Thursday, January 5, 2017

Youtube daily report Jan 5 2017

When Does The Kendrick Lamar x Reebok Classic Club C Come Out? | Fast News 247

In order to have a cool sneaker, it seems as though you must have a celebrity's name attached to it.

Hence the Kendrick Lamar x Reebok collaboration. Kendrick Lamar has previously collaborated on two different sneakers with Reebok

and on Wednesday, Lamar announced a third sneaker collab — the Reebok Classic x Kendrick Lamar Club C — which will be coming out soon.

This new take on one of Reebok's classic sneakers features a black and white acid wash print which,

according to Lamar, "represents equality within society and coming together as one,"

and the letters "K" and "O" are in red to represent Lamar's nickname "K Dot."

The Kendrick Lamar x Reebok Classic Club C sneaker will hit shelves on Jan. 13,

and if they are like any other celebrity sneaker collab, they will probably sell out immediately.

But, with this being the third Reebok collaboration under Lamar's belt, you can almost guarantee

that he'll continue to create dope sneakers for the foreseeable future,

especially because Lamar is very interested in using his sneakers to bring people together.

"Now more than ever it is important for individuals to come together as one.

This sneaker represents that call for unity and equality, while also pushing people to look beneath the surface

and uncover the hidden messages," Lamar said in a press release.

"This is something I try to do with my music, and now here with the Club C."

Of course if Kendrick Lamar designs them, you know they're going to be cool.

For more infomation >> When Does The Kendrick Lamar x Reebok Classic Club C Come Out? | Fast News 247 - Duration: 2:57.

-------------------------------------------

How to Draw Spider-Man - Di...

For more infomation >> How to Draw Spider-Man - Di...

-------------------------------------------

Love Lele Pons?

For more infomation >> Love Lele Pons?

-------------------------------------------

S. Korea's foreign ministry calls in Chinese ambassador to Seoul amid THAAD dispute - Duration: 0:54.

Tensions escalate between South Korea and China over the THAAD decision.

Seoul's foreign ministry stress stationing the U.S. missile defense system is a necessity

in protecting the country from North Korea's nculear and missile threats.

The statement comes in the wake of a trip to China by a group of South Korean lawmakers

from the main opposition Democratic Party, which discussed THAAD with the Chinese Foreign

Minister.

Wang Yi reportedly reiterated Beijing would not accept the decision.

Korea's foreign ministry also called in China's ambassador to Seoul today... and made its

position clear on the deployment.

It added, however, the summons was planned before the opposition lawmakers' trip to Beijing.

Talks between Deputy Foreign Minister Kim Hyoung-zhin... and Chinese Ambassador Qiu

Guohong... also touched on other topics of mutual interest.

Earlier in the day,...

South Korea's defense ministry once again stressed it WILL deploy THAAD this year...

as scheduled,... adding it's a matter of sovereign and security rights.

For more infomation >> S. Korea's foreign ministry calls in Chinese ambassador to Seoul amid THAAD dispute - Duration: 0:54.

-------------------------------------------

How To Beat Kirby S Dreamland - Duration: 1:02.

For more infomation >> How To Beat Kirby S Dreamland - Duration: 1:02.

-------------------------------------------

Vœux de David Alis aux personnels et étudiant(e)s de Rennes 1 - Duration: 3:35.

For more infomation >> Vœux de David Alis aux personnels et étudiant(e)s de Rennes 1 - Duration: 3:35.

-------------------------------------------

How To Beat Five Nights At Freddy S 20 20 20 20 Mode - Duration: 3:04.

For more infomation >> How To Beat Five Nights At Freddy S 20 20 20 20 Mode - Duration: 3:04.

-------------------------------------------

How To Beat Five Nights At Freddy S - Duration: 3:06.

For more infomation >> How To Beat Five Nights At Freddy S - Duration: 3:06.

-------------------------------------------

How To Beat King Dodongo In The Legend Of Zelda Ocarina Of Time - Duration: 1:22.

For more infomation >> How To Beat King Dodongo In The Legend Of Zelda Ocarina Of Time - Duration: 1:22.

-------------------------------------------

How To Beat Cynthia In Pokemon Black White - Duration: 2:22.

For more infomation >> How To Beat Cynthia In Pokemon Black White - Duration: 2:22.

-------------------------------------------

How To Beat Dongorongo In The Legend Of Zelda Phantom Hourglass - Duration: 1:44.

For more infomation >> How To Beat Dongorongo In The Legend Of Zelda Phantom Hourglass - Duration: 1:44.

-------------------------------------------

How To Beat Everyone On Counter Strike 1 6 - Duration: 2:10.

For more infomation >> How To Beat Everyone On Counter Strike 1 6 - Duration: 2:10.

-------------------------------------------

That awkward moment when you say NO to service charges - Duration: 1:24.

For more infomation >> That awkward moment when you say NO to service charges - Duration: 1:24.

-------------------------------------------

How To Beat Level 59 In Pet Rescue Saga - Duration: 2:16.

For more infomation >> How To Beat Level 59 In Pet Rescue Saga - Duration: 2:16.

-------------------------------------------

How To Beat Candy Crush Level 30 - Duration: 2:00.

For more infomation >> How To Beat Candy Crush Level 30 - Duration: 2:00.

-------------------------------------------

How To Beat Drug Addiction - Duration: 15:01.

For more infomation >> How To Beat Drug Addiction - Duration: 15:01.

-------------------------------------------

How To Beat Candy Crush Without Paying Anything - Duration: 4:44.

For more infomation >> How To Beat Candy Crush Without Paying Anything - Duration: 4:44.

-------------------------------------------

How To Beat Iron Man The Game - Duration: 1:00.

For more infomation >> How To Beat Iron Man The Game - Duration: 1:00.

-------------------------------------------

How To Beat Elizabeth In Persona 3 - Duration: 7:14.

For more infomation >> How To Beat Elizabeth In Persona 3 - Duration: 7:14.

-------------------------------------------

How To Beat Cerberus On Kingdom Hearts Easily - Duration: 0:57.

For more infomation >> How To Beat Cerberus On Kingdom Hearts Easily - Duration: 0:57.

-------------------------------------------

How To Beat Candy Crush Level 29 - Duration: 2:54.

For more infomation >> How To Beat Candy Crush Level 29 - Duration: 2:54.

-------------------------------------------

How To Beat Everyone In The Runescape Wilderness And Duel Arena - Duration: 1:32.

For more infomation >> How To Beat Everyone In The Runescape Wilderness And Duel Arena - Duration: 1:32.

-------------------------------------------

How To Beat Jordan On Expert In Guitar Hero - Duration: 3:37.

For more infomation >> How To Beat Jordan On Expert In Guitar Hero - Duration: 3:37.

-------------------------------------------

Shadow - Inertial Mocap

For more infomation >> Shadow - Inertial Mocap

-------------------------------------------

Disney's Pinocchio

For more infomation >> Disney's Pinocchio

-------------------------------------------

Nail Art Desing | Learn Colors for Children - Duration: 3:00.

For more infomation >> Nail Art Desing | Learn Colors for Children - Duration: 3:00.

-------------------------------------------

Аниме приколы под музыку #73 | Смешные моменты аниме #73 | anime crack | anime coub (Specially) +18 - Duration: 15:29.

Hello

Nice view

For more infomation >> Аниме приколы под музыку #73 | Смешные моменты аниме #73 | anime crack | anime coub (Specially) +18 - Duration: 15:29.

-------------------------------------------

Disabled veterans looking for help to find missing dogs - Duration: 2:29.

For more infomation >> Disabled veterans looking for help to find missing dogs - Duration: 2:29.

-------------------------------------------

JE SUIS CHEWBACCA - Duration: 2:16.

Let's Go !

Everything good ?

GO PRO

I d'ont like water

Count three and I jump !

Cheers !

For more infomation >> JE SUIS CHEWBACCA - Duration: 2:16.

-------------------------------------------

How To Beat Ghirahim - Duration: 3:53.

For more infomation >> How To Beat Ghirahim - Duration: 3:53.

-------------------------------------------

20 Détails Incroyables Cachés Dans Les Films - Duration: 10:37.

For more infomation >> 20 Détails Incroyables Cachés Dans Les Films - Duration: 10:37.

-------------------------------------------

How To Control Your Thoughts With Mantras - Powerful! - Duration: 9:51.

Hello!

In this video you will learn to control your thoughts in order to achieve your dreams and

improve the quality of your life.

This is the method used by Buddhist monks and Muhammad Ali to destroy one-by-one their

fears.

Stay until the end of the video because I will share with you step-by-step the exercise

that will allow you to do it.

Here we go.

Hey this is Juan Camilo Lovera from Secrets of Happiness and today we're going to study

our fifth principle in order to live with eternal happiness.

If this is the first video that you watch I just want to let you know that we have more

videos that will complement this knowledge.

Okay, did you know that everything, all the businesses that exist, all the companies,

all the projects, all what you see in the reality, this beautiful Christmas tree, Mc

Donalds, Apple, all the things that we know were created twice.

Firstly if the mind of someone and secondly in the reality.

All the things that we create were first created in our mind.

This is like a superpower that we have as humans, that we can control our minds, we

can control our thoughts and depending on the quality of our thoughts as same will be

the quality of our lives.

So today we are going to learn, how to control our thoughts in order to direct them to the

place and to the direction that we want.

Lets think for example that you feel fear of heights, high places.

Each time that you go to a high place, to a high building and you tell yourself.

"I feel fear, I feel frighten, I don't want to see the floor".

Each time you are telling yourself that kind of messages, that kind of thoughts you are

feeding and making stronger your fear.

Imagine that this is a monster inside of you.

Fears are like monsters.

If you realize, are just simple thoughts that we create and each time that we repeat ourselves

negative thoughts, we are telling our mind and our brain "yes, this monster is stronger".

Otherwise think on this example, the next time that you go to that high building or

to that high place you are going to tell yourself, "I feel confident in heights, I enjoy being

in high places" and this will begin destroying that monster and you are going to take control

of your thoughts.

And at the same time you are going to take control of your decisions and the way how

you are living your life.

Right?

Today we are going to study the exercise step-by-step that ancient people and successful people

is using in order to destroy their fears and achieve what they want.

Just in a second I will give you the exercise but before that I need to let you know something

very important.

Each time that we complain, that we use negative thoughts and negative words such as: impossible,

I can't, it's not for me and so on.

We are destroying our energy and our potential.

Imagine the tire of a bike, each time we tell ourselves a negative thought, it's like an

energy leak.

Is like the tire is leaking, it's exactly the same.

The air is going out from the tire.

The energy and the potential is getting out from ourselves.

Each time we use negative thoughts, so we need to take care about the messages and the

thoughts that we use to ourselves.

If you want to be successful, which kind of thoughts you want to use?

Positive or negative?

You want to tell yourself "I can, I'm capable, I have tenacity, I have confidence" or "I

cannot, I don't know how, its not the time".

You have the answer, not?

Destroy that kind of thoughts of your mind and we are going to learn, how to do it.

And the way is by using something called Mantras.

The mantras are short sentences, short affirmations that program your brain, that program yourself

in order to believe something that you want to do it.

So, I will give you some examples.

The first one is from this amazing book.

I highly recommend this book.

The monk who sold his Ferrari from Robin Sharma.

And the mantra he suggests is so simple: "I am more than I appear to be, all the worlds

strength and power rests inside me"., "I am more than I appear to be, all the worlds strength

and power rests inside me".

And you need to repeat this to yourself at least 30 times each day and you will feel

the big difference that it makes.

With conviction, "I am more than I appear to be, all the worlds strength and energy

rests inside me", "I am more than I appear to be, all the worlds strength and energy

rests inside me" and you can do it aloud as am I doing right now, which is great because

you feel with enthusiasm and with conviction.

Otherwise you can do it in your mind, but I highly recommend you to it in this way,

with conviction.

And you can also create your own mantras, depending on what you want to achieve.

For example, years ago I was so lazy, I need to recognise that, I didn't do exercise and

I remember that a lot of times I feel lazy to do something, to wake up early and I create

this powerful mantra for myself.

"I am vitality, positive attitude and enthusiasm", "I am vitality, positive attitude and enthusiasm"

and I repeat myself this mantra everyday.

When I feel tired, when I don't want to do something I repeat this myself and it's like

magic.

Is a way to program your brain.

And I told you that Muhammad Ali used this power, he created this mantra for himself

"I am the greatest", "I am the greatest".

Imagine if you look at the mirror and you repeat yourself everyday "I am the best speaker,

I am the best soccer player, I am the best cooker in the world".

This is a way to program your brain, to believe in a very deep way that you are that person,

and you are going to become that kind of person.

Because you are telling your brain, you are telling your body, you are telling your soul

and all of you that you are that kind of person.

So I will give you 2 simple exercises for this week.

The first exercise is, you need to take control of your thoughts, so each time that you identify

and detect that you are telling yourself a negative thought.

Such as impossible, I can't and other kind of words you are going to do this.

You are going to pass your finger through your throat so for example.

Lets say I'm with my mom and she said.

"Okay we need to arrive in one hour to this place" and you said "it's impossible mom".

And you detect that kind of thought, you are going to do this.

Simple.

Why?

Because this is also programming your brain, is telling that you are killing yourself.

Each time you tell yourself, "I can't, Impossible" and so on.

You are going to remember very easy that you are killing yourself, that you are killing

your potential and you are destroying your energy.

So thats the first exercise.

And the second one is, you are going to choose one mantra, you can choose one of the ones

that I give you or you can design your own mantra.

Lets think, coming back to the example of the fear of heights.

Create this mantra for example.

"I enjoy and I am confident with heights", "I enjoy and I am confident with heights",

"I enjoy and I am confident with heights".

And you are going to remember and repeat this mantra at least 10 times per day in order

to program your brain.

Lets think on finances "I am a rich and abundant person", "I am a rich and abundant person",

"I am a rich and abundant person" and repeat to yourself.

Okay that was everything for today, trust me.

The quality of our thoughts defines the quality of our lives.

And let me know which mantra do you define in the comments.

If you want to keep learning subscribe to the channel and if you like this video please

thumbs-up.

I'm Juan Camilo and I'm signing off.

For more infomation >> How To Control Your Thoughts With Mantras - Powerful! - Duration: 9:51.

-------------------------------------------

La datte - L'amie des desserts sans sucre - Duration: 2:34.

For more infomation >> La datte - L'amie des desserts sans sucre - Duration: 2:34.

-------------------------------------------

Is This the Accidental Mastermind in the DNC Hack - Duration: 6:22.

Is This the Accidental Mastermind in the DNC Hack?

BY PATRICK TUCKER.

The list of characters that the White House is sanctioning for participating in the �Fancy

Bear� DNC hacks reads like a casting call for a James Bond movie (the Roger Moore years.)

A quick image search on the names turns up a handful of GRU officers in olive military

uniforms, complete with red-piped epaulets, among others.

But one company on the list stands out, and the founder, a young woman named Alisa Esage

Shevchenko, is suddenly caught in the glare of a very unwanted spotlight.

MOST READ

1 Weaponized Narrative Is the New Battlespace

2 The Key to Putin�s Cyber Power

3 The Technology Race to Build � or Stop � North

Korea�s Nuclear Missiles SUBSCRIBE

Receive daily email updates: Subscribe to the Defense One daily.

Be the first to receive updates.

Enter your email Subscribe

The White House, along with the Treasury Department and the Department of Homeland Security singled

out Shevchenko�s company, Zorsecurity (a.k.a. Esage Lab), for providing the GRU with �technical

research and development.�

Shevchenko denies the accusations.

Speaking to Forbes writer Thomas Fox-Brewster, she called them �sick.� On Twitter, Shevchenko

claimed that the company went out of business more than a year ago.

Zorsecurity�s site is now blank, though at post time plenty of live HTML remained

on the home page.

Among other things, it advertises the company�s mission: �to protect Russian companies from

professional computer attacks.� That�s the same mission the site listed on April

3, 2015, when the site was archived.

The page also notes Shevchenko�s first-place finish in a �competition for the breaking

of critical infrastructure, held in the framework of an international conference Positive Hack

Days 2014.�

A quick search for zorsecurity.ru�s Internet protocol number takes you to 159.253.20.176,

a modestly designed page that serves as an anchor for more active social media accounts.

Shevchenko worked at cyber security company Kaspersky from 2003 until 2009 before starting

her own company called Esage Labs.

At Kaspersky, she specialized in rootkits, according to a 2014 profile in Russian Forbes.

A rootkit allows users to gain privileged access to a computer while hiding their presence

on the network.

Esage played a role in either creating or selling a program, Malwas, that has not been

publicly released.

The program allows a hacker to hop from computer to computer (or endpoints) to evade detection.

DON'T MISS

The Boeing and Saab pilot training jet flies for the first time on Dec. 20, 2016, in St.

Louis.

A New Military Jet Flies Just One Year After It Was Designed

VIDEO: The F-35B Just Got A Lot Deadlier A global business empire raises the question:

will the next president�s foreign policy serve America�s interests or his own?

Tracking Trump�s National-Security Conflicts of Interest

A South Korean army soldier watches a TV news program showing North Korea's ballistic missile

believed to have been launched from underwater and North Korean leader Kim Jong-un, at Seoul

Railway station in Seoul, Aug. 25, 2016.

Washington�s Dangerous Drums of War on North Korea

America�s War-by-Airstrike in Three Charts Similar endpoint hopping was one characteristic

of the Russian-backed attack on the Joint Chief�s non-classified email system in 2015.

But it�s not unique to the DNC or the Pentagon hack.

�When you typically see these large-scale attacks, where you see these large amounts

of lateral movement� � jumping from one computer to another within the network � �and

especially when you have relatively tightly wound network controls, a lot of the time

you don�t have the command-and-control architecture to be able to go in and see the attack,�

said a representative from a company that the Defense Department called in to remediate

the attacks.

�So the advance threat characteristics change to be more automated, a kind of pervasive

deployment using common vulnerabilities and exploiting them widely.�

Importantly, the government�s forensic case for the sanctions, and the accompanying appendix,

does not link Shevchenko to any particular smoking guns.

It makes references to various remote-access tools (named after integers) as well as a

variant of a malware program called OnionDuke.

Shevchenko�s material support could have come in the form of that OnionDuke variant,

or the remote-access tools, or some other zero-day or bug along the way.

Or, as Shevchenko claims, the U.S. government could be making a mistake.

In its lack of specificity connecting the individuals named to the actions and tools

outlined, the report inadvertently pushes the reasonable reader to the lattermost conclusion.

On a background call with reporters on Thursday, one senior administration official said that

the evidence should be strong enough to �stand up in court.� So far, it resembles, to high

degree, reports that have already come out publicly and serves as a poor indictment of

anyone (at least according to many experts that have played a contributing role in the

investigation.)

None of that changes the consensus view among private researchers and the intelligence community,

that Russian actors were indeed behind the DNC hack.

For more infomation >> Is This the Accidental Mastermind in the DNC Hack - Duration: 6:22.

-------------------------------------------

Silence

For more infomation >> Silence

-------------------------------------------

Watch We Love You

For more infomation >> Watch We Love You

-------------------------------------------

Pojďme Hrát Scooby Doo (2) - Mystery / Záhada (Sega verze) - |28| - Raketové Finále {CZ} - Duration: 15:01.

For more infomation >> Pojďme Hrát Scooby Doo (2) - Mystery / Záhada (Sega verze) - |28| - Raketové Finále {CZ} - Duration: 15:01.

-------------------------------------------

United Airlines leaves Virginia minor stranded in Upstate New York - Duration: 2:40.

For more infomation >> United Airlines leaves Virginia minor stranded in Upstate New York - Duration: 2:40.

-------------------------------------------

Is This the Accidental Mastermind in the DNC Hack - Duration: 6:22.

Is This the Accidental Mastermind in the DNC Hack?

BY PATRICK TUCKER.

The list of characters that the White House is sanctioning for participating in the �Fancy

Bear� DNC hacks reads like a casting call for a James Bond movie (the Roger Moore years.)

A quick image search on the names turns up a handful of GRU officers in olive military

uniforms, complete with red-piped epaulets, among others.

But one company on the list stands out, and the founder, a young woman named Alisa Esage

Shevchenko, is suddenly caught in the glare of a very unwanted spotlight.

MOST READ

1 Weaponized Narrative Is the New Battlespace

2 The Key to Putin�s Cyber Power

3 The Technology Race to Build � or Stop � North

Korea�s Nuclear Missiles SUBSCRIBE

Receive daily email updates: Subscribe to the Defense One daily.

Be the first to receive updates.

Enter your email Subscribe

The White House, along with the Treasury Department and the Department of Homeland Security singled

out Shevchenko�s company, Zorsecurity (a.k.a. Esage Lab), for providing the GRU with �technical

research and development.�

Shevchenko denies the accusations.

Speaking to Forbes writer Thomas Fox-Brewster, she called them �sick.� On Twitter, Shevchenko

claimed that the company went out of business more than a year ago.

Zorsecurity�s site is now blank, though at post time plenty of live HTML remained

on the home page.

Among other things, it advertises the company�s mission: �to protect Russian companies from

professional computer attacks.� That�s the same mission the site listed on April

3, 2015, when the site was archived.

The page also notes Shevchenko�s first-place finish in a �competition for the breaking

of critical infrastructure, held in the framework of an international conference Positive Hack

Days 2014.�

A quick search for zorsecurity.ru�s Internet protocol number takes you to 159.253.20.176,

a modestly designed page that serves as an anchor for more active social media accounts.

Shevchenko worked at cyber security company Kaspersky from 2003 until 2009 before starting

her own company called Esage Labs.

At Kaspersky, she specialized in rootkits, according to a 2014 profile in Russian Forbes.

A rootkit allows users to gain privileged access to a computer while hiding their presence

on the network.

Esage played a role in either creating or selling a program, Malwas, that has not been

publicly released.

The program allows a hacker to hop from computer to computer (or endpoints) to evade detection.

DON'T MISS

The Boeing and Saab pilot training jet flies for the first time on Dec. 20, 2016, in St.

Louis.

A New Military Jet Flies Just One Year After It Was Designed

VIDEO: The F-35B Just Got A Lot Deadlier A global business empire raises the question:

will the next president�s foreign policy serve America�s interests or his own?

Tracking Trump�s National-Security Conflicts of Interest

A South Korean army soldier watches a TV news program showing North Korea's ballistic missile

believed to have been launched from underwater and North Korean leader Kim Jong-un, at Seoul

Railway station in Seoul, Aug. 25, 2016.

Washington�s Dangerous Drums of War on North Korea

America�s War-by-Airstrike in Three Charts Similar endpoint hopping was one characteristic

of the Russian-backed attack on the Joint Chief�s non-classified email system in 2015.

But it�s not unique to the DNC or the Pentagon hack.

�When you typically see these large-scale attacks, where you see these large amounts

of lateral movement� � jumping from one computer to another within the network � �and

especially when you have relatively tightly wound network controls, a lot of the time

you don�t have the command-and-control architecture to be able to go in and see the attack,�

said a representative from a company that the Defense Department called in to remediate

the attacks.

�So the advance threat characteristics change to be more automated, a kind of pervasive

deployment using common vulnerabilities and exploiting them widely.�

Importantly, the government�s forensic case for the sanctions, and the accompanying appendix,

does not link Shevchenko to any particular smoking guns.

It makes references to various remote-access tools (named after integers) as well as a

variant of a malware program called OnionDuke.

Shevchenko�s material support could have come in the form of that OnionDuke variant,

or the remote-access tools, or some other zero-day or bug along the way.

Or, as Shevchenko claims, the U.S. government could be making a mistake.

In its lack of specificity connecting the individuals named to the actions and tools

outlined, the report inadvertently pushes the reasonable reader to the lattermost conclusion.

On a background call with reporters on Thursday, one senior administration official said that

the evidence should be strong enough to �stand up in court.� So far, it resembles, to high

degree, reports that have already come out publicly and serves as a poor indictment of

anyone (at least according to many experts that have played a contributing role in the

investigation.)

None of that changes the consensus view among private researchers and the intelligence community,

that Russian actors were indeed behind the DNC hack.

For more infomation >> Is This the Accidental Mastermind in the DNC Hack - Duration: 6:22.

-------------------------------------------

Scooby Doo (2) - Mystery (Sega) - Walkthrough - |28| Rocket Finale {EN} - Duration: 15:01.

Point and Click adventures should add all the solutions that betatesters come with during testing, which would solve given situation in full. :D

The second part of this game is rather unfinished, there are many object descriptions missing, collision boxes are totally out of control, the puzzle solutions are sometimes impossible to come up with from a human being.

Jako poslední vìc použijte šipku s míèem.

WHY NOT PUSH HIM? THE RESULT WOULD BE COMPLETELY THE SAME ONE.

It never was safe to begin with. :D

xD

Thanks for watching! - Templayer

?? xD

So that should be all for this game.

I'm planning on playing all the Scooby Doo adventure games.

I'm going to make this a 15 minute video, just because I can. :D

No comments:

Post a Comment