<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Peer To Peer Networks and Distributed Systems</title><description>The blog facilitates to share research ideas, paper review, and comments among P2P researchers.</description><managingEditor>noreply@blogger.com (汗)</managingEditor><pubDate>Wed, 28 Aug 2024 12:55:23 -0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">59</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://p2ptnews.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:image href="http://infodeikram.blogspot.com/"/><itunes:subtitle>The blog facilitates to share research ideas, paper review, and comments among P2P researchers.</itunes:subtitle><itunes:category text="Science &amp; Medicine"><itunes:category text="Natural Sciences"/></itunes:category><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>Resolving SVN Conflicts</title><link>http://p2ptnews.blogspot.com/2011/06/resolving-svn-conflicts.html</link><author>noreply@blogger.com (汗)</author><pubDate>Wed, 15 Jun 2011 05:48:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-4132502260808289994</guid><description>Our method for merging branches back to trunk:
branch&amp;gt; svn merge from trunk [rev_last_merged_from_trunk]:[HEAD]
branch&amp;gt; (resolve conflicts, deploy, test)
branch&amp;gt; commit
(at this point, the branch should be exactly what trunk has plus all changes done in the branch)
trunk&amp;gt; svn merge from branch [rev_first_branched_from_trunk]:[HEAD]
For some reason svn still sees a ton of conflicts </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Wuala: Reliable, secure, distributed storage.</title><link>http://p2ptnews.blogspot.com/2011/05/wuala-reliable-secure-distributed.html</link><category>tech</category><author>noreply@blogger.com (汗)</author><pubDate>Fri, 27 May 2011 04:27:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-2810795747321471662</guid><description>When you store a file, it is first encrypted on your computer and then chunked up and encoded into redundant fragments using erasure codes (Reed-Solomon codes). These encrypted, redundant fragments are then stored in our European data centers and in the Wuala cloud. We make sure that your data is always safe. A complete backup of your encrypted files is always kept on our servers, so that it can </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://3.bp.blogspot.com/-8U_E72HSndY/Td-K0UV0jJI/AAAAAAAAAX8/8QjR8jAPgNE/s72-c/wuala_logo.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Apple's applied for patent to prevent 'sexting' using iOS</title><link>http://p2ptnews.blogspot.com/2011/05/apples-applied-for-patent-to-prevent.html</link><author>noreply@blogger.com (汗)</author><pubDate>Fri, 27 May 2011 02:18:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-377692126044269411</guid><description>

Recently, Apple applied for patent to prevent 'sexting' via apple products e.g., iPod, iPad, iPhone. The patent explain who iOS manage to detect 'sex' related messages and prevent them from propagation among people in social network facilitated by apple products.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://1.bp.blogspot.com/-bDuqo1G_agQ/Td9sby-wzFI/AAAAAAAAAXs/F8y0nF7ereM/s72-c/6237502-610-330.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Mikogo: Free Web Conferenceing and Desktop Sharing</title><link>http://p2ptnews.blogspot.com/2011/05/mikogo-free-web-conferenceing-and.html</link><author>noreply@blogger.com (汗)</author><pubDate>Thu, 26 May 2011 08:15:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-8919495953057991868</guid><description>Mikogo web-conferencing, easy-to-use cross-platform desktop sharing tool,ideal for online meetings or remote support. Currently, it could share screen contents or application over Internet upto ten simultaneously remote people.

Mikogo is best (in term of saving energy, time, and costs) for collaborative environments where people (researcher, engineers, developers, financial advisors, insurance </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://3.bp.blogspot.com/-b2-oNcl_PM4/Td5umG1SxLI/AAAAAAAAAVs/lrTgQBaJ19U/s72-c/mikogo-logo.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Vyatta Network OS The Freedom of Software for Custom Network Edge Design</title><link>http://p2ptnews.blogspot.com/2011/05/vyatta-network-os-freedom-of-software.html</link><category>News</category><category>tech</category><author>noreply@blogger.com (汗)</author><pubDate>Thu, 26 May 2011 08:01:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-4665431039566720489</guid><description>"The Vyatta Network OS delivers advanced routing and security functionality for the enterprise branch and datacenter as well as the service provider edge and CPE. The Vyatta network operating system includes dynamic routing, stateful firewall, VPN support, threat protection, traffic management and more in a package that is optimized to take advantage of multicore x86 processing power, common </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://4.bp.blogspot.com/-8MuZOtQbKqQ/Td5rFlNFOfI/AAAAAAAAAVk/YnBPGYthrdA/s72-c/homepagegraphic.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Installation Guide for PPStream in Ubuntu</title><link>http://p2ptnews.blogspot.com/2011/05/installation-guide-for-ppstream-in.html</link><category>Hacks</category><author>noreply@blogger.com (汗)</author><pubDate>Tue, 24 May 2011 09:59:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-5267966900537608064</guid><description>totem-pps is PPStream plugin for Ubuntu 10.04.

1. Add one of ppa following sources

PPA for lucid

deb http://ppa.launchpad.net/portis25/ppa/ubuntu lucid main
deb-src http://ppa.launchpad.net/portis25/ppa/ubuntu lucid main

PPA for karmic

deb http://ppa.launchpad.net/portis25/cnav/ubuntu karmic main
deb-src http://ppa.launchpad.net/portis25/cnav/ubuntu karmic main

2. Install totem-pps

$ sudo </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Install Linux SopCast Player 0.4.0 In Ubuntu 11.04</title><link>http://p2ptnews.blogspot.com/2011/05/install-linux-sopcast-player-040-in.html</link><category>tech</category><author>noreply@blogger.com (汗)</author><pubDate>Tue, 24 May 2011 07:49:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-1234203690651851462</guid><description>SopCast Player is a Linux GUI front-end for the p2p streaming technology developed by SopCast. SopCast can play various TV channels (watch football games, HBO, AXN Movie and so on) for free, using the internet.



Here is how to install the latest SopCast Player 0.4 in Ubuntu 11.04.


1. You must download libstdc++ manually because this package is not included in the Ubuntu repositories. Don't </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://4.bp.blogspot.com/-h5ym26GXngg/TdvFixkvlSI/AAAAAAAAAT4/FdFF7TMZu5I/s72-c/sopcast_player-ubuntu.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Linux Kernal vulnerability and Denial of Service (DoS) attack</title><link>http://p2ptnews.blogspot.com/2011/05/linux-kernal-vulnerability-and-denial.html</link><author>noreply@blogger.com (汗)</author><pubDate>Tue, 24 May 2011 07:22:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-990155039493669124</guid><description>PRE-CERT Security Advisory
==========================

* Advisory: PRE-SA-2011-03
* Released on: 13 Apr 2011
* Last updated on: 13 Apr 2011
* Affected product: Linux Kernel 2.4 and 2.6
* Impact: denial-of-service
* Origin: storage devices
* Credit: Timo Warns (PRESENSE Technologies GmbH)
* CVE Identifier: CVE-2011-1577


Summary
-------

The Linux kernel contains a vulnerability that may lead to
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Arachni: Web application security scanner framework</title><link>http://p2ptnews.blogspot.com/2011/05/arachni-web-application-security.html</link><category>tech</category><author>noreply@blogger.com (汗)</author><pubDate>Tue, 24 May 2011 06:21:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-2785858630341218202</guid><description>Arachni is a high-performance (Open Source) Web Application Security Scanner Framework written in Ruby. Here is a newer version the Arachni.

The main focus of this release has been on distributed deployment and bugfixing. Which include some main additions: update of the HTML reports to include false positive reporting functionality and an updated WebUI with support for multiple Dispatchers.

In </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Neubot: A tool for measuring network neutrality</title><link>http://p2ptnews.blogspot.com/2011/05/neubot-tool-for-measuring-network.html</link><category>tech</category><author>noreply@blogger.com (汗)</author><pubDate>Tue, 24 May 2011 06:04:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-1392142426865061546</guid><description>Violations of network neutrality is to be honest providers in studying the small print carefully - or if because of configuration errors on the part of providers at one time World-of-Warcarft no longer works properly . But if the new Linux distribution, despite a 60 Seeders now a fifth of the pay range for the home computer with drips - how can we really prove that is manipulated here?

By </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>IPSO  Alliance were parterned with CDM Media Team</title><link>http://p2ptnews.blogspot.com/2011/05/ipso-alliance-were-parterned-with-cdm.html</link><category>News</category><author>noreply@blogger.com (汗)</author><pubDate>Tue, 24 May 2011 05:56:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-3083664819396043913</guid><description>"Chicago, IL, May 18, 2011 –(PR.com)– The CDM Media team announced today that it has partnered with the IPSO Alliance for three 2011 technology events.

The IPSO Alliance is an open, informal and thought-leading association of like-minded organizations and individuals that promote the value of using the Internet Protocol for the networking of Smart Objects. The IPSO Alliance performs </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>New Samsung Galaxy Tab</title><link>http://p2ptnews.blogspot.com/2011/05/new-samsung-galaxy-tab.html</link><category>tech</category><author>noreply@blogger.com (汗)</author><pubDate>Mon, 23 May 2011 11:06:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-1767086389700427913</guid><description>You want to make yourself comfortable with your Galaxy Tab prefer home or in a café and indulge in unlimited multimedia enjoyment? Then the new Samsung WiFi Galaxy Tab perfectly adapted to your needs. The variant offers all the advantages of the known Galaxy Tab as unbeatable manageability, 17.8 inch screen, great entertainment, thanks to e-book function and video playback in HD quality video </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://2.bp.blogspot.com/-YgzzLxZ8j4o/Tdqh83yizOI/AAAAAAAAATw/t19yl79WPwk/s72-c/Samsung-Galaxy-Tab-2.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Using Android Powered Smart Gadget at the Cost of Privacy.</title><link>http://p2ptnews.blogspot.com/2011/05/using-android-powered-smart-gadget-at.html</link><author>noreply@blogger.com (汗)</author><pubDate>Wed, 18 May 2011 13:16:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-2048957485079261815</guid><description>'New research from computer scientists at the University of Ulm in Germany have found that 99.7 percent of Android-powered smart phones are leaking data that, if stolen, can allow criminals into the personal data stored on Google's online services, or cloud.

The issue, say the researchers, is how the Google Android system uses software code—called authTokens—that allow users to log in to Google </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>What if you control a system physicaly or control firewire?</title><link>http://p2ptnews.blogspot.com/2011/05/what-if-you-control-system-physicaly-or.html</link><category>Attacks</category><author>noreply@blogger.com (汗)</author><pubDate>Wed, 18 May 2011 12:09:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-5786439550366031357</guid><description>Controlling computer systems physically or controlling Firewire port of those systems via intrusion could open a Pandora of attacks. For instance, controlling Firewire port like PCMCIA/Cardbus/Express card, etc., could lead to: memory leakage attack, RAM tampering, RAM spoofing, Dumping RAM contents, Grabbing ssh-agent keys, grabbing screen contents, modifying screen contents, bypassing logins/</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Chromebook from Acer</title><link>http://p2ptnews.blogspot.com/2011/05/hardware-specifications-11.html</link><category>tech</category><author>noreply@blogger.com (汗)</author><pubDate>Tue, 17 May 2011 09:00:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-3873008379540817839</guid><description>
ggv2id='146485f9';
Hardware: 
Specifications

11.6" HD Widescreen CineCrystalTM LED-backlit LCD
3.19 lbs | 1.45 kg
6 hours of continuous usage 1
Intel® AtomTM Dual-Core Processor
Built in dual-band Wi-Fi and World-mode 3G (optional)
HD Webcam with noise cancelling microphone
High-Definition Audio Support
2 USB 2.0 ports
4-in-1 memory card slot
HDMI port
Fullsize Chrome keyboard
Oversize </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://3.bp.blogspot.com/-DvUYNsDeSgI/TdKbWAHq-TI/AAAAAAAAATo/hjiTgU6q28Y/s72-c/acer-zgb-rightside-640x130.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Samsung Chromebooks</title><link>http://p2ptnews.blogspot.com/2011/05/samsung-chromebooks.html</link><category>tech</category><author>noreply@blogger.com (汗)</author><pubDate>Tue, 17 May 2011 08:57:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-2051446158709839356</guid><description>Hardware:

12.1" (1280x800) 300 nit Display
3.26 lbs / 1.48 kg
8.5 hours of continuous usage 1
Intel® AtomTM Dual-Core Processor
Built in dual-band Wi-Fi and World-mode 3G (optional)
HD Webcam with noise cancelling microphone
2 USB 2.0 ports
4-in-1 memory card slot
Mini-VGA port
Fullsize Chrome keyboard
Oversize fully-clickable trackpad



Specifications

For anyone who has used the Cr-48 </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://3.bp.blogspot.com/-MMYZTCsDn0U/TdKanJIOpaI/AAAAAAAAATA/qvcnwIcFyt0/s72-c/samsung-td-640x485.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Who want a Chromebook?</title><link>http://p2ptnews.blogspot.com/2011/05/who-want-chromebook.html</link><category>tech</category><author>noreply@blogger.com (汗)</author><pubDate>Tue, 17 May 2011 08:05:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-7870578811545705162</guid><description>In developer conference Google announced Chroomebook which would be launched on 15th June, 2011. Hardware made by Acer and Samsung would contain Google's Chrome OS. It will cost 20$ per month to get a Chromebook from Google. 

The most attractive feature of Chromebooks is the security it provides. Normally, Internet users i.e., surfer, faces passwords and web-browser history[1] steal without </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>What Will The Internet Look Like In 10 Years?</title><link>http://p2ptnews.blogspot.com/2011/05/what-will-internet-look-like-in-10.html</link><author>noreply@blogger.com (汗)</author><pubDate>Thu, 12 May 2011 06:48:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-8070140365377104117</guid><description>'The Internet Society engaged in a scenario planning exercise to reveal plausible courses of events that could impact the health of the Internet in the future. While obviously not intended to be a definitive overview of the landscape or all potential issues, we believe the results are interesting and, we hope, thought-provoking.

We are sharing them in the hope that they will inspire thought </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Google I/O 2011</title><link>http://p2ptnews.blogspot.com/2011/05/google-io-2011.html</link><author>noreply@blogger.com (汗)</author><pubDate>Wed, 11 May 2011 03:28:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-7558993337307680130</guid><description>
'Google I/O 2011 
brings together thousands of developers for two days of deep technical content, focused on building the next generation of web, mobile, and enterprise applications with Google and open web technologies such as Android, Google Chrome, Google APIs, Google Web Toolkit, App Engine, and more.'


Together with our GTUG partners and Student Ambassadors, we are hosting free viewing </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Tracking stolen or lost camera</title><link>http://p2ptnews.blogspot.com/2011/05/tracking-stolen-or-lost-camera.html</link><category>Crawlers</category><category>Ideas</category><category>Search</category><author>noreply@blogger.com (汗)</author><pubDate>Fri, 6 May 2011 12:09:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-7834597207305402020</guid><description>Here is a nice tracking site for stolen or lost cameras. One need to enter serial code of camera to the site which will search missing camera by searching photo (were taken by the camera) on web. The site's database has over million of camera sightings. 

Normally, every photo consist of secret information such as camera model, dates, etc This sort of information is called Exchangeable Image File</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Cisco IOS SNMP Message Processing Denial Of Service Vulnerability</title><link>http://p2ptnews.blogspot.com/2011/05/cisco-ios-snmp-message-processing.html</link><category>DoS</category><category>Security</category><category>Vulnerability</category><author>noreply@blogger.com (汗)</author><pubDate>Thu, 5 May 2011 08:02:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-7603875191226515411</guid><description>------------------------------------------------------------------
I. Summary

Cisco Internetwork Operating System (IOS) 15.0 attempts to process SNMP solicited operations on improper ports (UDP 161,162), which allows remote attackers to cause a denial of service when SNMP is disabled.

------------------------------------------------------------------
II. Description

It has been reported that </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Cisco IOS UDP Denial of Service Vulnerability</title><link>http://p2ptnews.blogspot.com/2011/05/cisco-ios-udp-denial-of-service.html</link><category>DoS</category><category>Vulnerability</category><author>noreply@blogger.com (汗)</author><pubDate>Thu, 5 May 2011 08:01:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-917817397807773592</guid><description>------------------------------------------------------------------
I. Summary

Cisco routers running IOS 15.0 allows a remote attacker to cause a denial of service via a flood of UDP packets (a randomly chosen UDP port).

------------------------------------------------------------------
II. Description

A potential denial of service condition may exist in Cisco's IOS firmware.

The problem </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Is over-qualification need of time?</title><link>http://p2ptnews.blogspot.com/2011/05/is-over-qualification-need-of-time.html</link><author>noreply@blogger.com (汗)</author><pubDate>Thu, 5 May 2011 02:52:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-2117397231898790268</guid><description>"Software has also been replacing engineers in such tasks as chip design. More
broadly, the idea that modern technology eliminates only menial jobs, that
well-educated workers are clear winners, may dominate popular discussion, but
it's actually decades out of date." more ...

Searching for over-qualified persons are hard and here is an article for those who are over-qualified. more ...</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Cloud computing and risk management</title><link>http://p2ptnews.blogspot.com/2011/05/cloud-computing-and-risk-management.html</link><author>noreply@blogger.com (汗)</author><pubDate>Thu, 5 May 2011 01:21:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-7548276246420283502</guid><description>"The cloud computing model is being adopted by many organizations because of it's efficiency, performance and cost benefits. But some organizations may be shying away from cloud because of security concerns. Read this data sheet from IBM to learn about services from IBM that can help you secure your cloud computing solutions. Discover how IBM experts can guide you through the security and privacy</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Free comic books</title><link>http://p2ptnews.blogspot.com/2011/05/free-comic-books.html</link><category>books</category><category>comic</category><category>tech</category><author>noreply@blogger.com (汗)</author><pubDate>Thu, 5 May 2011 01:13:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8922623128269073337.post-1107875579702745886</guid><description>Big news for those, enthusiasts, who spend money on buying comic books and reading materials. freecomicbookday.com is going to offer free books on 7th of May 2011. Their collection include: 
* Amazing Spider-man 
* Avatar Last Airbender and Star Wars: The clone wars
* Elric the Balance Lost
* Mouse Guard and Dark Crystal Flip Book



For more info: www.freecomicbookday.com</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>