- Every year, nearly four million cats are eaten in Asia.h
- On average, cats spend 2/3 of every day sleeping. That means a nine-year-old cat has been awake for only three years of its life.i
- Unlike dogs, cats do not have a sweet tooth. Scientists believe this is due to a mutation in a key taste receptor.d
- When a cat chases its prey, it keeps its head level. Dogs and humans bob their heads up and down.i
- The technical term for a cat’s hairball is a “bezoar.”f
- A group of cats is called a “clowder.”g
- Female cats tend to be right pawed, while male cats are more often left pawed. Interestingly, while 90% of humans are right handed, the remaining 10% of lefties also tend to be male.l
A cat cannot climb head first down a tree because its claws are curved the wrong way
A cat can’t climb head first down a tree because every claw on a cat’s paw points the same way. To get down from a tree, a cat must back down.i
- Cats make about 100 different sounds. Dogs make only about 10.i
- A cat’s brain is biologically more similar to a human brain than it is to a dog’s. Both humans and cats have identical regions in their brains that are responsible for emotions.i
- There are more than 500 million domestic cats in the world, with approximately 40 recognized breeds.k
- Approximately 24 cat skins can make a coat.e
- While it is commonly thought that the ancient Egyptians were the first to domesticate cats, the oldest known pet cat was recently found in a 9,500-year-old grave on the Mediterranean island of Cyprus. This grave predates early Egyptian art depicting cats by 4,000 years or more.g
- During the time of the Spanish Inquisition, Pope Innocent VIII condemned cats as evil and thousands of cats were burned. Unfortunately, the widespread killing of cats led to an explosion of the rat population, which exacerbated the effects of the Black Death.g
- During the Middle Ages, cats were associated with withcraft, and on St. John’s Day, people all over Europe would stuff them into sacks and toss the cats into bonfires. On holy days, people celebrated by tossing cats from church towers.g
Cats are the most popular pet in North American
Cats are North America’s most popular pets: there are 73 million cats compared to 63 million dogs. Over 30% of households in North America own a cat.g
- The first cat in space was a French cat named Felicette (a.k.a. “Astrocat”) In 1963, France blasted the cat into outer space. Electrodes implanted in her brains sent neurological signals back to Earth. She survived the trip.g
- The group of words associated with cat (catt, cath, chat, katze) stem from the Latincatus, meaning domestic cat, as opposed to feles, or wild cat.b
- The term “puss” is the root of the principal word for “cat” in the Romanian term pisicaand the root of secondary words in Lithuanian (puz) and Low German puus. Some scholars suggest that “puss” could be imitative of the hissing sound used to get a cat’s attention. As a slang word for the female pudenda, it could be associated with the connotation of a cat being soft, warm, and fuzzy.j
- Approximately 40,000 people are bitten by cats in the U.S. annually.g
- According to Hebrew legend, Noah prayed to God for help protecting all the food he stored on the ark from being eaten by rats. In reply, God made the lion sneeze, and out popped a cat.i
- A cat’s hearing is better than a dog’s. And a cat can hear high-frequency sounds up to two octaves higher than a human.a
- A cat can travel at a top speed of approximately 31 mph (49 km) over a short distance.a
- A cat can jump up to five times its own height in a single bound.a
- Some cats have survived falls of over 65 feet (20 meters), due largely to their “righting reflex.” The eyes and balance organs in the inner ear tell it where it is in space so the cat can land on its feet. Even cats without a tail have this ability.d
A cat rubs against people to mark them as their territory
A cat rubs against people not only to be affectionate but also to mark out its territory with scent glands around its face. The tail area and paws also carry the cat’s scent.a
- Researchers are unsure exactly how a cat purrs. Most veterinarians believe that a cat purrs by vibrating vocal folds deep in the throat. To do this, a muscle in the larynx opens and closes the air passage about 25 times per second.i
- When a family cat died in ancient Egypt, family members would mourn by shaving off their eyebrows. They also held elaborate funerals during which they drank wine and beat their breasts. The cat was embalmed with a sculpted wooden mask and the tiny mummy was placed in the family tomb or in a pet cemetery with tiny mummies of mice.d
- In 1888, more than 300,000 mummified cats were found an Egyptian cemetery. They were stripped of their wrappings and carted off to be used by farmers in England and the U.S. for fertilizer.i
- Most cats give birth to a litter of between one and nine kittens. The largest known litter ever produced was 19 kittens, of which 15 survived.c
- Smuggling a cat out of ancient Egypt was punishable by death. Phoenician traders eventually succeeded in smuggling felines, which they sold to rich people in Athens and other important cities.g
- The earliest ancestor of the modern cat lived about 30 million years ago. Scientists called it the Proailurus, which means “first cat” in Greek. The group of animals that pet cats belong to emerged around 12 million years ago.d
- The biggest wildcat today is the Siberian Tiger. It can be more than 12 feet (3.6 m) long (about the size of a small car) and weigh up to 700 pounds (317 kg).a
- The smallest wildcat today is the Black-footed cat. The females are less than 20 inches (50 cm) long and can weigh as little as 2.5 lbs (1.2 kg).a
- Many Egyptians worshipped the goddess Bast, who had a woman’s body and a cat’s head.i
- Mohammed loved cats and reportedly his favorite cat, Muezza, was a tabby. Legend says that tabby cats have an “M” for Mohammed on top of their heads because Mohammad would often rest his hand on the cat’s head.i
- While many parts of Europe and North America consider the black cat a sign of bad luck, in Britain and Australia, black cats are considered lucky.g
- The most popular pedigreed cat is the Persian cat, followed by the Main Coon cat and the Siamese cat.a
- The smallest pedigreed cat is a Singapura, which can weigh just 4 lbs (1.8 kg), or about five large cans of cat food. The largest pedigreed cats are Maine Coon cats, which can weigh 25 lbs (11.3 kg), or nearly twice as much as an average cat weighs.i
Some Siamese cats are cross-eyed to compensate for abnormal optic wiring
Some Siamese cats appear cross-eyed because the nerves from the left side of the brain go to mostly the right eye and the nerves from the right side of the brain go mostly to the left eye. This causes some double vision, which the cat tries to correct by “crossing” its eyes.i
- Researchers believe the word “tabby” comes from Attabiyah, a neighborhood in Baghdad, Iraq. Tabbies got their name because their striped coats resembled the famous wavy patterns in the silk produced in this city.i
- Cats hate the water because their fur does not insulate well when it’s wet. The Turkish Van, however, is one cat that likes swimming. Bred in central Asia, its coat has a unique texture that makes it water resistant.i
- The Egyptian Mau is probably the oldest breed of cat. In fact, the breed is so ancient that its name is the Egyptian word for “cat.”d
- The costliest cat ever is named Little Nicky, who cost his owner $50,000. He is a clone of an older cat.i
- A cat usually has about 12 whiskers on each side of its face.f
- A cat’s eyesight is both better and worse than humans. It is better because cats can see in much dimmer light and they have a wider peripheral view. It’s worse because they don’t see color as well as humans do. Scientists believe grass appears red to cats.d
- Spanish-Jewish folklore recounts that Adam’s first wife, Lilith, became a blackvampire cat, sucking the blood from sleeping babies. This may be the root of the superstition that a cat will smother a sleeping baby or suck out the child’s breath.f
- Perhaps the most famous comic cat is the Cheshire Cat in Lewis Carroll’s Alice in Wonderland. With the ability to disappear, this mysterious character embodies the magic and sorcery historically associated with cats.f
- In the original Italian version of Cinderella, the benevolent fairy godmother figure was a cat.f
Two Siamese cats discovered microphones hidden by Russian spies in Holland’s embassy in Moscow
In Holland’s embassy in Moscow, Russia, the staff noticed that the two Siamese cats kept meowing and clawing at the walls of the building. Their owners finally investigated, thinking they would find mice. Instead, they discovered microphones hidden by Russian spies. The cats heard the microphones when they turned on.
1.Most soccer players run 7 miles in a game.
2.The only 2 animals that can see behind itself without turning its head are the rabbit and the parrot.
3.Whip makes a cracking sound because its tip moves faster than the speed of sound.
4.It cost 7 million dollars to build the Titanic and 200 million to make a film about it.
5.When hippos are upset, their sweat turns red.
6.Every time you sneeze some of your brain cells die.
7.Your left lung is smaller than your right lung to make room for your heart.
8.Laughing lowers levels of stress hormones and strengthens the immune system. Six-year-olds laugh an average of 300 times a day. Adults only laugh 15 to 100 times a day.
9.Chewing gum while peeling onions will keep you from crying.
10.The Boeing 747 is capable of flying upside-down if it weren’t for the fact that the wings would shear off when trying to roll it over.
11.Never hold your nose and cover your mouth when sneezing, as it can blow out your eyeballs.
12.The world’s smartest pig, owned by a mathematics teacher in Madison, WI, memorized the multiplication tables up to 12.
13.In ancient Greece, children of wealthy families were dipped in olive oil at birth to keep them hairless throughout their lives.
14.Every Labrador retriever dreams about bananas once in a while.
15.Approximately one-sixth of your life is spent on Wednesdays.
16.You can actually sharpen the blades on a pencil sharpener by wrapping your pencils in aluminum foil before inserting them.
17.111,111,111 x 111,111,111 = 12,345,678,987,654,321
18.12 newborns will be given to the wrong parents daily.
19.123,000,000 cars are being driven down the U.S’s highways.
20.160 cars can drive side by side on the Monumental Axis in Brazil, the world’s widest road.
21.A cockroach can live several weeks with its head cut off.
22.A company in Taiwan makes dinnerware out of wheat, so you can eat your plate.
23.A cow produces 200 times more gas a day than a person.
24.A dime has 118 ridges around the edge.
25.A dragonfly has a lifespan of 24 hours.
The Titanic in 1912
Among the stories surrounding the sinking of the luxury liner Titanic in 1912 was a tale about an unlucky mummy whose curse was as responsible for that accident as that floating island of ice the tore open the ship’s hull. Though the story had been around for years, it spread rapidly in the wake of the popularity of the filmTitanic. The tale goes something like this:
In the late 1890’s a rich, young Englishman visiting the archaeological digs near Luxor purchased the coffin and mummy of The Princess of Amen-Ra. He arranged for it to be shipped back to his home, but was not there to receive it. He disappeared, never to be found. One of his companions on the trip later died, another lost an arm in an accident and a third lost his fortune in a bank failure.
The coffin reached England and was purchased by a businessman. Three members of the businessman’s household were injured in an auto accident and his house caught on fire. Convinced that the mummy was unlucky, the man donated it to the British Museum.
The staff at the museum reported hearing loud banging and crying noises coming from the coffin at night. Things were thrown around the exhibit room without explanation. Finally a watchman died. Then a photographer took a photo of the coffin. When he developed it, the image that appeared was so horrifying that the photographer killed himself.
The museum wanted to get rid of the unlucky mummy, but with it’s reputation they could not even give it away. Finally, an American archaeologist, who didn’t believe in the stories, purchased the mummy and coffin and had it sent back to the states on board the Titanic. The rest was, well, history…
Other version of this story has the archaeologist bribing the Titanic crew to have the mummy put into a life boat and later it winds up in New York City. The mummy is sold and shipped again and involved in one or two more shipwrecks before winding up on the bottom of the sea.
Is this a true story? Or just a weird tale?
Shipping records show no mummy was on board the Titanic (this may be why some versions of the tale say that the archaeologist smuggled it aboard). In no account by anyTitanic survivor do they mention sharing a lifeboat with a mummy (which wouldn’t have been easy to forget). Nor did any rescuer report taking a mummy on board.
The tale probably has its origins with two Englishmen named Douglas Murray and T.W. Stead. Murray and Stead claimed that an acquaintance of theirs bought a mummy in Egypt and had it placed in a drawing room in his home. The next morning every breakable item in the room had been smashed. The next night the mummy was left in another room with the same results..
Great loss of life, but no mummy
The pair also visited the British Museum and saw the coffin lid of Priestess Amun (there wasn’t ever a mummy, only the lid). They decided that the face depicted on it was a tormented horror. Combining the two stories, that of the breakable items and the scary lid, the two sold the tale to the newspapers. The tale later grew to include the Titanic.
The Titanic portion of the story may have been inspired by the loss of the Menkaure sarcophagus in 1838. The sarcophagus, which was being shipped from Egypt to England, was considered to be one of the finest examples of art from the Old Kingdom period. It went to the bottom of the sea when the ship carrying it, The Beatrice, sunk in deep water somewhere near Cartagena.
The truth is that the Priestess Amun coffin lid (British Museum item No. 22542) is still sitting quietly in the British Museum’s second Egyptian room, where it can be seen today
#8. Explode Your Genitals
We think we have a pretty good idea of what hackers are capable of: stealing your personal information, crashing your computer, Rollerblading like a sonofabitch and making out with Angelina Jolie (back when she was hot, before her alien DNA kicked in and she started looking like a hawk-monster).
But today’s hackers have finally crossed a line, and must be terminated with extreme prejudice. The offense? They’re trying to destroy your wang.
“The good news is that your leg is going to be fine …”
The newest MacBooks contain batteries with small monitor chips installed. It’s such a discreet addition that Apple didn’t feel the need to secure it, which of course means that hackers everywhere had to immediately set to work exploiting it. It gets pretty technical, but the gist of the process is this: The software uses a default password, which is the same in every single MacBook. By reverse engineering the firmware, hackers can render the battery useless or inject malware into the system through the chip (and you couldn’t even wipe your hard drive and reformat the system to get rid of it, because you probably won’t think to check your battery for a virus).
“Is it enough to Sharpie ‘Avira’ onto them?”
Or, if they’re feeling particularly villainous, they could just overheat the battery of your laptop (so named because it sits on top of your lap, which, you’ll recall, is where you keep your junk) to the point of bursting into flames or exploding. That’s right: Hackers are after your penis.
There is just no version of that sentence that is anything less than terrifying.
“Definitely that guy. You don’t play a druid without repercussions.”
#7. Cut Your Car’s Brakes
Security specialists at the University of Washington and the University of California have shown that new cars with computer systems onboard face a real security threat from hackers. These scientists were able to gain control of two vehicles and operate more than a dozen functions while the cars were in motion. This included things like braking, selective braking of each wheel (thus effectively “steering” the car) and shutting off the engine completely. Scarier still is that once they gained control of the vehicles, driver input was totally ignored: The pedals, wheel and switches all had no effect. They were also able to launch a “composite attack,” in which the malicious software would be erased after a crash, effectively leaving no evidence of tampering.
Just a quick flash of smoke followed by confusion and a throwing star.
Being vehicular-manslaughtered by cyberwarriors is the worst case scenario, of course.
It’s far more likely that these exploits will be used to simply steal the cars. Experts are predicting that the future of car theft is a split venture, with hackers selling their services to car thieves by providing them with the GPS location of the vehicle, then unlocking the door and starting the engine remotely so the thieves can drive off with it. Possible points of entry for a car hacker are through Bluetooth, a cellular network, the freaking tire pressure monitor and even music files. Yes, the next song you download could be your last, if the wrong hacker has been into it. So while we agree that Journey’sGreatest Hits is indeed a sweet album that you totally need for that road trip, you have to ask yourself the question: Is it worth dying for?
We’ll never stop believin’.
(The answer is yes, obviously.)
#6. Control a Nuclear Power Plant
When Scott Lunsford, a researcher for IBM’s Internet Security Systems, told the owners of an American nuclear power station that he could hack into their system through the Internet, they laughed in his face. They told him that he couldn’t do it; that it was “impossible.” Then they left to look up the word “hubris” in the dictionary while Lunsford hacked the holy shit out of their systems. It took his team less than a day to infiltrate and less than a week to take full control of the nuclear power station. He claimed it was “one of the easiest penetration tests” he had ever performed.
We’re pretty sure he was talking about the colons of the owners.
While he couldn’t have caused anything like a meltdown, Lunsford is still convinced that if he had been inclined, he could have done some significant damage within the system. All it would have taken was simply “closing a valve” to shut off power to most of a city. The particular system Lunsford hacked to gain control of the plant is powered by something called SCADA (Supervisory Control and Data Acquisition) software, and the bad news is that so is most of the rest of America’s infrastructure. SCADA controls things like water filtration plants and subway networks all across the nation, and its security is becoming weaker by the day, mostly due to ever-increasing Internet connectivity. Lunsford imagines a variety of catastrophic possibilities if cyber-terrorists ever learned of these exploits in the SCADA system, like he just did, and like we’re telling you about right now (uh … sorry, America).
Eh, New York doesn’t need electricity anyway.
#5. Use Your Computer Screen as a Two-Way Mirror
Odds are that if you’re reading this, you have a Webcam pointed at you right now and — NO DON’T LOOK AT IT! Just be cool, OK? Act natural …
Most likely, there’s nobody watching you. We assume even bored hackers have better things to do than watch someone play Call of Duty and distractedly drop Fritos on their underwear. But if a hacker ever did want to gain control of your Webcam to spy on you, it’s very doable. In fact, improperly or entirely unsecured Webcams have entire sites devoted to them: Here’s a whole subreddit of controllable Webcams that you’re going to lose an entire afternoon clicking on, just because you can.
They’ve been standing like that for six hours. And it is so hot.
Webcam manufacturers are well aware of this problem, too. Companies like Logitech are already fitting their Webcams with privacy shields (a fancy term for “lens caps”) to protect their users against unwanted access. As far as a motive for this kind of invasion of privacy, there are few reasons to hack a civilian’s personal Webcam short of spying on women changing … aaaand that’s exactly what the majority of cases turn out to beee…..
So if you’re an attractive woman reading this and you’re worried about your privacy, check for the LED indicator next to your Webcam to see when it’s active. And, uh … maybe send us a thank you message for introducing this vital information to you, and then just continue about your normal business: checking your email topless.
#4. Shower in Free Money
Remember the “easy money” scene from Terminator 2, when John Connor and his friend hack an ATM with a portable Atari computer? That wasn’t fiction. (Well, that one part, anyway. The rest of that movie was absolutely fictional. Sentient killer skeleton robots do not exist, and “Hasta la vista, baby” is not a thing that reasonable human beings say to one another.) Unlike most companies, ATM designers haven’t been getting hacked much in the last decade or so, and as such, their security measures are slightly behind the curve.
At last year’s Black Hat technical security conference, IOActive Labs’ Director of Security Research, Barnaby Jack, wanted to demonstrate just how easy it was to hack a couple of ATMs. He didn’t need to open up the machine or even make a withdrawal to accomplish this. He did everything entirely remotely, using only his laptop and a program called Jackpot. When he was done, a jaunty little tune played on his speakers, the word “jackpot” flashed on his screen, and the ATM started spitting out bills all over the place, presumably while Barnaby kicked his heels together and yipped like an old-timey prospector.
Roughly 40 percent of you are now typing “Jackpot full download” into Google.
#3. Crash the National Power Grid
By 2020, the U.K. wants to have a smart meter in every home to measure gas and electricity consumption. The devices send real-time data directly to the utility companies through a Web connection, thus providing customers with constantly updated information on energy conservation while simultaneously helping to manage national demand more efficiently. The smart meter sounds like a reasonable idea to us working stiffs (well, we’re not really working, but we sure are stiff!), but where we see just a little gray box outside that gives us power, a hacker sees a bunch of low-hanging fruit with minimal security, spanning the entire country.
Time to bake some hack pie, baby!
If just one of these boxes was infected with a worm, it could theoretically bring down the entire grid. In the case of the U.K.’s future national “smart grid” plan, that could potentially mean cutting the power off to an entire country.
That’s why the really good Modern Warfare players own generators.
Worldwide, there are already 40 million smart meters in use, and several of those networks operate in the U.S. Yet another team from IOActive (these guys are starting to sound like equal parts Robin Hood and Doctor Doom, aren’t they?) developed a worm and used it to illustrate the security flaws in these systems. With this worm in place, they did exactly what they warned, and successfully took control of an entire American power grid. Mike Davis, a senior consultant for the firm, issued this ominous statement: “We can switch off hundreds of thousands of homes potentially at the same time.” He didn’t append the statement with a list of demands or anything, but we’re forced to assume that it was followed by some sort of maniacal cackling.
#2. Stop Your Heart
Everything from your car to your blender is getting upgraded with a computer chip these days. Medical implants like pacemakers are no exception. Since they need to be updated somewhat remotely anyway (otherwise all maintenance would involve major surgery), they do have limited outside connectivity, allowing doctors to access your stored medical history, your name and address and your doctor’s name and address. Oh, and a skilled hacker can access all of it, too.
That’s right: They can hack your goddamn heart.
And as if we need to say it: Obviously they can remotely stop it beating while they’re in there.
“Damn you, V4g1n@B00bs87! Daaammnnn yoooouu …”
In some devices, like an implanted defibrillator, which shocks your heart back into activity if it ever seizes up, hackers can remotely shut off the device and wait for you to die or, if they just ain’t got all day, send it into test mode instead — where the pacemaker repeatedly delivers powerful, fatal shocks to the heart even when it’s already beating just fine.
Via Wikimedia Commons
But if you enter the Konami Code …
Diabetic implants like insulin pumps have proven to be another security risk: When hackers get access to one of these devices, they can mess with the levels being injected into the body, which, again, can have fatal consequences. Jay Radcliffe discovered this hack while he was dicking around with his own diabetic equipment. At first he thought it was “really cool” that he could just ditz around for a few minutes and gain access to computers within his own body. Then he realized that any bored teenager with the right skill set could have total mastery over whether he lives or dies.
#1. See You Naked
You know those full body scanners they have at airports now? They’re essentially robots that strip-search you with science, staring right through your clothes to see if you’re hiding a weapon or an embarrassing tattoo. But more disturbing than the simple fact that these pictures exist is the ease with which these X-ray devices can be hacked. Hackers can gain control of an airport’s PC from hundreds of miles away and download these pictures in a flash, probably kick-starting a new half-transparent ghostporn fetish (and the Internet is already at near critical levels of fetish saturation).
The images these devices capture are supposed to be deleted immediately after security views them, but that’s not always the case. Last year, images from an older type of full body scanner (slightly less naked-looking images) were leaked, and future privacy breaches like this are considered a very real threat. So if you’re planning to travel by air in the future, maybe hit the gym, do a little waxing and be more selective about your underwear choices, because you never know who could be judging your naked body in the near future. (Us. It’s probably going to be us.)
Oh yeah. This is … hot?
The mystic black lion….as we all know according to internet records and myths there is only one left in this breed..
Readers i donno how many of you know it but this breed of black lion is just a myth…most of the black lion images are photoshopped and published
This is your very first post. Click the Edit link to modify or delete it, or start a new post. If you like, use this post to tell readers why you started this blog and what you plan to do with it.