hellreturn
Management-
Posts
2836 -
Joined
-
Last visited
-
Days Won
53
Content Type
Forums
Profiles
Events
Gallery
Downloads
Articles
Everything posted by hellreturn
-
"A lot of the guys working on Modern Warfare 3 are the same guys who worked on Modern Warfare 2 and Modern Warfare," the executive said to IndustryGamers. "A lot of them are Infinity Ward sort of lifers and have been there from the beginning." Some have questioned Infinity Ward's credit following the forced departure of studio leads Frank West and Vince Zampella, along with an unknown number of colleagues, now at the ReSpawn Entertainment. "A lot of the turmoil, it all happened before I got here, so I never got to work with the old Infinity Ward," Hirshberg admitted. He continued, "I only got to work with the new Infinity Ward, and all I can tell you is while they went through a huge transition, and while there was a lot of rebuilding that had to happen and they had to bring in some new talent to replace some of the people that had left, this is one of the most dazzlingly creative group of people I've ever met in my life. And so anyone who tells you, 'This is not the real Infinity Ward' is wrong. This is an unbelievable developer, an unbelievably talented studio… and they've got something to prove, too. I think they've taken a lot of pride in proving the skeptics wrong and so far, the reception of Modern Warfare 3 has been pretty great." Sledgehammer is on board Modern Warfare 3, but Hirshberg told the game is benefiting, rather than suffering, from more than one cook eyeing the broth. Hirshberg added, "They welcomed in a partner and that was probably a decision born out of necessity – nobody probably would have designed it that way proactively, but because they were going through a rebuilding right in the middle of this development, they welcomed a pretty high octane partner into their creative process." "And Sledgehammer truly has treated them as partners, and the game is a reflection of a combined vision between those two studios. And to my great delight it is a one plus one equals three situation. The game has gotten better because of these two very strong, creative forces working together," he explained. Modern Warfare 3 is expected in November.
-
This is so nerd vs nerd Looks like luz boat is sinking like titanic.
-
A group calling itself the A-Team has posted what they contend are the names, locations, aliases and even family members of the hacking cabal known as Lulz Security. Could this be the real reason the high-profile hacking group disbanded this weekend? Listening to A-Team tell the story, there is no love lost between this new hacking crew and whoever it is ends up being the real people behind now-disbanded group LulzSec (and related group gn0sis): The timing of this data dump and abrupt the Lulz Security "retirement" Saturday are indeed curious. I suppose if a number of high-profile arrests are made in the near future concerning teens and twenty-something computer experts we'll know if this list is legit or not, huh? The full A-Team's message can be found here: http://pastebin.com/raw.php?i=iVujX4TR
-
Video game developer Valve has announced that "Team Fortress 2" will become entirely free to play for PC and Mac customers. Robin Walker of Valve assured that "Team Fortress2" will not have any pay-to-win options, premium subscriptions or advertising models. It will be completely free, with the exception of in-game items. In-game purchases will be the only way Valve will make any money from "Team Fortress 2." http://www.youtube.com/watch?v=eQ8duKs2Plw You can download it for free from official Steam site: http://store.steampowered.com/app/440/ PC System Requirements: Minimum: 1.7 GHz Processor, 512MB RAM, DirectX® 8.1 level Graphics Card (Requires support for SSE), Windows® 7 (32/64-bit)/Vista/XP, Mouse, Keyboard, Internet Connection Recommended: Pentium 4 processor (3.0GHz, or better), 1GB RAM, DirectX® 9 level Graphics Card, Windows® 7 (32/64-bit)/Vista/XP, Mouse, Keyboard, Internet Connection PS. Please, don't forget about ET while enjoying TF2
-
Lulz Security, a group of hackers who have tormented corporations and government agencies, said Saturday that it would stop its spree, 50 days after it first started attacks. In a statement posted on The Pirate Bay, a file-sharing Web site, the group said its six members had decided to "say bon voyage" as Lulz Security but did not cite a reason. In addition, the group shared a number of files and documents it said were obtained in the course of its attacks. These files, which were available for download, included what appeared to be internal company documents from AT&T and user names and passwords from a number of other Web sites. On its Twitter feed, the group's members encouraged other hackers to continue attacking Web sites and government agencies and said they planned to stay involved in the efforts through Anonymous, another collective of rogue hackers. It is unclear why the group decided to stop hacking under its current name. In a recent interview with Adrian Chen of Gawker, one the group's members, who goes by the name "Topiary" online, said Lulz Security planned to continue its campaign for some time and said he had no fears of being apprehended by the authorities. The full statement posted on The Pirate Bay by Lulz Security:
-
How to edit player level in silent database.
hellreturn replied to RaNeR's topic in General Discussion
For spawn times, add this in your etmain server config: set g_useralliedrespawntime 15 set g_useraxisrespawntime 15 -
Does the application get's auto installed in Android or it asks for your permission to install it?
-
Lookout Security Firm as identified a new Android Trojan named GGTracker that is downloaded to a user’s phone after visiting a malicious webpage that imitates the Android Market. The Trojan then proceeds to sign up the user to premium SMS services without their knowledge. The Trojan targets only U.S. Smartphone users when they click on a malicious in-app advertisement. The website lures users to click-through to download and install an application one of which is a fake battery optimizer called "t4t.pwower.management", and another is a porn app called "com.space.sexypic". After the application has been installed, GGTracker registers the user for premium subscription services. The Trojan carries out this task by contacting another server in the background where the malicious behavior intercepts crucial confirmation data to charge users without their consent or knowledge. Lookout advises that users can protect themselves from malicious webpage’s by taking a few precautions: After clicking on an advertisement, make sure the page and URL matches the website the advertisement claims it’s sending you to. Download apps only from trusted sources. Also look at the developer’s name, reviews, and star ratings. If you are suppose to be on the Android Market, check the URL to make sure you are on the Market and not redirected to another site. Always monitor your phone for any unusual behavior like unusual SMS messages, strange charges on your phone bill or unusual network activity. Check all apps running in the background and investigate any that you think should not be running. Don’t download any third party apps by making sure "unknown sources" is not check off in "application settings" in your android system. Download a mobile security app for your phone that scans every app you download to ensure its safe. More information: Lookout Blog
-
Our old favorite browser just got some updates, Firefox 5 is released on Windows, Mac, Linux, and Android. It's the first release of Firefox's new three-month rapid release development cycle, in which the user can get new features, updates, and bug fixes faster than ever before. Although there are only small updates, and it looks like it cannot make any difference, well, think again. This small features really matters when combined together, they make a really significant change. Some changes maybe useful for other users while some might not think so, for example, the adopted feature from Google Chrome in which the tabs stay the same size when closing them. Normally when you have a ton of tabs open and then you close one, the other tabs will expand to fill the space that the closed one had occupied. Now, it only does resize when your mouse leave the tab bar, so you can close consecutive tabs easily without moving your mouse. Some great features added are: Support for CSS animation that lets page elements move around the screen. It's very useful to make web pages and web apps more dynamic. Do-Not-Track on Andriod, Mozilla created the Do-Not-Track feature to let users have control on how their browsing behavior is tracked and used on the web. Firefox new add-on SDK now lets developers build extensions with the use of HTML, CSS, and Javascript. This will make extensions easier to write and improve compatibility over the next versions of Firefox. Increased speed Improved stability Fixed security issues The internet is changing in a fast paced cycle, so browsers need to catch up with the growing needs of the users. This update indicates that Firefox is not falling behind of the browser wars, it still got some trump cards under its sleeves. Click here to view the article
-
Our old favorite browser just got some updates, Firefox 5 is released on Windows, Mac, Linux, and Android. It's the first release of Firefox's new three-month rapid release development cycle, in which the user can get new features, updates, and bug fixes faster than ever before. Although there are only small updates, and it looks like it cannot make any difference, well, think again. This small features really matters when combined together, they make a really significant change. Some changes maybe useful for other users while some might not think so, for example, the adopted feature from Google Chrome in which the tabs stay the same size when closing them. Normally when you have a ton of tabs open and then you close one, the other tabs will expand to fill the space that the closed one had occupied. Now, it only does resize when your mouse leave the tab bar, so you can close consecutive tabs easily without moving your mouse. Some great features added are: Support for CSS animation that lets page elements move around the screen. It's very useful to make web pages and web apps more dynamic. Do-Not-Track on Andriod, Mozilla created the Do-Not-Track feature to let users have control on how their browsing behavior is tracked and used on the web. Firefox new add-on SDK now lets developers build extensions with the use of HTML, CSS, and Javascript. This will make extensions easier to write and improve compatibility over the next versions of Firefox. Increased speed Improved stability Fixed security issues The internet is changing in a fast paced cycle, so browsers need to catch up with the growing needs of the users. This update indicates that Firefox is not falling behind of the browser wars, it still got some trump cards under its sleeves.
-
I don't think it's lulzsec this time. As per the news, it seems 2 new hackers.. Sony needs internal security audit on all there websites tbh
-
While there have been cyber attacks made against other companies and government organizations in the last couple of months, Sony has been by far the company that has suffered through the most attacks. Today CNet's News.com reports that yet another web site owned and operated by one of Sony's divisions has been attacked. Two hackers claimed they took over 177,000 emails from the Sony Pictures France web site. The two hackers who accomplished the attack said they got through via an SQL injection. The duo posted 70 of the emails on a Pastebin web page. Sony Pictures has yet to confirm the attack saying only, "We are currently investigating this claim." One of the hackers, known as "Idahc", stated in a Forbes.com interview last week that he is launching these attacks as a way to get companies like Sony to improve their web site security systems. This is the 20th cyber attack on a web site or server owned and/or operated by the Japanese company in the past couple of months. Of course the biggest attack happened on April 20 when hackers attacked the Sony Playstation Network online gaming service. Sony said that tens of millions of PSN accounts were exposed although no financial info was apparently taken. Sony shut down the network for a few weeks and has only just recently brought the Playstation Network back to full operations. It also compensated PSN users for the system downtime with free downloadable games as well as other offers. Click here to view the article
-
Intel has now added three new high-efficiency, low-power parts to its product catalog. These will supposedly be the new chips for the MacBook Airs due a few weeks from now, according to Apple Insider. The ultra low voltage (ULV) are 17 watts, making them suitable for use in the ultra-thin MacBook Airs. The standard parts used by Apple consume 25-35 watts, making them unusable in the MacBook Air. The new lineup consists of three new parts. The Core i7-2677M is a dual-core processor that runs at 1.8 GHz, with TurboBoost 2.0 up to 2.9 GHz and a 4 MB cache. The Core i7-2637M is another dual-core part that runs at 1.7 GHz, with boosts up to 2.8 GHz and the standard 4 MB cache. The Core i5-2557M is a dual core part that runs at 1.7 GHz with boosts up to 2.7 GHz and a cache of 3 MB. The prices are 317, 289 and 250 US Dollars, respectively. Intel sees a huge market for ultra-thin notebooks like Apple's offerings. When the Air was fist released, it was criticized for not being thin enough and giving up too many features. Apple has since made the Air thinner and reduced the price, while adding a Solid State Drive, which supports very fast booting, wake, and program launching. One will have to see what is offered as Apple launches its MacBook Air refresh in the coming weeks. Click here to view the article
-
In a move aimed squarely against Skype and its new overlords, Google is taking voice chat and videoconferencing to the land of the free and open source. According to Cnet, Google is planning to add an open source communications protocol called WebRTC into future versions of Chrome. Google developed this project as an outgrowth of its purchase of Global IP Solutions in 2010, and released it to the open source community in May 2011. In typical Google form, the plan was to take Skype-like communication technologies and capabilities, and stick them on the web, in any browser. It promised to work with other browser developers to help achieve this goal, so that developers could start writing web apps that take advantage of the open standard. Google has already been in the multimedia teleconferencing game for some time. After releasing Voice and Video chat for its Gtalk client, re-releasing it in a mobile incarnation, and integrating its Google Voice VoIP product into new versions of Android OS, Google is ready to unleash its model on non-proprietary platforms. Microsoft likely already has plans to heavily integrate Skype into many of its online services. If WebRTC can take off as a viable project that developers will want to use, Microsoft could see some stiff competition from developers looking for open-source and cross platform communications solutions in their web apps. Ultimately, the platform could be used to build a total Skype replacement. WebRTC is Google’s latest attempt to bring native app capabilities to the cloud. As demonstrated in Chrome OS, Google is confident that most if not all activities done by users on a regular basis can be done from a web app. The same applies for real time multimedia communication, and WebRTC hopes to streamline and open source that goal. Source: Neowin Click here to view the article
-
While there have been cyber attacks made against other companies and government organizations in the last couple of months, Sony has been by far the company that has suffered through the most attacks. Today CNet's News.com reports that yet another web site owned and operated by one of Sony's divisions has been attacked. Two hackers claimed they took over 177,000 emails from the Sony Pictures France web site. The two hackers who accomplished the attack said they got through via an SQL injection. The duo posted 70 of the emails on a Pastebin web page. Sony Pictures has yet to confirm the attack saying only, "We are currently investigating this claim." One of the hackers, known as "Idahc", stated in a Forbes.com interview last week that he is launching these attacks as a way to get companies like Sony to improve their web site security systems. This is the 20th cyber attack on a web site or server owned and/or operated by the Japanese company in the past couple of months. Of course the biggest attack happened on April 20 when hackers attacked the Sony Playstation Network online gaming service. Sony said that tens of millions of PSN accounts were exposed although no financial info was apparently taken. Sony shut down the network for a few weeks and has only just recently brought the Playstation Network back to full operations. It also compensated PSN users for the system downtime with free downloadable games as well as other offers.
-
Intel has now added three new high-efficiency, low-power parts to its product catalog. These will supposedly be the new chips for the MacBook Airs due a few weeks from now, according to Apple Insider. The ultra low voltage (ULV) are 17 watts, making them suitable for use in the ultra-thin MacBook Airs. The standard parts used by Apple consume 25-35 watts, making them unusable in the MacBook Air. The new lineup consists of three new parts. The Core i7-2677M is a dual-core processor that runs at 1.8 GHz, with TurboBoost 2.0 up to 2.9 GHz and a 4 MB cache. The Core i7-2637M is another dual-core part that runs at 1.7 GHz, with boosts up to 2.8 GHz and the standard 4 MB cache. The Core i5-2557M is a dual core part that runs at 1.7 GHz with boosts up to 2.7 GHz and a cache of 3 MB. The prices are 317, 289 and 250 US Dollars, respectively. Intel sees a huge market for ultra-thin notebooks like Apple's offerings. When the Air was fist released, it was criticized for not being thin enough and giving up too many features. Apple has since made the Air thinner and reduced the price, while adding a Solid State Drive, which supports very fast booting, wake, and program launching. One will have to see what is offered as Apple launches its MacBook Air refresh in the coming weeks.
-
In a move aimed squarely against Skype and its new overlords, Google is taking voice chat and videoconferencing to the land of the free and open source. According to Cnet, Google is planning to add an open source communications protocol called WebRTC into future versions of Chrome. Google developed this project as an outgrowth of its purchase of Global IP Solutions in 2010, and released it to the open source community in May 2011. In typical Google form, the plan was to take Skype-like communication technologies and capabilities, and stick them on the web, in any browser. It promised to work with other browser developers to help achieve this goal, so that developers could start writing web apps that take advantage of the open standard. Google has already been in the multimedia teleconferencing game for some time. After releasing Voice and Video chat for its Gtalk client, re-releasing it in a mobile incarnation, and integrating its Google Voice VoIP product into new versions of Android OS, Google is ready to unleash its model on non-proprietary platforms. Microsoft likely already has plans to heavily integrate Skype into many of its online services. If WebRTC can take off as a viable project that developers will want to use, Microsoft could see some stiff competition from developers looking for open-source and cross platform communications solutions in their web apps. Ultimately, the platform could be used to build a total Skype replacement. WebRTC is Google’s latest attempt to bring native app capabilities to the cloud. As demonstrated in Chrome OS, Google is confident that most if not all activities done by users on a regular basis can be done from a web app. The same applies for real time multimedia communication, and WebRTC hopes to streamline and open source that goal. Source: Neowin
-
You can find all server variables from this link/manual. If g_misc is not added in config it will choose default value i.e. 0. If you like to modify the behavior, then you can add it in server config as: set g_misc 5 5 = 1 + 4 = Enable double jump and HP display. To store XP you need: set g_XPSave 23 set g_XPSaveMaxAge_xp "1d" set g_XPSaveMaxAge "30d" You need to set g_gametype in your map rotation config i.e. objectivecycle.cfg to enable map voting.
-
varsovie has released a second beta version of his TLR mapping contest entry: tm_Jungle. Here is the change log: 2011-06-07Second release for TLR contest.- change spawntime to let easier allies capture first spawn point- added dynamitable main door to secure middle spawn point- added side corrridor to let axis easier return stolen document- reubild all spawn points.- decrease foliage Source: Splash Damage forums Click here to view the article
-
varsovie has released a second beta version of his TLR mapping contest entry: tm_Jungle. Here is the change log: 2011-06-07 Second release for TLR contest. - change spawntime to let easier allies capture first spawn point - added dynamitable main door to secure middle spawn point - added side corrridor to let axis easier return stolen document - reubild all spawn points. - decrease foliage Source: Splash Damage forums
-
Try to create new profile with new name for test purpose and join the server. See if you still get the error. Probably as error says you have blank name when you are connecting to server.
-
There are protocol changes also. IPv6 specifies a new packet format, designed to minimize packet header processing by routers. Because the headers of IPv4 packets and IPv6 packets are significantly different, the two protocols are not interoperable. However, in most respects, IPv6 is a conservative extension of IPv4. Most transport and application-layer protocols need little or no change to operate over IPv6; exceptions are application protocols that embed internet-layer addresses, such as FTP and NTPv3. Simplified processing by routers In IPv6, the packet header and the process of packet forwarding have been simplified. Although IPv6 packet headers are at least twice the size of IPv4 packet headers, packet processing by routers is generally more efficient, thereby extending the end-to-end principle of Internet design. Specifically: The packet header in IPv6 is simpler than that used in IPv4, with many rarely used fields moved to separate optional header extensions. IPv6 routers do not perform fragmentation. IPv6 hosts are required to either perform path MTU discovery, perform end-to-end fragmentation, or to send packets no larger than the IPv6 default minimum MTU size of 1280 octets. The IPv6 header is not protected by a checksum; integrity protection is assumed to be assured by both link layer and higher layer (TCP, UDP, etc.) error detection. Therefore, IPv6 routers do not need to recompute a checksum when header fields (such as the time to live (TTL) or hop count) change. The TTL field of IPv4 has been renamed to Hop Limit, reflecting the fact that routers are no longer expected to compute the time a packet has spent in a queue. Mobility Unlike mobile IPv4, mobile IPv6 avoids triangular routing and is therefore as efficient as native IPv6. IPv6 routers may also support network mobility which allows entire subnets to move to a new router connection point without renumbering. Jumbograms IPv4 limits packets to 65535 (216 - 1) octets of payload. IPv6 has optional support for packets over this limit, referred to as jumbograms, which can be as large as 4294967295 (232 - 1) octets. The use of jumbograms may improve performance over high-MTU links. The use of jumbograms is indicated by the Jumbo Payload Option header. Options extensibility The IPv6 protocol header has a fixed size (40 octets). Options are implemented as additional extension headers after the IPv6 header, which limits their size only by the size of an entire packet. The extension header mechanism provides extensibility to support future services for quality of service, security, mobility, and others, without redesign of the basic protocol Packet format The IPv6 packet is composed of two parts: the packet header and the payload. The header consists of a fixed portion with minimal functionality required for all packets and may contain optional extension to implement special features. The fixed header occupies the first 40 octets (320 bits) of the IPv6 packet. It contains the source and destination addresses, traffic classification options, a hop counter, and a pointer for extension headers if any. The Next Header field, present in each extension as well, points to the next element in the chain of extensions. The last field points to the upper-layer protocol that is carried in the packet's payload. Extension headers carry options that are used for special treatment of a packet in the network, e.g., for routing, fragmentation, and for security using the IPsec framework. The payload can have a size of up to 64KB without special options, or larger with a jumbo payload option in a Hop-By-Hop Options extension header. Unlike in IPv4, fragmentation is handled only in the end points of a communication session; routers never fragment a packet, and hosts are expected to use Path MTU Discovery to select a packet size that can traverse the entire communications path. This are the few which I know.
-
WASHINGTON – A solar flare erupted from the sun in an impressive display captured by NASA cameras, but scientists say the medium-sized event will have a minimal impact, if any, on Earth. The flare peaked early Tuesday and created a large cloud that appeared to cover almost half the surface of the sun, NASA said. A cloud of charged particles erupted from the sun's outer atmosphere and is expected to pass by Earth late Wednesday or early Thursday, causing a minor disruption to Earth's magnetic field, according to the National Weather Service's Space Weather Prediction Center in Boulder, Colo. "This wasn't really such a big event," said Michael Hesse, chief of the space weather laboratory at NASA's Goddard Space Flight Center in Greenbelt, Md. "It was spectacular to watch, but not big in terms of hazards to the Earth." At most, the cloud that erupted from the sun may cause some brief interruptions to high-frequency radio communications, especially closer to the North and South poles, said Joe Kunches, a space scientist at SWPC. Some global positioning devices also may make tiny errors, he said. "It doesn't look like it's going to be a direct hit on the Earth," Kunches said. "It's going to be, if you use a baseball analogy, a little bit low and outside on the pitch." The aurora borealis also may be more visible Thursday or Friday night, he said. Images of the flare were recorded by an orbiting satellite called the Solar Dynamics Observatory. The photos and video were the most spectacular that the satellite has captured since it was launched last year, Hesse said. A much larger solar flare erupted Saturday, but NASA didn't capture images because it happened on the side of the sun opposite Earth, Hesse said. Scientists have been expecting an increase in solar activity because the sun is moving into a more volatile period of an 11-year cycle in which its magnetic field reverses its orientation. "The sun has woken up and is becoming more active as we approach the solar maximum," expected in 2013, Hesse said. Source: By BEN NUCKOLS, Associated Press Click here to view the article
-
NEW YORK – About 200,000 Citibank credit card customers in North America have had their names, account numbers and email addresses stolen by hackers who broke into Citi's online account site. Citigroup Inc. said it discovered that account information for about 1 percent of its credit card customers had been viewed by hackers. Citi has more than 21 million credit card customers in North America, according to its 2010 annual report. The New York-based bank, which discovered the problem during routine monitoring, didn't say exactly how many accounts were breached. Citi said it was contacting those customers. The bank said hackers weren't able to gain access to social security numbers, birth dates, card expiration dates or card security codes. That kind of information often leads to identity theft, where cyber criminals empty out bank accounts and apply for multiple credit cards. That can debilitate the finances and credit of victims. Citi customers could still be vulnerable other problems. Details about their bank accounts and financial information linked to them could be acquired using the email information and account numbers hackers stole. The Citi data breach was the latest in a series of recent high-profile data attacks against a number of major firms. --On June 1, Google Inc. said that the personal Gmail accounts of several hundred people, including senior U.S. government officials, military personnel and political activists, had been breached. --On May 30, broadcaster PBS confirmed that hackers cracked the network's website and posted a phony story claiming dead rapper Tupac Shakur was alive in New Zealand. --On May 28, defense contractor Lockheed Martin Corp. said it had detected a "significant and tenacious attack" against its computer networks. The company said it took swift and deliberate actions to protect the network and the systems remain secure. --In April, media and electronics company Sony Corp.'s PlayStation Network was shut down in April after a massive security breach that affected more than 100 million online accounts. --Also in April, hackers penetrated a network operated by a data marketing firm Epsilon. The company handles email communications for companies like Best Buy Co. and Target Corp. The number of data breaches in the last two months sets a "high water mark," said John Ottman, CEO of Application Security Inc., a New York-based firm that specializes in securing databases, the big repositories companies use to organize account information and other data. "Attackers have realized that most organizations have not properly protected databases," Ottman said. Cyber attackers have a variety of less-dangerous motivations, from mischief to online activism. For example, a group identifying itself as LulzSec claimed credit for the fake PBS article calling it retaliation for a documentary about WikiLeaks, the website that publishes classified documents. But often such data breaches are an attempt to steal personal data, which is likely the case with Citi. Hackers also will pose as legitimate companies in a tactic known as "phishing," where they try to get users to supply additional information like social security numbers and email or bank passwords to get access to their financial information. In an emailed statement, Sean Kevelighan, a spokesman for Citi said the bank is contacting affected customers and enhancing procedures to prevent a similar security breach from happening again. "For the security of these customers, we are not disclosing further details," he said. Source: PALLAVI GOGOI and KELVIN CHAN, AP Business Writers Click here to view the article
-
Germany defends E.coli response as death toll rises
hellreturn replied to hellreturn's topic in Front Page News
Russia is probably trying to save there people from infections. E.coli is nasty though. Will start steaming and boiling my food from now on. I like the raw vegetables but not taking chances. Best is grow your own food. Wondering how the outbreak starts? Organic foods affected more or non organic.