dark star - crosby still & nash video free download


113,461
Duration: 04:46
Uploaded: 2008/05/04

Comments

8 years ago

Rossella Ross

Buona giornata a tutti

9 years ago

christopher roman

WOW!!!

9 years ago

Elio Cantarelli

Una bellissima serata a tutti...

9 years ago

Snake Anthony

Just the most random set of unrelated incohesive images ever. Good song, though.

10 years ago

MegaRockgirl7

Hi Annafarina! Great job! Thanks so much for posting this song, and video! Even though, I am a metal, and hard rock fan, I also listen to, and like Classic Rock, and I was wondering who sung this song, because I heard it on a classic rock station where I live, and the DJ didn't say who was the artist, when I heard it. The pics in this video are totally awesome! I especially like the black guitar, the Ghost ship, the Ghost Pirate, Johnny Depp, the black cat, the grim reaper with the black wings, and the Lighthouse! I love this song! Thanks again! "KEEP ROCKING" :-) 

10 years ago

tani hirou

Gorgeous music

10 years ago

Robin Rouleau

an all time favorite.

10 years ago

Karen Roberts

are you paying for a subscription to you tube and still getting commercials?

10 years ago

Karen Roberts

far f***ing out great song, love it then still loven it now,where is my joint?

10 years ago

William Calandro

Just download Adblock Plus.. Problem solved!! ;-)

10 years ago

David Simmons

and im pissed about all the youtube commercials

10 years ago

Art Muzzillo

But the largest target of all may be the U.S. itself. In May of this year, U.S. intelligence sources confirmed a cyberintrusion into one of the most sensitive databases of the nation's physical infrastructure -- the U.S. Army Corps of Engineers' National Inventory of Dams (NID).

10 years ago

Art Muzzillo

This single database details all the vulnerabilities of every major dam in the country -- about 8,100 dams across our nation's waterways. Now imagine a cyberattack on the network of a single major dam. Such an event could easily compromise the network and allow for malicious code to be planted inside -- code that could later open the floodgates or lock them in place. Within minutes, the valley below could flood, with unimaginable consequences, including loss of property and life.

10 years ago

Art Muzzillo

While the intrusion at the NID was discovered in May, intelligence reports show that the database was actually penetrated in January, five months before it was discovered. Further investigation suggests that this intrusion came from unauthorized users based in China. Of course, this raises new fears. Officials are now concerned that China may be preparing to conduct a future cyberattack on the national electrical power grid.See Facebook "tinfoil behatted" entry.

Related Videos