Our TV Shows

Got a Tip?

Call TMZ at (888) 847-9869 or Click Here

Dina Lohan

We're Shacking Up

in Beverly Hills

1/31/2013 1:00 AM PST BY TMZ STAFF

0130-dina-lohan-beverly-hills-hotel-tmzLindsay Lohan's hotel rejection streak is OVER ... 'cause she and her mother Dina were finally able to score a room at the legendary Beverly Hills Hotel ... TMZ has learned.

We broke the story ... LiLo and DiLo were turned away from TWO famous hotels in Santa Monica late last night ... after they arrived in L.A. for Lindsay's court hearing.

But the search continued ... and the Lohan ladies were finally able to find a suite in the Hills of Beverly ... at the same hotel where Howard Hughes lived on and off for 30 years.

In fact, the BHH has hosted some of the most famous people in the world ... including John Wayne, The Beatles ... and even Liz Taylor.

It's also where Harvey Levin famously asked Paris Hilton how she felt about TMZ users comparing her to a "fart in a mitten" back in 2006. Enjoy ...



No Avatar


Just one little note before I head for bed........
Notice anything funny about the photos of Lindsay getting out of the car in her socks and short shorts....? I did a coupld of things ....One if she got out to go get her a juicey drink then why was she already carrying the cup as she gets out of the car......Two as she is getting out you see a bloody bandaid sticking on her back left thigh and in the next picture it is their but in the third photos supposedly taken one behind the other were is the bandaid....? and if she went in to get a drink why don't you have photos of her entering or exiting the place....and lastly does it make you wonder why she has a bloodly bandaid on the side back of her thigh located just near or over where a person has a major artery and vein running up out of your leg and why does she have so many buises around that she diabetic ? LOL........Inguiring minds want to know.....
that little joint and photo session was pure Lohan Co selling a photo shoot for mony....and that is a hat /wig unless she dyed her hair overnight she was wearing a hat wig.....hat with long wig attached....shes had it a while now....
anyway off to bed....Enjoy your evening/day where ever you are......
Beaver Hill Farmstead Closing down...Goodnight

566 days ago


A New Shot:
Lindsay lohan shot: a red headed slut with a splash of coke

566 days ago


"I'll fight you doing a windmill with my titties.”
Lindsay Lohan!

566 days ago

Chief Gall    

The National Enquirer???? The National Stupid Enquirer????? Silly haters read some BS Lindsay/Gaga story from a dumbfk gossip rag and instantly believe it??? It took one minute to find a BS story because there are so many, and a few more mionutes to comment aftewr eight(8) beers and more later and back seat on Rte. 95. Consider the Tom Cruise story from The NE. AQbsolute total BS!! There are so many more BS storiees about so many celebs. You wanna believe nasty about Lindsay because you hate Lindsay and nasty about Lindsay makes you feel good because you hate Lindsay. Iggaddeee biggadee stupoid fukking douchebag hater fggot clowns!!!!1 The story about Lindsay begging Gaga for $$$$ is BS you dumb fukking apes. Gossipcop is correct and haters and NE are stupidly wrong. Poor Things!!!!

The National Enquirer’s last Tom Cruise cover allegations were so egregious and inflammatory, the actor threatened to sue the tabloid.

Now the mag is digging itself an even deeper hole.

According to a so-called “world exclusive,” the Enquirer claims Cruise’s divorce from Katie Holmes has given rise to “new questions about their daughter Suri’s paternity.”

(Seriously, what is it with the Enquirer and paternity?)

The magazine’s “sources” say Cruise “will be most disturbed over suppositions that Suri will someday ask him to take a paternity test to prove he’s her father.”

Cruise is supposedly “furious” and “outraged” by the rise of speculation that he might not be Suri’s biological dad, alleges the
Enquirer, knowing full well that it itself is the publication responsible for spreading those baseless rumors.

The tabloid lists a number of absurd “Internet” reports to back up the premise that there’s somehow any actual debate about Cruise’s paternity.

According to the Enquirer, men including Josh Hartnett, Joshua Jackson, Chris Klein and even deceased Scientology founder L. Ron Hubbard have been mentioned as possible biological dads for Suri.

The Enquirer attributes these allegations to random websites and outlets but is more than happy to bring up a phony “controversy” regarding Suri’s 2006 birth certificate and other supposed question marks surrounding Cruise’s parentage.

The magazine wonders whether it will all end in a “paternity test bombshell.”

This drivel would be laughable if it weren’t also so despicable.

There is zero actual, legitimate debate about Cruise’s paternity.

The Enquirer is the only outlet still stirring this silly debate six years after Suri’s birth because it’s beneath everyone else.

Sources in the Cruise camp tell Gossip Cop the story is a complete fabrication from a tabloid with a history of smears against the actor.

566 days ago

Suzy Q     

Crazy Town

566 days ago

Suzy Q     

For anyone who wants to OCCUPY the Bieb, you'll definitely need this photo for ammo. (It's also on his fan page)

566 days ago


Here we go again with a bunch of mentally challenged people standing knee deep in the kiddie you have some funny or interesting comments or a fake Ketjo story? Please enlighten me with your humor, originality and writing skills..................

566 days ago


So other then the LiLO...ho attacks and the turbinator and soon be dead attacks......oh yeah duck lips, probably by the person who insisted on calling me a yellow chicken for six months........any information that can contribute to making this a better thread in any way? The K stories are OK I guess????? Maybe something interesting not about her looks or drugs or jail or death.......U got anything?

566 days ago


different knot S shaped..anybody know? I can post a avi?.

566 days ago


check disss outtie.......Similar to monitoring a wireless application, someone can effortlessly access a corporate wireless network from outside the facility if the proper precautions are not taken. Someone can, for example, sit in a parked car and associate with one of the wireless base stations located inside a building. Without proper security, this person can access servers and applications residing on the corporate network. This is similar to letting a stranger inside your home or office.
Unfortunately, many companies deploy their wireless networks using the default, unsecured base station configurations, making it possible for anyone to interface with their application servers. In fact, you can go war driving and discover that 30 percent of the wireless LAN access points in an average city do not deploy any form of security. This allows anyone to access hard drives and use resources such as Internet connections.
The Windows XP operating system makes it easy to interface with wireless networks, especially on public wireless LANs. When a laptop associates with the wireless LAN, the user can navigate to any other laptop associated with the same wireless LAN. Without personal firewall protection, someone can browse through your hard drive. This is a tremendous security risk.
Even if you implement all security controls on access points, the possible connection of a rogue access point is a significant threat. (See Figure 8-2.) A rogue access point is an unauthorized access point on the network. An employee might purchase an access point and install it within his office without knowing the security implications. A hacker could also plant a rogue access point within a facility by purposely connecting an unprotected access point to the corporate network.
Figure 8-2. Rogue Access Points Offer an Open Port for Hackers to Exploit

A rogue access point can be exploited because it probably won't have any encryption activated, which provides an open door for someone to easily access the corporate network from outside the facility. For that reason, a company should continually monitor for the presence of rogue access points. Keep in mind that this is a problem whether a wireless network is in place or not. Someone could connect a rogue access point to a completely wired Ethernet network.
To counter unauthorized access, the wireless network should deploy mutual authentication between client devices and the access points. Authentication is the action of proving the identity of a person or device. The wireless network should implement methods for client devices to prove identity to base stations and vice versa. This ensures the validity of the user and proves that the user is connecting to a legitimate access point. In addition, access points should authenticate with the switches to disallow the successful connection of a rogue access point.
Man-in-the-Middle Attacks

The use of encryption and authentication techniques improves the security of a wireless network; however, smart hackers can still find vulnerabilities because of the way that networking protocols operate. A definite weakness is a man-in-the-middle attack, which is when a hacker places a fictitious device between the users and the wireless network. (See Figure 8-3.) For example, a common man-in-the-middle attack exploits the common address resolution protocol (ARP) that all TCP/IP networks utilize. A hacker with the right tools can exploit ARP and take control of the wireless network.
Figure 8-3. Intermediate Devices Enable Man-in-the-Middle Attacks

ARP is a crucial function used by sending a wireless or wired NIC to discover the physical address of a destination NIC. The physical address of a card is the same as the medium-access control (MAC) address, which is embedded in the card by the manufacturer and unique from any other NIC or network component. The MAC address is analogous to the street address of your home. Just as someone must know this address to send you a letter, a sending NIC must know the MAC address of the destination. The NIC only understands and responds to the physical MAC address.
The application software that needs to send the data will have the destination IP address, but the sending NIC must use ARP to discover the corresponding physical address. It gets the address by broadcasting an ARP request packet that announces the destination NIC's IP address. All stations will hear this request, and the station with the corresponding IP address will return an ARP response packet containing its MAC address and IP address.
The sending station will then include this MAC address as the destination address in the frame being sent. The sending station also stores the corresponding IP address and MAC address mapping in a table for a specified period of time (or until the station receives another ARP response from the station having that IP address).
A problem with ARP is that it introduces a security risk resulting from ARP spoofing. For example, a hacker can fool a station by sending, from a rogue network device, a fictitious ARP response that includes the IP address of a legitimate network device and the MAC address of the rogue device. This causes all legitimate stations on the network to automatically update their ARP tables with the false mapping.
Of course, these stations will then send future packets to the rogue device rather than to the legitimate access point or router. This is a classic man-in-the-middle attack, which enables a hacker to manipulate user sessions. As a result, the hacker can obtain passwords, capture sensitive data, and even interface with corporate servers as if they were the legitimate user.
In order to cir***vent man-in-the-middle attacks using ARP spoofing, vendors such as OptimumPath implement secure ARP (SARP). This enhancement to ARP provides a special secure tunnel between each client and the wireless access point or router, which ignores any ARP responses not associated with the clients on the other end of the tunnel. Therefore, only legitimate ARP responses provide the basis for updating ARP tables. The stations implementing SARP are free from spoofing.
The use of SARP, however, requires the installation of special software on each client. Consequently, SARP is not practical for public hotspots. Enterprises, though, can install SARP on clients and be much freer from man-in-the-middle attacks.

566 days ago

Mumra the Ever Living    

Wow, Marvin/Chief Rectum must have REALLY been drunk last night.

565 days ago

Zephyr, Enemy of #LittleWhores    

‎"Ok h8turds, rise and shine, and don't forget your booties cause it's cold out there"
"It's cold out there everyday. What is this, Miami Beach?"
"Not hardly"
"Especially cold. But the big question on everybody's chapped lips..."
"Do you think Phil is gonna come out and see his shadow?"
"That's right woodchuck-chuckers, it's GROUNDHOG DAY"

565 days ago

Bear King of the Dead Thread Heads (and he means it)    

@ Zephyr.............Lohans are dirtbags, plain and simple. We know it, the Pro-Lohaner's know it, and Lindsay and DUIna know it. Oops, secret's out.

565 days ago

Mumra the Ever Living    

I originally had this link as part of a response to Marvin/Red Rimmed Rectum, but I thought it deserved to be in a comment of it's own. Besides how many people actually reads that azzwipes comments?
Wow!!!! It doesn't really hit home how gross Lohan looks until you compare her with actual female human beings.
Well, GOTTI ROLL!!!!! BTW CHIEF GALL, how is the Gotti comeback starring role coming along anyhow? How long did you bleat on about it - Oh that's right, you STILL use that as an insult to us - you're too drunk to realize that Gotti fell through. Another failure for Lohan and for some reason you use it as if it was a triumph for our favorite drug addled, alcoholic, serial lying, thief, prostitute, toilet clogger.
BTW, here's what's really incredible. I just used all those insults and I hardly touched the surface on what a waste of protoplasm Lohan is.

565 days ago


Morning Folks ,
I see nothing happened last night except Poor Marvin throwing a drunken hissy typing fit over his prescious Lindsay Lohan..... You want us to talk about something nice about her....let me think of something nice////////////////////????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????? oh wait I got one...NO! can't say that I would get banned , wait if I think hard enough I might come up with something.....................................................................................................................................................................................................................................................................................................................................................................????????????????>>>>>>>>>>>>>>>>>>>>>>>>>>...<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> NOPE ! can't thing on one thing nice to say about her or Lohan Inc......Sorry Marvin old Boy but your shyt out of luck in the good story department.............But you can't blame anybody for it except for your prescious Lindsay Lohan and her Lohan Inc themselves........they created the monster and let it loose on the villiage just like in the book and it will end up destroying them just like any good monster would and believe me as Monsters go she is a good one..............
Speaking of Monsters has it gone back to NY yet ? Got to get ready to run for Dubai......

565 days ago
Previous 15 Comments | 15 | 16 | 17 | 18 | 19 | 20 | 21 | Most Recent | Next 15 Comments

Around The Web