Next Page: 10000


Kommentar til Hacker’s Manifesto af We are Legion – Historien om hacktivismen |

[...] Samme år begynder hacker magasinet 2600 at udkomme. Phrack Magazine offentliggør i 1986 “The Hacker’s Manifesto” under overskriften “The Conscience of a Hacker“. I 1987 dannes Critical Art [...]

Juice jacking

Ricariche pubbliche via usb ? Arriva il preservativo

Dalla corrente arriva la violazione informatica ?


Ma dalle ricariche in pubblico, tramite dispositivi hackerati o aggiunte posticcie, e' possibile leggere i contenuti degli smar


Professions: Network Security Analyst - Great Falls, Montana

The Network Security Analyst duties include planning and implementing security measures to protect computer systems, networks and data. Information security analysts are expected to stay up-to-date on the latest intelligence, including hackers' methodologies, in order to anticipate security breaches. Self-driven and able to work well as part of a team or individually, a successful Network Security Analyst is an analytical thinker with a drive to solve problems. They think well on their feet and can be proactive in challenging situations. FLSA: EXEMPT DUTIES AND RESPONSIBILITIES: Network Security Analysts conduct network monitoring and intrusion detection analysis to determine if there have been any attacks on the system. They analyze network traffic to identify anomalies, and test the information security controls for weaknesses. If malicious activity has been detected in the system, the Network Security Analyst takes mitigating actions to contain the activity and minimize damage. They may also facilitate forensics analysis to determine the source of the threat. Network Security Analysts design and implement new safeguards to protect the system. They work with other IT teams to implement the new safeguards, whether it is in the form of software, hardware, or new operating procedures. The Network Security Analyst works with stakeholders at all levels of the organization to communicate the state of information security, inform of possible risks, and suggest ways to improve security. Network Security Analysts must stay on top of emerging threats and vulnerabilities in IT security. They conduct research, and attend conferences, professional association meetings and technical symposia to gain awareness of the latest information security technological developments. Demonstrates the ability to deal with pressure to meet deadlines, to be accurate, and to handle constantly changing situations. Demonstrates the ability to deal with a variety of people, deal with stressful situations, and handle conflict. BA/BS degree in a technology field or suitable work experience as an analyst. 1-3 years of information technology experience. Knowledge of network topology and network security fundamentals. Experience with incident response handling Ability to lead audits for improving security and remediating gaps. Certification through an organization such as the International Information Systems Security Certification Consortium (CISSP/HCISPP), Cisco (CCNA/CCNP), or privacy certification (CIPP/CIPM/CIPT). Knowledge of JSON, YAML, and Python. Experience with SIEM and the following is preferred ELK, Cisco, Tenable, Varonis. Knowledge of auditing and utilizing Cybersecurity frameworks a plus (NIST) Community Information Great Falls has a city population of 60,000, with a draw of over 275,000 people in north central Montana. We experience mild winters and enjoy blue skies over 300 days per year. Great Falls is a wonderful and safe place to raise a family, with nationally ranked public schools and an average commute of under 12 minutes, making the quality of life in Great Falls unsurpassed in the Rocky Mountain West. Additionally, the Missouri River, a blue-ribbon fly-fishing destination, runs through the middle of town. Outdoor activities include camping, hiking, horseback riding, water and snow skiing, rock and ice climbing, boating, whitewater kayaking, off-road motorsports, upland bird and waterfowl hunting, and big-game hunting. Benefis Health System This is your opportunity to be part of an exceptional health system in a state that is well known for its beautiful four seasons and outdoor lifestyle. While enjoying the last best place, you'll have the added benefit of having access to Benefis Health System, one of the state's most modern and progressive healthcare facilities with 500+ beds and over 270 employed medical staff members representing more than 40 specialties. Our state-of-the-art facilities and cutting-edge technologies make Benefis an exceptional working environment. ()

Maha CM seeks support from Centre to help out farmers in state

Maha CM seeks support from Centre to help out farmers in state

Mumbai: Chief Minister Uddhav Thackeray on Sunday sought the help from the Centre to help out farmers in distress in the state. “The Centre should help Maharashtra in helping farmers in the state. Opposition leaders should go and meet the Prime Minister and demand financial assistance for the farmers in the state,” the Chief Minister …

Check out more stories at The Siasat Daily


Polscy uczniowie przyszłością cyberbezpieczeństwa

Ponad 1200 uczniów wzięło udział w konkursie Capture The Flag „153+1” organizowanym przez Instytut Wymiaru Sprawiedliwości. Uczestnicy wcielili się w rolę zawodowych specjalistów od cyberbezpieczeństwa i szukali podatności systemów na ataki hackerskie.

Data of 21 million Mixcloud users put up for sale on the dark web

A hacker has breached online music streaming service Mixcloud earlier this month, and is now selling the site’s user data online, on a dark web marketplace. The hack came to light on Friday, when the hacker contacted several journalists to share news of the breach and to provide data samples, including to ZDNet. Accordig to […]

Comment on アンチエイジングといえば幹細胞コスメ⁉ by ps4 games

Hi! I just wanted to ask if you ever have any issues with hackers? My last blog (wordpress) was hacked and I ended up losing a few months of hard work due to no backup. Do you have any solutions to stop hackers?

Politie haalt veelgebruikte ‘hackers tool’ offline


Bij een internationale politieactie tegen cybercrime zijn verkopers en gebruikers van een hacktool gearresteerd. Het gaat om de Imminent Monitor Remote Access Trojan (IM-RAT), waarmee cybercriminelen de computer van slachtoffers konden overnemen. Met deze actie is volgens de politie een einde gemaakt aan de beschikbaarheid van deze tool, die maar liefst in 124 landen werd […]

Het bericht Politie haalt veelgebruikte ‘hackers tool’ offline verscheen eerst op BeveiligingNieuws.


Værnepligt for hackere: Nu kan du tilmelde dig

Fra i dag kan spirende it-talenter søge om at blive cyberværnepligtige i det danske forsvar.

LED icosahedron shines for all the world to see

Convex regular icosahedrons contain 30 edges and 12 vertices. This makes for an interesting math problem, but as demonstrated by this project out of the LVL1 hackerspace in Louisville, Kentucky, its geometry also presents an excellent target for a massive number of LEDs. Their build, in fact, consists of 708 programmable LEDs arranged facing inward […]

An Escalating Threat: Hacking By A New Generation Of Nations

As if digital threats from the main U.S. cyberspace adversaries weren’t enough, U.S. officials and researchers are increasingly worried about hacking dangers posed by a slew of other nations including Vietnam, Qatar and the United Arab Emirates. The fears are upending a half decade during which U.S. cybersecurity worries focused on four main adversaries — Russia, China, Iran and North Korea. And they’re signaling that cyberspace is about to get far more complicated and dangerous. “The threshold for entry to have a cyber program has dropped so low because you don’t need to figure out how to build your own program. You can just buy it as a service and that worries me,” a senior FBI cybersecurity official told reporters during a roundtable discussion. In some cases the nations are developing hacking capabilities in-house, such as in Vietnam, where government-backed hackers are reportedly stealing information from rival governments and companies in key sectors including the auto industry to gain a competitive advantage.

Hackers Are Already Targeting Disney Plus Accounts

In case you weren't already aware, Disney recently launched a new video streaming service called Disney+ which has been driving Netflix and other established streaming services crazy with fear and apprehension since ...

Hackers Are Imitating Government Agencies To Spread Malware

Researchers at Proofpoint have found evidence of a new threat actor who has been sending out convincing looking emails. They are claiming to come from several government agencies. These include the Italian ...

Another WhatsApp Vulnerability Has Been Found

WhatsApp is the most popular messaging platform in the world. Unfortunately, that means it's got a giant bullseye on it where hackers are concerned. In recent months, the company has faced no ...

Myanmar G21 Anonymous has issued a warning message to officials of “Myanmar Idol”

Myanmar G21 Anonymous Hacker Releases Letter Against Attack on Myanmar Idol The people who sat down for tonight’s concert at […]

Hacker, Peter L.

Peter L. Hacker Hamersville 59, 28-Nov, Advantage Cremation Advantage.

Confira sete dicas para aproveitar as férias com segurança

Confira sete dicas para aproveitar as férias com segurança
Foto: @nurseryart

Os dias de descanso das férias de dezembro estão chegando e criam possibilidades de se aproveitar o período para conhecer novos destinos ou explorar atrações locais. Espera-se uma movimentação maior de pessoas nas cidades, aeroportos e rodovias e, com isso, aumentam também os riscos relacionados à segurança física e cibernética. A Unisys, empresa global de tecnologia, reuniu abaixo alguns cuidados para que você não seja vítima de armadilhas durante a temporada:

1.  Planeje com antecedência e verifique os alertas de autoridades locais.

Após escolher o destino das tão aguardadas férias, inscreva-se em algum alerta de viagem ou de notícias da região ou do evento para receber atualizações sobre o tráfego e informações sobre possíveis contratempos. Se você pretende aproveitar o período para viajar sozinho, certifique-se de que seus amigos ou familiares saibam para onde você está indo, quando você planeja chegar e quando é esperado seu retorno para que todos estejam informados de sua localização.

2.  Compre passagens e ingressos em canais oficiais e desconfie de promoções

A pesquisa Unisys Security Index 2019 aponta que 85% dos brasileiros já foram vítimas de pelo menos um tipo de fraude cibernética no último ano - spam e phishing foram os golpes mais citados (54% e 42%, respectivamente). Essas seguem sendo técnicas muito populares (e efetivas) para os criminosos roubarem dados das vítimas. Por isso, fique atento a e-mails com promoções de passagens, ingressos, brindes ou similares – normalmente são fraudulentos. Além disso, verifique se o website que você está usando para comprar bilhetes mostra o ícone de cadeado seguro (cadeado SSL) no navegador e se o endereço começa com "https: //". E, lembre-se, se os preços parecem bons demais para serem verdade, eles provavelmente não são tão bons assim. Em caso de dúvida, contate o suporte ao usuário da empresa fornecedora.

3.  Fique atento e evite expor-se nas redes sociais

Falsos posts podem levá-lo a websites que visam o roubo de informações ou a distribuição de malware. Assim como no caso dos e-mails, posts com promoções de ingressos, brindes ou similares devem ser objeto de maior desconfiança. Além disso, lembre-se que seu post nas redes sociais pode ser visto por usuários que você não imagina. Por isso, fique atento à visibilidade atribuída a eles ao informar nas redes aonde você irá, o que vai fazer, ou mesmo ao fazer um check-in e tirar uma selfie tagueando local do evento.

4.  Atualize seu celular e evite redes Wi-Fi não seguras

Não atualizar o sistema operacional e aplicativos em smartphones ou no computador pessoal aumenta sua exposição na rede. Falhas de segurança são publicadas com frequência e os criminosos estão sempre atentos em como explorá-las. O Unisys Security Index aponta que cerca de 70% dos brasileiros se preocupam com a segurança dos dados pessoais e de cartão de crédito em seus dispositivos quando usam Wi-Fi público em grandes eventos. Assegure-se de que seus dispositivos estejam atualizados com o software mais recente e use somente redes protegidas por senha. Redes Wi-Fi desprotegidas podem dar aos hackers acesso a dados críticos em seu smartphone.

5.  Utilize VPNs

Durante o tempo off, caso precise acessar os dados da empresa, tais como e-mails ou outros, a partir de redes Wi-Fi locais de aeroportos, hotéis e restaurantes, utilize mecanismos seguros. Uma VPN não o protegerá de todas as ameaças, mas poderá assegurar que seus dados não sejam bisbilhotados enquanto estão transitando pela rede.

6.  Utilize os recursos de segurança do seu smartphone.

Os smartphones dispõem de recursos de segurança, como senha no bloqueio de tela. Use e assegure-se de que seja uma senha forte – há melhores práticas para a criação de senhas numéricas fortes e mesmo para desenhos de padrão de desbloqueio mais robustos. Você pode ainda habilitar recursos de localização para ajudar, em caso de perda (e recurso de apagar todos os dados, para uma situação de roubo do dispositivo).

7.  Viaje tranquilo!

Não é necessário levar tudo o que você possui para uma viagem ou festival. Deixe os objetos de valor em casa e viaje apenas com o essencial - em seus bolsos e malas pequenas, se possível - para que você possa relaxar e se divertir. Mantenha o seu telefone carregado e leve consigo um carregador de baterias para garantir que ele estará disponível em caso de emergência.

Golpistas adoram turistas: enquanto você está deslumbrado e empolgado para explorar um lugar novo pela primeira vez, pode ficar especialmente vulnerável a criminosos que se aproveitam da sua confiança e desatenção. Fique atento e leve em conta as recomendações mencionadas acima para aproveitar as férias com o menor risco possível!

A Unisys é uma empresa global de tecnologia da informação com expertise em criar soluções seguras e de alto desempenho para corporações e governos ao redor do mundo. A companhia desenvolveu aplicações de segurança para alguns dos maiores eventos globais, como a Copa do Mundo da FIFA, o Superbowl e os Jogos Olímpicos.

Siga a Unisys nas redes sociais: LinkedInFacebookTwitter e Instagram.

Lembrem-se de compartilhar as suas fotos no instagram com a hastag #NADATEIMPEDE. As melhores aparecem no instagram do blog e em posts aqui.

Gostaram do post? Nos conte nos comentários e compartilhe com os amigos.


Maharashtra CM Uddhav Thackeray wins floor test with 169 votes

Maharashtra CM Uddhav Thackeray has won the floor test with 169 votes in favour of the Maharashtra Vikas Aghadi government. Four legislature from MNS, CPM, AIMIM and Independent abstain. The floor test was administered by Pro-tem speaker and senior NCP leader Dilip Walse-Patil. Thackeray formally took charge as Maharashtra CMContinue Reading

7 Signs It’s Time To Get Focused On Zero Trust


When an experienced hacker can gain access to a company’s accounting and financial systems in 7 minutes or less after obtaining privileged access credentials, according to Ponemon, it’s time to get focused on Zero Trust Security. 2019 is on its way to being a record year for ransomware attacks, which grew 118% in Q1 of […]

7 Signs It’s Time To Get Focused On Zero Trust is copyrighted by Louis Columbus. If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft.

Enterprise Irregulars is sponsored by Salesforce and Zoho.


One Take Media Co. acquires Thriller Hollywood Movie “Hacker” !!

MUMBAI: A teenager turns to online crime and identity theft to save his family from financial ruin and soon garners attention from a dangerous hacker...

Nine arrested in UK as police take down website that allowed hackers to control people's webcams


Will never abandon hindutva, says Uddhav Thackeray

Maharashtra Chief Minister Uddhav Thackeray told the Legislative Assembly that he would never abandon the ideology of Hindutva. “I am still with the ideology of Hindutva which cannot be separated from me,” he said while addressing the special session.

Hacker Claims to Have Epstein's Data

Soon after the sex criminal Jeffrey Epstein died in August, a mysterious man met with two prominent lawyers. ... He told the lawyers he had something incendiary: a vast archive of Epstein's data, stored on encrypted servers overseas. He said he had years of the financier's communications and financial records -- as well as thousands of hours of footage from hidden cameras in the bedrooms of Epstein's properties.

Why Your Magento Store Needs Code Audit?

No one wants to have their site crash during Cyber Monday or leave customer data open to hackers. That’s why Magento Code Audit is very important as it has a proactive problem-solving approach. The audit analysis the overall performance of your eCommerce store, look for bugs and vulnerabilities and solve these issues before they become …

No sex Dershowitz, DNC haters, all your school are belong to us – News Bytes – 1-Dec-2019

Epstein Tapes? Sordid Case Takes A Bizarre Turn After Mystery 'Hacker' Emerges | Zero Hedge Going by the pseudonym Patrick Kessler, self-described 'hacker' said he had "thousands of hours of footage from hidden cameras" from Epstein's multiple properties, which included former Israeli Prime Minister Ehud Barak, lawyer Alan Dershowitz, and Prince Andrew, along with three … Continue reading "No sex Dershowitz, DNC haters, all your school are belong to us – News Bytes – 1-Dec-2019"

Está es la razón por la que los hackers se interesan en empresas mexicanas


Los hackers no solamente han atacado a Pemex, sino que hay muchas empresas que sufren ataques de este tipo ¿Por qué ocurre?

The post " Está es la razón por la que los hackers se interesan en empresas mexicanas " appeared first on FayerWayer.


विधानसभा में बोले उद्धव ठाकरे – मैं अभी भी हिंदुत्व के एजेंडे पर अब भी कायम हूं


नई दिल्ली: महाराष्ट्र के नए सीएम उद्धव ठाकरे ने रविवार को विधानसभा में कहा कि वह अब भी हिंदुत्व के एजेंडे पर कायम हैं। उन्होंने कहा कि अपनी बात पर कायम रहना ही उनका हिंदुत्व है। उन्होंने कहा, ‘मैं आपको विपक्ष का नेता नहीं कहूंगा, लेकिन आपको ‘जिम्मेदार नेता’ कहूंगा। ठाकरे ने कहा, अगर आप हमारे लिए अच्छे […]

The post विधानसभा में बोले उद्धव ठाकरे – मैं अभी भी हिंदुत्व के एजेंडे पर अब भी कायम हूं appeared first on Kohram Hindi News.


Maharashtra CM stays Aarey metro car shed work

Maharashtra Chief Minister Uddhav Thackeray today said that the new government has stayed the Aarey Metro car-shed work and no trees will be felled until further notice.

Maharashtra govt to monitor all schemes related to farmers on regular basis

Maharashtra Chief Minister Uddhav Thackeray held his first cabinet meeting at Sahyadri Guest House in Mumbai last evening after assuming charge.

Strewth! Aussie Broadband Just Smashed NBN Plans By $20 A Month

We've seen a bunch of cheap NBN plans in recent months, but this deal really takes the biscuit. For a limited time, Aussie Broadband is knocking $20 off the monthly price of its Unlimited NBN 100 and NBN 50 plans. This brings the total down to as little as $59 per month! Here are the details. More »


Cyber Monday 2019: Here Are All The Best Deals!

The world's biggest online shopping period (AKA Black Friday/Cyber Monday) is now in full swing. There are literally tens of thousands of deals vying for your wallet's attention including killer bargains on video games, clothing, books, booze and tech. Here's a list of the best deals you can buy right now, freshly updated with the latest offers. More »


Roast Vegetables On A Rack For Maximum Crispiness

Water is the enemy of crisp, perfectly golden brown roasted vegetables—which sucks, because vegetables contain a lot of it. If you’re all about those crispy edges, try reaching for a cooling rack. More air circulation means all that water will actually evaporate, so your vegetables turn out crispy every single time. More »


Six Online Deals You Need To Know About In Australia Today

G'day! Here are some cracking online bargains for Lifehacker readers, including: Get Battlefield V on PC for $10, the best Cyber Monday deals on eBay and Amazon, $20 off Aussie Broaband NBN plans, BoozeBud clearance sale and more! More »


Reminder: Phone Detecting Cameras Are Now Live In NSW

The NSW Government announced earlier this year it was introducing mobile phone detection cameras, due to be switched on in late 2019 across the state. It's part of a plan to reduce fatalities by 30 per cent in two years and its trial earlier in 2019 was deemed quite effective. Here's what drivers in NSW - and other states - need to know. More »


How To Get Someone To Stop Reclining Their Seat On A Flight

In recent weeks, we here at Lifehacker HQ have had several important debates over the correct etiquette on flights, like which passenger has the right to close the window shade and the ability to deplane first. More »


The Top 20 Cyber Monday Deals On eBay And Amazon

We're living through Cyber Monday which is great for two reasons: there's still some amazing deals to sneak in at the last minute and the marathon deal period is finally almost over. With hundreds of sales across hundreds of websites, it's hard to figure out where to look and what to even look for. To help you out on your merry, big-spending way, we've rounded up the top 20 deals across eBay and Amazon you can still nab today. More »


Get The Best Cyber Monday Deals With This Single App

Huge sales like Cyber Monday can be mighty overwhelming. Sometimes I'd rather pay full price than try navigating a million different stores or websites to compare deals. Enter, your one-stop shopping app, WhatsMine. More »


How To Renovate A Rented Property [Infographic]

The dream of owning a house has become increasingly out of reach for many Australians. But that doesn't mean your rented property can't also feel like home. More »


The Best Contract-Free NBN Plans (With No Connection Fees)

Contracts suck. Why would you give as much as two years of your life to an NBN provider? Your speeds could get worse. You could find a better deal. You could ditch the NBN entirely after 5G becomes more widely available. More »


Last Week's 10 Biggest Posts

You wanted: Black Friday mega deals, new Netflix/Disney Plus shows and a killer Samsung Galaxy S10 deal. Kick off your Monday by checking out the ten most popular posts from last week. More »


How Much Can You Really Save By Cutting Out Coffee?

If there’s one thing that grinds our gears here at Lifehacker, it’s when personal finance gurus declare that the easiest way to spend less, save more, and rack up riches is by giving up coffee. More »


Avoid Those 'Secret Sister' Gift Exchanges On Facebook

Every year my Facebook newsfeed is inundated with invitations to join gift exchanges, specifically those that suggest you can send one gift or book or bottle of local beer and then you’ll magically receive 36 in return. It sounds too good to be true, which is probably because it is. More »


How To Keep Your Hyatt Rewards From Expiring

As many World of Hyatt members already know, any accumulated Hyatt points will expire after 24 months of inactivity. However, that doesn’t mean that you have to book yourself a Hyatt stay every two years to avoid losing your points. There are a number of ways to maintain your World of Hyatt rewards past the 24-month mark, including redeeming your points, purchasing new points, and giving your points to another World of Hyatt member. More »


Get Google's Search Results With More Privacy By Using Startpage

When it comes to web searching, the privacy-conscious among us have probably already heard of DuckDuckGo. This week Fast Company wrote about an alternative to the search engine called Startpage, which if you’re a DuckDuckGo user is worth a look as well. More »


Cyber Monday 2019: The Best Computer Sales So Far

There is no better time of the year to be scavenging for all the greatest offers on computers, Macbooks or tablets. We’ve gathered our favourite offers for this Cyber Week and arranged them into a list. Some of the stores we’ve included are Microsoft, DELL, Kogan and many more. More »


How To Prioritise When Everything Is Important

Sure, it’s great to make a to-do list, but how do you prioritise the tasks — especially when everything seems like a priority? Instead of getting overwhelmed, you need to learn how to prioritise your priorities. Yes, that’s entirely possible, and we’re going to tell you how to do it. More »


Why Would You Ever Poach An Egg When You Could Soft-Boil It?

There are lots of tricks to making poached eggs. Add vinegar to the water, swirl the water into a vortex, slip the egg gently into the water from a mug, plop the egg into the water so its momentum holds it together. Boil the water, simmer the water, once the egg is in turn the heat off altogether. Well, here's my number one poached egg tip: Don't. More »


Here's How Long Your Workout Actually Needs To Be

How long do you spend at the gym? There's an optimum amount of time you should be spending on your daily workout, and chances are it's a lot shorter than you think. Think of what you'll do with all that extra time! More »


Ask The 'Frozen' Characters To Tell Your Kids Stories Using Google Assistant

If you have some Frozen fans in your household, a new Google Assistant skill is likely to be a big hit: you can have characters from the movie read you a story. More »


A Dog Year Is NOT Equivalent To 7 Human Years

Do you know your dog's age in 'dog years'? You know: supposedly a dog is seven dog years old on its first birthday and all that? Well, as it turns out, that figure isn't really accurate at all, and it's thrown even further out of whack when you realise that all dog breeds age at different rates. So if you want to figure out your pooch's actual age in dog years, here's how to do it. More »


How Much Money You Need To Save By The Time You're 35

Over on Twitter, some people are roasting MarketWatch for an article originally published in January that says you should have double your salary saved by the time you're 35. More »


The Best NBN Providers, According To Netflix

If you’re looking for a fast NBN plan, there a couple of ways to gauge performance. The ACCC has a quarterly report, providers self-report evening speeds, or you could check out what Netflix has to say. More »


Sleeping With Your Ex Might Not Be A Terrible Idea

We all agree that there’s no worse idea for getting over an ex than sleeping with them one more time. Or two more times. Right? Bad idea. Unless... unless it turns out it’s actually good for you. More »


The 25 Best Films Of The 21st Century

There have been a lot of great films released since the year 2000, but some of them stood above the rest and elevated the medium to a whole new level of storytelling. These are the 25 best films of the 21st century according to film critics around the globe, and where you can buy them for your collection. More »


Comment on OTW Announces Fanhackers Relaunch by Claudia Rebaza

Hello Maz Could you copy and paste the link that isn’t working? I thought you might mean the “to reach out” link in the post above but that seems to be connecting fine. Claudia Rebaza Staffer, OTW Communications

Comment on OTW Announces Fanhackers Relaunch by Maz Weaver

Uh ... the Comments Feed link isn't working. It just throws up a screen full of code.

Plusieurs hôpitaux français visés par des cyberattaques, après le CHU de Rouen

Les hackers s’intéressent de près au milieu médical et plus particulièrement aux hôpitaux en France. Cela a commencé à la mi-novembre avec le CHU de Rouen qui a connu une attaque informatique, ce qui a paralysé les ordinateurs sur place et a posé des problèmes de gestion. Il …

Lire la suite

Aimez KultureGeek sur Facebook, et suivez-nous sur Twitter


Best Laptop For Cyber Security 2019 – Reviews & Buyer’s Guide


23 Find the ideal laptop for cybersecurity purposes, IT professionals, and hackers is a complicated process, and they usually depend upon various specific needs. If you want to be successful in cybersecurity, the laptop must be the priority. You need the Best Laptop For Cyber Security 2019. The learning methods involve a lot of techniques […]

The post Best Laptop For Cyber Security 2019 – Reviews & Buyer’s Guide appeared first on


Signs your iPhone or Android may be INFECTED – and one is bad battery life

IF YOUR smartphone is running a little slowly then it may have fallen victim to hackers, according to cyber experts. Poor performance could indicate your mobile has been infected with viruses which allow fraudsters to access your banking details. The revelation was made by security buffs during exclusive interviews with The Sun. They were discussing […]

Magento Marketplace Suffers Data Breach Exposing Users’ Account Info


If you have ever registered an account with the official Magento marketplace to bought or sold any extension, plugin, or e-commerce website theme, you must change your password immediately.

Adobe—the company owning Magento e-commerce platform—today disclosed a new data breach incident that exposed account information of Magento marketplace users to an unknown group of hackers or individuals.

Account to the company, the hacker exploited an undisclosed vulnerability in its marketplace website that allowed him to gain unauthorized third-party access to the database of registered users, including both customers (buyers) as well as the developers (sellers).

The leaked database includes affected users' names, email addresses, MageID, billing and shipping address information, and some limited commercial information.

While Adobe didn't reveal or might don't know when the Magento marketplace was compromised, the company did confirm that its security team discovered the breach last week on November 21.

Image courtesy: Twitter user @Hxzeroone

Besides this, the company also assured that the hackers were not able to compromise Magento's core product and services, which suggests that themes and plugins hosted on the Marketplace were not accessed to add any backdoor or malicious code and are safe to download.

"On November 21, we became aware of a vulnerability related to Magento Marketplace. We temporarily took down the Magento Marketplace in order to address the issue. The Marketplace is back online. This issue did not affect the operation of any Magento core products or services," said Jason Woosley, VP of Commerce Product and Platform at Adobe.

While the company also didn't reveal the total number of affected users and developers, it has started notifying the affected customers via email.

Thought Adobe hasn't explicitly mentioned that the account passwords were also leaked, users are still recommended to change it, and as well as for any other website where you were using the same password.


Your new car could be hacked by cyber criminals who can take over vehicles in seconds


NEW CARS could be hacked by cyber criminals who can potentially take control of a vehicle to cause devastating life-threatening consequences.

Ene, CERT-RO: Un atac cibernetic asupra spitalelor, ca cel din iunie, se poate repeta oricând. Nu am ţinut training angajaţilor sanitari

Un atac cibernetic asupra sistemelor informatice ale spitalelor ca cel din iunie, când cinci spitale din România, inclusiv din Bucureşti, au fost victime ale hackerilor, se poate repeta oricând în cazul în care
Citește mai departe...

Raspberry Pi 4 WiFi stops working at 2560x1440 screen resolution


This is part of a series of post on the design and technical steps of creating Himblick, a digital signage box based on the Raspberry Pi 4.


This post seem to have become quite popular, so to be clear, the intention is to document the issue that we spent a whole day chasing so that others won't have to.

It's been fantastic to see how this has made the rounds and resulted in actual RF measurements being made, and better pinpointing of the issue than we could ever have achieved.

I greatly admire Raspberry Pi's work. Thanks to them we get to have an affordable standard platform with a wide use base, which over time gets extremely well known, and as such can be a very well mapped ground to build on.

Original post

One full day of crazy debugging, and the result is that if the Raspberry Pi 4 outputs HDMI at a resolution of 2560x1440, the WiFi stops working.

Any lower resolution we tried, from 2048x1080 down, does not show this problem.

We did not try any resolution above 2560x1440, for lack of a monitor that would do it.

We reproduced this:

  • on both microHDMI outputs
  • with two different cables: one with a microHDMI to HDMI dongle adapter; one direct microHDMI to HDMI. The latter is the one I bought in the Raspberry Pi Store in Cambridge together with one of the Pi 4 units.
  • with three different RaspberryPi units
  • with 4 different power supplies: one rated at 2A, one rated at 3A, one rated at 3A bought in the Raspberry Pi shop in Cambridge, and a laptop USB-C charger
  • with stock Raspbian Buster Lite
  • with stock Raspbian Buster
  • killing every process in the system, starting the network manually with wpa_supplicant and dhclient, and starting X manually with sudo X
  • with two different SD cards
  • connected to an AP some meters away, and connected to a phone hotspot next to the Raspberry PI

At the bottom of this forum thread (guestxyz dated Aug 07) someone mentioned screen resolution, which is what finally prompted us to try that. Thanks, guestxyz!

After confirming what the trigger was that caused the problem and chatting about it on IRC, olasd found this forum thread where more people are experiencing similar issues.

Further things left to try after chatting about it on IRC:

  • whether disconnecting the HDMI cable from the Pi end (with X still started at high resolution and everything) make the WiFi work again
  • switching the monitor to another input while the Pi is at 2560x1440
  • letting the monitor go into power saving mode while the Pi is at 2560x1440
  • cable chokes


Uddhav orders bullet train project review

In a move that may set his government on a collision course with the Centre, chief minister Uddhav Thackeray on Sunday announced a review of the Rs 1.1 lakh crore Mumbai-Ahmedabad bullet train project. The bullet train is estimated to cost Rs1.1 lakh crore.

Will never give up Hindutva ideology: Uddhav

Congress and NCP may have joined forces with Shiv Sena on the latter’s promise that it will commit to secularism, but just a day after clearing the floor test, chief minister Uddhav Thackeray said in the assembly that he would never abandon Hindutva. He also took a swipe at Devendra Fadnavis, hinting at that the latter didn’t keep his “promise” to Sena. “To keep a promise is also part of my Hindutva."

Hackers Are Already Targeting Disney Plus Accounts

In case you weren't already aware, Disney recently launched a new video streaming service called Disney+ which has been driving Netflix and ...

Forsvarets Efterretningstjeneste klar med ny risikovurdering: Her er cyber- og hackertruslerne mod Danmark lige nu

I risikovurderingen fra Forsvarets Efterretningstjeneste for 2019 fremgår det, at cyberspionage og hackerangreb udgør nogle af de værste trusler mod Danmark netop nu.

Traveling through an airport? Your phone could get hacked if you charge it this way

Before you plug in at the airport, consider this: Hackers have been using charging stations to steal data off your phone. Here's what you need to do.


Gigantic mining botnet unmasked


Includes 500,000 infected machines used to mine cryptocoins (without user knowledge).

The hacker group "Stantinko" already attracted attention with one of the largest botnets in the world due to the theft of credentials, fraud and the manipulation of banners. Researchers at security researcher Eset have recently discovered a new business model for botnet operators: cryptomining on more than 500,000 computers. So that their machinations remain undetected, they camouflage their malicious program on the infected machines. If the person in question opens the Task Manager or if the affected device goes into battery mode, the coinminer from Stantinko shuts itself off and remains invisible.

To conceal the communication, the malicious program works with proxies whose IP address is determined from the description text of Youtube videos. This technique is very sophisticated, because visiting the video platform is not uncommon. Youtube got informed and deleted the videos.

Not surprisingly, the criminals behind Stantinko are looking for new ways to further increase their financial profits through the botnet. Cryptomining is more profitable and harder to track than its old core adware business. With more than half a million infected computers, the cybercriminals will be attracting lucrative revenue. However, the new scam has the disadvantage that the mining of cryptocurrencies consumes enormous system resources, It makes even the opening of the browser a game of patience. Here, the criminals try tricky ways to go to disguise the malicious program from ordinary Internet users. Where previously advertising was only intrusive, the new mesh interferes with even the simplest work.



The Evolution of Workplace Cyber Security


Information Technology Blog - - The Evolution of Workplace Cyber Security - Information Technology Blog

Hackers are savvier than ever. Just when security experts wise up to one scheme, cyber criminals devise another. Business owners however, are taking the offensive against today’s greatest threat, phishing. According to both Symantic and Trend Micro over 90% of cyber-attacks begin with spear phishing emails. Let’s face it: Naive, untrained employees account for the …

The post The Evolution of Workplace Cyber Security appeared first on Information Technology Blog.


Manual Version 15 To Accompany Hacker Techniques Tools And Incident

Manual Version 15 To Accompany Hacker Techniques Tools And Incident

I still have fucking flashbacks to the worst of it


automoderator comments on gotta love tinder

wholesale sex toys When it comes to sexual behavior, expectations vibrators, relationships, gender roles, status and identity often have a starring role. Many people decide who they will and will not date or sexually partner with based on gender as well as sex. Often, "feminine" men are often assumed to be gay, "macho" men assumed to be heterosexual; "masculine" women are often assumed to be lesbian, and "femme" women heterosexual, even though none of those assumptions may be correct. wholesale sex toys

Realistic Dildo The material is "Futurotic," which means to avoid silicone lubes since the toy has silicone compounds in it. It's extremely easy to keep a grip on things, which is what I like to hear and feel. Now, inside this toy you have small rubber strands that, in my own experience, make the feeling of this toy something completely different. Realistic Dildo

vibrators Check out posts from other people that sound interesting and add in your thoughts! It takes a while to get up there, I know!Zombirella has some great advice. Make sure to have as many product details, sometimes the manufacture details dont always mach up with the toy itself. Also make your reviews personal, write specifically on what you like and dont like about the toy and it uses. vibrators

dildos They kept hooking hardware into him boxes to let him boss other computers, bank on bank of additional memories, more banks of associational neural nets, another tubful of twelve digit random numbers, a greatly augmented temporary memory. Human brain has around ten to the tenth neurons. By third year Mike had better than one and a half times that number of neuristors.. dildos

wholesale sex toys The anal stimulator is long enough to where it reaches your ass without you having to be at an awkward angle. It takes 2 AAA batteries to make this toy work. The battery compartment is at the bottom of the toy. This is ridiculous." While she ranting, the hostess comes running down the block. They had a cancellation and they could seat us immediately. I was humiliated, I didnt even want to eat there anymore.. wholesale sex toys

Adult Toys But when I finally manage to cum a second time, I swear to god I squirt for a full 30 seconds, it just keeps coming. I can almost HEAR the sound of my semen spurting out it so violent. My whole body locks up, my eyes roll back and sometimes I so drunk I just black out on the spot.. Adult Toys

If there are any lonely, desperate guys out there right now reading my posts, I want to tell you what I've learned so far. If you ever want to "get" a girlfriend, you need to do just ONE thing. To check off the "had relationship/sex" box on your life's to do list), you're not doing it right.

wholesale sex toys IP: Logged I personally don't think homosexuality has a lot to do with socialization. The same thing happens with eyeballs, as well as any other biometric. (A biometric is some aspect of a person that can be measured, and is unique across many people hopefully all of them.)Looking for a "cause" to everything is a bit counterproductive, I believe. wholesale sex toys

wholesale dildos "Better late than never. But also a bit troubling that so many folks seem to already know about this if it hasn't happened already. OpSec anyone?". Haha, I'm going to York University in Toronto. So no in person chats for now but a trans student policy, I hadn't thought of that! It's a large university, they must have one. (You get that I'm used to my university which is pretty much a converted outhouse with adjoining cathedral, where I had to write the trans student policy if I wanted one, right?)"In a strange room, before you are emptied for sleep, what are you. wholesale dildos

animal dildo Quote: Teenage boys can be confused about their sexual attractions. They can go through a phase of being attracted to those of the same sex, but in the vast majority of cases they simply grow out of it and develop a normal attraction for women. Engaging in homosexual activity at this age could entrap them in a lifestyle which they would otherwise have avoided. animal dildo

dog dildo It's never easy. But you have something going here, and I hope you and your new girl can make the most out of tomorrow. Keep pushing forward, you're almost there.We can't look back, we're not going that way. The maintenance for this toy is the easiest of any toy I own. To take care of the probe, we slip off the condom, wash it with warm water and toy cleanser and put it away in our toy box. The harness has a tendency to get dirty, so it will definitely require cleaning. dog dildo

Adult Toys Vibrating vaginas are exciting sex toys for men who want to bring their pleasure to a new level. Vibrating pussies are made of a wide range of materials and in many different styles, so you can choose the one that suits your needs. We also offer vibrating pussy products made of realistic flesh material UR3. Adult Toys

wholesale vibrators Should one's bondage exploits outgrow these particular restraints, they would serve well in a first aid kit, as they're a great size for makeshift bandages. They have no stretch like a proper support bandage, but they'd certainly hold gauze in place, and they'd be perfect for a splint or tourniquet. Hopefully your bedroom play won't require either of those uses, though.. wholesale vibrators

Realistic Dildo I give my love away way too easily. It's a bad habit of mine. But I have never been in a relationship. Don misunderstand me, I am one who actually does not buy into the theory that there is widespread "manipulation." I understand there are going to be some bad actors, but overall, I gauge the market based on demand and nothing more.What I was driving at was. If I had 10k BTC at market high (ATH), and I pretty much knew it was euphoric at that point and knew it to not be sustainable, why not sell off my BTC and short the ever loving shit out of it (since I could condition the market with large sells and influence direction). Once it starts to go down (not a given by any means that it wouldn just back up there is risk), I accumulating wealth off people "emotions" rather than a logic approach to a non sustainable hyper growth path. Realistic Dildo

dildos Another thing to think about is that even when you are feeling relaxed and aroused, intercourse or any other insertive sex is likely a fairly new sensation (even if you've used tampons in the past, they're generally much smaller in diameter than anything else you'd be inserting other than a small finger), and it's something that can take some time to get used to. One thing that might be helpful is if you get some basic latex gloves from a drugstore (or non latex ones if either of you has an allergy) and try insertion with fingers either yours or your partner's and a lot of lube, to get used to the sensation. Gloved fingers are a lot smoother and less likely to have any sort of sharp fingernail issues than ungloved ones, so I think that'll help, and some people find that using their hands, or having their partners use their own vibrators, can be easier because it's easy to feel how your body's responding. dildos

7. Whenever the plug pops out either on purpose or not, reapply lots of lube. I not that large, so whenever the plug can be easily moved in and out, my wife is ready for me to penetrate her. Heck, even you express some of that right here when you say "Aren't girls supposed to be turned on by [penises] anyway?" You even suggest that is the most natural thing. But the answer to that is no, as there is no "supposed to," saving those cultural mandates. When we take homophobia and heterosexism out of the picture vibrators, people are "supposed" to be attracted to whomever and whatever they ARE attracted to, and what is normal there in human sexuality is diversity, not anything uniform most broad studies on orientation show that people who are 100% heterosexual or 100% homosexual are the SMALLEST groups of people, not the largest.

dog dildo I hope I was of somewhat help in your situation. It is not meant to and cannot substitute for advice or care provided by an in person medical professional. The information contained herein is not meant to be used to diagnose or treat a health problem or disease, or for prescribing any medication. dog dildo

horse dildo Oreskes said in an emailed statement on Friday that he had engaged in "inappropriate behavior" in the past. He wrote, "I had worked hard to put those failings behind me. I had no intention to offend or harass anyone at NPR. Cake's lotions do not include parabens, phthalates, gluten, GMOs, petroleum, or mineral oil. Many of these ingredients raise concerns for users. Instead, this lotion is based on healthy skin ingredients like shea butter, milk lipids vibrators, and mango seed butter. horse dildo

vibrators Most of the panty is made of polyester. It is not the most breathable vibrators, but then again, it's worn to be taken off. Here's a picture of the front of the panty.. By Kevin Mitnick, hardcover, 432 pages, Little, Brown and Company, list price: $25.99, pub. Date: Aug. 15 In our new Internet saturated age, hackers are much more prevalent than they once were, but also much less prominent. vibrators

Adult Toys Women are traditionally socialized to be forgiving to perserve valuable social relationships, and successful predators deliberately exploit that. From the details of your story, I think there is little chance that this was his first time setting up and attempting to harm a vulnerable woman. It wasn when it happened to me.. Adult Toys

dildos When you wear this dress, you will feel powerful, and nothing can stop you. Warning: this dress is not a toy. Your partner will be out of control. Mega then checks with Gmail to see if the account exists, which is Mega's somewhat cheesy way of authenticating identity. You then get to set up the Mega account.The episode also demonstrated how fake news can be flung from fringe media to the mainstream. A conspiracy theory that began on pro President Trump message boards a theory that Rich was actually a mole who wanted to expose corruption at the DNC was fed by Russian news outlets including RT and Sputnik. dildos

dildo I been flipping through the book while listening to my voicemail. A really close friend had just been killed by a drunk driver, and me ready to fuck my way to a world record I listening to it once, like I have to replay this I must be crazy he must have said she NOT dead and the second time around, all I hear is the kid wailing in the background. And a screaming baby. dildo

dildo As we should all be aware from thousands of years of human history, youth sexuality and by this we mean sexuality of those under what is the current legal age of majority in the United States, in other words, eighteen years of age poses no real threat to us when it is entered into and developed responsibly and compassionately. It is, in fact, biologically inevitable that we develop sexually at puberty in physical ways. Historically, the advent of sexual activity, both masturbatory and partnered, has generally been assumed to be a natural adjunct of this physical development. dildo

Take your time with foreplay and dont worry about lasting 30 minutes like in porn. You'll spend two hours doing stuff believing it was like ten minutes, sometimes the other way around. You don't really feel time while at it, so don't worry about that part.

wholesale vibrators I was personally threatened to be killed during a period where I owed quite a bit of money after being robbed at gunpoint during a home invasion. Some methods of torture were used on people that I learned/knew about for sure, but that suffering was used as a warning to get people to pay up. Killing someone family IS used more often than you would think though, however, the person who owes the dealer would be warned first so as to put pressure on them to pay up or pay the price. wholesale vibrators

vibrators Createx Transparent Primary 6 2oz Colors Airbrush Paint Color Set 5801 00Createx Airbrush Colors are designed for permanent results with a soft hand feel on fabrics. Colors cure with the assistance of heat after drying. The use of heat to cure colors is one of the main differences between Createx Airbrush Colors and Wicked Auto Air Colors which cure to a much stronger film with air drying alone (referred to as self cross linking).. vibrators

wholesale sex toys Is rooted firmly in conservative ideology of market worship and adoration of private capital. This ideology makes a huge amount of presuppositions about the world, from the sheer expendability of poor people to the trajectory of humanity development being left to the whims of markets. Auesterity was the poor being punished for the inevitable result of unchecked neoliberal policy, which has always been the path of least resistance for maintaining unethical concentrations of wealth.. wholesale sex toys

dildos Her early journalism career was not without its bloopers. At a TV station in New Bedford, Mass., managers asked her to wear a long red wig and a revealing dress. They made her weather girl despite not having any experience in meteorology, she told The Post. dildos

g spot vibrator Some other dude commented that there been 10. I been to the scene of more than 10. In Palm Beach County alone. Holly Willoughby takes on the Celebrity Juice Wibbly Wobbly Board for the Halloween Special dressed as Zombie Wonder WomanNews Group Newspapers Limited in England No. 679215 Registered office: 1 London Bridge Street, London, SE1 9GF. "The Sun", "Sun", "Sun Online" are registered trademarks or trade names of News Group Newspapers Limited. g spot vibrator

dog dildo I think the first step is to realize self exploration and exploring one bounds doesn make you a freakI fully appreciate being anal obsessed, I got into anal play and testing my limits early on as I was curious seeing massive insertions in porn if it was actually possible and if it was actually enjoyable. I come to appreciate that size doesn matter, what matters is how what you inserted "rubs" you. But I did work up to the point I was able to fist myself and take a baseball bat anally. dog dildo

wholesale vibrators For teen and young adult women today, the era of fierce, second wave revolts against looksism aren't a distant memory for them. They've no memory, no feeling, and often no knowledge, of old school feminist reclamation of the body and the watershed feminist health care movement which first shred giant holes in male and corporate dominated approaches to women's bodies and reproductive health. Rather, this is a generation that has often been sent clear and often unchallenged messages, much like their grandmothers were, from their earliest moments of girlhood that every aspect of the female body is unacceptable body hair, wrinkles, the "wrong" size of labia minora or breasts vibrators, the cushy softness of even the thinnest belly. wholesale vibrators

wholesale dildos From here you can either choose a cover photo from a library or upload a pic of your own. When uploading a photo, the minimal size is 881x180 pixels. We recommend an image size of 1323x270 pixels or larger. Miami New Times blogger Kyle Munzenrieder says that Hickman, 54, "may be one of the first people prosecuted under Florida's new anti beastiality laws," but we wonder if that doesn't depend on when he goes to court. According to a Broward Palm Beach New Times blog from May 26 announcing the passage of the law, it goes into effect Oct. 1. wholesale dildos

sex toys Unlike traditional anal beads, the Cogilia beads have an interesting design to each of the beads. Each one of the beads resembles a lopsided hourglass shape. Instead of just being circular vibrators, this gives the beads more of a sensation. I 32 and I still picking up the pieces. I still have fucking flashbacks to the worst of it. Don get me wrong, my life is trending in the right direction and I feel better about it than I ever have in the past, but it been a long, hard road to get to where I am now. sex toys

wholesale vibrators There was both a scent and taste to this oil. I feel that the taste was just the right strength. Many products over do the flavouring of an oil or lubricant. Using electrostimulation, vibration, audio and visual cues vibrators, this shock collar is ready to help you effectively train your partner. Using the long range remote (works up to 800ft away) you can control each of those aspects individually. The buckle is an adjustable rolling buckle, that can also use a padlock (sold separately).. wholesale vibrators

gay sex toys These are classic symptoms of anxiety, which I suffer from. I know it's easy to say, "Don't put yourself in these situations," but I always feel OKAY going into it and WORRY much later. Isn't that odd?. Yet however smartly it evoked the sounds of an earlier era, Back To Black could never have been mistaken for anything but contemporary or anyone but Winehouse. Funk and R grooves snapped through a post breakbeat filter; her lyrics about lost love and self destructive habits pulled zero punches; her delivery came fluid as exhaled cigarette smoke. Even "Tears Dry On Their Own," whose arrangement reproduced Tammi Terrell and Marvin Gaye's version of "Ain't No Mountain High Enough" down to the drum fills, sounded magnificently fresh with Winehouse's lead line a romantic duet flipped into a frank, lonely rendering of a breakup's aftermath. gay sex toys

animal dildo We hear a whole lot about who should be our first partner. Most of the time, we're told it should be someone we love and who loves us back, someone committed to us long term, perhaps even someone we plan to spend the rest of our lives with. I agree completely, because you, all by yourself, have all of those qualities, more than any other person ever can.. animal dildo

wholesale vibrators We all do. But it really made me feel good. He told me to lean back and just think happy thoughts. I saw my regular doctor yesterday, the one I have been seeing for a while, as opposed to the student health center, and talked to him about the anal sex and HPV. Since I was diagnosed with the HPV that causes cervical cancer, he said there isn't anything to worry about, as that one cannot affect the rectum. However, he said if I had the HPV that causes genital warts, there would be concern, as warts could develop in the rectum. wholesale vibrators

wholesale dildos You'll find rotary phones, touchtone wall mounted phones, and even some of the very first Motorola cellular phones on eBay. Keep in mind that most people who sell vintage electronics market the equipment in used condition. When you buy old electronics vibrators, it may show signs of use, such as dirt, fading and buttons that don't work as smoothly as they once did. wholesale dildos

g spot vibrator Society puts a lot of pressure on men to maintain their masculinity, and it's perceived that the desire for anal sex can somehow diminish that trait. Well it doesn't. Wanting anal sex doesn't make a man gay; it only means that he is open to all the amazing pleasures and benefits that come with it. g spot vibrator

dog dildo He said I asked people to go. Look, you look at his testimony." Trump told The Washington Post in June 2016 that he didn't remember testifying in 1980 to the Organized Crime Strike Force about mob connected labor leader John Cody, who was close to Trump's mentor Roy Cohn and was alleged to have offered Trump peace with organized labor in exchange for a Trump Tower apartment. "I don't remember that at all," Trump said, adding: "I don't remember that, no. dog dildo

sex toys The idea of who was possessed, (Ray and/or Jesse) and whether they remained possessed and/or for how long and during which time periods they were possessed and even if possession was happening at all to Jesse, makes the movie more interesting.To this day I have no idea what the match crap means, or where it gets its data from. Is it just some Netflix algorithm that associates various films with one another and decides that if you watched movie X all the way through you a 90% match for movie Y? How does it know if I liked one, how does it know if anyone thinks something is good or sucks. That probably true. sex toys

g spot vibrator The bustier and g string are 95% nylon and 5% spandex. The material is really soft and comfortable to wear. The lace that goes around the bottom of the bustier and the lace on the g string feels like it would be itchy but it is not. If this vacation destination sounds like more work than it's worth, don't be discouraged. The pay offs are many and varied. Once you get past some of the quaint customs, the residents of Machismo really are sweet and loveable underneath all that posturing. g spot vibrator

vibrators This extreme paddle is no joke! Not for the faint of heart, this crop shaped paddle is made of heavy aluminum, with a spiked waffle texture on one side to tenderize your masochist's delicious meat without breaking the skin! Firm and inflexible, this weapon of ass destruction will deliver a hard thud, whether you're using it on the spiked side or the flat, smooth side. The ribbing of the handle allows you to maintain a sure grip as you swing, giving your pain slut the kind of pain and pleasure that they have been craving!She emerges from the en suite in cloud of steam, still freckled with tiny wet pearls from her shower. Dew drops on a morning flower vibrators.


165: Building Custom Apps to Empower Your Unique Situation

Eddie Wang, Growth Hacker at App Sheet, and Mike Saltijeral, Owner of Industrial Fence Inc, join us on this episode 165 of Art of Construction.   In many recent episodes we have discussed the Big Data explosion currently happening in design and construction. When on this topic, the question usually arises of what exactly the best way is to utilize this data to help grow your business. If you ask AppSheet, the answer is that there is no one best way. In fact, the best way will inevitably be different for each and every company. It is with this mindset that AppSheet provides a no-code application development platform that allows users to create mobile, tablet, and web applications using data sources like Google Drive, DropBox, Office 365, and other cloud-based spreadsheet and database platforms.   We’ve had a ton of construction platforms on this show before, but AppSheet is unique in that it is all about empowering the user to create a custom app instead of selling the user something pre-designed. In order to better tell the story of why this is powerful, Mike Saltijeral joined us to explain how AppSheet has given him the ultimate freedom to create unique and innovative solutions to the situations his fencing company faces.   Mike’s story is one that many business owners currently adopting new technology can relate to. And for business owners that have so far hesitated to adopt new technology, his story serves as an inspiration. Join Devon as he goes on a journey with Eddie and Mike to learn all about AppSheet, what it means to be able to build problem-solving digital solutions for your company without needing code, and what it takes to be a true leader and pursue these solutions in a way that benefits your entire team and your customer community.  AppSheet helps construction process owners create the tools they need to improve their business without writing a line of code. ​Start for free on the platform and build any app for up to 10 users with all our features enabled. They have plans for every size team starting from pay-as-you-go model user licenses to business plans with increased functionality, security, and speed.​ ​ Take an extra 20% off your first year with discount code: "AOC" if you purchase by 12/15 at

Hackers Are Already Targeting Disney Plus Accounts

In case you weren't already aware, Disney recently launched a new video streaming service called Disney+ which has been driving Netflix and other established streaming services crazy with fear and apprehension since ...

Hackers Are Imitating Government Agencies To Spread Malware

Researchers at Proofpoint have found evidence of a new threat actor who has been sending out convincing looking emails. They are claiming to come from several government agencies. These include the Italian ...

New Prints From Michael Hacker


Michael Hacker just released two new art prints. One's entitled "Biggest Jaw Drop Ever" and the other one's called "Shroomy". Both prints are are signed and limited giclée prints and available in different sizes (and versions).

Here are the links to get them.



Ethical hacking: il ruolo degli hacker nella cybersecurity


Jake Davis, ex componente del gruppo Lulzsec e oggi pentester, spiega perché la definizione "ethical hacking" non ha più senso

Leggi Ethical hacking: il ruolo degli hacker nella cybersecurity


5 упражнений от фитнес-красоток для тех, кто хочет преобразить своё тело

5 упражнений от фитнес-красоток для тех, кто хочет преобразить своё телоПерсональные тренеры, фитнес-модель и диетолог рассказывают о любимых упражнениях, которые помогают им поддерживать блестящую форму.

10 научно обоснованных причин завести кота

10 научно обоснованных причин завести котаХотите здоровья и лёгкости — принимайте котика. Ежедневно. В максимальных дозах.

Почему спать по 6 часов в день так же плохо, как не спать вообще

Учёные подтвердили это в ходе эксперимента и объяснили, в чём причина.

Как выбрать бюджетный игровой ноутбук

Как выбрать бюджетный игровой ноутбукУзнайте, каким должен быть недорогой лэптоп, который тянет современные игры на средне-высоких настройках графики.

5 советов родителям, которые хотят всё успевать

Успеть всё: 5 лайфхаков для работающей мамы и занятого отцаЛучше всех о постоянной спешке, недосыпе и нехватке времени знают родители, которые пытаются совмещать успешную карьеру с воспитанием детей. Рассказываем, как всё успевать, если вы не хотите выбирать между семьёй и работой.

AliExpress: самые интересные находки за неделю

AliExpress: samye interesnye nahodki za nedelyuИнтересные и полезные вещи, которые Лайфхакер нашёл на просторах торговой интернет-площадки AliExpress за прошлую неделю.

18 главных сериалов зимы: «Ведьмак», «Дракула» и «Чужак» по Стивену Кингу

18 главных сериалов зимы: «Ведьмак», «Дракула» и «Чужак» по Стивену КингуЛайфхакер собрал самые громкие премьеры и возвращения любимых проектов, которые скрасят вечера и долгие праздники.

Как не разрушить семью, если вы работаете вместе

«Мам, ты уволена»: как вести бизнес с родственникамиНа первый взгляд кажется, что эта статья могла бы состоять из одного слова: «никак». Но на самом деле всё не так страшно, если руководствоваться не одними лишь эмоциями. Собрали советы, которые помогут работать с родными и не разрушить семью.

ТЕСТ: Насколько вы сообразительны?

Тест на сообразительностьМолниеносно находить решения непростых задач — неплохая суперспособность. Проверьте, обладаете вы ей или нет. Для этого вам предстоит распутать числовые и буквенные последовательности, решить визуальные и словесные загадки, да и вообще хорошенько поднапрячь извилины. Вперёд, узнаем, кто тут самый сообразительный!

5 главных новостей из мира технологий за минувшую неделю

новости технологийТоповый планшет, новые умные часы, опасный вирус на Android и не только.

Лучшие смартфоны ноября

Luchshie smartfony noyabryaВ этом выпуске вас ждут Redmi Note 8T с большим экраном и NFC, Xiaomi Mi CC9 Pro с камерой на 108 Мп и раскладушка Motorola RAZR.

5 главных новостей из мира кино за минувшую неделю

Отзывы на «Ведьмака», главные претенденты на «Оскар 2020» и удалённые сцены из «Игры Престолов».

Учитывайте свой стиль работы, чтобы стать продуктивнее

Советы для приверженцев многозадачности, прокрастинаторов и тех, кто любит доводить дела до конца.

ТЕСТ: Подружитесь ли вы с искусственным интеллектом в 2040 году?

умный дом, искусственный интеллектВ наших домах уже есть роботы, которые замешивают тесто или моют пол. И датчики движения, включающие свет, когда мы заходим в комнату. А что, если в будущем роботы возьмут на себя все задания, которые мы не любим? А искусственный интеллект сможет настроить яркость лампочки, если ваши глаза устали? Пройдите тест и узнайте, готовы ли вы к такому повороту событий.

Как использовать ToDo.txt — список дел для минималистов

Как использовать ToDo.txt — список дел для минималистовУниверсальный способ управления задачами, для которого достаточно одного «Блокнота».

Pay What You Want: The Ultimate White Hat Hacker 2018 Bundle (Mini) for $1

Expires December 04, 2022 23:59 PST
Buy now and get 99% off


This course provides a good starting point from which to learn ethical hacking and identify threats and vulnerabilities to secure your IT environment. You'll begin with an introduction to the best tools around before diving into basic hacking technique, and ultimately going into real-life scenarios to get a hang of how hackers think.

  • Access 14 lectures & 2 hours of content 24/7
  • Discuss a basic introduction to reconnaissance
  • Get hands-on experience working w/ Metasploit & testing the effectiveness of different defenses
  • Learn about sniffing & how effective Man-in-the-Middle attacks can be
  • Go through a coffee shop scenario to further your understanding
  • Understand how hackers use networks to gain access to different systems


Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels


  • Internet required


Gary Dewey is an IT consultant specializing in security. A graduate of SUNY Broome's computer security and forensics degree program in New York, he has attended numerous B-Sides conferences and spoken at B-Sides in Rochester, New York. Gary participated in the 2015 US Cyber Challenge held at Virginia Tech. He is an active member of the Triple Cities Makerspace, a non-profit organization dedicated to community collaboration and learning. He enjoys hiking and cats.


A 21st Century Guide By Richard Carleton Hacker September 19 2000

A 21st Century Guide By Richard Carleton Hacker September 19 2000

Fast Poker -

IPB Image

I'm not admin here!
Many Poker rooms write that their system excludes the use of poker bots. But every good programmer knows that it is possible to make a poker bot and the protection mechanisms will not be effective.
😎 Today in darknet it is easy to buy various ready-made bots from $ 500. On hacker-forums in the TOR network, of course, there are excellent programs for the price of $ 20,000 and above. Making money with a poker bot does not mean being absent from the table. It is necessary fix the errors of the program, buy only high-quality and reliable IP, change the settings bot , corrections and follow updates of the program.
👍 Our poker bot plays in different ways against certain players. Based on my own experience and thousands of poker hands. The program simulates a real person with flexible team play settings. Multifunctionality of settings allow to exclude blocking and detection of software.

IPB Image

Plans: 103-350% after 1-25 days

FAST ONE ❤️️ +3% After 1 days
FAST TWO ♣️ +15% After 3 days
FAST THREE ♠️️ +30% After 5 days
FAST FOUR ♦️ +80% After 10 days
FAST FIVE ⭐️️ +250% After 25 days

Min: $20 / Max: Unlimited

SSL Encryption
DDos Protection
Other Script
Registrar NameCheap, Inc
Created on 2019-10-25
Expires on 2020-10-25
Updated on 2019-11-22

Accept: PM, Payeer, Bitcoin, Litecoin, Dogecoin, ETH, BCH, DASH,..

Join here:

Reduced Size Image

My deposit:
The amount of 35 USD has been withdrawn from your account.
Accounts: U4603107->U22338257.
Memo: Shopping Cart Payment. Invoice 1, hyiptank..
Date: 14:29 01.12.19. Batch: 292045898.


Por qué es mucho mejor que tu contraseña sea una frase, según los expertos

encontrado fichero en dark web
Los expertos dicen que la forma más efectiva de protegerse contra los hackers es crear buenos hábitos de contraseña. No hay razón para que tu contraseña sea una sola palabra: una "clave compuesta por una frase" es mucho más segura.

MyPublicInbox: Un proyecto para acercarte a perfiles públicos relevantes #MyPublicInbox

Cuando comenzamos a trabajar en la idea de MyPublicInbox lo veíamos como una forma de que una personas que deseara contactar con alguien que tuviera un perfil público para contarle una idea, ofrecerle un proyecto, querer contratarle, o solicitarle consejo profesional lo pudiera hacer de forma rápida y respetuosa. Desde el principio lo vimos como una forma de acortar la distancia entre las personas que quieren comunicarse y que culpa de los que no hacen un uso responsable de los canales de comunicación se había deteriorado.

Figura 1: MyPublicInbox: Un proyecto para acercarte a perfiles públicos relevantes

Cada vez que un perfil público se abre una cuenta en MyPublicInbox está abriendo una puerta hasta su buzón personal a todo aquel que necesite o quiera contactar con él. Una forma muy cómoda de poder tener acceso a personas relevantes, importantes, que admiras, que te pueden aconsejar o ayudar. Una forma, de tener disponible a alguien del nivel de estas personas cuando los necesitas. Y eso es, para los que hemos tenido que montar nuestro futuro profesional viniendo desde un barrio, o lanzar una StartUP solitos, una auténtica pasada
A día de hoy está funcionando muy bien, y cada día más perfiles públicos están en la plataforma. Hoy os he seleccionado 15 de los últimos que tienen buzón abierto a Internet en MyPublicInbox para que cualquiera pueda localizarlos fácilmente. Os he seleccionado solo quince, porque si no el post quedaba muy largo, pero podéis ver muchos más en la zona de Perfiles Relevantes, y en los posts que os dejo al final con las referencias.

Figura 3:Perfiles destacados en MyPublicInbox por categorías

La verdad es que no es fácil hablar de Rebeca Khamlichi si no conoces lo que hace, así que si la conoces, aquí está, y si no, léete esta entrevista que le hicieron en el El País el año pasado con motivo de la publicación de su libro "Las hijas de Antonio López".

Figura 4: Contacto de Rebeca Khamlichi

Periodista, amante del misterio, televisión, podcasts, cenas de asesinato. Si quieres una persona que organice un misterio en una cena y acaben todos muertos. Esa es Elena Merino. Conduce el podcasts de Elena en el País de los Horrores.

Figura 5: Contacto con Elena Merino

Si tienes una StartUP que quieres llevar a ScaleUP, o una empresa que necesita un empujón en comunicación para ser noticia. Si estás lanzando una carrera profesional y necesitas darte a conocer. Carolina Bonilla se ocupa de ello. De ayudar a que los profesionales independientes, las bandas de música, las startups y las pymes también sean noticia en los medios de comunicación.

Figura 6: Contactar con Carolina Bonilla

También está David Aldave, que está llenando de ruido armónico las salas de conciertos donde le dejan a él y a su grupo The Flamingos Bite, tocar los temas de rock que componen ellos mismos. Puedes escuchar su trabajo en Spotify y contratarlos directamente hablando con ellos.

Figura 7: Contactar con David Aldave cantante de "The Flamingos Bite"

Emprendedor, informático, hacker, dinamizador del cambio en la cultura de la empresa, mago, animador, presentador de eventos. No es fácil encontrar un mago que sepa programar. Sin duda el Mago More es un ejemplo de lo que es ser un profesional total para revolucionar una empresa. Su trabajo como dinamizador de grupos de trabajo, presentación de eventos, y agitador de compañías es diferencial. Y encima es divertido como él solo. Si tienes un evento, un programa de compañía que transmitir, o que empujar transformaciones tecnológicas en tu compañía debes contactar con el Mago More.

Figura 8: Contactar con el Mago More

La nueva hornada de divulgadores científicos, que son responsables de la educación a través del Big Brain ese que defiendo yo, tienen a Santi García Cremades entre ellos. Haciendo uso de las nuevas tecnologías, de las nuevas formas de comunicar, de los nuevos lenguajes para explicar conceptos, lleva la ciencia, las matemáticas hasta las pantallas de todo el mundo. Un ejemplo de cómo se educan las nuevas generaciones hoy en día.

Figura 9: Contactar con Santi García Cremades

Poco se puede decir de Ignacio Cirac sin dejarse mucho por contar. Un científico e investigador total de los pocos que tenemos en este país. Juan Ignacio Cirac Sasturain es un físico español reconocido por sus investigaciones en computación cuántica y óptica cuántica, enmarcadas en la teoría cuántica y en la física teórica. Desde 2001 es director de la División Teórica del Instituto Max-Planck de Óptica Cuántica en Garching, Alemania. Tiene siete reconocimientos como Doctor Honoris Causa, y ha sido galardonado con un sin fin de premios que puedes ver en su Wikipedia. Entre ellos, el Principe de Asturias de de Investigación Científica y Técnica. Y encima es una persona impresionate.

Figura 10: Contactar con Ignacio Cirac

Otra de los perfiles totales. Alvaro Benito, fue jugador del Real Madrid, y hoy en día sigue ligado al mundo del deporte. Entrenador de fútbol profesional de éxito, comentarista de partidos de fútbol de Primera División, Champions y periodista deportivo. Y encima, compositor de canciones, cantante y rockero que tiene en su haber haber lanzado uno de los grupos más populares de rock nacional: Pignoise. Es incansable en su creatividad.

Figura 11: Contactar con Álvaro Benito

No muchos actores pueden decir que han trabajado en una película que ha ganado un Oscar de Hollywood como lo hizo Todo sobre mi madre de Pedro Almodovar. Eloy Azorín sí puede. Actor internacional, mente inquieta y trabajador. Ahora puedes verle en la serie Apaches de Netflix, en el teatro representando - acaba de terminar temporada de 7 años en Madrid y está de gira -, o mil y una de sus giras. Nosotros le liamos para la campaña de Todos Somos Despistaos que presentamos en la Fundación Telefónica este viernes.

Figura 12: Contactar con Eloy Azorín

Entrenador,  conferenciante, consultor y manager de jugadores profesionales de tenis. Ese es Juanma Espacia. También es profesor de la Real Federación Española de Tenis y co-fundador de Sported (Sport & Education) junto con Feliciano López, que es una empresa dedicada a la gestión deportiva y a la formación de profesionales del deporte y los negocios que emplea el deporte como plataforma de aprendizaje, responsable de desarrollo de proyectos en el área de tenis.

Figura 13: Contactar con Juanma Esparcia

Marita Zafra es actriz, poeta y bailarina contemporánea profesional formada en el Real Conservatorio de Madrid. Comenzó como actriz en el Centro Dramático Nacional y de ahí paso a formar parte del reparto de la popular serie "Cuéntame". Actualmente da vida al personaje de Casilda, una criada tragicómica en la serie "Acacias 38" en RTVE.

Figura 14: Contactar con Marita Zafra

El siguiente perfil público seguramente sea más conocido para todos vosotros. Es el del gran Wardog, que es el BOFH ("Bastard Operator Form Hell") más conocido y querido (no por los usuarios) de nuestro país. Le convencí para que escribiera el libro de  "Wardog y el Mundo" en 0xWord, y ahora le he convencido para que se vuelva más accesible a través de MyPublicInbox.

Figura 15: Contactar con Wardog

Con más de 20 años estudiando el campo del envejecimiento Catalina Hoffmann es una de las más destacadas terapeutas especializadas en estimulación cognitiva. Se ha focalizado en estudiar el cerebro de los 40 a los 100 años y es creadora del Método Hoffmann. Emprendedora nata, fundadora de Vitalia centros de día, la primera red de franquicias de centros de día en España, Hoffmann world y la plataforma wellness siempre joven. Una emprendedora de pura cepa.

Figura 16: Contactar con Catalina Hoffmann

Debería haber estado en el artículo que dediqué a los Dibujantes y Artistas en MyPublicInbox, pero Mike Bonales se sacó el buzón después. Así que aquí lo traigo. Dibuja como los ángeles, y le liamos hace tiempo para participar en el cómic de "El fin de Cálico", pero su trabajo en el Conejo Frustrado es digna de conocer. Un artista único para que lo tengas a tiro de menaje en su buzón público.

Figura 17: Contactar con Mike Bonales

Y por último El País de los Horrores (Podcast). Es el buzón para que contactes con el equipo del podcast que dedica su emisión a tratar asesinatos, casos de misterios, leyendas, historia negra, etcétera. Si quieres contar una historia, conocer más detalles de algún hecho, o proponer un tema, puedes contactar con ellos por aquí.

Figura 18: Contactar con El País de los Horrores (Podcast)

Si quieres contactar con ellos, ya sabes que solo tienes que abrirte una cuenta en MyPublicInbox y contactar con ellos de forma respetuosa y valorando su tiempo en el proceso de comunicación. Y si quieres tener un buzón de MyPublicInbox, mira las opciones para tener un perfil público.

Saludos Malignos!

Más Referencias:

Autor: Chema Alonso (Contactar con Chema Alonso)


Episode 168- Roaring News

This week's news is full of spying smart devices and the perceived sprawl of IOT. We finish off discussing the use and non-use of big monolithic government contracts in technology. It's not because you're paranoid they're not out to get you... Privacy is foremost in many peoples mind, but on the other hand we keep bringing so called "smart" devices into our pivacy sanctums... And now we need to start thinking on how this trend affects our surroundings... We've outsourced all the people? OK, now let's outsource all the bytes! Red Hat is reporting on the apparent trend of outsourcing IOT, but to be honest, how pervasice is IOT in everyday life and is there really a need for this? All your bases, they are belong to... Amazon? We don't really care about how the Pentagon sends the taxpayers money and this article wrongly predicts Amazon to win the much discussed and maligned US Pentagon JEDI contract anyway, but are these monster deals still make sense in the world of hybrid cloud and micro-services? Please use the Contact Form on this blog or our twitter feed to send us your questions, or to suggest future episode topics you would like us to cover.

Get $100 off a Playstation 4 thanks to eBay's Cyber Monday sale -

  1. Get $100 off a Playstation 4 thanks to eBay's Cyber Monday sale
  2. The Top 20 Cyber Monday Deals On eBay And Amazon  Lifehacker Australia
  3. The massive Cyber Monday eBay deals set to take off around Australia  Daily Mail
  4. View full coverage on Google News


Hackers Are Already Targeting Disney Plus Accounts

In case you weren't already aware, Disney recently launched a new video streaming service called Disney+ which has been driving Netflix and other established streaming services crazy with fear and apprehension since ...

Hackers Are Imitating Government Agencies To Spread Malware

Researchers at Proofpoint have found evidence of a new threat actor who has been sending out convincing looking emails. They are claiming to come from several government agencies. These include the Italian ...

Another WhatsApp Vulnerability Has Been Found

WhatsApp is the most popular messaging platform in the world. Unfortunately, that means it's got a giant bullseye on it where hackers are concerned. In recent months, the company has faced no ...

Heads up: Hackers can target your vehicle


Hackers exploit security vulnerabilities in new automobile connectivity technology. Learn about this threat and how to stay safe in this guide. The automotive industry is transforming. Manufacturers shift their focus to modern software features. They also embrace the advantages of connectivity and 5G implementation. These technologies revolutionize automobiles as we know them. Not only making them safer or more robust but also personalized for consumer use. But innovations come with cybersecurity risks. And it’s nothing new. Hackers have exploited hardware and software vulnerabilities in cars since 2010. Nonetheless, these threats have grown in size and scale with the deployment of new technologies. Automakers face pressure to deliver new products. It often doesn’t leave enough time to think about cybersecurity capabilities. […]

The post Heads up: Hackers can target your vehicle appeared first on techAU.


Post NordVPN Data Exposure: Using Domain Threat Intelligence to Prevent MitM Attacks


NordVPN admitted last month that its data center located in Finland was hacked on March 5, 2018. While the virtual private network (VPN) service provider claimed it learned of the incident as early as April 13, 2019, it only confirmed the compromise last month after reports that its expired Transport Layer Security (TLS) certificate and its private key were leaked. The extent of the intrusion is detailed in this dumped Pastebin log. As shown, the hacker obtained full remote administrative access to NordVPN's node containers. Here are the implications of the breach:

  • With the private key, an attacker could create his own server in NordVPN's network, and launch man-in-the-middle (MitM) attacks.
  • Since the hacker had root access, he could have maliciously intercepted and modified user traffic.
  • The provider did not enable reneg-sec, so even though it uses encryption, one-hour-old traffic at the time of the hack could easily have been decrypted.

NordVPN released an official statement in response to the uproar and claimed that no user credentials and activity logs were stolen. It also stated that there were no signs that the hacker monitored user traffic. However, it did admit that the TLS keys can be used to launch a targeted and sophisticated MitM attack on a user in some circumstances.

It's also important to note that TorGuard recently suffered a similar data breach incident, bringing to light the possibility that other VPN providers could be vulnerable.

Our Investigative Tool: Threat Intelligence Platform

When a service that promises to protect user data and identity gets hacked, the incident highlights the increasing boldness and sophistication of attackers. With the possibility of MitM attacks as a result of TLS certificate and private key exposure, what can help stop adversaries from launching attacks on any VPN service providers' clients?

Domain threat intelligence is a possible line of defense to consider. Threat Intelligence Platform (TIP), for instance, can assess the integrity of a domain before it is allowed to connect to a computer or server that houses confidential data.

NordVPN could, for instance, run its domain through TIP to identify vulnerabilities, misconfigurations, and open ports that attackers can exploit.

The results showed that its site has redirects. To ensure its domain's integrity, it needs to check that these redirects do not lead to malicious sites or hosts. Attackers are known for using redirects to obtain data they are not authorized to view to their own servers or sites.

The domain analysis also gave out several Secure Sockets Layer (SSL) warnings that may be worth looking into. NordVPN can, for instance, consider setting its HTTP Public Key Pinning (HPKP) headers to protect against impersonation by attackers using wrongly issued or fraudulent certificates. It can also set its TLSA parameters to bind X.509 certificates to Domain Name System (DNS) names using DNS Security Extensions (DNSSEC).

A check on its mail servers also warned that Domain-Based Message Authentication, Reporting, and Conformance (DMARC) is not configured. When properly set up, this email validation system can provide an extra layer of defense against spoofing. It's intended to combat specific techniques often used in phishing and spam attacks such as forging senders' addresses.

Apart from identifying potential security gaps in its IT infrastructure, NordVPN can also use a domain threat intelligence platform to authenticate logins to its systems that contain sensitive client and employee data. Quick queries on the tool can help it spot unauthorized users on its network.

* * *

NordVPN is confident that none of its users' credentials, activity logs, or traffic have been compromised as a result of the data breach. However, we live in a world where cybersecurity is only as strong as your ability to detect threats early.

Preparing for a cyber attack by taking into account all possible attack vectors is, therefore, a must. By using domain threat intelligence obtained through tools such as Threat Intelligence Platform, security teams can better detect threats in real-time, thereby strengthening their organizations' security posture.


InterMed Breach: How Threat Intelligence Sources Help Maintain Domain Integrity


Major healthcare providers suffer a lot from breaches, both from a legal and financial standpoint. Aside from patient lawsuits, they also face severe penalties imposed by the Health Insurance Portability and Accountability Act of 1996 (HIPAA).

So not surprisingly, the average cost per breached record in the healthcare sector in the U.S. this year has reached US$429 — which could easily translate to millions of dollars, depending on how many customers a compromised entity has.

For InterMed, the said estimate shows that potential fines could reach US$12.87 million for the breach the company has suffered in September. Here are further details about the compromise:

  • An email account owned by an InterMed staff was hacked on September 4, 2019.
  • Internal investigations uncovered that threat actors accessed three more email accounts on September 7 and 10. These accounts revealed the personal information of around 30,000 patients.
  • Personally identifiable information (PII) such as names, dates of birth, insurance details, and clinical data were stolen.
  • The Social Security numbers of some patients were also compromised.
  • InterMed maintained that the attack did not affect its entire patient database. Recently added electronic health records (EHRs) were also not put at risk.

As a result of the breach, InterMed warned patients that they should watch out for unauthorized payment card transactions and forged letters from insurance or healthcare companies in the coming days. It also offered free credit monitoring and identity theft protection to the clients whose records were impacted.

The healthcare firm is right to indicate that their clients are vulnerable to fraudulent activities following the attack. It's also common to see a spike in spearphishing campaigns as a result of data breaches.

How the Threat Intelligence Platform Can Help Keep Domains Secure

Data loss due to email-related incidents is prevalent in the healthcare industry. In a recent industry survey, 95% of healthcare organizations claimed that they received emails from imposters in the past year.

Note that it's relatively easy to conduct reconnaissance on a target host today, thanks to the ubiquity of online directories. For instance, a quick Google search for "InterMed email address" would lead users to a RocketReach listing for the healthcare firm. While the directory did not reveal the email addresses of many company employees, it did provide clues on the organization's most used email formats (e.g., jdoe@intermed[.]com and janedoe@intermed[.]com).

The page also lists the names of the company's employees and president. Pretty much all hackers need to do is send a message with a malicious attachment to a person on the list using the likely used email address formats. They can also attempt to brute-force their way into employee email accounts with weak passwords and use these for attacks or gain entry into confidential databases.

Email security software and strong password credentials are usually the first lines of defense against such threats. In addition, the use of threat intelligence insights can help ensure the integrity of an organization's domain infrastructure, as leaving gaping vulnerabilities is like an open invitation for attackers to steal confidential information.

We analyzed InterMed's domain, which revealed some interesting findings. Results from our Threat Intelligence Platform (TIP) showed multiple Secure Sockets Layer (SSL) vulnerabilities concerning data encryption and authentication.

One way of ensuring the security of an organization's network is by disabling suboptimal cipher suites that include NULL, EXP(ort), and DES and RC4. In InterMed's case, it may be a good idea to disable DES-CBC3-SHA, as this may be vulnerable to a CVE-2016-2183 exploit known as "SWEET32." Setting its HTTP Public Key Pinning (HPKP) header is also recommended, as this could decrease risks of man-in-the-middle (MitM) attacks that use forged certificates.

* * *

All in all, organizations should continuously revisit their data management policies and train employees to improve their domain hygiene. They can rely on Threat Intelligence Platform to find weaknesses that attackers can take advantage of and strengthen their defenses.


Radikalisierungsmaschinen : wie Extremisten die neuen Technologien nutzen und uns manipulieren

Radikalisierungsmaschinen : wie Extremisten die neuen Technologien nutzen und uns manipulieren

Mediengruppe: Sachbuch
Verfasser: "Ebner, Julia"

Julia Ebner jagt hauptberuflich Extremisten. Undercover mischt sie sich unter Hacker, Terroristen, Trolle, Fundamentalisten und Verschwörer, sie kennt die Szenen von innen, von der Alt-Right-Bewegung bis zum Islamischen Staat, online wie offline. Ihr Buch macht Radikalisierung fassbar, es ist Erfahrungsbericht, Analyse, unmissverständlicher Weckruf. Als Extremismusforscherin stellen sich ihr folgende Fragen: Wie rekrutieren, wie mobilisieren Extremisten ihre Anhänger? Was ist ihre Vision der Zukunft? Mit welchen Mitteln wollen sie diese Vision erreichen? Um Antworten zu finden, schleust sich Julia Ebner ein in zwölf radikale Gruppierungen quer durch das ideologische Spektrum. Sozusagen von der anderen Seite beobachtet sie Planungen terroristischer Anschläge, Desinformationskampagnen, Einschüchterungsaktionen, Wahlmanipulationen. Sie erkennt, Radikalisierung folgt einem klaren Skript: Rekrutierung, Sozialisierung, Kommunikation, Mobilisierung, Angriff.


The latest from the dragon

In the Gatestone Institute, Gordan Chang reports,
On January 1, China's Cryptography Law becomes effective. The legislation follows the December 1 implementation of the Multi-Level Protection Scheme 2.0, issued under the authority of the 2016 Cybersecurity Law.

Together, these measures show Beijing's absolute determination to seize from foreign companies all their communications, data, and other information stored in electronic form in China.

"Once data crosses the Chinese border on a network," writes Steve Dickinson in the China Law Blog, "100 percent of that data will be 100 percent available to the Chinese government and the CCP."

Beijing's complete visibility into the networks of foreign companies will have extremely disadvantageous consequences, Dickinson notes. First, Chinese officials will be permitted, under Chinese law, to share seized information with state enterprises. This means the enterprises will be able to use that information against their foreign competitors.

Second, China's new rules will almost certainly result in foreign companies losing trade secret protection around the world. A trade secret loses its status as such when it is widely disclosed. Once a company allows such a secret to be carried on its Chinese network, the company has to assume Beijing will know it. "Since no company can reasonably assume its trade secrets will remain secret once transmitted into China over a Chinese controlled network, they are at great risk of having their trade secret protections outside China evaporating as well," writes Dickinson.

Third, China's cybersecurity program exposes companies to penalties for violating U.S. tech-export legislation. Businesses have assumed that technology covered by U.S. export prohibitions is not "exported" if it is kept on a Chinese network protected by end-to-end encryption, in other words, not available to Chinese authorities. Because companies will no longer be permitted to encrypt data end-to-end, they will almost certainly be considered as violating U.S. rules for tech stored on a network in China.

Not every analyst is alarmed by China's December 1 measures. James Andrew Lewis, for instance, maintains that Beijing's new rules are a "legitimate effort" to secure networks in China. Moreover, he argues the Chinese do not need the new MLPS 2.0 rules to grab information because they can just steal all they want with their advanced "APT" hacker groups. "Their intent is not to use it for malicious purposes," Lewis argues, referring to Chinese officials.

It is not clear how Lewis, a tech expert at the Washington, D.C.-based Center for Strategic and International Studies, can know the intent of China's officials. Furthermore, portraying that intent as benign seems naive—laughable even—while their country is stealing hundreds of billions of dollars of American intellectual property each year and while Chinese ruler Xi Jinping continues his determined attacks on foreign business. In these circumstances, we have to assume Chinese officials are acting with malign intent.

Lewis also downplays the basic point that China's cyber spies, once they have the encryption keys and access to the China network of a foreign firm, will be in a better position to penetrate the networks of that firm outside China. Therefore, it will only be a matter of time before Beijing steals data and puts companies out of business or ruins them to the point where Chinese entities can swoop in and buy them up cheap. Many allege that China stole data from Canada's Nortel Networks and thereby bankrupted it almost a decade ago. The company was, according to the Financial Post, "hacked to pieces."

Finally, CSIS's Lewis fails to recognize that Beijing's December 1 rules generally legitimize China's regulation and information-custody role--in other words, China's theft.

Senator Josh Hawley is rightly more suspicious of Beijing's intentions. In November, the Missouri Republican introduced a bill, the National Security and Data Protection Act of 2019, prohibiting American companies from storing user data or encryption keys in China. Of course, this bill faces opposition from tech companies doing business in that country.

Yet, there is someone who can, with the stroke of a pen, effectively implement Hawley's bill. President Donald John Trump can use his broad powers under the International Emergency Economic Powers Act of 1977 to prohibit companies from complying with the pernicious new rules or from storing data in China.

The rationale for such a sweeping presidential order is that the American people have an interest in China not taking control of American companies with operations in China--a probable consequence of the application of the December 1 and January 1 measures.

Such an emergency order would effectively force American companies out of China, so this step would be drastic. Yet it is China, with its incredibly ambitious grab of data, that is forcing the issue.

The American people have a vital interest in the protection of American data. Trump should issue such an order immediately.
Read more here.



Shiv Sena President Uddhav Bal Thackeray on Thursday, November 28 took oath as chief minister of Maharashtra ending political stalemate  



Amit Shah says ‘It is Shiv Sena which has insulted the people’s mandate, not BJP’


As  Shiv Sena  President  Uddhav  Thackeray led coaliaition  government in Maharashtra  is set to take oath on November 28, Union

The post Amit Shah says ‘It is Shiv Sena which has insulted the people’s mandate, not BJP’ appeared first on eBangla.


Often cited as a 'gold mine' for alternative work, Alberta's tech sector now faces uncertain future


It wasn't so long ago that Calgary's burgeoning tech sector was being held up as a potential case study in diversification, a lighthouse to chart a course toward in a province rocked from oil-and-gas downturns.




In this episode host Michael Bird is joined by Matt Helling, Softcat's Head of Security Sales, and Adam Louca, Softcat's Chief Technologist for Security, to look at a hot topic in IT security news: ransomware. We provide a brief history - how it began with posting cheques to Panama - to its current state today. We also explore the ways ransomware can catch you by bypassing your regular IT security, when you least expect it, particularly when it plays on emotional vulnerabilities. We also offer some ransomware protection suggestions, ways to ensure safe ransomware removal, and how planning ahead is important for network security.


Further reading

A brief history of ransomware:

Must-know ransomware statistics, 2017: 

Cryptocurrency mining malware now as lucrative as ransomware for hackers:

Mining is the new black:

Get in touch


The Oligarch Game: use coin-tosses to demonstrate "winner take all" and its power to warp perceptions


Internet Archive founder Brewster Kahle created The Game of Oligarchy, which "shows that the 'free market' leads inexorably to one person getting all the money and everyone else going broke. And fast."

The game's rules are simple: everyone is assigned $100 in play money to begin with; they take it in turns to pick a player to have a coin-toss against, with the winner taking 50% of the lesser of pots of the pair (if both have $100, the winner takes $50 from the loser).

Very quickly, the winners of the initial coin tosses wipe out the remaining players, and then each other, producing an outcome with a single winner with all the money. What's more interesting than the ability of small amounts of random chance to produce oligarchic outcomes is the psychological effect of playing the game: over the duration of the very short games, the winners arrive at a "feeling of righteous empowerment based on being successful" and players experience class divisions.

Kahle based his game on an article in Scientific American: "Is Inequality Inevitable? Wealth naturally trickles up in free-market economies, model suggests. Neal Krawetz has implemented the game so it can run automatically in browsers.

What is amazing is that even through each toss is “fair” in that it is a 50-50 chance to win a straight amount of money, the results shows one player wins all the money, and really quickly.

Two nephews and their partners, Mary and I played 4 rounds in about an hour and we discovered social classes (we called the broke ones “organ sellers”), feeling of righteous empowerment based on being successful (even though it was completely random), but also that “free market” ended with all-but-one-of-us in a bad situation really quickly.

Read the rest


Mira mamá, sin camionero


Patrocinador: esta semana de Black Friday, los mejores descuentos están en PCComponentes. Hoy miércoles tienes ofertas en portátiles y en informática en general.

Camiones autónomos / Censuras en TikTok / La polémica del mando de Stadia / Los trucos para mejorar Tinder / Realidad Virtual a tope

 Un camión autónomo recorre EE.UU. de punta a punta. 4.500 kilómetros y tres días después, los sistemas de nivel 4 de autonomía de Plus AI cruzaron Norteamérica. A bordo, un conductor de seguridad y un ingeniero monitorizaron el trayecto.

 Un hito importante aunque no han desvelado algunos detalles clave, de repostaje y peajes principalmente. El camión transportó carga real para un cliente real.

 Los sistemas de moderación de TikTok quedan en entredicho después de que una musulmana estadounidense viese su cuenta bloqueada por criticar los campos de concentración (vídeo) de Xinjiang. TikTok dice que fue por un vídeo con un meme de Bin Laden (vídeo) en otra cuenta una semana antes.

 Los usuarios de WeChat fuera de China también viven en este complejo sistema de dualidad legal.

 Las cámaras de videovigilancia con identificación facial incorporada se extienden por Madrid.

 Google afirma que los mandos de Stadia son de “género neutro” al tener sus botones agrupados de tal forma que manos más pequeñas los alcancen sin problema. Muchos internautas se mofan, pero en realidad esto es un tema importante de accesibilidad.

 No hay trucos en Tinder, según Tinder. Ni rechazar 5 perfiles por cada 1 que nos gusta, ni cambiar la distancia máxima, ni reiniciar la cuenta. La compañía afirma que el único método efectivo es la constancia y hablar con muchas personas.

 YouTube tendrá el banner más grande de Internet. Su app para televisores mostrará una pieza publicitaria gigante que ocupará aproximadamente el 60% de toda la pantalla. — También está en móvil y escritorio, pero más reducida.

 Facebook compra el estudio creador de Beat Saber. Beat Games es propiedad de Oculus ahora, y producirá más títulos de realidad virtual, intentando repetir la popularidad de Beat Saber.

 Valve publicará herramientas de modding con Half-Life Alyx para poder crear mods, mapas, modelos y demás específicos para realidad virtual. Estas herramientas fueron la base de Counter Strike y tantos otros juegos hace 20 años.

 Ejecutivo de Xbox dice que no hay demanda para realidad virtual y que por eso no están centrados en ese campo. Desde Sony le responden que ellos seguirán apostando por la tecnología.

 Granjeros rusos ponen gafas de realidad virtual a sus vacas con escenas de campos verdes para “estar más tranquilas y producir más leche”. Muy escéptico con esto, y dudo mucho que con su visión lateral vean nada.

 Facebook elimina las cuentas de los hackers de NSO. Los empleados y algunos de sus familiares se quedan sin WhatsApp ni Instagram. El grupo israelí de ciberseguridad ha demostrado ser capaz de asaltar iOS, Android, WhatsApp, etc. y vende este acceso a gobiernos, policías, cuerpos de espionaje, etc.

¿Qué termino es mejor que hacker? Muchas veces me decís que no es adecuado usar hacker para hablar de un ciberdelincuente. En este caso son expertos en ciberseguridad que atacan sistemas. ¿Está bien empleado? Dame tu opinión.

 Twitter comenzará a cancelar cuentas inactivas en masa a partir de diciembre. Tras 13 años de operaciones, muchos nombres de usuario inertes empezarán a quedar libres para que puedan volver a ser usados.

 Las cuentas de familiares fallecidos también podrían quedar afectadas, y The Internet Archive quiere ayudar a preservarlas.

 El Honor View 30 es el siguiente móvil de Huawei sin GooglePrácticamente idéntico al Mate 30 pero por unos 500 euros. Sería un superventas en Europa que, de momento, se quedará en China.

 El Kirin 990 de Huawei cuenta con raytracing en tiempo real para aplicarlo en los videojuegos que así lo programen. Los resultados están limitados a 30 fps, pero son muy vistosos (vídeo).

 Spotify tendrá sus propios premios musicales para competir con MTV, AMA, Grammys, etc. con una particularidad: los ganadores serán los artistas más populares en la plataforma. — Se celebrarán el 5 de marzo en Ciudad de México, la capital mundial con más usuarios de Spotify.


 Amazon España ofrece descuentos de hasta el 25% en los libros, posiblemente saltándose la restrictiva legislación.

 NordVPN presenta su propio gestor de contraseñas llamado NordPass para aquellos que busquen alternativa a 1Password.

 Crean una herramienta para encontrar la posición de un tiroteo a partir de los datos de audio en los vídeos grabados con múltiples móviles.

 La teleoperadora Orange lanza en España su propio banco totalmente digital con cuentas corriente tradicionales.

 Zorin OS 15 Lite es una versión especial de Linux con una interfaz del estilo Windows 7 diseñada para funcionar bien en ordenadores de incluso hace 15 años. Zorin OS 15 normal es mucho más versátil.

 Ford y Tesla no medirán la potencia de sus camionetas.

 Xerox inicia una OPA hostil a HP después de que la junta rechazase su oferta de adquisición de 33.000 millones de dólares.

 China se lanza a por el grupo Daimler. El fabricante chino BAIC quiere aumentar su participación del 5% presente, y quizá superar a su compatriota Geely (que tiene casi el 10%).

¿Quieres colaborar con el programa?


Ahora también tenemos un grupo de Telegram para oyentes:


Sigue la publicación en:


5 Black Friday VPN deals you can't miss

A VPN is your first and most important line of defense against hackers who are after everything from your browsing history to your credit card number, and each of the top-rated VPNs below is available for an additional 40% off when you enter the coupon code BFSAVE40 at checkout. 1. KeepSolid VPN Unlimited: Lifetime Subscription MSRP: $500 | Sale Price: $39 | Price w/ code BFSAVE40: $24 Protect your online activity and browse without restrictions with this VPN that offers a wide range of unique protocols. 2. Ivacy VPN: 5-Year Subscription MSRP: $899 | Sale Price: $20 | Price w/ code BFSAVE40: $12Read More »...

iVerify, l’unica app per iPhone e iPad in grado di rivelare se il proprio dispositivo è stato hackerato

Le politiche di Apple non consentono agli sviluppatori la possibilità di creare degli antivirus, ma iVerify gode di permessi speciali per analizzare tutti gli elementi presenti sul proprio device

Homeland Security watchdog investigates whistleblower complaint over lapses in bioterrorism program


A former information security manager alleged he was retaliated against for complaining that sensitive BioWatch data were vulnerable to hackers.


Chief Minister Uddhav Thackeray Visits Lata Mangeshkar at Hospital

Thackeray inquired about her health, an official said. Mangeshkar, 90, was admitted to the Intensive Care Unit of Breach Candy Hospital in south Mumbai after she complained of difficulty in breathing on November 11.

Protecting users from government-backed hacking and disinformation


Google's Threat Analysis Group (TAG) works to counter targeted and government-backed hacking against Google and our users. This is an area we have invested in deeply for over a decade. Our daily work involves detecting and defeating threats, and warning targeted users and customers about the world’s most sophisticated adversaries, spanning the full range of Google products including Gmail, Drive and YouTube.

In the past, we’ve posted on issues like phishing campaigns, vulnerabilities and disinformation. Going forward, we’ll share more technical details and data about the threats we detect and how we counter them to advance the broader digital security discussion.

TAG tracks more than 270 targeted or government-backed groups from more than 50 countries. These groups have many goals including intelligence collection, stealing intellectual property, targeting dissidents and activists, destructive cyber attacks, or spreading coordinated disinformation. We use the intelligence we gather to protect Google infrastructure as well as users targeted with malware or phishing.


We’ve had a long-standing policy to send users warnings if we detect that they are the subject of state-sponsored phishing attempts, and have posted periodically about these before. From July to September 2019, we sent more than 12,000 warnings to users in 149 countries that they were targeted by government-backed attackers. This is consistent (+/-10%) with the number of warnings sent in the same period of 2018 and 2017.

govt backed phishing targets in q3 2019.png

Distribution of government-backed phishing targets in Q3 (Jul-Sep 2019)

Over 90 percent of these users were targeted via “credential phishing emails” similar to the example below. These are usually attempts to obtain the target’s password or other account credentials to hijack their account. We encourage high-risk users—like journalists, human rights activists, and political campaigns—to enroll in our Advanced Protection Program (APP), which utilizes hardware security keys and provides the strongest protections available against phishing and account hijackings. APP is designed specifically for the highest-risk accounts.

In the simple phishing example below, an attacker has sent a phishing email with a security alert lure from “Goolge” suggesting the user secure their account. The user clicks the link, enters their password, and may also get asked for a security code if they have two-factor authentication enabled, allowing the attacker to access their account.

sample gmail lure.png

Sample lure used to phish Gmail users

Threat detection

Last week at CyberwarCon, we presented analysis about previously undisclosed campaigns from a Russia-nexus threat group called “Sandworm” (also known as “Iridium”). It’s a useful example of the type of detailed threat detection work that TAG does. Although much of Sandworm’s activity targeting Ukraine and their attacks against the 2018 Winter Olympics have been covered publicly, some campaigns have not been reported. 

In December 2017, TAG discovered a series of campaigns from Sandworm attempting to deploy Android malware. The first campaign targeted users in South Korea, where Sandworm was modifying legitimate Android applications with malware. They then uploaded these modified apps to the Play Store using their own attacker-controlled developer accounts. During this campaign, Sandworm uploaded eight different apps to the Play Store, each with fewer than 10 total installs. 

malicious apps targeting users in south korea.png

Malicious apps targeting users in South Korea

We also identified an earlier September 2017 Android campaign from Sandworm where they used similar tactics and deployed a fake version of the email app on the Play Store. This application had approximately 1,000 total installs. We worked with our colleagues on the Google Play Protect Team to write detections for this malware family, and eliminate it.

In November 2018, we saw evidence that Sandworm shifted from using attacker-controlled accounts to try and upload malicious apps to compromising legitimate developers. Throughout November, Sandworm targeted software and mobile app developers in Ukraine via spear phishing emails with malicious attachments. In at least one case, they compromised an app developer with several published Play Store apps—one with more than 200,000 installs. 

After compromising the developer, Sandworm built a backdoor in one of the legitimate apps and attempted to publish it on the Play Store. They did this by adding their implant code into the application package, signing the package with the compromised developer’s key, and then uploading it to the Play Store. However, the Google Play Protect team caught the attempt at the time of upload. As a result, no users were infected and we were able to re-secure the developer’s account.


TAG is one part of Google and YouTube’s broader efforts to tackle coordinated influence operations that attempt to game our services. We share relevant threat information on these campaigns with law enforcement and other tech companies. Here are some examples that have been reported recently that TAG worked on:

  • TAG recently took action against Russia-affiliated influence operations targeting several nations in Africa. The operations use inauthentic news outlets to disseminate messages promoting Russian interests in Africa. We have observed the use of local accounts and people to contribute to the operation, a tactic likely intended to make the content appear more genuine. Targeted countries included the Central African Republic, Sudan, Madagascar, and South Africa, and languages used included English, French, and Arabic. Activity on Google services was limited, but we enforced across our products swiftly. We terminated the associated Google accounts and 15 YouTube channels, and we continue to monitor this space. This discovery was consistent with recent observations and actions announced by Facebook. 

  • Consistent with a recent Bellingcat report, TAG identified a campaign targeting the Indonesian provinces Papua and West Papua with messaging in opposition to the Free Papua Movement. Google terminated one advertising account and 28 YouTube channels.


TAG works closely with other technology companies—including platforms and specialized security firms—to share intelligence and best practices. We also share threat information with law enforcement. And of course there are multiple teams at Google at work on these issues with whom we coordinate. 

Going forward, our goal is to give more updates on the attacks that TAG detects and stops. Our hope is that shining more light on these actors will be helpful to the security community, deter future attacks, and lead to better awareness and protections among high-risk targets.


The Oligarch Game: use coin-tosses to demonstrate "winner take all" and its power to warp perceptions


Internet Archive founder Brewster Kahle created The Game of Oligarchy, which "shows that the 'free market' leads inexorably to one person getting all the money and everyone else going broke. And fast."

The game's rules are simple: everyone is assigned $100 in play money to begin with; they take it in turns to pick a player to have a coin-toss against, with the winner taking 50% of the lesser of pots of the pair (if both have $100, the winner takes $50 from the loser).

Very quickly, the winners of the initial coin tosses wipe out the remaining players, and then each other, producing an outcome with a single winner with all the money. What's more interesting than the ability of small amounts of random chance to produce oligarchic outcomes is the psychological effect of playing the game: over the duration of the very short games, the winners arrive at a "feeling of righteous empowerment based on being successful" and players experience class divisions.

Kahle based his game on an article in Scientific American: "Is Inequality Inevitable? Wealth naturally trickles up in free-market economies, model suggests. Neal Krawetz has implemented the game so it can run automatically in browsers.

What is amazing is that even through each toss is “fair” in that it is a 50-50 chance to win a straight amount of money, the results shows one player wins all the money, and really quickly.

Two nephews and their partners, Mary and I played 4 rounds in about an hour and we discovered social classes (we called the broke ones “organ sellers”), feeling of righteous empowerment based on being successful (even though it was completely random), but also that “free market” ended with all-but-one-of-us in a bad situation really quickly.

Read the rest


November 28th, 2019

Happy Thanksgiving.​Please give to Feeding America: 35 East Whacker Drive, Suite 2000/ Chicago, Illinois, 60601/ 800-771-2303​ [...]

Nepp fordert erneut sektorales Bettelverbot

Hacker muss handeln anstatt nur davon zu reden

FPÖ-Belakowitsch zu SPÖ-Hacker: „Rot-Grün hat mit Toleranzpolitik organisierte Bettelbanden erst nach Wien gelockt“

„Ein von der FPÖ gefordertes sektorales Bettelverbot für Wien wurde von Rot und Grün aber immer abgelehnt“

 Maharashtra Govt. Formation : उद्धव की शपथ की तैयारी शुरू, केजरीवाल-ममता को भेजा जाएगा न्योता


महाराष्ट्र में शिवसेना, एनसीपी और कांग्रेस के सरकार बनाने का रास्ता साफ़ होते ही  शिवसेना ने उद्धव ठाकरे के शपथ ग्रहण के लिए तैयारियां  शुरू कर दी है. सूत्रों की मानें तो शपथ ग्रहण में राज ठाकरे को भी न्योता भेजा जा रहा है. इसके अलावा ममता बनर्जी, अरविंद केजरीवाल, अशोक गहलोत, अखिलेश यादव समेत […]

The post  Maharashtra Govt. Formation : उद्धव की शपथ की तैयारी शुरू, केजरीवाल-ममता को भेजा जाएगा न्योता appeared first on Hindi News, हिंदी समाचार, Samachar, Breaking News, Latest Khabar - Chauthi Duniya.


उद्धव ठाकरे नहीं बने CM तो समर्थक ने की आत्महत्या की कोशिश, काट लिया अपना हाथ


महाराष्ट्र में शिवसेना प्रमुख उद्धव ठाकरे के मुख्यमंत्री नहीं बनने से दुखी एक शिवसेना समर्थक ने वाशिम जिले में कथित तौर पर आत्महत्या करने की कोशिश की। पुलिस ने रविवार (24 नवंबर) को यह जानकारी दी। इसी दौरान महाराष्ट्र सरकार बनाने को लेकर रसाकस्सी अभी जारी है। हालांकि देवेंद्र फडणवीस ने अजित पवार के साथ […]

The post उद्धव ठाकरे नहीं बने CM तो समर्थक ने की आत्महत्या की कोशिश, काट लिया अपना हाथ appeared first on Hindi News, हिंदी समाचार, Samachar, Breaking News, Latest Khabar - Chauthi Duniya.


NCP विधायकों से उद्धव का वादा, बोले- लंबा चलेगा गठबंधन, नवाब मलिक ने किया 50 विधायकों के साथ होने का दावा


महाराष्ट्र में तेजी से बदल रहे राजनीतिक घटनाक्रम के बीच शिवसेना, NCP, और कांग्रेस को अपने विधायकों के पाला बदलने का डर सताने लगा है.यही वजह है कि कांग्रेस ने अपने विधायकों को जुहू इलाके के जे डब्ल्यू मैरियट, NCP ने पवई के द रेनेसां और  शिवसेना के विधायकों को मुंबई अंतरराष्ट्रीय हवाई अड्डे के […]

The post NCP विधायकों से उद्धव का वादा, बोले- लंबा चलेगा गठबंधन, नवाब मलिक ने किया 50 विधायकों के साथ होने का दावा appeared first on Hindi News, हिंदी समाचार, Samachar, Breaking News, Latest Khabar - Chauthi Duniya.


Secure your mobile devices this holiday season

Secure your mobile devices this holiday season sraikow Tue, 11/26/2019 - 10:23
Secure your mobile devices this holiday season

The holidays can be stressful, and cybersecurity may not always be top of mind. However, you should be on the watch for cyber threats and vulnerabilities at airports, coffee shops, hotels, shopping malls and other public spots.

For example, public USB charging stations are a convenient way to charge devices. But think twice before plugging into these stations. There’s a USB charging scam called “juice jacking,” in which hackers use public USB ports to infect smartphones with dangerous malware or steal personal data.

While juice jacking attacks are relatively uncommon, avoid using public kiosks to charge your phone. Instead, plug your device into an AC power outlet or use a portable battery pack. If you do use a public kiosk, leverage a USB data blocker to achieve USB security; a data blocker allows charging, yet blocks any data transfer capability or USB malware from infecting your device.

Public WiFi networks are also convenient, though they are often not secure. One of the most serious types of threats occurs when an attacker intercepts a mobile device’s network traffic through a man-in-the-middle (MITM) attack or rogue access point. This allows an attacker to read and capture credentials, emails, calendars, contacts and other sensitive data as a preliminary step in a more advanced attack on you or your employer.

To protect your data in motion and increase public WiFi security, use a virtual private network (VPN) to encrypt your data when connecting to a public WiFi network. And, make sure to remove the public WiFi network from your device by deleting it when you are done. Otherwise, you can still be an easy target for a hacker.

To further mitigate these risks, organizations should deploy MobileIron Unified Endpoint Management (UEM) with MobileIron Threat Defense (MTD). MTD can detect and remediate mobile threats, including device, network, app and phishing attacks, even when the device is offline. MTD offers continuous protection against mobile device threats, including malware, MITM attacks and unencrypted networks, that exploit user behavior and security gaps.


Hacker-Pschorr #Bierbartchallenge

(Mynewsdesk) Buschig oder dünn, gezwirbelt oder glatt – im November sind alle Formen der Oberlippenbärte erlaubt, natürlich auch Bierbärte. Denn die Movember Foundation hat ...

Now Games 5 (Compilation)

Now Games 5   (Compilation)


 Quick description

Six-game compilation containing the following games!:-








Hacker II (2) - The Doomsday Papers

Hacker II (2) - The Doomsday Papers
CONDITION:- GREAT, but missing instructions?


 Quick description

Activision's / Steve Cartright's sequel to their superb, genre-defining futuristic hacking game!


Hackers Are Already Targeting Disney Plus Accounts

In case you weren't already aware, Disney recently launched a new video streaming service called Disney+ which has been driving Netflix and other established streaming services crazy with fear and apprehension since ...

Hackers Are Imitating Government Agencies To Spread Malware

Researchers at Proofpoint have found evidence of a new threat actor who has been sending out convincing looking emails. They are claiming to come from several government agencies. These include the Italian ...

Another WhatsApp Vulnerability Has Been Found

WhatsApp is the most popular messaging platform in the world. Unfortunately, that means it's got a giant bullseye on it where hackers are concerned. In recent months, the company has faced no ...

Anzeige: TV-Tipp von TV Spielfilm: “Fast & Furious 8”

- Anzeige - TV-Tipp von TV Spielfilm: Der rehabilitierte PS-Ganove Dom (Vin Diesel) will mit Letty (Michelle Rodriguez) auf Kuba flittern. Die böse Hackerin Cipher (Charlize Theron) aber zwingt ihn, für sie zu arbeiten… Kesse Sprüche und Turboaction. "Fast & Furious 8", RTL, 20.15 Uhr Unser Tipp: Ihr persönliches TV-Programm auf


TV-Tipp von TV Spielfilm: Der rehabilitierte PS-Ganove Dom (Vin Diesel) will mit Letty (Michelle Rodriguez) auf Kuba flittern. Die böse Hackerin Cipher (Charlize Theron) aber zwingt ihn, für sie zu arbeiten… Kesse Sprüche und Turboaction.
“Fast & Furious 8”, RTL, 20.15 Uhr
Unser Tipp: Ihr persönliches TV-Programm auf


Comment on Lesson 2: The Bitter Taste of the Drug (Toa thuốc đắng) by Tantra Pramitdhita (Josh Hacker)

Holy Guru, after reading this discourse I feel like a fool for my comment on the previous article. Thank you for shedding some light onto the subject of 14 grievous failures of a buddhist practitioner. I rejoice in your compassion. Mat Hue Phap, I rejoice in your compassion and dedication as well. Thank you dharma brother for your translation. Om mani padme hum May Guru and his consort have a long life for the sake of all sentient beings May all sentient beings find freedom from suffering

Updated: Nile Breweries website hacked- Hacker threatens to leak secret beer formula

Nile Breweries website hacked

A hacker has taken over Nile Breweries Limited’s website and they are demanding the company to release a secret and more importantly a classified formula for one their beers within 24 hours. The hack happened between 10-11 am today morning. The black hacker made these requests in a video message that they posted on […]

The post Updated: Nile Breweries website hacked- Hacker threatens to leak secret beer formula appeared first on Techjaja.


“Jeffrey Epstein, Blackmail and a Lucrative ‘Hot List’”

“A shadowy hacker claimed to have the financier’s sex tapes. Two top lawyers wondered: What would the men in those videos pay to keep them secret?” SPOILER: There were no tapes forthcoming, but the story would make a helluva movie.

Fadnavis made CM second time to 'protect' Rs 40,000 crore central funds, claims Ananth Kumar Hegde - Times of India

  1. Fadnavis made CM second time to 'protect' Rs 40,000 crore central funds, claims Ananth Kumar Hegde  Times of India
  2. The big news: Fast-track court will try vet murder case, says Telangana CM, and 9 other top stories
  3. Never said 'I will return': Uddhav Thackeray taunts Devendra Fadnavis  Times of India
  4. Uddhav Thackeray has an uphill task. A look at his 4 big challenges | Opinion  Hindustan Times
  5. Devendra Fadnavis has an opportunity in opposition, but needs better strategy | Opinion  Hindustan Times
  6. View full coverage on Google News


It shouldnt be surprising if majority mark reaches 185 in future: Shiv Sena

As Uddhav Thackeray-led Maha Vikas Aghadi government won the trust vote with 169 votes in its favour, Shiv Sena on Monday said that it should not be surprising if the majority mark reaches 185 in future.

[WP] How to Add SSL and HTTPS in WordPress?

SSL plays an important role in website, because in the last year Google announced that they will be using HTTPS and SSL as a ranking signal in their search results. This means that using HTTPS and SSL will help improve your site’s SEO. Using an SSL certificate for your WordPress site means that your data, as well as your users’ data, remains safe from prying eyes. Since WordPress is a particularly large target for hackers due to its popularity and transparency, it’s important to take all the appropriate steps toward securing your site. [read more...]

Deux femmes à 15$

ArtelW pré-vend deux figurines sci-fi en 28mm. Vous trouverez une femme possédée par un démon et une pirate-commerçante.

ArtelW pre-sells two sci-fi figures in 28mm. You will find a woman possessed by a demon and a hacker.


Le marketplace Magento d’Adobe victime d’une intrusion

Un hacker est parvenu à exploiter une faille de sécurité dans la place de marché qui permet d'acheter, de vendre et de télécharger de thèmes et des plugins pour les boutiques en ligne Magento.

6 książek, które planuję przeczytać w grudniu 2019 roku - Podcast Codzienny - Odcinek 159


Oto lista:

1. Ego is the enemy

2. Thank you economy

3. Unscripted

4. Odchodząc od nie

5. Ultralearning

6. Biohackers Handbook 


What You Have to Know About Guarding Your self From Hackers

The strategy hackers use to attack your equipment or system are fairly simple. A hacker tests for susceptible programs by using a demon dialer (which will redial lots repeatedly till an association is made) or perhaps a wardialer (an application that works on the switch to switch tens and thousands of random telephone numbers to find another modem connected to a computer).Still another method applied to target computers with consistent contacts, such as DSL or contacts, uses a scanner program th [...]

Why Were the Russians So Set Against This Hacker Being Extradited?

The Russian government has for the past four years been fighting to keep 29-year-old alleged cybercriminal Alexei Burkov from being extradited by Israel to the United States. When Israeli authorities turned down requests to send him back to Russia -- supposedly to face separate hacking charges there -- the Russians then imprisoned an Israeli woman for seven years on trumped-up drug charges in a bid to trade prisoners. That effort failed as well, and Burkov had his first appearance in a U.S. court last week. What follows are some clues that might explain why the Russians are so eager to reclaim this young man.

Post Nord#VPN Data Exposure: Using #Domain Threat Intelligence to Prevent MitM Attacks


The extent of the intrusion is detailed in this dumped Pastebin log. As shown, the hacker obtained full remote administrative access to NordVPN's node containers. Here are the implications of the ...

Welcome! The dangers of Android phones to various scams involving hiring and Black Friday and some tips on staying safe and more on Tech Talk With Craig Peterson today on WGAN



Today there is a ton of stuff going on in the world of Technology and we are going to hit a number of topics from the dangers of Android phones to various scams involving hiring and Black Friday and some tips on staying safe -- so stay tuned.

For more tech tips, news, and updates visit -


Related Articles:

Reduce Vulnerabilities by Ditching Android

Tackling Ransomware on Windows

Cellular Throttling and Why it cost AT&T a Chunk of Change

Big Data, Data Brokers and Your Information

The hanging of an MSP “Shingle” and Your Business Security

Hiring and Issues with Scam Online Applications

Another “Pay--ment” System Introduced

Hand in Hand On Black Friday --- Shopping and Privacy

Imposter Retailers Outnumber Legitimate Ones


Automated Machine-Generated Transcript:

Craig Peterson
Hey, hello, everybody. Craig Peterson here on the air at WGAN and all over the world on podcasts. You can listen to me by just going to Craig slash iTunes that'll bring up the 800-pound gorilla podcast site.

You can also go to Craig Peterson dot com slash iTunes in and listen to my podcasts there, of course, and you can listen on right here to this station also on tune in radio. Additionally, listen to me when I'm on the air, three mornings a week now different stations different coverage. All of those end up on my podcast feed. I appreciate everybody who is going there and giving me a five-star rating. I know there are also a lot of people that are tuning in for the first time. Welcome. Welcome to all of you guys and gals. It is a wonderful, wonderful experience for me because we get new people, and I get to help teach you guys, help you to be able to understand the latest in technology. That's what I talk about every week. I have been in the technology business for many, many decades now. And I am still enjoying it. But you know, it's time for me to start giving back and start trying to help everybody understand what's going on. We spend a lot of time discussing security, what you should do for your home, what you should be doing for your Small Office/Home Office. Many of us, like me, work out of their houses now. That means you have different problems. When we catch China, Russia, and North Korea and then all of the criminal organizations all over the world. We've got all of those people trying to attack us. It gets very, very difficult to keep our data set. safe. And of course also, with all of the new technology, how do you use it? How do you make it work? Just this morning, we were on with a client, and they were meeting this is common, okay. But they were misusing the system that they have in place. They have a system that's in place to allow them to do diagrams, engineering diagrams. And unfortunately, the people they trusted to put it together to configure it, they did not do it anywhere near properly, nothing is SPECT, right, etc. And I know you'd think an engineering firm would understand that the specifications are there for a reason. They're there to be followed, right. And so the system has just been kind of, you know, hack together trying to make this thing work. And there ended up being an air coming up on their screen, and then the Good news, I guess for them is they had us be able to help them because I don't think there's anybody else out there. That is, you know, easy enough to find someone that could help them with this problem because the air looked like it was a licensing problem. The problem was that the database that they were using had lock records on it. Here's how they were using it. They have a database and applications that are running on this underpowered server. They were being accessed remotely by someone using a VPN on a laptop. And you know it all sounds pretty reasonable. The way they were doing it was running the application over on the laptop instead of on the server. So what they should have been doing is using either a virtual machine that that person could Connect remotely or use a terminal server that Microsoft provides. What happens is now he's running the app, the app is accessing the database via the VPN. So far, so good, right? Make sense? This virtual private network is letting his laptop think it's on the corporate network. This company has dozen-plus employees and a server with a database on it. The database is handling all the queries it's going through. Now, when you're talking about databases, I'm trying not to get too technical here, everybody. When you're talking about a database for a program, the database, hopefully, has what is called business rules in it. For instance, if you add a customer, you're not just putting one record in the database, you have a record that gives the basic information about the customer. It includes the name, maybe the address, and then you've got another record that's got the customer contact, who it is. Then there are also records about what they would buy for from us with totals, encounters, and things. It's called D normalizing a database. So all of these different records are created in different tables, maybe even different databases, but it's almost always one database. And so in order to keep all this information properly synchronized, because you don't want to have a record for the company, a business a client, and then have the, the your programs trying to access now how do I get ahold of this client and so it tries to go to the phone number database, so I'm just oversimplifying this slightly. Still, there's no record for the phone number database, you don't want that to happen. So what you do is you use a lock, and the lock helped to enforce these business rules to make sure Hey if I'm creating a new customer, I want to make sure I have their name, their address, the contact that we have. And so a contact record, and the type of company, maybe an inventory item, just in time stuff, whatever it might be, all of that needs to be there in the database. What happens is, there's what's called an atomic transaction. The database program, the software that you're running, identifies the customer contact and his records and returns the records for the company itself, the records for the inventory, and the shipping information records. And then it says, commit this all to the database. At that point, the database already has all of these records and reports it is ready to commit. Everything is there. What was happening with this client is they were on a VPN. And they were running the software over on the laptop. The software on the laptop was saying, Okay, so here's, here's the client we're dealing with, and we've got some new information for them. So let's insert this new information in the database. And so the database does a lock to hold. So we can get a customer number to generate all of this stuff in case somebody else is trying to do it. And then, the VPN connection goes away, or the laptop crashes. Something happens, right? Now, the application could crash crash, and if its on the server, the database could crash on the server, all of that stuff could happen. So when you get right down into it, there are tools to try and recover. But in this case, records were locked. They weren't lost. They were locked. So now when they went back in they were getting in an error message, they really couldn't understand what's going on here. Why? Why am I getting this error? We had to delve into it and contact the app developers and look at the databases, and then we had to remove the locks manually. Now, that's just great. We remove the locks. What that probably means they have a corrupted database, one that was corrupted silently, in a way that no one understands. And in some cases, if it's a real expensive application, it probably has stuff that does continuity checks and makes sure there's congruence between all the records. But that's not the case here. You know what it reminds me I saw the same thing at a doctor's office. They've been using the same software for many, many years. And the software uses a very, very basic database and This database, and I don't even know if I would call it a database, right? But I think of the old retrieve stuff if you're an old-timer like me, and what we used to do with those and which is great because it the beat trivalent, you put data out into files and then allows you to access it very, very quickly. But by today's standards, you would not consider that a database. So over the years, when they had a problem, they would just shut off the computer and then turn it back on, reboot, right. So now we're helping them win factory finish migration of all of their data from this very old it using 30-year-old technology, this ancient system for the doctors practice to a very modern one on Max, and it's cool the stuff they can do. You know, they can immediately while you're sitting there with the doctor, the doctor can check right away, what drugs you're on from other providers because the pharmacy that you use keeps all that information, it's all tied right in real-time. And the doctor can check for possible conflicts of some of these medications and immediately issue the prescription. So it's before you leave your consultation with the doctor. It's all done. It's just amazing for them, and they're having a hard time with some of these concepts. And I get that right. If you're using 30 old 30-year-old design software, which so many people are you know, some of these companies like Kronos, they have some new stuff, but they're selling some stuff that's just decades old. It's just been, you know, modified, modified. And so the basic concepts behind the software aren't there. So they had been turning off their computers. Off and on resetting control, alt, delete, right, all of those things that we've all done before. And their database was as corrupt as can be. And manual processes instead of automated processes to try and get their database up to snuff. So anyways, an engineering firm, we got it taken care of for them. Still, their databases almost certainly got corruptions in it, because they're not doing it as backed by the manufacturer. Right. And you'd think as I said, they know better. And we've got the doctor's office all up and running too. So that's good. So anyway, if you ever want to know a little bit about databases, you just learned it. When we come back. Hey, we're going to be talking about shopping Black Friday, Cyber Monday privacy. That's coming up today, and we're going to talk about Android again, and a whole lot more. Of course, you're listening to Craig Peterson online, Craig Peterson, calm and I'm WGAN

Hello, everybody, Craig heater song here hopefully you're enjoying today's show so far. Let's give a little bit of a rundown of what's coming up. We've got our Black Friday, Cyber Monday shopping information coming right up here shopping and privacy on today's show the number of imposture retailers. It is crucial, and I'm going to help you understand these sites because they are the imposter websites is outnumbering the legitimate websites for retailers and we're getting caught all of the time. We're going to talk a little bit about the IM and MSP shingle to your business security. I saw this again, and some of these ms peas MSS peas are they break from shops is what we call them. In other words, you call them when you have a problem. They're not proactive. But it turns out now not only they're not good at security, but they are a massive target for hackers. We'll talk about how that's a problem for your business and some things you can do about that. Hiring issues. Right now. If you're looking for a job that some of this scam online application stuff with this going on will tell you more targeting and tackling here some ransomware on Windows, which is way way up. Big Data brokers and your information. We talked a little bit last week about what Google's doing with Project Nightingale, which is scary enough, but we're going to get into that.

Facebook is introducing a new payment system. You might remember they were trying to launch this whole cryptocurrency, and it fell flat. Well, we'll talk a little bit about this Calibre wallet that's coming to our way, and cellular throttling and why it cost AT&T a chunk of change. If you use AT&T, you may be getting a check. You will have to fill out some forms. Then I discuss how you can reduce vulnerabilities by ditching Android. It is amazing. There's a study that just came out. And this is an article from Wired magazine that I have up on my website at Craig

Android is not Android is not Android. Every manufacturer has a different version of Android. Now, some of the core modules are the same, but they have to add their device drivers. They typically add bloatware is what we call it to the phones, and of course bloatware, you also see in Windows computers a lot. And those are those ads that come up that lets you get all of these premium features. All you have to do is pay us extra. They're out there doing all of this. And so my warning has always been, if you are considering buying an Android phone, remember that it might only be good for six months. I'm not talking about the hardware; some of the equipment is great. When I say some of the phones only be suitable for six months. It's because the security patches that are going to be needed for your phone will no longer be available. And my accountant came by last week and he just bought a new Android phone I told him don't buy another Android get an apple get an iPhone. If you can't afford a new iPhone by you don't even have to buy us To buy a model or two older iPhone, you will be much much happier and you will be much, much safer. But he got another Android phone. Why did he ask me about or why did he bring up because he knows I'm not an Android fan, right? So. So when we're sitting down, he's, he's not going to be sitting there pulling his phone today, Greg, that's great. No android phone I have because he knows I'm going to be all right. And in this case, it was I bought this phone now a couple of months ago, and I can't get updates for it anymore. Two months, two months, he had that phone, and he couldn't get updates for his Android phone. So it's not even six months in some cases is a lot less than other cases it's longer. If you're going to make the mistake of buying an Android phone, make sure it is the number one model in volume in sales. That manufacturer right now is Samsung. And the goal with that, but here's this story. And I've got some stuff I wrote up about it.

Every android phone is unique. Because the manufacturers can freely create applications, they've got to make changes to the device drivers, the interfaces, the carriers, which then upload their information into the cellular tables that are in it. They might have a different transmitter than was planned for they go for the cheapest, cheapest. And so they've got to rewrite that low part of the operating system completely. You're getting that right now. Well, here's what we have just found. Every Android has pre-installed as of today. Now, remember, I'm saying that some of these phones you can't get security updates after six months and only two months in some cases. Maybe it's a year. But there's a study out right now, that is saying that on average when you buy an Android phone, there are 146 vulnerabilities pre-installed on your phone. So these are bugs in the software that Google has already fixed.
Some of these were zero-day attacks. Many of them weren't. But on average, your new Android phone, according to this study, already has 146 security vulnerabilities before you even open the box. Right. Now, does that make sense to you? Now, if you buy an iPhone, you're going to find that the first thing that you're gonna want to do is you set it up, you put in, your Apple account or you create one they're absolutely free. Apple does not harass you about any of this stuff. They give you iCloud backup automatically. But you're going to set up your iPhone. One of the very first things that it does is it updates itself.

Apple, just with the most recent release of its operating system going to look this up right now. Age of an iPhone six, they just recently stopped supporting their newest operating system that doesn't mean patches for security problems. But their newest operating system does not support the straight-six. It supports the six s but not the straight-six. So I'm looking right now in Wikipedia, and it was released there we go in on 24 14. So right now, while we're talking, it is more than five years old. It's been over five years since it was released. So Apple provided full support soup to nuts support for the software on iPhone sixes for more than five years. And that's very typical for Apple and the iPhones. So if you buy, you can still purchase the six ass I would not personally because it's not going to be fully supported. The next time we come up with another phone, so you know next year or maybe early in 2020. If you are considering buying an iPhone and you want to save some money, you can still buy a seven, or you can always buy an iPhone eight. You can even buy the 10. My mom, who is well into her 80s now, wanted to replace her phone. I think she had an iPhone four and she just last week returned it. I said they go out and buy because she was confused. I said, go out and buy the iPhone XR. That iPhone 10 XR, which she did. It is a great deal. It is a fantastic phone. And it's going to last year another five years with full software support from Apple. So keep that in mind. You can open that brand new box with your Android phone with 146 security bugs in it before you even open it up, and it's not going to update itself to the latest patches. None of that's going to happen. Depending on the phone in the manufacturer. But get an iPhone right forget all of this stuff about Android. I do not sell iPhones I to make money off of iPhones. I do not work for Apple. Okay. My company, however, is a certified Apple authorized Support Center

Hello, everybody, Craig Peterson, here on WGAN live online, you can find me at Craig I often have some of these free pop up pieces of training and I've been doing Facebook Lives lately and just trying to get the word out, helping people understand what is happening in technology today. And we're on show number 1037. Now, the way I number shows is that's actually week number 1037. We should have done some big deal when we hit show 1000 but I, I didn't I probably should have But anyhow, so that's 1037 weeks of being on the air every week, which is pretty amazing when you get down to it and it's thanks for You guys, I so appreciate what you guys do by listening and supporting the stations I'm on and of course listening to the podcast and and the easiest way, by the way if you are an avid listener, if you will, is to go to Craig Peterson comm slash iTunes. And if you wouldn't mind, give me a five-star review and, and let me know what you think of the show right there. And I do read those and a quick shout out to people on the air frequently. I do.

Now, you know, I mentioned a little bit earlier than I do a lot of computer security. And it's a huge deal, and it's very, very difficult. I also mentioned these break-fix shops. Those are businesses that do computer support, but basically, you call them when there's a problem as opposed to them being proactive and taking care of issues for you. Which is what my company and I do alright, so there you go. That's what I do. Well, let's get into this whole MSP thing. I am an MSP RIR, and MSP managed security services provider. And I want to roll the clock back because I have something here that I remember pretty well. And then I want to talk about it because I have a cup of coffee in front of me. And it's sitting on a napkin. And so I want to tell you a little bit of background. And this has to do with experience, really, and knowledge if you're old enough to remember the whole y2k thing. And the biggest problem with y2k was, hey, and we've been writing software for years that rely on next year, being One year more than this year. Back then, we had to be very careful with all of our data and how much storage we were using. Instead of storing the year as we do now as 1975, we would save the year as just 75. Hey, it's not going to matter for another, what, 35 years. Y2k is going to cause the world to come to an end because nothing's going to work. That is, it had only been 50 years that this code. And we all know that there was a whole industry that developed to help companies make sure they are y2k compliant. Some people wrote software that reviewed other software to make sure that these mistakes weren't in it. And then y2k came and went with very, very few incidents.

Now, the reason people were worried about was legitimate. If you had an older GPS this year, say one that was more than five years old, maybe ten years old, you might have noticed that it stopped working? Did you see that? And the reason these things stopped working was the same problem everybody was worried about and y2k while almost the same problem. And that is counters rolled over from the GPS satellites. If you didn't have a big enough counter on your GPS receiver, you were in big trouble. The satellites themselves were fine. It was your little GPS receiver that's built into your navigation system, right.

Huge deal. You had to buy a new one. Well, it's a much bigger deal for the bank, but thinking what else was happening around the year 2000. I started building commercial internet properties as soon as it became legal because I'd been on the internet since the early 1980s. I've been designing and helping to design and implement internet solutions since the early 1980s. And I've been doing network work, and computer network works professionally since 1975. I've been doing security work, managed security for my clients since the early 1990s. There was a lot of work done out there. I go back now and think about the late 1990s. My coffee mug is sitting here on a napkin. And you know, you go to a coffee shop, the napkins are three by three inches square, give or take. And if you are getting a muffin, you might get a napkin that you could unroll, and that's maybe what eight and a half by 11. Give or take, right? It's pretty big. Well, in the mid to late '90s, people were going to specific coffee shops. I remember this so well out in Silicon Valley in California. They went to these p coffee shops because it was where angels hung out. Angels are people who if you don't know, invest money in early-stage startups, in other words, when a company is first going, and so if I were today to talk to an angel and say, Hey, I need some money, the angel would say, Okay, well, let's look at the business plan. We go through all the financials, I better have some customers already some sort of a proof of concept, minimum viable product that I can show them and say, yeah, look at this is looking really good. So I need 1,000,005 million to take this to the next level. Well, back then, in the late 90s. They would sit and have coffee with one of these angel investors. And they'd say, hey, I've got an idea for a business and they pull out a napkin. And they take a, pencil and they would sketch on the back of that napkin. What their idea why it's because it's going to be great. And the investors just based on that napkin, no product, no team, nothing but an idea. Based on that napkin, the investors were giving out five and $10 million checks to these people who, in my mind, were, were, fraudsters. You know, they convince themselves that they had the best idea in the world, and they were going to become the next billionaire. Maybe the first billionaire under 20 years old. A lot of these investors, Of course, we're a little older, and they didn't know how to deal with the internet. They didn't know much about it and very immature back in the late 90s. Although I'd already been on it for 30 years, well, you know, around it for 30 years and on for more than 20 then, so they were giving them crazy money just based on a napkin. So what does everybody do? Well, where's the money while the money is on the internet, and it's out in the Bay Area of San Francisco, San Jose. So I'm going to go out there. And some of these people, literally, I knew people that did this, they hopped on an airplane. They flew out to San Jose, with the intent of going to one of these coffee shops or about a half a dozen of them, that were known to be frequented by angel investors and venture capitalists. And it's kind of like somebody flying to LA Working Yeah, I'm an actor, and they're working in a coffee shop. And they're Bariza hoping to get spotted by that director to get their big break. A big problem. And because everybody saw that the internet was the place to be. Everybody hung up a shingle about the internet. So stick around. We're going to talk more about this. We're going to tie this into exactly what's happening today, to you to your business, when it comes to security. And so many of these firms that are out there right now trying to sell you stuff. So stick around. We'll be right back.

You're listening to Craig Peterson, right here on WGAN and online pretty much everywhere and at Craig stick around. We'll be right back.

Hello, everybody, welcome back, Craig beater song here. Of course, we're on WGA. And we are online, Craig Peterson calm. And good news. I'm on pretty much every podcasting platform out there. And I've had more than 20 million podcast downloads since I started podcasting 15 years. The numbers are picking up. We just had got another 100,000 downloads recently. I'm pretty jazzed with that. It is all because of you guys. The more you are of you who subscribe to my podcast, the more it gets noticed, and the more people hear about it, and of course, then what that means is, we're able to help more people, and that's why I'm here. It is a labor of love. Alright, so let's get into the rest of the story from what I was talking about earlier, which is if you missed it, I talked a little bit about the history of the internet and internet investment. These companies that were spun up from a business plan that was nothing more than a rough sketch on the back of a napkin at a coffee shop. Okay. It's a big deal here. But we'll let's think about some of the biggest failures on the internet. And you've heard of some of these. You've probably heard of like let me just run through a few here. Ship raise 62 million dollars and failed. That's SHYPBP raised 149 million before they got wiped out. Juicer, all Yeah, that's a reasonably recent one 118.5 million pepper tap 51 million Sprague 56 million yak yak 73 million. And you can go online, look for some of these things. I found an article that had 323, startup failures, and post-mortems for all of them going back, just kind of way back. But, you know, back to 2014, which isn't the start of the internet, right. That's not the reach. The time we're talking. Okay. Timo meter, and this is a great one, by the way. Multiply $30 times one client times 24 months. Wow, we'll be rich. Okay. They got funding, right. Why didn't we get funding? Why didn't you get funding right with your great idea? So everybody started throwing their hat into the ring. They were going to these coffee shops out in Silicon Valley pitching and hopefully come with a good idea.

Of course, the investors wanted to have a billion-dollar company. Hey, it's not so bad. I put, you know, 5 -10 million in and I'm able to take a billion dollars out with a big company that's got a 5 billion valuation right. Wow, we're all going to be rich. And of course, that is the extremely rare case. So let's fast forward to today. And talk a little bit about what's happening right now. I've got an article up on my website that we put together called "I am an MSP shingle and your business security." Think of that word shingle. We talked about all of these. I don't know what to call these people, because they were out trying to get money for their ideas and were quite convincing. They weren't thieves, necessarily, although some of them probably were. But they didn't know any better. They didn't know what they should have known. Today, of course, the internet's much more mature. It's still not fully mature. It's changing every day, the way things are sold and marketed and used, and everything on the internet is just constant change. But right now, what are we talked about on this show before when it comes to open jobs, we know that the economy pretty much has full employment. But for the past three years, I think ever started ever since I started running the webinars for the FBI info guard program, ever since I started running those. There's indeed been somewhere between one and a half and 3 million open cybersecurity jobs. So Let's get right down to the economics of all of this. And I, I was following some stuff, and I've been developing material carefully in the industry because this is kind of the industry that I'm in. And I found out something that I thought was just kind of a DA moment, right? That's when you hear something, and it's I should have thought of that. I don't know why I didn't think of that. Right. We all have those. And so I had this moment, which is, if you have been a break-fix shop of what you've been doing is you take a call from somebody, and you sell them a computer, or you g a call from somebody, and you go out, and you spend two hours with them and you charge them three or 400 bucks for that service call. First of all, I don't think that serves the customer very well because the customer is going to be worried about calling you and the poor person that's having the problem doesn't want the boss to get upset because they called you right? So that's not helping the business very much. And on the other side, if you're trying to sell hardware nowadays, you know, we'll sell someone at $3,000 $4,000. workstation for one of their employees to use not even a high end one. And our margin is like 50 bucks on it. Nowadays. It obviously depends on the manufacturer, but there's like no margin in that business anymore. So if you were faced with that, if you owned a company, that all they really did was they sold some computer hardware when there was a refresh. And you went out and you did some repairs and some telephone support. And what would you be thinking? Why are retailers closing on you're basically a retailer? That's the business you're in. You're competing against Amazon, you're competing against Dell online, you're competing against all these guys. So what I've noticed happening, and I've noticed it because my company is what's called a master managed security services provider. We're a master security services provider because we work with these smaller companies that don't have the security expertise, and they know it.

Now there, there's a lot of people that don't know it. We just talked about all of these failures. Back in the boom days of the internet, hundreds of millions of dollars, billions just went down the drain. So some of these people think they know enough, but they don't. So they'll come to somebody like us, who is a master managed security services provider, and we'll be the people behind the scenes designing the networks and security infrastructure. They can meet the DFARS requirements or ITAR or HIPAA or PCI or some of them, many, many TLA's and FLA's out there, right. TLA is is a three-letter acronym, and an FLA is a four-letter acronym. So in business, we all have those. But that's what they'll do. Now, I got to tell you, the vast majority and I'm going to say 99% from my personal experience. And so I don't know what the real numbers are. I don't think anybody has the actual numbers for this. But, and I'm going to say 99% because I have never seen an exception to this rule. But 99% of these companies out there don't know enough to make the right decisions or to help the customer make the right decisions when it comes to security. Now, this presents a huge problem for everybody. Because we have all of these people who were PC repairs and Windows support people, these companies relied on Windows coming out with a new version from Microsoft. And it will work on your old hardware because you need more memory, you need more space on your desk, you need to have a faster computer to run Windows eight, right? And then Windows 10 comes out. And a lot of people what they've done over the years is they say, you know, my machine is old, it's slow. It's cluttered. I could probably reload windows and get my speed back. But I just assumed by new computer, and that's what these people relied on for literally a couple of decades here. You are in the crosshairs of hackers if you're a business and even if you're just a regular home user. Oh my gosh, the problems you guys all have because now the hackers have figured out that these companies that call themselves managed services providers, but don't have enough knowledge about security, to protect even themselves adequately. These so-called managed services providers have now become a significant target for the hackers, including nation-state, think about it for a second. If you've hired a managed soft or managed services company of some sort, you've given them access to all of your computers, and they probably have your passwords, right? They have all of this stuff. There is an attack going on right now against Connect wise and directly against Ms. Peas. They've scanned the internet to find anybody that mentions MSP on their website, and then they start attacking them. Cause they have the keys to the kingdom, your kingdom. So here's the advice to minimize your risk.

We had two weeks ago an attack that hit an IT services firm Everest, which is a subsidiary of NTT, one of the largest MSP is in Spain. They had to shut everything down, cut network links, try and figure out what happened. And in this case, it was ransomware. But they're also going straight for the data. It's happening every day. Okay, this is one of the largest, so yeah, my gosh, Here's what you have to do. You have to treat your managed security services provider as an insider risk. Just like any employee, you have your own IT staff. They are a risk to your business. They have access to All of your intellectual property, your client lists your employee records, right? They have access to all of it. So treat them like an insider. Understand the risks, do not let them keep your passwords or other information. And what we do for our clients is we never keep them. We cannot tell you what your password is, and we have to reset it. And we use specialized software, that when we access one of our client's computers, it keeps track of the right passwords and those are changed frequently and can be changed. Every time a technician connects, it is a huge deal, there you go. Some people are hanging out their shingle, saying I'm an MSP. Be very careful if you treat them like an insider, and mitigate your risks. All right, when we come back, by the way, in the next hour, we're going to be talking about online shopping. You're listening to print Peterson on WGAN.

Hey, hello everybody, Craig Peterson here on WGAN online at Craig I appreciate everybody being with us today. We went through a bunch of stuff in the last hour. And we talked about, you know, MSP insider threats a little bit. I want to finish up the whole thing about insider threats. People have been asking if they should treat any managed services provider, break-fix shop, or any third party who is taking care of our computer equipment as an insider with a potential insider threat. So how do we treat insiders and this whole insider threat thing? Well, I should do a training on this up pop-up training.

The veryfirst thing you have to do is figure out what is your most valuable asset in your business. Now, for most of us, it's our intellectual property. Frankly, those are our plans, our designs, our engineering diagrams, and it's our money, you know, bank account information, employee information, anything that could cause you to fail an audit. If you get audited, do you have all of the records? But if you are in a business that requires that you have security, what's going to happen when they come in and audit, okay, so any of that sort of data is information that you should protect. That means a lot of different things. I've taught some courses on this before, but it includes things like segmenting your networks so that people who don't need to get it at data can't get the data. In this day and age, for the truly paranoid, we see this more and more, it's called a zero-trust network. So people or machines can only get at things that you explicitly allow. So it isn't as though anyone in accounting can get to this, it's this person in the accounting can get to this. So all of your data is segmented. And again, don't let them keep your passwords. Try and do some of the administration stuff yourself, at least on the password side. Change the password and save it in an encrypted password manager to keep track of those passwords. Then when you have to call your managed services provider or your break-fix shop or, or your niece, whoever it is, who's taking care of your computers, you give them the password for that machine. They can get on and can do their thing. They get everything working, you watch them as they're working, which is another thing that we do. We're only on the machine when there's someone else watching, remotely. And we record all those sessions. By the way, anytime any one of our techs gets onto any machine, we have someone watching them. That is important. When the tech completes their work change the password.

The whole idea here is that they don't need to have them. And as I mentioned before, we've seen a growing number of managed services providers from around the world being targeted and compromised by hackers, including the large ones. That goes to show again, and even the big guys aren't as concerned about security. Or maybe they don't know enough about security as they should be. I was out at a prospect's place just a couple of days ago. We're talking with them about their managed services provider that they had. I mentioned earlier, this 99% number, and this is my number. But I say 99% because I have yet to find a single managed services provider that is doing security reasonably well. I have yet to find one. And that's kind of bad news, frankly, when you get right down to it. And so that's why I say 99%, right, I give the 1%. Now, I know there are Managed Security Services Providers that know how to do it, but this is a challenging world. Bottom line, is if you can find someone that you trust 100% implicitly, they are not keeping your password, not getting into machines, without permission, then you have to trust them as an insider, basically, an employee that you kind of trust, but you don't absolutely imagine and make sure obviously, you keep those employees in line too. We're going to be coming up here in just very soon, actually another segment or two, with what you need to worry about for your holiday shopping. I want to start this whole thing off by talking about what you should be doing and how to verify a site and whether it's legitimate because it turns out there are three times more fake shopping sites than there are real ones out there. So be very, very careful of that. Now, before we get into that, let's do about these bogus hiring scams, it confuses me because when you get down to it, we have such high employment rates right now. It makes you wonder why the bogus ones are having such success out there. I don't know. Maybe people are just trying to look for a raise because there are so many great job opportunities. I don't know. Okay, employment is at an all-time high. With the economy buzzing like this, finding workers for seasonal part-time work is getting harder and harder. Think about what Black Friday means. Black Friday is when retailers finally become profitable or "in the black" as far as books go. It's not quite as true as it used to be. It used to be that most of the year retailers operated in the negative and it took until right around Thanksgiving before things turned around, because that's when people start shopping for the holidays. So these employers are now having to compete with the spam employment opportunities on top of it all. And the whole online application process is just fraught with opportunities for fishers to glean all the information they could need to impersonate you. So you've got to be very careful, and one of the things you can do, and this is the same thing if you're looking to purchase online, is verify that you did not end up on a scam site. So bottom line, if you're looking for a job, and most people are going to start their job search on Google, which is an okay place to start, and they might top in or type in seasonal opportunities. Just yesterday, I was sitting with my wife, and she did a download to the latest version of Microsoft PowerPoint. We subscribe to Office for all of our employees, including my wife, as she helps out with the business. Anyway, she did a Google search, and instead of "office," she typed "orifice," and you know slip up, and you know how it is when you kind of automatic type sometimes. She typed for Microsoft for this download, and we got results that were all scam websites. It was all set up to make you think that you were on the Microsoft Office website and that you were downloading legitimate Microsoft Office software. I was sitting right next to her. I suspect many of you might have clicked on some of that stuff, you never know what's going to happen? Because again, she was automatic typing, she didn't notice she had mistyped it. And she might not have seen these sites weren't a legitimate site. So you have to keep an eye on that. If you're looking for part-time jobs and they come up in the Google results, you might try typing in the website directly. So let's say you want to take a part-time job, but Walmart or Target or something, go to the website and make sure it's legit. How do you make sure it's legit? Well, we're going to talk about that a little later in this hour. We're going to talk about verifying the shopping sites, but if you go to their website, and if there are multiple pages on the website that all look legit like there's a real shopping cart, there's real stuff online, there's real privacy, disclaimers, etc. That's probably a real target site, and it's not a scam site. And then you can go ahead and fill out the Hiring information. I would be cautious about putting in things that are a little too personal. You want to give them your background and a way to contact you. But be careful with things like your social security number or bank account numbers. Many employers nowadays are asking for your social media account information. So it's one thing to say while you can go to slash Craig Peterson and you'll see my Twitter feed. It's quite another to give them access to your Twitter account, and some of them are asking for that. They want your Twitter account username and password and your Facebook username and password. Because many times we are sending stuff using direct messages back channels, hidden channels that they're not going to see when they go to your public-facing Twitter page or Facebook page. And so Martin Employers are saying hey, listen, we want to have a good inside look at your social media account. So I would not give them any that sort of information. Remember if it is a scam, even if it's not a scam if they get hacked, which has happened before to target all of the TJ Maxx, guys, etc. that information could leak out. Alright, so I'll stick around when we come back we're going to talk about tackling ransomware and Windows. And we're going to also talk about a new payment system that's was announced and then we'll finish up with what you should be doing for the holidays. You're listening to Craig Peterson here on WGAN and online at Craig I am on pretty much every major podcast platform. Thanks for listening today. Stick around. I'll be right back.

Hello, everybody, welcome back, Craig Peterson here listening to me on WGAN and online. Hey, if you enjoy the show, if you listen to podcasts at all, I encourage you to subscribe to your favorite podcast platform that helps get the show noticed and gets it out. And even better if you could share it with a friend and make sure you subscribe. I'd appreciate it. You know, we put a lot of work into these. I think we're giving great information. I get great feedback and emails. I had a couple over the last few weeks here actually two weeks that were saying that these were some of the best shows of mine they've ever heard. And I've done well over 1000 shows. So I think that's, that's an excellent thing, and I appreciate those types of messages that I get from you guys. So you can always email me, let me know what you think. What is it about Though the show that you liked, maybe you have some ideas or some topics that you want me to cover all of that stuff is just great and I would love to hear from you again. Me M-E at Craig couldn't be much simpler than that could it.

Let's get into this. We got a couple more quick security articles. Just general information here about Windows and Facebook, and then we're going to get into Black Friday scams, and of course it doesn't just go for Black Friday, this is throughout much of the holiday shopping season; actually, these all apply all year. Then we have these fake retailer sites I'll tell you about them how they're popping up and, and a little bit more about the signs. We covered that in that last segment a little bit when we were talking about the hiring scam, so stick with us today. We got a lot more to cover here before we're off the air, hard to believe two hours, can go by so fast. So let's start with windows here. Ransomware has been a problem for a long time. And for those that don't know, ransomware is where some software gets on your computer. There are a lot of mechanisms for nowadays, but it gets on your computer, it encrypts your files so that they become useless to you. And then it asks for money, the typical payment in Bitcoin, which is, by the way, attributed to be the number one reason Bitcoin Bitcoin has risen in price, and I can see that.

There is a new study released. We've got more than 1 billion Windows operating system powered PCs in use in the world today. And that makes them a huge target for hackers. Now, just this morning, I was talking with one of our engineers, and I was saying how impressed I am with Microsoft recently. Since Balmer and Gates left, it has been a fantastic, amazing company. They've been able to maintain compatibility with older software right now for the most part while increasing their security, and they have turned a lump of coal into something that's, that's worthwhile, right? I still don't think it's anywhere near as good as something like Mac OS is on the apple side. But not everybody can run Mac OS, not everybody understands it. So major kudos to our friends over at Microsoft. It's amazing. But they are a big target, and they do have a large attack surface. In other words, there are a lot of things in Inside Microsoft Windows that can be and are currently under attack. You have to be kind of leery about some of these potentially unwanted applications that are on your machine. You might have heard me mentioned before some of the bloatware that gets installed by the computer sellers. And what they do is they load up all their programs. And they get paid. It's like five bucks. They'll get paid to load 50 different games, and you know, anti-spyware, software, and McAfee or Norton, all software that is practically useless to you. And then you have to spend hours removing that bloatware from your computer. But it's not just the bloatware that's out there. There are crypto coin miners installed on our computers, unbeknownst to us. There are all kinds of vulnerability exploits Trojans, and nowadays, ransomware and what's called file-less malware. Fileless malware is why 100% of the antivirus solutions that are out there today don't work anymore because it's a file, so it never hits the disk, so they don't have a chance to examine it. So having white label type of antivirus not white-labeled, but whitelist might be beneficial. But even in those cases, there's a lot for us consider. Now we're finding ransomware that's crypto locking, is growing, the number of attacks is growing. The number of successful computer accesses is growing. Now, to me, the most disappointing part of the numbers as I've looked through this in some detail, in this report that came out.

The thing that disappoints me the most is much of the time. They are using exploits that have been around available for a couple of years or more. Many of these were patched by Microsoft, Adobe, and Oracle years ago. These are the ones that upset me the absolute most. We see now, the most significant year-on-year increase of any malware in the ransomware community, almost 75% increase since last year. So if you know someone that has had ransomware and I bet you you do somewhere in your circle of acquaintances, I don't think he would have to go out too deep right. I think it is about a 75% increase. According to Bit Defender, the number of ransomware reports dropped in the first half of the year due to one big hacking group called Grandacrab, who throttled down their efforts due to ramped-up law enforcement efforts. Now, ransomware is rising again, as these new ransomware groups are emerging to fill the void left by Grandacrab. I'm not going to go through the names of all of this different type of ransomware. These profit-motivated cybercriminals and they're just spending a little bit of time and a little bit of money because the to buy this ransomware. Some of this stuff is even licensed now. Where they have to, they download it for free. They can try it out on so many people, and then they have to go to a registration site and buy a license to use the ransomware. And then off it goes in that can be just 100 bucks. It's incredible. Here but they're also saying that they're seeing reports of miners and Phylis malware out there too. So coin miners, those are where you go to a website, then you know how the site says, Hey, can we send you news updates and you say allow or disallow yes or no on that you've seen those before, right? Those are not all illegitimate. Many of them are, most of them are legitimate. But that's how the coin miners are working. And so they will embed some code in a website, a legal site, and the coin miner will then start using your web browser to mine for various types of like Bitcoin type currencies that are out there. Okay. So we see a lot more in the ransomware style. We've got to be very, very careful. And about 40% of the population of the 1 billion people that use Windows about 40% admit the They have not applied security patches even though they're available. So make sure you ask them nowadays you don't have to go out and spend a lot of money to buy a license for Windows, you can pay monthly. And you don't have to worry about Windows upgrades anymore, because included. That's what we do with all of our customers; we include everything. Okay, we try and make it very, very easy for them. This article, as well as all of the other ones I've talked about today, and a few others we're not going to be able to get to today are all up on my website at Craig Please visit me there, you'll learn about the pop-up pieces of training. I have some of the Facebook Lives. The themes for the week and all of that stuff. You know, I'm not going to spam you with marketing messages. I'm just trying to get this out the truth out, Craig Peterson dot com. Hey, stick around. We'll be right back here listening on WGAN and online as well.

Hello, everybody, welcome back, Craig Peterson here on WGAN and online at Craig Peterson calm and on your favorite podcasting app. And please do spend a minute and subscribe if you haven't already. Well, we talked about cryptocurrencies, many, many times, when they first started coming out for started rising to prominence. I had set up a little mining operation to figure it out, and I had my wallet and everything and, and it was a little too late in the game to find Bitcoin, like right off the bat. That's why I stopped because I was only interested in finding out more about the technology. So you have to use it if you want to understand it. That's kind of the bottom line on it. And I looked at it as kind of a gimmick, and of course, we now know that the cybercriminals online found Bitcoin To be phenomenal when it comes to being able to get paid in a more or less, kind of a quiet way, right? Where people are not aware of where the money's coming or going. Now, remember that Bitcoin is not anonymous. None of this data is genuinely anonymous, bottom line, but it is kind of, you know, private, more or less. So they use it for pain ransoms. I attended an excellent briefing by the Secret Service about how they tracked down some of the bad guys that are using Bitcoin. And it was frankly fascinating, and how they've been successful at that. So don't think that you're going to somehow because you're using a cryptocurrency going to be out of the reach of the hands of the law because you're not going to be okay criminals will get caught. But we had another end enterprise, and I don't like it. Some people would probably call them a criminal enterprise called Facebook out there. And you might remember Facebook decided they were going to come up with this whole new network, they're going to do Libra and it was going to be a cryptocurrency. Now, cryptocurrencies are getting to be a serious business. You have, for instance, the government of China active in developing a cryptocurrency. China frankly, wants to be able to have a currency that they control that they can peer into the becomes the International Monetary standard, instead of the U.S. dollar. So China has been working on this for about five years, and frankly, next year, I think you can expect that China is going to have a state back state-sponsored cryptocurrency that they're going to be pushing all over the world. They are going to try and get oil valued in their cryptocurrency. I think that's a bit of a problem for us here in the U.S. and will be a challenge for our economy too. But when we look at somebody like Facebook, where they're trying to set up this network, called the Libra network, I was thinking good thoughts about it.

I know you are wondering, wait a minute, is this the Craig I've grown to know over the years What's going on here? I was kind of happy about it, as it possible for anyone anywhere in the world to have a financial transaction with you. For instance, I know some ladies who are in Africa, and they're impoverished women and trying to make ends meet and just have not been able to earn $100 a month. And many of these women are brilliant. Some of them are entrepreneurs, and they want to get a business going. And this particular group of women is now making themselves available after a friend of mine trained them here been in some technology, how to use computers and how to be a virtual assistant system. They are making themselves available as a virtual assistant. What could be more accessible for these women, and for the people who might want to hire them, than to make their transactions a cryptocurrency of some sort? A currency that they could use at their home that we could use at home. A currency that we could trust to a high degree. Remember, coins like if you have a U.S. dollar bill that you want to spend, the only reason it's worth anything, is because it's considered to be Legal Tender backed by the United States government. Now it isn't supported by silver anymore or gold anymore but deemed to be reasonable, legitimate currency. Initially, the Facebook Libra network announced they had a dozen or more of the foremost financial institutions in the United States. They would all work together and cooperate in developing this currency. Now, several reasons got squashed, not the least of which is governments and wanting to tax them and not being able to track some of the transactions easily. But I'm sure Facebook would have provided the governments with all the transaction information they wanted. Okay. So frankly, it would make it even easier for governments to track transactions than it is now. But the thing I loved about it was thinking about these women that my friend trained over in one of the poorest countries in Africa and how it would change their lives. I don't know if you've watched those some of this stuff here on micro-investments or watch how they're working. There's one organization called Shanta ( that quite impresses me. They're working in Myanmar. Interesting what they're doing, but when the basic idea with micro-investments is that somebody like you, were I, we might put $1,000 into this. And you've got someone in some countries somewhere that wants to buy a cow for the milk, and they're going to sell the milk, or they want to buy a goat or for the milk or whatever it might be micro to us. And so they're lent $100 to start a business. And they go out, and they get that business going, and they repay the loan, and that money is just put right back into another loan to another person that wants to do it. I've been following these micro-investments, and am very, very impressed with what many of these places are doing. And that led me to notice something else, which was the presence of phones, just regular cell phones that can send text messages, not smartphones. But the presence of phones and cell service coming into these tiny, tiny villages. And how most women were taking these phones. And we're using them to create businesses to support themselves and their families. Just absolutely amazing and many of these women, in fact, I think almost all of the ones my friends been teaching our single women, they've been either abandoned by their husbands Or the kids, Father, whatever you might want to call them. And they have to do all of the support. And so they're spending a whole month's wages, they're spending $100 to go through this program, this one-month long program that my friend runs. And so she's been looking for donations of laptops, just regular windows laptops, to help these women out as well. But these women get these cell phones and just with the cell phone now, there is some technology out there right now we don't use it in this country. Still, in several other developing countries that they can send money to people and receive money to people just using text messages. So just using their cell phones brought them out of extreme poverty. Now you know, we have poverty in the U.S., but poverty in the new in the U.S. looks like somebody that's upper class in these countries does. Okay. We don't know what poverty is. What we call poverty isn't, you know,' it's just astounding to me. So I got excited when I saw this whole idea behind the Libra network and what Facebook was doing with Calibra wallet. So we got to go for break, and we're going to come back I'm going to finish this up because there's something new and exciting that's happening in this space now. And then we're going to get into our Black Friday scams, and some more fake retailer sites. If you want more details, you're going to have to go to my website at Craig Peterson dot com. I'm not going to be able to cover it entirely in either the radio show today here on WGAN or my podcasts. You can find my Podcasts on pretty much every podcasting platform or my website, Craig Peterson dot com stick around, more to come

Hey, Craig Peterson, back here on WGAN. I can't believe it's been two hours since we've been together today. Man does time fly. So going back because I want to finish up our last topic here about the microtransactions and about what our friends at Facebook had been doing trying to put a cryptocurrency in place. It completely fell apart about a month ago. Facebook is planning to start rolling out something called Facebook Pay on messenger and on Facebook itself. Today, it's going to be initially available for fundraisers person to person payments, event tickets, in-game purchases, and from some pages and some businesses that are on the Facebook marketplace. And they're planning on bringing this to more people and more places. They're going to be adding not just messenger, but adding Instagram and WhatsApp to this. So basically, what they're trying to do now is use this technology to make it possible for people to pay each other no matter where they are. Now, you already know because you're just listening, you already know that I think that's a unique idea. And that is going to lift people out of poverty. Just like capitalism has, it's the best system the world has ever invented, to lift people out of poverty. And if Facebook successful this, they will save lives as well. And of course, there's the other side, Facebook's going to make a ton of money on this. Because they're going to, obviously they'll have some form of transaction fees, and they'll be making some money over that. Okay, so we got more stuff we're not going to get to today because I want to get to the Black Friday scams and the retail stuff. There either is a new secret consumer score that you have never heard of before. And I am not, unfortunately, to get time to do much. With that, I say now it's been out there for probably the better part of a decade. I found some information about it from the New York Times back in 2012, and the Wall Street Journal back in 2018. There is a scoring system that's keeping track of us, and one with which you are probably not familiar. So that's up on my website, Craig and 18 T's and green to pay $16 million to settle a legal dispute over smart throttling smartphone plans. So they came to that agreement with the Federal Trade Commission. Okay, so now into Black Friday scams. These are happening all the time. They are souped-up during Black Friday and Cyber Monday when there's a lot of people buying stuff online, and I'll let's get into it here. This shopping fever lasts for about four days right now. Some sites like Walmart start on Wednesday, and others are ready underway here. But let's go into some of these top scams. Man, we've only got about 10 minutes left here.

So number one, this is a great article. It's from Heimdal Security dot com. I've got it up on my website at Craig Peterson dot com. If the website insistently asks you to download its application. Now, we already probably have apps from merchants. I've got Amazon, for instance, there are apps from Walmart Target, Ollie Express, Rakuten, Barnes and Noble, and the little guys are having a hard time competing there, but they try nonetheless. Now, a lot of these websites are going to talk you into downloading their mobile apps. And there's nothing wrong with that. But remember that not all of these retailers are legit, and not all of the legitimate retailers the apps are legitimate because it's rare that they would be developing the app themselves. So they probably had a third party do it. Who knows, right? So don't just willy nilly install apps from retailers are going online number two, the website looks fishy. And of course, this is pH fishy. And what that means is you might be on a cloned site. Right now, there are I was saying three earlier, but I was wrong. According to research from Venafi, they were looking at what is called TLS certificates. These are SSL certificates used basically if the website says HTTPS, then they're using TL. So they examine these. And they found that there are four times more fake retailer sites than the real one. Okay? So there are typos, squatting domains. I mentioned one of them earlier in the show today that my wife accidentally typed orifice instead of office when she's tr


The blame game: When hackers steal your data, is it a corporate failure – or the attackers' fault?


Or a mix of both?

Sponsored Organisations are attacked every day: cybercriminals gain a foothold within the corporate network, and data is stolen and operations disrupted. The target of an attack could be your employer, a customer, a social media platform, or an intermediary responsible for secure access control, or financial record holding.…


أفضل 10 اجهزة لابتوب مناسبة للهكر والأختراق Best Laptops for Hacker 2018


أفضل 10 اجهزة لابتوب مناسبة للهكر والأختراق Best Laptops for Hacker 2020

السلام عليكم متابعين قناة ومدونة Shadow Hacker لقد تلقيت رسائل عديده حول ما الأجهزة المناسبة لأستعمالها في الهكر والأختراق وما الجهاز الذي انا استخدمه حاليا , ولا شك ان هناك الكثير من الأشخاص يعانون من ثقل وسرعه  الجهاز الكمبيوتر

لئن ممارسة الهكر عموماً يحتاج الى اجهزة ذات مواصفات عاليه حتى تستطيع ممارسة الهكر والأختراق دون اي مشاكل ,
ولذالك سوف اعرض عليكم أفضل عشرة اجهزة كومبيوتر يمكنك استمالها في الهكر والأختراق دون اي مشاكل !

ملاحظة بسيطه الترتيب سوف يكون عشوائي يمكنك أختيار الذي يناسبك !

أفضل 10 اجهزة لابتوب مناسبة للهكر والأختراق Best Laptops for Hacker 2020

1. HP Pavilion 2018 Laptop

هذا هو أحدث كمبيوتر محمول من HP والذي يتميز بالأداء العالي. وقد تم تجهيز الكمبيوتر المحمول بمعالج Intel Core i7 من الجيل الثامن مع ذاكرة تخزين مؤقت سعة 8 ميجابايت وذاكرة DDR4 سعة 16 جيجا بايت من أجل الوصول السريع إلى الملفات وتشغيل البرامج النصية لـ DDOS دون أي تأخير. هناك العديد من تطبيقات الأختراق مثل Hashcat أو Hydra التي تعتبر تطبيقات GPU كثيفة وهذا الكمبيوتر المحمول لن يخيب ظنك لأنه يحتوي على شريحة رسومات NVidia GeForce مخصصة مع ذاكرة فيديو بسعة 4 GB. يأتي مع SSD بسعة 512 جيجا بايت ولوحة مفاتيح بإضاءة خلفية وشاشة FHD مقاس 15.6 بوصة.

2. Lenovo ThinkPad P51s

Ultrabook الموصى بها لتشغيل الأجهزة. مع ذاكرة الوصول العشوائي 16 غيغابايت ، لن تواجه أي تأخير أثناء تشغيل برامج الأختراق التي تحتاج إلى إنشاء VMs. هذا ثينك باد من لينوفو مدعوم من معالج Intel i7 Kaby Lake ووحدة معالجة الرسومات NVidia Quadro مع ذاكرة VRAM سعة 2 جيجابايت. إنها تأتي بسعة تخزين 512 جيجا بايت SSD ، لوحة مفاتيح رقمية مضاءة بإضاءة خلفية ، قارئ بصمات الأصابع ، HDMI ، موصل ومنافذ ثاندربولت 3. مع بطارية احتياطية لمدة 13 ساعة وشاشة مضادة للتوهج ، يمكنك العمل لفترات أطول دون أي انقطاع.

3. Alienware 17.3” UHD Laptop

هذا الكمبيوتر المحمول مخصص للمخترقين الذين يبحثون عن الأسلوب والأداء في نفس الوقت. من Alienware يأتي مع تصميم قوي والأجهزة القوية. يأتي هذا الوحش عالي السرعة مع معالج Intel i-7 ، وذاكرة DDR4 بسعة 16 جيجا بايت ، وشاشة UHD كبيرة 17.3 مع دقة قصوى 3840 × 2160 بكسل. فتحات الهيكل سهلة الفتح لذاكرة الوصول العشوائي (RAM) وترقية القرص الصلب. للتمهيد السريع ، يمكنك استخدام SSD الخاص به بسعة 256 جيجا بايت والحفاظ على برامجك ومستنداتك ووسائطك في محرك الأقراص الصلبة 1 تيرابايت SATA.

4. Dell Inspiron 15 7000 (2018)

إذا كنت تتطلع لاستضافة بيئة تطوير متينة على جهاز ، فإن Dell Inspiron 7000 هو أفضل جهاز كمبيوتر محمول لاستضافة خادم ويب لاختبار مآثر المتصفح. يأتي مع الجيل السابع من معالجات Intel i5 (ذاكرة 6 ميجابايت) ، ذاكرة رام 16 جيجا بايت ، ومخزن هجين سعة 256 جيجابايت SSD + 1TB SATA HDD. يتم الاعتناء بالرسومات بواسطة NVIDia GeForce GPU (4 جيجابايت) وشاشة Full HD 15.6 بوصة. وهي مجهزة بلوحة مفاتيح رقمية كاملة الإضاءة وقارئ بطاقات و HD Webcam HDMI ومنافذ USB 3.0.

5. Apple MacBook Pro MGXA2LL / A

Apple MacBook Pro في قائمته لأفضل أجهزة الكمبيوتر المحمولة للهكر والمخترقين . مواصفات هذا الكمبيوتر المحمول تتحدث عن نفسها. يأتي جهاز MacBook هذا مزودًا بمعالج Intel i7 (ذاكرة كاش 6 ميجابكسل رباعية النواة) ، وذاكرة RAM سعة 16 جيجابايت ، ومخزن سعة 256 جيجابايت ، بالإضافة إلى بطارية احتياطية مدتها ثمان ساعات. مدعوم من رسومات Intel Iris Pro ، تقدم شاشة مقاس 15.4 بوصة درجة وضوح
2880 × 1800 بكسل. اشترِ هذا الكمبيوتر المحمول المتقدم للحصول على أداء لا تشوبه شائبة.

6. Lenovo ideaPad Y700

تم تصميم هذا الكمبيوتر للألعاب ، وهو عبارة عن كمبيوتر محمول موثوق به لتشغيل ادوات الأختراق ، أو كالي لينكس أو باك بوكس. مع شاشة كبيرة بحجم 17.3 بوصة ، يمكنك الحصول على سطح مكتب مثل تجربة أثناء الاستمتاع بأداء عالٍ من مواصفات الأجهزة القوية. يتميز IdeaPad بمعالج Intel Core i7 ، والتخزين الهجين (128GB SSD + 1TB HDD) ، وذاكرة RAM 16 جيجابايت ، والرسومات المنفصلة من NVidia GeForce GTX 960M مع ذاكرة فيديو بسعة 4 جيجابايت.

7. Dell XPS 15 9560

هذا هو جهاز كمبيوتر محمول 15 بوصة من سلسلة XPS Dell المشهورة. تأتي محملة مسبقًا بنظام التشغيل Windows 10 Professional OS وتوفر بطارية احتياطية لمدة 10 ساعات. بالإضافة إلى ذلك ، فإنه يحتوي على حجم SSD سريع بحجم 256 جيجابايت ومعالج Intel i7 الأساسي (3.8 غيغاهرتز) وذاكرة عشوائية 8 جيجابايت ورسومات NVidia مخصصة مع ذاكرة الوصول العشوائي DDR5 4GB. مواصفات هذا الكمبيوتر المحمول تفي بالمعايير الموصى بها ، وبالتالي مؤهلة لمهام الهكر والأختراق .

8. Acer Aspire E 15

هذا هو كمبيوتر محمول من شركة أيسر أن يعد بتقديم السرعة والمتانة بسعر جيب. سواء كنت مبتدئًا أو محترفًا محنكًا في مجال تكنولوجيا المعلومات ، فإن Acer Aspire E15 تتلقى ردود فعل إيجابية من زبائنها الراضين في جميع أنحاء العالم. يتحدث عن تكوينه ، فإنه يأتي مع الجيل السابع من معالجات Intel i5 و 8 جيجابايت RAM و NVidia GeForce 940MX وشاشة عريضة كاملة الدقة 15.6 بوصة. الكمبيوتر المحمول مرفق مع إصدار windows 10 Home ويوفر نسخة احتياطية مذهلة تصل إلى 12 ساعة.

9. Asus Vivobook S510

سوف تجد كل من القوة والاكتناز في هذا vivobook خفيفة الوزن. على الرغم من أنه يتميز بتصميم جذاب مع مظهر نحيف (0.7 بوصة) ، إلا أنه يعتبر قوة حقيقية من الداخل. موصى به لكل من الهكر والمخترقين ، وهو مجهز بمعالجات Core i7 من الجيل السابع ، وذاكرة وصول عشوائي 8 غيغابايت ومجموعة من 128 GB M.2 SSD و 1 تيرابايت HDD كجهاز تخزين. تمنحك شاشة Full 15.6 بوصة عالية الدقة زوايا مشاهدة واسعة تصل إلى 178 درجة. تتكون البطارية من خلايا Lithium-Polymer التي تسمح بشحن أسرع ولوحة مفاتيح ذات إضاءة خلفية ، يمكنك العمل في المناطق ذات الإضاءة الضعيفه . هذا هو الفائز الحقيقي وقد حصلت على تصنيفات نجوم عالية من مستخدميها بالارتياح.

10. Acer Predator Helios 300

هذا الكمبيوتر المحمول القاتل هو وحش قوي من الداخل. يحتوي هذا اللابتوب القوي على هيكل معدني مع اللمسة السوداء الأنيقة. . تتكون الأجهزة من معالج Intel Core i7 ، أحدث وحدة معالجة الرسومات NVidia GTX 1060 مع ذاكرة رسومات هائلة تبلغ 6 جيجابايت. تعمل شاشة FHD 15.6 بوصات بتقنية IPS التي يمكن الاعتماد عليها والتي تضمن زوايا مشاهدة أوسع. تعمل أدوات تشفير كلمات المرور بدون عيوب مع ذاكرة وصول عشوائي سعتها 16 غيغابايت ويتم ضمان تشغيل نظام تشغيل أسرع من خلال SSD 256 غيغابايت. يحتوي على لوحة مفاتيح رقمية كاملة مع إضاءة خلفية حمراء.

الى هنا انتهينا أتمنى قد أعجبتكم هذه الأجهزة ولا تتردد بطرح اي سؤال حول الموضوع في التعليقات اسفل المقال!

اخوكم طارق من قناة Shadow Hacker

مراقبة اي شخص على الواتساب بستخدام رقم الهاتف فقط
تجسس على الواتساب عن طريق رقم الهاتف

مراقبة اي شخص على الواتساب بستخدام رقم الهاتف فقط

اصبح الواتساب مهم في حياتنا اليومية وله فوائد كثيره لما يسهل علينا في التواصل مع الأشخاص الذين نعرفهم والذين لا نعرفهم وبرغم ان الواتساب له فوائد كثيرة ومميزة الا انه في نفس الوقت قد ينجم عليه اضرار كبيرة وربما الكبار قد يتجنبون الوقوع بمثل هاذه الأخطاء لكن الصغار قد لا يكون لهم الوعي الكافي فيما يقحمون انفسهم به لذا اتيت لكم اليوم بطريقة لمراقبه اي شخص على الواتس اب متى يقوم بتسجيل الدخول وكم يمضي وهوا متصل ومتى يغلق الواتس اب

التجسس على الواتساب مجانا هاذه الطريقة فعاله للاشخاص الذين لديهم ابناء صغار ويمضون وقتهم على استخدام الواتس اب بشكل كبير او يمكنك مراقبه اي شخص تريده او يهمك فهي فعاله للغايه ولا يتطلب الأمر منك تثبيت اي برامج او تطبيقات خارجية في هاتف الشخص الذي تريد مراقبته بل سيتم الأمر من خلال هاتفك فط ودون اي تعقيدات

طرق مراقبة الواتساب من خلال الرقم ومعرفة محادثات 

برغم ان طرق تجسس على الواتساب معدومة نوعاً ما واغلبها يكون غير مجدي الا ان هناك طرق فعالة لمعرفه ماذا يقوم الشخص بفعله على Whatsapp ومن يحادث  وماذا يرسل للأشخاص الأخرين والأمر اشبه انك تحمل هاتف الذي تريد مراقبته وكأنه بين يدين وانتت من تتحكم فيه وبطبع لا ينعدم الواتساب من الثغرات فكل فتره وحين نسمع ان هناك ثغرة في الواتساب تمكن المخترقين من التجسس على المحادثات عن بعد وبمجرد معرفة الثغرة يقوم whatsapp بسد تلك الثغرة

لكن ماذا عن طرق مراقبة الأشخاص على الواتساب وكيف تتجسس على اي محادثة على الواتساب , في الحقيقه يوجد طرق عديدة منها معروفة ومنها غير معروف واشهرها بستخدام Whatsapp web وايضاً يوجد ثغرات في الأصدارات القديمه تمكنك من اختراق اي واتساب بسهولة لكن بمجرد تحديث الواتساب عند الشخص الذي تريد مراقبته لا تجدي نفعاً لكن هناك تطبيقات تتيح لك مراقبة الهاتف بشكل كامل ومن ظمنها الواتساب وهي بل عاده تكون موجهه الى الأهل الضين يريدون مراقبة ابنائهم

تطبيق مراقبة اتصال اي شخص على الواتساب

اليوم اقدم لكم تطبيق رائع وجميل يمكنك من مراقبة اي شخص على الواتساب بمجرد فتحه لتطبيق ومتى يغلق التطبيق ربما قد لا يعطيك مميزات كبيرة مثل مشاهدة المحادثات الا انه مفيد للبعض الذين يهتمون لشخص ما ويريدون معرفه متى يقوم بفح الواتساب ومتى يغلقه وسوف يأتيك اشعارات تخبرك بذالك بشكل دقيق وغاية في الروعة وسوف يكون مفيد لك للغاية

مميزات تطبيق WaRadar لمراقبة Whatsapp

  • سهل الأستخدام للغاية
  • كل ما تحتاجة هوا رقم هاتفالذي تريد مراقبته
  • مجاني ويوجد به ميزات مدفوعة
  • يصلك الأشعارات حتى وان كنت غير متصل في الأنترنت
شرح تطبيق مراقبة الواتساب برقم هاتف فقط

اولاً سوف نحتاج الى تحميل تطبيق WaRadar على متجر جوجل بلاي ويمكنك تحميله من الموقع الرسمي من هنا WaRadar
بعد ان تقوم بتحميلة وتثبيته على هاتفك الأندرويد سوف تقوم بفتح وسيظهر لك بشكل التالي قم بلموافقة لتعليمات
whatsapp tracker for iphone

بعدها سوف تكمل ما يتطلب منك اظافته مثل اسم الشخص ويمكنك اضافه اي اسم الأمر فقط كي تعرف اذا كنت تراقب اكثر من شخص ول يكن اسم موقع Shadow Hacker وثم سوف تقوم بأضافه رقم الهاتف مع مراعاه اختيار دولة الشخص

بعد قيامك بوضع رقم الهاتف الذذي تريد مراقبته على الواتساب واختيار الدولة يجد عليك التاكد ان الرقم هوا بل فعل مفعل على الواتساب ويقوم هاذا الشخص بستخدامه لكي يصلك الأشعارات , بعدها سيظهر لك بشكل التالي
بعد وصولك لهاذه المرحلة كل ما عليك فعله هوا الرجوع للخلف فط وسيتم تفعيل الخدمه كما هوا موضع امامكم
وبذالك تم تفعيل الطريقة بنجاح وسيتم اشعارك بحال قام الشخص بفتح الواتساب الخاص به وحتى وان لم تكن متصل في الأنترنت سيخبرك متى قام هاذا الشخص بلأتتصال في الواتس اب ومتى خرج وكم مضى من الوقت وهوا متصل في الواتساب
اتمنى قد اعجبتكم الطريقة وكما اخبرتكم ستكون مفيدة للعديد من الأشخاص الذين يحبون مراقبة اشخاص يحبونهم على الواتساب


تحميل برنامج تهكير الالعاب الاصلي لجميع هواتف الأندرويد

السلام عليكم متابعين قناة ومدونة Shadow Hacker , في هاذا الموضوع اقدم لكم طريقه تهكير العاب الأندرويد مثل تهكير لعبة ببجي والعاب الأون لاين والأوف لاين وما هي الطرق تهكير العاب الأندرويد وما هي الأدوات المستخدمه في تهكير العاب الأندرويد كل هاذا سوف نتعرف عليه من خلال هاذا المقال

تحميل برنامج تهكير الالعاب الاصلي لجميع هواتف الأندرويد

كل ما اطلبه منك سوى التركيز وفتح دماغك معي! 
لاول مرة في العالم العربي سوف نقوم بالتطرق الى كيفية تهكير الالعاب, ما سوف تطلع عليه في هذا الموضوع سوف تحتاجه في حياتك باكملها وسوف تحتاج كل الادوات التي سوف نقوم بالتطرق اليها في حالة كنت تريد تعلم تهكير الالعاب
لن نعلمك فقط كيفية تهكير لعبة معينة بل سوف نشرح لك كيف تقوم بتهكير اي لعبة وكيف تصبح هكر العاب, يعني بدون ما تحتاج اي شخص في المستقبل يهكر لك الالعاب!

 مرحبا اخوتي في الله, كما وعدتكم دائما ان كل موضوع سوف اقوم بالتطرق اليه سوف يكون الافضل من نوعه, وسوف نقدم لكم دائما الافضل حتى يصبح كل شخص فيكم هكر سواء هكر حسابات او هكر مواقع او هكر العاب, في كل مواضيع موقعنا دائما ما نشرح لكم جديد مجال الاختراق والطرق السرية التي لا يعلمها اغلب الناس.

تنبيه: لكي نكون صريحين من البداية لازم تعرف انه الالعاب التي لا تتطلب انترنت يسهل تهكيرها بنسبة نجاح 100% لكن الالعاب اون لاين يصعب تهكيرها, لكن يمكن تحميلها على الهاتف ولعبها بدون انترنت, وكمثال بسيط تستطيه تهكير لعبة كلاش اوف كلانس على الهاتف وزيادة المجوهرات وكل شيء لكن اللعبة لا يمكن ان تتصل بالانترنت وتحتفض بنفس المجوهرات والادوات, لانه وبمجرد ان تقوم بالاتصال بالانترنت سيتم اغلاق حسابك, بعض البرام جالتي سوف نقوم بشرحها الان تمكنك من الحصول على الميزات في اللعبة, مثلا في لعبة ببجي تستطيع اظهار الخصوم, لان التطبيق هنا يقوم بالتلاعب في التطبي المتواج دفي هاتفك ولا يمكنه ان يزيد من نقاطك او يقتل الخصوم. واي موقع اخر يخبرك انه يمكن اختراق لعبة معينة فالموضوع كذب في كذب ويجب ان تحذر لان اغلبهم يريدون فقط سرقة حسابك في لعبة معينة.

اليوم سوف اشرح لكم كيف تتم عملية اختراق وتهكير الالعاب خطوة بخطوة واي مساعدة او مشكل خليه تحت التعليقات, بسبب التعليقات دائما نرى ما ينقص موضوعنا واحيانا نقوم بتفصيل اكثر لبعض النقاط لدى كل ما عليك سوى التركيز وان شاء الله راح تخرج من هذا الموضوع عندك معلومات بنسبة 90% تقدر تهكير اي لعبة!

 مكاسب تنزيل برنامج تهكير العاب الاندرويد بدون روت

- ترجمة الالعاب من اللغة الاجنبية الى اللغة العربية
- جعل الذهب والنقود والمجوهرات لا تنتهي ويمكن استخدام اكثر من 999.999 نقطة
- تفعيل كل ممزيات اللعبة , خرائط, شخصيات, معدات, ادوات, مميزات,,,,
- التحكم باللعبة كما تريد تغيير الشخصيات ,,,
- تختيم اللعب التي تريدها بدون مشاكل وبدون الحاجة لاي مجهود

كيف اصبحت قادر على تهكير الالعاب ؟

ماهي الادوات التي كنت استخدمها في تهكير الالعاب ؟

يوجد العديد من البرامج والتطبيقات التي كنت دائما ما استخدمها لاقوم باختراق اي لعبة. وسوف اشرح لكم كل الادوات بالتفصيل كما انني سوف اشرح لكم كيفية اختراق كل لعبة حسب الطلب! بمعنى لو في لعبة معينة انت عايز تخترقها كل الي عليك انك تخلي تعليق اسففل الموضوع وراح انزل لك التهكير الخاص باي لعبة!

لوكي باتشر برنامج تهكير الالعاب Lucky Patcher

لوكي باتشر الاسطورة في عالم تهكير الالعاب, يضم هذا التطبيق مجموعة من الاكواد التي تمكنه من تهكير العديد من الالعاب يصل عدد الالعاب التي يمكن اختراقها عن طريق لوكي باتشر ازيد من 10 الف لعبة اوف لاين, مع بعض الالعب الاخرى اون لاين , يستطيع هذا التطبيق من ان يمكنك من الشراء مجانا في الالعاب واحصول على المجوهرات والنقاط التي يطلب منك دفع الماال مقابل الحصول عليها.

كيف يعمل برنامج تهكير الالعاب لوكي باتشر ؟
بدون ما ندخل في التفاصيل المعقدة, لوكي باتشر بيمسح الكود الاصلي الخاص باللعبة ويستبدله بكود جديد هذا الكود يتيح لك الحصول على كل مميزات الللعبة مثلا:

- الحصل على مجوهرات مجانية لا محدودة
- الحصول على نقاط شحن لا محدودة
- فتح الشخصيات المدفوعة
- الحصول على الاشياء المدفوعة بالمجان
- يمنع الاعلانات من الظهور في التطبيق

طريقة تهكير الالعاب باستخدام لوكي باتشر

  1. اولا يجب ان نقوم بتحميل التطبيق من الموقع الرسمي الخاص بالبرنامج لكي نتفادا انا نقوم بتحميل اي برنامج ملغم قد يضر بهاتفك.
  2. في حالة كنت تريد تحميل التطبيق بشكل مباشر اضغط هنا : [ تحميل التطبيق ]
فيما يخص شرح استخدام التطبيق يمكنك البحث في اليوتيوب سيكون من الأفضل لك الشرح العملي لكي تفهم طريقه استخدام التطبيق لتهكير العاب الأندرويد

برنامج تهكير العاب بدون نت SB Game Hacker APK 

تطبيق جيم هاكر ايضا احد اكثر التطبيقات التي يتم استخدامها في تهكير الالعاب, بالاخاص الالعاب اوف لاين اي بدون انترنت, كل ما عليك سوى ان تقوم بتحميل التطبيق وان تقوم باختيار الشيء الذي تريد تغيير في اللعبة , لنفترض مثلا ان حسابك به 800 نقطة ذهب, كل ما عليك سوى الدخول الى التطبيق والبحت عن رقم 800 وتقوم بتغيير الى القيمة التي تريدها, وسوف يقوم التطبيق بتغيير القيمة في اللعبة, كل ما عليك حينها يوى ان تقوم باغلاق اللعة واعادة تشغيها وستتمكن من الحصول على الذهب بالمجان, كما قلت التطبيق يستخدم غالبا في عندما يكون هاتفك غير متصل بالانترنت!

برنامج Game guardian 

البرنامج المستخدم في تهكير اشهر الالعاب مثل كاندي كراش,  ولعبة ببجي الشهيرة, يقوم الهكر بحقن ملفه في ملفات اللعبة ما يتيح له التعديل على خضائض اللعبة مثلا, اظهار الخصوم زيادة السرعة, زيادة الدم , ويمكن استخدامه على اكتر من لعبة في نفس الوقت.

بعد ان تقوم بفتح التطبيق كل ما عليك سوى التوجه الى اللعبة المراد تهكيرها, تم تقوم بتشغيل ايقونة البرنامج لكي تتمكن من التحكم في اللعبة , بعد ان تقوم بتغيير النقاط او اي شيء تريد زيادته تدضغط على مواقع لكي يتمكن التطبيق من تهكير اللعبة.

مواقع تحميل الالعاب المهكرة الجاهزة

موقع تهكير الالعاب, يوجد العديد من المواقع التي تقدم لك خدمة تحميل الالعاب المهكرة جاهزة, مثلا عندما تبحت عن لعبة في المتجر وتجد انه تطبيق مدفعة او مجانية لكن بعض الادوات والاشياء مدفوعة اي يتطلب منك دفع المال, كل ما عليك سوى ان تقوم بالتوجه لاحد هذه الماوقع التي سوف نشرحها تم تقوم بالبحت عن الللعبة التي تريدها وستتمكن من تحميلها بالمجان ومهكرة على هاتفك.


الموقع الاسطورة الذي يقوم بتنزيل اغلب الاعاب المدفوعة بالمجان , تقريبا به كل الاعاب المدفوعة التي يتراوح سعرها مابين 1 دولار الى 50 دولار , ستجد كل الاعاب المدفوعة بالمجان لتحميل, فمثلا ان كنت تبحت عن لعبة Kingdom rush vengeance ستجدها في الموقع قابلة لتحميل بالمجان بوضعيتين, الوضعية الاولى تحميل عادي كما لو انك اشتريتها بدون مجوهرات زائدة, والوضع الثاني تنزيلها بالوضع المتطور اي بمجوهرات وكل الشخصيات مفتوحة.


موقع rexdl ايضا يمكن اعتباره موسوعة الاعاب المهكرة الجاهزة , كل ما عليك سوى الدخول الى الموقع وستجد جميع الالعاب المهكرة جاهزة لتحميل, كما انه يمكن طلب تهكير لعبة معينة, المميز في الموقع انه يتم تهكير جميع الاعاب الجديدة والقديمة حسب الطلب, وبه مكان لدردشة بحيت يمكن الدردشة مع اعضاء الموقع وتبادل الالعاب بينكوم. تستطيع تهكير الاعاب اون لاين ايضا لكن لا يمكنك لعبها بالانترنت فقط على هاتفك.


الموقع الغني عن التعريف والاول في مجال تنزيل الاعاب المهكرة , به العديد الاعضاء يشتغلون على تنزيل الاعاب المهكرة الجديدة بالمجان, ستجد به قوائم كبيرة من الاعاب يمكنك البحت وتصفح الاعاب المدفوعة وتحميلها على اشكال ونسخ متعدد, الشكل التصميم الخاص بالموقع يتيح لاي شخص استخدام الموقع بسهولة ثامة, كل ما عليك سوى الدخول الى الموقع واختيار اللعبة المراد تحميلها والضغط على تحميل وستجد اللعبة جاهزة في هاتفك بدون القيام باي شيء اخر.

تطبيقات تهكير الالعاب , تهكير جميع الالعاب

تطبيقات تهكير الالعاب, بما انه يوجد العديد من المواقع التي تقدم لك خدمة تحميل الاعاب المدفوعة والمهكر ةبالمجان يوجد ايضا العديد من التطبيقات التي تمكنك من تنزيل الالعاب المهكرة على هاتفك, جمعت ليكم افضل واقوى التطبيقات المختصة بتهكير الالعاب, كل الي عليك ان تقوم بتحميل التطبيق وتقوم بالبحت عن الللعبة المراد تهكيرها. 

تطبيق Blackmart

ملك الالعاب المهكرة بكل معنى للكلمة, ستجد به العديد من التطبيقات التي تم تهكيرها مسبقا وتنزليها على التطبيق, الجيد في التطبيق انه سهل الاستخدام وتستطيع استخدامه بكل سهولة دون الحاجة لاي خبرة كل ما علي كسوى تحميل التطبيق اختياراللعبة وتحميلها واستمتع باللعب.

[تحميل التطبيق من الموقع الرسمي] 


 تطبيق 1Mobile Market

 تطبيق اخر مميز بالتصميم الخاص به, تطبيق مميز يشمل بين التطبيقات المجانية والتطبيقات المدفوعة يمكنك تحميلهم بكل سهولة, كما انك ستجد تطبيقات في اخرى والعاب يمكن تحميلها من خلال التطبيق, المميز في التطبيق ان به تصميم ويرتب لك التطبيقات حسب التقييم والتحميلات والتطبيقات الاكثر شيوعية .

[ تحميل التطبيق من الموقع الرسمي ]   

تطبيق Mobogenie Market

 المميز في هذا التطبيق انه لا يوفر لك فقط الالعاب المهكرة, بل ايضا التطبيقات والبرامج والكتب وكل شيء مدفوع هناك فرصة كبيرة ان تجده بالمجان في هذا التطبيق, مثلا الاغاني المدفوعة والافلام والكتب,,, كماان التطبيق يتوفر على مكتبة كبيرة من التطبيقات ويمكنك ان تقوم بطلب اي تطبيق ان يتم تهكيره حسب الطلب.

تطبيق GetAPK

 المميز في تطبيق getapk انه يتوفر على جميع التطبيقات بجميع النسخ, اي انه يمكنك ان تقوم بتحميل تطبيقات مختلفة بنسخ قديمة مثلا تطبيق فيسبوك نسخة 2004 لانه بعض التطبيقات القديمة تكون خفيفة الاستخدام على الهاتف ولا تتطلب انترنت بحجم كبير, ايضا ستجد مجموعة من الالعاب التي تم تهكيرها بنسخ متعددة. يبقى هذا التطبيق الافضل لمن يبحت عن تطبيقات بمواصفات معينة مثلا النسخ القديمة.

الى هنا انتهى الشرح اتمنى قد نال على اعجابكم ورضاكم ولا تنسوا مشاركه المقال وموقع Shadow Hacker بين اصدقائكم لكي تعم الفائدة للجميع .


جلب معلومات الفيس بوك الأميلات وارقام الهواتف للأختراق الفيس بوك

السلام عليكم متابعين قناة ومدونة شادو هكر , في هاذا المقال اقدم لكم شرح كيفيه الحصول على الأميلات المتاحه لأي حساب فيس بوك الأصدقاء لأستخدامه في عمليه الأختراق وهكر الفيس بوك كما يمكنك استخراج جميع ارقام هواتف حسابات الفيس بوك بواسطع سكربت او اداة رائعه OSIF هذه الأداة الرائعه تمكننا من استخراج جميع الأملات المتاحه لأستخدامها في اختراق الفيس بوك وايضاً يوجد بها خيرات كثيرة سنقوم بشرحها بتفصيل ويمكنك ايضاً استخدام السكربت على تطبيق Termux للاختراق
هكر اختراق حسابات الفيس بوك 2019

جلب معلومات الفيس بوك الأميلات وارقام الهواتف للأختراق الفيس بوك

تعبر اداة OSIF من الأدوات الرائعه في جلب المعلومات الهندسة الأجتماعيه فهي توفر لك استخراج معلومات حساسه لتجسس واختراق الحسابات الفيس بوك كما توفر لك الأداة خصائص عديدة بعيدة عن الأختراق فمصلاً يمكنك حذف بوستات حسابك على الفيس بوك بشكل تلقائي او حذف المتابعين او اضافه اصدقاء او حذف الأصدقاء الفيس بوك دون اي عناء منك

شرح استخدام OSIF لأختراق الفيس بوك 2019

لقد قمت بعمل شرح فيديو لكيفه اختراق الفيس بوك وجلب المعلومات بواسطه سكربت OSIF على اليوتيوب وقمت بشرح مفصل للاداة وطريقه استخدام السكربت كما يمكنك ايضاً استتخدام السكربت على تطبيق Termux للاختراق ولا يقتصر الأمر فقط على توزيعة الكالي لنكس اي لك حريه الأختيار

تثبيت اداة OSIF على Termux

pkg update upgrade
pkg install git python2

 شرح استخدام OSIF

كما ذكرت فقد قمت بعمل شرح مفصل لأداة OSIF على اليوتيوب انصحك بمشاهدته وفيما يخص تثبيت OSIF على تطبيق تيرمكس Termux سنقوم بوقت لاحق بشرحة

الى هنا انتهى الشرح اتمنى قد نال على اعجابكم ورضاكم واذا كان لديك اي استفسار فلا تنسى اخبارنا في قسم التعليقات اسفل الصفحة اخوكم طارق Shadow Hacker


هكر تحديد اللاعبين في ببجي لجميع الأجهزة تهكير لعبه ببجي HACK PUBG MOBILE 2020

السلام عليكم متابعين قناة ومدونة شادو هكر , في هاذا المقال اقدم لكم هكر لعبه ببجي Pubg Mobile لتحديد الاعبين ولجميع الأجهزة يمكنك استخدام برنامج هكر ببجي موبايل على محاكي , اصبح الجميع الأن يبحث عن طريقه للفوز في لعبه ببجي ودائماً ما يقوم بتسخدام الحيل مثل البحث عن الهاك ببجي هكر ببجي للكمبيوتر والذي يجعلك تفوز دوماً في لعبه pubg لذا سوف اقدم لكم اليوم سكربت او برنامج هكر ببجي موبايل جديد جداً يتيح لك اختراق وتهكير ببجي موبايل على جميع الأجهزة للاندرويد والأيفون لكن يجب عليك استخدام محاكي اي اننا سوف نقوم بتسخدام جهاز الكمبيوتر هكر ببجي للكمبيوتر لكي تستطيع تهكير ببجي موبايل "PUBG Mobile"

هكر تحديد اللاعبين في ببجي لجميع الأجهزة تهكير لعبه ببجي HACK PUBG MOBILE 2019

عشاق لعبه ببجي موبايل اذا كنت تبحث عن طريقه لتهكير لعبه ببجي فهاذا الموضوع مناسب لك للغايه سوف اقم لكم برنامج HACK PUBG MOBILE وهوا هكر تحديد الاعبيين في ببجي وايضاً يوجد به ميزات عديدة مع شرح بل فيديو لطريقه تهكير لعبه ببجي موبايل , كما ذكرنا اننا سوف نقوم بستخدام محاكي لتشغيل لعبه ببجي هكر ببجي للكمبيوتر ويمكنك استخدام اي محاكي تريده كيف تشغيل هكر ببجي على ويندوز 10 وايضاً قمنا بطرح مواضيع عديده حول تحكير لعبه ببجي اذا كنت تفضل استخدام Hack PUBG للايفون والأندرويد ويمكنك مشاهدة تهكير لعبه ببجي قبل البدء في الشرح من خلال هاذه المواضيع  هكر ببجي طريقة تهكير لعبة ببجي للأيفون 2019
وايضاً لا تنسى مشاهدة هاذا الموضوع حول هكر لعبه ببجي للايفون والأندرويد بدون باند 2019 وهوا موضوع رائع حقاً

هكر ببجي للايفون والأندرويد ولجميع الأجهزة بدون باند

هاذا مجموعه هاكات لتهكير ببجي موبايل على الأندرويد والأيفون ايضاً بدون جيلبريك او روت وبدون باند على الأطلاق وتعتبر هاذه المجموعه محدثه وتوافقه مع جميه نسخ لعبه ببجي اي يمكنك تهكير ببجي بدون اي مشاكل وبمييزات ممتازة

هكر ببجي موبايل محاكي هكر ببجي موبايل على الويندوز بدون باند Hack PUBG

هاذا البرامج يمكنك استخدامها على الويندوز بستخدام محاكي بطبع وما يجعله مميز انه متوافق مع جميع نسخ ببجي موبايل ويوجد به مميزات جبارة مثل هكر تحديد الاعبين في ببجي والقفز لمسافات طويله ومميزات كبيرة وضخمه اكتشفها بنفسك

تحميل هكر ببجي موبايل بستخدام محاكي ببجي Hacl PUPG

هاذه كانت مجموعه بسيطه يمكنك استخدامها في تهكير لعبه ببجي على الأيفون وجميع الأجهزة او بستخدام محاكي اذا كان لديك اي استفسار او مشكله لا تنسى اخبارنا في قسم التعليقات اسفل الصفحه اخوكم Shadow Hacker


كيفية اختراق الشبكات اللاسلكية الواي فاي باستخدام أجهزة هاتف Android


السلام عليكم متابعين قناة ومدونة Shadow Hacker هل تريد اختبار أمن شبكة الإنترنت وتعلم أختراق WIFI بستخدام الهاتف الأندرويد ؟ اذاً هذا المقال سوف يكون مفيداً لك , كنت تحتاج في السابق إلى نظام تشغيل مثل: الويندوز أو لينكس، مع بطاقة إنترنت لاسلكي مثل ALFA ، من أجل القيام بأختبار أختراق الواي فاي . لكن الآن، على خلاف ذلك، أصبح من الممكن استخدام بعض أجهزة الأندرويد في فحص وكسر حماية الشبكات اللاسلكية. وسرقة الباسوورد الشبكات هذه الأدوات متاحة للاستخدام المجاني، بشرط أن يكون جهازك متوافقًا معها. اختراق أجهزة الراوتر

كيفية اختراق الشبكات اللاسلكية الواي فاي باستخدام أجهزة هاتف Android

الطريقة الأولى أجهزة راوتر WEP

التحكم الجذري (Root) في جهاز أندرويد متوافق مع التطبيق. لا يمكن لكل الهواتف والأجهزة اللوحية التي تعمل بنظام Android القيام بأختراق الباسوورد نظام WPS. يجب أن يمتلك الجهاز بطاقة شبكة لاسلكية من نوع Broadcom bcm4329 

أو bcm4330، بالإضافة إلى التحكم الجذري في جهاز الأندرويد (Root) وهو ما يعني القدرة على التحكم في برمجيات الهاتف الذكي على مستوى متقدم وأعمق مما يتيحه الشكل الأساسي المُقدم من قبل مُصنع الهاتف. يمكنك الاعتماد على توزيعة سيانوجين مود Cyanogen ROM؛ التي تضمن لك أفضل نسب النجاح في تحقيق غرضك. من بين الأجهزة المعروف دعمها لهذه 
Nexus 7
Galaxy S1/S2/S3/S4/S5
Galaxy y
Nexus One
Desire HD
Micromax A67

تحميل وتثبيت تطبيق Bcmon. تسمح لك هذه الأداة بتفعيل وضع المراقبة (Monitor Mode) في بطاقة Broadcom وهو الأمر الأساسي لكي تتمكن من كسر كلمة المرور. يمكنك تنزيل تطبيق bcmon مجانًا كملف بصيغة APK من صفحة التطبيق الرسمية في موقع Google Code.
لكي تقدر على تثبيت الملف بصيغة APK، سوف تحتاج إلى ضبط خيارات قائمة الأمان والحماية والسماح بتثبيت التطبيقات المنزلة على جهاز الهاتف من المصادر غير المضمونة وغير المعتمدة بشكل طبيعي من قبل نظام تشغيل الهاتف الافتراضي.

تشغيل تطبيق Bcmon. بعد الانتهاء من تثبيت ملف APK، قم بتشغيل التطبيق. قم بتثبيت أي برمجيات أو أدوات إضافية، إن طلب منك ذلك. انقر على خيار "تفعيل وضع المراقبة". إذا انهار التطبيق، قم بفتحه وحاول من جديد. إن انهار التطبيق للمرة الثالثة، فعلى الأغلب أن جهازك غير متوافق مع التطبيق.
يجب أن يكون الجهاز في وضعية التحكم الجذري (Rooted) لكي يقدر على تشغيل تطبيق Bcmon.

انقر على خيار "تشغيل سطر الأوامر" (Run bcmon terminal). سوف يؤدّي ذلك إلى تشغيل سطر أوامر مشابه لسطر أوامر نظام لينكس. اكتب الأمر airodump-ng ثم اضغط على زر الإدخال. سيؤدّي ذلك إلى تحميل أداة AIrdump وسيتم نقلك إلى سطر الأوامر من جديد. اكتب الأمر airodump-ng wlan0 ثم انقر على زر الإدخال.

قم بتحديد "نقطة الوصول Access Point" التي ترغب بكسر حمايتها. سوف تظهر لك قائمة بنقاط الوصول المتاحة. يتوجب عليك اختيار نقطة وصول تستخدم نظام التشفير WEP؛ لكي تقدر على تنفيذ الخطوات الواردة في هذا القسم من المقال.

لاحظ عنوان (ماك MAC) الذي سوف يظهر لك. انتبه إلى أن المقصود هو عنوان التحكم في الوسائط الخاص بالرواتر وليس نظام التشغيل Mac. الرقم الظاهر أمامك هو رقم مميز عالميًا ويفترض ألا توجد أي بطاقة شبكة إنترنت أخرى بنفس عنوان الماك. احرص على كتابة العنوان الصحيح في حالة ظهر لك أكثر من عنوان للعديد من أجهزة الراوتر. يمكنك أن تكتب هذا العنوان في مكان خارجي.

انتبه كذلك إلى القناة التي تقوم "نقطة الوصول" بالبث من عليها.

ابدأ عملية مسح القناة. سوف يتوجب عليك جمع معلومات من "نقطة الوصول" لبضع ساعات، قبل أن تتمكن من بدء محاولات كسر كلمة المرور. اكتب الأمر airodump-ng -c channel# --bssid MAC address -w output ath0، ثم انقر على زر الإدخال. سيبدأ تطبيق Airodump بعملية المسح. يمكنك ترك الجهاز لبعض الوقت أثناء جمعه للمعلومات. احرص على توصيل الجهاز بالشاحن إن كانت البطارية منخفضة.

استبدل channel# برقم القناة التي تستخدمها نقطة الوصول للبث.
استبدل MAC address بعنوان MAC الخاص بجهاز الراوتر (مثلًا 00:0a:95:9d:68:16).

استمر بمسح القناة حتى تصل إلى ما بين 20,000 إلى 30,000 حزمة على الأقل.

اكسر كلمة المرور. يمكنك البدء بمحاولة كسر كلمة المرور بعد امتلاك عدد مناسب من حزم البيانات. ارجع إلى سطر الأوامر واكتب الأمرaircrack-ng output*.cap ثم انقر على زر الإدخال.

لاحظ كلمة المرور المكتوبة بالنظام السداسي العشري عند الانتهاء. ستظهر الرسالة Key Found! متبوعة بكلمة المرور بالنظام السداسي العشري عند انتهاء عملية كسر كلمة السر (التي قد تتطلب عدة ساعات). تأكد من أن نسبة الاحتمالية "Probability" تساوي 100% وإلا فإن كلمة المرور لن تعمل. [١]

لا تقم بإدخال الرمز ":" عند إدخال كلمة المرور. إن كانت كلمة المرور 12:34:56:78:90 مثلًا، اكتب 1234567890.

الطريقة الثانية أجهزة الراوتر المؤمنة بتشفير WPA2 WPS

تشغيل تطبيق Bcmon. بعد الانتهاء من تثبيت ملف APK، قم بتشغيل التطبيق. قم بتثبيت أي برمجيات أو أدوات إضافية، إن طلب منك ذلك. انقر على خيار "تفعيل وضع المراقبة". إذا انهار التطبيق، قم بفتحه وحاول من جديد. إن انهار التطبيق للمرة الثالثة، فعلى الأغلب أن جهازك غير متوافق مع التطبيق.

يجب أن يكون الجهاز في وضعية التحكم الجذري (Rooted) لكي يقدر على تشغيل تطبيق Bcmon.

تحميل وتثبيت تطبيق Reaver. وهو أحد البرمجيات المصمّمة لكسر كلمات السر المشفرة بنظام WPS؛ بهدف استرجاع كلمة مرور تشفير WPA2. يمكنك تنزيل تطبيق Reaver بصيغة ملف APK من الموضوع الرسمي للمطوّر في منتديات "XDA-developers".

شغّل تطبيق Reaver. انقر على أيقونة التطبيق من قائمة التطبيقات. سيتوجب عليك تأكيد عدم استخدام التطبيق لأهداف غير مشروعة أولًا، ثم سيقوم التطبيق بالبحث عن الشبكات المتاحة. انقر على اسم نقطة الوصول التي ترغب بكسر حمايتها للاستمرار.

قد يتوجب عليك تأكيد وضع المراقبة (Monitor Mode) قبل الاستمرار. سيؤدّي ذلك إلى فتح تطبيق bcmon مجددًا في هذه الحالة.
يجب أن تقبل نقطة الوصول التي تختارها المصادقة بواسطة WPS. لا تدعم كل أجهزة الراوتر هذه الخاصية.

قم بالتأكد من إعداداتك. يمكنك الاعتماد على الإعدادات الافتراضية في أغلب الحالات. سوف تحتاج إلى التأكد من تفعيل صندوق الإعدادات التلقائية المتقدّمة (Automatic advanced settings).

ابدأ عملية كسر كلمة المرور. انقر على زر بدء الهجوم (Start attack)، الموجود أسفل قائمة إعدادات Reaver. سوف تظهر لك شاشة، تعرض نتائج عملية الكسر الحالية.

قد تتطلب عملية كسر كلمة مرور WPS ما بين ساعتين إلى 10 ساعات أو أكثر وقد لا تنجح هذه العملية دائمًا. [٢]
الى هنا انتهى المقال Shadow Hacker


اوامر تطبيق تيرمكس لنظام ALL TERMUX COMMANDS


اوامر تطبيق تيرمكس لنظام ALL TERMUX COMMANDS

السلام عليكم متابعين قناة ومدونة شادو هكر , لقد قمنا في السابق بطرح مواضيع عديدة من ادوات واوامر مساعدة في تطبيق تيرمكس Termux للاختراق والهكر والعديد من الأمور ويمكنك الأطلاق عليها من خلال القسم الخاص في تطبيق تيرمكس Termux المتعلقه في الهكر والأختراق ويوجد بها العديد من الأدوات التي تساعدك على فهم وشرح تطبيق Termux TERMUX COMMANDS يمكنك زيارة قسم تطبيق تيرمكس من هنا Termux ويمكنك مشاهدة موضوع جميع اوامر تطبيق termux للاختراق All termux commands لكن اليوم سوف نتعرف على اوامر جديده خاصه في تطبيق تيرمكس TERMUX COMMANDS تساعدك على التحكم في بيئه تطبيق تيرمكس والتعرف على وظيفه الأوامر الموجودة بها وغالباً هاذه المجموعة الأخيرة التي سوف اضيفها فيما يخص اوامر تكبيق Termux
جميع اوامر تطبيق تيرمكس Termux
جميع أوامر تطبيق تيرمكس ALL TERMUX COMMANDS
في البدايه يمكنك ايضاً متابعه المقال الخاص على موقع شادو هكر حول اوامر المستخدمه في تطبيق Termux TERMUX COMMANDS  للاختراق وشرح الأوامر بلعربيه وما وظيفة كل أمر شرح جميع اوامر termux للاختراق وكيفية أستخدامة | How to use Termux in Android  وهاذه الأوامر مهمه جداً ويجب عليك مشاهدة الموضوع لفهم طبيعة عمل تطبيق تيرمكس

ما هوا تطبيق Termux

Termux هو تطبيق مجاني ومفتوح المصدر يقوم بمحاكاة واجهة الأوامر المستَخدمة في نظام تشغيل Linux. وعن طريق القيام بذلك، يمكنك إدخال جميع الأوامر المعتادة والعمل بشكل مريح من خلال جهاز أندرويد الخاص بك.يحتوي التطبيق على تحديثات عديدة من تطبيق Android Terminal Emulator الكلاسيكي، مثل إمكانية النفاذ إلى مكتبة ضخمة من باقات Linux لتثبيت البرامج مباشرة من الجهاز، بالإضافة إلى بعض مختصرات لوحة المفاتيح التي تم تحديثها لتشكل توليفات مع أزرار التحكم بالصوت وأزرار الغلق/الفتح. كما إنها متوافقة مع مختلف أنواع لوحات المفاتيح الخارجية.فسواء كنت تعمل مع con NodeJS، أو Ruby، أو Python أو كنت مضطرًا للاتصال بخوادم عبر SSH، فإن Termux يمكنه مساعدتك بفضل قدرته على إدارة الباقات كما لو كنت جالسًا أمام جهاز الكمبيوتر على سطح المكتب الخاص بك - ولكن مع تعددية مريحة في استخدام نظام تشغيل Linux على جهاز أندرويد بمكونات قوية بما يكفي لإتمام أي مهمة.

الأن بعدما تعرفنا على تطبيق تيرمكس وما هي وظائفه الأن دعوني اعرض عليكم بعض من الأوامر التي تستخدمها داخل التطبيق وهي مهمه جداً من اوامر الأختراق والتنقل بين الملفات وغيرها من الأوامر تطبيق Termux المفيدة
./ more
2to3 mpicalc
2to3-2.7 mpstat
2to3-3.7 mv
: nc
[ netstat
[[ nice
]] nmeter
alias nohup
am nproc
apt od
apt-cache patch
apt-config pdftexi2dvi
apt-get perl
apt-key perlbug
apt-mark perldoc
ar perlivp
arp perlthanks
awk pgrep
base64 piconv
basename pidof
bash ping
bbconfig ping6
bg pip
bind pip2
break pip2.7
builtin pip3
bunzip2 pip3.7
busybox pipe_progress
bzip2 pkg
caca-config pkill
cacaclock pl2pm
cacademo pm
cacafire pmap
cacaplay pod2html
cacaserver pod2man
cacaview pod2texi
cal pod2text
caller pod2usage
case podchecker
cat podselect
cd popd
chattr popmaildir
chgrp printenv
chkfont printf
chmod prove
chown ps
chpst pscan
cksum ptardiff
clear ptargrep
cmp pushd
comm pwd
command pwdx
command_not_found_handle pydoc
compgen pydoc2
complete pydoc2.7
compopt pydoc3
continue pydoc3.7
coproc python
corelist python-config
cp python2
cpan python2-config
cpio python2.7
crond python2.7-config
crontab python3
cut python3-config
dalvikvm python3.7
dash python3.7-config
date python3.7m
dc python3.7m-config
dd pyvenv
declare pyvenv-3.7
df read
diff readarray
dirname readlink
dirs readonly
disown realpath
do reformime
done renice
dos2unix reset
dpkg resize
dpkg-deb return
dpkg-divert rev
dpkg-genbuildinfo rm
dpkg-query rmdir
dpkg-split route
dpkg-trigger run-parts
du runsv
dumpsexp runsvdir
easy_install rx
easy_install-2.7 script
easy_install-3.7 scriptreplay
echo sed
egrep select
elif sendmail
else seq
enable set
enc2xs setsid
encguess settings
env setuidgid
envdir sh
esac sha1sum
eval sha256sum
exec sha3sum
exit sha512sum
expand shasum
export shift
expr shopt
false showfigfonts
fc shuf
fg sleep
fi smemcap
figlet softlimit
figlist sort
find source
fold splain
for split
free start-stop-daemon
fsync strings
ftpd stty
ftpget su
ftpput sum
function suspend
fuser sv
gawk svlogd
gawklibpath_append sync
gawklibpath_default sysctl
gawklibpath_prepend tac
gawkpath_append tail
gawkpath_default tar
gawkpath_prepend tcpsvd
gdbm_dump tee
gdbm_load telnet
gdbmtool telnetd
getopt termux-fix-shebang
getopts termux-info
getprop termux-open
git termux-open-url
git-receive-pack termux-reload-settings
git-upload-archive termux-setup-storage
git-upload-pack termux-wake-lock
gpg-error termux-wake-unlock
gpg-error-config test
gpgrt-config texi2any
gpgv texi2dvi
grep texi2pdf
gunzip texindex
gzip tftp
h2ph tftpd
h2xs then
hash time
hd timeout
head times
help toilet
hexdump top
history touch
hmac256 tr
hostname trap
httpd true
id tty
if ttysize
ifconfig type
img2txt typeset
in udpsvd
info ulimit
inotifyd umask
install unalias
install-info uname
instmodsh uncompress
iostat unexpand
ip uniq
ipcalc unix2dos
jobs unlink
json_pp unlzma
kill unset
killall until
less unxz
lessecho unzip
lesskey uptime
let usleep
libgcrypt-config uudecode
libnetcfg uuencode
linux32 vi
linux64 wait
ln watch
local wc
logcat wget
login which
logout while
ls whoami
lsattr whois
lsof xargs
lsusb xdg-open
lzma xsubpp
makeinfo xz
makemime yat2m
mapfile yes
md5sum zipdetails
mkdir {
mkfifo }
هاذة كانت بعض من اوامر تطبيق تيرمكس TERMUX COMMANDS التي يمكنك استخدامها داخل التطبيق , الى هنا انتهى المقال اتمنى قد نال على اعجابكم ورضاكم ولا تنسى مشاركه المقال مع اصدقائك لكي تعم الفائدة للجميع اخوكم طارق Shadow Hacker دمتم في امان الله


مفاهيم ومصطلاحات الكريدت كارد - Credit Card وكيف تعرف الفيزا شغاله ام لا

السلام عليكم متابعين قناة ومدونة Shadow Hacker , عالم الأموال والبرح من الأنترنت والنقود وغيرها من اكثر الأشياء التي يهتم بها البعض لذا سوف نقوم بشرح اليوم عن الفيزا والماستر كارد وكيف تعمل وكيف تعرف ان الفيزا شغاله ام لا وتشتري بها من الأنترنت وما هي مميزات الفيزا والوماستر كارد وكيف تحصل على ماستر كارد وفيزا مجاناً كل هاذا سوف نتعرف عليه من خلال هاذا المقال المفصل وشرح خصائص بطاقة الكريدت كارد الفيزا والماستر كارد وكيف تحصل على المال ويمكنك مشاهدة موضوع الخاص موقع فحص الفيزا شغاله او لا ومواقع تعطيك فيزا وهمية لشراء Credit Card 2019
كيف تعرف ان الفيزا شغاله ام لا وطريقه الشراء بفيزا مسروقة

مفاهيم ومصطلاحات الكريدت كارد - Credit Card وكيف تعرف الفيزا شغاله ام لا

في هاذا المقال سوف نتعرف على بعض المصطلاحات التي تستخدم في السبام والبطاقات المصرفيه والفرق بينهم وما هي الأفضل بين هاذه البطاقات وفيما تستخدم اولاً الـ CC  والـ FullZ او Full info ماذ تعني المطلحات و الفرواق بينها هذا الموضوع يفيدك عند فرز الريزولت او حتى عند شراء البطاقات  الـ CC او CCV تطلق على معلومات البطاقة التي تقتصر  على البيانات التالية

اسم حامل البطاقة
رقم البطاقة
تاريخ الانتهاء
الـ CVV (ثلاث ارقام مطبوعة خل البطاقة)
عنوان حامل البطاقة
في بعض الاحيان رقم صاحب البطاقة
ايميل صاحب البطاقة
توضيح الفرواق , اول شي ارقام البطاقات

البطاقات الي تبدأ برقم 3 هذي AMEX

البطاقات الي تبدأ برقم 4 هذي VISA

البطاقات الي تبدأ برقم 5 هذي Master Card

البطاقات الي تبدأ برقم 6 هذي Discover


تطلق على البطاقات بشكل عام وفي منها نوعين

Credit card

هذي البطاقات الإئتمانية يكون الشخص مطلعها من البنك
ومثلا لها Limit عشر الاف دولار

الشخص يصرفها بعدين يسدد البنك

Debit Card

هذي البطاقات الشخص يودع فيها مبلغ مقطوع او يتم سحب المبلغ المقطوع من حسابك البنكي مباشرة

virtual credit card
بطاقات فيزا افتراضية

Bank Account
حساب بنكي

virtual bank account
حساب بنكي افتراضي

ثلاث او اربع ارقام مطبوعة خلف البطاقة

Billing address
عنوان الدفع (عنوان مالك البطاقة)

شخص او شركة او حساب يتم تحويل الاموال المشبوهة او السلع اليه ثم يعاد تحويلها اليك بصورة نظيفة

حامل البطاقة

صلاحية البطاقة

Address Verification Service
خدمة التحقق من العنوان
(خدمة تقدمها بعض البنوك لتأكيد ان عنوان الشحن هو نفسه عنوان الدفع )
تاريخ انتهاء البطاقة

اول 6 ارقام من البطاقة
ومن خلالها ممكن نعرف البنك المصدر + نوع وفئة البطاقة

Social Security Number
رقم الضمان الاجتماعي
يستعمل في كثير حالات للتحقق انك مالك البطاقة

Date Of Birth
تاريخ الميلاد وبرضه يستخدم للتحقق

الان نأتي لمصطلحين مهمين جدا للغاية

verified by visa
مضمون بواسطة فيزا
مضمون مع فيزا

هذا معناه ان البطاقة عليها طبقة حماية

لا تتم اي عملية شراء من الانترنت الا عن طريق ادخل رقم سري PIN

الرقم هذا اما يكون ثابت في كل عملية شراء وهذا الرائج وسهل تخطيه بمعرفة الكود

والنوع الثاني عن طريق ارسال رسالة الى جوال حامل البطاقة تحتوي على كود جديد لكل عملية شراء وهذا صعب تخطيه

mastercard securecode
تأمين البطاقة من ماستر كارد

وهذا غالبا يكون رقم سري ثابت او اخر اربع ارقام من SSN

طرق تخطي الـ VBV, MSCS

الطريق المختصر انت تبحث عن بائع يبيع بطاقات

يعني بطاقات مو مشتركة بالخدمة سواء من فيزا او ماستر كارد

واستغرب كثير من الاخوان هنا بحث عن بطاقات VBV
لا اعلم مالحكمة

الطريقة الثانية
استخدام مواقع لا تعتمد الـ 3D Secure

في كثير مواقع لا تعمتد في عمليات الشراء على 3d secure
فيتم خصم المبلغ مباشرة من البطاقة بدون الرجع الى اي طبقة حماية

الطريقة الثالثة

معرفة كافة التفاصيل عن البطاقة وحاملها
يعني ممكن انت عن طريق السكامة تخليه يحط كلمة المرور

او في حالات اخرى يكون عندك رقم الضمان الاجتماعي او تاريخ حامل البطاقة

غالبا مايتم تخطي الحماية اذا تواجدت عندك معلومات الضمان الاجتماعي او تاريخ الميلاد

انواع البطاقات وحدودها

3 - American Express
4 - Visa
5 - MasterCard
6 - Discover

الارقام تبين بدايات البطاقة

يعني اذا البطاقة بدت بـ 6 يعني Disco وهكذا

كل شركة لها انواع بطاقات معينة ورح احاول اوضحها في هذا الموضوع



1- Classic
هذا اشهر نوع من عند فيزا
وهي اكثر بطاقة منتشرة في جميع الدول
حدود البطاقات هذي غالبا تكون بسيطة
لان اغلب ملاكها من اصحاب الدخل المتوسط

2- Gold
بطاقة مشهورة بس بشكل اقل من Classic وحدودها كبيرة

3- Platinum
موجودة في كثير دول
وحدودها غالبا ماتكون 10 الاف دولار تقريبا

4- Signature
بطاقة ممتازة جدا حدودها تعتمد على مرتب الشخص
وغالبا ماتصدر الا لاصحاب المرتبات العالية

5- Infinite
بطاقة نادرة وتكريدها صعب
وغالبا تكون بدون حد

6- Business
بطاقات لاصحاب المشاريع المتوسطة
وغالبا تكون حدودها ممتازة

7- Corporate
هذي للمشاريع الكبيرة
حدودها اعلى من Business

8- Black
بطاقة حصرية لا تصدر الا لفئة معينة من الناس $$$$$ مبادئ ومصطلحات الكريدت كارد Credit Card مجال السبام
رسومها السنوية 500 دولار
غير محدودة مطلقا


ماستر كارد

1- Standard
مثل الفيزا كلاسيك

2- Gold
مثل الفيزا Gold

3- Platinum
مثل الفيزا البلاتينيوم

4- World
بطاقة حدودها مرتفعه جدا

5- World Elite
بدون حدود مطلقا



1- Gold
غالبا حدودها 10 الاف دولار

2- Plat
تقريبا 35 الف دولار

3- Centurion
حدودها تبدأ من 75 الف دولار وانت طالع



ماعندي معلومات وافية عنها


السؤال الي يتبادر الى اذهانكم

كيف اعرف نوعية البطاقة الي معي ؟

استعمل هذا الموقع من هنا

حط اول 6 ارقام من البطاقة

ورح يطلع لك نوع البطاقة وفئتها والدولة والبنك المصدر


طبعا هذي الفئات الاساسية وفي فئات مختلفة لكن هذي الأشهر والاكثر انتشارا حول العالم


« Le fonctionnement des bureaucraties va de plus en plus être confié à des machines plutôt qu'à des humains »


La convergence d'intérêts actuelle entre les géants du Net et les Etats dans leurs volontés de surveillance et de censure met en péril l'idéal démocratique, selon Félix Tréguer, activiste à la Quadrature du net et chercheur. Entretien.
Basta ! : Le livre s'appelle L'utopie déchue, n'est-ce pas pessimiste comme titre ? Est-ce votre vision de l'Internet aujourd'hui ?
Félix Tréguer [1] : Le mouvement hacker et plus généralement les mouvements de défense des droits numériques se sont nourris d'utopies (...)


Debian Developer on Raspbian and Red Hat on Raspberry Pi in the Classroom

  • Cleanup Raspbian

    This is part of a series of post on the design and technical steps of creating Himblick, a digital signage box based on the Raspberry Pi 4.

    Rapsbian is designed to be an interactive system, but we want to build a noninteractive black box out of it, which should never ever get a keyboard plug into it. See the "Museum ceiling" use case.

    Ideally we should use a plain Debian as a base, but the Raspberry Pi model 4 is not supported yet for that.

    Instead, we start from Raspbian Lite, and remove the bits that get in the way.

  • Open Source Stories: Early Adopters: Raspberry Pi in the Classroom

    Google “Raspberry Pi projects,” and you’ll get a diverse set of results: Home automation systems, weather data stations, time-lapse cameras, retro video game systems, a staircase that plays music as you climb.

    The accessibility and versatility that make the Pi a must-have for hackers and makers also render it indispensable for educators seeking to bring science and technology to life.

    Launched in 2012 by the United Kingdom-based Raspberry Pi Foundation, the Pi is a single-board computer that retails for about US$35. It was designed to make computer science more accessible to students, according to Matt Richardson, Executive Director, Raspberry Pi Foundation North America.


Princesses make terrible passwords – quite possible Disney+ hacks related to this being your password.

If you used the same password for an account that was previously breached as you did for your Disney+ password, a bad actor could gain access. Furthermore, hackers with stolen datasets at their fingertips could easily filter on key terms to find the Disney fans. Just look how many times the 12 Disney princesses showed Read more about Princesses make terrible passwords – quite possible Disney+ hacks related to this being your password.[…]

Cayman Bank Targeted By Phineas Fisher Confirms it Was Hacked – 2 TB of data can be searched through now, find the money launderers

On Sunday, Motherboard reported that the hacker or hackers known as Phineas Fisher targeted a bank, stole money and documents, and is offering other hackers $100,000 to carry out politically motivated hacks. Now, the bank Phineas Fisher targeted, Cayman National Bank from the Isle of Man, confirmed it has suffered a data breach. “It is Read more about Cayman Bank Targeted By Phineas Fisher Confirms it Was Hacked – 2 TB of data can be searched through now, find the money launderers[…]

Spermbirds, Loaded, Kick Joneses – Kaiserslautern/Kammgarn, 15.11.2019


Es hat für mich etwas von einer Strafe, dass ich nicht schon einen Tag vorher in Karlsruhe in der Alten Hackerei bei dem Konzert dabei sein konnte,weil ich einer privaten Verpflichtung nachkommen musste. Aber gut, [...]

Der Beitrag Spermbirds, Loaded, Kick Joneses – Kaiserslautern/Kammgarn, 15.11.2019 erschien zuerst auf Polytox.


7 Signs It’s Time To Get Focused On Zero Trust

When an experienced hacker can gain access to a company’s accounting and financial systems in 7 minutes or less after obtaining privileged access credentials, according to Ponemon, it’s time to get focused on Zero Trust Security. 2019 is on its way to being a record year for ransomware attacks, which grew 118% in Q1 of […]

La cité des jarres, à la rencontre d'Erlendur, Islandais jusqu'au bout de l'enquête

POLAR ETRANGER - En rentrant à son domicile, au premier étage d'un petit immeuble de Nordurmyri, un quartier excentré de Reykjavik, l'homme, qui avait pris ses enfants au sortir de l'école, fut assez étonné de voir la porte de l'appartement du sous-sol inhabituellement ouverte. Appelant depuis le seuil et sans succès l'occupant qu'il ne connaissait que de vue, il ne fut pas assez vif pour empêcher son fils aîné de pénétrer dans l'appartement ouvert, ce qui valut à ce dernier de se trouver face au corps inerte et ensanglanté de Monsieur Holberg, au milieu du salon.

La police prévenue et les premières constatations effectuées, le meurtre fut rapidement identifié comme cause du décès du vieil homme habitant seul dans cet appartement.
Ce qui empêchait l'inspecteur Erlendur Sveinsson de considérer, comme ses collègues, cette mort comme étant le résultat d'un « crime à l'islandaise », à savoir « violent, bête et méchant », c'étaient ces trois mots au sens incompréhensible, rapidement écrits au crayon à papier sur une feuille posée sur le cadavre.
L'absence d'effraction à la porte, l'absence apparente de vol dans l'appartement, la porte ouverte dénotant un départ précipité, le cendrier qui avait servi d'arme, tout le ramenait à la conviction d'un acte sans préméditation mais que le meurtrier avait voulu quand même qualifier.
Et quand l'ordinateur récent retrouvé sur un bureau a fourni aux enquêteurs pléthore de fichiers à caractère pornographique, dans tous les excès déviants que les vidéos ont pu dévoiler aux policiers, Erlendur se demandait déjà quel genre d'homme pouvait bien se cacher derrière ce voisin tranquille retrouvé assassiné : l'élucidation du meurtre risquait de ne pas être un long fleuve tranquille, elle non plus...
Rentré chez lui, Erlendur eut encore à affronter Eva Lind, sa fille, qui tentait vainement de décrocher d'une addiction à la drogue et avec laquelle il peinait à trouver le bon ton de discussion. Résultat : elle était partie en claquant la porte, le laissant seul devant un repas devenu froid qu'il n'avait même plus envie de manger.
Arnaldur Indridason est, bien sûr, loin d'être un inconnu dans le milieu du roman policier et chacun de ses nouveaux ouvrages ne manque pas d'attirer les amateurs du genre ; shootés aux atmosphères froides, brumeuses autant qu'inquiétantes des polars à l'islandaise.
Sans être un « addict » inconditionnel, j'ai toujours apprécié ses romans et son emblématique inspecteur aux manières assez peu conventionnelles.
C'est pour cela que j'ai plongé sans retenue dans l'un de ses premiers romans (sinon le premier si je ne me trompe pas) qui m'avait encore échappé (mais il va falloir que je vérifie qu'il n'y en a pas encore toute une ribambelle vue sa production déjà assez significative).
Le scénario se cale peu à peu sur un intéressant sujet sociétal assez sensible qui concerne la constitution de banques d'organes et de tissus humains prélevés sur des personnes décédées et destinées à des fins de recherche et d’enseignement, dans des temps où ces prélèvements n'étaient pas encore encadrés par des dispositions législatives. Mais il s'agit aussi de la protection, plus récemment devenue prégnante, des données personnelles associées à ces prélèvements, et rendues d'autant plus vaporeuses que la prolifération tentaculaire du numérique s'avère parfois bien perméable aux hackers en tous genres...
Tout cela sert de toile de fond, ciselée aux petits oignons, à une passionnante intrigue dont les origines sont bien loin et bien proches de ce meurtre sur lequel s’ouvrent les premières pages du livre.
Le personnage d'Erlendur, qui deviendra, au fil des romans, le héros récurrent d'Arnaldur Indridason commence déjà à dessiner son profil atypique et si caractéristique, même si les cercles personnels des grands flics récurrents du polar sont tous, plus ou moins, devenus un peu stéréotypés avec leurs travers, leurs vies, leurs em...rdes du quotidien, leur humanité assez loin des icônes plus anciennes.
Pas de problème, Erlendur va vous emmener au bout de cette enquête passionnante, historique, sociale, un brin philosophique et, de fait, très actuelle et très engagée dans la dénonciation des violences faites aux femmes.
Inconditionnels ou pas, si vous n'avez pas encore lu ce livre, n'hésitez pas à vous lancer à votre tour.

Arnaldur Indridason, trad. islandais Eric Boury - La cité des jarres - Points - 9782757800232 - 7,50 €


Datenleck bei bekanntem Streamingdienst: 20 Millionen Accounts offen

Die bekannte Streaming-App Mixcloud war von einem großen Datenleck betroffen. In Untergrund-Foren verkauft ein Hacker …

After FB post, Pankaja removes BJP from Twitter bio

In her three recent tweets posted on November 28, she congratulated Maharashtra's new Chief Minister Uddhav Thackeray but not the government formed by the Shiv Sena, Nationalist Congress Party and Congress.

CM Uddhav withdraws cases against Aarey activists

After taking charge as the chief minister on November 29, Thackeray, who heads the Shiv Sena-Nationalist Congress Party-Congress government, had announced stay on construction of the metrocar shed project in the colony, a prime green lung of the city

I'm still with Hindutva: Uddhav in Maha assembly

Describing Fadnavis as a friend, Thackeray also said he does not view him as opposition leader.

Cong's Nana Patole elected Maha Speaker unopposed

Thackeray and BJP legislature party leader Devendra Fadnavis lauded Patole's work as legislator and farmers' leader.

Thackeray sails through floor test; BJP MLAs skip vote

Altogether 169 MLAs vote in favour of the motion of confidence, pro tem Speaker Dilip Walse Patil informed the House.

Uddhav Thackeray govt to face floor test today

The government is expected to have a smooth sailing in the floor test, a Vidhan Bhawan official told PTI.

Thackeray stays Aarey metro carshed work

Thackeray said not a single tree leaf will be cut till further developments.

Uddhav takes charge, floor test likely tomorrow

Governor B K Koshyari has asked Thackeray to prove majority by December 3.

Uddhav Thackeray is not a slave of Delhi: Sena

Modi must co-operate with "younger brother" Uddhav, the Shiv Sena said in its mouthpiece 'Saamana'.

Thackeray Sarkar: Uddhav sworn in mega event

Thackeray, 59, became the third Sena leader after Manohar Joshi and Narayan Rane to occupy the top post.

Ambanis, Raj Thackeray attend Uddhav's swearing-in

The event witnessed the who's who of Maharashtra politics -- including three former chief ministers of Maharashtra.

Experienced hands Bhujbal, Thorat make it to cabinet

Chhagan Bhujbal, Jayant Patil (both from the NCP), Balasaheb Thorat and Nitin Raut (both from the Congress), Eknath Shinde and Subhash Desai (both from the Sena) took oath as ministers along with Thackeray.

6 former Maha CMs attend Thackeray's swearing-in

Interestingly, among all the six former CMs, only Fadnavis, the first BJP leader to hold the top post in the state, completed full five-year term.

'This is the beginning of a new political era'

Leaders from across the political spectrum came out and congratulated Shiv Sena chief Uddhav Thackeray after he was sworn in as the Maharashtra chief minister.

Shiv Sena has a history of flirting with 'frenemies'

Besides late Shiv Sena supremo Bal Thackeray and former prime minister Indira Gandhi, NCP president Sharad Pawar also figured in the posters.

Bal Thackeray lookalike major draw at swearing-in

A white shawl draped on his left shoulder, rudraksha beads around his neck, red tilak on the forehead and sporting dark sunglasses, Kantilal Mishra bore a striking similarity to Shiv Sena founder Bal Thackeray who had mesmerised lakhs of Shiv Sainiks.

'It was necessary for Shiv Sena to split with BJP'

'The Shiv Sena as a party was going nowhere.''Now Uddhav Thackeray has shown his partymen that he can take the BJP head on.'

PHOTOS: Shivaji Park gears up for Uddhav's swearing-in

As Shiv Sena president Uddhav Thackeray is set to take oath as chief minister of Maharashtra on Thursday, preparations are in full swing at Shivaji Park in Dadar in central Mumbai.

6 things to know about new Maharashtra government

More than the Uddhav Thackeray-led ministry, two coordination committees will approve and disapprove big projects, contracts and political decisions.

Aaditya invites Sonia, Manmohan to swearing-in

Aaditya Thackeray had a brief meeting with Gandhi at her 10 Janpath residence in New Delhi.

Bal Thackeray-Indira seen together on Sena's poster

Thackeray had also supported the Emergency imposed by Indira Gandhi in 1975 when most of the other parties were vehemently protesting against it.

Uddhav, first Thackeray to take oath as Maha CM

Thackeray would be taking over as chief minister more than a month after results of the Maharashtra Assembly elections were declared on October 24.

Uddhav calls PM, invites him to swearing-in ceremony

Thackeray spoke to the prime minister over the phone and invited him, Shiv Sena party sources confirmed.

Posters calling Ajit Pawar 'future CM' put up in Pune

The poster came up on the eve of swearing-in of Sena president and the Aghadi nominee Uddhav Thackeray in Mumbai.

BJP couldn't impose CM despite 'aghori' attempts: Raut

Raut also said it will not be surprising if the Shiv Sena forms government at the Centre after having installed its chief minister (Uddhav Thackeray) in Maharashtra.

CM-designate Uddhav Thackeray meets Governor

The Shiv Sena chief will be the first from the Thackeray family to be sworn in as the chief minister.

'Uddhav will be a very reluctant chief minister'

This will be 'an Uddhav Thackeray government controlled by a remote now held by Sharad Pawar.'

Uddhav to lead Aghadi govt, swearing-in on Thursday

'I want to thank Sonia ji also. Parties with different ideologies have come together...those who were friends for 30 years, did not trust us. But those against whom we fought for 30 years have trusted me,' Thackeray said.

Never dreamt of leading Maha: Uddhav; thanks Sonia

Thackeray said that he is ready to answer all questions raised by former chief minister and Bharatiya Janata Party leader Devendra Fadnavis as he is not 'scared' of anything.

Ajit Pawar resigns as Maharashtra deputy CM

"Ajit dada has resigned and he is with us. Uddhav Thackeray will be the chief minister of Maharashtra for five years," Shiv Sena leader Sanjay Raut said.

MLAs' parade becomes cynosure of Maha politics

NCP chief Sharad Pawar, Shiv Sena president Uddhav Thackeray and senior Congress leader Mallikarjun Kharge were among those present during the show of strength aimed at making a public statement that the three parties hold the real mandate to govern the state.

Pawar vs Pawar: Uncle-nephew tussles not new in Maha

Sharad Pawar-Ajit Pawar, Bal Thackeray-Raj Thackeray, Gopinath Munde-Dhananjay Munde. Troubled uncle-nephew relationships have rocked the boat of more than one party trying to steer its way through Maharashtra's troubled political waters with the crisis in the Nationalist Congress Party only the latest in the series.

Uddhav meets 'Renaissance Man' Pawar,NCP says game on

The Sena-NCP bonhomie was also seen after Shiv Sena leaders Eknath Shinde and Sena chief Uddhav Thackeray's Man Friday Milind Narvekar on Saturday caught Sanjay Bansod, NCP MLA from Udgir, who was set to fly out of Mumbai.

Action will be taken against Ajit: Sharad Pawar

While addressing a joint press conference with Shiv Sena chief Uddhav Thackeray in Mumbai, NCP chief Sharad Pawar paraded 3 MLAs to display that all are with him.

What next for Uddhav Thackeray?

'While it seems that the sole option left for the Shiv Sena chief is to sit in the Opposition and wait and watch, there are two other choices before him to show his party rank and file if he is a quitter or a fighter.'

Process to form Sena-led govt in final stages: Uddhav

Thackeray met the legislators to apprise them of the government formation process and meetings of Congress-Nationalist Congress Party leaders in Delhi.

Thackerays meet Pawar over Maharashtra tie-up

The Thackerays called on Pawar, a Rajya Sabha MP, after he arrived in Mumbai from New Delhi in the evening.

Congress-NCP-Sena to form govt before Dec 1: Raut

"The chief minister will be of Shiv Sena. People want Uddhav Thackeray to be the chief minister," said Raut.

Hacker Stole Unreleased Music and Then Tried To Frame Someone Else

US authorities charged a Texas man this week for hacking into the cloud accounts of two music companies and the social media account of a high-profile music producer, from where he stole unreleased songs that he later published online for free on public internet forums. From a report: When the man realized he could be caught, he contacted one of the hacked companies and tried to pin the blame on another individual. According to court documents published on Monday by the Department of Justice, the suspect is a 27-year-old named Christian Erazo, from Austin, Texas. US authorities say that Erazo worked with three other co-conspirators on a series of hacks that took place between late 2016 and April 2017. The group's primary targets were two music management companies, one located in New York, and the second in Los Angeles. According to investigators, the four hackers obtained and used employee credentials to access the companies' cloud storage accounts, from where they downloaded more than 100 unreleased songs. Most of the data came from the New York-based music label, from where the Erazo and co-conspirators stole more than 50 GBs of music. Erazo's indictment claims the group accessed the company's cloud storage account more than 2,300 times across several months.

Read more of this story at Slashdot.


ABAP/SAP UI5 Entwickler (m/w/d)


ABAP/SAP UI5 Entwickler (m/w/d) T.CON GmbH & Co. KG Berlin Du bist bei uns genau richtig, wenn Entwickeln im SAP-Umfeld (sei es in ABAP/SAP UI5) in verschiedenen Modulen deine Leidenschaft ist Du gerne Verantwortung in Projekten zur Realisierung kundenspezifischer Lösungen rund um SAP ERP und MES übernimmst;…

Der Beitrag ABAP/SAP UI5 Entwickler (m/w/d) erschien zuerst auf Hacker Jobs.


IT-Administrator (m/w/d) Sharepoint


IT-Administrator (m/w/d) Sharepoint ABG FRANKFURT HOLDING GmbH Wohnungsbau- und Beteiligungsgesellschaft mbH Frankfurt am Main Übernahme von administrativen Aufgaben im SharePoint-Umfeld (Intranet); Planung, Organisation und eigenständige Durchführung von Tests der SharePoint-Anwendungen; Erarbeitung von Anforderungsanalysen;… wir suchen zum nächstmöglichen eintritt einen it-administrator (m/w/d) sharepoint ihre aufgaben: übernahme von administrativen aufgaben im sharepoint-umfeld (intranet)  planung organisation eigenständige durchführung […]

Der Beitrag IT-Administrator (m/w/d) Sharepoint erschien zuerst auf Hacker Jobs.


IT-Anforderungsmanager (m/w/d) Handelssystem MX.3 / MLC


IT-Anforderungsmanager (m/w/d) Handelssystem MX.3 / MLC Landwirtschaftliche Rentenbank Frankfurt am Main Unterstützung der Fachbereiche im MX.3-Support bei der Lösung Murex-spezifischer Fragestellungen; Aufnahme und Prüfung fachlicher Anforderungen sowie die Nachverfolgung im Rahmen der Umsetzung;… it-anforderungsmanager (m/w/d) handelssystem mx3 / mlc das sind wir als förderbank für die agrarwirtschaft und den ländlichen raum bewegen wir uns in […]

Der Beitrag IT-Anforderungsmanager (m/w/d) Handelssystem MX.3 / MLC erschien zuerst auf Hacker Jobs.


Hard- und Softwareentwickler (m/w/d)


Hard- und Softwareentwickler (m/w/d) Lauda Dr. R. Wobser GmbH & Co. KG Lauda-Königshofen Hard- und Softwareentwicklung von Embedded Systemen, insbesondere von Mikrocontrollerbasierten Systemen; Programmierung der Mikrocontroller in C / C++, unter anderem Implementierung von Regelkreisen und Temperaturmesstechnik;… alle reden von der zukunft sie gestalten sie aktiv mit wir bei sind mit rund 500 mitarbeiterinnen und […]

Der Beitrag Hard- und Softwareentwickler (m/w/d) erschien zuerst auf Hacker Jobs.


Mitarbeiter (m/w/d) IT Helpdesk


Mitarbeiter (m/w/d) IT Helpdesk CORDEN PHARMA GmbH Plankstadt bei Heidelberg Annahme von Störungen und Servicefragen per Telefon, E-Mail und Ticket-System; Installation, Konfiguration und Support von Desktops, Notebooks, Druckern etc.; Software-Bereitstellung (SCCM);… ist seit mehr als 25 jahren erfolgreich in den bereichen entwicklung formulierung und verpackung von arzneimitteln sowie in der herstellung klinischer prüfpräparate tätig wir […]

Der Beitrag Mitarbeiter (m/w/d) IT Helpdesk erschien zuerst auf Hacker Jobs.


System Engineer (m/w/d) Client Management


System Engineer (m/w/d) Client Management Hays AG Halle Sie sind verantwortlich für die Weiterentwicklung des Digital-Workplace-Konzeptes; Sie steuern die Client-Management-Lösungen; Sie sind Ansprechpartner für Endpoint-Security-Lösungen im Client-Umfeld;…

Der Beitrag System Engineer (m/w/d) Client Management erschien zuerst auf Hacker Jobs.


Senior IT-Architekt (m/w/d) IT-Sicherheit / Encryption-Services


Senior IT-Architekt (m/w/d) IT-Sicherheit / Encryption-Services BWI GmbH Bonn Softwareentwicklung von PKI-spezifischen Anwendungen, insb. des Karten-Management-Systems (Java, SCRUM); Begleitung von Testverfahren, vor allem beim Testen und Evaluieren des Kartenmanagementsystems;… tu was du liebst jetzt die it für deutschland gestalten gestalten sie mit uns eine der größten und komplexesten it-landschaften deutschlands und unterstützen sie unser team […]

Der Beitrag Senior IT-Architekt (m/w/d) IT-Sicherheit / Encryption-Services erschien zuerst auf Hacker Jobs.


IT Provider Manager (m/w/d) Web-Lösungen, EDI-Lösungen


IT Provider Manager (m/w/d) Web-Lösungen, EDI-Lösungen VBL. Versorgungsanstalt des Bundes und der Länder Karlsruhe Als IT Provider Manager/-in (m/w/d) analysieren und qualifizieren Sie Anforderungen zur Weiterentwicklung unserer Web-, EDI-Lösungen, organisieren und bewerten Angebote unserer Service-Provider, beauftragen und steuern die Umsetzungen;… die vbl mit sitz in karlsruhe ist deutschlands größte zusatzversorgungseinrichtung für beschäftigte öffentlichen dienstes betreut […]

Der Beitrag IT Provider Manager (m/w/d) Web-Lösungen, EDI-Lösungen erschien zuerst auf Hacker Jobs.


Associate Project Director (m/w/d) HFP Projekte


Associate Project Director (m/w/d) HFP Projekte BWI GmbH Bonn, Köln, Meckenheim, München, Nürnberg Verantwortung für technische IT-Projekte von der Lösungsentwicklung bis zur Inbetriebnahme inkl. fachlicher Führung der Projektteams; Übersetzen von Kundenanforderungen in neue und bestehende IT-Prozesse/-Lösungen;… tu was du liebst jetzt die it für deutschland gestalten gestalten sie mit uns eine der größten und komplexesten […]

Der Beitrag Associate Project Director (m/w/d) HFP Projekte erschien zuerst auf Hacker Jobs.


UX / UI Designer (m/w/d)


UX / UI Designer (m/w/d) E. M. Group Holding AG Wertingen, München, Augsburg Als UI/UX Designer verantwortest Du die grafische Gestaltung und Weiterentwicklung unserer User Interfaces und trägst dafür Sorge, dass unsere Kunden eine einheitliche User Experience und herausragende Usability erfahren;… gastronomie ist unsere leidenschaft – gastronomen und hoteliers mit dem besonderen etwas auszustatten unsere […]

Der Beitrag UX / UI Designer (m/w/d) erschien zuerst auf Hacker Jobs.


AV Operations Manager (m/w/d)


AV Operations Manager (m/w/d) macom GmbH Frankfurt am Main Im Service-Level- und Eskalations-Management verantwortest Du die Überwachung der Servicequalität und steuerst nachfolgende Serviceprovider; Du übernimmst die Steuerung standardisierter Install/Move/Add/Change Maßnahmen für Medientechnik;… av operations manager (m/w/d) ist europas führender experte für die technologieberatung und das engineering zur digitalen transformation in räumen in der sich stark […]

Der Beitrag AV Operations Manager (m/w/d) erschien zuerst auf Hacker Jobs.


Manager Microsoft Dynamics NAV (m/w/d) Europe


Manager Microsoft Dynamics NAV (m/w/d) Europe ECKA Granules Germany GmbH Velden Einführung, Überwachung, Verwaltung und Prozessverbesserung von Microsoft Dynamics NAV in Zusammenarbeit mit Kollegen in einem internationalen Umfeld; Erstellen von Jet Reports nach Bedarf für Funktionseinheiten;… für den standort in velden suchen wir zum baldmöglichsten eintritt einen manager microsoft dynamics nav (m/w/d) – europe gmbh […]

Der Beitrag Manager Microsoft Dynamics NAV (m/w/d) Europe erschien zuerst auf Hacker Jobs.


Technical Customer Service Engineer (f/m/d)


Technical Customer Service Engineer (f/m/d) OKI EUROPE LIMITED, Branch Office Düsseldorf Düsseldorf Bearbeitung aller technischer Anfragen auf 2nd Level Niveau;… ist der  spezialist für  professionelle led drucklösungen  und managed document  solutions  und vertreibt  sein  produkt-portfolio  in  weltweit 120 ländern in deutschland ist die mit sitz in  seit  1984 die vertriebs-  service-und  marketingorganisation der japanischen electric […]

Der Beitrag Technical Customer Service Engineer (f/m/d) erschien zuerst auf Hacker Jobs.


Digitalisierungsbeauftragter (m/w/d) für die Bereiche Verwaltung und Schulen


Digitalisierungsbeauftragter (m/w/d) für die Bereiche Verwaltung und Schulen Stadt Ansbach Personal und Organisationsamt Ansbach Ausarbeitung und Umsetzung eines Digitalisierungskonzeptes für die Stadtverwaltung Ansbach; Einführung zukunftsfähiger E-Government-Lösungen mit Umsetzung des Onlinezugangsgesetzes; Leitung der Projekte E-Akte / E-Rechnung / Rechnungsworkflow;… die ist eine leistungsfähige moderne aktive aufstrebende kommune im herzen der metropolregion nürnberg eine hohe lebensqualität günstige […]

Der Beitrag Digitalisierungsbeauftragter (m/w/d) für die Bereiche Verwaltung und Schulen erschien zuerst auf Hacker Jobs.


Systembetreuer / Administrator (w/m/d)


Systembetreuer / Administrator (w/m/d) identity Trust Management AG Düsseldorf Betreuung von Linux und Windows Server Systemen; Planung und Neuentwicklung von MS SQL, postgreSQL Datenbanken; Betreuung von ClusterFS Systemen und verteilten Applikationen; Zusammenarbeit mit anderen Abteilungen der Softwareentwicklung;… die ag gehört zu den marktführenden unternehmen im bereich video- bzw online-legitimation ai identifikationsverfahren und physischer verfahren in […]

Der Beitrag Systembetreuer / Administrator (w/m/d) erschien zuerst auf Hacker Jobs.


Fachinformatiker (w/m/d) zentrale Dienste im Rechenzentrum


Fachinformatiker (w/m/d) zentrale Dienste im Rechenzentrum Dataport Hamburg, Bremen, Altenholz, Kiel, Magdeburg Planung der technischen Umsetzungsschritte bei Änderungen an Rechenzentrumservices; Erstellung von Service Level Agreements (SLAs) und Kalkulationen; interne Klärung von Aufträgen mit den ausführenden Fachbereichen, auch technisch;… an alle digitalen superhelden weltverbesserer datenschützer und entwicklergenies wir haben eine gemeinsame mission: public value bauen sie […]

Der Beitrag Fachinformatiker (w/m/d) zentrale Dienste im Rechenzentrum erschien zuerst auf Hacker Jobs.


IT-Systemadministrator (m/w/d) Infrastruktur


IT-Systemadministrator (m/w/d) Infrastruktur Blickle Räder+Rollen GmbH u. Co. KG Rosenfeld Übernahme von Aufgaben im Bereich der Konfiguration und Pflege der IT-Infrastruktur (Server, Arbeitsstationen, Drucker, TK-Anlagen); Administration der Mail- und Virenschutzsysteme sowie von MS Exchange im DAG; Fehleranalyse;… wir sind eine mittelständische unternehmensgruppe mit 18 eigenen vertriebsgesellschaften in europa nordamerika asien und australien und beschäftigen insgesamt […]

Der Beitrag IT-Systemadministrator (m/w/d) Infrastruktur erschien zuerst auf Hacker Jobs.


IT-Spezialist (m/w/d)


IT-Spezialist (m/w/d) Hagen Grote GmbH Krefeld Betreuung der unternehmenseigenen EDV-/IT- und Telefoninfrastruktur; Anbindung, Konfiguration und Betreuung von Datenbanken/BI-System (qliksense cloud); Erstellung von Schnittstellenanforderungendropshipment und Marktplatzanbindungen;… seit über 30 jahren bietet mit seinem angebot von über 10000 produkten hobbyköchen und anspruchsvollen feinschmeckern eine große auswahl an praktischen helfern innovativen neuheiten sowie erstklassigen delikatessen die höchste ansprüche […]

Der Beitrag IT-Spezialist (m/w/d) erschien zuerst auf Hacker Jobs.


Mitarbeiter (m/w/d) Servicetechniker


Mitarbeiter (m/w/d) Servicetechniker Ratiodata GmbH Duisburg Betreuung der Arbeitsplätze unserer Kunden im Rahmen der vereinbarten Service Level Agreements (SLAs); selbstständige Fehleranalyse, Reparatur und Wartung von komplexen Druckersystemen (MFP), Client-Server-Hardware sowie deren Peripherie;… gmbh 2019-200/mss mitarbeiter (m/w/d) servicetechniker einsatzort duisburg wer wir sind: wer wir sind: die gmbh zählt zu den größten systemhäusern und technologiepartnern in […]

Der Beitrag Mitarbeiter (m/w/d) Servicetechniker erschien zuerst auf Hacker Jobs.


IT-Systemadministrator (m/w/d)


IT-Systemadministrator (m/w/d) Brunner’s Zeitarbeit GmbH München Remote und vor Ort Betreuung der internen und externen Kunden und deren Client und Server IT-Infrastruktur; Remote Wartung der IT-Infrastrukturen; technischer Support und Betreuung der Anwender;… sehr geehrte bewerberin sehr geehrter bewerber wir von brunner’s personaldienstleistung vermitteln seit 1991 erfolgreich personal im raum münchen seit mehr als 15 jahren […]

Der Beitrag IT-Systemadministrator (m/w/d) erschien zuerst auf Hacker Jobs.


Application Support Engineer DMS (m/w/d)


Application Support Engineer DMS (m/w/d) B&O Service und Messtechnik AG Bad Aibling, München Aufnahme, Klassifizierung, Bearbeitung und Lösung von produktspezifischen Supportanfragen; Schnittstelle zwischen (zumeist firmeninternen) Kunden, Stakeholdern aus verschiedenen Fachabteilungen und externen Dienstleister;… application support engineer dms (m/w/d) die -gruppe ist ein baunaher sowie technischer dienstleister mit mehr als 60-jähriger tradition über 2500 mit­arbeitern über […]

Der Beitrag Application Support Engineer DMS (m/w/d) erschien zuerst auf Hacker Jobs.


Service Desk Mitarbeiter (w/m/d)


Service Desk Mitarbeiter (w/m/d) Bechtle AG Hamburg First-Level Support: Annahme und Erstlösung von Störungen/Incidents; Second-Level Support: Bearbeitung von Störmeldungen beim Endanwender; IMAC-Tätigkeiten, z.B. Installation und Konfiguration neuer Geräte;… z u k u n f t s t a r k e   it und sie besser we it erkommen als service desk mitarbeiter zu einsatzort […]

Der Beitrag Service Desk Mitarbeiter (w/m/d) erschien zuerst auf Hacker Jobs.


Senior Architekt Networking / Security (m/w/d)


Senior Architekt Networking / Security (m/w/d) Bechtle AG Hamburg Entwicklung von Strategien und Lösungen im Bereich IT-Sicherheit sowie Datenschutz für und mit unseren Kunden; Beratung, Konzeption, Planung und Sizing, Integration und ggf. Installation, Konfiguration und Dokumentation;… z u k u n f t s t a r k e   it und sie ticken sie […]

Der Beitrag Senior Architekt Networking / Security (m/w/d) erschien zuerst auf Hacker Jobs.


Anwendungsberater (m/w/d) Apothekenwarenwirtschaft


Anwendungsberater (m/w/d) Apothekenwarenwirtschaft PHARMATECHNIK GmbH & Co. KG Kleinmachnow Im Team Anwendungsberatung übernimmst du bei unseren IT-Projekten die fachliche Vorbereitung, die Ersteinweisung und Nachschulung bei Neukunden und Bestandskunden;… wir möchten unsere führende position in deutschland weiter ausbauen und suchen dich zur verstärkung in berlin als anwendungsberater apothekenwarenwirtschaft (m/w/d) in vollzeit für unsere geschäftsstelle in kleinmachnow […]

Der Beitrag Anwendungsberater (m/w/d) Apothekenwarenwirtschaft erschien zuerst auf Hacker Jobs.


Product Owner IT (m/w/d)


Product Owner IT (m/w/d) epay, a Euronet Worldwide Company Planegg / Martinsried bei München Du kümmerst Dich als Product Owner IT im Team um das WebShop System von epay worldwide, dabei liegt Dein Fokus auf den Bonusprogrammen und den dazugehörigen Marketingplattformen, betreust mit Begeisterung unseren größten deutschen Kunden i;… wir sind epy – trnsct elektronische […]

Der Beitrag Product Owner IT (m/w/d) erschien zuerst auf Hacker Jobs.


Fachinformatiker Fachrichtung Systemintegration (m/w/d)


Fachinformatiker Fachrichtung Systemintegration (m/w/d) Max-Planck-Institut für medizinische Forschung Heidelberg Darüber hinaus sind Sie für die Beschaffung und Verwaltung von Hard- und Software verantwortlich und organisieren Reparaturaufträge und Wartungen;… fachinformatiker*in fachrichtung systemintegration (m/w/d) (kennziffer 19/2019) ihre tätigkeit: ihr aufgabengebiet umfasst die betreuung der wissenschaftlichen abteilungen und serviceeinrichtungen im bereich der it mit dem installieren konfigurieren testen […]

Der Beitrag Fachinformatiker Fachrichtung Systemintegration (m/w/d) erschien zuerst auf Hacker Jobs.


Anwendungsberater ERP-Software (w/m/d)


Anwendungsberater ERP-Software (w/m/d) Because Software AG Germering Bearbeitung eingehender Anwendungsfragen unserer Kunden; Anpassung unserer Software an Kundenwünsche; selbständige Einführung unserer Software beim Kunden; Planung und Durchführung von Updates und Schulungen;… wir sind kundenberater bei der und suchen dich am standort münchen als anwendungsberater erp- (w/m/d) du bist der erste ansprechpartner bei fragen zu unserer agentur […]

Der Beitrag Anwendungsberater ERP-Software (w/m/d) erschien zuerst auf Hacker Jobs.


Sehr gute Perspektiven für hardwarenahen Softwareentwickler für Embedded Systems eines weltweit agierenden, kleineren Technologieführers (m/w/d)


Sehr gute Perspektiven für hardwarenahen Softwareentwickler für Embedded Systems eines weltweit agierenden, kleineren Technologieführers (m/w/d) J.WIENBERG PERSONALBERATUNG & PERSONALVERMITTLUNG Landsberg am Lech / Raum Sie betreuen als interner und / oder externer Projektleiter das gesamte Spektrum und entsprechend den gesamten Softwareentwicklungsprozess Ihrer komplexen und vor allem höchst innovativen kundenspezifischen Geräte, Systeme, Baugruppen;… sehr gute perspektiven […]

Der Beitrag Sehr gute Perspektiven für hardwarenahen Softwareentwickler für Embedded Systems eines weltweit agierenden, kleineren Technologieführers (m/w/d) erschien zuerst auf Hacker Jobs.


IT-Spezialist (m/w/d) Serversysteme


IT-Spezialist (m/w/d) Serversysteme FIEGE Logistik Stiftung & Co. KG Worms Planung und Unterstützung der Konfiguration teils komplexer Serverinfrastrukturen inklusive Storage-Systemen; Weiterentwicklung des Konfigurationstools; Verantwortung für die Planung von flexiblen und skalierbaren Systemumgebungen;… ein arbeitgeber für mich mit unserer leidenschaft für unsere kunden sind wir zu einem weltweit operierenden full-service-dienst­leister gewachsen innovationskraft flache hierarchien und gemeinsames […]

Der Beitrag IT-Spezialist (m/w/d) Serversysteme erschien zuerst auf Hacker Jobs.


IT-Administrator / IT-Techniker / Systemadministrator (m/w/d)


IT-Administrator / IT-Techniker / Systemadministrator (m/w/d) Oskar Böttcher GmbH & Co. KG Berlin Sicherstellung des ordnungsgemäßen Betriebs der IT-Infrastruktur mit Vernetzung mehrerer Standorte; Implementierung und Weiterentwicklung der IT-Basis; Installation und Administration von Endgeräten sowie Betreuung der eingesetzten Software;… seit 1901 ist obeta ein starker und verlässlicher partner des elektrohandwerks als bundesweit agierender großhandel wächst das […]

Der Beitrag IT-Administrator / IT-Techniker / Systemadministrator (m/w/d) erschien zuerst auf Hacker Jobs.


SPS Entwickler / Programmierer (m/w/d) Antriebstechnik / Automation


SPS Entwickler / Programmierer (m/w/d) Antriebstechnik / Automation Ungerer Technology GmbH Pforzheim Erstellung und Pflege von Programmen für Simotion und Simatic S7; Inbetriebnahme von Antriebssystemen und Maschinensteuerungen; Inbetriebnahmen von Anlagen im Haus und vor Ort beim Kunden; Erstellung von Dokumentationen und Funktionsbeschreibungen;… sps entwickler / programmierer (m/w/d) antriebstechnik / automation in vollzeit über uns die […]

Der Beitrag SPS Entwickler / Programmierer (m/w/d) Antriebstechnik / Automation erschien zuerst auf Hacker Jobs.


Hackers Are Already Targeting Disney Plus Accounts

In case you weren't already aware, Disney recently launched a new video streaming service called Disney+ which has been driving Netflix and other established streaming services crazy with fear and apprehension since ...

ITK-Systemtechniker (m/w/d)


ITK-Systemtechniker (m/w/d) SYSCON GmbH Borgholzhausen, Mörfelden-Walldorf Inbetriebnahme, sowie Fach- und sachgerechte Montage von komplexen Kommunikationslösungen im Hard- und Softwarebereich (VoIP, DECT, Systemendgeräte, CTI etc.); Systemintegration in Kommunikationsinfrastrukturen wie z.B. IP Netze, Server und Gateways;… die gmbh ist ein innovatives it-beratungs- und dienstleistungsunternehmen mit niederlassungen in osnabrück mörfelden und alzenau seit über 25 jahren übernimmt unser […]

Der Beitrag ITK-Systemtechniker (m/w/d) erschien zuerst auf Hacker Jobs.


Anwendungsentwickler C/C++ / Softwareentwickler (m/w/d)


Anwendungsentwickler C/C++ / Softwareentwickler (m/w/d) NOVENTI Health SE Mannheim Softwaretechnische Umsetzung (Design und Implementierung) der Feinspezifikationen unter Einhaltung der Coding- und Architektur-Richtlinien; Abstimmung der Feinspezifikationen mit dem Projektleiter (m/w/d) und dem jeweils involvierten Fachbereich;… die group ist marktführend im digitalen gesundheitsmarkt in deutschland und europas größtes abrechnungsunternehmen im gesundheitswen sie vereint zahlreiche einzelgellschaften mit einer […]

Der Beitrag Anwendungsentwickler C/C++ / Softwareentwickler (m/w/d) erschien zuerst auf Hacker Jobs.


Computer Scientist / Software Engineer as Sen. Android App Developer (m/f/d)


Computer Scientist / Software Engineer as Sen. Android App Developer (m/f/d) Leica Camera AG München, Wetzlar As an Android developer, youll be working on the code behind our Leica application used by thousands of users every day. You are the enabler of our customers to use their Leica Camera right at the finger tips;…

Der Beitrag Computer Scientist / Software Engineer as Sen. Android App Developer (m/f/d) erschien zuerst auf Hacker Jobs.


Informatiker / Wirtschaftsinformatiker (w/m/d) im Bereich Dokumenten- und Workflow Management-System


Informatiker / Wirtschaftsinformatiker (w/m/d) im Bereich Dokumenten- und Workflow Management-System Technische Hochschule Rosenheim Rosenheim Entwicklung / Weiterentwicklung des hochschulweiten Dokumenten- und Workflow Management-Systems (DMS) mit Systemdokumentation; Prozessmodellierung (mit ARIS), damit verbundene Administration der ARIS-Software;… die rosen­heim ist mit knapp 6000 studie­renden 230 wissen­schaftlerinnen und wissenschaftlern sowie 300 beschäftigten in technik und ver­waltung die wichtigste bildungs­einrichtung […]

Der Beitrag Informatiker / Wirtschaftsinformatiker (w/m/d) im Bereich Dokumenten- und Workflow Management-System erschien zuerst auf Hacker Jobs.


IT-Administrator (m/w/d)


IT-Administrator (m/w/d) Franz Binder GmbH + Co. Elektrische Bauelemente KG Neckarsulm Sie verstärken unser IT-Team in verschiedenen Bereichen wie Windows/ Linux-Server, Virtualisierung (Citrix/VMWare), LAN/ WAN, SAP-Basis, Digitalisierung und Collaboration;… wir sind ein international erfolgreiches mittelständisches unternehmen mit über 1000 mitarbeitern am standort neckarsulm dank hoher innovationsfreude haben wir uns innerhalb der steck­verbranche weltweit einen sehr […]

Der Beitrag IT-Administrator (m/w/d) erschien zuerst auf Hacker Jobs.


Mitarbeiter/in Anwender-IT-Support (m/w/d)


Mitarbeiter/in Anwender-IT-Support (m/w/d) KS21 Software & Beratung GmbH Sankt Augustin Anwender-Support unserer Software-Produkte (ERP-Software) per Online Fernwartung; Analyse, Reproduktion und Lösungen von Anwender-Fragestellungen inkl. konsequenter Dokumentation in unserem CRM-System;… mitarbeiter/in anwender-it-support (m/w/d) vollzeitmitarbeiter/in für it-support – -anwenderbetreuung (m/w/d) in festanstellung für unsere zentrale in sankt augustin für die anwenderbetreuung unserer erp- suchen wir für unsere […]

Der Beitrag Mitarbeiter/in Anwender-IT-Support (m/w/d) erschien zuerst auf Hacker Jobs.


Chief Operating Officer (m/w/d) Fintech / Cloud Services


Chief Operating Officer (m/w/d) Fintech / Cloud Services crossinx GmbH Frankfurt am Main Weiterentwicklung des Unternehmens in Bezug auf alle operativen Tätigkeiten eines IT-Unternehmens in Verbindung mit den entsprechenden Kundenprojekten. Das Aufgabengebiet umfasst dabei insbesondere die Bereich IT-Projekte, Projektmanagement, Support;… für unsere hauptverwaltung in frankfurt/main suchen wir zum nächstmöglichen zeitpunkt einen   chief operating officer […]

Der Beitrag Chief Operating Officer (m/w/d) Fintech / Cloud Services erschien zuerst auf Hacker Jobs.


Anwendungsentwickler (w/m/d) MS Dynamics NAV


Anwendungsentwickler (w/m/d) MS Dynamics NAV Eckelmann AG Wiesbaden Entwicklung, Optimierung und Pflege von MS Dynamics NAV; Anwendungsprogrammierung und Konfiguration mit Softwareintegration, Schnittstellenentwicklung und Migration von Daten; Beratung der Fachabteilungen;… die ag ist mittelständischer automatisierungspartner für den maschinen- und anlagenbau kernkompetenz ist die entwicklung von hard- und software sowie die systemintegration zur automatisierung von maschinen und […]

Der Beitrag Anwendungsentwickler (w/m/d) MS Dynamics NAV erschien zuerst auf Hacker Jobs.


Teamleiter Planung Security, IT- und Dienstedesign (m/w/d)


Teamleiter Planung Security, IT- und Dienstedesign (m/w/d) Thüringer Netkom GmbH Weimar Verantwortlich für die IT-Architektur der IT-Landschaft; Mitwirkung bei der Planung komplexer IT-Systeme sowie notwendiger Schnittstellenarchitektur; verantwortlich für die Einrichtung eines effizienten Anforderungsmanagements;… die thuringer gmbh ist ein telekommunikationsdienstleister in thuringen mit sitz in weimar als tochterunternehmen der teag thuringer energie ag betreiben wir seit […]

Der Beitrag Teamleiter Planung Security, IT- und Dienstedesign (m/w/d) erschien zuerst auf Hacker Jobs.


Prozessmanager (m/w/d) Supply Chain


Prozessmanager (m/w/d) Supply Chain Müller Service GmbH Fischach Sie sind verantwortlich für die Gestaltung, Weiterentwicklung und Standardisierung von Netzwerk- und Produktionsplanungsprozessen sowie den Prozessen zur Materialdisposition;… prozessmanager supply chain (m/w/d) anf-kennung 2471   was uns ganz nach vorne bringt gute zutaten höchste qualität und gestandene persönlichkeiten die im umkämpften markt für molkerei- und feinkostprodukte etwas […]

Der Beitrag Prozessmanager (m/w/d) Supply Chain erschien zuerst auf Hacker Jobs.


IT Systemadministrator (m/w/d)


IT Systemadministrator (m/w/d) EMP Merchandising Handelsgesellschaft mbH Lingen (Ems) Du bist unser IT-Profi und kümmerst dich um die Installation und Konfiguration von Hard- und Softwarekomponenten sowie die Hard- und Softwarepflege durch automatisierte Softwareverteilung und Assetmanagement; 1st und 2nd-Level-Support;… die emp mbh ein unternehmen der warner music group ist einer der führenden e-commerce-player der fashion- und […]

Der Beitrag IT Systemadministrator (m/w/d) erschien zuerst auf Hacker Jobs.


Softwareentwickler (m/w/d) Frontend


Softwareentwickler (m/w/d) Frontend Betterspace GmbH Kassel Konzeption, Aufbau und die abschließende Weiterentwicklung von Weboberflächen; Technische Umsetzung von fachlichen Anforderungen; Kreieren von intuitive User Experiences mit einem sauberen und raffinierten Design;… softwareentwickler (m/w/d) frontend unternehmensbeschreibung die gmbh ist ein innovativer spezialist für digitale lösungen in der hotelbranche als junges und innovatives unternehmen bieten wir smarte lösungen […]

Der Beitrag Softwareentwickler (m/w/d) Frontend erschien zuerst auf Hacker Jobs.


Need Power When Traveling? Beware of USB Charging Stations


The Los Angeles Times is reporting on the dangers of “juice jacking,” a method where hackers hijack a USB port to steal information from a phone or tablet. As the LA Times reports, this is not a new problem and has been around for some time. It’s recently regained national attention, however, in the wake…

The post Need Power When Traveling? Beware of USB Charging Stations appeared first on WebProNews.


Hackers Are Already Targeting Disney Plus Accounts

In case you weren't already aware, Disney recently launched a new video streaming service called Disney+ which has been driving Netflix and other established streaming services crazy with fear and apprehension since ...

Hackers Are Imitating Government Agencies To Spread Malware

Researchers at Proofpoint have found evidence of a new threat actor who has been sending out convincing looking emails. They are claiming to come from several government agencies. These include the Italian ...

Another WhatsApp Vulnerability Has Been Found

WhatsApp is the most popular messaging platform in the world. Unfortunately, that means it's got a giant bullseye on it where hackers are concerned. In recent months, the company has faced no ...

DC Court Says Climate Change Prof Can Sue The F*ck Out Of National Review And Man We're Broken Up About It


Yesterday, the Supreme Court denied a cert petition in Competitive Enterprise Institute and National Review v. Michael E. Mann, letting a DC Court of Appeals order allowing the lawsuit to go forward to stand.

And I don't know about y'all, but I can't wait to see the bros over at the National Review go in front of a DC jury.

When this Supreme Court refuses the opportunity to jump in to both protect the bootlickers at the National Review AND try to debunk climate change, you know someone done fucked up.

Excuse me for a moment.




Okay, let's lawsplain this

Now, as you may know, I really fucking hate bullshit defamation cases. In fact, mocking dumb defamation cases (and threats to file dumb defamation cases over BESMIRCH STATEMENTS) is one of my favorite hobbies.

But this one ... well, this one's just fun.

Michael Mann is the Penn State professor who developed the "hockey stick graph" that shows the dramatic increase in global temperatures in the 20th century. You've probably seen it, it's the one that looks like this:

As described by Courthouse News:

The case centers on Michael Mann, a professor at Penn State famous for developing the so-called "hockey stick graph" that used ice core samples, tree ring analysis and other data to show global temperatures rising dramatically in the 20th century after a general trend of cooling for most of history.

Mann's work has been instrumental in the charged debate over the threats posed by climate change, as the graph he helped develop was a key point of evidence that human activity is driving the warming of the planet.
The graph has been the subject of hot debate and some climate skeptics have called into question its validity, though peer-reviewed studies have largely backed up Mann's findings.

Despite the overwhelming support for Mann's work, climate change deniers -- like those at the National Review and CEI -- still like to pretend it doesn't exist. And after hackers released a bunch of emails from climate scientists in the so-called "Climategate" scandal, those same sycophants deliberately misread the emails and took statements out of context to claim Mann was a liar who had manipulated data.

In response, a variety of organizations, from Penn State to the EPA to the British House of Commons, investigated Mann's work. He was cleared of any wrongdoing.

But haters gonna hate and liars gonna lie, so outlets like CEI and the National Review continued their crusade against saving the planet.

In July 2012, CEI lackey Rand Simberg wrote a piece comparing Professor Mann to ... Penn State pedophile Jerry Sandusky.

Yes, seriously.

Mann could be said to be the Jerry Sandusky of climate science, except for instead of molesting children, he has molested and tortured data in the service of politicized science that could have dire economic consequences for the nation and planet.

Not to be outdone, Mark Steyn wrote a blog post for the National Review Online quoting from Simberg's post and calling Mann's work "fraudulent." And all of this happened after Mann and his team had been cleared of wrongdoing

This case is still at an early stage and it will take a while to work its way through the DC courts. In the meantime, I'll just be sitting over here laughing as Professor Mann continues this battle for his reputation.

The NRO, for its part, used the opportunity to whine about the "very liberal" DC courts and do a little fundraising from the gullible sycophants who make up its readership.

I guess the snowflakes over at NRO are feeling a little triggered today. Quick, somebody get them a safe space!

[ SCOTUS / Alito / Courthouse News ]

Send money to us, not the National Review.

How often would you like to donate?

Select an amount (USD)


Zero to Hero Cyber Security Hacker Bundle


Thought hacking computers was just a gig reserved for the bad guys? Think again! Become a champion of the cyber world by learning the fundamentals, tools, and ethics of hacking for good with the Zero to Hero Cyber Security Hacker Bundle. 

The post Zero to Hero Cyber Security Hacker Bundle appeared first on Indie Game Bundles.


ആരെ കോളനി: പ്രതിഷേധിച്ചവർക്കെതിരേയുള്ള കേസുകൾ പിൻവലിക്കാൻ നിർദേശം

മുംബൈ: മെട്രോ കാർ ഷെഡ് ആരെ കോളനിയിൽ പണിയുന്നതിൽ പ്രതിഷേധിച്ചവർക്കെതിരെ എടുത്ത കേസുകൾ പിൻവലിക്കാൻ മുഖ്യമന്ത്രി ഉദ്ധവ് താക്കറെ ഞായറാഴ്ച നിർദേശം നൽകി. കഴിഞ്ഞദിവസം ആരെ കോളനിയിൽ കാർഷെഡ് പണിയുന്നത് നിർത്തിവെക്കാൻ ഉദ്ധവ് താക്കറെ നിർദേശിച്ചിരുന്നു. ഇതിനുപിന്നാലെയാണ് പുതിയ തീരുമാനം വന്നത്. ആരെ കോളനിയിൽ നിർമാണ പ്രവർത്തനങ്ങൾ നടത്തുന്നതിനെതിരേ പരിസ്ഥിതി പ്രവർത്തകർ വിവിധ ഇടങ്ങളിൽ പ്രതിഷേധ പരിപാടികൾ നടത്തിയിരുന്നു. ഇവർക്കെതിരേ പിന്നീട് പോലീസ് കേസെടുക്കുകയുണ്ടായി. ഈ കേസുകൾ പിൻവലിക്കാനാണ് ഇപ്പോൾ മുഖ്യമന്ത്രിയുടെ നിർദേശം വന്നിരിക്കുന്നത്. ബി.ജെ.പി.യുടെ സഖ്യകക്ഷിയായിരുന്നെങ്കിലും ആരെ കോളനിയിൽ മെട്രോ കാർ ഷെഡ് പണിയുന്നതിനെ ശിവസേന എതിർത്തിരുന്നു. content highlights:uddhav thackeray directs to withdraw cases against Aarey protestors

FRI. BRIEF: TikTok US Expansion • Music Hacker Indicted • NTS Online Radio • More -

FRI. BRIEF: TikTok US Expansion • Music Hacker Indicted • NTS Online Radio • More

Warnung vor E-Mails: Online-Angreifer dringen bei Conrad Electronic ein

Unbekannte haben sich beim Versandhändler Conrad Electronic Zugang zu Kundendaten wie IBAN-Nummern und Postadressen verschafft. Es gebe aber keine Hinweise darauf, dass die Hacker die Daten tatsächlich abgegriffen hätten, teilte die Conrad Electronic SE in Hirschau mit.

FACT CHECK: Did Cops distribute Tasbeeh’s after Uddhav took Oath

FACT CHECK: Did Cops distribute Tasbeeh’s after Uddhav took Oath

A popular writer followed by over 2 million people on Twitter, shared a video stating the state started witnessing secular activities as soon as Uddhav Thackeray took the oath as Maharashtra’s CM. As expected the video went viral on social media after it was shared by Writer Madhu Kishwar on Sunday, 1 December, The Quint …

Check out more stories at The Siasat Daily


I will not give up Hindutva ideology: Uddhav Thackeray

I will not give up Hindutva ideology: Uddhav Thackeray

Mumbai: Despite the inclusion of the word ‘Secularism’ in the common minimum program of Shiv Sena, NCP, and Congress coalition, the CM of Maharashtra Mr. Uddhav Thackeray declared that he would not give up Hindutva Ideology. While addressing the Assembly session, he told that the word ‘Hindutva’ can’t be isolated from him. He reiterated that in …

Check out more stories at The Siasat Daily


Smartphones hotspots of cyberattacks in India: Check Point

Smartphones hotspots of cyberattacks in India: Check Point

New Delhi: If you thought only large critical infrastructure and big corporations would always bear the brunt of the rise in cyberattacks, you could not be further from the truth. In India, smartphones, the device that most people now carry in their pockets, have become a very large attack centre, said a top security expert. …

Check out more stories at The Siasat Daily


Webinar Recap: IP Security Threats in your SoC


Three years ago my youngest son purchased a $17 smart watch on eBay, but then my oldest son read an article warning about how that watch would sync with your phone, then send all of your contact info to an address in China. My youngest son then wisely turned the watch off, and never used it again. Hackers have been able to spoof and hide Read More


Rencontre avec Rayna Stamboliyska (Académie Digitale #7)


En quelques années, l'Académie Digitale est devenue un des rendez-vous phares de l'association Nancy Numérique. Ce moment convivial, organisé par les membres de l'association, permet le temps d’un après-midi de faire des rencontres, d’échanger et de prendre de la hauteur. Pour sa septième édition, l'Académie Digitale se déroulera en deux parties à l'Hôtel de ville de Nancy, Place Stanislas.

La première partie, réservée aux membres de Nancy Numérique, s’articulera autour d’une plénière de rentrée, un speed-meeting et d'ateliers de partage de connaissance.

La seconde partie sera une rencontre ouverte à tous, avec Rayna Stamboliyska, pour son ouvrage La face cachée d'Internet, Hackers, bitcoins, piratage, Wikileaks, Anonymous, darkweb, Tor, vote électronique, chiffrement…

Rayna Stamboliyska est fondatrice et directrice générale de RS Strategy, depuis 2013, et co-fondatrice de Data Colada en 2016.

sep 09 2019, 6:00pm - 8:00pm CEST
NANCY, 54000, Hôtel de ville
Type d'évènement: 
POINT (6,182562 48,693145)


Crypto expert arrested for allegedly helping North Korea evade sanctions


North Korea has long been accused of using cryptocurrency to avoid sanctions, but the US is now accusing a man of giving the country some help American law enforcement has arrested crypto expert and Ethereum project member Virgil Griffith for allegedly providing North Korea with information on how cryptocurrency and blockchain tech could help the isolated nation evade US sanctions. He presented at a crypto conference in Pyongyang despite being denied permission to travel to North Korea, and reportedly discussed how the country could "launder money" and otherwise skirt trade barriers. There were several North Korean officials in the audience who asked him questions, according to the Justice Department.

Via: ZDNet

Source: Department of Justice


Grinding – AVC

Shared by 3 on Twitter (Including Luis Iván Cuende , Rachael Horwitz or Pawel Chudzinski). Discussed by 2 on Hackernews. Source:

Urgent announcement about current situation of Global

Dear user, Following the official announcement "Announcement of IDAX withdrawal channel congestion" on November 24, We announce... Shared by 2 on Twitter (Including Miko Matsumura ㋡ & Bobby Ong). Discussed by 22 on Reddit. Discussed by 2 on Hackernews. Source:

Manhattan U.S. Attorney Announces Arrest Of United States Citizen For Assisting North Korea In Evading Sanctions USAO-SDNY

Shared by 14 on Twitter (Including Ryan Selkis, Laura Shin or Emin Gün Sirer). Discussed by 25 on Reddit. Discussed by 2 on Hackernews. Source:

Новые приложения и игры для iOS: лучшее за ноябрь

Новые приложения и игры для iOS: лучшее за ноябрь
Самые интересные и полезные новинки App Store за месяц.

На Android появился вирус, который выводит деньги через приложения российских банков

На Android появился вирус, который выводит деньги через приложения российских банков
Пока масштабы его применения невелики.

भाजपच्या ‘या’ महिला खासदाराने मुख्यमंत्र्यांना लगावला ‘खोचक’ टोला

Uddhav Thackeray
Uddhav Thackeray

मुंबई : पोलीसनामा ऑनलाइन – शिवसेना पक्ष प्रमुख उद्धव ठाकरे यांनी मुख्यमंत्री पदाची शपथ घेतल्यानंतर त्यांना अनेकांकडून शुभेच्छा देण्यात येत आहेत. माजी मुख्यमंत्री देवेंद्र फडणवीस यांनी शपथविधी सोहळ्याला हजरी लावली, मात्र उद्धव ठाकरेंची भेट न घेता ट्विट करून शुभेच्छा दिल्या आहेत. दिवंगत भाजप नेते प्रमोद महाजन यांच्या कन्या आणि खासदार पूनम महाजन यांनी देखील मुख्यमंत्री […]

The post भाजपच्या ‘या’ महिला खासदाराने मुख्यमंत्र्यांना लगावला ‘खोचक’ टोला appeared first on पोलीसनामा (Policenama).


शिवतीर्थावर राज ठाकरे आणि CM उद्धव ठाकरेंची ‘गळाभेट’

Uddhav Raj
Uddhav Raj

मुंबई : पोलीसनामा ऑनलाइन – मुंबईच्या शिवतीर्थावर आज उद्धव ठाकरे यांचा मुख्यमंत्रीपदाचा शपथविधी सोहळा पार पडला. या सोहळ्याला राज्यातील तसेच इतर राज्यातील नेत्यांनी हजेरी लावली होती. मात्र, सर्व महाराष्ट्राचे लक्ष लागून राहिले होते ते मनसे अध्यक्ष राज ठाकरे यांच्याकडे. राज ठाकरे उद्धव ठाकरेंच्या शपथविधी सोहळ्याला येणार का असा प्रश्न सर्वांना पडला होता. मात्र, उद्धव ठाकरे […]

The post शिवतीर्थावर राज ठाकरे आणि CM उद्धव ठाकरेंची ‘गळाभेट’ appeared first on पोलीसनामा (Policenama).


‘उद्धव बाळासाहेब ठाकरे – फोटोग्राफर ते मुख्यमंत्री’ !, जाणून घ्या प्रत्येक पैलू

Uddhav Thackeray
Uddhav Thackeray

मुंबई : पोलीसनामा ऑनलाइन – महाविकासआघाडीचे नेते आणि शिवेसना पक्ष प्रमुख उद्धव ठाकरे यांनी आज (गुरुवार दि. 28 नोव्हेंबर) मुंबईतील शिवतीर्थावर मुख्यमंत्री म्हणून शपथ घेतली. यानंतर सर्वांनी त्यांच्यावर शुभेच्छांचा वर्षाव केला. महाराष्ट्र नवनिर्माण सेनेचे प्रमुख राज ठाकरे यांच्या मातोश्रींनीही उद्धव यांना शुभेच्छा दिल्या. यावेळीही राज ठाकरेही उपस्थित होते. शिवसेनाप्रमुख बाळासाहेब ठाकरे यांच्या निधनांनंतरही त्यांनी पक्षाची […]

The post ‘उद्धव बाळासाहेब ठाकरे – फोटोग्राफर ते मुख्यमंत्री’ !, जाणून घ्या प्रत्येक पैलू appeared first on पोलीसनामा (Policenama).


‘माशी कुठं शिंकली’ ! Ex CM देवेंद्र फडणवीस उद्धव ठाकरेंच्या शपथविधीला पोहचले पण…

devendra and uddhav
devendra and uddhav

मुंबई : पोलीसनामा ऑनलाइन – महाराष्ट्राच्या विधानसभेवर भगवा फडकवण्याचं शिवसेना प्रमुख दिवंगत बाळासाहेब ठाकरे यांचे स्वप्न अखेर आज पूर्ण झाले. बाळासाहेब ठाकरे यांचे चिरंजीव उद्धव ठाकरे यांनी आज मुख्यमंत्रीपदाची शपथ घेत शिवसेनेच्या सोनेरी इतिहासात नवा अध्याय रचला. शिवाजी पार्क मैदानावर बाळासाहेब ठाकरे यांनी रोप रुजवले आणि ते वाढवले ही. त्याच शिवाजी पार्क मैदानावर आज उद्धव […]

The post ‘माशी कुठं शिंकली’ ! Ex CM देवेंद्र फडणवीस उद्धव ठाकरेंच्या शपथविधीला पोहचले पण… appeared first on पोलीसनामा (Policenama).


देवेंद्र फडणवीसांनी दिल्या उध्दव ठाकरेंना मुख्यमंत्री पदाच्या शुभेच्छा, म्हणाले…

Thackeray Fadanvis
Thackeray Fadanvis

मुंबई : पोलीसनामा ऑनलाइन – राज्याला नवे मुख्यमंत्री मिळाल्यानंतर राज्याच्या माजी मुख्यमंत्र्यांनी नव्या मुख्यमंत्र्यांना शुभेच्छा दिल्या आहेत. आज शिवसेना प्रमुख मुख्यमंत्री उद्धव ठाकरेंनी राज्याच्या मुख्यमंत्रिपदाची शपथ घेतली. यानंतर देशभरातून त्यांच्यावर शुभेच्छांचा वर्षाव झाला. महाराष्ट्राचे माजी मुख्यमंत्री देवेंद्र फडणवीस यांनी देखील उद्धव ठाकरेंना मुख्यमंत्रिपदी विराजमान झाल्याबद्दल शुभेच्छा कळवल्या आहेत. माजी मुख्यमंत्री देवेंद्र फडणवीस यांनी ट्विट करत […]

The post देवेंद्र फडणवीसांनी दिल्या उध्दव ठाकरेंना मुख्यमंत्री पदाच्या शुभेच्छा, म्हणाले… appeared first on पोलीसनामा (Policenama).


उध्दव ठाकरेंचा CM म्हणून शपथविधी झाल्यानंतर नेटकर्‍यांकडून शिवसेना ‘टार्गेट’

Uddhav Thackeray
Uddhav Thackeray

मुंबई : पोलीसनामा ऑनलाइन – महाराष्ट्राच्या विधानसभेवर भगवा फडकवण्याचे शिवसेनाप्रमुख दिवंगत बाळासाहेब ठाकरे यांचे स्वप्न आज पूर्ण झाले. बाळासाहेब ठाकरे यांचे चिरंजीव आणि शिवसेना पक्षप्रमुख उद्धव ठाकरे यांनी राज्याच्या 29 व्या मुख्यमंत्रीपदाची शपथ घेतली. शिवतीर्थावर झालेल्या शपथविधी सोहळ्याला राज्यातील आणि इतर राज्यातील अनेक नेते उपस्थित होते. ज्या शिवाजी पार्क मैदानावर बाळासाहेबांनी शिवसेनेचं रोप रुजवलं त्याच […]

The post उध्दव ठाकरेंचा CM म्हणून शपथविधी झाल्यानंतर नेटकर्‍यांकडून शिवसेना ‘टार्गेट’ appeared first on पोलीसनामा (Policenama).


PM नरेंद्र मोदींनी दिल्या CM उध्दव ठाकरेंना ‘या’ शुभेच्छा !

Modi Thackeray
Modi Thackeray

मुंबई : पोलीसनामा ऑनलाइन – राज्याला आज नवे मुख्यमंत्री मिळाले. शिवसेना प्रमुख उद्धव ठाकरे यांनी आज मुख्यमंत्रिपदाची शपथ घेतली. त्यानंतर आता ‘मोठ्या भावा’ने उद्धव ठाकरे यांना शुभेच्छा दिल्या आहेत. पंतप्रधान मोदी यांनी राज्याचे मुख्यमंत्री उद्धव ठाकरे यांना मुख्यमंत्रिपदाची शपथ घेतल्यानंतर ट्वीट करत शुभेच्छा कळवल्या. पंतप्रधान मोदींनी उद्धव ठाकरेंना शुभेच्छा देत ट्विट केले आहे की महाराष्ट्रच्या […]

The post PM नरेंद्र मोदींनी दिल्या CM उध्दव ठाकरेंना ‘या’ शुभेच्छा ! appeared first on पोलीसनामा (Policenama).


Hackers Are Already Targeting Disney Plus Accounts

In case you weren't already aware, Disney recently launched a new video streaming service called Disney+ which has been driving Netflix and other established streaming services crazy with fear and apprehension since ...

Hackers Are Imitating Government Agencies To Spread Malware

Researchers at Proofpoint have found evidence of a new threat actor who has been sending out convincing looking emails. They are claiming to come from several government agencies. These include the Italian ...

Another WhatsApp Vulnerability Has Been Found

WhatsApp is the most popular messaging platform in the world. Unfortunately, that means it's got a giant bullseye on it where hackers are concerned. In recent months, the company has faced no ...

Online Safety for Cyber Monday

Timely words of wisdom from Professor Roberts...
Hub Category: 
Main Image: 
Thumbnail Image: 

The appeal of online deals on Cyber Monday has been growing steadily for several years. This year it is estimated that sales will be about 19% above last year’s with $9.4 billion in sales on that day alone. For the first time this year, more Americans say they are planning to shop on Cyber Monday than on Black Friday. With numbers like that you can be sure that the scammers are out in force!

All the usual online shopping reminders are equally important for Cyber Monday. Among the key safe practices are:

  • Using a password manager. A password manager not only adds immeasurably to online safety, it is a huge convenience for things like filling out forms and making payments.
  • Using a VPN (virtual private network) for both online and mobile shopping activities.
  • Having a strategy for card usage. First, never use a debit card online. That gives hackers access to your entire bank account. Credit cards have a limit to loss as long as problems are reported promptly.

The initial article in this series recommended using only one credit card for Black Friday shopping. Consider extending that strategy by using only one (different) card for online shopping. Separating retail and online shopping makes it easier to monitor your accounts, which should be done frequently at this time of year. A third card for sites where you shop frequently is useful, and be careful about giving even those sites permission to save your payment information. The more sites that have your payment information, the greater the danger of being hacked. Examine your level of trust about a dozen times before you allow any site to save payment information.

Cyber Monday is such a tempting target that there are many focused scams, some achieving new prominence this year. All the usual safe practices apply, but here are some special things to watch out for:

  • Fake Cyber Monday deal apps. These can be hard to distinguish from the authentic retail apps, so the best idea is not to download them at all. They may be carriers of malware as well as promoters of fake deals. Go directly to the retail site to verify the deals.  If you are using mobile apps, download only trusted retail apps directly from the Apple Store or Google Play. Even then, look carefully at the source of the app before you download.
  • Fake websites. There’s one report that as many as 100,000 fake websites have been created to take advantage of holiday shoppers. There are two important ways to respond:
    • Once again the year-round advice of being sure the link is valid is important.
    • Shop for deal on retail sites, not search engines. Many of the fake sites are so good they come up high in search results.
  • Scams delivered by email. These are so prevalent that it’s best, at least for the holiday season, not to open any links or attachments in emails that look like they are from retailers. They often lead to fake sites. Again, check out the bargains directly on the retail site. Even tracking emails can be faked. Instead of clicking on the link, copy the tracking number, go directly to the delivery site and paste number in there.
  • Pop-ups. They have a high probability of leading to dangerous sites. Don’t click on them. Even ads that look legitimate can be a problem, so look carefully at the URL and other site information if you click on them. Better, go directly to the retail site. If the deal is legitimate, it will be on the retail site. Free offers should be avoided altogether.

Remember to:

  • Be sure your device security software is up to date. Be sure your connection is safe. Using a VPN, especially on your mobile phone, adds another layer of safety.
  • Check your credit card transactions on a regular basis.

Shopping online is a wonderful convenience. Staying safe is a matter of taking reasonable precautions and not being lured into phony deals. Add safety to convenience, and have a wonderful shopping experience!


Why Choose Managed IT Services?


Why would anyone want to hire a IT consultant to handle complex technology needs for their business?  Doesn’t it make more sense to hire a full time IT person to make sure everything is running tip top?

These are questions well worth their weight in gold.  Any smart business owner or leader serves their company well by pondering these questions.  If you are to succeed you must have the right technology in place.  And it must be reliable!


At the core of your business, is the need to communicate with your clients and employees.  This means you must have a set of tools that allows your team to engage those customers and personnel that keep things moving forward positively.  With the increased reliability and security offered by big cloud providers at an affordable price, it makes sense that companies are flocking to services such as Office365 and Google S-Suite for their company email and inter-office communications platforms.  This doesn’t mean that everything is going to work right out of the box.  It isn’t as simple as “plug and play”, or “pay and play”.  These services still need to be setup properly to keep things secure and ensure that your operational policies are kept in check.  It is also important to ensure that your connection to these services is secure and reliable.

Advantages of Managed IT Services

It is reasonable to doubt that Managed IT services have any advantages over onsite in office IT personnel.  The advantages depend on factors such as, the size of your business.  If you are running a small 1 - 10 employee company, you probably don’t have the bank roll to hire a $60,000+ per year IT person to make sure everything is running smoothly.  And you probably don’t have the daily “OMG! The printer is broken again!” problems.  And even if you do have daily problems, it probably just means you don’t have the time or knowledge to fix those issues permanently.

What if you are a 10 - 100 employee company?  Maybe you have the revenue to hire a full time IT person, but should you?  It might make sense if you are in need of something technical 8 hours a day, or if things are not very stable in your environment.

And how about your 100 - 1000 or more employee company size?  What should you do about your IT needs?

In every case mentioned above, it is possible to save considerable revenue by choosing an IT consultant to manage your IT services.  Even if you need someone 8 hours a day to solve those problems that come up all the time.

What are the advantages of choosing Managed IT Services?
  1. Save Money
  2. Save TIME (see #1)
  3. Objective perspective on your technology needs

Cost of Doing Nothing

As a small to medium sized business you might be thinking “I’m saving a ton by ignoring my technology needs/problems”.  But this is dangerously ignorant.  The consequences of not securing your WiFi or not putting Anti-Virus on your computers, and not maintaining it, are huge!  You are fooling only yourself if you think that you won’t be hacked, or that no one cares enough about your business to try to hack you.  Small and medium sized businesses are targeted by hackers because hackers know that most smaller businesses can’t afford to secure their networks, or keep software up to date with security patches.  By doing nothing it is going to cost you more than you think, it could even cost you your business!

Data breeches have cost companies billions of dollars over the past 5 years.  And not just the big guys!  Make sure you do something to keep yourself and your business protected against cybercrime and feel free to contact us for a free consultation.

JBitPro Managed IT Services

We service the greater Houston area with Managed IT services and would love the opportunity to save your company money.  We have several monthly plans to choose from, as well as affordable hourly rates for those who don’t have a monthly service plan.

To learn more about our services and pricing:


FTC and Software Company Reach Security Settlement Over Unfair Practices

The FTC recently settled with Infotrax Systems, L.C. a technology company providing software to the direct sales industry. The settlement followed a breach suffered by the company, and involved allegations the company had failed to use reasonable security. According to the FTC, for almost two years, a hacker accessed InfroTrax’s server unnoticed at least seventeen...… Continue Reading

Google oferă recompensă: 1 milion de dolari să-i ataci telefonul Pixel

Compania IT Google oferă recompense mai mari în programul său de "bug bounty", care pot ajunge până la 1,5 milioane de dolari pentru "hackerii" independenți care reușesc să găsească vulnerabilități complexe în dispozitivele și softurile sale.

O treime dintre români ar fi dispuși să plătească o asigurare împotriva hackerilor

Securitatea cibernetică este una dintre principalele îngrijorări ale românilor, aproape jumătate dintre aceștia spunând că este probabil și foarte probabil să fie ținta unui atac cibernetic, cum ar fi furtul de date, infectarea/blocarea computerului în scopul cererii unei recompense, atacarea dispozitivelor electronice smart din locuință sau accesarea camerelor de supraveghere, arată un studiu realizat de IRES pentru UNSAR în luna septembrie. Aproximativ 33% dintre români sunt dispuși să încheie o asigurare pentru a se proteja de consecințele financiare ale atacurilor cibernetice.

Browserele Chrome, Edge și Safari au fost compromise de hackeri chinezi la o competiție

Hackeri etici de elită din China au compromis trei dintre cele mai cunsocute browsere de internet din lume - Chrome, Edge și Safari -, transmite publicația ZDNet, citată de Mediafax. Cei mai buni hackeri etici din China s-au strâns în acest weekend în orașul Chengdu pentru a participa la evenimentul Tianfu Cup.

tedu@honk.tedunangst.. bonked


The #e2k19 #openbsd #hackathon/#hikeathon is over.

Number of developers: 13

Means of transportation in and out: snowshoe, ski

Record morning temperature low: -27 deg C

Elks spotted: zero






tedu@honk.tedunangst.. bonked


I am currently implementing a #sndio support plugin for the opensmalltalk-vm, testing under #squeak. So #squeak has sound in #OpenBSD now.

However I still have some glitches there, as the sound samples seem to have a hall effect, which I guess is due to some samples get repeated or played too often.

I am still uncertain whether that's an effect in handing in too much data to sndio or whether that's sndio's problem with resampling or something.

Is there a #openbsd hacker attending #36c3 that I could show them my WIP and ask for comments?


Executive: Director of Growth - New York, New York

Director of Growth New York, NY - Our client is revolutionizing a regulated public works system of rigid schedules to a fully dynamic, on-demand network. As Director of Growth, your mission will be to scale a team of professionals to conquer the growth efforts across all our client's consumer markets in North America and Europe while contributing to the build of a groundbreaking brand. - Responsibilities: Work as the senior leadership component of the funnel management vertical within user growth, engaging with top-level management across the company. Build and lead a world-class team of acquisition, engagement, and retention marketers and growth hackers. Uncover new growth opportunities to acquire new and engaged users. Optimize their user engagement funnel; advance their ability to segment, target, and serve their various types of customers. Own a multi-million-dollar acquisition and engagement marketing budget including advertising, incentives, and promotional spend. Be the primary touchpoint with product teams to progress product and technology-led opportunities for user growth. Optimize conversion through rigorous testing of initiatives including paid media campaigns, organic initiatives, conversion rate optimization, and engagement. Constantly scrutinize and analyze all ongoing initiatives and strategies, reacting appropriately to pivot spend and capitalize on opportunities. Work closely with Brand and Design teams to craft effective and targeted messaging for new riders. - Qualifications: 10+ years in growth and acquisition marketing, with a track record of creating, planning and executing customer acquisition, conversion, and engagement strategies to drive transformative business results. Channel expertise across the entire marketing mix including offline and online channels. Strong background in marketing technology and data analytics, including experience with multi-channel attribution, conversion rate optimization, and customer segmentation. Experience working with data scientists, data visualization tools, attribution modeling, and data feeds. Hands-on, proactive approach and established testing philosophy. Excellent leadership and team-building skills. 5+ years of managing large teams of acquisition marketers Ability to work with multiple teams and functions within the company including creative, engineering, marketing, and legal. High level of independence and ability to execute across the marketing stack. A skilled professional communicator - you engage easily with people of all backgrounds. Self-starter who can power through ambiguity and thrives in a fast-paced, dynamic start-up environment. Strong academic background, MBA is a plus. ()

Düsseldorf Headlines, Freitag, 29. November 2019

BILD Düsseldorf: MINISTER MAUERT, OPPOSITION SAUER! – Peter Biesenbach (71, CDU) schweigt zur „Hacker-Affäre“ – und erntet wütende Zwischenrufe aus dem Publikum. EXPRESS DÜSSELDORF:  REDESCHLACHT UM DIE UMWELTSPUR – Am Ende gab’s eine knappe Mehrheit für sie. RHEINISCHE POST: ALLE DREI UMWELTSPUREN BLEIBEN – Emotional und elegant diskutierte der Stadtrat am Donnerstag mehr als zwei […]

Why you should never jailbreak your devices (no replies)

Why you should never jailbreak your devices
A jailbreak is a hack that seems to promise free apps, extra features, and better performance for your laptop, phone, gaming console, or even your tractor. Also called rooting, it instead removes essential security features from your device, leaving you vulnerable to stalkers, hackers, and thefts.
The history of jailbreaking is, ironically, largely one of freedom. Early hackers found that their computers had built-in restrictions from which they wanted to break free. Removing these restrictions provided freedom and a good programming challenge.
What’s the difference between rooting and jailbreaking?
Rooting and jailbreaking are the same thing, though jailbreaking is largely associated with iOS devices, which were often sold subsidized and locked to an expensive phone plan.
To ‘unlock’ the phone meant to exploit vulnerabilities in the phone’s operating system in a way that would upgrade privileges to ‘root’ or ‘superuser,’ allowing the user to install any program, and to generally control the device fully.
Some jailbreaks require you to re-jailbreak the device every time at startup, while other, more persistent manipulations are more permanent. All can be removed by reverting the phone to its factory setting—although there is the risk of ‘bricking’ the device and making it entirely useless.
Due to Android’s already open nature and the manufacturer’s permissive approach to ‘rooting,’ giving yourself full privileges on an Android phone is far more straightforward, but this can make manipulations more difficult to restore.
Rooted Android devices are far more common, even though the user already has access to a wider variety of features, and can install apps from unofficial stores or even installation files.
Rooting your device always makes it less secure
While some restrictions are indeed annoying, unnecessary, or built with the intent of milking users of their money, jailbreaks aren’t able to distinguish between necessary and malign limits.
For example, it is important that each installed app can only read its own data, and cannot access the data of other apps. Otherwise, they could obtain encryption keys, Bitcoin backup seeds, passwords, or your personal information. You would need to trust all your apps with all the data in your phone—an unnecessary and dangerous undertaking.
Additionally, rooting makes it easier for others to manipulate the software on your device, for example, by accessing its operating system when you plug it into somebody else’s USB port.
Your personal information would be entirely exposed, leaving you without privacy or any control of your data.

Here’s what to do instead of jailbreaking your phone
As jailbreaking or rooting is never an option for sane and security-minded folk like us, we must make other decisions when looking for the freedom to use our device the way we want. And to free us from poorly administered Digital Rights Management (DRM) or monopolistic restrictions.
1. Choose your device carefully
While it is relatively common to bundle software with hardware, not all devices are created equal. Some laptops and phones will make it relatively easy for you to install software, while others won’t.
Make a conscious decision before buying: Does the default software have the capabilities you expect, or can you install the operating system you want?
If you get a Laptop with Windows installed, do a quick search to see how well Linux runs on it. If you’re getting a phone, you might be interested in an Android alternative like LineageOS (formerly Cyanogen Mod).
2. Know what you are doing
If your device cannot easily be unbundled, make sure you know what you are doing. Cars and tractors, for example, also come with a proprietary operating system, but it can be more easily replaced than that of an iPhone.
It’s important that you know what you are doing, though, and what implications your alterations have on your safety and that of potential participants. Not all alternative firmware is well tested, and some might be outright malicious, too.
3. Campaign for the right to repair
Your fridge, car, phone, TV, or air conditioner is yours, and it should be yours to repair. Organizations like the EFF campaign to free hardware from license agreements, and to invalidate clauses that make it impossible for you to control the things you own.
You can also contact your local hackerspace or library about tips and communities (or even start one of your own).
Don’t jailbreak or root your device
There may be instances when it is appropriate to root or jailbreak a device, perhaps for testing purposes or, for example, to run an IMSI Catcher.
Either way, never jailbreak or root the device you are actively using for communications or data storage. Anything with your personal details on should never be rooted and any rooted device should always be a dedicated spare one.
If you’re worried that your device may be rooted, or simply want to make sure it is not, you can always reset your device to its factory settings, or reinstall the operating system.
When comes to the issue of online privacy and security, let recommend a toof called VPN. RitaVPN is a relatively new VPN service, but it’s already making a name for itself. Its features include split tunneling, double encryption, kill switch protection, makes it one of the best VPN in 2019. VPN download Qwer432

Network 10 servers hit by hackers

Exclusive: 10 was hit with a major corporate crisis when its servers were hacked, just before the Melb. Cup Carnival.

Check Out Websites Like for Ultimate Mobile Gaming Experience


Mobile gaming is the norm these days! Though most players prefer PC or consoles to play games, the rising community of mobile gaming has left the …

The post Check Out Websites Like for Ultimate Mobile Gaming Experience appeared first on Foreverdc.


Disney + User Account Info For Sale Already!


I just recently signed up for Disney +, and probably, so did you! Sigh. Watch out! Thousands Of Disney+ Accounts Are Up For Sale On Hacking Forums Forbes – By: Lee Mathews – “Disney’s hotly-anticipated streaming service Disney+ finally launched this week. Despite being open to the public for just a few days, hackers have already hijacked thousands of accounts [...]

The post Disney + User Account Info For Sale Already! appeared first on Dr. Bill.TV | The Computer Curmudgeon.


Mr. Robot, serie

Rami Malek es hoy en día un flamante ganador del Oscar. Lo ganó este mismo año por su interpretación/imitación de Freddy Mercury en Bohemian Rapsody. Pero antes de hacerlo protagonizó esta fantástica serie de hackers, ciberseguridad y tecnología, que se sale un poco de los cauces habituales nada realistas. Si hoy en día hacemos un...

Cyber Monday spy alert as FBI warns hackers can use your smart TV to watch YOU inside your home

THE FBI has issued a Cyber Monday alert to warn hackers may use your new smart TV to spy on you and steal your cash. The crime-busting organisation says hi-tech tellies are a snooper’s dream as they have to be connected to the internet to allow streaming services like Netflix. And the fact so many […]

ESP32 IoT Devices Vulnerable to Forever-Hack


A popular WiFi chip, ESP32, contains a security flaw that enables hackers to implant malware that can never be removed. The attack works by implanting code into eFuses, a chip feature that can only be configured once.

By Erik Costlow

Uddhav Thackeray takes oath as Maharashtra Chief Minister; 6 Cabinet Ministers follow suit


Shiv Sena leader Uddhav Thackeray,last evening, took oath as Maharashtra’s new Chief Minister in front of a packed Shivaji Park, the same iconic ground where his father late Bal Thackeray was cremated. Mr. Thackeray took oath in the presence of Governor Bhagat Singh Koshyari. He was accompanied by six Cabinet ministers — two each from […]

The post Uddhav Thackeray takes oath as Maharashtra Chief Minister; 6 Cabinet Ministers follow suit appeared first on .


Opera All Over the Map


See this story at


Community News Group

Montreal offers a lot of classical music — as well as diversity, much of historical and architectural interest, fine restaurants, and a designated Gay Village not far via Metro or even by foot from the venues where the two operas I saw were performed. (Like many such ‘hoods, it’s said to be less gay than back in the day.)

“Lucia di Lammermoor” (November 9), from Opéra de Montréal, filled the vast, modern Salle Wilfrid-Pelletier, named for a longtime Met conductor married in turn to fine second-tier divas Queena Mario and Rose Bampton. As Lucia, Kathleen Kim took over rehearsals on a week’s notice from the vocally more opulent but usually dramatically static Albina Shagimuratova. The company was lucky to get Kim, a diminutive, vulnerable stage figure with some interpretive guts and notably good staccati. Her voice lacks much weight below and high E flats were not on this occasion stellar, but she more than earned her check.

The production’s raison d’etre and highest achievement was the very first Edgardo of locally bred and trained tenor star Frédéric Antoun. A very credible Romantic hero, Antoun sang extremely well in good style, balancing Gallic float with Latin ping in his phrasing. He offered — in key! — one of the best final scenes since Alfredo Kraus’ long tenure in the great role, this despite being ludicrously upstaged by five (!!!) ghosts, an ill-advised hallmark “innovation” (as if!) of Michael Cavanagh’s otherwise clunkily old fashioned staging in the late Robert O’Hearn’s “Victor Book of the Opera”-worthy sets.

Cavanagh and routine conductor Fabrizio Ventura — who allowed far too many 1970s-style held final high notes — also cut the dramatically crucial Wolf’s Crag Tower scene, something one doesn’t expect at an international house. This gave Gregory Dahl’s seasoned, professional Enrico not much to do. Oleg Tsibulko’s solidly unremarkable Raimondo got his scene with Lucia. Rising tenor Mario Bahg sounded wonderful in Arturo’s brief but exposed duties, and Florence Bourg contributed a sonorous Alisa, unfazed by high Bs.

The next day brought — Antoun’s work aside — a far more interesting occasion in Opera McGill’s “Clemenza di Tito.” Michael Hidetoshi Mori’s fluid, intelligent production ingeniously blended modern choral dress with Ginette Grenier’s compelling period robes; using much more of the recitative (farmed out by Mozart to an assistant), Mori and the impressive conductor Stephen Hargreaves made this sometimes static opera compelling and exciting to a diverse public.

All the students cast showed accomplishment. Maddie Studt’s Sesto proved outstandingly credible visually, vocally and technically. The Vitellia, Avery Lafrentz, had a comic blast and showed a mettlesome, wide-ranging voice that should settle in. Olivier Gagnon was vivid and agile if not always dulcet in Tito’s tricky music; in a sudden misstep, Hargreaves rushed him through the crucial finale. Elisabeth Boudreault furnished an appealing Servilia ready for professional stages. Any music-minded visitor to Montreal should check out McGill’s calendar.

At November 14’s Boston Symphony concert, later repeated in New York, Austrian soprano Genia Kuehmeier, long away for North America, confirmed her high vocal quality in Mahler’s Fourth and honorably followed the composer’s prescribed dynamics. Andris Nelsons didn’t channel much interpretive specificity with his technically top-notch players’ work. The concert’s takeaway was the truly sensational playing of Leif Ove Andsnes in Grieg’s flashy, derivative Piano Concerto.

The next night Carnegie hosted the Chicago Symphony under Riccardo Muti in a program focused on Rome. Bizet’s youthful “Roma”, despite some initially intriguing channeling of brass chords reminiscent of “Tannhaeuser,” proved an exercise in spurious orchestral color; to my surprise the string section seemed under-rehearsed, which they were assuredly not in the final work, Respighi’s facile showpiece “The Pines of Rome.” In between came the real deal: Berlioz’s cantata “La mort de Cléopâtre,” a practice run for his later heroine Didon in “Les troyens.” Muti gets Berlioz and shook the heavens, as did Joyce DiDonato in a terrifically impressive demonstration of meaningful French declamation, stage savvy, and the vocal chops (up to ringing high B flats) to evoke the Egyptian ruler’s pride, regret, and desperate resolve. The crowd veritably shouted its approval; high time for her Didon to occupy a local throne!

Unlike New York, our nation’s capital still has a flourishing concert organization, Washington Concert Opera. November 24’s “Hamlet” offered the kind of wow-I’m-glad-to-be-present experience that one associates with great evenings when the much-missed Opera Orchestra of New York presented such nonpareil stars as Mariella Devia, Gabriela Benacková, and Renato Bruson. Ambroise Thomas’ score — here shorn of the ballet — may not be adequate to Shakespeare’s play (what could be?) but can boast several very fine scenes. Antony Walker let us hear the usually suppressed original final scene, with a (somewhat) happy ending in which Hamlet, Gertrude, Polonius, and Laertes all survive.

Jacques Imbrailo, best known for Billy Budd and Pelleas, proved very impressive as a Byronic, style-imbued Prince of Denmark, bringing an emo Ralph Fiennes vibe to his dramatic performance and using layered dynamics to fill out the portions — like the much-derided drinking song, actually clever in context — somewhat heavily scored for his sonorous lyric baritone. Lisette Oropesa also achieved a musical and theatrical triumph as Ophelia, finding the part’s hurt and pathos as well as the terrific staccati and chromatic scales; she has become an excellent interpreter of French opera.

The others, while satisfying, needed some further Gallic stylistic coaching. Eve Gigliotti brought a wide-ranging, dramatically implicated sound to Gertrude, a fine part, and Jonas Hacker dispatched Laertes’ limited but not easy music with flair. If his Claudius sounded rather weathered, Tom Fox has kept his range and his stage artistry.

Walker had assembled several other imposing low-voiced singers in Matthew Scollin (Horatio/ First Gravedigger), Brian Kontes (Ghost, channeling “Semiramide”), and Timothy Bruno (Polonius). Walker’s forces, while not perfect throughout, played with intent. It was an exciting evening.

David Shengold ( writes about opera for many venues.

Comment on this story.


Hackers Are Already Targeting Disney Plus Accounts

In case you weren't already aware, Disney recently launched a new video streaming service called Disney+ which has been driving Netflix and other established streaming services crazy with fear and apprehension since ...

Hackers Are Imitating Government Agencies To Spread Malware

Researchers at Proofpoint have found evidence of a new threat actor who has been sending out convincing looking emails. They are claiming to come from several government agencies. These include the Italian ...

Another WhatsApp Vulnerability Has Been Found

WhatsApp is the most popular messaging platform in the world. Unfortunately, that means it's got a giant bullseye on it where hackers are concerned. In recent months, the company has faced no ...

Поздравляем команду Bushwhackers!


23 ноября 2019 года состоялись онлайн-соревнования RuCTFE 2019. Команда Bushwhackers заняла второе место.

Основной целью RuCTFE является обмен опытом и знаниями в области компьютерной безопасности и желание весело провести время. Состязание оказалось поистине международным. Зарегистрировались 384 команды из них: команды из США - 26, Зимбабве - 1, Китай - 11, по 3 команды из Монголии и Казахстана, 140 команд из России, 4 из Бразилии и многие другие. Что доказывает интерес к информационной безопасности на наднациональном уровне.

RuCTFE - это соревнование типа Attack-Defence: командам был предложен образ виртуальной машины, а в ней - несколько сервисов, которые написаны на разных языках программирования. Написаны так, чтобы в них заведомо имелись множественные уязвимости. Во время игры команды зарабатывают очки за корректную работу сервисов своего сервера и за украденную информацию (она же — «флаги») с серверов других команд.

Состав команды победителей Bushwhackers, возглавляемой Максимом Мальковым: Наградов Евгений, Шейдаев Вадим, Прокопенко Валерия, Попов Константин, Капунин Иван, Короткий Фёдор, Ковальков Борис, фГоворков Илья, Сигалов Даниил, Лернер Эмиль, Хашаев Артур, Павлов Дмитрий, Лозко Роман, Самосадный Кирилл, Иванов Анатолий, Шарипов Александр, Балобанов Арсений, Сильчев Виталий.


Fernandinha Fernandez, Manu Fox - Hacker [HD 720P] Watch Online


Genre: Brazilian, SexyHot Productions, SexyHot, Hardcore, Latina, BlowJob, Big Ass

Fernandinha Fernandez, Manu Fox - Hacker [HD 720P] Watch Online


Maharashtra: Uddhav Thackeray Government Faces Floor Test


The Uddhav Thackeray-led Maha Vikas Aghadi government of the Shiv Sena-NCP-Congress alliance faces floor test in the Maharashtra Assembly on Saturday, 30 November.

Video: ANI

Support The Quint's independent journalism. Become a member now:
Check out The Quint for more news:
The Quint in Hindi:
For more videos, subscribe to our YouTube channel:

You can also follow The Quint here:

Fadnavis' haste to come to power sank BJP in Maharashtra: Raut

India Pioneer - Senior Shiv Sena leader Sanjay Raut on Sunday said former chief minister Devendra Fadnavis' haste to attain power and "childish comments" sank the BJP in Maharashtra and the latter became the opposition leader. With the coming together of Shiv Sena chief Uddhav Thackeray, NCP supremo Sharad Pawar

How to Create Your First Dungeons & Dragons Character

Lifehacker - Dungeons & Dragons used to be a weird little hobby, seen as hopelessly nerdy, childish, and even Satanic. Now it's a bigger cultural deal than Monopoly, even chess. It's featured in Stranger Things and the podcast The Adventure Zone. In the real world, it's trendy among artsy parents and their kids. And I hear it all the time: "I really want to start playing D&D." 



テーマ制作ハンズオン - baserCMS勉強会@福岡(初心者向けのハンズオン勉強会)が、本日開催されます!







  • 開催場所:Engineer Cafe - Hacker Space Fukuoka -
  • 日時:2019年11月26日(火)受付開始 18:00 / スタート 18:30 / 撤収 21:00
  • 持参物:ノートパソコンと学習意欲と思いやり
  • 費用:無料




ハンズオンセミナー形式で、こちらが準備した静的HTMLのコーポレートサイト(予定)を実際にbaserCMSにテーマ化して組み込んでいきます。 組み込み時のポイントや考え方のレクチャーを行いながら実施しますので、基本的な作り方がマスターできます。

  • HOMEにお知らせ一覧を表示
  • お知らせ詳細の表示
  • お問い合せフォームの設置

こちらが用意したAWS環境にFTP接続してもらい、 アップロードしながらブラウザでその都度確認していく流れになります



  • baserCMSを体験してみたい方
  • CMSでのサイト制作を体験してみたい方
  • 仕事の幅を広げたい方
  • Wordpress以外のCMSを知っておきたい方



  • HTML,CSSでのサイト制作経験(JavaScriotの知識は不要)
  • FTPでリモート接続して作業できること
  • 歓迎)PHP、Wordpressの制作経験



  • ノートパソコン(Windows,Mac問わず)
  • FTPクライアント
  • UTF-8が利用できるエディタ ( VSCodeがオススメ )

《注意事項》 当日は、環境を揃える為、運営側でサーバーを準備します。



Data of 21 million Mixcloud users put up for sale on the dark web


A hacker has breached online music streaming service Mixcloud earlier this month, and is now selling the site's user data online, on a dark web marketplace.

The hack came to light on Friday, when the hacker contacted several journalists to share news of the breach and to provide data samples, including to ZDNet.

Accordig to a sample of the stolen data, the hacker is selling Mixcloud user information that includes details such as usernames, email addresses, hashed password strings, users' country of origin, registration dates, last login dates, and IP addresses.

The breach appears to have taken place on or before November 13, which is the registration date for the last user profile included in the data dump.


Image: ZDNet

ZDNet emailed several users whose data was included in the sample we received, and several have confirmed they had recently registered a Mixcloud account. Tech news sites TechCrunch and Motherboard also verified the data authenticity through other means, as well.

Mixcloud confirmed the breach in a blog post on Saturday.

The company said that most users had signed up through Facebook, and did not have a password associated with their account.

For those that did, Mixcloud said that passwords should be safe, as each one was salted and passed through a strong hashing function (SHA256 algorightm, accordng to the sample we received), making it currently impossible to reverse back to its cleartext form.

Either way, the company recommended that users reset passwords, just to be safe.

This means that the data advertised on the dark web right now is just a long list of email addresses and uncrackable passwords. The Mixcloud data is currently sold for a price of $2,000.


Image: ZDNet

The hacker behind the Mixcloud breach goes by the name of A_W_S, and has been involved in other hacks together with another hacker known as Gnosticplayers.

He previously claimed responsability in August for hacking Canva (137 million users), Chegg (40 million), Poshmark (36 million), PromoFarma (26 million), RoadTrippers (25 million), StockX (6.8 million), StorEnvy (23 million), and Wirecard Brazil (48 million).

When ZDNet asked for proof of the breaches, he only provided user data samples for four -- namely Canva, Chegg, PromoFarma, and RoadTrippers.

Only Canva, Chegg, and StockX publicly acknowledged the breaches. The other five companies did not return a request for comment from ZDNet, sent back in August.

This data, too, had been put up for sale online, on August 5, earlier this year.


ImageL ZDNet


Comentario en T2 Transporting en Madrid por florida film festival 2013

Howdy! I know this is somewhat off topic but I was wondering which blog platform are you using for this website? I'm getting tired of Wordpress because I've had issues with hackers and I'm looking at alternatives for another platform. I would be awesome if you could point me in the direction of a good platform.

How to Learn Faster Than Everyone Around You with Scott Young

Episode Show Notes . Learn More About the Show The 5 AM Miracle Podcast . Free Productivity Resources Join The 5 AM Club! . The 5 AM Miracle Book Audiobook, Paperback, and Kindle . Connect on Social Media Facebook Group • Instagram • Twitter • LinkedIn . Episode Summary Learning really fast is sexy, but is it possible for you? Yes! In this week’s episode of The 5 AM Miracle Podcast I chat with Scott Young, author of Ultralearning: Master Hard Skills, Outsmart the Competition, and Accelerate Your Career about learning at a rapid pace. . Resources Mentioned in this Episode SideTrak [Get 10% off your portable monitor] HempFusion [Get 20% off + free shipping with code 5AM] Business Licenses, LLC [Get started with their help today] BetterHelp [Get 10% off your first month with code 5AM] Scott Young [Check out Scott’s Website] Ultralearning: Master Hard Skills, Outsmart the Competition, and Accelerate Your Career [Book by Scott Young] . Scott Young Scott Young is the author of the Wall Street Journal and National best selling book, Ultralearning: Master Hard Skills, Outsmart the Competition, and Accelerate Your Career. Scott has been a prolific writer on his blog since 2006 where he writes about learning, productivity, career, habits, and living well. He is known for documenting learning challenges such as learning a 4-year MIT computer science degree in one year, learning four languages in one year, and learning to draw portraits in 30 days. His work has been featured in TEDx, The New York Times, Lifehacker, Popular Mechanics and Business Insider. Find out more at

The $6 Trillion Problem The Energy Industry Is Ignoring

Cybersecurity has long flown under the radar of the governments worldwide. Hackers are set to cost countries across the globe $6 trillion in the next two years, dwarfing the economic impact of natural disasters. And it’s not just small-timers sitting in a basement asking your grandmother for bitcoin, either. Independent and state-sponsored hackers alike are increasingly targeting major financial institutions, critical infrastructure and other points of support which make the world go round. Financial firms are already on edge, suggesting…

Comment on Hello world! by Roxanne

Good day! Do you know if they make any plugins to protect against hackers? I'm kinda paranoid about losing everything I've worked hard on. Any recommendations?

King Corbin


Cock King, Corbin Colby is BACK to destroy yet another hot, horny, young hole! Fresh faced, Jacob Hansen gets the business end of Corbin's colossal club this go round; and, he starts off like any good boy should, on his knees, worshipping the wide weapon with superstar, cock sucking skills! Colby has a carnal craving for twink cock. He downs the dude's dong with tongue swirling skill, cupping the boy's bubble butt to take his dick even deeper down his throat. Always the pleaser, Colby gives the boy's balls, and butt hole a hot tongue bath; then, he lies back and allows Hansen to hop on for a ride. The agile bottom balances his beautiful bubble butt above Colby's king sized slab, spread eagle for the camera, his own beefy bone bouncing for our watching pleasure. Corbin wraps a strong hand around Hansen's hog; and, it instantly stretches more than a few inches. He jacks Jacob's jock as the boy bounces, filling his fuck hole with the fat piece. Then, the top titan turns the twink on his side for a severe slab slam. He smashes Jacob's back seat till his pretty head dangles off the bed; and, he's moaning for more fuck! Colby stands, steadying his tree trunk legs to really lay into the lad. Then, he and Jacob take turns tugging the twink's tally whacker till bottom boy blows! He gasps for air, reaches up to feel Corbin's muscled frame, then fires a fresh fuck load onto his tight, tan flesh! Colby cocks his gun, then empties his oozy ammo ALL over Hansen's hot, freshly hammered hole. Next, he pushes his prized porn spooge deep up the dude's dirt road with his thick, still throbbing monster cock! Get a cum rag boys, you're gonna need it.


Data of 21 million Mixcloud users available for sale on the dark web


The online music streaming service Mixcloud was recently breached by a hacker that is attempting to sell stolen user data a dark web marketplace. On Friday, the hacker that goes online with the handle “A_W_S” contacted multiple media outlets to disclose the hack, it also provided data samples as proof of the data breach. The […]

The post Data of 21 million Mixcloud users available for sale on the dark web appeared first on Security Affairs.


Google warned 12K+ users targeted by state-sponsored hackers


Google revealed that over 12,000 of its users were targeted by state-sponsored hackers in the third quarter of this year. Google’s Threat Analysis Group (TAG) revealed that it has detected and blocked attacks carried out by nation-state actors on 12,000 of its users in the third quarter of this year. Over 90 percent of the […]

The post Google warned 12K+ users targeted by state-sponsored hackers appeared first on Security Affairs.


IKEA sofa with genius armrest storage


Bet you never knew your sofa armrests were prime storage space. Ok, so the guys at IKEA are the masters of hidden / secret storage everywhere. In fact, one of the things I most loved about the ESKILSTUNA sofa series was the undercover storage on the chaise lounge, but… what? More than 80 liters of storage […]

The post IKEA sofa with genius armrest storage appeared first on IKEA Hackers.


DIY cat house you can easily make with an IKEA step stool


Our DIY Cat House project makes use of the IKEA BEKVÄM stool, with the space divided into two. A “Päls Hem” aka Fur House. We enclosed the space at the base of the stool to create a cosy nook for our cat to curl in. Add some soft furnishings into the “cave” and your cat […]

The post DIY cat house you can easily make with an IKEA step stool appeared first on IKEA Hackers.


IKEA Pax 2.0: The 2 main problems with Pax SOLVED!


Let’s address the PAX wardrobe bulge and sag problems. I did these mods, because in my opinion, there are two big problems with the PAX system: the back and the shelves. 1. The backer board is thin and not rigid. Over the time it deforms. It also doesn’t make the PAX frame very stable. (Others […]

The post IKEA Pax 2.0: The 2 main problems with Pax SOLVED! appeared first on IKEA Hackers.


Get your gift wrap rolls stored & organized. Once and for all


6 best tips for gift wrap storage and organization As the holiday season rolls around, Nadine asked a preemptive question: “How do you store your gift paper rolls?” The usual case, before the holidays we get a variety of gift wrap and then when the holidays are over, we end up with reams of paper. […]

The post Get your gift wrap rolls stored & organized. Once and for all appeared first on IKEA Hackers.


IKEA kitchen cabinets are great as wardrobes. Here’s proof.


Can you make a full height wardrobe from METOD kitchen cabinets? Oh, yes! This post started out as a Hackers Help question. Min wanted to know whether the MAXIMERA drawers could fit into PLATSA frames as she didn’t like the PLATSA range of doors. However, after deliberating it, she eventually ended up with the METOD […]

The post IKEA kitchen cabinets are great as wardrobes. Here’s proof. appeared first on IKEA Hackers.


6 ideas to make your IKEA doormat a lot more welcoming


The IKEA TRAMPA doormat is one of the best around. It’s made from renewable material (coir fibers) and comes with a non-slip backing. The plain coir doormat is so easy to keep clean too. Just shake it or vacuum the dust off. Photo: Ashley’s Studio Better yet, it’s super affordable. Only $4.99 for the small […]

The post 6 ideas to make your IKEA doormat a lot more welcoming appeared first on IKEA Hackers.


Diagnose Your Devices' Privacy Problems With This List From Mozilla


If you need a little help figuring out how to lock down your smart home devices (or those you’re considering purchasing), Mozilla is here to help. I recommend spending some time scanning through its “Privacy Not Included” list and bookmarking the pages for any devices you own. Not only does the site round up all the…



Luke Q&A Solo Show: Oxygen Therapy, My Rewilding Practices, & Gut Health Deep Dive #244


Before we get into today’s episode, I just want to thank all of you. I started these Q&A episodes a couple of months ago as an experiment and I’ve been blown away by the positive feedback and questions you’ve been sending my way. These are a blast for me to do and I love that it’s becoming a regular thing now.

I also want to say that I’m not a doctor. I don’t even play one on TV. However, I have spent the last few years finding and talking to the most forward-thinking doctors, wellness experts, spiritual leaders, and biohackers around — and I love sharing what I’ve learned with all of you.

If you want to ask some questions, come join us in The Life Stylist Podcast Facebook Group! It’s completely free, and you can even watch these Q&A sessions live in the future.

Jonathan wants to know more about hyperbaric oxygen chambers, which are actually great for everything from travel recovery to managing Lyme disease to treating erectile dysfunction. Tiffany asked about my rewilding experiences and how I strike a balance between the “wild,” natural lifestyle and modern biohacks. Finally, Peter wants to optimize his gut health. A classic that never goes out of style, and something that I’ve actually been working on a lot over the last few months.

Listen to learn more — and, again, thank you all for making this community so supportive and inquisitive.


Topics Discussed In This Episode:

  • What it’s like to be in a hyperbaric oxygen chamber
  • Why it’s the pressure, not the oxygen, that makes the hyperbaric oxygen treatments a transformative healing experience
  • There are other ways to get more oxygen in your brain and blood stream, but none are as safe or effective as hyperbaric oxygen chambers
  • Why I use oxygen chambers before and after flying
  • How to find an oxygen chamber near you
  • The #1 biohack to support your health — oh, and did I mention that it’s free?
  • How you can harness technology to get closer to nature
  • Becoming a modern hunter-gatherer
  • How to safely allow your body to absorb as much sun as possible
  • Dealing with a low libido or even erectile dysfunction? I have a couple hacks to help you out
  • How pornography can screw up your circadian rythym — and what you can do about it
  • The healing and grounding benefits of natural hot springs
  • How to make an ice bath in your home, if you can’t find cold a natural spring-fed body of water near you
  • Primary water: the water that the Earth makes itself
  • A highly underappreciated hack: (safely) interacting with and observing animals
  • Why limiting our range of movement is one of the biggest contributors to our society’s rapidly declining health
  • Escaping our indoor zoo to move like a wild human ape
  • Why I’ve struggled to hack my own gut health & what I’ve figured out about gut recovery
  • Don’t just guess how to address your gut health — do some tests
  • Viome: the best way to determine what foods are right for your body
  • How a functional medicine practitioner can help you optimize your unique microbiome
  • Why rectal ozone is a great option for someone with leaky gut (which is most of us these days)
  • Why you should avoid all food preservatives
  • How to cut glyphosate out of your diet, which can absolutely wreck your gut
  • Why your gut health may actually be caused by too few enzymes, not too many
  • Why you might want to consider colon cleansing, especially if you’re thinking about fasting in the near future


More about this episode.


Connect with Luke on social media to learn how to take your lifestyle to the next level, plus catch exclusive live interviews & events:

INSTAGRAM - @lukestorey //


TWITTER - @MrLukeStorey //



JUST THRIVE. Imagine this: a probiotic that actually does what it is supposed to do! I’ve tried so many different supplements, and when you find the right one — the one that really works — it’s like winning the lottery. So I was psyched when I tried Just Thrive Probiotic, the first and only spore-based probiotics and antioxidants. Their products have been the subject of groundbreaking clinical studies and demonstrated incomparable effects on the gut, even healing leaky gut. It’s super simple and it just works. You can use code ‘luke15’ for 15% off at


ORGANIFI. I talk about the Organifi green juice a lot because it’s delicious and I eat it every day, but did you know that they also make a red juice? This red juice powder is packed with antioxidants, immune-boosting herbs, and adaptogens like reishi and cordyceps mushrooms (which are really hard to make taste good – I have no idea how they did this). It’s super quick and easy nutrition on-the-go. Save 20% using code “LIFESTYLIST” at


PIQUE TEA. Say goodbye to stress, sleep better, get immune support, improve productivity, increase mental clarity and performance and get through your day with sustained energy and NO afternoon crashes or jitters. Get your hands on Pique Tea Crystals! Inspired by Simon (their founder’s) own personal health journey, they have a variety of teas that are designed to support gut health, fasting, promote calm and longevity. If you care about maximizing your health and unlocking your full potential, drink these teas. Their pu’er tea is exquisite - made from the rarest, purest, most ecological ingredients possible. It is the world's most precious tea, with the most concentrated polyphenols that provide immune and gut health support on top of cellular regeneration. Their Sun Goddess Matcha is also the purest matcha ever crafted, delicious on its own or when made into a latte. You can taste its quality through its umami taste. Use code “lukestorey” for 10% off at They rarely (if ever) have sales so you’d definitely want to check this out! Code excludes fermented pu’ers due to their limited quantity and rarity.


Love the Show? Youʻll really love Lukeʻs Master Market Online Store! 

It’s a win/win! Get direct links to all of Luke’s hand-picked biohacking and health products all in one place, get exclusive discounts, and support the show by making purchases through the web store >> SHOP NOW.

Other ways to support: 

SUBSCRIBE >> Apple Podcasts + Stitcher + Google Podcasts + Spotify

LEAVE APPLE PODCASTS REVIEW >> Simple step-by-step instructions

SHARE >> Spread the word! Tell your family, friends, neighbors, and all your social pals


Trump doesn't think he'll be impeached, continues to push 'Ukraine server' conspiracy


President Donald Trump on Friday promoted a debunked conspiracy theory that Ukraine interfered in the 2016 election, a day after a former White House adviser called it a "fictional narrative" and said it played into Russia's hands.

Trump called in to Fox & Friends and said he was trying to root out corruption in the Eastern European nation when he withheld aid over the summer. Trump's July 25 call with Ukraine's President Volodymyr Zelensky is at the centre of the House impeachment probe, which is looking into Trump's pressure on Ukraine to investigate political rivals as he held back nearly $400 million.

He repeated his assertion that Ukrainians might have hacked the Democratic National Committee's network in 2016 and framed Russia for the crime.

"They gave the server to CrowdStrike, which is a company owned by a very wealthy Ukrainian," Trump said. "I still want to see that server. The FBI has never gotten that server. That's a big part of this whole thing."

Trump's claim on Ukraine being behind the 2016 election interference has been discredited by intelligence agencies.

CrowdStrike is an internet security firm based in California. They investigated the DNC hack in June 2016 and traced it to two groups of hackers connected to a Russian intelligence service — not Ukraine.

One version of the debunked theory holds that CrowdStrike is owned by a wealthy Ukrainian. In fact, company co-founder Dmitri Alperovitch is a Russian-born U.S. citizen who immigrated as a child and graduated from the Georgia Institute of Technology.

The president repeated his claim one day after Fiona Hill, a former Russia adviser on the White House National Security Council, admonished Republicans for pushing unsubstantiated conspiracy theories about Ukrainian interference in the 2016 presidential election.

"Based on questions and statements I have heard, some of you on this committee appear to believe that Russia and its security services did not conduct a campaign against our country and that perhaps, somehow, for some reason, Ukraine did," Hill testified before the House impeachment inquiry panel. "This is a fictional narrative that has been perpetrated and propagated by the Russian security services themselves."

Democrats have said the so-called Crowdstrike theory makes little sense, the latest being Ted Lieu of California.

"Emails stolen from that server hurt Clinton & HELPED TRUMP," said Lieu.

Trump in the interview also worked to undercut witnesses at the hearings, including the former U.S. ambassador to Ukraine, Marie Yovanovitch, whom Trump recalled from her post in Kyiv. The president called her an "Obama person" and claimed without evidence that she didn't want his picture to hang on the walls of the embassy.

"There are a lot of things that she did that I didn't like," he said, adding that he asked why administration officials were being so kind to her. "'Well, sir, she's a woman. We have to be nice,' he said they told him. Without providing details, Trump said he viewed her differently. "She's very tough. I heard bad things," he said.

He previously lashed out at Yovanovitch on Twitter while she was appearing before the House intelligence committee on Nov. 15, leading intelligence committee chair Adam Schiff to get her reaction in real time.

Trump said he does not expect to be impeached, claiming Democrats have "absolutely nothing" incriminating, despite days of public testimony by witnesses who said Trump withheld aid from Ukraine to press the country to investigate his political rivals.

"I think it's very hard to impeach you when they have absolutely nothing," Trump said, adding that if the House did vote to impeach him, he would welcome a trial in the Senate.

Trump told Fox & Friends that "there was no quid pro quo," in his efforts to push Ukrainian President Zelensky to open investigations of former Vice-President Joe Biden and his son's dealings in Ukraine.

The president's assertion is at odds with sworn testimony by impeachment witnesses.



Best WordPress Firewall Plugins You Should Use On Your WordPress Site


Do not let hackers jump into your website, install WordPress firewall plugins on your website Firewall plugins are necessary to protect your website WordPress site […]

The post Best WordPress Firewall Plugins You Should Use On Your WordPress Site appeared first on Wbcom Designs.


Google Confirms Android Camera Security Threat Affecting Millions


  A serious vulnerability affecting Google and Samsung smartphones, with the potential to impact hundreds of millions of Android users, was recently confirmed, according to a story in Forbes. Researchers discovered that hackers could take control of a smartphone user’s camera apps and remotely take photos, record video, spy on your conversations by recording them […]

The post Google Confirms Android Camera Security Threat Affecting Millions appeared first on Deutsches Asienforschungszentrum.


Webstránka predávala špionážny softvér, umožňoval kradnúť dáta aj pripojiť sa na webkameru


Produkty spoločnosti Imminent Methods si kúpilo 14 500 ľudí.

The post Webstránka predávala špionážny softvér, umožňoval kradnúť dáta aj pripojiť sa na webkameru appeared first on


Video: Kelly Patrick Show 107


Kelly and Alex Hacker review HRMMA 112.  

Video: Averything 15


Alex Hacker and Blake O'neil join me as we break down Real housewives of Atlanta Season 12 Episode 3 and Real Housewives of New Jersey Season 10 Episode 3. we also discuss Kanye, Taylor Swift, Grammy noms. I also start a new segment for the queen Mari...

Konstancia: 3 актёрских приёма, которые помогут справиться со стрессовой ситуацией


Они пригодятся на собеседовании, деловой встрече и во время любых взаимодействий с людьми.

Попробуйте вспомнить, когда вы в последний раз были актёром. Может, в школьной постановке или в караоке с коллегами. А может, на встрече с начальником, когда вы обсуждали прибавку к зарплате.

Эту статью можно не только прочитать, но и послушать. Если вам так удобнее — включайте подкаст.

На первый взгляд третья ситуация выбивается из общего ряда, но только не для Эми и Майкла Портов, профессиональных актёров, которые стали специалистами по публичным выступлениям. По их словам, большинству из нас постоянно приходится играть, даже если мы сами этого не замечаем. «Нам нужно говорить тосты, произносить прощальные речи, презентовать себя на собеседованиях, вести переговоры, — рассказывает Майкл. — И всё это ситуации, в которых ставки очень высоки».

Чтобы преуспеть в них, попробуйте думать как профессиональный актёр. Они используют специальные приёмы, чтобы создать на сцене правдоподобный вариант реальности. И обычным людям эти хитрости помогут создать ту версию, которая им необходима.

Это не значит, что нужно манипулировать другими или притворяться. Просто коммуницируйте так, чтобы окружающие прониклись вашей точкой зрения.

Вспомните театр: Джульетта может заставить зрителей почувствовать, почему она непременно должна выйти замуж за Ромео. Вам, может быть, нужно убедить хозяина квартиры заменить сломанную плиту или договориться с родителями друзей вашего ребёнка, чтобы устроить совместное мероприятие.

«Мы целыми днями пытаемся повлиять на других людей и вызываем у них какие-то чувства, — говорит Эми. — Даже если не ставим сознательной цели, мы всё равно пытаемся получить то, что хотим, и вызываем у окружающих какую-то реакцию». В некоторых случаях от этого зависит очень многое, и Майкл и Эми советуют применять в этих ситуациях следующие приёмы.


1. Понимайте свою конечную цель

Актёр всегда выступает, чётко представляя, чего хочет добиться от зрителей. Возьмите это на вооружение. Перед следующей ответственной ситуацией задайте себе вопрос, который задают актёры, прорабатывая персонажа: «Какая у меня конечная цель?»

То есть подумайте не только о краткосрочных последствиях, но и о долгосрочной перспективе.

Например, Майкл рассказал, что при знакомстве с родителями Эми он не ломал голову, как бы произвести на них хорошее впечатление. Он думал, что в долгосрочной перспективе хочет гармоничную сплочённую семью. Поэтому принимал решения, соответствующие этой большой цели.

2. Подумайте, какие чувства вы хотите вызвать у другого человека

То, как актёр говорит и двигается во время представления, тоже служит для достижения цели и помогает произвести нужное впечатление на зрителей. Это называется «разыграть сцену». В обычной жизни приём пригодится, например, на собеседовании.

Допустим, вы хотите, чтобы работодатель понял, что вы открытый человек и умеете сотрудничать с другими. Тогда для вас «разыграть сцену» — это рассказать, как вы рады взаимодействовать с новыми коллегами и чему-то учиться у них, возможно, даже упомянуть кого-то по имени.

Если хотите показать, что умеете работать самостоятельно и с вами не придётся нянчиться, сообщите о полезных курсах, которые вы проходили (естественно, не лгите, если этого не делали). Или о методах, которые использовали на прошлом месте, чтобы оптимизировать труд.

Конечно, это не гарантирует стопроцентный успех. «Люди не всегда реагируют именно так, как вам бы хотелось, — говорит Майкл. — Но если вы научитесь плавно разыгрывать одну сцену за другой, следуя своей цели, то сможете импровизировать и быть гибким».

3. Примите свой страх

Спокойное отношение к дискомфорту — главное свойство для тех, кто выступает. И пожалуй, больше всего неудобств вызывает страх негативной оценки окружающих. Мы боимся, что нас не примут, станут высмеивать или критиковать.

Поэтому многие из нас стараются избегать рисков, но, как говорит Майкл, это убивает любое хорошее исполнение. Сложно расположить кого-то к себе, когда всё время пытаешься заглушить сигналы тревоги у себя в голове.

Научитесь управлять страхом. Напоминайте себе, что это естественное чувство. Если перед важным разговором у вас потеют ладони и сводит желудок, это всего лишь значит, что вы живой человек.

Прямо перед стрессовой ситуацией определите свой самый главный страх, связанный с ней.

Старайтесь быть максимально конкретным. Не ограничивайтесь фразой «Мне очень страшно» — найдите причину своих опасений. Может, вы боитесь не понравиться, беспокоитесь, что кто-то услышит, как у вас дрожит голос, или не хотите кого-то подвести. Психологи называют такое конкретизирование своего состояния эмоциональной детализацией. Тем, кому лучше удаётся сделать это, обычно легче управлять эмоциями и правильно на них реагировать.

И наконец, просто сделайте то, что нужно. Договоритесь с продавцом о снижении цены на автомобиль, начните общаться с потенциальным клиентом, выступите с докладом. «Чтобы хорошо держаться на сцене и преуспевать в трудных ситуациях, нужно идти на риски и не беспокоиться о критике», — напоминает Эми.

Конечно, такие актёрские приёмы не сделают из вас Мерил Стрип. Но они помогут говорить и действовать более обдуманно. В итоге вы будете лучше контролировать взаимодействия с окружающими, а не позволять стрессу вами руководить.


At UConn’s New $1M Cybersecurity Lab, Students Learn to Hack

At UConn’s New $1M Cybersecurity Lab, Students Learn to Hack shailaja.neela… Fri, 11/22/2019 - 16:29

Kazem Kazerounian, dean of the University of Connecticut’s School of Engineering, says the school’s recent addition of a cybersecurity lab isn’t just another computer lab — it’s the future.

“This is a lot more than an undergraduate lab for us, a lot more than a science experiment. It is [teaching] the skill sets our engineers need to be successful in this war against the bad guys,” Kazerounian tells the Hartford Courant.

At UConn, students this fall began taking classes in the $1 million lab, funded by alumni (and brothers) Stephen Altschuler and Samuel Altschuler. Cybersecurity courses will be mandatory for freshman majoring in computer science. By 2021, the university expects 100 students to be enrolled in cybersecurity courses each semester.

Right out of the gate, students are learning how to steal wireless network users’ login information using a fake banking website.

As scary as that sounds, the students’ mission is actually to learn how to prevent or deal with cyberattack threats rather than to carry them out. UConn students are learning these and other hacking techniques — like password cracking, wired network sifting and wireless hijacking.

“We are in an age where the threat of cyberattacks has gotten more pervasive. As an institution, we need to be training the next generation of engineers to combat this threat, which is why this gift from the Altschuler brothers is so important for the School of Engineering and the University,” said Kazerounian to UConn Today. 

MORE FROM EDTECH: How Schools and Universities Can Thwart Cyberattackers

A Hands-On Approach to Cybersecurity Education

UConn’s cybersecurity courses are fully hands-on and will be entirely practice-based rather than lecture oriented, says Ben Fuller, an assistant professor who designed the course material. If the idea of hacking in the wild sounds unsafe, have no fear. Students don’t learn by hacking into actual operational networks. They learn over a monitored system and on an isolated network separate from that of the school.

The course’s first-year curriculum covers such areas as cyber hygiene in software and hardware, website security, the secure configuration of networks and networked systems, security in network routing, and vulnerabilities in commercial, off-the-shelf devices and IoT devices.

A Steep Rise in Cyberattacks on Businesses and Consumers

Why the push for a more comprehensive cybersecurity curriculum? 

Hacking is only becoming more and more pervasive. In July, a data breach at Capital One bank affected more than 100 million people in the U.S. and put at risk about 140,000 Social Security numbers, as well as about 80,000 linked bank account numbers. Several higher education institutions, including UConn itself, have also already been victims of data breaches by cyberattackers.

A Zogby Analytics survey reveals 58 percent of more than 400 business executives reported an increase in suspicious phishing emails — messages claiming to be from a senior manager or a vendor seeking payments — in the last year. About 47 percent of employees who received those fake emails were duped and transferred company funds. About 37 percent of those losses ranged between $50,000 to $100,000, according to the survey. Meanwhile, data breaches are also threatening the security of more U.S. consumers. An April survey by HSB found that 21 percent of consumers said they had been the victim of identity theft, compared with 18 percent two years earlier.

It’s no wonder that the National Academy of Engineering has declared the security of cyberspace to be one of 14 major engineering challenges of the 21st century. 

“[Hackers] affect everything from Fortune 500 companies to local governments —and, yes, research universities,” says UConn President Thomas Katsouleas.


Review: Cisco Meraki MX64 Cloud-Managed Platform Tightens Network Security

Review: Cisco Meraki MX64 Cloud-Managed Platform Tightens Network Security shailaja.neela… Thu, 11/21/2019 - 13:56

Protecting college students, educators, visitors and other users of a busy campus network can be challenging.

With so many people logging in and making use of resources, and so much personal information potentially flowing through the network, modern campuses are tempting targets for hackers and other cybercriminals. Institutions need to protect themselves as least as well as most businesses and corporations do. 

On many campuses, limited IT budgets and a lack of dedicated staff make network protection a challenge. What is needed is advanced cybersecurity that is both easily scalable and simple to manage.

That’s where the Cisco Meraki MX64 cloud-managed security appliance can help. Designed to protect campus environments from cyberthreats without taxing IT budgets, it includes intrusion protection, anti-virus, content filtering and the ability to create secure VPN tunnels for authorized users. 

Unlike most security appliances, the MX64 can be installed in seconds and managed over the cloud. Here’s how that works: The MX64 connects through the cloud to a Cisco Meraki data center. It can then get all of its firmware upgrades through an SSL connection. 

Administrators can manage the device the same way, using a simple, graphical interface. Technical expertise is not required to install the MX64 physically at an institution or to manage it remotely through the cloud — a plus for large environments or colleges with multiple locations.

MORE FROM EDTECH: 5 Tips for Starting a Campus Security Department from Scratch.

Control User Search Options and Prioritize Bandwidth Use

The MX64 has Layer 7 functionality and automatically integrates with Microsoft Active Directory, which lets it enforce content filtering options for various groups, applications or individual users. Features also include web search filters that can be quite detailed, such as granting teachers and administrators greater access than students, or perhaps giving students more rights than guests. Google SafeSearch and YouTube for Schools are also included.

Admins can also prioritize applications or users in terms of bandwidth, so that critical applications aren’t slowed at peak use times. And regardless of how the bandwidth is configured, the Cisco Threat Grid and advanced malware protection cover all traffic.

Amid the entire line of Meraki security appliances, the MX64 is designed for the smallest number of users and can simultaneously support 50 concurrent users as well as 50 VPN tunnels. Stack several MX64s for additional bandwidth. Also, larger institutions can install more enterprise models, such as the MX84, which supports 500 users, or the MX450, which can handle up to 10,000 clients.

For busy campuses with small IT budgets, the MX64 offers protection while streamlining most of the administrative homework that such an effort would normally entail.

MORE FROM EDTECH: The Hardware Behind Keeping Campuses Safe.

John Breeden II is an award-winning reviewer and public speaker with 20 years of experience covering technology.


HPR2956: HPR Community News for November 2019


New hosts

Welcome to our new hosts:
Nihilazo, Daniel Persson.

Last Month's Shows

Id Day Date Title Host
2935 Fri 2019-11-01 The work of fire fighters, part 3 Jeroen Baten
2936 Mon 2019-11-04 HPR Community News for October 2019 HPR Volunteers
2937 Tue 2019-11-05 Lord D's Film Reviews: His Girl Friday lostnbronx
2938 Wed 2019-11-06 Naming pets in space game tuturto
2939 Thu 2019-11-07 Submit a show to Hacker Public Radio in 10 easy steps b-yeezi
2940 Fri 2019-11-08 Better Social Media 05 - Mastodon Ahuka
2941 Mon 2019-11-11 Server Basics 107: Minishift and container management klaatu
2942 Tue 2019-11-12 Why I love lisps Nihilazo
2943 Wed 2019-11-13 Music as Life brian
2944 Thu 2019-11-14 ONICS Basics Part 4: Network Flows and Connections Gabriel Evenfire
2945 Fri 2019-11-15 Saturday at OggCamp Manchester 2019 Ken Fallon
2946 Mon 2019-11-18 Sunday at OggCamp Manchester 2019 Ken Fallon
2947 Tue 2019-11-19 The Mimblewimble Protocol mightbemike
2948 Wed 2019-11-20 Testing with Haskell tuturto
2949 Thu 2019-11-21 Grin and Beam: The 2 major mimblewimble blockchains mightbemike
2950 Fri 2019-11-22 NotPetya and Maersk: An Object Lesson Ahuka
2951 Mon 2019-11-25 A walk through my PifaceCAD Python code – Part 2 MrX
2952 Tue 2019-11-26 Publishing your book using open source tools Jeroen Baten
2953 Wed 2019-11-27 How I got started in Linux Archer72
2954 Thu 2019-11-28 Wrestling As You Like It episode 1 TheDUDE
2955 Fri 2019-11-29 Machine Learning / Data Analysis Basics Daniel Persson

Comments this month

These are comments which have been made during the past month, either to shows released during the month or to past shows. There are 16 comments in total.

Past shows

There are 2 comments on 1 previous show:

  • hpr1585 (2014-08-29) "36 - LibreOffice Calc - Financial Functions - Loan Payments" by Ahuka.
    • Comment 1: timttmy on 2019-11-30: "Thanks"
    • Comment 2: Ahuka on 2019-11-30: "I'm glad it helped"

This month's shows

There are 14 comments on 8 of this month's shows:

  • hpr2935 (2019-11-01) "The work of fire fighters, part 3" by Jeroen Baten.
    • Comment 1: Ken Fallon on 2019-11-05: "That sucks"
    • Comment 2: Ken Fallon on 2019-11-05: "That blows"
    • Comment 3: Ken Fallon on 2019-11-05: "You're Fired"

  • hpr2936 (2019-11-04) "HPR Community News for October 2019" by HPR Volunteers.
    • Comment 1: lostnbronx on 2019-11-04: "Ken's Voice Is Better Than espeak"
    • Comment 2: Jon Kulp on 2019-11-05: "Pots"
    • Comment 3: clacke on 2019-11-19: "Release order or episode order?"

  • hpr2939 (2019-11-07) "Submit a show to Hacker Public Radio in 10 easy steps" by b-yeezi.
    • Comment 1: Ken Fallon on 2019-11-07: "Clarification"

  • hpr2940 (2019-11-08) "Better Social Media 05 - Mastodon" by Ahuka.
    • Comment 1: ClaudioM on 2019-11-08: "Simple Mastodon Timeline View Option"

  • hpr2942 (2019-11-12) "Why I love lisps" by Nihilazo.

  • hpr2943 (2019-11-13) "Music as Life" by brian.
    • Comment 1: Carl on 2019-11-21: "Interesting Episode"

  • hpr2944 (2019-11-14) "ONICS Basics Part 4: Network Flows and Connections" by Gabriel Evenfire.
    • Comment 1: Dave Morriss on 2019-11-27: "This is wonderful"

  • hpr2955 (2019-11-29) "Machine Learning / Data Analysis Basics" by Daniel Persson.
    • Comment 1: b-yeezi on 2019-11-29: "Great first episode"

Mailing List discussions

Policy decisions surrounding HPR are taken by the community as a whole. This discussion takes place on the Mail List which is open to all HPR listeners and contributors. The discussions are open and available on the HPR server under Mailman.

The threaded discussions this month can be found here:

Events Calendar

With the kind permission of we are linking to The Community Calendar.

Quoting the site:

This is the community event calendar, where we track events of interest to people using and developing Linux and free software. Clicking on individual events will take you to the appropriate web page.

Any other business

Stand at FOSDEM

Our proposal for a “Free Culture Podcasts” stand at FOSDEM was accepted for the Sunday 2nd February. This is fantastic news as this is the largest FLOSS event in Europe and is absolutely thronged the whole day.

Anyone going to FOSDEM, and who would like to help staff the booth on Sunday please get in touch.

Tags and Summaries

Thanks to the following contributor for sending in updates in the past month: Dave Morriss

Over the period tags and/or summaries have been added to 5 shows which were without them.

If you would like to contribute to the tag/summary project visit the summary page at and follow the instructions there.


Comment on Network 10 servers hit by hackers by Teoni

It doesn't have to be complicated. Even just storing things on an external hard drive can save a lot of pain. In this new digital world it is dangerous not to back up anything.

Comment on Network 10 servers hit by hackers by Wharto

Studio automation (Mosart) didn't fare too well either it has been said.

Why Every Developer Needs to be a Generalist


Developer Generalist vs Specialist

Context, as they say, is king.

The age-old question of exactly what a software developer should focus on learning has been crossing my mind a lot lately. More than ever, our technology is evolving at a furious pace - and the coding world is definitely feeling the pressure. It can be overwhelming to choose where to pay attention and what to dismiss as a passing fad.

So what are you to do? Let’s look at what the next decade has in store for the development world.

Past Predictions

Cory House spoke convincingly on the merits of specializing in one area to become a known and trusted voice. A few years ago, Forbes came out with a high level article proclaiming the opposite. More recently, I stumbled upon this post on Hacker Noon embracing the notion of both specialist and generalist. Which way is a developer supposed to go? The answer to this question can feel largely opinion-based but there are some logical ways to examine it. Let’s get started.

How Do I Choose the Right Tech to Focus On

This is the question for a specialist: how to leap frog from one framework lilypad to another. It’s easy to fall in love with a specific area of coding and become obsessed - I’ve certainly done it. However, it can truly lead to a head-in-the-sand position when the world moves on without you (my condolences to Windows Phone developer friends, for example).

Are You Saying I Should be a Full Stack Developer

Great question! “Generalist” doesn’t always mean “Full Stack”; they aren’t interchangeable. The traditional view of a full stack programmer referred to the web (back end and front end) but there are many different places where code plays a role!

Personally, I’ve coded for voice, IoT, APIs, timer jobs, mobile apps, intranet sites, external websites, ETLs, and the list goes on. Is any of that knowledge evergreen? Some of it! Mostly the ways in which I interacted with my team and product owner - not how I specifically customized a Sharepoint page.

You can carry a cross-section of evergreen knowledge with you as a software engineer. A specific part of those “years of experience” is still applicable to whatever you need to work on now. And that part fits neatly into being a generalist developer.

Why Does Future Tech Require a Generalist Approach

Regardless of what kind of coding you do now, areas of our industry are developing in impossible to ignore ways. Remember when Javascript started taking over the world? If you wanted to do anything in the browser, you had to learn it. Now, not only does it influence the browser - Node.js & Reactive Native have hugely influenced API and mobile app development as well.

Remember when AI was just another fad? With advancements in Machine Learning, Deep Learning and Big Data analytics - it doesn’t look so dismissable anymore.

Even if your main gig is maintaining a legacy code base, you owe it to your future self to know what tools are out there, different than what you use today. This knowledge doesn’t have to be super deep to be powerful, but you do need to know enough about current and future industry techniques to understand where your experience can fit.

What Should All Developers Learn Right Now

I’m glad you asked! There are a few areas in particular that developers really can’t afford to ignore anymore.

1. Security

Naturally, the developer relations team here at Okta cares a lot about this topic! Often, developers are content to make a system ‘just work’ well enough to get out the door for a deadline. The result is company after company coming forward and admitting to their users that their data was not securely stored or collected. This is an area you HAVE to educate yourself on.

Get started with the basics like the OWASP Top 10 security vulnerabilities. The Cheat Sheet Series is another excellent resource for app devs looking to become knowledgeable on security quickly.

Next, make sure you are coding securely from the very beginning, from how you store API keys to the way you deploy your code. This is one area you cannot afford to cut corners. We’ve got lots of blog posts here at Okta to get you up to speed on user security specifically.

2. Machine Learning

Automation will come in many forms and affect all areas of technology. You should have at least a cursory understanding of how your data is fed into various algorithms and the decisions those algorithms can make.

You’ll need to use coding languages like Python and/or R to get started in this area and there are great tutorials on using Jupyter Notebooks to help. However, if you are interested in using machine learning as a service, Microsoft has come a long way with Cognitive Services, which will allow you to use REST APIs to do basic machine learning tasks like image recognition or text analysis. No matter what business you are part of, AI is here to stay in some capacity and you will probably need to interact with it in some way.

3. DevOps/TechOps

Even if you aren’t the keeper of the big red deployment button, it’s crucial for all developers to understand how code gets to production. From mastering pull-request procedures to knowing how your application architecture impacts hosting costs, development work is intrinsically tied to ops work. This is especially true with microservices architecture, which often impact the bottom line.

Reach out to your local DevOps or TechOps meetup or user group and get acquainted with a few people who really know the practice. If that’s not an option in your area, watch a few video courses on the subject. Look into scripting tools for DevOps automation like Terraform or Pulumi. Playing with infrastructure as code can actually be quite enjoyable and a nice change of pace coming from application development. Whether you are the only technical person both building and deploying code, or you are one part of a large department with a separate DevOps team, take the time to become educated on this flow.

What Do You Think Developers Should Learn

Being a specialist can be rewarding, but being a generalist is a necessity. You truly do need a bit of both; just remember not to sacrifice general knowledge in order to focus on your preference. Security, Machine Learning, and Dev/Tech Ops are the top 3 topics I believe have strong merit at the moment, but that list is certainly not exhaustive. Comment below with what you believe every coder needs to add to their ever-growing toolbox!

Learn more about Developer Careers, Tools, and Security

If you’d like to continue reading our thoughts on developer careers, we’ve published a number of posts that might interest you:

For other great content from the Okta Dev Team, follow us on Twitter and Facebook!


Inside #Microsoft’s effort to secure the vote


They’ll also use deepfakes to cause havoc in politics and financial markets. Lastly, Experian predicts, hackers will take advantage of less secure mobile payment options, often at events like concerts ...

12/1/2019: THE HEALTH HACKER: My toughest challenge


AFTER retiring from a gruelling NRL career, during which he spent more than eight years trying to stop manmountains from scoring on his wing, Beau Ryan thought he’d finally left the tough stuff behind. Television careers can seem pretty easy by...



GANGED pilchards are tempting the salmon and tailor residing in the gutters situated on the northern end of Wamberal Beach. The northern end of Paddy’s Channel is also worth investigating as locals have found bream and whiting when using live...

12/1/2019: THE HEALTH HACKER: Hacking starting something new with Beau Ryan

1 STAY FOCUSED. “I had to work really hard to get where I got to in rugby league, and I now take that same approach for radio and TV,” Beau says. “I don’t take anything for granted. I know how hard it is to be successful, and while I achieved a lot in...

12/1/2019: THE HEALTH HACKER: Ask Adam...

Q Like most people, I find myself struggling with motivation sometimes. What’s the one piece of advice you give people to keep them moving? A Motivation is often the only thing standing between who we are and who we want to be. The most important...

A tőzsdelopások ellenére továbbra is erős maradt a bitcoin

Az elmúlt év során számos kriptotőzsde esett hackertámadás áldozatául, több millió dolláros lopások történtek. A hatalmas veszteségek ellenére a bitcoin árfolyamát ezt nem különösebben érdekelte és tartotta a felfelé vezető …

Hackers Are Already Targeting Disney Plus Accounts

In case you weren't already aware, Disney recently launched a new video streaming service called Disney+ which has been driving Netflix and other established streaming services crazy with fear and apprehension since ...

Uddhav 8th Maha CM to take oath while not being MLA/MLC

Shiv Sena president Uddhav Thackeray will be the eighth person to take oath as Maharashtra chief minister while not being a legislator. Congress lead...

Using Eternal Terminal with OSX and AWS Including Ansible Support



I know, I know – it is 2019 and we’re not supposed to be SSH’ing into boxes – but, really, you’re going to do it anyway. And if you are going to ssh into boxes then, for heaven’s sake, let’s get rid of that stupidity that is your SSH terminal disconnecting whenever there is a simple blip in connectivity.

Eternal Terminal, ET, is a mature Open Source project that purports to solve SSH disconnects. I say “purports” because I have only just installed it and this blog post is my proof of concept to see how well it works. I’m essentially SSH’d into some box or another roughly 10 to 12 hours a day, 5 to 7 days a week.

Note: You can strike purports in the above paragraph. I’ve now been using Eternal Terminal though a variety of network conditions including changing my wifi connection with long running processes and it works great. I do not understand the deviltry that drives this pretty damn amazing bit of software but I sure do like it.


Here’s what you need to do to use ET on a local OSX to remote AWS context:

  1. You need to install ET (client) on your OSX box.
  2. You need to install ET (server) on your Linux server.
  3. You need to start ET (server) on your Linux server.
  4. You need to open port 2022 on your AWS security group.
  5. You need to adjust your SSH login statements.
  6. You may want to use an Ansible Playbook to install ET on your server.

Installing ET on OSX

Here’s how to install ET on OSX:

brew install MisterTea/et/et

Installing ET on your Server

Here’s how to install ET on Ubuntu:

sudo apt-get install -y software-properties-common
sudo add-apt-repository ppa:jgmath2000/et
sudo apt-get update
sudo apt-get install et

Starting Eternal Terminal on Your Server

After installation, ET should start automatically. You can check its status with:

systemctl status et

You should see something like this if ET is running:

● et.service - Eternal Terminal
   Loaded: loaded (/lib/systemd/system/et.service; enabled; vendor preset: enabled)
   Active: active (running) since Tue 2019-11-26 21:37:24 UTC; 22min ago
  Process: 6052 ExecStart=/usr/bin/etserver --daemon --cfgfile=/etc/et.cfg (code=exited, status=0/SUCCESS)
 Main PID: 6061 (etserver)
    Tasks: 10 (limit: 4915)
   CGroup: /system.slice/et.service
           └─6061 /usr/bin/etserver --daemon --cfgfile=/etc/et.cfg

Nov 26 21:37:23 ip-172-31-3-194 systemd[1]: Starting Eternal Terminal...
Nov 26 21:37:23 ip-172-31-3-194 systemd[1]: et.service: Can't open PID file /var/run/ (yet?) after
Nov 26 21:37:24 ip-172-31-3-194 systemd[1]: Started Eternal Terminal.

Opening Port 2022 on Your Security Group

Eternal Terminal on the server relies on port 2022 being open. This needs to be done at your AWS security group. Here’s how to do this:

  1. Log into in a browser.
  2. Go into EC2 instances.
  3. Open Security Groups from the sidebar.
  4. Select the Inbound tab.
  5. Click the Edit button.
  6. Click the Add Rule button.
  7. In the Port Range field enter 2022.
  8. In the source field, enter
  9. Click the Save button.

Changing Your SSH Login Statement

My normal ssh statement looks like this:

ssh -i "~/Downloads/adl_fuzzygroup.pem" ubuntu@xx.yy.zz.aa

To use ET, you need to have a “ssh statement” like this:

et ubuntu@xx.yy.zz.aa -i "~/Downloads/adl_fuzzygroup.pem"

An Ansible Playbook to Automate Server Setup

If you have more than one server on AWS, you should be using a DevOps tool like Ansible to automate machine setup. Here’s a sample playbook:


- name: Configure servers for use with Eternal Terminal
  hosts: all
  become: true
  remote_user: ubuntu
    - name: Install system packages
      apt: pkg= state=latest install_recommends=no
        - software-properties-common

    - name: Add Ansible PPA
      apt_repository: repo="ppa:jgmath2000/et" update_cache=no

    - name: Update APT cache
      apt: update_cache=yes

    - name: Install system packages
      apt: pkg= state=latest install_recommends=no
        - et

Save the above to playbook_install_et.yml and then run it with a statement like this:

ansible-playbook -i inventories/inventory.txt playbook_install_et.yml



Wie die Arztpraxis zum Einfallstor für Hacker werden kann – Experten warnen allerdings vor übertriebenen Ängsten

Um hier auch einmal eine relativierende Gegenspostion abzubilden. 😉 Handelsblatt, 29.11.2019: Wie die Arztpraxis zum Einfallstor für Hacker werden kann

GitHub Gist: instantly share code, notes, and snippets. Shared by 2 on Twitter (Including Emin Gün Sirer & zooko). Discussed by 2 on Hackernews. Source:

Vertcoin 51% Attack ‘Motive Uncertain’ as Hackers Lose up to $4,000


An attempt to manipulate trading at exchange Bittrex saw only temporary success, with a subsequent...

The post Vertcoin 51% Attack ‘Motive Uncertain’ as Hackers Lose up to $4,000 appeared first on Icolancer.


Vertcoin 51% Attack ‘Motive Uncertain’ as Hackers Lose up to $4,000


Growth Hacker - Telenor - Islamabad

Why should you join Telenor. Manage end to end data analytics for My Telenor app eco-system. At Telenor Pakistan, we give you the opportunity to become a…
From Telenor - Tue, 26 Nov 2019 14:49:01 GMT - View all Islamabad jobs

可能性を広げたい親たちへ。AI時代の子どもの育て方:書評 | ライフハッカー[日本版]

『AI時代の「天才」の育て方』(市村よしなり。著、きずな出版)の著者は、本書を読み終えるころには次のような気づきが生まれるだろうと記しています。 ◎親だけの子育てには、本来無理があること◎しつけるのではなく、世間の決めた“よい子”という枠に — 読み進める

Analyste Cyberdéfense SOC H/F

Vade Secure Logo

Appétence pour la cyberdéfense? Motivé/e par les technos innovantes et les projets variés?

Nous sommes leader mondial en termes de protection prédictive de la messagerie, avec plus de 600 millions de boîtes aux lettres protégées dans 76 pays.

En forte croissance continue, on renforce nos équipes Security Operations Center.

Appétence pour la Cyberdéfense ? Motivé(e) par la lutte contre le spam et les challenges pour le contrer ?

En forte croissance continue, nous renforçons nos équipes Security Operations Center en recrutant un/e Analyste Cyberdéfense SOC, basé sur notre super campus de Lille/Hem.


Vous intégrez l’équipe SOC dont la mission première est de mettre à jour le filtre/mail en fonction des menaces rencontrées : bloquer les attaques qui seraient passées au travers et libérer les éventuels messages bloqués à tort.
Composée de 15 personnes basées en France, USA, Canada et Japon, l’équipe travaille en 24/7 afin de s’adapter en temps réel aux menaces.

En tant qu’Analyste, votre mission est d’exploiter différents types d’informations : les remontées des destinataires (signalements « feedbackloop »), les retours clients et les flux live. En particulier :

  • Catégoriser la menace survenue
  • Mesures pour la stopper promptement et durablement. Anticipation des modifications du spammeur
  • Analyses des menaces récurrentes (rédaction/modification de règles heuristiques / regex)

En collaboration étroite avec le département Research, vous contribuez activement aux retours d’expériences sur l’élaboration de mécanismes et concepts en vue de lutter contre les hackers les plus obstinés.

En complément, vous formalisez des réponses claires aux clients sur les mesures prises. Vous êtes en veille technologique et partagez vos recherches et connaissances au sein de l’équipe.

Notre parcours de formation adapté et ciblé vous permettra de devenir rapidement opérationnel.


De formation B+2 Informatique, complétée avec une première expérience réussie dans un service Support IT, vous avez montré votre réelle motivation pour la protection des usagers et la satisfaction client.

Vous maitrisez la rédaction d’expressions régulières ou vous avez des compétences en développement.

Vous connaissez le protocole SMTP et le langage HTML.

Compétences complémentaires appréciées : environnements et commandes Windows & Linux.

Esprit logique et bon sens, goût de l’investigation et l’envie de trouver des solutions, vous êtes force de proposition et capable de prendre de la hauteur dans vos analyses. Bonnes capacités de rédaction en français.

On en parle ?


Threat Source newsletter (Nov. 21, 2019)


Newsletter compiled by Jon Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

It’s nearly holiday shopping season, which means it’s prime scam season. On the latest Beers with Talos episode, we run down the best ways to stay safe while shopping online and how to detect phony emails. It’s also election season, which makes for some good discussion.

And, as it’s time to look back on the year that was, we have a new feature from Talos Incident Response where we take a quarter-by-quarter look at the top threats we’ve seen in the wild. In Q4 of Cisco’s fiscal year, our IR analysts mainly saw ransomware and cryptocurrency miners.

IR also had another exciting announcement this week, with the unveiling of a new cyber range that can help train employees to avoid common scams that can lead to malware infection. The cyber range now comes with any IR retainer.

The Threat Source newsletter is getting a week off next week for the Thanksgiving holiday in the U.S., so we’ll talk to you again in December.

Upcoming public engagements with Talos

Event: “Reading Telegram messages abusing the shadows” at BSides Lisbon 
Location: Auditorio FMD-UL, Lisbon, Portugal
Date: Nov. 28 - 29
Speakers: Vitor Ventura
Synopsis: One of the cornerstones of privacy today is secure messaging applications like Telegram, which deploy end-to-end encryption to protect the communications. But several clone applications have been created and distributed with the intent of spying on their users. In this talk, Vitor will demonstrate how the Telegram registration process became abused, allowing message interception on non-rooted Android devices without replacing the official application. This is another example on how encryption is not a panacea, and that side-channel attacks like this are a real problem for otherwise secure applications.

Event: “Signed, Sealed, Compromised: The Past, Present, and Future of Supply Chain Attacks” at CactusCon
Location: Charleston Coliseum & Convention Center, Charleston, WV
Date: Dec. 6 - 7
Speakers: Edmund Brumaghin and Earl Carter
Synopsis: This talk will discuss the common techniques we’re seeing in supply chain attacks. Supply chain attacks are a broad topic, but one that has continued to evolve and mature over the last decade. Nick and Edmund will walk through what a supply chain attack constitutes, the history of how these attacks have evolved, and where we see this attack technique moving in the future.

Cyber Security Week in Review

  • The highly publicized Checkra1n jailbreak for iOS devices has been on the market for a week now. Here’s what that means for iPhone users and security researchers, and why it poses such an ethical dilemma.  
  • Google and Samsung recently patched a vulnerability in some of their smartphones that could allow an attacker to take over the device’s camera. But other Android devices may still be at risk. 
  • Several government services in Louisiana were taken down due to a ransomware attack. Two days post-infection, the state’s motor vehicles department was still closed. But state officials say no one has paid the ransom requested by the attackers. 
  • The Australian government released a proposal to secure internet-of-things devices. It is a voluntary code the country is asking companies to abide to, including devices like "everyday smart devices that connect to the internet, such as smart TVs, watches, and home speakers.” 
  • Numerous popular apps on the Google Play store are still vulnerable to long-known remote code execution vulnerabilities. A study found that while these apps do have recent updates, they don’t necessarily protect against publicly disclosed bugs. 
  • The Russian government is eager to bring an alleged hacker back into its country after he appeared in a U.S. court to face charges. Research indicates the man may be one of the most well-connected hackers in Russia and the government fears he knows too much. 
  • Microsoft says there is “no evidence” that the Dopplepaymer malware is spreading through Microsoft Teams. The company said after extensive research, it believes the only way Dopplemaymer can spread is through remote human operators using existing Domain Admin credentials. 
  • Many user accounts for the newly launched Disney+ streaming service have been stolen and listed for sale on the dark web. However, Disney says there is no evidence to indicate its servers were breached. 

Notable recent security issues

Title: New, custom dropped delivers variety of information-stealing malware 
Description: A wave of adversaries which are dropping well-known information-stealer like Agent Tesla, Loki-bot and others since at least January 2019 using custom droppers. These droppers inject the final malware into common processes on the victim machine. Once infected, the malware can steal information from many popular pieces of software, including the Google Chrome, Safari and Firefox web browsers. The injection techniques are well-known and have been used for many years, but with the adversaries customizing them, traditional anti-virus systems are having a hard time detecting the embedded malware.
Snort SIDs: 52246

Title: Denial-of-service vulnerability in some Intel graphics drivers
Description: Intel’s IGC64.dll graphics driver contains a denial-of-service vulnerability. An attacker could exploit this bug by supplying a malformed pixel shader if the graphics driver is operating inside a VMware guest operating system. This type of attack can be triggered from VMware guest usermode to cause a denial-of-service attack due to an out-of-bounds read in the driver.
Snort SIDs: 50295, 50296

Most prevalent malware files this week

SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510
MD5: 4a50780ddb3db16ebab57b0ca42da0fb
Typical Filename: xme64-2141.exe
Claimed Product: N/A
Detection Name: W32.7ACF71AFA8-95.SBX.TG

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
Typical Filename: qmreportupload
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: 85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5
MD5: 8c80dd97c37525927c1e549cb59bcbf3
Typical Filename: Eternalblue-2.2.0.exe
Claimed Product: N/A
Detection Name: W32.WNCryLdrA:Trojan.22k2.1201

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f 
MD5: e2ea315d9a83e7577053f52c974f6a5a
Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256: f917be677daab5ee91dd3e9ec3f8fd027a58371524f46dd314a13aefc78b2ddc 
MD5: c5608e40f6f47ad84e2985804957c342
Typical Filename: FlashHelperServices.exe
Claimed Product: Flash Helper Service
Detection Name: PUA:2144FlashPlayer-tpd 


Splat Space Open Meeting


photoSplat Space - Durham's Hackerspace

Open Meetings on Tuesdays include member show & tell, project updates, and calls for collaborative hacking from 7pm-8pm. By 8:00pm, the meeting will break and everyone is free to mingle, work on projects, and get to know fellow hackers.

Durham, NC 27701 - USA

Tuesday, December 3 at 7:00 PM



Saturday Science


photoSplat Space - Durham's Hackerspace

You're invited to check out the pop-up Community Lab space at the Splat outpost in the Lakewood Shopping Center (Scrap Exchange property). Come to see & hear about member projects, or to talk about or work on a project or idea of your own. We'll also have a few demos & hands-on activities geared toward kids, as well.

Projects featured this week:
- microbial fuel cells
- diy bio-sensors
- diy gel electrophoresis

The community lab effort is led by TriDIYBio, the biology interest group of SplatSpace. Our goal is to create a Community Laboratory open to all, focusing on the interests of its members. These interests currently include: Citizen Science, Biotechnology, Entomology, Teaching and Experimenting with Biology, DIY Lab Equipment, Electronics, and Science-y art. New members are invited to join in ongoing activities, or to use the space to work on your own projects and ideas.

Saturday Science events are free and open to the public. Everyone is very welcome to attend, regardless of prior science experience.

Durham, NC - USA

Saturday, December 7 at 1:00 PM



Open Saturdays


photoSplat Space - Durham's Hackerspace

Join other makers, hackers and crafters to work on any of your projects and socialize.

Any project is welcome: textiles, crafts, 3d printers, wearables, electronics, or software.

Or, just come to visit and check out the Space if you've never been to Splat Space.

Durham, NC 27701 - USA

Saturday, December 7 at 1:00 PM



Splat Space Open Meeting


photoSplat Space - Durham's Hackerspace

Open Meetings on Tuesdays include member show & tell, project updates, and calls for collaborative hacking from 7pm-8pm. By 8:00pm, the meeting will break and everyone is free to mingle, work on projects, and get to know fellow hackers.

[How to find us: see]

Durham, NC 27701 - USA

Tuesday, February 4 at 7:00 PM



Saturday Science


photoSplat Space - Durham's Hackerspace

You're invited to check out the pop-up Community Lab space at the Splat outpost in the Lakewood Shopping Center (Scrap Exchange property). Come to see & hear about member projects, or to talk about or work on a project or idea of your own. We'll also have a few demos & hands-on activities geared toward kids, as well.

Projects featured this week:
- microbial fuel cells
- diy bio-sensors
- diy gel electrophoresis

The community lab effort is led by TriDIYBio, the biology interest group of SplatSpace. Our goal is to create a Community Laboratory open to all, focusing on the interests of its members. These interests currently include: Citizen Science, Biotechnology, Entomology, Teaching and Experimenting with Biology, DIY Lab Equipment, Electronics, and Science-y art. New members are invited to join in ongoing activities, or to use the space to work on your own projects and ideas.

Saturday Science events are free and open to the public. Everyone is very welcome to attend, regardless of prior science experience.

Durham, NC 27701 - USA

Saturday, February 8 at 1:00 PM



Open Saturdays


photoSplat Space - Durham's Hackerspace

Join other makers, hackers and crafters to work on any of your projects and socialize.

Any project is welcome: textiles, crafts, 3d printers, wearables, electronics, or software.

Or, just come to visit and check out the Space if you've never been to Splat Space.

Durham, NC 27701 - USA

Saturday, February 8 at 1:00 PM



Software Project Night


photoSplat Space - Durham's Hackerspace

Come to Software Project Night with a project that you want to show off, you want to ask others for help with, or that you just want to work on.

Come to Software Project Night with a software topic you want to talk about because you think it's cool, or you want to understand it better.

Come to Software Project Night if you're a beginner or an expert programmer: sharing your unique perspective on software is what makes Software Project Night work!

Durham, NC 27701 - USA

Sunday, February 9 at 6:00 PM



Black Friday smart TV's are a hackers portal to your home, FBI warns

The Black Friday sales just finished and just like every year a lot of people decided to pick up a new TV while they were heavily discounted. Now, the FBI has warned the public that the smart TV they just bought could possibly be hacked.
Since Black Friday has just...

Read the rest in your browser! Tap or click here.


Sonia- Rahul Gandhi skip the swearing-in ceremony of Thackeray

NEW DELHI : After Congress interim president Sonia Gandhi decided to skip the swearing-in ceremony of Uddhav Thackeray as Maharashtra chief minister, party leader Rahul Gandhi has also decided to give the event a miss. In his letter to Uddhav Thackeray, Rahul Gandhi wished him all the best. The Congress MP wrote he won’t be […]

“This is govt for all people,”Says CM Uddhav Thackeray

MUMBAI : Chief Minister Uddhav Thackeray Thursday assured the people of good governance in the state. “I want to help the farmers in a manner which will make them happy,” he said after chairing the first cabinet meeting of newly-sworn MLAs of the Congress-NCP-Shiv Sena combine. Uddhav, 59, is the 19th chief minister of the […]

Trouble for Shiv Sena? NCP demands CM’s post for 2.5 years, Deputy CM for Ajit Pawar

MUMBAI : Trouble for Shiv Sena? NCP demands Maharashtra Chief Minister’s post for 2.5 years, Deputy CM for Ajit Pawar A day ahead of Uddhav Thackeray’s oath-taking as Maharashtra chief minister, NCP leader Praful Patel confirmed that the deputy CM of the alliance will be from his party and the speaker from the Congress. Mr […]

Aaditya meets Sonia Gandhi, invites her for Uddhav’s swearing-in

NEW DELHI : After reports said that Congress president Sonia Gandhi and her son Rahul Gandhi will not attend the oath ceremony of Uddhav Thackeray as Maharashtra Chief Minister on Thursday, the Shiv Sena chief’s son, Aaditya Thackeray, personally came to Delhi to invite Mrs Gandhi on Wednesday evening. Aaditya Thackeray after visiting Sonia Gandhi […]

Maharashtra political drama timeline after Fadnavis’ resignation

Maharashtra Government Formation Timeline > Shiv Sena abandons Aarey saying the party was against tree cutting overnight and not metro. > Congress leader Rahul Gandhi to skip swearing-in ceremony of Uddhav Thackeray tomorrow evening. > Uddhav to become the first Thackeray to be chief minister of Maharashtra. > Ashok Chavan believes three wheels are better […]

ಹಿಂದುತ್ವ ಸಿದ್ಧಾಂತ ಬಿಡುವ ಪ್ರಶ್ನೆಯೇ ಇಲ್ಲವೆಂದ ಉದ್ಧವ್‌, ಸದನದಲ್ಲಿ ಮಾಜಿ ದೋಸ್ತಿಗಳ ಫೈಟ್!

ತಾವು ಈಗಲೂ ಹಿಂದುತ್ವದ ಸಿದ್ಧಾಂತಕ್ಕೆ ಬದ್ಧ ಎಂದು ಮಹಾರಾಷ್ಟ್ರ ಮುಖ್ಯಮಂತ್ರಿ ಉದ್ಧವ್‌ ಠಾಕ್ರೆ ಸ್ಪಷ್ಟಪಡಿಸಿದ್ದಾರೆ. ಈ ಹಿಂದೆ ಸೋನಿಯಾ ಗಾಂಧಿ ಮೃದು ಹಿಂದುತ್ವದ ಧೋರಣೆ ಅನುಸರಿಸಲು ಹೇಳಿದ್ದು ಸ್ಮರಿಸಬಹುದು.

Maharashtra: Uddhav Govt faces Rs. 5 lakh cr debt, to “review” Bullet Train


Thackeray Govt struggling with Rs. 5 lakh cr debt Plans “review” of Bullet Train worth Rs. 1.05 lakh crore. Firm on unconditional farm loan waiver. Uddhav assures Hindutva plank to continue Power-sharing and ‘secularism’ issue begin to surface Mumbai: Fresh from his successful floor test but now staring at daunting problems, the new Maharashtra Chief […] More

The post Maharashtra: Uddhav Govt faces Rs. 5 lakh cr debt, to “review” Bullet Train appeared first on Revoi.


Сборки Windows 8 :: RE: Windows 8.1 (x86/x64) 40in1 +/- Office 2016 SmokieBlahBlah 14.09.19 [Ru/En]

Автор: dharmahacker
Добавлено: 22 Ноя 2019 20:08:08 (GMT 3)


 !  Примечание от Eastoop:
И где вы были с такой ценной информацией два месяца назад?


Transatlantic Cable podcast, episode 120

On this podcast, Dave and Jeff discuss an insecure smartwatch for kids, Jack Dorsey hacker caught, Black Friday scams and security and more.

Cyber-threats can impact brand perception and customer trust at banks

We live in an age when private customer data is constantly under attack from hackers. Cyber-threats have taken a front seat in the line-up of primary risks facing banks and financial institutions. The fact that cyber-attacks are becoming more prevalent isn't the only issue; they're also becoming more complex and therefore harder to address. And although the convenient interconnectivity of the Internet of Things (IoT) creates many advantages for financial institutions, there is also an increased risk to dangerous threats. Data capture form to appear here! The impact of cyber heists Money taken in cyber heists, both in banking and elsewhere, was estimated at $3 trillion According to Cybersecurity Ventures, the amount of money taken in cyber heists, both in banking and elsewhere, was estimated at $3 trillion overall for 2015, and this substantial amount is expected to double by 2021. In today’s environment, banks, credit unions, and financial organisations of all types are...

Privacy Tip: How to Delete All Your Facebook Messages at Once


Over the past month two of my Facebook friends have had their accounts hacked (that I know of). In both of these cases the hacker chose to go through the person's Facebook emails to read all of their messages and then use that information to message their friends – posing as them. I was one […]

The post Privacy Tip: How to Delete All Your Facebook Messages at Once appeared first on


Carissa a écrit :

Hey there! I just wanted to ask if you ever have any trouble with hackers? My last blog (wordpress) was hacked and I ended up losing many months of hard work due to no data backup. Do you have any solutions to prevent hackers? Feel free to visit my blog post :: wormateio hacks:

Silas a écrit :

Heya! I just wanted to ask if you ever have any problems with hackers? My last blog (wordpress) was hacked and I ended up losing months of hard work due to no backup. Do you have any methods to prevent hackers? Feel free to visit my page ... quest bars cheap:

Agnes a écrit :

Hi! I know this is kind of off topic but I was wondering which blog platform are you using for this site? I'm getting sick and tired of Wordpress because I've had issues with hackers and I'm looking at options for another platform. I would be fantastic if you could point me in the direction of a good platform. Stop by my homepage ps4 games:

After Aarey activists, Uddhav now announces dropping of cases against Nanar protesters

The Sena had opposed the mega-complex, estimated to cost upwards of Rs 3 lakh crore, and Thackeray had promised to get these cases withdrawn at several poll rallies in the state.

Portfolio allocation to be completed in a couple of days: Maharashtra CM Uddhav Thackeray

Despite clearing the floor test in the two-day special session of the Assembly, all the three partners don rsquo;t seem to have come to terms over the portfolio allocation.

Maharashtra government to review bullet train project: CM Uddhav Thackeray

The state government will come out with a white paper on the financial condition of the state, Thackeray said.

Devendra Fadnavis gets 'Sagar' as his official residence

Earlier today, Chief Minister Uddhav Thackeray was allotted the official residence #39;Varsha #39; at Malabar Hill.

After cryptic Facebook post, Pankaja Munde removes 'BJP' from Twitter bio

in her three recent tweets posted on November 28, she congratulated Maharashtra #39;s new Chief Minister Uddhav Thackeray but not the government formed by the Shiv Sena, NCP and Congress.

Will come back, says Devendra Fadnavis after verbal swordplay with Uddhav Thackeray

Responding to the barbs over his ldquo;Me punha yein rdquo; remarks, Fadnavis said he did say it but forgot to announce a time table of his return as chief minister.

After allying with NCP and Congress, confusion now in Shiv Sena over persisting with Hindutva

While Uddhav Thackeray stated in the Assembly that the party won rsquo;t #39;abandon Hindutva #39;, party spokesperson Sanjay Raut was busy explaining the #39;secular #39; Hindutva of the Congress in a TV debate.

NCP leader Supriya Sule meets CM Thackeray, seeks separate ministry for specially-abled people

Nawab Malik had also given a suggestion to the Maharashtra Chief Minister to build a car shed in Goregaon #39;s RPF Parade ground, which was earlier constructed in the Aarey Colony.

Maharashtra CM Uddhav Thackeray seeks support from Centre to help out farmers in state

The newly appointed CM was of the opinion that opposition leaders should meet with PM Modi and demand financial assistance for farmers in Maharashtra.

Maharashtra: Nana Patole of Congress elected Speaker as BJP withdraws candidate

Pro-tem speaker Dilip Walse Patil made the announcement in the Assembly after which Chief Minister Uddhav Thackeray and some senior MLAs escorted Patole, 57, to the Speaker #39;s chair.

Supriya Sule urges Uddhav Thackeray to revert to MPSC for recruitment in government

The NCP leader asked the new government to revert to the earlier recruitment practice instead of the #39;Mahaportal #39;, as followed by the previous BJP-led government.

'Will not do anything at midnight': Uddhav takes dig at 'friend' Fadnavis' early morning swearing-in

Thackeray was speaking after Fadnavis, leader of state BJP legislature unit, was named the new Leader of Opposition in the House by Speaker Nana Patole.

Nana Patole belongs to farmer family, will give justice to everyone: Uddhav Thackeray

Congress MLA Patole was elected unopposed as Maharashtra Assembly Speaker on Sunday after BJP withdrew its candidature for the post. The BJP took a decision after an all-party meeting.

Rashmi Thackeray to Supriya Sule: People who sealed the deal in Maharashtra

The flow of politics in Maharashtra underlines that cut-throat politics does not win always.

NCP yet to decide name for deputy CM's post, says Jayant Patil ahead of Maharashtra trust vote

The deputy chief minister #39;s post has come the NCP #39;s way as per the power-sharing formula in the Uddhav Thackeray-led Shiv Sena-NCP-Congress government.

This Welsh password generator might keep you safe from hackers, but definitely from dragons


Inspired by XKCD's classic diceware strip, a programmer named Alice created an open-source algorithm to randomly generate secure passphrases in Welsh. As difficult as it would be for any human or computer to figure out a nonsense phrase like, "correct horse battery staple," it would be even more difficult to guess, "stwffwl batri ceffyl cywir," especially when there are only about 700,000 Welsh speakers to begin with.

While I'm no cryptologist, I did run a few of the passwords through and and they seemed to work out all right. According to those sites, it would take 11 quattuordecillion years or 1 trillion trillion trillion years for a computer to crack "DrefnasidRhyd-y-meirchSefydlogiad6*." Similarly, "GlaeruchdyrauGymreigeiddiaiBarcdir0**" would take 429 tredecillion years, or 94 billion trillion trillion years, respectively.

However, as Alice the programmer warns: "It's probably not a good idea to actually use this, since the wordlist is freely available along with the algorithm being used."

So it might not stop a really clever hacker from getting into your email. But it will almost certainly stop a mythic Welsh dragon from stealing your identity. Probably. I'm assuming their claws are pretty clumsy on the keyboard.

Welsh Password Generator []

Image via Lewis Ogden/Flickr (altered)

*Google Translate tells me this means, "The ford of the horses was arranged." I don't know that I trust it—Google Translate is famously sloppy with the grammar of some Celtic languages—but it certainly sounds epic.

**Similarly, this became "Parkland was a Welsh occupation" which sounds like something you would hear on the Breton version of InfoWars. Read the rest


Ahead of Maharashtra floor test, Congress and BJP name candidates for Speaker post

Congress MLA Nana Patole will take on BJP #39;s Kisan S. Kathore on Saturday ahead of the floor test for the Uddhav Thackeray-led #39;Maha Vikas Aghadi #39; government.

Foremost VPN for Unblocking Netflix for upcoming 2020


  With a huge focus on privacy and security these days, we truly have to be careful with how we go about using internet services. You could be at a coffee shop using its free Wi-Fi, innocently trying to watch all Netflix originals, and unbeknownst to you, a hacker is ... [Read More]

The post Foremost VPN for Unblocking Netflix for upcoming 2020 appeared first on The Movie Blog.


Uddhav Thackeray orders Mumbai-Ahmedabad bullet train project review, Telangana vet rape & murder case in fast-track court, more

Uddhav Thackeray orders Mumbai-Ahmedabad bullet train project review, Telangana vet rape & murder case in fast-track court, more


Uddhav Thackeray govt wins Maharashtra floor test with 169 MLAs

Uddhav Thackeray govt wins Maharashtra floor test with 169 MLAs


Uddhav Thackeray to begin innings as CM, ruckus in Parliament over Pragya Thakur's remark; more

Uddhav Thackeray to begin innings as CM, ruckus in Parliament over Pragya Thakur's remark; more


The rise of Shiv Sena chief Uddhav Thackeray

The rise of Shiv Sena chief Uddhav Thackeray


Watch: After swearing-in, Uddhav Thackeray visits Siddhivinayak Temple

Watch: After swearing-in, Uddhav Thackeray visits Siddhivinayak Temple


Raj Thackeray attends Uddhav's swearing-in ceremony

Raj Thackeray attends Uddhav's swearing-in ceremony


Watch: Uddhav Thackeray takes oath as Maharashtra CM

Watch: Uddhav Thackeray takes oath as Maharashtra CM


Watch: Shiv Sena puts up poster featuring Bal Thackeray, Indira Gandhi ahead of Uddhav's swearing-in 

Watch: Shiv Sena puts up poster featuring Bal Thackeray, Indira Gandhi ahead of Uddhav's swearing-in 


Uddhav Thackeray to take oath as Maharashtra CM today

Uddhav Thackeray to take oath as Maharashtra CM today


Flashback: When Uddhav Thackeray was a photographer

Flashback: When Uddhav Thackeray was a photographer


PM Modi congratulates Uddhav Thackeray ahead of his swearing-in ceremony

PM Modi congratulates Uddhav Thackeray ahead of his swearing-in ceremony


Rahul Gandhi likely to skip Uddhav Thackeray's swearing-in ceremony tomorrow

Rahul Gandhi likely to skip Uddhav Thackeray's swearing-in ceremony tomorrow


Uddhav Thackeray to take oath as Maharashtra CM on November 28

Uddhav Thackeray to take oath as Maharashtra CM on November 28


Watch: Life and times of Uddhav Thackeray

Watch: Life and times of Uddhav Thackeray


Maharashtra govt: 1st ever Thackeray CM, but, will Pawar hold remote?

Maharashtra govt: 1st ever Thackeray CM, but, will Pawar hold remote?


Uddhav Thackeray elected as leader of Maharashtra Vikas Aghadi

Uddhav Thackeray elected as leader of Maharashtra Vikas Aghadi


Maharashtra government formation: Uddhav Thackeray to take oath as CM on Dec 1

Maharashtra government formation: Uddhav Thackeray to take oath as CM on Dec 1


Watch: Sharad Pawar, Uddhav Thackeray react on Maharashtra twist

Watch: Sharad Pawar, Uddhav Thackeray react on Maharashtra twist


Can Uddhav Thackeray run Maharashtra effectively?

Can Uddhav Thackeray run Maharashtra effectively?


Uddhav Thackeray to be Maharashtra CM, no decision on Speaker post

Uddhav Thackeray to be Maharashtra CM, no decision on Speaker post


Made sure nothing was left for discussion: Uddhav Thackeray