Next Page: 10000

          Gizmodo Is Elon Musk Serious?       Cache   Translate Page   Web Page Cache   

Gizmodo Is Elon Musk Serious? | Two Cents Why a Roth 401(k) Is (Almost) Always Better Than a Traditional 401(k) | Kotaku Top PUBG Streamer Says He Was Banned After Playing With Hacker [Updated] | Jalopnik Here’s What Happened With The Tesla Model S Race Car That Got Too Hot After Five Miles On An F1 Track |

Read more...


          The Hacker      Cache   Translate Page   Web Page Cache   
awkwardlunar / 15 pages
And we are back with the crew. Cinder just can't catch a break can she? Well let's continue the Story of Cinder and Peony, oh and Thorne is there too. This story will be introducing new characters and if you haven't read The Sisters or The Farmer,...
          Waarom stemmen we in 2030 nog niet elektronisch?      Cache   Translate Page   Web Page Cache   

Stemmen in 2030. Het lijkt ver weg, maar minister Ollongren waagt zich in een interview met de NOS vandaag toch aan een voorspelling. "Dan hebben we een véél overzichtelijker stembiljet en tellen we op zo'n manier dat fouten eigenlijk nauwelijks meer voorkomen." Elektronisch stemmen is nog niet aan de orde, denkt de minister.

Het rode potlood blijft dus voorlopig. Wel wil minister Ollongren experimenteren met het elektronisch tellen van stembiljetten. De biljetten zijn dan gewoon van papier, net als nu, alleen kunnen ze met speciale scanners worden geteld. Ollongren vergelijkt het met een "heel groot kopieerapparaat waar de papieren ingaan en ook weer uitkomen". Dat scheelt tijd en maakt bovendien de kans op fouten kleiner.

Om elektronisch te kunnen tellen, zijn wel andere stembiljetten nodig. Het huidige formulier is namelijk veel te groot voor een scanapparaat. Minister Ollongren gaat in november modellen van nieuwe stembiljetten testen. Dan zijn er in twaalf gemeenten herindelingsverkiezingen.

Er wordt al lang gesproken over elektronisch stemmen en tellen. Al in 1966 waren er voor het eerst verkiezingen met een stemmachine. En daarna bleven we decennialang stemcomputers gebruiken bij verkiezingen.

Maar met de jaren namen niet alleen de technische mogelijkheden toe, maar ook de dreigingen, bijvoorbeeld van hackers. Daarom stemmen we sinds 2009 weer "analoog", met een rood potlood en papieren stembiljet.

In andere sectoren blijven nieuwe digitale technieken elkaar intussen in rap tempo opvolgen. "Veel mensen vragen zich af: als ik mijn belastingaangifte online kan doen, waarom kan dat dan niet met stemmen?", zegt Ronald Prins, oud-directeur van beveiligingsbedrijf Fox-IT, binnenkort lid van de Kiesraad en eerder lid van een overheidscommissie die elektronisch stemmen onderzocht. "Maar als je belastingaangifte wordt gemanipuleerd, dan gaat er ergens wel een systeem piepen en krijg je een brief op de mat."

Bij verkiezingen is dat niet zo: vanwege het stemgeheim mag niemand - ook de overheid niet - weten wat je stemt. Het stemgeheim ligt zó gevoelig dat er in 2014 zelfs discussie was over het nemen van een selfie met je ingevulde stembiljet.

Het stemgeheim maakt het bij elektronisch stemmen ook moeilijker om fraude op te sporen. Ter vergelijking: als jouw bank een 'verdachte' transactie ontdekt met je creditcard, kan je bank contact met je opnemen of je kaart blokkeren. Dat komt doordat internetbankieren niet anoniem is, zoals stemmen. Bij verkiezingen waarbij elektronisch wordt gestemd, kan iemand inbreken in het systeem, de stemmen manipuleren en daarna zijn sporen wissen.

Digitale manipulatie

Niet voor niets schreef minister Ollongren vorige maand al in een brief aan de Tweede Kamer dat digitale manipulatie bij elektronisch stemmen niet is uit te sluiten. Volgens haar is inmiddels duidelijk dat "statelijke actoren" de intentie en capaciteit hebben om zich via digitale middelen te mengen in onze verkiezingen. Daarom wil ze alleen gaan experimenteren met het elektronisch tellen van op papier uitgebrachte stemmen.

Computerbeveiliger Prins onderschrijft dat: "Bij je belastingaangifte hoef je niet bang te zijn dat een buitenlandse overheid deze manipuleert. Bij verkiezingen zien we dat in ieder geval één land actief bezig is om verkiezingen digitaal te manipuleren."

Is er dan geen veilige manier om elektronisch te stemmen? Vaak wordt in dit verband blockchain genoemd, de techniek achter bitcoin. Blockchain is een soort digitaal grootboek met daarin de boekhouding van elke economische transactie ooit gedaan.

Maar ook blockchain biedt hier geen soelaas, sterker nog: zéker blockchain niet. Want juist bij blockchain is alles van nature openbaar: je kunt bij bitcoin bijvoorbeeld precies achterhalen vanaf waar en naar welke rekeningen geld wordt overgemaakt. Voor verkiezingen zou dat betekenen dat stemmen aan kiezers kunnen worden gekoppeld.

Uitvoering

Voorlopig experimenteren we dus alleen met nieuwe stembiljetten en een stemmenteller. Computerbeveiliger Prins is positief over dat plan, hoewel volgens hem veel afhangt van de uitvoering. "Computers in het stemproces zie ik niet zitten, maar bij het tellen kan het best." Wel is het daarbij belangrijk dat er steekproeven worden gehouden om te kijken of de computers geen fouten maken, benadrukt hij.

Als dat toch gebeurt, kunnen de papieren stembiljetten altijd handmatig opnieuw worden geteld. Zo'n "paper trail" is er bij internetstemmen en stemcomputers niet. Volgens Rop Gongrijp, oprichter van internetprovider Xs4all en een van de drijvende krachten achter het verdwijnen van de stemcomputers, is de paper trail essentieel. "Met elektronisch tellen kan ik leven, als er maar genoeg met de hand wordt nageteld", zegt hij. Dat moet wat Gongrijp betreft gebeuren door met een willekeurige steekproef uit te kiezen welke stemmen moeten worden nageteld. En ook daar moet weer controle op zijn.

Ook hoogleraar computerbeveiliging Bart Jacobs, in het verleden kritisch over stemcomputers, is positief over het plan. "Dit hadden ze vijf jaar geleden al moeten doen", zegt Jacobs. "Toen waren er al plannen voor elektronisch tellen, maar minister Plasterk van Binnenlandse Zaken wilde eerst onderzoek naar elektronisch stemmen."

Minister Ollongren wijst er nu op dat het doorvoeren van veranderingen in het stemproces ingewikkeld is. "Alles is vastgelegd in de Kieswet. Als je iets wil veranderen, moet je eerst experimenten doen en daarna een wetswijziging doorvoeren. We doen alles stap voor stap. En dat is ook belangrijk, want het gaat echt over onze democratie."

Ook bij stemmentellers is er overigens nog wel een risico op hacken, geeft hoogleraar Jacobs toe. "Maar ze hoeven niet aan het internet verbonden te zijn", zegt hij. "Dat maakt het risico minder groot."


          Comentario en Zombie Dawn | Full Horror Movie online por Wizardhacker 70      Cache   Translate Page   Web Page Cache   
i just feel sorry for the baby, I mean they brought the little guy on set just so that he can be a prop and be in the sun for a few hours
          Don’t be like the #PlaneBae people      Cache   Translate Page   Web Page Cache   

Lifehacker’s Virginia K. Smith on the trend of narrating others’ quasi-public interactions for viral attention: “stop posting pictures of strangers.”

It’s invasive, inappropriate, and can even put the other person in danger. In a world that made any sense, this wouldn’t require further explanation. This would be a commonly understood part of the social contract. Instead, last week alone darkened the internet’s door with stories about the insufferable #PlaneBae saga, as well as one of the more distressing Dear Prudie questions in recent memory (no small feat). In the case of the former, Twitter user Rosey Blair spent hours live tweeting the flirtation of two strangers sitting in front of her on a flight, complete with pictures, garnering hundreds of thousands of retweets (she later made a thirsty attempt to parlay her viral fame into a job at Buzzfeed, which should tell you everything you need to know). In the latter, a Dear Prudie letter writer looked to be let off the hook after getting caught taking an unauthorized photo of an overweight colleague and “[sharing] it in an online community where we discuss the obese people in our lives.”

Odd how the most trivially sociopathic people are so good at sensing where profit is to be made on the “empathy margins” where public and private life blur.

          Iranian Hackers Tried to Impersonate Israeli Cyber-security Company - Haaretz      Cache   Translate Page   Web Page Cache   

Haaretz

Iranian Hackers Tried to Impersonate Israeli Cyber-security Company
Haaretz
The Israeli cybersecurity firm ClearSky has exposed several cases in which Iranian hackers impersonated legitimate websites. In February, for instance, it revealed an operation it called Ayatollah BBC – a series of Iranian-run websites impersonating ...


          Credential Phishing – Easy Steps to Stymie Hackers      Cache   Translate Page   Web Page Cache   

Phishing attacks have become a common factor in our daily routines for businesses and in our personal lives. There are many different types of phishing attacks, each of which requires a slightly different defense while having some commonalities as well. This article covers a specific type of attack called credential phishing and ways to protect against it. While you may […]

The post Credential Phishing – Easy Steps to Stymie Hackers appeared first on The Ethical Hacker Network.


          Tämä nuotio palaa jopa 12 tuntia ilman puiden lisäystä – tämä niksi on yllättävän hyödyllinen      Cache   Translate Page   Web Page Cache   
Nuotio luo tunnelmaa, lämpöä ja sen avulla voi myös valmistaa ruokaa. Jokainen osaa sytyttää nuotion, mutta osaatko asetella puut niin että nuotio palaa koko yön yli ilman puiden lisäystä? Salaisuus piilee puiden koossa, muodossa ja asettelussa, jonka ansiosta ne eivät pääse palamaan liian nopeasti. Crazy Russian Hacker jakaa nyt vinkin, joka voi tulla tarpeeseen ihmisille, […]
          Hacker podia se passar por funcionário da NET e atacar clientes via email      Cache   Translate Page   Web Page Cache   
Um hacker malicioso poderia enganar clientes da NET ao se passar por funcionário; falha foi corrigida

Uma falha no sistema de emails de atendimento ao cliente da NET, uma das maiores empresas de telecomunicações do Brasil, permitia que hackers maliciosos enviassem mensagem para clientes da NET com domínio original da empresa. Dessa maneira, um golpe de phishing se tornaria praticamente perfeito.

O que é um golpe de phishing: phishing é um dos métodos de ataque mais antigos, já que "metade do trabalho" é enganar o usuário de computador ou smartphone. Como uma "pescaria", o cibercriminoso envia um texto indicando que você ganhou algum prêmio ou dinheiro (ou está devendo algum valor) e, normalmente, um link acompanhante para você resolver a situação. O phishing também pode ser caracterizado como sites falsos que pedem dados de visitantes. A armadilha acontece quando você entra nesse link e insere os seus dados sensíveis — normalmente, há um site falso do banco/ecommerce para ludibriar a vítima —, como nome completo, telefone, CPF e números de contas bancárias.

Leia mais...


          Extensão de VPN é invadida e deixa carteiras de criptomoedas vulneráveis      Cache   Translate Page   Web Page Cache   
VPN gratuita Hola foi substituída na Chrome Web Store por uma versão infectada

Uma falha de segurança em uma extensão do Google Chrome acabou afetando o serviço MyEtherWallet (MEW), utilizado para gerenciar carteiras de criptomoedas. Nesta terça (10), o MEW soltou um alerta pedindo para que todos os usuários do serviço que também têm a extensão Hola instalada deveriam transferir seus fundos para uma conta nova imediatamente.

A companhia disse ter recebido informações de que a extensão teria sido invadida por um hacker. Hola é um serviço de VPN gratuito que pode ser adicionado ao navegador para permitir ao usuário acessar sites bloqueados no seu país. Poucas horas após o alerta do MEW, a companhia responsável pela extensão confirmou a falha de segurança.

Leia mais...


          US Reaper drone data leaked on dark web, researchers say      Cache   Translate Page   Web Page Cache   
A hacker penetrated an Air Force captain's computer to steal sensitive information about US military drones, according to new research by cybersecurity investigators at Recorded Future, a threat intelligence firm.

          2271 liter benzint loptak egy töltőállomásról a hackerek      Cache   Translate Page   Web Page Cache   
Fényes nappal, valószínűleg a benzinkutas is nyakig sáros.
          Promoții online false, înșelătorii adevărate. Cum ne ferim de escroci      Cache   Translate Page   Web Page Cache   
Feriţi-vă de ofertele de pe Internet care sunt prea frumoase ca să fie adevărate! De multe ori, nici nu sunt! În fiecare lună se dublează numărul celor care îşi încredinţează datele de pe card hackerilor ce clonează site-uri şi conturi de Facebook. În loc de bilete ieftine de avion şi electrocasnice scumpe la preţ de chilipir, rămân cu pagube de mii de lei uneori.
          Product Manager or Product Owner?      Cache   Translate Page   Web Page Cache   

Here’s my take.

First, the glib version: the two roles seem to have their names inverted, as in my experience a Product Owner tends to manage the development of a product for a company, while a Product Manager tends to own that product within the company.

I suspect that both roles could benefit from moving towards each other.

I think that POs often don’t have enough authority, and are left to accept the demands of various stakeholders in the business as the inevitable direction the product will go in. This isn’t ideal, as a great product is usually driven by a bold vision coupled with insights from user research and data analysis - stuff that isn’t a core competency of most stakeholders outside the Product discipline.

And I think that some PMs rely too much on “knowing” what to build - being that one figurehead of the product who drives its development and has all the answers. But of course most answers are really just hunches, and there might well be some more insightful hunches and expertise available elsewhere in the business, and again within user research and data analysis.

Caveat: this is all gross generalisation, as every company seems to conceive these roles somewhat differently. Which is part of the problem, of course!

And finally, a good article: https://hackernoon.com/product-101-for-engineers-83ef7260cbf1


          Texas AG's office to SA: Don't approve mandatory sick leave ordinance      Cache   Translate Page   Web Page Cache   
The San Antonio City Council would run afoul of state law if it were to adopt an ordinance mandating that private employers in the city provide paid sick leave to their workers, the Texas Attorney General's office warned on Monday. David Hacker, special counsel for civil litigation under Attorney General Ken Paxton, in a letter addressed to Mayor Ron Nirenberg, said that while the city's charter requires it to vote on an ordinance as described in a petition calling for paid sick leave, such an ordinance…

          Voksi Bobol Denuvo Dragon Ball FighterZ, Klaim Dukung Multiplayer VS Gamer Ori      Cache   Translate Page   Web Page Cache   
“Raja baru” untuk game-game yang mengusung Denuvo di dalamnya, tidak ada lagi kalimat yang lebih tepat untuk menjelaskan kiprah hacker asal Bulgaria – Voksi dalam setidaknya beberapa bulan terakhir ini.
          Frame.io Ups Its Security Game to Make Sure Your Footage is Protected      Cache   Translate Page   Web Page Cache   

Frame.io is determined to make you feel safer (and more secure) with your media.

Digital security isn't a matter of simply setting things up and walking away. As hackers develop advanced tools to break into systems, security requires constant vigilance and improvements to a system that ensures that the wrong people do not gain access to the data.

This is especially relevant to filmmakers, as there is a tremendous amount of interest in the work created at the top end, such as getting new episodes of Game of Thrones or the latest Marvel film early. If you remember the Larson Studios Hack, the hacking group wasn't even specifically targetting post-production facilities; they just happened to luck into new episodes of Orange is the New Black.

Frame.io is quite publicly a place where works-in-progress (of new movies, television episodes, etc.) will be stored, and the company knows that there's a giant target on your back for hackers looking for hot content.

Read More


          7/11/2018: MONEY: TIMEHOP HACK BREACHED DATA OF 21 MILLION USERS      Cache   Translate Page   Web Page Cache   
Timehop, whose app shows past social media posts, said it “experienced a network intrusion” on July 4 that affected 21 million users. Timehop said it disrupted the hackers, but email addresses, names and phone numbers were compromised.
          App Store slaví desáté narozeniny, na začátku bylo jen 500 aplikací      Cache   Translate Page   Web Page Cache   
Smartphone bez snadné dostupnosti aplikací a her si dnes už nedokážeme představit. Přes různé předchozí pokusy znamenal průlom až App Store od Applu, který následovaly další společnosti. Právě v úterý 10. července slaví desáté narozeniny.
          Hackers maken 23,5 miljoen buit bij nieuwe cryptohack      Cache   Translate Page   Web Page Cache   
Het begint bijna een dagelijks fenomeen te worden: hackers die miljoenen buitmaken door een of andere exchange te kraken. Bancor zou een gedecentraliseerde exchange zijn, maar naar nu blijkt was dat vooral marketingpraat. Ook bij deze exchange konden hackers namelijk aan de haal gaan met een buit van dik 20 miljoen dollar. Vervolgens werden tegoeden […]
          Streamer Terkenal PUBG Shroud Terkena Banned Setelah Bermain Dengan Hacker      Cache   Translate Page   Web Page Cache   

Sudah bukan rahasia lagi bahwa game PlayerUnknown’s Battlegrounds memiliki masalah dengan para hacker / cheater, dan dengan tegas sang developer memeranginya bahkan beberapa hacker dan cheater PUBG telah berhasil ditangkap. Streamer Twitch terkenal yaitu Michael “Shroud” Grzesiek dan Wadu saat live streaming beberapa hari lalu menyatakan dia terkena banned selama satu bulan dari PUBG setelah insiden di …

The post Streamer Terkenal PUBG Shroud Terkena Banned Setelah Bermain Dengan Hacker appeared first on VazGaming.com - Pusat Informasi Seputar Game.


          Jason Yip of State Apparel – Golf Unfiltered #165      Cache   Translate Page   Web Page Cache   

The THP Radio Network is proud to present the Golf Unfiltered Show with Adam Fonseca.…

The post Jason Yip of State Apparel – Golf Unfiltered #165 appeared first on The Hackers Paradise.


          Odyssey Red Ball Putter      Cache   Translate Page   Web Page Cache   

The ability to make more putts begins with three aspects. Alignment, start your ball where…

The post Odyssey Red Ball Putter appeared first on The Hackers Paradise.


          Here's How Apple's Stopping Police from Breaking into iPhones      Cache   Translate Page   Web Page Cache   

Since the San Bernardino shooting in 2014, Apple's been engaged in a game of cat and mouse with law enforcement. Authorities want access to evidence on criminals' iPhones, but Apple wants to protect all of its customers' personal data equally. The latest installment in this saga has Apple outright disabling the Lightning port. Cellebrite & GrayKey In February 2018, Israeli company Cellebrite told its customers it had a tool that could unlock any iPhone in existence. Per CNN, Cellebrite is the "FBI's go-to phone hacker," so this new tool had serious implications — US law enforcement agencies... more


          L’app che spia la gente può essere a sua volta spiata (quasi) da chiunque: è la vicenda SpyHuman      Cache   Translate Page   Web Page Cache   

SpyHuman è stata presa di mira da un hacker rimasto anonimo, riuscito a carpire dai server aziendali ben 440 milioni di dati con relativa semplicità.

L'articolo L’app che spia la gente può essere a sua volta spiata (quasi) da chiunque: è la vicenda SpyHuman proviene da TuttoAndroid.


          Virtual Tours, Newsletters and Resources on the Fly! Now that's Pro!      Cache   Translate Page   Web Page Cache   
Wanna create Virtual Tours like a PRO? Integrate them into your blog or website? Lifehacker told us last week about this kick ass new website called Mapwing and let this Pro be the first (ok, second) to tell you, It...
          Google Notebook Adds Search and Real Estate agents Catch On      Cache   Translate Page   Web Page Cache   
Today Lifehacker tipped us off to a helpful new feature on Google Notebooks- you can now search the content of public notebooks. Check out the content that comes up when you search for "Real Estate." Google Notebooks are the perfect...
          Firefox 2 Tip: Instant Calculator      Cache   Translate Page   Web Page Cache   
A nice tip from Lifehacker for all you Pros that have begun using Firefox version 2. If you type in your mathmatical formula into the search box (Cntrl-K to get there in a hurry) and you'll get an answer quicker...
          Daily Coding Puzzles      Cache   Translate Page   Web Page Cache   

I think a lot of people know this at this point, but I love writing code. To wake myself up in the morning and get my brain running, I normally solve a code puzzle first thing when I get to work.

I normally find these on Project Euler, CodeWars, or HackerRank -- though I'm totally open to suggestions if anybody has a really good alternate resource! I really love the problem-solving nature of these code challenges, and how I can sometimes can come up with really cool out of the box solutions to them. I do feel like they help me become a stronger programmer, and an added bonus is that if I am interviewing at the time a lot of interview questions are similar to these (for better or for worse).

Since I'm already doing these every day, I thought it would be really cool to share my results on social media to keep me accountable and to see how other people solve the same problem. I normally solve these challenges in Python or JavaScript, but other people have been posting in Ruby, Rust, Ramda, and Clojure so far (which is so cool to see!). Some of them I have solved before at some point, so I post multiple answers in different languages or my refactors!

If you would like to follow along and post your own solutions (or just see other people's), follow me on Twitter or I've been using the hashtag #CodingPuzzle on them, so you could follow there instead! I normally post in between 8 and 9 AM EST since that is normally when I get to work! It's also led to some interesting discussions on efficiency and the strengths of different programming languages for solving these types of problems! These problems are also a variety of difficulties, so if one day's problem is too hard, still follow the next day for a new one!

To get started, today's problem was Project Euler Problem 2: Even Fibonacci Numbers: Each new term in the Fibonacci sequence is generated by adding the previous two terms. Find the sum of the even-valued terms. Please post your answer here!

If you want to catch up on the previous ones, they were:

Hope to see your answers!


          How to Use YouTube’s Incognito Mode – Lifehacker      Cache   Translate Page   Web Page Cache   
LifehackerAndroid: Sometimes you want to watch a video on YouTube and not have it show up in your history. For those moments when you need to go undercover, YouTube recently added an Incognito mode that makes it easier to watch videos without leaving a trace.YouTube on Android is getting an Incognito modeThe VergeYouTube’s Incognito mode […]
          This $50 Mechanical Keyboard Includes Genuine Cherry MX Switches      Cache   Translate Page   Web Page Cache   

The Corsair K66 is one of the most stripped-down models of Corsair’s reader-favorite K-series mechanical keyboards, but it has the one feature that really matters: Genuine Cherry MX Red switches. It’s not backlit, but with its clean design and quiet keys, it’d be ideal for use in an office environment. So buy it for…

Read more...


          Stock Up On Our Favorite Men's Shirts For Under $50      Cache   Translate Page   Web Page Cache   

“No-iron shirts” have been around for so long that it seems almost ridiculous to buy anything else. Twillory takes that notion one step further by taking that no-iron notion and adding a bespoke feel.

Read more...


          Prevent Hackers From Turning Your Business Into The Next Big Data Breach      Cache   Translate Page   Web Page Cache   
Windows comes with this software built-in … Hopefully it doesn’t happen to you, but sometimes employees add their personal email account or phone number to company accounts with the intention of usi…
          Comment on On the Use of the Word “Hack” by Sonia Hernandez      Cache   Translate Page   Web Page Cache   
This is really amazing, my whole life I've never met any one who does it better, big shout out to mikejosh (@) cyber-wizard.com , I contacted him and he's absolutely the best when it comes to INCREASING CREDIT SCORE, GRADES CHANGE, FACEBOOK, EMAIL and WHATS APP in fact he does all sort of hack, interesting part is he works with Proofs. He increased myself and for other of my buddies' credit worthiness within hours. I can strongly assure you that he's one of the best ethical hackers I've ever met, It was a blessing meeting him, Just let him know Miss Hernandez referred you.
          NickTube: Planet Nickelodeon Video Round-Up | Tuesday 10th July 2018      Cache   Translate Page   Web Page Cache   
Check out a selection of video clips featuring your favourite Nickelodeon shows and stars from Nickelodeon channels around the world!

Please note that some videos may be subject to geographical restrictions.

My 3 NEW Animated Series! | Butch Hartman



Support Oaxis on Kickstarter: http://kck.st/2JYfUGP

You had some questions about show on my new network, so I'm here to reveal some animated series. Thanks Hartfans!

[Butch's new animated shows are: Dyna Mice, Butch's version of the Teenage Mutant Ninja Turtles about three superhero mice that fight crime; Imaginathan, a Danny Phantom-esque animated show about a kid named Nathan whose father invents a device that allows thoughts to become reality. It will be animated anime style, feature a over-arcing story, and is based on a show from the Noog Network; and Splatapus (Splatypus), a part Fairly OddParents part SpongeBob super-cartoony Bugs Bunny-esque show following a little guy name Splat Flatfoot.]

2 YEAR OLDS GIVE ME A HAIR CUT..... (DISASTER!!) | JoJo Siwa Vlogs



THIS WAS A BAD IDEA....

Knight Squad | The Sound of Armour | Nickelodeon UK



Ciara and Arc search for the suit of armour while Prudence and Warwick put on a glittery song and dance show.

Les Thunderman | Filles vs Garçons | Nickelodeon France



Les garçons ont pour défi de survivre 24 heures dans la nature tandis que Barbra initie les filles aux activités de son enfance à la ferme.

Vikki RPM | Le plan parfait | Nickelodeon Teen France



Toby the Wise Rescue Tram | Thomas & Friends UK | Kids Cartoons



Highlights of Toby. Thomas gives Toby a confidence boost. Toby is asked to help James with being the rescue engine. James refused Toby's help and gets into trouble. Toby helps rescuing everyone.

Blaze et les Monster Machines | Le moteur à ballon | NICKELODEON JUNIOR FRANCE



Blaze et ses amis roulent avec l'aide d'un immense ballon d'air.

Henry Danger | Combattimento in treno | Nickelodeon Italia



Henry e Phoebe si lanciano da un elicottero per salvare Ray che è tenuto come ostaggio su un treno!

Game Shakers | Nieuw teamlid | Nickelodeon Nederlands



Being Small Doesn't Mean You Can't Do Big Things | Life Lesson | Thomas & Friends UK | Kids Cartoons



Learn how everyone is useful just like Skiff!

iCarly | First Dates | Nickelodeon UK



Spencer gives Freddie some solid advice for his first date, and cooks spaghetti tacos!

Hunter Street | Espagueti| Latinoamérica | Nickelodeon en Español



¿Listos para comer espaguetis con los amigos de Hunter Street? ¡Puede haber algunos problemas en el camino!

YTV - Sponge Birth Pants Day Promo (2018)



LIVE Q&A!!! | JoJo Siwa Vlogs



COME HANG OUT WITH ME LIVE!!

Hunter Street | O que vai rolar na primeira temporada | Brasil | Nickelodeon em Português



Será que os irmãos vão decifrar as pistas e resolver o dilema?

🔴LIVE Thomas & Friends | Gordon Takes a Tumble | Full Episodes LIVE | Classic Thomas & Friends Live | UK



Gordon, the express train, is proud of being the fastest engine who carries only passengers and not freight. When The Fat Controller sends him to haul some trucks, Gordon is unhappy and learns that pride comes before a fall…

Paw Patrol : la Pat'Patrouille | Une pluie de nourriture | NICKELODEON JUNIOR FRANCE



Monsieur Porter a décidé d'effectuer toutes ses livraisons par drone, mais il perd la télécommande et les drones deviennent incontrôlables.

Horrid Henry - Pyjama Party | Cartoons For Children | Horrid Henry Full Episodes | HFFE



Don't forget to subscribe for more horridness!

Les Mystères d'Hunter Street | La pièce secrète | Nickelodeon Teen France



Dans la cache du hacker, la fratrie découvre le plan d’une pièce secrète chez eux !

Les aventures de la tour Wayne | Olpho le nez-rat | Nickelodeon France



Un étrange rat se balade dans le hall de la tour Wayne.

School of Rock | Das Pudding-Zimmer | Nickelodeon Deutschland



A casa dei Loud | Lavoro sporco | Nickelodeon Italia



Tutti devono fare attenzione con Lola, o saranno guai! Lincoln si è offerto di aiutare Lola, ma non sa per cosa, ora è nei pasticci!

Henry Danger | Henry obtient un superpouvoir | Nickelodeon France



Henry fait une expérience pour avoir des réflexes plus rapides pour son combat contre Drex.

Мой шумный дом | Шумные сёстры | Nickelodeon Россия



Линкольну надоело, что его сёстры постоянно шумят, поэтому он нашёл способ, как с этим справиться.

Tartarugas Ninja | O que Perdeu o Splinter? | Brasil | Nickelodeon em Português



O Splinter conta o que se passou entre ele e o Shredder.

Breadwinners | ¿De quién fue esa idea? | Latinoamérica | Nickelodeon en Español



Henry Danger | Medo de Cobras | Portugal | Nickelodeon em Português



Jasper avisa o Capitão Man e o Henry Danger de que os corredores da escola estão cheio de cobras. Como lidarão eles com o problema?

Henry Danger | ¡Henry gana un superpoder! | España | Nickelodeon en Español



Henry se somete a un experimento para tener reflejos rápidos en su lucha contra Drex.

Даша-путешественница | Пирог для Башмачка | Nick Jr. Россия



Башмачок получил пирог на День Рождения от Даши.

Nickelodeon Italy Continuity July 2018



Nick Italia luglio 2018

Horrid Henry - Henry Goes Fishing | Cartoons For Children | Horrid Henry Full Episodes | HFFE



Don't forget to subscribe for more horridness!

More Nick: Nickelodeon Releases New 'Dora's Worldwide Adventure' and 'Nick Football Champions' Apps Globally!
Follow NickALive! on Twitter, Tumblr, Google+, via RSS, on Instagram, and/or Facebook for the latest Nickelodeon International and Nick Jr. News and Highlights!
          How to Use YouTube’s Incognito Mode – Lifehacker      Cache   Translate Page   Web Page Cache   
LifehackerAndroid: Sometimes you want to watch a video on YouTube and not have it show up in your history. For those moments when you need to go undercover, YouTube recently added an Incognito mode that makes it easier to watch videos without leaving a trace.YouTube on Android is getting an Incognito modeThe VergeYouTube’s Incognito mode […]
          Former NSA Hacker Reveals 5 Ways To Protect Yourself Online      Cache   Translate Page   Web Page Cache   

In a time where companies, celebrities, and even governments are coming under cyber-attacks, getting hacked might seem inevitable. But according to former NSA hacker David Kennedy, there are steps you can take to prevent it from happening to you. Kennedy shares his five must-do tips for protecting yourself from hackers.
          US Reaper drone data leaked on dark web, researchers say      Cache   Translate Page   Web Page Cache   
A hacker penetrated an Air Force captain's computer to steal sensitive information about US military drones, according to new research by cybersecurity investigators at Recorded Future, a threat intelligence firm.

          The Greatest 'Unusual Articles' From Wikipedia      Cache   Translate Page   Web Page Cache   

I should warn you, you’re about to waste a lot of time learning useless trivia. Wikipedia contributors have compiled a list of “unusual articles”—really just articles about unusual things—and the list alone is over 27,000 words long. We’ve collected over eighty of our favorites.

Read more...


          Stock Up On Our Favorite Men's Shirts For Under $50      Cache   Translate Page   Web Page Cache   

“No-iron shirts” have been around for so long that it seems almost ridiculous to buy anything else. Twillory takes that notion one step further by taking that no-iron notion and adding a bespoke feel.

Read more...


          토익 단어 정리      Cache   Translate Page   Web Page Cache   
토익단어장토익 영단어[영어] 토익단어 정리 종합.[토익,기출,어휘,단어,숙어,영어] 토익 빈도수 높은 어휘들 알면 알수록 힘이다!!![토익] 토익 기출 단어 어휘 완전정복[토익] 토익 RC총정리 990문제 applicant 지원자 신청자 apprehensive 걱정하는 염려하는 aptitude 재능 소질 associate 관련시키다 bilingual 2개 국어를 구사하는 broad 폭넓은 candidate 지원자 후보자 certification 증명서 증명 commensurate 비례한 액수가 상응하는 confidence 확신 자신 신임 consultant 고문 컨설턴트 degree 학위 eligible 자격이 있는 적격의 employment 고용 entitle ~에게 ~할 자격을 주다 get through 합격하다 ~을 무사히 마치다 highly 매우 몹시 increment 증가 인상 lag 뒤쳐지다 뒤떨어지다 managerial 관리의 match ~에 어울리다 조화되다 meet 만족시키다 minimum 최소한도 occupation 직업 opening 공석 결원; 개시 개장 토익 RC 공략법 총정리토익에 자주나오는 알짜 단어 기출!토익단어 7000개토익초급 부사정리[토익]토익필수핵심단어1020개조선대 이한재교수 경영학원론 단어정리 레포트조선대 경영학원론 단어정리조선대 이한재교수 경영학원론 단어정리[영어어휘] 주제별 단어정리토익단어 150자[토플 단어]Hacker토플필수단어정리모던패밀리 단어정리north star2 3과 단어정리이한재교수 경영의 이해 레포트 단어정리 족보 조회수:3회
          Review: Playing With Fire - Sherry D. Ficklin       Cache   Translate Page   Web Page Cache   


Playing With Fire (#Hacker, #1)


Review: Playing with Fire - Book #1 #Hackers Series , Geek Girl Mysteries  - Sherry D. Ficklin - October 2015
Farris and her Dad are in dire need of a new beginning. Especially since last year her mum died, her friends turned her back on her, and her dad has been living in his job. Farris's dad is in the military, and they are moving to a new base. When Farris arrives, she meets a group of misfits and for the first time in a long time finds herself fitting in. If only it were that easy, as her Dad is feeling the pressure at work and someone is trying to mess with the base and the planes. Farris knows she can help as computers are her thing, but what happens when she starts to dig and finds out her new friends could be suspects. When one of the threats causes harm to her Dad, Farris steps up her game and skills to find the real #hacker and person behind the threat? What will happen though when she soon learns that she can't trust anyone especially not the nerd next door - Reid? Can Farris save the day and her father's job at the base? Find out in Playing with Fire. A fun, fast-paced YA novel filled with hacking, computers, and adventures and not to mention an awesome spy girl feel. Fans of Shannon Greenland's Spy Specialists and Ally Carters Gallagher Girl series will love Sherry D. Ficklin's #Hackers.
                                                            

                                    



          Торрент-клиент qBittorrent — простая замена громоздкому uTorrent      Cache   Translate Page   Web Page Cache   

Если вы пользуетесь торрент-трекерами, то наверняка привыкли скачивать файлы через uTorrent. Эта многофункциональная программа давно себя зарекомендовала, но в последнее время превратилась в нагромождение рекламы и ненужных функций. Отличной заменой популярному клиенту станет приложение с открытым исходным кодом qBittorrent.

Внешне клиент мало чем отличается от uTorrent, но сразу радует отсутствием рекламы. Слева располагается панель, на которой отображается статус загрузок, чуть правее — окно с самими торрентами.

qBittorrent

Внизу можно просматривать различные параметры скачивания — например, скорость, размер, информацию о сидах и пирах. Вверху располагаются кнопки приостановки и запуска загрузки, добавления торрент-файлов и так далее.

В qBittorrent есть удобная поисковая система. Чтобы её добавить, нужно нажать «Вид» на панели вверху, а затем выбрать «Поисковик». После этого вы сможете искать файлы на популярных торрент-трекерах прямо через программу. В клиент встроено несколько плагинов для поиска, а другие можно легко найти в Google.

qBittorrent

Описывать все возможности qBittorrent нет смысла — по большей части клиент идентичен uTorrent. Программа поддерживает современные интернет-протоколы и технологии, свойственные подобного рода приложениям, и переведена примерно на 70 языков. Работает она на Windows, macOS и Linux, а также на FreeBSD и OS/2.

qBittorrent →


          12 Sites Like Lifehacker.com      Cache   Translate Page   Web Page Cache   
Lifehacker is another platform like lifehack.org that provide the latest information about the life hacks and software that was launched on 31 January 2005. It was originally founded by Gawker Media and now own by Univision Communication. The platform covers a wide range of topics such as Microsoft Windows, Linux, Mac program, Android, and iOS […]
          Filme 'Oito Mulheres e um Segredo' serve de alerta à cibersegurança das empresas      Cache   Translate Page   Web Page Cache   
Hacker interpretada por Rihanna demonstra como o elo mais frágil da cibersegurança nas corporações sempre é o humano
          Top PUBG Streamer Says He Was Banned After Playing With Hacker      Cache   Translate Page   Web Page Cache   
During a livestream yesterday Twitch streamer Michael “Shroud” Grzesiek stated that he received a one month ban from PUBG following an incident where he played alongside a hacker. The ban comes on the heels of lengthy community speculation as to whether or not the game’s developers would actually discipline one of their game’s most popular streamers. More »
   
 
 

          Im happy I now registered (Italy, La Moschella)      Cache   Translate Page   Web Page Cache   
Hey! I just wanted to ask if yօu ever hɑve any issues witһ hackers? My last blog (wordpress) ᴡɑѕ hacked ɑnd I ended up losing a fеw mоnths of hɑrɗ work duе to no data backup. Ɗο you һave any solutions tо stop hackers?
          Chinese State-Linked Hackers in Large Scale Operation to Monitor Cambodia's Upcoming Elections, Report Says      Cache   Translate Page   Web Page Cache   
The emails were believable. An interview request for a member of the opposition. An article sent to a government official. A conference invitation for a journalist. But each...
          Jeff Mills: Waveform Transmission Vol. 1      Cache   Translate Page   Web Page Cache   

Axis 060 (US Do EP) - € 50.00
The 20th Anniversary edition - Essential blue print Techno - one sealed copy

Tracklisting:
  1. Phase 4
  2. Berlin
  3. Jerical
  4. Changes Of Life
  5. The Hacker
  6. DNA
  7. Late Night
  8. Man-Like

          Review: 5 Beers from Melvin Brewing, 2018      Cache   Translate Page   Web Page Cache   

When we previously encountered Wyoming-based Melvin Brewing, it was just a taste of the company’s extensive beer selection. Today we dig deeper into the Melvin lineup, paying closer attention to its exceptional IPAs, each one bigger than the next. Melvin Heyzeus Mexican Style Lager – Can the boys from Wyoming make a credible Fauxrona? This expression […]

The post Review: 5 Beers from Melvin Brewing, 2018 appeared first on Drinkhacker: The Insider's Guide to Good Drinking.


          'White hat' hacker rewards skyrocket as cyber attack threat looms      Cache   Translate Page   Web Page Cache   
none
          Top PUBG Streamer Says He Was Banned After Playing With Hacker [Updated] - Kotaku      Cache   Translate Page   Web Page Cache   

Kotaku

Top PUBG Streamer Says He Was Banned After Playing With Hacker [Updated]
Kotaku
During a livestream last night Twitch streamer Michael “Shroud” Grzesiek stated that he received a one month ban from PUBG following an incident where he played alongside a hacker. The ban comes on the heels of lengthy community speculation as to ...
Popular 'PUBG' streamer faces ban for playing with cheaterEngadget
Popular streamer Shroud gets banned for playing PUBG with a hackerPC Gamer
Popular PUBG Streamer Shroud Banned for Getting in Hacked Flying CarGame Rant
Bleeding Cool News -Newsweek
all 19 news articles »

          Pastor Convicted of Pocketing Millions Through Insider Trading      Cache   Translate Page   Web Page Cache   

A federal jury in Brooklyn, New York on Friday convicted two men for their roles in an international scheme to make millions of dollars by illegally trading on corporate press releases that were stolen by computer hackers before they became public.

Vitaly Korchevsky, a Pennsylvania pastor and former Morgan Stanley vice president, and co-defendant Vladislav Khalupsky were each found guilty on two securities fraud and three conspiracy counts, a spokesman for U.S. Attorney Richard Donoghue in Brooklyn said.

The defendants had been among 10 people, including seven traders and three Ukraine-based hackers, criminally charged in Brooklyn and New Jersey over what U.S. authorities have called the largest known hacking scheme to game financial markets.

Authorities said more than 150,000 press releases were stolen from Business Wire, Marketwired and PR Newswire from February 2010 to August 2015, and used to generated in excess of $100 million of illegal trading profit.

Traders allegedly gave hackers "shopping lists" or "wish lists" of releases they wanted to see in advance, and traded in such companies as Advanced Micro Devices Inc, Caterpillar Inc, Home Depot Inc, Panera Bread Co, Qualcomm Inc and Weight Watchers International Inc .

Korchevsky, 53, has lived in Glen Mills, Pennsylvania, while Khalupsky, 48, has lived in Brooklyn and Odessa, Ukraine, prosecutors said. Their trial began on June 12.

"It is a sad day for Mr. Korchevsky," his lawyer Steven Brill said in an email. "But we will fight on and begin preparing for sentencing and a full appeal."

"We are clearly disappointed in the verdict, but will continue to fight for Mr. Khalupsky through sentencing and appeal," his lawyer Mildred Whalen said in an email.

Business Wire is owned by Warren Buffett's Berkshire Hathaway Inc, PR Newswire is owned by Cision Ltd , and Marketwired is owned by West Corp.

None was accused of wrongdoing.

The case is U.S. v. Korchevsky et al, U.S. District Court, Eastern District of New York, No. 15-cr-00381. {eoa}

© 2018 Thomson Reuters. All rights reserved.


          New top story on Hacker News: Bruno Latour Tracks Down Gaia      Cache   Translate Page   Web Page Cache   
Bruno Latour Tracks Down Gaia 4 by Hooke | 0 comments on Hacker News. https://ClusterAssets.tk
          Grab a Set of Our Readers' Favorite Bluetooth Headphones For Just $19      Cache   Translate Page   Web Page Cache   

Anker’s SoundBuds Slims are our readers’ favorite affordable Bluetooth headphones, and you can grab a pair for just $19 with promo code WE5B8NAH, or $7 less than usual.

Read more...


          Top PUBG Streamer Says He Was Banned After Playing With Hacker [Updated]      Cache   Translate Page   Web Page Cache   

During a livestream last night Twitch streamer Michael “Shroud” Grzesiek stated that he received a one month ban from PUBG following an incident where he played alongside a hacker. The ban comes on the heels of lengthy community speculation as to whether or not the game’s developers would actually discipline one of…

Read more...


          leadership majority minority How Important Is It For The Majority To Respect The Rights Of Majority?      Cache   Translate Page   Web Page Cache   
modern view of how the disabled is described[m&a에관련된 책 독후감] How To Think Like The World`s Greastest Masters of M&A[한의학][논문요약] Smoking is negatively associated with the presence of thyroglobulin autoantibody and to a lesser deg성소수자 학생에 대한 교육의 역할 (영문)[레포트]영강 레포트 (Humanitarian Intervention)[토플, ibt, 이익훈, 해커스, hackers] ibt 토플 <이익훈> 미출제 타픽 아웃라인 74개 Five paragraph about How Important Is It For The Majority To Respect The Rights Of Majority? Society becomes accomplished with the member who has the relationship of the various opinion and understanding. For the maintenance of the society there is a necessity to regulate these rationally. This essay gives an answer about three questions; how important is it for the majority to respect the rights of majority? Should the minority always agree to follow what the majority decide is best? What interest if any does the majority have in respecting the rights of the minority? 경영학원론 레포트[2]고려대 리더쉽 개발 기말고사 자료Making Connections3 skills and strategi 본문번역국가공무원 영어기출문제(1993~2006년 9급,7급,국회8급기출문제집)국제무역론_연습문제_답단국대 편입문제프렌즈 대번[리포트자료] Netiquette, Emoticons, Internet Jargoncomtemporary topic1 스크립manegerial accounting , garrison 13th 연습문제 풀이영어 토익 단어 7000개Entertainment Marketing and communication (Griffith University) Summary크레이지_kreyszig_공학수학_9판_솔루션공무원 영어기본서 문법노트 조회수:876회
          Cyberterroristas marroquíes hackean la página de la Presidencia de Sudáfrica.       Cache   Translate Page   Web Page Cache   

*Fuente: The Citizen, South Africa. 7.7.2018
Traducción no oficial EIC Poemario por un Sahara Libre
Quien haya pirateado la web parece tener un propósito diferente al de quienes la atacaron el año pasado.
Tras conocerse que el sitio web de la Presidencia de Sudáfrica thepresidency.gov.za fue atacada por hackers desconocidos el sábado por la mañana, el sitio web todavía no funcionaba al mediodía. Volvió a estar operativo a las 3 de la tarde cuando volvimos a intentar acceder.
News24 informó que los usuarios que intentaron acceder al sitio para ver las noticias de la presidencia encontraron un mensaje que decía: “Hackeado por Black Team. El Sahara es marroquí. ¡Y Marruecos es tu Señor!”.
Para cuando The Citizen intentó acceder al sitio, el mensaje de los hackers ya no estaba disponible.
Su mensaje se refería al territorio en disputa en el Sáhara Occidental, una zona escasamente poblada, en su mayoría desértica, situada en la costa noroeste de África.
Antigua colonia española, fue anexionada por Marruecos en 1975. Desde entonces ha sido objeto de una larga disputa territorial entre Marruecos y el pueblo saharaui, representado por el Frente Polisario, movimiento de liberación saharaui.
En enero la Unión Africana decidió que sus estados miembros no participarían en el Foro de Crans Montana en el Sahara Occidental ocupado. Sin embargo, Sudáfrica y Marruecos reanudaron las relaciones diplomáticas recientemente después de más de una década desde que Marruecos retirara a su embajador de Pretoria.
Marruecos retiró a su embajador de Sudáfrica en 2004 después de que el entonces presidente Thabo Mbeki reconociera a la República del Sahara Occidental, territorio que Marruecos reclama como suyo.
El ANC apoya desde hace mucho tiempo la independencia del Sáhara Occidental y acusa a Marruecos de ocupar la región.
La portavoz de Cyril Ramaphosa, Khusela Diko, declaró a News24 que sus técnicos estaban investigando el incidente y que buscaban que el sitio web volviera a pleno rendimiento después de la “interferencia”.
Afirmó no saber quién estaba detrás del ataque.
(…)

          US Reaper drone data leaked on dark web, researchers say      Cache   Translate Page   Web Page Cache   
A hacker penetrated an Air Force captain’s computer to steal sensitive information about US military drones, according to new research by cybersecurity investigators at Recorded Future, a threat intelligence firm. The documents, while not classified, include a private list of airmen working with MQ-9A Reaper drones and maintenance and course material on the weapons – the US-made deadly unmanned aerial vehicle used around the world to surveille and strike targets. US law enforcement is investigating the breach, according to Recorded […]
          Bancor $12M Hack Sparks Backlash Over ‘Decentralization’ Claims      Cache   Translate Page   Web Page Cache   

Cryptocurrency industry commentators have poured scorn on decentralized exchange platform Bancor after hackers stole around $12 million July 9. Bancor Hack Cause Remains Unknown Bancor, which shot to fame in 2017 when it raised over $150 million in three hours during its ICO, confirmed the hack in an update Tuesday. Malicious parties originally attempted to steal and convert 24,984 ETH ($10,800,000), 229,356,645 NPXS ($1,000,000) and Bancor’s own BNT token. After using instant conversion platform Changelly

The post Bancor $12M Hack Sparks Backlash Over ‘Decentralization’ Claims appeared first on Bitcoinist.com.


          Chinese State-Linked Hackers in Large Scale Operation to Monitor Cambodia’s Upcoming Elections, Report Says      Cache   Translate Page   Web Page Cache   
Such cases may be linked to a largescale operation from a Chinese cyber espionage group seeking to monitor the country’s upcoming national elections
          Top PUBG Streamer Says He Was Banned After Playing With Hacker [Updated] - Kotaku      Cache   Translate Page   Web Page Cache   

Kotaku

Top PUBG Streamer Says He Was Banned After Playing With Hacker [Updated]
Kotaku
During a livestream last night Twitch streamer Michael “Shroud” Grzesiek stated that he received a one month ban from PUBG following an incident where he played alongside a hacker. The ban comes on the heels of lengthy community speculation as to ...
Popular 'PUBG' streamer faces ban for playing with cheaterEngadget
Popular streamer Shroud gets banned for playing PUBG with a hackerPC Gamer
Popular PUBG Streamer Shroud Banned for Getting in Hacked Flying CarGame Rant
Bleeding Cool News -Newsweek
all 19 news articles »

          How Flipping and Employment Taxes are Skimming Your Profits | 423      Cache   Translate Page   Web Page Cache   

If you're a prospective or current flipper, you're looking at thousands of extra dollars in taxes each year - unless you're taking Tim Berry's advice.

On this week's Tax Hacker Tuesday, Matt Theriault and Tim Berry teach everything you need to know about flipping and employment taxes including how to utilize corporations to your advantage, when to start creating your entities, how to avoid huge pitfalls and crazy lawsuits, and much, much more!


          Iranian Hackers Tried to Impersonate Israeli Cyber-security Company - Haaretz      Cache   Translate Page   Web Page Cache   

Haaretz

Iranian Hackers Tried to Impersonate Israeli Cyber-security Company
Haaretz
The Israeli cybersecurity firm ClearSky has exposed several cases in which Iranian hackers impersonated legitimate websites. In February, for instance, it revealed an operation it called Ayatollah BBC – a series of Iranian-run websites impersonating ...


          China-based hackers take an interest in Cambodia's elections      Cache   Translate Page   Web Page Cache   

Group named 'TEMP.Periscope' releasing RATs says FireEye

AUS-based security researcher has accused China of interfering in Cambodia's forthcoming national election.…


          Chinese State-Linked Hackers in Large Scale Operation to Monitor Cambodia’s Upcoming Elections, Report Says      Cache   Translate Page   Web Page Cache   
Such cases may be linked to a largescale operation from a Chinese cyber espionage group seeking to monitor the country’s upcoming national elections
          hackers edit wikipedia page to      Cache   Translate Page   Web Page Cache   
hackers edit wikipedia page to

          Former NSA Hacker Reveals 5 Ways To Protect Yourself Online      Cache   Translate Page   Web Page Cache   

In a time where companies, celebrities, and even governments are coming under cyber-attacks, getting hacked might seem inevitable. But according to former NSA hacker David Kennedy, there are steps you can take to prevent it from happening to you. Kennedy shares his five must-do tips for protecting yourself from hackers.
          Hackers find clever way to steal gas      Cache   Translate Page   Web Page Cache   
The worst thing about living in a high-tech world is that criminals have also gone high-tech. Think about all of the digital threats that we constantly need to be watching for. From spoofed websites to phishing emails that are trying to steal our credentials and payment information, cybercrime is everywhere. It seems there's no safe...
          Top PUBG Streamer Says He Was Banned After Playing With Hacker [Updated] - Kotaku      Cache   Translate Page   Web Page Cache   

Kotaku

Top PUBG Streamer Says He Was Banned After Playing With Hacker [Updated]
Kotaku
During a livestream last night Twitch streamer Michael “Shroud” Grzesiek stated that he received a one month ban from PUBG following an incident where he played alongside a hacker. The ban comes on the heels of lengthy community speculation as to ...
Popular 'PUBG' streamer faces ban for playing with cheaterEngadget
Popular streamer Shroud gets banned for playing PUBG with a hackerPC Gamer
Popular PUBG Streamer Shroud Banned for Getting in Hacked Flying CarGame Rant
Bleeding Cool News -Newsweek -Attack of the Fanboy
all 19 news articles »

          Top PUBG Streamer Says He Was Banned After Playing With Hacker [Updated] - Kotaku      Cache   Translate Page   Web Page Cache   

Kotaku

Top PUBG Streamer Says He Was Banned After Playing With Hacker [Updated]
Kotaku
During a livestream last night Twitch streamer Michael “Shroud” Grzesiek stated that he received a one month ban from PUBG following an incident where he played alongside a hacker. The ban comes on the heels of lengthy community speculation as to ...
Popular 'PUBG' streamer faces ban for playing with cheaterEngadget
Popular streamer Shroud gets banned for playing PUBG with a hackerPC Gamer
Popular PUBG Streamer Shroud Banned for Getting in Hacked Flying CarGame Rant
Bleeding Cool News -Newsweek
all 19 news articles »

          Top PUBG Streamer Says He Was Banned After Playing With Hacker [Updated]      Cache   Translate Page   Web Page Cache   

During a livestream last night Twitch streamer Michael “Shroud” Grzesiek stated that he received a one month ban from PUBG following an incident where he played alongside a hacker. The ban comes on the heels of lengthy community speculation as to whether or not the game’s developers would actually discipline one of…

Read more...


          * NEW * History Hackers: Viking Adventure Story (LKS2 Storywriting Competition Winner)      Cache   Translate Page   Web Page Cache   
The winner of the Lower Key Stage 2 category is Thady Lillingston from Northcote Lodge, with a thrilling adventure set in Viking times.

          Sheesh: Two Men Hack Into A Pump At A Detroit Gas Station & Steal 600 Gallons Of Gas!      Cache   Translate Page   Web Page Cache   
Two suspects allegedly managed to hack a gas pump and steal over 600 gallons of gasoline, valued at about $1,800. The theft took place in the middle of the day and went on for about 90 minutes, with the gas station attendant unable to thwart the hackers. The thieves used some sort of remote device that allowed them to hijack the pump and take control away from the gas station employee. Posted By Persist

          EOS, Augur, Tron dan Monero Menyerahkan Insentif Bounty Bug ke Beberapa Hacker setelah Kekurangan Kode Diidentifikasi      Cache   Translate Page   Web Page Cache   
Meskipun ketangguhan teknologi blockchain yang terkenal , peretasan yang meluas dan 51 persen serangan pada beberapa proyek cryptocurrency telah membuktikan bahwa sektor yang sedang berkembang rentan terhadap kekurangan. Ini dalam [...]
          แฮคเกอร์ขโมยน้ำมัน 600 แกลลอนจากปั๊มน้ำมันในสหรัฐฯ โดยการแฮคหัวจ่าย      Cache   Translate Page   Web Page Cache   

เกิดเหตุการขโมยน้ำมันกันแบบแปลกประหลาดในสหรัฐอเมริกา เมื่อหัวจ่ายน้ำมันในปั๊มถูกแฮค ทำให้มีน้ำมันโดนขโมยไป 600 แกลลอน (ประมาณ 2,300 ลิตร) คิดเป็นมูลค่าราว 1,800 ดอลลาร์

การขโมยน้ำมันที่ว่านี้ไม่ใช่เป็นการมาแฮคระบบคอมพิวเตอร์แล้วเอาถังมาขโมยน้ำมันจากหัวจ่ายไปดื้อๆ แต่สิ่งที่เกิดขึ้นก็คือ ในช่วงประมาณบ่ายโมงวันที่ 23 มิถุนายน หัวจ่ายน้ำมันของปั๊มน้ำมัน Marathon เกิดอาการผิดปกติ โดยมันสามารถจ่ายน้ำมันออกได้แม้จะไม่ได้รับการชำระเงินจากลูกค้า ทำให้มีรถยนต์อย่างน้อย 10 คัน ขับเข้ามาเติมน้ำมันฟรีจากปั๊ม รวมปริมาณน้ำมันมากถึง 600 แกลลอน

แม้พนักงานประจำปั๊มน้ำมันพยายามจะสั่งตัดการจ่ายน้ำมันโดยอาศัยระบบคอมพิวเตอร์ของปั๊มแต่ก็ไม่เป็นผล เหตุการณ์แจกน้ำมันฟรีเกิดขึ้นเป็นเวลานาน 90 นาที จนกระทั่งพนักงานประจำปั๊มตัดสินใจใช้อุปกรณ์หยุดฉุกเฉินเพื่อทำการตัดระบบน้ำมันและโทรแจ้งตำรวจ

จากการตรวจสอบพบว่ามีอุปกรณ์ที่ใช้เพื่อการควบคุมจากระยะไกลถูกนำเข้าไปติดตั้งไว้กับหัวจ่ายน้ำมัน แม้กล้องวงจรปิดภายนอกของปั๊มจะมีปัญหาในช่วงเวลาที่ผู้ก่อเหตุลงมือ แต่ยังดีที่มีภาพจากกล้องวงจรปิดซึ่งติดตั้งอยู่ในร้านค้าของปั๊มน้ำมันทำให้สามารถระบุได้ว่างานนี้มีผู้ต้องสงสัยจำนวน 2 คน

แม้รายละเอียดเชิงลึกเกี่ยวกับเทคนิคที่แฮคเกอร์ใช้เพื่อขโมยน้ำมันจะยังไม่ได้รับการเปิดเผยออกมา แต่เป็นไปได้ว่าการก่อเหตุครั้งนี้อาศัยการช่องโหว่ในระบบซอฟต์แวร์ที่ปั๊มน้ำมันใช้งานเพื่อควบคุมหัวจ่าย โดยในบรรดาซอฟต์แวร์ที่มีการใช้งานในปั๊มน้ำมันหลายเจ้านั้น มีอย่างน้อย 1 รายที่เว็บไซต์ Motherboard เคยลงบทความตีแผ่ว่ามีช่องโหว่ที่ทำให้ผู้ไม่หวังดีสามารถแฮคระบบเพื่อแก้ไขตัวเลขราคาน้ำมันรวมทั้งตัวเลขวัดปริมาตรน้ำมันได้

เหตุการณ์แฮคระบบคอมพิวเตอร์เพื่อขโมยน้ำมันนี้เริ่มเกิดขึ้นถี่ในระยะหลัง เมื่อ 2-3 เดือนก่อนมีชายคนหนึ่งถูกตั้งข้อหาว่าใช้อุปกรณ์แฮคระบบควบคุมหัวจ่ายน้ำมันเพื่อขโมยน้ำมันเป็นมูลค่า 800 ดอลลาร์ ส่วนเมื่อเดือนที่แล้วก็มีคดีของลูกจ้างบริษัท BP ทำการแก้ไขบันทึกในระบบคอมพิวเตอร์เพื่อทำการขโมยน้ำมันเป็นมูลค่ามากกว่า 300,000 ดอลลาร์จากบริษัท

ที่มา - Ubergizmo, Gizmodo, TechSpot

No Descriptionภาพจาก Wikimedia


          Free Slurpee Day 2018 Is Coming So Prepare Your Body      Cache   Translate Page   Web Page Cache   
image

With heat waves ripping across the U.S., even us self-professed lovers of summer have been finding ourselves longing for a crisp autumn day. This Wednesday, however, we'll all have at least one reason to be glad it’s still the middle of July: 7-Eleven’s annual Free Slurpee Day returns for 2018!

July 11th (a.k.a. 7/11) is of course 7-Eleven’s golden day, and what better way to celebrate than by blessing us with complimentary, ice-cold slushies in the midst of this sweltering heat? 

"Free Slurpee day may be the most anticipated day of the year for millions of 7‑Eleven customers and new customers alike," Raj Kapoor, 7‑Eleven's senior vice president said in a press release. "7‑Eleven Day is a celebration, not only of our birthday, but more importantly, of our customers." 

Unfortunately, this is not bring-your-own-cup day so the free frozen concoction only comes in a small size — but don't be afraid to treat yourself to an upgrade. 

Unsurprisingly, Slurpee fans are anxiously awaiting the occasion.

For some of us, Free Slurpee Day is a beacon of hope in this grim existence that is 2018.

Others would even go so far as to call it a bonafide national holiday.

Meanwhile, some of us are just interested in maximizing our efficiency in pursuit of free stuff.

For the true Slurpee addicts out there, there's even more reason to rejoice. 7-Eleven is adding some insane new flavors.

You can claim your free small Slurpee at participating 7 Eleven locations from 11 a.m. to 7 p.m. While you're at it grab a Big Bite hot dog, which will be sold for $1 in honor of the day. 

So get excited and prepare your bod for the sugar rush. When few things in life are truly free, we can always depend on 7-Eleven to bestow us with this yearly gift.

More from Distractify

Woman Teams Up With Domino's Worker To Get Back At The Hacker Who Stole Her Pizza

36 Delicious Reasons to Pack Your Costco Card on Your Next Vacation

30 Undeniably American Things That You Won't Find Anywhere Else


          Weekly doing      Cache   Translate Page   Web Page Cache   

photoSquidwrench hackerspace

What is a Squidwrench weekly doing? It is our weekly meeting where you, the meeting-goer, bring a project you are currently working on, or interested in, researching, and you do/learn about/create/teach others/etc said project in the company of others. Pretty much, it's the tinkering you would be doing at home on your own, but now you're out doing it socially. Don't have a project? Come anyway!

Highland, NY 12528 - USA

Tuesday, September 18 at 7:00 PM

4

https://www.meetup.com/squidwrench/events/dkvcpfyxmbxb/


          US Reaper drone data leaked on dark web, researchers say      Cache   Translate Page   Web Page Cache   
A hacker penetrated an Air Force captain's computer to steal sensitive information about US military drones, according to new research by cybersecurity investigators at Recorded Future, a threat intelligence firm.
          Don Eyles: Space Hacker      Cache   Translate Page   Web Page Cache   
This programmer saved the Apollo 14 mission with 61 keystrokes
          蘋果在 iOS 11.4.1 更新加入避免透過 USB 暴力破解上鎖選項      Cache   Translate Page   Web Page Cache   
日前針對網路安全公司 Hacker House 共同創辦人 Matthew Hickey 宣稱可用暴力方式破解 iOS 防護機制,蘋果當時給予回應表示測試結果有誤,直到稍早才經由 iOS 11.4.1 更新內容證實實際原因,原來蘋果早在 WWDC 2018 向釋出開發者釋出的 iOS 12 beta 測試版本加入 USB 連接限制功能,藉此阻擋 Matthew Hickey 標榜透過 USB 連入破解模式。

          Comment on Tariffs or Border Adjustment taxes – Is there a Difference? by تبلیغ در گوگل      Cache   Translate Page   Web Page Cache   
<strong>تبلیغ در گوگل ادوردز</strong> Hey! I know this is somewhat off subject but I was pondering which website system are you utilizing for this internet site? I’m obtaining ill and drained of WordPress due to the fact I have experienced troubles with hackers and I’m searching at alterna…
          L’app che spia la gente può essere a sua volta spiata (quasi) da chiunque: è la vicenda SpyHuman      Cache   Translate Page   Web Page Cache   

SpyHuman è stata presa di mira da un hacker rimasto anonimo, riuscito a carpire dai server aziendali ben 440 milioni di dati con relativa semplicità.

L'articolo L’app che spia la gente può essere a sua volta spiata (quasi) da chiunque: è la vicenda SpyHuman proviene da TuttoAndroid.


          Hacker Breaches Hola VPN Chrome Extension to Go After Cryptocurrency Wallet Site      Cache   Translate Page   Web Page Cache   
A hacker has breached a Hola VPN developer account and has replaced the official Chrome extension with one that redirected users of the MyEtherWallet.com website to a phishing page controlled by the attacker. [...]
          iOS 11.4.1 blocca l’accesso tramite la porta Lightning agli hacker e alla polizia      Cache   Translate Page   Web Page Cache   

Nella giornata di ieri Apple ha rilasciato iOS 11.4.1 che tra le novità descritte nel nostro articolo, ha introdotto anche...

L'articolo iOS 11.4.1 blocca l’accesso tramite la porta Lightning agli hacker e alla polizia proviene da iSpazio.


          Cybercriminalité : Le site Internet de la présidence sud-africaine piraté      Cache   Translate Page   Web Page Cache   

(TIC Mag) – Le site Internet de la présidence sud-africaine a été la cible le 7 juillet 2018 d’un groupe de hacker. Selon les médias sud-africains, la plateforme qui répond à l’adresse thepresidency.gov.za a été piraté par un groupe marocain, qui visiblement, se revendique du Sahara occidental. Durant tout le temps qu’a duré l’attaque, en […]

L’article Cybercriminalité : Le site Internet de la présidence sud-africaine piraté est apparu en premier sur TIC Mag.


          Stolen D-Link certificates used in malware campaigns      Cache   Translate Page   Web Page Cache   
ESET Security has recently discovered that a group of hackers was using legitimate security certificates stolen from D-Link and Changing Information Technology to help spread Plead malware.The certificates were used to cryptographically verify that legitimate software was issued by D-Link and Changing Information Technology. Microsoft Windows, Apple s macOS, and most other operating systems rely on the cryptographic signatures produced by such certificates to help users ensure that executable files ...
          How To Use Netflix's Smart Downloads Tool      Cache   Translate Page   Web Page Cache   
Netflix has offered the ability to download shows for a couple of years now. However, the onus was on the user to manually add episodes into the offline mode. Thankfully, a new software update takes care of the downloading for you. Here's how it works. More »
   
 
 

          How To Use YouTube's Incognito Mode      Cache   Translate Page   Web Page Cache   
Android. Sometimes you want to watch a video on YouTube and not have it show up in your history. For those moments when you need to go undercover, YouTube recently added an Incognito mode that makes it easier to watch videos without leaving a trace. More »
   
 
 

          Which Soft Drink Has The Most Sugar? Coke Vs Red Bull Vs Powerade      Cache   Translate Page   Web Page Cache   
Soft drinks are regularly cited as one of the top causes of obesity and tooth decay in Australia. yet we still quaff them by the gallon. You know it's bad for you - you may have even tried to quit - but that highly addictive sugar hit will always have you in its thrall. This infographic breaks down the sugar content in five popular drinks; from Coke to Powerade. The ranking might actually surprise you. (Who would have thought a certain iced tea would be worse than Red Bull?) More »
   
 
 

          How To Disable 'Galaxy Apps' Notifications On Your Samsung Phone      Cache   Translate Page   Web Page Cache   
As most Galaxy owners probably know, Samsung phones come with their own app store, Galaxy Apps, which includes items such as new fonts and Edge setups for your device as well as other apps and games. It can be a great resource when you want to customise your phone and a great annoyance if you accidentally turn on notifications from the store. More »
   
 
 

          What Should Your Heart Rate Be? (And How Can You Improve It?)      Cache   Translate Page   Web Page Cache   
Humans have been aware of their heart rate for thousands of years. But knowing the meaning behind the beats isn’t so simple. Exactly what should a healthy person's heart rate be? And what affects it? Let's take a look at the science. More »
   
 
 

          How To Have A Successful Amazon Prime Day      Cache   Translate Page   Web Page Cache   
On July 16, Aussie shoppers will get their first taste of the annual Amazon Prime Day event. It’s kind of like heading to Westfield's on Boxing Day or a big retailer during a closing down sale, except it all takes place online. Here are some tips to ensure you get the best deal possible. More »
   
 
 

          Maybe Wait To Install iOS 11.4 On Your iPhone      Cache   Translate Page   Web Page Cache   
If you haven’t updated your iPhone to iOS 11.4 yet, you might want to hold off for a bit. The newest update to the operating system reportedly has a bug that will make your battery run out of juice a lot faster than it did prior to the update. As BGR notes, a thread on Apple’s support forum is already 35 pages deep with iOS 11.4 users who are feeling battery burnt. More »
   
 
 

          Rapid Review: Motorola Moto G6 Plus      Cache   Translate Page   Web Page Cache   
Motorola's smartphone business has been through some challenging times. After the mobile phone business was spun off, it landed with Google who later sold it to Lenovo where it sits today. And while other brands have garnered plenty of attention, Motorola has continued to create some decent Android handsets. The Moto G Plus is the company's flagship smartphone and it's a great phone that won't break the bank. More »
   
 
 

          Try Baking This Boiled Cider Pie      Cache   Translate Page   Web Page Cache   
This pie is really something special — and I bet you already have the ingredients on hand. More »
   
 
 

          I Compared Google's Chrome Browser With Its No. 1 Competitor - And The Winner Was Clear      Cache   Translate Page   Web Page Cache   
My web browser of choice is Google Chrome, but I'm always on the hunt for a better browser. After all, it's the app I use most often on pretty much any computer. If a browser can perform faster and more efficiently than Chrome, I'd absolutely consider it. So I decided to give Firefox a try. More »
   
 
 

          Six Terrifying Video Games You Need To Play      Cache   Translate Page   Web Page Cache   
No matter how good a horror movie is, it'll never quite match the horrifying feeling of being in control of the main character's desperate struggle for survival. Horror games are uniquely terrifying for their interactivity - you're not allowed to just close your eyes when things get scary. Here's our pick of the five scariest horror games every horror junkie needs to play. More »
   
 
 

          McDonald's Has Some Spicy Fries And Nuggs For You To Try      Cache   Translate Page   Web Page Cache   
Bugger me, it's cold. Dragging myself out of bed this morning was an effort worthy of the 12 labours of Hercules. If you're feeling similarly glum and frozen, a trip to Macca's may be in order. it's selling a limited-edition range of spicy sides just for winter. More »
   
 
 

          USB Restricted Mode In iOS 11.4.1 Isn't As Secure As It Seems      Cache   Translate Page   Web Page Cache   
“Ahh-ha!” you think to yourself. “Apple has finally made it impossible for the police to see what’s on my confiscated iPhone.” Not quite. More »
   
 
 

          Why You Should Regularly Check Your Internet Speeds      Cache   Translate Page   Web Page Cache   
If you aren't checking your Internet speeds on a weekly basis, you might not know when there's a problem. You aren't likely to notice a difference between 150 Mbps and 80 Mbps download speeds when you're browsing websites, watching (1080p) YouTube, or chatting with friends, but if you're downloading a huge Fortnite update, why drive in the slow lane? More »
   
 
 

          Today I Discovered Pink Used To Be Considered A Masculine Colour      Cache   Translate Page   Web Page Cache   
Pink is for girls and blue is for boys... right? It's a dichotomy drilled into us by countless clothing stores, baby gender reveals, toy branding and all sorts of other gender-obsessed industries, but this colour association is barely 100 years old. Before that, pink was often seen as a masculine colour, while blue was considered softer and more feminine. Here's how that happened - and how it changed. More »
   
 
 

          Six Deals You Should Know About In Australia Today      Cache   Translate Page   Web Page Cache   
G'day! Here are some cracking online deals for Lifehacker readers, including. 70% off House with free shipping, new Hungry Jack's vouchers, EB Games manager's sale, 25% off select eBay stores and more! More »
   
 
 

          How One Business Cut Its Energy Bill By $100,000      Cache   Translate Page   Web Page Cache   
There are many challenges facing Australian business, and the changing cost of energy bills is only one of them. Many energy retailers offer competitive rates and discounts that only last for a fixed period, such as 24 months. Small businesses that fail to perform another comparison when they are due to renew risk losing competitive or discounted rates and an unnecessary rise in their next bill. More »
   
 
 

          Turn Your Aerial Wall Socket Into A Netflix-Style Streaming Hub With This Gadget      Cache   Translate Page   Web Page Cache   
Broadcast television isn't dead, at least not yet, but the way we watch it is certainly changing. These days Australia's free-to-air broadcasters all offer online simulcasts, but they're not available on every device. Worse yet, you'll often find that live sport like footy and cricket — perhaps the only things you want to watch on free-to-air — is blocked due to streaming rights deals. As we've seen with Optus' World Cup streaming disaster, sometimes free-to-air broadcasts can save the day. More »
   
 
 

          Spec Shootout: Microsoft Surface Go Vs iPad Vs Galaxy Tab S3      Cache   Translate Page   Web Page Cache   
With the announcement of Microsoft's new Surface Go, there will be more than a few nervous folks at the Apple and Samsung head offices. The Surface Go promises to deliver a lot in a compact and inexpensive package that could single-handedly put a massive dent in not just those tablet makers' bottom line but also the entire Chromebook market. Here's a look at how the Microsoft Surface Go compares to its major competitors. More »
   
 
 

          A Doctor's Recommended Meal Plan: Breakfast, Lunch And Dinner      Cache   Translate Page   Web Page Cache   
Knowing what makes up a healthy diet can be really confusing. New fads and fast fixes appear weekly. At the same time, the rise of celebrity chefs and TV cooking – while admittedly entertaining – has made preparing food seem complex and often unachievable. More »
   
 
 

          How To Deal With Being An Older Employee At A Modern Company      Cache   Translate Page   Web Page Cache   
There’s a lot of discussion about diversity and inclusion at companies, in particular those focused on tech, but one marginalised group that often gets overlooked is older people. What constitutes “older” varies wildly depending on your industry and personal outlook, of course, but anyone closer to retirement than their university graduation is approaching work differently. Here’s how you can help yourself in a workforce that seems to get younger every year. More »
   
 
 

          Report: Samsung Galaxy S10 Will Come With FIVE Cameras      Cache   Translate Page   Web Page Cache   
The Samsung Galaxy S10 is shaping up to be something very special indeed. Previously, we've heard murmurings of a fingerprint-sensing touchscreen, a truly bezel-free display and a Exynos 9820 CPU featuring a next-gen Mongoose M4 core. Now we have some equally intriguing news about the camera. If true, it could blow every other smartphone in early 2019 out of the water. More »
   
 
 

          PSA: Your ISP Has Naught To Do With The NBN Rollout      Cache   Translate Page   Web Page Cache   
One of the best things about the NBN is that the provider of the infrastructure, NBN Co, is not the retailer that sells you access to the service. And while that's why next door neighbours buying similar services can end up with different performance, it also means you can choose who you want to deal with. But, according to a recent survey, that's not what we do. Most people stick with their current ISP when they choose their Retail Service Provider (RSP). More »
   
 
 

          Sync Your Lights To Your Games And Music With This App      Cache   Translate Page   Web Page Cache   
Windows/Mac. There are plenty of apps you can use to put on a little light show in your house (or geek den) if you’ve bought into Philips’ Hue ecosystem. My room is full of the company’s expensive colour-changing LED bulbs, and I’ve checked out a few of these apps, but generally don’t need to make my room look like an exploding volcano on a regular basis. These kinds of apps are fun for parties, but not all that practical for everyday use. More »
   
 
 

          Chinese hackers target Cambodia opposition ahead of elections      Cache   Translate Page   Web Page Cache   
Cyber group attacks MPs, institutions and media in run-up to national poll
          US firm alleges Chinese hacking of Cambodian government      Cache   Translate Page   Web Page Cache   
A Chinese espionage group has hacked several key Cambodian government entities ahead of the Kingdom's national election on July 29, US cybersecurity firm FireEye claims.Hackers targeted at least one opposition figure by impersonating a human rights gr
          (USA-CA-Menlo Park) CAD/CAFM Specialist (Hines@Facebook)      Cache   Translate Page   Web Page Cache   
When you join Hines, you will work alongside innovative leaders who set the standards responsible for our reputation as an industry leader today, and you’ll be a part of shaping our future in the years to come. As the CAD/CAFM Specialist, you will maintain the Computer Aided Facilities Management System (CAFM), using Archibus with AutoCAD overlay in a large fast-paced company. Coordinate, upload and maintain floor plans and space information data through Moves/Adds/Changes (MAC), New Hire processes and AutoCAD drawings. Assist facilities in preparing space studies, test fits and process documentation. + Project manage the collection, coordination and upload of space and employee information + Oversee Move/Add/Change (MAC) and New Hire process + Organize changes and maintain information utilizing Archibus and AutoCAD systems + POC for drawings and data with the ability to be proactive and resolve data discrepancies + Support remote office leads through floor plan updates, test fits, training on internal system and resolving issues that arise. + Upload conference room information, coordinate and schedule changes + Provide support to other projects that are initiated Minimum Requirements include: + Bachelor’s degree from an accredited institution + Four or more years professional working experience + Proficiency with AutoCAD 2013 and higher + Advanced knowledge in Microsoft Office and Adobe Acrobat Pro + Interest in systems connections between database and various internal systems + Experience with data entry, consistency and validation at a large scale + Excellent written, verbal, and customer service skills in a fast-paced environment + Strong organization, attention to details and time management skills Hines is a privately owned global real estate investment firm founded in 1957 with a presence in 201 cities in 24 countries. Hines has approximately $111 billion of assets under management, including $60 billion for which Hines provides fiduciary investment management services, and $51 billion for which Hines provides third-party property-level services. The firm has 108 developments currently underway around the world. Historically, Hines has developed, redeveloped or acquired 1,295 properties, totaling over 422 million square feet. The firm’s current property and asset management portfolio includes 506 properties, representing over 210 million square feet. With extensive experience in investments across the risk spectrum and all property types, and a pioneering commitment to sustainability, Hines is one of the largest and most-respected real estate organizations in the world. Visit www.hines.com for more information. We are an equal opportunity employer and support workforce diversity. No calls or emails from third parties at this time please. ID: 2018-5681 External Company URL: www.karba.com Street: 1 Hacker Way
          Comment on slider02 by وزارة التعليم نظام فارس      Cache   Translate Page   Web Page Cache   
Hi there! Dо you know if they make аny plugins tо protect against hackers? І'm kinda paranoid аbout losing еverything I've ᴡorked һard οn. Any suggestions?
          Found Again: Fraser Lake Book 3      Cache   Translate Page   Web Page Cache   
After his rescue from a prisoner of war compound in Russia, wolf shifter Lieutenant Colonel Mark Thompson doesn’t quite know what to do with the rest of his life. When an intriguing young man makes him an offer to recover more than a thousand miles away, he accepts. Nathan “Hacker”[...]
          With 'zero tolerance,' new strain on already struggling immigration courts      Cache   Translate Page   Web Page Cache   

With 'zero tolerance,' new strain on already struggling immigration courtsIn a federal courtroom in the border city of McAllen, Texas, two weeks ago, 74 migrants waited as Judge J. Scott Thacker confirmed their names and countries of origin. Tired and nervous, the migrants were wearing the clothes they had been arrested in, translation headsets, and ankle chains that clinked as some of them fidgeted.



          Des hackers piratent une station service pour voler du carburant      Cache   Translate Page   Web Page Cache   

L'essence est de plus en plus chère, comme chacun sait. Il fut un temps où les bandits dévalisaient les banques, il en sera peut-être un temps où ils dévaliseront les stations services non pour prendre la caisse, mais simplement pour faire le plein :-)

Et ce temps a peut-être déjà commencé ! Fox2 rapporte un piratage d'un nouveau genre. Dans une station service de Detroit aux Etats-Unis, des hackers ont piraté, en plein jour, le système de commande à distance des pompes à essence, pour ravitailler un convoi de 10 véhicules.

Au total ce sont 600 gallons d'essence qui ont ainsi été dérobés, pour une valeur de 1800 dollars.

L'employé de la station s'est rendu compte de la manoeuvre et a essayé d'arrêter les pompes depuis son pupitre de commande, mais sans succès. A priori parce que les hackers avaient le contrôle total du système.

Catégorie actualité: 
Image actualité AMP: 

          What To Do When Your Kid's Stuffed Animals Are Covered In Drool Crust      Cache   Translate Page   Web Page Cache   
Jolie Kerr is a cleaning expert, advice columnist and author of the New York Times bestselling book, My Boyfriend Barfed In My Handbag ... And Other Things You Can’t Ask Martha. Her flagship column, “Ask a Clean Person”, debuted in 2011. Here on Lifehacker, we’ve launched a new iteration of it, focusing on parenting and all the messes it brings.  More »
   
 
 

          The Online Trick That Guarantees A Cheaper Airfare      Cache   Translate Page   Web Page Cache   
Booking travel and accomodation overseas can be a challenging experience. But one thing I find really annoying is that the prices we pay when booking domestic flights overseas are far higher when we book from here than what locals get. But you can get around that by using your VPN software. More »
   
 
 

          Which Soft Drink Has More Sugar? Coke Vs Red Bull Vs Powerade      Cache   Translate Page   Web Page Cache   
Soft drinks are regularly cited as one of the top causes of obesity and tooth decay in Australia. yet we still quaff them by the gallon. You know it's bad for you - you may have even tried to quit - but that highly addictive sugar hit will always have you in its thrall. This infographic breaks down the sugar content in five popular drinks; from Coke to Powerade. The ranking might actually surprise you. (Who would have thought a certain iced tea would be worse than Red Bull?) More »
   
 
 

          Hacker Selling Pentagon’s Killer Drone Manual on Dark Web for $150, Cheap      Cache   Translate Page   Web Page Cache   
Photo Illustration by The Daily Beast

A sensitive training manual for the U.S. military’s lethal MQ-9 Reaper UAV was put up for sale on an underground marketplace last month, after a hacker plucked it from an Air Force captain’s home network using a default password.

But despite an asking price of only $150, nobody was interested. “I’ve been personally investigating the  dark web for almost 15 years, and this is the first time I’ve uncovered documents of this nature,” says Andrei Barysevich, director of advanced collection at Recorded Future. “This type of document would typically be stolen by nation-state hackers. They wouldn’t be offering it on the dark web, and certainly not for $150.” Developed by General Atomics, the $64 million MQ-9 Reaper is the heavily-armed follow-on to the Predator drone, capable of dropping laser-guided bombs and Hellfire missiles on a target from an altitude of 50 thousand feet. In its unarmed configuration it’s been used by DHS for border surveillance and NASA for weather studies. The stolen Reaper training manual was titled “MQ-9A Reaper Block 5 (UHK97000-15) RPAMaintenance Event 1 Delta Training.” It was unclassified, but the cover bore a lengthy admonishment on safe handling.

“This information is furnished upon condition that it will not be  released to another nation without the specific authority” of the Air Force, the cover reads. “[T]he recipient will report promptly to the United States, any known or suspected compromises.” The document, and others like it, was pilfered from the home network of an Air Force captain in the 432d Aircraft Maintenance Squadron at Creech Air Force Base in Nevada, says Barysevich. A spokesperson for the squadron did not immediately respond to an inquiry from the Daily Beast on Tuesday. Barysevich says he spotted the manual for sale on a dark web forum in early June. Posing as a potential buyer, he struck up a conversation with the seller, who turned out to be part of a small hacking crew based in South America that specializes in low-hanging fruit. Armed with some rudimentary knowledge and an Internet-of-things search engine called Shodan, the hackers learned to exploit a feature in some Netgear home routers that allow a user to attach an external USB drive and load it up with documents, videos or music that they want to share across their home network. An extra option called the “Personal FTP Server” also makes the files accessible over the public Internet, so the user can fetch them from work or while traveling.If the user switches the Personal FTP Server option on, and doesn’t explicitly set a password for the server, all their shared files are left wide open to anybody who logs in as “anonymous,” with no password required — a mistake evidently made by the Air Force captain. “We reported this to DHS and various law enforcement agencies, and they forwarded the information to the U.S. Air Force,” says Barysevich.

Read more at The Daily Beast.

Got a tip? Send it to The Daily Beast here


          Бесплатные приложения и скидки в Google Play 11 июля      Cache   Translate Page   Web Page Cache   
Самые горячие распродажи приложений и игр Google Play — в нашей ежедневной рубрике. Лайфхакер отбирает для вас и ваших Android-устройств только лучшее!
          Что знает о нас Facebook: 7 пугающих патентов, полученных соцсетью      Cache   Translate Page   Web Page Cache   
И вам они точно не понравятся.
          Учёные доказали: ходьба делает людей более творческими      Cache   Translate Page   Web Page Cache   
После прогулки вам обеспечено на 60% больше вдохновения.
          Cyber Security Architect (m/f) - Infotainment Platform      Cache   Translate Page   Web Page Cache   
Cyber Security Architect (m/f) - Infotainment Platform - Citi

Die Daimler AG ist eines der erfolgreichsten Automobilunternehmen der Welt. Mit den Geschftsfeldern Mercedes-Benz Cars, Daimler Trucks, Mercedes-Benz Vans, Daimler Buses und Daimler Financial Services gehrt der Fahrzeughersteller zu den grten Anbietern von Premium-Pkw und ist der grte weltweit aufgestellte Nutzfahrzeug-Hersteller. Job-ID: P0142V079 Our modern MBUX (Mercedes-Benz User Experience) infotainment systems are based on the latest technologies, powerful embedded systems, software with artificial intelligence and are IP-networked and connected. They offer features such as car-office or over-the-air updates and are linked to back-end systems, cloud solutions and the Internet of Things. This not only excites our customers, but also arouses the interest of hackers and cyber-terrorists in the context of rising cybercrime. Mercedes-Benz stands for safety. Of course, this also applies to cyber security. Therefore, we are looking for you: A motivated cyber security specialist that ensures we are building an infotainment system with state of the art security imbued in the product and our development processes. Tasks Responsible for the safety of the infotainment systems in our vehicles in close cooperation with our application, functional architecture and system managers Thread-modeling and risk assessment for our systems, functions and components in the development process. Development of state-of-the-art security concepts and architectures Definition of security requirements and measures for our ECUs and systems such as a host-based IDS (Intrusion Detection System) & Security Remote Attestation for Mercedes-Benz vehicles Coordination and control of the implementation of security measures and functions at our software development partners in-house or externally Coordination and implementation of development-related security assessments and pentests Coordination of remedial measures internally or with our development partners Analyze cyber security developments and threats in the IT, software and consumer industries and draw conclusions about our systems Assessment of Threat Intelligence Reports, CVEs and Vulnerabilities and Mitigation Development Qualification Personal: You are a passionate technical leader looking to develop new products in automotive infotainment domain. Security certifications such as CISSP (Certified Information System Security Professional), CEH or OSCP are beneficial Academic: Degree in IT-security, computer science, software development, information technology, communication technology, or a comparable qualification Experience: Several years' professional experience in the fields of carIT security or IT security, software development or system design Familiar with following conepts: security in development and deployment processes, pentesting in embedded or carIT context, statistic and dynamic code analysis, threat modelling, vulnerability scans, vulnerability and risk management Extensive project management experience in large-scale software development projects Practical experience in software development Familiar with agile test-driven development and continuous integration Language skills: Proficient in English. German is a plus Personal skills: Excellent analytical skills and an independent, structured, and target-oriented approach to work Personal initiative, commitment, and resilience Well-developed communication and teamwork skills Enjoy working in international teams High degree of flexibility Interested? We look forward to receiving your complete application, including CV (in English or German) and relevant with the following information: Job title and reference number Salary expectation Earliest start date

    Uzņēmums: MBition GmbH
    Darba veids: Pilna laika

          Chinese Cyber-Spy Hackers Target Cambodia as Elections Loom      Cache   Translate Page   Web Page Cache   
none
          Security: Updates, SELinux, Fobs, PoS, TimeHop, AUR      Cache   Translate Page   Web Page Cache   
  • Security updates for Tuesday
  • Fun with DAC_OVERRIDE and SELinux
  • Why you might want to wrap your car key fob in foil

    Given that the best way to store your car keys at night is by putting them in a coffee can, what's an ex-FBI agent's advice to protect cars from theft during the day?

    Wrap car fobs in aluminum foil.

    [...]

    He held up his fob and said, “This should be something we don’t need to wrap with foil. It’s 2018. Car companies need to find a way so no one can replicate the messages and the communication between the key and the vehicle.”

    [...]

    While auto industry engineers know a lot about traditional safety, quality, compliance and reliability challenges, cyber is an “adaptive adversary,” said Faye Francy, executive director of the nonprofit Automotive Information Sharing and Analysis Center, which specializes in cybersecurity strategies. “Automakers are starting to implement security features in every stage of design and manufacturing. This includes the key fob.”

  • Crooks install skimmer on point-of-sale machine in 2 seconds
  • Facebook add-on TimeHop has been pwned by hackers [sic]

    The big problem doesn't affect UK users, but will be making our US cousins sweat - phone numbers were leaked. TimeHop recommends adding a PIN to your phone account because if abused, this could be used for identity theft - starting with, but not limited to, porting the number without permission.`

  • Arch Linux AUR Repository Found to Contain Malware

    The Arch Linux user-maintained software repository called AUR has been found to host malware. The discovery was made after a change in one of the package installation instructions was made. This is yet another incident that showcases that Linux users should not explicitly trust user-controlled repositories.

  • Malware found in the Arch Linux AUR repository

    Here's a report in Sensors Tech Forum on the discovery of a set of hostile packages in the Arch Linux AUR repository system. AUR contains user-contributed packages, of course; it's not a part of the Arch distribution itself.

read more


          Brýle – obroučky dioptrické, dámské i pánské - 220      Cache   Translate Page   Web Page Cache   
Nové. Cena v obchodě 1800 .- Kč. Nyní čirá skla bez dioptrií. Hadřík na čištění zdarma. Upřednostním rychlé jednání a osobní odběr, po předchozí domluvě na uvedeném čísle. Vyzkoušet a odebrat možno v Praze 8 – Bohnicích, Hackerova 6. Případně možn ...
          A desperate hacker tried selling US military files for $150 — only to find no one wanted them      Cache   Translate Page   Web Page Cache   

us air force drone control kandahar afghanistanReuters/Josh Smith

  • A hacker who got ahold of sensitive US military documents tried to selling them on a dark-web forum, only to find no one wanted to buy them.
  • The sensitive information the hacker attempted to sell included a maintenance manual for the MQ-9A Reaper drone, a list of airmen assigned to a Reaper drone unit, manuals on how to suppress improvised explosive devices, and an M1 Abrams tank manual.
  • The hacker also tapped into live footage of surveillance cameras at the US-Mexico border and NASA bases, and an MQ-1 Predator flying over the Gulf of Mexico.
  • The hacker, who is believed to reside in a poverty-stricken country in South America, said his internet connection was slow and that because his bandwidth was limited, he did not download all the files prior to finding a willing buyer.
  • Undercover analysts alerted US officials and the vulnerable computers were taken offline, which inadvertently cut off the hacker's access to the files.
  • Analysts say they have a "good level of confidence" about the hacker's identity.

A hacker who got ahold of sensitive US military documents tried to sell them on a dark-web forum — only to find there were no buyers. The hacker was forced to lower his price to $150.

After a team of undercover analysts from Recorded Future's Insikt Group embedded themselves with users from the dark-web forum, they came across the hacker who exploited a simple vulnerability on Netgear-brand routers.

See the rest of the story at Business Insider

NOW WATCH: Watch the moment Trump and Kim Jong Un share a historic handshake at Singapore summit

See Also:


          07/10 Links Pt1: Fatah to US: “We don’t want your flour, your wheat, or your aid”; IDF stops boat seeking to break Gaza blockade; Israeli Border Police Soldiers Save Life of Palestinian Baby in Hebron      Cache   Translate Page   Web Page Cache   
From Ian:

PMW: Fatah to US: “We don’t want your flour, your wheat, or your aid”
At a Fatah demonstration earlier this month, Abbas' deputy chairman of Fatah, Mahmoud Al-Aloul, announced that Palestinians don't want US aid, because US is "forming an alliance" with Israeli Prime Minister Netanyahu, "the Israeli enemy":

Fatah Deputy Chairman and Fatah Central Committee member Mahmoud Al-Aloul: "Mahmoud Abbas has told him [Trump], and we are telling him, that America is not fit to be a sponsor of peace... This American Trump is forming an alliance with [Israeli Prime Minister Benjamin] Netanyahu, the Israeli enemy, who is sowing havoc and destruction over the land by expropriation and building settlements... We want freedom. We want independence. We want an end to the occupation. We don't want your flour, your wheat, or your aid." [Official PA TV, July 2, 2018]

Al-Aloul's statement rejecting US aid follows the passing of the Taylor Force Act in the US, in March 2018, which cuts almost all funding to the PA if it continues paying salaries to terrorist prisoners and allowances to families of so-called "Martyrs." The law was named after US citizen Taylor Force who was murdered by a Palestinian terrorist in Tel Aviv on March 8, 2016.

Al-Aloul's comments also follow the passing of a new Israeli law to deduct the amount of money the PA pays imprisoned terrorists and families of "Martyrs" from the tax money Israel collects for the PA, which was passed by the Israeli Parliament on July 2, 2018.
PMW: PA leader Nabil Shaath: Australia is “worthy of being spat on”
PA Chairman Abbas’ advisor Nabil Shaath: "This filthy talk of ‘the criminals’ in connection with our Martyrs and prisoners – while they are our heroes, the heroes of self-sacrifice and the candles of freedom. They cannot be compared to the Israeli criminals in Israel’s prisons... Australia’s decision [to stop] transferring $10 million angered me greatly... It transferred [the aid to the UN]... so that it would not serve for payment of the salaries of the [prisoners and Martyrs’] families. In other words, the truth is they are worthy of being spat on. You [Australians] are the servants of the US… I don’t want your 10 million, I don’t want to chase after them." [Official PA TV, Topic of the Day, July 3, 2018] Nabil Shaath is PA Chairman Mahmoud Abbas’ advisor on Foreign Affairs and International Relations Australia cuts direct aid to the PA - Australia announced on July 2, 2018, that it is ceasing its direct aid to the PA, and will transfer aid through the UN. Australian Foreign Minister Julie Bishop explained that Australia unsuccessfully sought confirmation from the PA that the aid was not going to pay terrorists. Bishop added: "Any assistance provided by the PLO to those convicted of politically motivated violence is an affront to Australian values and undermines the prospect of meaningful peace between Israel and the Palestinians." PMW has led the exposure of the salaries paid by the PA to terrorists and their families.


Father of American Victim of Palestinian Terror Calls New US, Israeli Laws Penalizing PA ‘a Good Beginning’
The recent passage of laws in both the US and Israel penalizing the Palestinian Authority (PA) over its payments to terrorists and their families marked “a good beginning, but there is much more to be done,” the father of an American military veteran who was killed in a stabbing attack in Tel Aviv two years ago told The Algemeiner on Monday.

Stuart Force, the father of the late Taylor Force, traveled to Israel to attend last week’s Knesset vote on a bill modeled on a US law — named after his West Point graduate son — that was approved by Congress and signed by President Donald Trump in March limiting American aid to the PA.

“Watching the legislation’s passage in the Knesset was a very emotional and special time for me,” Force said. “I feel that the resolve shown by both countries to address this part of the war on terror will provide a stimulus for nations worldwide to look at where their humanitarian aid actually goes.”

“If it cannot be shown that the intended recipients of our assistance are receiving it, then it should be withheld until it can,” he continued. “Something is terribly wrong when the leaders of terrorism are living like wealthy warlords, with their ‘subjects’ having no hope for a better future.”



JCPA: Economics Won’t Help. The Palestinians Will Continue with Terror Attacks
In any case, the chance that economic temptations will lead to a change in Palestinian national goals is very slight as long as the Palestinian system is not led by a political movement that gives priority to the welfare of its citizens. That movement must recognize that to provide for their economic needs, it must end its commitment to the struggle against Zionism, which is translated as yielding the “Right of Return” and deciding to forego the establishment of a Palestinian state in all of mandatory Palestine.

The approach of the U.S. administration criticizes the Palestinians and Hamas, in particular, for “not acting according to the needs of the Palestinian people.” This reaction indicates a lack of understanding for Palestinian priorities and superimposes upon them a Western order of priorities, which sees in the pursuit of happiness and prosperity as all people’s solitary goal.

The Palestinians explain to the world that they have a different order of priorities, including paying salaries to terrorists, “Return Marches,” the destruction of a critical truck crossing for goods, and the right to forgo both human life and prosperity. However, it appears that the Americans, Europeans, and many Israelis are not getting these messages. They continue to believe that economic considerations can lead the Palestinians to change their anti-peace policies.

We must not diminish the importance of investing in the advancement of the Palestinian economy and economic cooperation with them. These are based on ethical motives – from the desire to bring economic prosperity to our neighbors to advancing familiarity between both peoples. We must hope that in the end this will motivate the Palestinian to change their order of priorities.
IDF stops boat seeking to break Gaza blockade
The Israeli Navy on Tuesday apprehended a Gazan boat with approximately eight people on board that attempted to breach the legal naval blockade. The apprehension took place without incident.

After the boat and the Gazans on board are searched, the boat will be towed to the Israeli Navy base in Ashdod.

The IDF assigned medical personnel to treat those on board who requirws medical assistance.

This is the second time in the past two months that the Hamas terror organization has attempted to violate the legal naval blockade and has paid Gazan civilians to participate.

The IDF stated that the naval blockade is a "necessary and legal security measure that has been recognized repeatedly by the world and the UN as important to the security of the State of Israel and its maritime borders that protect Israeli civilians in the face of terror and smuggling of weapons."
Exclusive: Islamic cyber terrorists trying to target infrastructure
Though they have not yet succeeded, Islamic cyber terrorists are increasing their efforts to carry out cyberattacks against Western countries infrastructure.

This is one of the concerning conclusions of a report obtained exclusively by The Jerusalem Post.

The report was issued by the IDC Herzliya International Institute for Counter-Terrorism’s (ICT) cyberdesk, with input from ICT deputy director Dr. Eitan Azani and cyberdesk coordinator Nadine Liv.

To date, most cyberterror attacks have consisted of defacing target websites and posting embarrassing messages.

But the report discussed “the possibility of terrorist organizations acquiring offensive capabilities on the Internet, hiring hackers for this purpose, or receiving assistance from terror- sponsoring countries” as a serious future danger.

Further, it said that, “the monitoring of the accounts of IS [Islamic State]-supporting hackers indicates that there is a desire to develop these offensive capabilities.”
Iran’s Two-Front Strategy
The Assad regime's current offensive in southern Syria has been mainly in the eastern part of Daraa province, down to the Jordanian border. The push toward the west - Quneitra and the Golan - carries the risk of Israeli action.

Once the Syrian military campaign finds its way to Israel's border, Iran will as well - whether immediately or down the road makes little difference.

All the chatter about a deal with Russia notwithstanding, there is a need for Israel to intensify its targeting of Iran's infrastructure, personnel, and logistical lines in Syria to deter the Iranians from moving against Israel on the Golan.

"We have just one option," Brig.-Gen. (ret.) Shimon Shapira, a senior researcher of Hizbullah and Iran at the Jerusalem Center for Public Affairs, told me.

"And that is to act with force, overtly and covertly, against the Iranian presence in Syria. Consenting to or accepting the Iranian presence, be it direct or indirect, in the end will lead to a war with Iran in Syria and in Lebanon."

As Prime Minister Benjamin Netanyahu put it recently, "if there needs to be" conflict with Iran, "it is better now than later."
Report: Obama 'shocked' by settlement expansion
A series of maps of Judea and Samaria, focusing on the placement of Jewish communities and Israeli military facilities in the area, provoked a dramatic change in the Obama administration’s policies vis-à-vis Israel, a report by The New Yorker claims.

According to the report Monday, a presentation by then-Secretary of State John Kerry to President Barack Obama in the waning days of the administration ‘shocked’ the president into taking a more aggressive stance towards Israel, withholding America’s veto on a United Nations Security Council resolution critical of Israeli policies in Judea and Samaria.

The Obama administration, like its predecessors, had in the past backed a final status settlement negotiated by Israel and the Palestinian Authority and opposed unilateral actions regarding core final status issues. In this vein, the US had traditionally used its veto power on the Security Council to block resolutions directed against Israel.

In December 2016, however, the Obama administration permitted UNSC Resolution 2334 to pass – a measure which demanded Israel unilaterally freeze all construction in not only Judea and Samaria, but eastern Jerusalem as well.

The decision to abandon Israel at the Security Council – a significant departure from traditional US policy – after the president was presented with a series of maps collected at the behest of a senior State Department official, Frank Lowenstein.

The collection of maps, assembled in 2015 by Lowenstein and updated by the State Department in 2016, was presented to Obama and key advisers by Secretary of State John Kerry during a 2016 Oval Office meeting.
New Zealand “got it wrong” over 2334
National Party leader, Simon Bridges, has acknowledged that New Zealand “got it wrong” by co-sponsoring United Nations Security Council Resolution 2334 alongside Malaysia, Senegal, and Venezuela.

Though New Zealand First leader, Winston Peters, challenged the process at the time – that the decision was not put to cabinet – Mr Bridges stated that he thought cabinet “would have made a different decision” than Foreign Minister Murray McCully did.

This is an important acknowledgement – especially after Bill English failed to answer questions about the controversial resolution and claimed that the decision actually didn’t need to go to cabinet.

The comments by Mr Bridges were made during question time at a Hastings public meeting on Friday 29 June, 2018, and are online. Pastor Nigel Woodley asked

“In a future National govt led by you, what do you propose to do to ensure that a much more even-handed, balanced, and fair foreign policy towards the State of Israel is enacted. Because at the moment the foreign policy is very much tipped in favour of the Palestinians at the expense of both truth and justice.” – Pastor Nigel Woodley

The response of Mr Bridges is transcribed below the video. He made three important comments that need to be highlighted.

1. “I get that question or similar at most meetings”
This observation shows how the actions of Minister McCully were out of step with the wishes of the people. The Israel Institute of New Zealand 2017 poll showed that more than half of all Kiwis support Israel and only about one quarter thought the government was right to co-sponsor the resolution. The thousands of New Zealanders who protested, signed letters, and expressed their disappointment at the time are clearly still sending the same message.

2. “We got it wrong on that UN resolution [2234]”
This acknowledgment is some relief to the majority of New Zealanders and is an important step from Mr Bridges. However, the resolution is not “history” now and nor is it “academic”, as Rt Hon Mr Peters has claimed. Unfortunately, UN resolutions build upon each other and 2334 was referenced in the disproportionate number of anti-Israel resolutions that New Zealand continued to support in 2017, and in the recent resolution condemning Israel for “disproportionate and indiscriminate force” with regard to the Gaza riots – a resolution that New Zealand also supported, despite it not mentioning Hamas. If New Zealand is to act on the rhetoric, then the voting pattern at the UN must change to become more in line with our traditional allies on the side of truth, justice, and fairness.
What does Boris Johnson's resignation mean for UK-Israel relations?
Former British foreign minister Boris Johnson's resignation on Monday plunged Prime Minister Theresa May's turbulent government into even more trouble less than a day after former Brexit Secretary David Davis quit the government.

Johnson’s resignation letter slammed May's Brexit negotiation strategy, stating that the Brexit "dream is dying, suffocated by needless self-doubt."

May moved quickly to appoint Health Secretary Jeremy Hunt as the UK's new foreign secretary, ushering in a new and less flamboyant era at the British Foreign Office.

Israeli Ambassador to the UK Mark Regev was quick to welcome Johnson's foreign secretary replacement, expressing hope that relations between the two countries will continue to go from strength to strength.

"Mazal tov to Jeremy Hunt on his appointment as Foreign Secretary. Looking forward to further strengthening the Israel-UK partnership," wrote the Israeli envoy on Twitter on Monday evening.

Although public statements made by Hunt to date regarding Israel are scarce, he dedicates much of his website's foreign policy section to the Middle East where his opinions regarding the Israeli-Arab conflict mirror those of the Conservative Party in general.

There Hunt expresses his desire to promote business ties with Israel, and states his strong opposition to the BDS movement. But he also highlights his concerns regarding the demolition of Palestinian villages and the detention of Palestinian children by Israeli authorities.

Hunt reiterates his government's support for a two-state solution, and states that he was "very disappointed by the announcement of the US's intention to move its embassy from Tel Aviv to Jerusalem."
France Keeps Blackening Israel
Relations between France and Israel have been ambivalent and complex for decades. Among the most prominent are those where the French government sets out to blacken Israel. President Emmanuel Macron is seemingly a new type of Frenchman. He reached the presidency without having risen through the ranks of an existing political party. He is a suave, intelligent politician with an excellent education, an international outlook, many ideas, and good public relations.

However, analysis has to concentrate on facts and not packaging. A good point of departure are the French reactions to the recent Gaza border violence. When Israeli Prime Minister Benjamin Netanyahu met Macron in Paris in April, the French president told him that the relocation of the US Embassy to Jerusalem “led to people dying and did not advance peace.” With this transparently manipulative statement Macron showed his skills in distorting the truth in a few words. What provoked the violence was the terror organization Hamas’ initiative to send civilians to the border and mix terrorists among them. Among the more than 115 Gazans killed by Israel, more than half were confirmed terrorists. That many of those killed were terrorists was confirmed by Hamas itself.

France also supported an UN Security Council resolution which called for protective measures for Palestinians, but didn’t mention Hamas. Deputy Israeli Minister Michael Oren summarized it in a tweet: “Shame on France for supporting it. French government cannot say it’s against anti-Semitism and vote for this anti-Semitic resolution.”
The IDF’s response to ongoing Hamas terror attacks
Today, Monday July 9, the Kerem Shalom Crossing will now only be open to humanitarian aid, including food and medicine that will be approved on an individual basis by COGAT. Exports and marketing of goods will no longer take place at the Kerem Shalom Crossing.

This is in light of the ongoing arson and additional terror attacks at the hands of the terror organization, Hamas. This includes infiltration into Israel from the Gaza Strip, terror tunnels discovered leading into Israel from the Gaza Strip, including two near the Kerem Shalom Crossing, and violent riots along the security border. In addition to putting the lives of Israeli civilians at risk and breaching Israel’s sovereignty, Hamas also simultaneously exploits and endangers Gaza residents.

Additionally, the expansion of the designated fishing zone in the Gaza Strip ends today, Monday July 9. For the past three months during the fishing season, the extension increased from six to nine nautical miles. The fishing zone will be returned to six nautical miles today.

This is in response not only to the most recent terror attempts by Hamas, but also in addition to the discovery that took place on June 3 of a terror tunnel located within a Hamas military post that exited to the sea. As well, on May 29th, the Israeli Navy apprehended a Palestinian boat with approximately 17 Palestinians that attempted to breach the legal naval blockade.

The State of Israel aspires and acts to improve the living conditions of civilians in the Gaza Strip. However, the IDF has decided to take these measures due to the recent situation in which the Hamas terror organization is exploiting Gazan residents and launching arson and explosive balloons and kites towards the Israeli communities adjacent to the Gaza Strip. The current situation doesn’t allow the residents of southern Israel to safely maintain their daily routine. Should these severe conditions continue, IDF measures will persist and intensify.
Kite, balloon terrorism continues scorching Israel's land
More than 100 days have passed since the kite and balloon terrorism began. So far, it has resulted in 678 fires in farmlands and wooded areas in Israeli communities on the Gaza border community, with 9,160 dunams (2,260 acres) of mostly natural grove consumed.

In addition, 6,000 dunams (1,500 acres) of agricultural produce and thousands of dunams (acres) of open fields were burned to the ground.

The Keren Kayemeth LeIsrael (KKL) alone has lost 15,100 dunams (37,000 acres) of land, not including the Gaza border communities' lands that were scorched.

Firefighters, community security coordinators, and KKL teams worked tirelessly to put out 33 fires across the Eshkol, Sdot Negev and Hof Ashkelon regional councils on Monday. The firefighters managed to gain control of most of the blazes within minutes, except for the fire in Kibbutz Gvar'am, which took the crews a longer time to overcome.

Despite the IDF's announcement that a high-tech solution has been found to eliminate the incendiary balloons threat—in the form of detection and interception drones— fields are still being burned every day and the threat posed by the balloons is only increasing.

The IDF is operating a system able to detect and track the balloons. However, they are still not being intercepted while in the air.
Analysis: Why close the Kerem Shalom Gaza border crossing now?
So there are a few options. It is possible to threaten Hamas, which both Liberman and Netanyahu have done repeatedly since the wave of kite arson began. But that has not succeeded in getting the terrorist organization to stop setting fire to the Israeli fields.

It is also possible, as both the prime minister and defense minister have done, to stress upon occasion that the real strategic danger to the country – the problem that needs immediate and urgent attention – is Iran’s entrenchment in Syria.

But the public pressure has built nonetheless, and Netanyahu needs to show that not only is Israel not impotent against what seems like a primitive threat, but can also apply pressure on Hamas in return.

Why now? Perhaps because Israel thought, in vain, that its warnings and threats against Hamas would do the trick. Perhaps because they wanted to give Egyptian mediators a chance to persuade Hamas to give up this type of warfare. Perhaps because there was hope the IDF would come up with some kind of technological solution to the problem.

But when none of that came to pass, Netanyahu and Liberman – according to this face-value reading of the situation – decided to turn up the heat, even at the risk of bringing down international condemnation on Israel, and even if it means making the extremely difficult lives of Gaza’s residents under Hamas even more difficult.

Something, Netanyahu and Liberman surely believe, needs to be done.
Hamas: We infiltrated Israel and collected information
For years, Hamas has been complaining that the Israeli and Egyptian blockade on the Gaza Strip, as well as sanctions imposed by the Palestinian Authority against the two million residents living there, have created a “humanitarian and economic crisis” in the coastal enclave.

But now that some countries and international parties – including the US, Israel and the United Nations – have come up with a number of initiatives to improve living conditions in the Gaza Strip, Hamas does not seem to know what to do.

Here’s the dilemma Hamas is facing: On the one hand, if Hamas accepts these initiatives, its rivals – first and foremost the ruling Fatah faction – will accuse it of “selling out to Israel and the US,” and giving up Palestinian national rights in return for economic projects and humanitarian aid.

On the other hand, rejecting proposals to improve the living conditions its constituents could aggravate the situation and possibly prompt desperate Palestinians to revolt against the Hamas regime.

Some of the initiatives sound very tempting, to a point where it’s hard to see how Hamas can say no to a seaport in Cyprus or projects to create job opportunities to solve the serious problem of unemployment in the Gaza Strip.

Hamas has nothing to lose by allowing Western parties to establish an industrial zone in the Gaza Strip that would provide thousand of jobs to Palestinians. In fact, such projects benefit Hamas because they exempt it from its responsibilities – as the de facto government in the Gaza Strip – toward its people.

This is why Hamas leaders and officials appear to be divided over the various initiatives that are being proposed by Israel, the US and the UN.
U.N.: Israel’s ban on commercial goods for Gaza could escalate conflict
The United Nations said it was concerned Israel’s decision to halt the flow of commercial goods into the Gaza Strip through the Kerem Shalom crossing could escalate its conflict with Hamas.

“Everyone must step back from the trajectory of confrontation and escalation,” UN Special Coordinator to the Middle East Peace Process Nickolay Mladenov said on Tuesday.

He spoke in response to Prime Minister Benjamin Netanyahu’s decision to issue the harshest restrictions on Gaza’s main commercial crossing since the 2014 war with Hamas.

As of Tuesday morning only humanitarian supplies, such as food, medicine and fuel could enter the strip.

Israel’s decision to impose severe economic sanctions on Gaza comes fours months after Hamas and Islamic militants in Gaza have launched flaming kites into southern Israel that has scorched large swaths of fields along the southern border.

It also comes in the midst of a major US push to put in place an economic package that would ease life for the two million Palestinians in Gaza, that are also suffering from Palestinian economic sanctions and living on four hours of fuel a day.

“I am concerned by the consequences of Israel’s decision to temporarily suspend imports and exports with the exception of basic humanitarian supplies through the Kerem Shalom crossing,” Mladenov said on Tuesday.
Liberman in Golan: IDF will act against Iranian presence in Syria
Israel will not allow Iran to entrench itself in Syria, which would give it the ability to launch attacks on Israeli territory, Defense Minister Avigdor Liberman warned Tuesday during a tour of the Golan Heights with senior IDF officers.

"The Iranian presence in Syria is unreasonable, and we are not prepared to accept an Iranian presence in Syria anywhere, and as you have heard more than once, we will act against any Iranian consolidation in Syria,” the defense minister said.

“The moment we identify an Iranian presence, we will act,” Liberman added, warning that there is no difference between a withdrawal of Iranian troops to 40 or 80 kilometers from Israel’s border.

According to Liberman, Israel has “identified elements” belonging to Iran and its Shiite proxy militias who “under the auspices of the regime” are trying to establish themselves on the Golan Heights.

“This effort to establish a terrorist infrastructure under the auspices of the regime, as far as we are concerned, is unacceptable and we will act with force against any terrorist infrastructure that we will see and identify here in the region,” Liberman warned.
Female terrorist who mistakenly stabbed Arab sentenced
A Jerusalem court sentenced a female Arab terrorist to 10 years in prison on Monday, after she was found guilty of a stabbing attack near the Old City of Jerusalem last summer.

The terrorist, 31-year-old Fadwa Nazih Hamadeh, attacked a haredi man returning from morning prayers in the Old City of Jerusalem on Saturday, August 12th.

As the haredi man left the Old City via the Damascus Gate, Hamadeh lunged at him with a knife. In video footage taken from a security camera in the area, Hamadeh’s would-be victim can be seen dodging the attack and fleeing the scene.

After she failed to injure her first target, Hamadeh turned her sights on another man, stabbing him in the shoulder.

The victim was a 31-year-old Arab man Hamadeh had mistakenly thought was an Israeli Jew.

A resident of Jerusalem’s Sur Baher neighborhood, Hamadeh is married and has five children, ranging in age from 8 to one-and-a-half.
Overnight: Shooting attack in Beit El
A shooting attack took place in the town of Beit El in the Binyamin region overnight Monday. No injuries were reported.

Several bullet casings were found at the scene. Troops are searching the area.

Meanwhile, IDF soldiers operating in Palestinian Authority-assigned areas of Judea and Samaria detained overnight Tuesday four wanted persons suspected of involvement in terrorist activities, popular terror and violent disturbances against civilians and security forces.

The suspects were taken for questioning.

As well, during a search for weapons in the PA city of Qalqiliya, IDF troops seized an M16 assault rifle, which was transferred to security agencies.
Israeli Border Police Soldiers Save Life of Palestinian Baby in Hebron
Israeli Border Police soldiers stationed at the Cave of the Patriarchs in Hebron saved the life of a nine-month-old Palestinian boy on Sunday, the Hebrew news site Walla reported.

The soldiers heard shouts coming from a nearby home and when they arrived they found an unconscious baby surrounded by distressed family members who were trying to resuscitate him.

The baby was not breathing and his face had turned blue. The soldiers took over the effort to revive him, and a Border Police medic who was called to the scene succeeded in getting him breathing again.

Watch an Israel Police video of the medic treating the baby below:


Khaled Abu Toameh: Hamas divided: The Gaza Strip rulers' humanitarian aid dilemma
The Al-Qassam Brigades, the military wing of terror group Hamas, published what it called "new details" about the attack on Zikim Beach on July 8, 2014.

Hamas naval commandos landed at the Zikim beach at the beginning of Operation Protective Edge, where they were located and eliminated by an IDF combined force 40 minutes after infiltration into Israeli territory.

According Hamas’ version, the Zikim operation included two stages. The first stage was the observation and gathering of information about IDF forces in the area of ​​Zikim Beach and their command headquarters. That mission was carried out by Hamas naval force operatives who infiltrated Israeli territory.

The second stage was the implementation of the attack, that began with the departure of Hamas naval force operatives by diving and swimming towards the target. The force split in two. The first force landed outside and began to advance toward the command headquarters. After about 45 minutes, another force joined them and updated Hamas command about developments and asked for further directions.
Syrians Flee Towards the Hospitals of ‘Enemy’ Israel
The founder of the Good Neighbor project, Lt. Col. (res.) Marco Moreno, explains that “refugees are not expected to seek shelter from us. We have always managed aid as a military operation with caution and attention, knowing that our soldiers are saving and helping them while risking our lives. We enter at night in a country at war against us. We can expect anything, and we know that. But we want to save them as human beings. We passionately help children; when they come with their families here and there along the fence, the population collects toys, clothes, funds, special food, diapers … at the beginning, there was a lot of suspicion, but then they understood.”

“Yes, we certainly have an explicit interest,” he added. “When the operation started, we told them: ‘We will help you beyond the border and take care of you, but don’t allow your terrorists to come and hurt us.’ What simply started out as the right thing to do has transformed into something beautiful.”

Lt.-Col. Tomer Koller, a medical officer in the Bashan division of the Golan, points to the colored tents in the wind from the Hazaka outlook post. Inside, they are packed with people in need.

For Israel, it is impossible to think of hosting them. The country is small, and these refugees are particularly problematic; they vary from newborn babies to ISIS terrorists who hate Jews. “Our policy is to help them,” said Koller. “We feed them, we take care of them as much as possible … and then they have their reality at home.”

Their home is in flames. We know it; we see the frightful wounds on the bodies of Syrians cured by Israelis in the Galilee. Israel cares for Syrians with its incredible therapeutic power and good will, but it can’t bring them home. In that respect, the best of human intentions and common sense sometimes clash. The right choice, however, is that man remains a friend of his fellow man, at his best, even in war. That’s what Israel believes.
Iran Vows to Sell as Much Oil as It Can in Face of US Sanctions
Iran’s vice president acknowledged on Tuesday that US sanctions would hurt the economy, but promised to “sell as much oil as we can” and protect banking.

Eshaq Jahangiri said Washington was trying to stop Iran’s petrochemical, steel and copper exports. “America seeks to reduce Iran’s oil sales, our vital source of income, to zero,” he said, according to Fars news agency.

“It would be a mistake to think the US economic war against Iran will have no impact,” Jahangiri added.

President Donald Trump said in May he would pull the United States out of an international accord under which Tehran had agreed to limit its nuclear development in exchange for sanctions relief.

Trump said he would reintroduce sanctions and Washington later told countries they must stop buying Iran’s oil from Nov. 4 or face financial consequences.

On Tuesday, the US ambassador to Germany also called on Berlin to block an Iranian bid to withdraw large sums of cash from bank accounts in Germany.

Jahangiri said Iran’s foreign ministry and the central bank have taken measures to facilitate Iran’s banking operations despite the US sanctions. He did not elaborate.
U.S. Seeks to Thwart Iran Flying Millions in Cash Out of Germany
Top Trump administration officials are working to stop Germany from allowing Iran to fly more than $350 million in cash out of the country and back to Tehran as part of a bid by the Iranian regime to restock its coffers ahead of a major financial crackdown by America, according to conversations with senior U.S. diplomats and officials on Capital Hill.

The Trump administration is already working to stop the German government from allowing this transfer following weekend reports that Iran is poised to fly around 300 million Euros out of the country as part of an ongoing scheme to skirt tough new U.S. economic sanctions, which were put back into effect after President Donald Trump decided to abandon the landmark nuclear deal.

"The mullahs are worried that they will run out of cash," according to a report in Germany's Bild news site. "Iran's justification for their plan says that they need the money ‘to pass it on to Iranian individuals who, when traveling abroad, are dependent on euros in cash due to their lack of access to accepted credit cards.'"

The disclosure of the latest scheme to skirt U.S. sanctions has inflamed ongoing tensions between the United States and Germany over its efforts to continue providing Iran with sanctions relief in the face of a crackdown by the Trump administration, which has been locked in diplomatic efforts to convince European partners to pull out of Iran.
China’s Xi Pledges $20 Billion in Loans to Revive Middle East
Chinese President Xi Jinping on Tuesday pledged a package of $20 billion in loans, and about $106 million in financial aid, to Middle East nations, as part of what he called an “oil and gas plus” model to revive economic growth in the region.

Beijing has ramped up engagement in the Middle East in recent years as Arab nations play an important role in Xi’s signature Belt and Road foreign policy plan for strong trade routes linking China with central and southeast Asia.

Development was key to resolving many security problems in the Middle East, Xi told a gathering with representatives of 21 Arab nations in the Chinese capital.

“We should treat each other frankly, not fear differences, not avoid problems, and have ample discussion on each aspect of foreign policy and development strategy,” he said.

China would offer aid worth 100 million yuan ($15 million) to Palestine to support economic development, besides providing a further 600 million yuan ($91 million) to Jordan, Lebanon, Syria and Yemen, he added.

A consortium of banks from China and Arab nations, with a dedicated fund of $3 billion, will also be set up, he said.

It was unclear what the relationship between the bank consortium, financial aid and the overall loan package would be.

The loans will fund a plan of “economic reconstruction” and “industrial revival” that would include cooperation on oil and gas, nuclear and clean energy, Xi said.
China pledges $15 million to Palestinians amid major push for Mideast influence
China will provide Palestinians with more than $15 million in aid, President Xi Jinping told top Arab officials Tuesday, as Beijing seeks to build its influence in the Middle East and Africa.

The 100 million yuan pledge to Palestinians was made as part of a plan to give Arab states more than $23 billion in lines of credit, loans and humanitarian assistance for economic development.

The money will be earmarked for “projects that will produce good employment opportunities and positive social impact in Arab States that have reconstruction needs,” said Xi, without providing further details.

It is part of a special Chinese program for “economic reconstruction” and “industrial revitalization,” Xi told participants at a China-Arab States forum in Beijing’s Great Hall of the People.

Beijing is also prepared to provide another one billion yuan ($151 million) to countries in the region to “build capacity for stability maintenance,” Xi said, using a term commonly associated with policing and surveillance.

Xi said that Syria, Yemen, Jordan and Lebanon would receive $91 million in humanitarian assistance.



We have lots of ideas, but we need more resources to be even more effective. Please donate today to help get the message out and to help defend Israel.
          RICK & RICK: Lessons BK Learned from Hackers (Podcast)      Cache   Translate Page   Web Page Cache   
RICK & RICK: Lessons BK Learned from Hackers (Podcast) On an all-new episode, Rick Mathieson and Rick Wootten discuss the hot topics in the week that was in marketing, media and pop-culture, including: • IHOB, Revisited (:30) • Have the 'Star Wars' movies been sidelined? (1:53) • Summer box office...
          How to Download and Install      Cache   Translate Page   Web Page Cache   

Apple has released iOS 11.4.1 for eligible iPhone, iPad, and iPod touch models. Among other tweaks, the latest iOS update finally brings an anticipated safety feature - by default, your iOS device will prevent USB accessories from connecting more than an hour after it was locked. This change addresses the issue that was letting law enforcement and private companies crack the passcode through the Lightning port with brute force methods. The option was seen first as the 'USB Restricted Mode' in the developer preview betas for iOS 12 and iOS 11.4.1 last month.

To restrict USB access, the iOS 11.4.1 brings a new toggle for USB Accessories that you can find by going to Settings Face ID (or Touch ID) & Passcode. The option is by default disabled. This enables you to disallow USB accessories to establish a connection with your iOS device if it has been locked for over an hour. As a result, cracking tools such as GrayKey will not be able to gain backdoor access to your device. However, if you own an USB accessory that you want to continue work with your iOS device for over an hour, you can toggle the USB Accessories option on. This removes the hour limit.

As reported by Reuters in June, Apple representatives had said that the change in the settings would protect customers in countries where law enforcement seizes and tries to crack phones with fewer legal restrictions than under US law. "We're constantly strengthening the security protections in every Apple product to help customers defend against hackers, identity thieves and intrusions into their personal data," Apple had said in a prepared statement. "We have the greatest respect for law enforcement, and we don't design our security improvements to frustrate their efforts to do their jobs."

Apple was notably in the headlines in 2016 when FBI had requested the company to enable bypassing of security measures and get backdoor access to the iPhone found in the San Bernardino terrorist shootings. Eventually, the company brought a solution to intrinsically restrict any exploit that uses the Lightning port.

Notably, researchers at ElcomSoft claim to have found a bug in the new USB Accessories option that resets the one-hour counter as long as the USB accessory is connected to the iOS device before the USB Restricted Mode lock comes on. Accessories like Apple's Lightning to USB 3 Camera adapter do the trick, ElcomSoft claims. The company is calling the loophole an oversight.

Apart from the USB Accessories toggle, iOS 11.4.1 fixes an issue that prevented some users from viewing the last known location of their AirPods in the Find My iPhone app. The update also improves the reliability of syncing mail, contacts, and notes with Exchange accounts. Furthermore, information on the security changes of the latest update are available on Apple's support page.

How to download iOS 11.4.1 update

You can download the iOS 11.4.1 update on your iPhone 5s and above models, iPad Air and above models, iPad mini 2 and above models, or the sixth generation iPod touch. To download, go to Settings General Software Update and then follow the on-screen instructions. It is advisable to use a Wi-Fi connection to download the over-the-air (OTA) update. Also, you should back up your data before beginning the update process.


          A Hacker Sold U.S. Military Drone Documents On The Dark Web For Just $200      Cache   Translate Page   Web Page Cache   
Can the U.S. government be trusted to keep sensitive data secure? Leaked docs included military advi
          A Hacker Sold U.S. Military Drone Documents On The Dark Web For Just $200      Cache   Translate Page   Web Page Cache   
Can the U.S. government be trusted to keep sensitive data secure? Leaked docs included military advi
          L'ultima Roma imperiale e l'ultima Roma repubblichina      Cache   Translate Page   Web Page Cache   

a) L’ULTIMA ROMA IMPERIALE

Da “Storia d’Italia, Vol. 4, pagg. 143 e segg., Montanelli e Gervaso, RCS 1994, Milano”, citiamo:

Non risulta che i Romani, o per meglio dire gli abitanti di Roma, si rendessero esatto conto di cio’ che significava la decisione di Odoacre di spedire a Costantinopoli le insegne imperiali e di abolire la carica di Augusto. Il Senato, che pro-forma si riuniva per avallare le decisioni del tirannello di turno, lo considero’ un fatto di ordinaria amministrazione, anzi lo saluto’ come una provvida riunificazione dell’Impero dopo la divisione fattane da Costantino. Che tutto l’Occidente se ne fosse separato; che Roma, una volta caput mundi, non lo fosse piu’ neanche dell’Italia, la quale ormai gravitava piu’ su Milano e Ravenna; che la Penisola non fosse piu’ che la remota propaggine di un Impero che si proclamava ancora Romano, ma che in realta’ era soltanto grecorientale, parvero loro tutte cose di scarso rilievo e di secondaria importanza.

Questa indifferenza e’ significativa. Non che, intendiamoci, all’atto pratico il Senato avesse la possibilita’ e i mezzi di opporsi. Se avesse osato, per dirla con Mussolini, i Lanzichenecchi di Odoacre avrebbero fatto di quell’aula sorda e grigia un loro bivacco. Ma almeno un addio alle aquile ed ai fasci littori, cioe’ a ottocento anni di Storia e di Gloria, avrebbe potuto risuonarvi. Invece, niente. Fra gli epigoni di quella che era stata la piu’ rigogliosa aristocrazia del mondo, non se ne trovo’ uno disposto a pronunciare un epitaffio.

L’ultimo Senatore degno di questo nome era stato Simmaco, alle cui “Lettere” dobbiamo il piu’ gradevole ritratto dell’agonizzante Roma imperiale. Veniva da una grande famiglia di Consoli e Prefetti, che avevano servito con la medesima accortezza gli interessi dello Stato e quelli propri, come dimostrava l’immenso patrimonio che avevano accumulato. Fra l’altro essi avevano disseminato, dal Lago di Garda alla Baia di Napoli, una catena di sontuose ville, in modo da poter scorrazzare la Penisola senza lo scomodo di uscire di casa.

Simmaco era l’ultimo rappresentante della cultura pagana, sebbene di fatto di religione si proclamasse agnostico. “Che importanza ha” disse all’imperatore Valentiniano “quale strada si sceglie per giungere al Vero? Quel che conta sapere e’ che non si arrivera’ mai a scoprirlo”. Gran signore ed intimo amico di Vezio Pretestato, capo della minoranza pagana in Senato, egli fu designato a patrocinarla nella sua ultima battaglia contro il Cristianesimo. L’imperatore Graziano, completamente dominato da Ambrogio, sulla fine del quarto secolo ordino’ la chiusura e la confisca di tutti i templi dedicati agli dei e la rimozione dal Senato della statua della Vittoria che Augusto vi aveva installato. Simmaco si oppose con un discorso degno del miglior Cicerone, e fu bandito da Graziano. Morto costui e succedutogli Valentiniano II, Simmaco riprese la sua battaglia oratoria e l’avrebbe vinta sull’animo del nuovo giovane imperatore, se Ambrogio non fosse intervenuto con la sua foga abituale. Il Vescovo di Milano trionfo’ perche’ aveva dalla sua la fede. Simmaco non aveva che la ragione. Le sue “lettere” sono una limpida, ma parziale descrizione della Roma dei suoi tempi, dal punto di vista dei ricchi privilegiati, che ancora vi mantenevano posizioni di rielievo, sia pure soltanto decorative.

Quella che non lo e’ piu’ sul piano politico, e’ ancora pero’ la capitale intellettuale dell’Occidente, dove chiunque voglia parlare al mondo civile e’ costretto a venire ad imparare la lingua e i costumi e per trovare gli strumenti di diffusione. Nei palazzi si sono accumulati libri ed oggetti d’arte. Vi sono tappeti che costano fino a duecento milioni di lire. Battaglioni di cuochi preparano pranzi sontuosi. E dalle conversazioni e’ bandita ogni parola che non sia del piu’ classico latino. Questa societa’ non e’ chiusa. Accoglie tutti coloro, indigeni o forestieri, che in qualche modo fanno spicco, ma gli impone la sua etichetta. Le ambizioni sono piu’ intellettuali che politiche. Tuttavia la dedizione al bene pubblico e’ ancora grande. Questa classe dirigente, lungi dal trarre profitto dalle sue cariche amministrative e diplomatiche (di quelle militari ha perso persino il ricordo) se le mantiene finanziando di tasca propria circhi e teatri.

E’ un ceto signorile di altissima civilta’ che non ruba piu’ perche’ i suoi avi hanno gia’ rubato abbastanza, e alla cui porta tutti i forestieri, barbari o meno, fanno ressa per essere accolti.


C’e’ senza dubbio del vero in questo attraente ritratto, ma visto da una parte sola. L’altra ce la fornisce un cristiano, anzi un prete di Marsiglia, Salviano, nel suo libro “Il governo di Dio”, di cui Agostino ebbe probabilmente conoscenza.


Salviano non vede che oppressione, corruzione e immoralita’, a differ

enza di quanto avviene nelle societa’ barbariche, rozze ma certamente dallo spirito di sacrificio, di un sentimento di solidarieta’ e di fratellanza e dalla legge dell’onore. “Roma muore e ride” dice questo puritano che non l’ama e che forse ha letto un po’ troppo di Tacito. Ma anche nella sua descrizione del vero c’e’.

La citta’ aveva in quel momento meno di duecentomila abitanti, fra i quali i Romani di razza dovevano contarsi, al massimo, a centinaia. Dai tempi di Cesare essa era una metropoli in prevalenza orientale, che si era abituata a vivere parassitariamente alle spalle delle province romanizzate. A parte una cartiera e una fabbrica di coloranti, le sue uniche industrie erano la politica ed il saccheggio. Quest’ultimo aveva riempito il suo tesoro pubblico e quelli privati come nel secolo decimonono il saccheggio coloniale avrebbe fruttato la ricchezza dell’Inghilterra. Ma esso era finito da un pezzo, ormai: da quando Costantinopoli bloccava I mercati orientali e le invasioni barbariche avevano paralizzato quelle occidentali. Da allora sempre piu’ Roma ma aveva dovuto contare solo sulla Penisola. Ma neanche qui le cose andavano bene. La popolazione complessiva non superava i cinque milioni. Ma ai guai della decadenza demografica dovevano aggiungersi quelli del declino della classe media. Dai Gracchi in poi Roma aveva sempre lottato per ricostruire o puntellare quella societa’ contadina di coltivatori diretti che davano i mgliori soldati all’esercito e i migliori funzionari all’amministrazione. Ma il sistema fiscale del basso Impero l’aveva definitivamente rovinata. La Tributaria era talmente corrotta e prevaricatrice che, stando a Salviano, per la prima volta nel terzo secolo si videro cittadini romani fuggire, per salvarsi, oltre la “cortina di ferro” del limes, e rifugiarsi presso i barbari.

L’imperatore Valentiniano I ne fu cosi’ colpito che istitui’ una nuova professione: quella dei “Difensori della Citta” cui erano affidati i reclami contro il fisco. Ma nessun rimedio di legge e’ valido quando il costume si corrompe. I memorialisti del tempo hanno lasciato scritto che coloro che vivevano sulle tasse erano piu’ numerosi di coloro che dovevano pagarle. Ed era la conseguenza di due fenomeni ugualmente deleteri e che si sviluppano sempre di pari passo: da una parte il proliferare della burocrazia, dall’altra l’assottigliamento dei contribuenti. I quali, incapaci di far fronte al fisco, sempre piu’ vendevano il podere o la piccola fattoria al latifondista, facendosene assumere in qualita’ di coloni, cioe’ pressappoco di servi della gleba.

Fu questo il vero inizio del Medioevo almeno dal punto di vista sociale, e comincio’ a verificarsi prima dell’arrivo dei barbari.

Da quando le guerre di conquista erano finite, era cessato anche l’afflusso degli schiavi. E quindi i grandi proprietarierano ben contenti di assoldare come contadini quelli piccoli, dopo everne ricomprato le terre. Costro, dal canto proprio, cercavano un padrone: non solo per sottrasi alla Tributaria, ma anche per avere in lui un protettore nello scompiglio che si andava accentuando. Il grande feudatario, che sin qui aveva vissuto un po’ nel suo palazzo a Roma, un po’ nella sua villa di campagna, comincia a cambiare visionomia, e si trasforma nel potente che e’ gia’ l’inizio del Feudalesimo. La villa che finora tirava soltanto al comodo e al bello perche’ alla sua protezione accudivano i Prefetti e i Generali con le loro forze di polizia, adesso cerca anche la sicurezza e si trasforma piano piano in castello, cioe’ in fortilizio, perche’ lo Stato non e’ piu’ sempre in grado di difenderla dai briganti che infestano le contrade e dai “federati” che cominciano a calarvi e con essi spesso si confondono. Quello che invece non cambia e’ il rapporto umano fra il padrone ed il colono, che si e’ da poco sostituito allo schiavo ma che il padrone seguita a trattare come tale.

Questa e’ una delle ragioni per cui il Feudalesimo, fenomeno tipicamente germanico, in Italia attecchi’ prima che altrove, ma vi ebbe anche la vita piu’ corta. I barbari che non si erano allenati al comando sugli schiavi, avevano del vassallaggio un’idea molto piu’ umana dei Romani, perche’ lo esercitavano sui loro fratelli, quindi con molte limitazioni e garanzie. I Romani invece si erano sempre riconosciuti il diritto di disporre della vita dei loro dipendenti, e vi avevano contratto una specie di vizio mentale. Paolino di Pella si congratulava della propria mentalita’ scrivendo, in questi tempi, di essersi sempre contentato, quanto a concubine, delle serve: il che costituiva, secondo lui, solo l’esercizio di un diritto. In questo contado scarsamente popolato da una plebe di mezzadri e di braccianti senz’altra protezione che quella grazisamente concessa dai potenti, solo costoro vivevano agiatamente, perche’ quasi tutto il reddito veniva rastrellato a Roma. Ma anche qui ci si guardava dal distribuirlo equamente. Mentre Simmaco iscriveva nel suo registro dei conti la spesa di oltre cinquecentomilioni di lire per uno spettacolo nel Circo, dove trenta gladiatori sassoni preferivano strangolarsi ciascuno con le proprie mani piuttosto che sbudellarsi l’un l’altro, un vasto proletariato viveva solo di sussidi, di elemosine e di piccoli intrallazzi, approfittando di ogni disordine per dedicarsi al saccheggio di banche e negozi.

Ad Ammiano Marcellino, che vi giunse alla fine del quarto secolo da Antiochia, Roma fece l’impressione di una citta; piacevole e corrotta, dove la raffinatezza e la crudelta’, l’intelligenza ed il cinismo, il lusso e la miseria, la tradizione e l’anarchia si mescolavano in dosi abbastanza robuste. Ammiano scriveva in un latino un po’ imparaticcio, ma era un imparziale galantuomo, a cui il paganesimo non impedi’ per esempio di condannare Giuliano l’Apostata per I suoi tentativi contro le liberta’ cristiane. E al suo giudizio ci crediamo, anche perche’ conferma sia il ritratto in rosa di Simmaco che quello in nero di Salviano. Le due Rome, quella splendida dei pochi e quella miserabile dei molti, convivevano. E si capisce come’essa potesse apparire diversa secondo gli occhi che la guardavano. Altri due cronisti forestieri, Macrobio e Claudiano, non videro che la prima, forse perche’ ebbero la ventura di essere accolti nella buona societa’. Ma le loro descrizioni puzzano di omaggio. Anch’essi, tuttavia ci aiutano a capire come mai Roma accettasse con tanta facilita’ la sua spoliazione del titolo di Capitale dell’Impero.

Tutte le decadenze in tutti i luoghi e in tutti i tempi sono contrassegnate dai medesimi fenomeni: le accresciute distanze sociali fra un numero sempre piu’ piccolo di privilegiati e una massa sempre piu’ grande di derelitti, l’affievolimento di ogni vincolo di solidarieta’, e la totale indifferenza di tutti agli interessi della comunita’.

Nei salotti della ricca Roma, quasi tutta pagana, si parlava di Cicerone e di Catullo, si citava Aristotele, si corbellavano I Generali barbari, le loro rozze maniere, i loro errori di pronuncia e di ortografia. Nei “bassi” della povera Roma cristiana ci si arrangiava come si poteva e si era troppo impegnati a mettere daccordo il desinare con la cena per potersi preoccupare dell’Impero, dello Stato, del Passato e del Futuro.

Che un lanzichenecco tedesco cresciuto alla corte di Attila, come Odoacre, avesse rispedito le aquile e i fasci a Costantinopoli e stesse governando l’Italia come un Re indipendente, non interessava a nessuno.

A intendere e ad esprimere in tutta la sua grandezza e tragicita’ questa catastrofe ci fu solo un poeta. Ma non era romano, e nemmeno italiano. Era un gallo nativo forse di Tolosa, forse di Narbona, si chiamava Rutilio Namaziano, veniva dalla carriera amministrativa, ed era prefetto in Toscana e in Umbria. Prima di tornarsene in patria bsotto l’incalzare delle invasioni visigote e vandale, volle pagare il suo debito di gratitudine a Roma, che aveva fatto di lui un uomo civile e colto, dedicandole un’apostrofe che dimostra quanto quella civilta’ e cultura egli le avesse assimilate. Forse il suo libro “De reditu” e’ l’ultimo capolavoro della latinita’ classica. Comunque, lo e’ certamente l’addio all’Urbe che vi e’ incluso:

Ascolta, regina bellissima di un mondo che hai fatto tuo,

o Roma, accolta negli stellati cieli, asolta madre di uomini e di dei.

Non lontani dal cielo siamo noi quando ci troviamo nei tuoi templi….

Tu spargi i tuoi doni eguali ai raggi del sole

per ovunque in cerchio fluttua l’Oceano…

Non ti fermarono le sabbie infocate di Libia,

non l’estrema terra armata di ghiaccio ti respinse….

Facesti una patria sola di genti diverse,

giovo’ a chi era senza leggi diventare tuo tributario

poiche’ tu trasformavi gli uomini in cittadini

e una citta’ facesti di cio’ che prima non era che un globo.


Non si poteva dire di piu’, ne’ meglio. Questo barbaroi dal cuore traboccante di affetto, di riconoscenza, di ammirazione, aveva composto per Roma il piu’ bell’epitaffio in un latino degno di Virgilio. Ma i Romani non lo lessero. E ancor oggi il nome di Namaziano e’ noto solo a pochi studiosi.

b) L’ULTIMA ROMA REPUBBLICHINA

Questa e’ la Roma che oggi ospita due Stati: la Citta’ del Vaticano (Santa Sede) e la Repubblica italiana.

La citta’ del Vaticano rappresenta lo Stato temporale della comunita’ cristiana che prende le redini della citta’ dal VI secolo dopo Cristo e non lo lascia fino alla sedicente unita’ d’Italia.

La Repubblica italiana rappresenta lo stato di una comunita’ unificata con la forza e tenuta assieme con l’inganno.

Alla Santa Sede ora non si pagano piu’ tributi, ma neanche essa ne paga per il mantenimento della citta’.

Alla Repubblica italiana si pagano tributi salatissimi che servono ad alimentare i suoi clientes, non certo per contribuire ad aiutare chi ne ha bisogno (vedi ultimi terremotati), per le quali imposte piu’ di un centinaio di piccoli imprenditori si sono suicidati. Strani costoro, che invece di ribellarsi si suicidano (ma che volete, questi sono gli Italiani).

Sia la Santa Sede (gia’ Papato) che la Repubblica italiana (gia’ Regno d’Italia e poi Impero) soffrono degli stessi problemi che afflissero la Roma imperiale: le accresciute distanze sociali fra un numero sempre piu’ piccolo di privilegiati e una massa sempre piu’ grande di derelitti, l’affievolimento di ogni vincolo di solidarieta’, e la totale indifferenza di tutti agli interessi della comunita’.

In entrambi questi Stati, corruzione, privilegi e ruberie sono gli elementi caratterstici della classe governante, incapace a governare, ma capacissima a depredare lo Stato. Addirittura molti Italiani confondono i privilegi, che chiamano “diritti acquisiti con le lotte sindacali” con i diritti naturali.

I diritti naturali sono innati ed uguali per tutti, mentre i privilegi sono acquisiti con la forza e diversi per ogni classe che ne gode.

Nel paragrafo precedente abbiamo citato: “La Tributaria era talmente corrotta e prevaricatrice che, stando a Salviano, per la prima volta nel terzo secolo si videro cittadini romani fuggire, per salvarsi, oltre la “cortina di ferro” del limes, e rifugiarsi presso i barbari.”

Nella Repubblica italiana le cose non sono affatto cambiate, ma qui i cittadini preferiscono il suicidio alla ribellione. Parlo con il massimo rispetto per questi suicidi che, invece di essere condannati, dovrebbero essere vendicati”.

Uno dei Ministri (tra i piu’ idioti) della Repubblica delle banane ha affermato pubblicamente che tutti coloro che se ne vanno dall’Italia costituiscono un bene, perche’ non hanno voglia di lavorare. Costui, oltre che essere idiota, e’ anche un ottimo camuffatore della realta’, perche’ deve proteggere le sue banane.

Nella Repubblica delle banane si verifica lo stesso fenomeno avuto nella Roma del tardo impero: “coloro che vivevano sulle tasse erano piu’ numerosi di coloro che dovevano pagarle.”

La Repubblica italiana ha circa cinquecentomila uomini in armi pronti a difenderla perche’ da essa ricevono lo stipendio; ha inoltre piu’ di dieci milioni di dipendenti pubblici, parapubblici, o collusi con il pubblico, che non hanno nessuna voglia di rinunciare ai loro privilgi e pronti a scendere in piazza per difenderli anche con la forza, visto che ne hanno perche’ ricevono lauti compensi.


Lo scrivente e’ demoralizzato e finanche mortificato per questa realta’ e, purtroppo, ancora non vede nessuno all’orizzonte capace di terminare questo schifo con la stessa sorte che tocco’ alla Roma del Tardo Impero, ma non dispera. Giambattista Vico non ha mai sbagliato con la sua teoria dei “Corsi e ricosri storici”. Prima o poi ci sara’ un nuovo Odoacre che fara’ fare alla Repubblica delle banane la stessa fine dell’Impero romano d’occidente: ci sara’ certamente qualcuno che non potendo riconsegnare le insegne a nessun altro, probabilmente le brucera’ e con esse brucera’ le chiappe a tutti gli schifosi privilegiati che usurpano gli interessi della collettivita’.

Meditate, gente, meditate e, soprattutto, ribellatevi.


Costa adriatica, aprile 2017.


Related Post















          Nintendo rilascerà nuovi modelli di Switch per combattere la pirateria      Cache   Translate Page   Web Page Cache   

Nintendo Switch ha avuto un successo incredibile alla sua uscita, ma purtroppo è stata anche vittima di numerosi tentativi di hackeraggio da parte di alcuni pirati informatici e, per combattere questo fenomeno, la grande N ha deciso di mettere in commercio nuovi modelli della console. I nuovi modelli non avranno miglioramenti per quanto riguarda l’hardware interno, ma […]

L'articolo Nintendo rilascerà nuovi modelli di Switch per combattere la pirateria proviene da Videogiochi, Fumetti, Cinema, Serie TV, Tech, Eventi | NerdPlanet.it.


          Jasa pembuatan website jogja kecamatan sleman      Cache   Translate Page   Web Page Cache   
Jasa pembuatan website jogja kecamatan sleman desain mewah, elegan, dan professional. Gratis Email, Gratis pemanduan, Bisa mengajukan desain sendiri (custom Desain), Garansi dari hacker dan virus. Konsultasi Pemesanan Web Hubungi SMS/ TELP/ WA: Indosat: 0857 2931 9861 Telkomsel: 0821 3630 2531 XL: 0877 3497 3348 Untuk Cek Harga Web & Contoh Desain Klik di Sini     […]
          Jasa pembuatan website legal      Cache   Translate Page   Web Page Cache   
Jasa pembuatan website legal Mulai 390 rb, 500 rb, 1,2 jt. Fasilitas: Tutorial edit web + gratis konsultasi setiap saat, bonus index google. Garansi keamanan web dari hacker, virus dan malware. Khusus untuk toko online suport ongkos kirim JNE otomatis. Konsultasi Pemesanan Web Hubungi SMS/ TELP/ WA: Indosat: 0857 2931 9861 Telkomsel: 0821 3630 2531 […]
          Jasa Pembuatan Website di Bantul      Cache   Translate Page   Web Page Cache   
Jasa pembuatan website di Bantul. Harga , 300 ribu -1,2 juta. Garansi dari virus, hacker dll; Gratis: Tutorial edit+konsultasi 24 jam, index google.   Cek Harga Web Selengkapnya + Contohnya + Penjelasannya = Klik Di Sini   Kami menawarkan sistem pelayanan online modern, menjangkau seluruh wilayah tanpa kendala. Pelayanan kami mampu menjangkau Bantul. Contoh untuk jasa […]
          Jasa Pembuatan Website di Sleman      Cache   Translate Page   Web Page Cache   
Jasa Pembuatan Website di Sleman. Harga , 300 ribu -1,2 juta. Garansi dari virus, hacker dll; Gratis: Tutorial edit+konsultasi 24 jam, index google.   Cek Harga Web Selengkapnya + Contohnya + Penjelasannya = Klik Di Sini   Kami menawarkan sistem pelayanan online modern, menjangkau seluruh wilayah tanpa kendala. Contoh untuk Jasa Pembuatan Website di Sleman. […]
          WILLIAM MAKEPEACE THACKERAY: A NEWCOME CSALÁD I-II - Jelenlegi ára: 1 500 Ft      Cache   Translate Page   Web Page Cache   
Magyar Helikon 1973. Bp.
Borítólapos egészvászon kötésben, jó állapotú ritkább kiadás!
Egyetlen eladó példány!
A világirodalom egyik legjelentősebb írója. Dickens mellett az angol társadalmi regény­nek a legnagyobb klasszikus művelője.  
A maga korában roppant népszerű művei a kapitalizmus életformájának, erkölcseinek kegyetlen szatírái.  
? Lelenc volt-e Thomas Newcome, ama falu menhelyén nevelt gyermek, mely nagy ipari várossá fejlődött, és jelenleg az ő nevét vi­seli? Ezt híresztelték róla a legutóbbi választás alkalmával, mikor Sir Brian a konzervatív oldalon indult harcba a kerületért; Mr. Yapp, az ízig-vérig liberális jelölt, városszerte plakátokat ragasztatott ki, me­lyeken a menhely képe szerepelt, s azt hirdette a Newcome család pályafutásának kiindulási pontjaként, továbbá ironikusan arra szólí­totta fel a szabad polgárokat, szavazzanak Newcome-ra a céh, továb­bá szavazzanak Newcome-ra az egyházkerület érdekében etcetera. De ugyan ki törődik az efféle helyi botrányokkal? Nagyon keveset számít ama szerencsések szemében, akik a meghívottak listáján sze­repelnek Lady Ann Newcome estélyei alkalmával, hogy szépséges leányai csak nagyapjukig tudják-e visszavezetni a családfájukat, vagy legendás ősük, a borbélysebész révén hitvalló Edward király állához kapcsolódnak??
Postázás levélként, csomagként, Vatera futárral az Ön választása és az aktuális díjszabás szerint.  10000. - Ft feletti vásárlás esetén ingyenes házhozszállítás!  
Szállítás:  A vételár+postaköltség beérkezése után két munkanapon belül.  
Személyes átvétel Makón.
Kérjük tekintse meg böngészhető választékunkat ide kattintva
WILLIAM MAKEPEACE THACKERAY: A NEWCOME CSALÁD I-II
Jelenlegi ára: 1 500 Ft
Az aukció vége: 2018-07-11 10:32
          Malafide hacker verbouwt Arch Linux PDF-reader tot malware      Cache   Translate Page   Web Page Cache   
De tool werd niet meer ondersteund door originele bouwer en crimineel speelde daar op in.
          Innovation in healthcare: A hacker’s dream and CISO’s nightmare?      Cache   Translate Page   Web Page Cache   
For example, researchers at Stanford University last year announced that they had successfully trained a deep learning algorithm to identify skin ...
          (USA-CA-West Hollywood) Director of Marketing - Growth Hacker/Analytics/Acquisitions      Cache   Translate Page   Web Page Cache   
Director of Marketing - Growth Hacker/Analytics/Acquisitions Director of Marketing - Growth Hacker/Analytics/Acquisitions - Skills Required - Driving Traffic to eCommerce site, eCommerce Sites, eCommerce Online Acquisitions, Data-Centric Marketing Focus, Analytics, B2C, Digtial Marketing, Optimization/Optimizely/Google Optimize, Growth Hacking, Startup Experience/Small Teams Located in beautiful West Hollywood, CA, we are a B2C eCommerce company (w/risque consumer electronic products...if you get our drift.) Brought to you by the founders of some of the best known companies in the industry. We're looking for business savvy individuals, who don't get shy too easily, with an interest in joining a fantastic team, within a dynamic work environment, with incredible (I mean incredible) bonuses, perks, offices, and who can work hard but also have a great time. We have some very big players which has driven our success immediately and immensely. This is a great opportunity for anyone looking for growth and we're dedicated to offering the BEST the industry has to offer to our employees. **Top Reasons to Work with Us** - HUGE Room for Growth - Great Work/Life Balance/Autonomy - Competitive Pay + Bonuses **What You Will Be Doing** - Lead eCommerce Marketing Strategy - Customer-centric role. You will be the voice of our online customers, focusing on conversions, retention, and campaigns. - Data/Analytics driven role. Measure and report performance of all digital marketing campaigns, and assess against goals (ROI, ROAS and KPIs) - Identify trends and insights, and optimize spend and performance based on the insights - eCommerce growth hacking; focus on online customers, new acquisitions, developing a loyal client base. - Brainstorm new and creative growth strategies, leveraging both paid and unpaid strategies. - Take part in SEM, marketing database, email, social media and/or display advertising campaigns - Highly creative with experience in identifying target e-commerce audiences and devising digital campaigns that engage, inform and motivate - Work with Tech teams to optimize UX, A/B tests for landing page optimization, ad copy, promotional cadence and segment discovery - Plan, execute, and measure experiments and conversion tests - Collaborate with internal teams to create landing pages and optimize user experience and conversion - Utilize strong analytical ability to evaluate end-to-end customer experience across multiple channels and customer touch points - Collaborate with agencies and other vendor partners **What You Need for this Position** - BS/MS degree in marketing or a related field - 5+ years of eCommerce marketing w/focus on data and analytics to drive KPIs. - Growth hacking; bringing new customers to our eCommerce site. - SEM, Paid search, Data driven individual. - Solid knowledge of website analytics tools (e.g., Google Analytics, Omniture) - Online Sales marketing; predominately in a conversions and retention focused roles. - Past experience with email marketing, lead nurturing, marketing automation, and marketing analytics - Working knowledge of UI/UX, A/B tests, multivariate experiments, Landing Pages, Mailchimp, similar. - Working Knowledge of graphic design software (Photoshop, Illustrator, etc.) - Bonus points for development (HTML, CSS, and JavaScript) - Strong analytical skills and experience with campaign reporting and data analysis. **What's In It for You** For your hard work, you will be rewarded with a strong compensation package that includes a competitive base salary (D.O.E), excellent medical, dental and health benefits and other cool perks. Interviews are ongoing, completed interviews will move straight to hiring manager interviews. Incomplete applications will move through HR first. Please complete applications to expedite process. Applicants must be authorized to work in the U.S. **CyberCoders, Inc is proud to be an Equal Opportunity Employer** All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status, or any other characteristic protected by law. **Your Right to Work** – In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire. *Director of Marketing - Growth Hacker/Analytics/Acquisitions* *CA-West Hollywood* *AS3-ECommAcqDirector*
          (USA-CA-Huntington Beach) Senior Backend Software Architect      Cache   Translate Page   Web Page Cache   
Senior Backend Software Architect Senior Backend Software Architect - Skills Required - Java, Ruby On Rails, Scala, Clojure, Haskell, Erlang Based in Huntington Beach (off Warner and Beach) - We are a developer-heavy company that builds best-in-industry software and provides best-in-industry engineers for our clients. We're now entering our 5th year of operation and have a growing set of client, projects, each with its own project lead and team of engineers. This job is a good fit for you if you enjoy leading, building teams, but also still enjoy getting your hands dirty and writing excellent code most of the day. Even our CEO writes code! Base Salary: $150,000-$200,000 + performance bonus + amazing perks and benefits (see below) **What You Will Be Doing** - Building out our in-house engineering teams who are working on client projects by providing individual mentoring, leading code reviews, and organizing architecture discussions. - Pure coding on projects to complete sprint tasks. - Taking over the current coding duties of our CEO and will be a high level role on our team, potential to be our next CTO/Director of Engineering! **What You Need for this Position** - 7+ years working experience - BSCS or related - Predominant Programming Language Being Either: Java, Ruby on Rails, Python, Scala, Erlang, Haskell, Go, Rust or similar - We work on SQL DBs: PostgreSQL, Cassandra, Redis, Elasticsearch, Neo4j Nice to haves: - AWS, Azure, GCP, Heroku for infrastructure - Java 8, 9 or 10 **What's In It for You** - Work with other high-caliber engineers - Our blog is regularly featured on the front page of Hacker News - Flexible working hours - as long as high-quality work gets done - Easy-going, open office environment - RELO assistance - Monthly hackathons where you get to work on or collaborate on the project of your choice! - Employer 3% matching 401k - 100% coverage of PPO healthcare plan, including PPO dental and vision - Were security-focused So, if you are a Senior Software Architect with experience local to HB, please apply today! Applicants must be authorized to work in the U.S. **CyberCoders, Inc is proud to be an Equal Opportunity Employer** All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status, or any other characteristic protected by law. **Your Right to Work** – In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire. *Senior Backend Software Architect* *CA-Huntington Beach* *BJ1-1467019*
          (USA-MS-Port Gibson) Heavy Equipment Operator      Cache   Translate Page   Web Page Cache   
We are currently seeking a **Heavy Equipment Operator** to join our team. **Essential Functions** + Plans, assigns, directs, checks, and coordinates work. + Responsible for quality and quantity of production. + Performs all aspects of labor as necessary to keep crew operation flowing. + Ensures the overall safety, quality and production requirements of the crew are met. + Operates heavy equipment of various types to remove branches and tree material from electrical lines. + Cleans up and disposes of all debris. + Operates and services equipment such as gasoline, hydraulic tools, power saws, power winches, mower deck, weed whacker, chipper, and sprayers. + Uses hand-tools, such as axes, hand-lines, saws, block and tackle, pruners and other equipment as required. + Obtains written or oral permission from property owners to trim or remove trees or perform other work on property. Arranges with customer or property owner to obtain access, advises of interruption, explains work to be done, etc. + Promotes and maintains good customer and public relations through the effective accomplishment of assigned work and the appropriate behavior of employees on the crew. + Safeguards employees and the public from hazards in and around work area. + Sets up barriers, warning signs, flags, markers, etc. to protect employees and public. + Trains new personnel. + Work in all temperatures and will be exposed to nature i.e., irritating plants and biting or stinging insects. + Exposed to traffic. + Keeps informed on new equipment, specifications, standard practices, operating procedures, and customer and company employee relations policies and practices. + Works near energized parts or equipment. + Exposed to traffic. + Works around excessive noise from machines, jackhammers, gas drills and other equipment with proper hearing protection. **Minimum Requirements** + Due to the inherently dangerous nature of the industry and requirements to work with or around hazardous equipment, employees must be able to maintain attention and concentration for extended periods of time. + Must be able to wear necessary PPE as necessary. + Must be able to enter and exit a vehicle numerous times a day. + Must be able to withstand exposure to all kinds of weather while completing work assignments, i.e., rain, heat, sun, cold. + Must be able to stand for extended periods of time. + Must be able to grip and turn traffic control sign frequently. + Must have good vision and be attentive. + Must be able to read and comprehend written and verbal job instructions/information. + Must be able to verbally communicate with other crew members and fully understand instructions and information. + Must be familiar with electrical hazards. + Must have own transportation to and from the show up location. + Must pass a background check. + Must pass pre-employment drug test. **Physical Requirements:** **Activity:** **R** **O** **F** **C** **Activity:** **R** **O** **F** **C** Standing X Seeing X Walking X Reading X Sitting X Reaching X Stooping X Range of Motion X Kneeling X Hearing - Speech Range X Squatting X Depth Perception X Body Twisting X Color Vision X Crawling X Lifting X Sense of Touch X Carrying X Manual Dexterity X Pushing X Speaking Clearly X Pulling X Seeing Distant X Climbing Ladders X Climbing On/Off Truck X Climbing Stairs X Climbing X Balancing X Gripping X Lifting up to 10 lbs X Lifting over 10 lbs to 50 lbs X Lifting up to 50 lbs X Individuals must be able to perform the essential functions of the position with or without a reasonable accommodation. Individuals with a disability who desire a reasonable accommodation should contact the ADA Coordinator at 1-800-248-8733, ext 1339. An Equal Opportunity Employer, including disabled and vets. _Rarely_ = less than 10% _Occasionally_ =up to 33% _Frequently_ = up to 66% _Continuously_ = 67% to 100%
          Bancor Urges Industry Players to Collaborate After $23.5 Million Hack      Cache   Translate Page   Web Page Cache   

On July 9, the decentralized crypto platform Bancor was compromised. The hackers managed to drain over $23 million worth of crypto, part of which has allegedly already been converted into fiat via the instant exchange service Changelly. While the Bancor team is collaborating with other industry players to track the stolen funds, the recent security […]

Post source: Bancor Urges Industry Players to Collaborate After $23.5 Million Hack

More Bitcoin News and Cryptocurrency News on TheBitcoinNews.com


          So teuer sind Hackerangriffe für Unternehmen      Cache   Translate Page   Web Page Cache   
Datenpannen gefährden nicht nur den Ruf von Firmen, sondern auch deren wirtschaftliches Überleben. In Deutschland müssen sie etwa vier Millionen Euro pro Attacke aufbringen. In anderen Staaten sind die Schäden geringer.
          Michael McDonald Ready for Head-to-Head Battle with Eduardo Dantas at Bellator 202      Cache   Translate Page   Web Page Cache   

As has been the case in years prior, bantamweight Michael McDonald’s seven month layoff was caused by yet another hand injury that required surgery to fix.

Thankfully for McDonald, once again things were able to be repaired and he can finally get back to fighting.

“As much as I would love to never give my doctor another job; because that would mean nothing on me was broken; he was able to fix me up,” McDonald told MMAWeekly.com. “I’ve had four or five surgeries on my right hand, and every time they’ve done a flawless job. It’s always been in a new spot, so all of the repairs have been successful.”

Having had to miss significant amounts of time in the past due to injuries to the same hand, the question arose whether or not McDonald considered no longer fighting again due to his problems.

“There’s a lot of things that are involved and go into the decision to keep doing what I’m doing,” said McDonald. “In general I would say the problem is that I have a lightweight frame; my body isn’t naturally fit to withstand the impact that I put on it. I think I’ve learned to generate massive amounts of force for my body size.

“I do think if it’s worth it to my body. It helps that organizations like Bellator and the UFC are willing to fix me. If that wasn’t the case and they weren’t willing to pay to fix the injuries, then there’s absolutely no way I’d consider doing this again.”

McDonald (18-4) will have his first fight of 2018 when he takes on Eduardo Dantas (20-5) in a 135-pound co-main event at Bellator 202 on Friday in Thackerville, Okla.

TRENDING > Stipe Miocic Calls for a Rematch with Daniel Cormier

“(Dantas is) obviously a great fighter, a former champion, and is very good, so I have to perform and do my game as solid as I can,” McDonald said. “That’s what I plan on doing. There are no tricks, there’s no deception, I think a better martial artist, and we’re going to go head to head and see how that goes.”

Having had plans derailed in the past due to his injury issues, McDonald looks at the remainder of 2018 with cautious optimism.

“The biggest factor in that question mark is how my body feels after the fight,” said McDonald. “We’ll have to see. It’s very possible I might need another surgery after the fight. You never know what’s going to happen. If I’m healthy and I feel good then I’ll consider it and see how I’m feeling.

“There’s another factor: when I have a fight coming up, other things get pushed back, like life and whatever it be. I notice when you put life too back too much you start to hate your job. There’s no balance. You never start living. If my body is healthy and the pile of life gets pushed off to the side and that’s down, then I’m ready.”


          LiSS Firewall-Systeme      Cache   Translate Page   Web Page Cache   
Klingenberg, 11.07.2018 (PresseBox) - LiSS appliances vereinen die wesentlichen Sicherheitsfunktionen auf nur einem Gerät. Damit sind sensible Unternehmensnetzwerke optimal vor Viren, Hackern sowie unerwünschten E-Mails und Webinhalte - Mehrstufige Firewall - Stateful Inspection - Intrusion ...
          Innovation in healthcare: A hacker’s dream and CISO’s nightmare?      Cache   Translate Page   Web Page Cache   

It’s hard not to be excited about artificial intelligence and machine learning in pure technology terms, but applying these innovations to the healthcare sector has the potential to do truly great things for humanity. Just imagine if these technologies could help us to diagnose and treat some of the world’s most pressing health crises. Ground-breaking work in the field of healthcare AI is already being undertaken. For example, researchers at Stanford University last year announced … More

The post Innovation in healthcare: A hacker’s dream and CISO’s nightmare? appeared first on Help Net Security.


          Pentagono in allarme: cyber-avversari pronti a colpire telefonia e anti-virus      Cache   Translate Page   Web Page Cache   

Le principali strategie del Pentagono per difendere il sicurezza nazionale dagli attacchi hacker potrebbero non essere sufficienti. Secondo il capo dell’Agenzia per la sicurezza nucleare USA, pratiche come il “Software Banning” – ossia il divieto di usare software provenienti da potenziali cyber-avversari – non basteranno a mantenere il governo al sicuro. Anziché vietare il software cinesi […]

L'articolo Pentagono in allarme: cyber-avversari
pronti a colpire telefonia e anti-virus
proviene da Gli occhi della guerra.


          We’re hosting a free workshop for DIY Entrepreneurs and Makers!      Cache   Translate Page   Web Page Cache   

The future is digital and it needs great minds to take it in great directions. We are proud to support DIY entrepreneurs and side hustlers as they work to improve their digital presence. We’d love to invite you to our Read more…

The post We’re hosting a free workshop for DIY Entrepreneurs and Makers! appeared first on HackerYou.


          Re: When police officers have their criminal records expunged      Cache   Translate Page   Web Page Cache   
I thought it was impossible to remove criminal records until I found this professional Russian hacker by the name Vadim Artyom. This man literally saved my life when I couldn't get a good job because of some bad records I had online. Vadim took down all that within 7hours. Can't say much, if you need help reach Vadim on Email- vadimwebhack@gmail com or Whatsapp- +380683017209

HE OFFERS MANY OTHER SERVICES LIKE -Social media hack -Website hack -Credit hack and score boost -Android and iPhone cloning -GPS tracking -Sales of blank ATM cards for universal withdrawal and many other services i cant mention all.
Posted by Bahr Logan
          LTE Networks May Be Vulnerable To Hacking      Cache   Translate Page   Web Page Cache   
Researchers from Ruhr-Universität Bochum and New York University in Abu Dhabi have discovered serious security flaws in 4G LTE networks that allow hackers to spy on, listen in on, intercept, and ...
          Macy's Says Hackers Accessed Online Customers' Credit Card Data      Cache   Translate Page   Web Page Cache   

recipesworld4ever posted a photo:

Macy's Says Hackers Accessed Online Customers' Credit Card Data

via Blogger ift.tt/2zuHTNQ


          Un hacker intenta vender archivos militares de EEUU, nadie se los compra y encima le descubren      Cache   Translate Page   Web Page Cache   
dron mq-9a hacker

En la Dark Web se vende de todo, y se intenta sacar rédito de lo que sea, sin importar su procedencia. Un hacker consiguió una serie de documentos del ejército de Estados Unidos, y se vio obligado a rebajar su precio porque nadie los quería, a pesar de que eran bastante sensibles e interesantes para un posible enemigo del país.

Leer más...

El artículo Un hacker intenta vender archivos militares de EEUU, nadie se los compra y encima le descubren escrito por Alberto García se publicó en ADSLZone.


          Geohot Works For Facebook (Confirmed)      Cache   Translate Page   Web Page Cache   
Are you surprised? Yes that’s right we have got some news that the most-famous hacker Geohot behind LimeRa1n jailbreak tool which still used till our day to jailbreak iOS devices. Anyway he dissapeard for some time but today we found that George Hotz (aka Geohot) is actually working for Facebook since May, but why do […]
          ATM's Using Biometric Identification to Combat Fraud      Cache   Translate Page   Web Page Cache   
ATMs Use Biometrics to Combat Fraud

Back to the future at your local ATM



•••

BY ERIN ONEIL
Updated February 20, 2018

Iris-scanners and biometric fingertip readers sound like something out of a spy-thriller, but these devices have already been adopted by financial institutions in international markets. More than 15 million citizens use the technology in Japan alone. Banks in Mexico, South America, Africa, and the Middle East are also moving toward the new technology due to its popularity with rural consumers who aren’t accustomed to carrying bank cards (but apparently don't mind having a machine scan their bodies).

In the current market, Western banks and financial institutions are already set to integrate biometric technology with mass market banking.

Banks Adopt Biometric Technology to Combat Fraud

Consumer liability for fraudulent charges and the cost of implementing biometric technology remain the top reasons why U.S. banks haven't yet adopted the ATM biometrics. In Japan, legislation requiring banks to pay for fraudulent charges led to more than 80,000 biometric ATMs being installed since 2006. In the United States, consumer reluctance and privacy concerns have been cited among the main drawbacks, but a recent survey shows consumers in all age groups overwhelmingly vote for biometric scanning as the preferred authentication method for ATM withdrawals.

A Way to Combat Identity Theft

According to industry numbers from Javelin Strategy & Research, one-tenth of fraud cases in 2009 involved unauthorized ATM withdrawals. ATM skimming devices that capture card data and PINs are not the only security threat; at the annual Black Hat information security conference, noted hacker and security specialist Barnaby Jack hacked into the ATM’s rootkit, gathered card data, and emptied the ATM’s cash reserve. Fortunately, the security guru also revealed safeguards that could easily be implemented to prevent the same type of attack.

Traditionally, access to a checking account has been with a debit/ATM card and PIN. But with new every data breach (as well as increasingly hard-to-detect skimmers), thieves have more ways to steal money. Cards with smart chips should slow that trend, but tech-savvy thieves are not going to give up easily.

Even with high-tech cards, there's still a risk of somebody besides the authorized account holder using a card; it might happen because you share your card (and PIN) with a "trustworthy" friend, or because a card is lost or stolen and the PIN is easy to find. Becuase PINs are hard to remember, they are often kept with cards, which of course defeats the purpose entirely.

With biometric technology, banks can be sure that only the authorized account holder can make withdrawals. And consumers might enjoy knowing that there's no need to remember a code - your body has everything needed to complete the transaction. In fact, some banks are even looking at card-free transactions (or at least using a chip in your phone instead of a plastic card).

ATMs of the Future

Today’s biometric scanners go far beyond basic fingerprint recognition. According to security experts, fingerprints can easily be lifted and replicated. In Poland and Japan, consumers are already using Hitachi's infrared scanners that capture the unique pattern of capillaries in the finger and hand. The most secure biometric technology uses a device designed to perform an iris scan based on more than 2,000 unique measurement points. According to developers, people and pets all over the world will be connected to a system that uses iris scan identification within the next decade.

But we don't need to wait that long. Finger scanners already authenticate customers, sometimes by reading the vein patterns in a finger instead of an old-fashioned fingerprint. If you've recently done business with a teller or accessed a safe deposit box, there's a good chance you've left some kind of biometric record with the bank.

Biometric Challenges

If biometric security is so great, why don't we have it everywhere? Again, some consumers are uncomfortable with having their bodies scanned, and having that information stored with numerous financial services companies.

In addition, the technology needs to function properly - especially when it comes to ATMs. An ATM is a self-service machine, and it'll never get used if it's cumbersome to get authenticated. Consumers might not understand how to interact with the machines (or they might not want to put their eyes within a few inches of the machine), and machines need to be almost 100% reliable. In the past, ATMs with fingerprint readers have had problems with "well-worn" fingers, and they don't work when they're dirty Vein and iris scanners are more reliable, but it is costly to outfit machines with new technology.

Source: The Balance
          Criptovalute: maxi furto da 24.984 ETH sull'exchange Bancor, rubati anche NPXS e BNT      Cache   Translate Page   Web Page Cache   
La sicurezza continua ad essere il tallone d'Achille delle criptovalute. L'exchange Bancor, molo utilizzato anch dagli investitori italiani, ha annunciato ieri pomeriggio di aver sospese in modo temporaneo le proprie attività a causa di una imprevista falla di sicurezza. Dietro queste parole molto istituzionali c'è una realtà che ha viso ben 23 milioni di dollari "evaporare" dalla piattaforma. A tanto ammonterebbe il maxi furto che Bancor ha subito proprio ieri. In un messaggio affidato a Twitter e che subito ha fatto il giro della rete, la piattaforma israeliana ha precisato che "Bancor ha riscontrato una falla di sicurezza. Nessuno dei wallet degli utenti è stato compromesso. Per completare l’indagine abbiamo avviato una fase di manutenzione e rilasceremo ulteriori dettagli a breve. Cercheremo di riprendere le attività il prima possibile". Ovviamente quanto successo ieri all'exchange ha alimentato le paure di chi da tempo si chiede se comprare criptovalute è sicuro.  Se in una prima fase la notizia del maxi furto subito da Bancor si è limitata a poche comunicazioni e a uno striminzito annuncio sul sito istituzionale, successivamente è stato lo stesso exchange a fornire ulteriori detagli su quello che è avvenuto. Bancor ha precisato che un portafoglio utilizzato per aggiornare smart contract è stato compromesso e poi utilizzato in modo fraudolento per prelevare 24.984 Ethereum  corrispondenti a 12,5 milioni di dollari. Sempre lo stesso wallet ha poi rubato 229.356.645 NPXS (pari a circa 1 milione) e 3.200.000 BNT (pari a circa 10 milioni di dollari. Complessivamente sono state asportate criptovalute per coplessivi 23,5 milioni di dollari. Un vero e proprio bollettino di guerra quindi in quello che si è configurato come un assalto organizzato opera di hacker professionisti. Dinanzi a quanto avvenuto, l'exchange israeliano non ha potuto fare altro che provare a tranquillizzare gli utenti e i clienti affermando: "Stiamo comunque lavorando con dozzine di exchange di criptovalute per tracciare i fondi rubati e rendere più difficile ai ladri la loro liquidazione". L'assalto comunque è fatto e gli investitori in criptovalute sono tornati a chiedersi se tutti quegli analisti che da mesi parlano di rischio affidabilità per le cripto non abbiano un pò di ragione. Proprio i furti, sempre più frequenti e sempre più efficaci, sono uno dei motivi alla base dei tanti ribassi del Bitcoin & C. Oggi la quotazione BTC è in calo del 4,8% a 6300 dollari. In rosso anche tutte le altcoin a maggiore capitalizzazione con Ethereum in calo del 6,5% e Ripple in ribasso del 3,6%. 
          CLUBcast 175      Cache   Translate Page   Web Page Cache   

Your Home for The Latest & Greatest Electronic Dance Music.

 
Hosted & Mixed by MP.
 
Track List:
 
1. Avicii - All My Life (Kidz At The Bar Bootleg)
2. Firebeatz & Apster Ft. Spree Wilson - Ghostchild
3. Tiesto & Oliver Heldens - Wombass
4. Michael Brun & Still Young - Check This Out
5. Aftershock - Hacker
6. Bali Bandits - Bend It
7. Chuckie - Who Is Ready To Jump (Revolvr Bootleg) 
8. Madison Mars - Theme O
9. Adele - Hello (Kepik Remix)
10. The Weeknd - Can't Feel My Face (ELIAS Remix)
11. Autoerotique - I Get Up
12. Chuckie & Albert Neve - DAMN
13. R3hab & Headhunterz - Won't Stop Rocking
14. Ralvero & Karim Mika - Mad
15. Don Diablo, Khrebto, & DallasK - Got The Retrograde (Ronium & Wand England Mashup)
16. Jay Hardway - Electric Elephants
 
TWITTER:
CLUBcast -Twitter.com/CLUBcastpodcast
MP - Twitter.com/clubcastMP
 
FACEBOOK:
CLUBcast - facebook.com/clubcastpodcast
MP - facebook.com/clubcastMP
 
CLUBcastpodcast.com

          PUBG bans Shroud after teaming-up with hacker in-game      Cache   Translate Page   Web Page Cache   

The most popular streamer on Twitch for PlayerUnknown's Battleground is no doubt Michael Grzesiek, better known as Shroud. Well, Shroud won't be at the top of Twitch streams for PUBG for at least a while, as he has sadly been banned from the game for an entire month.

Shroud...


Read the rest in your browser using this link! Tap or click here.


          Comment on Conformity, Cruelty, and Political Activism by Mike K      Cache   Translate Page   Web Page Cache   
Interesting the cookie thing remembers my blog site but not my name. I just finished reading for the third of fourth time, Cliff Stoll's great book, <a href="https://www.amazon.com/Cuckoos-Egg-Tracking-Computer-Espionage/dp/1416507787/" rel="nofollow"> "The Cuckoo's Egg.</a> The later edition has a epiloge chapter and a note about his later life (as of 2005). He makes it clear, but in an amusing way, that he and all his friends were typical Berkeley leftists in 1986 when the story takes place. He has quite a bit about his personal life, which is why the book is so enjoyable even though outdated. His live in girlfriend was Martha Matthews who was studying for the Bar as he was tracking the hacker. They had been together for 8 years at the time. They married at the end of the book. It is all charming. He moved back to Boston with her to accompany her to a new job. He had little trouble finding a job as an Astronomer at Harvard where he participated in the famous case of the net work "Worm" that ravaged many computers in 1987 and which turned out to have been written by the son of Robert T Morris, the chief scientist of the NSA. He mentions that he later returned to California and now (2005) lives in Oakland with his wife Pat. What happened to Martha ? <a href="http://www.publiccounsel.org/pages/?id=0056" rel="nofollow"> She lives in Los Angeles with her lesbian "wife."</a> <i>Ms. Matthews is a 1987 graduate of Boalt Hall School of Law at the University of California at Berkeley. After graduation from law school, Ms. Matthews served as a law clerk for Judge Thelton E. Henderson in the Northern District of California, Judge [now Justice] Stephen Breyer in the First Circuit, and Supreme Court Justice Harry Blackmun. Ms. Matthews currently resides in Los Angeles with her spouse Yolanda Vera and their children.</i> Some people grow out of leftism and some don't. He is a very interesting guy.
          A Hacker Sold U.S. Military Drone Documents On The Dark Web For Just $200      Cache   Translate Page   Web Page Cache   
Can the U.S. government be trusted to keep sensitive data secure? Leaked docs included military advice on defeating improvised explosive devices and Reaper drone manuals, according to cybersecurity researchers.
          El popular streamer Shroud expulsado de PUBG por hacer trampas      Cache   Translate Page   Web Page Cache   
Formó equipo con un hacker.

Parece que las verdaderas leyendas no existen. Recientemente, Kotaku informaba de que el popular streamer de Twitch, Michael 'Shroud' Grzesiek, "el niño prodigio", había estado jugando a Playerunknown's Battlegrounds formando equipo con un hacker y, además, haciendo uso de trampas.



No tardaron en captar que algo raro sucedía en las partidas de Shroud. En el vídeo que os dejamos sobre estas líneas, se le puede ver en el minuto 6:19 riéndose y diciendo: "Me están expulsando". Gracias a un hacker, pudo volar en un coche y anotarse al menos una muerte gracias a que le dijeron dónde se ocultaba su oponente.

Como resultado, Shroud tenía razón. En un directo que tuvo lugar anoche, Grzesiek declaró que le habían expulsado del juego temporalmente. "Estaba tratando de pasar un buen rato. Obviamente sabía qué diablos estaba haciendo. No fue una gran idea. Parecía una gran idea pero no lo era. Lo siento por los que están realmente molestos conmigo", se disculpaba. "Me han expulsado durante un mes".



Por otro lado, el propio hacker se encargó durante la partida de despejar todas las dudas. Alrededor del minuto 8:50, afirma que vende los trucos, y Grzesiek inmediatamente lo mandó a callar mientras le decía: "No digas nada".

Un battle royale de éxito


Vídeo:



Playerunknown's Battlegrounds está disponible tanto en PC y en Xbox One. Es un juego de disparos y acción que sigue la mecánica del battle royale: los jugadores deberán esforzarse por ser el último en quedar en pie. Para conseguirlo, contarán con un amplio arsenal de armas y vehículos. Desde Vandal le hemos dedicado un análisis que podéis leer en el siguiente enlace, así como una guía que también os invitamos a consultar.

Por otro lado, PUBG ha alcanzado recientemente los 50 millones de copias vendidas y un total de 400 millones de jugadores.

El popular streamer Shroud expulsado de PUBG por hacer trampas
          XDA Developers' Android Hacker's Toolkit      Cache   Translate Page   Web Page Cache   
none
          Has That Manchurian "President" Been A Russian Asset For Three Decades? Will Mueller Ever Tell Us?      Cache   Translate Page   Web Page Cache   
Useful Idiots, Enablers by Chip Proser

I'm guessing Jonathan Chait and Glenn Greenwald are not sitting down for some blinis and caviar at the Russian Tea Room any time soon. Chait's New York magazine collusion column over the weekend, Will Trump Be Meeting With His Counterpart-- Or His Handler, is the kind of thing that sends Trumpists-- as well as Greenwald-- into a rage. Chait wrote that when the news of the Russian hack of the DNC broke in June, 2016, "nobody raised the faintest suspicions that Russia wished to alter the outcome of the election, let alone that Trump or anybody connected with him might have been in cahoots with a foreign power. It was a third-rate cyberburglary. Nothing to see here." Since then "trying to discern the size and shape of the scandal is an exercise in uncertainty." The legitimacy of the Trumpist regime is at stake... The media," Chait asserts, "has treated the notion that Russia has personally compromised the president of the United States as something close to a kook theory" and then proposes that an "unlikely but possible" theory "that this is all much worse than we suspect," that Trump has been a Russian agent since the late '80s.
The first intimations that Trump might harbor a dark secret originated among America’s European allies, which, being situated closer to Russia, have had more experience fending off its nefarious encroachments. In 2015, Western European intelligence agencies began picking up evidence of communications between the Russian government and people in Donald Trump’s orbit. In April 2016, one of the Baltic states shared with then–CIA director John Brennan an audio recording of Russians discussing funneling money to the Trump campaign. In the summer of 2016, Robert Hannigan, head of the U.K. intelligence agency GCHQ, flew to Washington to brief Brennan on intercepted communications between the Trump campaign and Russia.

The contents of these communications have not been disclosed, but what Brennan learned obviously unsettled him profoundly. In congressional testimony on Russian election interference last year, Brennan hinted that some Americans might have betrayed their country. “Individuals who go along a treasonous path,” he warned, “do not even realize they’re along that path until it gets to be a bit too late.” In an interview this year, he put it more bluntly: “I think [Trump] is afraid of the president of Russia. The Russians may have something on him personally that they could always roll out and make his life more difficult.”

...[This theory] would mean the Russia scandal began far earlier than conventionally understood and ended later-- indeed, is still happening. As Trump arranges to meet face-to-face and privately with Vladimir Putin later this month, the collusion between the two men metastasizing from a dark accusation into an open alliance, it would be dangerous not to consider the possibility that the summit is less a negotiation between two heads of state than a meeting between a Russian-intelligence asset and his handler.

It is often said that Donald Trump has had the same nationalistic, zero-sum worldview forever. But that isn’t exactly true. Yes, his racism and mendacity have been evident since his youth, but those who have traced the evolution of his hypernationalism all settle on one year in particular: 1987. Trump “came onto the political stage in 1987 with a full-page ad in the New York Times attacking the Japanese for relying on the United States to defend it militarily,” reported Edward Alden, a senior fellow at the Council on Foreign Relations. “The president has believed for 30 years that these alliance commitments are a drain on our finite national treasure,” a White House official told the Washington Post columnist Josh Rogin. Tom Wright, another scholar who has delved into Trump’s history, reached the same conclusion. “1987 is Trump’s breakout year. There are only a couple of examples of him commenting on world politics before then.”

What changed that year? One possible explanation is that Trump published The Art of the Deal, which sped up his transformation from an aggressive, publicity-seeking New York developer to a national symbol of capitalism. But the timing for this account does not line up perfectly-- the book came out on November 1, and Trump had begun opining loudly on trade and international politics two months earlier. The other important event from that year is that Trump visited Moscow.

During the Soviet era, Russian intelligence cast a wide net to gain leverage over influential figures abroad. (The practice continues to this day.) The Russians would lure or entrap not only prominent politicians and cultural leaders, but also people whom they saw as having the potential for gaining prominence in the future. In 1986, Soviet ambassador Yuri Dubinin met Trump in New York, flattered him with praise for his building exploits, and invited him to discuss a building in Moscow. Trump visited Moscow in July 1987. He stayed at the National Hotel, in the Lenin Suite, which certainly would have been bugged. There is not much else in the public record to describe his visit, except Trump’s own recollection in The Art of the Deal that Soviet officials were eager for him to build a hotel there. (It never happened.)

Trump returned from Moscow fired up with political ambition. He began the first of a long series of presidential flirtations, which included a flashy trip to New Hampshire. Two months after his Moscow visit, Trump spent almost $100,000 on a series of full-page newspaper ads that published a political manifesto. “An open letter from Donald J. Trump on why America should stop paying to defend countries that can afford to defend themselves,” as Trump labeled it, launched angry populist charges against the allies that benefited from the umbrella of American military protection. “Why are these nations not paying the United States for the human lives and billions of dollars we are losing to protect their interests?”

Trump’s letter avoided the question of whom the U.S. was protecting those countries from. The primary answer, of course, was the Soviet Union. After World War II, the U.S. had created a liberal international order and underwritten its safety by maintaining the world’s strongest military. A central goal of Soviet, and later Russian, foreign policy was to split the U.S. from its allies.

The safest assumption is that it’s entirely coincidental that Trump launched a national campaign, with himself as spokesman, built around themes that dovetailed closely with Soviet foreign-policy goals shortly after his Moscow stay. Indeed, it seems slightly insane to contemplate the possibility that a secret relationship between Trump and Russia dates back this far. But it can’t be dismissed completely. How do you even think about the small but real chance-- 10 percent? 20 percent?-- that the president of the United States has been covertly influenced or personally compromised by a hostile foreign power for decades?

Russian intelligence gains influence in foreign countries by operating subtly and patiently. It exerts different gradations of leverage over different kinds of people, and uses a basic tool kit of blackmail that involves the exploitation of greed, stupidity, ego, and sexual appetite. All of which are traits Trump has in abundance.



Throughout his career, Trump has always felt comfortable operating at or beyond the ethical boundaries that constrain typical businesses. In the 1980s, he worked with La Cosa Nostra, which controlled the New York cement trade, and later employed Michael Cohen and Felix Sater, both of whom have links to the Russian Mafia. Trump habitually refused to pay his counterparties, and if the people he burned (or any journalists) got in his way, he bullied them with threats. Trump also reportedly circulated at parties for wealthy men featuring cocaine and underage girls.

One might think this notoriety immunizes Trump from blackmail. Curiously, however, Trump’s tolerance for risk has always been matched by careful control over information. He maintains a fanatical secrecy about his finances and has paid out numerous settlements to silence women. The combination of a penchant for compromising behavior, a willingness to work closely with criminals, and a desire to protect aspects of his privacy makes him the ideal blackmail target.

It is not difficult to imagine that Russia quickly had something on Trump, from either exploits during his 1987 visit or any subsequent embarrassing behavior KGB assets might have uncovered. But the other leverage Russia enjoyed over Trump for at least 15 years is indisputable-- in fact, his family has admitted to it multiple times. After a series of financial reversals and his brazen abuse of bankruptcy laws, Trump found it impossible to borrow from American banks and grew heavily reliant on unconventional sources of capital. Russian cash proved his salvation. From 2003 to 2017, people from the former USSR made 86 all-cash purchases-- a red flag of potential money laundering-- of Trump properties, totaling $109 million. In 2010, the private-wealth division of Deutsche Bank also loaned him hundreds of millions of dollars during the same period it was laundering billions in Russian money. “Russians make up a pretty disproportionate cross-section of a lot of our assets,” said Donald Jr. in 2008. “We don’t rely on American banks. We have all the funding we need out of Russia,” boasted Eric Trump in 2014.

Since Vladimir Putin, a former KGB agent, rose to power in 1999, money has become a key source of Russian political leverage. The Russian state (and hence Putin) controls the most lucrative sectors of its economy, and Russian investment is not designed solely to maximize return. Shady business transactions offer the perfect cover for covert payments, since just about the entire Russian economy is shady. Trump’s adamant refusal to disclose his tax returns has many possible explanations, but none is more obvious than the prospect that he is hiding what are effectively bribes.

During the Obama administration, Russia grew more estranged from the United States as its aggressive behavior toward its neighbors triggered hostile responses from NATO. Putin grew increasingly enamored of reactionary social theories portraying traditional, conservative, Christian Europe as pitted in a civilizational struggle against both decadent liberalism and radical Islam. Also during this time, Trump carved out a brand as a populist hero of the right by publicly questioning Obama’s birthplace and legitimacy.

In July 2013, Trump visited Moscow again. If the Russians did not have a back-channel relationship or compromising file on Trump 30 years ago, they very likely obtained one then. Former FBI director James Comey recounts in his book that Trump was obsessed with reports that he had been recorded in a hotel room watching prostitutes urinate on a bed that Barack Obama had once slept in. Trump, Comey wrote, “argued that it could not be true because he had not stayed overnight in Moscow but had only used the hotel room to change his clothes.” The journalists Michael Isikoff and David Corn have reconstructed Trump’s trip to Moscow and established that he did in fact stay overnight.

This was not the only allegation Trump forcefully and implausibly denied in his early meetings with Comey. He also denied that he had offered a pornographic-film star money to come to his room, grabbed a woman sitting next to him on an airplane, and mocked a disabled reporter at a rally. The other denials have gained no credence in the media. (Indeed, the last incident was broadcast on national television.) But Trump’s dismissal of the Moscow-hotel-room allegation has been given the benefit of the doubt by most reporters, who typically describe the charge as “salacious” and “unverified,” which it most certainly is, and treat that to mean “absurd,” which it is not. There is growing reason to think the pee tape might indeed exist.

There has never been much doubt about Russia’s motive to engineer a caper like this. Russian intelligence has a documented and long-standing practice of gathering compromising intelligence on visiting dignitaries. The use of prostitutes and the bugging of hotel rooms are standard. The skepticism has instead focused on both the source of the allegations, former British-intelligence official turned private investigator Christopher Steele, and Trump himself.

Steele’s dossier burst into public view in January 2017, introducing so many astonishing claims into the public domain that it read like politicized fiction, a modern-day Protocols of the Elders of Zion. “There has been no public corroboration of the salacious allegations against Mr. Trump, nor of the specific claims about coordination between his associates and the Russians,” the Times stated authoritatively last fall. “In fact, some of those claims have been challenged with supporting evidence. For instance, Mr. Trump’s longtime personal lawyer, Michael D. Cohen, produced his passport to rebut the dossier’s claim that he had secret meetings in Prague with a Russian official last year.”

The truth is that much of the reporting of the Russia scandal over the past 18 months has followed the contours of what Steele’s sources told him. Steele reported that “the Kremlin had been feeding Trump and his team valuable intelligence on his opponents, including Democratic presidential candidate Hillary Clinton,” in June 2016, days after the Trump Tower meeting occurred but a year before it would be publicly confirmed. Steele obtained early news of the Kremlin’s strategy to exploit divides within the Democratic Party through social media; the role of Carter Page, a member of Trump’s foreign-policy team whom Russia had been trying to cultivate as a spy since at least 2013; and other now-familiar elements of the story.

Even the accusations in the dossier that have purportedly been refuted have gained support from law enforcement. Mueller has reportedly obtained evidence that Cohen actually did visit Prague during the 2016 campaign, contrary to his denials. The FBI has learned that Cohen “was in frequent contact with foreign individuals” who “had knowledge of or played a role in 2016 election meddling,” according to BuzzFeed News.

Then there is Trump himself. While the president’s character has never been exactly deemed above reproach, some doubts have lingered about whether he would really hire prostitutes to defile a bed merely because Obama had slept there and whether a tape of such a thing would truly shame him.

These questions have been answered in the affirmative. Trump’s payment of hush money to Stormy Daniels and other women proves that he holds his sexual privacy dear. And the obsessive hatred of Obama that grew out of Trump’s humiliation at the 2011 White House Correspondents’ Dinner has blossomed into a perverse and often self-destructive mania. People both inside and outside the administration report that Trump will ultimately pick whatever option he believes is the negation of Obama’s legacy. “He will ask: ‘Did Obama approve this?’ And if the answer is affirmative, he will say: ‘We don’t,’” a European diplomat told BuzzFeed News.

Isikoff and Corn reported that Trump and many of the people who accompanied him on the 2013 trip to Moscow had, earlier that year, visited a club in Las Vegas that regularly performed “simulated sex acts of bestiality and grotesque sadomasochism,” including shows in which strippers simulated urinating. Isikoff and Corn do not establish what kind of performance was on display the night Trump visited. It may or may not have involved bodily fluids. But the notion that a display of exotic sex acts lies totally outside the range of behavior Trump would enjoy is quaint and unfounded.

It’s not necessary to believe that Putin always knew he might install Trump in the Oval Office to find the following situation highly plausible: Sometime in 2015, the Russian president recognized that he had, in one of his unknown number of intelligence files, an inroad into American presidential politics. The Republican nominees from 2008 and 2012 had both run on a hawkish position against Russia (Mitt Romney had called the country America’s “No. 1 geopolitical foe”). Now, on the fringes of the GOP primaries, there was a candidate opening up what was, from Putin’s standpoint, a much-needed flank against not just Obama but his former secretary of State Hillary Clinton and her aggressive position against Russia.

Trump praised Putin’s toughness and called for a thaw in relations between the two countries. At first, Putin likely considered him simply a way to goad his American foes. Then Trump captured the nomination and his value increased exponentially.

At that point, it would have been strange if Russia didn’t help Trump. After all, Russians covertly support allied politicians abroad all the time. Putin naturally sees intelligence work as central to foreign policy, and his foreign policy is fundamentally threatened by democratic, socially progressive Western Europe. During his tenure, Russia has formed overt or covert ties to right-wing parties in France, Germany, Austria, Hungary, Greece, and Bulgaria. France’s right-wing party received an $11 million loan from Russia; its counterparts in Bulgaria and Greece were alleged (but not proved) to have taken funding under the table, too. More often, Russians intermingle financial dealings with political subterfuge in a complex web that appears superficially legitimate.


...For all the ambiguous, suspicious facts surrounding Trump’s ties to Russia, Manafort’s role is the most straightforward. He is an utterly amoral consultant and spent at least a decade directly advancing Russian foreign-policy interests while engaging in systemic corruption.

The story begins in 2005, when Manafort proposed to work for billionaire Russian aluminum magnate Oleg Deripaska. Manafort, a Republican operative who had hired himself out to a variety of global villains, promised he would “influence politics, business dealings, and news coverage inside the United States, Europe, and former Soviet Republics to benefit President Vladimir Putin’s government” in a memo described by the Associated Press.

Russia’s oligarchs put their wealth and power at Putin’s disposal, or they don’t remain oligarchs for long. This requirement is not lost on Deripaska. “I don’t separate myself from the state,” Deripaska told the Financial Times in 2007. “I have no other interests.” A 2006 U.S. diplomatic cable described him as “among the 2-3 oligarchs Putin turns to on a regular basis.” Working for Deripaska meant working for Putin.

There’s no doubt Manafort’s offer was taken up. Deripaska hired Manafort for $10 million a year, and Manafort worked to advance Russian interests in Ukraine, Georgia, and Montenegro. Manafort brought on as his business partner in these endeavors Konstantin Kilimnik, a former member of Russia’s foreign military-intelligence agency who-- according to an indictment by Mueller — still has ties to Russian intelligence.

The mystery is exactly when, or whether, Manafort’s service to Deripaska-- which is to say, to Putin-- ended. He has hidden many of his proceeds and indeed now faces charges of money laundering. In 2010, Manafort received a $10 million loan from Deripaska, which he funneled through his shell company. (Manafort had used the same shell company to buy an apartment in Trump Tower, for cash, in 2006.)

Spending lavishly and deep in debt, Manafort went underground in 2014. Deripaska, seeking to recover funds he believed Manafort owed him, went to court, where one of his lawyers stated, “It appears that Paul Manafort and Rick Gates”-- Manafort’s longtime associate-- “have simply disappeared.” Two years later, Manafort resurfaced as Trump’s campaign manager, with Gates as his deputy, and set out to use his position to regain favor with his estranged patron. In leaked emails to Kilimnik, Manafort referred to his new standing and asked, “How do we use to get whole?” Kilimnik assured Manafort, “We will get back to the original relationship.” That is, Manafort was asking about, and Kilimnik was confirming, the possibility of trading his position as Trump’s campaign manager for debt forgiveness from Deripaska.

This much was clear in March 2016: The person who managed the campaign of a pro-Russian candidate in Ukraine was now also managing the campaign of a pro-Russian candidate in the United States. And Trump’s campaign certainly looked like the same play Putin had run many times before: Trump inflamed internal ethnic division, assailed the corruption of the elite, attacked Western allies while calling for cooperation with Russia, and sowed distrust in the fairness of the vote count. And in addition to deploying social-media bots and trolls, Russia apparently spent directly to help elect Trump. The FBI is investigating Alexander Torshin, a Russian banker who built ties to Republicans and allegedly funneled campaign funds to the National Rifle Association, which spent three times as much to help Trump as it had on behalf of Romney four years earlier.

Trump surrounded himself with several staffers, in addition to Manafort, with unusually close ties to Russia. His national-security adviser, Michael Flynn, had traveled to Moscow in 2015 to fête Putin at a banquet; George Papadopoulos met with Russian officials during the campaign; Russia had marked Carter Page as a possible asset. Michael Cohen and Felix Sater, the two business associates of Trump’s with decades-long ties to Russian organized crime, engaged in a mix of diplomatic and commercial negotiations with Russia during the campaign.


Several Trump advisers knew Russia was working to help Trump. Papadopoulos let it slip that Russia had dirt on Clinton; Roger Stone, a former longtime business partner of Manafort’s who communicated regularly with Trump throughout the campaign, knew what material WikiLeaks had obtained, according to two associates. Stone also repeatedly boasted of his back-channel contacts to Julian Assange and flaunted advance knowledge of what dirt Assange had. Between a pair of phone conversations Donald Jr. had to set up his Trump Tower meeting, he spoke with someone with a blocked phone number. (His father has a blocked phone number.) John K. Mashburn, a former campaign and current White House staffer, testified in March that he recalled receiving an email in early 2016 that Russia had negative information on Clinton.

Russia’s hacking appears, in short, to have been common knowledge within the campaign. Despite that, Trump repeatedly denied that Russia had any involvement with the email hacking, suggesting China or a 400-pound man might be the true culprit. Trump and his advisers also made at least 20 false public denials that they had any contact with Russian officials during the campaign.

...One example of the kind Trump’s campaign may still be hiding came briefly to light two summers ago. In July 2016, a loose-knit community of computer scientists and cybersecurity experts discovered a strange pattern of online traffic between two computer servers. One of those servers belonged to Alfa Bank in Moscow and the other to the Trump Organization. Alfa Bank’s owners had “assumed an unforeseen level of prominence and influence in the economic and political affairs of their nation,” as a federal court once put it.

The analysts noted that the traffic between the two servers occurred during office hours in New York and Moscow and spiked in correspondence with major campaign events, suggesting it entailed human communication rather than bots. More suspiciously, after New York Times reporter Eric Lichtblau asked Alfa Bank about it but before he brought it up with the Trump campaign, the server in Trump Tower shut down. The timing strongly implied Alfa Bank was communicating with Trump.

In October, Slate’s Franklin Foer broke the story of the servers and the computer scientists’ analysis about what it seemed to mean, which he called “a suggestive body of evidence that doesn’t absolutely preclude alternative explanations.” When Foer’s story landed, the political world treated it as insane. Vox, which had dismissed reports about Trump’s secret Russian ties as “poorly evidenced conspiracy theories,” savaged the server report. The Intercept called it “wacky.” Lichtblau reported that the FBI was investigating the server but that it “ultimately concluded that there could be an innocuous explanation, like a marketing email or spam, for the computer contacts.”

That story became famous primarily for its headline conclusion, “Investigating Donald Trump, FBI Sees No Clear Link to Russia.” And yet, CNN reported in March 2017 that the FBI’s investigation into the server remained open. Meanwhile, the biggest mystery of Foer’s story-- why did Trump and Russia need a computer server to communicate?-- now has a coherent answer.

It was already apparent in 2016 that the highest-profile parts of Russia’s messaging machine, like RT and Sputnik, were biased toward Trump. But now we know that its social-media activity employed precise demographic and geographic targeting — far more precise than a foreign country would be expected to have and notably concentrated on “key demographic groups in areas of the states that turned out to be pivotal,” CNN reported. That information is highly valuable: When a Republican staffer named Aaron Nevins received stolen Democratic Party voter-profile data from Guccifer 2.0, the Russian-backed hacker, that summer, he wrote to the hacker, “This is probably worth millions of dollars.” The Alfa Bank server connection might not have been put to the exact same kind of collaborative purpose, but Russia’s social-media operation needed some fine-grained expertise to direct its targeted messages. It likely got it from somebody connected to Trump and quite possibly used the server to transmit directly with Trump Tower. If that server was transmitting data to and from Moscow, who in Trump Tower was feeding it?

...Now that he’s in office, Trump’s ties to Russia have attracted close scrutiny, and he has found his room to maneuver with Putin sharply constrained by his party. In early 2017, Congress passed sanctions to retaliate against Russia’s election attack. Trump lobbied to weaken them, and when they passed by vetoproof supermajorities, he was reportedly “apoplectic” and took four days to agree to sign the bill even knowing he couldn’t block it. After their passage, Trump has failed to enforce the sanctions as directed.

Trump also moved to return to Russia a diplomatic compound that had been taken by the Obama administration; announced that he and Putin had “discussed forming an impenetrable Cyber Security unit” to jointly guard against “election hacking”; and congratulated the Russian strongman for winning reelection, despite being handed a card before the call warning: “Do not congratulate.”

More recently, as Trump has slipped the fetters that shackled him in his first year in office, his growing confidence and independence have been expressed in a series of notably Russophilic moves. He has defied efforts by the leaders of Germany, France, Britain, and Canada to placate him, opening a deep rift with American allies. He announced that Russia should be allowed back into the G7, from which it had been expelled after invading Ukraine and seizing Crimea. Trump later explained that Russia had been expelled because “President Obama didn’t like [Putin]” and also because “President Obama lost Crimea, just so you understand. It’s his fault-- yeah, it’s his fault.”

During the conference, Trump told Western leaders that Crimea rightfully belongs to Russia because most of its people speak Russian. In private remarks, he implored French president Emmanuel Macron to leave the European Union, promising a better deal. Trump also told fellow leaders “NATO is as bad as NAFTA”-- reserving what for Trump counts as the most severe kind of insult to describe America’s closest military alliance. At a rally in North Dakota last month, he echoed this language: “Sometimes our worst enemies are our so-called friends or allies, right?”

Last summer, Putin suggested to Trump that the U.S. stop having joint military exercises with South Korea. Trump’s advisers, worried the concession would upset American allies, talked him out of the idea temporarily, but, without warning his aides, he offered it up in negotiations with Kim Jong-un. Again confounding his advisers, he has decided to arrange a one-on-one summit with Putin later this month, beginning with a meeting between the two heads of state during which no advisers will be present.

...Trump’s determination to conciliate Putin can’t be dismissed as casual trolling or some idle attraction to a friendly face. It has a serious cost: He is raising suspicions among the public, and among probably some hawkish Republican senators, whose support he very much needs against Mueller. His motive for these foreign-policy moves is obviously strong enough in his mind to be worth prolonging an investigation he is desperate to terminate.

There is one other way in which Trump’s behavior has changed in recent months. As Mueller has plunged deeper into his murky dealings with Russia, the president has increasingly abandoned the patina of innocence. Trump used to claim he would be vindicated, and his advisers insisted his periodic fits sprang from an irrational resentment that Mueller was tarnishing his election and obscuring his achievements.



Trump barely puts much effort into predicting a clean bill of health anymore. He acts like a man with a great deal to hide: declining to testify, dangling pardons to keep witnesses from incriminating him, publicly chastising his attorney general for not quashing the whole investigation, and endorsing Russia’s preposterous claims that it had nothing to do with the election at all. (“Russia continues to say they had nothing to do with Meddling in our Election!” he tweeted last month, contradicting the conclusion of every U.S. intelligence agency.) Trump’s behavior toward Russia looks nothing like that of a leader of a country it attacked and exactly like that of an accessory after the fact.

“After” could be optimistic. The logic of Russia’s role in helping Trump has not changed since the election. If Trump’s campaign hired hackers to penetrate his opponent’s communications or voting machines, they would risk arrest. But Putin can hire hackers with impunity. Mueller can indict Russians, and he has, but he can’t arrest them unless they decide to leave Russia. Outsourcing Trump’s hacking work to Putin made perfect sense for both men in 2016, and still does.

And if you’re Putin, embarking upon a coveted summit with the most Russophilic president since World War II, who is taking a crowbar to the alliance of your enemies, why wouldn’t you help him in 2018 and 2020? Ever since the fall of 2016, when Republican Senate Majority Leader Mitch McConnell privately turned down an Obama-administration proposal for a bipartisan warning to Russia not to interfere in the election, the underlying dynamic has been set: Most Republicans would rather win an election with Putin’s help than lose one without it. The Democrats, brimming with rage, threaten to investigate Russian activity if they win a chamber of Congress this November. For Putin to redouble his attack-- by hacking into voting machines or some other method-- would be both strategic and in keeping with his personality. Why stop now?

Meanwhile, the White House has eliminated its top cybersecurity position. That might simply reflect a Republican bias against bureaucratic expertise. But it might also be just what it looks like: The cop on the beat is being fired because his boss is in cahoots with the crooks.

Shortly before Trump’s inauguration, according to Israeli journalist Ronen Bergman, Israeli intelligence officials gathered at CIA headquarters, where they were told something astonishing: Russia, the agency believed, had “leverages of pressure” over the incoming president. Therefore, the agency advised the Israelis to consider the possibility that Trump might pass their secrets on to Russia. The Israelis dismissed the warning as outlandish. Who could believe that the world’s most powerful country was about to hand its presidency to a Russian dupe? That the United States government had, essentially, fallen?

A few months later, Trump invited Russian diplomats into the Oval Office. He boasted to them that he had fired “nut job” James Comey. “I faced great pressure because of Russia. That’s taken off.” At the same meeting, Trump passed on to the Russians a highly sensitive intelligence secret Israel had captured from a valuable source inside ISIS. It was the precise danger Israel had been cautioned about.

Like many of the suspicious facts surrounding Trump’s relations with Russia, it was possible to construct a semi-innocent defense. Maybe he just likes to brag about what he knows. Maybe he’s just too doddering to remember what’s a secret. And as often happens, these unwieldy explanations gained general acceptance. It seemed just too crazy to consider the alternative: It was all exactly what it appeared to be.



Today, only 2 senators-- Rand Paul (R-KY) and Mike Lee (R-UT)-- voted against Jack Reed's amendment-- cosponsored by, among others, Pat Toomey (R-PA), Marco Rubio (R-FL) and Johnny Isakson (R-GA)-- reaffirming the American commitment to NATO-- a very direct slap in the face of Trump and his affinity to Putin and the Kremlin. It passed 97-2. Also, earlier today, the Center for American Progress, released a new report from their Moscow Project, Putin's Payout: 10 Ways Trump Has Supported Putin's Foreign Policy Agenda. The gist of it:
Putin’s Goal: Weaken and divide the transatlantic alliance.
Putin’s Payout: Trump undermines US relationships with European allies and calls the US’s commitment to NATO into question.
Putin’s Goal: Degrade the European Union and foster pro-Russian political movements.
Putin’s Payout: Trump attacks the EU and actively supports anti-EU, Kremlin-backed parties.
• Putin’s Goal: Disrupt American leadership of the global economic order.
Putin’s Payout: Trump is eagerly pushing for an all-out trade war with Europe.
 Putin’s Goal: Build global resentment and distrust towards the US and stoke anti-American sentiment.
Putin’s Payout: America’s closest allies are explicitly suspicious and distrusting of the US because of Trump’s rhetoric and actions.
 Putin’s Goal: Relieve economic and domestic political pressure from US sanctions on Russia.
Putin’s Payout: Trump tries to roll back, impede, and blunt the impact of sanctions at every step.
 Putin’s Goal: Legitimize his regime in the eyes of the world.
Putin’s Payout: Trump repeatedly praises and defends Putin, lending the weight of the US presidency providing validation towards Putin’s cause.
Putin’s Goal: Revive Russia’s status as a great power and gain international recognition for its illegal seizure of Crimea.
Putin’s Payout: Trump publicly says that Crimea is part of Russia and calls for Russia to be welcomed back into the international community with no concessions.
Putin’s Goal: Continue to sow discord in Western democracies and avoid repercussions for interfering in US and European elections.
Putin’s Payout: Trump dismisses Russian interference and has done nothing to prevent future meddling, putting him at odds with his own intelligence community.
Putin’s Goal: Soften America’s adversarial stance toward Russia.
Putin’s Payout: Trump is shifting the Republican Party’s generations-long hawkish views on Russia.
Putin’s Goal: Destabilize the US from within.
Putin’s Payout: Trump attacks US institutions while driving divisive politics and eroding democratic norms.


          Hacker Bobol Akun Facebook Plt Gubernur Pengganti Irwandi Yusuf      Cache   Translate Page   Web Page Cache   
Gubernur Aceh Nonaktif Irwandi Yusuf kini berada di tahanan KPK karena kasus korupsi.
          The Register: Ukrainian hackers help Philadelphia pastor in $100 million newswire-tapping heist      Cache   Translate Page   Web Page Cache   

Two former investment bankers, one of whom is also a priest, have been found guilty of an elaborate scam – hacking newswires to read press releases prior to publication, and trade millions using this insider information. Vitaly Korchevsky, formerly a veep at Morgan Stanley and a pastor at the Slavic Evangelical Baptist Church in Philadelphia, […]

The post The Register: Ukrainian hackers help Philadelphia pastor in $100 million newswire-tapping heist appeared first on KyivPost.


          Un hacker intenta vender documentos militares estadounidenses en la dark web por sólo 150 dólares      Cache   Translate Page   Web Page Cache   

Dark Web

Ya sabemos que en la dark web podemos encontrarnos material muy sorprendente y, en muchos casos, ilegal. Esto le ocurrió a Andrei Barysevich, director de la compañía Recorded Future (especializada en inteligencia de amenazas en tiempo real).

Andrei asegura que se encontró un manual del drone MQ-9 Reaper, un vehículo aéreo no tripulado que es utilizado por militares estadounidenses. Lo que más le llamó la atención es que un hacker intentaba venderlo por tan sólo 150 dólares.

Este drone fue creado por General Atomics Aeronautical Systems y en febrero de 2001 hizo su primer vuelo. Está equipado con un motor turbohélice, con el que puede alcanzar una gran velocidad. Está considerado como el "el drone más letal".

Un adversario podría conocer sus capacidades técnicas y debilidades

Al parecer, este hacker consiguió hacerse con el manual tras haberlo robado a un capitán de la Fuerza Aérea. Lo hizo explotando una vulnerabilidad de los routers Netgear, utilizando una contraseña por defecto.

"Este tipo de documentos normalmente consiguen robarlos hackers expertos de otras naciones. No los venderían en la dark web y menos por 150 dólares", asegura Andrei. A pesar del bajo precio, sorprende que no haya conseguido venderlo:

"Llevo investigando la dark web desde hace 15 años y es la primera vez que me encuentro documentos de esta naturaleza".

Aunque este documento no está considerado como clasificado, los investigadores de Recorded Future consideran que es "altamente sensible" y "podría darle a un adversario la habilidad de evaluar las capacidades técnicas y las debilidades de una de las aeronaves más avanzadas tecnológicamente".

Por su parte, Netgear asegura que lanzaron una actualización en 2016 "que arregla este problema". Esta noticia nos vuelve a recordar que la seguridad de la red de nuestra casa es nuestra responsabilidad, y debemos extremar las precauciones si poseemos algún tipo de información sensible.

En Genbeta | Este vídeo muestra lo terrorífico que sería un mundo dominado por armas con inteligencia artificial

También te recomendamos

Desafiando todos los obstáculos: los impactantes retratos y fotografías de acción del Embajador de Canon Samo Vidic

Sigue estos consejos de la AEPD para proteger tus datos y prevenir delitos en Internet

Qué es la Deep Web y en qué se diferencia de la Dark Web

-
La noticia Un hacker intenta vender documentos militares estadounidenses en la dark web por sólo 150 dólares fue publicada originalmente en Genbeta por Santi Araújo .


          Comentário sobre Curso de Hacker por Paulo Tacio      Cache   Translate Page   Web Page Cache   
Sim, esta atualizado, mantivemos o post original para que os clientes tivessem um feedback dos comentários. Abração!!!
          Comentário sobre Curso de Hacker por Ricardo      Cache   Translate Page   Web Page Cache   
Prezado, a data que observei no site é de ano de 2010. Seu curso está atualizado? Grato
           Hacker Caught Selling Maintenance Manuals for Military Drones      Cache   Translate Page   Web Page Cache   
A poorly configured router allowed the theft of drone manuals, a list of maintainers, material on the Abrams tank, and more.
          Hackers Steal 600 Gallons Of Gas In Detroit      Cache   Translate Page   Web Page Cache   
Local news reports from Detroit reveal that the police are looking for two suspects who allegedly managed to steal 600 gallons of gasoline from a gas station by hacking a gas pump. The theft is valued at around $1,800 and it took place in the middle of the day and was ongoing for almost 90 minutes. The gas station attendant was unable to do anything to stop the hackers. Fox […]
          lipa_fv: ЧТО ДЕЛАТЬ, ЕСЛИ СВЕЛО НОГУ      Cache   Translate Page   Web Page Cache   

Эти простые советы пригодятся вам на море или в походе, на крутом подъёме.

Что сделать с судорогой в ноге прямо сейчас

Вот три приёма экстренной помощи, которые помогут быстро справиться с судорогой любой из ножных мышц. Выбирайте любой или комбинируйте в зависимости от ситуации.

4843185_sudoroga (600x354, 14Kb)

1. Нагрузите пострадавшую ногу

Встаньтена неё и поперекатывайте вес с носка на пятку. Вариант — попрыгайте на одной ножке. Это поможет сокращённой мышце расслабиться.

2. Сделайте растяжку

Иногда бывает, что нагрузить ногу нельзя. Например, вы плывёте или находитесь на неровной, крутой, неустойчивой поверхности. В этом случае растяжка — наиболее безопасный вариант самопомощи.

Если свело икру, сядьте, положите прямые ноги перед собой и двумя руками потяните носок пострадавшей ноги на себя. Если вы плывёте, просто попробуйте без помощи рук поднять носок к голени.

Если свело переднюю часть бедра, встаньте, обопритесь рукой на что-нибудь устойчивое, согните пострадавшую ногу в колене и потяните носок к ягодице. Во время плавания наберите в лёгкие побольше воздуха, чтобы не бояться погрузиться под воду, согните ногу в колене и уже двумя руками постарайтесь подтянуть носок к ягодице.

Вы должны почувствовать, как тянутся соответствующие мышцы. В этом случае наступит облегчение. Если же растяжку по каким-то причинам сделать сложно, переходите к третьему варианту.

3. Сделайте массаж

Активно помассируйте пострадавшую мышцу пальцами или любым подручным массажёром. Можете даже ущипнуть.

Ваша задача — обеспечить прилив крови к пострадавшему месту. Это поможет снять спазм.

На ускорение кровообращения рассчитывали и бабушки, советовавшие прикалывать к плавкам булавку и тыкать ею в мышцу при судороге в воде. Это тоже своеобразный массаж. Только, мягко скажем, негигиеничный. Ведь неизвестно, какая зараза плавает вокруг вас. Поэтому прибегать к такому способу можно лишь в крайних случаях.

Почему сводит ноги

Судороги — довольно редкое явление. Большинство людей сталкиваются с ними буквально несколько раз в жизни. Если у вас не так и мышечные спазмы приходят регулярно, важно разобраться, что их провоцирует.

1. Вы перенапряглись

Мышечное напряжение нередко связано с микротравмами — крохотными повреждениями и даже разрывами мышечных волокон. Заживление таких травм сопровождается знакомой многим крепатурой, а иногда и судорогами.

Кроме того, интенсивные нагрузки вызывают перевозбуждение нервных волокон, идущих от мускулов к спинному и головному мозгу. А это приводит к непроизвольным спазмам.

2. У вас неудобная обувь

Туфли давят, у них не подходящая вашей ступне колодка или, положим, не тот размер, из-за чего вы вынуждены «придерживать» обувь пальцами. Всё это, во-первых, ухудшает кровообращение в ногах, а во-вторых, заставляет мышцы неестественно и постоянно напрягаться. В итоге, когда «испанский сапог» наконец-то снят, мышца не верит своему счастью и не может расслабиться — её сводит судорогой.

3. Вы переохладились

Большая разница температур окружающей среды и тела вызывает спазм сосудов. А связанное с этим нарушение кровообращения может стать причиной болезненного сокращения мышц.

Такая разница температур нередко возникает во время купания. Кроме того, пловец, как правило, ещё и активничает, то есть на спазм сосудов накладывается перенапряжение.

4. Вам не хватает магния, калия и других микроэлементов

Магний, калий, натрий, кальций — важнейшие электролиты, недостаток которых ухудшает проводимость нервных сигналов в мышечных волокнах и может вызвать судороги мышц.

5. У вас варикоз

Ну или болезнь только начинает развиваться. Из-за нарушений в работе сосудов мышцы ног могут испытывать дефицит питательных веществ.

6. Вы беременны

Судороги икроножных мышц — частые спутники второго и третьего триместров беременности. Причина их возникновения в данном случае не совсем ясна.

7. Возможно, у вас склонность к судорогам

Нередко возникновение спазмов связано с индивидуальными «настройками» нервной системы. Кто-то вообще не сталкивается с судорогами, а кого-то они преследуют после каждого интенсивного похода в спортзал или, положим, во время плавания.

Что делать, чтобы судороги в ногах не повторялись

1. Чтобы не сталкиваться с противным ощущением, достаточно соблюдать несложные правила.

2. Не усердствуйте с физнагрузками, знайте свою норму.

3. Выбирайте удобную обувь.

4. Следите за тем, чтобы в вашем рационе были продукты, содержащие магний, калий, кальций, натрий. Это бананы, орехи, нежирное мясо, молоко и кисломолочные продукты, цитрусовые, яблоки, груши, морковь…

5. Если у вас склонность к судорогам, постарайтесь вычислить факторы, которые провоцируют мышечные спазмы. В дальнейшем либо избегайте их, либо соблюдайте меры предосторожности. Например, при купании не заплывайте далеко от берега и не плавайте в одиночку.

6. Прежде чем делать то, что обычно заканчивается судорогой, выпейте стакан воды с имбирём и корицей. Такой напиток снизит риск возникновения спазма. Готовить питьё лучше загодя. 3 чайные ложки тёртого корня имбиря и 1 чайную ложку корицы залейте литром кипятка и дайте настояться 2–3 часа. Для вкуса можно добавить немного мёда.

Источник


          light2811: Запах розмарина увеличивает объем памяти на 75%      Cache   Translate Page   Web Page Cache   

Запах розмарина увеличивает объем памяти на 75%

Удивительная трава!

 

Розмарин широко используется в народной медицине уже несколько столетий. Еще в Древней Греции студенты носили его веточку в волосах накануне экзаменов.

Они считали, что он улучшает память.

Ссылка на розмарин есть и в шекспировском Гамлете, когда Офелия заявляет:

 

«Вот розмарин, для памяти; прошу тебя, люби и помни».

Исследования показывают, что это растение содержит урсоловую кислоту — вещество, которое борется со свободными радикалами, повреждающими мозг с возрастом. Есть в нем и другие кислоты, препятствующие повреждению радикалами молекул ДНК.

А еще розмарин предотвращает распад ацетилхолина — химиката, который служит топливом для клеток мозга, отвечающих за память и коммуникацию.

Несколько серьезных научных экспериментов показали, что эфирное масло розмарина увеличивает шанс запоминания сложной новой информации на 60-75%. Во всяком случае, именно настолько оказались выше оценки в тестах на память и внимательность у тех, кому давали им надышаться перед экзаменом.

Почему это происходит?

Крутой журнал для экспертов в психофармакологии The Therapeutic Advances in Psychopharmacology предполагает, что причина — в соединении 1,8-цинеол. Он содержится в розмарине, и есть данные, что он улучшает работу памяти.

Ученые советуют вдыхать экстракт розмарина перед выполнением важных задач. Если вы будете так делать, то время важных совещаний, переговоров и собеседований станете испытывать меньше стресса, а скорость и точность мышления вырастет как минимум в полтора раза. Настроение тоже улучшится.

Современная фитотерапия использует розмарин в качестве мягкого обезболивающего, которое избавляет от мигрени и болей в животе.

Может, пришла пора его купить?


          PUBG Streamer Shroud Banned for Teaming Up with Game Hackers      Cache   Translate Page   Web Page Cache   
PUBG has been facing a lot of issues lately, because of the many bugs and glitches. But the biggest issue that the development team has been facing is cheating. Hackers have been plaguing the game, and PUBG Corp. has been trying hard to crack down on cheating. And their latest action has just showcased that […]
          A desperate hacker tried selling US military files for $150 — only to find no one wanted them      Cache   Translate Page   Web Page Cache   

us air force drone control kandahar afghanistanReuters/Josh Smith

  • A hacker who got ahold of sensitive US military documents tried to selling them on a dark-web forum, only to find no one wanted to buy them.
  • The sensitive information the hacker attempted to sell included a maintenance manual for the MQ-9A Reaper drone, a list of airmen assigned to a Reaper drone unit, manuals on how to suppress improvised explosive devices, and an M1 Abrams tank manual.
  • The hacker also tapped into live footage of surveillance cameras at the US-Mexico border and NASA bases, and an MQ-1 Predator flying over the Gulf of Mexico.
  • The hacker, who is believed to reside in a poverty-stricken country in South America, said his internet connection was slow and that because his bandwidth was limited, he did not download all the files prior to finding a willing buyer.
  • Undercover analysts alerted US officials and the vulnerable computers were taken offline, which inadvertently cut off the hacker's access to the files.
  • Analysts say they have a "good level of confidence" about the hacker's identity.

A hacker who got ahold of sensitive US military documents tried to sell them on a dark-web forum — only to find there were no buyers. The hacker was forced to lower his price to $150.

After a team of undercover analysts from Recorded Future's Insikt Group embedded themselves with users from the dark-web forum, they came across the hacker who exploited a simple vulnerability on Netgear-brand routers.

See the rest of the story at Business Insider

NOW WATCH: Trump pitched peace to Kim Jong Un with this Hollywood-style video starring Kim as the leading man

See Also:


          Chinese hackers train sights on Cambodia in run-up to elections, cybersecurity firm says      Cache   Translate Page   Web Page Cache   
Chinese cyberspies have targeted Cambodian government institutions, opposition party members, diplomats and media, possibly to gather information ahead of elections later this month, according to cybersecurity firm FireEye.The hacks are suspected to come
          Wednesday’s Show Info. (7/11/18)      Cache   Translate Page   Web Page Cache   
Daily List: 3 Ways To Get Rid of Guests Who’ve Overstayed Their Welcome https://lifehacker.com/5920945/how-to-get-rid-of-people-whove-overstayed-their-welcome Laguna Gray Baseball Fundraiser 5109 Laguna Blvd. Friday 11 am to 10 pm Mention Laguna Gray National Bridal Event July 20-29 Sparkle Bridal https://sparklebridalcouture.com/ Power Of Voice Award July 18, 5-8pm Clunie Community Center 601 Alhambra Blvd. http://www.accesssacramento.org Caviar Day Preview […]
          Read A Hacker Manifesto Ebook Online      Cache   Translate Page   Web Page Cache   

SUMMARY OF THE BOOK : A Hacker Manifesto "A Hacker Manifesto" deftly defines the fraught territory between the ever more strident demands by drug and media companies for protection of their patents and copyrights and the pervasive popular culture of file sharing and pirating. Full description BOOK DETAIL : -Author : Mckenzie Wark -Language : English -Grade Level : 1-2 -Product Dimensions : 8.6 x 0.7 x 9.2 inches -Shipping Weight : 18.7 ounces -Format : BOOKS -Seller information : Mckenzie Wark ( 1* ) -Link Download : https://newsselller12.blogspot.com/?book=0674015436 -------- Do not hesitate !!! ( Reviewing the best customers, read this book for FREE GET IMMEDIATELY LINKS HERE https://newsselller12.blogspot.com/?book=0674015436 )
          US firm: Chinese hackers infiltrated Cambodia’s politics      Cache   Translate Page   Web Page Cache   

U.S. cybersecurity firm FireEye says it has found evidence that a Chinese hacking team it believes is linked to Beijing has penetrated computer systems belonging to Cambodia's election commission, opposition leaders and media

The post US firm: Chinese hackers infiltrated Cambodia’s politics appeared first on FederalNewsRadio.com.


          ကုိသန္းလြင္ ● ကုန္သြယ္ေရးစစ္ပြဲ      Cache   Translate Page   Web Page Cache   
ကုိသန္းလြင္ ● ကုန္သြယ္ေရးစစ္ပြဲ
(မုိးမခ) ဇူလုိင္ ၁၁၊ ၂၀၁၈

(၁)
လြန္ခဲ့ေသာလက ေဘဂ်င္းသို႔ ကြၽန္ေတာ္ေရာက္ခဲ့ပါသည္။ ေဘဂ်င္းၿမိဳ႕သို႔ေရာက္လ်င္ ဂူးဂဲလ္၊ ေဖ့ဘြတ္ႏွင့္ အူဘာ (Google, Facebook, Uber) တို႔ကိုသံုး၍မရႏိုင္ေၾကာင္း သိပါသည္။ ကြၽန္ေတာ္သည္ အျပင္မွာသုံးစြဲရသည့္အရာမ်ား တ႐ုတ္ျပည္မွာ မရႏိုင္ဆိုျခင္းမွာထူးဆန္းေနသည္။ တ႐ုတ္တို႔ကစိတ္အေႏွာင့္အယွက္ျဖစ္ဟန္ မတူ၊ သူတို႔သည္သူတို႔ႏိုင္ငံမွလုပ္သည့္ Baidu ကို ဂူဂဲလ္အစားႏွင့္ ဆိုရွယ္မီဒီယာအတြက္ “Wechat" သုံးမည္။ တကၠစီငွားလိုပါလ်င္ “Didi”  ကိုသုံးမည္၊ သတင္းေတြဖတ္လိုလ်င္ Toutiao ကို သံုးမည္။ ေဘဂ်င္းတြင္လုပ္သမွ်ကို အစိုးရက ေစာင့္ၾကည့္ေနမည္ဆိုျခင္းကို သိပါ သည္။ ဤအလုပ္ကို သာမန္ျဖစ္ေသာ လုပ္ေနက် အလုပ္တခုသဖြယ္ သေဘာထားၾကပါသည္။

(၂)
တ႐ုတ္အစိုးရအေနျဖင့္ သူတို႔ႏိုင္ငံသားမ်ားအတြက္ မိမိကိုယ္ပိုင္တံဆိပ္ (Brand) ျဖင့္သာ သုံးစြဲခြင့္ေပးခဲ့ပါသည္။ လြတ္လပ္ ခြင့္ (Privacy) ဆိုသည္မွာမရွိ။ သူတို႔၏တကယ့္ရည္ရြယ္ခ်က္မွာ သူတို႔တံဆိပ္ကိုတ႐ုတ္ ျပည္၌သာမက တကမၻာလုံးစိုးမိုးရန္ရည္ရြယ္ရင္းပင္ျဖစ္သည္။ အေမရိကန္ႏွင့္အေပါင္းအပါတို႔ကလည္း တ႐ုတ္တို႔ၾကီးစိုးမည့္အေရးကို အစြမ္းကုန္ ကာကြယ္ ၾကမည္ျဖစ္သည္။

သမၼတထရန္႔မွာ ထိုစစ္ပြဲတြင္ အေမရိကန္ႏိုင္ငံကို ဦးေဆာင္ႏိုင္ဖြယ္မရွိ။ သူမၾကာခင္က သတ္မွတ္လိုက္ေသာ သံမဏိႏွင့္ အလူမီနီယမ္တို႔အေပၚ တင္းၾကပ္အခြန္ေကာက္ခံမည့္ စီမံကိန္းကို တ႐ုတ္ျပည္သာမက မိတ္ေဆြႏိုင္ငံျဖစ္သည့္ကေနဒါႏွင့္ဂ်ာမနီအပါအ၀င္ ဥေရာပေကာင္စီ ႏိုင္ငံမ်ားက ဆန္႔က်င္လ်က္ရွိသည္။ သို႔ေသာ္ သံမဏိအေပၚအခြန္ေကာက္ျခင္းမွာ ျဖစ္ ပြားဖြယ္ရွိေသာ တ႐ုတ္ႏွင့္ကုန္သြယ္ေရးစစ္ပြဲႏွင့္စာေသာ္ ဘာမွအရာ မေရာက္သည့္ကိစၥျဖစ္သြားသည္။ ေရရွည္တြင္ မည့္သည့္ႏိုင္ငံက စီးပြားေရးတြင္ၾကီးစိုးမည္ကို စက္မႈစြမ္းအား (Technology) က အဆုံးအျဖတ္ေပးပါလိမ့္မည္။ တိုင္းျပည္ တခုတြင္ လူတို႔၏ လုပ္အားႏွင့္ ရင္းႏွီးေငြသည္ ဂ်ီဒီပီ GDP ၏ ၂၀ ရာခုိင္ႏႈန္းမွ်သာ ရွိျပီး က်န္ ၈၀ ရာခုိင္ႏႈန္းမွာ စီးပြားေရးတိုး တက္မႈဘက္မွျဖစ္သည္။ ထုတ္ကုန္တိုးျမႇင့္ေရးအတြက္ စက္မႈအားကို အဘယ္မွ်သုံးႏိုင္မည္ဆိုသည့္အေပၚတြင္ မူတည္ပါ သည္။

တ႐ုတ္ျပည္၏ရည္မွန္းခ်က္မ်ားတြင္ သူတို႔လူေနမႈအဆင့္အတန္းကို အေနာက္ႏိုင္ငံတို႔သို႔ အမွီလိုက္ရန္တခု အပါအဝင္ျဖစ္ သည္။

လူေပါင္းမ်ားစြာက တ႐ုတ္၏ထုတ္ကုန္အေပၚတြင္ အခြန္ေကာက္ခံဖို႔အေရးကို ရႈံခ်ေနၾကေသာ္လည္း တ႐ုတ္ျပည္အေပၚ တြင္ ေဒၚလာ ၆၀ ဘီလီယံမွ် အေကာက္ခြန္ကိုခ်မွတ္ေသာအခါ ဝမ္းသာေနၾကသည္။ အကယ္၍ တ႐ုတ္ျပည္က တန္ျပန္ အေကာက္ခြန္ကို သတ္မွတ္ပါလွ်င္ေနာက္ထပ္ ၂၀၀ ဘီလီယံတိုးခ်မည္ဟုလည္း ၿခိမ္းေျခာက္ထားသည္။ ထိုအေတာအတြင္း တ႐ုတ္တို႔၏ ရင္းႏွီးျမႇဳပ္ႏွံမႈႏွင့္ အေမရိကန္တို႔ႏွင့္ စက္မႈဆိုင္ရာဗဟုသုတမ်ားကို တ႐ုတ္ျပည္သို႔တင္ပို႔ျခင္းကိုလည္း ေသခ်ာ စိစစ္ေနသည္။

မစၥတာထရန္႔က သူသမၼတမျဖစ္မီကတည္းက စတင္ေနခဲ့ေသာ ကုန္သြယ္ေရးစစ္ပြဲကုိ ပိုမိုက်ယ္ျပန္႔ေအာင္၊ အရွိန္အဟုန္ရ ေအာင္ ေဆာင္ရြက္ေနသည္။ ၂၀၀၈ ခုႏွစ္ ဘ႑ာေရးအႀကပ္အတည္းၿပီးကတည္းက ႏိုင္ငံမ်ားမွာ ေဘာ္ဒါကိုေက်ာ္ျဖတ္၍ ကူးသန္းေရာင္း၀ယ္ေရးအတြက္ ကုန္စည္ႏွင့္ ေငြကူးသန္းျခင္းႏွင့္ လူျဖတ္သန္းျခင္း (Immigration) တို႔ကို အတားအဆီးမ်ား ျပဳလုပ္ၾကသည္။ ဂလိုဘယ္လိုက္ေဇးရွင္း၏ ခ်န္ပီယံမ်ားက ႏိုင္ငံတို႔၏ နယ္နိမိတ္မ်ားျပိဳက်ပ်က္စီးရမည္ဟု နိမိတ္ဖတ္ေနခ်ိန္ တြင္ တ႐ုတ္ျပည္က သမၼတထရန္႔၏ တ႐ုတ္ျပည္ႏွင့္ ပတ္သတ္လ်င္ တင္းမာေသာ သေဘာထားမွာ ေျပာင္းျပန္ျဖစ္ေနသည္။
အေနာက္ႏိုင္ငံမ်ားက တ႐ုတ္ႏိုင္ငံသည္ တရားမ၀င္ေသာ နည္းလမ္းမ်ားျဖင့္ အေနာက္ႏိုင္ငံမ်ားကို အမွီလိုက္လာေနသည္။ တ႐ုတ္ျပည္တြင္ ရင္းႏွီးျမႇဳပ္ႏွံရန္ ေရာက္ရွိလာေသာကုမၸဏီမ်ားကို သူတို႔၏အတတ္ပညာမ်ားကို အတင္းသံုးခိုင္းသည္။ သူတို႔၏သတင္းခိုးယူသူမ်ားက (hacker) မ်ားက အတတ္ပညာကိုခိုးယူသည္။ ၁၉ ရာစုႏွစ္က အေမရိကားသည္လည္း အဂၤလန္ႏိုင္ငံမွ တက္ခႏိုလိုဂ်ီကို ကူးခ်ဘူးသည္။ ဂ်ပန္ႏိုင္ငံ၏တိုးတတ္လာပံုမွာလည္း အေမရိကန္တို႔၏လုပ္ပံုကိုင္ပံုကို ကူး ခ်ျခင္းပင္ျဖစ္သည္။ ကူးယူပံုျခင္းတူေသာ္လည္း တ႐ုတ္တို႔လုပ္ၾကသည္မွာ ပို၍ေၾကာက္စရာေကာင္းသည္။

ေဘဂ်င္းသည္ ဂူဂဲႏွင့္ေဖ့စ္ဘြတ္ကို ႏိုင္ငံတြင္းသို႔အဝင္မခံ၊ (UBER) ကိုလည္း မတရားေသာနည္းမ်ားျဖင့္ ဖိအားကို သံုး လ်က္ ျပည္တြင္းကုမၸဏီတခုသို႔ ေရာင္းခ်ရသည္။ (Amazon) ကို တ႐ုတ္ျပည္မွထြက္ခြာသြားေအာင္ ဖိအားေပးသည္။ Chip Maker မာခရြန္ကို တ႐ုတ္ျပည္အေတြင္း သူတို႔ Chip မ်ားကိုမေရာင္းရဟု တားျမစ္ထားသည္။ ျပည္တြင္းေစ်းကြက္မွေငြကို ျပည္ပသို႔ထြက္မသြားရေအာင္လုပ္သည္။ ျပည္တြင္းကုမၸဏီမ်ားကို ႏိုင္ငံျခားတိုင္းျပည္မ်ားသို႔ လုပ္ငန္းသဘာဝ က်ယ္ျပန္႔ ေအာင္ ေဆာင္ရြက္ေပးသည္။

ယမန္ႏွစ္က ပုလဲဆိပ္ကမ္းကို “Greater Bay Area” ဟုနာမည္ေပး၍ ရွမ္းဇန္း ကံတံုၿမိဳ႕ႏွင့္ ေဟာင္ေကာင္ (Shenzhen, Guangzhou) တို႔ကို အေမရိကန္ႏိုင္ငံမွ အီလီကြန္ေတာင္ၾကားႏွင့္ ယွဥ္ျပိဳင္ႏိုင္ေအာင္ၾကိဳးစား မည္ဟုေၾကညာထားသည္။
တခ်ိန္က Made in China သည္ ေခတ္စားခဲ့ေသာ္လည္း၊ ယခုအခါ “တ႐ုတ္ျပည္တြင္ဖန္တီးသည္” (Create in China) ဆိုေသာစကားျဖင့္ အစားထိုးရန္ၾကံစည္ေနသည္။ တ႐ုတ္ျပည္တြင္ယခင္က ေနရာအႏွံ႔မွထုတ္လုပ္လိုက္ေသာပစၥည္းကို တေနရာတြင္ ျပန္လည္တပ္ဆင္ျပီးေရာင္းခ်ရသည္။ ယခုအခါ တေနရာတည္းတြင္ ပစၥည္းသစ္မ်ားကို တီထြင္ဖန္တီးထုတ္ လုပ္ျခင္းျဖင့္ ရွမ္ဇန္းျပည္နယ္သည္ ဆီလီကြန္းေတာင္ၾကားထက္ ပိုမိုေကာင္းမြန္ေသာအရာမ်ားကို ထုတ္လုပ္ႏိုင္သည္ဟူ ၍ေျပာေနၾကသည္။

ကမၻာတြင္ ေငြေၾကးေတာင့္တင္းေသာ အင္တာနက္ကုမၸဏီ ၂၀ အနက္ ၁၁ ခုမွာ အေမရိကန္မွျဖစ္ျပီး၊ ၉ ခုမွာ တ႐ုတ္ျပည္ မွျဖစ္သည္။ တ႐ုတ္ျပည္မွ လြန္ခဲ့ေသာ ၅ ႏွစ္က အင္တာနက္ကုမၸဏီ ႏွစ္ခုသာရွိသည္။ အလီဘာဘာႏွင့္ Tencent တ႐ုတ္ ကုမၸဏီ ႏွစ္ခုမွာအသံုးျပဳသူ ျပည္တြင္းမွ ၉၀ ရာခုိင္ႏႈန္းရရွိျပီး ဂူဂဲလ္, ေဖ့စ္ဘြတ္တို႔၏ ၁၀ ရာခုိင္ႏႈန္းသာ အေမရိကန္ႏိုင္ငံ အတြင္းမွ ျဖစ္သည္ကို ေတြ႔ရွိႏိုင္သည္။ တ႐ုတ္တို႔က ဤမွ်ႏွင့္အားမရႏိုင္ဘဲ ပိုမိုက်ယ္ျပန္႔လာ ေစရန္အား ထုတ္လ်က္ရွိသည္။
ထရန္႔အစိုးရက တ႐ုတ္ျပည္ကုမၸဏီမ်ား၏နယ္ပယ္ခံ အင္အားခ်ဲ႕ထြင္ျခင္းကို တားျမစ္လိုသည္။ မၾကာမီက မန္းနီးဂရမ္ (Money Gram) ေခၚ ေငြလႊဲကုမၸဏီကို တ႐ုတ္ျပည္မွဝယ္ယူရန္ ႀကိဳးစားျခင္းကို (Block) တားျမစ္ထားသည္။ Chip မ်ားျပဳ လုပ္ေသာ Qualcomm ကို Broadcomm က ဝယ္ယူရန္အစီအစဥ္ကိုလည္း ခြင့္မျပဳေပ။

ထရန္႔ကတ႐ုတ္တယ္လီကြန္ကုမၸဏီ ZTE သို႔ ကုန္ပစၥည္းေရာင္းခ်ရန္ (Supplier) မလုပ္ရန္ပိတ္ပင္လိုက္ေသာအခါ ZTE က အေမရိကန္ျပည္မွ အဓိကက်ေသာ ပစၥည္းမရရွိႏိုင္သည့္အတြက္ စက္႐ံုကိုပိတ္ရေတာ့သည္။ ထရန္႔က ZTE အေပၚခ်မွတ္ ထားသည့္တားျမစ္ခ်က္ကိုဖယ္ရွားရန္ ZTE က ေဒၚလာ ၅ ဘီလီယံ ဒဏ္ေၾကးေပးရန္ႏွင့္၊ အဓိကအုပ္ခ်ဳပ္မႈေကာ္မတီလူႀကီး မ်ားကိုထုတ္ပစ္ရမည္ဟု ေတာင္းဆိုသည္။ ထရန္႔က ထိုအေၾကာင္းကို ကြန္ဂရက္သို႔တင္ျပေသာအခါ ကြန္ဂရက္က သေဘာမတူခဲ့ေပ။

ထရန္၏လိုအပ္ခ်က္မ်ားမွာ Financial Technology ႏွင့္ AI Artificial Inteligence ဘက္တြင္ တ႐ုတ္ျပည္သို႔ စက္မႈပစၥည္း တင္ပို႔ျခင္းႏွင့္ အေမရိကန္ျပည္မွ ရင္းႏွီးျမႇဳပ္ႏွံမႈကို ကန္႔သတ္ရန္ျဖစ္သည္။ အလားတူ ဂ်ာမနီက တ႐ုတ္ျပည္ကုမၸဏီမ်ား ရင္းႏွီးျမႇဳပ္ႏွံျခင္းကိုကန္႔သတ္ျပီး၊ ႀသစေတးလ်က တ႐ုတ္တို႔၏ 5G Technology ကို ျပည္တြင္းသို႔အဝင္မခံရန္ စဥ္းစားေန သည္။

႐ုရွား၊ ဘရာဇီးႏွင့္ အျခားႏိုင္ငံမ်ားတြင္ မိမိတို႔ႏိုင္ငံအတြင္းျပည္သူမ်ားသံုးေသာ server မ်ားကို ႏိုင္ငံတြင္းတြင္   ထားရမည္ဟူ ေသာဥပေဒကို ခ်မွတ္ခဲ့သည္။ သို႔မွသာ ထိုဆာဗာမ်ား၏ အလုပ္လုပ္ရမႈမ်ားကိုေစာင့္ၾကည့္ရန္ Control လုပ္ရန္လြယ္ကူ မည္ျဖစ္သည္။ ကာတာ၊ အီရန္ႏွင့္ ယူေအအီးႏွင့္ အျခားႏိုင္ငံအမ်ားအျပားမွာ ႏိုင္ငံျခားတြင္ သံုးသည္။ WhatsApp ႏွင့္ ဗိုက္ဗာ (Viber) တို႔ကို တားျမစ္ထားသည္။

စီးပြားေရးကပ္ဆိုက္ၿပီဆိုလွ်င္ အေမရိကန္ ဥေရာပႏွင့္ဂ်ပန္ႏိုင္ငံတို႔တြင္ တင္ရွိေသာေႂကြးက မ်ားျပားလွပါသည္။ ဤသို႔ ဆိုလွ်င္ ထိုအစိုးရမ်ားအေနျဖင့္ စီးပြားေရးကပ္မွမွလြတ္ေျမာက္ရန္ မလြယ္ကူလွပါ။ ဤကဲ့သို႔အေျခအေနမ်ဳိးတြင္ ကိုယ္အက်ဳိးစီးပြားကို ကာကြယ္ျခင္း (Protectionism)  တခုသာလုပ္စရာရွိပါသည္။ မိမိအက်ိဳးကိုကာကြယ္ရန္အတြက္ ႏိုင္ငံတြင္းဝင္လာမည့္ကုန္ပစၥည္းအေပၚ အခြန္စည္းၾကပ္ျခင္းကိုသာ လုပ္ႏိုင္ၾကပါသည္။

ဤသို႔ျဖင့္ အေျမႇာ္အျမင္ႀကီးသူမ်ားက ခ်မွတ္ထားခဲ့ၾကေသာ (Free Trade) ႏွင့္ ဆန္႔က်င္ေသာအရာမ်ားသာ ဆက္တိုက္ျဖစ္ လာ ရန္ရွိပါသည္။ ရင္းႏွီးျမႇပ္ႏံွသူမ်ား ကုန္ထုတ္လုပ္သူမ်ား ေၾကာက္ႀကသည္မွာ ကုန္သြယ္ေရးစစ္ပြဲျဖစ္မွာကိုပဲျဖစ္ ပါ သည္။

(၃)
ထရန္႔၏အစိုးရကေသာၾကာေန႔က (ဇူလိုင္ ၆ ရက္)ေန႔က တ႐ုတ္ပစၥည္း ၃၄ ဘီလီယံေပၚတြင္ အခြန္စေကာက္ၿပီျဖစ္ရာ တ႐ုတ္က လက္တုန္႔ျပန္မည္အေရးကို ေစာင့္ရန္သာရွိေတာ့သည္။ လူအမ်ားကမူ ကုန္သြယ္ေရးစစ္ပြဲစၿပီဟု ေျပာဆိုေနၾက သည္။

ကိုသန္းလြင္
Ref: The coming Tech Battle with China, Ruchir Sharma Newyork Times June 28 2918


          I Compared Google's Chrome Browser With Its No. 1 Competitor - And The Winner Was Clear | Lifehacker Australia      Cache   Translate Page   Web Page Cache   

I Compared Google's Chrome Browser With Its No. 1 Competitor - And The Winner Was Clear https://t.co/0Y14rxZfZw via @flipboard — Doug Peterson (@dougpete) July 11, 2018

Tags: IFTTT Twitter


          Cheeks of Hema Malini: Mumbaikars Destined to End up in Potholes      Cache   Translate Page   Web Page Cache   
Reading Time: 3 minutesMumbai is where the Maharashtra Government’s seat is; where the Shiv Sena rules; where Raj Thackeray intimidates; where Bollywood tests the box-office; where cricket is played at all places and where roads are not like Hema Malini’s cheeks. Mumbai is also where annual Monsoon-invasions leave it crippled, drowning in filthy water, year after year. A […]
          US firm: Chinese hackers infiltrated Cambodia's politics      Cache   Translate Page   Web Page Cache   
BEIJING (AP) — The U.S. cybersecurity firm FireEye says it has found evidence that a Chinese hacking team it believes is linked to Beijing has penetrated computer systems belonging to Cambodia's election commission, opposition leaders...
          Secret method of hacking the iPhone is “fused” to hackers      Cache   Translate Page   Web Page Cache   
It revealed the developer. Last year it became clear that the company NSO Group learned to hack iPhone. Moreover, it began to sell the possibility of […] Read the original post by adminfsd
          Inside Mueller’s New Army      Cache   Translate Page   Web Page Cache   
Photo Illustration by Elizabeth Brockway/The Daily Beast

Chelsea Manning, Iranian extortionists, and Hillaryland’s original hacker—they’ve all been targets for prosecutors that now work for Team Mueller.

As special counsel Robert Mueller’s probe has quietly chugged along, outraging the president and encircling some of his top campaign officials, the investigation has slowly grown. When Mueller first started his investigation into potential coordination between the Trump campaign and the Kremlin, he brought on just over a dozen seasoned prosecutors—some from inside the Justice Department and others from private practice—to work on his team.

In the past six months, the number of prosecutors working on cases he has brought has expanded significantly, with new additions casting light on the special counsel’s potential priorities and focuses. Court filings show that at least half a dozen new names are participating in Mueller’s work, all current Justice Department prosecutors. Their backgrounds vary widely, from prosecuting violent crimes to cyber attacks.

Read more at The Daily Beast.

Got a tip? Send it to The Daily Beast here


          לחברת Hackeru הבינלאומית דרוש/ה מרצה לפיתוח אפליקציות Android ו-iOS      Cache   Translate Page   Web Page Cache   
לחברת Hackeru המובילה בתחום לימודי ההייטק דרוש/ה מרצה לפיתוח אפליקציות Android וiOS עם התמחות מקיפה ב- Server ו- Client.דרישותניסיון בפיתוח אפליקציות - חובה.ניסיון בהדרכה - חובה.ניסיון קודם בתפקיד דומה או זהה - יתרון.נדרשת בקיאות ברמת הדרכה:פיתוח אפליקציות בiOS HTML וHTML5CSS3.0NET.JavaScriptBootstrap, jQuery,JSAngularMySQLJavaSwift
          How To Retrieve Lost Text Messages With PhoneRescue For iOS      Cache   Translate Page   Web Page Cache   

If you ask any iPhone user to name top 5 most important things that are stored on their device, chances are the list will include text messages. The text messages that we exchange on a daily basis contain so much of our lives that it is hard to even imagine losing this data. Today messages […]

The post How To Retrieve Lost Text Messages With PhoneRescue For iOS appeared first on iOS Hacker.


          Cenzura din China pentru sistemul de operare iOS afectează şi iPhone-uri vândute în alte ţări din lume (Telefoane mobile)      Cache   Translate Page   Web Page Cache   

În ultima perioadă am întâlnit mai multe „atacuri” cu mesaje în format text, care duc la probleme cu ale sistemului de operare iOS, însă cea mai recentă este şi singura care pare să fi fost realizată cu intenţie. Se pare că nevoia de a cenzura anumite cuvinte sau simboluri în China a dus la un bug software care oprea orice aplicaţie folosea un anume caracter emoji, ba chiar şi aplicaţii care nu foloseau caracterul, în cazul în care primeau un mesaj în altă aplicaţie cu acesta.

China este probabil cea mai importantă piaţă pentru Apple în acest moment, iar compania încearcă să facă tot ce este posibil pentru a mulţumi guvernul chinez. Astfel, compania se supune tuturor regulilor şi cerinţelor chinezilor, precum mutarea informaţiilor utilizatorilor din China pe servere de pe teritoriul ţării şi eliminarea aplicaţiilor de tip VPN care ar oferi utilizatorilor de iPhone acces la internetul „necenzurat”.

Cenzura a ajuns atât de departe încât guvernul chinez a cerut celor de la Apple eliminarea pictogramei emoji care descrie steagul taiwanez, acest caracter fiind complet absent din lista emoji din China, iar primirea lui afişează simbolul pentru „caracter invalid”. Se pare însă că partea de cod scrisă special pentru această cenzură nu era tocmai perfect, putând afecta şi telefoane din alte regiuni, precum cele din Taiwan. Astfel, orice încercare de a trimite un mesaj cu acest caracter, sau orice tentativă de a citi un mesaj similar ducea la închiderea aplicaţiei.

Nu foarte multe dispozitive au fost afectate de această problemă. Se pare că apărea în funcţie de setările de locaţie şi limbă. Între timp însă Apple a corectat problema printr-un update software: iOS 11.4.1 descriind-o ca un „denial of service attack”. Acest bug a fost identificat prima dată de Patrick Wardle, fondatorul companiei de securitate Digita Security şi „hacker de profesie”, când o prietenă din Taiwan se plângea că telefonul său a fost „spart” de către hackeri chinezi, întrucât nu mai poate folosi emoji-ul cu steagul ţării.

 

(...)

Cuvinte cheie: cenzura china, cenzura iphone, ios 12 bug, iphone

Subiecte asemănătoare:
» Deoarece acest tip de conţinut este greu de cenzurat, China a interzis complet livestreamingul pe trei platforme importante
» China le-a interzis femeilor să facă transmisiuni live pe web în care mănâncă banane „într-un mod erotic”

Articol original - Cenzura din China pentru sistemul de operare iOS afectează şi iPhone-uri vândute în alte ţări din lume, de pe site-ul go4it.ro


          Un hacker a fost prins când încerca să vândă documente furate din computerele unei baze militare americane (Internet)      Cache   Translate Page   Web Page Cache   

Obişnuim să vedem în filme hackeri care sparg sisteme informatice ale guvernului şi armatei americane, însă în realitate aceste lucruri se întâmplă foarte rar, sau sunt oprite înainte ca cineva să poată accesa informaţii sensibile. Se pare însă că de data aceasta un hacker descris ca având „abilităţi moderate” a reuşit să pătrundă în sistemul unei baze militare, de unde a descărcat un manual pentru dronele de luptă ale Statelor Unite, cât şi diverse alte documente referitoare la tacticile de război ale armatei americane. Acesta a fost prins abia după ce a scos la vânzare o parte dintre documente.

Se pare că hacker-ul, care între timp a fost prins, însă identitatea sa nu a fost dezvăluită, a reuşit să acceseze reţeaua internă a bazei militare folosind o vulnerabilitate cunoscută încă din 2016 a unui router produs de Netgear. Astfel, acesta s-a putut conecta folosind această breşă direct la computerul capitanului unităţii, de unde a putut descărca fişierele printre care se regăseau manualul dronei MQ-9 Reaper, cea pe care americanii o folosesc de mai multă vreme în misiuni, cât şi mai multe manuale de antrenament, de supravieţuire şi tactici ale platonului de tanchişti.

Acţiunile acestui hacker pun la îndoială însă sistemele de securitate ale bazelor militare ale Statelor Unite. Recorded Future, organizaţia de securitate care a documentat acest eveniment spune că accesul neautorizat ar fi trebuit să fie depistat mai repede, acesta putând accesa sistemele bazei militare pentru mai bine de o săptămână. De asemenea, faptul că acesta nu este un hacker foarte competent ridică o altă problemă: cât de grave ar putea fi acţiunile unui grup organizat?

Hacker-ul a fost prins abia când după ce a încercat să pună la vânzare manualul dronei pentru o sumă între 150 şi 200 de dolari pe „dark web”, partea „întunecată” a internetului, unde majoritatea infractorilor cibernetici îşi vând produsele sau serviciile. În trecut aici au fost prinşi traficanţi de droguri, asasini şi chiar amatori de pornografie infantilă.

 

(...)

Cuvinte cheie: hacker, baza militara americana, drona militara

Subiecte asemănătoare:
» Hacker american, acuzat de crimă după ce un muncitor angajat să-i construiască o reţea secretă de tuneluri subterane şi-a pierdut viaţa într-un incendiu
» Guccifer 2.0: Un hacker care s-a dat drept român, apoi a dezvăluit date despre congresmeni democraţi, era agent GRU
» Adeanna Cooke, playmate-ul devenit hacker etic
» Go4news: Serviciul iCloud, compromis din nou. Imaginile private ale zeci de tinere din Scoţia au ajuns pe internet
» Un hacker care susţine că este român a dezvăluit date despre congresmeni democraţi din SUA

Articol original - Un hacker a fost prins când încerca să vândă documente furate din computerele unei baze militare americane, de pe site-ul go4it.ro


          US firm: Chinese hackers infiltrated Cambodia’s politics      Cache   Translate Page   Web Page Cache   

BEIJING (AP) — Last month, the daughter of a jailed Cambodian opposition party leader received an email from a well-seeming activist at a reputed Cambodian non-profit. For weeks, the sender nudged Monovithya Kem to open an attachment described as containing interview questions. Kem suspected a trap set by Cambodian hackers seeking access to her computer. […]
          A short film about disappointment / Joshua Mattson.      Cache   Translate Page   Web Page Cache   
cover image"An ingenious novel about art and revenge, insisting on your dreams and hitting on your doctor, told in the form of 80 movie reviews In near-future America, film critic Noah Body uploads his reviews to an underread content aggregator. His job is dreary routine: watch, seethe, pan. He dreams of making his own film, free of the hackery of commercial cinema. Faced with writing on lousy movies for a website that no one reads, Noah smuggles into his reviews depictions of his troubled life on the margins. Amid his movie reviews, we learn that his apartment in the vintage slum of Miniature Aleppo has been stripped of furniture after his wife ran off with his best friend--who Noah believes has possessed his body. He's in the middle of an escalating grudge match against a vending machine tycoon with a penchant for violence. And he's infatuated with a doctor who has diagnosed him with a "disease of thought." Exhausted by days spent watching flicks featuring monks with a passion for rock and roll and slashers featuring rampaging hairdressers, Noah is determined to create his own masterpiece: a filmed meditation on art-with-a-capital-A, written by, directed by, and starring himself"-- Provided by publisher.
          Finalmente!      Cache   Translate Page   Web Page Cache   
Gerard's Paella lands in Santa Rosa When I was a senior editor for Make magazine a few years back, the two biggest events of the year were the Maker Faires in New York and San Mateo. If you've never been, Maker Faire is part science fair and part Burning Man festival that attracts legions of DIY tech enthusiasts, hackers and geeks.…
          Comment on Knicks Morning News (2018.07.10) by Ntilakilla      Cache   Translate Page   Web Page Cache   
<blockquote>you realize the voa… which was also heavily disputed internally…. leans their argument on timestamps proving it wasnt possible to copy files to wikileaks due to the transfer rate…. which is hilariously bad analysis… just read it… </blockquote> They lean their argument on a number of data points, not just timestamps. If you want to focus on them as part of a cherrypick go ahead. But there were many issues with the metadata which supposedly added up to something completely different than what CrowdStrike, the only security group to have ever looked at the hacked server, surmised before they had to retract and then change parts of their analysis when called out on it by IISS for erroneously using their data as proof of the intrusion. For one thing, let's look that the supposedly hacked material's transfer rate. Metadata showed that on the evening of July 5, 2016 that 1,976 megabytes of data were downloaded from the DNC’s server. The operation took 87 seconds, a transfer rate of 22.7 megabytes per second. This is the documented factual record. The problem? No hacker using an Internet service provider available in mid-2016 was capable of downloading data at this speed. A test download of a comparable data volume (and using a server speed not available in 2016) 40 miles from his computer via a server 20 miles away and came up with a speed of 11.8 megabytes per second—half what the DNC operation would need were it a hack. Other investigators have built on this finding. Folden and Edward Loomis say a survey published August 3, 2016, by www.speedtest.net/reports is highly reliable and use it as their thumbnail index. It indicated that the highest average ISP speeds of first-half 2016 were achieved by Xfinity and Cox Communications. These speeds averaged 15.6 megabytes per second and 14.7 megabytes per second, respectively. And this was supposedly all done from Romania by Guccifer.
          New top story on Hacker News: Show HN: Open Source API access control firewall/proxy written in Go      Cache   Translate Page   Web Page Cache   
Show HN: Open Source API access control firewall/proxy written in Go 25 by ibuildoss | 3 comments on
          New top story on Hacker News: Willing (YC S15) Is Hiring an Engineering Manager      Cache   Translate Page   Web Page Cache   
Willing (YC S15) Is Hiring an Engineering Manager 1 by eliam2 | 0 comments on Hacker News. https://C
          New top story on Hacker News: Djbsort: A new software library for sorting arrays of integers      Cache   Translate Page   Web Page Cache   
Djbsort: A new software library for sorting arrays of integers 80 by xmmrm | 20 comments on Hacker N
          New top story on Hacker News: Writing a Game Boy emulator      Cache   Translate Page   Web Page Cache   
Writing a Game Boy emulator 6 by tosh | 0 comments on Hacker News. https://ClusterAssets.tk
          New top story on Hacker News: Loefflers Discrete Cosine Transform Algorithm in Futhark      Cache   Translate Page   Web Page Cache   
Loefflers Discrete Cosine Transform Algorithm in Futhark 3 by fulafel | 0 comments on Hacker News. h
          Malicious Software Packages Found On Arch Linux User Repository      Cache   Translate Page   Web Page Cache   
Yet another incident which showcases that you should not explicitly trust user-controlled software repositories. One of the most popular Linux distros Arch Linux has pulled as many as three user-maintained software repository AUR packages after it was found hosting malicious code. Arch Linux is an independently developed, general-purpose GNU/Linux distribution composed predominantly of free

          Path of Blood: Al Qaeda vs. Saudi Arabia      Cache   Translate Page   Web Page Cache   

If there is one heroic figure in this documentary, it is Prince Muhammad bin Nayef, who crushed Al Qaeda’s campaign of terror in Saudi Arabia with a forceful armed response and close coordination with Western intelligence agencies. Since then, he has been purged of his government office and his place in the royal succession. Oh well. At least, he proved you can win a war against terrorism (or come close enough for government work). Viewers will get an eye-opening look at Al Qaeda in footage the terrorists shot of themselves (with some supplemental video shot by Saudi security forces) throughout Jonathan Hacker’s Path of Blood (trailer here), which opens this Friday in New York.

Forget Eric Hoffer’s True Believer. Ali, the Jihadi who we meet in the opening scene is such a clueless simpleton, he literally asks the Islamist recording his intended martyrdom video to use “smaller words.” For him, the choice between building a life in the here-and-now or opting for a fantastical harem of virgins in the afterlife is probably a no-brainer. One thing is certain: the candid footage of him and his other fellow Islamist extremists does not paint a flattering picture—and they shot it themselves.

Unfortunately, the collected videos suggest the savagery of the Al Qaeda terrorists even exceeds their stupidity. Despite Ali’s awkward blooper reel, this film is absolutely nothing like Al Qaeda’s Funniest Home Videos. There are some absolutely chilling clips, including some of the final minutes of American hostage Paul Marshall Johnson Jr.’s life, before he was beheaded on camera. Hacker largely spares us the actually murders, but plenty of the resulting blood and gore can be seen uncensored and unsanitized. That can be hard to watch, but the fact Mark Boal (screenwriter and producer of Zero Dark Thirty and The Hurt Locker) is onboard as an executive producer should reassure a lot of viewers.

Hacker also incorporates several scenes of the Saudi security forces taking the fight to Al Qaeda, mostly shot by Saudi law enforcement. There is chaos and bloodshed, but it is clear the Saudi forces are professional and highly motivated. Indeed, it is easy to see why the Saudi authorities were willing to share all this footage they either confiscated or shot themselves. Without a doubt, it documents an unqualified win over Al Qaeda, scored by the very same nation that was so embarrassed by its high-level connections to bin Laden. Of course, now that Prince Muhammad is on the outs, and possibly under house arrest, the PR points are suddenly a bit muddled again.

Regardless, Path is enormously instructive by exposing the psychology and ideology of Al Qaeda terrorists. It also identifies some potentially winning strategies for fighting terrorism. It is worth noting none of the martyrs and murderers ever goes off on Israel. Frankly, the Israeli issue just doesn’t seem to be on their radar. Prince Muhammad and the House of Saud are a different matter entirely. The resulting film, quite brilliantly cut together by editor Peter Haddon (with some additional wok done by Kirsi Pyy and Bob H. Woodward), is profoundly illuminating and often deeply disturbing. Highly recommended for tough, inquiring viewers, Path of Blood opens this Friday (7/13) in New York, at the IFC Center.

          Comment on Fashions fade, style is eternal by Free Poker Slots      Cache   Translate Page   Web Page Cache   
Heya! I just wanted to ask if you ever have any trouble with hackers? My last log (wordpress) was haced and I ended up losing many months of hard work due to nno back up. Do you have any solutions to proteect against hackers?
          7/11/2018: ECONOMY & BUSINESS: Macy’s says hackers took customer data      Cache   Translate Page   Web Page Cache   
Macy’s said Tuesday that hackers obtained names and passwords of online customers and potentially were able to access data including credit card numbers and expiration dates. The data breach affected half of 1 percent of customers registered on...
          Ham-designed Gear Used in Thailand Cave Rescue      Cache   Translate Page   Web Page Cache   

Unless you live in a cave, you’ve probably heard at a little about the thirteen people — mostly children — trapped in the Tham Luang Nang Non cave in Thailand. What you may have missed, though, is the hacker/ham radio connection. The British Cave Rescue Council (BCRC) was asked for their expert help. [Rick Stanton], [John Volanthen] and [Rob Harper] answered the call. They were equipped with HeyPhones. The HeyPhone is a 17-year-old design from [John Hey, G3TDZ]. Sadly, [G3TDZ] is now a silent key (ham radio parlance for deceased) so he didn’t get to see his design play a …read more


          Cognitive Security Market 2018 Grow with Leading Key Vendors as XTN, Intel Security, Symantec Corporation, CA Technologies Inc., CSC, Fortinet Inc., Cato Networks, Check Point Software Technologies      Cache   Translate Page   Web Page Cache   
Cognitive Security Market 2018 Grow with Leading Key Vendors as XTN, Intel Security, Symantec Corporation, CA Technologies Inc., CSC, Fortinet Inc., Cato Networks, Check Point Software Technologies Overview In cognitive security market, digitization, mobility and increased focus of hackers to attack confidential information are significant factors driving the market growth. The advantages of digitization in cognitive security technology enables organization by providing precise solution against unauthorized access of

          Something Phishy: How to Identify and Avoid Phishing Scams      Cache   Translate Page   Web Page Cache   
Phishing is one of the most common attack vectors for hackers who exploit end-user behavior as the weakest link in an organizations cyber-defense. For years, criminals have disguised attacks in emails and today we see phishing emails as a primary delivery method for ransomware payloads. Phishing emails have led to massive data exposures, which caused [&hellip
          Education Policy-Focusing on The Demand Wallahs      Cache   Translate Page   Web Page Cache   
Education Policy-Focusing on The Demand Wallahs프뢰벨 유아교육방법의 의의에 관한 연구 - A Study on the Implications of Froebel`s Methods of Early Childhood Education[교수이론] 교수이론과 현재 이슈가 되고 있는 학습과학(learning science)과의 관련성노동경제학 영강 8-9[영어교육] 공공교육에서의 원어민 영어교사의 효과 연구(영문)[초등영어] 5. Where is 수업지도안 I. Introduction II. Threesupports in the Demand Wallahs III. Conclusions I. Introduction 1. Supply of Schooling People in the supply side emphasize the school enrollment. One of the most prominent policies to get the children into a classroom is UN’s Millennium Development Goals (MDGs) by Jeffrey Sachs. It ensures that by 2015 children everywhere boys and girls alike will be able to complete a full course of primary schooling and eliminate gender disparity in primary and secondary education preferably by 2005 and in all levels of education no later than 2015. This project has been accomplished in India and several African countries.However people in the supply side somewhat ignore the quality of education. They say that children should learn anything in school just that they should complete a basic cycle of education. In addition it turns out that the quality of teachers is not good on the survey led by World Bank. 정책론 영어레포트OXFORD TOY 마케팅 전략 (영문)리포트] 삼성 이건희 회장에 대한 연구리포트Entertainment Marketing and communication (Griffith University) Summarythe politics of hunger 크리틱 페이퍼삼디 프린팅[레포트] BASS MODEL PPT 발표자료입니다홍익대학교 2008~2009학년도 수시 2학기(인문계열)[교육공학] Applying Constructivism to the English class(영문)[토플, ibt, 이익훈, 해커스, hackers] ibt 토플 <이익훈> 미출제 타픽 아웃라인 74개경제교육 고등학교 영어 수업지도안■[강추]토익에 자주나오는 영어 단어 7000개 ■교육에 대한 기독교적 관점 (영문)교육을 위한 하드웨어 시스템 구축(Hardware for Educators)(영문) 조회수:36회
          Offer - VoIP Phone verification solution development - VindalooVoIP - USA      Cache   Translate Page   Web Page Cache   
Phone Verification System (PVS) is widely used to verify a person’s phone number quickly using a web interface or any such integrated process which has the ability to explore existing business system and its processes. Phone verification has become inevitable due to the rising frauds happening in online transactions. The PVS helps to prevent ID fraud by quickly confirming the authenticity of the phone number provided. This solution is recommended for the high risk transactions. At present, a phone verification system is a must, especially in non-face-to-face transactions as there are number of frauds happening all across the world.VSPL solution has more focus on verification techniques such as comparing the phone numbers provided with a national data source to figure out whether the phone number is belonging to the same individual or not. Our solution helps to prevent automated registrations. Other than this, our solution is capable of figuring out the type of protocols behind the phone numbers, such as mobile, residential, or commercial. The fact is that when there is a sturdy solution available, we can ensure accurate user verification and thereby keep the hackers at bay.Email: info@vindaloovoip.comPhone: +91 81 4057 4252 http://www.vindaloovoip.com/solutions/phone-verification-system/
           US firm: Chinese hackers infiltrated Cambodia's politics      Cache   Translate Page   Web Page Cache   
U.S. cybersecurity firm FireEye says it has found evidence that a Chinese hacking team it believes is linked to Beijing has penetrated computer systems belonging to Cambodia's election commission, opposition leaders and media
          Adult Education and Social Change      Cache   Translate Page   Web Page Cache   
커뮤니티 비지니스[교수이론] 교수이론과 현재 이슈가 되고 있는 학습과학(learning science)과의 관련성[영어교육] 게임이 언어 학습에 미치는 영향(영문)Entertainment Marketing and communication (Griffith University) Summary[교육학] 한국의 성교육 현황 및 향후 과제(영문)PLLT 쳅터 1 자료 [초등교육론] 초등학교 학생들의 트렌드(영문)[토플, ibt, 이익훈, 해커스, hackers] ibt 토플 <이익훈> 미출제 타픽 아웃라인 74개topics for today 4[교육학] 장 피아제(Jean Piaget) 이론의 특징(영문)comtemporary topic1 스크립호주 노동시장 현황관련 논문영어 토익 단어 7000개성매매금지법 분석 리포트(영어)OXFORD TOY 마케팅 전략 (영문)[국제문화]중국과 영국에서 인터넷 문화 연구(영문)옥스팜 Oxfam에 대하여 (영문)[소비자행동] 메가스터디 7-S 분석(영문)영국, 중국, 미국, 한국의 사회적 기업 사례[졸업]유아의 사회가상놀이를 통한 의사소통 맥락과 전략 조회수:1043회
          Comentario en radioterapia-azul.290-300×135.jpg por hickory street cafe      Cache   Translate Page   Web Page Cache   
Greetings! I know this is kinda off topic but I was wondering which blog platform are you using for this site? I'm getting sick and tired of Wordpress because I've had issues with hackers and I'm looking at alternatives for another platform. I would be fantastic if you could point me in the direction of a good platform.
          Creepy      Cache   Translate Page   Web Page Cache   
I am astonished by this. Hackers shakedown website owners for "protection" money. Bruno and his ballbat just went digital.
          Comentário sobre Como Hackear Facebook Baixar programa HACKER Roubar Senha e Password por jonas santos      Cache   Translate Page   Web Page Cache   
alguém me ajudar a rackea o Facebook do meu namorado por favor
          Comentário sobre 5 formas de hackear senhas, Como hackers roubam passwords Facebook por Abderson      Cache   Translate Page   Web Page Cache   
Alguém descobri pra mim do Gmail pfv 91998369793
          Offer - VoIP Phone verification solution development - VindalooVoIP - USA      Cache   Translate Page   Web Page Cache   
Phone Verification System (PVS) is widely used to verify a person’s phone number quickly using a web interface or any such integrated process which has the ability to explore existing business system and its processes. Phone verification has become inevitable due to the rising frauds happening in online transactions. The PVS helps to prevent ID fraud by quickly confirming the authenticity of the phone number provided. This solution is recommended for the high risk transactions. At present, a phone verification system is a must, especially in non-face-to-face transactions as there are number of frauds happening all across the world.VSPL solution has more focus on verification techniques such as comparing the phone numbers provided with a national data source to figure out whether the phone number is belonging to the same individual or not. Our solution helps to prevent automated registrations. Other than this, our solution is capable of figuring out the type of protocols behind the phone numbers, such as mobile, residential, or commercial. The fact is that when there is a sturdy solution available, we can ensure accurate user verification and thereby keep the hackers at bay.Email: info@vindaloovoip.comPhone: +91 81 4057 4252 http://www.vindaloovoip.com/solutions/phone-verification-system/
          “White Hat” Ethical Hackers and Corporate Investigations      Cache   Translate Page   Web Page Cache   
This post originally appeared in our sister publication, Password Protected. A “white hat” is an ethical computer hacker who specializes in penetration testing and other testing methodologies to ensure the security of an organization’s information systems. According to the Ethical Hacking Council, “The goal of the ethical hacker is to help the organization take pre-emptive measures against malicious...… Continue Reading
          Did Apple make it easier for your iPhone to get hacked?      Cache   Translate Page   Web Page Cache   
Apple's attempt to prevent hackers (and law enforcement) from cracking your iPhone may have a glaring flaw.
          PAX built-in wardrobe for master bedroom      Cache   Translate Page   Web Page Cache   

Our master bedroom contained a row of built-in wardrobe, rather crudely built from scratch by the previous owners a few decades ago. It was clear they had to go. The choice was either to remove the wardrobes, extend the plasterboard ceiling, replace the carpet, plaster the walls and ceiling, paint the whole room and then […]

The post PAX built-in wardrobe for master bedroom appeared first on IKEA Hackers.


          GitHub - Arachni/arachni: Web Application Security Scanner Framework      Cache   Translate Page   Web Page Cache   

README.md

Arachni logo

Synopsis

Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.

It is smart, it trains itself by monitoring and learning from the web application's behavior during the scan process and is able to perform meta-analysis using a number of factors in order to correctly assess the trustworthiness of results and intelligently identify (or avoid) false-positives.

Unlike other scanners, it takes into account the dynamic nature of web applications, can detect changes caused while travelling through the paths of a web application’s cyclomatic complexity and is able to adjust itself accordingly. This way, attack/input vectors that would otherwise be undetectable by non-humans can be handled seamlessly.

Moreover, due to its integrated browser environment, it can also audit and inspect client-side code, as well as support highly complicated web applications which make heavy use of technologies such as JavaScript, HTML5, DOM manipulation and AJAX.

Finally, it is versatile enough to cover a great deal of use cases, ranging from a simple command line scanner utility, to a global high performance grid of scanners, to a Ruby library allowing for scripted audits, to a multi-user multi-scan web collaboration platform.

Note: Despite the fact that Arachni is mostly targeted towards web application security, it can easily be used for general purpose scraping, data-mining, etc. with the addition of custom components.

Arachni offers:

A stable, efficient, high-performance framework

Check, report and plugin developers are allowed to easily and quickly create and deploy their components with the minimum amount of restrictions imposed upon them, while provided with the necessary infrastructure to accomplish their goals.

Furthermore, they are encouraged to take full advantage of the Ruby language under a unified framework that will increase their productivity without stifling them or complicating their tasks.

Moreover, that same framework can be utilized as any other Ruby library and lead to the development of brand new scanners or help you create highly customized scan/audit scenarios and/or scripted scans.

Simplicity

Although some parts of the Framework are fairly complex you will never have to deal them directly. From a user’s or a component developer’s point of view everything appears simple and straight-forward all the while providing power, performance and flexibility.

From the simple command-line utility scanner to the intuitive and user-friendly Web interface and collaboration platform, Arachni follows the principle of least surprise and provides you with plenty of feedback and guidance.

In simple terms

Arachni is designed to automatically detect security issues in web applications. All it expects is the URL of the target website and after a while it will present you with its findings.

Features

General

  • Cookie-jar/cookie-string support.
  • Custom header support.
  • SSL support with fine-grained options.
  • User Agent spoofing.
  • Proxy support for SOCKS4, SOCKS4A, SOCKS5, HTTP/1.1 and HTTP/1.0.
  • Proxy authentication.
  • Site authentication (SSL-based, form-based, Cookie-Jar, Basic-Digest, NTLMv1, Kerberos and others).
  • Automatic log-out detection and re-login during the scan (when the initial login was performed via the autologin, login_script or proxy plugins).
  • Custom 404 page detection.
  • UI abstraction:
  • Pause/resume functionality.
  • Hibernation support -- Suspend to and restore from disk.
  • High performance asynchronous HTTP requests.
    • With adjustable concurrency.
    • With the ability to auto-detect server health and adjust its concurrency automatically.
  • Support for custom default input values, using pairs of patterns (to be matched against input names) and values to be used to fill in matching inputs.

Integrated browser environment

Arachni includes an integrated, real browser environment in order to provide sufficient coverage to modern web applications which make use of technologies such as HTML5, JavaScript, DOM manipulation, AJAX, etc.

In addition to the monitoring of the vanilla DOM and JavaScript environments, Arachni's browsers also hook into popular frameworks to make the logged data easier to digest:

In essence, this turns Arachni into a DOM and JavaScript debugger, allowing it to monitor DOM events and JavaScript data and execution flows. As a result, not only can the system trigger and identify DOM-based issues, but it will accompany them with a great deal of information regarding the state of the page at the time.

Relevant information include:

  • Page DOM, as HTML code.
    • With a list of DOM transitions required to restore the state of the page to the one at the time it was logged.
  • Original DOM (i.e. prior to the action that caused the page to be logged), as HTML code.
    • With a list of DOM transitions.
  • Data-flow sinks -- Each sink is a JS method which received a tainted argument.
    • Parent object of the method (ex.: DOMWindow).
    • Method signature (ex.: decodeURIComponent()).
    • Arguments list.
      • With the identified taint located recursively in the included objects.
    • Method source code.
    • JS stacktrace.
  • Execution flow sinks -- Each sink is a successfully executed JS payload, as injected by the security checks.
    • Includes a JS stacktrace.
  • JavaScript stack-traces include:
    • Method names.
    • Method locations.
    • Method source codes.
    • Argument lists.

In essence, you have access to roughly the same information that your favorite debugger (for example, FireBug) would provide, as if you had set a breakpoint to take place at the right time for identifying an issue.

Browser-cluster

The browser-cluster is what coordinates the browser analysis of resources and allows the system to perform operations which would normally be quite time consuming in a high-performance fashion.

Configuration options include:

  • Adjustable pool-size, i.e. the amount of browser workers to utilize.
  • Timeout for each job.
  • Worker TTL counted in jobs -- Workers which exceed the TTL have their browser process respawned.
  • Ability to disable loading images.
  • Adjustable screen width and height.
    • Can be used to analyze responsive and mobile applications.
  • Ability to wait until certain elements appear in the page.
  • Configurable local storage data.

Coverage

The system can provide great coverage to modern web applications due to its integrated browser environment. This allows it to interact with complex applications that make heavy use of client-side code (like JavaScript) just like a human would.

In addition to that, it also knows about which browser state changes the application has been programmed to handle and is able to trigger them programatically in order to provide coverage for a full set of possible scenarios.

By inspecting all possible pages and their states (when using client-side code) Arachni is able to extract and audit the following elements and their inputs:

  • Forms
    • Along with ones that require interaction via a real browser due to DOM events.
  • User-interface Forms
    • Input and button groups which don't belong to an HTML <form> element but are instead associated via JS code.
  • User-interface Inputs
    • Orphan <input> elements with associated DOM events.
  • Links
    • Along with ones that have client-side parameters in their fragment, i.e.: http://example.com/#/?param=val&param2=val2
    • With support for rewrite rules.
  • LinkTemplates -- Allowing for extraction of arbitrary inputs from generic paths, based on user-supplied templates -- useful when rewrite rules are not available.
    • Along with ones that have client-side parameters in their URL fragments, i.e.: http://example.com/#/param/val/param2/val2
  • Cookies
  • Headers
  • Generic client-side elements which have associated DOM events.
  • AJAX-request parameters.
  • JSON request data.
  • XML request data.

Open distributed architecture

Arachni is designed to fit into your workflow and easily integrate with your existing infrastructure.

Depending on the level of control you require over the process, you can either choose the REST service or the custom RPC protocol.

Both approaches allow you to:

  • Remotely monitor and manage scans.
  • Perform multiple scans at the same time -- Each scan is compartmentalized to its own OS process to take advantage of:
    • Multi-core/SMP architectures.
    • OS-level scheduling/restrictions.
    • Sandboxed failure propagation.
  • Communicate over a secure channel.

REST API

  • Very simple and straightforward API.
  • Easy interoperability with non-Ruby systems.
    • Operates over HTTP.
    • Uses JSON to format messages.
  • Stateful scan monitoring.
    • Unique sessions automatically only receive updates when polling for progress, rather than full data.

RPC API

  • High-performance/low-bandwidth communication protocol.
    • MessagePack serialization for performance, efficiency and ease of integration with 3rd party systems.
  • Grid:
    • Self-healing.
    • Scale up/down by hot-plugging/hot-unplugging nodes.
      • Can scale up infinitely by adding nodes to increase scan capacity.
    • (Always-on) Load-balancing -- All Instances are automatically provided by the least burdened Grid member.
      • With optional per-scan opt-out/override.
    • (Optional) High-Performance mode -- Combines the resources of multiple nodes to perform multi-Instance scans.
      • Enabled on a per-scan basis.

Scope configuration

  • Filters for redundant pages like galleries, catalogs, etc. based on regular expressions and counters.
    • Can optionally detect and ignore redundant pages automatically.
  • URL exclusion filters using regular expressions.
  • Page exclusion filters based on content, using regular expressions.
  • URL inclusion filters using regular expressions.
  • Can be forced to only follow HTTPS paths and not downgrade to HTTP.
  • Can optionally follow subdomains.
  • Adjustable page count limit.
  • Adjustable redirect limit.
  • Adjustable directory depth limit.
  • Adjustable DOM depth limit.
  • Adjustment using URL-rewrite rules.
  • Can read paths from multiple user supplied files (to both restrict and extend the scope).

Audit

  • Can audit:
    • Forms
      • Can automatically refresh nonce tokens.
      • Can submit them via the integrated browser environment.
    • User-interface Forms
      • Input and button groups which don't belong to an HTML <form> element but are instead associated via JS code.
    • User-interface Inputs
      • Orphan <input> elements with associated DOM events.
    • Links
      • Can load them via the integrated browser environment.
    • LinkTemplates
      • Can load them via the integrated browser environment.
    • Cookies
      • Can load them via the integrated browser environment.
    • Headers
    • Generic client-side DOM elements.
    • JSON request data.
    • XML request data.
  • Can ignore binary/non-text pages.
  • Can audit elements using both GET and POST HTTP methods.
  • Can inject both raw and HTTP encoded payloads.
  • Can submit all links and forms of the page along with the cookie permutations to provide extensive cookie-audit coverage.
  • Can exclude specific input vectors by name.
  • Can include specific input vectors by name.

Components

Arachni is a highly modular system, employing several components of distinct types to perform its duties.

In addition to enabling or disabling the bundled components so as to adjust the system's behavior and features as needed, functionality can be extended via the addition of user-created components to suit almost every need.

Platform fingerprinters

In order to make efficient use of the available bandwidth, Arachni performs rudimentary platform fingerprinting and tailors the audit process to the server-side deployed technologies by only using applicable payloads.

Currently, the following platforms can be identified:

  • Operating systems
    • BSD
    • Linux
    • Unix
    • Windows
    • Solaris
  • Web servers
    • Apache
    • IIS
    • Nginx
    • Tomcat
    • Jetty
    • Gunicorn
  • Programming languages
    • PHP
    • ASP
    • ASPX
    • Java
    • Python
    • Ruby
  • Frameworks
    • Rack
    • CakePHP
    • Rails
    • Django
    • ASP.NET MVC
    • JSF
    • CherryPy
    • Nette
    • Symfony

The user also has the option of specifying extra platforms (like a DB server) in order to help the system be as efficient as possible. Alternatively, fingerprinting can be disabled altogether.

Finally, Arachni will always err on the side of caution and send all available payloads when it fails to identify specific platforms.

Checks

Checks are system components which perform security checks and log issues.

Active

Active checks engage the web application via its inputs.

  • SQL injection (sql_injection) -- Error based detection.
    • Oracle
    • InterBase
    • PostgreSQL
    • MySQL
    • MSSQL
    • EMC
    • SQLite
    • DB2
    • Informix
    • Firebird
    • SaP Max DB
    • Sybase
    • Frontbase
    • Ingres
    • HSQLDB
    • MS Access
  • Blind SQL injection using differential analysis (sql_injection_differential).
  • Blind SQL injection using timing attacks (sql_injection_timing).
    • MySQL
    • PostgreSQL
    • MSSQL
  • NoSQL injection (no_sql_injection) -- Error based vulnerability detection.
  • Blind NoSQL injection using differential analysis (no_sql_injection_differential).
  • CSRF detection (csrf).
  • Code injection (code_injection).
    • PHP
    • Ruby
    • Python
    • Java
    • ASP
  • Blind code injection using timing attacks (code_injection_timing).
    • PHP
    • Ruby
    • Python
    • Java
    • ASP
  • LDAP injection (ldap_injection).
  • Path traversal (path_traversal).
    • *nix
    • Windows
    • Java
  • File inclusion (file_inclusion).
    • *nix
    • Windows
    • Java
    • PHP
    • Perl
  • Response splitting (response_splitting).
  • OS command injection (os_cmd_injection).
    • *nix
    • *BSD
    • IBM AIX
    • Windows
  • Blind OS command injection using timing attacks (os_cmd_injection_timing).
    • Linux
    • *BSD
    • Solaris
    • Windows
  • Remote file inclusion (rfi).
  • Unvalidated redirects (unvalidated_redirect).
  • Unvalidated DOM redirects (unvalidated_redirect_dom).
  • XPath injection (xpath_injection).
    • Generic
    • PHP
    • Java
    • dotNET
    • libXML2
  • XSS (xss).
  • Path XSS (xss_path).
  • XSS in event attributes of HTML elements (xss_event).
  • XSS in HTML tags (xss_tag).
  • XSS in script context (xss_script_context).
  • DOM XSS (xss_dom).
  • DOM XSS script context (xss_dom_script_context).
  • Source code disclosure (source_code_disclosure)
  • XML External Entity (xxe).
    • Linux
    • *BSD
    • Solaris
    • Windows
Passive

Passive checks look for the existence of files, folders and signatures.

  • Allowed HTTP methods (allowed_methods).
  • Back-up files (backup_files).
  • Backup directories (backup_directories)
  • Common administration interfaces (common_admin_interfaces).
  • Common directories (common_directories).
  • Common files (common_files).
  • HTTP PUT (http_put).
  • Insufficient Transport Layer Protection for password forms (unencrypted_password_form).
  • WebDAV detection (webdav).
  • HTTP TRACE detection (xst).
  • Credit Card number disclosure (credit_card).
  • CVS/SVN user disclosure (cvs_svn_users).
  • Private IP address disclosure (private_ip).
  • Common backdoors (backdoors).
  • .htaccess LIMIT misconfiguration (htaccess_limit).
  • Interesting responses (interesting_responses).
  • HTML object grepper (html_objects).
  • E-mail address disclosure (emails).
  • US Social Security Number disclosure (ssn).
  • Forceful directory listing (directory_listing).
  • Mixed Resource/Scripting (mixed_resource).
  • Insecure cookies (insecure_cookies).
  • HttpOnly cookies (http_only_cookies).
  • Auto-complete for password form fields (password_autocomplete).
  • Origin Spoof Access Restriction Bypass (origin_spoof_access_restriction_bypass)
  • Form-based upload (form_upload)
  • localstart.asp (localstart_asp)
  • Cookie set for parent domain (cookie_set_for_parent_domain)
  • Missing Strict-Transport-Security headers for HTTPS sites (hsts).
  • Missing X-Frame-Options headers (x_frame_options).
  • Insecure CORS policy (insecure_cors_policy).
  • Insecure cross-domain policy (allow-access-from) (insecure_cross_domain_policy_access)
  • Insecure cross-domain policy (allow-http-request-headers-from) (insecure_cross_domain_policy_headers)
  • Insecure client-access policy (insecure_client_access_policy)

Reporters

Plugins

Plugins add extra functionality to the system in a modular fashion, this way the core remains lean and makes it easy for anyone to add arbitrary functionality.

  • Passive Proxy (proxy) -- Analyzes requests and responses between the web app and the browser assisting in AJAX audits, logging-in and/or restricting the scope of the audit.
  • Form based login (autologin).
  • Script based login (login_script).
  • Dictionary attacker for HTTP Auth (http_dicattack).
  • Dictionary attacker for form based authentication (form_dicattack).
  • Cookie collector (cookie_collector) -- Keeps track of cookies while establishing a timeline of changes.
  • WAF (Web Application Firewall) Detector (waf_detector) -- Establishes a baseline of normal behavior and uses rDiff analysis to determine if malicious inputs cause any behavioral changes.
  • BeepNotify (beep_notify) -- Beeps when the scan finishes.
  • EmailNotify (email_notify) -- Sends a notification (and optionally a report) over SMTP at the end of the scan.
  • VectorFeed (vector_feed) -- Reads in vector data from which it creates elements to be audited. Can be used to perform extremely specialized/narrow audits on a per vector/element basis. Useful for unit-testing or a gazillion other things.
  • Script (script) -- Loads and runs an external Ruby script under the scope of a plugin, used for debugging and general hackery.
  • Uncommon headers (uncommon_headers) -- Logs uncommon headers.
  • Content-types (content_types) -- Logs content-types of server responses aiding in the identification of interesting (possibly leaked) files.
  • Vector collector (vector_collector) -- Collects information about all seen input vectors which are within the scan scope.
  • Headers collector (headers_collector) -- Collects response headers based on specified criteria.
  • Exec (exec) -- Calls external executables at different scan stages.
  • Metrics (metrics) -- Captures metrics about multiple aspects of the scan and the web application.
  • Restrict to DOM state (restrict_to_dom_state) -- Restricts the audit to a single page's DOM state, based on a URL fragment.
  • Webhook notify (webhook_notify) -- Sends a webhook payload over HTTP at the end of the scan.
  • Rate limiter (rate_limiter) -- Rate limits HTTP requests.
  • Page dump (page_dump) -- Dumps page data to disk as YAML.
Defaults

Default plugins will run for every scan and are placed under /plugins/defaults/.

  • AutoThrottle (autothrottle) -- Dynamically adjusts HTTP throughput during the scan for maximum bandwidth utilization.
  • Healthmap (healthmap) -- Generates sitemap showing the health of each crawled/audited URL
Meta

Plugins under /plugins/defaults/meta/ perform analysis on the scan results to determine trustworthiness or just add context information or general insights.

  • TimingAttacks (timing_attacks) -- Provides a notice for issues uncovered by timing attacks when the affected audited pages returned unusually high response times to begin with. It also points out the danger of DoS attacks against pages that perform heavy-duty processing.
  • Discovery (discovery) -- Performs anomaly detection on issues logged by discovery checks and warns of the possibility of false positives where applicable.
  • Uniformity (uniformity) -- Reports inputs that are uniformly vulnerable across a number of pages hinting to the lack of a central point of input sanitization.

Trainer subsystem

The Trainer is what enables Arachni to learn from the scan it performs and incorporate that knowledge, on the fly, for the duration of the audit.

Checks have the ability to individually force the Framework to learn from the HTTP responses they are going to induce.

However, this is usually not required since Arachni is aware of which requests are more likely to uncover new elements or attack vectors and will adapt itself accordingly.

Still, this can be an invaluable asset to Fuzzer checks.

Running the specs

You can run rake spec to run all specs or you can run them selectively using the following:

rake spec:core            # for the core libraries
rake spec:checks          # for the checks
rake spec:plugins         # for the plugins
rake spec:reports         # for the reports
rake spec:path_extractors # for the path extractors

Please be warned, the core specs will require a beast of a machine due to the necessity to test the Grid/multi-Instance features of the system.

Note: The check specs will take many hours to complete due to the timing-attack tests.

Bug reports/Feature requests

Submit bugs using GitHub Issues and get support via the Support Portal.

Contributing

(Before starting any work, please read the instructions for working with the source code.)

We're happy to accept help from fellow code-monkeys and these are the steps you need to follow in order to contribute code:

  • Fork the project.
  • Start a feature branch based on the experimental branch (git checkout -b <feature-name> experimental).
  • Add specs for your code.
  • Run the spec suite to make sure you didn't break anything (rake spec:core for the core libs or rake spec for everything).
  • Commit and push your changes.
  • Issue a pull request and wait for your code to be reviewed.

License

Arachni Public Source License v1.0 -- please see the LICENSE file for more information.


          EU-parlementsleden bang voor Chinese hackers      Cache   Translate Page   Web Page Cache   
Een groep van dertig EU-parlementsleden heeft een brief verstuurd naar de voorzitter van het Europees Parlement, Antonio Tajani en secretaris-generaal Klaus Welle. Daarin klagen ze dat ze geen enkele training krijgen rond hacking en cybercriminaliteit, bijvoorbeeld...
          adserving.unibet.com      Cache   Translate Page   Web Page Cache   
Désinstaller adserving.unibet.com de Windows 2000 adserving.unibet.com infections similaires liées AdwareSelectionLinks, IncrediFind, Softomate.ai, MySearch.f, Adware Generic5.RQT, HyperBar, Vapsup.bis, TSAdBot, TestTimer, Adware.CouponDropDown, RK.ad, TrojanSpy.Win32.Agent.ad, DownLow, 100% Free Hearts ToolbarBrowser HijackerSupernew-search.net, Bodisparking.com, Mega-scan-pc-new14.biz, ManageDNS404.com, Sweetime.com, Homebusinesslifestyle.info, SecondThought, Foodpuma.com, Websearch.searchiseasy.infoRansomwareHackerman Ransomware, .wcry File Extension Ransomware, .aaa File Extension Ransomware, Decryptallfiles3@india.com, SurveyLocker Ransomware, Alpha Ransomware, Ninja_gaiver@aol.com Ransomware, Death Bitches Ransomware, AMBA Ransomware, CryptoCat Ransomware, EduCrypt Ransomware, Mischa Ransomware, Locker Ransomware, CryptFile2 RansomwareTrojanInjector.gen!BE, Proxy.Koobface.gen!J, CeeInject.CG, Kneel Trojan, Trojan.Injector.L, I-Worm.Rusty, Trojan.Witkinat, Virus.VBInject.YX, Trojan Upclicker, Trojan.Danglo, Troj/TDL3Mem-A SpywareSafeSurfing,...

Read More Read More


          A Hacker Was Able To Take Sensitive Documents From The Military Because No One Updated The Routers      Cache   Translate Page   Web Page Cache   

Hamza Bashir Ahmad posted a photo:

A Hacker Was Able To Take Sensitive Documents From The Military Because No One Updated The Routers

via Blogger ift.tt/2JcWxbX


          Amazon Is Marking Down A Bunch of Men's Calvin Klein Styles for Prime Members      Cache   Translate Page   Web Page Cache   

Amazon’s Gold Box is full (two pages full) of up to 50% off men’s Calvin Klein shirts, ties, khakis, and more. Prime Members can stock up on button downs for work or weddings you have to attend, or grab a handful of ties because you really need to stop wearing the same one to every slightly fancy event or dinner you…

Read more...


          Teste mostra que 100% das redes corporativas têm vulnerabilidades internas      Cache   Translate Page   Web Page Cache   

Uma sequência de testes de penetração realizada pela empresa de segurança Positive Technologies revelou resultados alarmantes. Segundo resultados publicados no site da própria companhia, 100% das redes corporativas que participaram da simulação puderam ser invadidas internamente sem grandes dificuldades. De fato, apenas 7% foram classificadas como de “dificuldade moderada”.

Os procedimentos foram conduzidos por funcionários que simulavam ataques por meio de computadores das próprias companhias. Em todos os casos, os “hackers” conseguiram obter controle completo de toda a infraestrutura e em todas as redes corporativas.

Ataques externos também estão mais fáceis

A Positive Technologies revelou também que ataques de perímetro – realizados por um hacker posicionado fora da rede – também se tornaram consideravelmente mais fáceis. A dificuldade de acessar a intranet das empresas foi considerada “trivial” em 56% dos casos em 2017. No ano anterior, o mesmo qualificador foi atribuído a apenas 27% das redes.

A empresa revelou ainda que conseguiu encontrar em média duas vulnerabilidades em cada rede participante da simulação. Em um dos casos, foi encontrada uma brecha de segurança que já existia há 18 anos. O relatório completo dos testes pode ser encontrado no site oficial da Positive Technologies.


          Макаронов или макарон? 20 слов, которые вы неправильно употребляете во множественном числе      Cache   Translate Page   Web Page Cache   
Стоит знать каждому, кто хочет говорить и писать грамотно.
          Лучшие скидки и акции на AliExpress и в других онлайн-магазинах 11 июля      Cache   Translate Page   Web Page Cache   
В сегодняшнем выпуске — скидки на смартфоны Xiaomi Black Shark и Elephone S7, инструменты, вентиляторы, солнцезащитные очки и часы.
          Можно ли умереть, если съесть слишком много шоколада      Cache   Translate Page   Web Page Cache   
Врачи рассказали, насколько страшна передозировка любимым лакомством.
          3 причины, почему ваш бизнес не приносит прибыли      Cache   Translate Page   Web Page Cache   
прибыль в бизнесеКак исправить ситуацию, если ваш бизнес приносит только убытки.
          Как преодолевать любые преграды: учимся на примере ультрамарафонцев      Cache   Translate Page   Web Page Cache   
Душа человека закаляется в огне боли. 💪
          Бесплатные приложения и скидки App Store 11 июля      Cache   Translate Page   Web Page Cache   
Не пропустите все самые интересные акции на приложения для ваших iPhone, iPad и Mac. Только лучшее за этот день!
          Burning Man: как попасть на главный в мире фестиваль самовыражения      Cache   Translate Page   Web Page Cache   
Пошаговая инструкция: как добраться до места, где жить, что брать с собой и сколько нужно денег на самую безумную поездку в своей жизни.
          Alex_INNA: Напиток, который быстро заживляет гастрит, язвы, снизит сахар в крови, холестерин, давление, избавит от лишнего веса      Cache   Translate Page   Web Page Cache   

Это цитата сообщения Ольга_Гужва Оригинальное сообщениеНапиток, который быстро заживляет гастрит, язвы, снизит сахар в крови, холестерин, давление, избавит от лишнего веса

Универсальное средство!

 

Широкий спектр его целебных возможностей вас удивит

!

Картофель вкусный во многих отношениях: вареный, запеченный, приготовленный на пару … Во всяком случае, трудно найти того, кто не любит картошку.

Но сегодня нас интересует лекарственное использование картофеля, которое, к сожалению, очень мало известно людям.

 

Этот клубень невероятно полезен для здоровья, если мы знаем, как его использовать.

И одним из лучших способов использования лечебного потенциала картофеля является употребление сока.

Что такого особенного в картофельном соке? Широкий спектр его целебных возможностей вас удивит!

1. Успешно лечит гастрит

Картофель является щелочным, поэтому его сок служит для успокоения желудочно-кишечного тракта и помогает вылечить чрезмерную кислотность (изжогу).

Для лечения гастрита возьмите 1 столовую ложку свежего картофельного сока, растворите её в воде выпейте за полчаса до завтрака, обеда и ужина.

Улучшение будет практически незамедлительным.

2. Заживляет язвы желудка

Если вы пьете только 50 мл (2 столовые ложки) картофельного сока утром на голодный желудок и делаете то же самое перед другими приемами пищи, вы достигнете значительного улучшения при язве желудка. Уже через месяц вы забудете о ней!

3. Диабет

Рекомендуется также использовать картофельный сок, так как он помогает снизить уровень глюкозы в крови.

4. Легочные заболевания

Вы курите?

Если у вас есть эта плохая привычка, вы должны регулярно пить картофельный сок.

Это не избавит вас от курения, но, по крайней мере, он поможет вам очищать легкие.

Подробнее о картофельном соке

— Картофельный сок — замечательный противовоспалительный препарат, который отлично борется с артритом и против всех других форм воспалительной боли, таких как боли в спине и суставах.

— Этот сок улучшает кровообращение во всех областях тела.

— Он очень щелочной и используется для подщелачивания организма, чтобы предотвратить такие заболевания, как рак и сердечно-сосудистые заболевания.

— Отлично подходит для лечения экземы и акне, даже помогает быстро очистить кожу.

— Картофельный сок может помочь вам сбросить вес.

— Он отлично подходит против подагры и устраняет мочевую кислоту.

— Помогает снизить уровень холестерина.

— Помогает очистить печень и желчный пузырь.

Но это еще не всё!

Исследования показывают, что картофельный сок эффективен при лечении панкреатита и заболевания почек.

И есть некоторые свидетельства того, что он помогает контролировать кровяное давление.

Этот сок также помогает предотвратить образование камней в мочевом тракте.

И, наконец, картофельный сок является источником витаминов A, C, B и фосфора, кальция, железа, калия, зеаксантина и белка.

Как сделать сок?

Предпочтительно использовать органический картофель (если это невозможно, как минимум минимизировать присутствие пестицидов).

Вы можете сделать этот сок в соковыжималке или блендере или просто натереть на терке и выдавить сок.

Разбавьте сок очищенной водой. На 1 столовую ложку возьмите 150 мл воды.

Пейте сразу после приготовления.

Вкус картофельного сока не нравится?

Поэтому мы рекомендуем смешивать его с другими соками, такими как яблочный или морковный или тыквенный или добавьте зелень.

 

Источник →


          Comment on Hello world! by Kristen      Cache   Translate Page   Web Page Cache   
Hey there! I just wanted to ask if you ever have any issues with hackers? My last blog (wordpress) was hacked and I ended up losing several weeks of hard work due to no back up. Do you have any solutions to stop hackers?
          Bitcoin analysis for 11/07/2018      Cache   Translate Page   Web Page Cache   

Bitcoin analysis for 11/07/2018:

Cryptocurrency malware that infected more than one million computers in China has reportedly earned over $ 2 million in its developers over two years.

According to a local press report, the police in the Chinese city of Da Lian arrested 20 suspects from a computer company that allegedly took control of a large number of computers to earn illegal digging of cryptocurrencies.

By clicking on ads and installing plugins, more than a million computers were infected, extracting 26 million dollars in two years in DigiByte, Decred and Siacoin, police informs.

Hackers evidently chose to extract smaller cryptocurrencies, because they do not require so much computing power, which allows a quieter extraction process and less chance of seeing it by the victims. The report also indicates that hackers have created a network of over 100 agents who helped propagate illegal mining software, for example by working with Internet cafes.

In June, another group of hackers in China was also liquidated for alleged collusion with local computer maintenance companies in order to break into more than 100,000 computers belonging to internet cafes - also to extract the Siacoin cryptocurrency.

Traders beware: do not install suspicious programs and do not follow any suspicious links on social media related to the cryptocurrency news, analysis, airdrops or bounty.

Let's now take a look at the Bitcoin technical picture at the H4 time frame. The market has broken below the short-term internal trend line support and now is consolidating in the middle of the range, around the level of technical support at $6,334. The price is already below the weekly pivot, which might indicate more downside price action to come soon. The next target for bears is seen at the level of $6,064 (weekly pivot support) and then at $5,900, which is very close to the swing bottom at $5,742.

analytics5b45b6d52b008.jpg

The material has been provided by InstaForex Company - www.instaforex.com
          Re: US firm: Chinese hackers infiltrated Cambodia's politics | Inquirer Technology      Cache   Translate Page   Web Page Cache   

gagawin lahat ng mga Instik sa utos ng amo ni Dutae na si Xi-Pon para magharian dito sa mundo.


          Re: US firm: Chinese hackers infiltrated Cambodia's politics | Inquirer Technology      Cache   Translate Page   Web Page Cache   

of course there is a traitor inside, just open the PORTS, and it will be easily hacked.


          Re: US firm: Chinese hackers infiltrated Cambodia's politics | Inquirer Technology      Cache   Translate Page   Web Page Cache   

The Triangle of Destruction - DPRK, RUSSIA and CHINA have been doing this with relentless vigor for the past 2 decades or more. Just look at all the "Hacking" stats over past years and then, as a secondary subject, ask yourself - Why Does Duterte Still Love China??? A few billion will fill a few Balakbayan boxes and a pay for a private jet.


          Hacker Steals Military Docs Because Someone Didn’t Change a Default FTP Password      Cache   Translate Page   Web Page Cache   
A hacker is selling sensitive military documents on online hacking forums, a security firm has discovered. [...]
          Director of Marketing - Growth Hacker/Analytics/Acquisitions      Cache   Translate Page   Web Page Cache   
CA-West Hollywood, Located in beautiful West Hollywood, CA, we are a B2C eCommerce company (w/risque consumer electronic products.if you get our drift.) Brought to you by the founders of some of the best known companies in the industry. We're looking for business savvy individuals, who don't get shy too easily, with an interest in joining a fantastic team, within a dynamic work environment, with incredible (I mean i
          Stolen US Military Drone Documents Found for Sale on Dark Web, Researchers Say - Wall Street Journal      Cache   Translate Page   Web Page Cache   

Wall Street Journal

Stolen US Military Drone Documents Found for Sale on Dark Web, Researchers Say
Wall Street Journal
An unidentified hacker tried to sell purported U.S. military documents containing information about combat drones last month, a cybersecurity research firm said, after they were allegedly stolen from an Air Force officer's computer. The hacker sought ...
Report: Hacker sold sensitive MQ-9 Reaper drone documents on the Dark WebFast Company
A desperate hacker tried selling US military files for $150 — only to find no one wanted themBusiness Insider
Researchers found stolen military secrets for sale on the dark webCNET
Forbes
all 28 news articles »

          Comment on The X-Files by rainman      Cache   Translate Page   Web Page Cache   
Oh jeez I forgot about the X-Files episodes about black stuff in the eyes. How could I not make this association with PROMETHEUS? This now seems like a blatant ripoff. I was always in the monster of the week camp in X-Files fandom, and of course any X-Files movie is going to be all about the overarching story and not a monster of the year extended episode. I never cared about Mulder's sister (except as a driving force behind his obsession) or aliens hidden in cargo containers in the desert or men in Black who had black goo in their eyes sometimes, and this always seemed to be the lazy weekly TV show scriptwriting hackery where they don't really know where they are going, have no real plans, and keep adding more ridiculous crap on top of their rickety house of cards. It's a Ponzi scheme style of writing, where they just hope they can fool enough people long enough before it all falls apart. See LOST, PROMETHEUS, and not BREAKING BAD.
          100,000 Crypto Currency Thefts Prevented By Kaspersky Lab In 2018      Cache   Translate Page   Web Page Cache   


Join- https://t.me/btctradingclub

For more Bitcoin Crypto Currency news Latest Update Crypto Currency Training Auto Trading Crypto BOT & Crypto Trading Signals join above given telegram channel

https://play.google.com/store/apps/details?...yptosignals.app


Crypto Trading Mobile APPS now receive Crypto Signals on Mobile Google Play Store

As cryptocurrency thefts are becoming more frequent and big news for blockchain naysayers, it is important to point out that there are companies out there trying to prevent these issues. The Moscow-based anti-virus firm, Kaspersky Lab, has recently reported preventing 100,000 crypto thefts in 2018 alone.

Kaspersky Lab is a well-known anti-virus company that has been leading the cybersecurity industry for many years. In 2018, they fought off a reported 100,000 approaches used by cybercriminals to steal cryptocurrencies. Their prevention of cryptocurrency thefts is leading experts to praise the company for their vigilance.

Tackling cryptocurrency thefts in 2018
Bearing in mind that the 100,000 prevented attempts have taken place in the first few months of 2018 alone should give you an idea of the security issues that continue to blight the crypto industry. This groundbreaking Russian company recently reported that analyzing the main patterns and trends related to the thefts has helped them to understand the mentality of hackers and to help tackle cryptocurrency thefts, helping users to avoid dodgy and fake exchanges, ICOs and wallets.

Kaspersky went on to detail how cybercriminals have been finding loopholes to exploit the hype in the marketplace and have mainly targeted inexperienced users and novice traders. As part of the prevention, Kaspersky talked about how they tracked over 1,000 ethereum wallets where users were conned out of over 21,000 ether. That total equated to approximately USD 10 million, which is a massive number. You also have to take into consideration that this figure does not include funds that were stolen by cybercriminals directly from the online wallets of victims.

Protecting crypto users online
One of the primary targets for cybercriminals and hackers are Initial Coin Offering (ICO) investors. Kaspersky has pointed out that it is relatively easy for hackers to obtain personal data such as email addresses of the potential investors in certain projects. The cryptocurrency thefts are in the main part very focused from criminals who know how to target the weaknesses of systems.

Once the cybercriminals have the personal info they need, they use fake letters from a ‘startup team’ in the pre-ICO launch phase of the program. The letters are used to talk investors into moving their digital funds to the wallet addresses of the criminals, which is basically another arm of phishing.

Another avenue utilized by fraudsters is to create fake ICOs and projects through social media platforms, through email campaigns and even on search engines such as Google. Some of the frauds in this modern age know no bounds. A recent report from Kaspersky Lab noted that fraudulent schemes are based on the old tried and tested methods of social engineering. They are created to exploit human nature and to take advantage of the ‘human factor’.

As Kaspersky Lab continues to move forward in its quest to eradicate cryptocurrency thefts, it is important that we, as crypto users, use a modicum of common sense and to not put ourselves in the position to be exploited or conned.
          The Hacker-Powered Security Report 2018      Cache   Translate Page   Web Page Cache   
The Hacker-Powered Security Report 2018 is the most comprehensive report on hacker-powered security. Analysis of 78,275 security vulnerability reports received in the past year from ethical hackers that reported them to over 1,000 organizations through HackerOne.

          Stolen US Military Drone Documents Found for Sale on Dark Web, Researchers Say - Wall Street Journal      Cache   Translate Page   Web Page Cache   

Wall Street Journal

Stolen US Military Drone Documents Found for Sale on Dark Web, Researchers Say
Wall Street Journal
An unidentified hacker tried to sell purported U.S. military documents containing information about combat drones last month, a cybersecurity research firm said, after they were allegedly stolen from an Air Force officer's computer. The hacker sought ...
Report: Hacker sold sensitive MQ-9 Reaper drone documents on the Dark WebFast Company
How an Amateur Hacker Stole Top-Secret Drone Documents From the US Air ForceFortune
Researchers found stolen military secrets for sale on the dark webCNET
Business Insider -Forbes -CNN -The Verge
all 28 news articles »

          พายุกำลังมา Intel จ่ายเงินรางวัลช่องโหว่ระดับสูงสุด 100,000 ดอลลาร์ พร้อมรายงานช่องโหว่ Spectre แบบใหม่      Cache   Translate Page   Web Page Cache   

เมื่อวานนี้อินเทลจ่ายเงินรางวัลรายงานช่องโหว่ผ่านแพลตฟอร์ม HackerOne เป็นเงิน 100,000 ดอลลาร์ นับเป็นเงินรางวัลที่สูงที่สุดตั้งแต่เปิดโครงการมา โดยตอนนี้ยังไม่มีข้อมูลว่าเป็นช่องโหว่อะไร ในวันเดียวกันยังมีอีกช่องโหว่ได้เงินรางวัลไป 20,000 ดอลลาร์

โครงการรายงานช่องโหว่ของอินเทลมีเพดานสูงสุด 100,000 ดอลลลาร์สำหรับช่องโหว่ระดับวิกฤติในฮาร์แวร์ และยังมีโครงการพิเศษรายงานช่องโหว่ side-channel แบบ Sprectre/Meltdown เพดานสูงสุด 250,000 ดอลลาร์ เงินรางวัล 100,000 ดอลลาร์จึงเป็นไปได้สองแนวทาง ว่าช่องโหว่นี้เป็นช่องโหว่ฮาร์ดแวร์ระดับวิกฤติ หรือช่องโหว่ side-channel ระดับสูง

อินเทลจ่ายเงินในช่วงเวลาเดียวกับที่รายงานช่องโหว่ Spectre แบบใหม่ เรียกว่า Bounds Check Bypass Store ที่แยกออกมาจาก Bounds Check Bypass หรือ Spectre variant 1

ยังไม่มีการยืนยันว่าช่องโหว่ 100,000 ดอลลาร์นั้นเป็นช่องโหว่ Spectre ที่รายงานออกมาหรือไม่ หน้าโครงการ HackerOne ของอินเทลเองก็ไม่เคยเปิดเผยรายาน

นอกจากช่องโหว่เหล่านี้ อินเทลปล่อยแพตช์ออกมาพร้อมกันอีกหลายตัว ใน Security Center หลายตัวเกี่ยวข้องกับความปลอดภัยเฟิร์มแวร์ ผู้ใช้ระดับองค์กรควรตรวจสอบผลกระทบและเร่งอัพเดต

ที่มา - The Register, Intel

Topics: 

          Don Eyles: Space Hacker [video]      Cache   Translate Page   Web Page Cache   
Comments
          Hackers Have a New Favorite Target: Gas Stations      Cache   Translate Page   Web Page Cache   

Hackers Have a New Favorite Target: Gas StationsHackers Have a New Favorite Target: Gas Stations



          PUBG: Bekannter Twich-Streamer wird für einen Monat gesperrt      Cache   Translate Page   Web Page Cache   
Das Team der PUBG Corp hat in dieser Woche dem bekannten Twitch-Streamer Michael "Shroud" Grzesiek einen einmonatigen Bann erteilt, weil dieser kurzzeitig mit einem Cheater spielte. Der Hacker war nicht Teil von Shrouds Squad, sondern lediglich ein…
          Microsoft challenges iPad with $599 Surface Go tablet - The Sydney Morning Herald      Cache   Translate Page   Web Page Cache   

The Sydney Morning Herald

Microsoft challenges iPad with $599 Surface Go tablet
The Sydney Morning Herald
Microsoft has taken direct aim at Apple's entry-level iPad with a new tablet of its own, announcing the $599 Surface Go will launch in Australia next month. The 10-inch Go is smaller, lighter and less powerful than the existing Surface Pro tablet, but ...
Spec Shootout: Microsoft Surface Go Vs iPad Vs Galaxy Tab S3Lifehacker Australia
Microsoft hits Go on iPad rivalThe Australian
Microsoft debuts cut-price Surface Go tablet to take on cheaper Apple iPadsThe Australian Financial Review
CRN Australia -Sunshine Coast Daily -PCMag -ScienceAlert
all 114 news articles »

          Sony представила Xperia XA2 Plus с большим экраном и крутым звуком      Cache   Translate Page   Web Page Cache   
Это первый среднеценовой смартфон Sony, получивший поддержку Hi-Res Audio.
          Как научить подростка копить и тратить с умом      Cache   Translate Page   Web Page Cache   
Если карманные деньги ребёнка улетучиваются быстрее, чем вы зарабатываете, устройте ему такой челлендж.
          Inside Mueller's New Army (Betsy Woodruff/The Daily Beast)      Cache   Translate Page   Web Page Cache   

Betsy Woodruff / The Daily Beast:
Inside Mueller's New Army … Chelsea Manning, Iranian extortionists, and Hillaryland's original hacker—they've all been targets for prosecutors that now work for Team Mueller.  —  As special counsel Robert Mueller's probe has quietly chugged along, outraging the president and encircling …


          Accelerating Pathways for Young Ethical Hackers in Cybersecurity      Cache   Translate Page   Web Page Cache   

Synack, Nav Talent and Morgan Stanley join forces on ThinkCyber, a program to develop the skills and expertise of a new generation of ethical hackers to help protect the American way of life.

(PRWeb July 11, 2018)

Read the full story at https://www.prweb.com/releases/2018/07/prweb15615749.htm


          Don’t be like the #PlaneBae people      Cache   Translate Page   Web Page Cache   

Lifehacker’s Virginia K. Smith on the trend of narrating others’ quasi-public interactions for viral attention: “stop posting pictures of strangers.”

It’s invasive, inappropriate, and can even put the other person in danger. In a world that made any sense, this wouldn’t require further explanation. This would be a commonly understood part of the social contract. Instead, last week alone darkened the internet’s door with stories about the insufferable #PlaneBae saga, as well as one of the more distressing Dear Prudie questions in recent memory (no small feat). In the case of the former, Twitter user Rosey Blair spent hours live tweeting the flirtation of two strangers sitting in front of her on a flight, complete with pictures, garnering hundreds of thousands of retweets (she later made a thirsty attempt to parlay her viral fame into a job at Buzzfeed, which should tell you everything you need to know). In the latter, a Dear Prudie letter writer looked to be let off the hook after getting caught taking an unauthorized photo of an overweight colleague and “[sharing] it in an online community where we discuss the obese people in our lives.”

Odd how the most trivially sociopathic people are so good at sensing where profit is to be made on the “empathy margins” where public and private life blur.

          Asbestos death secretary's family win compensation      Cache   Translate Page   Web Page Cache   
Winifred Thacker was exposed to asbestos dust while walking through the steel foundry while she was at work.
          Hacker offered for sale US Military Reaper Drone documents for $200      Cache   Translate Page   Web Page Cache   

Researchers at threat intelligence firm Recorded Future have reported that a hacker was trying to sell US Military Reaper drone documents for less than $200. The news is disconcerting, the hackers may have obtained the documents related to the Reaper drone by hacking into at least two computers belonging to U.S. military personnel. “Specifically, an English-speaking hacker claimed […]

The post Hacker offered for sale US Military Reaper Drone documents for $200 appeared first on Security Affairs.


          A tainted version of Arch Linux PDF reader package found in a user-provided AUR      Cache   Translate Page   Web Page Cache   

Hackers have poisoned the Arch Linux PDF reader package named “acroread” that was found in a user-provided Arch User Repository (AUR), Hackers have poisoned the Arch Linux PDF reader package, this means that users who have downloaded recently a PDF viewer named “acroread” may have been compromised. ThePDF reader package has been tainted with a malware and Arch […]

The post A tainted version of Arch Linux PDF reader package found in a user-provided AUR appeared first on Security Affairs.


          Hackers steal $13.5 Million from Israeli Bancor exchange      Cache   Translate Page   Web Page Cache   

The Israeli-based decentralized cryptocurrency Bancor exchange is the last victim of a security breach in the cryptocurrency industry. According to a statement published by the Bancor exchange,  an unknown hacker has stolen roughly $13.5 million worth of cryptocurrency. The security breach occurred on July 9, 2018 at 00:00 UTC, the attackers gained access to one […]

The post Hackers steal $13.5 Million from Israeli Bancor exchange appeared first on Security Affairs.


          Hackers and cops hate Apple’s iOS 11.4.1 update      Cache   Translate Page   Web Page Cache   

The iOS version debuting today partially deactivates the Lightning port after an iPhone hasn’t been used for an hour. This makes iPhone hacking more difficult, for both criminals and law enforcement. Previously, this feature was available in iOS betas. iOS 11.4.1 is the first time it’s been in a public version. The goal of this […]

(via Cult of Mac - Tech and culture through an Apple lens)


          Top PUBG Streamer Finds a Hacker and Sparks Debate      Cache   Translate Page   Web Page Cache   
Michael Shroud Grzesiek, a popular PUBG Twitch streamer known for his skilled play and quick reflexes, recently played alongside a hacker. When fans noticed the hacker on Shrouds stream and shared clips on social media, it sparked debate over what to do about top players fraternizing with cheaters.
          Error Code C:31:40      Cache   Translate Page   Web Page Cache   
I just bought a Sony handycam TRV608 from EBay. It was affordable and seemed to be from a reputable electronics repair guy so I felt comfortable purchasing it. . . .
Category: Video Camera: Sony
          Data Recovery on Mac OS X      Cache   Translate Page   Web Page Cache   
The term spot lattice printer is utilized for affect printers that utilization a grid of little sticks to exchange ink to the page
Category: Storage
          Hacker κλέβει στρατιωτικά έγγραφα με το default FTP password από Netgear router - [Newsit.gr]      Cache   Translate Page   Web Page Cache   
Image

Η Recorded Future αναφέρει ότι ο hacker ζητούσε για τα έγγραφα από 150 μέχρι 200 δολάρια. Ποιο είναι το αστείο της υπόθεσης; Η τιμή των εγγράφων είναι μεγαλύτερη! Μετά από έρευνα αποκαλύφθηκε ότι ο hacker χρησιμοποίησε το Shodan, με στόχο κάποια συγκεκριμένα Netgear routers που χρησιμοποιούν ένα...


          PUBG: Bắn cùng hacker, Shroud nhận án phạt cấm chơi một tháng       Cache   Translate Page   Web Page Cache   
none
          Engadget RSS Feed: Popular 'PUBG' streamer faces ban for playing with cheater      Cache   Translate Page   Web Page Cache   

There's no question that PUBG's creators want to crack down on cheating, but some players have wondered: is it really willing to go after superstar players if they play dirty? Apparently, the answer is yes. PUBG Corp has issued a one-month ban to Shroud (aka Michael Grzesiek), one of PUBG's best-known streamers, after a session where he initially complained about and then played with a cheater. The hacker both took Shroud around in a flying car and helped him spot rival players that were otherwise invisible. And did we mention that the hacker wasn't part of Shroud's squad, which is a bannable offense by itself?

Via: Kotaku

Source: Shroud (Twitch 1), (2)


          Popular PUBG Streamer Shroud Banned After Playing with Hackers      Cache   Translate Page   Web Page Cache   
Twitch streamer Michael “Shroud” Grzesiek has been temporarily banned after playing <a href="https://screenrant.com/tag/playerunknowns-battlegrounds/"><strong><em>PlayerUnknown’s Battlegrounds</em></strong></a> with a hacker. The original stream is no longer available, but clips captured by fans continue to spread across social media. The video has reignited the ongoing debate among players about <em>PUBG’s</em> hacker problem. The community finds itself split on whether clips of top players working with hackers calls attention to flaws within the game or if the players are using their popularity to get away with cheating.
          122.02      Cache   Translate Page   Web Page Cache   
The Growth Hacker Wake Up Call: How Growth Hacking Rewrote Marketing’s Best Practices by Ryan Holiday “It was only a matter of time before someone smart said, 'It doesn’t have to be this way. The tools of the Internet and...
          Ольга_Гужва: Как использовать свечи правильно…      Cache   Translate Page   Web Page Cache   
svecha2

Большинство из нас обращается со свечами неправильно. В итоге нам приходится отскребать копоть с подсвечника и испытывать на себе другие досадные последствия. Следуйте советам, описанным в статье, и вы станете настоящим профи в разжигании свечей…

Как вы зажигаете свечу и обращаетесь с ней, пока она горит? Никогда не задумывались? Многие не имеют и малейшего представления о том, как использовать приобретённую свечу по максимуму. Оказывается, достаточно следовать всего пяти простым советам.

clip_image001

1. Обрезайте фитиль.

В первую очередь не забудьте обрезать фитиль, как на правой свече.

Не ленитесь, делайте это каждый раз, когда собираетесь зажечь новую свечу.

Как это сделать?

Обрежьте фитиль таким образом, чтобы длина его видимой части составляла не более 6 миллиметров. Для этого вы можете использовать обычные ножницы, кусачки для ногтей или специальный триммер для обрезания фитиля свечи. Не важно, что именно вы выберете.

Кстати, удобнее всего зажигать свечу длинными спичками.

Зачем нужно это делать?

Во-первых, пламя свечи будет гораздо ярче и красивее. Если вы не обрежете фитиль, пламя скорее всего примет странную грибообразную форму, из-за которой оно будет выглядеть более тускло и размыто.

 

clip_image002

Разница видна сразу.

Во-вторых, чересчур длинный фитиль — это основная причина тех самых отвратительных пятен копоти, которые хорошо видны на стеклянных подсвечниках. Укорачивание фитиля поможет удержать пламя под контролем и не даст этим пятнам появиться.

 

clip_image003

Не хотите, чтобы подсвечник выглядел вот так? Обрезайте фитиль!

2. Дайте воску полностью расплавиться.

Когда вы зажгли свечу, не гасите её, пока верхний слой воска полностью не расплавится. Это может занять несколько часов. Если вы не готовы ждать столько времени, лучше вообще не зажигайте свечу.

clip_image004

Зачем это нужно?

Если вы не дадите воску полностью стаять, то образуется лунка или целый кратер. Фитиль будет опускаться всё ниже и ниже, как будто по центру свечи образуется тоннель. Вот так это выглядит.

В конце концов лунка будет настолько глубокой, что вы вряд ли сможете снова зажечь свечу. Достать до фитиля будет слишком тяжело. Что более важно, весь этот нестаявший воск на стенках подсвечника представляет собой несколько часов наслаждения приятным ароматом и светом от пламени свечи, которые вы оплатили, но использовать уже не сможете.

Да, для этого требуется терпение. Но если каждый раз, когда вы будете зажигать свечу, вы позволите воску полностью стаять, то поверхность свечки останется ровной, а стенки подсвечника — чистыми. И они будут такими всё время, пока свеча действительно не израсходуется.

 

clip_image005

И снова оцените разницу.

3. Купите свечи с несколькими фитилями.

Довольно тяжело найти время для того, чтобы свеча расплавилась так, как описано в предыдущем пункте.

Что делать?

Приобретите свечу с двумя или тремя фитилями. Чем больше пламени, тем больше тепла и тем быстрее растает свеча.

Обратите внимание на один факт. Следует избегать очень широких свечей с одним фитилём. Тепла от одного фитилька явно не хватит для того, чтобы полностью растопить всю свечу.

4. Защитите пламя свечи от потоков воздуха.

Постарайтесь сделать всё возможное для того, чтобы горящая свеча находилась достаточно далеко от вентиляторов, кондиционеров, открытых окон или мест, мимо которых часто проходит большое количество людей.

Потоки воздуха могут повлиять на пламя свечи, отчего на стенках стеклянного подсвечника появится ещё больше неприглядных тёмных отметин.

 

clip_image006

На свече слева стенка испачкана из-за колебания пламени.

5. Не задувайте свечу.

Чтобы потушить свечу, накройте её какой-нибудь крышечкой, но не задувайте (если, конечно, это не свеча с тортика на вашем дне рождения). Так вы сможете избежать неприятного запаха.

Теперь вы готовы. Пользуйтесь свечками так, как это делают профессионалы, экономьте деньги и усилия и полноценно наслаждайтесь приобретёнными свечами.

Источник →


          US firm: Chinese hackers infiltrated Cambodia's politics      Cache   Translate Page   Web Page Cache   
China_Cambodia_Cyberattacks_01150Last month, the daughter of a jailed Cambodian opposition party leader received an email from a well-seeming activist at a reputed Cambodian non-profit. For weeks, the sender nudged Monovithya Kem to open an attachment described as containing interview questions.
          Comment on PUBG Streamer Shroud Banned for Teaming Up with Game Hackers by 🍩 blaster      Cache   Translate Page   Web Page Cache   
Go to hell he's the best PUBG Player he didn't did that for his win cause he always wins he did it just for fun man. Why do u want to ban him just because you're not as good as him.
          Director of Marketing - Growth Hacker/Analytics/Acquisitions      Cache   Translate Page   Web Page Cache   
CA-West Hollywood, Located in beautiful West Hollywood, CA, we are a B2C eCommerce company (w/risque consumer electronic products.if you get our drift.) Brought to you by the founders of some of the best known companies in the industry. We're looking for business savvy individuals, who don't get shy too easily, with an interest in joining a fantastic team, within a dynamic work environment, with incredible (I mean i
          White-hat hackers find record number of vulnerabilities      Cache   Translate Page   Web Page Cache   
none
          “SC’s 13,000 voting machines unreliable, vulnerable to hackers, lawsuit alleges”      Cache   Translate Page   Web Page Cache   
The State. The complaint filed in federal district court alleges: In South Carolina, the capacity of the state’s election system to record and count votes reliably is deeply compromised by the state’s unnecessarily vulnerable voting system. Throughout the state, elections … Continue reading
          Top 6 Best Standalone Firewall Software For Windows 2018      Cache   Translate Page   Web Page Cache   
GlassWire-Firewall
In the 1990’s, Windows faced a number of security problems that hackers were quick to misuse. To solve this problem, the firewall came into action. A Firewall software is used to block malicious and/or unwanted network traffic, obviously to secure your PC. Though Windows has a great built-in firewall, it lacks at some point. And […]     Continue Reading

You May Also Like :

If you Liked Top 6 Best Standalone Firewall Software For Windows 2018 , stay connected with Techniblogic.


          Macy's Says Hackers Accessed Online Customers' Credit Card Data      Cache   Translate Page   Web Page Cache   
Macy’s contacted customers that may have been impacted by the breach and said it was offering consumer protection services to them at no cost.
          Hacker rouba documentos militares porque alguém não alterou senha padrão de FTP      Cache   Translate Page   Web Page Cache   
Um hacker está a vender documentos militares sensíveis num fórum dedicado à pirataria, material esse que, segundo se apurou, foi descoberto “dentro” de bases dos EUA. Alguns dos documentos sensíveis, colocados à venda, incluem...

          Hackers can purchase government login credentials for cheap on the dark web      Cache   Translate Page   Web Page Cache   

McAfee discovered that hackers have access to many organizations that have weak credentials when using Microsoft’s Remote Desktop component in Windows-based PCs. Access to these organizations can be bought for very little money.

The post Hackers can purchase government login credentials for cheap on the dark web appeared first on Digital Trends.


          Stolen Military Drone Documents Found for Sale on Dark Web      Cache   Translate Page   Web Page Cache   
An unidentified hacker tried to sell purported U.S. military documents containing information about combat drones, a cybersecurity research firm said, after they were allegedly stolen from an Air Force officer’s computer.
                Cache   Translate Page   Web Page Cache   
A Hacker Was Able To Take Sensitive Documents From The Military Because No One Updated The Routers.
           Embedded Computing Needs Hardware-Based Security       Cache   Translate Page   Web Page Cache   
Embedded Computing Needs Hardware-Based Security

Embedded systems are in a profound transition: from physically isolated, autonomous devices to Internet-connected, accessible devices. Designers are learning—often to their dismay—that the mutation requires far more than just gluing a network interface onto the bus and adding an Internet Protocol stack. In many ways, these Internet-aware designs are coming to look less like traditional […]

Embedded systems are in a profound transition: from physically isolated, autonomous devices to Internet-connected, accessible devices. Designers are learning—often to their dismay—that the mutation requires far more than just gluing a network interface onto the bus and adding an Internet Protocol stack. In many ways, these Internet-aware designs are coming to look less like traditional embedded systems and more like miniaturized enterprise data centers.

Much data-center technology—multitasking, multiprocessing, and fast private networks, for example—is already familiar to designers of large embedded systems, albeit on a far smaller scale. But one data-center technology—system security—may prove novel. Yet the same needs that shape data-center security architectures magically appear in embedded systems–once you connect them to the Internet. Unlike compute, storage, or connectivity requirements though, the demands of security don’t diminish much when you scale the system down from a warehouse-sized data center to a connected embedded device.

Data Center Security

So what is it that data centers—and connected embedded systems–need in the way of security? First, they need to protect themselves from external attacks and internal subversion by their own applications. This means providing a protected envelope in which any attempt to read or write code or data will be authenticated before it is performed. It also means that all system code and data—for operating systems, hypervisors, management, or maintenance—must be strongly encrypted when it is in storage or in transit outside that trusted envelope.

Second, data centers must support the security needs of their applications. Apps may provide transport-layer security (TLS, once known as secure socket layer, or SSL) for their clients, or they may use public-key authentication and encryption. They may also require authenticated and encrypted inter-process communication and storage, often using symmetric-key cryptography. They will look to the data center for key management and, often, crypto algorithm acceleration.

There are three common elements to all of these needs. They all require a secure, accelerated environment (Figure 1) in which to execute cryptographic algorithms. They need a safe way to create, store, send, and receive cryptographic keys. And, in order to create strong keys, they need a true random number generator based on a physical source of entropy.

Figure 1. Extreme measures are necessary to protect encryption keys and codes.

Crypto algorithms need a special environment for two reasons. First, they must be kept secure from corruption and monitoring. They are the ideal point of attack in the data center. Second, they can place an unsupportable computing burden on application CPUs, driving up latency in just the places where apps are most latency-sensitive. Both of these arguments suggest a physically secure proprietary hardware accelerator.

The problem of cryptographic key management presents similar issues. Secret keys must of course be kept secret. Less obviously, public keys must be protected from tampering. If a hacker can substitute a key she created for a public key you obtained from a certificate authority, you will authenticate messages from the hacker instead of genuine messages. These concerns preclude allowing unencrypted keys to ever be in server memory or storage. In fact some experts argue that they preclude allowing even encrypted keys into shared memory.

The random number problem is more mathematical. In order to generate a new key, you start with a random number. If the number is not truly random, but follows a statistical pattern, you have just narrowed the space in which an attacker must search to discover the key. Software random-number generators, though, can only approximate a genuinely random distribution. The poorer the approximation, the easier it will be for an attacker to find the key through directed trial and error. So ideally, you would get your random number by sampling a truly random physical process, such as delay-line jitter, RF noise or semiconductor junction noise. There is strong motivation to have a hardware-based random-number generator.

The HSM

These considerations led vendors to develop, and most data centers to install, a specialized appliance called a hardware security module (HSM). In either board or box form factor, the HSM meets the requirements outlined above, with several distinctive features.

First, the HSM is physically tamper-resistant, in much the same manner as a smartcard. The package may be designed to resist penetration, voltage manipulation, thermal attacks, and even examination by x-rays or ion beams. Such events should trigger the module to delete internal memory. Ideally, the module should also block side-channel attacks such as differential power analysis.

Second, the HSM should provide proprietary hardware for crypto algorithm acceleration, key storage, and random-number generation.

Third, the HSM must have a highly restrictive, bullet-proof firewall. The device should only respond to authenticated requests for a small number of pre-defined actions, such as to encrypt or decrypt a string or to create, read, write, or apply a key. Private or secret keys should only be readable under rigorous conditions, and only in encrypted form. Two special functions, key back-and up and restore, usually to a smartcard, and firmware update, must be very carefully controlled, ideally by multi-party authentication involving at least one trusted human.

By providing multiple levels of security, from external tamper protection to strong encryption of internal data and code, the HSM becomes so hard to hack that for most attackers it just isn’t worth the bother (Figure 2). Sadly, in practice it usually isn’t worth the bother because some other part of the data center is much more vulnerable. In any case, the HSM establishes the foundation on which the rest of the data-center security architecture is constructed.

.Figure 2. Full security requires multiple layers of defenses.

Understandably, HSM vendors are uninterested in describing the architectures of their modules. But it is possible to make some generalizations about just what is in a typical box-level HSM (Figure 3).

Figure 3. A typical HSM has a relatively simple structure.

The tamper resistance functions require hardware support, including motion, capacitive, radiation, voltage, and temperature sensors. There will be a secure microcontroller, ideally with in-line encryption/decryption on the memory and I/O interfaces. It will be the job of this MCU to monitor the sensors and supervise the other functions of the HSM. It will also read some sort of analog device to get a seed for random number generation. The MCU should of course also be secure against side-channel attacks.

In addition, there should be secure memory for key storage. Ideally this should be a custom device resistant to scanning from outside and instantly erasable when intrusion is detected. But the very large amount of memory that may be necessary for key storage and for buffers for encryption and decryption tasks in a data center may make DRAM the only practical solution, and the security features will have to be incorporated into the DIMMs.

Since the firewall is so restrictive, it can probably be implemented in a hardware state machine, relieving the MCU of some overhead and reducing the risk of a successful attack on the MCU software. And last but not least, our HSM will include a crypto algorithm accelerator. This would usually be a hardware data path optimized for the necessary encryption and authentication algorithms.

But there is a problem in that last statement. There are dozens of key-exchange, authentication, and encryption algorithms in wide use. Murphy’s Law dictates that a data center will have to support a large subset of them, plus some proprietary algorithms dreamed up by apps developers. Covering all these needs with a fixed hardware accelerator might mean either accelerating only very primitive operations, as in a large bank of multiply-accumulators, and shifting a lot of the work back onto the MCU, or else building a very complex—and very hard to verify—reprogrammable state machine. If the latter approach is taken, there will immediately be pressure from data center managers to make the accelerator more general and more accessible to users for application acceleration. HSM vendors must balance these desires against the absolute need to keep the accelerator verifiable during the design process and secure during operation. Some security experts, though, argue that user programmability and security are fundamentally incompatible. If you want the accelerator to be incorruptible, you must define and verify its functions at design time.

The custom hardware—primarily the crypto datapath—could be done in an easy ASIC, but it would require special attention to ensure that differential power attacks could glean no information from the ASIC’s supply rails, and that the circuitry was protected against voltage and temperature exploits—not unsimilar to the precautions you would take designing a smartcard chip. With these provisions, a secure MCU core could be included in the ASIC as well, if the design team had the necessary expertise or access to appropriate intellectual property (IP). ARM, for example, is now offering a tamper-resistant line of processor IP cores based on the Cortex*-M architecture and called SecureCore. These might prove adequate if the heavy lifting of the crypto algorithms stays in the accelerator.

This custom design could also be done in an FPGA. But use of an FPGA raises some new issues. Most FPGAs are volatile and configured at power-up from an external memory. This boot process can be protected by encryption, and vendors provide for that. Also, most FPGAs have limited or no mixed-signal capabilities, so it might be impossible to integrate the range of sensor inputs required for tamper detection without external analog-to-digital converters (ADCs), which would themselves add to the attack surface and have to be protected. There are exceptions to both the need for external configuration ROM and lack of mixed-signal circuits, but the exceptions tend to be smaller devices, such as the Intel® MAX® 10 device family.

FPGAs also introduce some new opportunities. Because the accelerator datapath would be run-time reconfigurable, the crypto accelerator could be reconfigured for each algorithm family as needed, bypassing the dilemma of flexibility versus security. Additionally, there has been some work in creating entropy sources in FPGAs for use by true random number generators.

All of these implementation options raise another important question. With so many ways to implement the HSM, how can a user know how secure a particular device actually is? The answer is independent certification. The main standard used for HSMs, Federal Information Processing Standard (FIPS) 140-2, was created by the US National Institute of Standards and Technology (NIST). FIPS 140-2 defines four levels of security, ranging from just an unprotected crypto engine on the weak end to an engine and storage subsystem fully enclosed by intrusion and tamper resistant or detecting hardware on the strong end. Each individual design must be certified by a third-party lab recognized under a certification program jointly operated by NIST and Canada’s Communications Security Establishment.

HSMs may also be evaluated at the product level under the international Common Criteria for Information Technology Security Evaluation (glibly known as CC), ISO 15408. This certification process is also done by recognized third-party labs. But unlike FIPS 140-2, which evaluates the overall actual security level of the HSM, CC evaluation in effect only checks that claims submitted by the vendor are supportable. This approach, which may or may not involve actual testing of the product, has been used to, for example, get various versions of Microsoft Windows certified under the CC. So it is pretty much up to the user to determine what was actually certified, at what level, and what the implications are for their own use case.

An Embedded HSM?

The challenges that brought HSMs to the data center are now present in edge computing, with a few important differences. Embedded systems are likely to use just a few crypto algorithms compared to the plethora a data center would face. And similarly, connected embedded systems probably would need to manage far fewer keys than a data center. Both of these differences could simplify the one big problem with bringing HSMs to embedded systems.

That problem is scale. Depending on capabilities and level of security, data-center HSMs cost from hundreds to thousands of dollars. The range in size from PCIe* cards to pizza-sized boxes. For an edge-computing rack full of servers that is not a serious problem. But for a more typical embedded system, supposed to fit into a small box or onto a circuit board inside a mechanical assembly, it is a non-starter. There is a clear need for HSM technology to scale down from the pizza box to chip level without compromising functionality or security.

But is this feasible? Technically, the answer appears to be yes. As we have seen, all the functions of an HSM could in principle be absorbed into an ASIC or FPGA, with the exception of some sensors and the more mechanical elements of physical intrusion detection. And MCU vendors have already offered pieces of a full solution, including secure software-execution modes, on-chip private memories, and limited crypto accelerators. As one report observed, even ordinary smartcard hardware could be used as a reasonably secure but very limited HSM. So an embedded design team with the requisite skills and motivation should be able to produce a chip-level HSM.

But such a project would face several serious challenges. The requisite skills include secure processor and memory design, a good grasp of cryptography, and experience with physical tamper protection. That’s not a common skill set in embedded design teams. The design should get FIPS 140-2 certification. But that can be an expensive and time-consuming process, as can ISO 15408, running into the hundreds of thousands of dollars and months of delays. And all this work could only be amortized across the relatively tiny volumes of the embedded system under design.

Most serious, perhaps would be a less tangible challenge: convincing management to take system security seriously enough to ignore halfway measures and undertake an HSM chip design. Unfortunately, there is still in management a great deal of magical thinking about the threats facing connected embedded systems, even in applications like power generation and transportation where the potential for damage is vast.

But there is another way. Perhaps it is time for a semiconductor vendor, with its far broader market and great access to specialized expertises, to undertake a FIPS 140-2 certified HSM chip. At some point, after a few more high-profile attacks on too-important and too-vulnerable physical plants, further progress in edge computing may require it.