Next Page: 10000

          Google закроет почтовый сервис Inbox      Cache   Translate Page      

Почтовый сервис Inbox от Google, который изначально продвигался как экспериментальный, прекратит своё существование в конце марта 2019 года. Решение о скором прекращении его поддержки было принято даже несмотря на довольно высокий интерес со стороны пользователей.

Google заявляет, что планирует сосредоточиться исключительно на Gmail, который уже успел перенять многие функции и некоторые визуальные решения Inbox. После недавнего редизайна сервис заметно преобразился и стал выглядеть более современно.

Всем пользователям Inbox уже сейчас стоит задуматься о переходе на новый почтовый сервис.


          Все новинки с сентябрьской презентации Apple 2018 года      Cache   Translate Page      

Завершилась сентябрьская презентация Apple, на которой компания всегда показывает новые устройства. Этот год не стал исключением, но оказался практически лишён сюрпризов: анонсировали только смартфоны и часы.

Тем не менее мероприятие, как и обычно, было красивым и, главное, интересным. Все анонсы — ниже.

iPhone Xs, Xs Max и Xr

Новые iPhone выглядят практически идентично iPhone X, но к серебристому и «серому космосу» добавился ещё и золотой цвет корпуса. Одна из моделей, Xs Max, — огромная, 6,5-дюймовая. Диагональ iPhone Xs — 5,8 дюйма.

Оба смартфона получили улучшенные OLED-дисплеи с поддержкой HDR10 и Dolby Vision, вырез для сенсоров никуда не делся. Стало быстрее работать распознавание лиц через Face ID. Были усовершенствованы водонепроницаемость и стереодинамики.

Внутри у устройств теперь шестиядерный процессор A12 Bionic — первый 7-нанометровый чип Apple. Максимальный объём памяти устройств составляет 512 ГБ.

Камеры смартфонов стали значительно лучше, но по большей части в программном плане. В новом режиме Smart HDR есть как минимум пара интересных фишек. Одна из них позволяет делать снимки мгновенно, совершенно без задержки после нажатия на кнопку спуска затвора. Вторая собирает вместе несколько одинаковых кадров с разной экспозицией и создаёт лучшее возможное изображение.

Оба телефона работают немного дольше, чем их предшественник: Xs — примерно на 30 минут, Xs Max — на полтора часа. Появилась поддержка гигабитных LTE-сетей.

За меньшую модель с 64 ГБ придётся выложить 88 тысяч рублей, за большую — 97 тысяч. Продажи начнутся 28 сентября.

Особняком стоит iPhone Xr — смартфон с 6,1-дюймовым ЖК-экраном с «чёлкой» и системой Face ID. Устройство будет доступно в шести разных цветах: чёрном, белом, синем, коралловом, красном и жёлтом.

У iPhone Xr только одна камера сзади. Рамка сделана не из нержавеющей стали, а из алюминия. Устройство защищено от воды и пыли по стандарту IP67, а не IP68. Нет 3D Touch, но есть виброотклик, примерно как на трекпаде MacBook Pro. Зато процессор установлен такой же, как в Xs и Xs Max.

«Бюджетный» смартфон с 64 ГБ памяти будет продаваться по цене 65 тысяч рублей, также появятся варианты со 128 и 256 ГБ. Apple начнёт принимать предзаказы 19 октября, а поставки стартуют 26 октября.

Apple Watch Series 4

Компания существенно переработала дизайн умных часов. Экран вырос более чем на 30%, став практически безрамочным, закруглённым по краям.

Из-за изменений в дизайне громкость динамика немного выросла, сами часы стали тоньше. Задняя часть устройства теперь выполнена из чёрной керамики, дисплей — из сапфирового стекла.

Внутри у Apple Watch Series 4 новый двухъядерный 64-битный процессор S4. Благодаря ему производительность выросла в два раза.

Также компания обновила акселерометр и гироскоп. Часы поймут, если вы упадёте, и сами вызовут скорую помощь, если вы не будете проявлять активность более минуты.

Более того, Apple Watch Series 4 станут первым потребительским продуктом с возможностью делать электрокардиограмму. Для этого достаточно будет запустить специальное приложение и приложить палец к колёсику.

Минимальная стоимость часов с GPS составит 32 тысячи рублей. В продажу они поступят 28 сентября. Новая watchOS 5 станет доступна 17 сентября.


          Кошмары из реальной жизни: о чём рассказывает «Американская история ужасов»      Cache   Translate Page      

По задумке, каждый сезон «Американской истории ужасов» — вариация на тему какого-нибудь классического ужастика. Причём авторы Райан Мёрфи и Брэд Фэлчак нередко брали за основу реальные события и биографии людей.

Сериал представляет собой антологию, то есть истории не связаны друг с другом, а разных героев играют одни и те же актёры. Так, Эван Питерс и Сара Полсон снялись во всех сезонах.

Стартовавший сейчас «Апокалипсис» впервые нарушает эти правила. Авторы решили столкнуть основных персонажей двух самых популярных историй: «Дома-убийцы» и «Шабаша». По этому случаю будет полезно вспомнить, о чём же рассказывали в каждом сезоне сериала и откуда авторы черпали вдохновение.

1. Дом-убийца

Murder House

Первый сезон антологии посвящён семье Хармонов. Бен (Дилан Макдермотт), его жена Вивьен (Конни Бриттон) и дочь Вайолет (Таисса Фармига) переезжают из Бостона в Лос-Анджелес и селятся в опустевшем доме. Новых обитателей смущает лишь одно: бывший хозяин дома убил своего любовника, а потом покончил с собой.

Почти сразу начинают происходить странные вещи. Вивьен нанимает на работу горничную, которую она видит старухой, а муж — соблазнительной девушкой. К Бену на приём начинает ходить подросток, одержимый убийствами, а человек с обожжённым лицом постоянно убеждает хозяев, что этот дом населён призраками.

И действительно, понять, кто из гостей реален, а кто умер много лет назад, с каждой серией всё сложнее. И в это же время Вивьен беременеет близнецами, один из которых должен стать Антихристом.

В первом сезоне авторы использовали немало реальных историй. Например, рассказ о подростке, расстрелявшем своих одноклассников, основан на трагедии в школе «Колумбайн», а среди призраков дома показывают медсестёр, убитых маньяком Ричардом Спеком в 1966 году.

2. Психбольница

Asylum

Действие второго сезона разворачивается в середине шестидесятых в психиатрической больнице «Брайрклифф», которой управляет жестокая монахиня Джуд (Джессика Лэнг). В лечебницу поступает Кит Уокер (Эван Питерс), подозреваемый в убийствах молодых женщин. А журналистка Лана Уинтерс (Сара Полсон), которая освещает в прессе эти преступления, пытается узнать больше о работе клиники.

В этом сезоне намешано очень много: от опытов над психопатами, которые ставит бывший фашист доктор Артур Арден (Джеймс Кромвелл) до инопланетян, ангела смерти и самого дьявола, вселившегося в одну из монахинь (Лили Рэйб). При этом многие жуткие истории из «Психбольницы» тоже основаны на реальных событиях.

Сам «Брайрклифф» — подобие жуткой школы для умственно отсталых «Уиллоубрук», впоследствии закрытой из-за жестокого обращения персонала с детьми. Доктор Арден явно отсылает к жутким экспериментам Йозефа Менгеле, а ещё один персонаж списан с преступника Эда Гина — прообраза Кожаного Лица из «Техасской резни бензопилой».

К тому же похищение героев инопланетянами напоминает об истории Барни и Бетти Хилл, утверждавших, что они вступили в контакт с НЛО.

3. Шабаш

Coven

От рассказов о призраках и сумасшедших авторы «Американской истории ужасов» перешли к колдовству. Через 300 лет после знаменитого салемского процесса ведьм осталось совсем мало, и они стараются скрывать свои умения.

Очередные нападки приводят юных колдуний в специальную школу в Новом Орлеане. Верховная ведьма Фиона (Джессика Лэнг) ведёт себя агрессивно и хочет защитить свой род. Её дочь Корделия (Сара Полсон) настроена более миролюбиво и просто учит девочек защищаться.

У каждой ученицы есть свои секреты. Зои (Таисса Фармига) отправляется в школу после того, как обнаруживает у себя тёмные силы: она может вызвать кровоизлияние у человека, когда занимается с ним сексом. У Мэдисон Монтгомери (Эмма Робертс) есть способности к телекинезу. Куини (Габури Сидибе) может наносить раны другим, если режет себя. Нэн (Джейми Брюэр) слышит чужие мысли.

В основе сюжета — борьба героинь с ведьмами из других кланов и охотниками за нечистью. И здесь авторы вспоминают интересную мифологию. Анджела Бассетт играет жрицу Мари Лаво, что добавляет магии вуду. Появляется даже Папа Легба — посредник между людьми и духами в культе.

Кроме того, в сезоне присутствует Дельфина Лалори (Кэти Бейтс) — легендарная убийца XVIII века — и даже Новоорлеанский Дровосек, нападавший на людей с топором в начале XX века.

4. Фрик-шоу

Freak Show

Этот сезон посвящён ещё одной классической теме ужастиков — цирку уродов. По большей части здесь просто рассказ о буднях бродячих актёров в пятидесятых годах. Когда они прибывают в город Джупитер, в окрестностях появляется убийца в костюме клоуна. Это вызывает агрессию у жителей, которые и так не доверяют обитателям бродячего цирка.

Здесь Райан Мёрфи буквально пошёл ва-банк. Он пригласил сыграть в сериале действительно необычных людей: Амазонку Ив ростом 203 см, Джоти Амджи ростом 62 см, безногую Роуз Сиггинс и многих других.

У остальных персонажей были реальные прототипы. Эван Питерс играет человека-лобстера с деформированными руками. Наоми Гроссман уже во второй раз появляется в роли Пэппер, что странным образом связывает «Фрик-шоу» с «Психбольницей», где также был этот персонаж. А сама Пэппер и её муж похожи на известного персонажа Шлитци.

Но наверное, интереснее всего выглядит Сара Полсон. Здесь она в роли сиамских близнецов с общим телом.

У клоуна-маньяка Твисти тоже был реальный прототип — Джон Уэйн Гейси. В начале XX века он убил больше 30 человек. А затем в сюжете появляется дух Эдварда Мордрейка — одного из самых известных людей с физическими странностями. У Мордрейка действительно было второе лицо на затылке.

Не менее важно то, что тут Райан Мёрфи попрощался с одной из своих любимых актрис — Джессикой Лэнг. До этого она появлялась во всех сезонах «Американской истории ужасов», но роль хозяйки цирка стала на тот момент для неё завершающей.

5. Отель

Hotel

Детектив Джон Лоу (Уэс Бентли) берётся за расследование серии убийств. Немногочисленные зацепки приводят его в отель «Кортез». И чем дальше он разбирается в происходящих там событиях, тем больше убеждается, что все странности связаны с первым хозяином здания, который превратил его в настоящий лабиринт. И конечно же, далеко не все постоянные обитатели «Кортеза» — живые люди.

В этом сезоне авторы сумели привлечь зрителя новой яркой звездой. В сериале появилась Леди Гага. Ей достался образ сексуальной графини-вампира Элизабет — одной из бывших хозяек отеля.

Эван Питерс на этот раз сыграл первого владельца «Кортеза», который уже призраком каждый год собирает на праздник всех знаменитых маньяков. У этого героя тоже, разумеется, был прообраз — первый известный американский маньяк Генри Говард Холмс, построивший отель со множеством тупиков и ловушек. Он убивал работавших у него девушек и получал за них страховые выплаты.

6. Роанок

Roanoke

В шестом сезоне авторы сериала отошли от традиционного формата. «Роанок» показан в виде псевдодокументального шоу, где якобы участники реальных событий рассказывают о том, что с ними случилось, а актёры отыгрывают за них происходящее. Таким образом одни и те же роли играют сразу по два человека: «настоящий» герой и актёр из шоу. Например, Сара Полсон показывает на экране то, что произошло с персонажем Лили Рэйб.

Что интересно, с середины сезона формат сериала снова меняется и «реальные» герои встречаются с актёрами.

Основная сюжетная линия связана с одной из самых старых американских легенд — бесследно пропавшей английской колонией Роанок. Главные герои переезжают в места, где когда-то обосновались поселенцы, и сталкиваются с их призраками.

Кстати, Леди Гага появилась и в этом сезоне. Здесь она сыграла ведьму Ската из ирландской мифологии.

7. Культ

Cult

Сара Полсон играет женщину, страдающую посттравматическим стрессовым расстройством после трагических событий 11 сентября. У неё появляется множество фобий, которые она пытается излечить. Но после победы Дональда Трампа все её проблемы обостряются. Она даже невольно совершает убийство.

В то же время Кай (Эван Питерс) выдвигает свою кандидатуру на выборах в городской совет, а после этого создаёт культ своих единомышленников, готовых убивать.

В этом сезоне авторы впервые отклонились от идей классических хорроров в сторону социального триллера. Это неудивительно, ведь Райан Мёрфи — ярый противник Трампа. В общем, сезон показывает психологическое состояние многих американцев после выборов президента.

8. Апокалипсис

Apocalypse

12 сентября — старт нового сезона «Американской истории ужасов». Впервые создатели сериала решились на полноценный кроссовер. Ранее только некоторые герои появлялись или упоминались в разных сезонах, что мало влияло на сюжет.

«Апокалипсис» станет одновременно продолжением историй «Дома-убийцы и «Шабаша».

Подробности сюжета пока не раскрывают, но уже известно, что к своим ролям вернулись практически все ведьмы. Также появится Джессика Лэнг и главные герои первого сезона. Также появится повзрослевший Антихрист, родившийся в финале «Дома-убийцы».

При этом Сара Полсон подтвердила, что исполнит сразу три роли: две из предыдущих сезонов и неизвестную новую.

Читайте также


          Представлены iPhone Xs, iPhone Xs Max и iPhone Xr — новинки компании Apple      Cache   Translate Page      

12 сентября компания Apple провела в своем кампусе Apple Park презентацию новых устройств, среди которых оказались две модели iPhone. Все они выполнены в дизайне прошлогоднего iPhone X, то есть обладают экраном «от края до края» и небольшим выступом сверху для камер и датчиков.

iPhone Xs

Смартфон iPhone Xs представляет собой плановое обновление с основными изменениями «под капотом». Корпус аппарата выполнен из алюминия и соответствует стандарту защиты IP68. Диагональ дисплея — 5,8 дюйма при разрешении 2436 × 1125 пикселей (458 ppi).

В качестве процессора используется собственный Apple A12 Bionic — первый 7-нанометровый чип компании. Десятиядерная архитектура (6 ядер на вычисления и 4 на графику) обеспечивает отличную производительность. Хранилище новых iPhone Xs ограничено до 512 ГБ. При этом Xs работает на 30 минут дольше от батареи, чем iPhone X.

Динамики новинок обеспечивают стерео-погружение в любой медиа-контент — будь-то игры, фильмы или музыка. Верхний вырез, который также называют «челкой», все ещё занят датчиками и камерами не только для селфи, но и для безопасной разблокировки устройства с помощью лица владельца.

iPhone Xs Max

Эта модель стала самой большой в истории линейки iPhone по параметру диагонали дисплея — 6,5 дюймов при разрешении 2688 × 1242 пикселей. В качестве матрицы инженеры Apple выбрали обкатанную на прошлогоднем iPhone X технологию OLED (Super Retina).

Прирост в автономности iPhone Xs Max составляет 1 час 30 минут в сравнении с iPhone X.

iPhone Xs и Xs Max поддерживают работу с двумя SIM-картами одновременно благодаря технологии eSIM (физическая SIM + виртуальная eSIM). В Китае будет доступна версия с двумя слотами для SIM-карт.

iPhone Xr

Модель с индексом Xr — это обновление для ниши, в которой раньше выступал уже не выпускаемый iPhone SE. Диагональ LCD-дисплея — 6,1 дюйма при разрешении 1792 × 828 пикселей. Процессор — тот же Apple A12 Bionic.

Время работы — на 1 час 30 минут больше, чем у iPhone 8 Plus.

Цены на новые iPhone:

  • iPhone Xs Max — от 1 099 долларов / от 96 990 рублей (в продаже с 28 сентября).
  • iPhone Xs — от 999 долларов / от от 87 990 рублей (в продаже с 28 сентября).
  • iPhone Xr — от 749 долларов / от 64 990 рублей (предзаказ с 19 октября).


          Apple представила новые умные часы Watch Series 4      Cache   Translate Page      

Как и прежде, устройства будут доступны в двух размерах, однако теперь это не 38 и 42 мм, а 40 и 44 мм. Дисплеи при этом были увеличены на 35% и 32% соответственно. Экранные рамки теперь заметно уже, а дизайн в целом стал более обтекаемым.

Все циферблаты и приложения были переработаны под увеличенные дисплеи. Перед глазами будет больше действительно полезного контента, что особенно заметно на модульном циферблате, который отображает только выбранную вами информацию.

Watch Series 4 получили новый двухъядерный чип S4, который вдвое мощнее процессора прошлого поколения. Помимо скорости работы, была заметно повышена точность измерений частоты сердечного ритма и всех спортивных показателей. Это стало возможным за счёт применения нового пульсомера, акселерометра и гироскопа.

При помощи обновлённых датчиков Apple Watch теперь могут определить, когда вы споткнулись или же поскользнулись. Если после падения вы не встаёте, часы автоматически могут вызвать службу спасения. Правда, эта функция будет доступна только в США.

Watch Series 4 теперь будут предупреждать о слишком медленном сердцебиении и выявлять первые симптомы заболеваний сердца. Более того, часы смогут сделать ЭКГ. Для этого нужно лишь приложить палец к колёсику Digital Crown. Отчёт со всеми показателями будет доступен в приложении «Здоровье».

Apple удалось получить разрешение от Управления по контролю за продуктами и лекарствами (FDA) США, которое одобрило использование часов в качестве медицинского устройства. Это позволяет говорить об очень высокой точности измерений.

Конструкция часов полностью переработана с учётом улучшения приёма сигнала сотовой связи. Кроме того, внутри теперь улучшенный динамик и микрофон, убирающий эхо.

По части автономности кардинальных изменений не последовало. Как и прежде, пользователи смогут рассчитывать на полный день активного использования или до 6 часов в режиме тренировки на открытом воздухе. Специально для спортсменов была представлена и обновлённая версия часов Watch Nike+.

Несмотря на изменения в дизайне и увеличение размеров, Apple Watch Series 4 совместимы с ремешками для часов прошлого поколения. Подойдёт как миланское плетение, так и любые другие браслеты, уже доступные в продаже.

Watch Series 4 (GPS) в России будут стоить от 31 990 рублей. В продаже они появятся уже 28 сентября. Версию Apple Watch Nike+ можно будет заказать на официальном сайте Apple с 14 сентября, а в наличии они появятся 4 октября. Продаж модели с LTE в России пока не предвидится.


          Как пить вино: инструкция для чайников      Cache   Translate Page      

Шаг 1. Охладить

У каждого вина есть своя идеальная температура, при которой оно как следует раскроется. И вино надо до неё довести. Не обязательно стоять над ним с градусником: просто, не анализируя, белые закидываем в холодильник на пару часов, красные — минут на 30–40.

Нет холодильника под рукой — тогда в ведро, таз или раковину с ледяной водой. Зимой вино можно убрать на балкон, если там не –30, и на всякий случай надо будет проверять каждые минут 10, как у вина дела.

Педантам и тем, кто не хочет ходить и щупать, достаточно ли бутылка холодна, советуем приобрести специальный термометр — будете знать точно, какая у вина температура. А вот и шпаргалка для обстоятельных, градусы, естественно, выше нуля.

Шаг 2. Открыть

Открывать вино — дело лучших, все присутствующие (герань и кот) смотрят на вас. Права на ошибку нет, улыбаемся, проворачиваем всё легко и изящно.

Чем открывать

Есть нож сомелье — он 2 в 1, и штопор, и нож, на картинке он третий слева. И есть штопор пролетарский — спиралька, иногда с рычагами для извлечения пробки.

Если что, бояться ножа сомелье не надо, его осваивают даже самые трепетные и неумелые граждане, а удобство при использовании такого просто зашкаливает. Короче говоря, советуем.

Ножи сомелье имеются в свободной продаже, часто даже в крупных супермаркетах. Мы вот однажды приобрели нож в «Азбуке Вкуса», по пути в гости, где не было оборудования.

Как открывать вино

Делай раз: естественно, полюбоваться бутылкой, заинстаграмить. Только не надо встряхивать и переворачивать вверх дном в поисках лучшего ракурса, особенно игристые и возрастные красные. Игристые потом будут открываться слишком буйно, а в почтенных красных взбаламутится винный осадок.

Делай два: снять фольгу с пробки — тут и пригодится специальный ножичек у ножа сомелье. Если у вас штопор пролетарский, срежьте фольгу обычным коротким ножом или крепкими маникюрными ножницами. Некоторые заботливые производители приделывают к фольге специальный хвостик, за который можно дёрнуть, чтобы потом легко всё снять.

Делай три: аккуратно ввести спираль ножа сомелье или штопора на три оборота. Соблюдать вертикальное положение, чтобы спираль не закосила и не раскрошила пробку.

Делай четыре: момент икс — извлечь пробку. Если у вас нож сомелье, сначала упритесь в горло бутылки верхним рычажком, потом, когда пробка наполовину вылезет, — нижним. Теперь мягко пробку вытягивайте — сильно тужиться не придётся. Если штопор пролетарский — ну там как-то всё само происходит, тянешь, пока не вылезет.

Делай пять: протереть горлышко (бутылки, не своё) салфеткой и гордо оглядеть зрителей. И пусть процесс открытия видел только кот-пофигист, всё равно вы герой.

Как открывать игристое

Делай раз: главное — не совершать резких движений, бутылку не трясти. Спокойно достать и поставить на стол.

Делай два: дёрнуть за хвостик (у игристых он почти всегда есть), снять фольгу. Открутить проволоку (она называется мюзле), пробку придерживать большим пальцем.

Делай три: взять бутылку в рабочую руку (напоминаем — у правшей правая, у левшей левая), наклонить под углом 45 градусов. Горлышко направить в сторону — не себе в подбородок и не на людей рядом, не то будут жертвы.

Делай четыре: крепко придерживать пробку нерабочей рукой, рабочей мягко проворачивать бутылку то в одну, то в другую сторону. Пробка сама потихоньку вылезет.

Делай пять: почувствовав, что пробка вот-вот вырвется наружу, сосредоточиться и не дать ей улететь в потолок. Или дать.

Шаг 3. Раздышать

Если вино белое, розовое или игристое — его надо просто открывать и пить, шаг 3 пропускаем. Есть исключение — бочковые белые подороже, их нужно открыть минут за 10 до распития. Чтобы раздышались, распушили хвост.

Если у вас красное — ему точно понадобится время подышать. Насытившись кислородом, вино раскрепощается и выдаёт все свои тайны. Особенно нужно продышаться молодым-резвым красным (года 2–3), чтобы сбавили резкость и напор, и зрелым (от 7–8 лет) — чтобы ушла затхлость и проявилась вся возрастная элегантность.

«Раздышать» вино можно двумя способами

Просто открыть заранее

Вино супермаркетное бюджетное, рублей за 700, открываем минут за 5 до распития, «средний класс», что-то в районе тысячи-двух рублей — за 20–30 минут, а что-то старое (от 7 лет) и дорогое (от 2 000 рублей) — за час-два.

Аэрировать

Проще говоря, перелить вино в кувшин, увеличить площадь соприкосновения с воздухом, а заодно и скорость раскрепощения вина. Для ещё большей скорости можно попереливать вино из кувшина в кувшин, только бережно, без истерик. Кувшин сойдёт любой, большую банку от огурцов тоже можно использовать. Наливать надо не всю бутылку, а часть, где-то треть максимум. Раздышать одну партию, выпить, потом раскрепощать следующую. Время нахождения в кувшине — минут 10–20, а если вино ну совсем уж «илитное» — то подольше.

Отступление от темы

Есть ещё слово декантация. Это почти то же, что аэрация, только с дополнительным прибабахом. Вино переливают в вазу особой формы, она же декантер, там оно аэрируется. Главное — потом, когда вино переливают в бокал: декантер в своих изгибах задерживает винный осадок, который так в бокал бы и лез, если бы ему дали волю.

Осадок этот есть далеко не во всех винах — он появляется в вине на 7–10 год жизни. Естественно, такие мы не распиваем на постоянной основе. Поэтому часто практиковать декантацию и заводить эту странную вазу в хозяйстве не обязательно. Она будет пылиться без дела, либо теща конфискует её под букеты.

Шаг 4. Налить: сколько и куда

Под красное и белое нужен стандартный винный бокал объёмом 300–450 мл. Наливать не доверху, как чай, а заполнять примерно на треть. Вино должно быть на уровне самой широкой части бокала. Тогда площадь контакта вина с воздухом максимальна, и оно может как следует подышать ещё и в бокале, ну и поддать в связи с этим больше прелестей.

Для игристого нужен узкий бокал объёмом 150–200 мл. Заполнять на ¾, в общем, лить, пока пена совсем нагло наружу не полезет.

Шаг 5. Пить

Конечно, иногда можно всеми предыдущими правилами взять и пренебречь. Открыть вино ключами от гаража, пить тёплым из картонного стакана. Главное — помнить одну мудрость и неукоснительно следовать ей: «Пей вино так, как ты бы хотел, чтобы оно пило тебя».


В помощь всем, кто хочет разбираться в вине и читать про него на человеческом языке, — сервис Invisible. Там всех наших московских совершеннолетних читателей ждёт подарок — два правильных винных бокала с первым заказом.

Забрать бокалы


          Safari, Edge fans: Is that really the website you think you’re visiting? URL spoof bug blabbed      Cache   Translate Page      
A security researcher had found a flaw which allows potential hackers to spoof URLs in Safari and Edge while visiting a malicious link. However. even weeks after disclosure, while Microsoft has patched the flaw, Apple hasn’t yet shown interest in patching it. The vulnerability is the result of what researcher Rafay Baloch describes as a […]
          That British Airways breach shows hackers fine-tuning e-commerce attacks      Cache   Translate Page      
The British Airways data breach is proof that hackers are getting more and more sophisticated. It took only 22 lines of code for the hackers to break into user data of the UK’s largest airline and steal data from up to 380,000 people. But the hackers behind British Airways’ data breach, which took place from late […]
          Offer - Is your Gmail account traded off? Join our 1-855-479-1999 Gmail Help for quick assistance - USA      Cache   Translate Page      
Are you okay with your Gmail account? Or having security worries with the same? Is your account secure enough to avoid external thefts or hackers? At this point, you will have to defend your account on a quick premise. Why don't you get associated with our Gmail Help group by means of a telephone call to get the correct solution? Just dial 1-855-479-1999 for beneficial results in no time. https://monktech.net/gmail-helpline-number.html
          EmberFest 2017 参加レポート day 1      Cache   Translate Page      

EmberFest 一日目のまとめです。 EU 圏では Ember ユーザーが比較的多く、プロダクション投入している企業も多いようです。 今回の EmberFest では地域コミュニティだけでなくコアコミッターも多数参加しているということだったので、実際にお話してみたいなと思って参加してきました。

f:id:tricknotes:20171017214224j:plain

参加できなかったけど、ぜひ内容知りたい!という方のためにまとめます。

Opening Keynote — Ember.js in the year 2020

ここ最近、Ember core / CLI からドキュメントまで幅広い守備範囲をカバーしていくれている @locks の発表。 2020年(というよりかは少し先の未来)に向けた Ember のやっていきの話でした。

バージョンアップに伴う API の変更を、ユーザー / ライブラリ開発者にとっても極力影響の小さいものにしつつ、着実に進化しているんだなぁというのがよくわかる発表でした。 ここ最近は目に見えてインパクトのある機能は追加されていないように見えますが、内部構造は大きく改善されているというのがよくわかる内容でした。 Glimmer については、後述の"Compile-time optimizations for you and me"で踏み込んで解説されているのでご参照ください。

Designing Immutable data flows in Ember

例えば React のような不変なデータ構造を Ember に導入するとどういう状態になるか、というパターン実装の話。 Ember のアプリケーションステートは得てして複雑になりがちで、そこに不変データ構造を持ち込むとどれくらいシンプルになるかという思考実験。(と言いつつ、彼はおそらくプロダクションでも使っていると思われる)

  • Ember.Object (Ember Data を含む) は大変ステートフルだよね、という前提がある。
    • Ember は observer パターンで DOM 変更の要・不要を検知しているので、基本的にはオブジェクトのプロパティの変化に興味がある。
  • そこで、immutable data flow を導入してはどうか、というご提案
    • data tracking が簡単になる
    • 状態管理がシンプルになる
    • 2 way binding とか、結構大変…
  • 例えば、this.set('name', newName) する代わりに、this.set('user', newUser) するのだとどうか1
  • Immutable Component のコンセプト
    • 引数のプロパティを更新したくなるような場合、コンポーネント生成時に受け取った引数と同じ型のデータを生成して親のアクションを呼び出す
    • データの生成は Object.assign や Spread object properties を使う
    • このコンセプトは、composition が深い場合もうまくいく
    • "data down actions up"
  • これを徹底すると、データフローがわかりやすくなるだけではなくコードもシンプルになる
    • ネストの下層のものだけ監視したいようなコードを書く場合、とても上手く機能する すべての状態が更新されるので、トップレベルのオブジェクトだけ監視するので十分になる
    • 例: @computed('user.{firstName,lastName}') -> @computed('user')
    • そしてこれは、Ember だけではなく Glimmer の場合も上手く機能する

Ember の CoC から少々逸れているように思われたのが気になりましたが、内容としてはとても理にかなっていると思いました。 原理主義的なアプローチ…というだけでもなく、状態管理+コードが実際にシンプルになる点は興味深かったです。 いまだとコーディング規約と思想で実現するしかないので、もう少し具体的な何か(例えば Lint ?)がライブラリとして提供されるようになる採用しやすくなるのかもしれません。

Treeshaking in Ember CLI

  • 話者 : Alex Navasardyan - @twokul

Ember CLI チームでとてもアクティブなコアメンバーである @twokul の発表。 長年の課題であった Tree-shaking のご提案。(参考: https://dockyard.com/blog/2014/11/28/ember-wish-list)

  • ビルド後の最終成果物に、利用されていないコードを含めないようにするためのアプローチについて。
    • 現状は、すべてのコードがビルド後の JS に含まれている。たとえアプリケーションから使われていないコードがあっても。
    • 実はこれはなかなか根が深い問題で、Ember の本体が DI によって動的にモジュール解決する仕組みを導入することに起因している。
      • Ember 自体は古くから開発されていることもあり、いまとなっては Legacy だと思われる部分のひとつである
    • しかし、これは module API によって解決可能となる2
  • いまは最初の実装を試している、という段階

多くの部分を聞き逃した可能性がある(ほんとはもっと喋っていた)ので、資料が公開されたらもう少し深掘りして内容を更新したいと思います。

How to start loving Acceptance Tests in Ember.JS

Acceptance test の重要性と、いかにそれを上手く書くかというテクニックの話。

  • SPA ではユーザーの入力を起点に複数のコンポーネントが状態を変更する。
    • もちろん、Unit test が大事だということを否定はしないが、コンポーネント間のつながりの部分のテストが漏れがちなので、Acceptance test を書きましょう。
  • いくつかのポイントを紹介する
    • Mirage + faker を使って、テストデータの定義を管理する
      • 最近の Mirage は Ember Data のモデルを勝手に見つけてくれて便利(以前は、Mirage と Ember Data のモデルの対応を表現するクラスをいちいち作る必要があった)
    • ページオブジェクト(ember-cli-page-object) を使って、シナリオ中の CSS セレクタへの参照をカプセル化する3
    • CSS セレクタの重複が省けるし、テストシナリオの可読性もよくなる
    • andThen はネストさせる必要はないので、テストがシンプルに保てる
  • メンテナンス可能で可読性の高い Acceptance test を書いていきましょう

Ember の開発でいまどきのスタンダードと考えられているテストの書き方を紹介してくれていたのかなという感じでした。 目新しい話ではなかったけど、introduction としてはたいへんよくできたチュートリアルだと感じました。

そういえば、Acceptance test の抽象度を上げるという観点だと Cucumber を利用するのもアリなのかな…という気がするのですが、その利用例はあまり聞いたことがないですね…。

スポンサートーク

  • Simplabs
    • Ember.js + Phoenix をメインのツールとして採用している
    • ソフトウェア開発(受託) / コンサル / トレーニングをやっている
    • 興味あれば、あとで話しかけて!

Ember @ Netflix

Ember を積極採用して、これまでに20個程度のアプリをプロダクション投入した Netflix の実例について。 Netflix ならではの技術スタック・パターンをご紹介。

  • Authentication
    • BOLT UI -> Meechum -> JWT
  • Mixin の生成パターン
    • Ember の Mixin 生成をラップした簡単なコードがある
    • これを使うと、動的な Mixin 生成が簡単に書ける4
  • Query params
    • 素の Query params だと controller と route に似たようなコードを書くことになるので、alt 実装を作った
    • これを使うと、ユーザのテキスト入力の変化の度に検索クエリを発行するような UI がきれいに書ける
  • テストデータ
    • 安定の Mirage を使っている
  • Data Table
    • 大量のデータを扱うグリッドレイアウトを実現したかったので、専用のライブラリ(?)を作った
    • "Ember X Table" 5

20 個も Ember アプリを本番リリースすると、いろいろとパターンが見出されてくるんですね…! これも資料の内容がわかりやすかったので、公開されたらもう少し深掘りします。

Building the Progressive Web App for HackerNews.io in Ember

https://hackernews.ioProgressive Web App (以下、PWA) として作った話。

  • いくつかのポイントとその実装について
    • Service Workers + Metadata でオフラインでも使える
    • Postcss + BrowserTargets でクロスブラウザ対応してる
    • Ember Route で、任意の画面をエントリポイントにできるように URL をサポートしている
    • モデルの適切なマッピング
    • 初期ロードのパフォーマンスを改善するためにいくつか工夫をした
      • 素の状態だとファイルサイズがめちゃくちゃ大きく表示に時間がかかるので、せめて React と同等程度のパフォーマンスを出したい
        • 特にモバイルで影響が大きい
      • まずは jQeury を dependency から外す
      • つぎは vendor.js + app.js で concat して async でロードする
      • rel=dns-prefetch / rel=preconnect / rel=preload meta link を CSS の読み込みに使うと、ダウンロード開始までの時間を短縮できる
      • とくに初期表示に必要な CSS を inline 化する -> - ember-cli-critical
      • CDN を使う
      • ここまでやって、画面表示に必要な時間が 12s -> 4s (話者の環境で、React と同等)になった

とても実践的な話しでした。 "PWA" とはなにかを話者自身がしっかり定義してその実装を工夫した話で、すぐに使えるテクニック集という観点でも参考になりました。

Promoting Ember's best practices by linting code

Ember アプリへの lint 導入の話。

  • Link の種類と Ember でのアプローチ
  • また、Lint の実行タイミングについても、いろいろあるので各自工夫してほしい
    • CLI
    • text editor
    • Git hooks
    • CI
  • Ember の blueprint には ESLint の設定が含まれているので、テスト実行時に ESLint が一緒に実行される
  • また、もし lint がチームで上手く機能していない(毎回 disable にしたり、修正に使う時間がかかりすぎていたり…)場合には lint をやめるということを考えてもよいかもしれない

いくつかのツールは話者が開発したということもあり、話者の Lint への愛を感じました。 JS は曖昧な書き方ができてしまいそれが混乱の原因になりうることが多いので、Lint を強化するというアプローチには正しいように感じられます。

Deep Dive on Ember Events

Ember での Events の仕組みを理解しよう、という話。

  • 前置き
    • 実は Ember の世界では、DOM Events をフレームワークが受け取ったあと、各 Component にディスパッチするというイベントモデルと採用している
    • DOM Event -> Ember Event の順番で、それぞれ子から親にイベントが伝搬していく
      • どこかで propergation を止めることができるが、そうすると以降にイベントは伝搬しない
  • イベントハンドラの書き方と、DOM / Ember Event の対応について6
  • 続いてパフォーマンスの話
    • DOM Event は要素に対してハンドラが生成されるので、ハンドラの設定数に比例してレンダリング速度が像以下する
    • 一方、Ember Event はバブリングを利用しているのでレンダリング速度は一定
    • 実行速度はどちらもあんまりかわらない7
    • また、アプリの書き方によっては DOM Event でも Ember Event でもハンドルすることができる
  • 次は、条件によってハンドラの内容が変わる場合
    • 書き方によっては意図通りに動いたり動かなかったりする8
  • いろいろなイベントハンドラの定義方法があるけど、仕組みを理解したうえでイベントハンドラ使ってね

たしかに Ember の Event の仕組みは概要を理解していないと難しいと感じることがあります。 資料ではとてもわかりやすくハンドラの違いが説明されていたので、ハマったときには読み返してみたい発表内容でした。

Compile-time optimizations for you and me

Glimmer 最適化のアプローチの話。

  • Glimmer を最適化することによって、ビルド時間・実行時間をもっと高速にできる
  • "Flexibility and Optimizability are oppsites"
    • テンプレーティングの柔軟さと最適化可能度は相対する概念である
    • (Less Power) << Ember / Vue / Angular / React+Webpack >> (More power)
    • Ember のテンプレートである Handlebnars が制約が強いため、コンパイル時に最適化が効かせやすい
  • Glimmer VM でのいくつかのアプローチ9
    • 例えば div とか href といったよく使われる文字列(HTML の文字列だけでなく、アプリケーション固有の文字列も含む)を事前に定数表として組み立てておいて、VM ではその表への参照を使う方法
    • 現在はテキストベースの命令を採用しているが、これをバイナリに圧縮するという方法
      • VM がバイナリのまま実行できるようになると、ファイルサイズを圧縮できる
    • 変数のインライン展開
      • コンポーネントへの引数として固定値が渡されそれをテンプレートで参照しているような場合、コンパイル時に引数を定数として置き換える方法
  • Glimmer 単体だとこれらのアプローチは上手くいくことが期待できるが、実は Ember だとまだ課題がある
    • 例えば、Computed Property にはロジックを置けるので、その部分については Glimmer VM では手が出せない
    • もし Handlebars で表現されていれば Glimmer VM で最適化できるが、これについてはもう少し検討が必要

他のライブラリではあまり聞いたことがないアプローチでとても興味深かったです。 もしこれがよいアイディアだと認知されたらきっと他のライブラリでも実装が進むことになると思うので、Ember だけでなく他のライブラリも良くなることが期待されます。


以上、ざっくりとしたまとめでした。 なお今回のレポートは、日本では数少ない Ember コミュニティである Ember.Sapporo のメンバーの協力の元作成されました。

二日目の発表内容についてもまとめ次第公開予定です。


  1. このあたり、スライドがあるととてもわかりやすいので、公開され次第追記予定

  2. コンセプトと API は見通しが立ったので、あとは実装を頑張ればよい、という状態なはず

  3. Ruby の Capybara でも page object を実装したライブラリがあるので、これがアイディアの起源と思われる。 https://github.com/natritmeyer/site_prism

  4. 資料が公開されたら追記予定

  5. 詳細が不明なので、わかり次第追記予定。資料を見た感じだと、@ebryn(Ember のコアコミッター)も参加しているようだったので、かなり力をいれた何かだと思われる

  6. コードを見るととてもわかりやすいので資料を参照のこと

  7. 発表資料中ではグラフで比較されていてわかりやすかった

  8. 資料中にクイズ形式で例がでてくるので参照のこと

  9. Glimmer はテンプレートの描画に独自実装の VM を導入している https://github.com/glimmerjs/glimmer-vm


          Growth Hacker - Canon Canada - Brampton, ON      Cache   Translate Page      
Exceptional analytical skills - you take a data driven approach to make recommendations for KPIs and promotions....
From Canon - Thu, 26 Jul 2018 21:31:40 GMT - View all Brampton, ON jobs
          Offer - Is your Gmail account traded off? Join our 1-855-479-1999 Gmail Help for quick assistance - USA      Cache   Translate Page      
Are you okay with your Gmail account? Or having security worries with the same? Is your account secure enough to avoid external thefts or hackers? At this point, you will have to defend your account on a quick premise. Why don't you get associated with our Gmail Help group by means of a telephone call to get the correct solution? Just dial 1-855-479-1999 for beneficial results in no time. https://monktech.net/gmail-helpline-number.html
          9/12/2018: NEWS: Hackers cripple internet at university      Cache   Translate Page      
EDINBURGH University has become the latest victim of cyber attackers, who yesterday left its internet services crippled for hours. The university’s wireless services, websites and many student services were all affected by the attack, which occurred...
          Hackers clone Tesla Model S key fob in 2 seconds to steal car      Cache   Translate Page      

Feeling reckless and looking for something new to do with your Raspberry Pi? Using a Raspberry Pi 3 Model B+, Proxmark3, Yard Stick One, and a USB battery pack, Belgium researchers needed less than two seconds to clone the key fob of a Tesla Model S.

The reckless part comes into play if you were to actually steal the Tesla. But if you turn to a life of crime, then the researchers believe McLaren, Karma and Triumph are vulnerable to the attack, as well, because like Tesla, the keyless entry solutions for those vehicles are designed by Pektron.

To read this article in full, please click here


          Offer - Is your Gmail account traded off? Join our 1-855-479-1999 Gmail Help for quick assistance - USA      Cache   Translate Page      
Are you okay with your Gmail account? Or having security worries with the same? Is your account secure enough to avoid external thefts or hackers? At this point, you will have to defend your account on a quick premise. Why don't you get associated with our Gmail Help group by means of a telephone call to get the correct solution? Just dial 1-855-479-1999 for beneficial results in no time. https://monktech.net/gmail-helpline-number.html
           Russian hacker behind massive botnet pleads guilty       Cache   Translate Page      
A Russian hacker who at one time gained control over as many as 100,000 computers globally via botnets he created pleaded guilty Wednesday in a Connecticut...
          Comma.ai's George Hotz ousts George Hotz as CEO - TechCrunch      Cache   Translate Page      

TechCrunch

Comma.ai's George Hotz ousts George Hotz as CEO
TechCrunch
Hotz, who gained worldwide fame under the hacker alias “geohot” when he cracked the iPhone and PlayStation 3 as a teenager, isn't leaving the company he founded. Instead, Hotz and two others are part of a new division called Comma.ai research that will ...


           Liverpool student 'killed herself after plea for help unanswered'       Cache   Translate Page      
Ceara Thacker died aged 19 in her halls of residence at the University of Liverpool where mental health support workers failed to arrange a follow-up to an initial appointment due to a backlog.
           Notorious Russian cybercriminal pleads guilty to US...       Cache   Translate Page      
WASHINGTON (AP) - A Russian man considered to be one of the world's most notorious hackers pleaded guilty Wednesday to U.S. charges alleging he operated a...
          Offer - Is your Gmail account traded off? Join our 1-855-479-1999 Gmail Help for quick assistance - USA      Cache   Translate Page      
Are you okay with your Gmail account? Or having security worries with the same? Is your account secure enough to avoid external thefts or hackers? At this point, you will have to defend your account on a quick premise. Why don't you get associated with our Gmail Help group by means of a telephone call to get the correct solution? Just dial 1-855-479-1999 for beneficial results in no time. https://monktech.net/gmail-helpline-number.html
          Trump podepsal příkaz proti vměšování do voleb, obsahuje možné sankce      Cache   Translate Page      
Americký prezident Donald Trump podepsal exekutivní příkaz, jehož cílem je bránit zahraničnímu vměšování do voleb v USA. Obsahuje pokyny pro ministerstva financí a zahraničí týkající se možných sankcí vůči státům a dalším aktérům, kteří by se pokusili volby ovlivnit.
          Offer - Is your Gmail account traded off? Join our 1-855-479-1999 Gmail Help for quick assistance - USA      Cache   Translate Page      
Are you okay with your Gmail account? Or having security worries with the same? Is your account secure enough to avoid external thefts or hackers? At this point, you will have to defend your account on a quick premise. Why don't you get associated with our Gmail Help group by means of a telephone call to get the correct solution? Just dial 1-855-479-1999 for beneficial results in no time. https://monktech.net/gmail-helpline-number.html
          Half-Earth, Half-Baked      Cache   Translate Page      
SUBHEAD: Can a lower human population on only half of Earth's land allow for continuity of life?

By Chris Smaje on 4 September 2018 for Small Farm Future -
(https://smallfarmfuture.org.uk/2018/09/half-earth-half-baked/)


Image above: Insanity itself from Ecomodernists - "A manifesto to use humanity's extraordinary powers in service of creating a good Anthropocene." From (http://www.ecomodernism.org/).

I’ve been writing in my book draft lately about the role of livestock in a small farm future, which has led me by a somewhat circuitous but probably fairly obvious route to reading Harvard biologist and conservationist E.O. Wilson’s Half-Earth (W.W. Norton, 2016), in which he argues that we should leave half our planet’s surface as “inviolable reserves” for nature.

I found it an interesting and informative, if also somewhat vague and rambling, little book (still, if I succeed in publishing a book that’s no more rambling than Wilson’s when I’m 87 I’ll be happy).

One of Wilson’s key points is that we’re not yet even close to knowing all the species with which we share the biosphere, let alone knowing how they fit into wider sets of ecological relationships.

Therefore, from numerous perspectives but not least human self-preservation, he argues that it’s not a good idea to wantonly let species go extinct.

Yet this, sadly, is what’s currently happening by the hand of humanity, with an extinction rate now around a thousand times higher than before the spread of humans around the world.

This amounts to a sixth mass planetary extinction, which will rival over a few human generations what the last one, the Chicxulub asteroid impact that ultimately did for the dinosaurs, achieved on one bad day – but in geological terms, the time difference is slight.

Wilson deploys his biological expertise to great effect throughout the book in a running battle with Anthropocene theorists, “novel ecosystem” enthusiasts and outriders of the ‘ecomodernist’ Breakthrough Institute like Emma Marris and Erle Ellis who’ve likewise detained me on this website over the years.

The basic message of the Anthropocenites to threatened species and to the people who wish to defend them runs something like ‘this is a human planet now – so deal with it, or get out the way’.

In practical terms, they raise the valid point that in an ever-changing and stochastic biota there’s never a baseline point of ‘balance’ to which conservationism can aim its restorative efforts.

To which Wilson makes the nice rejoinder that this is a problem that should be formulated as a scientific challenge, not an excuse for throwing up our hands and singing que será será.

But then, in the penultimate chapter, he lets it all run through his fingers. Take this passage:
“The [human ecological footprint] will not stay the same. The footprint will evolve, not to claim more and more space, as you might at first suppose, but less. The reason lies in the evolution of the free market system, and the way it is increasingly shaped by high technology….

Just as natural selection drives organic evolution by competition among genes to produce more copies of themselves per unit cost in the next generation, raising benefit-to-cost of production drives the evolution of the economy. Almost all of the competition in a free market…raises the average quality of life.

Teleconferencing, online purchases and trade, e-book personal libraries, access on the Internet to all literature and scientific data, online diagnosis and medical practice, food production per hectare sharply raised by indoor vertical gardens with LED lighting, genetically engineered crops and microorganisms…” (p.191)
Enough already, Edward…we get your point. After nineteen chapters of amiable good sense, Wilson suddenly goes full ecomodernist, as if some devilish Breakthrough Institute hacker finally figured out how to make him stop his anti-Anthropocene agitating by messing with his neurons like a cordyceps fungus attacking one of his beloved ants.

I won’t dwell here on how wrongheaded all this is – regular readers and commenters on this blog are well appraised of the counter-arguments. I don’t even dispute that there are some aspects of emerging high technology that might help us mitigate some of our present predicaments.

But, my dear professor, the ‘evolution’ of the ‘free market system’ is not among them – rather, it’s the ‘free market system’ (or, more precisely, corporate capitalism – which isn’t really the same thing at all, but is the beast that Wilson is implicitly invoking) that has biodiversity in its deathly grip.

Wilson is pretty vague about what a ‘half-earth’ devoted to inviolable nature would actually look like, though he tells us that it needn’t involve dividing off the planet into large pieces the size of continents or nation-states, and earlier on in the book he demurs from the idea that ‘wilderness’ necessarily implies a lack of human residents.

He favors a lower human population, but says nothing about urban vis-à-vis rural residence or the nature of the agriculture necessary to support a half-earth world (other than his half-baked half-earth of vertical farming and LED lights).

His simple point really is that the number of species going extinct usually varies by something like the fourth root of the area available to them, so if we make half the planet available to wild species we should retain about 85% of them.

Of course, things are more complicated than that in reality, but maybe it’s not such a bad place to start – especially if we proceed by trying to ensure that existing wildernesses and centers of biodiversity are protected first.

A quick look at the FAO’s global land use statistics reveals that in fact only about 37% of the planet’s land area is devoted to agriculture, with about 4% devoted to cities, roads and other artificial surfaces.

So by those lights Wilson’s half-earth ambitions are already achieved – though it’s doubtless fair to say that we humans have appropriated the nicest territory for our agriculture (about a third of nature’s 60% share is glaciated or barren land).

Still, perhaps when Wilson says we should leave half the earth as “inviolable reserves” he means really inviolable – so no chemical pollution of any kind, and perhaps no climate change either, creeping in from the human side of the planet.

If that’s so, then the ‘half-earth’ idea is a little misleading because it draws attention to land take, when it should really be drawing attention to human practices like GHG emissions and nitrate pollution (another reason to question the ‘land sparing’ critique of organic farming).

Maybe instead of a half-earth we need a quarter-earth – which would be easily achieved by cutting back on rangeland and arable crops grown as livestock fodder (nearly 70% of global agricultural land is permanent meadow or pasture – yet another inconvenient truth for the land sparers, who illogically obsess over the 1% of organically-farmed land).

But I think what we really need is a no GHG emissions and a no pollution earth. How to achieve that?

Well, I’m open to ideas but here’s my half-earth halfpenny’s worth: stop fishing in the open ocean, stop extracting fossil fuels, stop making synthetic fertilizer (except as a stopgap measure via special government derogation).

Decide on the total human land-take, which gives a global per capita acreage. Then divide it up equally between the people of the world for carbon-free homesteading.

Those who prefer not to avail themselves of this generous offer and continue working in the city would be entitled to do so with the proviso that they forfeit, say, 50% of their earnings on top of tax, split between practical conservation, farmer support, agro-ecological research funds and mitigation of the environmental "bads" caused by the commercial-industrial farming that their old-falutin city-slicking ways would probably bring forth.

I’ll admit that it needs working up a bit more – a few details to fill in, some implementation issues to address. Perhaps you can help me in that task.

My starter for ten is that this system won’t emerge by the ‘evolution’ of a free market system increasingly shaped by high technology. Wilson might have realized this, if only he’d consulted an economist biologist…

.

          Delhi: RSS invites leaders across political spectrum for three-day lecture series - Economic Times      Cache   Translate Page      

Economic Times

Delhi: RSS invites leaders across political spectrum for three-day lecture series
Economic Times
RSS invites leaders from across the political spectrum, including Mamata Banerjee, Sharad Pawar, Jairam Ramesh, Shashi Tharoor, Naveen Patnaik, Uddhav Thackeray, and Akhilesh Yadav, for a 3-day lecture series in the capital. For the latest videos ...


          ظهور المرتزقة في المجال السيبراني      Cache   Translate Page      
صفحات رأي ومقالات

ظهور المرتزقة في المجال السيبراني

 "فورين بوليسي"
أيلول/سبتمبر 2018
ظهرت الرسالة النصية الأولى على هاتف أحمد منصور عند الساعة 9:38 من صباح أحد أيام آب/أغسطس الحارة عام 2016. كانت الرسالة غامضة بعض الشيء وباللغة العربية، وقد ورد فيها ما يلي: "أسرار جديدة عن تعذيب الإماراتيين في سجون الدولة" وتبعها رابط تشعبي. وقد بدا كل من الرقم والرسالة، والرسالة المشابهة التي تلقاها في اليوم التالي، غريبًا بالنسبة إلى منصور، وهو ناشط معروف في مجال حقوق الإنسان في دولة الإمارات العربية المتحدة. فقاوم وامتنع عن النقر على الروابط.
بدلاً من ذلك، أرسل منصور الملاحظات إلى معهد أبحاث "سيتيزن لاب" التابع لجامعة تورنتو والمتخصص في حقوق الإنسان وأمن الإنترنت. وبعد العمل بالاتجاه المعاكس، وجد الباحثون أن الروابط التشعبية هي جزء من برنامج تجسس متطور تم تصميمه خصيصًا لاستهداف منصور. ولو نقر على الروابط، لحوّل البرنامج هاتفه إلى "جاسوس رقمي في جيبه"، يتتبع تحركاته ويراقب رسائله ويسيطر على كاميرته وميكروفونه، بحسب ما جاء لاحقًا في تقرير "سيتيزن لاب".
لكن الاكتشاف المهم في التقرير لم يكن التكنولوجيا المستخدمة بحد ذاتها، إذ قامت وكالات الاستخبارات في الدول المتقدمة بتطوير برامج تجسس ونشرها حول العالم. فما برز هو أن معهد "سيتيزن لاب" قد تعقّب البرنامج واكتشف أنه يعود إلى شركة خاصة وهي "مجموعة إن أس أو" الإسرائيلية الغامضة. (يتكون الاسم من الأحرف الأولى من أسماء مؤسسي الشركة الثلاثة). وبطريقة ما، تمكنت هذه الشركة الصغيرة نسبيًا من العثور على ثغرة في أجهزة آيفون الجوالة التي تُعتبر من بين أكثر الأجهزة الخليوية أمنًا في العالم، وقد طورت برنامجًا لاستغلالها – وهي عملية مكلفة للغاية وتستغرق وقتًا طويلاً. وفي هذا السياق، كتب باحثو معهد "سيتيزن لاب" في تقريرهم: "لسنا على علم بأي حالة سابقة تم فيها اختراق نظام حماية أجهزة آيفون عن بُعد ليُستخدم كجزء من حملة هجومية موجّهة".
وتُعد إسرائيل رائدةً على المستوى العالمي في قطاع التكنولوجيا السيبرانية الخاص، حيث تملك على الأقل 300 شركة تغطي كافة المجالات بدءًا من الأمن المصرفي وصولاً إلى الدفاع عن البنية التحتية الحيوية. ولكن في حين أن معظم هذه المؤسسات تهدف إلى حماية الشركات من الهجمات الإلكترونية، استغل بعضها هذا الخط الرفيع الفاصل بين القدرات الإلكترونية الدفاعية وتلك الهجومية لتزويد العملاء بخدمات أكثر شرًا. ففي حالة منصور، يُعتقد أن الإمارات العربية المتحدة قد استخدمت أدوات زوّدتها بها شركة "إن أس أو" لمراقبة أشهر المعارضين في البلاد. (ويقضي منصور الآن حكمًا بالسجن لمدة 10 سنوات بسبب نشره "معلومات كاذبة" على حساباته الخاصة عبر وسائل التواصل الاجتماعي). وفي هذا الإطار، كتب الباحث في مجال السياسات في مؤسسة "راند" ساشا رومانوسكي العام الماضي أنّ "هذه الشركات تقوم بتطبيق تقنيات متطورة أو ربما أكثر تعقيدًا من وكالات الاستخبارات الأمريكية".
ولا تزال خصخصة هذه القدرة الهجومية في مراحلها الأولى. إلا أنها تثير مخاوف واسعة بشأن انتشار بعض الأدوات بالغة القوة وبشأن الطريقة التي تفقد بها الحكومات القدرة على احتكار استخدامها. فعندما تستخدم الأطراف الفاعلة في الدولة الأسلحة الإلكترونية، يكون هناك على الأقل إمكانية التنظيم والمساءلة. ولكن عندما تكون الشركات الخاصة هي الفاعلة، تصبح الأمور أكثر تعقيدًا. وفي هذا الصدد، تمثّل إسرائيل حالة اختبار جيدة. فهي تقدّم إمدادات ثابتة من مشغلي الإنترنت ذوي الكفاءات العالية الذين يتعلمون المهارة هذه أثناء خدمتهم العسكرية في واحدة من نخبة وحدات الاستخبارات في البلاد - والوحدة 8200 هي الأشهَر بينها – وينتقلون بعد ذلك للعمل في الشركات الخاصة. وقال نداف زافرير، وهو جنرال متقاعد وقائد سابق للوحدة 8200، إنّ الجنود الذين يقضون وقتًا في الخدمة لحماية إسرائيل من الهجمات الإلكترونية ينتهي بهم الحال في معرفة كيفية مهاجمة الطرف الآخر. وأضاف، "من أجل سد الثغرة بين الدفاع والهجوم، يجب أن يكون لديك عقلية المعتدي".
ولم تكن قضية منصور مسألةً منفردة. فوفقًا لمعهد "سيتيزن لاب"، تم استهداف نحو 175 شخصًا من قِبل برامج التجسس التي طورتها مجموعة "إن أس أو" منذ عام 2016، ومن بينهم ناشطون في مجال حقوق الإنسان ومعارضون. ويشار إلى أن شركات إسرائيلية أخرى توفّر منتجات مماثلة. وفي هذا الإطار، قال نيمرود كوزلوفسكي، وهو أستاذ مساعد في "جامعة تل أبيب" ومحامٍ متخصص في الأمن السيبراني: "ما من طريقة أخرى، فمن أجل تأمين الدفاع للشبكة، ينبغي تحديد نقاط الضعف". ثم أضاف: "لقد تم إنشاؤها بناءً على معرفة [إسرائيل] المتعمقة بمكامن الضعف والطرق الهجومية هذه. فنحن على دراية تامة بالأهداف".
فلنأخذ على سبيل المثال أشهر هذه الأهداف المزعومة، أي الهجوم الذي نفذته الوحدة 8200 بالتعاون مع "وكالة الأمن القومي" الأمريكية في عامي 2009 و2010 على منشأة إيرانية لتخصيب اليورانيوم في نطنز. لقد تمكنت الوحدة من نشر فيروس حاسوبي - يطلق عليه اسم "ستوكسنت" – داخل المرفق على الرغم من وجود فجوة هوائية هناك، أي أن المرفق كان منفصلًا عمليًا عن شبكة الإنترنت الواسعة. واستهدف الفيروس نظام التشغيل لأجهزة الطرد المركزي المستخدمة في تخصيب اليورانيوم، ما أدى إلى جعلها تتحرك بوتيرة خارجة عن السيطرة وتكسّرها. وعلى ما يبدو، تم اختراق نظام المراقبة أيضًا، إذ لم يلاحظ الإيرانيون بدايةً الضرر الذي كان يحدث.
ولعله ليس من الصدفة أن الكثير من منتجات شركات الدفاع الإلكتروني الإسرائيلية يهدف إلى إحباط الهجمات التي تكون على نمط "ستوكسنت" والتي تهاجم البنية التحتية الحيوية. فتضم هذه الشركات شركة "أبيريو سيستمز" التي يرأسها ضابط مخابرات سابق يدعى ليران تانكمان والتي طورت منتجًا يكتشف التلاعب بالبيانات - "آلة الحقيقة"، كما يسميها تانكمان - في قراءات المستشعِرات في المنشآت الصناعية.
وبالرغم من أن "ستوكسنت" فيروسًا قديمًا ولا يُعمل به الآن سوى كأداة تحليلية، بات اليوم مصدر اهتمام الخبراء في هذا المجال، وذلك لسبب وجيه: لقد كان هجومًا إلكترونيًا ناجحًا للغاية ضد جهة تابعة للدولة، وقد تسبب بأضرار مادية فعلية. وفي هذا الصدد، قال الخبير غابرييل أفنر، وهو مستشار الأمن الرقمي في إسرائيل، "إن عقدًا واحدًا من الزمن في التكنولوجيا هو دهر". ففي أيامنا هذه، تتزايد الهجمات السيبرانية، بحسب ما قال زافرير، وهو القائد السابق للوحدة 8200 ويدير اليوم شركة "تيم 8"، وهي شركة تجمع بين صندوق للمشاريع الرأسمالية وحاضن ومختبر للأفكار. أمّا التطور الذي يقلقه ويقلق وخبراء آخرين فهو انتشار إنترنت الأشياء.
وفي هذا الصدد، قال الخبير بالمسائل المتصلة بالفضاء الإلكتروني في "جامعة هارفارد" بروس شناير: "لقد تحول كل شيء إلى حاسوب: الهاتف والثلاجة وجهاز الميكروويف والسيارة". وتكمن المشكلة في أن شبكة الإنترنت، التي ظهرت في السبعينيات والثمانينيات من القرن الماضي، قد صُمّمت من دون مراعاة المسألة الأمنية. لذلك، يتسابق الجميع الآن إلى سدّ الثغرات في أنظمة المعلومات (مثل البرمجيات) وأنظمة التشغيل (مثل المنشآت الصناعية المادية) قديمة الطراز أو المكتوبة بشكل سيئ أو غير الآمنة. ثم أضاف شناير، وهو أيضًا مؤلف كتاب "انقر هنا لقتل الجميع: الأمن والصمود في عالم شديد الاتصال: "الهجمات أصبحت أسرع وأسهل وأفضل".
فهل يعني ذلك أننا هالكون جميعًا؟ الإجابة المختصرة هي لا – أو أقله ربما لا. فحتى الآن، إذا وضعنا "ستوكسنت" جانبًا، تُعد الهجمات الإلكترونية الأكثر نجاحًا هي تلك التي استهدفت أوكرانيا وإستونيا وتسببت في أضرار مادية واسعة النطاق. وعلى الرغم من أن هذه الهجمات، التي استهدفت شبكات الطاقة والمؤسسات المالية والوزارات الحكومية، قد تسببت بأضرار فادحة، تم تحديدها ومعالجتها بسرعة نسبيًا. ولم يحصل أي من سيناريوهات "يوم القيامة" التي يرغب بعض الخبراء أو النقاد في التحذير منها - مثل سيطرة المتسللين على سلاح نووي أو طائرة تجارية أو برامج ضارة تتسبب في انهيار وول ستريت.
ويعود ذلك جزئيًا إلى أنه "سيتوفر دائمًا للمتسللين الذين ترعاهم الدولة الموارد التي يحتاجونها"، بحسب تانكمان. "إنما المهم هنا هو إلى أي مدى يسبق القطاع العام [الجهات غير التابعة للدولة]. لن يكون هناك أي "سلاح نووي سيبراني" خلال سنة أو سنتين من اليوم، إذ تكمن المسألة في وتيرة التطور بين المهاجمين والمدافعين. فعليك أن تعمل بدون توقف".
وإذا كان جزء من الخطر نابع من الخط الضبابي الذي يفصل بين الدفاع السيبراني والهجوم السيبراني، يأتي جزء آخر من التمييز شبه المعدوم بين المجالين الالكترونيين العام والخاص. ففي تموز/يوليو على سبيل المثال، أصدرت السلطات الإسرائيلية لوائح اتهام عدة ضد موظف سابق في مجموعة "إن أس أو" ادّعت فيها أنه سرق معلومات حساسة ومسجّلة الملكية وهو في طور مغادرته الشركة. غير أن الموظف الذي لم يُكشف عن اسمه اتُهم أيضًا بمحاولة تقويض الأمن القومي: فقد حاول على ما يبدو بيع المعلومات بمبلغ قدره 50 مليون دولار أمريكي في عملة مشفرة إلى مشترٍ أجنبي على الشبكة المظلمة، وهي جزء شاسع من الانترنت وغير ظاهر يتعذر الوصول إليه من خلال محركات البحث العادية.
ولا تشكّل هذه الحادثة التي كشفتها الشركة بسرعة إلا حالة واحدة من بين العديد من الحالات التي توضح مدى ارتباط المجالين الخاص والعام في الحرب السيبرانية. فالقدرات التي كانت تخص الحكومات وحدها تجد اليوم طريقها إلى الشركات خاصة التي غالبًا ما تكون مجرمة.
وأصبحت شيفرة فيروس "ستوكسنت" متاحةً للعلن الآن. ففي عام 2013، سرق متسللون – يُعتقد أنهم من الجنسية الروسية - سلاحًا إلكترونيًا طورته "وكالة الأمن القومي" مستغلةً نقاط الضعف في "مايكروسوفت ويندوز" ونشروه على الانترنت. وفي أيار/مايو 2017، استخدم متسللون آخرون - ربما من كوريا الشمالية – هذا السلاح لإطلاق هجوم فيروس الفدية على صعيد العالم. ويُعتقد أن الهجوم الذي حمل اسم "واناكراي" قد أصاب 200 ألف حاسوب في أكثر من 150 دولة، ومنها أجزاء رئيسية من "دائرة خدمة الصحة الوطنية البريطانية"، قبل أن يتم إيقافه. وفي قضية منفصلة في عام 2013، أثبتت شركة "مانديانت"، وهي شركة خاصة للأمن السيبراني في الولايات المتحدة، أن المتسللين الذين يعملون لصالح الجيش الصيني يستهدفون الشركات الأمريكية والوكالات الحكومية. وفي عام 2015، قامت وحدة 8200 بحسب التقارير باختراق شركة "كاسبرسكاي لاب" الرائدة عالميًا في برامج مكافحة الفيروسات، كما اكتشفت أن الشركة الخاصة كانت تعمل كبوابة خلفية للمخابرات الروسية إلى عملائها، ومن بينهم أكثر من ٢٠ وكالة حكومية أمريكية.
وفي هذا السياق، قال جنرال إسرائيلي متقاعد ومؤسس شركة "بلو أوشين تكنولوجيز" المتخصصة بالهجمات الالكترونية رامي بن أفرايم: "في العالم المادي للحروب، لطالما عُرف بوضوح ما هو عام: أي الدبابات والقبة الحديدية (أنظمة الدفاع الصاروخي) وطائرات أف- ١٦. وتابع: "أمّا في العالم السيبراني اليوم، فالأمر معقد"، إذ يمكن أن تكون البنى التحتية الحيوية، مثل مرافق الطاقة أو محطات معالجة المياه، مملوكةً للقطاع الخاص، كما هو غالبًا الحال في الولايات المتحدة. ولكنها قد تتسبب في أضرار تطال البلد بأكمله إذا ما تعطلت أنظمتها. وكذلك، تمرّ رسائل تعبئة قوات الاحتياط الإسرائيلية في أوقات الحرب عبر شبكات الاتصالات الخاصة. كما أن إنترنت الأشياء - التي ربطت الكثير من منتجاتنا الاستهلاكية - قد خلقت أيضًا نقاط ضعف هائلة.
وأضاف بن أفرايم، وهو طيار حربي سابق: "إذا كنت ترغب في إنزال طائرة، وإذا كنت ترغب في الحصول على قوة جوية، فأنت لا تدخل من الباب الأمامي، أي قمرة القيادة، بل تنال من المطار والأنظمة اللوجستية. وتذهب خلف أجهزة الآيباد التي يأخذها معهم الطيارون إلى منازلهم". وأضاف بن أفرايم، لم يعد هناك "كيانات قائمة بذاتها –فكلّ شيء أصبح جزءًا من شبكة". وحسبما أخبرني نائب وزير الدفاع في ليتوانيا إدفيناس كيرزا في الخريف الماضي في العاصمة فيلنيوس، في إشارة إلى الإجراءات الروسية ضد الدول السوفيتية السابقة الأخرى: "إن الهجمات تأتي من الداخل – المصارف في تراجع والحكومة غير مستجيبة وهناك حالة عدم استقرار عام..."لا فرق إن تم تحصين الحدود"، كما يقولون، "فنحن سنأتي من الداخل".
قد اختارت إسرائيل على سبيل المثال مكافحة المشكلة على مستوى الدولة عن طريق ربط المجالين العام والخاص، وأحيانًا بكل ما للكلمة من معنى. فمركز البلاد للفضاء السيبراني في مدينة بئر السبع الجنوبية لا يضم حرم التكنولوجيا الجديد التابع للجيش الإسرائيلي فحسب، بل أيضًا مجمع شركات ذات تقنيات عالية ومركز النقب للأبحاث السيبرانية التابع لـ"جامعة بن غوريون" و"المديرية السيبرانية الوطنية" التي تتبع مباشرةً مكتب رئيس الوزراء. وقال المستشار الأمني أفنير بإصرار: "هناك جسر مادي بينهما".
وفي عالم أطلقت فيه مؤخرًا وكالة الأمن الداخلي الإسرائيلية، الشاباك، برنامجًا خاصًا يسرّع بدء التشغيل، فإن التعاون بين المجالَين العام والخاص سيزيد. ففي الواقع، عليها أن تتعاون لتواكب التطورات السريعة في مجالات مثل الذكاء الاصطناعي والتعلم الآلي وإنجازات أخرى في القدرات الحاسوبية.
ولم تقم الحرب الالكترونية بتعتيم الخط الذي يفصل بين الهجوم والدفاع فحسب، بل أيضًا مفهوم الملكية السيادية في ما يتعلق بالتطور التكنولوجي - وبالتحديد ما يشكل بالضبط شركة إسرائيلية (أو أمريكية أو صينية). لقد حجبت الإنترنت الحدود، والحرب السيبرانية ليست مستثناة. وكما قال شناير من جامعة هارفارد: "تُصنع الرقائق في (أ) وتُجمّع في (ب) وتكتب البرمجيات في جميع أنحاء العالم من قِبَل 125 فردًا من جنسيات مختلفة". وتبدو هذه الانسيابية شائعةً بشكل خاص في إسرائيل، حيث أنشأت الشركات الأجنبية، التي تملك أموالاً طائلة، مراكز متقدمة لأنشطة الأبحاث والتطوير واشترت الشركات الناشئة المحلية.
وفي حين أن الطبيعة الدولية لتكنولوجيا الحاسوب تعود بفوائد كثيرة، تعقّد عملية التحقق من مصدر الهجوم السيبراني. وبالتالي، إنّ غياب تحديد المصدر يصعّب استجابة الحكومات، وعدم وجود تهديد بالانتقام يجعل الردع عسيرًا، إن لم يكن مستحيلاً. وكتب ديفيد سانجر في مقال نُشر في صحيفة "نيويورك تايمز" مقتبسًا من كتابه "السلاح الأمثل: حرب وتخريب وخوف في عصر الإنترنت": "إنّ السبب في ظهور الأسلحة السيبرانية كأدوات فعالة لكافة الدول مهما كان حجمها يكمن في كونه طريقةً للعرقلة وممارسة السلطة أو النفوذ من دون إشعال حروب ومعارك قتالية".
وفي حين أن القطاع الخاص قد يكون قادرًا على دفع رواتب أعلى لشعبه، ما يجعله يجتذب المواهب والبراعة التكنولوجية، لا تزال الحكومة تحمل ورقةً رابحةً واحدة: القانون. وهذا ما يعيدنا إلى مجموعة "إن أس أو" ومنصور، المعارض الإماراتي. فمن أجل أن تبيع مجموعة "إن أس أو" بشكل قانوني السلاح السيبراني الهجومي الذي استُخدم لاستهداف منصور، كانت بحاجة إلى تصريح من ضابط منظم تصدير الأسلحة الإسرائيلي الموجود في وزارة الدفاع. بهذه الطريقة على الأقل، يتم تنظيم الأسلحة السيبرانية بشكل صارم مثل أنظمة الأسلحة الأخرى التي يبيعها الإسرائيليون لحكومات أجنبية، وحيث لا يكون التعامل إلاّ مع الحكومات. 
وفي هذا الإطار، قال يوفال ساسون، وهو شريك متخصص في تصدير الدفاع في شركة المحاماة "ميتار" الرائدة في إسرائيل: "إن بيع أنظمة كهذه إلى مؤسسات غير حكومية، مثل شركة أو أصحاب نفوذ سياسي غير قانوني إطلاقًا. وتمامًا مثل بيع طائرة بدون طيار أو رشاش، ينظر الضابط المنظم إلى المستخدم النهائي: أي هوية الحكومة وأعمالها. فالأداء الوظيفي اختبار محوري". وفي حالة الإمارات العربية المتحدة ومنصور، نصح بعض المسؤولين في مكتب المنظّم بعدم بيع هذا النظام لدولة عربية، وفقًا للصحيفة اليومية الإسرائيلية "يديعوت أحرونوت". وأفادت بأن الأسلحة الإلكترونية التي وافق عليها المنظمون أخيرًا كانت أضعف من تلك التي اقترحتها شركة "إن أس أو" وقالت إن بعض المسؤولين في وزارة الدفاع يعارضون الصفقة لأن التكنولوجيا كانت تُباع إلى بلد عربي. ونقلت الصحيفة عن مسؤول رفيع المستوى في الوزارة قوله: "من العار أن يمنحوا تصريحًا كهذا".
وقالت شركة "إن أس أو" في بيان لها إنها تمتثل لجميع القوانين ذات الصلة وإنها "لا تشغّل البرنامج لعملائها، وإنما تطوره فقط". قد يكون هذا الفارق مجرد خدعة، ولكنه يقدم مثالاً آخر على الإشكالات المتعلقة بمسألة الدفاع والهجوم، والخاصة والعامة: فيمكن استخدام الأدوات السيبرانية الخاصة نفسها التي تم توظيفها ضد أعداء الدولة مثل الصحفيين والمعارضين، لاعتراض سبيل تجار المخدرات والإرهابيين أيضًا. ففي الواقع، في عام 2016، استعان مكتب التحقيقات الفيدرالي بشركة إسرائيلية منفصلة تُدعى "سيلبريت" لفتح جهاز آيفون الخاص بأحد الإرهابيين المتورطين بتنفيذ هجوم سان برناردينو في كاليفورنيا عام 2015، حيث استخدمت الشركة أداةً سيبرانيةً جديدةً لفتحه بعد أن رفضت شركة "آبل" أن تقوم بذلك. ويقال إن "سيلبريت" تبيع منتجاتها في أكثر من 100 بلد.
وفي حين أن بعض المنتقدين يلومون إسرائيل على السلوك المارق، فإن البلاد ليست بعيدة عن ذلك. فلا يوجد في التجارة العالمية للأسلحة إلاّ قلة من الأولياء، حتى بين الديمقراطيات الغربية. ومن مصلحة الشركات الإسرائيلية الامتثال للقانون وتجنب التجاوزات ومنع وقوع التكنولوجيا في الأيدي الخاطئة. وعلى حد تعبير أفنر، "يمكن جني الكثير من الأموال، وبشكل قانوني. فلمَ العمل إذًا في الظلال؟"
وفي النتيجة، لم تكن "إن أس أو" تعمل في الظلال. فقد وافقت الحكومة الإسرائيلية على الصفقة التي أجرتها شركة خاصة في ما يتعلق ببيع أسلحة سيبرانية متطورة إلى حكومة عربية لديها مبادلات استخباراتية وأمنية. وكان هذا القرار رمزيًا للطريقة التي تغيرت فيها التكنولوجيا والحرب والسياسة بشكل كبير خلال سنوات قليلة فقط. ولطالما كان هناك عمليات تجسس وعمليات إعلامية وهجمات عسكرية، وكذلك الجهات الخاصة التي تبيع الأسلحة في جميع أنحاء العالم (من بينها، في العقود الأخيرة، العديد من الأفراد العسكريين الإسرائيليين السابقين). أمّا الفرق الآن فهو مدى وصول الأدوات السيبرانية الجديدة وسرعتها وانتشارها السهل. "لقد بدأ سباق التسلح السيبراني ذات الأبعاد التاريخية ولكن الخفية"، بحسب سانجر - والسباق عالمي. والجانب السلبي المحتمل واضح: سباق تسلح بدون قواعد أو معايير ومن دون خطوط أمامية واضحة. لكن لا مجال للعودة.
وقال بن أفرايم: "يجب أن نتواضع. لقد بدأنا نفهمه للتو". وأضاف: "إنها ثورة حقيقية. فقبل مئة عام، لم يكن من عنصر جوي للحرب. والآن بات عنصرًا حاسمًا لأي جيش". وقال: "الفضاء الالكتروني أكبر من ذلك حتى. اليوم، تفتح عينيك في الصباح – فتجد نفسك فيه".

نيري زيلبر زميل مساعد في معهد واشنطن ومؤلف مشارك (مع غيث العمري) للمقالة "دولة بلا جيش، جيش بلا دولة: تطور قوات أمن السلطة الفلسطينية، 1994-2018".

          Growth Hacker - Canon Canada - Brampton, ON      Cache   Translate Page      
Test and optimize marketing tactics for customer acquisition. We are looking for a marketing Growth Hacker to join our team and take on the challenge of...
From Canon - Thu, 26 Jul 2018 21:31:40 GMT - View all Brampton, ON jobs
          Notorious Russian cybercriminal pleads guilty to US charges      Cache   Translate Page      
A Russian man considered to be one of the world's most notorious hackers pleaded guilty Wednesday to U.S. charges alleging he operated a network of devices used to steal computer credentials, distribute spam emails and install malicious software.
          Notorious Russian Hacker Pleads Guilty In U.S. Court      Cache   Translate Page      
A Russian man considered to be one of the world's most notorious hackers has pleaded guilty to U.S. charges stemming from his operation of the Kelihos botnet, the Justice Department says.
          Assembleia Legislativa do RN confirma ataque hacker em site e suspensão temporária de sua página na internet      Cache   Translate Page      
NOTA ASSEMBLEIA – SISTEMA INFORMÁTICA A Assembleia Legislativa do Rio Grande do Norte informa à sociedade, à imprensa e aos órgãos de controle que o sistema de informática foi atingido por um ataque de vírus promovido por hackers. Permanecem preservados … Continua
          Canada: Une ville victime d'un piratage massif a payé une rançon en bitcoins      Cache   Translate Page      
Après deux jours de blocage, la municipalité a cédé aux hackers…
          Saga launches cybercrime insurance: do you need protection from hackers?      Cache   Translate Page      
Saga has launched new cover for cyber crime which protects customers against cyber attacks, fraud and scams. Find out whether you should by cover.
          Review: Rutherford Ranch 2016 Malbec Reserve and 2015 Cabernet Sauvignon      Cache   Translate Page      

The Rutherford Wine Company operates at least eight different sub-brands (many of which we’ve reviewed here previously), but Rutherford Ranch is arguably its flagship. Today we look at two new releases, both dense reds, from this property in the heart of Napa Valley. 2016 Rutherford Ranch Malbec Reserve Napa Valley – 87% malbec, 9% cabernet […]

The post Review: Rutherford Ranch 2016 Malbec Reserve and 2015 Cabernet Sauvignon appeared first on Drinkhacker: The Insider's Guide to Good Drinking.


          Criando um vírus bat que desliga o PC      Cache   Translate Page      
Os vírus de computador são programas (softwares) que são desenvolvidos desde para desligar um computador ou abrir várias janelas para incomodar o usuário, até para entregar o controle total de um sistema operacional ao hacker. Os vírus mais avançados e arrojados são desenvolvidos em uma linguagem de programação completa como C, C++, Java, Delphi, dentre […]
          FEMME FATALES: VAMPIRAS, HECHICERAS Y MÁS EN EL VII CONGRESO DE ARTE Y LITERATURA GÓTICA      Cache   Translate Page      
Seguimos detallando las muchas actividades que nos aguardan en un Octubre que se presenta especialmente prolijo en estas.

Repetiremos como PONENTES en el VII Congreso sobre arte, literatura y cultura gótica urbana.


Bajo el motivo de las Femme Fatales, nuestra ponencia será la siguiente: “Drácula y Parsifal: raíces mitológicas de sus villanas”.


Allí analizaremos que figuras mitológicas han dado lugar a los personajes de LAS NOVIAS DE DRÁCULA, así como KUNDRY Y LAS MUCHACHAS FLOR, intentando bajo esta nueva luz realizar una relectura de estos mitos literarios modernos.


Aquí os dejo EL PROGRAMA COMPLETO
, recalcando de nuevo que es una CITA IMPRESCINDIBLE para cualquier aficionado serio a la Literatura. Las inscripciones siguen abiertas, ¡os esperamos!

De nuestra participación en el FESTIVAL SUI GENERIS (X SEMANA GÓTICA) hablaremos también en breve.
          Grupo Lazarus ataca câmbios de criptomoedas de SO Mac      Cache   Translate Page      
Grupo Lazarus ataca câmbios de criptomoedas de SO Mac

Este é o primeiro caso em que investigadores da Kaspersky Lab detetaram o grupo Lazarus a distribuir malware direcionado a sistemas operativos Mac, o que representa uma chamada de atenção para os utilizadores que recorrem a este SO para atividades relacionadas com criptomoedas.

Com base na análise da equipa GReAT, o acesso à infraestrutura de câmbio começou quando um colaborador de uma empresa transferiu uma aplicação de um site, aparentemente legítimo, de uma empresa de desenvolve software para câmbio de criptomoedas.

O código da aplicação não levantou suspeitas com exceção de um componente – uma atualização. Em softwares legítimos, este tipo de componentes são utilizados para transferir novas versões de programas. No caso da AppleJeus, este atuou como um modulo de reconhecimento: primeiro, recolheu informações básicas sobre o computador em que estava instalado, enviando-as de volta para o servidor de comando e controlo. Se os hackers considerarem que vale a pena atacar o computador em questão, o código malicioso é novamente enviado sob a forma de software de atualização. Este instala um Trojan de nome Fallchill, uma ferramenta antiga que o grupo Lazarus voltou a atualizar recentemente e que proporcionou aos investigadores uma base para identificar os hackers. Após a instalação, o Trojan Fallchill proporciona-lhes um acesso quase ilimitado ao computador da vítima, permitindo-lhes roubar informações financeiras valiosas ou ativar ferramentas adicionais com o mesmo propósito.

A situação foi exacerbada pelo facto de os hackers terem ativado software para sistemas operativos Windows e Mac, este último sendo, em média, menos atacado por ciberameaças que o Windows. A funcionalidade do malware para ambas as plataformas é exatamente a mesma.

Outro detalhe pouco comum da operação AppleJeus é a de que, apesar de se assemelhar a um ataque à cadeia de abastecimento, na verdade não o é. O fornecedor do software de cambio de criptomoedas que foi utilizado para disseminar o malware no computador das vítimas tem um certificado digital válido para o seu website e registos legítimos do seu domínio. No entanto, e com base na informação pública disponível, os investigadores da Kaspersky Lab não conseguiram identificar nenhuma organização legítima localizada no endereço utilizado para o certificado.

“Detetámos um crescente interesse do grupo Lazarus nos mercados de criptomoedas no início de 2017, quando o software mineiro Monero foi instalado num dos seus servidores por um dos hackers do grupo. A partir daí, têm sido detetados em vários ataques direcionados a serviços de câmbio de criptomoedas juntamente com organizações financeiras legítimas. O facto de terem desenvolvido malware direcionado a utilizadores do sistema operativo Mac – para além do já existente para utilizadores de Windows – e criado uma empresa e um software totalmente fictícios de forma a conseguirem disseminar este malware sem serem detetados por soluções de segurança significa que os potenciais lucros destas operações são elevadíssimos e que poderemos esperar mais casos do género no futuro. Para os utilizadores de Mac, esta é uma chamada de atenção, especialmente se usam os seus computadores para operações relacionadas com criptomoedas,” afirma Vitaly Kamluk, diretor da equipa GReAT APAC da Kaspersky Lab.

O grupo Lazarus, reconhecido pelas suas sofisticadas operações e ligado à Coreia do Norte, é famoso não só pelos seus ataques de ciberespionagem e cibersabotagem mas também pelos ataques financeiros. Vários investigadores, incluindo os da Kaspersky Lab, já haviam reportado ataques anteriores do grupo a bancos e outras grandes organizações financeiras.

De forma a se proteger, e à sua empresa, de ciberataques sofisticados de grupos como o Lazarus, os especialistas da Kaspersky Lab aconselham a:

  • Não confiar absolutamente no código dos seus sistemas. Um website de aspeto legítimo, um perfil de uma empresa ou um certificado digital não são garantias da inexistência de backdoors que terão acesso às suas redes;
  • Utilizar uma solução de segurança robusta, equipada com tecnologias de deteção de comportamento malicioso que permitem a deteção e mitigação de ameaças anteriormente desconhecidas;
  • Subscrever as equipas de segurança IT a serviços de relatórios de inteligência de ameaças para que tenham acesso a informações e relatórios sobre os mais recentes desenvolvimentos em táticas, técnicas e procedimentos de sofisticados atores de ameaças;
  • Utilizar vários fatores de autentificação e hardware wallets no caso de transações financeiras substanciais. Neste caso, é preferível recorrer a um computador isolado e que não é utilizado para aceder à internet nem ao email.

O relatório completo pode ser encontrado em Securelist.com.


          Should You Upgrade to Apple's iPhone XS or iPhone XR?      Cache   Translate Page      

A large chunk of Apple’s audience is already lighting their bank accounts on fire in anticipation of all the neat new gear they can start preordering this week. That’s just the way it is, and partly why Apple can afford to do things like build sprawling, $200 buildings in the heart of Silicon Valley.

Read more...


          Creative Baby Shower Ideas With Lifestyle Expert Collette Wixom      Cache   Translate Page      
Lifestyle Expert and Founder of Mini Style Hacker Collette Wixom joined us live with three creative and unique baby shower ideas. For more information on Collette Wixom, click here or follow her on social media. A big thank you to the following vendors for all their help with the segment. For more info, see the links below. Produced by Be Inspired PR Rentals from Signature Party Rentals Linens from La Tavola Linen Floral Design from Hidden Garden Flowers Stationery by […]
          Latvian hacker who targeted Star Tribune website visitors sentenced to 33 months in federal prison      Cache   Translate Page      
Peteris Sahurovs, 29, was once one of FBI’s most wanted cybercriminals.
          Tesla Model S Hack Could Let Thieves Clone Key Fobs to Steal Cars      Cache   Translate Page      
Despite having proper security measures in place to protect the driving systems of its cars against cyber attacks, a team of security researchers discovered a way to remotely hack a Tesla Model S luxury sedans in less than two seconds. Yes, you heard that right. A team of researchers from the Computer Security and Industrial Cryptography (COSIC) group of the Department of Electrical

          Beware! Unpatched Safari Browser Hack Lets Attackers Spoof URLs      Cache   Translate Page      
A security researcher has discovered a serious vulnerability that could allow attackers to spoof website addresses in the Microsoft Edge web browser for Windows and Apple Safari for iOS. While Microsoft fixed the address bar URL spoofing vulnerability last month as part of its monthly security updates, Safari is still unpatched, potentially leaving Apple users vulnerable to phishing attacks.

          Sistema de informática da Assembleia Legislativa do RN é hackeado e site fica fora do ar      Cache   Translate Page      
O sistema de tecnologia da informação da Assembleia Legislativa do Rio Grande do Norte foi invadido por hackers, conforme confirmou a assessoria do órgão. Por precaução, o Legislativo informou que tirou o site do ar para evitar que os invasores alterem fotos e matérias, e tenta recuperar o acesso aos programas. Na manhã desta quarta-feira […]
          The 5 Announcements From Apple's iPhone Event That Actually Matter      Cache   Translate Page      

Apple held its annual September event earlier today, announcing a new iPhone (a few of them, actually), a new Apple Watch, and a handful of other goodies.

Read more...


          Should You Upgrade to Apple's iPhone XS or iPhone XR?      Cache   Translate Page      

A large chunk of Apple’s audience is already lighting their bank accounts on fire in anticipation of all the neat new gear they can start preordering this week. That’s just the way it is, and partly why Apple can afford to do things like build sprawling, $200 buildings in the heart of Silicon Valley.

Read more...


          Fry Herbs and Seasonings Directly in the White of Your Egg      Cache   Translate Page      

As a writer of food-things and lover of breakfast foods (at non-breakfast times), I have eaten many an egg. I don’t know that there is a preparation I don’t enjoy, but a sunny side up egg, fried in olive oil until the edges are crispy ranks very high on my list. I didn’t think there was much improving on the method,…

Read more...


          BUF早餐铺 | 微软与Adobe发布安全更新;谷歌发布Chrome安全更新;Edge与Safari浏览器存在安全风险;江苏一高校2000多学生信息遭泄露      Cache   Translate Page      
各位Buffer早上好,今天是 2018 年 9 月 13 日星期四,农历八月初四。今天的早餐铺内容有:微软与 Adobe 发布多个安全更新;谷歌发布 Chrome 安全更新,取消网址的“安全”标识;瑞士数据管理公司 Veeam 泄露 4.45 亿条用户数据;僵尸网络 Mirai 和Gafgyt 最新变种目标瞄准企业网络;Edge 与 Safari 浏览器存在安全风险,合法 URL 可被注入恶意内容;江苏一高校2000多学生信息遭泄露,疑被企业用于偷逃税款。 以下请看详细内容: 微软与 Adobe 发布多个安全更新 微软在 9 月 的修复日一共修复了 61 个漏洞,其中 17 个评级为严重,43 个评级为重要,1 个评级为普通。修复的产品包括 Windows、Edge、IE浏览器、Office、ChakraCore、.NET Framework、Microsoft.Data.OData、ASP.NET 等。在补丁发布之时,只有四个是已经“公开通知”的,其余漏洞则很可以已经在野利用。在 17 个严重漏洞中,Windows RCE 漏洞(CVE-2018-8475)、Windows ALPC 提权漏洞(CVE-2018-8440)、Scripting Engine 内存崩溃漏洞(CVE-2018-8457)以及 Windows Hyper-V 中的两个严重远程代码执行漏洞影响较大,用户应尽快修复。 同时,Adobe 共修复了 Flash 播放器和 ColdFusion 中的 10 个漏洞,其中有 6 个为高危,可被攻击者利用实现远程执行任意代码。[来源:thehackernews] 瑞士数据管理公司 Veeam 泄露 4.45 亿条用户数据 近日,安全研究人员在网上发现了一个公开的数据库,其中存储着超过 200 G 的数据,但没有任何安全防护。200 G 的内容包含瑞士智能数据管理服务商 Veeam 的大量用户信息,包括姓名、邮箱地址、居住国等。此外,市场份额、用户类型、企业规模、IP 地址、用户代理等企业信息也暴露无余。数据具体暴露的时间尚不清楚,但研究人员表示,自己 9 月 5 日才发现该数据库,而存储数据库的服务器 IP 在 8 月 31 日就已经有人搜索。目前 Veeam 已经发布公告,正在调查事件详情。[来源:bleepingcomputer] 谷歌发布 Chrome 安全更新,取消网址的“安全”标识 谷歌发布了 Chrome 69.0.3497.92 最新版本,适用于 Windows、MAC、Linux 等系统。新版本修复了一些漏洞,并取消了网址前的“安全”标识。Chrome 69 将不会再特地将HTTPS网站标记为“安全”,而是改在采用HTTP标准协议的网站旁标注“不安全”。这么做的目的是让用户了解不安全的网站,从而进一步推进全网加密。随着Chrome 70即将在10月份发布,当用户输入数据时,HTTP 站点将显示一个红色的“不安全”警告。[来源:us-cert] […]
          The Weekly Standard’s Kavanaugh Fact Check Was Correct      Cache   Translate Page      

Can journalists on the right honestly fact-check journalists on the left? That question erupted this week in a fight over Brett Kavanaugh’s Supreme Court confirmation hearings. The fight, as promised, has exposed media bias. But in this case, the bias is on the left.

The dispute centers on an article published on Sunday by ThinkProgress. The piece, written by Ian Millhiser, argues that Kavanaugh’s answers at his confirmation hearing last week, when combined with a speech Kavanaugh delivered last year, imply that he would overturn Roe v. Wade. It’s a smart and well-written piece. But the headline goes further. It claims that Kavanaugh “said he would kill Roe v. Wade.”

The Weekly Standard, in its “fact check,” said the headline wasn’t true. The author, Holmes Lybrand, wrote: “While ThinkProgress engages in an argument to suggest how Kavanaugh might vote in a Roe v. Wade redo, the article does not provide evidence that ‘Kavanaugh said he would kill Roe v. Wade.’ ” Lybrand delivered the same verdict against MoveOn.org for claiming that Kavanaugh “stated he’d overturn” Roe. He reported that “TWS Fact Check could not find” such a statement from Kavanaugh.

Based on the Standard’s fact check, Facebook declared the ThinkProgress article “false.” This led to a warning label and an editorial demotion of the article on Facebook. Whether Facebook should issue such labels and demotions at all is worth debating. But ThinkProgress and its allies haven’t focused on that question. Their complaint is more specific: They want the Standard to be removed from Facebook’s list of approved fact-checking organizations, on the grounds that the magazine is biased.

Millhiser, in a follow-up article, dismisses the Standard’s fact-checking as “ideological” and accuses the magazine of “placing right-wing ideology before accurate reporting.” He warns: “If Facebook continues its partnership with The Weekly Standard, the consequences could be quite severe for left-leaning outlets generally—or potentially for any other outlet which publishes a news article that The Weekly Standard disagrees with.” Judd Legum, the founding editor of ThinkProgress, says Millhiser’s article was rated false only because “a hack at a right-wing magazine has decided he doesn’t like” it.

Other journalists have joined in this accusation. “@weeklystandard naturally wanted to censor it, because @weeklystandard is unscrupulous,” says one. “Facebook has given the Weekly Standard the power to drive liberal news outlets into the ground,” says another. “This is what happens,” says a third, “when you let non-reality-based organizations into the fact-checking community to achieve ‘balance.’ ” My Slate colleague Mark Joseph Stern presents the best version of the argument.By deferring to the Weekly Standard’s judgment, Facebook is picking sides in an ideological debate,” he writes. “Facebook should not let conservative editors police liberal outlets’ analysis under the guise of fact-checking.”

These writers have done a lot of good work. But in this case, they’re mistaken. This is a matter of fact, not ideology. On Facebook, headlines are far more visible and widely read than articles are. The headline on the ThinkProgress article was false. Kavanaugh didn’t say he would kill Roe. And the Standard was right to point this out.

The Standard has offered to withdraw the “false” rating if ThinkProgress changes its headline. But as of Wednesday, ThinkProgress hadn’t budged. Millhiser insists the headline is true. According to Merriam-Webster, he argues, “the verb ‘say’ or ‘said’ can mean to ‘indicate,’ ‘show,’ or ‘communicate’ an idea.” He maintains that Kavanaugh “indicated, showed, or communicated his intention to overrule Roe” by doing two things. First, a year ago, Kavanaugh said that a 1997 Supreme Court opinion, Washington v. Glucksberg, was “not consistent” with Roe and Planned Parenthood v. Casey, the 1992 opinion that reaffirmed Roe. Second, during last week’s hearings, Kavanaugh said “all roads lead to the Glucksberg test” as the Supreme Court’s rule for defining rights not enumerated in the Constitution.

This is an interesting argument. But it doesn’t show that Kavanaugh “said” he would kill Roe. Let’s start with the dictionary entry Millhiser cited. It defines “say” as “state,” “declare,” “utter,” or “recite.” The only cases in which the definition refers to softer interpretations—“indicate,” “show,” or “communicate”—are when the act is nonverbal. The dictionary gives two examples: “the clock says five minutes after twelve,” and “a glance that said all that was necessary.” Kavanaugh is a person, not a clock. He spoke in words, not glances. To prove he said something, you have to show he said it.

Second, at his hearings, Kavanaugh was asked several times what he thought of Roe. He refused to address the substance of the case. It’s misleading to report that he “said he would kill Roe” when in fact he declined explicit invitations to say he would kill Roe.

Third, Kavanaugh’s 2017 remark that Roe, Casey, and Glucksberg were “not consistent” in their “approach” wasn’t absolute. He noted that although a majority of the court voted in Glucksberg not to assert a specific constitutional right to bodily autonomy (in that case, the issue was assisted suicide), a majority hadn’t voted that way five years earlier in Casey. (In fact, the court explicitly reasoned that Glucksberg and Casey were compatible.) Justice Anthony Kennedy, for whom Kavanaugh clerked—and whose seat Kavanaugh would fill—voted with the conservatives in Glucksberg but also voted in Casey to reaffirm Roe. So you can’t declare, as Millhiser does, that it’s a matter of simple logic to conclude that Kavanaugh “said he would kill Roe.”

Fourth, Kavanaugh repeatedly emphasized at his hearings that Roe could no longer be overturned on its merits alone. He said the court would now have to overcome the additional weight of Casey, which reaffirmed Roe based on stare decisis, a doctrine of deference to precedents. (Kavanaugh made the same point in his 2017 speech: that stare decisis might be why the court reaffirmed Roe, even as it voted the other way in Glucksberg.) In short, Kavanaugh explained why you can’t infer that a judge who believes Roe was wrongly decided would overturn Roe today.

So the Standard’s fact check is correct. By itself, that’s a small point. But ThinkProgress and its allies have made the dispute into something much bigger. By attacking the fact check as biased on the grounds that a conservative magazine published it, they’ve proved the opposite of what they intended. They’ve confirmed that the press is full of left-leaning journalists who sometimes can’t see or acknowledge congenial falsehoods, and they’ve demonstrated how these journalists unite, when challenged, in a tribal chorus to accuse conservatives of trying to “censor” them. In sum, they’ve demonstrated why we need conservative journalists to help check facts.

ThinkProgress does excellent fact-checking of lies on the right. In these cases, it applies the sensible rule that if a person didn’t say something, you can’t accuse him of saying it. Over the years, ThinkProgress has invoked this rule in defense of Barack Obama, Joe Biden, James Comey, and James Clapper, among others. But when the same rule is applied to ThinkProgress, it accuses the fact-checker of ideological hackery. And it calls for the Standard to be removed from Facebook’s panel of approved fact-checking organizations, even though other organizations on the panel, in assessing the Kavanaugh hearings, have applied the same rule.

Watching my colleagues rationalize the false headline, accuse the Standard of imposing ideological censorship under the guise of fact-checking, and castigate Facebook for allowing “non-reality-based organizations into the fact-checking community” is humbling. It’s a reminder that most of us, including me, are good at seeing other people’s biases but lousy at seeing our own. PolitiFact, in its initial report on the Kavanaugh hearings, said the nominee “raised a few eyebrows” when he “called birth control pills abortion-inducing drugs.” Days later, PolitiFact conceded that it had “repeated uncritically a Democratic talking point” and that Kavanaugh had actually been quoting a party in the case. I don’t see any of my colleagues on the left calling for PolitiFact to be removed from Facebook’s panel.

If progressives insist that anyone who challenges them is “non-reality-based”—and that the Weekly Standard’s name on a fact check “tells you all you need to know about how messed up Facebook’s notion of ‘fact-checking’ is”—they’ll seal themselves off in a bubble of mutual affirmation. David Roberts, a Vox blogger, made the key point in a tweet about Millhiser’s article. “A society can’t survive long without shared epistemic authorities and standards,” Roberts wrote. He was echoing Millhiser’s attack on the Standard. But in this case, it’s the Standard that is upholding shared epistemic rules. Said means said.

The Standard often gets things wrong. So does everybody else. We’re all fallible, but we can fact-check one another. In any industry where one group predominates—whites in the corporate elite, men in the entertainment business, liberals in the media—we need scrutiny from people who don’t share the prevailing biases. That’s why the Weekly Standard is on Facebook’s fact-checking panel. And it is doing its job.


          ALRN está fora do ar sob ataque de hackers que exigem resgate em dinheiro para devolver dados roubados      Cache   Translate Page      
Assembleia Legislativa do Rio Grande do Norte está sob um ataque conhecido no meio da informática como ‘ransonware’, um tipo de sequestro de dados, mediante pedido de resgate em dinheiro.
Uma fonte relatou que os primeiros sinais de instabilidade foram notados na noite de quarta para quinta-feira passada, tendo o site oficial da Casa saído do ar totalmente na sexta-feira (07). “Estamos sem intranet desde quinta-feira passada. Não estão dando mais detalhes, mas estamos sem fazer nada, pois, o sistema está travado”, relatou outra fonte.

          2cametrack.info Malware Solution (Help Guidance)      Cache   Translate Page      

2cametrack.info – What is it? 2cametrack.info alerts and redirections indicate malware infection on the PC and negatively affect computer system. Users may not know about penetration of their system by malicious software but they definitely will suffer from the results of its activities. Hackers use hijackers and adware to generate … Continue reading

The post 2cametrack.info Malware Solution (Help Guidance) appeared first on Malware Removal Solution.


          Wahleinmischung mit Sanktionen bestrafen: Trump unterzeichnet neuen Erlass      Cache   Translate Page      
Demnach soll das Dokument in?der nächsten Zeit veröffentlicht werden.? Der Erlass würde Sanktionen gegen jene ausländischen Personen und Organisationen vorsehen, die von den amerikanischen Geheimdiensten der Einmischung in?die Wahlen durch "Hackerangriffe oder auf eine...
          British Airways, 22 righe di codice possono bastare      Cache   Translate Page      
Gli hacker che hanno rubato i dati delle carte di credito di 380mila clienti della compagnia aerea avrebbero inserito una manciata di stringhe Javascript nel sito e nell’app mobile dell’azienda, spostando le informazioni delle transazioni su un server virtuale in Lituania.
          Thackeray: Hiúság vására - Jelenlegi ára: 700 Ft      Cache   Translate Page      

Író: Thackeray
Cím: Hiúság vására
Sorozatcím: Helikon Klasszikusok
Kiadó: Magyar Helikon, Budapest
Kiadás éve: 1962
Nyomda: Kossuth Nyomda, Budapest
Fordító: Vas István
Terjedelme: 889 oldal
Kötése: fűzött egészvászon kiadói borítóban
A könyv méretei: 14, 0 x 19, 0 x 4, 0 cm
Tömege: 0, 62 kg
Átvételi helyek, ahol a rendelés szállítási költség nélkül átvehető:
Budapest IX. kerület Lónyay utcában, egy üzletben.
Szeged Vitéz utcában , egy üzletben.
Hódmezővásárhely Széchenyi térnél , egy üzletben.
A postázás az aktuális postai díjszabás szerint, tömeg alapján történik, előre utalást követően.
Kérem, tekintese meg kínálatunkat, melyben számos érdekességet, ritkaságot találhat.
Thackeray: Hiúság vására
Jelenlegi ára: 700 Ft
Az aukció vége: 2018-09-13 02:15
          Re: Domestic Spying: Tracking your loved one's cell may give you peace of mind, but what are you giving up in the process?      Cache   Translate Page      
Never miss any opportunity guys cause i have never took chances for once my wife has been playing games on me lately but i was so smart to have the contact of a hacker called Blackhatthacker@tuta.io who could help me hack my wife after all was done this hacker hacked my wife phone and brought me results of all the applications she uses to chat after all my investigations on her chats and text messages, it was well known that this woman has planned with a man to kill me slowly and take over all i have worked for. I took out of my time to say a very big thank you to Blackhatthacker@tuta.io
Posted by Jerry Rice
          Re: Domestic Spying: Tracking your loved one's cell may give you peace of mind, but what are you giving up in the process?      Cache   Translate Page      
To all the women and men out there having relationship problems or you feel your spouse is cheating on you my dear stop getting frustrated by your spouse. jeajamhacker@gmail.com have made it easy for us all i have been cheated by my husband and i caught him with the help of jeajamhacker@gmail.com by hacking into my husband phone.
Posted by Adam Ison
          ALRN está fora do ar sob ataque de hackers que exigem resgate em dinheiro para devolver dados roubados      Cache   Translate Page      


O Portal No Ar teve acesso à informação em primeira mão de que a Assembleia Legislativa do Rio Grande do Norte está sob um ataque conhecido no meio da informática como ‘ransonware’, um tipo de sequestro de dados, mediante pedido de resgate em dinheiro.

Uma fonte relatou que os primeiros sinais de instabilidade foram notados na noite de quarta para quinta-feira passada, tendo o site oficial da Casa saído do ar totalmente na sexta-feira (07). “Estamos sem intranet desde quinta-feira passada. Não estão dando mais detalhes, mas estamos sem fazer nada, pois, o sistema está travado”, relatou outra fonte.

Na segunda-feira (10), ao retornar ao trabalho depois do feriadão da Independência, os servidores perceberam que não tinham acesso à intranet e nem ao banco de dados da casa legislativa.

O valor exigido pelos hackers não foi confirmado. Uma das fontes ouvidas pelo Portal No Ar disse que a informação estava sendo tratada pela cúpula da Assembléia. “Eu soube que pediram dinheiro sim. A princípio me falaram em cifras de 1 milhão, mas, depois da reunião de cúpula, um pessoa muito influente me falou que o pedido era em torno de R$ 80 mil”, contou.

Uma das fontes ouvidas contou que acreditava que o setor de informática da Assembleia estaria tentando recuperar as informações do banco de dados via backups, para minimizar o danos provocados pelos hackers.

Em contato com a assessoria de comunicação da Assembleia, o Portal No Ar foi informado de que o diretor geral da ALRN, Augusto Viveiros, e o procurador da Casa, Sérgio Freire, estavam tomando providências para comunicar aos órgãos competentes, e neste momento fazendo Boletim de Ocorrência, para levar ao Ministério Público do RN.

A assessoria de comunicação garantiu também que “os dados da casa estão intactos”, mas confirmou a suspensão total dos trabalhos da casa devido ao ataque.



Portal no Ar



Curta nossa Página


          Guilty: U.S. Convicts Kremlin-linked Russian hacker      Cache   Translate Page      
New reporting reveals former Trump campaign chair Paul Manafort is seeking a plea deal in the Mueller probe, but negotiations have stalled, because the Special Counsel wants information pertaining to Trump and the 2016 campaign. BuzzFeed News also...
          Programmer - Design Hacker (Intern) - AdiDesigns Studio - Paya Lebar      Cache   Translate Page      
Able to google and copy libraries. Internship / Contract ( Entry Level / Junior Executive )....
From InternSG - Mon, 03 Sep 2018 08:05:48 GMT - View all Paya Lebar jobs
          Student, 19, ‘killed herself after a plea for help following an earlier suicide bid went unanswered as welfare staff were on strike’      Cache   Translate Page      
A STUDENT killed herself after a plea for help following an earlier suicide bid went unanswered as welfare staff were striking, it was revealed. Ceara Thacker, 19, died three months after telling advisers at the University of Liverpool she’d attempted to take her life with an overdose. An internal review shows that welfare staff failed […]
          Offer - Is your Gmail account traded off? Join our Gmail Help for quick assistance 1-855-479-1999 - USA      Cache   Translate Page      
Are you okay with your Gmail account? or having security worries with the same? Is your account secure enough to avoid external thefts or hackers? At this point, you will have to defend your account on a quick premise. Why don't you get associated with our Gmail Help group by means of a telephone call to get the correct solution? Just dial +1-855-479-1999 for beneficial results in no time. https://monktech.net/gmail-helpline-number.html
          Report Finds Government and Military Employees Use Weak Passwords      Cache   Translate Page      

WatchGuard Technologies' Internet Security Report for Q2 2018 states that more than50% of military and government employees use weak passwords after analyzing the data leaked from LinkedIn in 2012.

According to their research, after analyzingpasswords associated with 355,023 government (.gov) and military (.mil) accounts from a 117 million encoded database of passwords stolen fromLinkedIn, over 50% of them were crackable in less than two days.

Furthermore, even though all government security training programs ask employees to use complex passwords to avoid providing hackers with an easy to exploit attack vector, the most common passwords throughoutthe analyzed database were"123456," "password," "linkedin," "sunshine," and "111111."

Granted, the dataset analyzed by the Threat Lab team comes from six-year-oldleak published online two years ago, but knowing what other research teams have found out about the passwords exposed in multiple other leaks in the past few years, the statistics most probably still hold out.

Researchers adviseorganization to implement multi-factor authentication solutions

TheWatchGuard researchers also say that if the chosen passwords were at least medium-strength and not your run-of-the-mill "security codes," the time needed to crack them would have exponentially increased from a few hoursto weeks and even years for strong passwords.

"These findings further illustrate the need for stronger passwords for everyone, and a higher standard for security among public service employees that handle potentially sensitive information," says WatchGuard's report .

Moreover, the research team adds that besides better training of government employees in choosing stronger passwords, both state and privately-held organizations must use multi-factor authentication to bring down the prevalence of security incidents due to brute force attacks.

WatchGuard also found out that in over 75% of all malware attacks are performed over the web via HTTP/HTTPS, with brute force login placed on the fourthplace.

Threat actors use substantial numbers of login attempts in the hope of breaking in Internet-facing systems which can lead to disastrous credential exfiltration and significant losses over time.


          Improving endpoint protection is top goal for IT security professionals      Cache   Translate Page      

Improving endpoint protection is top goal for IT security professionals

Three quarters of IT security professionals responding to a new survey have named improving endpoint security as one of their top two goals, with 48 percent saying it's most important.

The study by Ericom Software , a specialist in securing and connecting the digital workspace, finds 'Becoming compliant with mandatory regulations' is second, with 29 percent of respondents naming it as their top goal.

Over 90 percent of participants say that their companies have an active cybersecurity strategy in place. However, almost half are less than 'very confident' that their strategy is sufficient to preempt internet-borne threats.

Almost a third report that their organizations have been victims of a cyberattack. Of those, 13 percent reported a financial impact of over $5 million and 20 percent estimated the impact at between $1 million and $5 million. 62.5 percent of respondents say that if a cyberattack occurred, their organization could tolerate only one eight-hour work day of downtime.

"Having a cybersecurity strategy in place is, of course, essential. But, if it cannot be relied on to protect the organization against threats, it's of limited value," says Daniel Miller, director of product marketing at Ericom Software, "New strains of malware and vulnerable threat vectors are constantly emerging, and as organizations successfully close off known attack vectors, enterprising malicious hackers find new ways to get in. History has demonstrated that companies must continually update cybersecurity strategies to guard against new threats as they emerge."

More information and details of Ericom's solutions to protect endpoints can be found on the company's website .

Image Credit: alphaspirit / Shutterstock


          New Security Research Reveals Password Inadequacy Still a Top Threat      Cache   Translate Page      

WatchGuard’s Q2 2018 Internet Security Report uncovers heightened use of credential-focused attacks and continued prevalence of malicious Office documents

12 September 2018 New research from the WatchGuard Threat Lab shows the emergence of the Mimikatz credential-stealing malware as a top threat and the growing popularity of brute force login attacks against web applications. The research also reveals that 50 percent of government and military employee LinkedIn passwords, largely from the US, were weak enough to be cracked in less than two days, underscoring the reality that passwords alone can’t offer sufficient protection and the need for multi-factor authentication (MFA) solutions. WatchGuard’s Internet Security Report for Q2 2018 explores the latest security threats affecting small to midsize businesses (SMBs) and distributed enterprises.


New Security Research Reveals Password Inadequacy Still a Top Threat

Corey Nachreiner

“Authentication is the cornerstone of security and we’re seeing overwhelming evidence of its critical importance in the common trend of password- and credential-focused threats throughout Q2 2018,” said Corey Nachreiner, chief technology officer at WatchGuard Technologies. “Whether it’s an evasive credential-stealing malware variant or a brute force login attack, cyber criminals are laser-focused on hacking passwords for easy access to restricted networks and sensitive data. At WatchGuard, these trends are driving new innovative defences within our product portfolio, including AuthPoint, our Cloud-based multi-factor authentication solution and our IntelligentAV service, which leverages three malware detection engines to prevent malware strains that evade traditional signature-based antivirus products. Every organisation should seek out vendor and solution provider partners that offer layered protection against these ever-evolving attack techniques.”

The insights, research and security best practices included in WatchGuard’s quarterly Internet Security Report are designed to help organisations of all sizes understand the current cyber security landscape and better protect themselves, their partners and customers from emerging security threats. The top takeaways from the Q2 2018 report include:

Mimikatz was the most prevalent malware variant in Q2. Representing 27.2 percent of the top 10 malware variants listed last quarter, Mimikatz is a well-known password and credential stealer that has been popular in past quarters but has never been the top strain. This surge in Mimikatz’s dominance suggests that authentication attacks and credential theft are still major priorities for cyber criminals another indicator that passwords alone are inadequate as a security control and should be fortified with MFA services that make hackers’ lives harder by requiring additional authentication factors in order to successfully login and access the network.

Roughly half of government and military employee passwords are weak. After conducting a thorough analysis of the 2012 LinkedIn data dump to identify trends in user password strength, WatchGuard’s Threat Lab team found that half of all passwords associated with “.mil” and “.gov” email address domains within the database were objectively weak. Of the 355,023 largely US government and military account passwords within the database, 178,580 were cracked in under two days. The most common passwords used by these accounts included “123456,” “password,” “linkedin,” “sunshine,” and “111111.” Conversely, the team found that just over 50 percent of civilian passwords were weak. These findings further illustrate the need for stronger passwords for everyone, and a higher standard for security among public service employees that handle potentially sensitive information. In addition to better password training and processes, every organisation should deploy multi-factor authentication solutions to reduce the risk of a data breach.

More than 75 percent of malware attacks are delivered over the web. A total of 76 percent of threats from Q2 were web-based, suggesting that organisations need an HTTP and HTTPS inspection mechanism to prevent the vast majority of attacks. Ranked as the fourth most prevalent web attack in particular, “WEB Brute Force Login -1.1021” enables attackers to execute a massive deluge of login attempts against web applications, leveraging an endless series of random combinations to crack user passwords in a short period of time. This attack in particular is another example of cyber criminals’ heightened focus on credential theft and shows the importance of not only password security and complexity, but the need for MFA solutions as a more effective preventative measure.

Cryptocurrency miners earn spot as a top malware variant. As anticipated, malicious cryptominers are continuing to grow in popularity as a hacking tactic, making their way into WatchGuard’s top 10 malware list for the first time in Q2. Last quarter, WatchGuard uncovered its first named cryptominer, Cryptominer.AY, which matches a javascript cryptominer called “Coinhive” and uses its victims’ computer resources to mine the popular privacy-focused cryptocurrency, Monero (XRM). The data shows that victims in the United States were the top geographical target for this cryptominer, receiving approximately 75 percent of the total volume of attacks.

Cyber criminals continue to rely on malicious Office documents. Threat actors continue to booby-trap Office documents, exploiting old vulnerabilities in the popular Microsoft product to fool unsuspecting victims. Interestingly, three new Office malware exploits made WatchGuard’s top 10 list, and 75 percent of attacks from these attacks targeted EMEA victims, with a heavy focus on users in Germany specifically.

The complete Internet Security Report features an in-depth analysis of the EFail encryption vulnerability, along with insights into the top attacks in Q2 and defensive strategies SMBs can use to improve their security posture. These finding are based on anonymized Firebox Feed data from nearly 40,000 active WatchGuard UTM appliances worldwide, which blocked nearly 14 million malware variants (449 per device) and more than 1 million network attacks (26 per device) in Q2 2018.

For more information, download the full report here https://www.watchguard.com/wgrd-resource-center/security-report-q2-2018 . To access live, real-time threat insights by type, region and date, visit WatchGuard’s Threat Landscape data visualization tool today. Subscribe to The 443 Security Simplified podcast at Secplicity.org , or wherever you find your favorite podcasts.

About WatchGuard Technologies

WatchGuard Technologies, Inc. WatchGuard Technologies, Inc. is a global leader in network security, secure Wi-Fi, multi-factor authentication, and network intelligence. The company’s award-winning products and services are trusted around the world by nearly 10,000 security resellers and service providers to protect more than 80,000 customers. WatchGuard’s mission is to make enterprise-grade security accessible to companies of all types and sizes through simplicity, making WatchGuard an ideal solution for distributed enterprises and SMBs. The company is headquartered in S
          Generally Disclosing Pretty Rapidly: GDPR strapped a jet engine on hacked Britis ...      Cache   Translate Page      

AnalysisIf Equifax's mother-of-all-security-disasters last year underlined one thing, it was that big companies think they can weather just about anything cybercriminals and regulators can throw at them.

One unpatched web server, 147 million mostly US customer records swiped, and a political beating that should pulverise a company’s reputation for good (“one of the most egregious examples of corporate malfeasance since Enron,” said US Senate Democratic leader Chuck Schumer), and yet Equifax is not only still standing but perhaps even thriving.

While it’s true the full financial consequences yet to unfold, it’s hard not to notice that its shares last week rode back to within spitting distance of where they were before the breach was made public.

It all stands in fascinating contrast to what is happening in the UK and Europe, where the mood over database security breaches is darkening. It’s not that there are necessarily more of them so much as the speed with which they are being revealed.

Last week’sBritish Airways hack makes an interesting case study, not simply because of the technically embarrassing fact cybercriminals were able to skim up to 380,000 transactions in real time but the speed with which the company owned up to the calamity.

Confessions

According to BA, the attack began at 22.58 BST on August 21, and was stopped at 21:45 BTS on September 5. This meant BA had taken 15 days to notice hackers were grabbing its customers’ card numbers, but under 24 hours to tell the world via Twitter and email a contender for a world record for computer security breach confessions.

Security analysts RiskIQ have speculated that the same gang was behind June’s Ticketmaster web breach , which took a still fairly rapid five days to surface after being discovered on June 23. Perhaps the best example of how the security breach atmosphere is changing is T-Mobile US, which uncovered miscreants slurping account records of 2.2 million customers on August 20 and revealed that fact only four days later.

Compare this haste to Equifax, which detected its breach on July 29 last year, but only told the world months later on September 7.

Why the sudden hurry? In the case of BA, officially, the answer is Article 33 of Europe's GDPR , under which cyber-break-ins involving personal data must be reported within 72 hours. Security breaches are now understood as having their own lifecycle. At the user end, a recent report from EMW Law LLP found that complaints to the UK's Information Commissioner after May’s GDPR launch reached 6,281, a doubling compared to the same period in 2017.


Generally Disclosing Pretty Rapidly: GDPR strapped a jet engine on hacked Britis ...
British Airways hack: Infosec experts finger third-party scripts on payment pages READ MORE

“This is definitely due to the awareness and the run up to the GDPR,” agreed Falanx Group senior data protection and privacy consultant Lillian Tsang. But there’s more to it than that. “Reporting a breach shows awareness, the notion of “doing” something even if the breach cannot be mitigated quick enough. It does show pragmatism, rather than a reactive stance of yesteryears.”

Breaches will never become just another battle scar to be marked up to experience they are too serious and expensive for that no matter what the shareholders think when share prices recover. What is becoming stressful is the speed of disclosure.

“Crisis management is a relatively new yet vitally important area to focus on. As more chief staff realise that it’s a case of when rather than if a breach occurs, it is highly possible that more businesses have a ready-made crisis procedure waiting for a potential strike,” said ESET security specialist, Jake Moore.

As the breaches keep coming however, he believes an example will eventually be made of someone. “The ICO are likely to want to stick the GDPR message to a high-profile company to show its magnitude and therefore companies are ready to show that they are more compliant than ever before.”

It could be that BA’s rapid breach disclosure has set the benchmark at the sort of uncomfortable standard many, including its competitors, will struggle to match.

Sponsored: Following Bottomline’s journey to the Hybrid Cloud


          Hackers Behind the British Airways Data Breach Revealed      Cache   Translate Page      

Security experts at RiskIQ reported that the hackers behind the recent British Airways data breach is the MageCart crime gang. MageCart has been active since at least 2015 and managed to compromise lots of e-commerce websites to steal payment card and other sensitive data. The cyber gang operates by injecting a skimmer script in the […]

The post Hackers Behind the British Airways Data Breach Revealed appeared first on Virus Guides.


          Russian hacker behind massive botnet pleads guilty      Cache   Translate Page      
A Russian hacker who at one time gained control over as many as 100,000 computers globally via botnets he created pleaded guilty Wednesday in a Connecticut court to computer crimes and identity theft.
          N. Korean, Park Jin-Hyok Charged With Global Cyber Attacks      Cache   Translate Page      
By: Denise Simon | Founders Code U.S. CHARGES NORTH KOREAN HACKER Federal prosecutors charged a North Korean man, Park Jin-Hyok, with crimes in connection with a series of costly cyber attacks around the globe, including the WannaCry ransomware attack in 2018, the heist of Bangladesh’s central bank in 2017, and the hack of Sony Pictures [...]
          Delhi: RSS invites leaders across political spectrum for three-day lecture series - Economic Times      Cache   Translate Page      

Economic Times

Delhi: RSS invites leaders across political spectrum for three-day lecture series
Economic Times
RSS invites leaders from across the political spectrum, including Mamata Banerjee, Sharad Pawar, Jairam Ramesh, Shashi Tharoor, Naveen Patnaik, Uddhav Thackeray, and Akhilesh Yadav, for a 3-day lecture series in the capital. For the latest videos ...


          These Are The Best Features Of iPhone XR      Cache   Translate Page      

After months of rumors and speculations we finally have the official iPhone XR announcement. The fascinating new device packs a bunch of features that make it a unique hybrid between the iPhone 8 and iPhone Xs. On the back it features a glass back and single camera, which looks very similar to that of iPhone […]

The post These Are The Best Features Of iPhone XR appeared first on iOS Hacker.


          Apple’s ‘Low-Cost’ Lineup: iPhone XR vs. iPhone 8 vs. iPhone 7      Cache   Translate Page      

With the introduction of three new iPhones, Apple now has a long and somewhat complicated lineup of iPhones. The company is now selling 5 different models, 3 of which are aiming towards the lower end of the market, with iPhone Xs and iPhone Xs Max catering for the high-end. If you have a low to […]

The post Apple’s ‘Low-Cost’ Lineup: iPhone XR vs. iPhone 8 vs. iPhone 7 appeared first on iOS Hacker.


          iPhone XS vs. iPhone XS Max vs. iPhone XR: Specs Comparison      Cache   Translate Page      

Apple announced three new iPhones today: the iPhone XS, the iPhone XS Max, and the iPhone XR. The iPhone XS is the successor to the iPhone X, with the iPhone XS Max being a larger version of the iPhone XS. The iPhone XR looks like an iPhone 8 and iPhone X fused together, featuring a […]

The post iPhone XS vs. iPhone XS Max vs. iPhone XR: Specs Comparison appeared first on iOS Hacker.


          iPhone XS Max vs. Original iPhone 2G: A Comparison      Cache   Translate Page      

Its been 11 years since Apple announced the first iPhone and changed the world of technology for good. The device was revolutionary for its time, and ever since we have seen a great deal of evolution triggered by this device, not just for the iPhone itself but for the whole industry. Today Apple announced iPhone […]

The post iPhone XS Max vs. Original iPhone 2G: A Comparison appeared first on iOS Hacker.


          iOS 12 GM Is Now Available For Download      Cache   Translate Page      

Following its media event in which the company announced the new iPhone XS, iPhone XS Max and iPhone XR Apple has released the iOS 12 Gold Master and it is now available for download for developers. Devices that are already running the iOS 12 beta can download the GM over-the-air. It is also available through […]

The post iOS 12 GM Is Now Available For Download appeared first on iOS Hacker.


          Apple Announces The New iPhone XR      Cache   Translate Page      

Apple has just announced the brand new iPhone XR. This particular iPhone model features an edge-to-edge LCD display, which the company is calling the Liquid Retina. iPhone XR features A12 Bionic Chip, Face ID, Wireless Charging and many other features. The biggest highlight of this iPhone model is its large 6.1-inch LCD screen. Similar to […]

The post Apple Announces The New iPhone XR appeared first on iOS Hacker.


          Apple Announces iPhone Xs And iPhone Xs Max      Cache   Translate Page      

Today at its Special Event Apple has announced the new iPhone Xs and iPhone Xs Max. The iPhone Xs features the same design and screen size as the iPhone X, so it has a 5.8-inch OLED edge-to-edge display display, stainless steel sides and a glass back. Most of the changes on the 5.8-inch model are […]

The post Apple Announces iPhone Xs And iPhone Xs Max appeared first on iOS Hacker.


          Apple Announces The New Apple Watch Series 4      Cache   Translate Page      

Apple has just announced the new Apple Watch Series 4. According to the company everything about it is ‘redesigned and re-engineered’. The biggest highlight of the new device is the larger screen, which offers over 30 percent more real estate than previous models. The device is also made thinner than before. Apple has also included […]

The post Apple Announces The New Apple Watch Series 4 appeared first on iOS Hacker.


          LA ESTAFA QUE QUIERE QUEDARSE CON TODO, TUS DATOS Y TU CUENTA (PARA VACIARLA)      Cache   Translate Page      
La suplantación de identidad -o phishing-  es un método para realizar estafas por internet conocido desde la década de 1980 y comenzó a hacerse popular en los años siguientes, con la popularización de la red de redes. El término phishing fue inventado por el hacker y spammer Khan C. Smith y la primera estafa que se conoce estaba relacionada con robar contraseñas y datos financieros de los usuarios de America Online, según los archivos de la Universidad Cornell. De hecho, la palabra está relacionada con “pescar” usuarios de AOL (“pescar” en inglés es “fishing”.
Una forma habitual es enviar un mail avisando de una deuda o de la falta de actualización de datos de contacto o de pago con una institución conocida. Ese correo incluye un sitio web que, en ocasiones, es similar al de la institución. Cuando se entra al sitio web, la pantalla que aparece solicita una serie de datos que luego usará para obtener dinero (de cuentas bancarias o tarjetas de crédito) o datos directamente para venderlos.
En la actualidad, es uno de los métodos de estafa online más populares, más que nada en su modalidad “bulk” (en criollo, envían mails al voleo). Sin embargo, el número de sitios únicos de phishing identificados por el Antipishing Working Group bajo en el último trimestre de 2017 (180.757 frente a 190.942 en el tercero) y en el año contra año (de un total de 277.693 en el último trimestre de 2016). Esta caída podría deberse a un cambio en la metodología de medición, ya que ahora se computan direcciones web que suelen aparecen con URL personalizadas pero que dirigen al mismo lugar, según consigna el blog Segu-info.

El caso más reciente: PayPal (y Apple)

Como puede verse en la imagen dada a conocer desde la cuenta del Twitter del blog mencionado, el correo en cuestión llega en este caso sin enlace (para evitar las medidas de seguridad de los distintos clientes de correo) pero con un archivo PDF adjunto. En él se informa que los datos propios en la cuenta de PayPal son incorrectos y que si el usuario quiere seguir utilizando la cuenta deberá actualizar. Por supuesto, en el PDF sí aparece una dirección web  que lleva a un sitio web que comienza con “country0-mypapal” y que pide mail y contraseña. Una vez que el usuario introduce los datos, los ladrones se habrán hecho con los datos de PayPal. En el caso de Apple, pide información para quedarse con el Apple ID de los usuarios de la manzanita.

 

Qué buscan

Según Borghello, en este caso se trata tan solo de los datos más básicos del usuario, ya que luego de introducirlos en la pantalla mostrada arriba, el sitio web redirige a la página oficial de PayPal. ¿Qué pueden hacer con esos datos? Si bien no pueden acceder a los datos de las tarjetas de crédito y débito, si pueden utilizar el saldo precargado que se pueda tener en la cuenta, tal como lo confima Camilo Gutiérrez , jefe de Laboratorio de la compañía de ciberseguridad ESET.
Además -dice Rodríguez-, "cuando uno se loguea utiliza el mismo correo electrónico y la misma clave que usa en otros servicios, algo que hacen muchos usuarios; ahí pueden matar muchos pájaros de un tiro". Si consiguen ingresar a la cuenta de email, desde allí podrán modificar y hacerse con las contraseñas de muchos otros servicios, como las de las redes sociales. 
Un dato a tener en cuenta es que quien roba los datos no es quien necesariamente lo va a utilizar. "Estos suelen ponerse a la venta en mercados de la Deep Web. Se trata de bases de datos de, por ejemplo, 10.000 cuentas de correos electrónicos con contraseñas -no todas funcionan, por supuesto- y hay personas que luego utilizan esa información. Así que un posible objetivo es obtener la información para obtener ganancias con ella."
 

Consejos útiles

Desde ya, la recomendación es no hacer caso a este tipo de email. ¿Cómo darse cuenta? Si uno mira el mail, vera que más allá del nombre de fantasía de la cuenta (Centro de Ayuda de PayPal), la dirección real está llena de números y no tiene mucho sentido. En el PDF, hay una serie de errores de edición que las empresas suelen cuidar mucho (la prolijidad en las comunicaciones es parte de la imagen corporativa): dos, puntualmente –como puede verse en la imagen-, un salto de línea en el medio del párrafo que habla de lo rápido del proceso y luego dos puntos en lugar de uno en el final del último párrafo. El sitio web, con todos esos caracteres, no tiene sentido: la URL de PayPal es www.paypal.com.
Más allá de esto, la propia página de PayPal dedicada a este tipo de estafas señala que nunca le va a pedir al usuario números de tarjeta de crédito y débito, números de cuenta bancaria, número de documento de identidad, direcciones de correo electrónico, contraseñas y el nombre completo. O sea, justamente lo que solicitan las web falsas involucradas en un phishing. En caso de recibir este correo PayPal solicita que se denuncie a spoof@paypal.com. Otro lugar para denunciar es phishing@antiphishing.com.ar, de Segu-Info, que se ocupa de avisar a las compañías.
Cristian Borghello, director de Segu-Info, además de lo ya dicho, recomienda "nunca hacer clic en los enlaces recibidos" y aclara que no alcanza con chequear la dirección de correo electrónico o la URL. No es suficiente, de hecho, que los sitios web comienzen con el HTTPS. Se deben dar ambas condiciones, ser el sitio real y comenzar con HTTPS. "Esto es muy importante porque los delincuentes suelen crear dominios parecidos al real. Por ejemplo: HTTPS://www.sitioseguro.com vs HTTPS://www.sitiosegur0.com (ambos son HTTPS pero en el segundo se cambió la letra "o" por el nro "0")", desarrolla el experto en ciberseguridad.
"Una táctica común en casos de correos falsos es la de intentar asustar al destinatario. Es común que los asuntos del correo sean intimidatorios como 'bloquearemos su cuenta' o 'su tarjeta ha caducado'", puntualiza. "En cada correo recibido, utilizar el sentido común. Si algo es demasiado bueno o demasiado malo seguramente el correo es falso", recomienda.
El caso reciente que llegó a las noticias es el de Netflix: ofrecían una suscripción por $1 por año pero, claro, era solo una estafa más. La estafa apareció repetidamente en Instagram.


infotechnology

          Un grupo de investigadores consigue hackear un Tesla Model S en segundos, detectando un serio problema de seguridad      Cache   Translate Page      

Tesla Model S 100D supercargador

Ya hemos visto en varias ocasiones cómo han conseguido acceder a un Tesla de forma remota, pero quizá nunca de una manera tan efectiva y rápida. El 'robo' de un Tesla Model S se ha llevado a cabo por un grupo de investigadores de la Universidad KU Leven en Bélgica, que han demostrado que con solo 600 dólares en equipos informáticos y de radio se puede sustraer un Tesla en segundos.

Como suele ocurrir con este tipo de experimentos de ciberseguridad, presentaron los hallazgos a Tesla, que respondió con una actualización del software de la que os hablamos hace unos días.

Cuatro rápidos pasos, aunque no necesariamente sencillos

contacto prueba tesla model s 100D

Al igual que la mayoría de los sistemas de entrada sin llave, los llaveros Tesla Model S envían un código cifrado basado en una clave criptográfica secreta a las radios de un automóvil para activarlo y desbloquearlo, lo que permite que el motor del automóvil arranque. Después de nueve meses de trabajo de ingeniería, el equipo de KU Leuven descubrió, en el verano de 2017, que el sistema de entrada sin llave del Model S, desarrollado por un fabricante llamado Pektron, usaba un cifrado débil de solo 40 bits para encriptar esas claves.

Con un ordenador, un par de radios, un disco duro externo y baterías los investigadores descubrieron este fallo de seguridad que a Tesla se le había pasado por alto. Para empezar, crearon una base de datos con todas las claves digitales posibles que se pueden usar para abrir un Model S. Según explica Wired, el resultado fue de seis tercios de claves potenciales que fueron almacenadas en el disco duro.

A partir de ahí, el investigador solo tuvo que seguir cuatro pasos:

  • 1.Copiar la señal del sistema de bloqueo que emite el Model S.
  • 2.Aproximar la radio a menos de un metro del llavero de la víctima y engañar al mando para que emita dos códigos de respuesta utilizando la señal que copió el sistema de bloqueo del coche.
  • 3.Ejecutar las señales a través de la base de datos que contiene las posibles claves para desencriptar la clave digital.
  • 4.Proceder a acceder al vehículo.

Este ataque permite además clonar el llavero y crear uno propio, por lo que se puede desbloquear y conducir el vehículo las veces deseadas.

Un hallazgo que les ha valido una recompensa de 10.000 dólares y que ha permitido además a Tesla detectar el fallo, identificar una solución e implementarla a través de una actualización del software, que incluye introducir una clave para poder iniciar la conducción. El denomiando 'PIN to drive'.

Los investigadores creen que su ataque también podría funcionar contra vehículos McLaren y Karma y las motocicletas vendidas por Triumph, que también usan el sistema de llavero de Pektron. En estos casos, la única solución inmediata serían unas bolsas aislantes para las llaves.


          Las 22 líneas de JavaScript que permitieron el robo de datos de 380.000 clientes de British Airways      Cache   Translate Page      

BA JavaScript / RiskIQ

En RiskIQ han publicado el análisis post mortem del robo de datos que sufrió British Airways a finales de agosto: Inside the Magecart Breach of British Airways: How 22 Lines of Code Claimed 380,000 Victims. En concreto afectó a todas las personas que utilizaron la pasarela de pagos de la web principal y de la app móvil, entre el 21 de agosto y el 5 de septiembre.

Según parece un grupo denominado Magecart que ya había actuado antes consiguió inyectar su código en una librería de JavaScript que utiliza la web de British Airways, concretamente la Modernizr version 2.6.2.

Como muchas webs actualizan sus librerías a menudo si por alguna razón no pasan un chequeo de seguridad estricto puede que alguien la haya modificado con malas intenciones en otro lugar –por ejemplo el repositorio de código del que se descargan– en forma de actualización menor que pasa desapercibida – y ahí es cuando empiezan los problemas.

Ante este problema los usuarios, clientes y visitantes no pueden hacer nada, tal y como explican en Hackeo a British Airways en El Confidencial. Es la empresa propietaria de la web/app quien debe garantizar la seguridad cuando se le proporcionan datos sensibles. Este caso demuestra que esto puede suceder en sitios web y apps de todo tipo: desde los relativamente sencillos como los gestionados con WordPress a las grandes megacorporaciones que hacen grandes desarrollos pero dependen de código externo como son estas librerías. Es algo que requiere aumentar las medidas de seguridad especialmente cuando se manejan sistemas de pago, datos personales o cuentas con contraseñas.

(Vía The Next Web + El Confidencial + Mikko Hypponen.)

# Enlace Permanente


          Starting with Crypto      Cache   Translate Page      

Investing within the Crypto Currency market will be a touch daunting for ancient investors as a result of investment directly in Crypto Currency (CC) киви на биткоин - needs the utilization of latest tools and also the adoption of many new ideas. So, if you opt to immerse yourself during this market, you'll need to own a awfully sensible plan of what to try and do and what to expect.

The purchase and sale of CC needs that you simply select Exchange associated with the merchandise you would like to shop for and sell, be it Bitcoin, Litecoin or any of the opposite 1300 chips being compete. within the previous edition, we have a tendency to shortly explained the merchandise and services obtainable in many exchanges, to provide you a thought of the completely different offers. There square measure a great deal of exchanges to decide on from and everybody will things his means. rummage around for things that square measure necessary to you, for example:

- Record the policies, ways and prices of every technique
- Rates and retirement policies
- What square measure the fiduciary currencies for deposits and withdrawals?
- merchandise that manage, like coins, gold, silver, etc.
- group action fees
- wherever is that this exchange based? (United States / uk / Asian nation / Japan ...)

Prepare for Exchange configuration procedures for details and length, as a result of Exchange typically desires to understand a great deal concerning you. it is the same as making a replacement checking account as a result of Exchange could be a valuable negotiant and that they need to form certain you are what you say which you are a trustworthy person. It appears that "trust" is nonheritable over time, as a result of the exchange typically permits solely atiny low investment.

Your exchange can save your DC storage for you. several provide "cold storage", which suggests that you simplyr rooms square measure unbroken "offline" till you show that you need to try and do one thing with them. There was news of the hacked exchange and lots of coins were taken. bear in mind that your currencies square measure during a checking account in Exchange, however bear in mind that your currencies square measure solely numeric and you'll be able to not amendment all transactions within the blockchain. in contrast to your bank, this exchange doesn't have deposit insurance, therefore confine mind that hackers continuously strive everything they'll get in their Crypto Coins and steal them. Exchange usually offers password-protected accounts, and lots of provide two-factor authorization systems, that ought to be taken seriously to safeguard your account from hackers.

Since hackers wish to attack Exchange and your account, we have a tendency to continuously suggest employing a digital case for your coins. it is easy to maneuver coins between your Exchange account and your case. check that to decide on a portfolio that treats all the components you would like to shop for and sell. Your case is additionally the device you employ to "spend" your coins with merchants WHO settle for CC payments. each varieties of portfolios square measure "hot" and "cold". Hot wallets square measure terribly simple to use, however permit your rooms to be exposed to the web, however solely on your pc and not on the Exchange server. massive portfolios use off-line storage media, like special hardware memory cards and straightforward prints. employing a cold case makes transactions a lot of sophisticated, however they're the safest.

Your case contains a "private" key that permits all the transactions you would like to form. It conjointly includes a shared "public" key on the network in order that all users will establish your account after they create transactions with you. once hackers get their personal key, they'll move their currency wherever they need and it can't be modified.

Despite all the challenges and volatility, we have a tendency to believe that Blockchain's core technology is ever-changing the sport and revolutionizing the means transactions square measure done.
          Smart Cities, Smarter Cybersecurity?      Cache   Translate Page      
The trend toward smart cities raises questions regarding their vulnerability to hackers. Local government officials and consumers weigh in on what the priorities should be.
          Hackers Highlight Blind Spots in Security      Cache   Translate Page      
Both well-meaning and malicious hackers fess up to why they hack, and list the best data exfiltration strategies and the least effective security tools.
          Comment on 5 Ways to Find Start-up Funding for Your Small Business by Mathew Cox      Cache   Translate Page      
Hello friends, i want to share my testimony on how i got my BLANK ATM card which have change my life today. i was once living on the street where things were so hard for me, even to pay off my bills was very difficult for me i have to park off my apartment and start sleeping on the street of Vegas. i tried all i could do to secure a job but all went in vain because i was from the black side of America. so i decided to browse through on my phone for jobs online where i got an advert on Hackers advertising a Blank ATM card which can be used to hack any ATM Machine all over the world, i never thought this could be real because most advert on the internet are based on fraud, so i decided to give this a try and look where it will lead me to if it can change my life for good. i contacted this hackers and they told me they are from Australia and also they have branch all over the world in which they use in developing there ATM CARDS, this is real and not a scam it have help me out. to cut the story short this men who were geeks and also experts at ATM repairs, programming and execution who taught me various tips and tricks about breaking into an ATM Machine with a Blank ATM card.i applied for the Blank ATM card and it was delivered to me within 3 days and i did as i was told to and today my life have change from a street walker to my house, there is no ATM MACHINES this BLANK ATM CARD CANNOT penetrate into it because it have been programmed with various tools and software before it will be send to you. my life have really change and i want to share this to the world, i know this is illegal but also a smart way of living Big because the government cannot help us so we have to help our self. if you also want this BLANK ATM CARD i want you to contact the Hackers email on Mike Fiser . Email : blankatm001@aol.com
          Guilty: U.S. Convicts Kremlin-linked Russian hacker      Cache   Translate Page      
New reporting reveals former Trump campaign chair Paul Manafort is seeking a plea deal in the Mueller probe, but negotiations have stalled, because the Special Counsel wants information pertaining to Trump and the 2016 campaign. BuzzFeed News also...
          to consider 2018 "the BIG list" (no replies)      Cache   Translate Page      
New adds: The Neal Morse Band (nov), Hearts Of Fire (oct), Alcatrazz (dec), Sodom (nov), The Circle (jan 2019), Cinderella (sep), Metallica (nov), Saxon (oct), Steven Wilson (nov), Architects (nov)

In bold, the last updates.


SEP 2018
Narnia: We still believe Made in Brazil 1.9
Alex Skolnick Trio: Conundrum 7.9 Palmetto/MRI
Alter Bridge: Live at The Royal Albert Hall 7.9 Napalm Records
Cauldron: New Gods 7.9 Dissonance Productions
Clutch: Book of bad decisions 7.9 Weathermaker Music
Kingcrow: The Persistence 7.9 Laser's Edge
Korpiklaani: Kulkija 7.9 Nuclear Blast
Krisiun: Scourge of the enthroned 7.9 Century Media Records
Lenny Kravitz: Raise vibration 7.9
Metal Allegiance: Volume II - Power drunk majesty 7.9 Nuclear Blast
Monstrosity: The passage of existence 7.9 Metal Blade Records
Nashville Pussy: Pleased to eat you 7.9 Verycord Records
Satan: Cruel magic 7.9 Metal Blade Records
Sister Hazel: Wind EP 7.9 Croakin' Poets Records
The Skull: The endless road turns dark 7.9 Tee Pee Records
YES Feat Jon Anderson, Trevor Rabin, Rick Wakeman: Yes: 50th Anniversary Live At The Apollo 7.9 Eagle Vision
Ann Wilson: Immortal 14.9 BMG
DC4: Atomic highway 14.9 HighVolMusic
Deicide: Overtures of blasphemy 14.9 Century Media
Dream Child: Until death do we meet again 14.9 Frontiers Records
Good Charlotte: Generation RX 14.9 BMG
Grave Digger: The living dead 14.9 Napalm Records
Groundbreaker: s/t 14.9 Frontiers Records
The Guess Who: The future is what it used to be 14.9 Cleopatra Records
Hawkwind: Road to utopia 14-9 Cherry Red Records
Livesay: Chronicles 14.9 RFL Records
Monster Truck: True Rockers 14.9 Mascot Records
Outloud: Virtual hero society 14.9 Rock of Angels Records
Snakes In Paradise: Step into the light 14.9 Frontiers Records
Thrice: Palms 14.9 Epitaph Records
Tony Mitchell: Beggars gold 14.9 MelodicRock Records
Treat: Tunguska 14.9 Frontiers Records
The Trews: Civilianaires 14.9 Cadence Records
The Unity: Rise 14.9 SPV/Steamhammer
Uriah Heep: Living the dream 14.9 Frontiers Records
Fair Warning: Live Club Citta 19.9
The Three Tremors: s/t 20.9
Aborted: TerrorVision 21.9 Century Media Records
Acacia Avenue: Worlds apart 21.9 Perris Records
Atlas: In pursuit of memory 21.9 AOR Heaven
Billy F Gibbons: The big bad Blues 21.9 Concord Records
Black Majesty: Children of the abyss 21.9 Pride and Joy Music
Dark Sarah: The golden moth 21.9 Inner Wound Recordings
Dead Letter Circus - Dead Letter Circus 21.9 BMG
Dion Bayman: Better days 21.9 Art of Melody Music
Dragonlord: Dominion 21.9 Spinefarm Records
Dream Patrol: Phantoms of the past 21.9 Mighty Music
Freak Kitchen: Confusion to the enemy 21.9
Hardcore Superstars: You can't kill my Rock'N'Roll 21.9 Gain Music
Joe Bonamassa: Redemption 21.9 J&R Adventures
King Diamond: Songs from the dead live 21.9 Metal Blade Records
Kix: Fuse 30 Reblown 21.9
Lioncage: Turn back time 21.9 Pride & Joy Music
Slash Ft. Myles Kennedy & The Conspirators: Living the dream 21.9 Snakepit Records
Therapy?: Cleave 21.9 Marshall Records
Voivod: The wake 21.9 Century Media Records
Dallas: Dallas 24.9 AOR Blvd Records
Against The Current: Past lives 28.9 Fueled By Ramen
Angeline: Shadowlands 28.9
Beartooth: Disease 28.9 Red Bull Records
Billy Idol: Vital Idol/ Revitalized 28.9 Capitol/UMe
Cinderella: The Mercury years 28.9 Caroline International
Dynazty: Firesign 28.9 AFM Records
Jimmy Waldo-Steven Rosen: Voices from the past 28.9 MelodicRock Records
The Living End: Wunderbar 28.9 BMG
Necronomicon: Unleashed bastards 28.9 El Puerto Records
Newman: Decade II 28.9 AOR Heaven
Once Human: Stage of evolution 28.9 earMUSIC
Osukaru: House of mirrors 28.9
Palaye Royale: Boom Boom Room (Side B) 28.9 Sumerian Records
Riot V: Live at Keep It True Festival 2015 28.9 Nuclear Blast records
Rise To Fall: Into zero 28.9 Rise To Zero
Riverside: Wasteland 28.9 InsideOut Music
Running Wild: Pieces of eight: The Singles, Live and rare. 1984 - 1994 28.8 Noise Records
Saga: So Good So Far – Live At Rock Of Ages 28.9 earMUSIC
Starset: Vessels 2.0 28.9 Razor And Tie Records
Stratovarius: Enigma intermission 2 28.9 earMUSIC
Ted Poley: Modern art 28.9 Ted Poley.com
Terror: Total retaliation 28.9 Pure Noise Records
Vinny Del Rio: End of silence 28.9
Vulcain: Vinyle 28.9 Season Of Mist
Wolfheart: Constellation of the black light 28.9 Napalm Records

OCT 2018
Anthrax: State Of Euphoria 30th-anniversary 5.10 Island Records
Coheed And Cambria: The unheavenly creatures 5.10 Roadrunner Records
Hank Erix (Houston): Nothing but trouble 5.10 Cargo Records
High On Fire: Electric messiah 5.10 eOne
Leah: The quest 5.10 Inner Wound Recordings
Matt Nathanson: Sings his sad heart 5.10 Acrobat
Poets of the Fall: Ultraviolet 5.10 Insomniac
Steve Perry: Traces 5.10 Concord Records
Vola: Applause of a distant crowd 5.10 Mascot
Atreyu: In our wake 12.10 Spinefarm Records
City Of Thieves: Beast reality 12.10 Frontiers Records
Creye: Creye 12.10 Frontiers Records
Darkness: First class violence 12.10 Massacre Records
Dave Davies: Decade 12.10 Red River Entertainment
Evanescence: Synthesis Live 12.10 Eagle
Gama Bomb: Speed between the lines 12.10 AFM Records
Impellitteri: The nature of the beast 12.10 Frontiers Records
Kadavar: Live in Copenhagen 12.10 Nuclear Blast
London: Call that girl 12.10
Nazareth: Tattooed on my brain 12.10 Frontiers Records
Seventh Wonder: Tiara 12.10 Frontiers Records
Smash Into Pieces: Evolver 12.10 Gain/ Sony Music
Terrorizer: Caustic attack 12.10 The End Records
Verni: Barricade 12.10 Mighty Music
Heir Apparent: The view from below 15.10 No Remorse Records
Ace Frehley: Spaceman 19.10 eOne/SPV
Aldo Nova: 2 19.10
Amaranthe: Helix 19.10 Spinefarm Records
Disturbed: Evolution 19.9
Firmo: Rehab 19.10 Street Symphonies Records
Gorod: Aethra 19.10 Overpowered Records
Greta Van Fleet: Anthem of the peaceful army 19.10 Lava/Republic Records
Hearts Of Fire: Call of destiny 19.10 MelodicRock Records
Internal Bleeding: Corrupting influence 19.10 Unique Leader Records
Marty Friedman: One bad M.F. Live!! 19.10 Prosthetic Records
Midnite City: There goes the neighbourhood 19.10 AOR Heaven
Nothing But Thieves: What did you think when you made me this way EP 19.10 RCA
Roulette: Now! 19.10
Saliva: 10 Lives 19.10 Megaforce Records
Saxon: The eagle has landed 19.10 BMG
Soulfly: Ritual 19.10 Nuclear Blast
Whitesnake: Unzipped cd-box 19.10
Bloodbath: The arrow of Satan is drawn 26.10 Peaceville Records
C.T.P: Point Blank 26.9
Fifth Angel: The third secret 26.10 Nuclear Blast
Gary Moore Tribute: Moore Blues for Gary 26.10
Haken - Vector 26.10 Inside Out Records
Hamlet: Berlin 26.10
Hate Eternal: Upon desolate sands 26.10 Season Of Mist
Heaven's Trail: Lethal mind 26.10 Escape Records
The Kinks: The Kinks are the village green preservation society 50th-anniversary 26.10 BMG Records
Nothgard: Malady X 26.10 Metal Blade Records
Striker: Play to win 26.10 Record Breaking Records
Unleashed: The hunt for white Christ 26.10 Napalm Records
Warrel Dane: Shadow work 26.10 Century Media Records
Westfield Massacre: Salvation 26.10 Nerve Strike Records
White Widdow: Victory 26.10 AOR Heaven Records
Perfect View: Timeless 29.10 Lions Pride Music
Sirenia: Arcane astral aeons Napalm Records

NOV 2018
Arsis: Visitant 2.11 Nuclear Blast Records
Audiotopsy: The real now 2.11 Megaforce Records
Cancer: Shadow gripped 2.11 Peaceville Records
Hank Von Hell: Egomania 2.11 Sony Music
The Heard: The island 2.11 Despotz Records
Metallica: …And Justice For All 2.11 Blackened Records
The Neal Morse Band: Morsefest! 2017 2.11
Opeth: Garden of the titans: Live at Red Rocks Amphitheatre 2.11 Nuclear Blast
Roadkill: Ruled by machines 2.11 MelodicRock Records
Robert Rodrigo Band: Living for louder 2.11
Sick Of It All: Wake the sleeping dragon! 2.11 Century Media Records
Steven Wilson: Home invasion: In concert at The Royal Albert Hall 2.11 Caroline International
Witherfall: A prelude to sorrow 2.11 Century Media Records
Architects: Holy hell 9.11 Epitaph Records
Burning Witches: Hexenhammer 9.11 Nuclear Blast records
Evoken: Hypnagogia 9.11 Profound Lore Records
Flotsam And Jetsam: The end of chaos 9.11 AFM Records
Holter: Vlad the impaler 9.11 Frontiers Records
Lacuna Coil: The 119 Show - Live in London 9.11
Nordic Union: Second coming 9.11 Frontiers Records
Red Dragon Cartel: Patina 9.11Frontiers Records
Reece: Resilient heart 9.11 Mighty Music
Stephen Pearcy: View to a thrill 9.11 Frontiers Records
Ten: Illuminati 9.11 Frontiers Records
Muse: Simulation theory 12.11 Warner Bros Records
P.O.D: Circles 16.11 Mascot Label Group
Accept: Symphonic Terror - Live At Wacken 2017 23.11 Nuclear Blast
Dan Reed Network: Origins 23.11 Zero One Entertainment
Electric Boys: The ghost ward diaries 23.11 MIGHTY Music
Sodom: Partisan EP 23.11 SPV/Steamhammer
Master: Vindictive miscreant 28.11 Transcending Obscurity Records
Hush: If you smile 30.11 Lions Pride Music
Brett Walker: Last parade MelodicRock Records

DEC 2018
Alcatrazz: Parole denied - Tokyo 2017 7.12 Frontiers Records
Devil's Hand: 7.12 Frontiers Records
Johnny Gioeli: One Voice 7.12 Frontiers Records
Magic Dance: New eyes 7.12 Frontiers Records
Palace: Binary music 7.12 Frontiers Records
State Of Salazar: Superhero 7.12 Frontiers Records
Steelheart: Rock'N Milan 7.12 Frontiers Records
Gotthard: Defrosted II
Sinestress: Fear Art Of Melody Music

2018
220 Volt
38 Special:
91 Suite: new album
Abysmal Dawn: new album Season Of Mist Records
Adriangale: MelodicRock Records
Alissa (White-Gluz): solo album Napalm Records
Allen/Lande:
Amon Amarth:
Angelus Apatrida: Hidden Livevolution
Animal Drive: Frontiers Records
Art Nation:
Atheist: new album Agonia Records
Axe: The last offering Escape Music
Baby Snakes:
Bad Brains: new album
Beggars & Thieves: live album
Beggars & Thieves: new album
Benediction:
Biffy Clyro: Balance, not symmetry
Block Buster:
Brainstorm:
Brian Howe:
Brigade
The Brink: Frontiers Records
Bruce Dickinson:
Bryan Cole: Desire Kivel Records
Burning Rain: new album Frontiers Records
Care of Night:
Carcass:
Catalano:
Cheap Trick
Circus Maximus
Coastland Ride:
Come Taste The Band: new album AOR Heaven
Coroner:
The Crown: new album Metal Blade Records
Cruzh:
Crystal Ball: new album
The Damned: new album Search & Destroy Records
D.A.D:
Dalton:
Danko Jones: new album
Dare: new album
Dare: Best of
Dark Angel:
Darkhorse:
Dark Moor: Origins
The Darren Phillips Project:
Dave Bickler: Darklight
Death Dealer:
Dead Of Night: Pride & Joy Music
Diamond Head:
Dino Cazares: solo album
DIO Disciples: debut album BMG
East Temple Avenue
Eden's Curse:
Entombed A.D:
Fahran: Vapours
Gathering Of Kings:
Göran Edman:
Gypsy Rose: new album
Hackers:
Hittman:
Hoobastank: new album Napalm Records
House Of Shakira:
Hurricane:
Icarus Witch:Goodbye cruel world Cleopatra Records
Incognito: s/t Kivel Records
Jack Russell’s Great White: Once acoustically bitten
JaR:
Jerome Mazza: solo album Escape Music
Jesse Damon
Jonathan Davis
John Sykes: Sy-Ops
Jordan Rudess: new album Mascot Records
Jorn: new album Frontiers Records
Jorn: Box Set
Jungle Rot: new album Victory Records
Kane Roberts: new album Frontiers Records
Kenny Leckremo:
Killer Bee:
Lagoon:
Lillian Axe: From Womb To Tomb
Lita Ford:
Mad Invasion:
Magnum: Live album
Mason Hill: Frontiers Records
Mats Karlsson
Metal Church:
Mick Mars: solo album
Michael Monroe:
Michael Thompson Band:
MisterMiss:
Mother Road:
MPG "Martie Peters Group": Unfinished business
Nile:
Nils Patrik Johansson: Evil Deluxe MetalVille Records
Nita Strauss: Controlled chaos
Nitro:
Obús: new album
The Offspring: new album
On The Rise:
One Desire:
The Order:
Outlasted: new album MelodicRock Records
Pete Way: solo album
Player:
Pleasure Maker: Dancin' with danger Lions Pride Music
Pretty Maids: live-dvd/cd Frontiers Records
Queensryche:
Rachel Lorin: new album Frontiers Records
Raspberry Park: new album AOR Heaven Records
Razor:
Reckless Love
Rival Sons: new album Low Country Sound/Atlantic
Romeo's Daughter:
The Ron Keel Band:
Room Experience:
Royal Flush
Royal Mess
Saint Deamond
Santa Ana Winds: Inherit the wind AOR Blvd Records
Sebastian Bach:
Silent:
Skeletonwitch:
Spirits Of Fire: Frontiers Records
Starbreaker:
Starz:
State Cows: Challenges
State Of Rock: new album AOR Heaven
Steve Overland:
The Swedish Funk Connection:
Tango Down: new album Kivel Records
Ted Nugent: The music made me do it
Tempt:
Tom Keifer:
Tony Martin: Thornz
Toseland: new album Frontiers Records
Tourniquet: Gazing at Medusa Pathogenic Records
Venom:
Viana:
Vimic: Open your omen Universal Music Enterprises
Violet Janine:
Warlord: new album Frontiers Records
Waysted:
Work of Art
X Japan:
XYZ: new album

2019
7HY: new album Lions Pride Music
Alan Parsons: new album Frontiers Records
Anthrax:
Armored Saint: new album
Assassin: new album Massacre Records
Avenged Sevenfold:
Backyard Babies: Silver and gold Century Media
Battle Beast
Biff Byford: School of hard knocks
Black Star Riders: new album
Brother Firetribe: new album
Buckcherry: new album
Bush:
Danny Vaughn: solo album
Def Leppard:
Delain: new album
Demons & Wizards
Down 'N' Outz
The End:
Exciter:
Exodus:
Extreme:
Fair Warning: new album
Faithsedge:
Find Me: new album
Fit For An Autopsy: album debut Nuclear Blast
Fortune: comeback album Frontiers Records
Hammerfall:
Helix:
Helloween: live album Nuclear Blast
Killer Dwarfs: new album EMP Label Group
Killswitch Engage: New album Metal Blade Records
King Of Hearts: new album
King's X: new album
Korn:
Kreator:
Last In Line:
Leverage: new album Frontiers Records
The Magpie Salute: High water II Mascot/Eagle Rock
Malevolent Creation: The 13th beast Century Media
Megadeth:
Mike Tramp: new album Target Records
Neal Morse Project: Jesus Christ - The Exorcist Frontiers Records
Overkill:
Papa Roach:
Pearl Jam:
Pretty Maids: new album
Ratt:
Rob Zombie:
Roxy Blue: new album Frontiers Records
Running Wild:
Sabaton:
Sacred Reich: new album Metal Blade Records
Sadus:
Sascha Paeth:
Septicflesh: new album Nuclear Blast
Slipknot:
Soilwork: new album Nuclear Blast
Spread Eagle: new album Frontiers Records
Stratovarius: new album
Symphony X:
Tarja Turunen: new album
Ted Poley: new album Frontiers Records
Terra Nova:
Thunder:
Tesla: Shock Frontiers Records
Tora Tora: new album Frontiers Records
The Treatment: new album Frontiers Records
Volbeat: new album
Waiting For Monday: debut album Frontiers Records
Whitesnake: Flesh & Blood

JAN 2019
Bring Me The Horizon: Amo 11.1 Columbia Records
Jetboy: Born to fly 25.1 Frontiers Records
Avantasia: Moonglow Nuclear Blast
The Circle: Space between
Evergrey: The Atlantic AFM Records

FEB 2019
Rock Goddess: This time 22.2 Bite You To Death Records
Dream Theater: new album
Inglorious: new album Frontiers Records
Overkill: new album

MAR 2019
Children Of Bodom: new album
Venom INC: new album

APR 2019
Testament: new album

MAY 2019
Bai Bang: Best Of 4 Lions Pride Music

SEP 2019
Dragonforce: new album

2020
Helloween: new album Nuclear Blast
Nightwish: new album
          3 Strategies to Improved Dealer Communication      Cache   Translate Page      
Dealers serve as the sounding board to what plans, tactics, and strategies OEMs and captives implement, John Thacker, national director of sales for Kia Motors Finance, told Auto Finance Excellence. “If [Kia] has a new plan or program and we want to pilot it, we run it by our dealer council because their feedback is essential,” […]
          Industrial Cyber Security Market Size and Forecast to 2025      Cache   Translate Page      
(EMAILWIRE.COM, September 13, 2018 ) The rise in cybercrimes and threats by the hackers has led to an accelerated demand for cybersecurity services and solutions which can help the professionals to keep their confidential data safe and sound. Individual incorporation of such solutions can be expensive...
          Windows 10 will use the cloud to free up disk space      Cache   Translate Page      
The next update to Windows 10, due to be released in October, will be smarter about how it frees up disk space and cleans up temporary files.
That should save the hackers some time
          Hillicon Valley: Trump signs off on sanctions for election meddlers | Russian hacker pleads guilty over botnet | Reddit bans QAnon forum | FCC delays review of T-Mobile, Sprint merger | EU approves controversial copyright law      Cache   Translate Page      
Welcome to Hillicon Valley, The Hill's newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team, Olivia Beavers (@olivi...
          Hillicon Valley: Sanders finds perfect target in Amazon | Cyberattacks are new fear 17 years after 9/11 | Firm outs alleged British Airways hackers | Trump to target election interference with sanctions | Apple creating portal for police data requests      Cache   Translate Page      
Welcome to Hillicon Valley, The Hill's newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team, Olivia Beavers (@olivi...
          50 Jahre Gresten-Land - Dankeschön für Engagement      Cache   Translate Page      
Im Reigen der Jubiläumsveranstaltungen „50 Jahre Gresten-Land“ fand nun der Vereins- und Gewerbeabend im Stadl des Karl-Wirtes von Elisabeth und Karl Pöchhacker in Unterhörhag statt.
          Comment on “Big 3” Credit Bureaus Settle With 31 States Over Credit Reporting Mistakes by Phip Wealth      Cache   Translate Page      
I finally came across Dark Web hacker, After a recent post encouraging a low-scoring forum member to be hopeful, several people have asked me how I got my FICO score from 410 to the 789+ excellent result, also asking many questions on this forum, This is how it's work. I was introduce by a friend who also came across the same hacker from a forum when she was bankruptcy and finally regain herself from the same hacker who help me to get mine done within 72 hours. My score started slipping downward because of those new inquiries and i can't meet up over those decisions, but all is well just because i came across the right repair to get this done. DARKWEBCYBERSEVICE AT GMAIL DOT COM.
          Comment on “Big 3” Credit Bureaus Settle With 31 States Over Credit Reporting Mistakes by Chase Gay      Cache   Translate Page      
I am publicly testifying to the great work of a well known hacker(Garymckinnoncreditservices@gmail.com)who was refers to me by David willis,He help i and my son to raise our credit to 870 golden score and fix it to excellent result in less than 72 hours.Well it's always good to know the truth about something you fell suspicious and don't ignore it.Am so happy i melt David willis who refer me to the great hacker and save me from scammers out there.contact him today and get your problem solve.Garymckinnoncreditservices@gmail.com
          Hillicon Valley: Trump signs off on sanctions for election meddlers | Russian hacker pleads guilty over botnet | Reddit bans QAnon forum | FCC delays review of T-Mobile, Sprint merger | EU approves controversial copyright law      Cache   Translate Page      
Welcome to Hillicon Valley, The Hill's newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team, Olivia Beavers (@olivia_beavers) and Jacqueline Thomsen (@jacq_thomsen...
          Russian hackers were behind massive British Airways data theft that forced thousands of Brits to cancel their bank cards, experts claim      Cache   Translate Page      
RUSSIAN hackers were behind the massive British Airways data theft that forced thousands of Brits to cancel their bank cards, experts claim. Security researchers at Risk IQ say a group known as “Magecart” were responsible for stealing 380,000 customers’ details between August 21 and September 5. Experts told the Times hackers “set up custom built, targeted infrastructure […]
          Student, 19, ‘killed herself after a plea for help following an earlier suicide bid went unanswered as welfare staff were on strike’      Cache   Translate Page      
A STUDENT killed herself after a plea for help following an earlier suicide bid went unanswered as welfare staff were striking, it was revealed. Ceara Thacker, 19, died three months after telling advisers at the University of Liverpool she’d attempted to take her life with an overdose. An internal review shows that welfare staff failed […]
          Brecha de segurança afeta Microsoft Edge e Apple Safari      Cache   Translate Page      
Microsoft já resolveu o problema, mas a Apple permanece inerte

Uma falha de segurança identificada no Microsoft Edge e no Safari permitia que cibercriminosos enganassem usuários desses dois navegadores web de uma maneira relativamente fácil. Rafay Baloch, um pesquisador de segurança digital independente, percebeu que era possível recarregar e redirecionar uma página web para outro site sem que a barra de endereços desses dois navegadores fossem alteradas.

Em outras palavras, um hacker poderia criar um site fictício de algum portal de banco ou qualquer outra plataforma online de valor e redirecionar os visitantes para endereços forjados sem que eles pudessem ver a verdadeira URL no topo da página. Com isso, um site qualquer poderia se passar por um site de uma instituição financeira, por exemplo, a fim de roubar dados bancários de seus clientes.

Leia mais...


          How to Protect Data – Your Most Valuable Asset      Cache   Translate Page      

Data is undoubtedly a company’s most valuable asset. It can comprise clients’ accounts, financial records and other sensitive information. Each year, numerous data breaches occur. Often, these breaches are intentional and committed by hackers and ransomware. Some data breaches are also unintentional but also result in devastating consequences. Some of these consequences include loss of […]

The post How to Protect Data – Your Most Valuable Asset appeared first on Negosentro.


          Guilty: U.S. Convicts Kremlin-linked Russian hacker      Cache   Translate Page      
New reporting reveals former Trump campaign chair Paul Manafort is seeking a plea deal in the Mueller probe, but negotiations have stalled, because the Special Counsel wants information pertaining to Trump and the 2016 campaign. BuzzFeed News also...
          5 Tips for Managing Privileged Access      Cache   Translate Page      
https://www.esecurityplanet.com/applications/tips-for-privileged-access-management-pam.html

Download our in-depth report: The Ultimate Guide to IT Security Vendors
SHARE
Share it on Twitter 
Share it on Facebook 
Share it on Google+
Share it on Linked in 
Email 
Access to applications, servers and network resources is the cornerstone of enterprise IT, which is all about enabling connectivity. Not every account should have full access to everything in an enterprise, however, which is where super user or privileged accounts come into play.
With a privileged account, a user has administrative access to enterprise resources, a capability that should be closely guarded. As fans of Marvel Comics know well, with great power comes great responsibility. Privileged access management (PAM) is a way to limit access to those critical assets and prevent data breaches.
PAM and identity and access management (IAM) are similar security technologies, but the difference between what the two protect is night and day: IAM gives general users access to front-end systems, while PAM gives admins and other privileged users access to back-end systems. Think of it this way: A front-end user might be able to change or add data in a database; a back-end user has access to the entire database, thus the need for greater security.
So how should an organization protect its privileged accounts? That's a question that Paul Lanzi, co-founder and COO at Remediant, tackled in a session at the Black Hat USA conference in August. Lanzi outlined five steps that organizations can take to secure privileged access, based on experience deploying PAM across over 500,000 endpoints.

1. Beware local accounts

Once a user gets administrative rights for a system, more often than not, the user will create a secondary or local account that still has full access but isn't properly identified in a directory system like Active Directory.
"Discovering all the local accounts is often the most surprising thing for security teams because they assume all the accounts listed in Active Directory are domain accounts," Lanzi said. "In fact, the way that Active Directory works, you can have local accounts, and that's often where little pockets of privileged access hide out."
Lesson: Monitor for local admin accounts.

2. Stay tuned

Administrative rights are always changing. Lanzi said that every one of the enterprises he has worked with has at some point done an Active Directory cleanup project. What typically happens, however, is even after a directory cleanup, there tends to be a reversion, with old accounts coming back.
"Over time, admins tend to accrete more and more privileged access, it never really goes away," Lanzi said.
Lesson: Continuously monitor privileged accounts.

3. Session recording is not a panacea

While continuous monitoring of privileged access is important, the flip side of that is that some organizations will have session recording for every action performed by a privileged account.
Few if any enterprises actually look at the privileged account session recordings. What ends up happening in Lanzi's experience is that the session recording feature will end up slowing down some types of operations.
Just like a home DVR (digital video recorder), he noted that no one really watches what they record with session recording. Hackers also generally can easily bypass session recording with different techniques.
Lesson: Session recording has marginal utility.

4. Focus on access, not credentials

There is a movement in IT toward using fewer passwords in favor of using additional forms of strong authentication.
As such, password vault solutions are of limited utility, as simple credentials are not the only way that access is being granted.
Lesson: Focus on access instead of just credentials, which are going to get compromised.

5. Watch for lateral movement

One of the most common things that attackers do when exploiting an organization is to exploit one set of credentials and then move laterally.
"Privileged access should be the bulwark against lateral movement in the enterprise," Lanzi said.
Lesson: Use PAM solutions to control account access and limit the risk of lateral movement.

          Este é o “hacker” que revelou os segredos do Benfica      Cache   Translate Page      

Tem menos de 30 anos e opera a partir de Budapeste. É um génio da informática que ainda muito jovem foi apanhado pela primeira vez depois de desviar 270 mil euros de um banco nas ilhas Caimão. Chama-se Rui Pinto, está a ser investigado em Portugal e Espanha, e segundo a revista ‘Sábado’ foi o ‘hacker’ […]

O conteúdo Este é o “hacker” que revelou os segredos do Benfica aparece primeiro em BOM DIA.


          Trump assina ordem para punir país que interferir em eleições dos EUA      Cache   Translate Page      

O presidente Donald Trump assinou hoje (12) uma ordem executiva que determina a aplicação de sanções a países que tentam interferir no processo político e eleitoral dos Estados Unidos. “Como já deixei claro, os Estados Unidos não vão tolerar nenhuma forma de interferência estrangeira em nossas eleições”, afirmou por meio de um comunicado.

O texto detalha sanções que poderão ser aplicadas, entre elas o congelamento de ativos, a restrição de transações cambiais, limitação do acesso a instituições financeiras norte-americanas, bem como proibição de empresas dos Estados Unidos de investirem em países que eventualmente sofrerem sanções.

A ordem executiva começa a vigorar dois meses antes das chamadas eleições de "meio mandato", com disputas por vagas legislativas em nível federal, estadual e local, bem como eleições para governos locais em 36 estados, além de eleições para prefeituras.

Para analistas entrevistados pela imprensa norte-americana, a ordem foi uma demonstração de esforço do governo para “parecer firme” com a segurança para o processo eleitoral de novembro.

O anúncio sobre a ordem executiva provocou críticas entre republicanos e democratas no Congresso. Alguns parlamentares consideram a medida como “insuficiente”.

Trump foi criticado porque só assinou a ordem na reta final das eleições e, também, pelo fato de ele não ter oferecido uma resposta sobre as denúncias de interferência da Rússia nas eleições presidenciais de 2016, supostamente para prejudicar a candidatura de Hillary Clinton.

Agências de inteligência dos EUA concluíram que hackers teriam sigo apoiados pelo governo russo para tentar influenciar o eleitorado norte-americano contra Hillary e para favorecer Donald Trump.

Em julho, após um encontro com o presidente russo, Vladmir Putin, o presidente norte-americano foi questionado por ter aceitado as declarações de Putin, que negou qualquer tipo de interferência nas eleições americanas.


          LA CASISTICA DEI CONTRATTI TRANSNAZIONALI      Cache   Translate Page      
https://www.aneddoticamagazine.com/wp-content/uploads/2012/09/640px-Harvester.jpg

LA CASISTICA DEI CONTRATTI TRANSNAZIONALI IN AGRICOLTURA


640px-Harvester


 


In un precedente articolo abbiamo introdotto il concetto di “contratto transnazionale”, definendo come si costituisce, si amministra, e si concilia in caso di conflitto.


In questo articolo trattiamo delle fattispecie, cioè dei casi concreti, che possono presentarsi nelle attività imprenditoriali in generale, incluse quelle agricole ed agroalimentari.


 


Dal Codice Civile Italiano –Disposizioni sulla Legge in generale, art. 25 –Legge Regolatrice delle Obbligazioni, abbiamo assunto: “Le obbligazioni che nascono dal contratto [c. 1321 s.] sono regolate dalla legge nazionale dei contraenti, se comune; altrimenti da quella del luogo nel quale il contratto è stato conchiuso [c. 1326]. E’ salva, in ogni caso, la diversa volontà delle parti.”


Questa capacità vale solo per i contratti che sono definiti come “accordi tra le parti per costituire, regolare, o estinguere un rapporto giuridico patrimoniale”.


Pertanto, per tutte quelle ulteriori attività d’impresa che non ricadono sotto la specie dei contratti, come linea di principio generale possiamo affermare che, quando un’impresa opera stabilmente (con residenza) su un territorio, è soggetta alle leggi del luogo di residenza (come, del resto, un qualsiasi cittadino); mentre quando vi opera solo occasionalmente, allora è soggetta alle leggi del luogo di residenza o a quelle del luogo di costituzione.


 


Le seguenti attività son sempre regolate dalla legge del luogo di esecuzione della fattispecie.


Costituzione della ditta (sia in regime di residenza o di non residenza)


Acquisizione o fusione di aziende


Acquisizione di beni registrati


Diritto del lavoro per dipendenti residenti nel luogo di lavoro


Protezione sanitaria


 


Ricadono invece nel diritto trasnazionale (lex mercatoria) le seguenti fattispecie


Attività  bancarie internazionali


Crediti e pagamenti internazionali o telematici


Trasporti internazionali


Polizze assicurative multinazionali


Import/export


Transazioni telematiche internazionali


Questioni sulla concorrenza internazionale


Commercio elettronico internazionale


Protezione della proprietà intellettuale nel commercio internazionale


Contingentamenti e restrizioni doganali


Lavaggio di denaro sporco, estorsione, contraffazione, frodi internazionali.


 


Mentre all’elenco sub 1) la legge nazionale è capace di tutelare i diritti delle parti, per quanto riguarda, invece, le attività all’elenco sub 2), la legge nazionale è molto debole, può entrare in contrasto con altre leggi nazionali e, soprattutto, è molto lenta ad agire, mentre il commercio ha bisogno di tempi di risoluzione delle controversie molto più veloci.


Ipotizziamo, ad es., che un operatore italiano stipuli un contratto assicurativo con una compagnia di assicurazioni statunitense residente negli Stati Uniti, e che malauguratamente il contratto venga rescisso, sospeso, contestato, o quant’altro. Cosa potrà fare l’operatore italiano se si appella alla legge italiana? Potrà ottenere anche piena vittoria. Ma che cosa succede se il tribunale americano accerta (a torto, o a ragione) che la compagnia assicuratrice statunitense ha ragione lei?


Per evitare questa posizione di stallo si ricorre al compromesso o all’arbitrato, avendo avuto accortezza di definire sul contratto la clasuola arbitrale, oppure raggiungendo un accordo arbitrale con la controparte anche a contratto stipulato. Il conciliatore può arrivare ad un comune accordo tra le parti, mentre l’arbitro si comporta come un vero e prorpio giudice, la cui sentenza va depositata presso il tribunale in cui se ne chieda l’esecuzione.


 


Una  menzione a parte merita il discorso relativo alla pianificazione fiscale nel contesto multinazionale, considerando che la fiscalità è l’elemento essenziale per la sopravvivenza dello Stato.


Fino a quando le economie sono state chiuse da ambiti normativi molto rigidi che non permettevano la libera circolazione dei prodotti e dei capitali, il controllo fiscale da parte dello Stato è stato relativamente semplice, anche se è andato a discapito dell’economia.


Attualmente, in un contesto economico globalizzato, l’imposizione fiscale è molto più difficile, in quanto i singoli Stati nazionali hanno legislazioni molto diverse tra di loro, e ognuno si pone in competizione con l’altro per attirare il maggior numero di imprese sul suo territorio.


 


 


Cfr.: dello stesso autore;  “I Contratti Transnazionali in Agricoltura, ANGA.


 


 


Related Post














Aneddotica Magazine - Collaborative Blog since 2012 https://www.aneddoticamagazine.com/it/la-casistica-dei-contratti-transnazionali/
          Farmer Lobbying Group Accused Of Selling Out Farmers On Right To Repair Laws      Cache   Translate Page      

For the last few years, numerous states have been pushing so-called "right to repair" bills, which would make it easier for consumers to repair their own products and find replacement parts and tools. Not surprisingly, many tech companies have been working overtime to kill these efforts including Apple, which has tried to argue that Nebraska's right to repair bill would turn the state into a nefarious playground for hackers. Opposition also includes Sony and Microsoft, both of which enjoy a repair monopoly on their respective video game consoles.

Whether coming from Apple, Sony, or Microsoft, opposition to these bills usually focuses on the three (false) ideas: the bills will make users less safe, somehow "compromise" intellectual property, and open the door to cybersecurity theft.

Much of the current right to repair fracas began with the lowly tractor. More specifically, it started when John Deere decided to ban anything but "unauthorized repairs," inadvertently turning countless ordinary citizens into technology policy activists. A lengthy EULA the company required customers to sign back in 2016 forbids the lion-share of repair or modification of tractors customers thought they owned, simultaneously banning these consumers from suing over "crop loss, lost profits, loss of goodwill, loss of use of equipment … arising from the performance or non-performance of any aspect of the software."

As ordinary farmers hack their way around these restrictions just to make a living (often utilizing Ukranian firmware), California recently joined the attempt to codify the right to repair into law. But that effort was derailed this week with the news that California's biggest farmer lobbying organization decided to sell out its constituents and support a watered down version of California's proposal.

Back in February, the Equipment Dealers Association promised a few concessions in a bid to stall legislation; including making repair manuals, diagnostic tech and other service tools widely available to farmers by 2021. They did not, however, address efforts to hamstring third-party part sales, the use of DRM to lock down devices, and continued to battle right to repair legislation in numerous states. The California Farm Bureau (which again is supposed to represent the farmers on this issue) this week struck a "concession" deal with the Equipment Dealers Association that isn't much of a concession.

In fact, said "new" concession closely mirrors things the industry had already voluntarily agreed to:

"It is beyond comprehension...why the California Farm Bureau—which should nominally have the interests of farmers in mind—reached an agreement with the Equipment Dealers Association last week that enshrines the concessions the Equipment Dealers Association already agreed to, without seemingly getting anything else out of it, and without even getting it to move up its 2021 timeline."

“This agreement is especially important because whenever we can resolve issues that concern us without passing laws, everybody wins,” Joani Woelfel, the CEO of the Far West Equipment Dealers Association, said in a statement.

Well, not everybody. The core problems here owners have grown angry about (DRM, intentionally making it harder for third-party repair shops to get parts) weren't really addressed, and the "compromise" not only isn't much of one, but it kills the California effort for effective right to repair laws. Needless to say, activists looking for more meaningful action see this as a massive sellout:

"When it is up to the manufacturer to decide what information to share and what to withhold, you haven't addressed the problem," Gay Gordon-Byrne, Executive Director of the Repair Association, which is leading the right to repair movement, told Motherboard in an email. "We're also concerned that the agreement fails to mention anything about fair and reasonable pricing for parts, nor any mention of how farmers will get firmware, updates or patches."

"This agreement does not end monopolization of farm equipment repair,” Nathan Proctor, who is heading consumer rights group US PIRG’s right to repair efforts, told me in an email. “While it highlights how industry is feeling the pressure from Right to Repair, it also underscores that we need to do more if truly want the freedom to fix our property."

Unfortunately for hardware vendors and companies like John Deere, this isn't a fight that's going to be going away any time soon. The tighter companies like John Deere lock down their products with draconian DRM and annoying restrictions on what consumers can do, the more activists they create who previously may have never even gotten involved in such fights. As it stands, there are pushes for right to repair laws in nearly 20 states, and the tighter these companies squeeze, the more support for these initiatives they generate.



Permalink | Comments | Email This Story

          Guilty: U.S. Convicts Kremlin-linked Russian hacker      Cache   Translate Page      
New reporting reveals former Trump campaign chair Paul Manafort is seeking a plea deal in the Mueller probe, but negotiations have stalled, because the Special Counsel wants information pertaining to Trump and the 2016 campaign. BuzzFeed News also reports a barrage of suspicious money transfers occurred 11 days after the 2016 Trump Tower meeting and a major Russian hacker, who has claimed links to the Kremlin, was convicted by U.S. Prosecutors, after being extradited from Spain.
          Un hackathon con Arduino      Cache   Translate Page      


Utilizzare Arduino connesso in rete che invia dati al cloud di Dropbox per produrre Open Data. In questo articolo viene descritto un nuovo modo di fare innovazione che guarda alle tante tecnologie che ci portano verso una nuova rivoluzione industriale: dai nuovi modi di generare idee sostenibili, sociali ed economicamente valide attraverso gli hackathon, al mondo dei dati, all’internet delle cose e naturalmente, agli “hackers” e ai makers e a chi di questo mondo ne ha fatto una professione ma anche una bella ragione di vita. Hackathon è una parola inventata unendo i termini hacker e marathon. Una maratona a cui partecipano esperti del settore informatico: programmatori e sviluppatori di software, designers, esperti di marketing e comunicazione. Il primo Hackathon si […]
          Update: Keybase - Crypto for Everyone (Social Networking)      Cache   Translate Page      

Keybase - Crypto for Everyone 2.6.0


Device: iOS iPhone
Category: Social Networking
Price: Free, Version: 2.5.0 -> 2.6.0 (iTunes)

Description:

Keybase is a messaging platform where:

• you can write securely to any twitter, reddit, facebook, github, and hacker news user
• you don't need to know someone's phone number or email address
• all messages are secure, end-to-end encrypted
• multi-device: your messages survive and transfer with encryption to new phones & computers

Keybase is so much more. It is:

• free for everyone, and free of ads
• open source (https://github.com/keybase/client)
• multi-platform, w/apps for macOS, Linux, and Windows (https://keybase.io/download)

By using the Keybase app you agree to the following terms:

• you'll be a nice Internet person

Keybase for mobile is brand new and we yearn for feedback. Inside the app, click the gear icon and then choose "feedback" to send us a summary of your experience.

What's New

Features:
• Inline video in chat
• Better reconnection handling
• More visual polish
• Better explanation of Facebook proof process

Bugs:
• Better handling of errors uploading attachments
• Some git notifications in chat could show incorrectly
• Squashed some EOF errors
• Better selection of a different conversation when leaving the selected one
• Show in finder sometimes wouldn't work from chat
• Some teams that weren't subteams could show in the list
• The statusbar could disappear after viewing a video

Keybase - Crypto for Everyone


          Ethical Hacker - IBM - Ottawa, ON      Cache   Translate Page      
Ethical Hacking gives you the ability to exercise these skills while keeping the bad guys out of our networks and applications. Change the world at IBM....
From IBM - Sat, 08 Sep 2018 10:48:45 GMT - View all Ottawa, ON jobs
          Hackers clone Tesla Model S key fob in 2 seconds to steal car      Cache   Translate Page      

Feeling reckless and looking for something new to do with your Raspberry Pi? Using a Raspberry Pi 3 Model B+, Proxmark3, Yard Stick One, and a USB battery pack, Belgium researchers needed less than two seconds to clone the key fob of a Tesla Model S.

The reckless part comes into play if you were to actually steal the Tesla. But if you turn to a life of crime, then the researchers believe McLaren, Karma and Triumph are vulnerable to the attack, as well, because like Tesla, the keyless entry solutions for those vehicles are designed by Pektron.

To read this article in full, please click here


          Notorious Russian cybercriminal pleads guilty to US charges      Cache   Translate Page      

WASHINGTON (AP) — A Russian man considered to be one of the world’s most notorious hackers pleaded guilty Wednesday to U.S. charges alleging he operated a network of devices used to steal computer credentials, distribute spam emails and install malicious software. Peter Levashov, 36, pleaded guilty to conspiracy, wire fraud, identity theft and other charges […]
          Illinois braces for another Russian attack on its election systems      Cache   Translate Page      
The frontline in the war between foreign hackers and U.S. election officials is an office in a Springfield, Illinois strip mall.
          LWN on Security: Updates, fs-verity, Spectre, Qubes OS/CopperheadOS      Cache   Translate Page      
  • Security updates for Wednesday
  • Protecting files with fs-verity

    The developers of the Android system have, among their many goals, the wish to better protect Android devices against persistent compromise. It is bad if a device is taken over by an attacker; it's worse if it remains compromised even after a reboot. Numerous mechanisms for ensuring the integrity of installed system files have been proposed and implemented over the years. But it seems there is always room for one more; to fill that space, the fs-verity mechanism is being proposed as a way to protect individual files from malicious modification.

    The core idea behind fs-verity is the generation of a Merkle tree containing hashes of the blocks of a file to be protected. Whenever a page of that file is read from storage, the kernel ensures that the hash of the page in question matches the hash in the tree. Checking hashes this way has a number of advantages. Opening a file is fast, since the entire contents of the file need not be hashed at open time. If only a small portion of the file is read, the kernel never has to bother reading and checking the rest. It is also possible to catch modifications made to the file after it has been opened, which will not be caught if the hash is checked at open time.

  • Strengthening user-space Spectre v2 protection

    The Spectre variant 2 vulnerability allows the speculative execution of incorrect (in an attacker-controllable way) indirect branch predictions, resulting in the ability to exfiltrate information via side channels. The kernel has been reasonably well protected against this variant since shortly after its disclosure in January. It is, however, possible for user-space processes to use Spectre v2 to attack each other; thus far, the mainline kernel has offered relatively little protection against such attacks. A recent proposal from Jiri Kosina may change that situation, but there are still some disagreements around the details.

    On relatively recent processors (or those with suitably patched microcode), the "indirect branch prediction barrier" (IBPB) operation can be used to flush the branch-prediction buffer, removing any poisoning that an attacker might have put there. Doing an IBPB whenever the kernel switches execution from one process to another would defeat most Spectre v2 attacks, but IBPB is seen as being expensive, so this does not happen. Instead, the kernel looks to see whether the incoming process has marked itself as being non-dumpable, which is typically only done by specialized processes that want to prevent secrets from showing up in core dumps. In such cases, the process is deemed to be worth protecting and the IBPB is performed.

    Kosina notes that only a "negligible minority" of the code running on Linux systems marks itself as non-dumpable, so user space on Linux systems is essentially unprotected against Spectre v2. The solution he proposes is to use IBPB more often. In particular, the new code checks whether the outgoing process would be able to call ptrace() on the incoming process. If so, the new process can keep no secrets from the old one in any case, so there is no point in executing an IBPB operation. In cases where ptrace() would not succeed, though, the IBPB will happen.

  • Life behind the tinfoil curtain

    Security and convenience rarely go hand-in-hand, but if your job (or life) requires extraordinary care against potentially targeted attacks, the security side of that tradeoff may win out. If so, running a system like Qubes OS on your desktop or CopperheadOS on your phone might make sense, which is just what Konstantin Ryabitsev, Linux Foundation (LF) director of IT security, has done. He reported on the experience in a talk [YouTube video] entitled "Life Behind the Tinfoil Curtain" at the 2018 Linux Security Summit North America.

    He described himself as a "professional Russian hacker" from before it became popular, he said with a chuckle. He started running Linux on the desktop in 1998 (perhaps on Corel Linux, which he does not think particularly highly of) and has been a member of the LF staff since 2011. He has been running Qubes OS on his main workstation since August 2016 and CopperheadOS since September 2017. He stopped running CopperheadOS in June 2018 due to the upheaval at the company, but he hopes to go back to it at some point—"maybe".

read more


          ЛЮДМИЛА_ГОРНАЯ: Узнайте почему известный кардиолог рекомендует данный рацион питания, который поможет вам сбросить 10 килограмм за 1 неделю!       Cache   Translate Page      

Это цитата сообщения valniko77 Оригинальное сообщениеУзнайте почему известный кардиолог рекомендует данный рацион питания, который поможет вам сбросить 10 килограмм за 1 неделю!

 

Узнайте почему известный кардиолог рекомендует данный рацион питания, который поможет вам сбросить 10 килограмм за 1 неделю!

А также очищает артерии от плохого холестерола.

 

Просто следуйте плану диеты!

 
 

Мы все знаем, что наиболее эффективные планы диеты часто создаются лучшими специалистами и диетологами! Они ведут действительно хорошую работу — создают эффективные планы рациона питания, который поможет вам сбросить избыточный вес намного быстрее!

Сегодня мы покажем вам большой план диеты, который поможет вам потерять около 10 кг за неделю! Самая важная вещь об этом плане диеты – она рекомендована лучшими кардиологами.

Многие люди, особенно женщины, которые испытали на себе эту диету, были поражены их результатами! К сожалению, ожирение является одной из наиболее значимых проблем общественного здравоохранения. Чрезмерный вес связан с повышенным риском развития многих заболеваний, таких как диабет, некоторые виды рака и сердечно-сосудистые заболевания.

Нет волшебной палочки для потери веса, и многие люди страдают ожирением и пытаются бороться с лишним весом. Потеря веса практически невозможна без снижения калорий.

Перед началом этого плана диеты, вы должны знать, что это план на две недели, и вы должны потреблять тот же завтрак в течение всего режима. Вы должны есть только один фрукт на завтрак: персик, апельсин, груша, дыня, арбуз. И имейте в виду, что вы не должны есть виноград или бананы на завтрак.

Первый день


Обед
• Апельсин
• Одно вареное яйцо
• Стакан йогурта

Ужин
• Два помидора
• Два яйца (вкрутую)
• огурец или салат
• Два сухарика

Второй день

Обед
• Апельсин
• Одно вареное яйцо
• 200 мл йогурта

Ужин
• 125 г вареной говядины
• Помидор
• Один сухарик
• Апельсин
• Чашка чая или кофе (без сахара)

Третий день

Обед
• Одно вареное яйцо
• Апельсин
• Йогурт
• Листья салата или огурец

Ужин
• 125 гр. вареной говядины
• Апельсин
• Чашка кофе или чая (без сахара)

Четвертый день

Обед
• 125 гр. сыра
• Помидор
• Один сухарик

Ужин
• 125 гр. вареной говядины
• Два помидора
• Яблоко
• Один сухарик

Пятый день

Обед
• 200 гр. отварной рыбы или мяса
• Один помидор
• Один сухарик

Ужин
• Полкило вареного картофеля, моркови или гороха

Всегда готовьте мясо или овощи без использования соли, или добавляйте только одну щепотку. Сделайте перерыв на 6 и 7 день и продолжайте план диеты на 8-й день. Нельзя пить алкоголь, в то время как вы следуете этой диете. Вы сможете потерять около 4 килограмм в течение первых 5 дней. Делайте двухдневные перерывы и повторяйте план диеты три раза — 5 дней и двухдневный перерыв. Таким образом, вы сможете избежать негативных побочных эффектов и по-прежнему терять около 14 килограмм.

Следуйте этому плану диеты по понедельникам:

• Завтрак: чашка лимонного сока без сахара
Обед: яблоко и сухарик
Ужин: одно вареное яйцо, 1 сухарь и помидор

Вы можете есть эти продукты холодными или горячими — это на самом деле не имеет значения. Нужно помнить одно — потреблять продукты в соответствующем порядке, и никогда не пропускать приемы пищи!

http://fithacker.ru/articles/uznayte-pochemu-izves...logramm-za-1-nedelyu-a-takzhe-ochishhaet-arterii-ot-plohogo-holesterola/

 

 


          How Businesses Can Inject Security Into IoT Rollouts      Cache   Translate Page      
How Businesses Can Inject Security Into IoT Rollouts juliet.vanwage… Wed, 09/12/2018 - 11:44

For businesses everywhere, the Internet of Things has largely already arrived. According to Cisco's Internet of Things Group, by 2020 there will be over 50 billion connected devices worldwide.

Already, industries like retail, sports and entertainment, and more are tapping IoT tools to improve operations and cut costs. Standard Textiles, for instance, tapped IoT in conjunction with sensors and automation to inject greater visibility into its operations, improving quality and making operations more cost-effective.

The growth of connected sensors in business is a testament to the technology’s promise. But attaching unsecured connected devices to a business network broadens the attack surface for hackers.

“Whether devices are connected into a manufacturing system’s back-end or a consumer’s house, it’s another area where there is potentially a security weakness,” says Ravin Sanjith, program director of intelligent authentication at software analysis firm Opus Research.

Discover what IoT is already doing for companies on the leading edge!

4 Steps for a More Secure IoT Rollout

For businesses considering an IoT deployment of their own, here are four ways to reduce exposure to hacking:

  1. Make Security Part of the Deployment from the Start: Too many companies don’t consider the security issues of an IoT deployment until it’s too far along. Experts such as Sanjith advise including security in the budget and planning for any IoT deployment from the beginning.

  2. Test Devices Rigorously: The Ponemon Institute reported last year that 80 percent of IoT applications are not tested for security vulnerabilities. Conducting ongoing security tests, including from third parties, is a vital tactic, experts say.

  3. Protect Data in Transit: When data is transmitted from a device to the cloud, it’s potentially vulnerable. Companies can reduce the amount of data in transit by deploying edge computing to conduct data analysis right at the point of collection.

  4. Manage Security Directly: Too many businesses rely on end users to install ­security patches. Instead, update security automatically by remotely pushing out patches as soon as they’re available.


          Job Jair      Cache   Translate Page      
OK-Thackerville, Were hiring BEVERAGE SERVERS for our beverage department inside WinStar World Casino & Resort! Full-Time and Flexible Scheduling ! Benefits ! Paid Time Off ! Paid Holidays Advancement OpportunitiesFamily Culture ! Equal Opportunity Employer ! Must Pass a Background Check Apply online at www.traditionsspirits.com or in person at Traditions Spirits Administrative Office 11073 Rogers Rd. ! Thackervil
          Russian hackers were behind massive British Airways data theft that forced thousands of Brits to cancel their bank cards, experts claim      Cache   Translate Page      
RUSSIAN hackers were behind the massive British Airways data theft that forced thousands of Brits to cancel their bank cards, experts claim. Security researchers at Risk IQ say a group known as “Magecart” were responsible for stealing 380,000 customers’ details between August 21 and September 5. Experts told the Times hackers “set up custom built, targeted infrastructure […]
          Comment on Military Wants to Put All Its Eggs in One Cloud      Cache   Translate Page      
Via Badger

 Image result for hacking computers

Military Wants to Put All Its Eggs in One Cloud

Stupidest Idea EVER! It is like those in charge want to fail. In college, I studied computers and programming in 1970. I have been a geek since before that word existed. The more developed technology becomes the easier it is to hack into or destroy. In 1970, you could not hack into a computer. Why? They were not connected to anything. Simple logic, if you do not have a port into the computer, it is impossible to hack in.

Allowing a device to control your computer is a recipe for disaster. Being honest, I do not hack anymore, but there was a time I did. If you have an access point, I can promise it can be hacked. Putting all your information on a single source makes it a high value target to hack. It guarantees everyone wants in and they will get in. The best solution is to spread data out to hundreds or thousands of locations. No one location is that valuable unless you know what is there. But with everything at one location, the hacker knows what they want is there.

If I was a betting man, I’d say less that six months after completion it will have been breached. The breach will be classified because too many jobs are on the line. But within probably nine months every important document or bit of information will have been stolen.

          Ciberseguridad, cuestión de prevención más que reacción      Cache   Translate Page      

La conectividad trae consigo comodidad, pero también peligros como el robo de identidad y el fraude cibernético, que afectan de manera considerable las finanzas y la vida de las personas por el uso de los dispositivos que se conectan a Internet.

Con la llegada de Internet de las Cosas (IoT), el peligro parece crecer exponencialmente.

En entrevista con Notimex, el CEO de Unisys México, Alejandro González, señaló que para atender a las cuestiones de ciberseguridad que se presentan actualmente es necesario prevenir los ataques y realizar acciones que eviten el daño que éstos provocan, más que reaccionar ante los mismos.

“Lo que tenemos que hacer es estar alertas a cualquier situación que se presente día a día en el tema de sector público y privado, y como ciudadanos estar atentos a lo que nos pueda comprometer. Hay que estar alertas para que nosotros seamos a un nivel cultural un foco de prevención para este tipo de ataques, más que preocupados debemos estar atentos” dijo.

La cultura de la prevención por parte de los usuarios finales es fundamental para que sus datos estén protegidos, ya que actualmente los hackers no necesitan usar los puntos de entrada tradicionales para acceder a la información que se almacena o trasmite por una red de datos, señaló para Notimex el VP de Unisys Latinomaérica, Eduardo Almeida.

“El hacker hoy ya no necesita ingresar por la puerta IP a través de un routeador o un switch, lo hace por medio de dispositivos que están conectados, que sabemos hace 10 o cinco años no estaban, ha cambiado la forma como las empresas hacen las cosas, las amenazas no están estables evolucionan mucho, la política de seguridad debe ser parte de la vida empresarial” señaló.

Ambos directivos coincidieron en que la discusión sobre seguridad es un asunto importante que se encuentra en la mesa de quienes manejan datos, ya sea como gobierno o como empresa privada.

El VP de Unisys para Latinoamérica indicó que el cuidado de la seguridad en línea es muy importante debido a que las personas viven con una gran conectividad, lo que se debe al modo en que han evolucionado los manejos de la información y a la adopción de nuevos conceptos, tales como el de IoT, que traen consigo cambios en la sociedad.

“Conceptos nuevos como movilidad cambiaron la forma como la gente utiliza tecnología y la forma como la gente se relaciona con sus empresas, con sus gobiernos y con la familia, la comodidad para hacer las cosas hoy es presente y la generación que sale hoy de la universidad no anda sin un teléfono celular en las manos”, indicó.

Respecto a la presencia de ataques cibernéticos y el aumento en el número de los mismos ahora que existe una mayor conectividad, el CEO de Unisys para México indicó que estos se hacen presentes en todo momento, pero que las acciones tomadas para prevenir los efectos de los mismos hacen que sólo algunos sean conocidos por los usuarios finales.

“Ya ocurren hoy todos los días los ataques masivos, pero los proveedores de seguridad nos dedicamos a prever esto, los que hoy son conocidos son pocos, pero a nivel mundial cada segundo hay alguien queriendo atacar la cuenta de los usuarios del sector público y privado” indicó.

Más información en El Siglo de Torreón


          Weekly doing      Cache   Translate Page      

photoSquidwrench hackerspace

What is a Squidwrench weekly doing? It is our weekly meeting where you, the meeting-goer, bring a project you are currently working on, or interested in, researching, and you do/learn about/create/teach others/etc said project in the company of others. Pretty much, it's the tinkering you would be doing at home on your own, but now you're out doing it socially. Don't have a project? Come anyway!

Highland, NY 12528 - USA

Tuesday, September 18 at 7:00 PM

4

https://www.meetup.com/squidwrench/events/254634831/


          Weekly doing      Cache   Translate Page      

photoSquidwrench hackerspace

What is a Squidwrench weekly doing? It is our weekly meeting where you, the meeting-goer, bring a project you are currently working on, or interested in, researching, and you do/learn about/create/teach others/etc said project in the company of others. Pretty much, it's the tinkering you would be doing at home on your own, but now you're out doing it socially. Don't have a project? Come anyway!

Highland, NY 12528 - USA

Tuesday, October 2 at 7:00 PM

4

https://www.meetup.com/squidwrench/events/254630021/


          新iPhone、画面大きく 新興国開拓へ旧機種は値下げ - 日本経済新聞      Cache   Translate Page      

日本経済新聞

新iPhone、画面大きく 新興国開拓へ旧機種は値下げ
日本経済新聞
【シリコンバレー=佐藤浩実】米アップルは12日、スマートフォン「iPhone」の新戦略を発表した。画面サイズが6.5インチと過去最大で価格も最高(約12万2千円)となる高級機種を投入するほか、旧機種については値下げし約5万円の機種も用意した。先進国では高単価の、新興国 ...
私のiPhone Xが旧型になった日。買い換えるべき?ハフィントンポスト
発表会で触れたiPhoneとApple Watchの新モデルケータイ Watch
【速報】Apple、新型iPhoneを3モデル発表!液晶モデルのみ発売が10月にiPhone Mania
ライフハッカー[日本版] -ギズモード・ジャパン -ITmedia -週刊アスキー
all 312 news articles »

          わずか数秒でテスラ・モデルSを盗み出せるキーレスエントリーシステムの脆弱性が発覚      Cache   Translate Page      
#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
ベルギーにあるルーヴァン・カトリック大学のCOSIC(コンピューターセキュリティと産業暗号)研究チームが、テスラのモデルSのキーレスエントリーシステムを数秒でハックする方法を発見しました。Onderzoekers kraken contactloze sleutel van Tesla - KU Leuven Nieuwshttps://nieuws.kuleuven.be/nl/2018/onderzoekers-kraken-contactloze-sleutel-van-tesla/viewHackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob | WIREDhttps://www.wired.com/story/hackers-st 全文
GIGAZINE(ギガジン) 09月13日 13時00分


          Solve this ‘Day of the Programmer’ Coding Challenge – with 42 Languages to Choose From! | #ProgrammerDay @ProgrammerDay      Cache   Translate Page      
HackerRank are “building an engaged community of problem solvers in different domains of Computer Science like AI, Algorithms, Machine Learning, functional programming, etc” and have a bunch of ‘practice’ challenges for users to attempt to solve. You can upload your solution/s to a leaderboard, along with discussions and the ability to seek advice on your […]
          Hackerlar 50 milyon kişinin bilgilerini çaldı      Cache   Translate Page      
Hackerlar 50 milyon kişinin bilgilerini çaldı
Sungy Mobile, 50 milyondan fazla kullanıcısının verilerinde güvenlik zafiyeti olduğunun fark etti. Milyonlarca kişinin bilgileri çalındı.Devamı için tıklayınız
          Appscope — новый каталог веб-приложений для Android и iOS      Cache   Translate Page      
AppscopeОблегчённые версии Instagram, Google Maps, Twitter, Duolingo и других популярных программ.
          Google закроет почтовый сервис Inbox      Cache   Translate Page      
Google закроет почтовый сервис InboxКомпания планирует сосредоточиться на Gmail, которому в последнее время уделялось основное внимание.
          Все новинки с сентябрьской презентации Apple 2018 года      Cache   Translate Page      
Компания представила целых три смартфона и одни часы, но оставила публику без новых планшетов и аксессуаров.
          Кошмары из реальной жизни: о чём рассказывает «Американская история ужасов»      Cache   Translate Page      
Кошмары из реальной жизни: о чём рассказывает «Американская история ужасов»В день выхода нового сезона-кроссовера «Апокалипсис» Лайфхакер вспоминает основные темы сериала и их первоисточники.
          Представлены iPhone Xs, iPhone Xs Max и iPhone Xr — новинки компании Apple      Cache   Translate Page      
Это первые смартфоны Apple с поддержкой двух SIM-карт. Также компания полностью перешла на новый «безрамочный» дизайн.
          Apple представила новые умные часы Watch Series 4      Cache   Translate Page      
Смарт-часы получили обновлённый дизайн, увеличенные экраны и уникальную функцию ЭКГ.
          Как пить вино: инструкция для чайников      Cache   Translate Page      
охладить виноВинный сервис Invisible рассказывает, как обращаться с вином, чтобы получать от него максимум удовольствия.
          Прямой эфир: трансляция презентации iPhone Xs и других новинок Apple      Cache   Translate Page      
Горячие новости с ежегодного осеннего мероприятия компании. Присоединяйтесь!
          Обзор OPPO Find X — совершенно безрамочного флагмана с выдвижной камерой      Cache   Translate Page      
Мощнейший китайский флагман с футуристическим дизайном, моторизированной камерой и 3D-распознаванием лиц за 70 тысяч рублей.
          Как запретить Chrome отключать синхронизацию профиля, когда вы выходите из Gmail или YouTube      Cache   Translate Page      
Заставьте новую версию браузера работать с учётными записями так же, как старая.
          Штука дня: складное кресло размером с бутылку      Cache   Translate Page      
Весит килограмм и раскладывается одной рукой всего за 5 секунд.
          Огурцы в огурцах — гениальный способ избавиться от переросших овощей      Cache   Translate Page      
Отличный рассол получится из огурцов любой формы и размера.
          10 интересных фактов о жизни космонавтов в невесомости      Cache   Translate Page      
Сон в вертикальном положении, душ без воды и стрижка с пылесосом. Рассказываем, чем быт космонавтов отличается от земного.
          Лучшие скидки и акции на AliExpress и в других онлайн-магазинах 12 сентября      Cache   Translate Page      
В сегодняшнем выпуске — скидки на смартфоны Vivo Y85, Huawei P20 Lite, планшеты, телевизоры и другие товары.
          Virtual Tours, Newsletters and Resources on the Fly! Now that's Pro!      Cache   Translate Page      
Wanna create Virtual Tours like a PRO? Integrate them into your blog or website? Lifehacker told us last week about this kick ass new website called Mapwing and let this Pro be the first (ok, second) to tell you, It...
          Google Notebook Adds Search and Real Estate agents Catch On      Cache   Translate Page      
Today Lifehacker tipped us off to a helpful new feature on Google Notebooks- you can now search the content of public notebooks. Check out the content that comes up when you search for "Real Estate." Google Notebooks are the perfect...
          Firefox 2 Tip: Instant Calculator      Cache   Translate Page      
A nice tip from Lifehacker for all you Pros that have begun using Firefox version 2. If you type in your mathmatical formula into the search box (Cntrl-K to get there in a hurry) and you'll get an answer quicker...
          Sodomania vol.4      Cache   Translate Page      
Sodomania vol.4
Release Year: 1993
Cast: Brittany O'Connell, Carmel St. Clair, Chelsea Ann, Lilli Xene, Lynden Johnson, Misty Rain, Nicole London, Tiffany Mynx, Alex Sanders, Chad Thomas, Jack Mann, Tony Tedeschi, Troy Ballou
Genres: Retro

In Sodomania IV you get five separate vignettes, each with it«s own special flavor! In the first story we are treated to the screaming need of an impassioned mute girl whose innocence is exploited by a hedonistic duo...or is it?
In out second story one of the newest and kinkiest girls in the business adds a whole new dimension to appetite control. High in calories and low in fat!
Next, the hottest and nastiest girl I»ve ever met teams up with one of the only girls in the business that can match her intensity. They turn the tables on a perverted peeping Tom, and thief who has broken into their home. A heavy price is exacted upon this young man for his dirty deeds!
In out fourth scenario, the petite blond with the electric blue eyes and big titties is a feature dancer who comes to my office to tell me what kind of sex scene would really turn her on. Her dream lover is Tony Tedeschi, and she wants me to set up a scene that involves her teasing him and him doing her...Maybe I can help, I«ll do my best!
In our final scene, Brittany O»Connell returns as the infamous nutwhacker, Julliane St. Croix. But this time she meets her match in the form of an ultra kinky couple who turns the tables on our demented temptress...or do they? Maybe...maybe not!

Format: avi
Duration: 2:07:02
Video: 576x432, DivX 5, 1508kbps
Audio: 156kbps

Sodomania vol.4 Sodomania vol.4
Sodomania vol.4 Sodomania vol.4

Sodomania vol.4
File size: 1.5 GB

Sodomania vol.4

Sodomania vol.4
http://svalka.ws/
          Hacker legt netwerk van zes scholen plat en eist duizenden euro’s losgeld: “Dit is niet het werk van een leerling”      Cache   Translate Page      

Scholengroep KSO Tielt-Ruiselede zit al de hele week met de handen in het haar. Een hacker brak zondagavond binnen in het netwerk van de zes scholen en blokkeerde een heleboel gegevens. “Hij vroeg losgeld, maar dat we betaalden we niet.”


          Comment on 7 Ways to Get Buff ASAP – Cosmopolitan by Ling Kellog      Cache   Translate Page      
Wild hacker crew I was able to catch my wife cheating using these hackers - http://456bosfo4pgtbrv3.onion - You must use TOR browser to access.Wild hacker crew
          Ethical Hacker - IBM - Ottawa, ON      Cache   Translate Page      
Ethical Hacking gives you the ability to exercise these skills while keeping the bad guys out of our networks and applications. Change the world at IBM....
From IBM - Sat, 08 Sep 2018 10:48:45 GMT - View all Ottawa, ON jobs
          * NEW * Rounding Numbers Differentiated CfE Second Level Pack      Cache   Translate Page      
This set of differentiated activities allows children to round to nearest 10, 100, 1000, 10,000 and 100,000 in order to find the codes needed to stop computer hackers.

          Escusam de me perguntar que eu também não sei!...      Cache   Translate Page      


Não sei se o Rui Pinto é o hacker ou não. Sei que o FC Porto não pagou e sei que os mails existem e são verdadeiros. As autoridades sabem desde a primeira hora como tive acesso à informação que permitiu, por exemplo, descobrir os corruptos que andavam a violar o sistema judicial.


Escusam de me perguntar que eu também não sei!...

Leoninamente,
Até à próxima

          É muito bem capaz de ser do Sporting!!!...      Cache   Translate Page      

'Sábado' revela identidade do 'hacker' que roubou os segredos do Benfica
Trata-se de Rui Pinto, um português que vive na Europa de Leste

Terá, alegadamente, menos de 30 anos e operará, também alegadamente, a partir de Budapeste. Será um génio da informática que ainda muito jovem terá sido, ainda alegadamente, apanhado pela primeira vez depois de desviar 270 mil euros de um banco nas ilhas Caimão. Diz a 'Sábado' que o seu nome será Rui Pinto, estará a ser investigado em Portugal e Espanha e terá sido o 'hacker' responsável pelo roubo dos segredos do Benfica.

É muito bem capaz de ser do Sporting!!!...

Leoninamente,
Até à próxima

          Letter: Get out and vote      Cache   Translate Page      
This election has huge repercussions to our nation and the world. Democracy is at risk in the U.S. with voter ID laws, polling place closures, gerrymandering, and voting rights lost to folks trapped by the judicial system. Russian hackers are ignored, after throwing our 2016 […]
          Russian hackers were behind massive British Airways data theft that forced thousands of Brits to cancel their bank cards, experts claim      Cache   Translate Page      
RUSSIAN hackers were behind the massive British Airways data theft that forced thousands of Brits to cancel their bank cards, experts claim. Security researchers at Risk IQ say a group known as “Magecart” were responsible for stealing 380,000 customers’ details between August 21 and September 5. Experts told the Times hackers “set up custom built, targeted infrastructure […]
          [OGR-28] hitparade van week 37      Cache   Translate Page      
Replies: 4 Last poster: KuuKe at 13-09-2018 06:01 Topic is Open En jawel hoor, bij de Crazy Cow Squad zijn ze de grens van 190 miljoen punten geslecht Ze leveren tegenwoordig niet meer zo heel erg veel punten in maar als je als derde team binnen DPC dit hebt weten te behalen dan weet je meteen dat dat in het verleden wel anders is geweest! [OGR-28] hitparade van 12 september 2018Daily Top 30posdailymembertotal1.(1)130.821Theadalus67.341.908(5)2.(2)82.813ra.v.ochten at gmail.com2.653.370(22)3.(4)55.000 ossy_66633.365.477(9)4.(1)52.704Crazy Cow Squad190.023.244(3)5.()35.420Distri Server12.520.680(17)6.()26.098Division Brabant422.810.558(1)7.(6)5.444RamonP31.726.164(10)8.()2.648reznor15.365.879(15) Meer...Overall Top 30postotalmemberdaily1.()422.810.558Division Brabant26.098(6)2.()220.878.417Andy4fun03.()190.023.244Crazy Cow Squad52.704(4)4.()103.868.519Team_Kwakende_kip05.()67.341.908Theadalus130.821(1)6.()37.914.903NightBird07.()35.091.971Team KillEmAll graast voor goud08.()34.625.943Uplinksweetlake09.()33.365.477 ossy_66655.000(3)10.()31.726.164RamonP5.444(7)11.()28.100.576St4ck3r012.()27.832.833Grutte Pier [Wa Oars]013.()18.161.751x-RaY99 the one-man 'team'014.()15.738.922Damic015.()15.365.879reznor2.648(8)16.()14.320.802Qazwaplol017.()12.520.680Distri Server35.420(5)18.()7.057.749The_Greater019.()5.844.881EliteHackers.info020.()5.442.031somerjer at blerry.nl021.()3.315.295RhinoTech022.()2.653.370ra.v.ochten at gmail.com82.813(2)23.()2.550.942IceStorm024.()1.756.562[eNeRGy]025.()1.558.622DigiK-oz026.()1.400.875Antoine027.()1.252.542Robinski028.()1.044.032Tinkerer029.()1.037.366Jan-Lieuwe Koopmans030.()635.678VictordeHollander0 Meer...Teams Daily Top 15posdailymembertotal1.()5.302.328yoyo@home BOINC wrapper6.644.738.705(1)2.()2.697.170SEGA Users Group2.094.068.520(4)3.()2.365.544Team Hampshire College353.655.646(19)4.()956.508AnandTech 106351.967.183.563(5)5.()616.859BOFH@Chalmers1.144.483.255(9)6.(1)483.550linux-de.org3.525.682.937(2)7.(1)433.437BugTraq.Ru Team. United power of xUSSR.2.110.755.795(3)8.(1)429.456Distributed Amiga849.951.275(13)9.(3)390.948Dutch Power Cows1.350.324.329(8)10.(7)313.812Linuxfr: French Linux Team1.409.883.576(7)11.(2)299.658Lost Clusters - Denmark260.350.675(21)12.(1)281.416Team Warped (OS/2)648.086.291(15)13.(2)270.657Beer Drinkers Anonymous193.663.274(27)14.(2)258.576Czech D.NET Team1.074.222.049(10)15.(5)242.265OcUK - Overclockers UK46.004.492(71) Meer...Teams Overall Top 15postotalteamdaily1.()6.644.738.705yoyo@home BOINC wrapper5.302.328(1)2.()3.525.682.937linux-de.org483.550(6)3.()2.110.755.795BugTraq.Ru Team. United power of xUSSR.433.437(7)4.()2.094.068.520SEGA Users Group2.697.170(2)5.()1.967.183.563AnandTech 10635956.508(4)6.()1.875.942.284Free-DC107.658(23)7.()1.409.883.576Linuxfr: French Linux Team313.812(10)8.()1.350.324.329Dutch Power Cows390.948(9)9.()1.144.483.255BOFH@Chalmers616.859(5)10.()1.074.222.049Czech D.NET Team258.576(14)11.()1.030.892.279Ukraine56.297(40)12.()872.397.176San Antonio Linux User Group013.()849.951.275Distributed Amiga429.456(8)14.()668.846.043HardOCP9.331(101)15.()648.086.291Team Warped (OS/2)281.416(12) Meer...MijlpalenCrazy Cow Squad190.000.000LedenFlushers: 8/63 = 12.7%Geen nieuwe leden InhaalstatsBOFH@Chalmers haalt ons in over3 jaarTeam Hampshire College haalt ons in over5 jaarLinuxfr: French Linux Team wordt ingehaald over8 maandenFree-DC wordt ingehaald over3 jaarBugTraq.Ru Team. United power of xUSSR. wordt ingehaald over13 jaarMegaflush top 57 juli 2018Theadalus40.049.0071 december 2015Division Brabant30.471.11925 december 2017Crazy Cow Squad12.354.29416 augustus 2015Andy4fun6.814.46914 april 2014Qazwaplol6.251.321Meer informatieOGR-28 projectpagina op WDO*** suggesties voor een DPCH? ***bron
          3 Strategies to Improved Dealer Communication      Cache   Translate Page      
Dealers serve as the sounding board to what plans, tactics, and strategies OEMs and captives implement, John Thacker, national director of sales for Kia Motors Finance, told Auto Finance Excellence. “If [Kia] has a new plan or program and we want to pilot it, we run it by our dealer council because their feedback is […]
          'We must ask if our system of redistribution has gone from helpful to harmful'      Cache   Translate Page      
If you really want to get on these days, you need a catchy word or phrase. Something like 'pre-distribution' - a clever play on the more common redistribution. It was coined by Yale University economist Jacob Hacker back in 2011 and has become quite the thing among governments and social economists. This is not to decry the merits of Dr Hacker's insights - quite the reverse. Pre-distribution might have been invented with Ireland in mind.
          Oppo A5 Review      Cache   Translate Page      

Oppo in 2018 has been getting quite aggressive with the launches of new devices, and on the other side the devices had a great price to performance ratio, and even it had some really great internals which made that device unique aesthetically and in the history of Oppo. Even this device the Oppo A5 comes...

The post Oppo A5 Review appeared first on Thetechhacker.


          What To Consider When Choosing CFD Trading Apps      Cache   Translate Page      

A contract for difference commonly referred to as CFD is one of the most popular forms of trading around right now. It allows the trader to speculate on the prices of financial markets such as forex. The contract is between two parties, the buyer and the seller, where the difference between the opening price and...

The post What To Consider When Choosing CFD Trading Apps appeared first on Thetechhacker.


          33 temporarily free and 36 on-sale apps and games for Wednesday      Cache   Translate Page      

We're halfway through another week, so that means it's time to check out some more app sales. Today's list isn't too bad, and it even has some notable items (which you will find in bold). It also might be worth heading back to Monday's post to check out if anything there is still on sale.

Free

Apps

  1. BitProject $0.99 -> Free; Sale ends in 8 hours
  2. Sleep Bug Pro: White Noise Soundscapes & Music Box $1.99 -> Free; Sale ends in 3 days
  3. Sound Recorder $0.99 -> Free; Sale ends in 3 days
  4. Browse Simply Gold - Fast Incognito Web Browser $2.99 -> Free; Sale ends in 5 days
  5. QR Barcode Scanner Pro $4.99 -> Free; Sale ends in 6 days
  6. DartPro - Darts Scorer $1.49 -> Free; Sale ends in 7 days

Games

  1. Ancient Genocide $1.99 -> Free; Sale ends in 8 hours
  2. klocki $0.99 -> Free; Sale ends in 8 hours
  3. V for Vampire $1.99 -> Free; Sale ends in 8 hours
  4. Age of Civilizations Africa $1.95 -> Free; Sale ends in 1 day
  5. Fuzzy Seasons: Animal Forest (Start Pack Edition) $3.99 -> Free; Sale ends in 2 days
  6. RealFishing3D $0.99 -> Free; Sale ends in 3 days
  7. TA: Little Red Riding Hood $0.99 -> Free; Sale ends in 3 days
  8. DeepAbyss $0.99 -> Free; Sale ends in 4 days
  9. Mystic Guardian VIP : Old School Action RPG $3.99 -> Free; Sale ends in 4 days
  10. Dots puzzle $0.99 -> Free; Sale ends in 5 days
  11. Fluffy Alien $0.99 -> Free; Sale ends in 5 days
  12. i Live - Gold Edition $0.99 -> Free; Sale ends in 5 days
  13. Fliplomacy $1.99 -> Free; Sale ends in 6 days
  14. ORBB $0.99 -> Free; Sale ends in 6 days
  15. The Lonely Hacker $2.99 -> Free; Sale ends in 6 days
  16. Todlio $1.49 -> Free; Sale ends in 7 days

Icon packs & customization

  1. Color Metal 1 - Icon Pack $0.99 -> Free; Sale ends in 1 day
  2. Native American 3D Pro $0.99 -> Free; Sale ends in 1 day
  3. Color Metal 2 - Icon Pack $0.99 -> Free; Sale ends in 2 days
  4. Pixel Oreo 3D - Icon Pack $0.99 -> Free; Sale ends in 3 days
  5. Recticons - Icon Pack $1.99 -> Free; Sale ends in 3 days
  6. Smart Swipe (Sub) Launcher - Quick Arc Launcher $2.99 -> Free; Sale ends in 3 days
  7. Three Wise Monkeys 3D $0.99 -> Free; Sale ends in 3 days
  8. Mellow Dark - Icon Pack $0.99 -> Free; Sale ends in 4 days
  9. Rugos Premium - Icon Pack $0.99 -> Free; Sale ends in 4 days
  10. Flo UI Icon Pack $0.99 -> Free; Sale ends in 5 days
  11. Oreo Square - Icon pack $0.99 -> Free; Sale ends in 7 days

Sale

Apps

  1. How to Draw Pro $3.99 -> $0.99; Sale ends in 2 days
  2. Bubble Level PRO $1.99 -> Free; Sale ends in 3 days
  3. JPEG Optimizer PRO with PDF support $1.99 -> $0.99; Sale ends in 3 days
  4. Calls Blacklist PRO - Call Blocker $1.99 -> $1.39; Sale ends in 4 days
  5. Brea keven Point multiple products Business $1.49 -> $0.99; Sale ends in 5 days
  6. Periodic table Tamode Pro $1.49 -> $0.99; Sale ends in 5 days
  7. Volume Booster Pro $1.49 -> $0.99; Sale ends in 5 days
  8. Ultra Sound Booster Pro $1.49 -> $0.99; Sale ends in 5 days
  9. Bubble Level Pro $2.49 -> $1.49; Sale ends in 6 days
  10. CURSO DE TEORIA MUSICAL - PRO $1.99 -> $0.99; Sale ends in 6 days
  11. Drums Sheet Reading PRO $1.99 -> $0.99; Sale ends in 6 days
  12. English Spanish Dictionary $9.99 -> $3.99; Sale ends in 6 days
  13. English Spanish Dictionary Unabridged $24.99 -> $11.99; Sale ends in 6 days
  14. Language Coach $9.99 -> $0.99; Sale ends in 6 days
  15. Learn to play Bass Guitar PRO $1.99 -> $0.99; Sale ends in 6 days
  16. Learn to play Drums PRO $1.99 -> $0.99; Sale ends in 6 days
  17. Learn to play Piano PRO $1.99 -> $0.99; Sale ends in 6 days
  18. magic trick any card to phone " ac2phone " $6.99 -> $2.49; Sale ends in 6 days
  19. Music Scales PRO $1.99 -> $0.99; Sale ends in 6 days
  20. pro paint prediction-magic trick-be a mentalist $6.99 -> $0.99; Sale ends in 6 days
  21. READ MUSIC PRO $1.99 -> $0.99; Sale ends in 6 days
  22. Travel Interpreter Phrasebook $9.99 -> $0.99; Sale ends in 6 days
  23. WEATHER NOW - forecast radar & widgets ad free $2.99 -> $0.99; Sale ends in 6 days

Games

  1. SnakEscape $4.99 -> $3.49; Sale ends in 5 days
  2. Subtraction Skill Builders $2.49 -> $0.99; Sale ends in 5 days
  3. Volt $1.99 -> $0.99; Sale ends in 5 days
  4. Baby Games 7-in-1 Plus $1.99 -> $0.99; Sale ends in 6 days
  5. Dealer's Life - Your Pawn Shop $2.99 -> $0.99; Sale ends in 6 days
  6. President Simulator $1.99 -> $0.99; Sale ends in 6 days
  7. 911 Operator $4.99 -> $3.49; Sale ends in 7 days
  8. Addition and subtraction up to 10 in German $2.49 -> $0.99; Sale ends in 7 days
  9. Braveland Wizard $2.99 -> $0.99; Sale ends in 7 days
  10. Sally's Law $1.99 -> $0.99; Sale ends in 7 days
  11. Subtraction Math Trainer $2.49 -> $0.99; Sale ends in 7 days

Icon packs & customization

  1. King Blue - Icon Pack $1.99 -> $0.99; Sale ends in 2 days
  2. Circulus UI - Icon Pack $2.99 -> $0.99; Sale ends in 4 days
Read More

33 temporarily free and 36 on-sale apps and games for Wednesday was written by the awesome team at Android Police.


          September 19- NY Artificial Intelligence in Healthcare      Cache   Translate Page      
An interdisciplinary Meetup focused on artificial intelligence research, medicine and MedTech—where the spirit of the Enlightenment and coffeehouse culture meets the modern hackerspace. All are welcome. Meetup.com/NYHAIS Una reunión interdisciplinaria enfocada en la investigación de inteligencia artificial, medicina y MedTech. … Continue reading
          Nintendo Switch System Update 6.0.0 Launches Alongside Online Service      Cache   Translate Page      

eShop maintenance also planned.

Nintendo's North American website has revealed the next system update for the Switch will arrive on 18th September alongside the launch of the online service. After installing version 6.0.0, it will no longer be possible to unlink your Nintendo account from your Switch user account. This means you have until this date to unlink it. After this update is released, the eShop will go down for maintenance. Once this is complete, online memberships can be purchased. 

At the end of August, hackers reportedly uncovered information about version 6.0.0. The findings revealed more user icons would be added. There were also controller icons located, suggesting new officially-licensed controllers could be on the way.

Read the full article on nintendolife.com


          Comment on Hello world! by tomford.name      Cache   Translate Page      
Hey! I know this is kind of off topic but I was wondering which blog platform are you using for this site? I'm getting sick and tired of Wordpress because I've had problems with hackers and I'm looking at options for another platform. I would be great if you could point me in the direction of a good platform.
          Episode 153: Min svävare är fylld med cyborgs      Cache   Translate Page      
This week Dave (https://twitter.com/davidegts) talks with Camille Tuutti (https://twitter.com/camilletuutti) about government change agents and chip implants! GovernmentCIO Media (https://www.governmentciomedia.com/) Ashley Mahan, FedRAMP agency evangelist, General Services Administration: Government Cloud-Vetting Program’s Chief Cheerleader Sounds Off (https://www.governmentciomedia.com/government-cloud-vetting-programs-chief-cheerleader-sounds) David Lilley Jr., Former DHS geospatial information officer, now with Department of the Army: Former DHS Leader Says Change Agents Must Lead Revolutions (https://www.governmentciomedia.com/former-dhs-leader-says-change-agents-must-lead-revolutions) March 15: CXO Tech Forum: Uncle Sam Meets Silicon Valley (https://unclesammeetssiliconvalley.splashthat.com/) Patrick Hamilton Walsh (https://www.linkedin.com/in/patrickhamiltonwalsh/) Dangerous Things (https://dangerousthings.com/): Custom gadgetry for the discerning biohacker Epicenter (https://epicenterstockholm.com/) Swedish startup hub A Swedish start-up has started implanting microchips into its employees (https://www.cnbc.com/2017/04/03/start-up-epicenter-implants-employees-with-microchips.html) My hovercraft is full of eels in many languages (http://www.omniglot.com/language/phrases/hovercraft.htm) We Give Thanks * Camille Tuutti (https://twitter.com/camilletuutti) for being our special guest star! * Stefani Shepherd (https://twitter.com/GovITStef) for the photo! Special Guest: Camille Tuutti.
          Episode 147: Dadbag      Cache   Translate Page      
This week Dave (https://twitter.com/davidegts) and Gunnar (http://atechnologyjobisnoexcuse.com/about) talk about: Game Boys in your medical devices, unicode in your domain names, cryptocurrency miners in your browser, and commercial software in your national security systems Just sayin’: 13 'brain belts' where the world's smartest people reside (http://www.businessinsider.com/13-brain-belts-where-the-worlds-smartest-people-reside-2017-8) Vogue: 6 Reasons Akron, Ohio, Should Be On Your Radar (https://www.vogue.com/article/akron-ohio-travel-guide-lebron-james) Pocket (http://getpocket.com/) Tom Bihn Tristar (https://www.tombihn.com/products/tri-star?variant=16396837575) and Daylight (https://www.tombihn.com/products/daylight-backpack?variant=20794066631) combo Hyatt Regency DFW International Airport (https://dfw.regency.hyatt.com/en/hotel/home.html) 465k patients told to visit doctor to patch critical pacemaker vulnerability (https://arstechnica.com/information-technology/2017/08/465k-patients-need-a-firmware-update-to-prevent-serious-pacemaker-hacks/) Meanwhile: Game Boy Advance Hiding In a Medical Device (https://hackaday.com/2017/09/24/game-boy-advance-hiding-in-a-medical-device/) Fake domain names with unicode characters: Chrome, Firefox, and Opera users beware: This isn’t the apple.com you want (https://arstechnica.com/information-technology/2017/04/chrome-firefox-and-opera-users-beware-this-isnt-the-apple-com-you-want/) Try this: Go to https://www.xn--80ak6aa92e.com/ (https://www.xn--80ak6aa92e.com/) YMMV depending upon browser (works on Firefox, but not on Chrome) Coinhive (https://coin-hive.com/): "Monetize Your Business With Your Users' CPU Power" D&G Term of the Week: Cryptojacking Coinhive Is Rapidly Becoming a Favorite Tool Among Malware Devs (https://www.bleepingcomputer.com/news/security/coinhive-is-rapidly-becoming-a-favorite-tool-among-malware-devs/) Chrome Extension Embeds In-Browser Monero Miner That Drains Your CPU (https://www.bleepingcomputer.com/news/security/chrome-extension-embeds-in-browser-monero-miner-that-drains-your-cpu/) Showtime Websites Used to Mine Monero, Unclear If Hack or an Experiment (https://www.bleepingcomputer.com/news/security/showtime-websites-used-to-mine-monero-unclear-if-hack-or-an-experiment/) Someone Made an Ad Blocker But for Cryptocurrency Mining (https://motherboard.vice.com/en_us/article/d3yp9a/someone-made-an-ad-blocker-but-for-cryptocurrency-mining) Symantec CEO: Get Commercial Software Off National Security Systems (http://www.nextgov.com/cybersecurity/2017/09/symantec-ceo-get-commercial-software-national-security-systems/141158/) Exclusive: Symantec CEO says source code reviews pose unacceptable risk (http://www.reuters.com/article/us-usa-cyber-russia-symantec/exclusive-symantec-ceo-says-source-code-reviews-pose-unacceptable-risk-idUSKBN1CF2SB) Would You Video Chat With An Airline Customer Service Rep? (https://consumerist.com/2017/08/22/would-you-video-chat-with-an-airline-customer-service-rep/) Cutting Room Floor * Robots, Now Wielding Nunchucks (https://www.technologyreview.com/the-download/608955/robots-now-wielding-nunchucks/) * The Dadbag (http://thedadbag.com/) * See the whole product line (http://thedadbag.com/range.html) * Sony Releases New Earbud Detangling Spray (http://www.theonion.com/graphic/sony-releases-new-earbud-detangling-spray-56996) * Quickly Find the Hipster Neighborhoods in Any Major City With This Tool (https://lifehacker.com/quickly-find-the-hipster-neighborhoods-in-any-city-with-1818681545) * Emacs client for Slack (https://github.com/yuya373/emacs-slack?_lrsc=ff3ee0b4-a7dc-4c29-9295-41086c592fb2&sc_cid=701600000011zELAAY) brings Zawinski's Law of Software Envelopment to 2017 * See also Emacs client for Rocketchat (https://github.com/4hiziri/rocket-chat) (HT Anthony Green (https://twitter.com/antgreen)) * Greek philosopher or ailment? (https://wronghands1.com/2017/09/15/greek-philosopher-or-ailment/) * Memory Chemicals (https://scarfolk.blogspot.com/2017/10/memory-chemicals-1979.html): For more information, please reread We Give Thanks * Anthony Green (https://twitter.com/antgreen) * The D&G Show Slack Clubhouse for the discussion topics!
          Episode 145: Mark Giveth, Mark Taketh Away      Cache   Translate Page      
This week Dave (https://twitter.com/davidegts) and Gunnar (http://atechnologyjobisnoexcuse.com/about) talk with Mark Thacker (https://twitter.com/Thackman) about RHEL 7.4 security and storage, and how to kill a feature Red Hat Enterprise Linux 7.4 bolsters security functionality and performance, Linux container features and automation capabilities for complex IT environments (https://www.redhat.com/en/about/press-releases/red-hat-bridges-hybrid-multi-cloud-deployments-latest-version-red-hat-enterprise-linux-7) RHEL 7.4 launched Aug. 1, 2017 (RHEL 7.4 Release Notes for Security here (https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.4_Release_Notes/new_features_security.html)) Network Bound Disk Encryption (https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Security_Guide/sec-Using_Network-Bound_Disk_Encryption.html) USBGuard (https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Security_Guide/sec-Using-USBGuard.html) (See Lucy’s excellent blog post (http://rhelblog.redhat.com/2017/08/03/built-in-protection-against-usb-security-attacks-with-usbguard/) on this) Audit (https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Security_Guide/chap-system_auditing.html) enhancements for human readability (ausearch --format text) OpenSCAP (https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Security_Guide/chap-Compliance_and_Vulnerability_Scanning.html) NIST Certification SELinux support with OverlayFS (https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.4_Release_Notes/new_features_file_systems.html) System Role for SELinux configuration (https://access.redhat.com/articles/3050101) D&G This Week in Vendor Abandonment: Btrfs (https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.4_Release_Notes/chap-Red_Hat_Enterprise_Linux-7.4_Release_Notes-Deprecated_Functionality.html) Red Hat Acquires Permabit Assets, Eases Barriers to Cloud Portability with Data Deduplication Technology (https://www.redhat.com/en/about/press-releases/red-hat-acquires-permabit-assets-eases-barriers-cloud-portability-data-deduplication-technology) We Give Thanks * Mark Thacker (https://twitter.com/Thackman) for being our special guest star! Special Guest: Mark Thacker.
          Episode 144: Mark Thacker: Product Management Zelig      Cache   Translate Page      
This week Dave (https://twitter.com/davidegts) and Gunnar (http://atechnologyjobisnoexcuse.com/about) talk with Mark Thacker (https://twitter.com/Thackman) about technical product management and getting things done in open source and proprietary organizations Gopher (https://en.wikipedia.org/wiki/Gopher_%28protocol%29) Sun Microsystems (https://en.wikipedia.org/wiki/Sun_Microsystems) Quantum Corporation (https://en.wikipedia.org/wiki/Quantum_Corporation) Help Wanted: We’re hiring Senior Product Manager, Storage (https://careers-redhat.icims.com/jobs/56920/senior-product-manager%2c-storage/job) Strategic Partner Product Manager, Business (https://careers-redhat.icims.com/jobs/56340/strategic-partner-product-manager%2c-business/job) We Give Thanks * Mark Thacker (https://twitter.com/Thackman) for being our special guest star! Special Guest: Mark Thacker.
          Episode 143: Ostensibly Helpful, But Actually Dangerous      Cache   Translate Page      
This week Dave (https://twitter.com/davidegts) and Gunnar (http://atechnologyjobisnoexcuse.com/about) talk about things that are ostensibly helpful, but actually dangerous: robotic tutors, voice modulators, autocomplete, and the hellscape of Android VPN apps Creeper sauce (http://ontapgrille.com/location/stow/?page=menu) is back! Gunnar can’t wait for the delivery of his Tom Bihn Tristar (https://www.tombihn.com/products/tri-star) Human vs. robot ping pong (https://motherboard.vice.com/en_us/article/this-robot-is-almost-definitely-going-to-kick-your-ass-at-ping-pong) Hushme Lets You Talk On The Phone Privately While Pretending To Be Bane (http://www.neatorama.com/2017/03/21/Hushme-Lets-You-Talk-On-The-Phone-Privately-While-Pretending-To-Be-Bane/) Researchers Issue Security Warnings About Several Popular Android VPN Apps (http://lifehacker.com/researchers-issue-security-warnings-about-several-popul-1791617644) The browser setting everyone should turn off now (https://www.thrillist.com/tech/nation/change-chrome-autofill-browser-settings-prevent-credit-card-hacking) Is The Future Of Television Watching on Fast-Forward? (https://entertainment.slashdot.org/story/16/06/26/2044239/is-the-future-of-television-watching-on-fast-forward) Network Television Stations Speed Up TV Shows to Fit in More Ads (http://lifehacker.com/network-television-stations-speed-up-tv-shows-to-fit-in-1797131517) Couch to 5K (http://www.coolrunning.com/engine/2/2_3/181.shtml), RunKeeper (https://runkeeper.com/), and the value of chains Cutting Room Floor * Recreating Asteroids with open source and a laser projector (http://hackaday.com/2017/03/08/light-replaces-electrons-for-giant-vector-graphics-asteroids-game/) * We can now 3D print Slinkys (http://hackaday.com/2017/03/09/we-can-now-3d-print-slinkys/) * Robot Solves Sudoku on Paper (http://hackaday.com/2017/07/10/robot-solves-sudoku-on-paper/) * AI Move Poster Generator (http://www.neatorama.com/2017/07/11/AI-Move-Poster-Generator/) * Create Hilarious Fake Inspirational Messages With InspiroBot (http://lifehacker.com/create-hilarious-fake-inspirational-messages-with-inspi-1796535110) * New paint colors invented by neural network (http://lewisandquark.tumblr.com/post/160776374467/new-paint-colors-invented-by-neural-network) * Metal band names invented by neural network (http://lewisandquark.tumblr.com/post/160407271482/metal-band-names-invented-by-neural-network) * Neural networks can name guinea pigs (http://lewisandquark.tumblr.com/post/161854386267/neural-networks-can-name-guinea-pigs) * Princeton students after a freshman vs. sophomores snowball fight, 1893 (http://weird-vintage.com/post/163036593408/weirdvintage-princeton-students-after-a) * A Virtual Machine, in Google Sheets (http://hackaday.com/2017/07/05/a-virtual-machine-in-google-sheets/) We Give Thanks * The D&G Show Slack Clubhouse for the discussion topics!
          Episode 139: Travel and Leisure      Cache   Translate Page      

Cutting Room Floor


          Episode 137: The Invisible Hand      Cache   Translate Page      
Cutting Room Floor
          Episode 134: Drone Sweaters      Cache   Translate Page      
This week Dave and Gunnar talk about holding your TV for ransom, unwitting cryptocurrency miners, writing email with military precision.     Cutting Room Floor   We Give Thanks
          Episode 131: #131: Send In the Clowns      Cache   Translate Page      
Cutting Room Floor We Give Thanks
  • The D&G Show Slack Clubhouse for the discussion topics!

          Episode 128: #128: State-Sponsored Cleaning Lady      Cache   Translate Page      

This week Dave and Gunnar talk about: DDoS attack on DynDNS, DDoS Coin, and a USB killstick.

ship-it

Cutting Room Floor

 

We Give Thanks

  • The D&G Show Slack Clubhouse for the discussion topics!
#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 125: #125: Third Time’s the Charm      Cache   Translate Page      

This week Dave and Gunnar talk about: DEFCON, United Airlines security case study, and a chaser of meeting hygiene.

11372329_910192372350221_1330586803_n

Cutting Room Floor

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 122: #122: You’d Better Recognize      Cache   Translate Page      

This week Dave and Gunnar talk about recognition: facial recognition, keystroke recognition, Dothraki recognition.

men-at-computers-18

Cutting Room Floor

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          #121: Open Sourcing with Open_Sourcing      Cache   Translate Page      

This week Dave and Gunnar talk with Maha Shaikh about open source, the nature of community, and life as an open source academic.

maha

Maha says:

In a nutshell my work is, firstly, around making sense of how companies choose communities, what criteria they use and how they evaluate them.

Secondly, I look in great detail into how companies are learning to find new mechanisms of control to manage organizational forms like communities where traditional forms of obligation and redress inscribed into contracts are no longer possible. This also involves how companies have forced themselves to become comfortable with ‘less’ control.

Thirdly, how we can theorize and learn from online communities like open source ones to make sense of how ‘serious work’ is carried out in rather loud online settings where many voices create a cacophony somewhat unhelpful for creative work like coding.

We Give Thanks

Maha Shaikh for being our special guest star!

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Special Guest: Maha Shaikh.
          Episode 119: #119: Who’s your dadada?      Cache   Translate Page      

This week Dave and Gunnar talk about: authentication, password management, and robot lawyers.

knitting.jpg

 

Cutting Room Floor

We Give Thanks

  • The D&G Show Slack Clubhouse for the discussion topics!
  • Kyle Petrosino for giving us new ways to turn insects into cyborgs!
#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          #116: The Vulnerability Hunter      Cache   Translate Page      

This week Dave talks with Kurt Seifried about CVE, DWF, and why Red Hat not only thinks about stuff like this, but does something about it.

Tally_marks_counting_visitors

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Special Guest: Kurt Seifried.
          Episode 115: #115: Automate Your Curmudgeonry      Cache   Translate Page      

This week Dave and Gunnar talk about kill switches, killer robots, killer apps, and killing products.

IMG_20160416_140539

Cutting Room Floor

We Give Thanks

  • The D&G Show Slack Clubhouse for the discussion topics!
#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 108: #108: A Commitment to Your Privacy      Cache   Translate Page      

This week Dave and Gunnar talk about: iPhones, politics, politics with iPhones; glibc, containers, containers with glibc; Azure, Red Hat, Azure with Red Hat.

MAIN-Ashley-Madison-mask

Cutting Room Floor

 

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 106: #106: You Can’t Patch Stupid      Cache   Translate Page      

This week Dave and Gunnar talk about: Internet of Things! How ubiquitous network-connected sensors make our lives easier and our privacy forfeit.

641A

Cutting Room Floor

We Give Thanks

    • Sandra McCann for the D&G Mailbag letter!
    • The D&G Show Slack Clubhouse for the discussion topics!
#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          #103: Please Engage with Our Brand      Cache   Translate Page      

This week Dave and Gunnar talk about partnerships: D&G + Nextgov, Red Hat + Microsoft, Marriott + Starwood, New Haven police + your stuff.

please engage with our brand

Cutting Room Floor

We Give Thanks

  • Our Inception friends at Nextgov
  • The D&G Show Slack Clubhouse for the discussion topics!
#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 99: #99: Tufte Stamp      Cache   Translate Page      

This week Dave and Gunnar talk about: Apple App Store Infection, Hacking Car Dealerships to Hack Their Cars, almost-Running Man in the UK, and the robot fuel challenge.

tuftetramp

Cutting Room Floor

 

We Give Thanks

  • Mark Hilburger for the security alert!
  • D&G Show Slack Clubhouse for the discussion topics!
#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 95: #95: Run By Horses      Cache   Translate Page      

This week Dave and Gunnar talk about: San Jose’s license-plate opportunity, AT&T’s wifi opportunity, UK government’s Oracle opportunity, and DISA’s email opportunity.

1970s PORTRAIT OF BUSINESS...512 Megabytes?

Cutting Room Floor

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 89: #89: Home Alone      Cache   Translate Page      

This week Dave and Gunnar talk about: OMB, Uber, Slack, GitHub, OpenStack, Docker, the slow-motion password Armageddon, and our favorite OpenShift customers.

The Bear at the Beach

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 84: #84: The Kill Chain      Cache   Translate Page      

This week Dave and Gunnar talk about: automated swarms, automated chefs, and automated kill chains.

remote_control_cockroach_cyborg

 

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 83: #83: Like Feral Hogs      Cache   Translate Page      

This week Dave and Gunnar talk about: airgaps, airline smell-o-vision, reproducible builds, and meeting tips revisited.

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 75: #75: Panopticon on the Shelf      Cache   Translate Page      

This week, Dave and Gunnar talk about the new mail bag, joke kit, two-factor auth, and unmanagement.

dhs-elf-on-the-shelf

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 72: #72: Everything’s broken.      Cache   Translate Page      

This week, Dave and Gunnar talk about social media, which is broken. Also, BitCoin’s broken. And passwords are broken. Forge.mil is broken. Maker culture is broken. You get the idea.

BUMBLE1

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 68: #68: Not my circus, not my monkey.      Cache   Translate Page      

This week, Dave and Gunnar talk about: computers that think, computers that think they’re thinking, and people that think computers are people.

chimp_playing_poker_smoking

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 67: #67: “Your encryption is useless, Charlie Brown”      Cache   Translate Page      

This week Dave and Gunnar talk about encrypting everything, why encryption doesn’t matter, and why we are all Charlie Brown now.

Lucy, in the role of a cloud server provider. Or telco. Or regulator. Lucy, in the role of a cloud server provider. Or telco. Or regulator.

Cutting Room Floor

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 58: #58: You Will Know Dave’s Vacation By the Trail of Destruction      Cache   Translate Page      

This week, Dave and Gunnar talk about Barthelona, Gaudi, Toledo, Detroit, the Stasi, and why cloud providers can’t have nice things.

mens-old-time-bathing-suit-costume-891159

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 44: #44: Glad to be here      Cache   Translate Page      

This week, Dave and Gunnar talk about affordances, partnerships, and a bunch of reasons Red Hat is a great place to work.

RSS Icon#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Subscribe via RSS or iTunes.

Sophisticated multi-touch interfaces in vehicles have consequences.Sophisticated multi-touch interfaces in vehicles have consequences.

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 42: #42: Topic Roulette      Cache   Translate Page      

This week, Dave and Gunnar talk about: cleaning out the attic, transparency in companies, new RHEV release, and Packing for Mars by Mary Roach.

RSS Icon#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Subscribe via RSS or iTunes.

That's Dave on the right.That’s Dave on the right.

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 38: #38: Penchant for Hyperbole      Cache   Translate Page      

This week, Dave and Gunnar talk about: watching your email, hearing your GnuPG key, the smell of fresh-baked OpenStack, a taste of ARM on Fedora, a touch of Skynet.

RSS Icon#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Subscribe via RSS or iTunes.

Hyperbole

This episode’s title is dedicated to Peter Larsen. We heard you, and welcome your feedback!

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 36: #36: “Totally on Board”      Cache   Translate Page      

This week, Dave and Gunnar talk about: Audio hacking, Nexus 5 hacking, currency hacking, OpenShift Enterprise 2.0 hacking, lake monsters, and a new segment: the Security Dog House.

RSS Icon#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Subscribe via RSS or iTunes.

Goat Man

You recently submitted a criminal background screening request to National Center for Safety Initiatives (NCSI). In order to continue with the review of your file, NCSI needs important information from you.

Please submit a physical copy of ONE of the following forms of government issued ID documents to NCSI’s Compliance Department as soon as possible:

1.) Valid Driver’s License

2.) Passport

3.) State Issued Id

You may scan the document, take a photo and upload it, or even take a photo with your cell phone and send it to us. We accept .jpg, .pdf, .doc, and .png file formats. The following are the contacts for electronic submissions:

Upload: www.ncsisafe.com

Email: compliance@ncsisafe.com

E-mail and digital upload are preferred, as the image tends to come through more clearly and we are able to complete your screen more quickly. Please keep in mind that if you do not have a scanner, digital camera, or camera phone, many libraries have a scanner that is available to the public.

If you are absolutely unable to submit your ID using any of the above methods, you may send your ID via fax to 1-(440) 542-9833. Please note that faxes can come through unclear, and faxing your ID rather than submitting electronically may cause your screening to be delayed. “If you are faxing the request please include a cover page with your name and daytime phone number. Also, if you choose to fax, please enlarge and/or brighten the image so it is clear to read. If we cannot read your ID and you do not provide your name and number, we do not know who to contact to request a clear copy.

Your background screening cannot be completed until NCSI receives the required documentation from you. To avoid further delay, your prompt response to this request is necessary and appreciated. Please allow 2-3 days receipt and processing of your document. During this time, please continue to check your status at www.ncsisafe.com

Yours in safety,

Compliance Department

National Center for Safety Initiatives (NCSI)

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 35: #35: Say My Name      Cache   Translate Page      

This week, Dave and Gunnar talk about: US Government bitcoins, skeumorphic bitcoins, TSA coin-flips, twitter drops a dime on the US government, OSS payload this Federal IT award season, our $.02 on RHEL 6.5 and Fedora 20.

RSS Icon#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Subscribe via RSS or iTunes.

redhatheisenberg

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 33: #33: Beard Phone      Cache   Translate Page      

This week, Dave and Gunnar talk about badBIOS and unreliable narrators, 85% of Android is crap, warrant canaries, and special guest star Adam Clater talking about OpenShift and ownCloud

RSS Icon#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Subscribe via RSS or iTunes.

beards

Cutting Room Floor

We Give Thanks

  • Adam Clater for guest starring!
  • Gunnar’s mom for teaching us about warrant canaries
#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 31: #31: Pizza Hat      Cache   Translate Page      

This week, Dave and Gunnar talk about: turning people into products, patches into pounds and pence, protecting poultry, priorities, primary patchers on projects, and PDFs into poison.

RSS Icon#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Subscribe via RSS or iTunes.

How do you say "infringement" in Farsi?How do you say “infringement” in Farsi?