Next Page: 10000

          Serialul HBO care ar face Timișoara o destinație turistică dorită de străini      Cache   Translate Page      

A dat norocul peste Timișoara. Pe lângă titlul de Capitală Culturală Europeană, aceasta va mai avea încă un motiv de laudă. Va fi promovată prin asociere cu serialul Hackerville de pe HBO. HBO Europe a realizat coproducţia internaţională Hackerville, care a început să fie difuzat de HBO de pe 4 noiembrie. Thriller-ul are un scenariu […]

The post Serialul HBO care ar face Timișoara o destinație turistică dorită de străini appeared first on IMPACT.

          'Almost all' Pakistani banks hacked in security breach, says FIA cybercrime head       Cache   Translate Page      

In a shocking revelation, the head of the Federal Investigation Agency’s (FIA) cybercrime wing has said data from "almost all" Pakistani banks was stolen in a recent security breach.

"According to a recent report we have received, data from almost all Pakistani banks has been reportedly hacked," FIA Cybercrimes Director retired Capt Mohammad Shoaib told Geo News on Tuesday.

When pressed to clarify, the official said data from "most of the banks" operating in the country had been compromised.

Speaking to DawnNewsTV, Shoaib said hackers based outside Pakistan had breached the security systems of several local banks. "The hackers have stolen large amounts of money from people's accounts," he added.

"The recent attack on banks has made it quite clear that there is a need for improvement in the security system of our banks," he observed.

He said the FIA has written to all banks, and a meeting of the banks' heads and security managements is being called. The meeting will look into ways the security infrastructure of banks can be bolstered.

"Banks are the custodians of the money people have stored in them," Shoaib said. "They are also responsible if their security features are so weak that they result in pilferage."

It wasn't immediately clear when exactly the security breach took place.

According to Shoaib, more than 100 cases are being investigated by the agency in connection with the breach.

"An element of banking fraud which is a cause of concern is that banks hide the theft [that involves them]... and the clients report [the theft] to the banks and not to us, resulting in a loss of people's money," he told DawnNewsTV.

"We are trying to play a proactive role in preventing bank pilferage," he added.

Shoaib said the agency has arrested many gangs involved in cybercrimes and recovered stolen money from them.

A gang was arrested last week whose members used to disguise themselves as army officials and withdraw money from banks after gathering people's data, the official added.

'Data of over 8,000 account holders sold'

The disclosure comes days after around 10 banks blocked all international transactions on their cards, as concerns about a breach of credit and debit card data spread in the banking circles.

Sources told Dawn the State Bank of Pakistan (SBP) has been informed by several commercial banks that they have blocked international payments on debit and credit cards as a precautionary measure after cyber attacks on their clients’ accounts.

According to a digital security website, data of over 8,000 account holders of about 10 Pakistani banks was sold in a market of hackers.

A large Pakistani bank sent messages to its clients that online mobile banking services would be terminated for a temporary period from November 3 onwards on ‘technical grounds’.

The first cyber attack was reported by BankIslami on October 27. The bank said that Rs2.6 million was stolen from international payment cards after which it has stopped such transactions and allowed biometrically verified payments only on ATM cards within Pakistan.

Next day, the SBP issued directives to all banks to ensure that security measures on all information technology systems — including those related to card operations — are continuously updated to meet future challenges, ensure real-time monitoring of card operations related systems and transactions and immediately coordinate with all the integrated payment schemes, switch operators and media service providers.

          Stop worrying about the period in your Gmail address — Google says it doesn't matter (GOOG, GOOGL)      Cache   Translate Page      

Google Pixel 2 XL

  • Google ignores the periods in your email address.
  • That means and are the same email address.
  • You can use this trick to filter out spammers and companies that sell your email address.

My personal email address is my name at Most of the time, it looks like this:

But if I end up giving you, don't worry. I'll still get the email.

In fact, if you're a Gmail user, the periods in your email address don't matter at all. Gmail completely ignores them. You can add or remove as many periods as you'd like. 

Here's how Google explains it on a help page

If someone accidentally adds dots to your address when emailing you, you'll still get that email. For example, if your email is, you own all dotted versions of your address:

Gmail is one of the few services in which the dot doesn't make any difference in your username. Slate writer Will Oremus previously found that Facebook doesn't care about username dots, either, but nearly every other online services does. 

Also, if your workplace uses Gmail, that doesn't mean you can stick periods in your work email — it only applies to addresses. 

A secret spam address 

Gmail Smart ReplyWhile periods in Gmail usernames can be a fun quirk, they can also be a useful way to sort your inbox and filter what lands there.

Because the dots effectively give you scores of alternate email addresses, you can pick one and make it a defacto spam folder.

For example, if everyone emails me at, that should remain my main email address. But every time I'm giving my address to someone who might spam me, I give them

Then, in my gmail, I can create a folder for all mail sent to, and automatically star, or archive, or delete those notes. You can also use extra periods to sign up for a second account on a website without creating or using a new email address. 

This trick also works with the + symbol, which can be used in any email address to create even more alternative addresses. "For example, if your name was, you could send mail to or," Google explains on a help page.

"You can also use this when you register for a service and think they might share your information. For example, I added "+donation" when I gave money to a political organization once, and now when I see emails from other groups to that address, I know how they got it. Solution: filtered to auto-delete," Google continued

So while you don't have to stop telling people about the period in your email address, you should be aware of the superpowers it gives your Gmail account. 

Join the conversation about this story »

NOW WATCH: A cybersecurity expert showed us how hackers can tap into an office phone and listen to everything you're saying

          Do you wonder how many dead democrats will vote in this election?? Especially Georgia??? (3 replies)      Cache   Translate Page

It's guaranteed! DNC computer hackers are hard at work upon this day!! We can only hope that they get caught with voter fraud. Anyway, get out and vote for FREEDOM! Our grand childrens future depends upon you. God bless you all, and pray that we will have a victorious day.


          Comment on 5 Ways to Improve Your Credit Score After a Foreclosure by Denny Martin      Cache   Translate Page      
I never been in Texas ever and I was in jail from 2013 to 2015 and this show I got charged for stuff in Texas between 2016 and 2017 I don’t understand and i'm also going through credit cards issue which stop me from getting loan. HMM... I also contact lot of companies about my credit account and I have not authorized them, lowering my score which make me worried often.I decided to google search for private hacker and i came across DARK WEB hacker. I contact him about the charged stuff and my credit cards issues with faith and he told me to wait for 5 working days. Guys i was surprise when the hack increase my credit score to 790+ and clear off the charge stuff i was told i have in TEXAS without a trace by the US Government. Contact him right now so you can also benefit from him. Darkwebcyberservice at gmail dot com
          The OPM hack explained: Bad security practices meet China's Captain America      Cache   Translate Page      

In April of 2015, IT staffers within the United States Office of Personnel Management (OPM), the agency that manages the government's civilian workforce, discovered that some of its personnel files had been hacked. Among the sensitive data that was exfiltrated were millions of SF-86 forms, which contain extremely personal information gathered in background checks for people seeking government security clearances, along with records of millions of people's fingerprints. The OPM breach led to a Congressional investigation and the resignation of top OPM executives, and its full implications—for national security, and for the privacy of those whose records were stolen—are still not entirely clear.

To read this article in full, please click here

          Information Warfare and Security Flaws: Why the American Voting System Is Still at Serious Risk      Cache   Translate Page      
As this election’s results come back, they will reveal whether the misinformation and propaganda campaigns conducted alongside the political ones were effective.

As the 2018 midterms proceed, there are still significant risks to the integrity of the voting system – and information warfare continues to try to influence the American public’s choices when they cast their ballots.

On the day of the election, there were a number of early hitches in voting at individual polling places, such as polling places opening late and vote-counting machines not plugged in. But there seem not – at least not yet – to be major problems across the country.

However, not all the election-related news and information voters have been encountering in recent days and weeks is accurate, and some of it is deliberately misleading. As this election’s results come back, they will reveal whether the misinformation and propaganda campaigns conducted alongside the political ones were effective.

Securing election systems

America’s electoral process remains highly fragmented, because of the country’s cherished tradition of decentralized government and local control. While this may leave some individual communities’ voting equipment potentially vulnerable to attack, the nation’s voting process overall may be more trustworthy as a result of this fragmentation. With no unified government agency or office to provide, administer and protect election technologies, there’s not one central national element that could fail or be attacked.

Across the country, though, many districts’ voters will cast ballots with the help of machines that have long-standing security concerns. Fortunately, 45 states keep a paper record of each vote cast – whether for fear of threats to voting integrity or just budget constraints preventing purchase of newer gear. But that means five states – Louisiana, Georgia, South Carolina, New Jersey and Delaware – don’t keep paper records of their voters’ choices.

Voting machine vendors have been reluctant to appear before Congress to explain their systems’ security practices – and shortcomings. However, federal agencies have helped some states reduce the likelihood of voting machines being hacked or physically tampered with.

Beyond voting machines

Election security is about much more than voting machines and vote-counting systems, though they are the most visible technologies at work on Election Day. State systems that track voter registrations, or allow users to register online, are enticing targets for hackers, too. Security firm Carbon Black reported that 81 million voter records from 20 states are available in online forums. This data, obtained by hacking various official and corporate databases, could be used to facilitate voter fraud or sow confusion at polling places on Election Day: How would you feel if you were told that someone using your name and address had already voted?

There are security concerns even in states like Oregon, where everyone votes on paper and mails in their ballots in advance of Election Day. That state’s election officials were targeted by hackers seeking to gain access to state email and database systems. With that access, attackers might be able to digitally impersonate a government official to send false or confusing emails, press releases or other notifications to citizens, journalists or poll workers.

Also at risk are public-facing official websites that carry election information. Merely changing the reported location of polling places or voting hours could prevent some people from voting. Also vulnerable are states’ methods of announcing preliminary election results. At a major internet security conference in August, children were able to compromise replicas of several states’ election-reporting systems. The most remarkable was that in just 10 minutes, an 11-year-old boy cracked the security on a copy of the Florida secretary of state’s website and was able to change the publicly announced vote totals for candidates. That could be enough to cast doubt on whatever was later reported as the official results – and the integrity of the system itself.

Managing information on social media

A more difficult threat to defend against is information warfare, which doesn’t attack voting machines or election officials’ computers. Rather, it targets voters’ perceptions and decisions, seeking to influence how they vote.

Long before the 2016 U.S. presidential election, information warfare was influencing elections around the world, including in Ukraine, Myanmar and Egypt. But after 2016, Facebook and Twitter came under intense scrutiny for their role in providing digital environments that facilitated the spread of misinformation to sow discontent, and special counsel Robert Mueller began investigating Russians’ influence efforts.

In the run-up to the 2018 midterms, Russians and others were still hard at work trying to influence Americans to vote in ways that help foreign interests. In October, the U.S. Department of Justice charged a Russian woman with creating thousands of fake social media accounts allegedly representing American citizens to “create and amplify divisive social media and political content” before the election.

This year, though, unlike two years ago, social media companies are taking action. Twitter and Facebook have both deleted thousands of accounts they identified as engaging in propaganda and influence-peddling. And they have made other efforts to identify and fight falsehoods on their platforms, too.

Nevertheless, online misinformation continues to thrive. More than 80 percent of the Twitter accounts that often shared links to false and misleading information in 2016 are still active today. And the amount of online misinformation is higher than it was two years ago.

Investigating alleged wrongdoing

U.S. intelligence and police agencies are concerned about the potential effects of misinformation on the American electorate. But large proportions of the country don’t trust those organizations to be politically independent. It doesn’t help that the White House continues to claim, without evidence, that voter fraud is a significant problem.

Mainstream news organizations can find themselves under scrutiny too, either for reporting falsehoods that appear to gain traction online or for failing to filter out or properly identify inaccurate information for their readers.

Looking ahead

Protecting democracy is a huge challenge. I’ve written before that it involves more than technical solutions to computer problems. The U.S. government, and the people it serves, must find the desire and the drive to establish secure and trustworthy procedures for running elections across the country. Education is also key, teaching people from an early age how to recognize propaganda and misinformation, and think critically about the information they encounter. Facts are not subject to alternative views; without widespread agreement on common objective realities, society and government cannot function well.

Technology continues to evolve, presenting challenges to individuals and society alike. Emerging “deepfake” technology is already helping create convincing videos of people appearing to say and do things they never said or did. In addition, intelligent social media bots are becoming more human-like, making identifying and blocking them much more difficult. That’s just some of the challenges that democracies will face in the future.

Many of these problems will not have a clearly defined fix, because they involve a nuanced balancing of individual rights and social necessities. Real and lasting solutions must come from civil discourse by rational and objectively informed people who have, above all, the actual honest desire to do it right.

Richard Forno, Senior Lecturer, Cybersecurity & Internet Researcher, University of Maryland, Baltimore County

This article is republished from The Conversation under a Creative Commons license. Read the original article.


Related Stories

          Kotaku Blizzard Explains Why Overwatch Still Doesn’t Have A Black Woman Hero | io9 A Truly Ridiculou      Cache   Translate Page      

Kotaku Blizzard Explains Why Overwatch Still Doesn’t Have A Black Woman Hero | io9 A Truly Ridiculous Rumor About Matt Smith’s Role in Star Wars: Episode IX | Jalopnik The Weird Reason Subaru SVX Owners Keep Getting the Wrong Windshields | Vitals Track Your Sleep With the Apple Watch | The Takeout Ask The Salty…


          Election Eve Wrangle      Cache   Translate Page      
Whatever happened to 'vote your hopes and dreams'?

There will be a blue wave, unless there isn't.  The red firewall will break the azure tsunami, unless Trump's hate spew has punched suburban holes in it.  The US House flips (but maybe not), and the Senate stays in Mitch McConnell's terrapin-like appendages, except maybe for a systematic polling error, a la 2016.

No wonder Team Donkey is experiencing some cognitive dissonance.

Who, or what, gets the blame if the Ds can't get it done tomorrow?  Voter suppression, from Georgia to North Dakota to Texas college campuses like Prairie View A&M and Texas State?  Voting machines flipping straight-ticket votes (to Ted Cruz?)  There will still be plenty of finger-pointing at Russian hackers and Green candidates, I feel certain.  Even if some dropped out of their race and endorsed the Democrat.

[The old Catch-22: "Greens should run in state and local races and build up to presidential races" instead of playing spoiler (sic) every four years.  "Greens should drop out and endorse Democrats because this is the most important election of our lifetime".  You know, since the one two years ago.  That was their fault Democrats lost.  Blah blah.]

There may be some less nefarious, more legitimate reasons the election will be won -- or lost; for example, the strength of women voters.  Notable for the demographers, moderate Republican women who live in suburban America turning out to cast their ballots against Trump and the GOP.  No, wait; it's the youth vote.  That's it *snaps fingers*, the children are our future.  Either is better than blaming the Latinxs, after all.  We're all tired of hearing that.

Hold on a minute: this is a midterm election, and Texas Democrats who haven't elected one of theirs since, you know, Jim Hightower was Ag Commissioner always lose because they can't raise any money for consultants, advisers, pollsters, etc.  Except they did, a shitpot full of dough, in 2018 -- at least those running for Congress; not so much the statewides save Congressman SuperBeto, whose massive Bernie-like ATM machine reversed both the prevailing Texas narrative and the cash flow, doubling the take of Senator Serpent Covered in Vaseline.

The Cult of RFO'R aims for the upset tomorrow evening.  Rumor has it happening.

So as President Shitler is fond of saying: we'll see what happens.  I'm ready it to be over; how about you?  Here's your roundup of lefty blog posts and news from the final week before E-Day.


One unplumbed premise that the midterms might reveal is whether the strength of the Lone Star grassroots has shifted from one major party to the other, either because of 'outsiders' becoming 'insiders' or because there needs to be a "bad guy" to focus on and motivate the base.

Jim Henson, director of the Texas Politics Project at the University of Texas at Austin, says Democrats nationally — and in some parts of Texas — have unleashed the kind of intensity we used to see from the tea party.

“So the question of whether there is still that ability to motivate Republican voters on the other side is the big question going into this cycle,” Henson said.

Henson believes one reason the tea party’s galvanizing force has slipped in local and congressional races is that conservatives no longer have Barack Obama to target. And Donald Trump has taken over the role of chief agitator of conservatives.

Tea party-backed candidates have also been elected. In Texas, the movement has been changed by that success.

“I think once you have people who are part of institutions, it inevitably looks different, because you aren’t banging from the outside,” Henson said. “Like it or not, you are part of the status quo, and you are part of the establishment.”

Perhaps the only competitive statewide contest down the ballot shows signs of GOP panic, as indicted felon/AG Ken Paxton digs in to the deepest pockets of the friends he has left.

In addition to the TV ads, Paxton’s recent campaign finance filings have indicated that Republicans in high places are tuned in to the race in its home stretch. In recent days, the attorney general has received a $282,000 in-kind donation from Gov. Greg Abbott’s campaign; more than $350,000 in in-kind contributions from Texas for Lawsuit Reform, the political arm of the tort reform group; and $10,000 each from two of the biggest donors in the Republican Party: Sheldon and Miriam Adelson.

Millard Fillmore's Bathtub linked to a picture of Sweaty Beto, which may have been the Halloween costume of the year.

Stirred by Trump's call, armed militia groups head south to welcome the tired, poor, huddled masses yearning to breathe free intercept the invading (sic) migrant caravan.

Asked whether his group planned to deploy with weapons, McGauley laughed. “This is Texas, man,” he said.

Off the Kuff examined a pair of statewide judicial races.

In Harris County, the Texas Observer foresees a day of reckoning for Republican judges who have held fast to the money bail system, rewarding their friends and penalizing the poor.

Isiah Carey of Fox26 was first with the news that Houston mayor Sylvester Turner's first announced challenger next year will be former Democrat*, now (?) not-Trump Republican, non-DWI-convict and megawealthy trial lawyer -- Rick Perry's defense attorney, for those catching up -- Tony Buzbee.  *Lookie here, from Texpatriate:

(D)espite being the one-time Chairman of the Galveston County Democratic Party, a two-time Democrat nominee for the State Legislature and the once rumored Democratic candidate for Lieutenant Governor. However, of late, Buzbee has been appointed to the Board of Regents of his alma matter, Texas A&M University, and become a key financial supporter of both Perry and (Gov. Greg) Abbott.

Durrel Douglas at Houston Justice blogged the 2019 Houston City Council District B early line.  And in an excellent explainer, described how the local activist/consultant game -- getting paid to do politics, that is -- is a lot like having the app on your phone for the jukebox down at the local bar.

Socratic Gadfly, returning from a recent vacation, took a look at a major nature and environment issue that fired up up opposition to Trump — the Bears Ears downsizing — and offered his thoughts on the value of the original national monument site versus critics of several angles, and things that could make it even better.

Therese Odell at Foolish Watcher also leavens the politics with some Game of Thrones news.

And Harry Hamid's midnight tale from last week moves ahead to 1 a.m. (with no accounting for Daylight Savings Time and 'falling back' noted).

          Hackers seed StatCounter with nasty JavaScript in elaborate bitcoin theft scheme      Cache   Translate Page exchange believed to be target of embedded attack

One of the top traffic metrics sites on the internet is reportedly being used by criminals to steal bitcoins from a currency exchange.…

          LinkedIn se convierte en la nueva plataforma de phishing y así puedes evitarlo      Cache   Translate Page      

Hackers aprovechan el auge mundial de LinkedIn para lanzar ataques de phishing. ¿Cómo defenderte? Así lo podrás lograr.

          Credit Card Identity Theft Protection - Stop Credit Identity Theft From Happening To You       Cache   Translate Page      

In this age of digital communications where e-commerce sales are reporting unprecedented growth with every passing year, the importance of credit card identity theft protection has also increased substantially. Most of the cases reported for stolen identities are related to credit card identity theft. Financial criminals, online scammers, and professional hackers habitually break into the databases of online stores, e-commerce websites and even servers of large hospitality chains to get crucial Read More..
          This $59 Balance Ball Chair Will Work Out Your Core While You Work      Cache   Translate Page      

A finalist in our inexpensive office chair co-op, the Gaiam balance ball chair has a rare discount to under $60 today. This chair can help improve your core strength and balance, and stop you slouching, all while you’re sitting at your desk.


          The Lonely Hacker скачать 2.9 на Android      Cache   Translate Page      
Увлекательная игра где вы будете выступать в роли хакера.
          K–12 IT Leaders Can Mitigate Cybersecurity Risks Through User Training      Cache   Translate Page      
K–12 IT Leaders Can Mitigate Cybersecurity Risks Through User Training eli.zimmerman_9856 Tue, 11/06/2018 - 11:37

IT professionals in every K–12 school district likely grapple with one major security weakness: people.

Hackers can send malware and phishing emails, but users need to be trained how to recognize and report them — and not click. 

Forty-six percent of organizations experienced a serious data breach, according to “The Cybersecurity Insight Report” by CDW

CDW’s report notes “employees need to know what to do when faced with a threat. They also need to know how to take preventive measures to prevent malware.” Districts can take several steps to elevate the cybersecurity conversation and keep bad actors away from critical data.

One of those critical steps is making users aware of how to spot possible hacks. This should be an essential component of any training module moving forward.

Students should be taught how to become better digital citizens in order to help schools avoid data breaches. Begin by teaching them about privacy concerns and how to manage their digital identities. A good place to start is the International Society for Technology in Education’s Standards for Students. There are similar standards for educators and education leaders

MORE FROM EDTECH: Check out how schools are training students to be the next batch of cybersecurity professionals!

Time Equals Money Lost in Data Breaches

Besides the time lost when a cyberattack happens, there’s also a financial incentive to train users to steer clear of suspicious looking emails.

The Education Department announced recently it would strip any K–12 school district of Title IV funding if it did not adhere to “reasonable methods” to protect student data.

Staff should prepare for this possibility by planning and testing recovery strategies well in advance, since schools aren’t exempt from the risk of an attack.

Right now, according to the CDW report, just 30 percent of IT professionals are extremely confident their processes and people can stave off cyberattacks. The report also found that only 34 percent of IT pros are extremely confident their technology resources could mitigate risks over the next year. 

Schools should scan their networks for vulnerabilities. The CDW report shows that organizations improve their security posture with network access controls, security assessment tools and supplementary email security.

Cybersecurity professionals can choose between penetration tests and vulnerability scans

“The knowledge gained during these tests points out weaknesses that could be exploited by a real hacker and provides a roadmap for security remediation,” says Mike Chapple in a recent EdTech article

Cybersecurity Is an Ongoing Exercise in Schools

Data security should be an ongoing exercise in schools. Linnette Attai, project manager for Consortium for School Networking’s privacy initiative and Trusted Learning Environment program, told EdTech there’s no one-time, fix-all solution in risk mitigation.

Data governance policies are key, she says.

“People need training and guidance,” says Attai. “We can’t expect them to be able to understand what we mean when we say, ‘protect the privacy and security of data’ without giving them instructions on how to do that well.”

This article is part of the "Connect IT: Bridging the Gap Between Education and Technology" series. Please join the discussion on Twitter by using the #ConnectIT hashtag.


[title]Connect IT: Bridging the Gap Between Education and Technology

Wendy Jones is a K–12 Education Strategist for CDW•G.

          BMC gives ex-mayoral bungalow to Bal Thackeray Memorial Trust      Cache   Translate Page      
          Hackers Attempt to Sell Details from 120M Facebook Accounts      Cache   Translate Page      
Facebook Account Details for Sale on Dark Web – But Facebook Denies Breach Hold on…if account details are for sale, who else could have leaked them other than Facebook?  Considering how interconnected everything is, it’s entirely possible a third-party application suffered a breach or even a browser extension.  The exact route that leaked the data remains unknown, but the […]
          The 10 Best Deals of November 6, 2018      Cache   Translate Page      

We see a lot of deals around the web over on Kinja Deals, but these were our ten favorites today.


          Why Democrats Didn't Campaign More on Net Neutrality      Cache   Translate Page      

As Americans line up to vote on Tuesday, some of net neutrality’s most vocal defenders remain confident that the issue will be a determining factor in the 2018 midterm elections. Privately, however, some Democrats have expressed doubt that the battle over the ‘net is key to regaining control of Congress—even as…


          11/4/2018: Your Work: WORK HACKS Podcasts for productivity      Cache   Translate Page      

Raise the bar FANS of the website Lifehacker will enjoy its podcast — The Upgrade — which promises to help you improve your life, one day at a time. Presented by Melissa Kirsch and Alice Bradley, it’s not work-specific, but often covers topics such as...
          Election Day 2018: How to get free food, coffee, bike rides and more -      Cache   Translate Page

Election Day 2018: How to get free food, coffee, bike rides and more
The only thing more American than voting is free stuff, right? Well, you can combine the two on Tuesday as countless food chains and ride-share applications offer free and discounted goods to celebrate Election Day. Check out where you can eat for free ...
How to Get Free Stuff Today With Your 'I Voted' StickerLifehacker
Here is the free and discounted stuff you can get on Election DayMarketWatch
These chains are offering freebies and deals on Election DayBusiness Insider
Deseret News -New York Times
all 196 news articles »

          Ethical Hacker      Cache   Translate Page      
Introductie: Voor een grote organisatie ben ik op zoek naar een zeer ervaren Ethical Hacker. Organisatie: Je zal gaan werken bij een grote organisatie die opereert in alle niches wat betreft informatie beveiliging. Het team zal bestaan uit 15 professionals. Een mooi bedrijf met alle faciliteiten van dien is op zoek naar een Senior Ethical Hacker...
          Hardware tokens are used by folks serious about avoiding hackers      Cache   Translate Page      
hardware token

(TECH) Hardware tokens have been around for a while, but people most serious about avoiding hackers swear by them.

The post Hardware tokens are used by folks serious about avoiding hackers appeared first on The American Genius.

          Miss Cellania's Links      Cache   Translate Page      
Rick Grimes’s Plans on The Walking Dead, Ranked in Terms of Stupidity. The luckiest man alive made it through eight and a fraction seasons. 

An explanation of Eliminationism. "Donald Trump is now our Eliminationist in Chief."

Breaking Down the Three New Tiers of Economy Fares. Three US airlines (American, Delta, and United) are splitting their Economy class flights into three sub-sections, with different levels of misery for those trying to fly for the least money.

Ducks singing on their way to work.

The art collective Dorothy has constructed a map of the U.S. labeled with nothing but song titles! And in case you'd like to hear those songs, there's a Spotify playlist for that. (via Nag on the Lake)

White supremacists and other far-right extremists have killed far more people since Sept. 11, 2001, than any other category of domestic extremist. 

The Brave Cats of War. They were really popular with the press in World War I. (via Strange Company)

The Legend of Bill Pierce: Arizona's newest political outsider. His campaign started as a joke, then became a meme, but he's perfect for the job.

Why Do Racehorses Have Such Weird Names?

The 50 Greatest Movie Dance Scenes of All Time. Whether or not you agree with their picks or their rankings, you'll enjoy watching at least some of the 49 accompanying videos.

A blast from the past (2014): 9 Cats With Cushy Jobs.
          Διορθώστε εύκολα το BSOD σφάλμα στα Windows 10      Cache   Translate Page      
Οι Windows 10 χρήστες έχουν συνηθίσει σε BSOD λόγω της ποιότητας των ενημερώσεων του λειτουργικού συστήματος.
Ανεξάρτητα από το αν προκαλούνται από ενημερώσεις λειτουργιών OS ή αθροιστικές ενημερώσεις, αυτές οι αποτυχίες του συστήματος υπενθυμίζουν τις παλιές ημέρες όταν οι υπολογιστές κράσαραν περιστασιακά λόγω κακών drivers, χαμηλής αξιοπιστίας λειτουργικού συστήματος ή ασυμβίβαστων εφαρμογών.
Για να είμαστε ειλικρινείς, αυτοί είναι σχεδόν οι λόγοι που προκαλούν BSODs και τώρα, με μόνη -βασική- διαφορά ότι μπορούν να αποφευχθούν αν η Microsoft έκανε σωστές δοκιμές πριν κυκλοφορήσει τα νέα της updates.
Ας πάρουμε για παράδειγμα το Windows 10 έκδοση 1809. Αφού δέχτηκε αρκετούς ελέγχους ως μέρος του προγράμματος Windows Insider για αρκετούς μήνες, η ενημερωμένη έκδοση OS δημοσιεύθηκε και λίγες μέρες αργότερα διακόπηκε εξαιτίας ενός σημαντικού σφάλματος κατάργησης δεδομένων. Η έκδοση 1809 προκάλεσε επίσης BSOD και άλλα ζητήματα που επηρεάζουν την αξιοπιστία του συστήματος.
Επομένως, είναι πολύ σημαντικό να γνωρίζουμε τρόπους αντιμετώπισης των BSODs σφαλμάτων. Το πρώτο πράγμα που πρέπει να κάνετε είναι να απενεργοποιήσετε την αυτόματη επανεκκίνηση. Με αυτό τον τρόπο θα μπορέσετε να σημειώσετε το bugcheck code και να αναζητήσετε online για περισσότερες πληροφορίες.
Οι τεχνικά καταρτισμένοι χρήστες θα πρέπει να είναι σε θέση να βρουν την αιτία ενός BSOD με μια αναζήτηση Google, καθώς ο εν λόγω κώδικας παρέχει πολλές λεπτομέρειες σχετικά με το τι ακριβώς προκάλεσε το κρασάρισμα. Οι αρχάριοι, από την άλλη πλευρά, μπορούν να χρησιμοποιήσουν την ακόλουθη πλήρως αυτόματη λύση.
Οι εκδόσεις των Windows 10 πριν από την έκδοση 1809 έρχονται με ένα ενσωματωμένο εργαλείο αντιμετώπισης προβλημάτων Blue Screen, το οποίο σαρώνει αυτόματα το σύστημα για τη συλλογή πληροφοριών σχετικά με το κρασάρισμα και την επίλυση του προβλήματος. Μπορείτε να βρείτε το εργαλείο στην ακόλουθη τοποθεσία:
Settings > Update & security > Troubleshoot > Find and fix other problems > Blue Screen
Κάντε κλικ στην επιλογή Run του εργαλείου και, στη συνέχεια, ακολουθήστε τις οδηγίες στην οθόνη για να ολοκληρώσετε τη διαδικασία. Θα ακολουθήσει μια διαδικασία σάρωσης που υποτίθεται ότι θα εντοπίσει το πρόβλημα στο σύστημά σας και θα σας δώσει μια λύση, αν και οφείλουμε να αναφέρουμε οτι σε ορισμένες περιπτώσεις αυτό δεν είναι πάντα αποτελεσματικό. secnews

          Kotaku Current And Former Employees Sue Riot Games For Gender Discrimination | Jalopnik Toyota Is Ma      Cache   Translate Page      

Kotaku Current And Former Employees Sue Riot Games For Gender Discrimination | Jalopnik Toyota Is Making So Much Money It Can Do Nothing But Slash Your Choice Of Cars | Gizmodo How to Watch the Midterm Election Coverage Live on YouTube, Facebook, VR, and More | Lifehacker How to Improve Your Dungeons & Dragons Game,…


          Fede Alvarez on reinventing the series for The Girl in the Spider's Web      Cache   Translate Page      
Lisbeth Salander will be returning the big-screen this Friday with yet another actress stepping into the role. The young computer hacker was first brought to life by Noomi Rapace in THE GIRL WITH THE DRAGON TATTOO, who reprised the character for THE GIRL WHO PLAYED WITH FIRE and THE GIRL WHO KICKED THE HORNETS' NEST, followed by Rooney Mara taking over for David Fincher's… Read More...
          Link to Freedom to Tinker      Cache   Translate Page      
Freedom to Tinker Freedom to Tinker
With elections on our minds (vote Tuesday!) here's Ed Felton describing a new voting system called E2E-V. I'm not sure I get the nuances of the coin-flip challenge voters but it sounds like a much better system than our current black-box, insecure, privately owned machines. And of course my favorite system is Oregon's statewide mail-in system. I'm sure it's not as secure as end-to-end verifiable cryptography but I think the convenience and ease of understanding how it works means more people participate.

          The Scroll of Akbar Khan +1DMW by Mad Hacker's Incorporated & Hokuto Force (2018)      Cache   Translate Page      
Released by: Mad Hacker's Incorporated & Hokuto Force
Release date: 6 November 2018
Type: C64 Crack
Download | Discuss
The Scroll of Akbar Khan +1DMW
          Hackers atacam novamente sistemas da FIFA; Entidade teme vazamento de dados      Cache   Translate Page      
Campanha de phishing é a principal causa suspeita do hack que ocorreu em março, meses depois de a entidade ter sido vítima de outro grande ataque cibernético
          Let’s make elections about the issues, not “spoiler” hacks      Cache   Translate Page      

On the eve of the 2018 midterm elections, the issue of “spoilers” and third-party and independent candidates is front and center in several of most high-profile elections, even as Maine is showcasing the best solution: ranked choice voting.

President Donald Trump brought attention to how the major parties can manipulate voters through use and abuse of the role of third-party candidates. On Saturday, the president tweeted that allies of incumbent Democratic Sen. Joe Donnelly have been seeking to elevate the Libertarian Party candidate as more conservative than the Republican nominee for U.S. Senate:

Rumor has it that Senator Joe Donnelly of Indiana is paying for Facebook ads for his so-called opponent on the libertarian ticket. Donnelly is trying to steal the election? Isn’t that what Russia did!?

The Indiana Democratic Party indeed has issued ads that compare Republican Mike Braun and Libertarian nominee Lucy Brenton - not because they want Brenton to win, of course, but because they know that conservative votes for Brenton are votes not being cast for Braun.

Both parties engage in such tactics regularly, with controversies this year including the staff of a Republican congressman in Virginia collecting fraudulent signatures in an effort to help a former Democratic congressional nominee get on the ballot as an an independent. As Trump points out, Russian hackers of our elections in 2016 engaged in the same tactic in the presidential race, which former Republican congressman John Porter and I explained in an op-ed earlier this year.

More generally, third parties and independents are under attack across the nation for “spoiling” elections, as detailed last month by FairVote intern Ryan Joy. Notably, the past month has seen a run of prominent independents and third parties dropping out to avoid dividing a potential majority vote. Dropouts include the incumbent independent governor of Alaska Bill Walker and candidates running in major statewide races in Arizona, Maine, Oregon and - at least for one day - Michigan. In Georgia, votes for Libertarian nominees in elections for governor and secretary of state may trigger a December runoff election, as Georgia seeks to uphold majority rule.

Congressman Porter and I turn to a better way to secure our elections and put voters first:  ranked choice voting (RCV). Already used in 11 cities, with five additional cities recently enacting it for their next elections, RCV is being showcased this year in Maine in multi-candidate races for U.S. Senate and U.S. House for the first time in American history. Grounded in the editors’ experience with RCV in mayoral elections in Portland and the statewide primaries in June, this editorial in the Maine’s largest paper, The Portland Press Herald, about the withdrawal of independent gubernatorial candidate Alan Caron makes a compelling contrast between our usual single-choice, “top-of-the-heap” plurality system with ranked choice voting:

Caron came into the race with decades looking at Maine’s economic history and formulating ideas about what could make it grow now. But for most of the race, the first question he was asked was how he would navigate the spoiler question….. How different would this race have been if ranked-choice voting had been in play? Instead of asking him to drop out, people might have asked him about his plan to make the state energy independent by 2030, or two free years of higher ed for students who live in Maine for 10 years. Instead of focusing on how to prevent the worst possible outcome from the election, voters could have thought about what the best outcome could look like. That doesn’t mean that candidates like Caron would win, but they would at least have a chance to make their case.

Next Tuesday, Mainers will be able to compare the two voting systems. They will be able to rank preferences in the multi-candidate races for U.S. Senate and Congress but not in the three-way race for governor. Any of them who did not fill out a ranked-choice ballot in the June primary will get a chance to decide what’s more confusing: Marking a ballot that indicates a first and second choice, or trying to handicap a multi-candidate race, figuring out who’s a legitimate contender and who’s a spoiler.

In his news conference Monday, Caron said that he would work to pass a constitutional amendment to permit ranked-choice voting in state races. That remains the best way to address this problem.

FairVote’s senior fellow David Daley foreshadowed this editorial in his recent excellent analysis for the journal Democracy:

“[Ranked choice voting] is not a partisan reform. There will be times when it might help Democrats, or aid Republicans, or boost independents. This is a reform for voters, and a reform that incentivizes politicians to campaign and govern beyond their bases. RCV is the most significant reform we could enact to give voters more meaningful choices and ensure winners with true majority support. Candidates shouldn’t be dropping out, and offering voters fewer choices, just when most voters are beginning to pay attention. Likewise, there’s no need for voters to spend late October obsessing with polls and fretting a spoiler vote, or having to return a second time to the polls in November. The solution is as easy as 1, 2, 3.”

Let’s do what’s best for voters - and best for upholding the integrity of our elections - and avoiding electoral tactics based on undercutting representative democracy. Let’s enact ranked choice voting across our federal and state elections.

Illustration by Mikhaila Markham 

          Comment on How to Open a Frequent Flyer Account for Your Child by How To Survive A Long Flight With Kids | Lifehacker Australia      Cache   Translate Page      
[…] flyer accounts as well. Note this might be difficult to do online, depending on the program, but here’s some information on how to hack the different carrier’s online forms. And some carriers let you pool points, which […]
          Easy Handle Leak Detection Without A Debugger      Cache   Translate Page      

Originally posted on:

Finding handle leaks in all processes at once for all handle types without a debugger is no longer impossible. Since Windows 8.1 (0?) each handle creation and close call is instrumented with an ETW event. You only need to turn it on, execute your use case for some minutes or hours if you really need to and then stop the recording.

To start full handle tracing you need to install the Windows Performance Toolkit from the Windows 10 SDK or WDK. Then enter in an Administrator shell

  • wpr -start Handle
  • Execute your use case
  • wpr -stop c:\temp\Handle.etl

Then you can open the resulting .ETL file with WPA and add the graph Handles - Outstanding Count by Process to your analysis view.


Now you can filter for your process (e.g. in my case I did start Visual Studio). The original view gives me a system wide view of all processes which did allocate handles.


That is a nice view but if you are after a handle leak you need to Create Stack. No problem. Right click on the table header and add the Create Stack to the column list. Then you should load the symbol from MS and add your local symbol paths


With the call stacks you can drill into the allocation stack of any handle and search for your leak:


The graph nicely shows the not yet freed handles but the table shows all allocations which can be a bit confusing when you search for the not yet released handles. For big handle leaks the existing view is already enough but if you need in the table to drill down only into call stacks of not yet released handles you need to add a filter to exclude all lines in the table which have released a handle before the trace was stopped.

More Details

To add that filter click on the open the gear icon or press Ctrl+E:


Because we are doing advanced things we click on the Advanced icon


and there we can finally add the trace end time which is visible at the bottom of the WPA main window


Now the graph and the table is updated which now only shows the handles which have not been released since the start of Visual Studio in our example which should match the number of allocated handles shown by Task Manager.


You can also get more fancy. Normally I have some test which shows after some time a handle leak in a specific process. I start leak tracing and then the test and later I stop it. Since I do not want to treat first time initialization effects as leaks I can exclude the e.g. first 5 minutes of the test to get rid of first time init effects. I also want to make sure that I do not get handles as leaks which are allocated at the end because the test was still running at the end of the trace. To do that I need to look for recurring patterns in the trace and exclude all allocated handles which were created at some later time when the test run was just complete. The final result is a filter which hides all entries which match

[Close Time]:<"20,861s" OR [Create Time]:<"5s" OR [Create Time]:>"15s"

After all noise is removed any handle leak, even small ones are only a matter of drilling into the allocation call stacks and fixing the code. If you have a handle leak on a Windows 8.1 (0?) or later machine this approach is much easier and faster than to use Windbg and the !htrace command which is nicely explained at

Why So Late?

I have no idea why this very useful capability of WPA was never documented anywhere. It showed up in the Windows 8 SDK years ago but Handle leak tracing did never work because I was at that time still with Windows 7.

Which Handle Type did I Leak?

The easiest way is to use another tool. Process Hacker is a Process Explorer clone which can show for any process a nice summary. Double click on a process and select the Statistics tab:


When you click on Details you can sort by Handle Count and you immediately know for which handle type you are searching a leak:


PerfView for Advanced Recording

The only other tool I know of which can enable handle leak tracing is PerfView v1.9 from 2/19/2016 or later


PerfView has the unique capability to stop tracing based on a performance counter threshold. This is extremely useful to find e.g. a sudden handle spike which occurs during a stress test over night at 5 a.m. in the morning but when you arrive at 6 a.m. (you are already too late Zwinkerndes Smiley) at the office the handle spike will long be overwritten by newer handle allocations of the 500MB ring buffer. Now you can get your breakfast and arrive relaxed at 9 a.m where you can start analyzing the random handle spike which your colleagues were missing while they were sitting in front of Windbg over night and present the results at 10 a.m in the morning to your manager.

The only issue I have with PerfView is that its performance counter query is locale sensitive which makes it not trivial to specify it on e.g. a Hungarian machine. For the record: On my German machine I can start Handle leak tracing which stops when the performance counter for the the first devenv instance has a value greater than 2000 handles with

  • perfview collect c:\temp\HandleLeak.etl /kernelEvents=Handle /StopOnPerfCounter:"Prozess:Handleanzahl:devenv>2000"

The feature finally seems to have been set free with the Windows 10 SDK but handle leak tracing exists also since Windows 8.1 (0?) in the kernel but no tool was capable to enable it until now. Before that ETW feature Handle leaks have been quite hard to track down but with such advanced and pretty easy to use tooling it is just a matter of two command line calls to get all allocated handles from all processes in one go.

If you leak User (Windows, Menus, Cursors, …) or GDI objects (Device Contexts, Brushes, Fonts, …) you still need to resort to intercepting the corresponding OS methods in your target process like I have shown in Generic Resource Leak Detection with ETW and EasyHook but as usual you need to use the right tool for the job at hand to nail all bugs of your application.


With the addition of ETW tracing to handle allocations it has never been so easy to solve handle leaks. Previously it was a pretty complex undertaking but now you can follow the steps above and you will have a nearly 100% fix rate if you analyze the gathered data correctly. If this has helped you to solve a long searched leak or you have other useful information you want to share sound off in the comments.

          How Bugs Are Really Solved      Cache   Translate Page      

Originally posted on:

The number of bugs produced by developers are legion but why are advanced debugging skills still rare in the wild? How do you solve problems if you do not have the technical know how to to a full root cause analysis across all used tech stacks?

Simple bugs are always reproducible in your development environment and can easily be found with visual debuggers in your favorite IDE. Things get harder if your application consistently crashes at customer sites. In that case often environmental problems are the root cause which mostly cannot be reproduced in the lab. Either you install a debugger on production machines of your customers or you need to learn how to use memory dumps and analyze them back home.

There are also many other tools for Windows troubleshooting available like Process Explorer, Process Monitor, Process Hacker, VMMap, … which help a lot to diagnose many issues without ever using a debugger. With some effort you can learn to use these tools and you are good to solve many problems you can encounter during development or on customer machines.

Things get interesting if you get fatal sporadic issues in your application which results in data loss or it breaks randomly only on some customer machines. You can narrow it down where the application is crashing but if you have no idea how you did get there then some industry best practice anti patterns are used:

  • You know the module which breaks and you rewrite it.
  • You do not even know that. If the problem is sporadic tinker with the code until it gets sporadic enough to be no longer an urgent problem.

That is the spirit of good enough but certainly not of technical excellence. If you otherwise follow all the good patterns like Clean Code and the Refactoring you still will collect over the years more and more subtle race conditions and memory corruptions in central modules which need a rewrite not because the code is bad but because no one is able to understand why it fails and is able to fix it.

I am surprised that so many, especially small companies can get away with dealing technical debt that way without going out of business. Since most software projects are tight on budget some error margin is expected by the customers they can live pretty well with worked around errors. I am not complaining that this is the wrong approach. It may be more economical to bring a green banana to market to see what the customers are actually using and then polish the biggest user surfacing features fast enough before the users will step away from the product. The cloud business brings in some fascinating opportunities to quickly roll out software updates to all of your customers with new features or fixes. But you need to be sure that the new version does not break in a bad way or all of your customers will notice it immediately.

Did you ever encounter bugs which you were not able to solve? What creative solutions did you come up with?

          Why Is The First Start Of An Application Slow?      Cache   Translate Page      

Originally posted on:

All of us have experienced it but very few of us have gone into the details to really find the reasons for it. First of all why should I care? After the first time the application starts much faster. Well you should care if you want to give your customer not only a good second startup time but also a decent first startup experience. To do that you need to do repeated tests. The first startup is commonly referred to cold startup and all subsequent runs are warm startup scenarios. To test a cold startup scenario you need to reboot your computer every time and start your application. Not very practical and I have no one ever seen going down that road. The difference between warm and cold startup time is that the first time the dlls and data of the application need to be loaded from disc which can take quite some time. All subsequent runs can read the data not from disk but from the in memory file system cache which is managed by the operating system.

What Is The File System Cache?

Windows uses the memory of your system in some clever way. All memory that is used by your applications is shown in the Task Manager. The rest of the memory is free and not used by anything. Really? Of course not. The free memory consists of data of previously exited applications which was in use some time a ago. This "free" memory is called Standby List which is where the file system cache of Windows is really living. It is therefore not a good idea to max out your memory usage in task manager because if you do this you are flushing the file system cache which will result in a slow system. This cache is the reason why your second and all further startup times are much better. No disc accesses at all compared to the first run if all goes well.

How can you flush it?

If you want to measure cold startup times you need to clear the file system cache somehow. The easiest way is to use RAMMap from SysInternals. It has an option to flush the Standby List.


That is nice but unfortunately there is no command line tool available to do this in a test script to create repeatable tests. But not all is lost. Process Hacker is a better clone of Process Explorer which comes with full source code. There you can find the undocumented Windows API calls to flush the OS file system cache directly. It is basically

SYSTEM_MEMORY_LIST_COMMAND command = MemoryPurgeStandbyList;
NtSetSystemInformation(SystemMemoryListInformation, &command, sizeof(SYSTEM_MEMORY_LIST_COMMAND));

and you are done. There is also another trick I want to share: You want to clear the file system cache for a specific file? Windows will flush the file system cache if a file was opened with the FILE_FLAG_NO_BUFFERING flag. Here is little C# class that employs this trick:

    class FileSystemTools
        const int FILE_FLAG_NO_BUFFERING = 0x20000000;
        const FileOptions Unbuffered = (FileOptions)FILE_FLAG_NO_BUFFERING;

        /// <summary>
        /// Flush the file system cache for this file. This ensures that all subsequent operations on the file really cause disc
        /// access and you can measure the real disc access time.
        /// </summary>
        /// <param name="file">full path to file.</param>
        public static void FlushFSCacheForFile(string file)
            using (FileStream fileStream = new FileStream(file, FileMode.Open, FileAccess.Read, FileShare.ReadWrite, 4096, FileOptions.None | Unbuffered))


Hidden Dragons

If the first test run is slow and all other are fast we know that the file system cache is to blame. If you see a pattern like this


you know that the first run was cold and all others were warm. If we now flush the file system cache we should get rock solid cold times with no other influencers except virus scanner, indexing service and other pesky applications making our test unpredictable. If we measure again - this time with flushing the file system cache - we get this:



This is not warm and not cold. What is it then? The answer is it was mostly a warm startup because another instance of the application was still running. If the a process is alive and its working set was not trimmed then the dll data is NOT in the cache since it still belongs to the working set of a running process. You need therefore make sure that you close all applications which keep your dlls in memory (e..g Visual Studio with its designers ….) to test a real cold startup scenario. There are other pitfalls as well. If you kill a process without waiting until it has terminated you can get random good runs because a process kill is an asynchronous operation. You have to wait on the process handle until it becomes signaled to be sure that it is really gone. Or if you are using .NET you need to call Process.WaitForExit() to be sure.

After we have fixed that we get this graph:


What the hell is going on here? This was quite hard to find out since there is very little information on the net how to reliably test cold startup scenarios. The hidden thing is Superfetch.

Doesn´t ring a bell? Besides speeding up the boot it also tries to prefetch often used application dlls into memory before the application is started based on intelligent heuristics. This gets in our way if we flush the file system cache. After that the Superfetch system service named SysMain  which is hosted in a generic svchost.exe process tries to prefetch often used dlls at low IO priority. This is additional IO collides with our test where we want to load our dlls as well. To get consistent IO numbers it is therefore best to stop the Superfetch service.

sc stop SysMain

After doing that the graph still looks the same. What is interesting that if our application reads about 30MB more data it starts nearly 10s faster. This is a mystery which only xperf can solve. Here is a Disc IO graph of a 23s slow run


And here is a fast 14s run.


We read more data but the Disc Service Time is less! The average Disc Queue Depth is very high which should indicate an overwhelmed disc. What stands out is that we have about 70% less disc read operations on the assembly folder where the native images of .NET applications are stored. Sometimes we read the disc in a slow and sometimes in a fast way. To answer the question why we read from the disc in such different ways we need to check out the Disc IO Init call stacks. These will tell us who did initiate the read operations and most important when. First comes the slow run


It is no surprise that our slow cold startup causes many hard page faults which triggers the kernel to read the missing pages from disc. This is known to be slow. We can do little about it except to execute less code during startup. The graph shows a nice scattered pattern across the complete startup time. Now lets have a look at the fast run


That looks radically different. We load the same dlls but we have no hard faults? All dll data is read before the application main thread starts running. In our process the Prefetcher reads its prefetch database which is 1,3MB in size (see PfSnPrefetchMetaData in 687ms) which allows it to read our dlls in PfSnPrefetchSections (151MB in 3,1s) to read the dll data mostly with sequential reads in about half of the time. That is the real reason why we have so wildly varying startup times. The prefetcher will look at ca. the first 12s of application startup and will then update the prefetch database for your executable. Next time the startup is a little better and it will update it again causing it to prefetch a little more and so on. This is a nice self tuning system which not many people are aware of. From time to time the prefetcher seems to do nothing to check (that is my guess) if the prefetch database is helping at all. That explains the mostly good and sometimes very slow numbers whre no prefetching is active.

If we aim at stable cold repeatable tests we need to delete disable the Superfetch service because this process is responsible to write and update the prefetch database. The prefetch database file is located at


We need to delete that file as well and now we have real control over our IO during application startup. If you want to calculate the file name of your application prefetch database you need to take the full path of your executable and run it through a hash function which is described at There are still some sites out there which tell you to delete the prefetch folder to prevent caching of dlls to make your system faster. If these guys would have really measured their startup time in a controlled and systematic manner they would not have written such misleading guidelines. As you can see you need to take care about a lot of details to really understand your system. But it is worth it. If you have looked closely at the .pf file name there is a PrefetchFlag at the end. That is a number which you can pass to generic container processes to generate for the same executable different prefetch databases. This can be useful if you have generic container processes with wildly varying dll sets inside them. How do you tell the OS loader that you want to use a different prefetch database to speed up cold startup times?

Simple: Pass it as command line parameter! If you create e.g. an executable with the name prefetchTest.exe and pass /prefetch:dd as command line argument to it you get different prefetch files for each scenario:

prefetchTest.exe /prefetch:1
prefetchTest.exe /prefetch:2
That is a nice find. Perhaps you can make your own customers happier by including a cold startup test in your test suite to make the pain public. Most test reports I have seen include only warm numbers because it is quite difficult to create repeatable and stable cold startup tests. Here are my tips as short bullets for repeatable cold startup measurements:

Test Machine Preparation

  • Stop/Disable the Superfetch (SysMain) service.
  • Disable Windows Search (WSearch) service.
  • Disable Virus scanners.
  • Disable scheduled tasks and other system management software.
  • Delete the prefetch database for your executable.

Test Execution

  • Kill all applications which keep your dlls loaded.
  • Flush the file system cache before the test.

When you follow these tips you will get easily repeatable and stable cold startup numbers. If for some reason during startup much more code is executed which causes many page faults you can easily spot it. The warm startup time might not be affected at all because the actual run time of the additional code might be low but the new disc access pattern could be pricy in terms of cold startup time.

          11/6/2018: Tec: Chaves físicas protegem computadores contra hackers      Cache   Translate Page      
Vamos conversar sobre cintos de segurança. Especificamente, o cinto de segurança de três pontos inventado em 1959 por Nils Bohlin, engenheiro da Volvo. A criação não requeria que as montadoras mudassem a maneira pela qual fabricavam carros...
          Hackers use fake Elon Musk Twitter profile to scam users of bitcoins      Cache   Translate Page      
Hackers used Musk's name and likeness to ask for Bitcoin by promoting an ad on Twitter.
          Comment on 5 Ways to Improve Your Credit Score After a Foreclosure by Lisa jason      Cache   Translate Page      
i owe everything to the hacker team WIPERSOFT, He did a wonderful job of helping me raise my credit score!! Moving it from a 543 low score to a 790 !! My sole purpose was to get my credit rebuilt so that I could purchase a new car and with his help I just purchased a 2010 Mercedes-Benz E350. Thank you very much for your help. If I know of anyone whom I think could benefit from your services, I will definitely recommend you. By the way 6 months after the repair, I purchased a house, which I never thought I would have done, and would not have been able to do without the hacker’s help. Thank you again for your hard work. contact him on WIPERSOFT At TECHIE dot COM.
          Comment on 5 Ways to Improve Your Credit Score After a Foreclosure by Lisa Jason      Cache   Translate Page      
i owe everything to the hacker team WIPERSOFT, He did a wonderful job of helping me raise my credit score!! Moving it from a 543 low score to a 790 !! My sole purpose was to get my credit rebuilt so that I could purchase a new car and with his help I just purchased a 2010 Mercedes-Benz E350. Thank you very much for your help. If I know of anyone whom I think could benefit from your services, I will definitely recommend you. By the way 6 months after the repair, I purchased a house, which I never thought I would have done, and would not have been able to do without the hacker’s help. Thank you again for your hard work. contact him on WIPERSOFT At TECHIE dot COM.
          New Release – False Flag (The Phisher King book 2)      Cache   Translate Page      
Title: False Flag (The Phisher King book 2) Author: Clancy Nacht & Thursday Euclid Publisher: Eine Kleine Press Release Date: November 6, 2018 Genre(s): gay romantic suspense, political, Daddy kink Length: 60 000 words /268 pages Blurb: Sequel to Rainbow Award-winning m/m romantic thriller “The Phisher King.” FBI Agent Callum Riggs and hacker Hunter Walsh have settled into a quiet, contented life together with their Pomeranian, Bruiser. Under a hostile new administration, Cal’s changing duties at the Bureau frustrate his career and personal ambitions. Meanwhile, unbeknownst to Cal, Hunter pursues vengeance against his would-be rapist Chad, following him into the heart of Seattle’s blossoming Alt-Right scene.
          Metoda ”accidentul” s-a mutat pe internet      Cache   Translate Page      
Metoda ”Accidentul” s-a mutat pe internet. Hackerii vor să obțină date despre conturile utilizatorilor. Noul mod de operare al răufăcătorilor se cheama Vishing. Aceştia sună la întâmplare, păcălesc utilizatorii, apoi le iau banii. Veți primi un telefon care vă anunță că aveți un virus în calculator. Cel care va suna se va recomanda ca fiind […]
          Comment on BlinkURL by aumento peniana cirurgia      Cache   Translate Page      
Hey! Do you know if they make any plugins to protect against hackers? I'm kinda paranoid about losing everything I've worked hard on. Any tips?
          HSBC discloses customer accounts hacked at its U.S. bank      Cache   Translate Page      
Hackers breached some HSBC customers' accounts in the United States in October and accessed their information, the bank said in a regulatory filing on Tuesday.

          Comment on Routing Mondrian: The A. Michael Noll Experiment by abogados de accidentes terrassa      Cache   Translate Page      
Hi! I know this is kind of off topic but I was wondering which blog platform are you using for this website? I'm getting fed up of Wordpress because I've had problems with hackers and I'm looking at options for another platform. I would be awesome if you could point me in the direction of a good platform.
          An 'I Voted' Sticker Can Get You Free Stuff. (But Is It Legal? Well …) - New York Times      Cache   Translate Page      

New York Times

An 'I Voted' Sticker Can Get You Free Stuff. (But Is It Legal? Well …)
New York Times
You have made it through the months leading up to the midterm elections. You have researched your candidates and you have voted. Before you sit back and watch the infamous Election Day needle swing to and fro, you're entitled to a treat. Some companies ...
How to Get Free Stuff Today With Your 'I Voted' StickerLifehacker
Here is the free and discounted stuff you can get on Election DayMarketWatch
Free cookies, fries and ride-share discounts for Maryland voters on Election DayBaltimore Sun (blog)
Daily Mail -Lime -Fortune -USA TODAY
all 224 news articles »

          Piratage de HSBC : les données personnelles et bancaires de plusieurs clients ont été volées      Cache   Translate Page      
Un nouveau piratage a eu lieu. La banque HSBC annonce aujourd’hui que des hackers ont réussi à récupérer les informations de clients situés aux États-Unis. HSBC reste discrète sur certains détails cependant : combien de clients ont été touchés ? Aucune idée. On ne sait pas non plus …

Lire la suite

Aimez KultureGeek sur Facebook, et suivez-nous sur Twitter

          membros:juca      Cache   Translate Page      
Juca do Garoa Hacker Clube! Ver mais info em:
          Iran: Israël a tenté de lancer des cyberattaques, mais «est reparti bredouille»      Cache   Translate Page      
L'Iran a fait échec à des cyberattaques supposément lancées par Israël contre ses systèmes de télécommunications, a déclaré le ministre iranien des Télécommunications, Javad Azari Jahromi, constatant que des hackers israéliens étaient repartis «bredouille».
          Cujo vs Dojo vs Keezel Best Smart Internet Security Firewall 2018      Cache   Translate Page      

eping your devices safe from malware and security threats has become incredibly easy today. But at the same time, hackers have managed to find loopholes within current security systems, so there might be a situation where a malware and virus protector that you downloaded might not work the way you want it to. Keeping this […] More

The post Cujo vs Dojo vs Keezel Best Smart Internet Security Firewall 2018 appeared first on The Droid Guy.

          NIST Creates New Guidelines for Managing Privileged Accounts       Cache   Translate Page      
NIST Creates New Guidelines for Managing Privileged Accounts Elizabeth_Neus_pdwC Mon, 11/05/2018 - 13:58

Developed with industry partners, government draft guidelines for privileged account management are already being used in the financial sector to harden defenses against cyberattacks and misuse.

The draft guidelines from the National Cybersecurity Center of Excellence, part of the National Institute of Standards and Technology, are available for public comment until Nov. 30, but are solid enough that organizations can take advantage of them now, said two of the publication’s authors.

“We view it as a how-to guide,” says Harry Perper, a cybersecurity engineer for the NCCoE and co-author of the guidelines. “You can apply it in whatever way makes sense in your organization, in each organization, because every organization is different.”

MORE FROM BIZTECH: Find out how intellectual property firm Cantor Colburn assessed its security to protect its valuable information against hackers! 

How Organizations Can Effectively Manage Privileged Accounts

The draft guidelines outline a system that organizations can use to manage privileged accounts, which can be difficult to control and frequently have little oversight — those who control the accounts by definition have broader access and authority than the average user. 

Such accounts are “often described as the ‘keys to the kingdom,’” the guidelines’ executive summary notes. These can include accounts that permit the transfer of funds, that contain personally identifiable information on employees or are simply the passwords to a company’s social media page.

“I daresay we all have accounts that have high-value data that you would want privileged access only to it,” says Karen Waltermire, an NCCoE cybersecurity engineer and lead author. “We don’t dictate what is considered privileged.”

NCCoE’s draft guidelines apply to nearly any sector, Waltermire says, “but we focused on financial services because privileged account management there is mature, and they’re a very aware sector.”

The draft guidelines were developed in collaboration with financial service industry experts and technology companies, such as RSA and Splunk, and tested in a hybrid virtual/physical space. 

Implementing the privileged access management (PAM) solution involves adding a new layer of security between the users and the accounts; organizations can also read scenarios that outline the challenges presented by privileged access accounts and propose solutions.

Put Privileged Access Management into Practice

In one scenario, a company develops a new app that needs access to a database. The directory administrator — who may be one of several people with privileged access — adds the app via a shared account, but there’s no record of which admin made that change or how.

A PAM solution for this would include strong authentication procedures, possibly even changing the password after each session, so that if mistakes are made, they can be more easily investigated without having to search through logs or rely on administrators’ memories.

The solutions are designed to work with a company’s available resources and not with any specific products, Waltermire says, even though they were developed with the assistance of specific commercial partners. 

“We make these practice guides modular so that it is a solution, not the solution,” she says. “So you would be able to read the document and swap out Cisco for Juniper if your organization already has Juniper.”


          Repetitive transcranial magnetic stimulation with resting state network targeting for treatment-resistant depression in traumatic brain injury: a randomized, controlled, double blinded pilot study - Siddiqi SH, Trapp NT, Hacker CD, Laumann TO, Kandala S, Hong X, Trillo L, Shahim PP, Leuthardt E, Carter AR, Brody D.       Cache   Translate Page      
BACKGROUND: Repetitive transcranial magnetic stimulation (rTMS) has demonstrated antidepressant efficacy, but has limited evidence in depression associated with traumatic brain injury (TBI). Here, we investigate the use of rTMS targeted with individualized...
          This Company Wants to Make the Internet Load Faster      Cache   Translate Page      

The internet went down on February 28, 2017. Or at least that's how it seemed to some users as sites and apps like Slack and Medium went offline or malfunctioned for four hours. What actually happened is that Amazon's enormously popular S3 cloud storage service experienced an outage , affecting everything that depended on it.

It was a reminder of the risks when too much of the internet relies on a single service. Amazon gives customers the option of storing their data in different "availability regions" around the world, and within those regions it has multiple data centers in case something goes wrong. But last year's outage knocked out S3 in the entire North Virginia region. Customers could of course use other regions, or other clouds, as backups, but that involves extra work, including possibly managing accounts with multiple cloud providers.

A San Francisco based startup called Netlify wants to make it easier to avoid these sorts of outages by automatically distributing its customers’ content to multiple cloud computing providers. Users don't need accounts with Amazon, Microsoft Azure, Rackspace, or any other cloud company―Netlify maintains relationships with those services. You just sign-up for Netlify, and it handles the rest.

You can think of the company's core service as a cross between traditional web hosting providers and content delivery networks, like Akamai, that cache content on servers around the world to speed up websites and apps. Netlify has already attracted some big tech names as customers, often to host websites related to open source projects. For example, Google uses Netlify for the website for its infrastructure management tool Kubernetes, and Facebook uses the service for its programming framework React. But Netlify founders Christian Bach and Mathias Biilmann don't want to just be middlemen for cloud hosting. They want to fundamentally change how web applications are built, and put Netlify at the center.

Traditionally, web applications have run mostly on servers. The applications run their code in the cloud, or in a company's own data center, assemble a web page based on the results, and send the result to your browser. But as browsers have grown more sophisticated, web developers have begun shifting computing workloads to the browser. Today, browser-based apps like Google Docs or Facebook feel like desktop applications. Netlify aims to make it easier to build, publish, and maintain these types of sites.

Back to the Static Future

Markus Seyfferth, the COO of Smashing Media, was converted to Netlify's vision when he saw Biilman speak at a conference in 2016. Smashing Media, which publishes the web design and development publication Smashing Magazine and organizes the Smashing Conference, was looking to change the way it managed its roughly 3,200-page website.

Since its inception in 2006, Smashing Magazine had been powered by WordPress, the content management system that runs about 32 percent of the web according to technology survey outfit W3Techs, along with e-commerce tools to handle sales of books and conference tickets and a third application for managing its job listing site. Using three different systems was unwieldy, and the company's servers struggled to handle the site’s traffic, so Seyfferth was looking for a new approach.

When you write or edit a blog post in WordPress or similar applications, the software stores your content in a database. When someone visits your site, the server runs WordPress to pull the latest version from the database, along with any comments that have been posted, and assembles it into a page that it sends to the browser.

Building pages on the fly like this ensures that users always see the most recent version of a page, but it's slower than serving prebuilt "static" pages that have been generated in advance. And when lots of people are trying to visit a site at the same time, servers can bog down trying to build pages on the fly for each visitor, which can lead to outages. That leads companies to buy more servers than they typically need; what’s more, servers can still be overloaded at times.

"When we had a new product on the shop, it needed only a couple hundred orders in one hour and the shop would go down," Seyfferth says.

WordPress and similar applications try to make things faster and more efficient by "caching" content to reduce how often the software has to query the database, but it's still not as fast as serving static content.

Static content is also more secure. Using WordPress or similar content managers exposes at least two "attack surfaces" for hackers: the server itself, and the content management software. By removing the content management layer, and simply serving static content, the overall "attack surface" shrinks, meaning hackers have fewer ways to exploit software.

The security and performance advantages of static websites have made them increasingly popular with software developers in recent years, first for personal blogs and now for the websites for popular open source projects.

In a way, these static sites are a throwback to the early days of the web, when practically all content was static. Web developers updated pages manually and uploaded pre-built pages to the web. But the rise of blogs and other interactive websites in the early 2000s popularized server-side applications that made it possible for non-technical users to add or edit content, without special software. The same software also allowed readers to add comments or contribute content directly to a site.

At Smashing Media, Seyfferth didn't initially think static was an option. The company needed interactive features, to accept comments, process credit cards, and allow users to post job listings. So Netlify built several new features into its platform to make a primarily static approach more viable for Smashing Media.

The Glue in the Cloud

Biilmann, a native of Denmark, spotted the trend back to static sites while running a content management startup in San Francisco, and started a predecessor to Netlify called Bit Balloon in 2013. He invited Bach, his childhood best friend who was then working as an executive at a creative services agency in Denmark, to join him in 2015 and Netlify was born.

Initially, Netlify focused on hosting static sites. The company quickly attracted high-profile open source users, but Biilman and Bach wanted Netlify to be more than just another web-hosting company; they sought to make static sites viable for interactive websites.

Open source programming frameworks have made it easier to build sophisticated applications in the browser . And there's a growing ecosystem of services like Stripe for payments, Auth0 for user authentication, and Amazon Lambda for running small chunks of custom code, that make it possible to outsource many interactive features to the cloud. But these types of services can be hard to use with static sites because some sort of server side application is often needed to act as a middleman between the cloud and the browser.

Biilmann and Bach want Netlify to be that middleman, or as they put it, the "glue" between disparate cloud computing services. For example, they built an e-commerce feature for Smashing Media, now available to all Netlify customers, that integrates with Stripe. It also offers tools for managing code that runs on Lambda.

Smashing Media switched to Netlify about a year ago, and Seyfferth says it's been a success. It's much cheaper and more stable than traditional web application hosting. "Now the site pretty much always stays up no matter how many users," he says. "We'd never want to look back to what we were using before."

There are still some downsides. WordPress makes it easy for non-technical users to add, edit, and manage content. Static site software tends to be less sophisticated and harder to use. Netlify is trying to address that with its own open source static content management interface called Netlify CMS. But it's still rough.

Seyfferth says for many publications, it makes more sense to stick with WordPress for now because Netlify can still be challenging for non-technical users.

And while Netlify is a developer darling today, it's possible that major cloud providers could replicate some of its features. Google already offers a service called Firebase Hosting that offers some similar functionality.

For now, though, Bach and Biilmann say they're just focused on making their serverless vision practical for more companies. The more people who come around to this new approach, the more opportunities there are not just for Netlify, but for the entire new ecosystem.

More Great WIRED Stories Self-improvement in the internet age andhow we learn A drone-flinging cannon proves UAVscan mangle planes Google's human-sounding phone bot comes to the Pixel How Jump designed aglobal electric bike US weapons systems are easy cyberattack targets Looking for more? Sign up for our daily newsletter and never miss our latest and greatest stories
          Ethical Hacker      Cache   Translate Page      
Introductie: Voor een grote organisatie ben ik op zoek naar een zeer ervaren Ethical Hacker. Organisatie: Je zal gaan werken bij een grote organisatie die opereert in alle niches wat betreft informatie beveiliging. Het team zal bestaan uit 15 professionals. Een mooi bedrijf met alle faciliteiten van dien is op zoek naar een Senior Ethical Hacker...
          The OPM hack explained: Bad security practices meet China's Captain America      Cache   Translate Page      

In April of 2015, IT staffers within the United States Office of Personnel Management (OPM), the agency that manages the government's civilian workforce, discovered that some of its personnel files had been hacked. Among the sensitive data that was exfiltrated were millions of SF-86 forms, which contain extremely personal information gathered in background checks for people seeking government security clearances, along with records of millions of people's fingerprints. The OPM breach led to a Congressional investigation and the resignation of top OPM executives, and its full implications—for national security, and for the privacy of those whose records were stolen—are still not entirely clear.

To read this article in full, please click here

          After transforming into The Eye of Sauron for Halloween, Salesforce Tower lit up with lettering on the eve of election day telling people to 'Vote for Tomorrow' (CRM)      Cache   Translate Page      


  • On Tuesday, San Franciscans will vote on Proposition C, a local ballot measure that would tax the city's largest corporations to provide relief in the city's ongoing homelessness crisis.
  • On the eve of the midterm elections, the Salesforce Tower in San Francisco had a message for the people of its city: "Vote for Tomorrow." 
  • The artist in charge of the LED display told The San Francisco Chronicle in May that he would never portray an advertisement or holiday-themed image on it. 
  • However, this is the second time it's happened.  On Halloween, the tower displayed orange flames and The Eye of Sauron, the iconic symbol of the Dark Lord adopted in "The Lord of the Rings." 

On the eve of the midterm elections, the Salesforce Tower in San Francisco had a message for the people of its city: "Vote for Tomorrow."

The 1,070-foot-tall tower is the tallest in San Francisco and was constructed with 11,000 LED lights on the top six floors, which combine to make up a screen that's visible for up to 20 miles away. 

See the rest of the story at Business Insider

NOW WATCH: A cybersecurity expert showed us how hackers can tap into an office phone and listen to everything you're saying

See Also:

          Dark winter / Anthony J. Tata.      Cache   Translate Page      
cover imageBy the time anyone realizes what's happening, it is too late. A dark network of hackers has infiltrated the computers of the U.S. military, unleashing chaos across the globe. U.S. missiles strike the wrong targets. Defense systems fail. Power grids shut down. Within hours, America's enemies move in. Russian tanks plow through northern Europe. Iranian troops invade Iraq. North Korean destroys Seoul and fires missiles at Japan. Phase 1 of ComWar is complete. Enter Jake Mahegan and his team of highly trained operatives. Their mission is to locate the nerve center of ComWar--aka Computer Optimized Warfare--and to shut down the operation through any means necessary.
          Who Is Rachel Small? Full Story of Alleged Georgia Voting “Hacker”      Cache   Translate Page      
Unconfirmed reports indicate that the Federal Bureau of Investigation is trying to make contact with a woman named Rachel Small,...
          HSBC discloses customer accounts hacked at its U.S. bank      Cache   Translate Page      
Hackers breached some HSBC customers' accounts in the United States in October and accessed their information, the bank said in a regulatory filing on Tuesday.

          Growth Hacker - KLF Group - Montréal, QC      Cache   Translate Page      
Experience with growth hackings tools. We’re looking for a Growth Hacker to help find creative ways to over-deliver on our ambitious client acquisition targets....
From Indeed - Tue, 25 Sep 2018 21:31:43 GMT - View all Montréal, QC jobs
          Ethical Hacker - IBM - Ottawa, ON      Cache   Translate Page      
Ethical Hacking gives you the ability to exercise these skills while keeping the bad guys out of our networks and applications. Change the world at IBM....
From IBM - Wed, 17 Oct 2018 10:49:08 GMT - View all Ottawa, ON jobs
          Fallout 76: Erste Hacker-Vorwürfe, Bethesda reagiert      Cache   Translate Page      
Noch bevor Fallout 76 überhaupt auf dem Markt ist, gibt es erste ernsthafte Bedenken über die Anfälligkeit des Online-Spiels für Hacker.


Themen: Fallout 76, Bethesda Game Studios
          Kryptografie - Schutz vor Hackern und Geheimdiensten?      Cache   Translate Page      
Ein Wettkampf ist ausgebrochen zwischen Erfindern immer komplexerer kryptografischer Methoden einerseits und Hackern und Geheimdiensten andererseits. Von Kai Laufen (Produktion 2017)
          Hackers Attempt to Sell Details from 120M Facebook Accounts      Cache   Translate Page      
Facebook Account Details for Sale on Dark Web – But Facebook Denies Breach Hold on…if account details are for sale, who else could have leaked them other than Facebook?  Considering how interconnected everything is, it’s entirely possible a third-party application suffered a breach or even a browser extension.  The exact route that leaked the data remains unknown, but the […]
          Implantes cerebrales: el blanco de los hackers para manipular nuestros recuerdos      Cache   Translate Page      
cerebro digital
El nuevo blanco de los hackers podría ser ni más ni menos que nuestra propia mente. Científicos advierten que los ciberatacantes podrían manipular nuestros recuerdos a través de los implantes cerebrales que se usarán para tratar enfermedades neurodegenerativas.
          Comment on Nintendo Switch Kernel exploit 34c3 presentation: “Nvidia Backdoored themselves” by Jailbroken Nintendo Switch devices now support customize firmware! – Jalvis Tech      Cache   Translate Page      
[…] in December of 2017, a group of hackers revealed at the Chaos Communication Congress in Germany that they successfully hacked the Switch’s version 3.0.0 firmware. The team also […]
          Un visualizador de siete segmentos fabricado con cartón, pegamento, gomas elásticas y mucho ingenio      Cache   Translate Page      

El encanto de lo viejuno y los displays mecánicos queda redoblado en este ingenioso proyecto de The Q que es un visualizador de siete segmentos fabricado con cartón, gomas elásticas y poco más. Eso sí, es tremendamente ingenioso y dedicarle una tarde bien puede merecer la pena para aprender un montón de cosas.

El vídeo explica paso a paso cómo dibujar y recortar las diferentes piezas, que son principalmente de cartón de alto gramaje aunque podría incluso usarse madera delgada. Se taladran agujeros, se utilizan varillas y alambres para colocarlas y finalmente se pintan de amarillo vistoso, como mandan los cánones. Para el mecanismo se necesitan muelles y construir unas piezas especiales a modo de balancines mecánicos, que serán los que levanten y bajen los segmentos.

Un visualizador de siete segmentos fabricado con cartón

La parte más ingeniosa es la construcción del conversor decimal a 7 segmentos (nombrados ABCDEFG). Para hacerlo se emplea un mecanismo de discos giratorios en los que cada posición activa o desactiva uno de los segmentos. La tabla de correspondencias dígito/segmento permite saber cuál debe estar activado o desactivado. Se recortan los discos de la forma apropiada y cuando toda la estructura gire a modo de rueda irá levantando o bajando segmentos para mostrar los números del 0 al 9. Esto mismo es lo que se hace electrónicamente con circuitos integrados como el 74LS47, que realiza la misma labor.

El resultado es una caja contadora, en la que al girar la rueda por los números 0 a 9 se van viendo (y oyendo) su representación, una pequeña e interesante preciosidad. El siguiente paso supongo que será fabricar seis o siete de estos y conectarlos en serie para montar un gigantesco contador de millones.

A quién le gusten estas cosas apreciará el SevenBlocks que da la hora o incluso el display mecánico contador capaz de avanzar a unos 10 cambios por segundo.

# Enlace Permanente

          Kryptografie: Schutz vor Hackern und Geheimdiensten?      Cache   Translate Page      
Schon die Spartaner haben geheime Botschaften verschlüsselt, heute ist nur die Technik raffinierter. Kryptografische Verfahren stecken in Emails, Reisepässen, Onlinebanking und autonomen Autos.
          Hackers breach StatCounter to hijack Bitcoin transactions on exchange      Cache   Translate Page      
StatCounter is still compromised but has removed the script from its site.
          Biohacker: Bastler, Forscher, Weltenretter      Cache   Translate Page      
Warum über Gene oder Langlebigkeit ewig diskutieren? Biohacker stellen sich lieber ins Labor und probieren die Dinge aus. Darunter sind Aktivisten und Neugierige, Laien und Profis.
          IT-Sicherheit: So unsicher sind die US-Wahlen      Cache   Translate Page      
Wahlen gelten in den USA seit 2017 als "kritische Infrastruktur". Dafür zu sorgen, dass sie vor Hackerangriffen geschützt werden, hat also höchste Priorität. Doch nach wie vor sind Wahlcomputer schlecht geschützt. Von Hakan Tanriverdi (Wahlcomputer, Security)
          Banks and cyber security      Cache   Translate Page      
The head of the Federal Investigation Agency's (FIA) cybercrime wing, Capt (rtd) Mohammad Shoaib, has dropped a veritable bombshell. That is, hackers have stolen data from "almost all" Pakistani banks. All that is known so far is that those be
          Long Lines Test Voter Patience Across the Nation      Cache   Translate Page      

Voters reported waits of an hour and longer on Election Day in areas ranging from the Gulf coasts of Texas and Florida to parts of Missouri and South Carolina, up to Chicago, rural central Pennsylvania and New York City. Polling places opening late, voting machine outages, understaffing and sheer volume caused some voters to abandon the lengthy lines before casting their ballots.

In the Houston area, voters waited over half an hour for polls to open as staff struggled to get voting machinery online. Voters who were late for their jobs left polling places in Brooklyn as high turnout and downed ballot scanners led to waits of up to two hours.

While it is hard to know if the problems exceed usual Election Day hiccups, the issues in states that allow early voting, like Florida and Texas, are unexpected, said Michael McDonald, a political scientist at the University of Florida.

Behind the scenes, officials were addressing potential gaps in computer security. By noon Tuesday, several states reported to U.S. election-security officials that hackers tried to scan their computer systems for software vulnerabilities. Days before, a county clerk’s office said its email account was compromised and its messages forwarded to a private Gmail address, according to person familiar with the matter who was not authorized to discuss the matter publicly.

Although early voting in some states had outpaced 2014 — and experts anticipated problems if that trend continued into Election Day — the number of voters turning out at polling places on Tuesday caught many election administrators flatfooted.

The problem was particularly acute in the Houston area. At Lone Star College-Cypress Center, outside Houston, polls opened 45 minutes late because of what one voter attributed to understaffing and bewilderment among poll workers about how to operate voting machinery.

“There were people standing in line for an hour only to find out they were at the wrong polling place,” said Brianna Smith, a 31-year-old tax specialist and mother of three. “It was very discouraging for people to see a line wrapped around the corner when they have to go to work.”

The Houston Chronicle reported a similar late opening at a polling place at Notre Dame Catholic Church.

Hector de Leon, the spokesperson for the Harris County Clerk’s Office in Texas, said the county had resolved the morning’s issues. Delayed openings at some precincts, he added, are common. “Clerks are running late — they get there at 6:45 instead of 6 o’clock,” he said. “Clerks forget how to connect the equipment properly,” though he noted the county has technicians on call to help poll workers befuddled by voting machines.

Elsewhere, downed voting machines led to long delays after voting was underway.

Neil Brown, the president of the Poynter Institute for Media Studies, tweeted: “Single scanner breaks down at precinct” in St. Petersburg, Florida, with “some abandoning vote cause they need to work.” (The problem had been resolved by midday, and election officials hadn’t received reports of wait times prompting voters not to cast a ballot, said Dustin Chase, a spokesperson for the Pinellas County, Florida, supervisor of elections.) A Pennsylvanian named Jennifer Culbertson reported seeing fellow voters leave long lines before filling out their ballots at Spring Garden Township municipal building in York, Pennsylvania.

Farther north, voters in Brooklyn reported that, at one point Tuesday morning, all the machines that scan ballots at PS 22 were down. “They’re literally having people fill out the ballot and stuff them in locked ‘emergency’ ballot boxes that half the people in line don’t trust,” Rachael Berkey, who estimated that the wait was over two hours, wrote in an email.

Humidity may be the culprit in places like Brooklyn. “The scanner that’s being reported as jamming wants to operate in the range of 10 to 15 percent humidity, and we’re hearing about problems in New York, Boston and North Carolina, where humidity is really high today,” said Charles Stewart, a professor of political science at the Massachusetts Institute of Technology.

Elsewhere in Brooklyn, sheer volume generated long waits. Unlike many states, New York does not offer discretionary early voting.

In a balmy school gym at PS 11, the morning line topped 200, spilling out the schoolhouse doors and onto the sidewalk. The wait was an hour and a half.

The line was “probably longer than when Obama was on the ballot,” Emily Chen said.

Election officials for New York City were not immediately available for comment.

Some voters at the school described seeing people leave the polling place because of what longtime residents described as historic turnout.

“This is the longest line in generations,” Catherine Saunders, a 68-year-old Brooklynite, said. “I’ve been voting here for 27 years.”

Voters saw similarly historic turnout numbers elsewhere in the Northeast. Theresa Marshall, of Wells, Maine, had “never seen it so busy at the polls, even for presidential elections.”

In James Island, just outside Charleston, South Carolina, where the wait reached an hour and a half on an unseasonably warm Tuesday morning, Jennifer Dukes, a 34-year-old photographer, was among a number of locals who sought to persuade their fellow voters to stick out long lines by passing out snacks and water. She saw others playing games on their cellphones to pass the time.

According to Stewart, the best recourse for voters who ran into long lines Tuesday morning is to head back to the polls during the early afternoon. Nationwide statistics show the shortest waits during those hours on Election Day, before a post-work bump later in the afternoon.

          Daswani: “El cibercrimen se basa en el arte del engaño más que en la técnica”      Cache   Translate Page      
El conocido 'hacker' Deepak Daswani alerta de que, al estar nuestras vidas volcadas en los dispositivos digitales, quien los comprometa nos tendrá en sus manos.
          Comment on Windsor Shelters – Swastha Arogya For A Swachh Bharat – 2nd October 2017 by Miyuki Arisaka      Cache   Translate Page      
Howdy! I know this is somewhat off topic but I was wondering which blog platform are you using for this website? I'm getting tired of Wordpress because I've had problems with hackers and I'm looking at alternatives for another platform. I would be fantastic if you could point me in the direction of a good platform.
          Salvation - 2ª Temporada | Crítica      Cache   Translate Page      
'Salvation' é uma série de ficção cientifica da CBS, produzida por Alex Kurtzman (Fringe) e traz uma segunda temporada com 13 episódios. Nela acompanhamos a vida do estudante Liam Cole (Charlie Rowe, 'A Bussola de Ouro') no MIT (Instituto de Tecnologia de Massachusettes) que constrói um sistema para acompanhar o espaço e assim descobre que um asteroide está em rota de colisão com a terra. Devido a sua dimensão o planeta será destruído em 181 dias. Assustado ele pede ajuda a seu professor afim de confirmar sua teoria e seus cálculos, ele tem contatos com o governo e ficou de informá-los.

Após os acontecimentos da primeira temporada, a equipe formada por Liam, o gênio e bilionário da tecnologia, Darius Tanz (Santiago Cabrera, 'The Musketeers'), Grace Barrows (Jennifer Finniga, 'Tyrant'), a assessora de imprensa do Pentágono, e Harris Edwards (Ian Anthony Dal, Hawaii Five 5-0'), o secretário de Defesa, passou por algumas manobras e muitos contra tempos e conseguem ajuda da Presidente. Algumas pessoas são enviadas a Bunkers.

Darius durante meses selecionou pessoas como médicos, cientistas, professores, para um Bunker criado pela sua empresa como um plano B. Se o plano de Liam falhasse e o  meteoro colidisse com a terra aquelas pessoas no Bunker chamado "Salvation" seriam responsáveis por colonizar a terra. 

Então a segunda temporada começa exatamente onde a primeira terminou. É dai que tudo vai por ladeira abaixo. Tudo dá errado e nada sai como planejado. O Bunker "Salvation" é sabotado e depois de alguns dias as pessoas precisam sair. Enquanto isso o país está um caos. As pessoas estão nas ruas apavoradas, realizando furtos, causando brigas e tomando medidas desesperadas. 

O governo americano está passando por um golpe de estado, um golpe militar para afastar a Presidente. Darius vira vice-Presidente e ganha a confiança da população. Além disso, os militares não são os únicos que tentam manipular as pessoas. Um grupo de hackers chamado RE/SYST forçam Liam a trabalhar com eles, ameaçando soltar bombas em solo americano. Darius também participa de uma conferência mundial para conseguir ajuda para construir um canhão capaz de atingir o meteoro e forçá-lo a mudar seu destino.

Com todos os acontecimentos, a equipe é desfeita e o elo entre eles não é mais o mesmo. Harris e Grace precisam lidar com seus próprios problemas quando um detetive começa a investigar a morte de uma funcionária da Casa Branca que tentou matar Harris. Jillian (Jacqueline Byer,Full Out) não acredita mais nos planos de Liam e Darius e acaba envolvendo-se com um culto suicida que acredita que a colisão do meteoro será a salvação da humanidade. 

A segunda temporada abordou abusou dos clichês, incluiu muita informação superficial, realizou mudanças mal elaboradas e trouxe pouco desenvolvimento. Os personagens novos ficaram mais perdidos que o elenco principal. Foram treze episódios de altos e baixos. 

De forma geral não foi uma temporada excepcional. Tiveram boas cenas de ação e participações especiais que enriqueceram alguns episódios. O final da temporada foi bom e deixou perguntas sem respostas criando um gancho para uma nova temporada. 

Até o momento, a emissora ainda não se pronunciou sobre uma possível renovação para a terceira temporada. A segunda temporada está disponível na Netflix.

          Keeping ahead of the hackers in a hyper-connected world      Cache   Translate Page      

Prof Máire O’Neill will give a discourse at the RIA this week about securing connected devices and the internet of things. Dr Claire O’Connell caught up with her ahead of her talk.

The post Keeping ahead of the hackers in a hyper-connected world appeared first on Silicon Republic.

          Elon Musk bitcoin scam ramps up with spate of hacked Twitter accounts      Cache   Translate Page      

The posts to Elon Musk’s own Twitter account have made the headlines of late, and hackers are now trying to use his image to scam people.

The post Elon Musk bitcoin scam ramps up with spate of hacked Twitter accounts appeared first on Silicon Republic.

          Le conflit      Cache   Translate Page      
Les inspecteurs Jules Bavure et La Biche enquêtent sur des meurtres dont toutes les victimes portent mystérieusement des noms d'oiseaux. Les scènes de crime sont encombrées d'objets de peu de propos, météorites, plumes colorées ou insectes d'origines préhistoriques et rampants... Ils sont aux prises avec des personnages aux allures atypiques, tels un hacker, Corvus Poltergeist, et Cornix, un petit bonhomme aux allures étranges, affublé d'une tête circulaire et de grands pieds de clowns. Cette affaire prit tellement d'ampleur qu'elle concernera tous les pays de la Terre se trouvant simultanément attaqués par des êtres issus de la planète Mars mais qui l'auront quittée jadis, lorsqu'elle sera devenue impropre à la vie. L'histoire du livre "Le Conflit - Oiseau & Cie" raconte une guerre qui eut lieu, entre hommes et Martiens. Il est une sorte de parallèle, tracée dans le ciel et l'espace, du précédent roman de l'auteur, "Cnidaria, Reine méduse" , se déroulant dans les profondeurs des océans.
          Hackers Target Telegram, Instagram Users in Iran      Cache   Translate Page      
Hackers have been targeting Iranian users of Telegram and Instagram with fake login pages, app clones and BGP hijacking in attacks that have been ongoing since 2017, Cisco Talos reveals.  read more Source link
          U.S. Air Force Announces Third Bug Bounty Program      Cache   Translate Page      
The United States Air Force on Monday announced that it has launched its third bug bounty program in collaboration with HackerOne. Hack the Air Force 3.0 is the largest bug bounty program run by the U.S. government to date, spanning 191 countries and lasting more than four weeks. read more Source link
          Manfred Weber MdEP (CSU), Vors. EVP im EU-Parlament zu Brexit und Hackern      Cache   Translate Page      
Interview mit Mirjam Meinhardt | Im SWR Tagesgespräch mit Mirjam Meinhardt kritisierte der CSU-Europaabgeordnete Manfred Weber, EVP-Vorsitzender im EU-Parlament, die britische Regierung in Bezug auf die Brexit-Verhandlungen. Insbesondere die Äußerungen des britischen Außenministers Johnson seien leichtfertig. Eine harte Grenze zwischen Nord-Irland und Irland birge eine große Gefahr: Wir reden also über das Risiko, dass die Gewalt in Nordirland zurückkehrt". In Bezug auf die gerade bekannt gewordenen Hacker-Angriffe auf das Bundes-Netz plädiert Weber im SWR für eine stärkere europaweite Zusammenarbeit und warnt vor einer Naivität gegenüber Russland.
          Milwaukee woman has $1,600 siphoned from bank account after hackers take over Facebook account      Cache   Translate Page      

The Milwaukee woman claims her password was compromised of an entire sentence which no one else knew.

The post Milwaukee woman has $1,600 siphoned from bank account after hackers take over Facebook account appeared first on Techaeris.

          FBI Monitors Midterm Elections for Terrorist, Hacker Threats - Justice Dept.      Cache   Translate Page      
WASHINGTON (Sputnik) - FBI agents and lawyers at a command post in Washington, DC will analyze intelligence reports and coordinate responses to terrorists or hackers that attempt to disrupt the US midterm elections, a Department of Justice said.
          Hackerville: producţia de seriale româneşti, în direcţia bună      Cache   Translate Page      
Povestea cu hackeri şi prietenie româno-germană s-a lansat duminică pe HBO Go
           - Pakistan is all scammers      Cache   Translate Page is a total scam He's not a hacker. He is a poser. I told him I'd make sure he didn't get a single dime from the US after ripping me off. His whatsapp number is 92 347 1218745 He...
          Gudenus: Wiener Krankenanstaltengesetz hat bedauerlicherweise Lücken      Cache   Translate Page      
Gesundheitsstadtrat Hacker soll endlich handeln anstatt permanent zu analysieren
          Как развить главный навык XXI века      Cache   Translate Page      
Умение сконцентрироваться поможет выполнять сложную интеллектуальную работу и повысит продуктивность.
          Как оставить в автозагрузке Windows 10 только нужные приложения      Cache   Translate Page      
Избавьтесь от мусора, который замедляет запуск системы и работу ПК.
          Как справиться с выгоранием и вернуть себе былую продуктивность      Cache   Translate Page      
Долго пребывать в состоянии упадка невозможно. Начните менять ситуацию с маленьких шагов.
          When IoT and SCADA Meet with Niall Merrigan      Cache   Translate Page      
The Internet of Things and Industrial SCADA controls are colliding - what happens next? Richard chats with Niall Merrigan about the security issues around industrial plants - factories, power stations, refineries and so on. There has been automation there for years in the form of Supervisory Control and Data Acquisition (SCADA) systems - but their security models are pretty primitive, often relying on air-gap networks to keep hackers out. Meantime, inexpensive and powerful IoT devices offer new capabilities - they have their own security issues, but there are solutions. What happens when the two meet?
          The Pentagon Realised What It Has Done – the Chinese Put the US Army on Its Knees      Cache   Translate Page      

The Pentagon Realised What It Has Done – the Chinese Put the US Army on Its Knees
November 04, 2018
In the system of national defense of the US a gaping vulnerability was found that is very difficult to close. The reaction of the Pentagon is reminiscent of badly hidden panic, and journalists who examined the results of the research of American experts, who thoroughly studied the condition of the American army and defensive industry, admit that there is iron logic in the recent “strange” actions of president Trump — he wants to save America from transforming into a cardboard tiger with paper claws.
The essence of the problem, according to the retelling of the columnist of the Reuters agency Andy Home, who obtained a copy of the September report of the US Department of Defence on the situation concerning key deliveries necessary for the American army, is reduced to one important figure. More than 300 (!) key elements necessary for the normal functioning of the US Armed Forces and defensive industry are under threat: American producers are either on the verge of bankruptcy or were already replaced by suppliers from China or other countries because of the deindustrialisation of national economy and the relocation of production to the countries of Southeast Asia.
Mr. Home gives as a striking and clear example the amusing (of course, if you are not a US military man) fact from the report: it turns out that the last American producer of the synthetic threads necessary for the production of army tents “died” quite recently. This means that in the event that the US will fall under such a “textile embargo”, for some American soldiers they will seriously face the prospect of sleeping in the open-air. It is difficult not to notice that such a prospect looks slightly humiliating for an army that claims to be the most hi-tech on the planet.
The situation could be considered as funny if it didn’t affect such a wide range of requirements of the American army and military-industrial complex. In the declassified part of the research of the American Department of Defence it is mentioned that in the US there are difficulties with future deliveries of the power switches that nearly all American missiles are equipped with. As officials of the Pentagon report, the producer of these switches was closed down, but the highest military ranks learned about it only after it became clear that the power switches ended. And there is nowhere to take new ones from, because the producer disappeared into thin air a whole 2 years ago. One more striking example: the country’s only producer of solid rocket motors for “air-to-air” missiles, as the American officials write, “encountered technical production issues”, the reasons for which couldn’t be found even after government and military experts were involved. Attempts to restart production failed, and the Pentagon was obliged to employ a Norwegian company to ensure uninterrupted deliveries. Obviously, this indicates a certain technical degradation of the entire American system, because only the loss of some key competencies can explain a situation in which production cannot be restored and the problem cannot even be determined.
Whilst becoming acquainted with the complaints of the leadership of the American army it is difficult to rid oneself of the impression that it isn’t a document of the US Department of Defence dated September, 2018 that is in front of your eyes, but a description of the problems of the Russian army from the era of the dashing 90’s. Literally there is no direction in which there would be no serious or very serious problems, and often they even can’t be solved at the expense of the bottomless military budget.
In the section on nuclear weapon problems the Pentagon complains that in the US there isn’t the necessary number of engineers and technicians who would have the corresponding education, training, and US citizenship that are necessary for working with army nuclear objects. The mention of nationality is of importance, because American higher education institutions produce enough engineers, physicists, and representatives of other technical specialties and exact sciences, however a disproportionately large number of these graduates are foreigners, most often from the People’s Republic of China.
Americans can’t find not only the necessary engineers, but also the necessary microelectronics for nuclear weapons. And they complain that they no longer have the right to trust suppliers of electronic components – after all,
“the supply chain is globalised”. In translation from American bureaucratese into colloquial Russian it means: “the microelectronics for our nuclear missiles are made in China, and we don’t know what the Chinese have stuffed in it”.
There are serious difficulties even concerning issues that should be solved very easily in the conditions of hi-tech American economy. For example, the Pentagon complains about a lack of tools for the development of software, as well as the management of data and production, that could be trusted. The situation is exacerbated by “poor cybersecurity practices by many key software vendors”. This, when translated from American bureaucratese into colloquial Russian, means: “concerning cybersecurity, our vendors are so bad that we don’t know what the Chinese and Russian hackers cram into the software that our military use”.
Main conclusion of the report:
“China represents a significant and growing risk to the supply of materials deemed strategic and critical to U.S. national security. <…> Areas of concern to America’s manufacturing and defense industrial base include a growing number of both widely used and specialized metals, alloys and other materials, including rare earths and permanent magnets”.
In general everything is bad, starting with aluminium and ending with cybersecurity, from power switches for missiles to engineers and drill operators, and from computer numerical control machines to synthetic fabric for military tents. The greed of American business, the ideology of globalisation, and the iron belief that history, as Fukuyama predicted, is about to end collectively caused such damage to the defense capability of the US that the geopolitical opponents couldn’t even dream of. It is precisely by understanding this fact that explains Donald Trump’s attempts to carry out the reindustrialisation of America almost by force.
However, there is every reason to believe that, taking into account the present economic difficulties, it’s unlikely that Trump’s administration will be able to fix what its predecessors broke 20 years. And we [Russians – ed] and our Chinese partners need, on the one hand, not to repeat the mistakes of Americans, and on the other hand — to make the most of these mistakes. Judging by what is happening now on the world stage, this is exactly what Moscow and Beijing are doing.

River to Sea Uprooted Palestinian   
The views expressed in this article are the sole responsibility of the author and do not necessarily reflect those of the Blog!

 How Teachers Might Save Arizona Schools from the Kochs      Cache   Translate Page How Teachers Might Save Arizona Schools from the Kochs

“A change in education is Arizona’s No. 1 issue,” Garcia said in a televised debate. “It is my strength, it is Ducey’s weakness, and it’s going to be the difference.” (Photo: Victoria Pickering/flickr/cc)

“A change in education is Arizona’s No. 1 issue,” Garcia said in a televised debate. “It is my strength, it is Ducey’s weakness, and it’s going to be the difference.” (Photo: Victoria Pickering/flickr/cc)

The moment Beth Lewis realized the powerful political forces she was up against was when she was seated in the gallery of the Arizona House watching Republican legislators, one-by-one, fall into line to support a new bill she and her fellow teachers had come to the capitol to oppose. Republican Governor Doug Ducey and others “working the bill” on the floor took any wavering members into a back room for a “conversation,” while lobbyists in the wings nodded and hand-signaled with lawmakers to track the bill’s progress. When the bill’s handlers agreed a vote was in order, it passed easily. Then, “it was like a party,” Lewis recalls, with lawmakers high-fiving each other and lobbyists shaking hands and backslapping. “It was sickening,” she says. “I realized our state legislators weren’t at all interested in representing the people.”

The bill, which the State Senate also passed and the governor quickly signed, opened up education savings accounts, called Empowerment Scholarship Accounts, to all of the state’s 1.1 million students. The new accounts, previously restricted to students with special needs and students attending schools receiving a grade of D or F on the state’s school report card, would provide $4,400 a year, 90 percent of the amount of money the state would typically send a district for enrolling a student, for a family to spend as they wish on their children’s education. Students with disabilities and poor students would receive more money than other students.

For parents to receive the money, on a debit card, they must agree not to enroll their children in a public school—essentially giving up their children’s right to a free public education. Other than that, the program has few regulations and there’s little oversight in how public money is being spent. For that reason, Lewis, an Arizona public school teacher, and others who oppose the bill, call the savings accounts “vouchers” that drain funding from public education.

The lobbyists working the House floor that night were from the Goldwater Institute, a right-wing advocacy group based in Arizona with extensive connections to the Koch brothers and a number of organizations and networks with close Koch ties including ALEC (the American Legislative Exchange Council), the State Policy Network, and the Franklin Center for Government and Public Integrity. For years, Charles and David Koch and their associated foundations have invested heavily in electing Arizona lawmakers, including Governor Ducey, and expanding the education savings accounts was one of their crowning achievements.

Passing the bill was also a moment of triumph for the education agenda of the Trump administration. Shortly after news of the passage of the voucher expansion broke, U.S. Secretary of Education Betsy DeVos tweeted, “A big win for students & parents in Arizona tonight with the passage of ed savings accts. I applaud Gov. @DougDucey for putting kids first.”

But in the upcoming Arizona midterm elections, that achievement is at risk, as Lewis and her colleagues with Save Our School Arizona have successfully pushed a referendum onto the ballot, Proposition 305, that lets Arizona voters decide the fate of the bill. Should the initiative fail, the Koch brothers’ plan to expand vouchers would be defeated.

Arizona Democrats running for office, including Democratic gubernatorial candidate David Garcia, who is taking on Ducey, have embraced opposition to the voucher program and thrown their support behind teachers who are calling for more funding of public schools.

Should pro-education candidates win, and Prop 305 go down in flames, the teachers would have led a remarkable campaign that not only would be a victory for public schools but also would threaten to topple the Koch brothers’ political empire in the Grand Canyon State.

Before There Was #RedforEd

“The teachers’ protest movement, which calls itself #RedforEd, has transformed the political battleground” in Arizona, says an article in the New York Times.

The weeklong walkouts that happened earlier this year demanded higher teacher pay and more funding for schools. #RedforEd not only won concessions from Ducey and the state legislature; it culminated in placing a referendum on the ballot, called InvestInEd, that would have raised income taxes on individuals and households earning more than $250,000 and directed the increased revenues to public schools. However, the State Supreme Court struck the initiative from the ballot, for technical questions about its wording.

But months before there was #RedforEd, there was the fight against school vouchers.

After Lewis and her colleagues watched the statewide voucher expansion pass in the Arizona capitol, they began to meet regularly and formed Save Our Schools Arizona. At first, their effort to overturn the legislation got few supporters, Lewis recalls, even among teachers. Few understood that “scholarships” is just another word for “vouchers” and that “empowerment” actually means parents have to give up the right for their children to receive a free public education.

The “turning point,” according to Lewis, was the revelation that citizens could use a petition campaign to refer legislation to a ballot. That gave anti-voucher advocates a specific goal and steps—how many signatures they’d need and how many volunteers they’d need to recruit to circulate the petitions.

A Costly Program for Wealthier Families

Also aiding to their communications effort was an accumulation of evidence of how poorly the voucher program measured up to its purported intention to “save” low-income families from “failed” public schools.

Most of the students who participate in the program, 70 percent, come from some of the state’s most highly rated schools—rated A or B on the state report card. Only 7 percent of the money is being used by students leaving D- or F-rated schools. The majority of these families are also not low-income, but instead reside in the wealthier suburban communities in the state.

Other analyses have found that the vast majority of parents participating in the program use the money to pay for private school tuition. Given that most private schools in Arizona are religious schools, a reasonable conclusion is that the education saving accounts are mostly subsidizing wealthier families’ desires to leave public schools to seek out religious educations for their children.

Furthermore, since the average payout from the voucher program is $5,700 per year for children without disabilities, and the average private school tuition in Arizona is $6,126 for elementary schools and $19,162 for high schools, the vouchers are supplementing parents, who may already be able to afford private schools, with a “coupon” that heavily discounts the tuition. Families of students with disabilities, who receive $19,000 in voucher money on average, could even be “profiting” from the program, as there is very little to no monitoring of how they spend from the accounts.

Currently, Arizona’s voucher program drains $141 million from the public school system, and in fact, costs the state an additional $62 million each year—roughly $4,700 per student, adding 75 percent more to what the state pays to educate a regular public school student.

Kochs vs. ‘a Bunch of Volunteers’

Armed with information about how the voucher program was defrauding the state of millions of education dollars, the SOS Arizona team formed their campaign to get 75,321 signatures to place Prop 305 on the ballot.

“We did most of our outreach through social media,” recalls Sharon Kirsch, another leader in SOS Arizona. “SOS never had any money.”

Kirsch, a university professor, became interested in overturning the voucher expansion after she saw the bill zoom through the State Senate without serious consideration of what the expansion would do to public schools. Its sponsor was former State Senator Debbie Lesko—a recipient of large campaign donations from the Koch brothers and other conservative donors—who now sits in Congress and is up for reelection in November. Lesko is also Arizona state chairman for ALEC.

Relying on a network of volunteers—made up mostly of retired educators, parents, and community activists—SOS Arizona submitted 111,540 signatures in August 2017.

After SOS Arizona announced it had successfully gathered more than enough signatures to place the referendum on the ballot, the Koch network intervened again. On the night SOS delivered the signatures for review by the secretary of state’s office, Lewis recalls, they were told “both sides” would be allowed to be present at the review. Who was the other “side”?

“All of a sudden all these men in dark suits came into the room,” says Lewis. “They paired up with each examiner from the state and hovered over their shoulders, pointing to signatures they felt should be challenged or thrown out.”

The “suits” were from Americans for Prosperity, a right-wing pressure group that operates as a political arm of the Koch brothers to advocate and lobby at state and local levels for small government, deregulation, privatization, and anti-labor union policies.

“When I investigated what these right-wing organizations were doing to oppose us,” Kirsch explains, “I realized how strategic they’ve been. They’ve been working on their privatization efforts for years. They fund teams to work full-time on the issues. They’re breeding their own PhDs through academic centers they sponsor. And we just have a bunch of volunteers.”

Americans for Prosperity, along with the American Federation for Children, formerly led by Secretary DeVos, sued to block the referendum. But in January 2018, a judge dismissed the lawsuit.

In the meantime, Governor Ducey was meeting with donors in the Koch network, pledging to go big on passing Prop 305 and asking for their support. “This is a very real fight in my state,” he said. “I didn’t run for governor to play small ball.”

“In 2018, Koch donors see Arizona as ground zero in their push,” the Washington Post reports, and Koch brothers’ money has continued to pour into the state through Americans for Prosperity and the Libre Institute, an astroturf group spending “hundreds of thousands of dollars,” according to a local news outlet, “targeting Arizona Latino families with ads, mailers and phone calls” urging them to vote “yes” on Prop 305.

“We had to bring in Spanish-speaking volunteers to counter the propaganda being spread by the Koch Brothers’ Libre group,” says Kirsch. “We reached out to community organizations like LUCHA (Living United for Change in Arizona),” an Arizona-based grassroots group advocate for social and economic justice in the Latinx community. “They’ve been very helpful in spreading our literature,” Kirsch says.

In addition to its stealth campaign in the Latinx community, supporters of school vouchers also created a #YesforEd campaign that mimics the logo of the teachers’ #RedforEd campaign—a blatant attempt to mislead voters about the initiative and convince them to vote yes.

“This is the lowest of the low when it gets to political dirty tricks,” says Dawn Penich-Thacker of SOS Arizona. “They are obviously trying to mimic #RedforEd,” and create the false impression that a “yes” vote on Prop 305 supports teachers and public-school funding, when it would in fact do the exact opposite.

‘Education Is the Driving Issue’

While SOS Arizona has tried to keep its effort to block voucher expansion nonpartisan, its cause has champions running for office in the Democratic Party.

In the race for governor, Democratic candidate David Garcia is stridently opposed to the voucher expansion and urges voters to vote no. Should Garcia win, he would be the state’s first Latinx governor, but education issues could be what propels him over the top.

“A change in education is Arizona’s No. 1 issue,” Garcia said in a televised debate. “It is my strength, it is Ducey’s weakness, and it’s going to be the difference.”

Ducey has extended his small lead in recent polls, but Garcia insists the surveys likely miss a rising new electorate in the state that includes Latinx voters and teachers and pro-education voters energized by #RedforEd and the presence of Prop 305 on the ballot.

Someone with insights on both those issues—the rising power of Latinx voters and the significance of education in the Arizona elections—is Alex Gomez, the co-executive director of LUCHA.

She tells me LUCHA recently completed an effort to register over 20,000 new voters in the Latinx community and is now canvassing them to ensure they vote. Working with other like-minded organizations, LUCHA’s goal is to turn out 190,000 new voters from the Latinx community in the midterm elections.

LUCHA supported the educators who walked out of schools statewide this spring. “The midterms caught its wind after the teacher strike,” says Gomez. “That moment when there were 75,000 people at the capitol was a big part of building momentum. It became so clear that the legislature is more interested in their corporate donors than in doing the right thing for education and moving the state forward.”

Gomez expects its support for Garcia’s pro-education platform and opposition to Prop 305 will energize new voters, particularly those in the Latinx community who “are very grateful because no one has ever come to them before.”

“Education is the driving issue in Garcia’s campaign,” she says, and “we’re encouraging voters to vote against 305.

In many down-ballot races, Democratic candidates are uniting around education and opposition to Prop 305. In the race to unseat Debbie Lesko in U.S. House District 8, Hiral Tipirneni has drawn a sharp contrast to the Republican incumbent on education, calling Lesko, “the ringleader behind the infamous voucher bill, which takes our tax dollars out of public schools and uses them to pay for private school tuition.” Tipirneni nearly defeated Lesko in a special election in April.

In state legislative races, two Democratic candidates and LUCHA endorsees, Raquel Terán, running in Legislative District 30, and Gilbert Romero, in LD 21, are canvassing and phone-banking on Prop 305 and urging voters to vote no.

‘No Hiding Behind the Curtain’

Those leading the opposition to Prop 305 hope to do more than just defeat the bill; they want to expose the corrupt network behind the effort to privatize Arizona public schools and change the conversation about what would truly help education in the state.

“Teachers are carrying the torch against privatization in ways they never did before,” says Lewis. “They have a level of understanding of the issues I’ve never seen before.”

“Even if we defeat 305, I know folks at Goldwater are already crafting a new bill to replace the voucher bill with something else,” says Kirsch. “But people are paying attention in ways they never have in the past. They’re changing the conversation to making public schools the priority instead of all these other schemes that take money away from them.”

“We’re leaving everything out on the field and are really hopeful about the results,” says Gomez. “Even before election day, we’ve already won because we’ve exposed the corruption of the Republican Party. There’s no hiding behind the curtains anymore.”

elaine November 2, 2018

           Comment on Supercon Badge Hackers Racing The Clock by Nobody       Cache   Translate Page      
Is anyone else worried about the proximity of the food and drink to the soldering equipment?
          The Girl in the Spider’s Web Saddles Lisbeth Salander With a Rote Doomsday-Device Plot      Cache   Translate Page      

I’ll confess that I’ve never quite gotten the appeal of Lisbeth Salander. On paper, the titular character in Stieg Larsson’s The Girl With the Dragon Tattoo books — a queer club-going hacker who rides a motorcycle and kills rapists — sounds like a proper 21st-century James Bond. But in David ... More »

          Na internetu koupil údaje k bankovním kartám: „Vysát“ z nich měl tři miliony      Cache   Translate Page      
Tři mladíci měli podle obžaloby nakoupit údaje ke stovkám bankovních karet a z účtů jejich majitelů převedli přes tři miliony korun. Organizátor podvod sice u soudu nepopírá, ale tvrdí, že si přišli maximálně na milion a půl… Údaje ke kartám koupil na internetu!
          Aumentan el gasto para combatir a los hackers      Cache   Translate Page      

          Facebook admits it didn't do enough to prevent 'offline violence' in Myanmar      Cache   Translate Page      

A night before the U.S. midterm elections, Facebook has dropped an independent report into the platform's effect in Myanmar.

The report into Facebook's impact on human rights within the country was commissioned by the social media giant, but completed by non-profit organization BSR (Business for Social Responsibility).

SEE ALSO: Private messages from 81,000 Facebook accounts were put up for sale by hackers

And it affirms what many have suspected: Facebook didn't do enough to prevent violence and division in Myanmar.

"The report concludes that, prior to this year, we weren’t doing enough to help prevent our platform from being used to foment division and incite offline violence. We agree that we can and should do more," Facebook's product policy manager Alex Warofka wrote in a statement. Read more...

More about Tech, Facebook, Social Media, Human Rights, and Myanmar
          Comment on World News (November 2, 2018 Edition): “Swift And Severe”: Trump Administration Readies Its Best Hackers For Cyberattack Against Russia – ‘Migrant Caravan’ Members Sue Trump Over ‘Shockingly Unconstitutional’ Asylum Crackdown – After 17 years of war, top US commander in Afghanistan admits Taliban cannot be defeated – Russia’s gold reserves smash Soviet-era record as part of Moscow’s de-dollarization drive – Trump to reinstate all US sanctions on Iran, targeting      Cache   Translate Page
          Comment on World News (November 2, 2018 Edition): “Swift And Severe”: Trump Administration Readies Its Best Hackers For Cyberattack Against Russia – ‘Migrant Caravan’ Members Sue Trump Over ‘Shockingly Unconstitutional’ Asylum Crackdown – After 17 years of war, top US commander in Afghanistan admits Taliban cannot be defeated – Russia’s gold reserves smash Soviet-era record as part of Moscow’s de-dollarization drive – Trump to reinstate all US sanctions on Iran, targeting      Cache   Translate Page What Engineers Found When They Tore Apart Tesla's Model 3
          Comment on World News (November 2, 2018 Edition): “Swift And Severe”: Trump Administration Readies Its Best Hackers For Cyberattack Against Russia – ‘Migrant Caravan’ Members Sue Trump Over ‘Shockingly Unconstitutional’ Asylum Crackdown – After 17 years of war, top US commander in Afghanistan admits Taliban cannot be defeated – Russia’s gold reserves smash Soviet-era record as part of Moscow’s de-dollarization drive – Trump to reinstate all US sanctions on Iran, targeting      Cache   Translate Page MASS IMMIGRATION TURNS YOUR COUNTRY INTO THEIR COUNRY. THEIR CULTURE BECOMES YOUR CULTURE @6.00
          Tuesday Twitter roundup      Cache   Translate Page      

Judgment day has arrived:

If you've already voted, take some time to talk to folks at your precinct. If you haven't voted yet, do that first and then talk to people.

I'm pretty sure there is no other demographic that can be so wildly different than "retired," when it comes to donations. A good half of the rich-ass donor class identifies as such, at least the wives do anyway. Who are frequently used by their rich husbands to get around the campaign limits. And then there are the fifty dollar folks (like me), where it takes a hundred of us to equal one $5,000 check. All that said, I'm for any shift to the Democrats, however slight or ambiguous that shift may be.

And if you're like me and the first thing that popped into your head was Jay F**king DeLancy, you win a kewpie doll:

Asked about whether it might be misleading to suggest photo ID could stop hackers, Voter Integrity Project director Jay DeLancy declined to elaborate.

"The Democrats think that the Russians are cheating, and Republicans think Democrats are cheating. We just hate cheating. So we wanted to stop cheaters any which way we could," he said. "I think voter ID will solve a certain type of voter fraud."

And before you ask, no, I don't know what a kewpie doll is. I'm not that old, for god's sake! It's just one of those stupid things you (and by you I mean me) say, because you've heard it before.

I don't know, looks a little bitey...

Got to be close to 500 years of experience at that table. Sorry, it was very "ageist" of me to make fun of those dinosaurs...Dammit! I did it again...

The only plausible reason such a jerk would get elected once (much less three times) is the 2011 Gerrymandering...

I have talked to at least ten different teachers that said the same thing: The roof leaks when it rains. And the evil stepsister of a leaking roof is toxic mold, which is one of the most dangerous things your kids can encounter. We must do better.

More right-wing bullshit. These idiots will believe anything.

More misleading nonsense. The "eviscerate" memo came out long before Rick Glazier took over the NC Justice Center. Also, it's a testament to your lack of substantial evidence of wrongdoing that you have to keep harping about a non-issue that happened five years ago. Give it a rest, it makes you look foolish.

Thanks for the reminder. I bought a fancy new rainjacket to break in while I'm working at our precinct today. Which has absolutely no covered areas for me to shelter under. *sigh*

On that soggy note, here's your Onion:

Yeah, I am not looking forward to it. Does that make me an "establishment" Democrat or an intrepid "change agent" Democrat? Just practicing...


          Creating a Cyber false flag?      Cache   Translate Page      

The New York Times reported that the US Cyber Command has launched the first operation against Russia.

According to the newspaper, it will take the form of communications, by which the Americans plan to convince ”the Russian hackers” to stop that notorious “interference in the US internal affairs”.

Be sure to hit the 'cc' in lower right-hand corner of the video if subtitles don't appear.
          Großbank HSBC räumt Hacker-Angriff ein      Cache   Translate Page      
Unbekannte greifen offenbar per Brute-Force-Angriff auf Online-Konten zu. Sie erbeuten persönliche Daten, jedoch offenbar kein Geld. HSBC verbessert als Folge die Authentifizierung für seine Online-Konten.
          RECENZE: Nová tvář i styl. Dívka v pavoučí síti se pere s bondovkou      Cache   Translate Page      
Počítačová kouzelnice Lisbeth Salanderová, proslavená krimisérií Milénium, dostala ve filmu Dívka v pavoučí síti novou tvář Claire Foyové i novou stylizaci akční superhrdinky.
          Scammers Use Name of Elon Musk to Fleece Twitter Users      Cache   Translate Page      

Scammers have again abused Tesla CEO Elon Musk popularity to fleece Twitter users after hacking several popular accounts. British fashion retailer Matalan, film distributor Pathe UK and US publisher Pantheon Books were among those whose accounts were taken over by scam artists, the BBC reported on Monday. The hackers used Elon Musk name and likeness [...]

The post Scammers Use Name of Elon Musk to Fleece Twitter Users appeared first on NewsGram.

          2018-11-06のJS: Node.js 10.13.0(LTS)、React Hooks、Vueコンポーネントのテスト      Cache   Translate Page #408 - Node.js 10.13.0がリリースされました。

このリリースでNode.js 10.xがLong Term Support (LTS)となりました。
Node.js 10.xは2021年4月までサポートされます。

これを受けてApp Engineでは、Node.js 10をサポートしています。

Making Sense of React Hooks – Dan Abramov – Mediumという記事では、React v16.7.0-alphaで導入された"Hooks"のProposalについて書かれています。


1年間単体テストを書き続けた現場から送る Vue Component のテスト / Vue Component Test - Speaker DeckのスライドではVueコンポーネントのテストについて書かれています。

ライフサイクル、Props/Vuex State、User Interactionの3種類に分けてテストの方法について紹介されている。


Release v2.1.0 · facebook/create-react-app

React Tools ReleaseNote

create-react-app 2.1.0リリース。
create-react-app my-app --typescriptでTypeScriptプロジェクトとして作成できるようになった。

Video.js 7.3: Responsive Layout, Fill Mode, createLogger | Video.js Blog

video JavaScript library ReleaseNote

video.js 7.3リリース。
Fill Modeをplayer modeに格上げ、createLoggerメソッドの追加など

Node v11.1.0 (Current) | Node.js

node.js ReleaseNote

Node.js 11.1.0リリース。

Read Me - Squirrelly

JavaScript library


Node v10.13.0 (LTS) | Node.js

node.js ReleaseNote

Node.js 10.13.0リリース。 Node.js 10.xがLong Term Support (LTS)となり、2021年4月までメンテンスされる。

V8 release v7.1 · V8

V8 ReleaseNote

V8 v7.1リリース。
パフォーマンスの最適化、WasmでpostMessageをサポート。Intl.RelativeTimeFormatのサポート、globalThis Proposalをサポートなど


Making Sense of React Hooks – Dan Abramov – Medium

React article opinion proposal

React v16.7.0-alphaで導入された"Hooks"のProposalについて。


Node.jsにおけるprototype汚染攻撃への対策 - SSTエンジニアブログ

JavaScript security article

Prototype pollution攻撃への対応方法について。

Build a Bucket List Travel App with React and Material-UI (part 0) | appendTo

tutorial React article

ReactとMaterial UIを使ってトラベルウェブアプリを作る連載。

Reactで開発するチームが共通認識しておきたい重要な概念 - KitchHike Tech Blog

React redux article 設計 opinion

SFC、Flux/Redux、Context API、Renderパターン、SuspenseとHooksなどのトピックごとに解説とどのような方針をもって進めたかについて書かれている。


[JAPANESE] Why vue-cli needed a UI and what you can do with it

Vue console Tools slide

Vue CLIについてのスライド。
Vue CLIは"Ease of Access"のために様々な機能をもっている。
ビルドツールチェイン、vue ui、プラグインシステムについて。

1年間単体テストを書き続けた現場から送る Vue Component のテスト / Vue Component Test - Speaker Deck

Vue slide testing

ライフサイクル、Props/Vuex State、User Interactionのテスト方法などについて


Web Performance 101: JS, CSS, HTTP, images & fonts | PerfPerfPerf

performance slide browser



gruns/irondb: A relentless key-value store for the browser.

JavaScript browser library

Cookie、IndexedDB、LocalStorageなどを重複して保存できるKey Valueストアライブラリ。

frontarm/async-javascript-cheatsheet: Cheatsheet for promises and async/await

JavaScript Promises チートシート



WebComponents library TypeScript jsx

Web Componentsフレームワークとコンパイラー。フレームワークに則ったコンポーネント
を書きWeb Components(Custom Elements)へコンパイルするツール。

chunqiuyiyu/ervy: Bring charts to terminal.

node.js グラフ library

Bar, Pie, Bullet, Donut, Gauge, Scatterなどのグラフを描画できる

GoogleChromeLabs/carlo: Web rendering surface for Node applications

Chrome Electron library node.js


          Seven Gigantic Influences Of Wedding Banquet Hall | wedding banquet hall      Cache   Translate Page      

weddingbest posted a photo:

Seven Gigantic Influences Of Wedding Banquet Hall | wedding banquet hall

via WordPress

Thackers Caterers, which runs a accepted eponymous restaurant and a feast anteroom from the bounds of above cultural centre Birla Kreeda Kendra in Girgaum Chowpatty, has allegedly been operating illegally for the accomplished six years.

Its leave and licence acceding accomplished on September 30, 2012, and the BMC has allegedly fabricated no attack to renew it since. Besides, as per the aboriginal agreement, Thackers Caterers can alone run a cafeteria on the premises. Today, its beach feast anteroom and restaurant are alike with absurd functions.

They declared that today, admitting accepting no authorisation, it consistently rents out its feast anteroom for bells receptions and altogether parties as able-bodied as offers accouterment casework at ample rates. Mirror is in control of a hardly anachronous menu, whose prices alpha at Rs 950 per plate, as able-bodied as a archetype of the agreement and altitude of accouterment contracts.

Last year, the burghal beneficiary had asked Thackers to aftermath all permissions accepted to it to run the business on a amplitude meant for accessible use.

Deputy Municipal Commissioner (zone 1) Kishor Kshirsagar and Additional Municipal Commissioner Vijay Singhal did not acknowledge to calls and a argument message. Additional Municipal Commissioner AL Jarhad said he was not accustomed with the issue.

(Clockwise from top) Thackers runs from the bounds of above cultural centre Birla Kreeda Kendra in Girgaum Chowpatty; an earlier ‘rate’ agenda for accouterment casework at functions

Seven Gigantic Influences Of Wedding Banquet Hall | wedding banquet hall – wedding banquet hall
| Allowed to help my own weblog, within this time period We’ll show you regarding keyword. And after this, this can be the 1st impression:

Banquet Halls | Joy Studio Design Gallery – Best Design – wedding banquet hall | wedding banquet hall

How about photograph previously mentioned? will be in which amazing???. if you think maybe so, I’l m demonstrate some photograph again below:

So, if you wish to acquire all these incredible photos about (Seven Gigantic Influences Of Wedding Banquet Hall | wedding banquet hall), just click save button to store these images to your pc. They’re ready for down load, if you want and want to take it, click save symbol on the page, and it will be immediately down loaded to your home computer.} Finally in order to find unique and the latest picture related with (Seven Gigantic Influences Of Wedding Banquet Hall | wedding banquet hall), please follow us on google plus or book mark this website, we try our best to present you daily up-date with all new and fresh photos. We do hope you like staying here. For most up-dates and latest news about (Seven Gigantic Influences Of Wedding Banquet Hall | wedding banquet hall) graphics, please kindly follow us on tweets, path, Instagram and google plus, or you mark this page on bookmark section, We try to give you up-date regularly with fresh and new images, like your surfing, and find the perfect for you.

Here you are at our website, contentabove (Seven Gigantic Influences Of Wedding Banquet Hall | wedding banquet hall) published . Today we’re pleased to announce we have found an awfullyinteresting contentto be reviewed, that is (Seven Gigantic Influences Of Wedding Banquet Hall | wedding banquet hall) Many individuals attempting to find specifics of(Seven Gigantic Influences Of Wedding Banquet Hall | wedding banquet hall) and of course one of them is you, is not it?

Cheap (Cute) Wedding Decoration Ideas – wedding banquet hall | wedding banquet hall

white marquee – large party marquee for sale – luxury … – wedding banquet hall | wedding banquet hall

Ideas For Wedding Skits Ehow Ehow How To Discover | Party … – wedding banquet hall | wedding banquet hall

Gallery: Our Rooms | Concorde Banquets – wedding banquet hall | wedding banquet hall

Contemporary Event & Wedding Venues in Glendale, CA – Glenoaks Ballroom – wedding banquet hall | wedding banquet hall

Weddings – wedding banquet hall | wedding banquet hall

Ceremony Banquet Hall Thane, Mumbai | Banquet Hall … – wedding banquet hall | wedding banquet hall

P1010598 – wedding banquet hall | wedding banquet hall

Pasadena Wedding Venue Video | Imperial Palace Banquet Hall – YouTube – wedding banquet hall | wedding banquet hall

13+ Event Order Templates – Free Sample, Example, Format … – wedding banquet hall | wedding banquet hall

Affordable Wedding Banquet Hall Chicago Ballroom Rental WEDDINGS … – wedding banquet hall | wedding banquet hall

Affordable Wedding Venues in Houston | Azul Reception Hall – wedding banquet hall | wedding banquet hall

Birmingham, AL Wedding, Party and Conference Venue | Woodrow Hall – wedding banquet hall | wedding banquet hall

Couples room decor, banquet hall for wedding reception set … – wedding banquet hall | wedding banquet hall

arlington hall wedding reception floral lighting | holly … – wedding banquet hall | wedding banquet hall

The post Seven Gigantic Influences Of Wedding Banquet Hall | wedding banquet hall appeared first on Wallpaper Wedding.

          Canadian University Schooled by Crypto Hackers      Cache   Translate Page      

St Francis Xavier University in Canada recently came under attack by hackers, forcing a week-long network shutdown on campus. The hack began on November 1st, according to broadcaster Malware took over the network as so-called ‘cryptojackers’ used the school’s electricity and hardware to illegally mine cryptocurrencies. By Nov. 4th most services were up and […]

The post Canadian University Schooled by Crypto Hackers appeared first on Bitcoin Australia.

          You've Been Applying Band-Aids Wrong Your Entire Life      Cache   Translate Page      

Scrapes and cuts happen. Whether you're working outdoors or simply wrapping a birthday present, it's easy to find yourself in need of a band-aid. Sometimes it can be tricky to know the best way of applying your band-aid so it won't come off or leave your injury unprotected. Thankfully, YouTube user CrazyRussianHacker is at it again. He […]

The post You've Been Applying Band-Aids Wrong Your Entire Life appeared first on Wide Open Country.

          10 отличных игр, которые сперва сильно разочаровали фанатов      Cache   Translate Page      
Отличные игрыДайте этим проектам второй шанс, и они обязательно вас порадуют.
          ТЕСТ:​ ​​Что это за чудо природы? Определите по фото!      Cache   Translate Page      
На нашей планете много красивых природных локаций. Проверьте, сколько из них знаете вы.
          29 фраз, которые мешают вам жить      Cache   Translate Page      
Фразы которые мешают житьДаже на то, что пишут в умных книгах, нужно смотреть скептически.
          AliExpress: самые интересные находки за неделю      Cache   Translate Page      
AliExpress: самые интересные находки за неделюСамое необычное, забавное и дешёвое, что Лайфхакер нашёл на просторах торговой интернет-площадки AliExpress за прошлую неделю.
          30 вещей, которые я поняла к 30 годам      Cache   Translate Page      
30 вещей, которые я поняла к 30 годамПростые правила жизни, о которых многие забывают.
          22 советских мультфильма, которых мы все жутко боялись в детстве      Cache   Translate Page      
22 советских мультфильма, которых мы все жутко боялись в детствеПо сравнению с героями этих мультфильмов даже монстр под кроватью кажется милой и доброй зверюшкой. Лайфхакер составил подборку из самых пугающих и страшных советских мультиков, чтобы вы могли поностальгировать и пощекотать себе нервишки.
          Как сохранить все пароли из Chrome и перенести их в сторонний менеджер      Cache   Translate Page      
Как сохранить все пароли из Chrome и перенести их в сторонний менеджерВ последних версиях браузера Google можно сохранить все пароли в Excel-файл и затем с лёгкостью импортировать его в другое приложение.
          Почему цифровой детокс — бредовая идея      Cache   Translate Page      
цифровой детоксЕсли соцсети беспощадно пожирают ваше время, проблема не в них. Проблема в вас.
          Misión: la conservación histórica de las emisiones de radio grabando todo el espectro las 24 horas del día      Cache   Translate Page      

La gente que está detrás de Spectrum Archive, con Thomas Witherspoon a la cabeza, está trabajando en un colosal proyecto consistente en preservar el espectro de radio al completo a lo largo del tiempo. Para entenderlo sería como crear un archivo de las emisiones de una emisora de radio grabándola las 24 horas del día… pero con todas las emisoras de radio a la vez, grabando las frecuencias del espectro electromagnético en que operan las emisoras. De este modo cualquiera podría en el futuro acceder al archivo, elegir un día y una hora y escuchar qué se estaba emitiendo en ese momento en cualquier emisoras. Sería una especie de «máquina del tiempo» para la radio.

Esta «magia» se hace utilizando una aplicación llamada Software Defined Radio que en apariencia es como un sintonizador normal y corriente y toma como fuente los datos en brutos de la grabación del espectro. El software de la demo se llama HSSDR y su página web puede encontrase además una lista del hardware en forma de receptores de radio y antenas más adecuados para grabar el espectro al completo desde cualquier lugar – dado que las emisiones tienen cierto alcance y de un sitio a otro cambian las emisoras que pueden recibirse. Los aficionados solían llevan décadas haciendo estas grabaciones en todo el mundo en el más puro estilo hackeril: para encontrar «cosas interesantes», descubrir nuevas emisoras y cosas así.

La misión del Spectrum Archive es grabar todo el espectro para la posteridad –idealmente de forma colectiva y en diferentes lugares– en especial durante momentos críticos, por ejemplo cuando se producen eventos importantes o históricos por cualquier razón. Luego hay que preservar toda esa información e incluso poco a poco se pueden ir curando e integrando grabaciones antiguas de hace años o décadas (la demo es del 1 de mayo de 1986, el día del desastre de Chernobyl, cuando empezaban a filtrarse las noticias).

Finalmente la idea sería liberar ese contenido para que cualquiera pudiera usarlo: historiadores, investigadores y público en general. Según cuentan en Spectrum, que es donde descubrí este proyecto, están trabajando con otros modernos héroes de la Internet, la gente de The Internet Archive, para colaborar en esta labor.

Como es fácil de imaginar, tamaña misión tiene sus problemas. El primero es de almacenamiento: una grabación de 60 minutos de todo el espectro de radio de la banda AM (500-1700 kHz) ocupa unos 60 GB por hora; eso son casi 1,5 terabytes diarios. Esto es caro y preservarlo para el futuro, más todavía. Además a día de hoy no hay un sólo estándar o forma de grabar todo el espectro, aunque aseguran estar trabajando ya en software específico para ello y documentando todo el trabajo.

Desde luego es un trabajo encomiable, digno de Hércules, que sin duda será muy apreciado por generaciones futuras, en especial consiguen que el público pueda acceder, colaborar con nuevas grabaciones y ampliar el registro a todo el espectro de señales públicas (AM, FM, TV) que atraviesan el aire hasta llegar a nuestros receptores.

# Enlace Permanente

          The Pirate Bay Like 9 Best Torrent Sites (Updated Nov 2018)      Cache   Translate Page      
The Pirate Bay torrent search engine is one of the world's most famous and best torrent sites. But it has been caught second time mining digital currencies using visitors' computers. Like many popular torrent sites, the pirate bay also uses mining to make money without informing its users. But this time a tiny message on its homepage clarifies some terms of service but gives no option to

          It looks like the smash-hit game that paved the way for 'Fortnite: Battle Royale' is finally coming to PlayStation 4 (SNE)      Cache   Translate Page      

playerunknown's battlegrounds

  • It looks like "PlayerUnknown's Battlegrounds," the game whose success paved the way for "Fortnite: Battle Royale," is coming to the PlayStation 4.
  • The game hasn't officially been announced, but files for the game are present in the PlayStation 4 game database, and the online PSN store.
  • "PUBG" is one of the most popular action games on PC, but it's been console exclusive to the Xbox One for the past year.

It looks like "PlayerUnknown's Battlegrounds," the game that is largely credited with sparking the popularity of battle royale shooting games like "Fortnite: Battle Royale," is set for release on PlayStation 4.

While Bluehole, the game's developer, has yet to confirm a PS4 release date, fans have discovered files on PlayStation 4 consoles and in Sony's online PlayStation Network store. Last month the South Korean Game Rating and Administration Committee leaked ratings for a PlayStation 4 version of the game as well. A representative for the game declined to comment. 

"PlayerUnknown's Battlegrounds," or "PUBG," was officially released on PC in May 2017 and has been console exclusive to the Xbox One since December 2017. The game was in Microsoft's Xbox Game Preview program until September 4th, when version 1.0 was officially released. The mobile version of the game is also one of the most popular video games in China.

Read more: The company behind 'PlayerUnknown's Battlegrounds' has reportedly dropped its lawsuit against the wildly popular 'Fortnite'

Like "Fortnite: Battle Royale" and other games that it inspired, "PlayerUnknown's Battlegrounds" throws 100 players onto a single map with scattered resources. Players need to find weapons and items to defend themselves as the safe areas of the map begin to shrink. The last player or team surviving at the end of the round is the winner.

Though "PUBG" helped pioneer the battle royale genre, the game has seen its star wane, even as rivals like "Fortnite" have skyrocketed to success and challengers like "Call of Duty's" Blackout and "Battlefield V's" Firestorm continue to crop up. and. "PlayerUnknown's Battlegrounds" has a smaller development team than those games and has struggled to keep up with the demands of a massive community.

In November of 2017, "PUBG" was averaging 1.3 million players each day, according to SteamCharts, which tracks players on Steam, the most popular platform for PC games. The average number of daily "PUBG" players has since dwindled to about 450,000 over the last 30 days.

Still, "PlayerUnknown's Battlegrounds" remains one of the three most popular games on Steam by a wide margin, alongside "Dota 2" and "CounterStrike: Global Offensive." 

With "PUBG" available on multiple platforms, players are wondering if Bluehole will be able to implement cross-platform play. Earlier this year "Fortnite" became the first game to offer cross-platform play between the Xbox One, PlayStation 4, Nintendo Switch, PC, and mobile devices. Bluehole has expressed interest in allowing cross-platform play in the past, but nothing has been confirmed.

"PlayerUnknown's Battlegrounds" is currently available on PC and Xbox One for $29.99. This hypothetical PS4 version will likely carry a similar price.


SEE ALSO: The new 'Call of Duty' has a surprisingly fantastic Battle Royale mode aimed directly at 'Fortnite'

SEE ALSO: The company behind 'PlayerUnknown's Battlegrounds' has reportedly dropped its lawsuit against the wildly popular 'Fortnite'

Join the conversation about this story »

NOW WATCH: A cybersecurity expert showed us how hackers can tap into an office phone and listen to everything you're saying

          Thế giới Di động phủ nhận 5 triệu thông tin khách hàng bị hacker tấn công      Cache   Translate Page      

          Fallout 76: Bethesda bestätigt Sicherheitsprobleme der PC-Version      Cache   Translate Page      
Auf Reddit kamen Bedenken von Spielern bezüglich der PC-Version von Fallout 76 auf. Diese ist angeblich wenig gegen Hacker gesichert. Bethesda stimmte sogar zu und erklärte, dass es tatsächlich ein paar Probleme gibt, an denen noch gearbeitet werden…
          Почему круговые тренировки принесут вам больше пользы за меньшее время      Cache   Translate Page      

Что такое круговая тренировка

В круговой тренировке вы подряд выполняете несколько упражнений на разные группы мышц, а потом начинаете сначала. При этом отдых между подходами минимальный или вообще отсутствует.

Например, вместо того чтобы делать 3 подхода по 10 отжиманий, 3 подхода по 20 приседаний и 3 подхода по 20 скручиваний, вы 10 раз отжимаетесь, потом 20 раз приседаете, 20 раз скручиваетесь, отдыхаете 1–2 минуты, а затем повторяете всё ещё 2 раза.

В обычной тренировке отдых между подходами необходим: утомлённым мышцам надо отдохнуть, иначе вы не закончите подход. В круговой системе отдых не обязателен, ведь каждый новый подход задействует другую группу мышц.

Чем полезны круговые тренировки

Экономят время

За счёт короткого отдыха вы успеваете сделать больше за меньшее время. Например, если ваша тренировка состоит из 5 силовых упражнений по 3 подхода каждое, вы потратите на неё около 43 минут и 28 из них будете отдыхать между подходами. Сократив отдых до 30 секунд в круговой тренировке, вы управитесь со всеми упражнениями за 22 минуты.

Прокачивают дыхалку и сердце

За счёт небольшого отдыха или его отсутствия круговые тренировки одновременно прокачаютAcute Effects of Three Different Circuit Weight Training Protocols on Blood Lactate, Heart Rate, and Rating of Perceived Exertion in Recreationally Active Women и силу мышц, и VO2maxWhole-Body Aerobic Resistance Training Circuit Improves Aerobic Fitness and Muscle Strength in Sedentary Young Females — максимальное потребление кислорода, надёжный показатель аэробной мощности.

Помогают худеть

Высокий пульс на протяжении всей тренировки помогает быстроEffects of high-intensity circuit training, low-intensity circuit training and endurance training on blood pressure and lipoproteins in middle-aged overweight men снизить количество жира и увеличить мышечную массу.

Чем круговые тренировки отличаются от интервальных

Основной признак интервальной тренировки — чётко заданное время работы и отдыха либо работы с высокой и низкой интенсивностью. Пример: 30 секунд отжиманий, 30 секунд отдыха.

Круговая тренировка может стать интервальной, если вы зададите чёткие временные рамки работы и отдыха. Интервальная тоже может быть круговой, если в ней чередуются упражнения на разные группы мышц.

В то же время и круговая, и интервальная могут существовать отдельно друг от друга и сменяться в рамках одной тренировочной сессии. Например, вы можете начать с круговой тренировки (3 круга из 10 силовых упражнений на разные группы мышц) и закончить интервальным кардио (20 секунд спринта и 40 секунд бега трусцой в течение 5 минут).

Как составить круговую тренировку

1. Определите время тренировки

Благодаря круговой тренировке вы можете проработать все мышцы тела даже за 10–15 минут. Это прекрасный вариант, если у вас не хватает времени на полноценное занятие. Но если вы не торопитесь и хотите увеличить эффект, занимайтесь дольше — 30–60 минут.

На выполнение одного подхода из 10–25 повторений уходит в среднем от 30 до 120 секунд. Исходя из этого, вы можете найти общее время тренировки и определить, сколько в ней будет кругов и упражнений. Не забудьте посчитать время на отдых между упражнениями и кругами.

2. Поставьте цель

  • Если вам нужна только сила и гипертрофия мышц, но при этом не хватает времени, выполняйте силовые круговые тренировки без аэробных элементов. Если же времени у вас достаточно, откажитесь от круговой тренировки: мощность и силу мышц лучше прокачивать по стандартной схеме подходов и повторений.
  • Тем, кто хочет развить аэробную выносливость, стоит включить в круговую тренировку бег, прыжки через скакалку, упражнения на эллиптическом и гребном тренажёре. Вставьте небольшой интервал между силовыми упражнениями, и вы значительно улучшите аэробные возможности без дополнительных кардиотренировок.
  • Если вы хотите похудеть как можно скорее, выбирайте интенсивные интервальные круговые тренировки. Они наиболее эффективныEffects of three distinct protocols of fitness training on body composition, strength and blood lactate. для снижения жировой массы.
  • Тем, кто хочет похудеть, но при этом чувствовать себя комфортно, лучше чередовать круговые интервальные тренировки с днями спокойной аэробной нагрузки. Круговые интервалки очень утомительны, и, если делать их более двух раз в неделю, можно быстро потерять энтузиазм и удовольствие от спорта. Если вы разбавитеFunctional High-Intensity Circuit Training Improves Body Composition, Peak Oxygen Uptake, Strength, and Alters Certain Dimensions of Quality of Life in Overweight Women интервальные круговые сессии спокойной аэробной нагрузкой, тренировочная неделя станет куда комфортнее, а результаты будут лишь немного хуже, чем в случае исключительно круговых ВИИТ.

3. Выберите упражнения

Главный принцип круговой тренировки — чередование нагрузки на разные мышечные группы. Вы можете включить в одну тренировку несколько упражнений на одну группу мышц, но их нужно перемешать с упражнениями на другие мышцы, чтобы целевые группы успели отдохнуть.

Можете ориентироваться по:

  • частям тела: верх, низ и середина;
  • мышечным группам: грудь, спина, бицепс, трицепс, плечи, мышцы передней стороны бедра, мышцы задней стороны бедра, ягодицы, мышцы кора;
  • двигательным паттернам: тянуть, толкать, приседать, делать выпады, выполнять движения с хип хиндж — сгибание в тазобедренном суставе.

Какие круговые тренировки можно взять за образец

Лайфхакер составил две обычные круговые тренировки с оборудованием и без, а также одну высокоинтенсивную интервальную.

1. Интенсивная интервальная круговая тренировка

  • Время: от 10 минут.
  • Правила: в зависимости от своих возможностей выполните от одного до трёх кругов.

2. Круговая тренировка для дома

  • Время: 20 минут.
  • Правила: не отдыхайте между упражнениями, между кругами сделайте паузу в 90 секунд. Выполните три круга.

Воздушные приседания

Держите спину прямо, следите, чтобы колени не заворачивались внутрь, а пятки не отрывались от пола. Старайтесь приседать в полном диапазоне или хотя бы до параллели бёдер с полом. Повторите 20 раз.


Круговая тренировка для дома: Классическое отжимание

Грудью и бёдрами касайтесь пола, не расставляйте локти в стороны. Старайтесь подниматься с прямой спиной, без прогиба в пояснице. Если не получается, встаньте на колени или отжимайтесь от опоры. Выполните упражнение 10 раз.


Круговая тренировка для дома: Выпады

Если места достаточно, делайте выпады в движении, если нет — после каждого шага возвращайтесь назад. Следите, чтобы спина была прямой, а колено впереди стоящей ноги не выходило за носок. Сделайте по 10 раз на каждую ногу.


Круговая тренировка дома: Планка

Встаньте в упор лёжа, напрягите пресс и ягодицы, чтобы избежать прогиба в пояснице. Удерживайте положение 30 секунд.

Бег на месте

Бегите на носках, высоко поднимайте колени, помогайте себе руками. Выполняйте упражнение с максимальной интенсивностью 30 секунд.


В упоре лёжа по очереди подтягивайте колени к груди. Можете ставить стопу на пол или оставлять на весу, как на видео. Старайтесь удерживать таз на месте, не прогибайте поясницу. Выполните 20 раз.

Подъёмы ног лёжа

Круговая тренировка дома: Подъёмы ног

Исходное положение — прямые ноги в 20–30 см от пола. Поднимайте ноги до прямого угла с телом и опускайте обратно. Для удобства можете подложить руки под ягодицы. Не отрывайте поясницу от пола на протяжении всего упражнения. Выполните 10 подъёмов.

3. Круговая тренировка в тренажёрном зале

  • Время: 40 минут.
  • Правила: выполняйте упражнение одно за другим по 10 раз, вес — 50–70% от 1ПМ. Два последних упражнения — гиперэкстензию и складку на пресс — сделайте по 20 раз. Отдыхайте между упражнениями не более 30 секунд, между кругами — 1–2 минуты. Выполните три круга.

Жим лёжа

Круговая тренировка в тренажёрном зале: Жим лёжа

Лягте на скамью, прижмите стопы к полу. Возьмитесь за штангу прямым хватом шире плеч, опустите её до груди, а затем выжмите вверх.

Тяга верхнего блока к груди

Круговая тренировка в тренажёрном зале: Тяга верхнего блока к груди

Возьмитесь за рукоять узким обратным хватом, выпрямите спину, опустите плечи, сведите лопатки. Подтяните рукоять к груди, а затем вернитесь в исходное положение. При правильном исполнении вы почувствуете, как напрягаются широчайшие мышцы спины.

Разгибание ног в тренажёре или с эспандером

Круговая тренировка в тренажёрном зале: Разгибание ног в тренажёре или с эспандером

Это упражнение проще выполнять в тренажёре, но, если он занят или отсутствует, можно сделать и с эспандером. Зацепите эспандер за стойку на уровне щиколотки, накиньте петлю на ногу. В исходном положении нога согнута, эспандер натянут. Выпрямите ногу, а затем вернитесь в исходное положение и повторите. Двигается только голень, бедро и корпус зафиксированы.

Сгибание ног в тренажёре или с эспандером

Круговая тренировка в тренажёрном зале: Сгибание ног в тренажёре или с эспандером

Если выберете эспандер, зацепите его за стойку, накиньте петлю на ногу, отодвиньтесь подальше, чтобы натянуть резинку. Преодолевая сопротивление эспандера, старайтесь дотянуться пяткой до ягодицы.

Сгибание рук на бицепс плеча

Круговая тренировка в тренажёрном зале: Сгибание рук на бицепс плеча

Возьмите штангу обратным хватом, сгибайте и разгибайте руки. Если штанга занята, используйте гантели или нижний блок кроссовера.

Разгибание рук на трицепс в кроссовере

Круговая тренировка в тренажёрном зале: Разгибание рук на трицепс в кроссовере

Повесьте канатную рукоять, возьмитесь за концы прямым хватом, согните руки в локтях до прямого угла. Разгибайте руки и одновременно разводите концы канатной рукояти. Держите спину прямой, плечи — опущенными.

Жим ногами в тренажёре

Круговая тренировка в тренажёрном зале: Жим ногами в тренажёре

Лягте в тренажёр, руками возьмитесь за ручки, прижмите поясницу к спинке и не отрывайте до конца упражнения. Согните ноги под углом 90 градусов, а затем выпрямите их, толкая платформу вверх. Не разгибайте ноги полностью, чтобы не навредить коленным суставам.

Тяга штанги к подбородку

Круговая тренировка в тренажёрном зале: Тяга штанги к подбородку

Возьмите штангу прямым узким хватом. За счёт напряжения плеч доведите штангу до уровня ключиц. Локти при этом всегда находятся выше грифа. Следите за тем, чтобы штанга скользила вдоль тела, не наклоняйтесь вперёд.


Круговая тренировка в тренажёрном зале: Гиперэкстензия

Уберите руки за голову, поднимайте корпус до параллели с полом или чуть выше. Делайте размеренно, без рывков: так вы лучше нагрузите мышцы-разгибатели спины. Выполните 20 раз.

Складка на пресс

Круговая тренировка в тренажёрном зале: Складка на пресс

Согните колени под углом 90 градусов, подложите под спину свёрнутое полотенце или абмат, руки уберите за голову. Медленно поднимайте и опускайте корпус, можете на секунду задерживаться в верхней точке, чтобы получше нагрузить пресс. Сделайте 20 подъёмов.

Читайте также

          Как развить главный навык XXI века      Cache   Translate Page      

Все задачи можно разделить на две основные категории: углублённую и поверхностную работу. Их выделил Кэл Ньюпорт, автор книги «В работу с головой». По его словам, углублённая работа — это профессиональная деятельность, выполняемая в состоянии безраздельной концентрации, для чего требуется предельное напряжение мыслительных способностей. Такое усилие приводит к созданию новых ценностей и увеличивает мастерство исполнителя, а его результаты трудно воспроизвести.

А поверхностная работа — это не требующие интеллектуального напряжения задачи вычислительного типа, часто выполняемые в состоянии рассеянного внимания. Как правило, такие усилия не приводят к созданию в мире новых ценностей и легко воспроизводимы. Это совещания, работа с электронной почтой, отчёты. Хотя таких дел сложно избежать, старайтесь сократить затрачиваемое на них время. А также начните развивать навык глубокой концентрации. О том, как это сделать, рассказал блогер Дэн Силвестр (Dan Silvestre).

1. Выберите собственный метод углублённой работы

В привычной рабочей среде сложно глубоко сосредоточиться. Ньюпорт предлагает четыре системы, которые можно использовать для углублённой работы:

  • Монашеская. Сократите или совсем исключите поверхностные обязанности. Уединитесь на длительное время и отгородитесь от всех отвлекающих факторов.
  • Двухрежимная. Разделите рабочее время на несколько отрезков, которые посвятите углублённой работе, а промежутки оставьте на другие дела. Несколько дней в неделю работайте по монашеской системе.
  • Ритмическая. Простейший способ регулярно браться за углублённую работу — это превратить её в привычку. Суть ритмической системы в создании распорядка. Например, выделяйте на работу, требующую концентрации, по три-четыре часа каждый день.
  • Журналистская. Чередуйте углублённую работу с поверхностной в течение дня. Этот метод не для новичков.

2. Превратите углублённую работу в привычку

Выбрав подходящий вам метод, запланируйте в календаре дни или часы на углублённую работу и старайтесь неуклонно придерживаться этого графика. Чтобы такая работа стала привычкой, нужно не только ваше намерение, но и определённый распорядок. Учитывайте следующие пункты:

  • Где. Выберите место исключительно для углублённой работы. Например, переговорную или тихий уголок в библиотеке.
  • Сколько. Выделите определённое время на каждый заход углублённой работы. Всегда знайте, когда закончите.
  • Как. Нужно правильно организовать процессы. Подумайте, стоит ли вам отключить интернет, пока вы работаете углублённо. Есть ли какие-то метрики, с помощью которых вы можете оценить свою продуктивность?
  • С помощью чего. Для максимального успеха вам понадобится система поддержки. Например, у вас может быть привычка начинать работу с чашки хорошего кофе или всегда иметь под рукой какую-то еду, чтобы восполнять энергию.

3. Воплощайте планы в жизнь с помощью четырёх дисциплин

Знать, что делать и как сделать — далеко не одно и то же. Многие тратят время и ресурсы, думая только о первом. Но забывают обдумать, как будут воплощать избранную стратегию в жизнь. Книга «Как достичь цели. Четыре дисциплины исполнения» предлагает следующие методы:

  • Сосредоточьтесь на критически важных целях. Выберите несколько таких целей и занимайтесь ими во время углублённой работы. Они должны приносить ощутимые результаты в профессиональной сфере, чтобы вы постоянно испытывали энтузиазм.
  • Руководствуйтесь опережающими показателями. Успех можно измерять с помощью двух метрик: запаздывающих и опережающих показателей. К первым относятся конечные цели, которых вы пытаетесь достичь. Например, число напечатанных статей. Вторые оценивают привычки, которые приведут к достижению успеха. Так, актуальный показатель для углублённой работы — время, проведённое в состоянии полной концентрации и занятое работой над целями.
  • Ведите учёт. Люди стараются больше, когда им нужно фиксировать результат. Отмечайте в календаре, сколько часов в день работали углублённо. А дни, в которые разрешили сложную проблему или сделали ещё что-то важное, обводите в кружок.
  • Разработайте график отчётности. Он поможет вам в достижении критически важных целей. Заведите привычку раз в неделю делать отчёт и строить планы на следующую рабочую неделю.

4. Удалите все отвлекающие факторы

На работе практически невозможно долго быть сосредоточенным. Да и в остальное время мы постоянно отвлекаемся на телевизор или соцсети. В результате страдает наша способность концентрироваться. Мозг ожидает и даже требует развлечений. А частое переключение с одной задачи на другую ещё больше ухудшает ситуацию.

Зато сознательная сосредоточенная работа, наоборот, укрепляет проводящие пути нервной системы. Вот несколько способов сконцентрироваться:

  • Работайте в наушниках. Коллеги подумают, что вы их не слышите, и станут реже к вам обращаться.
  • Попросите, чтобы вам дали возможность полдня работать удалённо. Лучше всего с утра.
  • Разбирайте электронную почту дважды в день: ближе к обеду и в конце дня. И ограничьте время работы с ней, например, с помощью «помидорного» таймера.
  • Отключите уведомления на телефоне. Если будет что-то действительно срочное, вам позвонят.
  • Запланируйте, сколько времени будете проводить в интернете, и старайтесь не заходить в Сеть просто так. Это полезно делать не только на работе, но и дома, чтобы тренировать концентрацию.
  • В конце дня закройте все вкладки в браузере и открытые программы, удалите или переместите в нужное место все файлы из загрузок, очистите корзину и выключите компьютер. Завтра вам легче будет начать работу.

5. Не забывайте отдыхать

По данным исследованийThe Role of Deliberate Practice in the Acquisition of Expert Performance , мы можем сосредоточенно работать примерно четыре часа в день. После этого способность концентрироваться падает. Так что чередуйте периоды углублённой работы с отдыхом.

Закончив работу, старайтесь больше не думать о ней до утра. Не проверяйте почту после ужина, не прокручивайте в голове разговоры с коллегами, не стройте планы на завтра.

Вот почему это так важно:

  • Во время отдыха возникают новые идеи. Пока ваше сознание расслаблено, подсознание консолидирует воспоминания, а также может подкинуть вам полезные идеи и творческие решения.
  • Отдых помогает восполнить энергию, которая потом пригодится вам для углублённой работы.
  • Работа, которую вы делаете вечером, обычно не так уж важна. Скорее всего, это поверхностные задачи, которые ничего не дают вашей карьере.

Только помните, что качественный отдых — это не бездумное сидение в интернете или просмотр сериалов. Относитесь к технологиям осознанно и время от времени устраивайте себе цифровой детокс.

Бонус: как совершенствоваться в углублённой работе

Постоянно тренируйте этот навык. Вот несколько советов, которые вам помогут:

  • Откажитесь от соцсетей. Постоянные уведомления вредят способности концентрироваться. Если не получается проводить в соцсетях меньше времени, удалите их совсем.
  • Учитесь говорить «нет». Будьте избирательнее, когда решаете, на что согласиться. Каждый раз, когда вы не отказываетесь, вы по умолчанию говорите «да».
  • Медитируйте. Достаточно потратить на это десять минут с утра, чтобы повысить способность концентрироваться днём.

Как и любой другой приём, углублённую работу нужно подстраивать под себя. Пробуйте разные варианты, пока не найдёте тот, что подходит именно вам.

Читайте также

          Как оставить в автозагрузке Windows 10 только нужные приложения      Cache   Translate Page      

При включении компьютера сразу запускается масса программ, во многих из которых нет необходимости. Из-за этого операционная система загружается дольше. А если ПК не слишком мощный, то из-за лишних приложений он ещё и тормозит.

Как узнать, какие приложения загружаются при включении компьютера

Вызовите «Диспетчер задач», зажав клавиши Ctrl + Alt + Delete, и выберите в появившемся меню соответствующий пункт. Откройте вкладку «Автозагрузка», и вы увидите длинный список программ, которые запускаются при загрузке системы.

автозагрузка windows 10

Как бы это ни было соблазнительно, не стоит отключать все приложения. Это может навредить работоспособности ОС.

В каких случаях можно отключить автозагрузку, а в каких нельзя

Тут нет чётких правил, но рекомендации всё же существуют:

  • Если это миниатюрное приложение, которое ускоряет запуск полноценной программы, то его можно убрать из автозагрузки. Примерами могут служить iTunes Helper или Spotify. Если они вам понадобятся, то просто будут включаться немного дольше.
  • Если приложение, работающее в фоне, даёт какие-то явные преимущества, то лучше не отключать его. Например, Dropbox: без него файлы в локальной папке не будут синхронизироваться с облачным хранилищем.
  • Если программа в фоне упрощает вам жизнь, то подумайте насколько. Для примера возьмём Steam или важно ли для вас, чтобы обновления для игр скачивались сами? Если это не критично, у вас быстрый интернет и вы готовы мириться с тем, что загрузка будет запускаться только после открытия клиента, то отключайте.
  • Если вы не знаете, что это за приложение, потому что у него какое-то странное название, воспользуйтесь поиском по интернету. Для этого достаточно щёлкнуть правой кнопкой мыши по программе и выбрать соответствующий пункт. Так вы узнаете, нужна ли вам эта программа в фоне.

автозагрузка windows 10

  • Установите бесплатную программу Should I Remove It?. Она покажет с высокой долей вероятности, сможете ли вы обойтись без того или иного приложения на компьютере. Для этого используются данные, полученные от обычных пользователей и технических экспертов.

автозагрузка windows 10

Читайте также

          Как справиться с выгоранием и вернуть себе былую продуктивность      Cache   Translate Page      

Это нелёгкий процесс. Когда вы измотались и перегорели, кажется, что возвращение к обычному графику потребует нечеловеческих усилий. Ничто не приносит радости, в том числе и вещи, которые раньше вдохновляли и мотивировали вас. Небольшие шажки в сторону продуктивности кажутся колоссальными.

И всё же это возможно. Предлагаем вам несколько рекомендаций, которые помогут преодолеть кризис. Ничего сверхъестественного, просто несколько советов, которые облегчат ваше путешествие.

Избавьтесь от чувства вины

Первое и самое главное, что вы должны сделать, когда чувствуете, что далеки от продуктивности: перестаньте думать, как это плохо.

И совершенно неважно, почему произошёл кризис. Может быть, у вас были на то веские причины, например проблемы в семье, или серьёзные перемены в жизни, или болезнь. Может быть, вы просто переработали, и теперь вам требуется время на восстановление. Это не имеет значения, ведь дело в том, что чувство вины в этой ситуации никак вам не поможет. И даже наоборот: оно помешает вам обрести мотивацию.

Вина появляется из-за искажённого восприятия: вы видите только ошибки и недостатки, не замечая успехов и значимости прилагаемых усилий. Пользы от этого нет никакой.

Теоретически легко понять, что чувство вины бесполезно. Куда сложнее перестать его испытывать. Начните записывать всё, в чём вы якобы виноваты, или говорите об этом кому-нибудь. По большей части поводы настолько нелепы, что после этого вы не сможете больше воспринимать их всерьёз. Поймите, что, позволяя чувству вины контролировать вас, вы не поможете себе достичь целей или стать лучше.

Если коротко, вина не заслуживает ничего, кроме игнорирования. Запишите свои мысли, громко произнесите их, поговорите с другом — используйте все возможные способы, чтобы избавиться от неё.

Расставляйте приоритеты

Прилагая слишком много усилий, чтобы вернуть себя к обычной продуктивной жизни, вы быстро растеряете все силы.

Вместо этого думайте, как вы можете достичь продуктивности в разных сферах жизни разными способами. Можно делать упражнения, ложиться спать вовремя, приступать к работе пораньше, завершить собственный проект, позвонить друзьям или родным, вести дневник или блог, сходить к психологу, поддерживать чистоту на рабочем месте, взять перерыв, самостоятельно приготовить ужин или почитать книгу.

Выберите что-то одно и идите к этой цели. Не старайтесь преуспеть во всём сразу, иначе попросту перегорите.

Как победить эмоциональное выгорание: расставляйте приоритеты

Работайте над одной задачей, и вы не потратите на неё слишком много энергии. Достижение одной, пусть даже небольшой цели поможет вернуть уверенность в себе и придаст сил.

Сосредоточьтесь на небольших изменениях

Возможно, вы хотите вернуться к своему утреннему распорядку, ежедневной привычке писать или регулярным занятиям спортом. Отлично.

Для начала достигните первого уровня продуктивности. Например, если в ваш самый продуктивный день вы писали тексты на 1 500 слов или больше, поставьте себе целью писать по 300 слов в день. Добивайтесь её постепенно, а затем увеличивайте нормативы.

Вы будете двигаться путём небольших изменений и достижений. Это принесёт нужный результат, и в то же время вы не истощите внутренние ресурсы.

Визуализируйте продуктивность

Самое трудное в том, чтобы выйти из режима «кризис + выгорание», — снова найти мотивацию. Падение продуктивности заставляет вашу уверенность и вдохновение стремиться к нулю. И если мотивации нет, очень трудно вернуться к обычному режиму с одной лишь силой воли.

Выберите один аспект, в котором вы хотите достичь высокой продуктивности. Представьте, как вы проходите каждый шаг в этом направлении.

Представляйте этот процесс так подробно, как только можете. Продумайте детали. Визуализируйте каждый этап, инструменты, которыми вы будете пользоваться, возможные трудности.

Некоторым людям легче написать, чем представить себе это. Возьмите листок бумаги и запишите свои мысли от первого лица в настоящем времени: «Я просыпаюсь в 6 утра, шнурую кроссовки, отправляюсь на пробежку…»

Как победить эмоциональное выгорание: визуализируйте продуктивность

Для визуализации не потребуется больше 10 минут. Если вы можете делать это два или три раза в день — ещё лучше. Вы сами заметите, как появятся и силы, и желание, и мотивация. По сути, это способ вернуть себе утраченную уверенность. Мысленно вы показываете себе, кто вы и кем можете быть. Не спешите. Занимайтесь визуализацией столько, сколько можете, а затем начните предпринимать конкретные действия и шаги, которые вы представляли.

Планируйте каждое дело

Существует более мягкий подход. Он идеален для тех, на кого всё ещё давит мысль о необходимости вернуться к делам. Возьмите блокнот или даже маленький кусочек бумаги. Подумайте, какое одно дело вы можете сделать за 15 минут или даже меньше. Если вам необходимо выполнить большую задачу, разбейте её на небольшие части, которые не займут много времени.

Запишите задание так, словно вы уже его сделали:

  • Я только что написал два абзаца для поста в блоге.
  • Я помыл посуду.
  • Я только что заплатил по счетам.
  • Я совершил короткую пробежку.
  • Я ответил на два письма.

Затем установите таймер на 15 минут и работайте над заданием, которое вы записали. Когда время закончится и таймер запищит, вы можете завершить задачу, если не успели её доделать, или оставить как есть. Частичное выполнение — тоже достижение. Ключевой момент: вы начали делать то, что записали. Вы запланировали дело, определили время на выполнение и сделали это.

Если вы просто будете записывать следующее дело и выполнять его, то к концу дня многое из намеченного будет сделано. Вам не нужно перенапрягаться или тратить слишком много энергии. Просто выбирайте одну задачу, устанавливайте время, работайте над ней и переходите к следующей. Вы приучите себя планировать и осуществлять намеченное.

Ищите друга или наставника для поддержки

Или и того и другого. Поддержки много не бывает, когда вы пытаетесь снова стать продуктивным. Подумайте о сфере, в которой вы хотите добиваться результатов, и о том, кто мог бы вам помочь на этом пути.

Как победить эмоциональное выгорание: ищите друга или наставника для поддержки

Например, найдите друга, который будет ходить с вами на пробежки несколько раз в неделю. Знакомьтесь онлайн в профессиональных сообществах, задавайте вопросы, просто общайтесь с людьми, которые тоже хотят стать продуктивнее.

Не бойтесь обратиться за профессиональной помощью. Тренер, наставник, психотерапевт или консультант может помочь вам составить разумный план действий, получить более полное представление о том, что может вам понадобиться, и преодолеть препятствия, которые раньше вас останавливали. Семинары и курсы дадут вам новые знания и помогут улучшить методы и производительность в конкретных областях.

Если вы готовы работать над собой, чтобы стать продуктивным, вы можете подняться на уровень выше, а не просто вернуться к прежнему.

Не сдавайтесь

Для возвращения к обычному режиму потребуется время. Осознавайте, что впереди не только успехи, но и препятствия, которые нужно будет преодолевать. И это нормально, главное — придерживаться курса.

Если вы понимаете, что ваша жизнь становится лучше, когда вы продуктивны, то борьба того стоит. И каждый шаг на пути прогресса значительно облегчает следующий. Самое трудное — сделать первый и выбраться из этой ямы. Так пусть этот шаг будет небольшим, совсем простым. И тогда сила, энергия и мотивация к вам вернутся, и вы снова обретёте твёрдую почву под ногами.

          7 уроков от «Семи самураев» на все времена      Cache   Translate Page      

Знаменитая картина «Семь самураев» увидела свет в далёком 1954 году. За основу режиссёр Акира Куросава взял классическую историю о том, как несколько ронинов (самураев, потерявших своих господ) помогли крестьянам отбиться от нападения разбойников.

По сюжету жители деревни постоянно подвергаются нападениям бандитов. Решив, что после следующего ограбления они просто умрут от голода, крестьяне находят себе защитников — семерых ронинов. Казалось бы, простая история в руках великого режиссёра стала настоящим источником мудрости. Поэтому «Семь самураев» полезно пересматривать для понимания нескольких важных истин.

1. Общее дело объединяет даже противоположных по характеру людей

Семь самураев

Главные герои фильма интересны тем, что совершенно непохожи друг на друга. Возглавляет команду опытный и мудрый ронин Камбэй. Но также есть юноша Кацусиро, добродушный силач Горобэй, агрессивный и замкнутый мастер сражения на мечах Кюдзо, старый вояка Ситиродзи, не самый способный, но остроумный Хаясида и даже бродяга Кикутиё с поддельной грамотой самурая.

Объединившись ради общего дела, люди с разными характерами удачно дополняют друг друга. Горобэй вовремя разряжает обстановку, Кюдзо с лёгкостью справляется со сложными задачами. Даже нелепый Кикутиё оказывается полезен: он лучше всех находит общий язык с крестьянами, которые поначалу побаиваются ронинов.

2. Даже самым сильным нужна помощь

Сем самураев: принятие помощи

В поисках защиты крестьяне обращаются к Камбэю, рассчитывая на его силы и умения. Но мудрый самурай сразу сообщает, что не справится один. Чтобы дать бандитам настоящий отпор, необходимо собрать семерых воинов.

Вроде бы это простая мысль, однако в современной культуре зачастую популярны именно супергерои-одиночки. Они сами разбираются со всеми врагами и зовут подмогу только в последний момент. Настоящий мастер и воин способен заранее оценить свои силы и обратиться за помощью, пока не стало поздно.

3. Чёткий план действий в разы увеличивает шансы на успех

Семь самураев: план действий

Несмотря на то что у Камбэя есть поддержка, разбойников всё равно намного больше — 40 человек. К тому же они используют ружья и передвигаются верхом. Самураи берутся обучить крестьян сражаться, вооружив бамбуковыми копьями, но те мало на что способны.

Поэтому чёткий план и подготовка оказываются очень важны: самураи затапливают подходы к деревне и ломают мосты — так у разбойников остаётся единственный путь для нападения. Круглосуточные караулы не дают противнику застать воинов врасплох. После каждого столкновения с бандитами Камбэй подсчитывает убитых и раненых, оценивая сложность следующей схватки.

4. Помогая другим, ты помогаешь себе

Семь самураев: помощь другим

Несколько домов находятся далеко за рекой. Самураи предлагают их обитателям оставить свои жилища и поселиться с остальными ради безопасности. Сначала хозяева спорят: они надеются, что бандиты до них не доберутся. Камбэй объясняет, что после нападения грабители всё равно направятся к дальним домам, но помочь их жителям уже никто не сможет. Спастись можно только всем вместе.

5. Благородство и смелость не определяются статусом

Семь самураев: статус не главное

Для японцев социальный статус всегда был очень важен, и по сей день многие люди встречают по одёжке. «Семь самураев» показывают, что благородство — это свойство характера, а не следствие высокого происхождения. Кикутиё в бою проявляет не меньше храбрости, чем настоящие воины, а крестьяне отважно сражаются ради общего дела независимо от своих умений.

6. Агрессоры чаще всего трусливы

Семь самураев: трусость агрессоров

После нападения разбойников становится ясно, что большинство из них эгоистичные и трусливые люди. Они привыкли запугивать беззащитных крестьян. Когда жители деревни вместе с самураями неожиданно оказывают сопротивление, одни бандиты дезертируют, а другие постоянно препираются между собой.

7. Не нужно путать бесстрашие с безрассудством

Семь самураев: бесстрашие

Кюдзо отправляется в логово к бандитам, чтобы украсть у них ружьё, убивая по пути двоих разбойников. Смелый Кикутиё хочет повторить поступок мастера и тоже отправляется в лес. Ради своего подвига он бросает пост, который должен был охранять. Из-за этого разбойникам удаётся напасть на деревню, и один из самураев гибнет. Так становится понятно, что даже очень храбрые поступки могут оказаться опрометчивыми и повлечь за собой тяжёлые последствия.

Читайте также

          Как сексуальные фантазии зависят от возраста, пола и личностных черт      Cache   Translate Page      

Джастин Лемиллер (Justin J. Lehmiller), доктор психологии, бывший профессор Гарвардского университета, писатель и создатель блога Sex & Psychology, провёл масштабное исследование о сексуальных фантазиях, в котором приняли участие более 4 000 человек. Результаты социальный психолог изложил в книге «Скажи мне, чего ты хочешь» (Tell Me What You Want), некоторые из них опубликованыWhat Your Sexual Fantasies Say About Your Personality в его блоге. Лемиллер обнаружил, что черты личности из «большой пятёркиThe Big Five Personality Traits » — открытость опыту, добросовестность, доброжелательность, экстраверсия и невротизм — тесно связаны с сексуальными фантазиями.

О чём фантазируют люди, открытые опыту

Любознательные, наделённые богатым воображением люди, как правило, всегда стремятся испытать что-то новое. Неудивительно, что и тут ситуация не меняется: они фантазируют почти обо всех сценариях — от обычных до нетрадиционных.

О чём фантазируют добросовестные и организованные люди

Лемиллер пишет, что такие люди зачастую склонны к конформизму и во многом придерживаются традиционных взглядов. Их фантазии подробны, конкретны. В том числе они фокусируются на окружающей обстановке и условиях, в которых занимаются сексом. А вот о БДСМ или табуированных темах думают гораздо меньше. Возможно, потому, что в сексе, как и в прочих жизненных сферах, хотят соответствовать общепринятым нормам.

О чём фантазируют экстраверты

Как в жизни, так и в фантазиях экстраверты хотят взаимодействовать с другими. Они чаще воображают групповой секс и думают о полигамных, сексуально открытых отношениях. При этом их фантазии довольно простые — им достаточно лишь попробовать что-то новое. А вот запретные темы всплывают реже.

О чём фантазируют интроверты

Здесь как раз обратная история: фантазии на запретные темы преобладают. Причина, предполагает Лемиллер, в трудностях, возникающих при взаимодействии с другими людьми в реальной жизни, что заставляет интровертов стремиться к необычным формам сексуального выражения.

О чём фантазируют доброжелательные люди

Они добры и внимательны к другим и хотят, чтобы те были счастливы. Они не думают о БДСМ, безэмоциональном сексе, изменах — о ситуациях, когда они не уверены в согласии, безопасности и удовольствии партнёра. Даже в фантазиях такие люди учитывают чужие интересы.

О чём фантазируют эмоционально нестабильные, склонные к стрессу люди

Невротики редко думают о групповом сексе, новом опыте и полигамии в целом, будто бы они вовсе не заинтересованы в том, чтобы попробовать что-то новое и найти новых партнёров. Скорее всего, в этом слишком много неопределённости, которая заставляет испытывать напряжение. Их фантазии — страстные и романтические. Они помогают расслабиться и успокоиться.

Чем отличаются фантазии женщин и мужчин

Фантазии мужчин и женщин во многом похожиSeven Fascinating Facts About Sexual Fantasies , но есть и различия. Чаще всего женщины представляют ситуации, полные страсти и романтики, в их сценариях больше авантюры и разнообразия. А ещё они предпочитают видеть себя более властными, чем в реальности, и чаще мужчин фантазируютWhat your sexual fantasies say about you об однополых связях и БДСМ.

Мужчины грезят о групповом сексе чаще женщин. К тому же их фантазии гораздо эмоциональнее, чем многие считают. Но в отличие от противоположного пола они представляют себя покорнее, нежели на самом деле, и более склонны к смене гендерных ролей и мыслям на табуированные темы.

Чем отличаются фантазии молодого и старшего поколений

Лемиллер также обнаружил связьFantasy Island: Research Probes the Science of Sexual Desire между возрастом и фантазиями. Так, молодые респонденты отвечали, что чаще думают о БДСМ, а более зрелые — что предпочитают фантазировать о запретных темах и сексе с несколькими партнёрами.

Читайте также

          Подкаст Лайфхакера: о чём нельзя говорить с мужчинами      Cache   Translate Page      

Женщины очень любят поговорить, особенно с мужчинами. Но, если начистоту, иногда нас лучше останавливать. Как понять, когда стоит просто улыбнуться и промолчать? Какие темы желательно вообще не затрагивать в разговоре с сильным полом? Об этом — в новом выпуске подкаста Лайфхакера.

Подкаст Лайфхакера в iTunes →

Подкаст Лайфхакера в Google Podcasts →

RSS-поток подкаста Лайфхакера →

          Штука дня: подушка-забрало для комфортного сна в путешествиях      Cache   Translate Page      

Одна из самых глупых ситуаций — проснуться от толчков попутчика, на которого навалился, случайно задремав в самолёте. Помимо неловкости положения, это также чревато болями в шее и ещё большим чувством усталости после перелёта. Решение в виде специальной подушки предлагают неугомонные изобретатели с Kickstarter.

Новинка получила название NapUp Fly и, в отличие от традиционных шейных подушек, представляет из себя своеобразный шлем, который фиксирует голову, не давая ей заваливаться в сторону. За счёт очков, блокирующих свет, и встроенной аудиосистемы можно полностью отгородиться от окружающей обстановки и нормально отдохнуть.

С помощью регулируемых ремней NapUp Fly надёжно крепится к подголовнику кресла. Подушка имеет эргономичную форму и боковую поддержку, благодаря чему обеспечивает владельцу комфорт во время сна. При опускании «забрала» она фиксирует голову и позволяет расслабиться, не беспокоясь о падениях на плечи соседей.

Продвинутая версия NapUp Fly+, помимо этого, также оснащена качественными динамиками, расположенными в мягких вставках боковой поддержки. Через кабель с 3,5-миллиметровым разъёмом их можно подключить к смартфону и дремать под любимую музыку или фоновый шум.

Базовая версия подушки обойдётся в 35 долларов, за NapUp Fly+ придётся выложить 49 долларов. В комплекте идёт удобный футляр для хранения, а в более дорогом варианте есть ещё и кабель. Доставка новинки запланирована на февраль следующего года.

Заказать на Kickstarter →

          Как приготовить овсяное молоко из двух ингредиентов      Cache   Translate Page      

Что вам понадобится

  • 100 г овсяных хлопьев (не быстрого приготовления);
  • 900 мл воды.

Как приготовить овсяное молоко

Промойте овсяные хлопья. Всыпьте их в любую ёмкость и залейте водой. Лучше использовать фильтрованную, бутилированную или остывшую кипячёную.

Перемешайте и оставьте минимум на 4 часа, а лучше на всю ночь. Если в комнате жарко, уберите ёмкость с овсянкой в холодильник.

Перемешайте и перелейте всю массу в блендер. Взбейте её до однородной консистенции.

Процедите молоко через марлю, сложенную в несколько слоёв.

Как приготовить овсяную кашу: подробная инструкция →

Как разнообразить вкус молока

Хоть овсяный напиток и называется молоком из-за внешнего вида, по вкусу он всё-таки отличается от обычного. У него явный привкус овсянки.

Если хотите подсластить молоко, положите в блендер вместе с ним 1–2 финика. В уже процеженное молоко можно добавить немного мёда.

Прекрасный запах придадут напитку ванилин, корица, мускатный орех, кардамон и другие специи.

Овсянка на завтрак, которую можно приготовить с вечера →

Как хранить и использовать овсяное молоко

Молоко нужно хранить в холодильнике не дольше трёх дней. Перед употреблением ёмкость с напитком необходимо встряхнуть.

Овсяное молоко можно пить в чистом виде и использовать так же, как и обычное. Например, готовить смузи с фруктами, ягодами или овощами, кофе, чай, выпечку, каши, супы и другие блюда.

Читайте также

          Как настроить ночной режим macOS Mojave отдельно для каждого приложения      Cache   Translate Page      

В новой macOS при включении ночного режима в приложениях с поддержкой такой функции оформление интерфейса меняется на тёмное. В некоторых программах это выглядит хорошо, в других — не очень.

Стандартные возможности не позволяют добавить отдельное приложение в исключения, но это всё же можно реализовать с помощью бесплатной утилиты LightsOff.

как включить ночной режим: LightsOff

После установки её иконка появится в строке меню, откуда можно будет быстро переключаться между светлым и тёмным режимами интерфейса без необходимости копаться в настройках. При желании также можно настроить переключение тем по расписанию, поставив галочку напротив опции Scheduled.

как включить ночной режим: Scheduled

Для добавления приложений в исключения используется режим App Specific. После его включения в меню появляются ещё две дополнительные кнопки, с помощью которых можно назначать исключения для тёмного и светлого режима, проставляя галочки напротив приложений из списка.

как включить ночной режим: Список приложений

Например, если хотите, чтобы при тёмном режиме интерфейс «Почты» оставался светлым, нажмите Dark и затем отметьте приложение в списке. Или, скажем, вам нужно, чтобы в светлом режиме в «Терминале» было тёмное оформление. Тогда следует нажать кнопку Light и поставить галочку напротив названия приложения.

Специфика работы LightsOff такова, что меняется не только оформление окна активной программы, но и строка меню и док. В какой-то степени можно считать это минусом, но тут всё упирается в системные ограничения. Ведь, по сути, приложение просто часто переключается в ночной режим и обратно в зависимости от выбранных настроек.

LightsOff распространяется бесплатно, а скачать утилиту можно на сайте разработчика.

Скачать →

Читайте также

          Brian Kemp Knows Who The Hackers Are, And It's The Democrats Who Warned Him About Hackers      Cache   Translate Page      

Georgia's Republican candidate for governor, who also happens to be in charge of running Georgia's election, announced Sunday that he was "investigating" Georgia's Democratic Party for supposedly trying to hack the state's election systems. (Those would be the computer systems he has previously said couldn't possibly be compromised, at least if Russia were doing it.) Now, if you want to get all picky about it, the reality is that Democrats alerted Kemp's office to a security problem in his computer systems, and then he turned around and accused them of "hacking," which really is some impressive fuckery, isn't it?

Kemp's office announced the alleged investigation with a very subtle all-caps headline: "AFTER FAILED HACKING ATTEMPT, SOS LAUNCHES INVESTIGATION INTO GEORGIA DEMOCRATIC PARTY." And then of course the office briefed the press on all the evidence that would warrant such a serious accusation two days before the election, haha we are kidding of course.

What pretty quickly became clear, however, was that Kemp's office was accusing Democrats of "hacking" because they had called attention to a potential security problem with the state's voter registration systems, as the Washington Post explains:

Candice Broce, a spokeswoman for the secretary of state's office, said in an interview that Democrats were in possession of an email with script attached to it that, if launched, could have been used to extract personal voter registration data."

Our position is that these were failed attempts to hack the system," Broce said. "All the evidence indicates that, and we're still looking into it."

Democratic officials, in turn, accused Kemp of "defamatory accusations" and released the email in question, showing that it had been forwarded to a Democratic volunteer by someone not affiliated with the party who was flagging a potential data vulnerability. The volunteer forwarded the email to the party's voter protection director, who shared it with cybersecurity experts, who in turn alerted Kemp's office, they said.

Got that? Someone sent the Dems information about a possible security problem, the volunteer who got the email sent it to an appropriate higher-up, who then had cyber people look at it and take the evidence to to the authorities.

Then the Secretary of State's office accused the people trying to warn about the problem of hacking the election! If Brian Kemp is elected governor, expect witnesses to bank robberies to be accused of being in on the plot, because how else would they know so much about the robbery, huh?

Is there more? Of course there's more! Turns out others have been trying to call attention to the security vulnerabilities too:

Two voting rights attorneys suggested that Kemp launched the probe as a distraction, hours after they told authorities about potential security flaws in the electronic voter systems he is responsible for maintaining.

"We alerted the authorities. We expected Mr. Kemp to take action. We were surprised to see the apparent response to that was accusing [the Democrats] of hacking," David D. Cross, a Washington attorney who is helping sue Georgia to make it use paper ballots, said at a news conference Sunday afternoon.

This sort of shit is nothing new for Kemp, of course: As Wired and Gizmodo both note, Kemp accused the Department of Homeland Security of trying to "hack" Georgia computers in 2016 when in fact a DHS investigation turned up only examples of routine computer traffic. When it comes to actually improving computer security, frankly my dear, Kemp doesn't give a damn.

If you're really hot on getting all the cyber details, they're outlined by WhoWhatWhy, which explains the nature of the security hole:

Just before noon on Saturday, a third party provided WhoWhatWhy with an email and document, sent from the Democratic Party of Georgia to election security experts, that highlights "massive" vulnerabilities within the state's My Voter Page and its online voter registration system.

According to the document, it would not be difficult for almost anyone with minimal computer expertise to access millions of people's private information and potentially make changes to their voter registration — including canceling it.

The article goes on to say several security experts said the registration website code -- which is publicly viewable with any browser's tools -- definitely looked insecure, although of course they didn't test that because doing so would be illegal. Here's one very astonished geek:

"For such an easy and low hanging vulnerability to exist, it gives me zero confidence in the capabilities of the system administrator, software developer, and the data custodian," Kris Constable, who runs a privacy law and data security consulting firm, told WhoWhatWhy. "They should not be trusted with personally identifiable information again. They have showed incompetence in proper privacy-protecting data custodian capabilities."

So Kemp's office rewarded the Dems for their vigilance in protecting the integrity of the vote by accusing them of being evil hackers. Isn't that beautiful? University of California Irvine law school professor and political scientist Richard Hasen writes at Slate,

If this is true, it doesn't show Democrats "hacking" to manipulate election results. It shows Democrats, like many others, pointing out the glaring security flaws in Georgia's voting system. To turn this around and blame Democrats is an act of political chutzpah by an election official on par with nothing else I've seen.

Once the blatant fuckery on the part of Kemp's office became clear, Democratic candidate Stacey Abrams wrote in a statement, "Kemp's false accusations against the Democratic Party of Georgia were nothing more than a pathetic attempt to cover up for his failures," which if you ask us is putting it mildly.

And Kemp's campaign? The bastards tried once again to say they had saved Georgians from some dangerous bad behavior by Democrats, who -- as power-hungry radicals will -- brought the problem to the attention of the authorities:

Ryan Mahoney, Mr. Kemp's campaign spokesman, said in a statement late Sunday that the effort to "expose vulnerabilities" in the voter system was an "act of desperation" by Democrats.

"This was a 4th quarter Hail Mary pass that was intercepted in the end zone," he said. "Thanks to the systems and protocols established by Secretary of State Brian Kemp, no personal information was breached. These power-hungry radicals should be held accountable for their criminal behavior."

Translation: We don't know how to do computer security, but we sure do know how to slime people. Also, everything we know about politics we learned from our Labrador retriever, who assures us she was guarding the meatloaf that somehow ended up on the floor. Or half of it.

Brian Kemp is scum, and his people are scum. Georgia, please vote these bastards out, and for fuckssake elect Democrat John Barrow as the next Secretary of State. Foxes shouldn't be watching the henhouse, and they sure as hell shouldn't be designing the damn thing.

[WaPo / Slate / WhoWhatWhy / Wired]

Wonkette is ad-free and supported ONLY by readers. Help us keep covering the bastards, please! Click right there below!

How often would you like to donate?

Select an amount (USD)

          Don't Boo, Vote! Wonkagenda For Mon., Nov. 5, 2018      Cache   Translate Page      

Morning Wonketariat! Here's some of the things we may be talking about today.

Trump wanted the Pentagon to order some of the soldiers being sent to the border to serve as "crowd and traffic control," and to protect Customs and Border Patrol agents from the Middle Eastern Mexican taco trucks threatening to invade, but the Pentagon rejected the insane clown Posse Comitatus violation.

During a GOTV in Chicago, Obama encouraged people to vote tomorrow, and stated, "the character of our nation is on the ballot." Oh, Bamz, we miss you!

At a rally in Montana over the weekend, Trump said Democrats will just blame Russia if they fail to wash away Republicans in a #BlueWave. He then called the Trump-Russia investigation a "hoax," and bragged about his crowd size.

Fearing unemployment, House Republicans desperately want Trump to change the subject to the economy instead of making the midterms about spooky brown refugees. However, some Senate Republicans are cool with referendum on race, and Trump officials are even making robocalls about the "cotton-pickin'" importance of voting for Ron DeSantis over Andrew Gillum.

Georgia's shifty Secretary of State and Republican gubernatorial candidate Brian Kemp says he caught Democrats trying to hack the state voter registration system (again). Kemp's accusation comes shortly after Democratic officials and election security advocates told the FBI about a glitch in the voter registration system that potentially exposes voter information. Kemp's office (not federal authorities) is investigating, and now he's screaming that Democratic candidate Stacey Abrams is under investigation without any evidence to corroborate the accusation. During his time as Secretary of State, Kemp has repeatedly refused federal audits of the state's voting systems despite a decade of shenanigans from the state Republican Party. Earlier this year Kemp told the DHS to fuck off when it offered aid to shore up the state voting systems from election fuckery.

The Boston Globe reports DHS is investigating a rash of election hacking attempts, and notes that hackers haven't been very successful. Concerns about voter fuckery are rampant this election, but mountains of historical evidence show it's far more likely that you'll be a victim of voter suppression than election meddling.

Axios says there's a growing distrust in election integrity. Fueling that dumpster fire are garbage headlines from Axios about techno fuckery that don't cite identifiable sources, as usual. Be Smart: Axios is brown nosing and sensationalist crap.

Trump threw a laughably hypocritical tantrum and accused Indiana Democratic Sen. Joe Donnelly of buying Facebook ads targeting conservative voters that urges them to vote for the Libertarian candidate. The state Democratic party says they're only telling Republicans to vote for the "true conservative." Remember when the Russians bought Facebook ads and told progressives to vote for Jill Stein and Smokey McPot?

Surprise! Financial disclosures from Kris Kobach show that he's accepted thousands of Ameros from white nationalist groups that have been secretly supporting Kobach's political career since at least 2004.

After the Democrats take the House, Trump will run away to Not America for the rest of the month. First he'll head to France and stroke his war boner during the the 100th anniversary of the end of World War I. After that, he'll head to Buenos Aires to shit-talk the G20, eat subpar chocolate cake with Xi Jinping, and get orders from Vladimir Putin.

China is raking in tons of cash by frontloading exports in advance of Trump's trade war -- the trade war that was supposed to be really easy to win. Earlier this morning Xi Jinping said, "Great winds and storms may upset a pond, but not an ocean," which was a nice way of telling Trump to take a flying fuck at a rolling donut.

Marine Le Pen's European neo-Nazis far-right nationalists are rising in the polls, now ahead of French President Emmanuel Macron's En Marche party for the first time and exacerbating fears of a "Frexit" following next year's European Parliamentary elections. Earlier this weekend, the French territory of New Caledonia rejected a referendum to break off from France.

Ukrainian anti-corruption journalist Kateryna Handzyuk has died. The 33-year-old activist was the victim of an acid attack that left burns on 40 percent of her body earlier this year.

A bunch of filthy rich Muscovites were doxxed this weekend after hackers stole personal information, like names, addresses, and cell phone numbers, and dumped it onto a public database.

Youtube deleted a video from a known Russian troll who claimed USCyberCom reached out and poked his digital bits. In the video, the troll says he and other trolls have been dicking around in US midterm elections, and holds up some papers with candidate names, but foreign policy nerds and computer geeks are skeptical and think it may just be a double-reverse trolling attempting.

Vanity Fair has a bunch of gossip about CNN's love/hate relationship with Trump talking heads, why cable news is dominated by wall to wall Trump coverage, and why Jake Tapper thinks things aren't ever going back to "normal." At least CNN didn't air that super racist Trump ad, unlike NBC.

Author Stephen King is tired of being confused with "racist dumbbell" Steve King, and would really appreciate if you stopped voting for him.

West Point is SUPER SORRY it accidentally hurt the Air Force Academy mascot, Aurora, during its annual prank. The 22-year-old white gyrfalcon had initially been reported to have suffered life threatening injuries after cadets threw sweaters over the bird and stuffed it into a dog crate, but the bird is now expected to make a full recovery.

Here's SNL riding the blue wave...

Midterm Ad - SNL

And here's your morning Nice Time! The Galapagos Reef!

Follow Dominic on Twitter and Instagram!

We're 100% ad-free and reader-supported, so consider buying us coffee, or get a subscription!

How often would you like to donate?

Select an amount (USD)

          Student Gf Quikie Fuck In small Store room with BF Mms      Cache   Translate Page      
Student Gf Quikie Fuck In small Store room with BF Mms Click here to download videos of naughty desi boys and girls making out in public parks getting caught on cam. Download this Scandal – 11 Mb
          Researchers Find Microplastics in Stool Samples      Cache   Translate Page      

Tests reveal both tap water and bottled water1 contain microplastics, as does your household dust2 and many foods, especially seafood3,4 and sea salt,5 but also any food that has been stored in plastic packaging.

The suspicion that we're consuming our own plastic pollution was recently reconfirmed when researchers reported the discovery of microplastic particles in human stool samples. The consequences of ingesting microscopic plastic bits and pieces is still relatively unknown.

But considering the fact that plastic will not degrade within a human lifetime, and that many of the chemicals used in the production of plastic are known endocrine disruptors, chances are the impact on human health may be greater than suspected.

Animal research has also shown microplastics affect the gut barrier and the composition of gut microbiota in mice, and that they have toxic effects on the liver in fish.

Microplastic Debris Found in Human Stool Samples

The study6,7,8,9 in question was done by researchers from the Medical University of Vienna in collaboration with the Austrian Environment Agency. The findings of this pilot study were presented October 23, 2018, at the annual United European Gastroenterology conference in Vienna. As reported by Salon magazine:10

"Eight people from Finland, Italy, Japan, the Netherlands, Poland, Russia, the United Kingdom and Austria participated in the study. Each person kept a food diary the week before the stool sampling occurred which showed researchers that all participants were exposed to foods that were either wrapped in plastic, or they drank from plastic bottles. Six of the eight ate sea fish, too; none of them were vegetarians."

The stool samples were tested for the presence of 10 different types of plastics, of which nine were found in the samples. On average, participants had 20 microplastic particles per 10 grams of stool.

The most common types of plastic were polypropylene (found in bottle caps), polyethylene terephthalate or PET (found in water bottles, plastic bags and textile fibers) and polystyrene (found in takeout food containers, cups and plastic utensils). The particles ranged in size from 50 micrometers (about the width of a human hair) to 500 micrometers. According to lead researcher Dr. Philipp Schwabl, who called the results "astonishing":

"This is the first study of its kind and confirms what we have long suspected, that plastics ultimately reach the human gut. Of particular concern is what this means to us, and especially patients with gastrointestinal diseases11

There are initial indications that microplastics can damage the gastrointestinal tract12 by promoting inflammatory reactions or absorbing harmful substances13

While the highest plastic concentrations in animal studies have been found in the gut, the smallest microplastic particles are capable of entering the blood stream, lymphatic system and may even reach the liver. Now that we have first evidence for microplastics inside humans, we need further research to understand what this means for human health14

I believe that trying to reduce plastic usage and plastic-packed food might be beneficial for nature and for us. Certainly, plastic is a very useful material and has a lot of clever applications. But maybe we should try to rethink about the necessity of abundant plastic use, and search for and support ecological and sustainable alternatives.15"

World's Oceans Will Soon Contain More Plastic Than Fish

Indeed, the World Economic Forum estimates that by 2050, the world's oceans will contain more plastic than fish,16 thanks to the addition of 8 million metric tons of plastic each and every year — a figure expected to increase 10-fold17 over the next decade alone unless decisive action is taken. Already, in some ocean waters plastic exceeds plankton by a factor of 6-to-1.18

To avert such a travesty, the World Economic Forum recommends focusing on three key strategies, all of which hinge on rethinking how plastics are made in the first place, i.e., switching to renewable sources rather than using crude oil to produce plastic:19

  1. Improving the design of plastic packaging and other plastic products
  2. Devising "new and creative delivery models based on reusable packaging"
  3. Making recycling pay off — Plastic can, and should, be recycled, but a 2017 analysis20 reveals a staggering 91 percent aren't
transform plastic packaging strategies

Disturbingly, plastic pollution is also accumulating on farmland. According to research21 published in Science of the Total Environment, the annual release of plastics to land may actually be four to 23 times greater than that released to oceans! The use of sewage sludge (biosolids) as fertilizer is one major source of all this plastic pollution.

When factoring in the range of sludge application rates, and assuming data from certain other countries with similar plastics usage are comparable, the total annual input of microplastics to European and North American farmlands is thought to be 63,000 to 430,000, and 44,000 to 300,000 tons respectively.

Are Microplastics Contributing to Bowel Diseases and Cancer?

Dr. Herbert Tilg, president of the Austrian Society of Gastroenterology and chair of the United European gastroenterology scientific committee (who did not take part in the study), worries that microplastics may be a factor contributing to rising rates of inflammatory bowel syndrome and colon cancer. He told New Hampshire Public Radio:22

"Colon cancer is increasing in young people, and we think that either dietary or environmental components are a factor. Now that we know we can detect microplastics in humans, we can develop larger studies, in both healthy and diseased patients, to find out if they are a contributing factor."

Microplastics Linked to Altered Microbiota, Impaired Metabolism and Liver Toxicity

As noted by Schwabl, recent research suggests microplastic may indeed have an adverse effect on gut microbiota. The study,23 published in The Science of the Total Environment, found that polystyrene microplastics affected the gut barrier, microbiota and metabolism of mice. As reported by the authors:

"In this study, we exposed male mice to 5 micrometers pristine and fluorescent polystyrene microplastics (MP) for six weeks. The results showed that the polystyrene MP was observed in the guts of mice and could reduce the intestinal mucus secretion and cause damage the intestinal barrier function …

At the phylum level, the content of Actinobacteria decreased significantly in the polystyrene MP-treated group ... [T]he diversity of gut microbiota was altered after polystyrene MP exposure. At the genus level, a total of 15 types of bacteria changed significantly after exposure to polystyrene MP.

Furthermore, the predicted KEGG (Kyoto Encyclopedia of Genes and Genomes) metabolic pathway differences indicated that the main metabolic pathways of the functional genes in the microbial community were significantly influenced by the polystyrene MP.

In addition, indexes of amino acid metabolism and bile acid metabolism in the serum were analyzed after polystyrene MP exposure. These results indicated that polystyrene MP caused metabolic disorders. In conclusion, the polystyrene MP induced gut microbiota dysbiosis, intestinal barrier dysfunction and metabolic disorders in mice …"

Another study24 published in 2016 found polystyrene microplastics accumulated in zebrafish and stressed the liver. After just seven days of exposure, particles measuring 5 micrometers had accumulated in the gills, liver and gut. Particles measuring 20 micrometers in diameter accumulated the gills and gut only.

Histopathological analysis revealed the particles caused inflammation and the accumulation of lipids in the liver, and "significantly increased activities of superoxide dismutase and catalase, indicating that oxidative stress was induced." Metabolomic analysis also found the microplastics "induced alterations of metabolic profiles in fish liver and disturbed the lipid and energy metabolism."

Earlier research25 has also proven that microplastics are taken into cells and cause significant effects on the tissue of the blue mussel under laboratory conditions.

Bottled Water Nearly Universally Contaminated With Microplastics

As mentioned earlier, recent tests26 reveal drinking water is now nearly universally contaminated with microplastics, whether you're getting it from your tap or from bottled water. Just 17 of 259 bottles of water tested were found to be free of microplastic particles, and none of the 11 brands tested consistently free of plastic contaminants.

On average, the bottled water tested contained 325 pieces of microplastic per liter. The worst offender was Nestlé Pure Life, the most contaminated sample of which contained 10,390 particles per liter, while the least contaminated brand, San Pellegrino, contained a high-end density of 74 particles per liter. Here's a summary breakdown of the most and least contaminated brands:27

Most contaminated brands Least contaminated brands

Nestlé Pure Life

San Pellegrino









As noted by Orb Media, which commissioned the testing:28

"[F]indings suggest that a person who drinks a liter of bottled water a day might be consuming tens of thousands of microplastic particles each year … For microplastic debris around 100 microns in size … bottled water samples contained nearly twice as many pieces of microplastics per liter (10.4) than the tap water samples (4.45) ...

According to existing scientific research, the plastic particles you consume in food or drinks might interact with your body in a number of different ways … Some particles might lodge in the intestinal wall. Others might be taken up by intestinal tissue to travel through the body's lymphatic system …

Smaller debris, in the range of 20 microns (0.02 mm) has been shown to enter the bloodstream before it lodges in the kidneys and liver … Ninety percent of the plastic particles we found … were … small enough … for some to cross the gut into your body."

In response to these findings, the World Health Organization has promised to launch a safety review to assess the potential short- and long-term health risks of consuming microplastic in water.29

How You Can Be Part of the Solution

Our cultural affection for all things disposable has left a trail of destruction. Now, how can you be part of the solution? In short, by becoming a more conscious consumer. Really give some thought to the manufacturing of the products you buy, how they may affect you during use, and what will happen to them once you dispose of them.

Few of us are capable of living a zero-waste lifestyle at this point in time, but every single one of us can take small but definitive steps toward the goal of reducing plastic trash in all of its forms. Here are a few suggestions to consider:

Avoid bottled water — Instead, invest in a good water filtration system for your home and fill your own reusable bottles with filtered tap water. Previous testing has revealed most bottled water is nothing but tap water anyway, which may or may not have undergone additional filtration. With over 267 toxins found in public tap water, it's worth the investment to install a high-quality filter and bring your own water wherever you go.

Reduce your use of all things plastic — Purchase products that are not made from or packaged in plastic. While the items involved are near-endless, here are a few ideas:

  • Use reusable shopping bags for groceries
  • Bring your own mug when indulging in a coffee drink, and skip the lid and the straw
  • Store foods in glass containers or mason jars as opposed to plastic containers or bags
  • Take your own leftover container to restaurants
  • Request no plastic wrap on dry cleaning

Avoid microfiber clothing such as fleece, and/or wash them as infrequently as possible — Stretchy fabrics and fleece items shed copious amounts of microscopic plastic fibers each time they're washed. Due to their tiny size, these microfibers30 flow straight through the wastewater treatment plant without being caught.

Up to 1.7 million tons of microfibers enter the ocean each and every year,31 and testing shows synthetic microfibers make up 85 percent of shoreline debris worldwide.32 Once in the water column, this plastic microdebris blocks sunlight required for plankton and algae to thrive, and the ramifications of this reverberates throughout the entire food chain.

Not only do the actual fibers pose a health hazard to the sea life that consume them, since they bioaccumulate, these fibers also act like sponges, soaking up and concentrating toxins like PCBs, pesticides and oil, making the animal — which could end up on your plate — even more toxic than it normally would be.

A far "cleaner" option all-around is 100 percent organic clothing — cotton, hemp, silk, wool or bamboo fabrics dyed with natural, nontoxic dyes. The Bluesign System Certification33 tells you the item has been manufactured with a minimal amount of hazardous chemicals, or none.

Wash synthetic clothing as irregularly as possible using a mild detergent. Line dry instead of putting them in the dryer, as the heat and agitation will break down fibers. Handwashing or using the gentle cycle with cold water will also minimize the shedding of fibers, as will using a front loading washing machine.

You can also install a microfiber filter on your washing machine, but the fibers will still end up in the environment since they'll end up in trash destined for a landfill.

Recycle what you can — Take care to recycle and repurpose products whenever possible, and/or participate in "plastic drives" for local schools, where cash is paid by the pound.

Remember recyclables must never be placed in a plastic bag, as recycling facilities will simply send bagged items to a landfill.34 So, to ensure your recyclables actually get recycled, make sure you place the items loose in your recycle bin.

For more do's and don'ts of recycling, see "Surprising Recycling Mistakes Most People Make." You can also check out this Lifehacker article for more information about what you can and cannot recycle in general, over and beyond plastic.35

          Concerned About Your Security Online? Learn Tips That Are Guaranteed To Keep You Safe      Cache   Translate Page      
  Keeping private is the need of every human being. You not only need privacy but security in your home when surfing the internet. Hackers and snoopers are ingenious and will always find a way of violating your personal space online. Your privacy is your right. If living in a country with a dictatorial regime, […]
          Millions hacked from Pakistani bank; Central bank cautious on safety of 22 banks and payment systems      Cache   Translate Page      
Digital payment systems, majorly debit and credit card channels in Pakistan have been reportedly affected. This, after a report of a card-cloning scam that resulted in a loss of millions for a Pakistani bank.

Security of credit and debit cards issued by 22 Pakistani banks were under risk after the Pakistan Computer Emergency Response Team confirmed that 20,000 debit and credit cards issued by the banks were cloned and skimmed.

Card cloning is a technique using which details from a bank issued card are copied onto a new card. Card cloners use this technique for illegal transactions.

Actual estimates of the damage are yet to be calculated, but an initial report pegs the loss at $20,000.

Mohammad Shoaib, head of Pakistan Federal Investigation Agency's cyber-crime unit, was quoted explaining two television stations that "almost all" banks had been hit by hacking and a "large amount of money" had been stolen.

Shoaib was also quoted in a report by Geo News that "data from almost all Pakistani banks has been reportedly hacked."

BankIslami was among the first banks to be reported by the PakCERT in a threat report. The bank had first noticed unusual transactions of 2.6 million rupees or approximately $20,000 on Oct. 27 and had temporarily shut down its international payments system. PakCERT said that details of cards were posted on the dark net, an area of the Internet only accessible via special web browsers that ensure anonymity.

Dark net users could then access the cards to make online purchases but it was not clear how much money in total had actually been stolen.

"Subsequently, several other banks issued security alerts and either completely blocked customers' debit and credit cards or blocked their online and international use," PakCert said in its report.

In a statement, BankIslami said, it shut down the international and online payments systems and notified the central banking regulator.

The bank further added that the illicit transfer of 2.6 million rupees was returned to customers' accounts.

Soon after confirmation of the card-hack, the regulator- State Bank of Pakistan tried to reassure investors and consumers that the banking system had not been hacked with.

SBP also said that it had instructed all banks to increase their scrutiny after a lender reported the problem last week. The Central Bank clarified, "It has been noted with concern news items reporting that the data of most banks has been hacked. SBP categorically rejects such reports."

Here are some reponses from Twitter:

          Comment on Cobra F-Max Driver Review by Cobra Golf F-MAX Superlite Driver Review - The Hackers Paradise      Cache   Translate Page      
[…] above all else.  Last year we saw the metamorphosis of that line into the FMAX (reviewed here) and now the next iteration is the Cobra FMAX […]
          Πως η κοινωνική επιχειρηματικότητα μπορεί να αλλάξει τον κόσμο      Cache   Translate Page      

ΟνομάζομαιΔαμιανός Βαβανός,είμαι κοινωνικός επιχειρηματίας (SocialEntrepreneur) και πιο συγκεκριμένα τον τελευταίο χρόνο έχω την τιμή να είμαι ο συνιδρυτής και διαχειριστής του SocialHackersAcademy.  HSocialHackersAcademy είναι μια Μη Κερδοσκοπική Οργάνωση η οποία εκπαιδεύει πρόσφυγες και Έλληνες μακροχρόνια ανέργους στον προγραμματισμό υπολογιστών με απώτερο σκοπό την εύρεση εργασίας και την κοινωνική τους ένταξη. 

Τι είναι η Κοινωνική Επιχείρηση; 

Πιθανόν να έχετε ακούσει τον όρο Κοινωνική Επιχείρηση. Ισως και όχι. Για αυτό θα αναφέρω λίγα πράγματα για το συγκεκριμένο μοντέλο επιχείρησης.

Το μοντέλο της κοινωνικής επιχείρησης είναι πολύ ενδιαφέρον και πιστεύω πως μπορεί να συμβάλει ενεργά στο να δημιουργήσουμε έναν κόσμο με λιγότερες ανισότητες και περισσότερες ευκαιρίες για όλους. Το μοντέλο της κοινωνικης επιχειρησης βρίσκεται ανάμεσα στο μοντέλο των επιχειρήσεων που έχουν σκοπό το κέρδος και στις Μη Κερδοσκοπικές Εταιρείες. Είναι δηλαδή μία μορφή εταιρείας που διέπεται από ένα τρίτο μοντέλο επιχειρηματικότητας.   

Νομικά για να επιτευχθεί αυτό υπάρχουν δύο τρόποι:

1. Να ιδρύσετε μιαΚΟΙΝΣΕΠ

2. Να ιδρύσετε μια Μ.Κ.Ο. και ταυτόχρονα μια Ι.Κ.Ε.

Ο κάθε ένας από τους παραπάνω τρόπους έχει πλεονεκτήματα και φυσικά μειονεκτήματα. 

Πως προέκυψε η Κοινωνική Επιχειρηματικότητα; 

To οικονομικό μοντέλο που έχει επικρατήσει στο παγκόσμιο στερέωμα για αρκετές δεκαετίες, δεν επιτρέπει τις ίδιες ευκαιρίες σε όλες τις ομάδες και υπάρχουν σαφής αδικίες. Στον βωμό της «ελεύθερης αγοράς» όμως δημιουργήθηκαν τεράστιες ανισότητες και πολλοί άνθρωποι δεν μπορούν να ανταπεξέλθουν στις βασικές τους ανάγκες. Είτε γιατί είχαν τη ατυχία να γεννηθούν σε μια χώρα του «3ου κόσμου» είτε γιατί αντιμετώπισαν δυσκολίες στην ζωή τους που τους ανάγκασαν να ζουν σε συνθήκες φτώχειας (π.χ. Πολιτικές καταστάσεις, πόλεμος, φυσικές καταστροφές). 

Εκεί έρχεται η κοινωνική επιχείρηση της οποίας ο σκοπός είναι η παραγωγή κοινωνικού έργου / κοινωνικού αντίκτυπου ενώ ταυτόχρονα μπορεί να έχει κέρδη και να μην εξαρτάται από χρηματοδοτήσεις κρατικές, Ευρωπαϊκές ή άλλες. Αυτή είναι και η μεγαλύτερη πρόκληση που αντιμετωπίζουμε στους SocialHackersAcademy. 

Το «φιλανθρωπικό» χρήμα διαχέεται ανάλογα με το trendingissue της παρούσας στιγμής. Πριν 2-3 χρόνια ήταν η προσφυγική κρίση στην Ελλάδα και αμέτρητα εκατομμύρια Ευρώ έμπαιναν στην χώρα. Αυτή την στιγμή όμως τα Μ.Μ.Ε. έχουν στρέψει την προσοχή τους αλλού και η παροχή οικονομικής στήριξης δεν είναι ίδια. Τι θα συμβεί όμως με όλους αυτούς τους ανθρώπους; Στην Τουρκία μόνο υπάρχουν 3.5 εκατομμύρια πρόσφυγες. Πως θα ζήσουν αυτοί οι άνθρωποι; Πως θα ενταχθούν; Πως θα ονειρευτούν ένα καλύτερο αύριο; 

Η κοινωνική επιχειρηματικότητα στο προσκήνιο 

Σε αυτό το σημείο έρχεται η Κοινωνική Επιχειρηματικότητα και εμείς οι κοινωνικοί επιχειρηματίες, οι οποίοι με ορμή και αποφασιστικότητα προσπαθούμε να αλλάξουμε την κατάσταση. Προσοχή! δεν είναι απαραίτητο να αλλάξουμε τον κόσμο σήμερα. Αυτό που προτείνω είναι να ενωθούμε και να ξεκινήσουμε την προσπάθεια. Ο καθένας μόνος του στην αρχή και στη συνέχεια όλοι μαζί να βάλουμε το λιθαράκι μας και γιατί όχι τον ογκόλιθο μας, κατασκευάζοντας και δημιουργώντας μία πιο δίκαιη κοινωνία,παρέχοντας περισσότερες ευκαιρίες για εκείνους που τις έχουν ανάγκη. 

Παραδείγματα Κοινωνικής Επιχειρηματικότητας 

Υπάρχουν πολύ επιτυχημένα κοινωνικά πρότζεκτ σε όλο το κόσμο. Το πιο γνωστό μάλλον είναι αυτό της εταιρίαςToms η οποία για κάθε ζευγάρι παπούτσια που αγοράζεται δωρίζει ένα ζευγάρι παπούτσια σε κάποιον που το έχει ανάγκη. Το σημαντικό στην ιστορία τουιδρυτή της Toms είναι ότι δεν έψαχνε πώς θα βγάλει χρήματα ή πως θα αλλάξει τον κόσμο. Η ιδέα προέκυψε απλά όσο αυτός ταξίδευε στην Αργεντινή και παρατήρησε πως πολλά παιδιά δεν φορούσαν παπούτσια. Αναγνώρισε λοιπόν μια ανάγκη και βρήκε την λύση για να την καλύψει. Όπως λέει και ο αγαπητός μουPeterDiamandis «Θέλεις να γίνεις δισεκατομμυριούχος; Βοήθησε ένα δισεκατομμύριο ανθρώπους». Υπάρχουν πολύ αξιομνημονευτοι κοινωνικοί επιχειρηματίες εκεί έξω που παρεμβαίνουν και βρίσκουν λύσεις στο τραπεζικό, φαρμακευτικό, επισιτιστικό πρόβλημα κ.α. 

Αλλά ας μην κοιτάμε μόνο τα παραδείγματα του εξωτερικού. Ρίχνοντας μια ματιά στην Ελλάδα θα δούμε ότι στην χώρα μας υπάρχουν ενδιαφέρουσες προσπάθειες όπως αυτή τηςWiseGreece η οποία βοηθάει στο επισιτιστικό πρόβλημα που υπάρχει στην Ελλάδα. Με μια μικρή ομάδα και μια δυναμική «μπροστάρισα» έχουν επιτύχει πολύ σημαντικό κοινωνικό αντίκτυπο. 

Το να αλλάξεις τον κόσμο είναι πολύ πιο εύκολο απ’οτι φαντάζεσαι το μόνο που πρέπει να κάνουμε είναι να το ονειρευτούμε, να ενώσουμε τις δυνάμεις μας, να μικρύνουμε το εγώ μας και τα υπόλοιπα θα έρθουν!!! 

ΥΓ: Θα ήταν μεγάλη μου χαρά να συνδεθούμε στοInstagram😊

          Snag this Ethical Hacking bundle for only $39!      Cache   Translate Page      
It seems like every other day there's another high-profile hack that puts thousands of users' information into the hands of people who shouldn't have it. To safeguard against these types of attacks, companies hire Ethical Hackers who expose security flaws. These Ethical Hackers are in high demand, and the profession can be quite lucrative, Get eight Ethical Hacking courses for only $39 Learn more Because this profession requires a broad range of knowledge, the courses needed to become an Ethical Hacker are generally quite expensive. Right now, however, Windows Central Digital Offers has a pretty amazing deal. You can get this 45-hour bundle for only $39; that's 96% off the regular price of $1,273....
          Researchers Discover A Way to Bypass Hardware-Based SSD Full Disk Encryption      Cache   Translate Page      
Researchers Discover A Way to Bypass Hardware-Based SSD Full Disk Encryption Researchers from Radboud University in the Netherlands have announced a flaw that affects some SSDs that feature hardware-based security; the flaw could allow an attacker to completely bypass disk encryption. Bypassing the encryption would give the hackers full access to the local data without having to know the password for the disk. The

          HSBC confirma vazamento de dados de clientes nos EUA      Cache   Translate Page      

O HSBC confirmou nesta terça-feira (6), em alerta oficial para seus clientes, que as contas de alguns usuários nos Estados Unidos foram hackeadas em outubro. O documento registrado pelo governo da Califórnia aponta que informações pessoais de usuários foram comprometidas, como histórico de transação e de pagamento.

Segundo o aviso, a empresa sabe que houve um acesso não autorizado em seus servidores entre os dias 4 e 14 de outubro deste ano. “Quando o HSBC descobriu que sua conta online havia sido impactada, suspendeu o serviço para prevenir acessos futuros não autorizados em sua conta”, explica o documento. A empresa, então, avisou seus clientes e pediu que todas as senhas e credenciais de acesso fossem trocadas.

O banco informa que muitos tipos de dados pessoas podem ter sido comprometidos, entre eles, nome, endereço, e-mail, número, histórico e extrato da conta de quem usou o sistema online neste período.

Documento enviado a clientes do banco (Foto: Captura)

A nota ainda informa que está melhorando o sistema de autenticação para “adicionar uma camada extra de segurança”. Contudo, o banco não informou qual a intenção do hacker nem informa como os cibercriminosos conseguiram acesso a tais dados.

          FIFA nega que tenha dados vazados e acusa mídia de atacar instituição      Cache   Translate Page      

Um grupo chamado Football Leaks disse ter acessado informações do banco de dados da FIFA e ameaça publicar os dados confidenciais. Em nota, a organização negou, dizendo que a movimentação não passa de uma tentativa de deslegitimar a nova diretoria. Segundo o jornal The New York Times, o alto escalão da FIFA tem conhecimento de que seu sistema foi invadido em março deste ano e teme o vazamento de dados.

Os hackers teriam entrado no banco de dados da Federação por um golpe de phishing, que geralmente é quando uma pessoa clica em um link suspeito, expondo o ambiente onde um computador ou dispositivo móvel está.

A FIFA tem motivos de sobra para se preocupar, já que o Football Leaks não leva este nome à toa. O veículo ganhou projeção em 2015, exatamente com e-mails, contratos e mensagens anteriormente obtidos pela revista alemã Der Spiegel. Desde então, tem se mostrado um repositório de vazamentos sobre o futebol mundial.

Na época, o Der Spiegel informou ter unificado a apuração em um consórcio investigativo chamado European Investigative Collaborations. A suspeita é de que esta organização esteja trabalhando na apuração deste novo vazamento de março.

Em nota, a FIFA disse que recebeu uma série de pedidos de informação e negou o processo, mas diz que a mídia “insiste em ignorar” sua fala. “Parece óbvio que o que foi reportado em algumas empresas de mídia tem apenas um alvo: a tentativa de rebaixar a nova diretoria da FIFA e, em particular, o presidente, Gianni Infantino, e a secretária geral, Fatma Samour”, diz o comunicado.

A Federação assume que o passado da instituição recorre a muitos casos de corrupção conhecidos pela mídia, mas que há um processo para que a FIFA não tenha mais executivos corruptos. Logo, os rumores de vazamentos têm como objetivo apenas queimar a instituição. “Pelo benefício da dúvida, vale apontar que nenhuma das ‘reportagens’ possuem nada que remotamente seja uma violação de qualquer lei, estatuto ou regulamentação. Isso é, sem dúvida, uma melhora icomensurável em relação ao passado e algo com que a FIFA está completamente comprometida para seguir em frente”, pontua a nota.

          FIA, SBP at odds over theft of bank accounts data       Cache   Translate Page      

ISLAMABAD: Amid conflicting reports about a wide breach of bank accounts data, the top investigation agency of the country and the State Bank of Pakistan were found at odds on Tuesday, with the latter claiming that neither any bank nor any law-enforcement agency came up with such information.

The Federal Investigation Agency said ‘international’ hackers were behind the data breach of all major banks and they were asked through the SBP to protect their data and money of their clients. But the State Bank categorically denied such reports and claimed that no such information or evidence had been provided to it.

The issue concerning bank account holders across the country also reverberated in the National Assembly on Tuesday when chairman of the Senate standing committee on interior Rehman Malik sought a comprehensive report from the SBP, the interior ministry and the FIA on the matter within 10 days.

To sort out the matter and devise a joint strategy to handle the issue, an important meeting of the heads of all major banks, the SBP and the top investigation agency is scheduled for next week though a couple of banks moved in the late evening hours to assuage consumer concerns by announcing that their data was completely safe.

State Bank denies reports of hacking; banks cyber security issue echoes in NA

According to the FIA, there is a surge in number of complaints that people have lost their money, running into millions, from their bank accounts due to hacking.

When contacted, FIA’s Cyber Crime Director retired Capt Shoaib told Dawn that complaints regarding online stealing of money from the bank accounts had increased over the past few weeks. He said, “It is the responsibility of the banks to protect the money of their clients.”

He said the data of all main banks of the country had been hacked by ‘international’ hackers and the management of the banks through the SBP had been asked to protect their data and money of their clients.

Only last week, he added, a resident of Islamabad was deprived of Rs2.7million by the hackers and due to FIA’s intervention, that bank paid back the money to the victim.

He said the managements of the banks had been advised to make their data security fool-proof, otherwise, they would lose confidence of account holders.

“The FIA has no mandate to provide shield to the banks against hackers, because it is the sole responsibility of the banks to make their own arrangements to prevent stealing of their data and money of their clients,” he explained.

Later on Tuesday evening, the State Bank finally broke its silence in a press release and denied the reports of a wider data breach.

“SBP categorically rejects such reports” it said. “There is no evidence to this effect nor has this information been provided to the SBP by any bank or law enforcement agency.”

But the IT security firm whose report triggered the entire affair, PakCert, told Dawn that they had indeed shared their report with the SBP on Nov 5. “The report was shared with the State Bank via email at 4:30pm,” said Qazi Mohammad Misbauddin Ahmed, whose name appears on the top of the report. “We even received a response from the recipient a half hour later acknowledging receipt.”

Asked about this report, the SBP spokesperson confirmed receiving the report in question, but said it contained no evidence of a breach of data. “Look at the report carefully,” he said. “All it contains is the name of a bank, the number of cards supposedly in the position of the fraudsters, and price at which the bin containing all these cards can be purchased. Quite likely this data itself is fake,” the SBP spokesperson added.

In order to verify the authenticity of the data contained in the PakCert report, he continued, a bank would need to purchase the data in the bin, then go through the data and match it with what they have in their own database. If there was a match, next step would be to see if any unusual transactions had been reported, he told Dawn. “The banks might carry out some sort of verification at their end, but until that is done, there is no way to say that this is authentic information” in the threat intelligence report produced by PakCert.

As the dark net is full of material of this sort and its authenticity is always difficult to establish, the FIA claimed that a meeting of SBP and all major banks had been called next week to devise a joint strategy to tackle the issue.

Taking a serious notice of the reported hacking of data of the country’s major banks, the opposition drew the attention of the government towards the issue and demanded effective steps to ensure security of bank data.

While speaking on the point of order, former federal minister Ahsan Iqbal raised the issue and urged the government to take effective measures to save the savings of account holders. He said it was quite serious that data of all major banks had been hacked by the hackers in other parts of the world.

“This is a serious matter and the government should address it,” he said.

In response to the concerns, Federal Education Minister Shafqat Mehmood assured the house that the government would take effective steps to protect the money of the account holders. “It is a very serious problem and the government will take action on it,” he added.

Earlier during the day, chairman of the Senate standing committee on interior Rehman Malik sought report from the interior ministry, SBP and FIA on the matter within 10 days. He directed the FIA to probe as to how the data of banks was hacked. “It is quite alarming that bank accounts details of hundreds of thousands of Pakistanis have been stolen,” he added.

Mr Malik, who served as interior minister from 2008-13, said banks were responsible for the security of bank accounts of people. “Ironically, the banks failed to protect the money of their clients,” he said.

Meanwhile, individual banks moved to assuage consumer concerns. MCB issued a late night statement saying “customers’ data is completely safe. Not a single customer has been affected in the incident/ report publicized in media.” Likewise, Sindh Bank assured its customers that “their data is completely secure and is not subject to any internal or external risk”. Other banks are expected to follow suit.

Published in Dawn, November 7th, 2018

          Comentário sobre Como virar um Hacker, tutorial: Aprender a hackear, virar hacker PC por Joao      Cache   Translate Page      
Os hackers, nao precisam se identificar, logo, o senhor esta' desqualificado. Aconselho-o a procurar outra ocupacao.
          Comentário sobre Sistema Operacional Hacker: Melhor programa para Hackear, virar Hacker por Miguel Fernamdes      Cache   Translate Page      
gostaria de estar conectado com sigo. se fosse possível.
          Comentário sobre Sistema Operacional Hacker: Melhor programa para Hackear, virar Hacker por Miguel Fernamdes      Cache   Translate Page      
Gostaria de estar contado consigo por email. se fosse possível.
          What Could Go Wrong With Voting Machines on Election Day?      Cache   Translate Page      

Ed Felten has hacked into many, many voting machines over the years, because he wants Americans to know that the technologies we use to record votes can be dangerously porous. A professor of computer science and public affairs at Princeton University and the director of the Center for Information Technology Policy, he served as the deputy chief technology officer of the United States under President Barack Obama and now studies issues of government transparency and cybersecurity, with a special focus on voting and election security. In a recent interview for Slate’s technology podcast If Then, Felten described the problems that have plagued voting machines for years, why much of the technology has remained outdated, and what he’s worried about in 2018.

Listen to If Then by clicking the arrow on the audio player below, or get the show via Apple Podcasts, Overcast, SpotifyStitcher, or Google Play.

April Glaser: You first started hacking into voting machines in the late ’90s at Princeton, if I’m correct. What were those machines and what flaws did you see then? Are we still seeing the same problems today?

Ed Felten: We see a lot of the same problems today that we’ve seen in the past, and mostly because the machines have not been upgraded in many places. What we found back then was really two things. First of all, there were fundamental vulnerabilities because of the use of paperless computer systems in voting. That’s a risky thing to do in itself. Then on top of that, the systems that were actually out there in the field were not very well secured.

In some places in the U.S., there are new machines in use that are more secure, but in a lot of places, including my own home state of New Jersey, we’re still using the same old equipment as we have for a long time.

Glaser: You saw some of these voting machines were actually for sale on eBay back then, right? Is that still the case?

It still is, yeah. When a state or county switches machines or they take some out of service, they typically will sell them for surplus. So you can buy them on eBay and other places. That’s how we got a lot of the early machines that we study.

Glaser: I remember reading back in 2008 that one of the voting machine manufacturers actually threatened to take legal action against you for studying and testing the security of these machines. Has your research led to a hardening of these voting machine technologies?

I think the long-term impact of the research that my team and others have done has been more to get states and counties to switch to more secure systems. But that happens very slowly. We still have something like 30 percent of U.S. voters are voting on systems that are suspect by design.

Will Oremus: Before we get into the problems with the current machines, I wanted to ask what’s maybe a really basic question. But what does it look like to hack a voting machine? Is it a person standing there at the ballot box in front of the machine and doing stuff to it? Is it that they’re tapping in somehow remotely? When you hack them, what does it look like, and what might it look like if this were to actually happen in an election?

When we study a machine, we first kind of take it apart in our lab to understand everything about it. Then we try to figure out how someone might be able to modify the machine or the results. That typically involves just changing the software on the machine. Literally just installing a software upgrade or update that wasn’t authorized by the manufacturer that causes the machine to do something else. So usually it involves either having hands on the machine, physically hands on somewhere. It might be in the warehouse where the machine is kept, or it might also involve, if the machine has some kind of networking or wireless capability, breaking into it that way.

Glaser: Have we seen instances of hacked voting machines? I know that there’s been problems with the technology having bugs or not working right. But have we seen instances of hacking?

We don’t have confirmed cases in the U.S. of hacking that affected elections. As you said, we’ve seen quite a few examples of errors or things that shouldn’t have happened happening, but we haven’t seen those sorts of errors. But then again, part of the problem is that it would be hard to tell because the vulnerable machines don’t keep the kind of records you would need to keep in order to be sure that there wasn’t a problem.

Oremus: I was going to ask, is it just that we don’t know and it probably has happened, or are there actual barriers that have prevented this from happening? If it hasn’t happened, what’s the obstacle that has kept it from happening, you think?

I think the factor that has kept it from happening is that the people who have the capability of doing it have not chosen to manipulate an election. We knew in 2016, we’ve known before that there are people who have the capabilities to mess with voting machines, but they just haven’t so far. We can count ourselves lucky, but we shouldn’t stay in this position where we have to rely on the bad guys choosing not to act.

Glaser: Yeah, that’s quite unsettling. We know earlier this month, Texas officials charged that early votes intended to go to Beto O’Rourke instead went to Ted Cruz, and the voting machines, which are the eSlate machines made by Hart Intercivic, had switched the votes. I remember reading that those voting machines were running on something like 2007 software. Is this something that voters should really worry about? That is such ancient software.

There are a lot of voting machines, electronic voting machines, that run old software. That’s true in Texas. That’s true in Georgia. It’s true in New Jersey and a bunch of other places. Typically, these machines don’t have their software updated very often, and that has something to do with cost and maintenance issues, and also that software updates, in some cases, need to be certified through a slow and expensive process, which pushes people away from actually doing that. So all the more reason not to have to rely on this software being correct.

Oremus: What was the issue in Texas? I couldn’t get full clarity on that. Do you have a good understanding, do you think, of the vote-flipping or vote-switching bug?

As I understand it, it’s a usability problem, a user interface problem. This particular voting machine has a strange interface where there’s a sort of wheel that the voter can turn, and then a button to press to record their choice. Apparently if users go faster than the machine anticipates, you can get unexpected results. This kind of points to another issue that folks have had with electronic voting machines, which is often there are usability problems that cause more voters to leave the voting booth not having cast the vote they thought they did than we really want.

Oremus: That’s the argument, of course, for the paper trail, right?

A paper trail helps. Really for electronic voting, a paper trail is the most important safeguard because it creates another record of the vote, which the voter saw. The thing about paper is that it’s less surprising in how it behaves than computers can be. You kinda know that if you take a pencil or pen and make a mark on a piece of paper and put that paper in a box, and then you come back later and look at the paper again, it will still have the same marks on it. That’s not necessarily the case with a computer, right? If a computer records some information and then you come back later, it might have changed. That’s just the nature of how computers work. So, paper trail is the most important safeguard we need against all of these sorts of problems, whether it be malice, or error, or usability. Paper trail helps with all of those.

Oremus: My state, Delaware, just recently approved new voter machines that do have a paper trail. But should we be thinking about going all the way back to just pure paper? The whole push toward voting machines really gained momentum after Bush v. Gore with the hanging chads in Florida. Paper obviously has its own problems. What’s the optimal solution, do you think, at this point?

From my standpoint, I think the best system is one that keeps both paper and electronic records. You have a paper record, which the voter saw and verified, and you also have an electronic record. The benefit of having both is that each one has its pros and cons from the standpoint of reliability or security, but if you keep them both and then check them for consistency against each other, then you’re in the best position to detect a problem if there is one. A good example of a system like that is an optical scan system where the voter marks a paper ballot and then the voter feeds that into a scanner in the polling place, and the scanner keeps an electronic record. So best practice No. 1 in the polling place is to have a voter-verified paper record, along with an electronic record. And then best practice No. 2 is to actually compare them by a statistical audit after the election.

Glaser: Are there federal standards that voting machine companies have to adhere to in any way? Because it seems like they should work already, that they shouldn’t be switching votes or have these usability issues.

There are federal standards, and most of the states have voluntarily adopted the federal standards. But those standards are old and they’re not very comprehensive. Some of the machines may have been certified against the standard that existed when the machine was new, and so those could be standards that are quite old and might not have much of anything about security or usability in them. Back in the day, the standards were really written thinking about the old-fashioned, big metal lever machines. The federal government and the whole policy process is still kind of catching up in terms of standards.

Glaser: You worked at the White House under the Obama administration. I’m curious, why wasn’t there more progress on this issue then, or when will we see progress on this issue? I know it was only in January 2017 that election systems were designated as critical infrastructure like the electrical grid is, that they would get federal protections.

One of the core challenges here is that elections are really run by the states and counties as opposed to being run or managed in a centralized way. The federal government can set standards, but at the end of the day, it’s your county clerk, probably, who is the most important person for the operation of voting in the place where you vote. Because it’s so decentralized, and because these things are run by officials who often don’t have a lot of technology expertise available to them, it’s very difficult to get coordinated action across the whole country. So what we’ve seen over the past, say, 15 years as the security of voting machines has come into focus as an issue is slow progress as more and more states and counties adopt more secure practices. But it’s going be quite a while, probably, before we move forward. There have been efforts to pass federal legislation in this space. There’s a bill called the Secure Elections Act, which is now pending. But things tend to move slowly.

Glaser: The voting machine industry, I’m reading, is like a $300 million a year industry. And according to some fantastic reporting from Kim Zetter in the New York Times Magazine, there’s this revolving door between voting machine vendors and election officials. I’m curious if one of the reasons why we’re not seeing updates on the local level is that there may be a corruption issue.

I don’t know if there is clear corruption, but there is a tight community of people who are involved in election administration, whether on the vendor side or the election official side. I think the concerns about the cybersecurity of elections have been pretty slow to percolate into that community. This is not unusual to the voting machine space. You see a lot of different industries and sectors that are slow to catch on to how serious the security problems they face could be. Often it takes someone in a sector getting burned before the sector really wakes up and starts to take cybersecurity more seriously. We certainly don’t want to be in a situation where someone in the voting space or election space has to get burned before we take this more seriously.

Oremus: I know one thing that election security experts have been concerned about for a long time is that the software in these systems is proprietary, so you have these different private companies making the voting machines, building the software. And when researchers say, Hey, can we see your software and make sure it’s safe, make sure it doesn’t have bugs in it?, they say, No, you can’t see it. Is that still a problem today and has there been any progress in getting them to open that up or moving toward a more open-source approach?

There have been some efforts to make open-source voting software, but the major vendors are still operating in a closed-source way. This really comes down to what are the contracts that states and counties sign when they buy systems, because the degree of freedom that they have to inspect or reverse-engineer or analyze the systems depends on what’s in the contracts. Sometimes there are terms in there that say thou shall not examine or do security analysis on a system. That’s obviously, in my view, not something that a public official should be signing for a technology like this. There are other situations where officials insist on having more ability to inspect. Many of the most usable studies of voting machine security have come about because of officials who put their foot down and insisted on more freedom to have the machines tested.

Oremus: Yeah, it seems like maybe one dimension of this is a problem with technological literacy on the part of the representatives at the state and local levels who maybe don’t have the information needed to evaluate these systems as they’re making these decisions on behalf of the public.

It’s true there’s not a great deal of information that officials have about how the machines work or about the security. Certainly a lot of decisions have been made in the past that officials might regret now. But, budgets being tight, it’s not easy to admit error and spend another pile of money on new systems. The good news in this area is that I think it’s now pretty clear that the goal should not be to have systems that need to be bulletproof in terms of their security. The goal instead should be to have an overall system that is resilient so that if something goes wrong with the software, if it behaves strangely, that you have something to fall back on, you have a paper ballot, you have an audit or recount capability so that whatever goes wrong, you’ll be able to recover and at the end of the process, voters will be able to have confidence that you got the result right in the end.

Glaser: What’s your biggest concern for the 2018 election? What are you worried about this time around?

Well, it’s the same worry that we’ve had in past election cycles, unfortunately. It’s partly what happens if somebody tries to manipulate the systems and change the result of the election. But, as in 2016, there’s probably greater concern about the possibility that someone will try to undermine confidence in the election to try to undermine the legitimacy of the process by trying to cast doubt on the result. That could mean just trying to cause chaos in some way and then trying to spread rumors about misbehavior or spread conspiracy theories.

The worst outcome that I think that I feared in 2016, and the thing that is the biggest concern in this cycle, is that at the end of Election Day we genuinely won’t know who the voters wanted to put in charge, because we don’t have really a road map for dealing with that kind of uncertainty. The whole point of an election or the way we should think about election processes and security is that the goal is to produce convincing evidence as to what the voters wanted to do. If we’re in a situation where we don’t have convincing evidence pointing in either direction, and yet it’s the end of Election Day—and there really are not do-overs in American elections—then we’re in a difficult situation. I think that’s the thing that I would worry about the most.

          The U.S. Government May Have Just Made It Much Easier to Hack Back Against Russia      Cache   Translate Page      

“U.S. military hackers have been given the go-ahead to gain access to Russian cyber systems as part of potential retaliation for any meddling in America’s elections,” according to a Center for Public Integrity report. The article continues that this authorized activity is in preparation for “an offensive cyber-attack that the United States would unleash if Russia electronically interferes with the 2018 midterm election on Nov. 6.”

This more aggressive action would be in line with the reported new approach under a classified presidential directive, National Security Presidential Memorandum 13, or NSPM-13, that accompanied the September National Cyber Strategy and its corresponding Department of Defense Cyber Strategy. The unclassified summary of the DOD strategy states that DOD will “defend forward to disrupt or halt malicious cyber activity at its source, including activity that falls below the level of armed conflict.” This statement is consistent with comments by U.S. Cyber Command’s commanding general about the need for “persistent presence” on the web to ensure the safety of U.S. interests. “Defending forward” and “persistent presence” are euphemisms for taking actions on computer systems that are not DOD, including systems outside the United States.

This policy triggers some interesting speculation as to how the United States views international law and cyber activities. It seems uncontested that international law prohibits one country from coercively intervening in the domestic affairs of another country. This prohibition of intervention has its roots in Article 2(7) of the United Nations Charter and has been well reflected in international courts and tribunals. In describing what actions might equate to a prohibited intervention, courts have talked in terms of coercive measures by one state in another state’s domaine réservé—those matters reserved in international law to the sole prerogative of states, matters such as the right to choose a political, economic, social, and cultural system, and to formulate and execute foreign policy. NATO’s Cooperative Cyber Defense Centre of Excellence recently gathered a group of international experts who produced the Tallinn 2.0 Manual on the international law of cyberspace. In the manual, the experts argue that “the matter most clearly within a State’s domaine réservé appears to be the choice of both the political system and its organization.”

If Russia intervened in the midterm elections such that their actions violated the domaine réservé of the United States, the U.S. government would not be prohibited from engaging in “countermeasures,” as that term is understood in international law. These responses could include otherwise unlawful cyber measures designed to bring Russia back into compliance with international law. Non-cyber countermeasures would also be appropriate as there is no requirement for the countermeasure to use the same medium as the initial violation. In all circumstances, countermeasures must be proportionate to the injury suffered and must not involve destruction that amounts to the use of force. It is unclear if NSPM-13 addresses the lawfulness of countermeasures, though it may indicate an increasing willingness to use them.

With respect to actions that do not intervene in the domaine réservé, the Center for Public Integrity article highlights at least two very interesting points concerning the U.S. posture. First, the article quotes unnamed government officials who clarify that a foreign government’s influence campaigns don’t trigger a “broader response” such as countermeasures. It is only “efforts to tamper with voting registration and recording votes” that rise to that level. I take this to mean that the current administration believes that Russia can engage in influence operations, but until it actually hacks into voting machines, it has not violated international law because it has not coercively intervened in the domaine réservé.

An alternate view might be that the administration views Russia’s actions as a violation of international law but chooses, as a matter of policy, neither to describe them as such nor to respond to them as such. This would be a dangerous approach as it sends the wrong message not only to Russia, but also to all the other countries who are looking at Russia’s actions and forming their own interpretations of the law based on the United States’ reactions.

Neither of these views, of course, means that Russian individuals have not violated U.S. domestic law. In fact, this year’s Justice Department indictments against Russians for interfering in the 2016 presidential campaign make clear that much of their 2016 influence campaign violated U.S. domestic law. But the international law point is important.

Following from the first point, the article also makes clear that NSPM-13 allows DOD to take actions on foreign computers that would ensure “the right access” in case that was needed. Whether nonconsensual actions by one state on the computers in another state’s territory is prohibited by international law as a violation of sovereignty has been a hotly debated topic among academics and governments. That DOD is apparently allowed to establish “access” on other nations’ computers is significant: It appears that the Trump administration takes the view that persistent presence on foreign computers is not a violation of international law. Such actions would likely be considered unfriendly but not unlawful under international law, and would certainly be short of a prohibited use of force at least until harmful malware is activated.

In addition to the implicit assertions that can be drawn from the reported description of NSPM-13 concerning the current state of international law, the order also provides interesting insights on national security law and process. By revoking an Obama administration framework for cybersecurity known as PPD-20, NSPM-13 establishes a more streamlined and DOD-friendly method of approving cyber actions. According to the Center for Public Integrity article, instead of the prior process, where almost unanimous intra-governmental approval was necessary before a specific cyber action could be taken, the new process is less cumbersome, allowing DOD and other government agencies to get prior approval of broad parameters, including some “left-and-right bounds,” and then take specific cyber actions without seeking additional approval as long as they remain within the pre-considered operation.

There is no doubt that, if true, this signals a significant change to the U.S. cyber policy and is a clear indication that cyber actions have now entered the mainstream of national security tools. For years, the “newness” of cyber capabilities meant that the ability to authorize their use remained at very high levels and was subject to extensive interagency dialogue before even simple tasks could be taken. This undoubtedly had the practical effect of limiting the number of cyber activities undertaken. By allowing DOD and other government agencies to function more autonomously within preapproved guidelines reflects a normalization of cyber capabilities that has been too long in coming. Perhaps the decades of cyber actions both by and against U.S. interests have now provided a sufficient “comfort level” that cyber operations can now be viewed more like using tanks or aircraft to accomplish a military mission, rather than like using a nuclear weapon.

Many cyber-capable countries seem to be moving in a similar direction. Germany, for example, recently divulged that it has authorized “hack backs” in certain circumstances. The adoption and implementation of NSPM-13 and its application to the midterm elections seems to be a strong change in U.S. policy, one that sends a message to adversaries about what are acceptable and unacceptable cyber activities.

More from Just Security:

Why the First Amendment Does Not Protect Trump Campaign Collusion With WikiLeaks and Russia

Accountability Fatigue: A Human Rights Law Problem for Armed Forces?

          Le système genevois à nouveau remis en cause      Cache   Translate Page      
La télévision alémanique SRF révèle que le système de vote électronique de Genève n’est pas sûr. Il a été prouvé qu’il était possible d’accéder aux votes effectués en ligne. Les enquêtes journalistiques ne sont décidément pas très bonnes pour le système de vote électronique mis au point dans le canton de Genève. Il y a trois ans, la radio-télévision publique en langue français (RTS) avait révélé qu’il était possible de voter deux fois. Cette fois, la télévision alémanique SRF dévoile qu’un hacker a trouvé le moyen de consulter les votes des citoyens. Ces révélations constitueront un nouvel élément dans un débat déjà vif sur la sécurité du vote électronique. Des essais sont menés depuis des années, mais certains – notamment au Parlement – aimeraient une interdiction du vote électronique, essentiellement pour des raisons de sécurité. De leur côté, les Suisses de l’étranger réclament inlassablement, depuis des années, sa généralisation. En effet, l’acheminement du matériel de vote ...
          Xôn xao Thế giới Di động bị hack, rò rỉ hơn 5 triệu email khách hàng, có cả thông tin thẻ ngân hàng?      Cache   Translate Page      
Hàng loạt trang tin tại Việt Nam đang kháo nhau thông tin đồn thổi cho rằng hacker đã tấn công và tung lên diễn đàn RaidForums một tập tin dung lượng 150,6MB chứa dữ liệu liên quan đến hơn 5 triệu khách hàng, gồm email, tài khoản thẻ ngân hàng,...v.v
          Facebook Says Malicious Browser Extension To Blame For Hackers Compromising Profile Data      Cache   Translate Page      
Facebook is investigating after a report stating Russian hackers compromised private messages from 81,000 accounts.
          Bill’s 100 Year-Old Smart Home      Cache   Translate Page      

[Bill]  purchased a house in Central Florida, and like any good hacker, he started renovating, pulling Ethernet cables, and automating things. Lucky for us, he decided to write up his experiences and lessons learned. He found a few problems along the way, like old renovations that compromised the structure of the pool house. After getting the structural problems sorted, he started installing Insteon smart switches. If automated lighting is of interest, and you don’t want to wire up relays yourself, Insteon might be the way to go.

He linked the buildings together with a wireless bridge, and then worked out …read more

          Comentario en Denuncian que malos visitantes botan desperdicios agrotóxicos en zona de Picnic de Jahuel por خرید vpn      Cache   Translate Page      
<strong>vpn ایفون</strong> Hey! I know this is fairly off subject but I was asking yourself which website system are you making use of for this internet site? I’m receiving ill and fatigued of WordPress simply because I’ve had issues with hackers and I’m hunting at options for o…
          Finanzbranche braucht besseren Schutz vor Hackern      Cache   Translate Page      
Die Finanzmarktaufsichtsbehörde (FMA) ruft alle Stakeholder am Finanzmarkt zu einer stärkeren Vernetzung bei der Prävention von Cyber-Risiken auf. Mit der rasch voranschreitenden Digitalisierung der Finanzdienstleistungen steige auch die Anfälligkeit gegenüber Angriffen aus dem Cyber-Space. Diesem Bedrohungspotenzial komme wachsende Bedeutung zu, so die FMA.
          Come funziona la propaganda sul web      Cache   Translate Page      

Nuovo e utile

"I partiti tradizionali hanno perso la battaglia digitale". Chi la sta vincendo? "La Lega, ma i più aggressivi sui social sono quelli di CasaPound, Generazione Identitaria. I ragazzi dei centri sociali contestano ancora con metodi tradizionali mentre quelli di destra manipolano la discussione pubblica, costruiscono fake, usano troll. Dominano la scena". E tu? Le sai costruire le false notizie? "Chiaramente saprei costruirle ed è per questo che so contrastarle".

Alessandro Orlowski spiega che Twitter, Facebook possono essere davvero la lavatrice delle masse e che il pensare comune può essere adulterato con una tastiera. Intanto, tu chi sei? "Spin doctor, esperto di marketing digitale e social media intelligence". E in passato sei stato regista,e produttore, hai insegnato regiae ideazione di documentari virali all'università di Monaco. "Vivo a Barcellona, sono cresciuto a Parma e Londra".

Ha 51 anni, è figlio di padre tedesco e madre parmigiana. È un giramondo dalle tante vite. Per tre anni ha vissuto in Perù, dove ha curato la campagna presidenziale dell'economista Pedro Pablo Kuczynski aiutandolo nel cammino alla sua vittoria elettorale. Prima ancora ha abitato a Londra. Ha lavorato in Ucraina. Ha risieduto per alcuni anni a Beirut. È conosciuto per essere un esperto di marketing digitale datadriven. Dove hai imparato? "Da solo e unendo tutte le passioni che già coltivavo per la comunicazione. Oggi è la mia professione oltre a uno stile di vita. Una volta si era hacker per mostrare le vulnerabilità, le falle del sistema. Adesso bisogna conoscere le tecniche di phishing (adescamento, ndr) e contro-propaganda online per impedire di farsi danneggiare dagli altri. È un mezzo di difesa".

Nell'ufficio, a lavorare per Alex, c'è un software engineer russo che mi mostra quanto sia facile attraverso un piccolo circuito, una scatola grande quanto un pacchetto di sigarette, trafugare dati sensibili. "I più bravi programmatori, che padroneggiano meglio certe tecniche, spesso vengono dall'Est, questo è dovuto a un sistema educativo fortemente improntato sulla matematica e programmazione. All'Est hanno spiccate capacità matematiche, ma in Italia abbiamo dei geni riconosciutia livello internazionale anche molto creativi".

Seduto accanto ad Alex faccio così la conoscenza dei "bot", l'abbreviazione appunto della parola robot, che nel web stanno a indicare account automatizzati o semi automatizzati che hanno il compito di ritwittare e amplificare tweet, notizie ma anche bufale e menzogne. "Ma servono anche ad accendere quelli che vengono chiamati trigger emozionali. Metti che un noto personaggio accenda il focus su una delle 20 rapine verificatesi ieri in Italia e che quella rapina sia stata commessa da un rom. È chiaro che l'interesse dell'utente si concentrerà su quella rapina dimenticando le altre 19. I numeri si moltiplicheranno, tanto più se falsi profili condivideranno la notizia. I numeri ci condizionano".

Orlowski fa un esempio di comunicazione guasta: le polemiche scatenate sul nome di Marcello Foa presidente della Rai. Indicato da Lega e M5s, Foa ha dovuto fare i conti con l'opposizione iniziale di Pd e Forza Italia. "Ebbene, per incitare e sostenere la candidatura di presidente della Rai, sul web è partita una importante campagna di sostegno". Chi la conduceva? "Profili pro-Lega e profili dall'identità incerta e i risultati hanno dell'inverosimile". Vale a dire? "Mi attengo a quello che testimoniano i dati di monitoraggio su Twitter. Faccio l'esempio di Patrizia Rametta, responsabile della Lega donne in provincia di Siracusa. In un mese, da agosto a settembre, questa donna, che non è certo un personaggio noto al grande pubblico, è stata menzionata ben 63.500 volte. Più del rapper Fedez".

Il 31 luglio scorso, Rametta digita questo tweet: "Alle 20. Tweetstorm #Foapresidente unitevi e ritwittate dedicate due parole a un uomo libero Marcello Foa grande giornalista e presidente ottimale per una nuova Rai". È stato retwittato 445 volte. L'hashtag #Foapresidente è diventato tendenza su Twitter nel giro di poche ore al punto da far scrivere a Luca Morisi, lo spin doctor che segue i social per conto di Matteo Salvini, che "Gli italiani vogliono Foa presidente. Punto". È come se si fossero svolte delle elezioni sul nome di Foa. "Ma a partecipare non sono stati solo gli italiani ma anche profili di incerta identità". Quelli che chiami bot? "Esatto".

Consapevole della accuse, ovvero di aver messo su una fabbrica di bot a sostegno di Salvini, Morisi ha replicato proprio su Twitter a chi lo accusava: "Non si tratta di profili fasulli, questo è il bello (o il brutto) per voi veri troll".

Orlowski ricorda che in passato, nel 2015, un caso simile si verificò con la campagna social per chiedere le dimissioni del ministro Angelino Alfano condotta sempre da Salvini.

Un collettivo, Gilda 35, aveva denunciato che un'App chiamata Lega Nord illustrator non era altro che un unico bot che nascondeva 412 accounts che interagivano in maniera automatica. Anche in quel caso, l'hashtag #Alfanodimettiti balzò in testa alle tendenze di Twitter.

Orlowski dice che i partiti italiani hanno scoperto tardi la forza del web. Oggi a eccellere c'è la Lega. Morisi viene ritenuto l'uomo che sta dietro al suo successo comunicativo e che ha portato le tecniche di marketing online nella comunicazione politica. Nel caso della Lega, si è parlato di un software che misura e intercetta il sentimento dei social. "Morisi stesso ha citato il nome di questo software: La Bestia. Non c'è dubbio che Morisi sia bravo. Ma la tecnica in verità è antica. Morisi ha trovato in Salvini l'uomo carismatico che vende il prodotto. Non è molto diverso da quanto avviene con le fashion blogger".

Le dirette su Facebook, gli avvisi di garanzia esibiti su Instagram. Che tipo di comunicazione è quella di Salvini? "Volutamente rozza. Funziona proprio per questo. Le sue dirette video sono mosse. A livello semiotico ti vuole dire che "le mie dirette sono come quelle che fa tuo figlio con lo smartphone. Sono uno di voi". A differenza di Matteo Renzi che usa gli effetti. E sui social ormai si parla di Renzi utilizzando meme per denigrarlo. Il Pd per essere il partito che è, non ha destinato ai social la giusta attenzione".

E poi c'è il M5s. Anche loro usano bot? "Non credo siano riconducibili a Davide Casaleggio e alla sua società. Semmai sono singole iniziative di attivisti che si spingono a crearli. Per quanto riguarda la piattaforma Rousseau, non la ritengo così moderna ma un simulacro della e-democracy". Dunque le elezioni si vincono sui social? "In questo momento come tutte le forme di comunicazione politicai social sono omportanti per il successo alle urne. Sono la nostra realtà amplificata e anche le minacce e gli insulti ne fanno parte come le promesse o le fake news".

          Tout savoir sur le nouveau carnet de santé, le "dossier médical partagé"      Cache   Translate Page      

Un carnet de santé plus pratique, qui conserve toutes les informations médicale d'un patient et qui ne risque pas d'être perdu : c'est ce dont pourrait bientôt bénéficier tous les Français. La ministre de la Santé Agnès Buzyn devrait annoncer la généralisation du dossier médical partagé (DMP) ce mardi 6 novembre.

Dans les prochaines semaines, l'Assurance Maladie va envoyer à tous ses affiliés un identifiant et un mot de passe qui vont permettre de créer son compte personnel, selon Europe 1. Vous pourrez ensuite accéder à votre dossier médical sur le site Pour ceux qui n'ont pas d'ordinateur ou qui craignent de rencontrer des difficultés, une aide pourra être apportée par un conseiller de la caisse primaire d'Assurance Maladie ou même par un pharmacien. Et si vraiment vous préférez rester à votre bon vieux carnet de santé papier, libre à vous. Le DMP n'est pas obligatoire.

Le DMP contient tout ce qu'un carnet de santé classique consigne : le groupe sanguin, l'état de la vaccination, les allergies... Mais il sera également enrichie avec les radios, les bilans sanguins... bref, tous les résultats des examens médicaux, afin que tout soit centralisé au même endroit. 

Des risques de piratages 

Le DMP pourra être consulté par les différents médecins seulement si vous les y autorisez, sauf évidemment, en cas d'urgence, où ils pourront ne pas demander votre avis si vous êtes inconscient par exemple. Il est même possible de sélectionner certains documents si vous ne souhaitez pas qu'ils soient vus par tel ou tel professionnel. Et personnes d'autres que du personnel médical ne peut avoir accès à votre dossier. 

Difficile, cependant, de garantir que vos données seront totalement en sécurité, d'autant qu'elles sont une cible de choix pour les cyberpirates. "On ne peut jamais être sûrs à 100% car les hackers changent sans cesse de méthode", précise Francis Bricher, expert en transformation digitale, sur Europe 1. Mais l'Assurance maladie a l'habitude de stocker des données et de les sécuriser.  

          FSF Blogs: LibrePlanet Call for Sessions to close THIS FRIDAY      Cache   Translate Page      

The LibrePlanet 2019 conference call for sessions (CfS) deadline is nearly upon us! On Friday, November 9th, 2018, 10:00 EST (14:00 UTC), in four short days, we will close the CfS and begin the difficult task of deciding which talks to accept into the LibrePlanet 2019 program. We're excited to hear from new speakers and those new to free software, as well as those of you who have been around for years.

We want you to submit to the CfS.

LibrePlanet is an annual conference hosted by the Free Software Foundation (FSF) for free software enthusiasts and anyone who cares about the intersection of technology and social justice. LibrePlanet brings together software developers, law and policy experts, activists, students, and computer users to learn skills, celebrate free software accomplishments, and face challenges to software freedom.

LibrePlanet 2019's theme is “Trailblazing Free Software.” In 1983, the free software movement was born with the announcement of the GNU Project. FSF founder Richard Stallman saw the dangers of proprietary code from the beginning: when code was kept secret from users, they would be controlled by the technology they used, instead of vice-versa. In contrast, free software emphasized a community-oriented philosophy of sharing code freely, enabling people to understand how the programs they use work, to build off of each other's code, to pay it forward by sharing their own code, and to create useful software that treats users fairly.

We're looking for sessions on a wide range of topics: art, community, education, legal, policy, and technical talks are just a few of the categories represented at previous LibrePlanet conferences. It's important to us to provide sessions that are friendly to newcomers and experienced hackers alike, and we welcome presentations for kids or teens.

Feel free to find some inspiration by browsing through the sessions programs of previous years: 2018 and 2017. You can also watch talks from past years on our MediaGoblin instance. Some sessions from previous years include:

  • A newcomer’s perspective on & patches for the free software movement
  • Copyleft, diversity, and critical infrastructure
  • Hardware reverse engineering insights from the MAME
  • libreCMC: The libre embedded GNU/Linux distro
  • Nurturing non-coders
  • State of the Onion
  • Technology for direct actions

If you have any questions, don't hesitate to reach out to us at

          HSBC discloses customer accounts hacked at its U.S. bank      Cache   Translate Page      
Hackers breached some HSBC customers' accounts in the United States in October and accessed their information, the bank said in a regulatory filing on Tuesday.

          An 'I Voted' Sticker Can Get You Free Stuff. (But Is It Legal? Well …) - New York Times      Cache   Translate Page      

New York Times

An 'I Voted' Sticker Can Get You Free Stuff. (But Is It Legal? Well …)
New York Times
You have made it through the months leading up to the midterm elections. You have researched your candidates and you have voted. Before you sit back and watch the infamous Election Day needle swing to and fro, you're entitled to a treat. Some companies ...
Here is the free and discounted stuff you can get on Election DayMarketWatch
Free food on Election Day? Here's a list of Tuesday's delicious dealsDeseret News
How to Get Free Stuff Today With Your 'I Voted' StickerLifehacker -WPIX 11 New York -KOAT Albuquerque -CBS Denver
all 191 news articles »

          Snag this Ethical Hacking bundle for only $39!      Cache   Translate Page      
It seems like every other day there's another high-profile hack that puts thousands of users' information into the hands of people who shouldn't have it. To safeguard against these types of attacks, companies hire Ethical Hackers who expose security flaws. These Ethical Hackers are in high demand, and the profession can be quite lucrative, Get eight Ethical Hacking courses for only $39 Learn more Because this profession requires a broad range of knowledge, the courses needed to become an Ethical Hacker are generally quite expensive. Right now, however, Windows Central Digital Offers has a pretty amazing deal. You can get this 45-hour bundle for only $39; that's 96% off the regular price of $1,273....
          Senegal launches African 'cyber-security' school      Cache   Translate Page      
Dakar (AFP) Nov 6, 2018
Senegal on Tuesday inaugurated a cyber-security school to strengthen West Africa's defences against computer hackers and use of the internet for terror funding and propaganda. Senegalese Foreign Minister Sidiki Kaba and French counterpart Jean-Yves Le Drian gave the ceremonial start to the National Cyber-Security School (ENVR) on the sidelines of an annual regional security conference in Dak
          Air Force opens itself up to hacking, again      Cache   Translate Page      

The Air Force announced Monday that it has invited hackers from 191 countries to try to find vulnerabilities in systems it recently migrated to the cloud. Yes — it’s Hack the Air Force round three. And it’s the “most inclusive” edition to date, meaning that foreign nationals — except those from China, Russia, Iran or North Korea — are […]

The post Air Force opens itself up to hacking, again appeared first on Fedscoop.

          Hacker drohen: 120 Mio. Facebook-User bestohlen      Cache   Translate Page      
Hacker behaupten die Daten von 120 Millionen Facebook-Konten erbeutet zu haben. Mit privaten Nachrichten mit intimen Inhalten.
          Investigadores encontraron microplásticos en muestras fecales      Cache   Translate Page      

Por el Dr. Mercola

Las pruebas han revelado que tanto el agua de la llave como el agua embotellada1 contienen microplásticos, al igual que el polvo del hogar2 y muchos alimentos, en especial los mariscos3,4 y la sal de mar,5 pero también cualquier alimento que se haya almacenado en envases de plástico.

Hace poco se confirmó la sospecha de que consumíamos nuestra propia contaminación plástica, cuando los investigadores descubrieron partículas microplásticas en muestras de heces humanas. Las consecuencias de consumir partículas y fragmentos de plástico microscópicos aún son relativamente desconocidas.

Sin embargo, si consideramos que el plástico no se degradará en el lapso de una vida humana, y que muchas de las sustancias químicas que se utilizan en su producción son sustancias disruptoras endocrinas, es probable que el impacto en la salud humana sea mayor de lo que se cree.

Una investigación realizada con animales también ha demostrado que los microplásticos pueden afectar la barrera intestinal y la composición del microbioma intestinal en ratones, además podrían tener efectos tóxicos en el hígado de los peces.

Las muestras de heces humanas presentaron residuos microplásticos

El estudio6,7,8,9 en cuestión fue realizado por investigadores de la Universidad Médica de Viena, en colaboración con la Agencia de Medioambiente de Austria. Los hallazgos de este estudio piloto fueron presentados el 23 de octubre de 2018, durante la conferencia 'United European Gastroenterology' que se celebra todos los años en Viena. Según lo que informó la revista Salon:10

"En este estudio participaron 8 personas de Finlandia, Italia, Japón, los Países Bajos, Polonia, Rusia, el Reino Unido y Austria.

Cada persona llevó un diario de los alimentos que consumió una semana antes del muestreo de sus heces, lo cual les demostró a los investigadores que todos los participantes estuvieron expuestos a alimentos que estaban envueltos en plástico, o bien, que bebieron de botellas de plástico.

Además, 6 de los 8 participantes consumieron pescado marino; ninguna de las personas era vegetariana".

Las muestras fecales fueron analizadas para detectar la presencia de 10 tipos de plásticos y 9 de ellos fueron detectados en dichas muestras. En promedio, los participantes presentaron 20 partículas microplásticas por cada 10 gramos de heces.

Los tipos más comunes de plástico fueron el polipropileno (que se encuentra en las tapas de las botellas), tereftalato de polietileno o PET (que se encuentra en las botellas de agua, bolsas de plástico y fibras textiles) y poliestireno (que se encuentra en recipientes de comida para llevar, vasos y utensilios de plástico).

Las partículas variaron en tamaño desde 50 micrómetros (aproximadamente el ancho de un cabello humano) hasta 500 micrómetros. De acuerdo con el investigador principal, el Dr. Philipp Schwabl, quien calificó a los resultados como "impactantes":

"Este es el primer estudio en su tipo y confirma lo que hemos sospechado durante mucho tiempo, los plásticos finalmente han llegado al intestino humano; una cuestión que es particularmente preocupante para nosotros, sobre todo en el caso de los pacientes con enfermedades gastrointestinales11 ...

Existen indicios preliminares de que los microplásticos podrían dañar el tracto gastrointestinal12 al promover reacciones inflamatorias o absorber sustancias nocivas13 ...

Aunque en los estudios realizados con animales se descubrió que las mayores concentraciones plásticas se localizaban en el intestino, las partículas microplásticas más pequeñas son capaces de entrar en el torrente sanguíneo, sistema linfático e incluso llegar al hígado.

Ahora que tenemos la primera evidencia de microplásticos en seres humanos, necesitamos realizar más investigaciones para comprender lo que esto representa para la salud humana14 ...

Considero que tratar de disminuir el uso de plástico y alimentos empacados en dicho material podría ser beneficioso tanto para la naturaleza como para nosotros los seres humanos.

No cabe duda que el plástico es un material muy útil y tiene muchas aplicaciones ingeniosas, pero tal vez deberíamos intentar reconsiderar la necesidad de su abundante uso, así como buscar y apoyar alternativas ecológicas y sustentables".15

En un futuro cercano los océanos del mundo contendrán más plástico que peces

De hecho, el Foro Económico Mundial estima que para 2050, los océanos del planeta contendrán más plástico que peces;16 debido a la descarga anual de 8 millones de toneladas métricas de plástico, se espera que la cifra aumente 10 veces17 tan solo en la siguiente década, a menos que se tomen medidas decisivas.

En algunas aguas oceánicas, el plástico ya supera el plancton por un factor de 6 a 1.18

Para evitar semejante absurdez, el Foro Económico Mundial recomienda enfocarse en 3 estrategias clave, que en primer lugar dependen de reconsiderar la fabricación de los plásticos; es decir, cambiar a fuentes renovables en vez de usar petróleo para producir plástico:19

  1. Mejorar el diseño de envases plásticos y otros productos a base de plástico
  2. Diseñar "nuevos y creativos modelos de entrega basados en envases reutilizables"
  3. Apremiar a las personas para que el reciclaje de resultados – El plástico puede y debe ser reciclado, no obstante, un análisis realizado en 201720 revela que un impactante 91 % del plástico no se recicla

De manera inquietante, la contaminación plástica también se ha acumulado en las tierras de cultivo.

Según la investigación21 publicada en la revista Science of the Total Environment, ¡la descarga anual de plásticos en la tierra podría ser entre 4 a 23 veces mayor que la que se deshecha en los océanos! El uso de aguas residuales (biosólidos) como fertilizantes es una fuente significativa de toda esta contaminación plástica.

Cuando se considera el alcance que tienen las tasas de aplicación de residuos y se asume que los datos de otros países con un uso similar de plásticos son comparables, puede suponerse que: la descarga anual y total de microplásticos en tierras agrícolas de Europa y Norteamérica es respectivamente de 63 000 a 430 000 y de 44 000 a 300 000 toneladas.

Los microplásticos podrían contribuir en la incidencia del cáncer y enfermedades intestinales

El Dr. Herbert Tilg, presidente de la Austrian Society of Gastroenterology y del comité científico de gastroenterología de la Unión Europea (que no participó en el estudio), le preocupa que los microplásticos puedan ser un factor que contribuya al incremento de las tasas del síndrome intestinal inflamatorio y cáncer de colon. Asimismo, dijo para la cadena de radio New Hampshire Public Radio:22

"La incidencia de cáncer de colon se ha elevado entre la población de jóvenes y creemos que los componentes de la alimentación o el ambiente pueden ser un factor.

Ahora que sabemos que podemos detectar microplásticos en seres humanos, podremos desarrollar estudios más amplios, tanto en pacientes sanos como en enfermos, con el fin de averiguar si son factores coadyuvantes".

Los microplásticos están relacionados con la alteración del microbioma, deterioro del metabolismo y toxicidad hepática

Según señaló Schwabl, las investigaciones más recientes sugieren que los microplásticos podrían tener un efecto adverso en el microbioma intestinal. El estudio,23 publicado en la revista The Science of the Total Environment, encontró que los poliestirenos microplásticos podían afectar la barrera intestinal, microbioma y metabolismo de los ratones. Según informaron los autores:

"En este estudio, expusimos ratones machos a microplásticos de poliestireno (MP) prístino y fluorescente de 5 micrómetros durante 6 semanas. Los resultados demostraron la presencia de poliestireno MP en el intestino de los ratones, lo cual pudo haber disminuido la secreción de la mucosidad intestinal y dañar la función de su barrera intestinal...

En cuanto al nivel de filo o phylum, el contenido de Actinobacteria disminuyó significativamente en el grupo tratado con poliestireno MP... [L]a diversidad en el microbioma intestinal fue alterada después de ser expuestos al poliestireno MP.

Con relación al género, un total de 15 tipos de bacterias cambiaron significativamente tras ser expuestas al poliestireno MP.

Además, las diferencias que se basan en la Enciclopedia de genes y genomas de Kioto (KEGG, por sus siglas en inglés) sobre las vías metabólicas indicaron que el poliestireno MP influía significativamente en las principales vías metabólicas de los genes funcionales en la población microbiana.

Además, los índices del metabolismo de los aminoácidos y ácidos biliares en el suero fueron analizados después de ser expuestos al poliestireno MP. Estos resultados indicaron que el poliestireno MP había causado trastornos metabólicos.

En conclusión, el poliestireno MP había inducido una disbiosis en el microbioma intestinal, barrera intestinal y trastornos metabólicos de los ratones..."

Otro estudio24 publicado en 2016 encontró microplásticos de poliestireno acumulados en los peces cebra y estos les generaban un estrés hepático. Después de solo 7 días de exposición, las partículas de 5 micrómetros se habían acumulado en sus branquias, hígado e intestino.

Las partículas que medían 20 micrómetros de diámetro solo se habían acumulado en sus branquias e intestino.

El análisis histopatológico reveló que las partículas habían causado inflamación y acumulación de lípidos en el hígado, y que habían "aumentado significativamente la actividad de la superóxido dismutasa y catalasa, lo que indica que habían inducido estrés oxidativo".

Además, el análisis metabólico encontró que los microplásticos habían "inducido alteraciones en los perfiles metabólicos del hígado de los peces y habían alterado el metabolismo de sus lípidos y energía".

Las investigaciones anteriores25 también han demostrado que, en condiciones de laboratorio, los microplásticos se introducían en las células y causaban efectos significativos en el tejido de los mejillones azules.

El agua embotellada está casi completamente contaminada con microplásticos

Como mencioné anteriormente, las pruebas recientes26 revelaron que ahora el agua potable se encuentra casi completamente contaminada con microplásticos – ya sea la que toma de la llave o la embotellada. Los descubrimientos indican que solo 17 de las 259 botellas de agua analizadas estaban libres de partículas microplásticas, y ninguna de las 11 marcas analizadas demostró de forma consistente estar libre de contaminantes plásticos.

En promedio, el agua embotellada que se analizó contenía 325 piezas de microplástico por litro. La marca que arrojó los peores resultados fue Nestlé Pure Life, cuya muestra más contaminada contenía 10 390 partículas por litro, mientras que la menos contaminada, San Pellegrino, contenía una densidad de 74 partículas por litro.

A continuación, se encuentra un resumen de las marcas más y menos contaminadas:27

Marcas más contaminadas Marcas menos contaminadas

Nestlé Pure Vida

San Pellegrino









Como señaló Orb Media —quien solicitó las pruebas—:28

"[L]os hallazgos sugieren que una persona que bebe 1 litro de agua embotellada al día podría consumir decenas de miles de partículas microplásticas al año...

En cuanto a los desechos microplásticos de un tamaño aproximado de 100 micrones... las muestras de agua embotellada contenían casi el doble de fragmentos microplásticos por litro (10.4), en comparación las muestras de agua de la llave (4.45)...

De acuerdo con la investigación científica existente, las partículas de plástico que consume a través de sus alimentos o bebidas podrían interactuar con su cuerpo de diversas maneras...

Algunas partículas pueden alojarse en la pared intestinal, mientras que otras podrían ser absorbidas por el tejido intestinal y transportarse a través del sistema linfático del cuerpo...

Se ha demostrado que los residuos más pequeños, en un rango de 20 micrones (0.02 mm) pueden entrar en el torrente sanguíneo antes de alojarse en los riñones e hígado... El 90 % de las partículas de plástico que encontramos tenían un tamaño tan pequeño... que algunas podían atravesar el intestino dentro del cuerpo".

En respuesta a estos hallazgos, la Organización Mundial de la Salud ha prometido presentar una revisión de inocuidad para evaluar los posibles riesgos a corto y largo plazo de consumir microplásticos en el agua.29

¿Cómo puede ser parte de la solución?

Nuestro afán cultural por todo tipo de productos desechables ha provocado grandes estrados. Pero ¿cómo podría ser parte de la solución? En pocas palabras, al convertirse en un consumidor más consciente. De verdad reflexione sobre la fabricación de los productos que compra, cómo podrían afectarlo mientras los utiliza y qué les sucederá una vez que los deseche.

En este momento, pocas personas somos capaces de llevar un estilo de vida sin deshechos, sin embargo, cada uno de nosotros puede dar pasos pequeños, pero definitivos, hacia el objetivo de reducir la basura plástica en todas sus formas. He aquí algunas sugerencias que debe considerar:

Evite el agua embotellada — En su lugar, invierta en un buen sistema de filtración de agua para su hogar y llene sus propias botellas reutilizables con agua de la llave filtrada. Las pruebas anteriores han revelado que la mayoría del agua embotellada no es más que agua de la llave, que podría o no haber sido sometida a una filtración adicional.

Ya que el agua de la llave pública contiene más de 267 toxinas, valdría la pena invertir en instalar un filtro de alta calidad y llevar consigo su propia agua a donde quiera que vaya.

Reduzca el uso de todo lo que esté hecho de plástico — Compre productos que no estén hechos o empacados con este material. Y aunque estos elementos son casi infinitos, he aquí algunas ideas:

  • Utilice bolsas de compra reutilizables para los comestibles
  • Lleve consigo su propia taza cuando disfrute de un café, y no utilice la tapa ni el popote
  • Almacene los alimentos en recipientes de vidrio o frascos, en lugar de contenedores o bolsas de plástico
  • Lleve consigo su propio recipiente para sobras a los restaurantes
  • No pida que envuelvan su ropa en plástico cuando la lave en seco

Evite la ropa con microfibras, como la lana, o lávela con la menor frecuencia posible — Las telas elásticas y prendas de lana desechan grandes cantidades de fibras plásticas microscópicas cada vez que se lavan. Debido a su pequeño tamaño, estas microfibras30 fluyen directamente a través de la planta de tratamiento de aguas residuales sin ser captadas.

Cada año, hasta 1.7 millones de toneladas de microfibras entran al océano,31 y las pruebas demuestran que las microfibras sintéticas representan el 85 % de los desechos en las costas alrededor del mundo.32

Una vez que se encuentran en la corriente de agua, estos microresiduos plásticos bloquean la luz solar que el plancton y las algas necesitan para desarrollarse, y las consecuencias de esto repercuten en toda la cadena alimenticia.

Las fibras en sí no solo representan un peligro para la salud de la vida marina que las consume, ya que se bioacumulan, también pueden actuar como esponjas, al absorber y concentrar toxinas como PCBs, pesticidas y petróleo, lo que hace que el animal--que podría terminar siendo su alimento — sea inclusive más tóxico que en condiciones normales.

Una opción mucho más "limpia" para todos es la ropa 100 % orgánica – tejidos de algodón, cáñamo, seda, lana o bambú teñidos con colorantes naturales, no tóxicos. La certificación del sistema Bluesign33 le indica que el artículo fue fabricado con ninguna o una cantidad mínima de sustancias químicas peligrosas.

Lave la ropa sintética lo menos posible y con un detergente suave, asimismo, séquela bajo los rayos del sol, en vez de utilizar la secadora, ya que el calor y agitación harán que las fibras se rompan. Lavar la ropa a mano o utilizar un ciclo suave con agua fría también podría minimizar su desprendimiento, al igual que utilizar una lavadora de carga frontal.

Asimismo, puede instalar un filtro para microfibras en su lavadora; sin embargo, aun así estas podrían terminar en el medioambiente ya que finalmente serán desechadas en la basura que se deposita en los rellenos sanitarios.

Recicle lo que pueda — En la medida de lo posible, procure reciclar y reutilizar estos productos, y participe en "unidades recolectoras de plástico" en las escuelas locales, donde se paga por cada libra recolectada.

Recuerde que los materiales reciclables nunca deben colocarse en una bolsa de plástico, ya que las instalaciones de reciclaje enviarán los artículos empaquetados a un vertedero.34 Por lo tanto, para garantizar que sus materiales reciclables sean realmente reciclados, debe asegurarse de colocarlos sueltos en el contener para reciclaje.

Para descubrir más sobre lo que debe y no debe hacer para reciclar, consulte mi artículo, "Los sorpresivos errores de reciclaje que la mayoría de las personas comete a diario". Además, puede consultar el artículo del blog "Lifehacker" para obtener más datos sobre lo que puede y no puede reciclar en general, aparte del plástico.35

FeedComments Comentarios (0)

          Perfil falso de Elon Musk utilizado (novamente) em esquema fraudulento de criptomoedas      Cache   Translate Page      
Hackers piratearam contas verificadas do Twitter e editaram-nas para se parecerem com o perfil do dono da Tesla, com o objetivo de burlar utilizadores com moeda virtual.
          Hackers Target Telegram, Instagram Users in Iran      Cache   Translate Page      

Hackers have been targeting Iranian users of Telegram and Instagram with fake login pages, app clones and BGP hijacking in attacks that have been ongoing since 2017, Cisco Talos reveals. 

read more

          U.S. Air Force Announces Third Bug Bounty Program      Cache   Translate Page      

The United States Air Force on Monday announced that it has launched its third bug bounty program in collaboration with HackerOne.

Hack the Air Force 3.0 is the largest bug bounty program run by the U.S. government to date, spanning 191 countries and lasting more than four weeks.

read more

          An 'I Voted' Sticker Can Get You Free Stuff. (But Is It Legal? Well …) - New York Times      Cache   Translate Page      

New York Times

An 'I Voted' Sticker Can Get You Free Stuff. (But Is It Legal? Well …)
New York Times
You have made it through the months leading up to the midterm elections. You have researched your candidates and you have voted. Before you sit back and watch the infamous Election Day needle swing to and fro, you're entitled to a treat. Some companies ...
Here is the free and discounted stuff you can get on Election DayMarketWatch
Free food on Election Day? Here's a list of Tuesday's delicious dealsDeseret News
How to Get Free Stuff Today With Your 'I Voted' StickerLifehacker
FOX 5 DC -Lime -USA TODAY -Nation's Restaurant News
all 191 news articles »

          Week In Review      Cache   Translate Page      
By Jana S. Farmer Edited by Elissa D. Hecker Supreme Court Reviews Google Class Action Settlement Over Privacy Last Wednesday, the Supreme Court heard arguments whether it should allow or limit class-action settlements in which class members receive nothing, whereas their lawyers recover millions of dollars. Dawn Spacecraft Goes Quiet After Over A Decade In Space NASA's Dawn Spacecraft, in orbit around asteroid Ceres, lost its radio signal. Ceres is one of the two largest asteroids in the belt between Mars and Jupiter. Dawn was launched in 2007 and lasted two years longer than originally planned. Dawn is also notable for previously orbiting the asteroid Vesta and then leaving its orbit for Ceres. A Lawsuit Over a Teapot-Dome-Era Tax Provision Possible In Continuing Fight for the Release of the President's Tax Returns An obscure tax provision dating back to the time of Warren G. Harding's administration may be used to demand the President's tax returns from the Treasury Department. Steven Mnuchin, the Secretary of Treasury, said that his team would analyze any demands for the President's returns and fulfill them if required by law, but some believe that a legal clash over any such request is likely. Bankers Face Money Laundering Charges Federal prosecutors announced bribery and money laundering charges against a second Goldman Sachs employee following the guilty plea from one former Goldman Sachs banker as part of the investigation into the alleged embezzlement of billions of dollars from a state-run investment fund in Malaysia. The money was used to buy a Picasso painting, diamond necklaces, and Birkin bags, as well as to pay for the Hollywood blockbuster "The Wolf of Wall Street". Special Counsel Mueller Asks FBI To Investigate Emails Offering Women Money To Fabricate Sexual Misconduct Complaints Against Him Two women claim that they were offered compensation to fabricate sexual misconduct stories about Special Counsel Robert Mueller. Mueller's office asked the FBI to investigate the claims. U.S. and Great Britain Step Up Pressure For a Cease Fire In the Yemen War Secretary of State Mike Pompeo and his British counterpart, Jeremy Hunt, urged Saudi Arabia to cease hostilities in Yemen as criticism of Saudi Arabia has surged over its recent bombing campaign and the killing of writer Jamal Khashoggi. Previous calls to cease fire have been unsuccessful. Justice Department Indicts Chinese Intelligence Officers For Stealing Aerospace Secrets In the indictment unveiled last Tuesday, the Justice Department accused two intelligence officers who worked in the Jiangsu Province office of the Ministry of State Security, China's primary intelligence-gathering agency, of working with hackers to steal turbofan technology used in American and European commercial airliners. Pakistani Court Acquits Death Row Inmate In Blasphemy Case Asia Bibi, a Christian Pakistani woman, who was on death row for eight years after an accusation of speaking against the Prophet Muhammad, was freed this week. Her arrest and conviction in 2009 rallied international condemnation of a law that has inspired violence and of lack of evidence against her. Her freedom may come at a cost, however, both for her and the three justices of Pakistan's Supreme Court that acquitted her, as protests erupted in several cities. Below, for your browsing convenience, are summaries of news reports in categories divided into Entertainment, Art, Sports, and Media Entertainment GLAAD Finds That LGBTQ Representation On Television Has Improved GLAAD (formerly the Gay & Lesbian Alliance Against Defamation) found that the LGBTQ community was better represented on television in 2018. Men and women were equally represented among L.G.B.T.Q. characters on TV. French Movie Director Accused Of Sexual Misconduct Abdellatif Kechiche, well known for his film "Blue Is the Warmest Color", was accused by an unnamed actress of sexually abusing her. The Paris prosecutor's office has opened an investigation. Art and Cultural Heritage Cleveland Orchestra's Concertmaster Fired As a Result of Sexual Misconduct Allegations William Preucil, the Cleveland Orchestra's concertmaster, was fired when an investigation concluded that he had engaged in "actions ranging from serious sexual misconduct to sexually harassing behavior" with a number of women. He will also be replaced as the violinist on Suzuki Method instructional materials amid the resulting backlash from music teachers and parents of violin students. The Fine Arts Museums of San Francisco and The Metropolitan Museum of Art in New York Swap Directors The Fine Arts Museums of San Francisco (FAMSF) announced the appointment of Thomas P. Campbell, the former director and chief executive of the Metropolitan Museum of Art (the Met) in New York, as its new director and chief executive. He will be replacing Max Hollein, the former FAMSF director who took over Campbell's job at the Met earlier this year. Director of Contemporary Arts Museum In Houston Resigns Contemporary Arts Museum In Houston director Bill Arning resigned last Wednesday after nearly 10 years at the institution's helm, citing lack of progress and need for director rotation. Former Owner's Family and a German Art Dealer At An Impasse Over Art Stolen By the Nazis The family of Paul Rosenberg, a Paris art dealer, was successful in recovering over 400 works the Nazis looted from him. Some artworks, however, elude recovery efforts due to unfavorable national laws. One example is a pastel portrait by Edgar Degas, "Portrait of Mlle. Gabrielle Diot", created in 1890. The family knows that a German dealer tried to sell it several times, although the present possessor of the artwork is unknown. The intervention of the German officials on the Rosenbergs' behalf to find out the possessor's identity has not been successful. German law experts comment that the country's law is not conducive to recovery of looted artwork; although the law states that a good faith purchaser cannot pass good title to a stolen work, theft claims must be made within 30 years. Furthermore, after 10 years, the law recognizes the possession rights of the current holders unless it can be shown they knew the work had been stolen when it was purchased. Meanwhile, selling the portrait is difficult because it is listed on several international databases of looted art. Venice Museums Reopen After The Flood After the worst flood in 10 years, with water rising more than five feet, Venice's museums reopened last week. Piazza San Marco, home to the Basilica di San Marco and Doge's Palace, was submerged during the flood. Early reports indicated that the cultural institutes suffered no damage. The Architecture Biennale reopened as well, its venues not affected by the flooding. The floods came less than a month after a UNESCO report warned that the city was at a severe risk due to climate change. Venice hopes to prevent future flooding by building underwater barriers that would be raised when tides reach a certain level, but the project is behind schedule by several years. Brazil's Jair Bolsonaro May Thwart Rio Museum's Reconstruction Efforts Brazil's Newly-Elected President wants to remove the country's Ministry of Culture, which may have an impact on rebuilding the National Museum. Meanwhile, UNESCO launched an emergency mission to help the Rio Museum assess the damage and rebuild its collection after the devastating fire this summer as the Smithsonian Institution (Washington, DC), the Royal British Columbia Museum, and the embassies of several countries pledge their support. Sports University of Maryland In Upheaval Following Death of Football Player The University of Maryland's president announced his retirement, the football coach, DJ Durkin, was fired, and the chairman of the university's governing board resigned following the death of a 19-year-old football player Jordan McNair. McNair died from heatstroke after practice in the sweltering heat in May. WNBA Players' Union Opts Out of Its Labor Deal The WNBA players' union announced last Thursday that it would opt out of the league's collective bargaining agreement after the 2019 season, seeking higher pay and financial transparency. Players and WNBA have long been at odds over the league's pay scale and allegedly poor working conditions. FIFA Acknowledges Hacking, Braces For Possible Scandal From Anticipated Leaks FIFA revealed that its computer systems were hacked again this year and that it may have suffered a data breach. A prior hacking incident led to the publication of a list of failed drug tests by soccer players, among other revelations. The group Football Leaks reportedly originally obtained the documents. Media U.S. Officials Take a Wait and See Approach In the Investigation Into the Killing of Saudi Writer U.S. officials are waiting to see the results of a Saudi investigation into the killing of Jamal Khashoggi, a Virginia resident and Washington Post columnist. Secretary of State Mike Pompeo said this week that the administration was "reviewing putting sanctions on the individuals . . . engaged in that murder." Social Site Gab Did Nothing To Control Hate Speech By the Man Who Became the Pittsburgh Synagogue Shooter Gab, an alternative social media website, welcomed all speech, no matter how offensive. After revelations that Robert Bowers, the Pittsburgh Synagogue shooter who was indicted on 44 counts, aired his hatred on the platform, the company's web hosting provider, Joyent, the domain name provider, GoDaddy, and payment processing platforms Stripe, and PayPal either cancelled Gab's accounts or suspended service. Bowers entered a plea of not guilty to all 44 counts against him and requested a jury trial. "Not O.K., Google", Say Company's Workers Worldwide As They Protest Its Handling of Harassment About 20% of Google's employees staged walkouts in 50 cities after the New York Times reported that Google paid Android co-founder, Andy Rubin, $90,000,000 as part of the exit package after he was accused of sexual harassment. The protesters demanded change in how Google handles sexual harassment, including ending its use of private arbitration in such cases. Following Journalist's Effective Exclusion, Hong Kong's Future As A Civil Rights Haven In Asia Is In Question Hong Kong declined to renew the visa of a journalist for The Financial Times, Victor Mallet, after the Foreign Correspondents' Club of Hong Kong decided in late July to invite a political activist to speak at its event and Beijing demanded that the club cancel the speech. These developments raise questions about the city's future as a haven for rule of law and civil rights in Asia. Petra Laszlo, Camerawoman Filmed Kicking Refugees, Was Cleared Hungary's highest court overturned the conviction of Petra Laszlo, who was convicted of disorderly conduct for kicking refugees fleeing the war in Syria. The court acknowledged that Laszlo's conduct was "morally deplorable and against the law," but found that she should have been charged with "disturbance" instead, a regulatory offense usually punished by a fine. The statute of limitations for the lesser charge has expired, however.
          Internet : comment les entreprises sont rackettées par les hackers      Cache   Translate Page      
PIRATES - Chez nous, 1 500 PME ont déclaré avoir été victimes de cyberattaques en à peine un an. Plusieurs d'entre elles ont dû fermer, car il n'y avait pas de solution technique pour remettre en place leur système d'information.
          PS4: Fail0verflow disclose an exploit that could work on “all currently released hardware and software versions of PS4”      Cache   Translate Page      

Famed hacker group Fail0verflow have published a new blog article yesterday, in which they describe a novel way to gain code execution on the PS4. Developer ps4_enthusiast, who is behind the writeup, states the...

The post PS4: Fail0verflow disclose an exploit that could work on “all currently released hardware and software versions of PS4” appeared first on

          Audio of the DEF CON 26 Talks is Live with Torrent!      Cache   Translate Page      
audio archive image#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

It's November - the height of sweater season here at the DEF CON Central Office. It's a perfect time to find a cozy corner and treat yourself to a steaming mug of hacker knowledge. To that end, we've placed the audio files from DEF CON 26 on the media server for you to sample at your leisure. Please enjoy, and share a cup with anyone you think could use a little seasonal cheer.

          Payment Card Data is Not Trade Secret Information under the DTSA      Cache   Translate Page      
In a recent case involving hackers that stole "payment card data" from Chipotle, Judge William J. Martinez in the United States District Court for the District of Colorado found on an issue of first impression that payment card data was not a trade...
By: Holland & Knight LLP
          How to start forging a career in IT and cybersecurity - Mashable      Cache   Translate Page      


How to start forging a career in IT and cybersecurity
In this bundle, you'll get the training you need to crush today's most vital IT security certification exams: CompTIA Advanced Security Practitioner (CASP-003), CompTIA Cyber Security Analyst (CSA+), and CompTIA Pentest+. Through hours of video content ...

and more »

          News 5 Investigates: Election Cyber Security - WKRG News 5      Cache   Translate Page      

WKRG News 5

News 5 Investigates: Election Cyber Security
WKRG News 5
(WKRG) Protecting our elections from a cyber attack is becoming increasingly difficult as we use more technology to vote. Computer experts are constantly working to stay ahead of hackers by training and investigating suspect elections. There have been ...

          How to Get Updates on the 2018 Midterm Elections With or Without Cable TV - Fortune      Cache   Translate Page      


How to Get Updates on the 2018 Midterm Elections With or Without Cable TV
Midterm elections typically aren't must see TV. And turnout is rarely on par with general elections. But the interest in the 2018 midterm races is staggering, as witnessed by the lines at most polling places on Election Day Tuesday morning. Both ...
How to Watch the Midterm Results Without CableLifehacker

all 114 news articles »

          (USA-NC-Smithfield) Equipment Operator with DL      Cache   Translate Page      
We are currently seeking an **Equipment Operator** to join our team. **Essential Functions** + Plans, assigns, directs, checks, and coordinates work. + Responsible for quality and quantity of production. + Performs all aspects of labor as necessary to keep crew operation flowing. + Ensures the overall safety, quality and production requirements of the crew are met. + Operates heavy equipment of various types to remove branches and tree material from electrical lines. + Cleans up and disposes of all debris. + Operates and services equipment such as gasoline, hydraulic tools, power saws, power winches, mower deck, weed whacker, chipper, and sprayers. + Uses hand-tools, such as axes, hand-lines, saws, block and tackle, pruners and other equipment as required. + Sprays brush and stumps, making proper and selective application of herbicides. + Obtains written or oral permission from property owners to trim or remove trees or perform other work on property. Arranges with customer or property owner to obtain access, advises of interruption, explains work to be done, etc. + Promotes and maintains good customer and public relations through the effective accomplishment of assigned work and the appropriate behavior of employees on the crew. + Safeguards employees and the public from hazards in and around work area. + Sets up barriers, warning signs, flags, markers, etc. to protect employees and public. + Trains new personnel. + Work in all temperatures and will be exposed to nature i.e., irritating plants and biting or stinging insects. + Exposed to traffic. + Keeps informed on new equipment, specifications, standard practices, operating procedures, and customer and company employee relations policies and practices. + Works near energized parts or equipment. + Exposed to traffic. + Works around excessive noise from machines, jackhammers, gas drills and other equipment with proper hearing protection. + Possesses working knowledge and be able to identify tree and shrub species. **Minimum Requirements** + Due to the inherently dangerous nature of the industry and requirements to work with or around hazardous equipment, employees must be able to maintain attention and concentration for extended periods of time. + Must be able to wear necessary PPE as necessary. + Must be able to enter and exit a vehicle numerous times a day. + Must be able to withstand exposure to all kinds of weather while completing work assignments, i.e., rain, heat, sun, cold. + Must be able to stand for extended periods of time. + Must be able to grip and turn traffic control sign frequently. + Must have good vision and be attentive. + Must be able to read and comprehend written and verbal job instructions/information. + Must be able to verbally communicate with other crew members and fully understand instructions and information. + Must be familiar with electrical hazards. + Must have transportation to and from the startup location. + Must have a valid driver's license. + Must pass a background check. + Must pass a pre-employment drug test. **Physical Requirements:** Rarely – less than 10% Occasionally – up to 33% Frequently = up to 66% Continuously = from 67% to 100% Lifting: 1 to 50 pounds. Pieces of cut wood (which can be cut to the size you want) for loading into chipper or stacking in or out of the right of way. Assistance is always available. Largest chainsaw on truck weighs 17 pounds. Carrying: 1 to 50 pounds. Weed whacker when clearing around poles and other obstructions the equipment cannot access. Pieces of cut wood (which can be cut to the size you want) for loading into chipper or stacking in or out of right of way. Assistance is always available. Largest chainsaw on truck weighs 17 pounds. Walking: Occasionally on all surfaces Sitting: Frequently Standing: Frequently on all surfaces Stooping: Occasionally Kneeling: None Pushing: None Pulling: Occasionally Climbing: Occasionally; trees unable to trim with bucket Crouching: None Crawling: None Balancing: None (unless to bend over to pick up wood) Reaching: Frequently Handling: Frequently Fingering: Frequently Feeling: Frequently Talking: Occasionally Seeing: Frequently Hearing: Occasionally Individuals must be able to perform the essential functions of the position with or without a reasonable accommodation. Individuals with a disability who desire a reasonable accommodation should contact the ADA Coordinator at 1-800-248-8733, ext 1339. An Equal Opportunity Employer, including disabled and vets.
          (USA-MO-Jackson) Mower Operator Non-Union      Cache   Translate Page      
We are currently seeking a **Mower Operator** to join our team. **Essential Functions** + Drives mowing tractor with hand and foot controls and use weed whacker on brush cutter. + Uses gas powered push mower. + Rakes debris and trash. + Loads and unloads equipment onto truck and trailer. + Services equipment to keep in clean, neat and specified mechanical condition. + Works around hazardous equipment. + Works around excessive noise from machines, mower, and weed whacker with hearing protection. + Works in all temperatures and weather condition and will be exposed to nature, i.e., irritating plants, biting or stinging insects, dust, etc. + Works on unlevel ground. **Minimum Requirements** + Due to the inherently dangerous nature of the industry and requirements to work with or around hazardous equipment, employees must be able to maintain attention and concentration for extended periods of time. + Must be able to wear necessary PPE as necessary. + Must be able to safely drive an approved company vehicle. + Must be able to enter and exit a vehicle numerous times a day. + Must be able to withstand exposure to all kinds of weather while completing work assignments, i.e., rain, heat, sun, cold. + Must be able to traverse various terrains. + Must be able to read and comprehend written and verbal job instructions/information. + Must be able to effectively communicate with others. + Must be able to lift, move and maneuver 10 pounds on a frequent basis. + Must have endurance necessary to perform these duties throughout a standard eight to ten hour day. + Must have sufficient eye sight to judge distances and coordination to get and use the appropriate equipment and tools. + Must be able to operate and service all required tools and equipment. + Must have transportation to and from the show up location. + Must pass a pre-employment drug screen. + Must pass a background / MVR check. ​ **Physical Requirements:** - - - **Key:** _Rarely_ = less than 10% _Occasionally_ =up to 33% _Frequently_ = up to 66% _Continously_ = 67% to 100% - - - **Standing:** _Continuously_ **Seeing:** _Continuously_ **Walking:** _Frequently_ **Reading:** _Occasionally_ **Sitting:** _Rarely_ **Reaching:** _Continuously_ **Stooping:** _Occasionally_ **Range of Motion:** _Continuously_ **Kneeling:** _Rarely_ **Hearing - Speech Range:** _Frequently_ **Squatting:** _Occasionally_ **Depth Perception:** _Continuously_ **Body Twisting:** _Frequently_ **Color Vision:** _Rarely_ **Crawling:** _Rarely_ **Lifting:** _Frequently_ **Sense of Touch:** _Continuously_ **Carrying:** _Frequently_ **Manual Dexterity:** _Frequently_ **Pushing:** _Occasionally_ **Speaking Clearly:** _Frequently_ **Pulling:** _Frequently_ **Seeing Distant:** _Continuously_ **Climbing Ladders:** _Occasionally_ **Climbing On/Off Truck:** _Occasionally_ **Climbing Stairs:** _Rarely_ **Climbing:** _Continuously_ **Balancing:** _Frequently_ **Gripping:** _Continuously_ **Lifting up to 10 lbs:** _Frequently_ **Lifting over 10 lbs to 50 lbs:** _Continuously_ **Lifting up to 50 lbs:** _Occasionally_ Individuals must be able to perform the essential functions of the position with or without a reasonable accommodation. Individuals with a disability who desire a reasonable accommodation should contact the ADA Coordinator at 1-800-248-8733, ext 1339. An Equal Opportunity Employer, including disabled and vets.
          File-sharing software on state election servers could expose them to intruders      Cache   Translate Page      

Posted by InfoSec News on Nov 05

By Jack Gillum and Jeff Kao, Propublica
Ars Technica

As recently as Monday, computer servers that powered Kentucky's online
voter registration and Wisconsin's reporting of election results ran
software that could potentially expose information to hackers or enable
access to sensitive files without a...

          Commentaires sur Petits soucis de solde ? Bercy beaucoup. par Dr Slump      Cache   Translate Page      
Ils ont réussi à créer un logiciel producteur d'erreurs, de bugs, et de plantages, ils devraient le vendre à des hackers blackhat, ça pourrait leur être utile pour les basses oeuvres, non? En tout cas, créer un logiciel qui fait gaspiller plus d'argent qu'il n'en fait économiser, le garder, et même mieux, appliquer la même procédure pour l'IR, je n'ai qu'un mot à dire: splendide! Je dirais même plus: Rhââââ, lovely!
          Hackean i exposen missatges privats d’almenys 81.000 usuaris de Facebook      Cache   Translate Page      
Hackers russos al·leguen haver aconseguit accés als detalls de 120 milions de comptes de Facebook per vendre’ls a la web. Fins ara han tret a la llum missatges privats d’almenys 81.000 d’usuaris, mostrant des converses entre ...
          Marc Benioff invited Elon Musk to come dig tunnels in San Francisco for a new transportation system and the Tesla founder accepted: 'Sure, we can do it' (CRM)      Cache   Translate Page      

Marc Benioff Elon Musk

  • On Tuesday, Salesforce CEO Marc Benioff took to Twitter to invoke the help of Elon Musk. 
  • Benioff asked Musk if his Boring Company could come to San Francisco and help improve the city's transportation system. 
  • The Boring Company (a subsidiary of SpaceX) has created its first "test tunnel" under the streets of Los Angeles to help prove out its tunnel system, meant to alleviate city traffic. 
  • Musk nonchalantly agreed to Benioff's request. 

Before votes could even be counted on Tuesday in San Francisco for the highly debated Proposition C — which would tax the city's largest corporations to provide more funding to homeless services the measure's number one backer, Salesforce CEO Marc Benioff, was already on to the next issue: transportation. 

This time, however, instead of personally spending over $2 million to support a ballot measure, he took to Twitter and invoked the help of none other than Elon Musk. 

The tweet was a reply to the video Musk posted last Saturday, showing off the tunnel that The Boring Company (a subsidiary of Musk's SpaceX) had created under the streets of Los Angeles. The project is the company's "test tunnel," used to demonstrate how its "pod" vehicles and "lifts" will work.

The Boring Company's overall purpose is to create alternative modes of transportation to help reduce city traffic. 

Read more: Elon Musk shares first look into The Boring Company's 'disturbingly long' tunnel

A little over an hour after Benioff's request to have the Boring Company build similar tunnels throughout the Bay Area — and even one that extended over 350 miles south to Los Angeles — Elon agreed, nonchalantly. 

The Boring Company did not immediately respond to Business Insider's request for comment. 

In 2008, California voters passed Proposition 1A which earmarked $9 billion to initiate construction on a high-speed rail system that would connect San Francisco to Los Angeles. Construction for that project has already begun

SEE ALSO: San Francisco’s tech billionaires are fighting over how to deal with the city's homelessness crisis — Here’s what each tech bigwig says about Tuesday's vote on Prop C

Join the conversation about this story »

NOW WATCH: A cybersecurity expert showed us how hackers can tap into an office phone and listen to everything you're saying

          Nuovi MacBook Air, microfoni a prova di hacker      Cache   Translate Page      

I nuovi MacBook Air includono microfoni a prova di hacker: vengono disconnessi quando il coperchio del dispositivo viene chiuso per la fase di stop.

The post Nuovi MacBook Air, microfoni a prova di hacker appeared first on Webnews.

          ELLIS, Etta      Cache   Translate Page      
ELLIS (Thacker), Etta Crabtree Age 85, of Dallas, GA., passed away Nov. 4, 2018. Services Nov. 7, 1:00 PM at Mt. Nebo United Methodist Church. Benson...
          Forsvarsminister: Danske virksomheder griber hacker-angreb helt forkert an      Cache   Translate Page      
Talrige cybertrusler mod Danmark har sendt alarmberedskabet op på højeste niveau siden Den Kolde Krig. Her giver forsvarsminister Claus Hjort Frederiksen (V) sit bud på, hvordan de danske it-sikkerhedsventiler skal strammes.
          7 of the best antivirus programs for Windows 10      Cache   Translate Page      
Like it or not, your Windows 10 is highly vulnerable to all kinds of pernicious attacks — and hackers are just getting more and more creative with creeping into your personal computer. Denial of service, SQL injections, cross-site scripting, and password attacks are just a few of the ... Reported by Mashable 27 minutes ago.
          [aktualita] Soukromé vzkazy z Facebooku se volně nabízely na internetu      Cache   Translate Page      
Soukromé konverzace z Facebooku se bez vědomí postižených uživatelů volně prodávaly na internetu, tvrdí to alespoň report BBC. Hacker, který se ke konverzacím dostal, tvrdí, že má přístup k 120 milionům uživatelských účtů, jako důkaz předložil konverzace 81 000 lidí. Po kontaktování některých vlastníků účtů ze strany BBC se potvrdilo, že jsou předložené konverzace autentické. Ukázané konverzace byly nejčastěji z Ruska a Ukrajiny, jinak ale prakticky z celého světa, včetně Velké Británie. Cenu…
          HSBC discloses customer accounts hacked at its U.S. bank      Cache   Translate Page      
Hackers breached some HSBC customers' accounts in the United States in October and accessed their information, the bank said in a regulatory filing on Tuesday. It was not immediately clear how many accounts were breached or whether any money was stolen. "HSBC regrets this incident, and we take our responsibility for protecting our customers very seriously." an HSBC spokeswoman said. "We have notified customers whose accounts may have experienced unauthorised access and offered them one year of credit monitoring and identify theft protection service." (This first appeared on Reuters)
          Popular WooCommerce WordPress Plugin Patches Critical Vulnerability      Cache   Translate Page      
If you own an eCommerce website built on WordPress and powered by WooCommerce plugin, then beware of a new vulnerability that could compromise your online store. Simon Scannell, a researcher at RIPS Technologies GmbH, discovered an arbitrary file deletion vulnerability in the popular WooCommerce plugin that could allow a malicious or compromised privileged user to gain full control over the

          Re: Domestic Spying: Tracking your loved one's cell may give you peace of mind, but what are you giving up in the process?      Cache   Translate Page      
If you really need a professional hacker to hack your cheating boyfriend's/girlfriend's/spouse phone, whatsapp, facebook, bank account hack etc. Or credit score upgrade, I would recommend

WHATSAPP +18456436145

He has proven to be trustworthy, His jobs are fast and affordable. He has carried out over 3 jobs for me including helping me hack my ex wife's mobile phone and i can't forget when he cleared my credit card debts and improved my credit score to 750.
Posted by Mike Henry
          Comment on Space Utilisation Surveys 2015 by {Especializada na {fabricação|produção|apresentação|artefato|construção|criação|eficiência|elaboração|exibição|exposição|fabrico|formação|fruto|geração|manufatura|manufaturação|montagem|mostra|obra|produtividade|produto|realização      Cache   Translate Page      
Olá Eu só queria perguntar se você já tiver algum problemas com hackers? Meu último blog (wordpress) foi hackeado e acabei por perder meses de trabalho devido a n backup de dados . Tem algum métodos para proteger contra hackers?
          7 of the best antivirus programs for Windows 10      Cache   Translate Page      

Like it or not, your Windows 10 is highly vulnerable to all kinds of pernicious attacks — and hackers are just getting more and more creative with creeping into your personal computer. Denial of service, SQL injections, cross-site scripting, and password attacks are just a few of the threats you’ll have to contend with. 

And what happens if your information gets hacked? Just about anything under the sun. In 2017 alone, over 16 million people fell victim to identity theft. Combine that with password or document theft, and you get the picture. Having your computer hacked can get ugly fast.

Windows 10 does come with its own default antivirus program called Windows Defender. Unfortunately, comparative studies have shown that Windows Defender doesn’t always make the cut. Several of its features are more likely to fall short against other anti-virus software options. Read more...

More about Tech, Software, Cybersecurity, Computers, and Antivirus
          Vulnerabilidad en el cifrado nativo de las SSDs      Cache   Translate Page      
Investigadores de seguridad holandeses han descubierto [PDF] vulnerabilidades críticas en el cifrado nativo de SSD, las unidades de estado sólido que están dominando el mercado de consumo.

En comparación con los discos duros, la lógica que hace funcionar a las SSD es mucho más compleja, e incluye un SoC más potente y un sofisticado firmware que le dice al controlador dónde está físicamente cada bit de datos del usuario almacenado a través de una serie de chips flash NAND. No es sorprendente que cuanto más sofisticado sea el firmware de una SSD, más vulnerabilidades de seguridad potenciales pueda tener.

Es lo que han descubierto estos investigadores, básicamente que las tecnologías de cifrado nativo de SSD por hardware que incluyen la mayoría de unidades modernas son superables y permitirían a un atacante romper la seguridad y hacerse con los datos sin necesidad de la contraseña de acceso.

El equipo ha examinado dos de las marcas de SSD más vendidas, Crucial y Samsung, y sus productos más populares para el segmento cliente: MX100, MX200, MX300, 840 EVO, 850 EVO, T4 y T5 externos.
"El análisis descubre un patrón de problemas críticos entre los proveedores. En varios modelos, es posible omitir el cifrado por completo, lo que permite una recuperación de los datos sin ningún conocimiento de contraseñas o claves"
Los investigadores comentan que el patrón encontrado revela que los problemas "no son incidentales sino estructurales" y explican que en este escenario estándares como el TCG Opal utilizado es "extremadamente difícil de implementar correctamente"

Con acceso físico a los puertos de depuración del dispositivo, los investigadores pudieron realizar ingeniería inversa del firmware y modificarlo para acceder a los datos cifrados del hardware ingresando cualquier contraseña. También identificaron varias vulnerabilidades de corrupción de memoria, aunque "ninguna de las cuales pudieron ser explotadas con éxito para ganar control sobre la ejecución"explican.

También comprobaron que BitLocker, el software de cifrado integrado en Microsoft Windows no ofrece una protección efectiva en estos casos cuando se utiliza cifrado por hardware. El cifrado por software parece no verse afectado.

Los investigadores informaron de las vulnerabilidades a Crucial y Samsung antes de publicar sus hallazgos. Crucial ya ha lanzado parches de firmware para todas las unidades afectadas y Samsung ha lanzado parches de seguridad para sus SSD portátiles T3 y T5. Para sus unidades EVO, Samsung recomienda instalar