Next Page: 10000

          PSA: Microsoft says hackers had access to some Outlook․com accounts for months      Comment   Translate Page      
Microsoft has revealed this morning that a hacker was able to access Outlook.com accounts for several months. As detailed by The Verge, Microsoft discovered that a support agent’s credentials for Outlook.com were compromised for a 3-month window. Microsoft says that a hacker had access to the support agent’s account from January 1st through March 28th, […]
          Microsoft webmail breach exposed email addresses and subject lines - Engadget      Comment   Translate Page      
  1. Microsoft webmail breach exposed email addresses and subject lines  Engadget
  2. Microsoft reveals hackers accessed some Outlook.com accounts for months  The Verge
  3. Microsoft discloses security breach impacting some Outlook accounts  ZDNet
  4. PSA: Microsoft says hackers had access to some Outlook․com accounts for months  9to5Mac
  5. Microsoft: Hackers compromised support agent’s credentials to access customer email accounts  TechCrunch
  6. View full coverage on Google News

           Comment on dragones-big by Suboxone doctors       Comment   Translate Page      
Greetings! I know this is kinda off topic but I was wondering which blog platform are you using for this site? I'm getting fed up of Wordpress because I've had issues with hackers and I'm looking at options for another platform. I would be great if you could point me in the direction of a good platform.
          Ecuador Hacked After Julian Assange Arrest      Comment   Translate Page      

Two days after the Thursday arrest of Julian Assange at Ecuador's London embassy, several government websites were hacked; including Ecuador's official website, the Central Bank of Ecuador, the Ministry of the Interior and the Ecuadorian Assembly in the UK, according to Gateway Pundit's Cassandra Fairbanks, who was in London last week and documented the run-up to Assange's arrest. 

Concurrent with the breach, a hacking group operating under the name "AL1NE3737#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F2019_04_14%2F218872" released a database containing the full names and passwords for what appear to be 728 Ecuadorian government employees. 

Furthermore, Ecuador's sites were hit with Denial of Service (DoS) attacks. According to DefCon Lab.

Among those involved in these attacks stand out from the groups / hacker DeathLaw , 5UB5, Cyb3r C0nven Security and Al1ne ( Pryzraky ).

DoS actions has consistently been against the Ecuadorian government targets, the country that gave Julian Assange to the UK police." -DefCon Lab

...

The hacker Al1ne ( Pryzraky ) performed page defacements against and released a list of vulnerable targets related to the government of Ecuador

As noted by Fairbanks, "The cyber attack was reminiscent of 2010’s “Operation Avenge Assange” which was launched by the broader “Operation Payback” effort. The movement lead to hacktivists hitting companies such as PayPal, PostFinance, Mastercard, Visa, and others who had blocked services to WikiLeaks with a distributed denial-of-service (DDOS) attack. This is when a website is flooded with fake traffic until it crashes and goes offline." 

Following Assange's Thursday arrest, more than 70 MPs and peers signed a letter urging the UK home secretary to ensure that the WikiLeaks founder is extradited to Sweden if Swedish authorities request it. 

Sweden is considering whether to open a previously-dropped investigation into allegations of rape and sexual assault against Assange. 

The United States, meanwhile, wants to try Assange for the largest-ever leak of government secrets in 2010.  On Thursday, the Justice Department hit him with an indictment that claims the WikiLeaks founder helped former US Army intelligence analyst crack DoD password using Linux.  

"The indictment alleges that in March 2010, Assange engaged in a conspiracy with Chelsea Manning, a former intelligence analyst in the U.S. Army, to assist Manning in cracking a password stored on U.S. Department of Defense computers connected to the Secret Internet Protocol Network (SIPRNet), a U.S. government network used for classified documents and communications," reads a DOJ press release

Materials Manning released included videos of various US airstrikes in Iraq and Afghanistan, as well as the "Iraq War Logs" and "Afghan War Diary." 

Assange faces five years in prison if convicted in the Manning case. 


          Microsoft: Hackers compromised support agent’s credentials to access customer email accounts      Comment   Translate Page      
On the heels of a trove of 773 million emails, and tens of millions of passwords, from a variety of domains getting leaked in January, Microsoft has faced another breach affecting its web-based email services. Microsoft has confirmed to TechCrunch that a certain “limited” number of people who use web email services managed by Microsoft […]
          DevSecOps and Other New Feature in Developer Cloud - April Update      Comment   Translate Page      

Over the weekend we rolled out an update to Oracle Developer Cloud - your DevOps and Agile platform in the Oracle Cloud. A key new capability we added is security checks for your Java apps as part of our DevOps pipelines. Read below to learn more about this and other features available for you.

DevSecOps - Automate Code Security Checks

Keeping up to date with the latest information about security risks in your code can be a challenge, but not doing this can put your company and your customers at risk. We all heard stories about hackers leveraging well known security britches that companies forgot to patch. As your application grows this becomes even more challenging as you struggle to keep track of the set of public libraries you are using.

With the new version of Oracle Developer Cloud we add DevSecOps functionality that scans your code against a database of known security vulnerabilities and alerts you if your code is using libraries with known security issues. In our first release we scan Java code for projects that leverage Maven as their build framework.

You can setup automatic jobs to review your code, report the results, and stop the roll out of vulenrable apps. You can also automatically add a task to the issue tracking system in DevCS to help the team keep an eye on fixing the issue.

build setup

The build job will give you a detailed report with links to more information about every vulnerability we identify in your code.

security report

YAML Based Build and Pipeline Definition

Following the "Infrastructure as Code" approach Developer Cloud now allows you to define build jobs and pipelines using YAML files. These files can be stored in the Git repositories in DevCS, and versioned like the rest of your code. DevCS scans your git repositories for these files (specific directory), and creates or updates jobs and pipelines automatically when those are changed (in the master branch). This provides a compliment approach for defining your CI/CD in parallel to the visual approach using the DevCS interface.

Enhanced Git Branch Protection

You now have more capabilities to restrict what changes can be done to specific code branches. New branch types include branches that require review, are private, or frozen. For example, a branch that is marked as "requires review" limits the ability to push changes by requiring code review by other team members, successful build job, and other combinations of conditions.

Branch Restrictions

Deployment Build Step

Up until this release deployment was a separate part from our build pipelines. In the new release we are introducing a new step type in your build jobs that can do deployment to Oracle Cloud services. This allows you to add these deployment-jobs to pipelines in an easier way. In addition we connected our deployment step with the environment feature in DevCS. This way you define the connections to your cloud services only once, and then you are able to reuse them in various jobs.

Deployment Step

To learn more about these and other new features have a look at the "What's New" document and the links it provide for our product documentation. If you have further questions, reach us on the Developer Cloud slack channel or the online forum.


          Anonymous lanza una amenaza al Reino Unido: "iLiberen a Assange o pagarán!"      Comment   Translate Page      
El grupo de hackers Anonymous publicó un extenso mensaje en su página amenazando con tomar medidas contra el Gobierno del Reino Unido y sus aliados, tras la detención del fundador de Wikileaks, Julian Assange.
          Why Julian Assange's arrest is troubling for whistleblowers      Comment   Translate Page      
OPINION: He might be more hacker than reporter, but information is the lifeblood of democracy.
          Le nombre de cyberattaques liées à un contexte électoral aurait triplé depuis 2015 - Clubic.com      Comment   Translate Page      
Le nombre de cyberattaques liées à un contexte électoral aurait triplé depuis 2015  Clubic.com

Un rapport canadien met en évidence la hausse du nombre de cyberattaques visant plusieurs pays pendant les périodes électorales. Une accélération qui ...


          Microsoft discloses security breach that impacted some Outlook accounts      Comment   Translate Page      
Incident took place after hackers compromised a Microsoft support agent's account.
           Comment on China O Brien II (1990) by rarelust       Comment   Translate Page      
Yuzo Realted Posts plugin exploited by hackers resulted all site using it redirected to spam sites info here wordpress.org/support/topic/hacked-plugin-yuzo-realted-posts-2/
          What the hell is going on with Matthew Lillard's Instagram account?: An investigation      Comment   Translate Page      
TwitterFacebook

Even Hollywood's brightest stars are vulnerable to the pain and suffering of Instagram's broken customer support system.

Good Girls actor Matthew Lillard — also known for starring in cult classics such as SLC Punk!, Scream, and Hackers — learned this the hard way when he recently discovered he was locked out of his Instagram account. 

Lillard suspects he was hacked, but — celebrities are just like us! — his attempts to reach Instagram support have gone unanswered for more than a week.

SEE ALSO: Instagram hacks raise questions about its 2FA security

Now, in an exclusive interview with Mashable, the movie star describes the entire ordeal in detail, highlighting how even a verified account with more than 150,000 followers can be easily lost in Instagram's awful customer support system. Read more...

More about Tech, Instagram, Tech, and Social Media Companies
          30 полезных привычек, которые прокачают все сферы жизни      Comment   Translate Page      
Как проще достигать целей, улучшить отношения с близкими и жить в гармонии с собой.
          Что произойдёт с вашим телом, если вы откажетесь от углеводов на месяц      Comment   Translate Page      
Что произойдёт с вашим телом, если вы откажетесь от углеводов на месяцПоследствия могут быть не самыми приятными: от головных болей до гормонального сбоя.
          Без онлайна и доната: EA показала сюжетный трейлер Star Wars — Jedi: Fallen Order      Comment   Translate Page      
Всё что показано в трейлере появится на релизе.
          Не только «Оскар»: гид по главным кинопремиям и фестивалям      Comment   Translate Page      
Не только «Оскар»: гид по главным кинопремиям и фестивалямКому дают главный приз от BAFTA, какие картины попадают на «Сандэнс» и где награждают за лучшую фантастику.
          ИГРА: Сможете ли вы написать диктант без ошибок? Проверьте!      Comment   Translate Page      
проверить грамотность13 апреля по всему миру проходит «Тотальный диктант». Мы решили поддержать эту акцию и сделали игру: нужно расставить в тексте знаки препинания и написать выделенные слова без ошибок. В конце вы получите отметку, прямо как в школе.
          6 исполнительниц, ответственных за будущее женского хип-хопа в России и СНГ      Comment   Translate Page      
6 исполнительниц, ответственных за будущее женского хип-хопа в России и СНГПровокационный, остроумный рэп о политике, токсичных отношениях и собственной значимости.
          В библиотеку копирайтеру: книги, которые стоит прочитать      Comment   Translate Page      
В библиотеку копирайтеру: книги, которые стоит прочитатьЭти издания помогут писать просто и понятно, искать вдохновение во всём и научиться работать, даже когда муза ушла.
          Как отключить экран блокировки в Windows 10      Comment   Translate Page      
Как отключить экран блокировки в Windows 10На компьютерах без сенсорного дисплея он только мешает.
          Есть или не есть хлеб: всё, что надо знать про основной продукт      Comment   Translate Page      
Есть или не есть хлеб: всё, что надо знать про основной продуктЛайфхакер посоветовался с экспертом и выяснил, стоит ли отказываться от хлеба или же пора бежать за новым батоном.
          7 способов приготовить квас из берёзового сока      Comment   Translate Page      
7 способов приготовить квас из берёзового сокаВас ждут вкусные освежающие напитки с хлебом, изюмом, ячменём и не только.
          Игра дня: Pathway — приключенческая RPG в духе «Индианы Джонса»      Comment   Translate Page      
Отправляйтесь в неизведанную пустыню, расхищайте гробницы и принимайте сложные решения.
          Большой гид по «Игре престолов»: вспоминаем всё, что было в 7 сезонах      Comment   Translate Page      
Большой гид по «Игре престолов»: вспоминаем всё, что было в 7 сезонахПеред стартом нового сезона саги Лайфхакер пересказывает главные события предыдущих. Осторожно: спойлеры!
          ONE Mini — карманный переводчик для путешественников      Comment   Translate Page      
Устройство знает 12 различных языков, среди которых есть русский и английский.
          ТЕСТ: Хорошо ли вы различаете цвета?      Comment   Translate Page      
Пройдите простой и быстрый визуальный тест, чтобы проверить свою зоркость. Смотрите на разноцветные прямоугольники и выбирайте среди них тот, что отличается от других по цвету. Давайте выясним, получится ли у вас распознать всё многообразие цветов и оттенков. Увеличивайте яркость экрана на максимум!
          О чём спросить будущего работодателя      Comment   Translate Page      
Советы карьерного консультанта.
          Report: Hackers Steal, Publish Data on Thousands of Federal Agents, Police Officers Across US      Comment   Translate Page      

Hackers have stolen data from “several FBI-affiliated websites” and are distributing it across the web, TechCrunch reported on Friday, with details on “thousands of federal agents and law enforcement officers” now floating around on the web.

Read more...


          Report: Hackers Steal, Publish Data on Thousands of Federal Agents, Police Officers Across US      Comment   Translate Page      

Hackers have stolen data from “several FBI-affiliated websites” and are distributing it across the web, TechCrunch reported on Friday, with details on “thousands of federal agents and law enforcement officers” now floating around on the web.

Read more...


          Microsoft webmail services breached by hackers with support agent's credentials      Comment   Translate Page      
Microsoft's web-based email services were the target of a security beach. Using a customer support agent's credentials, hackers were...
          FBI-related breach reportedly compromised federal agents' details      Comment   Translate Page      

A group of hackers has exploited the flaws of at least three FBI-affiliated websites and leaked thousands of federal and law enforcement agents' personal details. According to TechCrunch, the group infiltrated websites run by the FBI National Academy Association. It's a nonprofit dedicated to promoting law enforcement training and has multiple chapters across the country, each with their own page. The hackers told the publication that they were able to break into the pages and download the contents, which they then uploaded on their own website.

Source: TechCrunch


          South-east Asian banks most used to receive funds from fraudulent transactions: SWIFT      Comment   Translate Page      

Posted by InfoSec News on Apr 13

https://www.businesstimes.com.sg/banking-finance/south-east-asian-banks-most-used-to-receive-funds-from-fraudulent-transactions-swift

By Vivienne Tay
The Business Times
April 12, 2019

HACKERS used South-east Asian banks to receive funds from 83 per cent of all
studied fraudulent transactions in 2018 and 2019, according to global payments
network SWIFT.

The remaining 17 per cent were spread across Europe, North America and the
Middle East,...

          Hackers Reportedly Stole Personal Data on Thousands of FBI, US Police Officers      Comment   Translate Page      
Part of the stolen data has been published on the internet, as one of the hackers claim, to show that they indeed have something interesting to sell.
          Microsoft: Προσοχή διαρροή emails Αλλάξτε κωδικούς - [Iguru.gr]      Comment   Translate Page      
Image

Η Microsoft μόλις αποκάλυψε ότι τα συστήματά της παραβιάστηκαν κάποια στιγμή το 2019, και ότι οι hackers κατάφεραν να έχουν πρόσβαση σε ορισμένες πληροφορίες ηλεκτρονικού ταχυδρομείου των χρηστών της εταιρείας. Σε ένα μήνυμα ηλεκτρονικού ταχυδρομείου που απέστειλε σε όλους τους εμπλεκόμενους...


          well, here it is again... damn...       Comment   Translate Page      
Saturday yowls and roars, most beloved and beautiful KitKats... yes, the world appears to still be spinning... whatever ... this Big Cat is experiencing a flashback... at fifteen she walked out of high school, as she's explained before... well, with the recent EXPOSE' of congress, the sheer monumental stupidity this Big Cat [kindergartners are smarter] is witnessing everyday by most of the congressional establishment critters -- as exampled by the AG Barr CIRCUS CIRCUS dumber-than-dumb questioning display... Barr, who actually has some real brain power, ran proverbial circles around these idiot-tards ... PLUS, the endless, stomach-turning, hell-level corruption ... the fact that most in congress could care less about WE REAL AMERICANS ... yeah, the Kougar wants to walk out again -- just given the complete insult to her intelligence, which high school was... and given the absolute oppression-suppression, the LACK OF FREEDOM, the stay-in-the-box YOU HAVE TO THINK/BELIEVE THIS WAY .... well, here it is again... damn... 

TAKE CARE, DARLING KITTENS, 'CAUSE THIS BIG CAT LOVES YA! 


DURING THE EARLY 90'S, THE KOUGAR VISITED HER SISTER, WHO WAS WORKING IN WASHINGTON DC AT THE TIME... WE VISITED MOUNT VERNON... IT WAS AN ABSOLUTELY INCREDIBLE AND WONDERFUL EXPERIENCE!!! PLUS, TO SEE THE ACTUAL SADDLES WASHINGTON USED ON HIS HORSES... YEAH, A HIGHLIGHT! 

SHATTERED: Mount Vernon Exposes Politico’s Very Fake News Story About Trump’s Visit To George Washington’s Estate



https://www.thegatewaypundit.com/2019/04/shattered-mount-vernon-exposes-politicos-very-fake-news-story-about-trumps-visit-to-george-washingtons-estate/

YES!!! 

Ecuadorian Government Websites Hacked and Taken Offline Over Julian Assange Arrest

Ecuadorian Government Websites Hacked and Taken Offline Over Julian Assange Arrest





Mapping Armaggedon: Earth's looming tsunamis and mega-quakes...



THE VERY GOV AGENCIES THAT ARE SUPPOSED TO HELP AND PROTECT CHILDREN ARE EONS, FAR AND AWAY MORE CRUEL TO CHILDREN THAN THE ABUSE THEY ARE SUPPOSED TO STOP... SADLY, VERY SADLY... THE KOUGAR ABSOLUTELY HATES CRUELTY TO CHILDREN... NOW PROPER DISCIPLINE THAT IS SOMETIMES PHYSICAL, YES, THAT IS NECESSARY AT TIMES... JUST LIKE A FEMALE DOG WHO CORRECTS HER PUPS WITH PHYSICAL FORCE... 

Further, the horror perpetrated against Native American children... the sheer persecution-brutality against the Bundy family and the good patriots involved in helping them ... may the perpetrators get what's coming to them... now! 






YEAH, AIN'T THIS INTERESTING... 

FACEBOOK REMOVES PAGE OF ECUADOR’S FORMER PRESIDENT ON SAME DAY AS ASSANGE’S ARREST

Prior to the removal of the page, Correa lambasted his successor in a series of posts


Facebook has unpublished the page of Ecuador’s former president, Rafael Correa, the social media giant confirmed on Thursday, claiming that the popular leftist leader violated the company’s security policies. 

"...Since 2015, Correa—who lives with his family in Brussels, Belgium—had used the social platform to great effect, using strongly-worded posts, video interviews, and live-streams as a platform amid the Ecuadorean media’s de facto blackout of the former leader, who remains reviled by the center-right former opposition and sections of the country’s left.
Former President Correa minced no words in his assessment of Moreno, denouncing him in an English-language tweet as “the greatest traitor in Ecuadorian and Latin American history … Moreno is a corrupt man, but what he has done is a crime that humanity will never forget.” ... 
https://www.infowars.com/facebook-removes-page-of-ecuadors-former-president-on-same-day-as-assanges-arrest/


IT IS STRAIGHT-UP TREASON, IT'S A DAMN MASSIVE INVASION... 

Trump Fires Off Late Night Tweet – Calls Democrats’ Open Border Policies “TREASONOUS”

President Trump fired off a late night tweet Wednesday, calling the actions taken by Democrats to keep the borders wide open, “TREASONOUS.”

Thank you, President Trump for calling it what it is!
“I think what the Democrats are doing with the Border is TREASONOUS. Their Open Border mindset is putting our Country at risk. Will not let this happen!” Trump said in a tweet.

There is a huge crisis at the US-Mexico border with record number of illegal aliens flooding into the United States.
Asylum seekers are being released into communities because of dangerous “catch and release” policies and Congress refuses to act.
No doubt these caravans of illegals are being funded by open border zealots looking to destroy US sovereignty.
Multiple caravans full of military-aged Central Americans and other migrants from all over the world are currently marching to the US border where they will seek asylum then be released into the US.

Rio Grande Valley (RGV) Sector Chief Patrol Agent Rodolfo Karisch said that in his sector alone, border agents have captured people trying to enter the country illegally from more than 50 different countries, including Turkey, China, Bangladesh, Egypt and Romania. “People are traveling across hemispheres to attempt to illegally enter the U.S., using the same pathways as the Central Americans,” he told lawmakers.
“Karisch noted that Border Patrol has apprehended more families illegally crossing the border in the first five months of fiscal 2019 than during all of fiscal 2018,” Fox News reported. “Customs and Border Protection (CBP) apprehended more than 76,000 migrants across the border in February and said it was on track to apprehend more than 100,000 in March. In the Rio Grande Valley alone, Karisch said that at current pace, they would have more than 260,000 apprehensions in his sector by the end of fiscal 2019. There were 162,000 in RGV last year. He also said that his agents apprehend, on average, 1,000 people a day.”
President Trump declared a national emergency in February to secure funding for a border wall, however, the insanely dangerous asylum laws are causing the biggest surge of illegal aliens flooding over the border.
Despite nearly 100,000 illegal invaders being apprehended by border patrol in the month of March alone, Democrats continue to give comfort and aid to the invaders by refusing to stop the border surge.
Judge Richard Seeborg on Monday blocked President Trump’s policy of returning asylum seekers to Mexico as they wait their turn for an immigration judge to hear their cases.
Judge Seeborg, an Obama appointee in San Francisco, granted a request by a civil liberties group that sued the Trump Administration on behalf of 11 asylum seekers from Central America.
Trump is right — what the Democrats are doing with the border is treasonous.
https://www.thegatewaypundit.com/2019/04/trump-fires-off-late-night-tweet-calls-democrats-open-border-policies-treasonous/


HOW DUMB IS THIS??? THESE HACKER-IDJITS WILL GET EXPOSED... 

WIKILEAKS claims 'extortion' over leaked Assange footage... 

THE GIANT TECH MONSTERS HATE YOU... 

Breaking the internet: New regulations imperil global network... 



YES, THE KOUGAR EMAILED THIS CORRUPT-TOID... 

Veritas Logo

Dear Savannah, 

You can’t make this up.
Yesterday I went to the Attorney General’s Office in New Hampshire to give them proof of voter fraud.  An admission from an Atkinson man who voted twice in the same election in two different states.

You can view the video HERE.
How did they respond?
They handed me and my executive producer a grand jury subpoena.  
Did the summons mention anything about voter fraud or double voting?  Of course not. 
We are now ordered to appear before a grand jury in Hillsborough County, New Hampshire for an investigation.

Our journalists found a man who admitted to double voting.  Breaking the law!
Now, the response of the AG’s office isn’t to investigate the double voter, but instead our operations.
I will not budge.  I will not capitulate.  And I will not cave to this political pressure.
I will keep releasing voter fraud videos in New Hampshire and I will not be not be intimidated by the misguided use of the grand jury process to try and prevent our lawful investigative journalism.
I'm not asking for your money, I'm asking for your help.
Please help me put pressure on the New Hampshire Attorney General's Office to investigate this voter fraud case right now.  
Please call their investigator Robert J. Sullivan at:603-271-1182
Or you can email him atRobert.Sullivan@doj.nh.gov
Tell him the following:
Please investigate Robert A. Bell for admitting to voting twice.  Why did you subpoena James O'Keefe, the journalist, instead of subpoenaing the person who voted twice? 
Be Brave!
James O’Keefe

WHILE THIS BIG CAT DESPISES FACEBOOK, DO YOU REALLY WANT TO LIVE THIS WAY??? UNDER THIS COMMIE-FASCIST TYRANNY... 






BIG BROTHER WATCHING 

Chinese cops send people to ‘concentration camps’ if they’re found with Facebook on phones during random stop and searches

Western social media is banned in China’s Xinjiang region where police are accused of seizing phones and installing spyware


"...Offenders are said to be sent to "re-education" camps to clamp down on social media use.
Mandatory spyware is downloaded onto citizen’s phones to restrict what citizens can access.
And police check mobiles for evidence of foreign social media apps like Twitter or WhatsApp.
Xinjiang is home to 11 million Uighurs - one of China’s fifty-five ethnic minorities who have their own language and mainly practice Islam.
The Chinese government is accused of routinely targeting citizens of the region with “counter-terror” measures and brutal policing.
Kasim, who claims to be a Xinjiang native, shared what he says are secretly taken pictures inside the secretive region, which the Chinese government restricts access to by outsiders.
He says he used special software to bypass the government's censors and post the images on Twitter.
And he said living in China is “like Nazi Germany” and likened the Chinese Communist Party to ISIS..." 
https://www.thesun.co.uk/news/8827966/chinese-cops-concentration-camps-facebook-stop-search/


YEP, THESE DAYS AS THE KOUGAR IS FOND OF SAYING... IT'S JUST A PRISON CELL ON WHEELS... IT'S TECH VAMPIRE FEEDING OFF YOU... 

Your car is watching you. Who owns the data?

Computers on wheels raise thorny questions about data privacy

If you’re driving a late model car or truck, chances are that the vehicle is mostly computers on wheels, collecting and wirelessly transmitting vast quantities of data to the car manufacturer not just on vehicle performance but personal information, too, such as your weight, the restaurants you visit, your music tastes and places you go.
A car can generate about 25 gigabytes of data every hour and as much as 4,000 gigabytes a day, according to some estimates. The data trove in the hands of car makers could be worth as much as $750 billion by 2030, the consulting firm McKinsey has estimated. But consumer groups, aftermarket repair shops and privacy advocates say the data belongs to the car’s owners and the information should be subject to data privacy laws.
Yet Congress has yet to pass comprehensive federal data privacy legislation. And although Sen. Roger Wicker of Mississippi, chairman of the Senate Committee on Commerce, Science, and Transportation, has said he would like to see federal privacy legislation passed by the end of the year, it is unclear if that goal can be met.
Financial technology is changing how we do business, and regulators are trying to catch up
MORE AT: https://www.rollcall.com/news/policy/cars-data-privacy

CAN YOU SAY GUILTY? GUILTY OF TREASON...? 

Ex-FBI Lawyer James Baker Refuses to Answer Rep. Meadows When Asked if Multiple Trump Associates Were Targeted With FISA Warrants

Ex-FBI Lawyer James Baker Refuses to Answer Rep. Meadows When Asked if Multiple Trump Associates Were Targeted With FISA Warrants


THE PROBLEM IS: ASSANGE IS IN NO WAY SAFE IN BRITAIN... HE'LL LIKELY GET THE TOMMY ROBINSON TREATMENT IF NOT RESCUED IN SOME WAY... 

VIDEO: WikiLeaks Editor-in-Chief Warns Other Journalists About the Serious Precedent Being Set if Julian Assange is Extradited

VIDEO: WikiLeaks Editor-in-Chief Warns Other Journalists About the Serious Precedent Being Set if Julian Assange is Extradited


ANOTHER RICH COMMIE SOCIALIST... GEE, WHAT A NOT SURPRISE... HUH? 

KA-CHING! Socialist Bernie Sanders, Who Owns Three Houses, Admits He’s a Millionaire

KA-CHING! Socialist Bernie Sanders, Who Owns Three Houses, Admits He’s a Millionaire


YEP,
          William Makepeace Thackeray: A Newcome család I-II. (*93) - Jelenlegi ára: 800 Ft      Comment   Translate Page      
William Makepeace Thackeray: A Newcome család I-II.
A megrendelt könyv(ek) személyesen átvehetők Budapesten lévő átvételi pontunkon minden hétköznap 10 és 18 óra, szombaton 10 és 14 óra között. A személyes átvételi lehetőségről részletesen az Ismerj+ alatt olvashat.  Kiszállítás esetén a Magyar Posta mindenkori díjszabása az irányadó, több könyv rendelése esetén egyszeri postázási díjat számolunk, 6000 forintot meghaladó rendelés esetén a kiszállítás díjtalan.
A vásárlás menete részletesen >>"
William Makepeace Thackeray: A Newcome család I-II. (*93)
Jelenlegi ára: 800 Ft
Az aukció vége: 2019-05-05 01:36
          William Makepeace Thackeray: A virginiai testvérek I-II. (*93) - Jelenlegi ára: 800 Ft      Comment   Translate Page      
William Makepeace Thackeray: A virginiai testvérek I-II.
A megrendelt könyv(ek) személyesen átvehetők Budapesten lévő átvételi pontunkon minden hétköznap 10 és 18 óra, szombaton 10 és 14 óra között. A személyes átvételi lehetőségről részletesen az Ismerj+ alatt olvashat.  Kiszállítás esetén a Magyar Posta mindenkori díjszabása az irányadó, több könyv rendelése esetén egyszeri postázási díjat számolunk, 6000 forintot meghaladó rendelés esetén a kiszállítás díjtalan.
A vásárlás menete részletesen >>"
William Makepeace Thackeray: A virginiai testvérek I-II. (*93)
Jelenlegi ára: 800 Ft
Az aukció vége: 2019-05-05 01:36
          Microsoft: Here's Your Outlook And It May Have Been Hacked      Comment   Translate Page      
Microsoft: Here's Your Outlook And It May Have Been Hacked As if Microsoft’s Skype security exploit back in February wasn’t alarming enough, users of the company’s Outlook.com, MSN.com and Hotmail.com webmail services may have something to worry about now as well. Microsoft has confirmed to a number of sources, and according to users on reddit with specific documentation, that hackers compromised

          Re: Domestic Spying: Tracking your loved one's cell may give you peace of mind, but what are you giving up in the process?      Comment   Translate Page      
WORLDHACKERS79@GMAIL.COM
This Turkey American hacker by the name WORLDHACKERS79@GMAIL. COM we can help you change your driving records and clear some implicating records you had online.
Posted by Laura David
          New Internet Explorer Zero-day exploit can get you even if you use Chrome      Comment   Translate Page      

A security researcher has found a new vulnerability in how Internet Explorer 11 handles  .MHT saved web pages which would allow hackers to steal files on your PC. Crucially because Internet Explorer is the default handler for .MHT files the zero-day, unpatched exploit would still work even if you use Chrome as your default for […]

Read More: New Internet Explorer Zero-day exploit can get you even if you use Chrome


          Hackerlar FBI dosyalarını çaldı      Comment   Translate Page      
Bilgisayar korsanları Amerikan Federal Soruşturma Bürosu FBI personeline ait kayıtları çaldı.
          Russian Marketing Assistant - Upwork      Comment   Translate Page      
LocalCoinSwap is looking to hire a Russian Marketing Assistant.

The role includes:

- Assisting Marketing Manager with outreach to Russian crypto media
- Driving P2P traders to buy/sell Bitcoin and other cryptocurrencies using LocalCoinSwap
- Sharing content on social media in Russian and English
- Responding to the community in Russian and English across Facebook, Twitter, Telegram, Instagram, Reddit, VK.com, OK.ru, RuTube, etc
- Translating content from English to Russian
- Writing tutorials and creating original content (editorial and video) in Russian
- Responding to customer service tickets in Russian and English
- Creating new ideas to help the Russian community grow, improve engagement and user satisfaction

REQUIREMENTS:

- Must speak Russian natively and fluent English
- Must have 1-5 years of experience in community management/marketing/communication
- Must have excellent written and oral communication in English and Russian
- Preferable to have experience buying and selling cryptocurrency peer-to-peer.
- A growth hacker mindset, with a strong interest in blockchain technology and cryptocurrency

BENEFITS:
- Fun and exciting startup team
- 100% Remote working

----------------------------------
About LocalCoinSwap:
----------------------------------

LocalCoinSwap is the world’s first community-owned, peer-to-peer (P2P) Bitcoin and Altcoin cryptocurrency exchange that connects people from all around the world to buy and sell cryptocurrency. As there is no KYC or ID verification required to get started, trading is fast, secure and private. All you need to do is create a free trade advertisement and in minutes you can be trading locally with others in your community, or with established businesses and OTC cryptocurrency brokers worldwide.

LocalCoinSwap currently has 23+ cryptocurrencies available for P2P trading, including Bitcoin, Ethereum, Monero, Dash, XRP, Dai, and Tether, to name a few; Over 250+ different payment methods including cash, bank transfer, direct debit, credit card, Paypal, Western Union, Amazon gift cards and iTunes gift cards, as well as more than 160+ fiat currencies, and is available in over 190+ countries, making it the largest selection of currencies available on any P2P platform worldwide.

In addition, LocalCoinSwap offers 24/7 customer service and is the only marketplace in the world with a profit-sharing model that gives 100% of its profits from the exchange back to the crypto community.

Budget: $800
Posted On: April 14, 2019 00:25 UTC
Category: Sales & Marketing > Display Advertising
Skills: Bitcoin, Content Writing, Online Community Management, SEO Backlinks, SEO Writing, Translation, Translation English Russian, Writing
Country: Australia
click to apply
          Hacker group posts hundreds of law officer records...      Comment   Translate Page      

Hacker group posts hundreds of law officer records...


(Second column, 16th story, link)



          10 Security features of Android phones !! Must be Aware      Comment   Translate Page      

Skyneel - Android guide, driver, root, ROM update, excel, review, App

Most of the smartphones used in the world, including India, are Android. These days, smartphones are used for mobile banking and for many purposes. If your smartphone comes in the hands of a hacker, then you can become a victim of trouble. All your personal information may leak. So today we are going to tell […]

[[ This is a content summary only. Visit https://www.skyneel.com for full article and more articles ]]


          Preparing the Thesis Proposal Defense      Comment   Translate Page      
Blog: 

Ingrid J. Paredes is a Ph.D. candidate in chemical engineering at New York University. You can find her on Twitter @ingridjoylyn.

In my program, we have four major milestones towards graduation: the qualifying exam, which is based on a critique of a peer-reviewed publication; the thesis proposal defense; the data defense; and finally, the dissertation defense. At the end of this month, I’ll check #2 off of my list. The defense requires the preparation of a report and delivery of a presentation detailing what I plan to do for the last two years of my PhD. Since defenses are often set up similarly, I’ve compiled a roundup of my own tips on how to prepare.

Create a Plan and Compile Your Resources
As soon as you schedule your proposal defense, create a plan for what tasks you need to accomplish. Megan’s checklist is a great place to start. Talk to other graduate students in your department who have defended recently, especially students who share committee members with you. Talk to your adviser to ensure that your timeline works.

Productivity
At Megan’s suggestion, I also included non-thesis daily tasks into my schedule, including commute time, leisure time, and food plans in my own timeline. I’m usually flexible with these, but having them on my calendar for the weeks leading up to my defense has helped me budget my time properly. I am also very religious with my writing time – even if I hit a block with my proposal, I try to work on other projects (like this blog post!) or journal to keep momentum. To avoid distractions, I usually set a timer for 20 to 30 minute intervals where I focus just on writing, and then I take a break for a few minutes.

Storyboarding
Before I write a paper or start a slide deck, I write on a stack of index cards with each of the topics I’d like to discuss to storyboard my research. This process works because it removes the distractions that come with working on a computer. Like, when I’m writing in Word, I often get so caught up with formatting and inserting references after each sentence that I write that it distracts me from actually writing.

For my proposal, I’ve organized my cards into three sections that I laid out on the floor: the introduction, the proposal plan, and my conclusions. Each index card has a title and a few bullet points and/or sketches of the material I plan to discuss. I laid these out in separate columns in front of me, which allowed me to easily visualize how much time I was dedicating to teach topic as well as the flow of my talk. I’ve run through this deck of cards a few times now, reciting a very rough version of my talk and reorganizing them as I’ve seen fit. It’s only once I feel confident about the logic of the presentation that I’ll actually finish writing and create my Powerpoint slides.

Backup Slides
My weak point in presentations is taking questions –I’m usually so nervous that I freeze. Having backup slides has been a safety blanket for me. Whenever I make a slide on a topic and feel like I need to provide more information, I chuck all of that information into a separate slide deck. That way the information is on hand for me to pull up on the screen in case any questions call for it. Preparing these is studying for the exam in and of itself!

Time Yourself
I speak really quickly when I’m nervous. To avoid finishing a 30 minute presentation in 10 minutes, I run through my presentations a few times with a timer on, even timing pauses and slots for questions. These pauses allow me to catch a break as well as for my listeners to do likewise.

Ask for Specific Feedback
When I first started preparing my for my defense, my adviser told me to pretend like I’m a lawyer. Make my presentation tight, from logic to design. I suggest practicing with your lab group and peers as well as with groups that aren’t familiar with your work. I have a few friends who are used to this by now, and I’ll go to them asking for feedback on specific aspects of my talk, like grammar, the number of “um’s” or “likes” I say, or slide design. Friends outside of my field have also been helpful in asking me about the basics of my research, helping me tighten my arguments.

I try to practice in front of the same crowd twice, first for an initial run, and then in the second go. Afterwards, I have a set of questions that I like to ask:

- What stood out to you in the talk?​
- Which part of the talk was most boring?
- At which point if any did I seem the most nervous/unsure?
- Did you notice any body language—hand gestures, looking away from the audience?

My presentation is 30 minutes long, which is a little over the length of a sitcom. While I know I won’t be as funny as an episode of Fresh off the Boat, I can plan to be as engaging as possible, and the best way to do that is to ask the audience themselves for feedback!

Editing
For writing, I’ve recorded an audio version to see how the words sound off the page. I’ll stick with a sentence until they sound right for me to say out loud. For presentations, I go back and make revisions right after a rehearsal while they’re fresh on my mind.

Day Of
While I’m not there yet, I do have a day-of ritual for any exam or presentations! I eat my favorite meal, I go through my presentation no more than twice, and I wear an outfit I’ve planned a few days in advance and practiced my talk in. Most importantly, I make sure to buy a bottle of champagne to celebrate immediately after.

What tips do you have for preparing for your quals?

[Image courtesy of the author.]

Show on Jobs site: 
Disable left side advertisement?: 
Is this diversity newsletter?: 
Is this Career Advice newsletter?: 
Advice Newsletter publication dates: 
Thursday, April 11, 2019
Diversity Newsletter publication date: 
Thursday, April 11, 2019

          Chrome bloqueará las descargas inseguras      Comment   Translate Page      
El equipo de Google Chrome está trabajando en una nueva dinámica que ayudará a los usuarios a evitar las descargas peligrosas. La prioridad serán los archivos que utilizan comúnmente los hackers para instalar malwares en los equipos de los usuarios, como son los archivos comprimidos (.rar, .zip, etc), los ejectutables (.exe, .dmg), extensiones (.crx), entre otros.
          30 полезных привычек, которые прокачают все сферы жизни      Comment   Translate Page      

Предпринимательница Лиз Хьюбер (Liz Huber) составила список самых главных привычек, которые помогают ей оставаться успешной и продуктивной.

Но для начала вспомним, как заводить привычки и придерживаться их:

  • Смоделируйте свою привычку. Не ограничивайтесь намерением бегать трижды в неделю. Выберите день и время и внесите это в календарь. Потом придерживайтесь выбранного графика.
  • Создайте триггер. Например, будильник, напоминание в календаре или конкретное действие (вы садитесь в транспорт или заходите домой). Со временем мозг запомнит, что за этим следует определённая привычка.
  • Не пропускайте ни дня в течение трёх недель. За это время сформируется петля привычки. Потом действие станет автоматическим.
  • Заводите привычки по одной. Не беритесь за несколько сразу. Переходите к следующей, только когда предыдущая привычка достаточно укрепилась.

Отношения

1. Если вы с партнёром давно вместе, не забывайте раз в неделю ходить на свидания. Это возможность укрепить вашу связь и пообщаться вдали от будничных дел. Совместный вечер дома для этого не подойдёт.

2. Прежде чем вскакивать с постели сразу после будильника, потратьте несколько минут на общение с партнёром.

3. Звоните родителям раз в неделю. Если вы забываете, поставьте себе напоминание в календаре. Или совмещайте разговор с какими-то домашними делами.

4. Определитесь, сколько общения вам нужно. Если вы интроверт, скорее всего, вам достаточно раз в неделю поужинать с хорошим другом, а выходные провести с семьёй. Если экстраверт, вам захочется куда-нибудь выбраться пару раз в неделю, а в выходные собраться с компанией друзей.

5. Выделяйте один вечер в неделю или часть выходных на то, чтобы пойти куда-то с близкими. Например, съездите за город, сходите на концерт или поиграйте в спортивные игры. Это укрепляет отношения.

6. Старайтесь знакомиться с пятью новыми людьми каждую неделю. Или с десятью, или с одним. Это зависит от того, насколько вам в данный момент нужно расширить круг общения.

Душевное равновесие

7. Заведите утренний ритуал. Включите в него медитацию, чтобы успокоиться. А также положительную визуализацию, чтобы настроить себя на успех.

8. Заправляйте постель по утрам. Это даст небольшой прилив продуктивности.

9. Выделите несколько минут в день, чтобы отпустить негативные мысли, страхи и тревоги. Признайте их, решите, что можно сделать, и запланируйте эти действия. В течение дня больше не уделяйте таким мыслям времени.

10. Отключайтесь от повседневных забот на полчаса или час каждый день. Выйдите на природу, займитесь йогой, почитайте книгу или побудьте с близкими.

11. Регулярно выделяйте время на то, что подпитывает вас энергией. Например, разговор с интересным человеком, позитивный фильм, увлекательную книгу, концерт, чашку любимого чая.

12. Делайте повседневные вещи по-новому: приготовьте неизвестное блюдо, пройдите на работу другой дорогой, почистите зубы, стоя на одной ноге. Разнообразие полезно для мозга.

13. В конце недели делайте уборку. Избавьтесь от лишнего в доме, в телефоне и на компьютере. Удалите ненужные фотографии, сообщения и приложения. Порядок в окружении поможет поддерживать и порядок в мыслях.

14. Каждый вечер делайте записи. Отмечайте, за что вы благодарны. А ещё выплёскивайте все накопившиеся мысли, чтобы они не мешали заснуть.

15. Заведите вечерний ритуал, который поможет расслабиться. Например, отключите все электронные приборы, примите душ, выпейте чашку чая, сделайте записи в дневнике, почитайте. Со временем такой ритуал станет для мозга сигналом, что пора переходить ко сну.

Успех

16. Планируйте следующую неделю в воскресенье. Тогда в понедельник проще будет взяться за дела. Вы сразу будете знать, что сделать в первую очередь.

17. Выходите из зоны комфорта. Именно за её пределами и происходят удивительные вещи.

18. Делайте самое важное дело с утра. Это лучше всего помогает побороть прокрастинацию. Каким бы сложном ни было ваше дело, лучше разобраться с ним сразу, а не оттягивать неприятный момент.

19. Отведите специальное время на работу с почтой. Так вы не будете отвлекаться из-за каждого нового письма и сможете сосредоточиться на важных делах.

20. Не забывайте отдыхать. Делайте перерывы в течение дня, отключайтесь от работы в выходные, а время от времени берите отгулы. Это помогает перезарядиться и посмотреть на вещи с другой стороны.

21. Отмечайте маленькие победы. Притормозите и напомните себе, чего вы добились. Иначе вас затянет рутина, и вы просто не заметите свою победу.

22. Не накручивайте себя и не зацикливайтесь на своих мыслях. Действуйте. Лучше сделать что-то неидеально, но до конца, чем стремиться к совершенству и откладывать.

Саморазвитие

23. Слушайте подкасты, чтобы получить советы по личностному росту из первых рук. Это удобно делать по дороге на работу, во время уборки или готовки.

24. Вместо сериалов и телевизионных передач смотрите документальные фильмы, вебинары и познавательные видео. Это тоже помогает расслабиться, нужно только привыкнуть. Со временем вы начнёте предвкушать ежедневную порцию знаний.

25. Читайте. Например, перед сном. Это к тому же поможет расслабиться. А в выходные выделяйте на чтение или аудиокнигу больше времени.

26. Подведите итоги прошедшей недели. Потратьте на это несколько минут в воскресенье. Обдумайте, что прошло хорошо, с какими проблемами вы столкнулись, что исправить на следующей неделе. Это полезно и в том случае, если вы на несколько дней забросили какую-то привычку. Подумайте, почему это произошло, что нужно изменить. А на следующей неделе начинайте снова.

Здоровье

27. Спите по восемь часов в день. Или столько, сколько вам нужно, чтобы выспаться.

28. Занимайтесь спортом каждый день. Достаточно пропотеть 15 минут. Сердце вас потом за это поблагодарит.

29. Ешьте осознанно. Не отвлекайтесь на другие занятия во время еды. Не смотрите телевизор и не отвечайте на сообщения. Сосредоточьтесь на вкусе еды и наслаждайтесь каждым кусочком. Съев половину порции, остановитесь. Постарайтесь понять, осталось ли ещё чувство голода. Если нет, не доедайте.

30. Питайтесь правильно. Отдавайте предпочтение свежим продуктам, а не полуфабрикатам.


          Без онлайна и доната: EA показала сюжетный трейлер Star Wars — Jedi: Fallen Order      Comment   Translate Page      

Студия Electronic Arts на мероприятии Star Wars Celebration показала тизер игры Star Wars — Jedi: Fallen Order. Разработчики обещают, что в ней не будет микротранзакций и мультиплеера — только сюжетная кампания.

Протагониста в игре кастомизировать не дадут. Но его сыграл Камерон Монахэн, известный по роли Джокера в сериале «Готэм». Разработчики обещают, что игроки будут больше сражаться в ближнем бою.

Главного героя зовут Кэл Кестис. Он пытается выживать в имперской Галактике и скрывает ото всех свою Силу. Однако из-за несчастного случая Кэл раскрывает себя и начинает сражаться против имперских инквизиторов.

Игру разработала студия Respawn Entertainment, известная по своей серии Titanfall и королевской битве Apex Legends. Сюжет написал сценарист Крис Авеллон, который известен по первым двум классическим Fallout и New Vegas.

Jedi: Fallen Order выйдет 15 ноября на Xbox One, PlayStation 4 и ПК. Ранее на Star Wars Celebration показали трейлер девятого эпизода «Звёздных войн».


          ИГРА: Сможете ли вы написать диктант без ошибок? Проверьте!      Comment   Translate Page      

В день проведения всемирной образовательной акции «Тотальный диктант» предлагаем узнать, под силу ли вам пройти испытание на грамотность. Вам будут предложены четыре текста различной тематики на выбор, в каждом из них допущено несколько ошибок. Будьте внимательны: ваша задача — найти их все и получить честно заслуженную оценку.


          В библиотеку копирайтеру: книги, которые стоит прочитать      Comment   Translate Page      

1. «Пиши, сокращай», Максим Ильяхов и Людмила Сарычева

Как писать просто, понятно и интересно: «Пиши, сокращай», Максим Ильяхов и Людмила Сарычева

Если у вас есть время прочесть всего одну книгу, берите эту. Она научит писать доступно, ёмко и лаконично на понятных примерах. Причём эти знания пригодятся и профессиональным авторам, и тем, кто вообще хоть что-то пишет — то есть абсолютно всем.

Впрочем, если у вас хорошее журналистское образование, вы вряд ли узнаете что-то новое, просто в большинстве случаев согласно покиваете авторам. Но книгу друзьям всё равно порекомендуете.

После прочтения не спешите бездумно резать тексты, превращая их в бессвязный набор слов. Главное — и об этом говорят сами авторы, — прежде чем писать и сокращать, думайте над тем, что у вас получится.

Купить книгу

2. «Мастерство презентации», Алексей Каптерев

Как писать просто, понятно и интересно: «Мастерство презентации», Алексей Каптерев

Вообще, книга учит создавать качественные презентации. Но для пишущих людей она будет не менее полезна. Берите на вооружение то, что пригодится при общении с аудиторией с помощью букв.

Текст — это то же выступление, стенд-ап, презентация, только более ограниченное в средствах выражения. Но вам также нужно суметь структурировать свои мысли, завладеть вниманием читателя и провести его от начала до конца повествования.

Читать рецензию →

Купить книгу

3. «Автор, ножницы, бумага», Николай Кононов

Как писать просто, понятно и интересно: «Автор, ножницы, бумага», Николай Кононов

Книга состоит из 14 уроков и последовательно учит складывать слова в тексты, которые понравятся и будут понятны читателю. В ней раскрываются разные форматы: статьи, слоганы, лонгриды, очерки, мемуары. Благодаря хорошей структуре, издание раскладывает мысли по полочкам и отвечает на главные вопросы начинающего автора.

Купить книгу

4. «Как писать так, чтобы вам доверяли», Кеннет Роуман и Джоэл Рафаэльсон

«Как писать так, чтобы вам доверяли», Кеннет Роуман и Джоэл Рафаэльсон

В своей книге Кеннет Роуман и Джоэл Рафаэльсон раскрыли основные принципы успешного письма, уделили особое внимание деловой переписке и спичрайтингу, поделились опытом составления планов и отчётов, а также дали советы относительно создания эффективного резюме.

Читать рецензию →

Купить книгу

5. «Скорочтение», Питер Камп

Как писать просто, понятно и интересно: «Скорочтение», Питер Камп

Опыт любого автора не бесконечен, поэтому при поиске информации ему приходится перелопачивать множество источников. Работа пойдёт гораздо быстрее, если увеличить скорость чтения, не потеряв при этом в качестве понимания. Эти навыки и помогает освоить книга Питера Кампа.

Купить книгу

6. «Писать легко: как сочинять тексты, не дожидаясь вдохновения», Ольга Соломатина

Как писать просто, понятно и интересно: «Писать легко: как сочинять тексты, не дожидаясь вдохновения», Ольга Соломатина

Книга Ольги Соломатиной — это своеобразный учебник для журналистов и копирайтеров, а все полученные теоретические знания вы сможете закрепить с помощью практических упражнений. Прочитав книгу, вы избавитесь от страха «чистого листа», пополните свой багаж знаний практической стилистикой, узнаете много нового о журналистских жанрах.

Читать рецензию →

Купить книгу

7. «Как стать популярным автором», Екатерина Иноземцева

Как писать просто, понятно и интересно: «Как стать популярным автором», Екатерина Иноземцева

В погоне за отличными текстами, которые будут полезны читателю и понравятся редактору, надо и о себе подумать. Книга научит, как заставить публикации формировать ваш личный бренд.

Репутация хорошего автора и эксперта в своей отрасли пригодится, когда вы решите выйти на новый уровень и зарабатывать больше. Кроме того, личный бренд выводит вас в поле зрения хэдхантеров, так что работа сама будет вас находить.

Купить книгу

8. «Копирайтинг: как не съесть собаку», Дмитрий Кот

Как писать просто, понятно и интересно: «Копирайтинг: как не съесть собаку», Дмитрий Кот

Дмитрий Кот, копирайтер с образованием и подходом маркетолога, расскажет вам, как создавать простые, но при этом эффективные рекламные тексты. Несмотря на то что книга в основном для тех, кто занимается написанием продающих текстов, для себя найдут что-то полезное и те, кто просто ведёт личный блог.

Читать рецензию →

Купить книгу

9. «Как писать книги», Стивен Кинг

«Как писать книги», Стивен Кинг

Нельзя сказать, что вся книга целиком состоит из полезных советов. Здесь много лирических отступлений, читать которые, впрочем, легко и приятно — это же Стивен Кинг. Но и практических рекомендаций, которые даёт автор, достаточно, чтобы изменить свой подход к текстам.

Купить книгу

10. «Клад для копирайтера. Технология создания захватывающих текстов», Элина Слободянюк

Как писать просто, понятно и интересно: «Клад для копирайтера. Технология создания захватывающих текстов», Элина Слободянюк

В своей книге Элина Слободянюк делится приёмами создания эффективных текстов: как придумывать отличные заголовки, как и какими литературными приёмами и средствами художественной выразительности пользоваться. Кроме того, автор уделяет внимание и редактированию текстов.

Читать рецензию →

Купить книгу

11. «Язык письма», Аллан и Барбара Пиз

Как писать просто, понятно и интересно: «Язык письма», Аллан и Барбара Пиз

Авторы специализируются на психологии общения и рассказывают в книге, как сделать текст эффективным с точки зрения воздействия на читателя. Для лучшего понимания повествование снабжено примерами.

Купить книгу

12. «Гениальность на заказ», Марк Леви

Как писать просто, понятно и интересно: «Гениальность на заказ», Марк Леви

Марк Леви подскажет, как написать текст, когда он совсем не пишется, а сроки поджимают, как составить список идей для продукта, когда в голову лезут одни шаблоны и вы никак не можете придумать ничего нового. Вы узнаете много интересного о технике фрирайтинга и гораздо реже будете сталкиваться с творческим ступором.

Читать рецензию →

Купить книгу

13. «Как писать убедительно», Джеральд Графф и Кэти Биркенштайн

«Как писать убедительно», Джеральд Графф и Кэти Биркенштайн

Авторы сосредотачиваются на научных и научно-популярных трудах, но их советы будут полезны всем, кто в своих текстах использует много ссылок на исследования и обрабатывает большой массив информации. Работа больше не будет скучной, а тексты — непонятными.

Купить книгу

14. «Рисовый штурм», Майкл Микалко

Как писать просто, понятно и интересно: «Рисовый штурм», Майкл Микалко

Говорят, нет такой избитой темы, которую нельзя было бы ударить ещё раз. Эта книга поможет отточить технику боя и раз за разом находить в привычном уязвимые места, которые помогут подать информацию остро и нестандартно.

Читать рецензию →

Купить книгу

15. Лайфхакер. 55 светлых идей по улучшению себя и своей жизни

Как писать просто, понятно и интересно: «Лайфхакер. 55 светлых идей по улучшению себя и своей жизни»

Если вы зарабатываете текстами, то знаете, что у вас просто нет времени дожидаться вдохновения. Заказчик или редактор не будет ждать, когда вас посетит муза, поэтому необходимо учиться управлять своими ресурсами, прокачивать личную продуктивность и делать последний рывок, когда сил почти не осталось.

Об этом написано в сотнях книг. Авторы Лайфхакера прочитали эти книги, опробовали на себе советы и выбрали лучшие их них.

Купить книгу

Лайфхакер может получать комиссию от покупки товаров, представленных в публикации.


          Как отключить экран блокировки в Windows 10      Comment   Translate Page      

Экран блокировки появляется, когда вы включаете свой компьютер или выводите его из спящего режима. На нём отображаются дата и время, события календаря, счётчик непрочитанных сообщений и другие нужные (или не очень) данные.

И, вместо того чтобы нажать на кнопку включения и сразу приступить к работе, приходится делать лишний щелчок, чтобы экран блокировки исчез. А ещё Microsoft время от времени проводит с ним сомнительные эксперименты.

Как отключить блокировку экрана в Windows 10
reddit.com

К счастью, экран блокировки можно легко выключить. Делается это так.

Откройте редактор реестра. Для этого введите в «Пуск» команду regedit и щёлкните появившийся пункт. Или нажмите Win + R, наберите regedit и кликните OK.

Как отключить блокировку экрана в Windows 10: откройте редактор реестра, введите команду regedit и щёлкните появившийся пункт

В редакторе реестра, последовательно открывая папки, доберитесь до раздела:

HKEY_LOCAL_MACHINE \ SOFTWARE \ Policies \ Microsoft \ Windows \ Personalization

Если его у вас нет, щёлкните правой кнопкой мыши в Windows, выберите «Создать» → «Раздел» и дайте ему название Personalization.

Как отключить блокировку экрана в Windows 10: создайте раздел и назовите его Personalization

Теперь щёлкните правой кнопкой в разделе Personalization и выберите «Создать» → «Параметр DWORD (32 бита)». Назовите его NoLockScreen.

Как отключить блокировку экрана в Windows 10: создайте Параметр DWORD (32 бита) и назовите его NoLockScreen

Откройте элемент и присвойте значение «1», затем нажмите OK. Закройте реестр.

Как отключить блокировку экрана в Windows 10: откройте элемент и присвойте значение «1», затем нажмите OK

Больше раздражающий экран блокировки появляться не будет. А если захотите вернуть его, просто удалите параметр NoLockScreen из реестра.


          Игра дня: Pathway — приключенческая RPG в духе «Индианы Джонса»      Comment   Translate Page      

Инди-студия Robotality, автор научно-фантастической пошаговой RPG Halfway, представила свой новый проект — Pathway. Это стратегическая ролевая игра в атмосфере 1930-х годов, в которой нужно исследовать полную опасностей и тайн пустыню.

steampowered.com

Вам предстоит собрать команду отважных авантюристов и отправиться на поиски сокровищ и артефактов Северной Африки. Влияние нацистов стремительно распространяется по миру, и ваша цель — их опередить.

В Pathway есть пять кампаний разной сложности. События в них генерируются случайным образом, поэтому каждое прохождение уникально. В игре более 400 созданных вручную сюжетных ситуаций, в рамках которых вам необходимо будет принимать не самые простые решения.

pathway-game.com

Прохождение начинается с выбора членов команды, у каждого из которых есть свои особенности. Кто-то хорошо сражается в ближнем бою, кто-то прекрасно владеет снайперской винтовкой, а кто-то не представляет свою жизнь без ножей.

steampowered.com

Как только вы соберёте команду, вашему взору откроется карта с множеством точек, в которые можно попасть. Перемещаясь от одного места к другому, вы будете натыкаться на интересных персонажей, таинственные руины и опасных врагов. Во многих точках можно найти что-то полезное, но в некоторых вы запросто можете погибнуть.

steampowered.com

Но смерть — это ещё не конец. Персонажи сохраняют накопленный опыт, и это позволяет создать более сильную команду. Кстати, сражения проходят в пошаговом режиме, поэтому особенности разных героев, как и самого поля боя, придётся использовать максимально обдуманно.

В Pathway приятная пиксельная графика, как в старых 16-битных играх. А ещё здесь отличная музыка, которая дополняет приключенческий дух проекта.


          О чём спросить будущего работодателя      Comment   Translate Page      

По мотивам мастер-класса «Как получить работу мечты», который провела Татьяна Соя из HR-сервиса «Антирабство», мы подготовили шпаргалку. Она поможет не растеряться в финале собеседования и задавать правильные вопросы рекрутеру. Вы узнаете больше о компании и сможете понять, хотите в ней работать или нет.


          Cara Cheat Judi Poker Online Uang Asli      Comment   Translate Page      
Apa anda pernah bermain judi poker online pada pc, gadget atau media yang lainnya? Bagi yang pernah bermain judi poker online, pasti anda berpikir faktor memenangkan permainan tergantung keberuntungan, dengan begitu anda sudah melakukan kesalahan besar pada permainan. Saat ini ada banyak judi poker online menggunakan uang asli di Indonesia, semakin hari bertambah banyak judi poker online uang asli. Hal itu dijadikan keuntungan oleh hacker untuk meluncurkan cheat judi poker online uang asli untuk meretas sistem judi poker online atau membuat pemain curang pada permainan. Menggunakan cheat adalah cara singkat menang judi poker online di meja, namun anda harus hati-hati karena seiring berjalan waktu, para Hacker telah menganalisa cara mencuri chip dari akun orang lain. Namun sistem judi poker online mengikuti update dan mempunyai keamanan yang bagus. Berikut ini cara cheat judi poker online uang asli : Cara terpopular adalah install program cheat ke pc anda sendiri. Untuk cara ini, anda harus mendisable anti virus terlebih dahulu karena dianggap virus oleh sistem anti virus komputer anda. Menginstall cheat hanya tahap akhir, penggunaan cheat ini membuat musuh kehilangan koneksi di akhir permainan sebelum membuka kartu, penggunaan cheat cara ini juga menurunkan resiko akan ketahuan menggunakan cheat oleh musuh. Untuk mendapat cheat[.....]
          'Hacker', bulos: la batalla ya se juega en la trinchera digital      Comment   Translate Page      
La red ya no es solo un medio de difusión, es también un arma de desestabilización

"Hacker", bulos: la batalla ya se juega en la trinchera digital


          A quarter of phishing emails bypass Office 365 security      Comment   Translate Page      

Email phishing is one of the most often used – and most successfully used – attack vectors that lead to cybersecurity incidents and breaches. Microsoft is the most impersonated brand “Cloud based email, with all of its benefits, has ushered in a new era of phishing attacks. The nature of the cloud provides even more vectors of which hackers take advantage, and even broader access to critical data when a phishing attack is successful,” says … More

The post A quarter of phishing emails bypass Office 365 security appeared first on Help Net Security.


          Rethinking Show Notes      Comment   Translate Page      

3:18 NAB reflections
4:05 Jim's New Podcast
6:32 Show Notes
9:10 Podcast Business Journal YouTube Article
14:34 Think Like a Hacker Podcast
16:58 Podcast Rodeo Show Doozy
19:49 Samson MBA38 Boom Arm
23:16 Blue Compass Boom Arm
28:24 Grammarly Gets Aggressive
31:20 Mic Placement
37:29 Leaving Mixers On
42:44 Knox is Kooky
43:54 Self Hosting is Not a Good idea
45:52 Should I Use Anchor? Not Before Reading This
48:34 Live Video Solutions Streamyard
52:55 Using Two Blue Yeti Microphones
56:03 Apple Mail
59:42 URL Questions

Work With Me
Join the School of Podcasting or let me be your podcast mentor


          The Mathematics of (Hacking) Passwords | Math - Scientific American      Comment   Translate Page      
Photo: Jean-Paul Delahaye
Jean-Paul Delahaye, professor emeritus of computer science at the University of Lille in France and a researcher at the Center for Research in Computer Science explains, The science and art of password setting and cracking continues to evolve, as does the war between password users and abusers.

Photo: Gaetan Charbonneau Getty Images
At one time or another, we have all been frustrated by trying to set a password, only to have it rejected as too weak. We are also told to change our choices regularly. Obviously such measures add safety, but how exactly?

I will explain the mathematical rationale for some standard advice, including clarifying why six characters are not enough for a good password and why you should never use only lowercase letters. I will also explain how hackers can uncover passwords even when stolen data sets lack them.

Here is the logic behind setting hack-resistant passwords. When you are asked to create a password of a certain length and combination of elements, your choice will fit into the realm of all unique options that conform to that rule—into the “space” of possibilities. For example, if you were told to use six lowercase letters—such as, afzjxd, auntie, secret, wwwwww—the space would contain 266, or 308,915,776, possibilities. In other words, there are 26 possible choices for the first letter, 26 possible choices for the second, and so forth. These choices are independent: you do not have to use different letters, so the size of the password space is the product of the possibilities, or 26 x 26 x 26 x 26 x 26 x 26 = 266.

If you are told to select a 12-character password that can include uppercase and lowercase letters, the 10 digits and 10 symbols (say, !, @, #, $, %, ^, &, ?, / and +), you would have 72 possibilities for each of the 12 characters of the password. The size of the possibility space would then be 7212 (19,408,409,961,765,342,806,016, or close to 19 x 1021).

That is more than 62 trillion times the size of the first space. A computer running through all the possibilities for your 12-character password one by one would take 62 trillion times longer. If your computer spent a second visiting the six-character space, it would have to devote two million years to examining each of the passwords in the 12-character space. The multitude of possibilities makes it impractical for a hacker to carry out a plan of attack that might have been feasible for the six-character space...

You can check whether any of your passwords has already been hacked by using a Web tool called Pwned Passwords (https://haveibeenpwned.com/Passwords). Its database includes more than 500 million passwords obtained after various attacks.

I tried e=mc2e=mc2, which I liked and believed to be secure, and received an unsettling response: “This password has been seen 114 times before.” Additional attempts show that it is difficult to come up with easy-to-memorize passwords that the database does not know. For example, aaaaaa appeared 395,299 times; a1b2c3d4, 113,550 times; abcdcba, 378 times; abczyx, 186 times; acegi, 117 times; clinton, 18,869 times; bush, 3,291 times; obama, 2,391 times; trump, 859 times.
Read more...

Source: Scientific American

          Un hacker ha avuto accesso ad alcuni account Outlook per tre mesi      Comment   Translate Page      

Un hacker è stato in grado di avere accesso ad alcuni account Outlook.com per tre mesi, dal 1 gennaio al...
          FBI関連ウェブサイトがハッキングされ警察や連邦機関に属する数千人分の個人情報が流出      Comment   Translate Page      
#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F2019_04_14%2F315702
by quasuo海外メディアのTechCrunchが、アメリカの警察機関の一つであるFBI関連のウェブサイトがハッキングされ、ハッカーたちが連邦機関に属する数千人分の個人情報を盗み出し、インターネット上に流出させたと報じています。Hackers publish personal data on thousands of US police officers and federal agents | TechCrunchhttps://techcrunch.com/2019/04/12/police-data-hack/海外ドラマや映画などでも度々耳にする、アメリカの警察機関であるFBIは、テロ・スパイなどの国家保 全文
GIGAZINE(ギガジン) 04月13日 23時00分


          Coloring book on racism      Comment   Translate Page      

Fighting racism with the hacker spirit: a coloring book entitled "Some of my best friends are colored."

          Comment on Product Spotlight – Galvin Green WindStopper Half-Zip Jacket Review by Jack P. Whitehead Biker Jackets      Comment   Translate Page      
I am a big fan of all kinds of jacket like bomber, racer, <a href="https://www.jacketsonfashion.com/buy/biker/" rel="nofollow">Biker Jackets</a>
          Comment on Throwback Thursday – TaylorMade Burner Bubble Driver Shaft by Jeff Burris      Comment   Translate Page      
$1.18 for each at the thrift store: four ! All in the bubble shaft & copper head: 10.5° "Titanium" driver, "Titanium" 3w, "Burner" 5w, and additional "Titanium" 21° w that doesn't say 5, but has the special minimum-ground-contact sort of skinny dual "pontoons" on the foot and it says "Raylor". I am a thrift and vintage golfer learning to be less of a high capper. I am studying Ralph Maltby books on how to repair and restore laminates and persimmons. Certain woods that aren't worth making original are candidates for experimentation with drilling holes and pouring in lead weights, as I am trained in safely constructing performance sporting goods and R & D, and merge it at home with dumpster diving. I find irons fun that have a big cavity to hide augmentations inside like weights and foam. Interesting and fun. Just bought THE last set of Maltby KE4 "Forged" (a removable weight in the middle instead of toe and/or foot, with huge empty cavity behind toe and foot -- ready to experiment!)
          Comment on Ben Hogan PTx Pro Forged Irons by Trout Bum      Comment   Translate Page      
I’m liking the look of these, as a die hard old hogan fan these may be what tips the scales for me
          Julian Assange Used Computer Skills to Help Police Take down Pedophile Ring      Comment   Translate Page      
Julian Assange used his expert computer skills to help police bring down a massive pedophile ring
WikiLeaks founder Julian Assange used his expert computer skills to help Australian police take down a massive pedophile ring 20 years ago.

As a young man, Mr Assange was a budding computer hacker who eagerly worked with authorities to assist them in two child pornography cases.
Theaustralian.com.au reports: The revelations came ahead of the imminent release of an explosive insider’s account of Mr Assange and his WikiLeaks empire, which will go on sale next week, despite threats of legal action and the author demanding the book be recalled because of translation errors.
Mr Assange is described as a dictatorial lover of young women and an abuser of cats in Daniel Domscheit-Berg’s Inside WikiLeaks: My Time With Julian Assange at the World’s Most Dangerous Website.
Mr Assange last night continued his fight against extradition from Britain to Sweden on alleged sex offences. On the final day of the hearing, his barrister, Australian Geoffrey Robertson QC, attacked Swedish Prime Minister Fredrik Reinfeldt for what he claimed was a “devastatingly prejudicial attack” against his client.
“The real evil of this outburst by the Prime Minister is not that he will have an effect on these proceedings, but in a small country it has created a toxic atmosphere,” Mr Robertson said.
Mr Assange “is public enemy number one as a result of the Prime Minister’s statement”.
District judge Howard Riddle, who is hearing the extradition case alone, rejected Mr Robertson’s attempt to have the case adjourned as a result of Mr Reinfeldt’s comments.
The London hearing came as Mr Assange’s mother, Christine, last night hand-delivered a letter to Kevin Rudd’s office in Brisbane, in which she pleaded with the Foreign Minister to condemn the treatment of her son by Swedish authorities.
“As far as I am aware you have made no diplomatic protest to Sweden for their abuse of my son’s legal and human rights, nor have you protested to the US for their incitements to kidnap and murder,” Mrs Assange’s letter to Mr Rudd said.
Revealing more of Mr Assange’s past yesterday, his counsel, Grace Morgan, told the Victorian County Court that, “in 1993, when Mr Assange was in his early 20s, he provided assistance to investigators from the Victoria Police Child Exploitation Unit”.
“My client assisted in relation to two investigations,” she said. “His role was limited to providing technical advice and support, to assist in the prosecution of persons suspected of publishing and distributing child pornography on the internet. Mr Assange’s participation was concluded in the mid-90s. He is not aware of the ultimate outcomes of the operations but understands his technical expertise was of value to the investigations. Mr Assange received no personal benefit from his contribution, and was pleased to be in a position to assist.”
Mr Assange’s role in policing pedophiles emerged after County Court judge Jeanette Morrish agreed to make public nine lines previously redacted from the transcript of a 1996 sentencing hearing for Mr Assange on computer hacking charges.
The new details about Mr Assange’s past emerged as the local publisher of Mr Domscheit-Berg’s book, Scribe, said 20,000 copies of the $29.99 book were delivered to booksellers this week and it was “literally too late” to stop them going on sale.
Inside WikiLeaks was first published in the author’s native Germany last month. When extracts from the English translation were leaked yesterday, WikiLeaks threatened to sue Mr Domscheit-Berg, who was once one of Mr Assange’s closest collaborators.
WikiLeaks claims Mr Domscheit-Berg admits in the book to sabotaging the whistleblower organisation by keeping important leaks out of Mr Assange’s hands, a claim he denies.
Mr Domscheit-Berg set up the rival OpenLeaks after falling out with Mr Assange.
He threw his own spanner in the works yesterday when he claimed the English translation of his book, which was organised by US publisher Random House, contained inaccuracies.

          Hacker group posts hundreds of law officer records      Comment   Translate Page      
Authorities were investigating Saturday the online posting by a hacker group of the personal information of hundreds of federal agents and police officers apparently stolen from websites affiliated with alumni of the FBI's National Academy.
          Microsoft webmail services breached by hackers with support agent’s credentials      Comment   Translate Page      
Microsoft's web-based email services were the target of a security beach. Using a customer support agent's credentials, hackers were possibly able to access email addresses and subject lines, but fortunately not their content.
          Hackeři měli přístup k e-mailům od Microsoftu několik měsíců      Comment   Translate Page      

Microsoft

V poslední době zde máme jeden bezpečnostní problém za druhým. Ať už se jednalo o obrovský únik dat až po nechráněné informace od Facebooku. Nyní zde máme další kauzu, která je spojena s e-mailovými službami od Microsoftu. Konkrétně se problém dotýká služeb jako msn.com, hotmail.com a outlook.com. Microsoftu neunikla databáze, ale někdo měl přístup k […]

The post Hackeři měli přístup k e-mailům od Microsoftu několik měsíců appeared first on Dotekomanie.cz.


          Любаша_Бодя: ЯПОНСКИЙ хлопковый БИСКВИТ: он просто ТАЕТ во рту!      Comment   Translate Page      

Японский хлопковый бисквит – очень нежный, влажный и пористый, чем-то напоминает птичье молоко на вкус! Бисквит действительно вкусный и очень отличается от классического рецепта, в общем, сколько не приготовь – съедается до крошки. В меру сладкий десерт, ванильный и очень легкий в приготовлении. 

 

СЕКРЕТЫ ПРИГОТОВЛЕНИЯ

Главное в рецепте – это температура выпечки и особенности вашей духовки, результат напрямую зависит только от этого: бисквит от перепадов температуры может осесть или остаться сырым в процессе выпекания. 

Ставим форму на противень с теплой водой. Печем в разогретой духовке до 170°С 15 минут, затем при 120°С выпекаем еще 40 минут (не открывая дверцу!).

Готовый продукт переложить в полиэтиленовый пакет и отправить в холодильник на несколько часов. Это надо для того, чтобы он стал более влажным и плотным.

Готовый бисквит для подачи нарезают в виде небольших прямоугольников.

 

Для квадратной формы 18 x 18 x 8 см:
Масло растительное 50мл
мука 80 г
молоко 80 мл
5 яичных желтков
1 цельное яйцо
5 яичных белков
сахар 80г
соль 1/4 ч.л.



 

* * *

 

Для формы размером 22 х 13 х 7 см:

Растительное масло – 50 мл.,

мука – 110 г.,

молоко – 80 г.,

желток – 5 шт.,

яйцо – 1 шт.,

белок – 5 шт.,

соль – 1 щепотка,

лимонный сок – 0,5 ч.л.,

ванильный сахар – 1 ч.л.,

сахар – 90 г.



 

 

 

ПРИЯТНОГО  ЧАЕПИТИЯ !!!

Ваша  ЛЮБАША  БОДЯ

 


          Microsoft: Hackers compromised support agent's credentials to access customer email accounts      Comment   Translate Page      

On the heels of a trove of 773 million emails, and tens of millions of passwords, from a variety of domains getting leaked in January, Microsoft has faced another breach affecting its web-based email services. Microsoft has confirmed to TechCrunch that a certain "limited" number of peop...

(techcrunch.com)


          Comentario en ORACIÓN AL ESPÍRITU DEL DOMINIO PARA AMARRAR, AMANSAR Y DOMINAR por recover flash drive files      Comment   Translate Page      
Hi theгe! I knoᴡ thіs is kind of оff topic but I was wondering ᴡhich blog platform are yߋu using for this site? I'm getting fed up of Wordpress becаuse I'νe һad issues witһ hackers and I'm ⅼooking ɑt alternatives fߋr another platform. I wouⅼd Ьe awesome іf you couⅼd pοіnt me in the direction of a ɡood platform.
          Microsoft Issues Security Alert Over Cyber Attack: Reports      Comment   Translate Page      
Microsoft has alerted some of its web mail users of possible hacker attacks that could access their
          Family turns down millions for house next to Masters golf course      Comment   Translate Page      
Steve Politi tracked down the Thacker family of 1112 Stanley Road, a house flush in the middle of Gate 6-A and the only one that all Augusta's money can't buy.
          Commentaires sur Kit Les Diablerets par mobile phone      Comment   Translate Page      
Hi there! I know this is somewhat off topic but I was wondering which blog platform are you using for this site? I'm getting fed up of Wordpress because I've had problems with hackers and I'm looking at options for another platform. I would be fantastic if you could point me in the direction of a good platform.
          Ecuador-Gobierno Corrupto de Lenin Moreno-Represión: Dictan prisión en Ecuador a colaborador de Assange ....La Jornada      Comment   Translate Page      





Quito. Un juez de la Unidad de Flagrancias de Ecuador ha dictado orden de prisión preventiva contra el ciudadano sueco Ola Bini, investigado por su supuesta relación con el fundador de Wikileaks, Julian Assange. Bini está acusado de un delito de ataque a la integridad de sistemas informáticos.

Bini fue detenido en Ecuador poco después de que el Gobierno del país andino entregara a Assange a las autoridades británicas después de siete años encerrado en la Embajada ecuatoriana en Londres. En concreto fue arrestado en el Aeropuerto Internacional Mariscal Sucre de Quito cuando se disponía a viajar a Japón. Tras el arresto, fue interrogado y el juez ordenó inmovilizar sus cuentas bancarias.

La ministra del Interior de Ecuador, María Paula Romo, ha explicado que Bini residía desde hace cinco años en Ecuador y que tenía vínculos con Wikileaks. Además, ha señalado dos desplazamientos internacionales de Bini hacia Perú y España que coinciden con viajes del ex ministro de Exteriores Ricardo Patiño, quien otorgó el asilo a Assange.

Romo ha indicado que su último desplazamiento fue hacia Venezuela hace un mes y medio. "Si se ha cometido algún delito, que la justicia lo determine, lo examine, pero no podemos permitir que el Ecuador se convierta en un centro de piratería o espionaje", ha apuntado en declaraciones recogidas por el diario 'El Comercio'.

Según Romo, Bini y otros dos hackers rusos habrían participado en actos de desestabilización en coordinación con funcionarios del "régimen anterior".

Patiño, sin embargo, ha rechazado estas acusaciones y ha denunciado una persecución en su contra, ya que "no conoce" al sueco. Bini es un conocido programador, defensor del software libre y de la privacidad en Internet.


vía:  https://www.jornada.com.mx/ultimas/2019/04/13/juez-ecuatoriano-dicta-prision-contra-sueco-ligado-con-assange-6995.html#.XLI-qyFbVZ8.twitter
          Commentaires sur Tabouret en bois Tettonica par Janina Loeve par http://tinyurl.com/yy22oyro      Comment   Translate Page      
Hi! Do you know if they make any plugins to protect against hackers? I'm kinda paranoid about losing everything I've worked hard on. Any tips?
          Growth hacker and marketing for people      Comment   Translate Page      

Leo en Expansión – Emprendedores-empleo el artículo “‘Growth Hacking’, el futuro del marketing digital” y me encanta que le pongan nombres a los nuevos modelos profesionales del marketing digital. Un paso más allá en el diseño de estrategias de captación y fidelización de clientes, con las nuevas herramientas que nos propone la red cada día. […]

La entrada Growth hacker and marketing for people aparece primero en Consol Vancells.


          Site do Outlook.com foi hackeado! será que sua conta está no meio?      Comment   Translate Page      
Agindo conforme as diretrizes de transparência da empresa, a Microsoft informou que um ataque hacker afetou algumas contas do @outlook.com. A vulnerabilidade ficou exposta por alguns meses sem que ninguém notasse. Estimado cliente, A Microsoft está comprometida em ser transparente com seus clientes. Como parte da manutenção dessa confiança e compromisso com você, estamos informando […]
          Hackers Steal, Publish Personal Data on FBI NA Attendees      Comment   Translate Page      
The hackers then put the data up for download on their own website. The spreadsheets contained about 4,000 unique records after duplicates were removed, including member names, a mix of personal and government email addresses, job titles, phone numbers and postal addresses.
          Cosa potremo dire su Assange      Comment   Translate Page      
A un certo punto su Julian Assange è diventato impossibile dire qualsiasi cosa. È semplicemente accaduto, non è colpa di nessuno. Da un certo momento in avanti, dire qualcosa di sensato su Assange, qualcosa di non ovvio e cialtrone, di vagamente correlato ad un’idea minima di verità sulla vita e le gesta dell’hacker australiano dai […]
          Microsoft issues security alert over cyber attack: Reports      Comment   Translate Page      

San Francisco, April 14 (IANS) Microsoft has alerted some of its webmail users of possible hacker attacks that could access their email accounts illegally, media reports said.

In an email notification to some affected users on Saturday, Microsoft said it became aware of an issue involving unauthorised access to some customers' web-based email accounts by cybercriminals.

"We have identified that a Microsoft support agent's credentials were compromised, enabling individuals outside Microsoft to access information within your Microsoft email account" between Jan. 1 and March 28," Xinhua quoted Microsoft as saying in the email.

The unauthorised access could have allowed unauthorized parties to view or access information of Microsoft email user accounts, such as email address, folder names, and the subject lines of emails, it said.

However, the software giant said the content of attached documents to emails would not be read or viewed, and it did not specify how many users of its Outlook.com mail service were affected.

"Microsoft regrets any inconvenience caused by this issue," said the company, recommending that affected users reset their login passwords.

The company assured its users that it has immediately disabled the compromised credentials to prevent their use for any further unauthorised access.

Microsoft has offered contact information for its data protection officer to help possible hacking victims to better protect their email accounts.

--IANS

vin/


          Stratolaunch, the giant aircraft developed by Paul Allen, just took its first flight in California      Comment   Translate Page      

Stratolaunch flight(AP Photo/Matt Hartman)

  • The Stratolaunch, an aircraft developed to air-launch small satellites, took its first flight on Saturday.
  • Stratolaunch calls its aircraft the world's largest, and it has the world's longest wingspan, though other aircraft exceed it in length.
  • Visit BusinessInsider.com for more stories.

LOS ANGELES (AP) — A giant six-engine aircraft with the world's longest wingspan landed its first flight after some two hours in the air Saturday.

The behemoth, twin-fuselage Stratolaunch jet lifted off from Mojave Air and Space Port and climbed into the desert sky 70 miles north of Los Angeles. Founded by the late billionaire Paul G. Allen, Stratolaunch is vying to be a contender in the market for air-launching small satellites.

The aircraft is designed to carry as many as three satellite-laden rockets at a time under the center of its enormous wing, which stretches 385 feet — a longer wingspan than any other aircraft. At an altitude of 35,000 feet, the rockets would be released, ignite their engines and soar into space.

The advantages of such air-launch systems include being able to use numerous airports and avoid the limitations of fixed launch sites which can be affected by weather, air traffic and ship traffic on ocean ranges.

(AP Photo/Matt Hartman)

Allen, the cofounder of Microsoft, founded Stratolaunch Systems Corp. in 2011 after emerging in aerospace by funding the development of the experimental air-launched SpaceShipOne, which in 2004 became the first privately built manned rocket to reach space.

Steve Dykes / Getty Images

After Allen's death in October 2018, Stratolaunch dropped plans to develop its own type of rocket engine and a family of launch vehicles, focusing instead on getting the giant plane airborne and launching Northrop Grumman's proven Pegasus XL.

(AP Photo/Matt Hartman)


See the rest of the story at Business Insider

See Also:

SEE ALSO: China built the world's biggest amphibious plane, and its latest test could give Beijing an edge in the South China Sea


          Transhumanism Becoming the ‘Relentless Drumbeat’ Shaping Our Future      Comment   Translate Page      
Following recent trends in state-of-the-art developments, from cryptocurrencies and universal basic income to biohacking and the surveillance state, transhumanism has been moved into the limelight of political discourse to reshape humanity’s future. Andrew Vladimirov, Information security specialist, biohacker and one of the original members of the Transhumanist Party UK, spoke in-depth with Sputnik about the […]
          0T137 Antik jelzett Hacker szecessziós kínáló - Jelenlegi ára: 36 000 Ft      Comment   Translate Page      
Hibátlan állapotú, antik, nagyméretű, füles asztali ezüstözött osztrák szecessziós kínáló.
Fükön jelzés:
HACKERSzélesség: 16. 5 cmHosszúság: 29. 5 cmMagasság: 16 cmSúly: 0. 97 kg
Termékeim között több alpakka kínáló termék található, kérem tekintse meg őket ide kattintva! Termékeim között több Hacker termék található, kérem tekintse meg őket ide kattintva!
A termékről további nagy felbontású képek!
ÁRUIM ZÖME ANTIK ÉS RÉGI TÁRGYAKBÓL ÁLL.
SZEMÉLYES ÁTVÉTELI LEHETŐSÉG BUDAPESTEN (IX. ) ILLETVE SZEGEDEN!
 
Szállítás
Termékeinket az MPL futárszolgálattal küldjük! Terjedelmes tárgyaink szállításában külön díjazás mellett tudunk segíteni! Szállítási módok az alábbiak szerint alakulnak
 
Személyes átvétel Budapest IX.
 
 
Személyes átvétel Szeged
 
 
MPL csomag előre utalással
 
 
MPL csomag utánvét
 
 
Fizetés
A vételár és szállítási költség kiegyenlítésére az alábbi lehetőségeket biztosítjuk
 
Személyes átvételkor készpénzben
 
 
Banki átutalás
 
 
Utánvét
 
 
Paypal (MasterCard, Visa)
 
 
Szállítási, átvételi idő
A termék vásárlását követően a szállítási, kézhez vételi idő az alábbiak szerint alakul belföldön
 
Személyes átvétel
1-5 munkanap
 
 
MPL csomag előre utalással
2-3 munkanap
 
 
MPL csomag utánvét
1-3 munkanap
 
( kínálótál szecesszió szeceszió szeci szecesziós )
0T137 Antik jelzett Hacker szecessziós kínáló
Jelenlegi ára: 36 000 Ft
Az aukció vége: 2019-04-14 06:12
          How To Enable The Hidden Dark Mode In Microsoft's Chromium Edge Browser      Comment   Translate Page      
Microsoft launched beta versions of its Chromium-based Edge browser earlier this week, and it’s been a hoot to give it a try — mainly because it feels so familiar for anyone who has been a Chrome fan. That isn’t to say that Edge is simply a reskinned version of Google’s browser, however. There are plenty of tweaks, including a brand-new way to unlock the browser’s hidden “dark mode” that pairs well with your application preferences in Windows itself. More »
   
 
 

          Start Your Kid's High School Graduation Gift In Kindergarten      Comment   Translate Page      
When my son was in preschool, I saw an idea floating around my parenting circles: Choose a sentimental book and, starting in kindergarten, have his teacher write him a note on a page in the book. Do this every year through high school. On graduation day, give him the book. More »
   
 
 

          Use Five Spice Instead Of Pumpkin Spice      Comment   Translate Page      
Though pumpkin spice takes America by storm every autumn, the famous combination of cinnamon, cloves and ginger is not so much a thing in Australia. Fortunately, Australians don't have to miss out on spicy autumn treats, as any recipe that uses pumpkin spice works just as well with five spice powder. More »
   
 
 

          How To Talk To Your Kid About Being Multiracial      Comment   Translate Page      
When Sonia Smith-Kang moved to California in the 1980s, it was at “the height of The Valley Girl,” she says. All around her, she saw blue eyes and feathered blonde hair. More »
   
 
 

          How To Survive The Final Season Of Game Of Thrones If You Aren't A Fan      Comment   Translate Page      
By my calculations (that is, a quick Google search), I see that Game of Thrones Season 8 is about to premiere on Monday. It is, as basically everyone knows, mercifully in its FINAL season. More »
   
 
 

          Why Your Oldest Child Is Your Smartest Child      Comment   Translate Page      
Parents of multiple children have long admitted that as each additional child comes along, the parenting standards get lower. More »
   
 
 

          Rębacze.pl      Comment   Translate Page      
rębacze.pl to mój nowy projekt poświęcony cyberbezpieczeństwu. Jeśli tęsknisz za moim pisaniem, zapraszam właśnie tam 🙂 Zbieram tam informacje związane z bezpieczeństwem w sieci – zarówno aktualne, jak i historyczne. To ostatnie w ramach prowadzonego przeze mnie projektu mającego na celu zebranie informacji o scenie hackerskiej lat minionych. No i tradycyjnie jestem otwarty na współpracę 🙂
          TechCrunch: Hackers publican datos personales sobre miles de policías y agentes federales de EEUU      Comment   Translate Page      
Uno de los piratas informáticos dijo a TechCrunh que robaron datos de más de mil sitios de internet del gobierno
          Metoda prin care 2 români au furat 4 milioane de dolari în 10 ani      Comment   Translate Page      
Doi hackeri români au fost găsiţi vinovaţi de justiţia americană pentru fraude cu carduri bancare, furt de indentitate şi spălare de bani.
          Microsoft discloses security breach that impacted some Outlook accounts - ZDNet      Comment   Translate Page      
  1. Microsoft discloses security breach that impacted some Outlook accounts  ZDNet
  2. Microsoft reveals hackers accessed some Outlook.com accounts for months  The Verge
  3. Microsoft: Hackers compromised support agent’s credentials to access customer email accounts  TechCrunch
  4. Microsoft: Hackers breached Outlook email accounts, among others  WHIO
  5. Microsoft webmail services breached by hackers with support agent’s credentials  Digital Trends
  6. View full coverage on Google News

          Hacker-Angriff auf Microsofts Web-Mail      Comment   Translate Page      
Von Anfang Jahr bis Ende März haben Unbekannte E-Mail-Adressen, Betreffzeilen und Ordnernamen von Microsofts Web-Mail-Diensten einsehen können.
          Hacker Queen Becomes A School Prince (Myanmar Translation)      Comment   Translate Page      
DoubleCBond / 198 pages
အျပင္ပန္းမွာေတာ့သူမကအထက္တန္းေက်ာင္းသားတစ္ေယာက္ေပါ့ လက္ေတြ႔မွာေတာ့သူမက 'Z'လို႔လူသိမ်ားတဲ့Hackerတစ္ေယာက္ အင္တာနက္ေပၚကမတရားမႈေတြကိုေဖာ္ထုတ္ေပးတဲ့သူေပါ့ ေယာက်ာ္းေလးအဝတ္အစားေတြကိုဝတ္တဲ့မိန္းကေလးတစ္ေယာက္ ဂိမ္းကစားတဲ့ေနရာမွာဆရာက်လြန္းတဲ့မိန္းကေလးတစ္ေယာက...
          WikiLeaks confirms Julian Assange’s tie-wearing pet Embassy Cat is safe after fugitive’s arrest in London      Comment   Translate Page      
JULIAN Assange’s tie-wearing cat is safe following the hacker’s arrest in London this week. WikiLeaks confirmed that the pet – simply named Embassy Cat – is being looked after by Assange’s lawyers. We can confirm that Assange's cat is safe. Assange asked his lawyers to rescue him from embassy threats in mid-October. They will be […]
          Watch Dogs 2 (Xbox One) $9 at Best Buy      Comment   Translate Page      
Best Buy has Watch Dogs 2 (Xbox One) for $9 downloaded. Polygon gave it a solid 8 out of a possible 10. The follow-up to the 2014 high-tech shooter; is based in San Francisco and follows a new protagonist, an up and coming hacker named Marcus.
          Prevent Amazon From Eavesdropping On Your Alexa Conversations      Comment   Translate Page      
Fun fact: Snippets of your Alexa conversations may be heard and read by thousands of Amazon employees. According to recent reports, Amazon has an international team of employees who work to help Alexa better understand your many commands and develop new ways for the AI to interact with users. This requires them to listen to snippets of what your Echo speakers and other Alexa devices are recording. Sounds eerily familiar to us. More »
   
 
 

          4/13/2019: WEEKEND REVIEW: SO WHAT COULD A HACKER DO AT MAR-A-LAGO?      Comment   Translate Page      

Late last month, as President Donald Trump was enjoying his 25th visit to Mar-a-Lago since his inauguration, a woman was arrested by the Secret Service after bluffing her way into the reception area of the resort. At the time she was detained, she was...
          US: Hacker group posts data of hundreds of federal agents, officers      Comment   Translate Page      
none
          Growth Hacker - SmartboxTV - Santiago, Norte de Santander      Comment   Translate Page      
Una plataforma SaaS completamente automatizada para crear negocios de video para la industria OTT. Nunchee es la forma más fácil y rápida para que cualquier...
De Get on Board - Fri, 12 Apr 2019 17:25:23 GMT - Ver todos: empleos en Santiago, Norte de Santander
          電子レンジ対応の調理バッグなら煮込み料理も焼き魚も簡単! ニオイも防げて冷凍保存もできるものも      Comment   Translate Page      
電子レンジ便利調理バッグ」は、材料を入れて、電子レンジで温めれば、料理が出来上がります。フライパンを使わないので、洗い物も最小限にすることが可能。
          重い荷物が「軽く」感じる!肩に余分な負荷をかけない高効率なバックパック「STORIO」を使ってみた      Comment   Translate Page      
2016年3月16日の記事を再編集のうえ、再掲しています。どれだけ高機能のスマホやタブレットがあっても、やっぱりノートPCでキーボードを使って作業するのが一番ストレスフリーで効率的です。でも、そのノートPCを持ち運ぶバックパックがイマイチだと、結局ストレスになってしまいます。世界各国を歩き倒したバックパッカーが自身の経験をもとに作り上げたバックパック「STORIO(ストーリオ)」は、旅を知り尽くし
          過去から未来へ。終了したGoogleサービスとアプリがわかる「Killed by Google」      Comment   Translate Page      
Googleが作り、廃止していったサービス・アプリが一覧で見られるオープンソースリスト「Killed by Google」について解説します。
          【本日のセール情報】Amazonで期間限定セールが開催中! 1,000円台の撥水・耐衝撃ノートPCケースやUSB充電式エチケットカッターがお買い得に      Comment   Translate Page      
Amazon(アマゾン)では、期間限定セールが多数開催されています。執筆現在、人気の撥水・耐衝撃ノートPCケースやUSB充電式エチケットカッターが、どちらも1,000円台でお買い得なセールを開催中です。
          Review: 2017 TintoNegro Malbec Uco Valley      Comment   Translate Page      

This Argetine malbec is a real beast: Hugely meaty, with intense notes of mushroom and forest floor, any sense of fruit and spice is fully trampled by this overwhelming savoriness to the point where it’s hard to recognize any sense of varietal character in this dense monstrosity. The one saving grace is actually some black […]

The post Review: 2017 TintoNegro Malbec Uco Valley appeared first on Drinkhacker: The Insider's Guide to Good Drinking.


          Ecuador denuncia ciberataques tras el retiro del asilo a assange      Comment   Translate Page      
Ecuador denuncia ciberataques tras el retiro del asilo a Assange



Funcionarios públicos de ecuador denunciaron que sus correos fueron intervenidos y que incluso este sábado aparecía la foto de Assenger en la página web de la Maná



"Han logrado intervenir un correo institucional y una página de un municipio", señaló la ministra del Interior, María Paula Romo, en su cuenta en Twitter sin señalar posibles responsables.



Agregó que "a pesar de haber sufrido cyber ataques en los últimos días, ninguna página del gobierno central, ni de sectores claves del mundo privado, se encuentra intervenida o sacada del aire".



Este sábado, durante algunas horas, en la página web del municipio de La Maná, una localidad de la andina provincia de Cotopaxi (centro), en lugar de la información habitual había una fotografía de Assange.



A pesar de haber sufrido cyber ataques en los últimos días, ninguna página del gobierno central, ni de sectores claves del mundo privado, se encuentra intervenida o sacada del aire. Han logrado intervenir un correo institucional y una página de un municipio. pic.twitter.com/5JgXp7ANzd



— María Paula Romo (@mariapaularomo) 13 de abril de 2019

En la imagen aparecía el australiano tras ser detenido el jueves en la embajada de Ecuador en Londres, al perder el asilo diplomático que le permitió permanecer en la legación desde 2012.



Romo denunció ese mismo día que una persona próxima a Assange estaba implicada -junto con el excanciller Ricardo Patiño- en un plan de desestabilización contra el presidente Lenín Moreno.



A raíz de la denuncia, las autoridades detuvieron al sueco Ola Bini, quien tiene una orden de prisión preventiva por el presunto delito de ataque a sistemas informáticos.





La ministra también ha señalado a dos hackers rusos que viven en Ecuador y que están vinculados con "ataques sistemáticos" al gobierno ecuatoriano, sin que las autoridades hayan confirmado si son aliados de WikiLeaks.







Ver información original al respecto en Fuente:

          Offer - install trend micro best buy - USA      Comment   Translate Page      
“Best buy trend micro sign in Support consultants will lend their hand to transfer, install and update Trend Micro Spy remover Antivirus on your system. we are able to additionally repair all errors which will manifest itself whereas putting in and configuring Trend Micro Antivirus on your computer”Is Trend Micro Internet Security an antivirus?Trend Micro Internet Security (known as PC-cillin Internet Security in Australia and Virus Buster in Japan) is an antivirus and online security program developed by Trend Micro for the consumer market.Where to seek out Trend Micro Activation Code for Best buy trend micro sign in?The Trend Micro security package is simple to setup & install at www.trendmicro.com/bestbuypc. Simply find 20-character alpha-numeric code that is written on the backside of the retail card. Here may be a sample Product Key to let you understand:xxxx-xxxx-xxxx-xxxx-xxxxHow to to Download install trend micro best buyTo install trend Micro maximum security the steps are very easy. See step by step instructions below to install your trend micro which you bought from www.trendmicro.com/bestbuy.First of all open any internet browser in your computer i.e. Google Chrome, Mozilla or internet explorer.Now just type URL trendmicro.com/bestbuy in the your browser.When you will press enter after putting the www.trendmicro.com/bestbuy URL either your software will start downloading automatically or it will show you some options like save, run & cancel on the bottom right of the screen. It actually contingent on your browser settings.If it is not downloading automatically, just click on run or save on the bottom side.Seems like you program is downloaded? Then just double click on the program to install (run) it.Now it will appeal for your activation code. Follow the on screen guidelines coming from the trend micro installer file.Finally your apps is installed and ready for its scan.How to login in your existing account to download your product ?you need to visit www.trendmicro.com/bestbuy.And then use the same email address that you provided when you create you account first time.After you have successfully logged in to your account you can start the download of your product onlineFeatures of Best buy trend micro sign in antivirus support1.The best security key feature of trend micro is Virus and malware protection.2.It can block malware before it infects your computer and remove existing malware that has already infected in your system.3.Safe from malacious websites and when we search any sites basically what happened when we are going to access our mails, social networking sites and if we are going to do online shopping or going to use internet banking then our all private information like user names and password saved over the network and hackers steal all these private information.4.It is Provide a Trend micro browser extensions comes with the internet security. It will show you the red mark on the malicious websites and green mark on the safe websites.This way it will secure your browsing.
          Hackers access FBI-affiliated websites to post personal info of agents and police officers      Comment   Translate Page      
It's hard to imagine a lower form of pond scum than a hacker who would knowingly put innocent people and their families in danger.
          Julian Assange: três mentiras e uma detenção.      Comment   Translate Page      
Em artigo publicado no Blog de Montaner, Armando Añel escreve sobre a verdadeira personalidade desse hacker:


La detención del hacker australiano Julian Assange, este jueves en Londres, ha puesto a correr la maquinaria de desinformación rusa y, en general, antiamericana. A continuación tres aproximaciones a la verdadera naturaleza del personaje detenido:

ASSANGE NO ES PERIODISTA

La directora de la cadena televisiva RT y de la agencia de noticias Sputnik, ambas al servicio de la dictadura de Putin, ha calificado al fundador de WikiLeaks de “principal periodista de la época”, pero en realidad se trata de un intento de camuflar su agenda pro autoritaria y antiamericana. Ni Assange es periodista profesional ni estudió periodismo en ninguna de sus formas ni hace periodismo tampoco, más bien este hacker australiano se dedica a obtener información sensible o clasificada de las democracias occidentales para dársela a Moscú, poner en peligro el trabajo de inteligencia anticomunista o simplemente dañar la imagen de Estados Unidos y otros gobiernos de Occidente. Incluso Prensa Latina (PL), agencia al servicio del régimen castrista, ha intentado calzar las “filtraciones” de Wikileaks ofreciendo declaraciones de la cancillería rusa y atacando a los medios de prensa occidentales.

ASSANGE NO ES UN VERDADERO REFUGIADO POLÍTICO

La historia del asilo político a Assange está llena de medias verdades y mentiras flagrantes. El hacker australiano huyó de Suecia, país donde previamente se le había negado la residencia, para no tener que enfrentar la justicia en un caso aún no resuelto contra dos mujeres con las que tuvo relaciones íntimas. Ya en Inglaterra, la policía sueca solicitó la intervención de la Interpol y ésta emitió una alerta roja para su captura y extradición acusado de delitos de violación, abusos y coacción. Fue detenido por la policía de Londres tras presentarse en una comisaría y luego puesto en libertad bajo fianza. Más tarde, un juez británico autorizó la extradición de Assange a Suecia rechazando los argumentos de su defensa que afirmaban que en ese país no tendría un juicio justo debido a que “los medios y la opinión pública están en su contra”. Finalmente, en 2012, el régimen procastrista de Rafael Correa le dio asilo en la embajada ecuatoriana en Londres, desde donde el hacker continuó trabajando contra las democracias occidentales para contento de Ecuador, Rusia y, por supuesto, Cuba.

ASSANGE NO ES UN HÉROE DE LA LIBERTAD

“¿No es curioso que WikiLeaks privilegiara de tal modo revelar los documentos confidenciales de los países libres, donde existe, además de la libertad de prensa, una legalidad digna de ese nombre, en vez de hacerlo con las dictaduras y gobiernos despóticos que proliferan todavía por el mundo?”, se ha preguntado el escritor Mario Vargas Llosa. Hay que entender que la guerra mundial de la manipulación emprendida por el binomio Putin-Assange ha estado dirigida a estimular el descontento de los perdedores en las democracias desarrolladas, socavando los cimientos de dichas democracias y extendiendo un populismo liberticida que es por naturaleza ajeno a los fundamentos republicanos. Cuando traficas con información, o desinformación, proporcionada, facilitada o sugerida por servicios secretos de países enemigos de la libertad, represivos, pro rusos, etc., uno de cuyos objetivos fundamentales precisamente es desinformar, imposible que no te conviertas en una herramienta de la mentira. Cuando no en un espíritu de la mentira. No se conoce ni se conocerá jamás a un supuesto héroe de la libertad de expresión cuyos principales abastecedores y socios sean depredadores de la libertad de expresión (Correa, Putin, Castro, etc.). Nadie nunca ha visto a un pez nadando fuera del agua.

          Offer - install trend micro best buy - USA      Comment   Translate Page      
“Best buy trend micro sign in Support consultants will lend their hand to transfer, install and update Trend Micro Spy remover Antivirus on your system. we are able to additionally repair all errors which will manifest itself whereas putting in and configuring Trend Micro Antivirus on your computer”Is Trend Micro Internet Security an antivirus?Trend Micro Internet Security (known as PC-cillin Internet Security in Australia and Virus Buster in Japan) is an antivirus and online security program developed by Trend Micro for the consumer market.Where to seek out Trend Micro Activation Code for Best buy trend micro sign in?The Trend Micro security package is simple to setup & install at www.trendmicro.com/bestbuypc. Simply find 20-character alpha-numeric code that is written on the backside of the retail card. Here may be a sample Product Key to let you understand:xxxx-xxxx-xxxx-xxxx-xxxxHow to to Download install trend micro best buyTo install trend Micro maximum security the steps are very easy. See step by step instructions below to install your trend micro which you bought from www.trendmicro.com/bestbuy.First of all open any internet browser in your computer i.e. Google Chrome, Mozilla or internet explorer.Now just type URL trendmicro.com/bestbuy in the your browser.When you will press enter after putting the www.trendmicro.com/bestbuy URL either your software will start downloading automatically or it will show you some options like save, run & cancel on the bottom right of the screen. It actually contingent on your browser settings.If it is not downloading automatically, just click on run or save on the bottom side.Seems like you program is downloaded? Then just double click on the program to install (run) it.Now it will appeal for your activation code. Follow the on screen guidelines coming from the trend micro installer file.Finally your apps is installed and ready for its scan.How to login in your existing account to download your product ?you need to visit www.trendmicro.com/bestbuy.And then use the same email address that you provided when you create you account first time.After you have successfully logged in to your account you can start the download of your product onlineFeatures of Best buy trend micro sign in antivirus support1.The best security key feature of trend micro is Virus and malware protection.2.It can block malware before it infects your computer and remove existing malware that has already infected in your system.3.Safe from malacious websites and when we search any sites basically what happened when we are going to access our mails, social networking sites and if we are going to do online shopping or going to use internet banking then our all private information like user names and password saved over the network and hackers steal all these private information.4.It is Provide a Trend micro browser extensions comes with the internet security. It will show you the red mark on the malicious websites and green mark on the safe websites.This way it will secure your browsing.
          Hackers tricked a Tesla, and it’s a sign of things to come in the race to fool artificial intelligence      Comment   Translate Page      
As more of daily life moves not only online but into the orbit of intelligent machines, computer scientists and lawyers are debating a fuzzy line: when ...
          Hackers tricked a Tesla, and it’s a sign of things to come in the race to fool artificial intelligence      Comment   Translate Page      
At Harvard University, Ariel Herbert-Voss studies adversarial machine learning — where an attacker uses external signals to force an AI system into ...
          An eviction notice       Comment   Translate Page      
Long ago, Julian Assange wore out his welcome at Ecuador's London embassy. Ecuador shut off his access to the Internet after WikiLeaks published emails from the Hillary Clinton campaign that had been pilfered by Russian hackers. Embassy officials grew weary of what they called his "discourteous and aggressive behavior." They even griped that he needed to do a better job cleaning up after his cat.
          How to customize a browser to make more user-friendly      Comment   Translate Page      

Today’s browsers are coming with various features which makes ready to use after installation. However, there are many more options available to users which are available in the form of add-ons and extensions. Today I want to discuss the browser customization, a new set of features which makes your browsing more productive. When it comes...

The post How to customize a browser to make more user-friendly appeared first on Thetechhacker.


          Comment on IJC hopes to increase Lake Ontario outflows in ‘coming days’ by ترمیم مو در بیماران      Comment   Translate Page      
<strong>ترمیم مو</strong> Hey! I know this is considerably off matter but I was questioning which website system are you making use of for this site? I’m getting sick and exhausted of WordPress simply because I have experienced issues with hackers and I’m seeking at choices for…
          Comment on Cornell student found dead at Ithaca Gorge by ریزش مو در آقایان      Comment   Translate Page      
<strong>ترمیم مو</strong> Hey! I know this is considerably off topic but I was wondering which weblog platform are you making use of for this web site? I’m getting ill and fatigued of WordPress simply because I have experienced problems with hackers and I’m searching at options…
          Comment on NAGEE GREEN TRIAL: Witness says defendant had knife, screamed ‘I kill out here’ by روش ترمیم مو      Comment   Translate Page      
<strong>ترمیم مو</strong> Hey! I know this is considerably off topic but I was pondering which weblog platform are you making use of for this internet site? I’m acquiring ill and fatigued of WordPress simply because I have had issues with hackers and I’m searching at choices fo…
          The Professional IT Skills Bundle for $29      Comment   Translate Page      
Expires April 14, 2020 23:59 PST
Buy now and get 98% off

KEY FEATURES

It's no secret that IT is one of tech's most lucrative fields, but getting your foot in the door can be a challenge for newcomers. From security to networking and cloud computing, The Professional IT Skills Bundle prepares you for the top skills in demand for any IT professional in 2019. You'll have more than 100 hours of expert tutorials to get you up to speed, and you can qualify for 112 CPE / CEU credits after completing the collection.

  • Access 112 hours of expert instruction
  • Foster skills in IT networking, security & more
  • Access prep material for CompTIA's A+ & Network+ certifications
  • Dive into Office 365 & Windows 10 security training
  • Explore training for Cloud Basics, Technology & Operations certifications

PRODUCT SPECS

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • This course may qualify you for 112 CPE / CEU Credits after you submit your documentation at the end of the course or pass the exam on CyberTraining 365.

Requirements

  • Internet required

THE EXPERT

Instructor

Timber Wolfe has been a consulting cyber security engineer for the past 9 years. He has worked with many organizations in different roles. Those roles include reverse engineering, network security consulting, security assessments and network penetration testing. He had a BSCE (Bachelorette in Computer Engineering) and holds many network security certifications. He regularly teaches classes in information security including CEH, SSDLC, RE/Malware Analysis, Mobile Security and is an EC-Council certified instructor.

Bally Kehal is a technology visionary who thrives on solving complex problems. Bally has over 15 years of hands-on experience with DevOps, Cyber Security, Data Privacy & Compliance, Mobile Applications and Big Data. His career has spanned from working for big enterprise companies like Microsoft to Drugstore.com and founding his own technology startup Social27, a social learning company which has clients like Microsoft, Verisign, Dell, Amazon etc. as its customers. Bally is also a Certified Ethical Hacker (CEH), Certified Security Analyst (ECSA) from EC-Council and is an Certified EC-Council Instructor (CEI).

          4/13/2019: WORLD: We may be hacks, but we’re better than hackers      Comment   Translate Page      

It was a colleague, a good and sensible Cape Bretoner, who said of WikiLeaks founder Julian Assange, that while she found him repellent, “at the heart of this story is freedom of speech and forcing sunlight into dark places; those are things I work for...
          The Nasty List Phishing Scam is Sweeping Through Instagram      Comment   Translate Page      
A new phishing scam called the "The Nasty List" is sweeping through Instagram and is targeting victim's login credentials. If a user falls victim, the hackers will utilize their accounts to further promote the phishing scam. [...]
          "Llenó nuestra casa de heces fecales": la conducta de Julian Assange en la Embajada - LaRepublica.pe      Comment   Translate Page      
  1. "Llenó nuestra casa de heces fecales": la conducta de Julian Assange en la Embajada  LaRepublica.pe
  2. Anonymous envía contundente amenaza tras arresto de Julian Assange | VIDEO  Diario Trome
  3. Ecuador denuncia ataques informáticos tras retirar el asilo a Assange  El Comercio - Perú
  4. Hackers tras detención de Assange: "Es hora de que Anonymous actúe en consecuencia"  Diario Correo
  5. Assange: ¿Abanderado de la prensa libre o un traidor?  Diario Gestión
  6. Ver cobertura completa en Google Noticias

          Microsoft reveals hackers gained access to its web email services for three months - BetaNews      Comment   Translate Page      
  1. Microsoft reveals hackers gained access to its web email services for three months  BetaNews
  2. Microsoft discloses security breach that impacted some Outlook accounts  ZDNet
  3. Microsoft reveals hackers accessed some Outlook.com accounts for months  The Verge
  4. Microsoft: Hackers breached Outlook email accounts, among others  WPXI Pittsburgh
  5. Cybercriminals Compromised Some Outlook.com Accounts  Thurrott.com
  6. View full coverage on Google News

          Ecuador: Un suedez descris drept un apropiat al lui Assange, inculpat pentru atac informatic împotriva Ecuadorului      Comment   Translate Page      
Un suedez arestat joi şi descris de autorităţile din Ecuador drept un apropiat al lui Julian Assange, fondatorul WikiLeaks, a fost inculpat pentru atac împotriva unor sisteme informatice, a comunicat parchetul de la Quito, potrivit AFP. Suedezul Ola Bini a fost reţinut în timp ce încerca să plece în Japonia, în aceeaşi zi în care poliţia londoneză l-a arestat pe Assange, după ce Ecuadorul i-a retras acestuia azilul diplomatic. Parchetul general de la Quito a anunţat sâmbătă inculparea &#39;unui cetăţean suedez de 36 de ani pentru participare prezumtivă la delictul de atac împotriva integrităţii unor sisteme informatice&#39;. Un judecător a dispus &#39;plasarea în detenţie preventivă a acuzatului şi îngheţarea conturilor sale bancare&#39;. Ministrul de interne ecuadorian, Maria Paula Romo, a declarat joi că o persoană apropiată de Assange, căreia nu i-a dezvăluit identitatea, a fost implicată într-un plan de &#39;destabilizare&#39; a preşedintelui Lenin Moreno. Această persoană efectuase călătorii în străinătate cu fostul ministru de externe ecuadorian Ricardo Patino. Maria Paula Romo a menţionat de asemenea &#39;doi hackeri ruşi care trăiesc tot în Ecuador&#39; şi având legătură cu &#39;atacuri sistematice&#39; contra guvernului de la Quito. Autorităţile ecuadoriene nu au precizat însă dacă cei doi ruşi erau apropiaţi de WikiLeaks. Vineri, ministrul de interne l-a descris pe Ola Bini drept &#39;o persoană apropiată de WikiLeaks&#39;, care s-a deplasat în ultimii ani de cel puţin 12 ori la ambasada Ecuadorului de la Londra. Australianul Julian Assange, 47 de ani, a fost arestat joi în sediul ambasadei ecuadoriene la Londra, unde se refugiase din 2012 pentru a evita extrădarea în Suedia, unde era acuzat de viol, un dosar clasat între timp. Assange beneficia de azil diplomatic, acordat de preşedintele ecuadorian de la acea vreme, Rafael Correa (2007-2017). Succesorul acestuia, Lenin Moreno, i-a retras lui Assange azilul, dar şi cetăţenia acordată în 2017.AGERPRES/(AS - autor: Irina Cristea, editor online: Ady Ivaşcu)
          The real hacking danger: China      Comment   Translate Page      
NPR Frontline has a report on China's stealing intellectual property from the US for at least 20 years.

why? Because if the companies complained, China might not let them use their cheap labor to make profits.


Technology theft and other unfair business practices originating from China are costing the American economy more than $57 billion a year, White House officials believe, and they expect that figure to grow. Yet an investigation by NPR and FRONTLINE into why three successive administrations failed to stop cyberhacking from China found an unlikely obstacle for the government — the victims themselves.
In dozens of interviews with U.S. government and business representatives, officials involved in commerce with China said hacking and theft were an open secret for almost two decades, allowed to quietly continue because U.S. companies had too much money at stake to make waves
read the whole article.

This is indeed an open secret, and the Frontline program is supposed to be about Trumpieboy's trade war with China. Trump was in business and knows how these things work of course, but don't expect an accurate account of why he decided to fight back, because, as the saying goes: "orange man bad".

sigh. I wish Congress would recognize that there are very real problems that need bi partisan cooperation instead of constantly whining and obstructing reform to make political points.

In other news, there are hints that Trump will shut down the Federal OPM office (who allowed my files to be hacked).

The WAPO hyperventillates about it but does admit:



Today the agency is widely viewed as slow and ineffective, though, with a long-lingering backlog of background investigations and risk-averse leadership that has failed to respond to calls for faster hiring and recruiting for a changing workforce. “In order to really ramp up the mission around people, we need to have an infrastructure for people management that is really world-class,” Weichert said.
in other words, reorganize the place. Given the advances in technology for records since the office was established, one hopes it is about time the office is reorganized and made more efficient.

But of course, this is government, which takes forever to do anything and tends to be years behind the private sector. If we needed something repaired or replaced at our clinic, it took months and lots of paperwork to get it done. As for computers: we had MSDos for our medical records in 2000, for example, even though Windows 1 was released in 1985... And then we were hacked and went back to using paper records.

ah but the problem with the bureaucracy is that their priorities are more important than the priorities of actually doing what they were tasked to do.
The plan has raised suspicions from federal employees, who have watched the administration attempt to freeze their pay, weaken the power of their unions, and move to clear a faster path to discipline and firing.
Translation: Right now, it's almost impossible to fire an employee who isn't needed, and it is difficult to fire a lazy or incompetent employee.
The American Federation of Government Employees, the largest federal employee union, with 750,000 members, is calling the idea “Trump’s Dangerous Plan to Abolish OPM” and predicting a “disastrous” result if policy for federal employees moves so close to the White House.

presumably they will slow down their work and do things wrong just to "punish" Trumpieboy.

Ah, but the realization that something needs to be done is a bipartisan agreement, which the WAPO admits if you read down to near the end of the long article:

Breaking up the OPM is not a Republican idea, though. The Obama administration discussed internally whether to do it, and so did Hillary Clinton’s team in 2016, civil service experts said. And the agency drew bipartisan fury in 2015 when U.S. officials alleged Chinese hackers stole millions of personnel records by hacking through the agency’s weak security system.

why yes. And who was fired for this security breech? Anyone? Anyone? 

-----------------

update: from Lawfareblog via Belmontclub:

OPM Chief Information Officer Donna Seymour acknowledged that the information compromised in the data breach included “SF-86 data as well as clearance adjudication information.” This was a particularly dismaying disclosure ... The full breadth of the security clearance data at risk remains unclear.
For instance, U.S. officials have “neither confirmed nor denied” whether OPM’s database was linked with Scattered Castles, the intelligence community’s database of “sensitive clearance holders” ... To make matters worse, it appears that OPM maintained an unsecured and unencrypted database for the security clearances ... Along with the aforementioned databases, the OPM systems are linked electronically to other agencies and databases, and it stored much of this data alongside the security clearance files. 
and Belmnot club adds:

 This is conceivably the biggest headline that never was; quite a feat in an period whose intelligence disasters included Snowden, Wikileaks-Manning, the rollup of the CIA network in China, missing the rise of ISIS and the burning of the US diplomatic stations in Benghazi. When you combine the litany of disasters with what we now know about lobbying for foreign governments in Washington it’s probable that Collusion has been out of control for some time. It’s a design defect. DC was meant to be a national capital not the 'capital of the world' which it has now become. The federal bureaucracy, the press corps and its defensive agencies were designed for more homogenous national age. They seem unable to cope with the corrosion of the global world.


          Einige Outlook.com Konten von Hackern infiltriert      Comment   Translate Page      

Ein Hacker hatte offenbar mehrere Monate lang Zugriff auf einige Outlook.com-Konten von Nutzern, berichtet The Verge unter Berufung auf Microsoft. Die Betroffenen werden darüber informiert. Passwörter oder gar den Inhalt von E-Mails oder Anhängen konnten wohl  nicht mitgelesen werden.

(Weiterlesen)
          The feeling is everything.      Comment   Translate Page      
---------
Some of my favorite friends.
No photo description available.


          Yes, President Trump is "The Man."      Comment   Translate Page      
----------
https://www.westernjournal.com/trump-blasts-ilhan-omar-9-11-comments-will-never-forget/?utm_source=Facebook&utm_medium=PostSideSharingButtons&utm_campaign=websitesharingbuttons&fbclid=IwAR0k5EwFdSuOAZeMh1nEce005cWHdVrazg_ntZqLtZLqTbO6QEvh3dJiXAs

--------------
911 Videohttps://www.westernjournal.com/trump-blasts-ilhan-omar-9-11-comments-will-never-forget/?utm_source=Facebook&utm_medium=PostSideSharingButton
--------------
          Grâce au porno, des cybercriminels ont réussi à hacker des millions de personnes dans 20 pays différents      Comment   Translate Page      
Etude PornoUne campagne mondiale contre les programmes malveillants est actuellement entreprise par plusieurs pays. Elle vise à démanteler un réseau de cybercriminels qualifié comme l’un des plus sophistiqués, des plus sérieux et des plus organisés au monde. Les activités du cybergang auraient touché des millions d’utilisateurs résidant dans vingt pays différents. Mardi dernier, Zain Qaiser, l’un […]
          Anonymous Cyber Attacks Continue Against Ecuadorian Government Websites Over Arrest of Julian Assange      Comment   Translate Page      

Over 30 websites belonging to the Ecuadorian government are now offline — some of them defaced — in protest of the arrest of WikiLeaks founder Julian Assange. The hackers are calling their efforts #OpEcuador, and are also promoting #OpUS and #OpUK. The United States and United Kingdom have not yet been hit with any cyber […]

The post Anonymous Cyber Attacks Continue Against Ecuadorian Government Websites Over Arrest of Julian Assange appeared first on The Gateway Pundit.


          The Professional IT Skills Bundle for $29      Comment   Translate Page      
Expires April 14, 2020 23:59 PST
Buy now and get 98% off

KEY FEATURES

It's no secret that IT is one of tech's most lucrative fields, but getting your foot in the door can be a challenge for newcomers. From security to networking and cloud computing, The Professional IT Skills Bundle prepares you for the top skills in demand for any IT professional in 2019. You'll have more than 100 hours of expert tutorials to get you up to speed, and you can qualify for 112 CPE / CEU credits after completing the collection.

  • Access 112 hours of expert instruction
  • Foster skills in IT networking, security & more
  • Access prep material for CompTIA's A+ & Network+ certifications
  • Dive into Office 365 & Windows 10 security training
  • Explore training for Cloud Basics, Technology & Operations certifications

PRODUCT SPECS

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • This course may qualify you for 112 CPE / CEU Credits after you submit your documentation at the end of the course or pass the exam on CyberTraining 365.

Requirements

  • Internet required

THE EXPERT

Instructor

Timber Wolfe has been a consulting cyber security engineer for the past 9 years. He has worked with many organizations in different roles. Those roles include reverse engineering, network security consulting, security assessments and network penetration testing. He had a BSCE (Bachelorette in Computer Engineering) and holds many network security certifications. He regularly teaches classes in information security including CEH, SSDLC, RE/Malware Analysis, Mobile Security and is an EC-Council certified instructor.

Bally Kehal is a technology visionary who thrives on solving complex problems. Bally has over 15 years of hands-on experience with DevOps, Cyber Security, Data Privacy & Compliance, Mobile Applications and Big Data. His career has spanned from working for big enterprise companies like Microsoft to Drugstore.com and founding his own technology startup Social27, a social learning company which has clients like Microsoft, Verisign, Dell, Amazon etc. as its customers. Bally is also a Certified Ethical Hacker (CEH), Certified Security Analyst (ECSA) from EC-Council and is an Certified EC-Council Instructor (CEI).

          Runners, Officials Getting Ready for 123rd Boston Marathon      Comment   Translate Page      

As runners lined up to pick up their bibs for the Boston Marathon, many were thinking about the race they've prepared for so long.

"This is the Mecca of running, and this is what everybody strives for, works hard all year long to have this. It's a blessing, it's a pure blessing," said Laura Fenster of Fresno, California.

Runners and their families and friends enjoyed the nice weather on Saturday, many of them heading to the Finish Line for pictures.

"The weather is amazing. This morning it was raining, now it's the sunshine. It's great. Boston is amazing," said Thais Moura of Sao Paulo, Brazil.

Moura, who is in town from South America, said this is a dream come true.

"I have been pursuing my qualifying time, and I did that. And I'm going to be running Monday. I have goose bumps now... I have no words for that," she said.

There are many first-timers in town, including Maria Payne from San Antonio, Texas. She says she's just trying to enjoy the moment.

"Look at this city. This city is fantastic, every store... the flowers in the windows. I think Boston does this right," she said.

Ana Croger, of Brisbane, Australia, is in Boston for the first time to run the marathon.

"I've been to a Red Sox game, a city tour, I've been to the Expo, it's been crazy," Croger said.

Kathy Linenberger, of San Diego, California, is also visiting Boston for the first time to run in the marathon.

"I've been waiting many, many years to come to Boston and run the marathon," Linenberger said. "This is my first time, I'm just thrilled."

Linenberger is thrilled, and thinking about the weather.

"We were at the 5K this morning," she said. "We tested out our rain jackets. We came prepared. I have 55 layers at least, 16 ponchos, rubber gloves. We've got everything because we knew if we brought all that, it wouldn't rain."

The weather on Marathon Monday is one of the hot topics. After last year's wind-swept rain and cold temperatures, this year's race could be gloomy as well.

"I did it last year, so there's absolutely nothing nature can send us that's worse than last year," Chris Tobias, of Baltimore, Maryland, said.

Officials are also preparing for the marathon, and the possibility of bad weather.

"The uncontrollable is always out there," said Sean Quirk, head coach of the Boston Cannons. "Last year was really tough with the weather, so expecting it to be a little bit better this year hopefully."

There are some extra precautions race organizers have announced because of the potential for rough weather, including no delay this year between Waves 3 and 4. That's to lessen the amount of time Wave 4 runners have to wait in the Athlete's Village before they begin.

And along the course, there will be extra gear and facilities to help runners and volunteers who may be struggling.

But there's no talk of postponing the race.

"The marathon is run on Patriots Day, or it's not run," said Tom Grilk, CEO of the Boston Athletic Association.

There will be a massive amount of security in place, but there are no credible threats to the event.

"We know what happened before," said Boston Police Commissioner William Gross. "Let's be each other's eyes and ears. This is our city, our marathon, let's look out for each other."


          370- THE NET      Comment   Translate Page      

waiting...

This week we download the url to THE NET, the 1995 web-themed thriller starring Sandra Bullock as an 1337 hacker who uncovers a chilling cyber plot that threatens the information super-highway and loses her identity in the process. Also featuring Jeremy Northam, Dennis Miller and Ray McKinnon, the net dials-up the tension, but does it have the bandwidth not to crash with today's hardware?

Listen here and don't forget to subscribe and rate us on Apple Podcasts, Spotify or Stitcher. Also, follow us on Facebook or Twitter. And please consider supporting our Patreon campaign, or purchasing Rewatchability t-shirts at TeePublic


          朝の支度は旦那に任せる! The New Yorkerの人気漫画家が語る子育て術      Comment   Translate Page      
敏腕クリエイターやビジネスパーソンに学ぶ子育て術「HOW I PARENT」シリーズ。今回は雑誌『The New Yorker』の連載漫画家、エミリー・フレイク(Emily Flake)さんの子育て術です。キャリアと仕事を料理する方法を伺いました。
          Microsoft, hacker hanno avuto accesso per mesi ad alcuni account Outlook      Comment   Translate Page      
Outlook webmail

All'inizio di quest'anno e per alcuni mesi dei cybercriminali hanno avuto accesso ad account Outlook.com. Microsoft indaga ma non è chiaro chi c’è dietro l’attacco.

- su macitynet.it Microsoft, hacker hanno avuto accesso per mesi ad alcuni account Outlook


          Iglooghost – Clear Tamei / Steel Mogu (2019)      Comment   Translate Page      
Artist: Iglooghost Album: Clear Tamei / Steel Mogu Genre: Electronic Released: 2019 Format: MP3 / FLAC Quality: 320Kbps / Lossless Size: 82 MB / 231 MB Tracklist: 01 – Påleo Mamu 02 – New Vectors 03 – Clear Tamei 04 – Namā 05 – Shrine Hacker (feat. Babii) [Edit] 06 – First Vōids 07 – […]
          Web-Mail betroffen: Hacker erbeuten Nutzerdaten von Microsoft      Comment   Translate Page      
Angreifer konnten über einen Servicemitarbeiter von Microsoft auf Daten des Web-Mails zugreifen. Betroffene Nutzer wurden informiert.
          Growth Hacker - SmartboxTV - Santiago, Norte de Santander      Comment   Translate Page      
Una plataforma SaaS completamente automatizada para crear negocios de video para la industria OTT. Nunchee es la forma más fácil y rápida para que cualquier...
De Get on Board - Fri, 12 Apr 2019 17:25:23 GMT - Ver todos: empleos en Santiago, Norte de Santander
          Everything You Need To Remember Before Watching Game Of Thrones Season 8      Comment   Translate Page      
How exactly are Jon Snow and Dannerys related? Is 'character X' still alive? What happened to the Queen Of Thorns? This epic 16-minute video covers all of the major plot beats from the past seven seasons of Game Of Thrones. Watch it now before the premiere of season 8! More »
   
 
 

          Right wing media organizations openly propagandize on behalf of right wing politicians. What else is new?      Comment   Translate Page      
Right wing media organizations openly propagandize on behalf of right wing politicians. What else is new?

by digby



To my mind this piece from 2017 proves that Wikileaks behaved exactly like Breitbart and Fox News, advising their preferred candidate about strategy, running derogatory stories about his rival and covering for his crimes and corruption. Recall that Trump hired Steve Bannon directly from the Breitbart editor's job to formally run his campaign.

The difference, of course, is that Breitbart and Fox don't pretend to be a "radical transparency" organization devoted to exposing government power wherever they find it. They have no problem owning the fact that they are cheap, partisan whores who are working for the advancement of an authoritarian scumbag largely in order to own the libs. That's what Julian Assange did during the 2016 election. He's just less honest about it:

Just before the stroke of midnight on September 20, 2016, at the height of last year’s presidential election, the WikiLeaks Twitter account sent a private direct message to Donald Trump Jr., the Republican nominee’s oldest son and campaign surrogate. “A PAC run anti-Trump site putintrump.org is about to launch,” WikiLeaks wrote. “The PAC is a recycled pro-Iraq war PAC. We have guessed the password. It is ‘putintrump.’ See ‘About’ for who is behind it. Any comments?” (The site, which has since become a joint project with Mother Jones, was founded by Rob Glaser, a tech entrepreneur, and was funded by Progress for USA Political Action Committee.)

The next morning, about 12 hours later, Trump Jr. responded to WikiLeaks. “Off the record I don’t know who that is, but I’ll ask around,” he wrote on September 21, 2016. “Thanks.”

The messages, obtained by The Atlantic, were also turned over by Trump Jr.’s lawyers to congressional investigators. They are part of a long—and largely one-sided—correspondence between WikiLeaks and the president’s son that continued until at least July 2017. The messages show WikiLeaks, a radical transparency organization that the American intelligence community believes was chosen by the Russian government to disseminate the information it had hacked, actively soliciting Trump Jr.’s cooperation. WikiLeaks made a series of increasingly bold requests, including asking for Trump’s tax returns, urging the Trump campaign on Election Day to reject the results of the election as rigged, and requesting that the president-elect tell Australia to appoint Julian Assange ambassador to the United States.
[...]
Though Trump Jr. mostly ignored the frequent messages from WikiLeaks, he at times appears to have acted on its requests. When WikiLeaks first reached out to Trump Jr. about putintrump.org, for instance, Trump Jr. followed up on his promise to “ask around.” According to a source familiar with the congressional investigations into Russian interference with the 2016 campaign, who requested anonymity because the investigation is ongoing, on the same day that Trump Jr. received the first message from WikiLeaks, he emailed other senior officials with the Trump campaign, including Steve Bannon, Kellyanne Conway, Brad Parscale, and Trump son-in-law Jared Kushner, telling them WikiLeaks had made contact. Kushner then forwarded the email to campaign communications staffer Hope Hicks. At no point during the 10-month correspondence does Trump Jr. rebuff WikiLeaks, which had published stolen documents and was already observed to be releasing information that benefited Russian interests.

WikiLeaks played a pivotal role in the presidential campaign. In July 2016, on the first day of the Democratic National Convention, WikiLeaks released emails stolen from the Democratic National Committee's servers that spring. The emails showed DNC officials denigrating Bernie Sanders, renewing tensions on the eve of Clinton’s acceptance of the nomination. On October 7, less than an hour after the Washington Post released the Access Hollywood tape, in which Trump bragged about sexually assaulting women, Wikileaks released emails that hackers had pilfered from the personal email account of Clinton’s campaign manager John Podesta.

On October 3, 2016, WikiLeaks wrote again. “Hiya, it’d be great if you guys could comment on/push this story,” WikiLeaks suggested, attaching a quote from then-Democratic nominee Hillary Clinton about wanting to “just drone” WikiLeaks founder, Julian Assange.

“Already did that earlier today,” Trump Jr. responded an hour-and-a-half later. “It’s amazing what she can get away with.”

Two minutes later, Trump Jr. wrote again, asking, “What’s behind this Wednesday leak I keep reading about?” The day before, Roger Stone, an informal advisor to Donald Trump, had tweeted, “Wednesday@HillaryClinton is done. #WikiLeaks.”

WikiLeaks didn’t respond to that message, but on October 12, 2016, the account again messaged Trump Jr. “Hey Donald, great to see you and your dad talking about our publications,” WikiLeaks wrote. (At a rally on October 10, Donald Trump had proclaimed, “I love WikiLeaks!”)

“Strongly suggest your dad tweets this link if he mentions us,” WikiLeaks went on, pointing Trump Jr. to the link wlsearch.tk, which it said would help Trump’s followers dig through the trove of stolen documents and find stories. “There’s many great stories the press are missing and we’re sure some of your follows [sic] will find it,” WikiLeaks went on. “Btw we just released Podesta Emails Part 4.”

Trump Jr. did not respond to this message. But just 15 minutes after it was sent, as The Wall Street Journal’s Byron Tau pointed out, Donald Trump himself tweeted, “Very little pick-up by the dishonest media of incredible information provided by WikiLeaks. So dishonest! Rigged system!”

Two days later, on October 14, 2016, Trump Jr. tweeted out the link WikiLeaks had provided him. “For those who have the time to read about all the corruption and hypocrisy all the @wikileaks emails are right here: http://wlsearch.tk/,” he wrote.

After this point, Trump Jr. ceased to respond to WikiLeaks’s direct messages, but WikiLeaks escalated its requests.

“Hey Don. We have an unusual idea,” WikiLeaks wrote on October 21, 2016. “Leak us one or more of your father’s tax returns.” WikiLeaks then laid out three reasons why this would benefit both the Trumps and WikiLeaks. One, The New York Times had already published a fragment of Trump’s tax returns on October 1; two, the rest could come out any time “through the most biased source (e.g. NYT/MSNBC).”

It is the third reason, though, WikiLeaks wrote, that “is the real kicker.” “If we publish them it will dramatically improve the perception of our impartiality,” WikiLeaks explained. “That means that the vast amount of stuff that we are publishing on Clinton will have much higher impact, because it won’t be perceived as coming from a ‘pro-Trump’ ‘pro-Russia’ source.” It then provided an email address and link where the Trump campaign could send the tax returns, and adds, “The same for any other negative stuff (documents, recordings) that you think has a decent chance of coming out. Let us put it out.”

Trump Jr. did not respond to this message.

WikiLeaks didn’t write again until Election Day, November 8, 2016. “Hi Don if your father ‘loses’ we think it is much more interesting if he DOES NOT conceed [sic] and spends time CHALLENGING the media and other types of rigging that occurred—as he has implied that he might do,” WikiLeaks wrote at 6:35pm, when the idea that Clinton would win was still the prevailing conventional wisdom. (As late as 7:00pm that night, FiveThirtyEight, a trusted prognosticator of the election, gave Clinton a 71 percent chance of winning the presidency.) WikiLeaks insisted that contesting the election results would be good for Trump’s rumored plans to start a media network should he lose the presidency. “The discussion can be transformative as it exposes media corruption, primary corruption, PAC corruption, etc.,” WikiLeaks wrote.

Shortly after midnight that day, when it was clear that Trump had beaten all expectations and won the presidency, WikiLeaks sent him a simple message: “Wow.”

Trump Jr. did not respond to these messages either, but WikiLeaks was undeterred. “Hi Don. Hope you’re doing well!” WikiLeaks wrote on December 16 to Trump Jr., who was by then the son of the president-elect. “In relation to Mr. Assange: Obama/Clinton placed pressure on Sweden, UK and Australia (his home country) to illicitly go after Mr. Assange. It would be real easy and helpful for your dad to suggest that Australia appoint Assange ambassador to [Washington,] DC.”

WikiLeaks even imagined how Trump might put it: “‘That’s a real smart tough guy and the most famous australian [sic] you have!’ or something similar,” WikiLeaks wrote. “They won’t do it but it will send the right signals to Australia, UK + Sweden to start following the law and stop bending it to ingratiate themselves with the Clintons.” (On December 7, Assange, proclaiming his innocence, had released his testimony in front of London investigators looking into accusations that he had committed alleged sexual assault.)

In the winter and spring, WikiLeaks went largely silent, only occasionally sending Trump Jr. links. But on July 11, 2017, three days after The New York Times broke the story about Trump Jr.’s June 2016 meeting with Natalia Veselnitskaya, a Russian lawyer with connections to Russia’s powerful prosecutor general, WikiLeaks got in touch again.

“Hi Don. Sorry to hear about your problems,” WikiLeaks wrote. “We have an idea that may help a little. We are VERY interested in confidentially obtaining and publishing a copy of the email(s) cited in the New York Times today,” citing a reference in the paper to emails Trump Jr had exchanged with Rob Goldstone, a publicist who had helped set up the meeting. “We think this is strongly in your interest,” WikiLeaks went on. It then reprised many of the same arguments it made in trying to convince Trump Jr. to turn over his father’s tax returns, including the argument that Trump’s enemies in the press were using the emails to spin an unfavorable narrative of the meeting. “Us publishing not only deprives them of this ability but is beautifully confounding.”

The message was sent at 9:29 am on July 11. Trump Jr. did not respond, but just hours later, he posted the emails himself, on his own Twitter feed.

Some time after 2011 or so, Wikileaks morphed into plain old partisan yellow journalism worthy of no more respect as a journalistic organization than Newsmax or Glenn Beck's The Blaze. It's protected under the First Amendment but you can't blame liberals for being reluctant to energetically take up the cause after what he did. The ACLU will do it, no doubt, as will other defenders of free speech. But you can bet the right wingers like Trump and Hannity will run as fast as they can now that Assange is in custody and can no longer help them out.No one should ever expect the right wing to defend free speech unless it directly benefits them.

This is a good rundown of the civil liberties and press freedom concerns about the Assange charges. Even miscreant yellow journalists have a right to publish and protect their sources.




.
          GNU Hackers Meeting: Malfunction in ghm-planning (at) gnu.org      Comment   Translate Page      

Due to a problem in the alias configuration, mails sent to ghm-planning before Sun Apr 14 8:00 CEST have been silently dropped.

If you sent a registration email and/or a talk proposal for the GHM 2019, please resend it.

Sorry for the inconvenience!


          Hacker Group Posts Hundreds Of Law Officer Records      Comment   Translate Page      
Hacker Group Posts Hundreds Of Law Officer Records

Authorities were investigating Saturday the online posting by a hacker group of the personal information of hundreds of federal agents and police officers apparently stolen from websites affiliated with alumni of the FBI’s National Academy.

Read more on Yeshiva World News


          Ústavní soud rozhodl ve prospěch Nikulina      Comment   Translate Page      
Prezident Zeman byl tehdy opět terčem útoků, když žádal tehdejšího ministra spravedlnosti Roberta Pelikána - o vydání ruského hackera, Jevgenije Nikulina, do Ruska.
          4/14/2019: THE HEALTH HACKER: How to save your sleep      Comment   Translate Page      

HOW have you been sleeping this week? Finding yourself fading a little earlier in the evening? Waking up while it’s still dark outside? Walking around tired and cranky all day? It sounds like you’ve been sapped by daylight savings. It might sound like...
          4/14/2019: THE HEALTH HACKER: FISHING      Comment   Translate Page      

THE northern end of Pearl Beach is producing tailor, salmon and trevally, early mornings, if using pilchards. Fishing the run-out tide with soft plastics has been the tricking Narara Creek’s resident bream. Good numbers of bream are being snared...
          4/14/2019: THE HEALTH HACKER: fast FIVE      Comment   Translate Page      
1 Say goodnight to blue light. Artificial light has the biggest single impact on the quality of your sleep. It tells your body it’s time to get up. So ban the phone from the bedroom. 2 Take a bath. Your temperature varies according to your circadian...
          4/14/2019: THE HEALTH HACKER: Ask Adam …      Comment   Translate Page      
Q What are your thoughts on the idea of a nightcap? Is it true a drink before bed helps you sleep? A Alcohol is the ultimate double-edged sword when it comes to sleep quality. While it’s true alcohol can help you fall asleep faster, it is also...
          Kelompok Hacker Rilis Rekam Jejak Ratusan Petugas Hukum      Comment   Translate Page      
Sebuah kelompok peretas telah memposting secara online informasi pribadi ratusan agen federal dan petugas kepolisian yang tampaknya dicuri dari situs web yang berafiliasi dengan alumni Akademi Nasiona
          Microsoft: Here's Your Outlook And It May Have Been Hacked      Comment   Translate Page      
Microsoft: Here's Your Outlook And It May Have Been Hacked As if Microsoft’s Skype security exploit back in February wasn’t alarming enough, users of the company’s Outlook.com, MSN.com and Hotmail.com webmail services may have something to worry about now as well. Microsoft has confirmed to a number of sources, and according to users on reddit with specific documentation, that hackers compromised
          4/13/2019: WORLD: We may be hacks, but we’re better than hackers      Comment   Translate Page      

It was a colleague, a good and sensible Cape Bretoner, who said of WikiLeaks founder Julian Assange, that while she found him repellent, “at the heart of this story is freedom of speech and forcing sunlight into dark places; those are things I work for...
          4/14/2019: TIMES NATION: Hackers can get to your MRI and CT scans      Comment   Translate Page      

Patients’ CT and MRI scan results can be easily changed by hackers, thereby deceiving radiologists and Artificial Intelligence (AI) algorithms that diagnose malignant tumours, Israeli researchers have warned. The researchers from the BenGurion...
          William Makepeace Thackeray: Nemes Barry Lyndon úr emlékiratai (*89) - Jelenlegi ára: 500 Ft      Comment   Translate Page      
William Makepeace Thackeray: Nemes Barry Lyndon úr emlékiratai
A megrendelt könyv(ek) személyesen átvehetők Budapesten lévő átvételi pontunkon minden hétköznap 10 és 18 óra, szombaton 10 és 14 óra között. A személyes átvételi lehetőségről részletesen az Ismerj+ alatt olvashat.  Kiszállítás esetén a Magyar Posta mindenkori díjszabása az irányadó, több könyv rendelése esetén egyszeri postázási díjat számolunk, 6000 forintot meghaladó rendelés esetén a kiszállítás díjtalan.
A vásárlás menete részletesen >>"
William Makepeace Thackeray: Nemes Barry Lyndon úr emlékiratai (*89)
Jelenlegi ára: 500 Ft
Az aukció vége: 2019-04-14 15:25
          Comment on Microsoft reveals hackers gained access to its web email services for three months by async2013      Comment   Translate Page      
Abysmal security. (C) microsoft 1985-2019
          Comment on Microsoft reveals hackers gained access to its web email services for three months by Slavic      Comment   Translate Page      
Apparently my account wasn't affected because I haven't received such email. But it may be only a matter of time. A bad situation, even if the mail messages weren't accessed by hackers, a compromised account could be used for restoration of another account (it can be easily identified by the header), so the user can now receive a fake recovery request. Anyway, I don't use Outlook mail for serious purposes and use only local Windows login.
          Comment on Microsoft reveals hackers gained access to its web email services for three months by Adrian S      Comment   Translate Page      
3 months? wow, so much for their security.
          U.S. agents’ data leaked by hackers       Comment   Translate Page      
Authorities were investigating Saturday the online posting by a hacker group of the personal information of hundreds of federal agents and police officers apparently stolen from websites affiliated with alumni of the FBI’s National Academy.
          Microsoft reveals that hackers could have accessed certain Outlook email accounts      Comment   Translate Page      
Microsoft is recommending that affected Outlook users change their passwords as a safety protocol.
          Equador denuncia ataques cibernéticos após prisão de Assange      Comment   Translate Page      

O governo do Equador suspendeu nesta quinta-feira o asilo e a cidadania do ativista e fundador do WikiLeaks. Assange foi preso na embaixada do Equador em Londres, onde morava desde 2012. O Equador, que retirou o asilo ao fundador do WikiLeaks, Julian Assange, denunciou neste sábado (13) ter sofrido ataques cibernéticos, sem que estes tenham afetado portais do governo central. "Eles conseguiram intervir em um e-mail institucional e em uma página de um município", afirmou a ministra do Interior, Maria Paula Romo, em sua conta no Twitter, sem indicar possíveis autores. Ela acrescentou que "apesar de ter sofrido ataques cibernéticos nos últimos dias, nenhuma página do governo central, ou setores-chave do mundo privado, foi interceptada ou removida do ar". Entenda como e por que Julian Assange, fundador do WikiLeaks, foi preso na embaixada do Equador Neste sábado, por algumas horas, no site do município de La Maná, uma cidade na província andina de Cotopaxi (centro), em vez da informação habitual, havia uma fotografia de Assange. Na imagem aparecia o australiano depois de ter sido preso na quinta-feira na Embaixada do Equador em Londres. Romo denunciou que uma pessoa próxima a Assange estaria envolvida em um plano para desestabilizar o presidente Lenin Moreno. Após a denúncia, as autoridades prenderam o sueco Ola Bini, que tem um mandado de prisão preventiva pelo suposto delito de ataque contra sistemas de informática. Foto divulgada pela procuradoria mostra objetos encontrados na casa do sueco Procuradoria do Equador via AP A ministra também apontou dois hackers russos que vivem no Equador ligados a "ataques sistemáticos" ao governo equatoriano, sem que as autoridades confirmassem se são aliados do WikiLeaks. Resumo: Julian Assange foi preso nesta quinta (11) na embaixada do Equador em Londres, onde estava desde 2012. Ele tentava evitar sua extradição para a Suécia, onde respondia por uma denúncia de assédio, que já foi arquivada. Ele também responde um processo sobre divulgação de documentos sigilosos americanos. O governo equatoriano suspendeu nesta quinta-feira seu asilo e sua cidadania. Governo americano emitiu um pedido de extradição para Assange. Juiz do Equador ordenou a prisão de cidadão sueco próximo a Assange neste sábado. Equador denunciou ataques cibernéticos após prisão de Assange. Entenda o que levou Julian Assange a ser preso em Londres Juiz equatoriano ordena prisão preventiva de sueco próximo a Assange Entenda como e por que Julian Assange, fundador do WikiLeaks, foi preso na embaixada do Equador Julian Assange, fundador do WikiLeaks, é preso na embaixada do Equador em Londres Presidente do Equador diz que Assange violou termos de asilo Julian Assange foi espionado dentro da embaixada equatoriana em Londres, diz WikiLeaks ONU pede garantias de que Julian Assange enfrente processo justo Herói para uns, criminoso para outros, Assange teve destino selado pela troca de governo no Equador EUA acusam Assange de conspirar com militar para invadir computadores
           Lỗi bảo mật trong giao thức WPA3 giúp hacker lấy mật khẩu Wi-Fi       Comment   Translate Page      
Các nhà nghiên cứu vừa tiết lộ một số lỗ hổng nghiêm trọng trong giao thức bảo mật không dây có thể cho phép kẻ tấn công lấy được mật khẩu của mạng Wi-Fi.
          Group Hacks FBI Websites, Posts Personal Info on Agents      Comment   Translate Page      

A hacker group uploaded the personal information of thousands of federal agents and law enforcement officials onto the web after hacking into “FBI-affiliated websites” and websites connected to at least one company, TechCrunch reports. The hackers reportedly breached three FBI National Academy Association websites using “public exploits,” downloaded the contents, and uploaded them on their own website. […]

The post Group Hacks FBI Websites, Posts Personal Info on Agents appeared first on USAHM Conspiracy News.


          Comment on Market Live: Sensex Gains over 150 Points After Hitting 37K by microsoft excel tutorial      Comment   Translate Page      
Good day! Do you know if they make any plugins to protect against hackers? I'm kinda paranoid about losing everything I've worked hard on. Any recommendations?
          There's a better way to cover your webcam (and 3-packs start at $26)      Comment   Translate Page      

There's a better way to cover your webcam (and 3-packs start at $26)The jury is still out on whether Mark Zuckerberg will make good on his promise of elevating his commitment to protecting Facebook users' privacy, but we're fairly certain that the tech mogul knows a thing or two about safeguarding his own privacy.A couple of years ago, the wealthiest millennial in the world inadvertently let slip that he performs a DIY trick to prevent hackers from spying on his computer: He covers his webcam and microphone with tape.Thanks to Zuck, what was once something that was practiced only by conspiracy theorists has been adopted by millions of people, including former FBI Director James Comey and the Pope. Even Edward Snowden, the infamous NSA whistleblower who is knowledgeable about surveillance, strongly suggests that you do the same. Read more...More about Cybersecurity, Mashable Shopping, Shopping Stackcommerce, Webcam Safety, and Webcam Covers



          How to earn Cyber Security Degree online?      Comment   Translate Page      

Cyber security, otherwise called PC security or data innovation security, is a field that covers the devices and frameworks used to screen, moderate, and forestalls online threats. Cyber security experts utilize imaginative innovation to battle hackers, cyber terrorists, network outages, and other specialized issues that could trade off system security. Because of our developing dependence…

The post How to earn Cyber Security Degree online? appeared first on Tech of Thrones.


          Anonymous amenaza: “¡Liberen a Julian Assange o lo pagarán!”      Comment   Translate Page      
“Liberen a Julian Assange o lo pagarán”. Así de claro y directo ha sido el mensaje que el grupo de ‘hackers’ Anonymous ha decidido enviar a Reino Unido, Estados Unidos y “todos los que participaron en la captura del fundador de WikiLeaks”. El...
          約束だよ。荷物のチェックイン時間は事前確認しとこ!      Comment   Translate Page      
荷物のチェックイン時間があることを知っていますか? Webチェックインをしていても、預け荷物がある場合は、余裕を持って空港に行ったほうが良さそうです。
          Hackers Accessed Some Microsoft Outlook Accounts from Early This Year      Comment   Translate Page      

Microsoft Outlook is now the latest tech product that hackers have had access to from as early as this year, according to the Redmond based tech giant. Microsoft recently discovered that hackers had compromised their email service support agent credentials. According to Microsoft, the hackers could have accessed users’ account email addresses, folder names, and […]

Read On Web → Hackers Accessed Some Microsoft Outlook Accounts from Early This Year


          കോൺഗ്രസ്, എൻ.സി.പി. സ്ഥാനാർഥികൾക്ക് പ്രചാരണത്തിന് ഇപ്പോള്‍ രാജ് താക്കറെയെ മതി       Comment   Translate Page      
മുംബൈ:മഹാരാഷ്ട്രയിൽ കോൺഗ്രസ്, എൻ.സി.പി. സ്ഥാനാർഥികൾക്ക് പ്രചാരണത്തിന് വേണ്ടത് സ്വന്തം നേതാക്കളെയല്ല, മഹാരാഷ്ട്രാ നവനിർമാൺ സേന(എം.എൻ.എസ്.) നേതാവ് രാജ് താക്കറെയെയാണ്. സ്വന്തം മണ്ഡലത്തിൽ രാജ് താക്കറെ പ്രസംഗിക്കണമെന്നാണ് അവരുടെ പ്രധാന ആവശ്യം. അതോടെ രാജിന് തിരക്കേറുകയും ചെയ്തു. എം.എൻ.എസ്. ഇത്തവണ ലോക്സഭയിലേക്ക് ഒരു സ്ഥാനാർഥിയെയും നിർത്തിയില്ല. എന്നിട്ടും പ്രചാരണരംഗത്ത് സജീവമാണ് രാജ് താക്കറെ. ലോക്സഭയിലേക്ക് മത്സരിക്കുന്നില്ലെന്നും വോട്ടുകൾ കോൺഗ്രസ്-എൻ.സി.പി. സ്ഥാനാർഥികൾക്ക് ചെയ്യണമെന്നും അദ്ദേഹം നേരത്തേതന്നെ അണികളോട് നിർദേശിച്ചിരുന്നു. നാസിക്(സമീർ ഭുജ്ബൽ), ബാരാമതി(സുപ്രിയ സുലേ), സത്താറ(ഉദയൻരാജെ ഭോസ്ലെ), മാവൽ(പാർഥ് പവാർ), മുംബൈ ഈസ്റ്റ്(സഞ്ജയ് ദീന പാട്ടീൽ) എന്നീ അഞ്ച് മണ്ഡലങ്ങളിൽ എൻ.സി.പി. സ്ഥാനാർഥികൾക്കുവേണ്ടി രംഗത്തിറങ്ങാമെന്ന് രാജ് താക്കറെ സമ്മതിച്ചിട്ടുണ്ട്. സോളാപുർ(സുശീൽകുമാർ ഷിന്ദേ), നാന്ദഡ്(അശോക് ചവാൻ), മുംബൈ നോർത്ത് സെൻട്രൽ(പ്രിയാദത്ത്), മുംബൈ നോർത്ത്(ഊർമിള മതോണ്ട്കർ) എന്നീ നാല് കോൺഗ്രസ് മണ്ഡലങ്ങളിലും അദ്ദേഹം പ്രചാരണം നടത്തും. നാന്ദഡിൽ പ്രചാരണത്തിന് അദ്ദേഹം കഴിഞ്ഞദിവസം തുടക്കംകുറിച്ചു. കോൺഗ്രസ് സംസ്ഥാനാധ്യക്ഷൻ അശോക് ചവാൻ മത്സരിക്കുന്ന മണ്ഡലമാണിത്. രാജിനെ സഖ്യത്തിലെടുക്കണമെന്ന് എൻ.സി.പി. നേതാക്കൾ വാദിച്ചപ്പോൾ അത് ഒരിക്കലും നടക്കില്ലെന്ന് തീർത്തുപറഞ്ഞ നേതാവാണ് അശോക് ചവാൻ. എങ്കിലും രാജ് ഇവിടെയെത്തി. അശോക് ചവാന് വോട്ടുചെയ്യണമെന്ന് അദ്ദേഹം ഒരിക്കലും പറഞ്ഞില്ല. എന്നാൽ, നരേന്ദ്രമോദിയെയും ശിവസേനയെയും രൂക്ഷമായി വിമർശിച്ചതിലൂടെ വോട്ടുചെയ്യേണ്ടതാർക്കെന്ന വ്യക്തമായ സൂചന റാലിക്കെത്തിയവർക്ക് നൽകി. കോൺഗ്രസ്, എൻ.സി.പി. സഖ്യത്തിലില്ലാത്തതിനാൽ രാജ് താക്കറെ അവരുടെ റാലിയിൽ പങ്കെടുക്കുന്നില്ല. ആ പാർട്ടിയുടെ നേതാക്കളുമായി വേദി പങ്കിടുന്നുമില്ല. സ്വന്തം റാലികളാണ് അദ്ദേഹം നടത്തുന്നത്. രാജിന്റെ തകർപ്പൻ പ്രസംഗം കേൾക്കാൻ ആയിരക്കണക്കിന് ആളുകൾ കൂടുന്നുമുണ്ട്. ജനങ്ങളെ ഇളക്കിമറിക്കുന്ന വാക്ചാതുരി ഏപ്രിൽ ഏഴിന് മഹാരാഷ്ട്രയുടെ പുതുവർഷമായ ഗുഡി പഡ്വ ദിനത്തിലാണ് രാജ് താക്കറെ നരേന്ദ്രമോദിക്കും അമിത് ഷായ്ക്കുമെതിരേയുള്ള തന്റെ ആക്രമണത്തിന് ദാദറിലെ ശിവാജിപാർക്കിൽ തുടക്കംകുറിച്ചത്. മോദിയെ ശക്തമായി ആക്രമിക്കാൻ കഴിയുമെന്നത് മാത്രമല്ല രാജിനെ താരപ്രചാരകനാക്കുന്നത്. ജനങ്ങളെ ആകർഷിക്കാനും അവരെ ഇളക്കിമറിക്കാനുമുള്ള ബാൽ താക്കറെയുടെ കഴിവ് കിട്ടിയിരിക്കുന്നത് മകൻ ഉദ്ദവിനേക്കാൾ മരുമകൻ രാജിനാണ് എന്നാണ് പൊതുവിലയിരുത്തൽ. അദ്ദേഹത്തിന്റെ വാക്കുകൾ ബി.ജെ.പി.-ശിവസേന കൂട്ടുകെട്ടിനെ പ്രതിരോധത്തിലാക്കുമെന്ന് കോൺഗ്രസ്, എൻ.സി.പി. നേതാക്കൾക്കറിയാം. 2009-ൽ നടന്ന തിരഞ്ഞെടുപ്പിൽ ഒറ്റയ്ക്ക് മത്സരിച്ച എം.എൻ.എസിന് 13 പേരെ നിയമസഭയിൽ എത്തിക്കാൻ കഴിഞ്ഞിരുന്നു. അന്ന് എം.എൻ.എസ്. മത്സരിച്ചത് കോൺഗ്രസ്-എൻ.സി.പി. സഖ്യത്തിന് ഗുണമായി. ശിവസേന വോട്ടുകളാണ് പാർട്ടി ഭിന്നിപ്പിച്ചത്. എന്നാൽ, 2014-ൽ നടന്ന തിരഞ്ഞെടുപ്പിൽ ഒരാളെ മാത്രമാണ് പാർട്ടിക്ക് വിജയിപ്പിക്കാൻ കഴിഞ്ഞത്. അയാളാകട്ടെ പിന്നീട് ശിവസേനയിലേക്ക് കൂറുമാറി. ഇപ്പോൾ കോൺഗ്രസ് സഖ്യത്തിലില്ലെങ്കിലും അടുത്ത ഒക്ടോബറിൽ നടക്കുന്ന നിയമസഭാ തിരഞ്ഞെടുപ്പിൽ ആ സഖ്യവുമായി സഹകരിച്ച് കുറച്ച് എം.എൻ.എസ്. സ്ഥാനാർഥികളെ വിജയിപ്പിക്കുക എന്ന രഹസ്യധാരണ രാജ് താക്കറെ ഉണ്ടാക്കിയിട്ടുണ്ടെന്നാണ് സൂചന. Content Highlights:Raj Thackeray-maharashtra election campaign

          (USA-WA-Kettle Falls) Mower Operator UNION REFERRED Local 77 w/DL      Comment   Translate Page      
**This is a union referred position. If you are interested in applying for this position, you must first report to the union hall at the following address. The union will instruct you on whether and how to apply for this position** **UNION HALL** **19415 INTERNATIONAL BLVD.** **SEATAC, WA 98188** **PHONE: 206-323-4505** We are currently seeking a **Mower Operator** to join our team. **Essential Functions** + Drives mowing tractor with hand and foot controls and use weed whacker on brush cutter. + Rakes debris and trash. + Loads and unloads equipment onto truck and trailer. + Services equipment to keep in clean, neat and specified mechanical condition. + Works around hazardous equipment. + Works around excessive noise from machines, mower, and weed whacker with hearing protection. + Works in all temperatures and weather condition and will be exposed to nature, i.e., irritating plants, biting or stinging insects, dust, etc. + Works on unlevel ground. **Minimum Requirements** + Due to the inherently dangerous nature of the industry and requirements to work with or around hazardous equipment, employees must be able to maintain attention and concentration for extended periods of time. + Must be able to wear necessary PPE as necessary. + Must be able to safely drive an approved company vehicle. + Must be able to enter and exit a vehicle numerous times a day. + Must be able to withstand exposure to all kinds of weather while completing work assignments, i.e., rain, heat, sun, cold. + Must be able to traverse various terrains. + Must be able to read and comprehend written and verbal job instructions/information. + Must be able to effectively communicate with others. + Must be able to lift, move and maneuver 10 pounds on a frequent basis. + Must have endurance necessary to perform these duties throughout a standard eight to ten hour day. + Must have sufficient eye sight to judge distances and coordination to get and use the appropriate equipment and tools. + Must be able to operate and service all required tools and equipment. + Must have transportation to and from the show up location. + Must pass a pre-employment drug screen. + Must pass a background / MVR check. + Must have a valid driver's license. + Must be willing to join the local union. ​ **Physical Requirements:** **Rarely = less than 10%:** **Occasionally = up to 33%:** **Frequently = up to 66%:** **Continuously = 67% to 100%:** **Activity:** **R** **O** **F** **C** **Activity:** **R** **O** **F** **C** Standing X Seeing X Walking X Reading X Sitting X Reaching X Stooping X Range of Motion X Kneeling X Hearing - Speech Range X Squatting X Depth Perception X Body Twisting X Color Vision X Crawling X Lifting X Sense of Touch X Carrying X Manual Dexterity X Pushing X Speaking Clearly X Pulling X Seeing Distant X Climbing Ladders X Climbing On/Off Truck X Climbing Stairs X Climbing X Balancing X Gripping X Lifting up to 10 lbs X Lifting over 10 lbs to 50 lbs X Lifting up to 50 lbs X Individuals must be able to perform the essential functions of the position with or without a reasonable accommodation. Individuals with a disability who desire a reasonable accommodation should contact the ADA Coordinator at 1-800-248-8733, ext 1339. An Equal Opportunity Employer, including disabled and vets.
          Martina25: РЕЦЕПТ ОТ ДЖУНЫ ДЛЯ ЗАЖИВЛЕНИЯ ГНОЙНЫХ РАН      Comment   Translate Page      


Этот рецепт я слышала от Джуны в далекие-далекие года. Она говорила, что это народный рецепт. Опробован моей семьей и всеми моими друзьями и знакомыми. Вытягивает всю гадость из ран на ура.

Итак, сам рецепт:
- 1 ч. л. меда
- 1 ст. л. муки
- 1 сырой желток

Перемешиваем и храним в холодильнике. Накладываем на нужное место, сверху укрываем туалетной бумагой. Меняем повязку каждые 3 часа. Ночью можно не менять. Буквально на следующий день без всякой боли начинает выходить гной. Если ранка болезненная, то просто снимаем бумагу, специально ничего не подчищая, накладываем новый слой.
Будьте здоровы!

https://fithacker.ru/
фото:https://vk.com/love_zozh

Серия сообщений "- авторские методики":
Часть 1 - Программа &quot;Настрои Сытина&quot;
Часть 2 - Определение продолжительности жизни человека &quot;Date X Pro. Версия 2.1.7&quot;
...
Часть 40 - СОВЕТЫ И ПОДСКАЗКИ ЗАЙЦЕВОЙ Е.Ф.
Часть 41 - ДОКТОР БУБНОВСКИЙ: "ПОКА НЕ ЛОПНУЛ НИ ОДИН СОСУД В ГОЛОВНОМ МОЗГЕ, ЗАКЛИНАЮ!"...
Часть 42 - РЕЦЕПТ ОТ ДЖУНЫ ДЛЯ ЗАЖИВЛЕНИЯ ГНОЙНЫХ РАН


          Martina25: ЖЕНЩИНА, ИСЦЕЛИВШАЯСЯ ОТ РАКА, ДЕЛИТСЯ РЕЦЕПТОМ, КОТОРЫЙ СПАС ЕЙ ЖИЗНЬ!      Comment   Translate Page      


Эта история женщины, пожелавшей остаться анонимной, которая живет в Боснии и Герцеговине. Она хотела бы помочь людям, которые борются с раком, именно поэтому решила поделиться этим чудесным рецептом. Это средство легко приготовить, и понадобится только два ингредиента — мед и имбирь.

Этот рецепт спас эту женщину от смерти. Ей диагностировали рак эндокринных желез. Но, к счастью, ей удалось бороться с ним без химиотерапии или хирургического вмешательства благодаря данному рецепту.

1. Возьмите два больших корня имбиря.

2. Очистите корни и нарежьте их на мелкие кусочки.

3. Смешайте имбирь с пол килограммами меда и переложите эту смесь в банку.

Съедайте четыре чайные ложки в течение дня. Используйте пластиковые или керамические ложки, ни в коем случае не металлические .

Через три дня признаки улучшения начнут появляться.
Будьте здоровы!

https://fithacker.ru/
          Martina25: СТРАДАЕТЕ ОТ ДИАБЕТА? ПРОСТО КИПЯТИТЕ ЭТИ ЛИСТЫ И РЕШИТЕ ВАШУ ПРОБЛЕМУ БЕЗ ЛЕКАРСТВ!      Comment   Translate Page      


Диабет является общей проблемой, многих людей во всем мире.

Это происходит, когда ваша поджелудочная железа останавливает производство инсулина или когда организм не в состоянии должным образом использовать инсулин, который присутствует в организме.

Общими симптомами сахарного диабета являются:

> мочеиспускание чаще, чем обычно, особенно в ночное время
> чувство сильной жажды
> Необъяснимая потеря веса
> Зуд вокруг пениса или влагалища
> Порезы или раны, которые заживают очень медленно
> Затуманенное зрение
> Чувство усталости

Плохо в этой болезни является то, что это может вызвать много проблем со здоровьем, таких как: плохое зрение, слабость, слепота, повреждение нерва, почечная недостаточность, болезнь сердца, эректильная дисфункция (у мужчин) ЭСТ.

Диабет 1 , который также называют юношеский диабет возникает , когда иммунная система ошибочно атакует и разрушает бета — клетки поджелудочной железы , которые делают инсулин.

Диабет 2 , который также называют диабетом взрослых. Наступает, когда организм не в состоянии должным образом использовать инсулин, который выделяется или не делает достаточно инсулина.

Гестационный диабет возникает во время беременности, особенно во втором триместре беременности.

Есть много природных средств, которые могут помочь регулировать уровень сахара в крови, но это один из самых наиболее эффективных и чтобы приготовить его, вам нужно всего лишь несколько манговых листьев.

Вот как сделать это средство:

Сначала возьмите 10 до 15 нежных листьев манго, затем сварить их в стакане воды и оставьте их на ночь. Утром процедите воду и пейте на пустой желудок. Для достижения наилучших результатов, вы должны использовать этот метод лечения в течение двух или трех месяцев.

Вы также можете высушить листья в темном месте и измельчите их. Используйте половину чайной ложки этой пудры манго листьев два раза в день.

Эти листья очень полезны для нашего здоровья в целом, потому что они богаты витаминами, ферментами, антиоксидантами и многими других полезными веществами. Они могут лечить многие состояния здоровья, такие как: лихорадка, диарея, бессонница, варикозное расширение вен, астму, бронхит и простуду. Кроме того, эти листья могут снизить кровяное давление и укрепить кровеносные сосуды.

https://fithacker.ru/
          Martina25: МНЕ 60 ЛЕТ. И ЭТО СРЕДСТВО ВЕРНУЛО МНЕ ЗРЕНИЕ, УДАЛИЛО ЖИР ИЗ ПЕЧЕНИ И ОЧИСТИЛО ОРГАНИЗМ!      Comment   Translate Page      


Свекла — овощ, который рекомендуется употреблять в основном в сыром виде. Хотя его вкус не привлекателен для большинства людей, свекла обладает целебными свойствами и предлагает широкий спектр преимуществ для здоровья. Например, он обладает способностью улучшать зрение, удалять жир из печени и предотвращать непроходимость кишечника.

Свекла содержит триптофан и бетайм, соединения, которые редко встречаются в растениях и известны своей способностью успокаивать нервы и бороться со стрессом. Регулярное употребление этого овоща также повышает циркуляцию крови, укрепляет сердечно-сосудистую систему и дает организму энергетический заряд.

Сочетание высокого содержания антиоксидантов и мощных противовоспалительных свойств помогает бороться со свободными радикалами, что, в свою очередь, предотвращает любое повреждение и улучшает общее состояние здоровья.

Читайте дальше, чтобы узнать, как приготовить вкусный, питательный и здоровый салат из свеклы!

Ингредиенты:

- 2-3 маленькие свеклы
- небольшая луковица
- яблочный уксус
- Оливковое масло первого отжима
- Соль и специи по вкусу

Приготовление:

Очистить свеклу и лук.
Натерёть свеклу на терке или при помощи кухонного комбайна.
Порежьте лук и соедините его со свеклой.
Добавьте 1 чайную ложку яблочного уксуса и 1 столовую ложку оливкового масла.
Добавьте соль, если необходимо и добавьте по вкусу специи и зелень.
Оставьте салат настаиваться на 1 час.

Этот салат очищает ваш ЖКТ и печень, одновременно улучшая ваше зрение.

Регулярное потребление будет делать чудеса для вашего общего состояния здоровья с точки зрения улучшения его на нескольких уровнях.
Будьте здоровы!

https://fithacker.ru/
фото:http://www.healthynaturalsolution.com/

Серия сообщений "- глаза, зрение":
Часть 1 - Диагноз на глазок
Часть 2 - Как вылечить ячмень на глазу
...
Часть 20 - ОТЛИЧНЫЙ РЕЦЕПТ ОТ БОЛЕЗНЕЙ ГЛАЗ
Часть 21 - ЧУДЕСНЫЙ НАПИТОК ДЛЯ ПОХУДЕНИЯ ОТ ТРАВНИКА ИЗ КИТАЯ
Часть 22 - МНЕ 60 ЛЕТ. И ЭТО СРЕДСТВО ВЕРНУЛО МНЕ ЗРЕНИЕ, УДАЛИЛО ЖИР ИЗ ПЕЧЕНИ И ОЧИСТИЛО ОРГАНИЗМ!


          Jump on the Air Fryer Bandwagon For $40 Off      Comment   Translate Page      

Yo, Mitchell Schwartz, your boy, Wolfgang Puck has an air fryer with your name on it... also, I guess, his name on it as well. And right now Woot’s got the Wolfgang Puck 7.2 Quart Air Fryer for just $50 which is $40 less than what’s currently on Amazon.

Read more...


          Improve Your Memory of Something By Talking About It      Comment   Translate Page      

Memory is one of those things we’re all constantly trying to improve on. As we age, it’s also one of those things that is constantly getting a little worse.

Read more...


          Update: Trello (Business)      Comment   Translate Page      

Trello 2.10.12


Device: Mac OS
Category: Business
Price: Free, Version: 2.10.7 -> 2.10.12 (iTunes)

Description:

Trello gives you perspective over all your projects, at work and at home.

Bring Trello to Mac in a dedicated workspace. The Trello Desktop App features native notifications, powerful enhancements and more - away from the distractions of your browser.

Stay productive with a beautiful minimal interface that doesn’t get in the way of your work.
Create new cards instantly from anywhere with a Quick Add window.
Get notified whenever there’s new activity in any of your Trello boards.
Work on multiple boards at once with multiple windows.
Set a global shortcut that opens the main window from anywhere.
Navigate between your starred boards with a quick shortcut.
Use Touch Bar to view starred boards, create new cards, and open new windows.

All Trello shortcuts work just like the web, including keyboard shortcuts, drag & drop and more.

---

Some useful Trello shortcuts:
Ctrl+Alt+Space - Open Quick Add window to quickly create a card (customizable)
Cmd+Shift+N - Create another window
Right-click on card - quick edit menu
Cmd+Alt+C - Copy URL of current open card or board
Cmd+Alt+V - Open any Trello card or board by pasting it into the app from your clipboard
Cmd+Alt+T - Open app from anywhere (customizable)
Cmd+1-9 - Quick access to your Starred Boards
Cmd+Shift+B - Open Boards page
Cmd+D - Open Default Board

---

Whether it's managing a team, writing an epic screenplay, or just making a grocery list, Trello is your sidekick for getting things done and staying organized.

"Trello is an awesome project management tool that makes collaboration easy and, dare I say, even fun."
LIFEHACKER

With Trello you can:

• Create boards to organize anything you're working on
• Use them solo or invite coworkers, friends and family to collaborate
• Customize workflows for different projects
• Add checklists of "To-Dos" on cards
• Assign tasks to yourself and coworkers
• Comment on items with your friends
• Upload photos and videos
• Attach files
• Display cards in a calendar view with the Calendar Power-Up
• Trello is free to use forever with options to upgrade to Gold for loads of extra fun and functionality

What's New

Fixed: issues related to selecting text on card backs.
Fixed: an issue preventing context menus from showing up. Please note that to see context menus you must have Spellcheck enabled!

Trello


           Datenklau: Hackerangriff auf Web-Mail-Dienste von Microsoft      Comment   Translate Page      
Hacker haben sich Zugriff auf Mail-Konten von Microsoft verschafft. Betroffen sind Kunden von Diensten wie @msn.com und @hotmail.com.
          Growth Operations Manager - Careem - Dubai      Comment   Translate Page      
Careem is looking for a rock star Growth Operations Manager who is part product manager, part marketer, part engineer, part data scientist and all time hacker....
From Careem - Sun, 14 Apr 2019 10:38:29 GMT - View all Dubai jobs
          Thacker, Phyllis      Comment   Translate Page      
Phyllis Arlene Thacker of Klamath Falls, Ore., passed away on April 2, 2019, at the age of 88. Phyllis was born on July 31, 1930, in Elrod, S.D.,...
          Microsoft: “Hackers konden maandenlang meekijken in mailbox van sommige Outlook-accounts”      Comment   Translate Page      
Microsoft heeft bekendgemaakt dat hackers mogelijk maandenlang toegang hadden tot bepaalde Outlook-accounts. Cybercriminelen konden meekijken in de...
          La presencia de “Chema Alonso” en redes sociales actualizada. (Me acabé Google Plus)      Comment   Translate Page      
Debido a unos incidentes serios de  seguridad en Google Plus - y al poco uso en el mundo de Internet - Google decidió cerrar su servicio Google Plus el pasado 2 de Abril, como estaba previsto desde hacía mucho tiempo. Google Plus se llevo por delante un servicio que muchos amábamos, como era el famoso Google Reader, pero al igual que le sucedió a Google Wave - el anticipado a Slack o Teams -, tuvo que irse. 

Figura 1: La presencia de “Chema Alonso” en redes sociales actualizada.
(Me acabé Google Plus)
Yo gestionaba los canales de Google Plus para El lado del Mal y el mío particular, y como un campeón estuve allí hasta el último momento. Hasta que el servicio se cerró, estuve publicando todo lo que salía por El lado del Mal, y en el mío personal lo que salía de nuestro trabajo en todo el resto de los medios.

Figura 2: Mi canal de Goole Plus antes de cerrar

Los que me conocen saben que soy un poco como Sheldon, no soy capaz de empezar algo sin dejarlo acabado - ya os contaré como hago los álbumes de cromos con Mi Hacker y Mi Survivor, que es para estudiar -, así que hasta el último día estuve publicando todo por ellos. Pero ahora hay que cambiar, así que os voy a dejar por aquí mi presencia en redes sociales e Internet, por si os interesa a alguno.

Blog y RSS: Un Informático en el lado del mal

Este sitio va a seguir siendo mi principal refugio. Aquí sigo escribiendo, leyendo los comentarios - aunque no comento por falta de tiempo - y expresándome sobre los temas que considero que tengo que hacerlo. Publico los artículos de amigos, compañeros y colaboradores, pero sigo gestionando yo únicamente este sitio.

Figura 3: Feed RSS de El lado del mal en FeedBurner

Para seguir el blog, lo mejor es suscribirse al Canal RSS que tengo en Feedburner desde casi el principio utilizando el cliente RSS que más te guste. Una buena alternativa al extinto Google Reader es Feedly, así que que puedes probarlo si no tienes lector que utilizar. También te puedes suscribir vía e-mail para recibir en tu bandeja de entrada los posts todos los días.

Linkedin (ChemaAlonso)

Es donde mantengo mi perfil profesional. No lo cambio mucho porque tampoco es que cambie mucho mi vida profesional a nivel macro (aunque sea muy activa a nivel micro). Por aquí comparto también lo que comparto por Telegram o Twitter. Como sabéis, Linkedin tiene un límite de 30.000 contactos que yo hace mucho que alcancé, así que no puedo añadir mucha gente nueva.

Figura 4: Linkedin de Chema Alonso

De vez en cuando tengo algún hueco entre los 30.000 contactos que tengo y añado alguno de los que tengo en lista de peticiones. Me encantaría añadir a más gente, pero la lista de peticiones que tengo pendientes de atender es de casi cuatro mil. Eso sí, puedes seguir mis publicaciones y comentar en ellas. 

No soy muy fan de que me envíen correos electrónicos por Linkedin, ya que tenemos canales oficiales para ello en las webs corporativas, así que no suelo contestar mucho por los mensajes privados cuando tienen que ver con trabajo.

Twitter (@ChemaAlonso)

Mi cuenta de Twitter la sigo utilizando, aunque no para debatir ni comentar muchas cosas. Es un canal por el que saco los trabajos que hago yo y lo que sacamos desde Telefónica, ElevenPaths, LUCA, 0xWord, AURA, Movistar Home, Talentum o Blog Think Big. Es decir, es un canal para estar atento en Twitter a la parte más profesional nuestra.

Figura 5: Cuenta de Chema Alonso en Twitter

No suelo debatir y tengo una política que os conté en el artículo de "Colaboradores pasivos de abusones en redes sociales". La verdad, no soy muy fan de Twitter, así que hablo poco de Chema Alonso en primera persona.

Instagram (ChemaAlonso)

Es a la red social donde más tiempo invierto. Publico stories y feed de fotos con cosas totalmente distintas. Más personal público que profesional. Mantengo la misma política de comentarios que la de Twitter, que ya os he dicho que describí en "Colaboradores pasivos de abusones en redes sociales". Como he dicho, no pongo demasiado de trabajo, y sí mucho más social en vida pública.




A post shared by Chema Alonso (@chemaalonso) on

No contesto a los mensajes porque me llegan demasiados y físicamente no me da tiempo a responderlos. Entended, que muchas de las cosas que me preguntáis ya las he contestado por el blog o en vídeos durante muchos años, así que si veo alguna cosa puntual nueva o interesante, lo contestaré cuando tenga algo de tiempo.


Solo como recordatorio para los nuevos navegantes del mundo del Instagram. No hackeo el WhatsApp, el Instagram, el LOL, el Facebook, o el Fortnite a nadie. Eso lo hacen los cibercriminales y no los hackers. Lo más probable es que acabe publicando tu mensajes - suerte que no me da la vida para publicar todos -.

YouTube (Chemai64)

En el canal de Youtube publico todos los vídeos de las conferencias, entrevistas, productos y PoCs organizados por temas y años. Están las conferencias que he sido capaz de recuperar desde el año 2008 o así, más las charlas de ElevenPaths Talks o LUCA Talks, demos de los posts de "El lado del mal", etcétera.

Figura 8: Última entrevista publicada en el Canal Youtube

Tiene más de 230.000 suscritos y debe tener unos mil vídeos, para que hinches y aburras de ver conferencias, entrevistas, podcasts, demos, webinars, etcétera. Y seguiré subiendo todo el material que se va generando.

Telegram (ElLadoDelMal)

Desde hace unos cuatro años tengo abierto un Canal Telegram de El Lado del Mal donde no solo salen los posts de este blog, sino que también salen los de Seguridad Apple, los del Blog de ElevenPaths, LUCA, Blog Think Big y otros medios con temas que tienen que ver con seguridad y tecnología. Intento que sea más cercano al contenido de este blog, así que no sale todo lo que generamos. Si eres usuario de Telegram, es una buena forma de saber qué hacemos.

Figura 9: Canal Telegram de El lado del Mal

Mi cuenta de Telegram no tiene un uso personal, así que no la uso para prácticamente nada. No contesto ningún mensaje por Telegram, solo tengo conectado la publicación de contenidos al canal de ElLadoDelMal y listo.

Facebook (Chema.Alonso.Maligno)

No es una página personal. Hace mucho tiempo que deje de usar Facebook como canal de comunicación personal. Es un canal en el que saco los contenidos de mis blogs. Al igual, más o menos, que hago en Telegram o Twitter. Si eres un fan de Facebook, también puedes seguir lo que comparto por allí.

Figura 10: Cuenta de Chema Alonso en Facebook 

Periódico: (No Hack, No Fun)

Si eres un amante de la navegación web que disfruta como yo leyendo cada mañana las páginas principales de los periódicos de actualidad y de deportes que me gustan, entonces No Hack, No Fun es tu sitio. Cada sábado creo el periódico semanal, cada domingo saco el e-mailing (al que te puedes suscribir desde la web de No Hack, No Fun) con las noticias que he dado de alta desde el día anterior. Y día a día actualizo la lista de noticias - que solo puedes ver si vienes a visitar la web.

Como ya os he dicho, los viernes antes de que comience la nueva versión semanal tienes la lista de todas las noticias por secciones de lo que he publicado esa semana. Para que no te falte de nada.

Correo Electrónico y Web

Si tienes mi dirección de correo electrónico - alguna de ellas - y me envías un mensaje, probablemente se pierda en la maraña de correos que recibo diariamente. La forma de comunicarse conmigo - si es para un tema profesional - es a través de las  zonas de contacto en las webs de Telefónica, ElevenPaths, LUCA o 0xWord. Ellos me filtran los mensajes, pero si hay alguno importante me lo hacen llegar siempre. Como ya dije, hay unas pequeñas recomendaciones que os dejé para escribirme.

Otros canales

Si hay otros canales que dicen que soy yo, o este blog, o usuarios en sitios que dicen que soy yo, probablemente no sea yo. No soy de participar en nada más que esto. Sí que tengo mi canal en Whakoon donde gestiono mi lista de cómics (y los que me faltan), mi Canal de SlideShare donde publico documentos y presentaciones o Spotify, pero he visto gente que se ha hecho pasar por mí en páginas de Facebook, foros de hacking, etcétera. No soy yo. Si soy yo, aviso por aquí antes.

Saludos Malignos!

          Operação de ciberespionagem faz 240 vítimas no Oriente Médio      Comment   Translate Page      

Uma operação de ciberespionagem lançada por hackers do Oriente Médio permitiu o monitoramento ilegal de 240 vítimas importantes do cenário político da região. O ataque aconteceu no ano passado e foi descoberto pela empresa de segurança Kaspersky Lab.

A operação chamada de SneakyPastes foi conduzida pelo Gaza Cybergang, que "compreende vários grupos de diferentes níveis de sofisticação", de acordo com a Karsperky. Os cibercrimonosos criavam e-mails e domínios descartáveis para espalhar uma infecção via mensagens de phishing. Quando o usuário abria o link malicioso ou o arquivo anexado ao e-mail, o software malicioso era instalado no dispositivo.

Só que o Gaza Cybergang conseguia ocultar o malware para que ele não fosse detectado. A estratégia ainda garantia que a localização do servidor de comando do grupo ficasse ocultado. Para isso, outro malware era baixado no aparelho da vítima, usando sucessivas etapas e sites gratuitos como Pastebin e Github.

-
Participe do GRUPO CANALTECH OFERTAS no WhatsApp e garanta sempre o menor preço em suas compras de produtos de tecnologia.
-

"O estágio final da infecção é um trojan de acesso remoto que, ao contatar com seu servidor de comando e controle, irá reunir, compactar, criptografar e roubar uma grande quantidade de documentos e planilhas", explicou a Karspersky em comunicado.

Em 2018, grupo Gaza Cybergang conduziu operação de ciberespionagem no Oriente Médio

A atuação do grupo afetou vítimas em mais de 39 países do Oriente Médio, incluindo entidades políticas, diplomáticas, veículos de imprensa, ativistas, políticos, bancos e ONGs. Na época, a descoberta da Kaspersky foi compartilhada com as autoridades e resultou na remoção de uma parte significativa da infraestrutura do ataque.

De acordo com a empresa de segurança, o Gaza Cybergang é uma ciberameaça de língua árabe, politicamente motivada, que ataca alvos principalmente no Oriente Médio e Norte da África, com um interesse especial nos territórios palestinos.

O período mais ativo da SneakyPastes foi em meados de abril e novembro de 2018. Os principais alvos foram entidades diplomáticas e governamentais, ONGs e veículos de comunicação. A maioria das vítimas da operação está localizada em territórios palestinos, na Jordânia, em Israel e no Líbano.

Leia a matéria no Canaltech.

Trending no Canaltech:


          Cibersegurança é estar sempre um passo à frente      Comment   Translate Page      

Por Penny Lane, vice-presidente do Programa de Disrupção de Fraudes de Pagamentos da Visa

Quando me apresento, geralmente as pessoas associam meu nome à música dos Beatles. Assim como a letra que retrata a rua da cidade inglesa de Liverpool onde tudo acontece, minha vida também é repleta de fatos marcantes. Depois de trabalhar, durante 13 anos, como matemática criptológica sênior no Departamento de Defesa da Agência de Segurança Nacional dos Estados Unidos fui para a Visa, onde hoje lidero cinco equipes formadas por 28 especialistas em fraudes – além dos escritórios regionais pelo mundo como, por exemplo, no Brasil.

Posso dizer que todo dia é uma surpresa porque não sabemos o que vai acontecer. Alguns dias parecem tranquilos e, de repente, sabemos de um novo ataque e temos que agir rapidamente. Por isso, nosso objetivo é ser proativo. Mais do que uma caça de gato e rato, o desafio é se antecipar às estratégias dos hackers e criar obstáculos para eles. Minha equipe é capaz de identificar um ataque que está prestes a acontecer em qualquer parte do mundo e pará-lo imediatamente para proteger os dados de emissores, adquirentes, estabelecimentos comerciais, empresas, bancos e consumidores.

-
Participe do GRUPO CANALTECH OFERTAS no WhatsApp e garanta sempre o menor preço em suas compras de produtos de tecnologia.
-

As fraudes nos sistemas bancários, por sinal, podem levar mais de três meses para se concretizarem. Minha equipe acompanha cada movimentação dos hackers e auxiliou mais de 40 bancos de todo o mundo, incluindo alguns da América Latina, que estavam comprometidos por ataques desde setembro de 2018. Para ter acessos a informações em primeira mão, utilizamos mais de 300 fontes de inteligência ininterruptamente, 24 horas por dia, sete dias por semana, para detectar, deter e interromper ataques direcionados ao ecossistema de pagamento global. Essas fontes incluem relacionamentos com estabelecimentos comerciais e industriais, além do contato com representantes legais e policiais.

Nestes 18 anos na empresa, tenho constatado a evolução dos cibercriminosos, cujas técnicas se tornaram mais complexas e sofisticadas. Os fraudadores são extremamente bem organizados para alcançar o objetivo de roubar dados financeiros e fundos de pessoas, empresas, bancos e até de governos. Por esse motivo, estamos constantemente desenvolvendo novas ferramentas para garantir a segurança dos nossos clientes.

Para impedir ataques a transações de comércio virtual, criamos uma ferramenta que consegue rastrear um malware (software malicioso) que age como um espião, roubando os dados das contas de clientes. O malware é identificado assim que o contato ocorre, mesmo que o site da empresa ainda não tenha registrado nenhum tipo de fraude. A ideia é não esperar que nossos clientes denunciem uma conta comprometida, mas acabar com a ação dos criminosos ao primeiro sinal, evitando a perda de dinheiro.

Além disso, fundei o projeto de capacitação chamado Visa’s Red Team. Se há hackers que cometem fraudes para roubar dados e aplicar golpes milionários, por que não formar uma equipe capaz de contra-atacar e encontrar vulnerabilidades nos processos de pagamento? A iniciativa inovadora rendeu bons resultados e, hoje, a equipe é composta por cerca de 50 especialistas. Em um laboratório, eles simulam ataques cibernéticos e verificam todos os tipos de combinações em transações, além de testar cada ferramenta de segurança que é desenvolvida.

Entre tantos casos que acompanhei, destaco a tentativa de um grupo de hackers na África que sacava dinheiro de forma muito rápida – milhares de dólares por minuto – de uma rede de caixas eletrônicos em uma sexta-feira à noite. Minha equipe achou a atividade estranha e entrou em contato com a instituição financeira, informando que as operações seriam bloqueadas. Por telefone, um funcionário do banco respondeu que nenhuma fraude tinha sido identificada e, portanto, não havia necessidade de interromper as atividades.

Eu e minha equipe tomamos a decisão de parar todas as transações realizadas por caixas eletrônicos do banco. Depois, descobrimos que o suposto funcionário com quem conversei era um dos criminosos. Todo o grupo foi preso. É uma pressão muito grande porque uma decisão errada teria um impacto terrível. Mas a verdade é que contamos com ferramentas sofisticadas e é bastante satisfatório pegar esses ‘caras maus’.

Além da curiosidade sobre o quão criativos os cibercriminosos podem ser, uma pergunta recorrente é sobre o fato de eu ser mulher em uma área dominada pelos homens. Embora a presença feminina esteja aumentando no setor de tecnologia, noto que ainda é bastante reduzida quando vou a seminários e congressos. As mulheres representam apenas 12% dos contratados nesta área, segundo pesquisa Barômetro de TI realizada com 1.745 profissionais no ano passado pela Michael Page, uma das maiores empresas de recrutamento do mundo. Para mudar esse cenário, é preciso encorajar os talentos das jovens em áreas que envolvem matemática e computação.

A Visa parece ser uma exceção nesse panorama, promovendo programas de inclusão, diversidade e igualdade de gênero, reconhecendo a capacidade e dando voz a todos seus colaboradores. Como resultado, a empresa ganhou vários prêmios em 2018 como Melhores Empregadores de Mulheres, da Forbes, e 25 Melhores Empresas para Mulheres do Setor de Tecnologia, da Anita Borg Institute. É um indício de transformação que trará mais equilíbrio e igualdade.

Leia a matéria no Canaltech.

Trending no Canaltech:


          Akun Twitter Dahlan Iskan Diretas, Mahfud MD Ungkap Sosok Hacker      Comment   Translate Page      
[PORTAL-ISLAM.ID]  Akun...

jika anda ingin membaca artikel ini lebih lengkap silahkan klik judul di atas atau silahkan klik tautan berikut di http://www.portal-islam.id/
          Surf safely and anonymously with this top-rated VPN      Comment   Translate Page      

We're well past the golden age of the internet, when you could surf where you liked without being sure that ad trackers or some other bot were hungrily following your trail of cookies - not to mention actual human hackers and other threats. Ever wish your virtual self had an invisibility cloak? A good virtual private network is the next best thing. And among VPNs, Nord VPN still stands out as one of the best.

This is still the well-supported VPN that earned an "Outstanding" rating from PCMag, among other accolades. With it, you can route your signal through one of over 3,500 remote servers worldwide, thereby foiling tracking algorithms and enabling you to bypass the browsing restrictions of whatever country you're in. The service includes double data encryption and automatic shutdown in case of a dropped connection. And best of all, Nord VPN maintains a strict no logs policy, meaning nobody records your browsing history - not even Nord VPN.

Get a three-year subscription to Nord VPN for $107.55 - a 75% discount off the list price. Read the rest


          Torsten Hacker became a registered member      Comment   Translate Page      
none
          Torsten Hacker became a registered member      Comment   Translate Page      
none
          Trifles and Folly by Gail Z. Martin Tour & #Giveaway      Comment   Translate Page      

Trifles and Folly
A Deadly Curiosities Collection
by Gail Z. Martin
Genre: Urban Fantasy

A collection of nine adventures: Buttons, The Restless Dead, Retribution, Coffin Box, Wicked Dreams, Collector, Bad Memories, Shadow Garden, and Spook House. 




Cassidy Kincaide runs Trifles & Folly in modern-day Charleston, an antiques and curios shop with a dangerous secret. Cassidy can read the history of objects by touching them and along with her business partners Teag, who has Weaver magic and Sorren, a 600 year-old vampire, they get rid of cursed objects and keep Charleston and the world safe from supernatural threats. An extension of the Deadly Curiosities book series.


Revised Edition 2, 2018. Includes an updated cover, minor edits and the BONUS section with three stories chronicling Sorren’s early days: Vanities, The Wild Hunt, and Dark Legacy.



Goodreads* Amazon


Trifles and Folly 2
A Deadly Curiosities Collection 

Cassidy Kincaide runs Trifles & Folly in modern-day Charleston, an antiques and curios shop with a dangerous secret. Cassidy can read the history of objects by touching them and together with Teag (a hacker and weaver witch) and Sorren, a 600 year-old vampire, they get rid of cursed objects and keep Charleston and the world safe from supernatural threats.



An extension of the Deadly Curiosities urban fantasy novel series, this collection contains three full novellas and four short stories: The Final Death, Predator, Fair Game, Fatal Invitation, Redcap, Bloodlines, plus three bonus stories: Among the Shoals Forever, The Low Road, and Steer a Pale Course.



Goodreads* Amazon


Gail Z. Martin discovered her passion for science fiction, fantasy and ghost stories in elementary school. The first story she wroteat age fivewas about a vampire. Her favorite TV show as a preschooler was Dark Shadows. At age 14, she decided to become a writer. She enjoys attending science fiction/fantasy conventions, Renaissance fairs and living history sites. She is married and has three children, a Himalayan cat, a Maltese and a golden retriever.


Website* Newsletter* Facebook* Pinterest * Twitter* Goodreads* Amazon


Follow the tour HEREfor exclusive excerpts, guest posts and a giveaway!

2x $25 Amazon Gift Cards
4x Swag Packs
Ends April 12, 2019
a Rafflecopter giveaway







          Comment on Black Hole of Misogyny: Reddit trolls just can’t stop attacking Dr. Katie Bouman for her crime of doing nothing wrong by Cat Mara      Comment   Translate Page      
This reminds me of the crap someone I follow on YouTube, the Chinese maker Naomi "SexyCyborg" Wu, gets because she is a woman, though with added helpings of orientalism and slut-shaming thrown in for good measure in Wu's case because she has breast implants-- something she is upfront about and was the topic of one of her most recent videos: https://youtube.com/watch?v=zVAjbJGd4GE I first heard about her through the XBox hacker Bunny Huang's blog who called out the abuse Wu was getting for her appearance. She was very shabbily treated by VICE magazine (there's a surprise 🙄) last year who interviewed her and ignored requests from her to stay out of aspects of her private life that might get her into trouble with the PRC authorities... which were ignored because white people, I guess 🙄🙄
          Piratage de Microsoft Outlook : des hackers ont eu accès à des comptes pendant quelques mois      Comment   Translate Page      
Outlook, le service d’e-mail de Microsoft, a été espionné par des hackers pendant trois mois. Ils ont pu avoir accès à des comptes d’utilisateurs, ainsi qu’à certaines données. Dans un e-mail envoyé aux utilisateurs d’Outlook, Microsoft explique que les identifiants de l’un de ses employés en charge de …

Lire la suite

Aimez KultureGeek sur Facebook, et suivez-nous sur Twitter



          Americké námořnictvo vyráží do boje s malými drony. Inspiruje se u Star Wars      Comment   Translate Page      
Americké námořnictvo sestavuje tým inženýrů, vědců, a také hackerů, který by měl vyvíjet postupy pro efektivní boj s hejny malých komerčních dronů. Ty jsou velmi levné, ale při správném použití mohou napáchat velké škody. Účinné nasazení komerčních dronů předvedli bojovníci různých frakcí v Sýrii a nedávno jsme zase byli svědky chaosu, jaký rozpoutaly malé drony na velkých letištích v Londýně, Dubaji a Newarku.
          Internet Explorer security flaw allows hackers to steal files - Engadget      Comment   Translate Page      
Internet Explorer security flaw allows hackers to steal files  Engadget

Microsoft's Internet Explorer has a longstanding reputation for poor security, but it's now bad enough that you could be attacked jut by having it on your PC....


          There's a better way to cover your webcam (and 3-packs start at $26)      Comment   Translate Page      
TwitterFacebook

The jury is still out on whether Mark Zuckerberg will make good on his promise of elevating his commitment to protecting Facebook users' privacy, but we're fairly certain that the tech mogul knows a thing or two about safeguarding his own privacy.

A couple of years ago, the wealthiest millennial in the world inadvertently let slip that he performs a DIY trick to prevent hackers from spying on his computer: He covers his webcam and microphone with tape.

Thanks to Zuck, what was once something that was practiced only by conspiracy theorists has been adopted by millions of people, including former FBI Director James Comey and the Pope. Even Edward Snowden, the infamous NSA whistleblower who is knowledgeable about surveillance, strongly suggests that you do the same. Read more...

More about Cybersecurity, Mashable Shopping, Shopping Stackcommerce, Webcam Safety, and Webcam Covers
          Microsoft reveals hackers accessed some Outlook.com accounts for months      Comment   Translate Page      
Microsoft reveals hackers accessed some Outlook.com accounts for months “Microsoft has started notifying some Outlook.com users that a hacker was able to access accounts for months earlier this year. The software giant discovered that a support agent’s credentials were compromised for its web mail service, allowing unauthorized access to some accounts between January 1st and […]
          Surf safely and anonymously with this top-rated VPN      Comment   Translate Page      

We're well past the golden age of the internet, when you could surf where you liked without being sure that ad trackers or some other bot were hungrily following your trail of cookies - not to mention actual human hackers and other threats. Ever wish your virtual self had an invisibility cloak? A good virtual private network is the next best thing. And among VPNs, Nord VPN still stands out as one of the best.

This is still the well-supported VPN that earned an "Outstanding" rating from PCMag, among other accolades. With it, you can route your signal through one of over 3,500 remote servers worldwide, thereby foiling tracking algorithms and enabling you to bypass the browsing restrictions of whatever country you're in. The service includes double data encryption and automatic shutdown in case of a dropped connection. And best of all, Nord VPN maintains a strict no logs policy, meaning nobody records your browsing history - not even Nord VPN.

Get a three-year subscription to Nord VPN for $107.55 - a 75% discount off the list price. Read the rest


          Hackers try smaller amounts three years after $100 million heist      Comment   Translate Page      
none
          Microsoft informs hackers had accessed some Outlook account emails for months      Comment   Translate Page      
none
          How To Pay for Online Games Using Bitcoin?      Comment   Translate Page      

Ever since the inception of gaming industry online, finding your favorite game is just possible with the push of a button now. But with an insane amount of gaming sites sprouting everywhere, chances are more, that you end up paying for fraud casinos and spill your confidential data to hackers. Fear not, just replace your […]

The post How To Pay for Online Games Using Bitcoin? appeared first on Unigamesity.


          Los diputados británicos piden dar prioridad a Suecia frente a EE.UU. en el caso Assange      Comment   Translate Page      
Continúan las presiones al Gobierno británico sobre la situación de Julian Assange, tres días después de su detención. Tras haber pedido el líder de la oposición, el laborista Jeremy Corbyn a Theresa May que este no fuera extraditado a Estados Unidos, esta vez han sido 70 diputados, la mayoría de ellos del partido del propio Corbyn, los que han firmado una carta en la que piden al ministerio del Interior que priorice la entrega a Suecia del fundador de WikiLeaks si las autoridades de ese país lo solicitan por un supuesto caso de violación. Sus señorías solicitan que se tramite esta antes que la extradición a Estados Unidos. Los parlamentarios británicos quieren que el Ejecutivo de May no ceda ante las presiones norteamericanas y que Assange responda ante la justicia sueca. «No presumimos la culpabilidad, por supuesto, pero creemos que el debido proceso debería ser seguido y el querellante debería ver que se hace Justicia», aseguran en una misiva en la que también cuestionan que las autoridades de Suecia tuvieran conocimiento de la detención de Assange. Piden, además, al titular de Interior británico «claridad» sobre si los fiscales del país nórdico fueron informados con anticipación de la decisión. La Fiscalía británica ya ha manifestado que en caso de que haya más de una solicitud será el propio ministro del Interior, Sajid Javid, el que determine a cuál dar prioridad. Este, aún no se ha manifestado en este sentido y lo único que ha explicado del tema Assange es que «nadie está por encima de la ley» y que el activista australiano será juzgado con total imparcialidad. Desde Suecia han dejado la puerta abierta a que se pueda retomar esa causa por presunto delito sexual que prescribe el año que viene. Sin embargo, la fiscalía del país aún no se ha pronunciado sobre si, finalmente, reabrirá un caso que sobreseyó en 2017 tras la imposibilidad de llevar al fundador de Wikileaks ante la justicia por estar este recluido en la embajada de Ecuador en Londres desde junio de 2012. Mientras, el siguiente paso en el caso Assange no tendrá lugar hasta el próximo 2 de mayo, cuando el hacker australiano tenga que prestar declaración de nuevo ante la Corte de Magistrados de Westminster. Lo hará por videollamada desde la cárcel y será entonces cuando comience el proceso oficial de extradición a Estados Unidos, que quiere interrogarle por conspirar con Chelsea Manning, la soldado estadounidense que filtró cables diplomáticos confidenciales del Gobierno de ese país.
          Why Isn’t Assange Charged with ‘Collusion with Russia’?      Comment   Translate Page      

Why Isn’t Assange Charged with ‘Collusion with Russia’?Prior to the publication of the stolen Democratic-party emails and internal documents, Julian Assange and WikiLeaks exhorted Russian government hackers to send them “new material.”That is what we are told by Special Counsel Robert Mueller’s indictment of Russian intelligence officers. (I won’t offend anyone by calling them “spies” — after all, they were just doing electronic surveillance authorized by their government, right?) Assange wanted the Russians to rest assured that giving “new material” to WikiLeaks (identified as “Organization 1” in the indictment) would “have a much higher impact than what you are doing” — i.e., hacking and then putting the information out through other channels.But time was of the essence. It was early 2016. If Hillary Clinton was not stopped right there and then, WikiLeaks warned, proceedings at the imminent Democratic national convention would “solidify bernie supporters behind her.” Of course, “bernie” is Bernie Sanders, the competitor who could still get the nomination. But if Assange and the Russians couldn’t raise Bernie’s prospects, WikiLeaks explained, Mrs. Clinton would be a White House shoo-in: “We think trump has only a 25% chance of winning against hillary . . . so conflict between bernie and hillary is interesting.”In a nutshell: Knowing that Russia had the capacity to hack the DNC and perhaps Clinton herself, WikiLeaks urged it to come up with new material and vowed to help bring it maximum public attention. By necessity, this desire to hurt Clinton would inure to Sanders’s benefit. And sure enough, WikiLeaks eventually published tens of thousands of the Democratic emails hacked by Russian intelligence.So . . . I have a few questions. WikiLeaks, Moscow, and Bernie SandersFirst, why was there no Sanders-Russia probe? Why, when President Obama directed John Brennan, his hyper-political CIA director, to rush out a report on Russia’s influence operations, did we not hear about the WikiLeaks-Russia objective of helping Sanders win the Democratic nomination? Brennan & Co. couldn’t tell us enough about our intelligence-agency mind readers’ confidence that Putin was rootin’ for Trump. Why nothing about the conspirators’ Feelin’ the Bern?Don’t get me wrong: I don’t think there is any basis for a criminal investigation of Senator Sanders. But there appears to have been no criminal predicate for a “collusion” investigation of Donald Trump, either — not a shred of public evidence that he conspired in the Putin regime’s hacking, other than that presented in the Clinton-campaign-sponsored Steele dossier (if you can call that “evidence” — though even Christopher Steele admits it’s not). Yet, Trump was subjected to an investigation for more than two years — on the gossamer-light theory that Trump stood to benefit from Moscow’s perfidy.Yes, of course, this cui bono claim was amplified by what were said to be Trump’s intriguing, if noncriminal, ties to Russia. To my knowledge, however, the mythical pee tape of Steele lore has never been located; it is unlikely, then, that there are any Trump photos that compare, intrigue-wise, to a shirtless Bernie boozing it up in the Soviet Union. Surely that should have been worth a FISA warrant or four.A more serious question: Why hasn’t Assange been indicted for criminal collusion with the Kremlin — the same hacking conspiracy for which Mueller indicted the Russian operatives with whom Mueller says Assange collaborated? The same conspiracy for which the president of the United States, though not guilty, was under the FBI’s microscope for nearly three years? The Assange Indictment: Weak and Potentially Time-BarredThe most striking thing about the Assange indictment that the Justice Department did file is how thin it is, and how tenuous. Leaping years backwards, ignoring “collusion with Russia,” prosecutors allege a single cyber-theft count: a conspiracy between Assange and then–Bradley (now Chelsea) Manning to steal U.S. defense secrets. This lone charge is punishable by as little as no jail time and a maximum sentence of just five years’ imprisonment (considerably less than the seven years Assange spent holed up in Ecuador’s London embassy to avoid prosecution).This is very peculiar. Manning, Assange’s co-conspirator, has already been convicted of multiple felony violations of the espionage act — serious crimes that the Assange indictment says WikiLeaks helped Manning commit . . . but which the Justice Department has not charged against Assange.Why? Probably because espionage charges are time-barred. Which brings us to the possibility — perhaps even the likelihood — that Assange will never see the inside of an American courtroom.As I pointed out on Thursday, the 2010 Assange-Manning cyber-theft conspiracy charged by prosecutors is outside the standard five-year statute of limitations for federal crimes: The limitations period was already exhausted when the indictment was filed in 2018. To breathe life into the case, the Justice Department will have to convince both British and American judges that this comparatively minor conspiracy charge is actually a “federal crime of terrorism,” triggering a three-year statute-of-limitations extension.For some reason, the extension statute — Section 2332b(g)(5)(B) — makes the extra three years applicable to cyber-theft offenses under Section 1030 of the penal code, but not espionage-act offenses under Section 793. I am skeptical, though, that the Justice Department’s cyber-theft charge qualifies for the extension. Prosecutors haven’t charged a substantive cyber-theft violation under Section 1030; they have charged a conspiracy (under Section 371) to commit the Section 1030 offense. That is not the same thing. Typically, if Congress intends that its mention of a crime should be understood to include a conspiracy to commit that crime, it says so. It did not say so in the extension statute.Why put all the prosecutorial eggs in such a rickety basket? Protecting Mueller’s Russian-Hacking IndictmentEngland is a close ally, but getting its courts to extradite people for U.S. criminal proceedings is no lay-up. It is a laborious process, and the outcome, even in strong cases, is uncertain. The Justice Department knows this, yet in its indictment it elected not to charge the Russia conspiracy — a 2016 offense that has no statute-of-limitations problem. Why? If you want the Brits to transfer a defendant, you need to make a compelling showing. Why leave obvious, serious charges on the cutting-room floor? Mueller brought a dozen felony charges against the Russian operatives with whom, we’ve been told for over two years, Assange conspired. So why isn’t Assange charged with at least some of these felonies?Some argue that the Justice Department is nervous that, as a pseudo-journalist, Assange may have First Amendment protection from such charges. But then why charge the Manning conspiracy? The theory of Assange’s guilt is the same in both the Russian-collusion and Manning-espionage situations: The WikiLeaks chief was not merely a journalist publicizing sensitive information; he was aiding, abetting, counseling, inducing, and procuring the theft of the sensitive information (to borrow the terms of the federal aiding and abetting statute). The Justice Department plainly believes that complicity in the theft shreds any claim to freedom of the press; there is no First Amendment right to steal information.If this is the Justice Department’s position, then why not charge Assange with the 2016 “collusion” conspiracy, too? If I were a cynic (perish the thought!), I’d suspect that the government does not want Special Counsel Mueller’s Russian-hacking indictment to be challenged.As I have explained previously, I accept the intelligence agencies’ conclusion, echoed by Mueller, that Russia was behind the hacking of Democratic email accounts. Nevertheless, there is a big difference between (a) accepting an intelligence conclusion based on probabilities, and (b) proving a key fact beyond a reasonable doubt in a criminal case.The intelligence assessment here may be sound, but the legal case Mueller would have to prove to a jury has problems. To state the most obvious: The Justice Department and FBI did not perform elementary investigative steps, such as taking possession of, and performing their own forensic analysis on, the servers that were hacked. Instead, they relied on CrowdStrike, a contractor of the DNC, which has a strong motive to blame Russia.Mueller’s team knew that no Russian defendant would ever actually be tried in a U.S. court on the hacking allegations. The indictment was more like a press release than a charging instrument. It was meant to be the last word on hacking: An authoritative version of events pronounced by a respected U.S. prosecutor that would never be challenged by skilled defense lawyers. The point was to put to rest the nettlesome “How do we really know Russia did it?” question raised by some former intelligence agents and hardcore Trump supporters.But now . . . here comes Assange. He has always insisted that Russia was not WikiLeaks’ source. I don’t believe him. I see him as a witting, anti-American tool of Moscow. But, to my chagrin, some in Trump’s base — not all, but some — have made Assange their strange bedfellow, just as many libertarians and leftists embraced him when he was exposing U.S. national-security programs, intelligence methods, defense strategies, and foreign-relations information. These Trump supporters have convinced themselves that raising doubt about Russia’s culpability exonerates the president — even though the special counsel has already cleared Trump, regardless of what Russia (and Assange) were up to.Consequently, if Assange were charged with the Russian-hacking conspiracy that Mueller has alleged, and if he were ever brought to the U.S. to face trial, he would maintain that he did not get the Democratic emails from Russian intelligence. Remember, a defendant does not have to prove anything: It would not be Assange’s burden to establish Russia’s innocence; the Justice Department would have to prove Russia’s culpability.Assange’s fans would give lots of sunshine to his effort to exculpate Moscow. Indeed, even without Assange mounting a challenge to Mueller’s Russian-hacking indictment, some Trump supporters have tried to cast doubt on Russia’s guilt (see, e.g., here and here). And a group of dissenting intelligence-community veterans will continue arguing that CrowdStrike’s analysis is flawed.To sum up: If the Justice Department had indicted Assange for collusion, Mueller’s Russian-hacking indictment would no longer stand unchallenged. Assange would deny that Russia is behind the hacking, and prosecutors would have to try to prove it, using hard, admissible courtroom proof — not top-secret sources who cannot be called as witnesses without blowing their cover, or other information that might be reliable enough to support an intelligence finding but would be inadmissible under courtroom due-process standards. If the prosecutors were unable to establish Russia’s guilt to a jury’s satisfaction, it would be a tremendous propaganda victory for the Kremlin, even if — as I believe — Russia is actually guilty.This is part of why it was a mistake to indict the Russian intelligence officers. An indictment is never an authoritative statement; it is just an allegation, it proves nothing. We didn’t need it to know what happened here. The indictment says nothing significant that we were not already told by the intelligence agencies’ assessment released to the public in January 2017.Adversary countries are a security challenge, not a law-enforcement problem. Because they don’t have to surrender their officials for an American trial, an indictment is a pointless gesture. But now, having with great fanfare filed charges against Russia that implicate Assange, the government shrinks from lodging these same charges against Assange — who, unlike the indicted Russian officials, may be in a position to put the government to its burden of proof. This just makes Mueller’s indictment of Russians look more like a publicity stunt than a serious allegation. If the government is afraid to try the allegations against Russia in court, people will naturally suspect the allegations are hype.Meanwhile, let us remember: Despite a dearth of evidence that he was complicit in Moscow’s hacking, President Trump was forced by the Justice Department and the FBI, urged on by congressional Democrats, to endure a two-year investigation and to govern under a cloud of suspicion that he was an agent of the Kremlin. Now we have Assange, as to whom there is indisputable evidence of complicity in the hacking conspiracy, but the Justice Department declines to charge him with it — instead, positing the dubious Manning conspiracy that may very well be time-barred.What is going on here?



           Comment on Mexico’s First Automobile: DM Nacional – Custom, Sports and Sport Custom Cars by FreeTzin       Comment   Translate Page      
I understand Geoffrey Hacker owns the 1950 Chrysler Imperial Sedanca (or Landau), the only known remaining example of DM Nacional coachbuilt automobiles, and began restoring it in November, 2017 Could we please have an update on the progress of the restoration, and if possible, some photos? I would most definitely love to see that…
          6 things you should do to protect yourself from hackers (but probably won’t)      Comment   Translate Page      

Hackers are glorified on television for the sake of entertainment value, making a spectacle out of coding activity and what it actually takes to break through a firewall. Sure, hackers on TV are pretty impressive (Hello, Mr. Robot) and they often depict real life circumstances in which femtocells and malwares are deployed with malicious intent. However, at the end of any Mr. Robot episode, it’s important to identify the series’ most useful takeaway; in real life, hackers pose serious threats to the details we digitally store on our personal devices. It’s not just about using the strongest passwords we can…

This story continues at The Next Web

          Microsoft meldet Hackerangriff auf E-Mail-Dienst Outlook      Comment   Translate Page      
Hacker haben einen Zugang zu einer Reihe von Accounts im E-Mail-Dienst Outlook bekommen. Das teilte das Portal „The Verge“ am Sonntag unter Berufung auf eine Mitteilung des US-Softwareherstellers Microsoft mit.
          Growth Hacker - SmartboxTV - Santiago, Norte de Santander      Comment   Translate Page      
Una plataforma SaaS completamente automatizada para crear negocios de video para la industria OTT. Nunchee es la forma más fácil y rápida para que cualquier...
De Get on Board - Fri, 12 Apr 2019 17:25:23 GMT - Ver todos: empleos en Santiago, Norte de Santander
          Három hónapon keresztül fértek hozzá illetéktelenek Microsoft által kezelt e-mail fiókok adataihoz      Comment   Translate Page      

Részletek az érintett fiókok tulajdonosait értesítő Microsoft-levélben.


          Ломаем стереотипы      Comment   Translate Page      
none
          Vita�s Lost Games � A Look at the Digital Future      Comment   Translate Page      

Ever since the advent of full-game downloads on consoles, it seems the market has slowly been shifting towards a digital future where games are delivered through internet connections rather than physical disks. While the convenience this brings is undeniable, and plenty of gamers have embraced having a stuffed memory card in their Vita, there are major pitfalls that are slowly beginning to show, one of which is that games can be delisted without any prior warning, leaving them lost to time unless you bought them before they disappeared.

It’s these that I’m aiming to examine in this article - games which have been removed from the PlayStation Store, both those that are digital-only (meaning they’re gone forever) and those that have physical releases that you’ll need to hunt down. Why have they been delisted and what does this mean for the Vita’s digital future?

 

Digital Delisted Games With Physical Releases

Of course, the best case scenario for the games that will be featured in an article like this are those that have had both physical and digital releases, because this means that although they’ve been removed from digital storefronts you can still hunt down a physical copy, so you're not completely out of options.

Sadly, some of these have become hugely pricey as time has gone on, the main offenders being anime licensed titles from Bandai-Namco like A.W. Phoenix Festa and Digimon Story: Cyber SleuthBoth of these received physical English releases in Asia, meaning you can still get them, but prices are insanely high for both – Digimon regularly fetches upwards of $90/£90 on eBay, while Asterisk War is commanding more like $250/£250. Others, like Dragon Ball Z: Battle of ZJ-Stars Victory Vs+One Piece Pirate Warriors 3, and One Piece Unlimited World Red also received physical releases in Europe, making them slightly easier to hunt down, but even for these titles prices are only going to increase as time goes on.

Given the aforementioned titles' sudden disappearance from digital storefronts, I would also be on alert for other anime games suddenly disappearing from the store without notice. Things like Digimon Story: Cyber Sleuth – Hacker’s Memory and Mobile Suit Gundam: Extreme Vs Force could well be next. Again, Asian-English physical versions are available for both, but with cart production ceasing this year these are only going to get rarer and rarer.

Licensing is a common issue among delisted titles. The Marvel licence in particular seems to be problematic. This means games like The Amazing Spider-Man and Ultimate Marvel vs. Capcom 3 are long gone (sadly so too is the DLC for the latter, a problem which has also affected LittleBigPlanet as it offered Marvel-themed DLC), and so too is Disney Infinity 2.0: Marvel’s Super Heroes. Speaking of Disney, its Star Wars IP formed part of Angry Birds Star Warswhich is now delisted, but so too is the Angry Birds Trilogy. This is a bit baffling since they were both originally mobile titles. Disney also licensed Epic Mickey 2: The Power of Two to Sony and this can only be played via a now-expensive physical release.

A similar thing happened with both LEGO Lord of the Rings and LEGO The Hobbitwith both disappearing mostly overnight from all digital storefronts, not just Vita. Thankfully, pre-owned physical copies can be found at fairly cheap prices; something also true of Virtua Tennis 4: World Tour (although prices are starting to creep up). Speaking of sports titles, all three of the four FIFA games have been delisted, with only FIFA ’15 remaining (surely a ploy to get you to buy the most recent version, although it barely matters since they all play the same). Football Manager Classic 2014 is also gone too, despite some of the PSP Champion Manager games still being up!

The SpongeBob licence also seems to have expired for publisher Activision, meaning SpongeBob Heropants is gone and physical copies are beginning to shoot up in price, despite the game being a bit of a dud. Three more games which can’t be picked up for a reasonable amount anymore are Ben 10: Galactic Racing, Shinobido 2: Revenge of Zen, and New Little King’s Story, the latter of which only got a physical English release in Europe and Asia, meaning it's pretty rare and getting rarer by the day. WRC3 on the other hand is delisted but easy enough to find. Whether you should or not is another matter, given it’s effectively obsolete with the much better WRC4 having released.

Oddly, despite being produced by mobile gaming giant Gameloft, Asphalt Injection and Dungeon Hunter Alliance have been delisted on Vita. The former sort of makes sense because it includes licensed vehicles, but the latter is baffling considering the PS3 version is still available. Perhaps it has something to do with Ubisoft publishing the Vita ports, which caused some kind of contractual issue (Ubisoft’s licensed rhythm game Michael Jackson: The Experience is also gone).

 

Digital Delisted Games Without Physical Releases

The other key class of games here is, of course, those that only received digital releases and had no physical counterparts, meaning they’re lost forever if you didn’t grab them while they were up on the store.

The one semi-exception to this rule is Adventure Time: Secret of the Nameless Kingdomwhich oddly received a physical release in Japan but not the west. Sadly, this physical version does not include any English text, making it a fairly useless import unless you want to muddle through. Thankfully, the developers warned of the delisting in advance and even sold the game for $0.99 for its final few weeks, meaning it was easy to grab as long as you had a PlayStation Network account.

Other titles weren’t so lucky. For example, games like Sony’s music festival simulation BigFest disappeared once its online servers went down, even though the game is still fully playable without them. Duke Nukem 3D: Megaton Edition is a title that went without much warning too, likely due to an upcoming PS4/XB1 port, which meant that publisher Gearbox didn’t want gamers playing the older version (oddly it contained slightly more content than the newer release).

One of the first games to be delisted that really made headlines was Plants vs. Zombies, one of the console’s western launch titles that was a shining example of digital distribution done right... until it mysteriously vanished from the store without warning (likely to do with the licence given to Sony Online Entertainment expiring). Another game that received a surprising amount of attention for its delisting was The Pinball Arcadewhich lost a large number of its tables (offered through DLC) late last year, effectively gutting it in terms of content.

Less fanfare was made about the disappearance of things like Jazz: Trump’s Journey (I didn’t realise it myself until randomly browsing the other day. The loss of this one is a shame as it was highly recommended by a user on a forum I browse) and Superfrog HDboth of which had no real reason for being removed given they’re self-published indie titles. They go to show the volatility of the digital-only future.

The biggest offender in this regard is the whole of PlayStation Mobile, though – a now-defunct service which allowed developers to create small games for a nominal fee and put them up on the cluttered PSM Store. The whole initiative was shut down in 2015 and, worse still, you can’t actually re-download any of these titles anymore, meaning games like Forevolution, Rymdkapsel, Sword of Rapierand Tokyo Jungle Mobile are potentially lost forever (I have the games on my OLED Vita, which is probably going to die at some point, and then they’ll be gone for good for me).

 

Free-to-Play Games

The final group of games I want to touch on here are free-to-play titles, which rely on micro-transactions to stay viable, meaning that once the servers go down the games go down with them – a terrible result for those of us who want to preserve titles we love into the future.

The main one that stands out for me is Invokers TournamentVita’s first and only MOBA. Although it’s not gone yet (server shutdown is the 15th of May), there’s only a month and a half left to play it. It’s not the best game, but I still enjoyed my time with it and would recommend people try it out for something different on the handheld. In fact, Sony-published F2P titles have a habit of disappearing. Destiny of Spirits went down less than a year after being released, Ecolibrium is being shutdown in May alongside Invokers Tournament, and Fat Princess: Piece of Cake was swiftly removed from the store too. I feel like it’s only a matter of time until Run Sackboy! Run! is gone, so if you’ve ever been tempted to try it out the time is now.

A few third-party developers also tried their hands at the F2P market. One of the strangest was Square-Enix’s effort with Deadman’s Cross, a shooter mixed with a card game that seemingly didn’t do very well as it was shut down within a yearTreasures of Montezuma Blitz seemed to last a lot longer, but sadly even that’s gone now too (I don’t even remember hearing about it being removed).

One of my biggest regrets with Vita gaming was not getting a Japanese account sooner, as there were a tonne of fun-looking F2P titles on the Japanese store that are now long gone. Did you know, for example, that there was a crossover card game from Compile Heart named NepNep Connect: Chaos Chanpuru which mixed in characters from a variety of its Vita titles, including Monster MonpieceNeptunia and Trillion? Well, it’s delisted now, alongside things like Picotto Knights, a side-scrolling brawler from GungHo, Tri-Ace’s cover-shooter card game Judas Codeand both Chain Chronicle V and Samurai & Dragons from SEGA.

Square-Enix also released a new entry in its Mana series, entitled Rise of Mana, which was supposedly pretty well received, but the service was shut down in 2016 (apparently Square-Enix is looking to re-tool the game as something else, but that seems unlikely at this point and it definitely won’t be for Vita). Two Gundam games – Gundam Conquest V and Mobile Suit Gundam: Battle Fortress - were also released in the region but went before I had chance to try them out. The fact these titles all disappeared so quickly means I’m probably going to have to hurry up if I want to play things like the Yakuza F2P spin-offs on the Japanese store, before they’re gone for good too.

 

Conclusion

As you might have gathered from the tone of this article, I’m a massive advocate of physical media, because it gives me the opportunity to preserve my games. I’m still planning on playing my Vita for years to come and having a copy I can put in a drawer to come back to later means I don’t have to rush to grab things before they’re gone. Sure, physical carts won’t last forever either (although they don’t suffer from disc rot, there are other problems with flash memory), but they at least offer a better solution.

The financial advantages of digital distribution mean we’re seeing more and more games opt for this route. Many indie titles wouldn’t be possible if physical production was the only way to release, for example. But it also means we’re at risk of seeing many more games lost to time. My only advice on this matter is to make sure that you don’t wait too long to buy something if you’re interested, especially if there’s some kind of licence involved (the recent news about Driveclub is a fantastic example of that).

Thankfully, there are companies out there like Limited Run Games that are working hard to preserve games (even if they’re not always entirely succeeding, with things like Night Trap being full of bugs and Ys Origin launching without the patch on the cart), so there are more physical options than ever before. Vita’s digital future has offered many advantages, but I'm certainly glad that carts exist and I’ll be playing mine for years to come.

Full Article - http://www.vgchartz.com/article/436943/vitas-lost-gamesa-look-at-the-digital-future/


          Internet Explorer security flaw allows hackers to steal files      Comment   Translate Page      
Microsoft’s Internet Explorer has a longstanding reputation for poor security, but it’s now bad enough that you could be attacked Leer mas Via:: Engadget
           Comment on portada by rental       Comment   Translate Page      
Howdy! Do you know if they make any plugins to safeguard against hackers? I'm kinda paranoid about losing everything I've worked hard on. Any suggestions?
           Comment on 122_2254 by social media marketing agencies       Comment   Translate Page      
Hello there! Do you know if they make any plugins to safeguard against hackers? I'm kinda paranoid about losing everything I've worked hard on. Any suggestions?
          7 crimes that shook the world of retail      Comment   Translate Page      

Target

  • Retail crime is ubiquitous.
  • But some cases prove to be more eye-catching than others.
  • From an airport iPad heist to a one-woman jewelry thief, here are some standout cases of retail crime.

Retail crime is on the rise.

In 2018, the National Retail Federation estimated that losses from organized retail crime were at "an all time high." The organization estimated that this form of crime costs the industry $777,877 per $1 billion in sales.

Read more: 'Serial returners' are on the rise — and it's causing headaches for retailers like Walmart and Target

But some cases prove to be a bit more shocking than others.

Whether they involved sensational circumstances or a massive haul of millions of dollars, here are seven retail crimes that shook up the whole industry:

A couple was accused of robbing Safeway of $5 million.

ABC reported that Richard Remington and Angela Evans were accused of nicking $5 million worth of goods from different Oregon Safeway stores in 2011. Together, the couple was reportedly seen stealing on camera 178 times.

Cops arrested the pair after a store loss-prevention officer placed a tracking device on their car, according to the Oregonian.



A Stop & Shop owner was charged with using his store to launder millions.

Abduhl Sulaiman owned a Stop & Shop in Lexington, Kentucky, but in 2008 he was arrested on charges that he contributed to an illegal retail scheme.

Authorities concluded that Sulaiman also laundered money for a retail theft ring posing as a Kentucky business called Alpha Trading, according to the Lexington Herald Leader.

According to Retail Info Systems, Sulaiman laundered $60 million through his store.



Robbers made off with thousands of tablets at JFK.

Thieves reportedly made off with thousands of iPads using an airport forklift at John F. Kennedy Airport on November 12, 2012.

And it could have been an inside job. The New York Post reported that the FBI arrested a JFK employee after they learned he had allegedly made "suspicious inquiries to coworkers about the gadget shipment."

Complex reported that the heist scored robbers $1.9 million worth of iPad Minis.



See the rest of the story at INSIDER
          Microsoft webmail services breached by hackers with support agent's credentials      Comment   Translate Page      
Microsoft's web-based email services were the target of a security beach. Using a customer support agent's credentials, hackers were...
          Thacker, Wanda L.      Comment   Translate Page      
66, died Thurs. April 11, 2019. Services 2PM Mon. Newnam Funeral Home. Visit 12-2PM Mon. newnamfuneralhome.com
          Ecuador denuncia ataques informáticos tras el retiro del asilo a Assange      Comment   Translate Page      
Quito, Ecuador. Ecuador, que retiró el asilo al fundador de WikiLeaks, Julian Assange, denunció haber sufrido ataques informáticos, sin que estos hayan afectado portales del gobierno central. “Han logrado intervenir un correo institucional y una página de un municipio”, señaló la ministra del Interior, María Paula Romo, en su cuenta en Twitter sin señalar posibles […]
          Estadía de Assange en embajada de Ecuador: ropa interior, patineta y botones de pánico      Comment   Translate Page      

Julian Assange - Embajada de Ecuador en Londres Foto Reuters

La decisión de Ecuador de acabar el jueves abruptamente con siete años de asilo de Julian Assange en su embajada de Londres fue producto de un largo deterioro de las relaciones, en parte por las sospechas de que estaba alentando en secreto acusaciones de corrupción contra el presidente Lenín Moreno.

 

La policía británica arrestó el jueves al australiano, quien buscó asilo en la misión diplomática durante el gobierno del expresidente Rafael Correa, quien veía en Assange a un héroe que filtró documentos secretos de Estados Unidos.

 

En contraste, Moreno tenía una opinión menos favorable de Assange cuando asumió el cargo en 2017 y ordenó al hacker australiano que redujera sus comentarios políticos, dejara de montar su patineta en los pasillos de la embajada y limpiara los desechos de James, el gato que adoptó como mascota.

 

La gota que rebalsó el vaso parece haber sido la aparición de un sitio web anónimo que acusó a la familia de Moreno de crear compañías offshore y de usarlas para vivir un estilo de vida lujoso en Europa mientras se desempeñaba como delegado especial de la ONU para discapacidades, acusaciones que el presidente ha negado.

 

Los materiales filtrados, apodados los "INApapers", contenían fotografías privadas de Moreno y su familia. Después de que se difundieran, Moreno dijo que Assange no tenía derecho a "hackear cuentas privadas y teléfonos" sin acusarlo directamente.

 

WikiLeaks twitteó sobre los informes pero, en mensajes y declaraciones a Reuters, negó rotundamente que Assange fuera responsable de las filtraciones o tuviera algo que ver con su publicación inicial.

Julian Assange - Embajada de Ecuador en Londres Foto Reuters

EL COMPORTAMIENTO EN LA EMBAJADA

Funcionarios del gobierno ecuatoriano describieron públicamente el jueves lo que calificaron como un comportamiento inaceptable e ingrato de Assange en la embajada. Quito ha dicho que gastó 6,2 millones de dólares en su manutención y seguridad entre 2012 y 2018.

 

El ministro de Relaciones Exteriores, José Valencia, dijo que Assange había estado usando un teléfono móvil que no estaba registrado en la embajada y que le había advertido al embajador en enero que había instalado botones de pánico que activaría si consideraba que su vida corría peligro.

 

"Es extraño que el señor Assange haya insistido en ser la víctima", dijo Valencia a la Asamblea Nacional de Ecuador.

 

La ministra del interior, María Paula Romo, comentó a reporteros que a Assange se le había "permitido hacer cosas como poner heces en las paredes de la embajada y otros comportamientos de esa naturaleza".

 

Valencia dijo a la Asamblea que el personal de limpieza de la embajada describió una "conducta higiénica inadecuada" durante la estadía de Assange, y agregó que un abogado que representa a Assange había atribuido el problema a "problemas estomacales".

 

"Ha puesto heces fecales en nuestra casa, ha golpeado a nuestros guardias, a la gente de Ecuador, ha dicho que el Ecuador es -no quiero repetirles la palabra- pero además que es un país insignificante en el mundo, eso es lo que éramos para él", dijo Moreno en un acto público en una ciudad al sur de Quito.

 

"Le hemos quitado el asilo a este malcriado y ventajosamente nos hemos librado una piedra en el zapato", agregó.

 

Abogados de Assange no respondieron a solicitudes de comentarios. Vaughan Smith, un amigo de Assange y fundador del Frontline Club de la prensa de Londres, dijo a Reuters que lo visitó la semana pasada y que creía que la afirmación de las heces era falsa.

 

"Julian ha estado bajo estrés pero parecía estar en un estado mental balanceado cada vez que lo ví", dijo Smith.

Detención de Julian Assange en Londres (Reuters)

REUTERS

CAMBIOS DE PERSONAL

Amigos de Assange que lo visitaron durante los últimos meses dijeron que desde que Moreno llegó a la presidencia, casi todo el personal de la embajada fue reemplazado.

 

La cancillería nombró a un nuevo embajador después de que Moreno asumió y despidió a un funcionario, Fidel Narváez, que era considerado cercano a Assange.

 

Los empleados de la embajada habían sido amables con Assange durante la presidencia de Correa. En cambio, los nuevos diplomáticos de Moreno fueron educados con los visitantes pero hostiles con Assange, agregaron sus amigos.

 

En febrero, el embajador le envió a Assange un memorando quejándose de que había "mostrado una vez más un comportamiento inaceptable" al escuchar la radio con el volumen alto mientras se reunía con sus visitas. "Esta acción perturbó el trabajo que estaba realizando la embajada", dijo.

 

A principios de febrero, según memorandos del gobierno ecuatoriano divulgados por partidarios de Assange, Ecuador se quejó con Assange de que había apuntado deliberadamente una lámpara de estudio a una cámara de seguridad instalados en una habitación donde Assange estaba con visitantes.

 

Más tarde, ese mismo mes, el embajador le envió a Assange un memo quejándose de que había "mostrado una vez más un comportamiento inaceptable" al subir el volumen de una radio mientras se reunía con los visitantes. "Esta acción perturbó el trabajo que estaba realizando la embajada", dijo el embajador.

 

Assange se había refugiado en la embajada en 2012 para evitar la extradición a Suecia por una investigación de agresión sexual que luego fue desestimada.

 

Funcionarios de Estados Unidos anunciaron el jueves después de su arresto que había sido acusado de conspiración para cometer una intrusión en la computadora, allanando el camino para su extradición.

 

Correa, en una entrevista con Reuters en Bruselas, dijo que Moreno le había entregado a Assange "a sus verdugos".

 

Cuando se le preguntó si había trabajado con Wikileaks para filtrar los "INApapers", no respondió directamente. Dijo que los documentos mostraban la "podredumbre" dentro de la familia de Moreno.

 

"Me disculpo en nombre del pueblo ecuatoriano. Un gobierno así, un presidente tan traicionero y traidor, no nos representa", dijo Correa.

 

Valencia se negó a comentar las críticas sobre Moreno.

 

Correa está involucrado en una batalla legal con fiscales que investigan un caso relacionado con el secuestro en 2012 de un legislador de la oposición.

 

Un tribunal en Ecuador el año pasado le ordenó su prisión preventiva en espera de un juicio y emitió una orden de arresto internacional. Correa niega el cargo.

 


          ¿Realmente te espía (y para qué) el micrófono de tu teléfono?      Comment   Translate Page      
Las empresas recaban nuestros datos con propósitos comerciales, pero al almacenarlos ponen en peligro nuestra privacidad. Son los hackers quienes están al acecho.
          Опрос: кто займёт Железный трон в «Игре престолов»?      Comment   Translate Page      
Делитесь своим мнением, а после окончания сезона проверим, кто же оказался прав.
          10 кулинарных привычек, которые могут стоить вам здоровья      Comment   Translate Page      
Проверьте, совершаете ли вы эти распространённые ошибки, когда готовите.
          ТЕСТ: Кто вы из «Игры престолов»?      Comment   Translate Page      
Во вселенной сериала «Игра престолов» множество разных персонажей: храбрецы и малодушные трусы, мудрые правители и жестокие тираны, гиганты и шустрые карлики. Мы составили тест, который поможет определить, кем из героев саги вы могли бы стать. Проходите его скорее, чтобы узнать свою сериальную судьбу.
          Как удалить Internet Explorer из Windows 10      Comment   Translate Page      
Как удалить Internet Explorer из Windows 10Всё равно браузер бесполезен, и даже Microsoft от него отказалась.
          Textify позволяет копировать текст из диалоговых окон Windows      Comment   Translate Page      
Textify позволяет копировать текст из диалоговых окон WindowsС ним вам больше не придётся вручную перепечатывать коды ошибок в строку поиска Google.
          20 недорогих, но стильных вещей на каждый день для мужчин и женщин      Comment   Translate Page      
Худи, футболки, топы и платья от 100 рублей. Практичная одежда для тех, кто любит часто обновлять гардероб.
          Internet Explorer exploit lets hackers steal your data even if you never use it      Comment   Translate Page      
TwitterFacebook

Finally stopped using Internet Explorer? Good! But, now it’s time to completely delete it from your computer, too.

Security researcher John Page has discovered a new security flaw that allows hackers to steal Windows users’ data thanks to Internet Explorer. The craziest part: Windows users don’t ever even have to open the now-obsolete web browser for malicious actors to use the exploit. It just needs to exist on their computer.

“Internet Explorer is vulnerable to XML External Entity attack if a user opens a specially crafted .MHT file locally,” writes Page. “This can allow remote attackers to potentially exfiltrate Local files and conduct remote reconnaissance on locally installed Program version information.” Read more...

More about Microsoft, Cybersecurity, Hacking, Pc, and Windows 10
          There's a better way to cover your webcam (and 3-packs start at $26)      Comment   Translate Page      
TwitterFacebook

The jury is still out on whether Mark Zuckerberg will make good on his promise of elevating his commitment to protecting Facebook users' privacy, but we're fairly certain that the tech mogul knows a thing or two about safeguarding his own privacy.

A couple of years ago, the wealthiest millennial in the world inadvertently let slip that he performs a DIY trick to prevent hackers from spying on his computer: He covers his webcam and microphone with tape.

Thanks to Zuck, what was once something that was practiced only by conspiracy theorists has been adopted by millions of people, including former FBI Director James Comey and the Pope. Even Edward Snowden, the infamous NSA whistleblower who is knowledgeable about surveillance, strongly suggests that you do the same. Read more...

More about Cybersecurity, Mashable Shopping, Shopping Stackcommerce, Webcam Safety, and Webcam Covers

          Hackers Were Able To Access Some Outlook.com Accounts For Months      Comment   Translate Page      
none
          Passbolt, un gestor de contraseñas gratuito, de código libre, autoalojado y OpenPGP pensado para equipos de trabajo      Comment   Translate Page      

Passbolt, un gestor de contraseñas gratuito, de código libre, autoalojado y OpenPGP pensado para equipos de trabajo#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F2019_04_14%2F663268

Todos, o la amplia mayoría, sabemos lo que es un gestor de contraseñas: un programa o aplicación que se utiliza para almacenar contraseñas, además de otros datos, ayudándonos generalmente en su gestión y creación. Una de las mejores soluciones existentes para proteger todas nuestras cuentas de usuario sin tener que recordar las mil y una contraseñas diferentes que deberíamos manejar.

Es por estas razones que estos servicios han proliferado de forma tan notable durante los últimos años diferenciándose, muchos de ellos, por rasgos que los hacen únicos respecto a la feroz competencia que los rodea. Algo que no es fácil de conseguir. ¿Un ejemplo? Passbolt.

De código abierto, extensible y para equipos

Https Help Passbolt Com Assets Img Diagrams Howitworks Svg Google Chrome 2019 04 12 18 46 08 Proceso de compartición de una contraseña en Passbolt.

Passbolt podría ser un administrador de contraseñas más, sin nada especial. Pero tiene varios atributos, muy bien comunicados, que lo distinguen del resto y lo colocan en una posición favorable a la hora de ser escogido.

¿Por qué? Porque es un gestor de contraseñas gratuito (aunque también se encuentran disponibles opciones de pago) y de código abierto que permite a los miembros de un equipo almacenar y compartir credenciales de forma segura. Por citar los mismos ejemplos de los que hablan sus responsables, podemos compartir la contraseña wifi de la oficina, la contraseña del administrador del router o la contraseña de la cuenta de Twitter de la empresa.

Y todo lo podemos hacer desde este servicio, como bien demuestra la demo.

"Passbolt está diseñado principalmente para equipos y no para individuos"

En Passbolt se preocupan mucho de resaltar estas cualidades porque, como bien dicen, gran parte de las soluciones para gestionar y administrar contraseñas "se centran en las necesidades personales", mientras que Passbolt "está diseñado principalmente para equipos y no para individuos; lo construimos teniendo en cuenta las necesidades de las pequeñas y medianas empresas". No obstante, también animan a usarlo de forma personal.

A este principal atributo, Passbolt suma otros atractivos: opción de ejecutarlo en servidores propios, posibilidad de personalizarlo para servir a necesidades particulares, disponibilidad de API, empleo de estándares de seguridad abiertos, minuciosidad a la hora de construirlo y empleo de OpenPGP, el estándar de encriptación de correo electrónico más utilizado.

También te recomendamos

Ghidra, la poderosa herramienta de ingeniería inversa de la NSA, ahora es open source y está disponible para Windows, Linux y macOS

Descarga más de 1000 iconos gratuitos y open source para usar en cualquier proyecto

Estas son todas las muertes que habrías sufrido sin tecnología

-
La noticia Passbolt, un gestor de contraseñas gratuito, de código libre, autoalojado y OpenPGP pensado para equipos de trabajo fue publicada originalmente en Genbeta por Toni Castillo .


          Theresa May ligner Jim Hacker      Comment   Translate Page      
none
          Microsoft: “Hackers konden maandenlang meekijken in mailbox van sommige Outlook-accounts”      Comment   Translate Page      
Microsoft heeft bekendgemaakt dat hackers mogelijk maandenlang toegang hadden tot bepaalde Outlook-accounts. Cybercriminelen konden meekijken in de...
          Review: Disaronno Amaretto      Comment   Translate Page      

One can’t get far in the drinking world without encountering the iconic Disaronno bottle. Disaronno brands its almond liqueur as not just the best amaretto around but “the world’s favorite Italian liqueur,” and the product has become an endemic part of the drinking world. Why, the first drink I had when I turned 21 was […]

The post Review: Disaronno Amaretto appeared first on Drinkhacker: The Insider's Guide to Good Drinking.


          Hackers Publish Sensitive Personal Information Belonging To 4,000 Federal Agents      Comment   Translate Page      

In one of the biggest and potentially most threatening hacks since the Obama-era 2015 OPM breach, a group of hackers believed to be based in Ukraine has published sensitive personal information of 4,000 FBI agents after infiltrating three chapters of the FBI National Academy Association.

The group, which corresponded with TechCrunch via an encrypted chat, says it is 'structuring' data belonging to employees across several federal law enforcement agencies, and is planning to package the information for sale. When asked if the information could put lives of federal employees at risk, one of the hackers replied: "Probably. yes."

FBI

The information posted online included data belonging to 4,000 FBI employees, Secret Service agents, Capitol Police and US Park Police.

The FBI National Academy Associates said in a statement to TechCrunch that the information, posted late Thursday, appears to come from the websites of three local chapters of the nonprofit FBINIAA, which has nearly 17,000 members nationwide and is active in 174 countries.

"We believe we have identified the three affected Chapters that have been hacked and they are currently working on checking the breach with their data security authorities," the organization said.

One of the purported hackers told TC that the organization has hacked "more than 1,000 sites" and that "soon they [the data] will be sold."

“We hacked more than 1,000 sites,” said the hacker. "Now we are structuring all the data, and soon they will be sold. I think something else will publish from the list of hacked government sites."

We'd imagine there are a host of criminal organizations and foreign governments who might be interested in purchasing the data. The hackers said they published some of the data to prove to any potential customers that they had something "interesting."

During their correspondence with TechCrunch, the hackers sent a chilling message to prove that they had seized a website belonging to one FBINAA chapter. They also sent proof that they had infiltrated sites belonging to other organizations, including the Taiwan-based manufacturing giant Foxconn.

Unprompted, the hacker sent a link to another FBINAA chapter website they claimed to have hacked. When we opened the page in a Tor browser session, the website had been defaced - prominently displaying a screenshot of the encrypted chat moments earlier.

The hacker - one of more than ten, they said - used public exploits, indicating that many of the websites they hit weren’t up-to-date and had outdated plugins.

In the encrypted chat, the hacker also provided evidence of other breached websites, including a subdomain belonging to manufacturing giant Foxconn.

One of the links provided did not need a username or a password but revealed the back-end to a Lotus-based webmail system containing thousands of employee records, including email addresses and phone numbers.

When asked why they did it, the hacker told TC: "Experience and money."


           Comment on On Metamodernism and The Listening Society by Decentered Podcast 026 – Exploring Citizens Media – Decentered Media       Comment   Translate Page      
[…] suggsted that Hanzi Freinacht‘s suggestion in his book The Listening Society, that the politics of the future will be determined by Hippster, Hippies and Hackers is worth […]
          ‘Saturday Night Live’ Mocks Assange Arrest: ‘I’m An Actual James Bond Super villain’      Comment   Translate Page      
Corporate media trying to paint journalist as malicious hacker.
          Angriff - Microsoft: Hacker hatten monatelang Zugriff auf Outlook.com-Accounts      Comment   Translate Page      
Zugang bestand vom 1. Jänner bis zum 28. März – Einblick in Mail-Adressen der Kommunikationspartner und Ordner
          Comment on Birds of a feather By Rick Ed, Do.Better Business by instagram hacker      Comment   Translate Page      
Fastidious respond in return of this difficulty with real arguments and telling all concerning that.
          Long-form websites and typography      Comment   Translate Page      
Two curiously-related pieces of content were shared on Hacker News today.


          Hackers publican datos personales sobre miles de policías y agentes federales de EEUU      Comment   Translate Page      

Un grupo de piratas informáticos atacó varios sitios web afiliados al Buró Federal de Investigaciones (FBI) y ha subido sus contenidos a la web, incluidos docenas de archivos que contienen la información personal de miles de agentes federales y oficiales de la ley, según informa TechCrunch. Los piratas informáticos robaron datos de tres sitios asociados con la Asociación de la Academia Nacional del FBI (FBINAA), una coalición de diferentes capítulos en Estados Unidos que promueve el liderazgo y la capacitación a nivel federal y policial, en la

etiquetas: hackers, publican, datos personales, ee.uu

» noticia original (laopinion.com)


          "Se está hackeando directamente a los usuarios, tirando de egos y apetitos"      Comment   Translate Page      
Ángel Gómez de Ágreda, durante la entrevista con 'El HuffPost'.

70 años se cumplen en este 2019 de la publicación de 1984, el clásico de las distopías por antonomasia, la obra más conocida de George Orwell. Un relato que siempre ha parecido exagerado, imposible, aleccionador pero lejano, y que hoy casi estamos rozando con los dedos. La sobreexposición en las redes sociales, la falta de privacidad, el uso poco claro de nuestros datos, la manipulación informativa... Todo ello nos sitúa inquietantemente cerca del Gran Hermano. 

Ángel Gómez de Ágreda, coronel del Ejército del Aire, antiguo jefe de cooperación del Mando Conjunto de Ciberdefensa y representante español en el Centro de Excelencia de Cooperación en Ciberseguridad de la OTAN, acaba de publicar un “manual de supervivencia” para este mundo hiperconectado llamado precisamente Mundo Orwell (Ariel), en el que intenta radiografiar el nuevo tiempo y, sobre todo, dar consejos para enfrentarnos a él. Porque se puede. Hace falta, eso sí, poner de nuestra parte. 

¿Estamos ya en el mundo Orwell?

Estamos muy cerquita, con tecnologías que Orwell no se imaginó en ningún momento. Estamos muy cerca, más que de conectar todo, de controlar todo. Todo está ya prácticamente conectado, no sólo en el primer mundo, sino en casi todas partes, y de aquí a cuatro o cinco años estará conectado también hasta el último africano en la aldea más remota. Al mismo tiempo, todo estará controlado por el que lo conecta. El título del libro hace referencia al de Orwell pero quizá también estamos yendo al escenario de Aldous Huxley, aquel Un mundo feliz. Nos lo ponen todo muy fácil y nosotros vivimos muy felices renunciando a nuestra libertad y nuestra privacidad en aras de, simplemente, la comodidad.

¿El Ministerio de la Verdad de hoy es el teléfono móvil?

El móvil es uno de los instrumentos que tiene el Ministerio de la Verdad moderno, pero más bien el gran controlador son las redes sociales, que están detrás del acceso que tenemos muchas veces a la información. Por eso me parece tan trascendental el papel de los periodistas serios y de investigación, que no buscan vender titulares sino el contenido de la noticia, desmenuzarla y dar realmente información, no mensajes interesados. Las redes sociales, atribuyéndose la característica de no ser medios de comunicación, se quedan simplemente con la parte comercial, que les está dando muchísimo dinero con nuestros datos, pero no bajan a informar realmente y proporcionar elementos para ejercer la libertad por nuestra parte.

Aunque el dibujo del panorama es espeluznante, usted remarca que no quiere meter miedo, sino que busca prevenir. ¿Es buena o mala la tecnología?

No he escrito un manual de odio. La tecnología es útil y ahora mismo, sencillamente, ya no podemos renunciar a ella. Estamos teniendo una enorme cantidad de beneficios que nos están llegando día a día, en temas médicos, de movilidad, de comunicación… No seríamos capaces de aparcar todo lo que nos está dando. El problema es que nos hemos metido a utilizar esa tecnología antes de que haya una regulación y antes de que sepamos las consecuencias que tiene su uso. Dicho esto, creo que tienen un potencial tremendo. Lo peor que nos podría pasar en el ciberespacio es quedarnos fuera de él. Es la principal amenaza que tenemos, porque cualquier riesgo que podamos estar corriendo estando dentro es menor que renunciar a todas las ventajas que tiene.

Lo peor que nos podría pasar en el ciberespacio es quedarnos fuera de él. Es la principal amenaza que tenemos, porque cualquier riesgo que podamos estar corriendo estando dentro es menor que renunciar a todas las ventajas que tiene

Algoritmos, combinaciones, columnas de números… Usted defiende que eso es importante, pero avisa de que todo está, siempre, al servicio de una idea. 

Es que nos quedamos a veces con lo superficial, con el pánico a que nos roben la cuenta corriente, cuando en realidad las letras, que en código binario también se componen de números, forman palabras, y las palabras son las que mueven a pensar si eres más rico o más pobre, más que el hecho de tener más o menos dinero. Comento en la obra el cuento la camisa del hombre feliz: ese hombre que no tenía camisa, pero tampoco sabía que la necesitaba. A nosotros nos han creado la necesidad de tener una camisa o de tener un coche o el último modelo de teléfono y eso es lo que nos hace consumir y sentirnos felices o desgraciados en función de que poseamos eso o no lo poseamos. La generación de esas ideas y necesidades está ahí. Sí, los números son importantes, pero lo más importante al final es cómo pensamos y los valores que tenemos.

¿También se ha creado la necesidad de que tengamos que exponernos tanto en las redes?

En ese caso, es una necesidad que tenemos desde siempre. Lo que nos han dado es el mecanismo perfecto para que todo el mundo busque todos los días sus 15 minutos de gloria. El problema es que no sólo hay algoritmos y programas, sino que hay egoritmos que se han consolidado. Es una palabra que uso en un intento de ilustrar que, además de programas y tecnologías, hay personas. No sólo están recurriendo al hackeo de las redes, los números, las tecnologías, sino que muchas veces están hackeando directamente a los usuarios, tirando de los egos y apetitos que tenemos, del afán de comodidad que tenemos y que nos han vendido muy fácilmente con estos programas supuestamente gratuitos.

Acuña otro concepto que da escalofríos: la guerra “en” la gente. ¿Qué es eso?

La guerra ya ha dejado de ocurrir en el campo de batalla, lejos de los ciudadanos. Preocupó mucho hace unos años cuando los terroristas trajeron la guerra entre la gente y ya no te sentías seguro en ningún sitio más que en tu casa, encerrado, donde tenías la casi seguridad de que nadie te iba a hacer daño. Ahora la guerra se desarrolla dentro de cada uno de nosotros. No van a venir a matarte -aunque queda poco también para que eso se pueda hacer por medios informáticos-, pero lo que van a hacer es venir a cambiar la forma que tienes de pensar. Al final, en la guerra de lo que se trata es de cambiar la voluntad del adversario y aquí van a venir a cambiar tu forma de pensar dentro de tu cabeza, a través de las redes sociales, los buscadores o la información que te llega. Nos hemos convertido, nosotros, en un campo de batalla en el que están luchando empresas, estados, personas… y eso nos coloca en una posición similar a la del salvaje oeste: puedes correr, pero no esconderte, porque no hay dónde hacerlo.

No sólo están recurriendo al hackeo de las redes, los números, las tecnologías, sino que muchas veces están hackeando directamente a los usuarios, tirando de los egos y apetitos que tenemos, del afán de comodidad que tenemos y que nos han vendido muy fácilmente con estos programas supuestamente gratuitos

Habla del cambio de valores, identidades y concepciones que ha traído esta revolución pero, ¿dónde está nuestra labor de ciudadanos, la responsabilidad de ser conscientes? ¿Podemos tomar las riendas o es imposible?

Nos han puesto muy fácil convertirnos en ciudadanos consumistas, nada más, de los que se dejan hacer. Lo que hemos hecho ha sido dejar de comprometernos con el funcionamiento diario de la comunidad en la que vivimos, incluso con el de la familia. Dedicamos todo nuestro esfuerzo a ir consumiendo píldoras de información que no nos llevan a nada, pero ningún esfuerzo a profundizar en esa información y en crearnos nuestras propias ideas y valores. Al final, nos convertimos en carne de cañón, en consumidores pasivos de democracia, en la que no tenemos prácticamente nada que decir ni ganas que decirlo. Gritamos mucho, pero no decimos nada, por resumir. 

¿Qué papel jugamos los medios? 

En un momento dado de este proceso, también se han ido a lo cómodo, a lo fácil. Las redes son un mecanismo estupendo para distribuir información y la apuesta es clara: “pues vamos a subirnos al carro”. Pero se ha hecho sin daros cuenta de que eso lo que hacía era poneros en manos de las plataformas que distribuían esa información, que perdíais la auctoritas que han tenido los medios de haber tenido el tiempo de informarse, dedicar los recursos para profundizar en la noticia y dar una opinión formada. Yo no digo que los medios tengan que ser neutrales, no, cada uno debe tener su ideología; el problema es cuando nos quedamos en la superficie, metiéndonos ahí en las olas, sin profundizar nunca. Ya no es que tengamos una ideología u otra, es que no tenemos ninguna. Vamos a saber la temperatura que hace, sin enterarnos realmente de qué tiempo va a hacer.

Dice el periodista Miguel Ángel Aguilar que “en las inundaciones lo que falta primero es el agua potable”...

Tal cual. Es lo que llamamos la infoxicación, una intoxicación de información, muchas veces manipulada, que no nos dice realmente nada. Tenemos información por todas partes, pero no conocimiento. Ninguno.

Ahora la guerra se desarrolla dentro de cada uno de nosotros. No van a venir a matarte -aunque queda poco también para que eso se pueda hacer por medios informáticos-, pero lo que van a hacer es venir a cambiar la forma que tienes de pensar

 

Usted le da la vuelta a las famosas fake news, las noticias falsas, y habla de “falsas noticias”. ¿Por qué el matiz? 

Porque eso no es noticia, es otra cosa. Tiene el mismo formato que las noticias, pero al final de lo que se trata es de lanzar un mensaje interesado, de un publirreportaje al que le han quitado ese aviso obligatorio de decir que es un publirreportaje. Nos están colando una propaganda o publicidad en un formato de noticias, junto con otras noticias, para que al final nos quedemos con la credibilidad que aportan los medios y nos traguemos el relato como si fuera línea editorial.

Y también hay que hacer otra distinción esencial entre la línea editorial y las noticias. La primera refleja una postura, una opinión, mientras que las segundas deberían simplemente informar lo más asépticamente posible. Hemos desdibujado también esa separación entre opiniones y noticias, entre otras cosas porque hemos hecho que la verdad sea opinable. Hemos democratizado el concepto de verdad. Ahora ya simplemente por el hecho de tener suficientes seguidores que apoyen una visión pretendemos que algo se convierta en verdad, independientemente del grado de certeza que haya sobre el tema.

La manipulación ocupa un lugar importante en Mundo Orwell. Y surge, obviamente, el escándalo de la trama rusa en EEUU. ¿Se pueden manipular de verdad unas elecciones, se puede influir tanto en un resultado?

Todo se basa en la toma de decisiones. Sean electorales o no, los pasos se dan básicamente en función de los sentimientos. Cuando se sabe qué hilo controla qué reacción, es fácil tirar de uno o de otro para manejar la marioneta. El voto es libre y secreto en la teoría, pero en esas circunstancias se vuelve teledirigido. Estamos expuestos a la propaganda y las encuestas y a los mensajes que se mandan, por toneladas. Por ejemplo, hay equipos electorales que utilizan las llamadas granjas de trolls para dar mayor difusión a sus ideas y generar corrientes de opinión en las redes sociales, masivas. Miles de personas conectadas a distintas cuentas que pueden generar una polémica, una controversia, incitan a la confrontación y difunden bulos y rumores. El poder es enorme. 

Sean electorales o no, los pasos se dan básicamente en función de los sentimientos. Cuando se sabe qué hilo controla qué reacción, es fácil tirar de uno o de otro para manejar la marioneta. El voto es libre y secreto en la teoría, pero en esas circunstancias se vuelve teledirigido

Justo el Gobierno español ha p