IAM Consultant - The Herjavec Group - Canada   
Experience with J2EE technologies, scripting, directories, certificates (PKI), and encryption are highly desirable....
From The Herjavec Group - Wed, 17 May 2017 15:13:43 GMT - View all Canada jobs
          Offering data backup for clients!   

This is a really excellent idea, and a great way to expand your existing services, while adding some additional revenue to your business.

Most backup services offer many of the same features, when it comes to encryption and security.
And they all generally function in the same manner.

Where white label backup services really start to differentiate is with branding, licensing, pricing structure, storage costs, and most importantly support.

These are areas that will impact you the most in determining whether this is going to be sustainable and profitable.

WholesaleBackup provides 2 white label backup solutions.

You can host the backups yourself on your own server or choose to host the backups on inexpensive cloud storage from S3 or Google. Around 2 cents per Gig. Either way you own the storage and only pay the straight cost of the storage with no markups. This is significantly different, where others will force you into their storage and you pay higher storage rates to use the software.

WholesaleBackup allows you to fully brand the backup client no extra fees, no co-branding.

You also get a backup management web console where you monitor and manage all of your backup accounts in a central location.

With WholesaleBackup you pay only 3 dollars per client license ( starting at 50 seats) you can back up as much or little as you want and your licensing costs stay the same.

WholesaleBackup is a USA based company and the support team is responsive and lives in the US. All partnerships receive free unlimited support.

You can get started on a free trial, it only takes a few minutes to setup your own custom branded backup clients and start testing and deploying your own cloud backup services. https://wholesalebackup.com

Good luck!


          TrueCrypt 6.1   
  • Ability to encrypt a non-system partition without losing existing data on the partition (in…

Download | Version Info | Change log | Screenshots | System Requirements | Comments

          Orbital Coins - Orbitalcoins.com   
I am not Admin or Owner Of this Project


Program Description


Our company helps you to get an incredible high return on your investments. If you don't like to waste time and if you want to earn big money easy, this program is for you. To participate in our program you need only one thing. All you need is desire to get rich. Our professional financial team and financial advisers are always at your service. We will help you to earn easy way.

Company security

Orbital Works Enterprise Limited official website is secured and faithfull encryption hence all members data are secured and safe also the all deposit and withdraw from and to the website be safe ensured.

Orbitalcoins.com is highly secured by anti ddos protection of Genius guard , that ensure that every data of the website will be secured at very high level at anytime at any place Orbital Coins will be live and member can access their account anytime securely. From the very beginning we were devoted to our clients' success. So even if all you have is an original idea of starting a business of your dreams,we know how to get it started. Our support staff is working 24*7 week. feel free to contact us anytime for any question you have or any complex situation you are in, you are always welcome at Orbital Coins.

Investment Plans
6% daily forever
200% after 10 days
500% after 7 day

Payment Processors
Ok Pay

Goldcoders Licensed

Minimum Deposit

          In-trade - In-trade.biz   
Project start 14 June 2017

IPB Image

About project:
In-Trade is a legal company providing online investment services, using innovative trading strategies to obtain the maximum result in the world's largest stock, commodity and raw materials exchanges and on electronic exchanges, crypto-currencies. The company actively uses trading strategies in which not only algorithms for obtaining the maximum profit from the transaction are initially laid, but also absolute minimization of risks, due to unique formulas and the latest software that independently processes the information received from the exchange, analyzes it and gives relevant signals to traders. This is the basis for the successful business of the company and the foundation for creating the most favorable conditions for cooperation for both corporate and private investors from around the world.

Investment plans:
0.7% daily for 300 days
Min.deposit: 5.00$
Max.deposit: 1000.00$

Payment system: PerfectMoney, Payeer, AdvCash, BitCoin
Referral Commission: 7% - 2% - 1.5% - 1% - 0.5%

About server:
IP Address - 51 other sites hosted on this server
IP Location Belize - Belize - Belize City - Dancom Ltd
ASN Belize AS262254 DANCOM LTD, BZ (registered Dec 05, 2012)
Name Server: DNS1.YANDEX.NET
Name Server: DNS2.YANDEX.NET

Valid from May 28, 2017 to May 29, 2018
Serial Number: 06a3ac3b6af688793964fb35514d3a65
Signature Algorithm: sha256WithRSAEncryption
Issuer: COMODO RSA Domain Validation Secure Server CA


Our deposit:
Pay system : PerfectMoney
Date: 06/19/2017 14:11
Batch: 179557056
From: U1426715
To: U14280062
Amount: -50.25
Currency: USD
Memo: Sent Payment 50.00 USD to account U14280062. Memo: Shopping Cart Payment. Пополнение счета через PerfectMoney
          Hashcloud - Hashcloud.io   
I am not Admin/Owner.


About HashCloud
Welcome To Hash Cloud Limited!
The cryptocurrency industry is rapidly developing, acquiring more and more users around the world. Unusual payment instrument has been recognized as a useful tool for a profitable investment long ago. When choosing a reliable financial partner, turn your attention to our company. We offer the best conditions for trust management, which are based on the productive activity of our major centers for mining Bitcoin.

Technical base used by us, an extensive network of partner equipment and of course effective solutions applied for cooling mining equipment and energy saving allow us to provide a stable daily income of 1% to 7.5% on the basis of charges every 60 minutes' principal included. In addition, Hash Cloud Limited offers withdrawals at any time, as well as the instantaneous processing of all requests for withdrawal. If you are a novice user of cryptocurrency, our company will be loyal your loyal companion in the world of online high-yield investments.

Investment Plans:

BRONZE 365 1% Daily
Plan Spent Amount ($) Daily Profit (%)
BRONZE $10.00 - $5000.00 1.00

SILVER 60 days 3.0% Daily
Plan Spent Amount ($) Daily Profit (%)
SILVER $50.00 - $5000.00 3.00

GOLD 30 Days 5% Daily
Plan Spent Amount ($) Profit (%)
GOLD $5100.00 - $30000.00 150.00

DIAMOND 60 Days 7.5% Daily
Plan Spent Amount ($) Profit (%)
DIAMOND $10100.00 - $100000.00 450.00

Accepted Payment Processor: Bitcoin

Withdrawal Type: Instant

Referral Commission: 3%

* Lisenced Script
* SSL Encrypted
* DDoS Protection
* Dedicated Hosting

View and Join HashCloud here!
          Morrisons security guard turned ISIS fighter in Syria moans how ‘high life’ in terror capital Raqqa is over and rants about fleeing jihadis   
FORMER Morrisons security guard turned jihadi terrorist Omar Hussain is moaning how the ISIS “high-life” in its besieged capital in Syria is over The British fighter, using the name Abu Sa’eed Al-Britani, complained about terrorists running away from the city of Raqqa while ranting about the heat in Syria. Using the encrypted channel Telegram, Hussain moaned: […]
          Encryption - Why It Matters to You   
Five words or less(NewsUSA) - Sponsored News - Much ado has been made about encryption lately. And on some level, you probably understand it. Sort of. You might know, for instance, that the FBI and Apple have tangled over it. (Apple won.) Most large companies like Google and Facebook support Apple's position. And that encryption keeps your "stuff" safe from prying eyes. The problem is that the idea of privacy is just that these days -- an idea. "The way technology is woven into our daily lives, you can't do without it," Amy Danker, an employee at Epic Wines and Spirits, told the Oakland Tribune in a recent interview. "So what's your other option? Are you gonna go back to a pager? I just assume that all my private information is already available through my IP ad-dress. You don't even think privacy exists, because it doesn't anymore, right?" Natalie Plotnikova agrees, saying the arm of the law is getting too long. "I don't really like it," Plotnikova told the Oakland Tribune as she waited to be cleared through security at the Federal Building in San Jose. "I don't want the government to be able to use my phone to see my information." This, say experts, is why encryption is necessary and important -- especially in our current mobile, on-the-go environment, where everything you do is done on smartphones. By having your information scrambled so that only the person you are sending it to can see it, your privacy is maintained and your information remains secure. To that end, technology from a company called VirnetX -- which created an app called Gabriel, that uses encryption technology derived from a CIA national security program -- may be the answer. The Gabriel app, available at the Apple App Store or the Google Play Store, was designed and built with personal privacy and security as a foundational principle. For just $10 to $15 per year, users can take advantage of the Gabriel app and benefit from uncompromising encryption security when they talk, video chat, text, email or share photographs or documents. No one will be able to see, hear or intercept your communications except for the party you're in contact with because Gabriel does not transmit or store data with any third party. It's person-to-person, end-to-end encryption that all but eliminates hacking possibilities. Other benefits include: * Making free voice or video calls or sending instant messages to other Gabriel members. * Receiving spamless email. * Sharing pictures or files that can't be intercepted. For more information, or to download Gabriel, please visit www.gabrielsecure.com.
          Encryption Technology for Your Privacy   
Five words or less(NewsUSA) - Sponsored News - Encryption and controversy seem to go hand in hand lately in the technology community. Case in point: When The FBI sought to compel Apple to assist in unlocking a cell phone in the case of the San Bernardino shooter last December. Ultimately the FBI was denied its request by a California district court. This type of technology can be a gray area, yet one that tech companies take seriously. On the one hand, the government insists it needs access to technology in which crimes have been perpetrated, noting that encryption also allows terrorists to communicate in ways that agencies can't track -- all the while, using encryption to secure its own communication. Privacy advocates argue that if the government is using it, private citizens should be allowed to as well, without prying eyes looking over their collective shoulder. To that point, one company that has come down firmly on the side of citizens and their right to privacy is VirnetX. The software and technology company said it believes in personal privacy and that strong encryption is imperative in protecting those rights. VirnetX has been so focused on providing secure communications using encryption that it designed an app called Gabriel. Gabriel uses encryption technology derived from a CIA national security project, and is one of a kind. "Gabriel has been designed and built with personal privacy and security as a foundational principle," says Dr. Robert Short, VirnetX chief technical officer and chief scientist. To that end, the program currently provides uncompromising data security, which means that users do not have to transmit data to, or store data with, any third party, including VirnetX. Users can therefore have peace of mind that their data is stored only on their devices, be it phone, tablet or computer. Gabriel is a product unto itself and can be found in Apple's App store, the Google Play store or gabrielsecure.com. This set of integrated applications allows for secure messaging, secure voice and video calling, secure mail and secure file sharing -- all encrypted. Other benefits to using Gabriel's encrypted apps include: * Making free voice or video calls or sending instant messages to other Gabriel members in your network. * Receiving spamless email. * Allowing for person-to-person messages that disappear once the session has ended. * Sharing pictures or files that can't be intercepted. Gabriel transmits person-to-person with end-to-end encryption to further eliminate hacking possibilities. For more information or to download Gabriel, go to www.gabrielsecure.com.
          Think Your Data is Safe? Think Again   
Five words or less(NewsUSA) - Sponsored News - No matter who you are or what business you are in, you're vulnerable to a cyber attack. That's the unfortunate reality of the times we live in. Think you're immune? There are millions of cyberattacks in the United States every year, with big companies like Home Depot, Adobe Systems, Sony, Citigroup, Target, Facebook, Evernote and The New York Times taking the biggest hits and falling victim. And like Fortune 500 companies that seemingly have the resources to battle data breaches, small businesses are just as exposed, if not more so. According to a Verizon Data Breach Investigations Report more than 70 percent of the businesses in the study that were breached had fewer than 100 employees. Those breaches result in huge losses. Trend Micro found that "cybercriminals steal as much as $1 billion a year from SMBs in the United States and Europe, alone." Which begs the question: If both large and small companies and the U.S. government can be compromised (even with security protocols in place), then what does that mean for individuals? It's a question that Dr. Robert Short, chief technology officer and chief technical scientist of VirnetX, struggled with and finally answered in the form of Gabriel, a set of secure encrypted communication apps derived from a CIA-sponsored Department of Defense project. "The genesis of Gabriel really was trying to solve the problem of how you make security transparent to the user. The means to automatically create a secure connection whenever a secure connection is needed to wherever it is needed, and create it on demand," says Short. "That has always been the vision behind Gabriel." The difference between Gabriel and other products, says Short, is that users do not have to transmit data to or store data with any third party, including VirnetX. In this way, data is stored only on their own devices. Essentially, users maintain control of their own data. Gabriel users also have secure, encrypted (spamless) email, text messages, free voice and video calls and picture or file share with other trusted Gabriel users in their network -- all directly from their personal device. Gabriel runs on iPhone, iPad, Android, Windows and Mac OSX. For more information or to download Gabriel go to gabrielsecure.com, the App Store or the Google Play store.
          Russian security services were behind cyberattack: Ukraine   
The malicious code in the virus encrypted data on computers, and demanded victims pay a $300 ransom, similar to the extortion tactic used in a global WannaCry ransomware attack in May. But Ukrainian officials and some security experts say the ransomware feature was likely a smokescreen.
          PDF Sharing and Security   
We just upgraded to Adobe Actobat 8 Professional for an upcoming project where we will be compiling a number of documents into an electronic (primarilly CD-based) journal and directory. Along with my registration of Acrobat, I received 30 days of free training via Lynda.com to help me get up to speed with the new features of this version of Acrobat.

Before gearing up to put together last year's edition of this same project, I was not very familiar with all of the capabilities of Acrobat. I'd, of course, used the free Adobe Reader and have printed to PDF with the distiller function that came with version 5.0 but hadn't done much else until working with 7.0 Pro.

Even with working on last year's project, I only dealt with the sections of the program that I needed to complete the tasks. There was a lot of trial and error and trubleshooting to make the final product function to the client's specifications. It wasn't extremely difficult, but we had our share of challenges to work through along the way.

Upon upgrading to Acrobat 8 Pro and viewing the training videos, I was not only surprised and delighted by the new features that will make this year's project go even smoother and allow the user experience to be all the more seamless (namely the ability to create PDF Packages!), but I was reminded of some security features that will be quite useful for other applications as well.

(To see what I'm working with, click here to download a PDF containing a number of images I've had as part of my NAPP Portfolio. - 6MB)

First of all, the security settings. If you are going to make a PDF available for download from your website or you will be sending it to someone to view samples of your work, you will want to make sure that your images are secure and someone won't be able to simply copy your photos to their computer or print them without permission.

Go to the "Secure" button in Acrobat and select "Password Encrypt" and click "Ok." You can look through the other options in the dialog box but the one we're concerned with is the "Permissions" section. Here, check the box that says, "Restrict the editing and printing of the document..." and enter a password - and remember it! Select your desired print and changes settings (I picked "none" for both) and leave the box marked "Enable copying of text, images, and other content" unchecked. This way, viewers can't download your images. When you click "Ok" you will be prompted to re-enter your password and told to save your document before the settings will take effect.

(Note: In the "Manage Security Policies" dialog you can create a preset if you plan to use the same security scheme a lot.)

If you allow users to print, or if you're worried about someone swiping your images using the "Print Screen" function, you can add a watermark within Acrobat to add one more layer of protection.

Go to "Document>Watermark>Add" and in the dialog box, insert your text, setup the appearance options, and click "Ok."

To combine these two security techniques, apply your watermark before you apply the security profile, otherwise you won't be able to change the settings without removing the security settings and re-saving the file.
          KaKa Folder Protector v6.01 released   
KaKa Folder Protector Screen shot

Kakasoft Folder Protector is a portable password protection application that helps users to protect folders, files or drives on a Windows computer. It can hide/encrypt any folder including flash disk and removable hard disk. The program uses industry s

Download1 MB | Windows | Free to Try | $ 24.95

          EncryptedRegView scans and decodes the Windows registry   

The Windows registry is no longer unknown to almost anyone, is that besides being a place where certain information is saved, it also allows us to activate or deactivate certain functions from the system configuration settings or own is not possible. This does not mean to be a place where we must be careful when […]

The post EncryptedRegView scans and decodes the Windows registry appeared first on WebTronics.

          North Dakota Dominates North American UAS Industry with Largest Test Site and Key Commercialization Opportunities   
This week, nearly two-dozen North Dakota aerospace and aviation leaders are in Atlanta for the AUVSI Unmanned Systems North America 2015 conference to showcase the state's dominance in America's hottest new industry.

As one of the largest blocks of airspace available in the country for flying unmanned aerial systems (UAS) with the goal of integrating UAS into the national airspace, the delegation will be at the show to discuss how the nation's first operational UAS test site is advancing research and has become increasingly open for businesses in this high profile industry.

In 2014, North Dakota became the first mission-ready test site chosen by the Federal Aviation Administration (FAA) to assist in research integrating unmanned aircraft with manned aircraft into the national airspace. North Dakota alone has invested $22.5 millioninto the test site to advance research and development for the commercialization of UAS, and will be investing an additional $10 million further between now and 2017. In addition, the state's 'Research ND' program will offers $5 million biannually in grants for research and development to organizations and companies involved in UAS research through cooperation with the University of North Dakota (UND) and North Dakota State University (NDSU).

"North Dakota is attracting innovative thinkers in UAS technology, creating jobs and expanding this important industry," said Lt. Gov.Drew Wrigley, who also serves as chairman of the Northern Plains Unmanned Systems Authority. "The momentum our state has gained in the past year alone, in cooperation with the FAA, shows again that we are the premier location for the advancement of UAS."

In February, the Grand Forks Air Force Base officially signed an Extended Use Lease Agreement that will allow for the development of the nation's very first UAS business park, Grand Sky. Governor Jack Dalrymple has already appropriated $2.5 million in state funds to further develop the 1.2 million square-foot UAS aerospace and technology park, with plans ahead for further annual investment. Grand Sky is estimated to eventually house 3,000 collaborating innovators for the advancement of UAS technology, including anchor tenant Northrop Grumman - who just signed a formal lease agreement and will break ground on its new facility at Grand Sky in September.

North Dakota's Governor Dalrymple, along with officials from ComDel Innovation, Inc. and Altavian, also recently announced that the companies have signed a $3.2 million agreement to manufacture UAS and UAS components at ComDel's high-tech manufacturing plant in Wahpeton, the first official UAS manufacturing project in the state.

Alongside these larger business deals taking place in the state, North Dakota's reputation for UAS innovation and proximity to an FAA test site has attracted many UAS tech startups, including Botlink, the creator of an all-in-one control and communications platform that allows UAS operators to control aircraft safely and securely through their own smart phone or tablet by processing all relevant FAA flight data – including avoidance alerts of other aircraft and restricted airspace. Just last week, Botlink announced its new password-protected encryption for secure drone communications that will prevent security breaches between UAS software and hardware, and through this partnership with authorization platform, LaunchKey, Botlink will be the first UAS app in the world with secure logins – solving one of the biggest concerns in the domestic UAS market today.

These new business announcements are just the most recent examples of how North Dakota is leading on UAS research, training and development.

In addition to North Dakota having unencumbered airspace across more than two thirds of the state available for FAA-approved testing, it is also home to a thriving private UAS industry, Grand Forks Air Force Base and partners with four universities prioritizing UAS research, including UND, NDSU, Northland Community & Technical College and Lake Region State College. UND, which has one of the most recognized UAS undergraduate programs in the nation, was the first university to offer a degree program in unmanned aviation in 2009 and is in the midst of a program re-vamp in effort to keep up with the evolving FAA regulations for the sector.

"Building upon North Dakota's long-term operational history and demonstrated performance in unmanned aircraft, and coupled with our collaborative efforts with both industry and the FAA, we are leading the nation's efforts to safely, efficiently and effectively integrate unmanned aircraft to enable commercial UAS operations throughout our National Airspace System," said Robert Becklund, executive director of the Northern Plains UAS Test Site.

For more information on North Dakota's UAS leadership visit NDUAS.com, and for details on the Northern Plains UAS Test Site visit www.npuasts.com.  

North Dakota Dominates North American UAS Industry with Largest Test Site and Key Commercialization Opportunities - PR Newswire

read more

           Optical encryption and the space bandwidth product    
Hennelly, B.M. and Sheridan, J. T. (2005) Optical encryption and the space bandwidth product. Optics Communications, 247. pp. 291-305. ISSN 0030-4018
           Strengths and weaknesses of optical encryption algorithms    
Gopinathan, Unnikrishnan and Monaghan, David S. and Naughton, Thomas J. and Sheridan, J. T. and Javidi, Bahram (2005) Strengths and weaknesses of optical encryption algorithms. In: LEOS 2005. The 18th Annual Meeting of the IEEE Lasers and Electro-Optics Society, 2005. IEEE Press, New York, pp. 951-952. ISBN 0780392175
          WinMagic to Attend Upcoming secureCIO Chicago Event   

Data Security Expert will Join secureCIO Chicago Attendees to Educate on the Importance of Encryption in an Enterprise Setting

(PRWeb July 13, 2015)

Read the full story at http://www.prweb.com/releases/2015/07/prweb12842530.htm

          E Con L'Estate...   

E stride questa estate di azzurro e di vento...mangiando le ultime ciliegie...rabbocco l'orgasmatico succo...che parla di te alla mia bocca...i miei capelli sciolti e le tue mani...a lisciare pensieri...ed i fianchi...ancore naturali dove posare i tuo battelli in fuga...il letto bianco è il nostro naufragio perenne...e dopo...gli...occhi ammainati come vele...

          Meeting You...   

Tra le tue mani...il mio sorriso...mentre abbracci le mie ginocchia nude...mi perdo in un altro tempo che pure è il nostro...e la tua bocca...sa sempre dove trovarmi...

E mi sorprendi...ancora...

          Update - Trial - Folder Lock v7.7.0   
Folder Lock is an easy to use, yet full-featured, software to lock, encrypt and backup your sensitive files and folders. The program uses 256-bit on-the-fly AES encryption to create password protecte....
          密碼系統的 Monoculture   
這篇文章講到最近密碼系統的現象:「On the Impending Crypto Monoculture」。 目前常在用的密碼系統包括了 RSA、DH、ECDH、ECDSA、SHA-2、AES 這些演算法,而最近這幾年大家在推廣使用的演算法都出自於同一個人手裡,Dan Bernstein,也就是 djb: A major feature of these changes includes the dropping of traditional encryption algorithms and mechanisms like RSA, DH, ECDH/ECDSA, SHA-2, and AES, for a completely different set of mechanisms, including … Continue reading
          WatchGuard Technologies' Wins Most Innovative Firewall and Cutting Edge SIEMSolution from Cyber Defense Magazine   
WatchGuard's Firebox M500 firewall continues streak of industry recognition for its ability to inspect encrypted traffic 149 percent faster than competing solutions

          New Generation of WatchGuard Firewalls Enable Mid-Size Enterprises to Keep Pace with Explosive Growth in Encrypted Traffic   
Encrypted traffic expected to draw 50 percent of all malware by 2017; Advanced processing capacity critical to ensure IT pros can turn on all defense-in-depth security layers with confidence

          WatchGuard Protects Apple Users   
Provides Seamless and Highly Secure Data Encryption Tunneling for Apple iPhone, iPad and other iOS Devices to WatchGuard Next-Generation Firewalls

          WatchGuard Enhances Email Security Solutions   
WatchGuard XCS Appliances Get Improvements to Stop Spam; Gain New Encryption Capabilities

          U.S. warns businesses of hacking campaign against nuclear, energy firms    

By Jim Finkle

TORONTO (Reuters) - The U.S government warned industrial firms this week about a hacking campaign targeting the nuclear and energy sectors, the latest event to highlight the power industry's vulnerability to cyber attacks.

Since at least May, hackers used tainted "phishing" emails to "harvest credentials" so they could gain access to networks of their targets, according to a joint report from the U.S. Department of Homeland Security and Federal Bureau of Investigation.

The report provided to the industrial firms was reviewed by Reuters on Friday. While disclosing attacks, and warning that in some cases hackers succeeded in compromising the networks of their targets, it did not identify any specific victims.

"Historically, cyber actors have strategically targeted the energy sector with various goals ranging from cyber espionage to the ability to disrupt energy systems in the event of a hostile conflict," the report said.

Homeland Security and FBI officials could not be reached for comment on the report, which was dated June 28.

The report was released during a week of heavy hacking activity.

A virus dubbed "NotPetya" attacked on Tuesday, spreading from initial infections in Ukraine to businesses around the globe. It encrypted data on infected machines, rendering them inoperable and disrupting activity at ports, law firms and factories.

On Tuesday the energy-industry news site E&E News reported that U.S. investigators were looking into cyber intrusions this year at multiple nuclear power generators.

Reuters has not confirmed details of the E&E News report, which said there was no evidence safety systems had been compromised at affected plants.

The activity described in the U.S. government report comes at a time when industrial firms are particularly anxious about threat that hackers pose to their operations.

Industrial firms, including power providers and other utilities, have been particularly worried about the potential for destructive cyber attacks since December 2016, when hackers cut electricity in Ukraine.

U.S. nuclear power generators PSEG , SCANA Corp and Entergy Corp said they were not impacted by the recent cyber attacks. SCANA's V.C. Summer nuclear plant in South Carolina shut down on Thursday due to a problem with a valve in the non-nuclear portion of the plant, a spokesman said.

Another nuclear power generator, Dominion Energy , said it does not comment on cyber security.

Two cyber security firms said on June 12 that they had identified the malicious software used in the Ukraine attack, which they dubbed Industroyer, warning that it could be easily modified to attack utilities in the United States and Europe.

Industroyer is only the second piece of malware uncovered to date that is capable of disrupting industrial processes without the need for hackers to manually intervene.

The first, Stuxnet, was discovered in 2010 and is widely believed by security researchers to have been used by the United States and Israel to attack Iran's nuclear program.

The U.S. government report said attackers conducted reconnaissance to gain information about the individuals whose computers they sought to infect so that they create "decoy documents" on topics of interest to their targets.

In an analysis, it described 11 files used in the attacks, including malware downloaders and tools that allow the hackers to take remote control of victim's computers and travel across their networks.

Chevron Corp , Exxon Mobil Corp and ConocoPhillips , the three largest U.S. oil producers, declined to comment on their network security.

(Reporting by Jim Finkle; Additional reporting by Timothy Gardner in Washington and Ernest Scheyder in Houston; editing by Grant McCool and Tom Brown)

          U.S. warns businesses of hacking campaign against nuclear, energy firms    

By Jim Finkle

TORONTO (Reuters) - The U.S government warned industrial firms this week about a hacking campaign targeting the nuclear and energy sectors, the latest event to highlight the power industry's vulnerability to cyber attacks.

Since at least May, hackers used tainted "phishing" emails to "harvest credentials" so they could gain access to networks of their targets, according to a joint report from the U.S. Department of Homeland Security and Federal Bureau of Investigation.

The report provided to the industrial firms was reviewed by Reuters on Friday. While disclosing attacks, and warning that in some cases hackers succeeded in compromising the networks of their targets, it did not identify any specific victims.

"Historically, cyber actors have strategically targeted the energy sector with various goals ranging from cyber espionage to the ability to disrupt energy systems in the event of a hostile conflict," the report said.

Homeland Security and FBI officials could not be reached for comment on the report, which was dated June 28.

The report was released during a week of heavy hacking activity.

A virus dubbed "NotPetya" attacked on Tuesday, spreading from initial infections in Ukraine to businesses around the globe. It encrypted data on infected machines, rendering them inoperable and disrupting activity at ports, law firms and factories.

On Tuesday the energy-industry news site E&E News reported that U.S. investigators were looking into cyber intrusions this year at multiple nuclear power generators.

Reuters has not confirmed details of the E&E News report, which said there was no evidence safety systems had been compromised at affected plants.

The activity described in the U.S. government report comes at a time when industrial firms are particularly anxious about threat that hackers pose to their operations.

Industrial firms, including power providers and other utilities, have been particularly worried about the potential for destructive cyber attacks since December 2016, when hackers cut electricity in Ukraine.

U.S. nuclear power generators PSEG , SCANA Corp and Entergy Corp said they were not impacted by the recent cyber attacks. SCANA's V.C. Summer nuclear plant in South Carolina shut down on Thursday due to a problem with a valve in the non-nuclear portion of the plant, a spokesman said.

Another nuclear power generator, Dominion Energy , said it does not comment on cyber security.

Two cyber security firms said on June 12 that they had identified the malicious software used in the Ukraine attack, which they dubbed Industroyer, warning that it could be easily modified to attack utilities in the United States and Europe.

Industroyer is only the second piece of malware uncovered to date that is capable of disrupting industrial processes without the need for hackers to manually intervene.

The first, Stuxnet, was discovered in 2010 and is widely believed by security researchers to have been used by the United States and Israel to attack Iran's nuclear program.

The U.S. government report said attackers conducted reconnaissance to gain information about the individuals whose computers they sought to infect so that they create "decoy documents" on topics of interest to their targets.

In an analysis, it described 11 files used in the attacks, including malware downloaders and tools that allow the hackers to take remote control of victim's computers and travel across their networks.

Chevron Corp , Exxon Mobil Corp and ConocoPhillips , the three largest U.S. oil producers, declined to comment on their network security.

(Reporting by Jim Finkle; Additional reporting by Timothy Gardner in Washington and Ernest Scheyder in Houston; editing by Grant McCool and Tom Brown)

          Quanto mais leve, melhor.   
    Quando você está caminhando com uma mochila pesada, todo seu corpo sofre, os joelhos, as pernas, as costas e até os braços. É um alívio tirar a mochila, que você solta no chão fazendo um grande barulho.

    Existe uma nova cultura que atualiza antigos padrões de peso. Na cultura antiga, sua mochila não deve pesar mais do que 30% do peso do seu corpo, ou seja, se eu peso 70kg não devo levar mais de 21kg. Na nova cultura o peso da sua mochila é avaliado em algumas faixas de peso. Estes são pesos base, ou seja, não incluem consumíveis como: alimento, água, combustível para o fogareiro e qualquer item que você esteja vestindo.

  • Militar - acima de 30kg. (com muita munição)
  • Pesada - entre 20kg e 30kg
  • Normal - entre 10kg e 20kg.
  • Leve - entre 5kg e 10kg.
  • Ultraleve - entre 2.5kg e 5kg.
  • Super Ultraleve - abaixo de 2.5kg.

    É claro que para se conseguir galgar as faixas mais leves existem algumas opções:
  • Comprar tudo novo, escolhendo os equipamentos mais caros e leves.
  • Fazer seus próprios equipamentos, ou utilizar recicláveis e descartáveis e coisas que você já tem em casa.
  • Uma combinação das opções acima.
    Antes de preparar a sua mochila, espalhe tudo em cima de uma mesa ou no chão da sala e olhe atentamente para cada item. Considere se você irá utilizar cada item nesta viagem e deixe em casa o que não precisa. Mesmo se você concluir que irá utilizar este item, considere se pode ficar sem ele. Por exemplo: Você pode ficar sem pentear os cabelos durante este período? Assim pode pensar em deixar em casa a escova de cabelos.
    A melhor maneira de reduzir peso é deixando em casa o que você não precisa. O que ficou, pesa ZERO na sua mochila.
    Cuidado com mochilas grandes, você sempre acha que precisa ocupar todo o espaço dela e termina levando coisas de que não irá precisar. 
    Consiga uma balança e pese cada item da sua mochila, inclusive a mochila. Faça uma planilha no computador, relacione todos os itens e seus pesos, experimente ir trocando opções e some todos os pesos. Considere se você pode utilizar algo mais leve para fazer a mesma função em cada item.
    Procure utilizar itens que possam servir para mais de uma função. Por exemplo: Os bastões de caminhada podem ser utilizados como estrutura para a montagem de alguns tipos de barracas que por não utilizarem varetas, são MUITO mais leves. A minha barraca pesa 810g por usar esta opção.
    Repita este processo várias vezes. Você vai se surpreender como a cada passada por todos os itens da mochila, e ponderando se realmente vai precisar dele, você vai deixar mais alguma coisa em casa.

    Na foto acima podemos ver TODO meu equipamento para trilha. Uma mochila de 22 litros que, carregada, pesa menos de 4Kg, uma pochete com duas garrafas e um bolso grande, dois bastões de caminhada, luva para trilha, calça com zíper nas pernas que fica como uma bermuda, relógio com bússola e um tênis bem leve que ficou fora da foto.

    Vou descrever primeiro os itens que carrego fora da mochila:
    Bastão de caminhada Quechua Forclaz 500 Light (230g)(Link do produto). Sua estrutura telescópica pode ser ajustada até 1,3m da altura. Andrew Skurka, uma Super Celebridade das trilhas nos EUA, recomenda o uso de dois bastões de caminhada para aliviar o esforço nos joelhos e ajudar no equilíbrio. 

     Pochete Kailash KTR 5L (320g)(Link do produto), possui duas garrafas de 750ml cada. Seu bolso frontal permite que itens frequentemente utilizados estejam sempre ao alcance da mão. É ideal para guardar alguns chocolates e guloseimas que serão consumidos durante a caminhada. Nesta foto podemos ver também: canivete Guepardo Atom 22 (128g)(Link do produto), repelente em creme 100ml (93g), A maravilhosa lanterna Petzl Tikka RXP (115g)(detalhes nesta matéria), protetor solar fator 40 com 50ml (65g).

     Luva Gripworkx para trilha (Importado), repare no reforço de couro do dedo indicador até o polegar na área de maior contato com o bastão. Toda a palma da mão é de material anti-derrapante.

    Relogio Guepardo Eletronic Adventure (Link do produto). Este relógio é muito interessante, possui: altímetro, barômetro, termômetro e bússola. Seu maior defeito é de não ser muito resistente a água, o que é um problema para um produto que se destina ao uso selvagem. No site diz que aguenta chuva, mas não pode ser submerso na água. (Veja detalhes no blog Sobrevivencialismo).

    Mochila Sea to Summit Ultrasil Dry Daypack (90g)(Link para o produto). Isso mesmo, esta mochila feita de tecido Cordura, que é um nylon siliconizado pesa 10% do peso da minha mochila anterior.

     O fecho é impermeável como um saco estanque. Esta mochila é realmente a prova d'água. Possui vedação interna nas costuras. Esta cordinha é para permitir a fixação de alguns objetos na parte externa, como meias penduradas para secar enquanto se caminha, permite também que se comprima a mochila para reduzir a movimentação do conteúdo caso ela não esteja muito cheia.

    As alças são feitas do mesmo tecido da mochila, neste caso foi necessária uma pequena mudança. A alça é feita de duas camadas de tecido costuradas, mas quando se coloca a mochila nos ombros este tecido não fica confortável. Eu cortei uma pequena parte da costura e inseri duas peças de EVA de 3mm de espessura em cada lado e costurei novamente. Agora é muito mais confortável nos ombros, mesmo com a mochila cheia.

    Por falar em mochila cheia, este é o conteúdo dela. Vou descrever na sequência:
  • Saco escrito Exped (957g). Saco original do isolante térmico Exped Downmat Lite 5 que vai dobrado no fundo da mochila formando uma estrutura para apoiar as costas. Este saco agora contém a barraca para 2 pessoas Trilhas e Rumos Flash 2 (810g)(Link do produto). Esta barraca custa menos de R$ 170,00 no site www.zereuequipamentos.com.br (detalhes nesta matéria), 6 estacas de alumínio (90g) e também a bomba para encher o isolante térmico.

  • Saco de dormir Deuter Dreamlite 500 (Link do produto) + roupas (816g). Este saco de dormir é indicado para temperaturas: conforto + 13°C, limite +10°C e extrema -3°C. É muito compacto e bem leve (580g), seu tecido é bem confortável. Caso esteja muito frio, este saco de dormir será utilizado em conjunto com o SOL Scape Bivvy (descrito abaixo). No mesmo pacote, também consegui comprimir um par de meias e uma troca de roupa.

  • Rede mosquiteira para cabeça Nautika. Utilizado como bolsa para vários itens pequenos(591g):

    1. Kit de higiene (66g): Escova de dentes, pasta de dentes, toalhinha, protetor labial (ChapStick).
    2. Kit de emergência (41g): vários Band-Aid's diferentes, gaze, analgésico, cortador de unhas, sachet de limpeza para ferimentos.
    3. Kit de utilidades (140g): vários sacos de lixo, Silver Tape, 20m de cordinha, Antiséptico.
    4. Kit de sobrevivência Bear Grills (319g): Kit original (detalhes nesta matéria), pastilhas Clorin, isqueiro, bússola, kit de reparo para o isolante térmico.
    5. Toalhas humedecidas (Baby Wipes) para limpeza pessoal.

  • Saco escrito SOL Scape Bivvy - Kit de Cozinha (173g): Este saco contém os itens de cozinha: Uma pequena panela com capacidade para 450ml e tampa de papel alumínio grosso, fogareiro para etanol feito com latinha de refrigerante, corta vento (papel alumínio), colher plástica Quechua, Sea to Summit X Bowl (tigela de silicone), garrafa de etanol (álcool de posto), pequeno tubo de detergente, pequena esponja, filtro de água e garrafa flexível de 32oz (quase 1 litro) Squeeze Sawyer.

  • Saco de alimentos: Talharim, Risoto de arroz, Sopa instantânea, Suco em pó, Clif Bar, Energy Gel, chocolate Snickers, Protein Bar, Knorr Quick (sopa de copo). De acordo com a duração da trilha a quantidade de alimentos vai mudar. Algumas dicas: O chocolate Snickers tem uma quantidade imensa de calorias, muito bom para repor energias durante a caminhada. Sopas instantâneas são uma grande fonte de sódio, que no dia a dia devemos evitar, mas durante um período de grande fadiga muscular o sódio e sais minerais são muito necessários.

  • Corta vento Track & Field amarelo (160g) (Como estou bonito nesta foto!!!). Esta blusa é impermeável mas ao mesmo tempo é respirável ou seja, permite que o vapor saia mas não deixa a água entrar. Tem dupla função pois pode ser utilizado para sinalização. Na foto vemos também o chapéu com abas Quechua.
  • O pequeno saco azul é a embalagem original da mochila. Sim a mochila veio neste saquinho minúsculo que hoje leva um pequeno canivete e uma pequena lanterna que posso utilizar em caso de emergência. Abaixo vemos: Estacas de aluminio, Lanterna Petzl e+lite e canivete Leatherman Style PS.

  • Travesseiro Klymit Pillow X Recon (68g)(importado). Este travesseiro tem um desenho que ajuda a manter a cabeça no centro, assim como permite um conforto muito maior para a orelha, quando se está deitado de lado. Cabe neste pequeno saco acima na foto.

  • Saco de dormir de emergência SOL Scape Bivvy verde oliva (226g)(importado). Este saco de dormir é composto de um material que é ao mesmo tempo resistente a água e também respirável. Pode até parecer frágil, mas tem gente usando ele regularmente a mais de 2 anos sem problemas. Mesmo no frio, nosso corpo libera uma grande quantidade de vapor, por isso é essencial que não se utilize nenhum material impermeável como isolante, ou você vai amanhecer ensopado. Este material também é aluminizado pelo lado interno, refletindo o calor do corpo de volta. É muito eficiente. Vi muitos relatos de pessoas que utilizam somente este saco para dormir na neve, obviamente também vestindo agasalho durante a noite. Minha idéia é utilizar este saco de dormir por fora do Deuter 500 e somar as capacidades térmicas, além de proteger o Deuter de água pelo lado de fora. Assim como o isolante térmico vai dobrado na traseira da mochila, este saco de dormir dobrado vai na frente da mochila por dentro.

  • Isolante térmico inflável Exped Downmat Lite 5 (613g)(Detalhes nesta matéria). Este colchão isolante é revestido internamente com penas, sendo além de confortável, indicado para temperaturas de até 5 graus negativos.
  • E por último esta pequena bolsa preta é um aquecedor Nautika para saco de dormir (Link do produto). Muito útil quando você é surpreendido por um frio maior do que estava preparado. Quando você abre o saquinho plástico e o ar entra em contato, o material interno se aquece até 50°C por até 10 horas. É indicado para ser colocado nas axilas, ou outro local onde o calor seja rapidamente espalhado pelo corpo para evitar hipotermia.

    Já fiz uma trilha carregando este equipamento. Foram 9,5 km sendo ida e volta com uma boa subida acima de 1000m de altitude. Durante todo o trajeto e mesmo ao final, pude sentir como se estivesse caminhando sem nenhum peso.
    Recomendo a todos o objetivo de reduzir o peso do seu equipamento para a categoria Ultraleve. Sinta a liberdade de poder explorar todos as maravilhas sem o fardo de uma carga pesada.

    Obrigado pela visita.

    Walgran e familia.

          Equipamentos Ultra Leves para Mochileiros   
   Quem acompanha meu blog sabe que estou me preparando para fazer umas trilhas. Muito que tenho lido mostra que nunca devemos carregar mais do que 30% do nosso peso, mas quanto mais leve, melhor.
   Os adeptos deste tipo de aventura garantem que se você viajar bem leve, pode aproveitar muito melhor a aventura. Consegue chegar nos pontos de pernoite muito menos fatigado, consegue dormir melhor e consequentemente acorda melhor, disposto para explorar as belezas e curtir melhor o passeio.
   Pensando nisso comecei a pesquisar algumas opções de equipamentos que caberiam no meu bolso.
   Os principais equipamentos para trilha são chamados conjuntamente de "Big Three" ou os "3 Grandes" que são os itens mais pesados e volumosos: Abrigo; Cama e Mochila.

   Abrigo inclui algumas opções: Barracas; Tendas; Rede ou mesmo Bivvy Sac, que são sacos de dormir fechados que se pode, em alguns casos, dormir no relento sem barraca. Em outros casos somente uma tenda de tela mosquiteira.
   Cama inclui saco de dormir e isolante térmico. Em alguns casos são utilizados colchões infláveis que isolam ou não o frio que vem do chão.
   Mochila é bem óbvio que se refere ao pacote onde se transporta todas as tralhas.
   Eu como prezo muito pelo conforto, quero ter coisas leves para poder levar alguns itens que em alguns casos são considerados luxo, como por exemplo um colchão inflável. Assim comecei pela mochila: REI Flash 45. É uma mochila da categoria ultra leve com apenas 960g, comporta 45 litros, tem uma estrutura de alumínio aeronáutico, seu boné superior possui bolsos para coisas pequenas, possui também bolso interno para uma bolsa de hidratação que é um cantil com uma mangueirinha para você beber água enquanto caminha.
   O mais interessante é que a funcionária da loja vestiu em mim um gabarito para medir o tamanho da minha coluna, tendo como referência o ajuste da mochila no quadril, para somente então recomendar o tamanho exato de mochila para mim.
   É muito importante que a cinta do quadril seja bem confortável e esteja bem ajustada. É justamente no quadril que deve ficar apoiado a maior parte do peso, por isso que a mochila tem as estruturas para "esticar" as costas, e também tem a cinta barrigueira. Cerca de 75% do peso deve estar sobre os ossos da bacia e apenas 25% nos ombros. Assim a coluna não sofre com o peso e você consegue ir muito mais longe com o mesmo peso. Note como as tiras inferiores das alças dos ombros são finas, justamente porque não precisam suportar todo o peso.
Link do produto: REI Flash 45

   Para o item cama, optei por uma combinação de saco de dormir + Colchão inflável.
   O saco de dormir Marmot Nanowave é do tipo sarcófago e acredito que olhando para a imagem abaixo entende-se por quê. A idéia é reduzir a perda de calor, pois perdemos 30% de nosso calor pela cabeça (ainda mais para os calvos como eu). Você literalmente veste o saco de dormir e cobre a cabeça, puxa dois elásticos e deixa só o rosto pra fora. Muita gente pensa que é desconfortável, mas é bem legal, e você fica bem quentinho. A temperatura limite deste modelo é de 7 graus Centígrados, mas se ficar calor basta abrir o ziper. Pesa apenas 920g e na sacola de compressão que acompanha, fica com o volume pouco maior que um litro.
Link do Produto: Marmot Nanowave Sleeping Bag
   Para aumentar o conforto e principalmente a isolação térmica optei pelo colchão Exped DownMat Lite 5 que conforme o nome indica, possui um isolamento interno de penas (Down) para chegar a um nível de isolamento térmico (R value) de 4.1. Acredite, é um isolamento excelente para um inflável de 2 polegadas de espessura. Ele possui as laterais mais altas, o que ajuda a não cair de cima dele. Pesa apenas 640g e enrolado tem menos de 1 litro. Acompanha uma bomba para encher, que nada mais é do que uma pequena bolsa com um pedaço de espuma dentro, que você aperta, empurrando o ar para dentro do colchão, quando solta, a espuma expande a bomba para você apertar de novo. Possui um exclusivo sistema de válvulas planas para reduzir o peso e o volume.
   Mesmo estando em um hotel bem confortável em Atlanta nos EUA, eu não resisti e inflei o danado e estendi o saco de dormir sobre ele para passar a noite, e ele passou neste teste com louvor.
Link do Produto: Exped DownMat Lite 5

   Para o item abrigo, eu já tinha uma barraquinha Nautika Amazon 3/4 que antes era um item leve dentro das minhas opções aqui no Brasil, não é tão pesada se considerarmos que cabem 3 pessoas + equipamento e seu peso pode ser dividido entre as 3 mochilas. Já mostrei esta barraca em outro post aqui no blog. Link: Qual Barraca Ideal?
   Para padrões ultra leves a Amazon fica bem pesada com cerca de 3Kg enquanto as boa barracas ultraleves para 4 pessoas ficam na faixa dos 1,8Kg como a Fly Creek UL4. Todas as varetas são de alumínio e o tecido super leve. Mas ainda é um desejo não realizado, fica aqui só a titulo de comparação.
   Link para o Produto: Big Agnes Fly Creek UL4
 Existem ainda opções mais leves ainda, que nem sequer utilizam varetas, somente a lona, que é esticada utilizando o bastão de caminhada ou um galho de arvore cortado na hora de montar a barraca. Um exemplo está na foto do início deste artigo, uma barraquinha triangular que pesa menos de 800g.

   Para garantir uma caminhada tranquila um bom calçado é fundamental e por isso escolhi o Merrel Moab Mid Waterproof. É um calçado muito interessante pois tem altura do cano suficiente para proteger o tornozelo de torções, é bem acolchoado e o mais legal... é à prova de água! A língua é inteiramente fechada e você pode enfiar o pé na água até o cano sem molhar dentro. Ao mesmo tempo, seu material permite que o vapor de água passe mantendo seu pé mais seco.

   Eu também tinha já a muitos anos o desejo de comprar uma multi ferramenta de qualidade tipo um Victorinox, mas aqui no Brasil é MUITO caro. Aproveitei a viagem e consegui um Leatherman Wave.
   Suas lâminas são excelentes, o aço é de alta qualidade, o alicate é super útil e ainda vem com uma bainha de Nylon para se usar no cinto. Seu serrote pode cortar galhos para fazer um abrigo, tem ainda uma mini chave de fendas para apertar parafuso de óculos, além da tesoura que ajuda na hora de fazer curativos.
   Espero que estas dicas sejam úteis para os mochileiros e campistas. Aguardem os próximos posts com mais utilidades.

  Obrigado pela visita.

Walgran e família.

          Install exim4 STARTTLS using a free LetsEncrypt certificate   
Here we are on a Debian Linux, such as Ubuntu and we want to run a mail server. Exim4 is currently the most popular email server, but getting it up and working for free is a hassle – who wants to pay for a SSL certificate, on an ongoing basis? And then there’s the maintenance […]
After WannaCry Ransomware Attack Now New Ransomware Attack Spreading Rapidly Worldwide Specially In Europe & US.
The Name Of Latest Ransomware Is Petya Ransomware.
Petya Ransomware - It Is A Powerful Malicious Program That Encrypt All User Data Or Threaten To Publish And Delete It Untill Ransom Is Paid.
Like WannaCry Ransomware, Petya Ransomware Also Encrypt The Files On The Computer And Demands $300 In Bitcoin.To Unblock The File Write An Email To Hackers & Then Pay For The Decryption Key.
But Now Pay For The Decryption Key Is Useless Because Virus Creator Email Id Is Hosted On Posteo & Posteo Team Blocked This Account.

How To Stop?

  1. In This Petya Ransomware Attack There Is One Kill Switch Available In Coding So You Can Easily Stop It In Your Local System.
    For This You Need To Create File Named perfc On C:\Windows.
    So,If This File Available In Your System Then Virus Can't Run Encrypt Function & Your Data Remain Safe.
  2. If Virus Spread On Your Computer & CHKDSK Screen Running Then Suddenly Shut Down The PC.
    Then Use Live OS For Remove Virus Files.

How To Be Safe & Protect Yourself?

  1. Don't Use Outdated Windows OS - Because In Old Windows OS There Is Vulnerability Called Ethernal Blue. Vulnerability Means Security Hole, By Using It Hacker Place Exploit (Small Program) In Our System And Encrypt Our Data.
  2. Don't Click On Anything Suspicious - Always Download Content From Verified Sites. Because If You're Clicking On Any Suspicious Email Or File Then You're Inviting Hacker For Ransomware..
  3. Install Antivirus Program - If You Don't Have Money To Pay Then Use Windows Defender For Free. And Make Sure You're​ Using Latest Security Updates. [Find Antivirus From Here.]
  4. Backup Your Computer - You Should Always Back Up Your Computer Just In Case A Ransomware Attacks Your Computer So You Have Copies Of Your Files In Another Location, Like An External Hard Drive Or In The Cloud..

Decryptor Tool:
Decyptor For Petya Ransomware Is Available
Download Link:https://github.com/leo-stone/hack-petya 

          Happy 150th Birthday, Canada!   
Image result

Happy Canada Day to all my Canadian trans family and north of the border TransGriot readers!.

Today is the 150th anniversary of the birth of Canada.   On July 1, 1867 the British colonies of Canada, Nova Scotia and New Brunswick were untied under the British North America Act into the Dominion of Canada.   Upon confederation the former province of Canada was divided into the current provinces of Ontario and Quebec.

Since that July 1, 1867 date Canada has grown to become an internationally respected nation touching three oceans and comprised of ten provinces and three territories

Image result for canada day
This day is celebrated across the nation with fireworks, parades and other events, but since this was the 150th anniversary of the date of confederation, this particular Canada Day celebration was going to be an epic party.

For my Canadian trans family, this Canada Day will probably be a memorable one which has even more meaning for them.

Image result for Canadian transgender people
The June 15 passage of the Trans Rights Bill in the Canadian Senate and its subsequent receiving of Royal Assent from the Governor General, means that on this Canada Day, the human rights of Canadian trans people are protected federally and in all the provinces and territories of Canada.

Canada acquired its independence gradually over time.  It joined the League of Nations as an independent country on January 10, 1920.  It wasn't until the 1982 passage of the Canada Act by the British Parliament that the Canadian Parliament assumed the power of making changes to the Canadian Constitution with Queen Elizabeth II still being considered the queen of Canada.

Dominion Day, as this date was previously known and celebrated as, subsequently became known as Canada Day.  

Image result for canada day
We're happy for you Canadian trans fam, and one day, your American trans cousins hope that in the near future we can celebrate the day that our human rights are recognized and protected by our federal government .

          Girls day out - meet up In Logan    
This has been in the works for awhile. If you follow me on social media then you know I've thrown this idea out there, we did a save the date and now here are the details! It will be a fun day that is open is all women - bloggers, family, friends, etc. If you are local to the area be SURE to join us! I will want your input on where to shop, eat and explore later that day! If you aren't local and want a little daytime getaway please join in the fun as well!

Huge THANKS to AdornIt Shoppe for hosting the morning events. 
I would love it if you RSVP'd by leaving me a comment or emailing me. It makes it easier to know how many we should expect BUT you don't have to RSVP to come.
Sassy Steals and I are hosting an Accessory swap. Just bring 1 item wrapped that you no longer use or wear that is an accessory but still in good condition. We will anonymously swap them and you will go home with a "new" to YOU item! So spring clean your accessories and swap with us!
Sassy Steals
After those 2 morning events the rest of the day is YOURS. 
Snag your girlfriends, meet some new people, connect, laugh and have a good time. 
I hope you'll take a day for you and come, so I have the chance to get to know YOU! 
See you in just a few weeks! xo - Megan

          Os pirómanos do costume: nós!*   
«Temos de alinhar as nossas exigências às condições do nosso tempo. Eu começaria então por aqui: os gestos que nos definem como portugueses, os interesses que nos movem, os hábitos que cultivamos, as pessoas que admiramos, as rotinas que estabelecemos em casa e no bairro onde vivemos, também no emprego para onde vamos todos os dias, as casas que decidimos erguer ou comprar, as árvores que vemos crescer, os políticos que elegemos e como nos relacionamos com eles. As leis que cumprimos e as que optamos por ignorar.

Ao fim de muitos e muitos anos, o que resulta desta soma de escolhas, boas e más, somos nós, os portugueses ao espelho, um povo reflectido na soma de tudo isto. É evidente que há acontecimentos brutais, como os incêndios de há uma semana, que podem ir muito além desta soma de características. Podem ser o resultado da sorte e do azar. Mas pode também dar-se o caso de esta sucessão de eventos trágicos ser a consequência da trajectória que escolhemos percorrer como comunidade, um caminho feito por vontade própria ou então pela mais estúpida das inércias, a motivada pelo desinteresse e desmazelo colectivos.

Chega então o momento da contagem dos mortos e dos hectares destruídos, quase 50 mil, uma barbaridade, e apontamos logo o dedo agressivo aos políticos, evidentemente culpados pela incúria de anos e talvez até pela gestão danosa dos recursos públicos. Têm responsabilidade os políticos, é verdade; nalguns casos têm até culpa, terão de ser os tribunais a julgar, mas antes de olhar para quem nos conduz devíamos olhar para nós próprios e voltar ao início: somar as características que exibimos, cultivamos e favorecemos como povo e daí tirar daí conclusões. Podemos até escolher factos pequenos, coisas sem importância do dia-a-dia, mas que começam por dizer quem somos.

Por exemplo, é proibido levar os cães para as praias concessionadas. E no entanto é vê-los a andar pelo areal, fazendo o que os animais fazem quando têm vontade, sem que a polícia faça cumprir a lei. Acontece o mesmo nas ruas de Lisboa, porcaria por toda a parte, um nojo inacreditável, passeios de sujidade medieval. Aceitamos e seguimos em frente, faz parte da paisagem como a floresta desordenada. O problema não são os cães, não é o eucalipto, somos nós. E um dia há uma doença qualquer, uma criança que vai para o hospital, uma daquelas micro calamidades urbanas que estimula o interesse jornalístico e provoca a indignação - geral, genérica, tardia.

Num país sem guerra, a preparação para a época de incêndios deveria ser a nossa guerra, talvez uma e várias, como em tempos o foi a redução da mortalidade infantil. Não há milagres, há anos piores ou melhores que dependem de vários factores, mas a evolução consistente exige esforço, obriga o cumprimento de rotinas de trabalho. Os aviões caem pouco porque há um método que tem de ser seguido pelos pilotos em todos os voos: há uma manual a seguir linha a linha, sem falhas. As mortes por infecção hospitalar diminuem sempre que são cumpridos os protocolos, alguns deles elementares: os médicos lavam as mãos após cada consulta, não passeiam os estetoscópio ao pescoço.

As pessoas, nós, os portugueses, queremos culpar os políticos por causa dos incêndios. Eles têm uma parte central da responsabilidade, mas a desgraça que vivemos é o resultado das nossas escolhas, uma a uma, todas somadas. O ponto é este. Algumas são opções pessoais - os nossos terrenos que não limpamos, os piqueniques que fazemos, os foguetes que lançamos, as práticas perigosas que toleramos, a beata que atiramos pela janela do carro. Outras colectivas, como os políticos que elegemos anos após ano, fruto da apatia generalizada e da cultura de compadrio.

Sim, o SIRESP é um negócio muito suspeito - não vinha com garantia? A ministra da Administração Interna e o Governo foram apanhados desprevenidos, como sempre. A GNR, a Protecção Civil e os bombeiros são tudo menos um corpo coeso. Vamos então apurar responsabilidades, sim, mas é bom que entendamos: hoje somos uma nação de especialistas em incêndios, amanhã voltaremos a ser os pirómanos do costume. (...)»
(André Macedo: "Os pirómanos do costume" . Na íntegra: aqui. Sublinhado meu)

*Digo "nós", porque não quero excluir-me da responsabilização atribuída ao colectivo nacional. Tal não significa, porém, que o "nós" inclua todos os portugueses. Ainda há, felizmente, muitos cidadãos com elevado sentido de responsabilidade.
(ilustração daqui)

          Make a DVD copy of MAC OS X Tiger   


With Mac OS X Tiger 10.4 now in hand, you may want to consider making a personal backup copy. This is an excellent way to ensure you are protected should your original install DVD become damaged or lost. This simple tutorial will show you how to make a reliable DVD copy from Tiger's Mac OS X InstallDVD.

NOTE: This tutorial is for personal use only. Only the legal owner of Mac OS X Tiger should make a backup. In no way whatsoever does creativebits.org condone the pirating or unauthorized duplication of Mac OS X Tiger. Please use this tutorial responsibly.

Now that the legal mumbo-jumbo is out of the way, lets begin. Duplicating CD/DVD’s is usually very easy, especially if you are lucky enough to have two drive bays and Toast Titanium. However, Mac OS X Tiger poses a slight difficulty since it is a bootable volume. The following steps will help you create a perfect working backup copy of Tiger.

Making a DVD Image

Step 1. Insert the retail Mac OS X Install DVD into your drive.

Step 2. Launch Disk Utility (Applications > Utilities).

Step 3. In Disk Utility, you will notice a white pane on the left hand side. In the pane, select the Mac OS X Install DVD by clicking on it once.

Step 4. Click New Image on the Disk Utility toolbar.

Step 5. A dialog box will appear. Give the new image a name. I used 'Mac OS X Install DVD'. Select the destination where you wish to save it. Leave Image Format at Compressed (default) and Encryption at None (default).

Step 6. Click Save to begin creating the image.

Step 7. Once your image has been created DO NOT mount it. Leave the image alone and proceed to the next section.

Burning the Image

Step 1. Launch Disk Utility (Applications > Utilities).

Step 2. Click Burn on the Disk Utility toolbar (upper left).

Step 3. Navigate to where you saved the DVD image created in the previous section. Click on the image file, then click the Burn button. Do not drag and drop the image file into Disk Utility during this step.

Step5. Insert a DVD when prompted and proceed to Burn it. (use good quality media)

Using these exact steps I was successfully able to create a personal backup copy of Mac OS X Tiger. I hope this tutorial helps. Enjoy the newfound features in Tiger!

          Daniel Nishimura posted a discussion   
Daniel Nishimura posted a discussion

C/C++ Developer for Ibis Networks, Inc.

Ibis Networks, Inc. is looking for a C/C++ programmer with a strong track record in developing firmware and micro controller code, for projects involving an IoT portfolio of products.  You will be a key contributor to expanding our portfolio of IoT devices for plug-load energy management.   You will join a distributed team of hardware and software engineers working to build enterprise-level technology for monitoring and optimizing energy use at the plug-level for buildings and campuses.   Location:  Flexible Ibis Networks is a distributed team, with some of our software team working from our Honolulu headquarters and locations in and around Seattle, WA and in the Bay Area.  We are open to remote workers given our distributed team, and would also welcome sometime to our offices in Honolulu or the Bay Area.  If you are experienced at working as part of a distributed team, are capable of writing clearly and using tools like Slack to effectively communicate, you’ll work well with our team.  You may rarely be asked to travel to Honolulu for company meetings and work sessions, but otherwise, we’re interested in talking to self-motivated people who are happy to work on interesting technology problems from a variety of locations. Requirements: C/C++ Firmware and micro controller development Network programming Strong knowledge of TCP/UDP, application level protocols Transport layer encryption (SSL/TLS) Understanding of REST API development A working knowledge of Netburner appliance development is strongly desirable, with experienced Netburner developers receiving priority for hiring.   Other desirable skills: I2C and/or SPI BACnet/IP Ruby on Rails Some familiarity with cloud-based architectures and services (e.g, AWS, Heroku)Please send your resume to careers@ibisnetworks.com See More

          He is totally unreproducible — he was sui generis — Martin Gardner, 1914 - 2010   
Gardner packed his commentary and footnotes on the text with insights into the hidden messages, allusions, word-games, private jokes, puns, parodies, mathematical riddles and assorted literary tricks encrypted in the tales, demonstrating that many of Carroll's jokes were in fact mathematical games. "In the batty world of Carroll scholarship", declared one critic, "Martin Gardner is the undisputed king." - from the Telegraph obiturary.

"This is really a sad day… because he had such a profound influence on so many of us," Gardner's friend Douglas Hofstadter, the Pulitzer Prize-winning author of "Godel, Escher, Bach: An Eternal Golden Braid" who succeeded Gardner at Scientific American, wrote on the magazine's website. "He is totally unreproducible — he was sui generis — and what's so strange is that so few people today are really aware of what a giant he was in so many fields." - from the Los Angeles Times obituary by Thomas H. Maugh II.

Well, a classic Martin Gardner column would be an essay. He published a lot of puzzles over the years and everybody knows those puzzles; they've become famous. But mainly, he wrote essays. He would take some topic and describe it in a way that related it to other things, related it to the real world, related it to literature and to science and to magic. He was a magician himself, in fact, and in philosophy. And he made all of this come together and made the math seem, you know, more interesting, more important than any teacher ever would be able to...He was philosophically a Mysterian, which is not a word you'll find in many dictionaries. But he defined himself as a Mysterian because he struggled all his life with philosophical questions. His library was full of books heavily annotated in the margins. And he came to the conclusion that life is mysterious, the world is mysterious, and that we have to come to grips with that, and is influenced to the - how he lived his life, how he thought about religion, how he interacted with people. And so it's the sense that the world is a wonderful place and a mysterious place that pervaded everything he did. And so I think that's what you should remember him by. - Michele Norris from an NPR interview with Dana Richards on the legacy of Martin Gardner.
          IT Services Specialist II - Electronic Arts - Redwood City, CA   
MS Offce Suite, MS Visual Studio, Skype for Business, Oracle, OKTA, Adobe Suite, Cisco VPN, Virtual Machines, Data Encryption, Python, Tableau, Slack, Box, Maya...
From Electronic Arts - Tue, 13 Jun 2017 05:11:07 GMT - View all Redwood City, CA jobs
          Comment on MySQL Encryption at Rest – Part 1 (LUKS) by Ravin   
Increasing the iteration time, using sha512 should be considered for any serious encryption. Defaults are not enough.
          Hide ALL IP 2017.06.30.170630 + Portable   
Hide ALL IP 2017.06.30.170630 + Portable
Hide ALL IP 2017.06.30.170630 + Portable

Hide ALL IP is the worlds best IP hide software, hide all your applications and games IP from snoopers & hackers, allows you to surf anonymously, prevent identity theft, and guard against hacker intrusions, all just need a click. Your IP address can link your internet activities directly to you, it can easy leak you by this IP address, Hide ALL IP protects your online identity by change your IP address to our private server's IP and routes all your internet traffic through our encrypted internet servers so that all remote servers only get a fake IP address, you are very safely. Unlike your ISP, Hide ALL IP does not track and does not record any where you go !
          Income Tax Filing - Top 10 FAQ related to Income Tax Filing   

Top 10 FAQ related to Income Tax Filling

  1. What is E-File?
  2. When is the tax filing deadline ( last date of Income Tax Filing)?
  3. Why file electronically?
  4. How does E-File work?
  5. Is online tax filing safe?
  6. How accurate is E-File?
  7. How long does it take?
  8. How much does it cost?
  9. Will I really get my refund faster?
  10. Do I need to keep copies of my tax returns?
So are you intrested to get answer of above questions....???? One by one see the answer of above your problem....see below for Income Tax Filing Frequently Asked Questions ::

(1) What is E-File?

It is a cooperative tax filing program with the IRS which makes it possible for taxpayers to file both federal and state personal income tax returns electronically at the same time. You file your income tax return using a computer instead of manually preparing and mailing your return. It is not only the fastest and most accurate way to file your return, but you can also expect to receive your refund sooner than if you file a paper return. You will receive your refund even faster when you have it deposited directly into your savings or checking account.

(2) When is the tax filing deadline?

The income tax filing deadline is April 17, 2009. If you file and/or pay taxes due after the April 17th due date, you may be subject to interest and penalties.

(3) Why file electronically?

You'll get your refund faster. – E-Filed refunds are usually received within 1-2 weeks. Even faster, in as little as 5 days, if the direct deposit option is used. You'll make fewer errors. The online service automatically checks your return and corrects any math errors it finds. The error rate on E-Filed returns is less than ½%.

You will get an acknowledgment of receipt from the IRS , so you will know that your returns have been received and accepted.

(4) How does E-File ( online income tax filing ) work?

You can choose to have a tax professional E-File your return for you or, if you prefer, you can E-File from your own personal computer. Visit the Arizona Department of Revenue’s web site for a listing of approved online service providers and approved prepackaged software. E-File is not only fast, but it’s also easy, and you don’t have to worry about your return being lost or delayed in the mail.

(5) Is online Tax Filling safe?

Yes. Online Income tax filing is secure. The information is encrypted and your return is securely transmitted to the IRS and to the Arizona Department of Revenue. So Online Tax Preperation service is totally secure and fast way by which you can file your taxes directly to IRS.

(6) How accurate is E-File ( income tax filing )?

It is virtually error proof! E-File is so accurate it almost eliminates the possibility of a mistake on your tax return. If an error is found, the Department of Revenue will notify you or your preparer immediately using electronic notification. After the error has been corrected, you may be able to resubmit your return electronically or may need to submit a paper return, depending upon the software program used to file your return.

(7) How long does it take?

That will depend on the complexity of your return and the service you select. If you have a simple return, it will take you about one hour. After spending hardly 60 minutes your online income tax return is completely prepared. So File your taxes online and Get fast Tax Refunds. Fill your pocket with your refunds and steal handsome amount from IRS. So File taxes online now!!!

(8) How much does it cost?

Costs vary, depending on which service you use. Check out the costs when visiting each service's web site. Some services offer free filing for people who meet certain income or age limits.

(9) Will I really get my refund faster?

In 2002, 98 percent of E-File Tax Returns that expected a refund took as little as 10 days or less while paper returns took considerably longer. To receive your refund as fast as possible, you should select the direct deposit option for your refund. Your refund will reach your checking or savings account in as little as 5 days; plus, you don't have to worry about losing or misplacing the check. You can call your bank to verify that your refund has been deposited.

(10) Do I need to keep copies of my tax returns?

Yes. After filing your Income Tax Return online, you will need to print and save a copy for your records, along with your W-2s and 1099s. If you forget, you need only go back to the service's web site, access your information, and print a copy.

          JAVID JABS   


The sophisticated underground rocket launcher system in Gaza has been exposed by the terrorist organization in a video it released Saturday.


In Burma, he called the country by what the generals used to call it, he badly mauled and miss-pronounced the name of leader of their democracy movement. Add to that, he kissed this single woman, which in their culture is an insult.....He gave credit to himself for the democracy movement there (the credit should go to the Bush administration and Laura Bush in particular ) and some are praising him, and fawning over this trip ! Oh , please...


See Explanation.  Clicking on the picture will download
 the highest resolution version available.
Like a Diamond in the Sky
Image Credit & Copyright: Alex Cherney (Terrastro, TWAN)
Explanation: A dark Sun hung over Queensland, Australia on Wednesday morning during a much anticipated total solar eclipse. Storm clouds threatened to spoil the view along the northern coast, but minutes before totality the clouds parted. Streaming past the Moon's edge, the last direct rays of sunlight produced a gorgeous diamond ring effect in this scene from Ellis Beach between Cairns and Port Douglas. Winking out in a moment, the diamond didn't last forever though. The area was plunged into darkness for nearly 2 minutes as the Moon's shadow swept off shore toward Australia's Great Barrier Reef and out into the southern Pacific. Ranging from 1/4000 to 1/15 seconds long, five separate exposures were blended in the image to create a presentation similar to the breathtaking visual experience of the eclipse.

Amateurish Hamas Propaganda Uses Easily Disproven Photo of 'IDF Soldier' w Boot On Palestinian Child
Reaganite Republican ^ | 18 November 2012 | Reaganite Republican

How dumb do they think you are?


A picture you will never see…

Found on the IDF Twitter feed, the video below depicts life in southern Israel under fire of the rockets that have rained down from Gaza: “Over the past 12 years, the residents of southern Israel have suffered over 12,000 rockets fired at them from the Gaza Strip. This is what their life has looked like over the years.” I think it’s safe to say you won’t be seeing this brief video compilation on the BCC or CNN either.

Iran must be President Obama’s immediate priority

By Henry A. Kissinger, Published: November 16

Henry A. Kissinger was secretary of state from 1973 to 1977.
In the aftermath of an exhausting reelection campaign, the most urgent decision facing the president is how to stop Iran from pursuing a military nuclear program. Presidents of both parties have long declared that “no option is off the table” in securing this goal. In the third presidential debate, the candidates agreed that this was a matter of the American national interest, even as they described the objective alternately as preventing an Iranian “nuclear weapon” or “breakout capacity” (President Obama), or a “nuclear-capable Iran” (Mitt Romney). As Iran continues to elaborate its enrichment capacity and move it underground, Israeli Prime Minister Benjamin Netanyahu has announced a spring deadline for counteraction. In this fraught environment, what operational meaning should be given to America’s declared objectives?

The United States and Iran are apparently conducting bilateral negotiations through official or semiofficial emissaries — a departure from the previous procedure of multilateral talks. Negotiations over Iran’s nuclear program do not have an encouraging record. For more than a decade, Iran has stalled, first with the “EU-3” (France, Germany and Britain) and then with the “P5+1” (the members of the U.N. Security Council plus Germany). It has alternated hints of flexibility with periods of intransigence, all while expanding, concealing and dispersing its nuclear facilities. If no limit is placed on this process, Iran’s tech­no­logical progress will dominate events. But at what stage, and in what manner, should Iran be deprived of a military nuclear capability? This has been the essence of the argument over “red lines.”

Three stages are involved in the evolution of a military nuclear capability: a delivery system, a capacity to enrich uranium and the production of nuclear warheads. Iran has been augmenting the range and number of its missile systems since at least 2006. Its enrichment capacity — long underreported to the International Atomic Energy Agency — has been expanded to thousands of centrifuges (the instruments that enrich uranium to bomb-grade material). The level exceeds any reasonable definition of peaceful uses authorized by the Non-Proliferation Treaty. The inevitable culmination is a nuclear weapon.

To draw the line at proscribing an Iranian nuclear weapon — as some argue — would prove unmanageable. Once the requisite amount of fissile material has been produced, constructing and equipping a warhead is a relatively short and technologically straightforward process, almost certainly impossible to detect in a timely fashion.

If so ineffectual a red line were to emerge from a decade of diplomacy by the permanent members of the Security Council, the result would be an essentially uncontrollable military nuclear proliferation throughout a region roiled by revolution and sectarian blood-feuds. Iran would thereby achieve the status of North Korea, with a military nuclear program at the very edge of going operational. Each nation that has a nuclear option would compete to minimize the time to its own full military nuclear capability. 

Meanwhile, countries within the reach of Iran’s military but lacking a nuclear option would be driven to reorient their political alignment toward Tehran. The reformist tendencies in the Arab Spring — already under severe pressure — would be submerged by this process. The president’s vision of progress toward a global reduction of nuclear weapons would suffer a blow, perhaps a fatal one.
Some have argued that even in the worst-case scenario, a nuclear Iran could be deterred. Yet this ignores the immensely costly, complex and tension-ridden realities of Cold War-era deterrence, the apocalyptic strain in the Iranian theocracy and the near-certainty that several regional powers will go nuclear if Iran does. Once nuclear balances are forged in conditions where tensions are no longer purely bilateral, as in the Cold War, and in still-developing countries whose technology to prevent accidents is rudimentary, the likelihood of some nuclear exchange will mount dramatically.

This is why the United States has insisted on limits on Iranian enrichment — that is, curtailing access to a weapon’s precursor elements. Abandoning the original demand to ban all enrichment, the P5+1 has explored what levels of production of fissile material are compatible with the peaceful uses authorized by the Non-Proliferation Treaty. The higher the level of enrichment, the shorter the time needed to bring about militarily applicable results. Conventional wisdom holds that the highest practically enforceable limit is 5 percent enrichment, and then only if all fissile material beyond an agreed amount is safeguarded outside Iran.

The time available for a diplomatic outcome shrinks in direct proportion as the Iranian enrichment capacity grows and a military nuclear capacity approaches. The diplomatic process must therefore be brought to a point of decision. The P5+1 or the United States unilaterally must put forward a precise program to curtail Iranian enrichment with specific time limits.

This does not imply a red line authorizing any country to go to war. However respectfully the views of friends are considered, the ultimate decision over peace or war must remain in the hands of the president. Why negotiate with a country of such demonstrated hostility and evasiveness? Precisely because the situation is so fraught. Diplomacy may reach an acceptable agreed outcome. Or its failure will mobilize the American people and the world. It will clarify either the causes of an escalating crisis, up to the level of military pressure, or ultimate acquiescence in an Iranian nuclear program. Either outcome will require a willingness to see it through to its ultimate implications. We cannot afford another strategic disaster.

To the extent that Iran shows willingness to conduct itself as a nation-state, rather than a revolutionary religious cause, and accepts enforceable verification, elements of Iranian security concerns should be taken seriously, including gradual easing of sanctions as strict limits on enrichment are implemented and enforced. But time will be urgent. Tehran must be made to understand that the alternative to an agreement is not simply a further period of negotiation and that using negotiations to gain time will have grave consequences. A creative diplomacy, allied to a determined strategy, may still be able to prevent a crisis provided the United States plays a decisive role in defining permissible outcomes.

2012 Tribune Media Services

More on this topic: A video interview with Henry Kissinger Henry A. Kissinger: Meshing realism and idealism in the Middle East David Ignatius: An interview with Mahmoud Ahmadinejad Charles Krauthammer: Collapse of the Cairo Doctrine

American media yawns, and some of our own friends fawn over him about his insulting kiss.....

Insult: A photograph in June 2011 shows Broadwell watching as Petraeus and his wife Holly arrive for a Senate Select Intelligence Committee hearing on Petraeus' nomination to be director of the CIA


60 Second Refutation of Socialism, While Sitting at the Beach

Last week, there were several comments in Carnival of the Capitalists that people would like to see more articles highlighting the benefits of capitalism. This got me thinking about a conversation I had years ago at the beach:
Hanging out at the beach one day with a distant family member, we got into a discussion about capitalism and socialism. In particular, we were arguing about whether brute labor, as socialism teaches, is the source of all wealth (which, socialism further argues, is in turn stolen by the capitalist masters). The young woman, as were most people her age, was taught mainly by the socialists who dominate college academia nowadays. I was trying to find a way to connect with her, to get her to question her assumptions, but was struggling because she really had not been taught many of the fundamental building blocks of either philosophy or economics, but rather a mish-mash of politically correct points of view that seem to substitute nowadays for both.
One of the reasons I took up writing a blog is that I have never been as snappy or witty in real-time discussions as I would like to be, and I generally think of the perfect comeback or argument minutes or hours too late. I have always done better with writing, where I have time to think. However, on this day, I had inspiration from a half-remembered story I had heard before. I am sure I stole the following argument from someone, but to this day I still can't remember from whom.
I picked up a handful of sand, and said "this is almost pure silicon, virtually identical to what powers a computer. Take as much labor as you want, and build me a computer with it -- the only limitation is you can only have true manual laborers - no engineers or managers or other capitalist lackeys".
Yeah, I know what you're thinking - beach sand is not pure silicon - it is actually silicon dioxide, SiO2, but if she didn't take any economics she certainly didn't take any chemistry or geology.
She replied that my request was BS, that it took a lot of money to build an electronics plant, and her group of laborers didn't have any and bankers would never lend them any.
All too many defenders of capitalism would have stopped here, and said aha! So you admit you need more than labor - you need capital too. But Marx would not have disagreed - he would have said it was the separation of labor and capital that was bad - only when laborers owned the capital, rather than being slaves to the ruling class that now controls the capital, would the world reach nirvana. So I offered her just that:
I told her - assume for our discussion that I have tons of money, and I will give you and your laborers as much as you need. The only restriction I put on it is that you may only buy raw materials - steel, land, silicon - in their crudest forms. It is up to you to assemble these raw materials, with your laborers, to build the factory and make me my computer.
She thought for a few seconds, and responded "but I can't - I don't know how. I need someone to tell me how to do it"
And that is the heart of socialism's failure. For the true source of wealth is not brute labor, or even what you might call brute capital, but the mind. The mind creates new technologies, new products, new business models, new productivity enhancements, in short, everything that creates wealth. Labor or capital without a mind behind it is useless.

Since 1700, the GDP per capita in places like the US has risen, in real terms, over 40 fold. This is a real increase in total wealth - it is not money stolen or looted or exploited. Wealthy nations like the US didn't "take" the wealth from somewhere else - it never even existed before. It was created by the minds of human beings.
How? What changed? Historians who really study this stuff would probably point to a jillion things, but in my mind two are important:
  1. There was a philosophical and intellectual change where questioning established beliefs and social patterns went from being heresy and unthinkable to being acceptable, and even in vogue. In other words, men, at first just the elite but soon everyone, were urged to use their mind rather than just relying on established beliefs
  2. There were social and political changes that greatly increased the number of people capable of entrepreneurship. Before this time, the vast vast majority of people were locked into social positions that allowed them no flexibility to act on a good idea, even if they had one. By starting to create a large and free middle class, first in the Netherlands and England and then in the US, more people had the ability to use their mind to create new wealth. Whereas before, perhaps 1% or less of any population really had the freedom to truly act on their ideas, after 1700 many more people began to have this freedom.
So today's wealth, and everything that goes with it (from shorter work hours to longer life spans) is the result of more people using their minds more freely.
Look around the world - for any country, ask yourself if the average person in that country has the open intellectual climate that encourages people to think for themselves, and the open political and economic climate that allows people to act on the insights their minds provide and to keep the fruits of their effort. Where you can answer yes to both, you will find wealth and growth. Where you answer no to both, you will find poverty and misery.

It says it in the Bible:
It all makes sense now. Gay marriage and marijuana being legalized on the same day!

Leviticus 20:13 - "if a man lays with another man, he should be stoned."

We've just been interpreting it wrong all these years!!!


Ugly uniform of the Steelers ! WASPS?

Ross Mirkarimi Dresses Like General Eisenhower

Luke Thomas
A sharp-dressed man...
Sheriff Ross Mirkarimi and District Attorney George Gascón aren't exactly seeing eye to eye these days. But if a common bond could be forged, perhaps the first step to take would be uniting the warring city officials over their shared sartorial senses.

As police chief, Gascón was far more likely than not to wander into police headquarters dressed like a lawyer. Gascón is a lawyer, and Mirkarimi is not -- but, in the limited amount of time the sheriff has been permitted to do the job he was elected to do, he's often outfitted like one.

So, it was a bit jarring to see Mirkarimi clothed in full sheriff's dress regalia during the weekend's Veteran's Day March. Decked out in a forest green uniform complete with gold-starred epaulets and gold bands on an Eisenhower jacket, the progressive sheriff looks like he ought to be leaping off a Jeep and warning us about the perils of the Military-Industrial Complex.

Yet while this uniform might be a head-turner, it's actually something of a California template.

Sheriff's department spokeswoman Susan Fahey said the "Class A uniform" -- worn to inaugurations, funerals, and other high-level events -- is essentially "standardized" throughout the state.

Even the longest-serving sheriffs couldn't remember wearing anything much different, other than a sea change in 1999 or 2000 when the department pulled the trigger and made the shift from British green to forest green. Those were heady times.

Calls to the California State Sheriffs' Association querying why sheriffs' duds look like a cross between military officers and park rangers have not yet been answered.

A quick glance at the association's board of directors, however, reveals that Fahey is right -- there is a fairly standard template of sheriff's dress uniforms.

More when we know more about this most pressing situation.

Puke !!!


Another Puke ! ! !

Posted Image

Posted Image

Posted Image

Posted Image

Posted Image

Posted Image


สัปดาห์ที่ 11

วันที่ 24 สิงหาคม 2555

-อาจารย์ให้ฟังเพลงเกาะสมุยมันมีอะไร  แล้ววิเคราะห์ว่าฟังแล้วมันให้อะไร  วัตถุประสงค์คืออะไร  และเราฟังแล้วรู้สึกอย่างไร  พูดถึงสถานที่ท่องเที่ยวคือเกาะสมุย  เชิญชวนให้คนมาเที่ยวเกาะสมุยและฟังแล้วทำให้เรารู้สึกอยากไปตามที่เนื้อเพลงได้กล่าวถึง...
การจัดประสบการณ์สำหรับเด็กปฐมวัยโดยใช้วรรณกรรมเป็นฐาน  เรื่องช้างน้อยอัลเฟรด
     เมื่อคุณครูเล่านิทานจบ  แล้วให้เด็กออกมาเล่า เป็นการส่งเสริมความสามารถในการจับใจความจากการดูภาพและฟังเรื่องราว  เด็กออกมาเล่าทำให้เกิดการแปลความ  ตีความ  คาดคะเน  และเก็บประเด็นสำคัญแล้วผสมผสานสิ่งที่ฟังเป็นเรื่องราวและพูดถ่ายทอดความหมายให้ผู้อื่นเข้าใจ  ซึ่งเป็นพื้นฐานของภาษา
     เด็กแสดงละคร  ทำให้เด็กเกิดการเรียนรู้เกี่ยวกับการเลือกสัญลักษณ์ที่เหมาะสม
     เด็กได้ประดิษฐ์รูปช้าง  ทำให้เด็กรู้จักการทำงานอย่างเป็นขั้นตอน  เชื่อมโยงกับสิ่งที่เล่ามา  ได้ทำงานแบบร่มมือและสร้างสรรค์สิ่งสวยงาม
     เด็กได้ไปทัศนศึกษาที่เขาดิน  ทำให้เด็้กได้ใกล้ชิดกับสิ่งที่เป็นจริงแล้วเกิดการเปรียบเทียบสิ่งที่เป็นจริงกับสิ่งที่อยู่ในนิทาน  เกิดการวิเคราะห์  แยกแยะ
     เด็กได้เต้นประกอบเพลงช้าง  ส่งเสริมพัฒนาการทางด้่านร่างกาย

     ต้องมีเนื้อเพลง(เขียนลง Power Point)  ทำนองเพลง(เพลงอะไรก็ได้)  พร้อมทำท่าทางประกอบ
-เล่านิทาน  โดยเล่าไปฉีกไป  กำหนดเรื่องขึ้นมาเอง
สัปดาห์ต่อไปแสดง  พร้อมเริ่มทยอยส่งงานทุกชิ้นได้



สัปดาห์ที่ 10  เรียนชดเชย

วันที่ 19 สิงหาคม 2555

-สัปดาห์หน้าอาจารยนัดส่ง Power Point กิจกรรมเล่านิทานให้น้องๆ ฟังของสัปดาห์ที่ 7 ทุกกลุ่ม
-งานสัปดาห์นี้คือ ทำสื่อบนปฎิทิน ตามที่แต่ละกลุ่มจับฉลากได้        
 อักษรสูง     : ง  ญ  น  ย  ร  ว  ม  ล   
 อักษรกลาง : ก  จ  ด  ต  บ  ป  อ
 อักษรต่ำ     : ศ ฐ  ข  ส  ฝ  ถ  ผ  ห   ฉ
สระมีทั้งหมด : อะ   อา/อิ  อี/อุ  อู/เอะ  เอ/แอะ  แอ/โอะ  โอ
กลุ่มของดิฉันได้ อักษรกลาง : ก  จ  ด  ต  บ  ป  อ  สระ โอะ  โอ



สัปดาห์ที่ 10

  วันที่ 17 สิงหาคม 2555 

หมายเหตุ เนื่องจาก อาจารย์ให้เรียนชดเชยในวันอาทิตย์ที่  15 สิงหาคม 2555 เวลา 13.00 น.
ที่ห้อง 223



สัปดาห์ที่ 9

วันที่ 10 สิงหาคม  2555

      อาจารย์สั่งให้ทำปฎิทินตั้งโต๊ะ  โดยนำปฎิทินเก่ามาทำเพื่อทำ  เป็นสื่อที่เกิดประโยชน์แก่น้องๆ   รายละเอียดในการทำงานและการแบ่งกลุ่ม  อาจารย์ให้มารับที่โต๊ะในวันพุธที่  15 สิงหาคม 2555 แล้วสัปดาห์หน้าทุกกลุ่มต้องพร้อมที่จะนำเสนอ


          VPNs and You   

History books of the future will refer to the mid-90s to early 2000s as the golden age of the internet. Why do they they think that? Well for starters, before I sat down to write this I googled “how to write a good tech article” and over 6 million results were found. Truly a marvelous time! However, it seems these days there is always something in the news about a hacking scandal or somebody getting their identity stolen, a bank account hacked, etc. With how open and cavalier some folks can be with their online activity and digital footprint, it’s no surprise there are so many instances of privacy crimes and security breaches taking place over the internet.

If you’re like me, you probably enjoy being able to venture freely across the digital serengeti that is the inter-webs, all the while remaining protected and anonymous to anyone who may be lurking in binary-coded shadows.

So how can you stay protected?

The answer is VPN. VPN stands for Virtual Private Network and it is many things, but above all else, it provides safe and anonymous access to the Internet. When you are connected to your wifi through a dedicated VPN, all of your traffic and activity becomes encrypted and impossible to be read and understood, essentially “scrambling” your IP address and redirecting its “origin” elsewhere, thus granting you total anonymity to anyone who may be looking. Thus, even if your communication is eavesdropped by malicious persons, they would be unable to decipher what site you are connecting to or what information you are exchanging. Acquiring a VPN is just as easy as a few clicks. I personally use Private Internet Access (PIA), which requires a monthly or yearly subscription to use the VPN service. Now, as far as setup goes, think of a VPN as just another application. It requires a download, a brief registration process, and that’s it! Once it’s downloaded and you’ve registered with the service, open it up and start surfing freely and privately. Keep in mind, a true, dedicated VPN runs in the background on your computer and is non-invasive, thus you shouldn’t even notice it doing its job. Remember this if you are setting out on the hunt for a reliable VPN service. Most importantly, do the research! There are dozens upon dozens of VPN services out there, free and subscription based, so take the time to make sure the one you go with is suited to your needs and desires. 

If you’re the type of individual who doesn’t do much online business and/or banking, you may have no need for a VPN, but of course it never hurts to add that extra level of security and peace of mind!

          Comment on EDS - TrueCrypt encryption for Android with Dropbox sync by Ramlal Jakhar   
How to recover my data all videos photos and songs deleted by apps eds lite please
          Faces >> Carlinhos Rech - Clube do Remo   

Face : Boruc (Fiorentina-ITA)
Hair : Piqué (Barcelona-ESP)

by: LukitaWWE
          Faces >> Leandro Cearense - Clube do Remo   

Face : Abate (Milan-ITA)
Hair : Vidal (Juventus-ITA)

by: LukitaWWE
          Tutorial >> Val Barreto (Clube do Remo)   

Time : Clube do Remo (Others)
Nome do Jogador : VAL BARRETO
Nome dos Comentários : BARRETO
Nome no Uniforme : VAL BARRETO
Espaço entre letras : 2


Configuração Básica :
Nacionalidade : BRASIL
Idade : 27
Melhor Pé : Pé Direito
Tipo de Desenvolvimento : Precoce/durad.


Posição : CA
               SA - Posição Registrada


Habilidades :


Índice do Jogador :


Face : NZogbia (Aston Villa - ENG)
Hair : D. Bent (Aston Villa - ENG)


Fisico :
Altura(cm) : 1,88
Peso (Kg) :  90
Constituição Fisica :
Tamanho da Cabeça :
6 .2
Profun. da Cabeça :
Acessorios :
Chuteiras : CTR Maestrl III
Pulseira : Desl.
Munhequeira : Desl
Luvas do Jogador : Automático
Roupa de Baixo : Desl.
Fita : Desl.

Estilo do Uniforme :
Mangas : Automático
Extremidade da Camisa : Por Fora
Comprimento da Meia : Normal
Camisas Internas : Liga

Movimento :
Drible : 3
Falta : 1
Pênalti : 3
Reposição de Bola : 1
Comemoração de Gol 1 : 40
Comemoração de Gol 2 : 42

by : LukitaWWE
          Faces >> Zé Antonio - Clube do Remo (PES 2013)   

Face : Bonera (Milan-ITA)
Hair : Curto/Crespo/9/Preto

by : LukitaWWE

          Faces >> Val Barreto (Vallotelli) Clube do Remo (PES 2013)   

Face : N´Zogbia (West Midlands Village : Aston Villa - ENG)
Hair : D. Bent (West Midlands Village : Aston Villa - ENG)

by: LukitaWWE
          Uniformes >> Liverpool 1 e 2 (2013)   

clique em mais informaçoes para pegar o uniforme.

Uniforme 1 -
Uniforme 2 -

          Price Drop: Simple Notes - The Ultimate Notes App   
Simple Notes - The Ultimate Notes App
Kategorie: Produktivität
Preis: 3,49 € -> 1,09 €
Version: 2.3
in iTunes öffnen

دعم كامل للواجهة العربية Simple, Clean and Easy to Use, Yet Powerful and Loaded with Features. Key Features: - - One universal app for all your IOS Devices. - Sync your notes with Dropbox and/or iCloud. - Zoom in or out on any note to get the ideal font size suitable for your vision. - Highlight words and search terms inside your notes. - Set reminders to your notes to read them later. - Save text as an image to your camera roll. - Use Password Protection with Advanced Encryption Standard (AES 256-bit) to secure data and to protect your notes from prying eyes. - Shake your device to undo or redo: delete, creating, editing, restoring and more. - 9 font styles with five font colors. - Sort your notes chronologically or alphabetically. - Choose from six different color themes to modify your notes to suit your taste. - Share your notes on Twitter, Facebook and more. - Send your notes via bluetooth. - The ability to AirPrint your notes. - Action extension to save a new note without opening the app. - Today widget to save clipboard text as a note. - Auto Paste: when you run the app it will save text that you copied (Text in the Clipboard) automatically as a note. You can also enable "Run in Background" to save what you copied when the app is a closed. - Night Mode that makes reading in the dark easier on your eyes. - Optimized for iPhone 6 and iPhone 6 Plus. - And much more..
          Folder Lock 7.7.0   
Folder Lock offers the fastest way of encrypting/password protecting files and folders. [License: Shareware $39.95 | Requires: Win 10 / 8 / 7 / Vista / XP | Size: 10.0 MB ]
          Forex Trading Software   

Forex Trading Software

If you are looking to get started trading the Forex, you will find that there are numerous software programs available (both web based and desktop based) for you to use in your trading. In fact, most brokers offer clients a software package for free or as part of their trading account. Usually the software that comes with your trading account is a very basic "bare bones" model. Sometimes, more features are available for a price. The software packages your broker provides can be an important consideration in choosing a broker. You may want to download and try some different packages using a demo account. This will give you a better idea of which software package you find most suitable to your unique style of trading.

Forex trading software comes in two basic flavors - desktop software, and web based software. Which one you choose to work with depends on your preference and other more technical factors. Obviously, the Forex market is very dynamic and you need to have the most reliable up to date connection to the data as possible. Your internet connection speed is a factor here, and if you can afford it, you really should be connecting via broadband.

Your internet connection speed is just one of the factors you should consider when selecting forex trading software. The biggest consideration should be one of security.

Generally speaking, web based forex software is more secure than a desktop based software package. Why is that? Well, with a desktop software, your information and data is stored on your hard drive thus making it vulnerable to numerous security issues. If your computer became infected by a virus, your personal data and the integrity of your trading system can become compromised. Likewise, in the event of hard drive failure, your important data can be lost. Then there is the threat of prying eyes accessing your trading systems.

Luckily, if you choose to go with a desktop based software for your forex trading, you can do some things to limit the risks. For starters, a dedicated computer just for trading the forex would be a wise investment. Due to the popularity of forex trading, there are computers made specifically with a forex traders needs in mind. Even if you cant afford a dedicated machine, you should still apply the following tips to your trading computer:

* Password protect your trading software and personal data
* Make regular backups of your trading data
* Use a anti virus program and keep it up to date
* Update your trading software regularly

If you choose to go with a web based trading software, allot of the security and maintenance issues are handled by the provider. Online based forex systems are hosted on secure servers, the same type of servers credit card processing is handled on. This gives you a great deal of protection, as your data is encrypted. Also, backups and mirrors of your account data are made by your software provider to protect you from data loss.

Aside from the security considerations, you may find that an online based trading software is simply more convenient. There is no software to download as the software runs in your regular web browser. This means that you always will have access to the latest versions and features. Also, if you travel you will certainly appreciate the ability to log in and trade from any computer with an internet connection.

As you can see, there are many options in forex trading software. You ultimately should choose to work with the software that you personally find easiest and most intuitive to use. that you personally find easiest and most intuitive to use.

For more information on Forex Trading Software and Forex trading systems, visit our sites, Forex Investing, and Forex Today

More free articles from http://www.articlesroom.com

Read more information about Forex Trading Software
          Comments: Ронни Mac разрывает Сиэтл )   

          ZeroNet and IPFS: uncensorable auto-scaling BitTorrent powered websites   

Jeremy recently nudged me into taking a close look at IPFS and ZeroNet, two BitTorrent inspired projects aiming to help achieve a more resilient distributed web that levels the playing field and is less susceptible to centralized control.

The two killer apps seem to be:

  1. DDoS resistant high-performance content distribution at scale without scaling costs and complexity.

    P2P web technology is interesting because the higher the demand, the better the system performs. Scaling is built in. You don't need to do anything special. No load balancers. No global CDN. No DevOps team. No venture capital to pay for all that server infrastructure. If your content is in popular demand, the swarm will take care of it.

  2. Censorship resistance: forbidden political speech in China, leaks of classified government or corporate misdeeds, copyright infringing content, illicit marketplaces, etc. Basically anything that annoys the powers that be for which there is enough demand to power a swarm.

    The P2P web takes the idea of the Internet treating censorship as damage and routing around it to a whole new level. The Internet isn't just routing around censorship, it's routing around the very possibility of censorship. Censorship attempts are the de-facto driving force revolutionizing content distribution.

    Ironically, the recent global crackdown on Torrent sites will probably do more for the rise of an unstoppable P2P web than anything else:

    You can't win Vader. If you strike me down, I shall become more powerful than you can possibly imagine.


Didn't TOR onion sites already solve censorship resistance?

No, because:

  1. TOR onion sites are relatively slow and hard to scale.

  2. You still have to host your hidden site somewhere and that somewhere becomes the central point of failure. It's very typical for TOR sites to go down or suffer Denial of Service attacks.

  3. The Intelligence Community have been flooding TOR with malicious nodes. With enough of those deducing the location of a hidden website becomes possible eventually. The higher the numbers of malicious nodes the higher the probability that a routing circuit will eventually be created comprising only the attacker's nodes. This allows the attacker to reveal the true IPs for both sides of the connections. This is called a Sybil attack.

    There are probably some technical countermeasures that would make this sort of attack harder, but the kind of troublemaker who would be most likely to lead this effort has been kicked out following what looks an awful lot like a character assassination campaign by JTRIG. Probably the same people behind the allegations of sexual misconduct against Wikileaks co-founder Julian Assange.

  4. Even if TOR wasn't being systematically compromised, keeping a hidden site hidden from determined investigators is very hard. It's easy to make mistakes.


This is basically a BitTorrent global filesystem protocol + reference implementation.

For a user to download content from the filesystem at least one node has to be caching it. Any file you download you also host/seed while it's in your cache and if you want to keep it in your cache you can "pin it".

This works great for popular content. The more popular the content the better it works. With unpopular content it essentially degrades to something resembling a client/server model.

In terms of censorship resistance, IPFS includes blacklists of forbidden content in the default distribution, though it's configurable so you can turn it off "at your own risk".

Personally I think all of this willful censorship stuff is just a phase to protect the protocol in its infancy. Blacklisting all forbidden content on a global filesystem is ridiculous. The only popular use case I see for that is blocking ads.

So censorship-free distributions of IPFS implementations that integrate with Tor will probably end up as the default if this ever catches on.


Unlike IPFS ZeroNet is not just a piece of the puzzle but actually a polished full stack solution for dynamic social P2P websites without any central server. That's an amazing accomplishment and it works right now.

The problem ZeroNet is solving is basically how to BitTorrent the entire website rather than just individual torrents.

I tried it and came away very very impressed. It's implemented in Python and is currently packaged & distributed a lot like the Tor Browser Bundle. There's no installation, you just unpack and it runs in place as a localhost web service your browser connects to.

The default ZeroNet homepage shows off a gallery of reference "zero" sites or zites: a messaging board, reddit-like forum, blog platform, end-to-end encrypted mailing service and social network.

Any site you visit gets "activated" and you join the swarm of users hosting it. It also shows up in the list of sites on the ZeroNet homepage along with the last time the site was updated, which has some privacy implications on shared computers.

I think the sites on the ZeroNet homepage are mostly intended as tech demos because conventional use cases already work well enough as regular websites. Due to its limited audience ZeroNet doesn't yet bring enough to the table to threaten the status quo for use cases where censorship resistance is not a requirement.

That means you need to venture beyond the ZeroNet homepage to see the point of it all. One of the best ways to do that is to search for sites on the Kaffiene search engine:

I think at present the best showcase for why ZeroNet could matter is Play, a polished curated site of verified torrents to popular movie releases. Judging by the number of seeders it also seems to be one of the most popular P2P sites on ZeroNet at present.

Well, that and a reddits style gifs site:

The main intrinsic limitation of ZeroNet is that it's less forgiving than the web with regards to unpopular content. The long tail is shorter. Beyond the handful of swarm-happy P2P sites is an empty wasteland of broken links.

          All your computers are belong to us: the dystopian future of security is now   

Alon is contemplating replacing his laptop so I figured I would recommend he take a look at Purism, a company offering laptops that are designed for people that care about security and privacy.

Unfortunately, once I started looking a bit more closely at this little rabbit it ran deep down into its little rabbit hole and I discovered that in reality there are currently very very few hardware options for people that want a computer that is not backdoored with a sophisticated rootkit at the hardware level.

I followed the Snowden revelations closely and even read Grenn Greendwald's "No Place to Hide", but still the extent of this was news to me. Apparently after 911 an NSA program called "Sentry Owl" successfully coerced major US PC companies into co-designing hardware level rootkits into their products.

By 2006 the new generation of Intel hardware came with Intel ME ("Management Engine"), the secret computer within your computer pre-installed.

The ME has a full network stack with its own MAC that works even when your computer is turned off and has direct access to RAM and you all hard drives / peripherals. It's a 5MB proprietary encrypted blackbox that was designed to be extensible while being extremely hard to reverse engineer. The ME CPU runs its own custom non-x86 instruction set (ARC), the firmware is compressed with a custom designed compression algorithm, and all code is signed and encrypted. Intel is extremely uncooperative with anyone that wants details on how this thing works, including big customers like Google.

If you wanted to design a universal hardware backdoor that is embedded into all PCs this is how you would do it.

The people who seem to know the most about Intel ME outside of the intelligence community are the free software "nuts" attempting to develop a free (free as in free speech) boot process:


Unfortunately, the latest generation of AMD hardware (post-2013) has its own version of Intel ME called the AMD PSP (Platform Security Processor) which isn't any better:


For people that want a computer that isn't backdoored at the hardware level libreboot recommends not using modern hardware at all. Yikes!

Intel ME and the AMD PSP have the NSA's fingerprints all over it. I would be very very surprised if it turned out NOT to be designed (or at least co-designed) with the concerns of US intelligence capabilities in mind.

Unfortunately, that's a problem even if you trust the NSA not to abuse their powers, because  as one 29-year old former NSA contractor armed with a thumbdrive showed - the NSA's security isn't all that great.

Even those who think it's wise to trust the NSA would probably think twice about trusting the legions of private contractors it depends on to run its mass warrantless surveillance programs.

Even worse, according to experts like Bruce Schneier the game of cyber-espionage is all offense, no defense. In other words, foreign intelligence agencies most likely already had all the documents Snowden leaked because they were already in the NSA's systems.

So now you also have to trust not just the NSA, but the Russian FSB, the Chinese Cyberarmy, and potentially anyone working for them in past, present and future.

Now I get why the Chinese are developing their own CPUs, why the Russians and Germans are reverting to typewriters and paper for classified information, and what a top US intelligence officials means when he says:

I know how deep we are in our enemies's networks without them having any idea that we're there. I'm worried that our networks are penetrated just as deeply

The only saving grace is that given the risk of detection, political fallout and attack devaluation, I reckon advanced attackers regard hardware level backdoors as the tools of last resort and only against high-value targets. For the little guys, they'll prefer plausibly deniable exploits in endpoint software that were either accidentally or maliciously inserted. And yes, part of Sentry Owl and similar programs by other intelligence agencies involves inserting undercover agents into private companies and presumably into open source projects like Debian and Ubuntu as well.

Bottom line: options for a someone who wants a computer and get reasonable assurance that it cannot be remotely controlled at the hardware level when connected to the Internet are virtually non-existent.

You can raise the bar a little bit without sacrificing too much comfort with products like those from Purism:


Features I like:

  • No binary blob drivers (which I'm certain are ALL backdoored)
  • hardware cut-off switches for RF, wireless and camera
  • Qubes OS certified / pre-installation option


Stuff I don't like:

Possibly the closest thing you can get to a free computer at the hardware and software level is by buying old refurbished hardware directly from the libreboot guys:


Unfortunately, you'll need to pay dearly for freedom. The laptop hardware was cutting edge in 2008. The server/workstation board is better since it took AMD longer to get on the backdoor bandwagon.

Also, given the well established practice of intercepting hardware in-route to install implants, if you don't have the skills to inspect hardware yourself, you can you know supposedly clean hardware hasn't been tampered with en route?

Paranoia, justified or not, is a tough hobby.

          How To Configure and Secure SFTP Without Providing Shell Access on CentOS 7   
In this article we will learn about how to configure SFTP without enabling the shell access on CentOS 7, SSH File Transfer Protocol (SFTP) which is a secure way to transferring files from servers to a server using the SSH encrypted connections, which is a different protocol from File Transfer Protocol (FTP) that is supported […]
          How To Configure and Secure SFTP Without Providing Shell Access on Ubuntu 16.04   
In this article, we will learn about how to configure SFTP without enabling the shell access on Ubuntu 14.04, SSH File Transfer Protocol (SFTP) which is a secure way to transfer files from various a servers are to a server using the SSH encrypted connections, which is a different protocol from File Transfer Protocol (FTP) […]
          AxCrypt 2.1.1513.0   

AxCrypt 2.1.1513.zero AxCrypt is the main open supply file encryption software program for Home windows. It integrates seamlessly with Home windows to compress, encrypt, decrypt, retailer, ship and work with particular person information. Options: The next are options that actually set it other than all different file encryption instruments, industrial in addition to free: Double-click […]

The post AxCrypt 2.1.1513.0 appeared first on ZetFile.

          Global attack likely cover for Ukraine malware installation   

The malicious code encrypted data and demanded victims pay a $300 ransom. The primary target of a cr...

          Samsung ATIV S Deals and Price Comparison by powerupmobile.com   

The Samsung ATIV S combines the best of Windows Phone 8 with the superior build quality and high-end design of a Samsung phone. The handset looks stunning with a 4.8-inch Super AMOLED HD display and a metallic trim and back casing with hairline finish. The 1.5GHz dual-core processor ensures there is plenty of power for the apps and the homescreen Live Tiles can be changed to show apps that you use most or you can create your own. 3.5G, Wi-Fi, Bluetooth and NFC are on board as well as GPS and Glonass support. The phone supports all the essential messaging options including instant messaging and video calling thanks to the front facing 1.9-megapixel video camera.

There is an 8-megapixel camera on board that includes geo-tagging, autofocus and LED flash and also captures video clips at 1080p. Social network integration allows you to get the latest news and gossip from friends easily and the phone memory can be expanded with a microSD card. The phone has a number of applications that make it great for keeping up with your work including Microsoft Office, device encryption and SkyDrive with free cloud storage. It's not all about work though as the multimedia player allows you to watch movies, video clips and listen to music and accessing the app store gives a choice of games and new apps to download. The phone is powerful and has a great range of features with the intuitive UI that you only get from Samsung so this is a great choice for those wanting a Windows 8 Phone.


Compare Samsung ATIV S Pay Monthly Contract Tariff Deals

Compare Samsung ATIV S Sim Free, Unlocked Prices & Deals

          Five Eyes Unlimited: What A Global Anti-Encryption Regime Could Look Like   

This week, the political heads of the intelligence services of Canada, New Zealand, Australia, the United Kingdom, and the United States (the "Five Eyes" alliance) met in Ottawa.  The Australian delegation entered the meeting saying publicly that they intended to "thwart the encryption of terrorist messaging." The final communiqué states more diplomatically that "Ministers and Attorneys General [...] noted that encryption can severely undermine public safety efforts by impeding lawful access to the content of communications during investigations into serious crimes, including terrorism. To address these issues, we committed to develop our engagement with communications and technology companies to explore shared solutions."

What might their plan be? Is this yet another attempt to ban encryption? A combined effort to compel ISPs and Internet companies to weaken their secure products? At least one leader of a Five Eyes nation has been talking recently about increasing international engagement with technology companies — with a list of laws in her back pocket that are already capable of subverting encryption, and the entire basis of user trust in the Internet.

Exporting Britain's Surveillance Regime

Before she was elevated to the role of Prime Minister by the fallout from Brexit, Theresa May was the author of the UK's Investigatory Powers bill, which spelled out the UK's plans for mass surveillance in a post-Snowden world.

At the unveiling of the bill in 2015, May's officials performed the traditional dance: they stated that they would be looking at controls on encryption, and then stating definitively that their new proposals included "no backdoors".

Sure enough, the word "encryption" does not appear in the Investigatory Powers Act (IPA). That's because it is written so broadly it doesn't need to.

We've covered the IPA before at EFF, but it's worth re-emphasizing some of the powers it grants the British government.

  • Any "communications service provider" can be served with a secret warrant, signed by the Home Secretary. Communications service provider is interpreted extremely broadly to include ISPs, social media platforms, mail services and other messaging services.
  • That warrant can describe a set of people or organizations that the government wants to spy upon.
  • It can require tech companies to insert malware onto their users' computers, re-engineer their own technology, or use their networks to interfere with any other system.
  • The warrant explicitly allows those companies to violate any other laws in complying with the warrant.
  • Beyond particular warrants, private tech companies operating in the United Kingdom also have to respond to "technical capability notices" which will require them to "To provide and maintain the capability to disclose, where practicable, the content of communications or secondary data in an intelligible form," as well as permit targeted and mass surveillance and government hacking.
  • Tech companies also have to the provide the UK government with new product designs in advance, so that the government can have time to require new "technical capabilities" before they are available to customers.

These capabilities alone already go far beyond the Nineties' dreams of a blanket ban on crypto. Under the IPA, the UK claims the theoretical ability to order a company like Apple or Facebook to remove secure communication features from their products—while being simultaneously prohibited from telling the public about it.

Companies could be prohibited from fixing existing vulnerabilities, or required to introduce new ones in forthcoming products. Even incidental users of communication tech could be commandeered to become spies in her Majesty's Secret Service: those same powers also allow the UK to, say, instruct a chain of coffee shops to use its free WiFi service to deploy British malware on its customers. (And, yes, coffee shops are given by officials as a valid example of a "communications service provider.")

Wouldn't companies push back against such demands? Possibly: but it's a much harder fight to win if it's not just the UK making the demand, but an international coalition of governments putting pressure on them to obey the same powers. This, it seems is what May's government wants next.

The Lowest Common Privacy Denominator

Since the IPA passed, May has repeatedly declared her intent to create a an international agreement on "regulating cyberspace". The difficulty of enforcing many of the theoretical powers of the IPA makes this particularly pressing.

The IPA includes language that makes it clear that the UK expects foreign companies to comply with its secret warrants. Realistically, it's far harder for UK law enforcement to get non-UK technology companies to act as their personal hacking teams. That's one reason why May's government has talked up the IPA as a "global gold standard" for surveillance, and one that they hope other countries will adopt.

In venues like the Five Eyes meeting, we can expect Britain to advocate for others to adopt IPA-like powers. In that, they will be certainly be joined by Australia, whose Prime Minister Malcolm Turnbull recently complained in the Australian Parliament that so many tech companies "are based in the United States where a strong libertarian tradition resists Government access to private communications, as the FBI found when Apple would not help unlock the iPhone of the dead San Bernardino terrorist." Turnbull, it seems, would be happy to adopt the compulsory compliance model of the United Kingdom (as would, he implied at the time of the Apple case, would President Trump).

In the meantime, the British authorities can encourage an intermediary step: other governments may be more likely to offer support for a IPA regime if Britain offers to share the results of its new powers with them.

Such information-sharing agreements are the raison d'être of the Five Eyes alliance, which began as a program to co-ordinate intelligence operations between the Anglo-American countries. That the debate over encryption is now taking place in a forum originally dedicated to intelligence matters is an indicator that the states still see extracting private communications as an intelligence matter.

But hacking and the subversion of tech companies isn't just for spies anymore. The British Act explicitly granted these abilities to conduct "equipment interference" to more than just GCHQ and Britain's other intelligence agencies. Hacking and secret warrants can now be used by, among others, the civilian police force, inland revenue and border controls. The secrecy and dirty tricks that used to be reserved for fighting agents of foreign powers is now available for use against a wide range of potential suspects.

With the Investigatory Powers Bill, the United Kingdom is now a country empowered with a blunt tools of surveillance that have no comparison in U.S. or any other countries' law. But, along with its Five Eyes partners, it is also seen as a moderate, liberal democracy, able to be trusted with access and sharing of confidential data. Similarly, Australia is one of the few countries in the world (and the only one of the Five) to legally compel ISPs to log data on their users. Canada conducts the same meta-data surveillance projects as the United States; New Zealand contributes its mass surveillance data to the shared XKEYSCORE project.

While such data-sharing may be business as usual for the Cold War spies, the risk of such unchecked co-operation have been barely considered by the judicial and legislative branches.

In the world of law enforcement, the UK has for the last year conducted a sustained lobbying campaign in the United States Congress to grant its police forces fast-track access to American tech companies' communications data. The UK would be permitted to seize the contents of Google, Facebook and other companies' customers' inboxes without a U.S. court warrant. In return, the U.S. would gain a reciprocal capability over data held in the U.K.

The danger is that, by forging broad agreements between these five countries, all will end up taking advantage of the lowest privacy standards of each. The United Kingdom will become the source of data obtained through the Investigatory Powers Bill; the United States will launder data taken from UPSTREAM and other programs through the United Kingdom's legal system, and so on.

Secret "Five Eyes" is not the venue for deciding on the future of global surveillance. Intelligence agencies and their secret alliances are no model for oversight and control of the much broader surveillance now being conducted on billions of innocent users of the public Internet. The Investigatory Powers Bill is no "gold standard.” Britain's radical new powers shouldn't be exported via the Five Eyes, either through law, or through data-sharing agreements conducted without judicial or legislative oversight.

          Is ISIS Trying To Manipulate the Crypto Debate? Tech Experts Debunk Encrypted Email Video   
ISIS releases a new video that aims to play into fears over encrypted communication.
          muhtuya: Что надо сделать если ваш пк заражен Petya ?   
Защита и где можно заразиться ?
  • Точный перевод с использованием Google Translate: Хотя этот вектор был подробно рассмотрен новостями и исследователями безопасности, включая собственную киберполицию Украины, были только косвенные доказательства этого вектора. У Microsoft теперь есть доказательства того, что несколько активных инфекций выкупа первоначально начались с законного процесса обновления Medoc.
Расшифровка файлов ?
  1. Во вторник 27 июня 2017 года в сети появился вирус под названием Petya. Были атакованы компании Роснефть и банк Хоум Кредит. После выполнения эта угроза перезаписывает главную загрузочную запись (MBR) с помощью Ransom: DOS / Petya.A и шифрует сектора системного диска. Происходит это поочередно так: Заставляет ПК пере загрузиться и выводит фальшивое системное сообщение, которое отмечает предполагаемую ошибку на диске и показывает фальшивую проверку целостности:
    Далее вы получите следующее сообщение, содержащее инструкции по покупке ключа для разблокировании системы.
  2. Вирус шифрует файлы на всех дисках о кроме папки Windows на диске C: следующие расширение шифруемых файлов:
  4. Не давно была атака вируса WannaCry который многим похож на вирус Petya о котором говорим в этой статье. Ну для начала схожесть у них что они крипто вирусы, это вирусы которые шифруют файлы пользователя требуя за расшифровку выкуп. Как утверждает Лаборатория Касперский это не тот вирус как раньше Petya а название его ExPetr, то есть этот вирус на много модифицирован скажем так что был раньше. Более подробней вы можете узнать на сайте noransom.kaspersky.ru хотя как говориться некоторые строчки кода схожи.
  5. Подцепить такой зловред можно в письме по электронной почте файл Петя.apx или с установкой обновления бухгалтерской программы M.E.doc. Ниже есть описание с блога Майкрософт о этой программе налогового уровня M.E.doc. Если в вашей сети дома или на работе появиться зараженная машина, то зловред будет распространяться с помощью все той же уязвимости что и вирус WannaCry по протоколу Smb. Эксплойт EternalBlue который использует уязвимость в Windows-реализации протокола SMB. Корпорация майкрософт как писалось в статье для защиты от WannaCry настоятельно рекомендует установить обновления для всех систем Windows и даже было выпущено обновления для уже давно не поддерживаемых продуктов таких как Windows Xp. Получается защита у вас должна стоят как и для вируса WannaCry так и для Petya одинаково. Более подробней о защите и установке обновлений читайте в статье обновления старых систем XP, 8, Windows server 2003. Бесплатную защиту от шифровальщиков в довесок к антивирусам и антишпионам можно установить от Касперского Kaspersky Anti-Ransomware. Так же если вы пользуетесь антишпионом MBAM то в него уже встроена защита не только от ПНП но и от вымогателей шифровальщиков, на сайте malwarebytes.com написано на счет шифровальщиков: Не дает злоумышленникам шифровать Ваши файлы с целью получения выкупа. Думаю это самый лучший способ установив MBAM к вашему антивирусу. Вариант от Майкрософт который уже встроен в систему, защитник Defender Windows 8.1 и Windows 10, Microsoft Security Essentials для Windows 7 и Windows Vista. Так же вы можете загрузить для одноразового сканирования на предмет зараженности вашего компьютера всех типов угроз Microsoft Safety Scanner. На сайте Майкрософт есть полное описание вируса откуда взялса и как попадает в систему, более точное описание правда на английском языке blogs.technet.microsoft.com. На блоге говориться что первая зараженность точнее вымогательный процесс начался с Украинской компании M.E.Doc которая разрабатывает программное обеспечение налогового учета, MEDoc.
  6. Пользователям предлагают написать на указанный почтовый ящик доказательства перечисления средств для получения ключа расшифровки. Если вы соберетесь переводить средства для расшифровки файлов то вы не сможете написать на почту зло вреду что вы отправили выкуп. Адрес электронной почты, на который жертвы должны были сообщать когда перечислили средства заблокирован германским провайдером, на их сервере был почтовый ящик. Так что перевести вы сможете а выслать вам ключ не смогут. Так что скажем официально получить ключ от вымогателей не представиться возможным. Кошелек вымогателей известный на данный момент 1 июля 2017 года blockchain, данные по поступлениям обновляются в течении 15 секунд. Чтобы остановить вирус на компьютере жертвы нужно создать пустой файл на диске C:\Windows\ perfc в свойствах указать только для чтения. Именно дешифровальщиков пока еще нет исключение для старых версий вируса на GitHub hack-petya .
    Так чтобы зашифровать диск вирусу надо перезагрузить компьютер. Если вы увидели подозрение на шифрование или заражение, не перезагружать компьютерное устройство а переводите его в спящий режим. Таким образом система не будет зашифрована и вы сможете продолжит работу.
  7. Спасти файлы:
    Спасти файлы вы можете выключив компьютер как только увидели подозрение на шифрование или действие вируса. Далее не загружая систему а загрузившись с LiveCD диска, скопировать нужные вам данные с компьютерного устройства. Будьте осторожны если вы перезагрузите компьютер файлы будут зашифрованы.
  8. Ниже показано уведомления вируса.

          Plasma Vault - Easily Create Encrypted Directories on KDE Desktop   

FOSSmint: Plasma Vault is an open-source encryption solution for KDE Neon with which you can create encrypted folders to contain private files of any format.

          Biografia Abraham Lincoln   

Biografia de Abraham Lincoln:

Abraham Lincoln (1809-1865) foi presidente dos Estados Unidos da América. Foi o presidente que emancipou os escravos de seu país, Lincoln é considerado um dos inspiradores da moderna democracia e uma das maiores figuras da história americana.

Abraham Lincoln nasceu em Hodgenville, Kentucky, em 12 de fevereiro de 1809. Filho de lavradores, desde cedo teve de trabalhar arduamente. Aos sete anos foi para Indiana com a família, em busca de melhor situação econômica. Pouco depois perdeu a mãe, e o pai casou-se outra vez. Devido à dificuldade de encontrar uma escola no novo domicílio e desejoso de progredir, o jovem Lincoln pedia livros a amigos e vizinhos para ler depois das tarefas diárias. Empregou-se numa serraria e mais tarde em barcos dos rios Ohio e Mississipi.

Em 1836, aprovado em exames de direito, tornou-se um advogado muito popular. No ano seguinte, sua família mudou-se para Springfield, Illinois, onde Lincoln encontrou melhores oportunidades profissionais. Casou-se em 1842 com Mary Todd, mulher inteligente e ambiciosa.

Início político

Filiado ao partido whig (conservador), Lincoln, entre 1834 e 1840, havia se elegido quatro vezes para a assembléia estadual, onde defendera um grande projeto para a construção de ferrovias, rodovias e canais. Nessa época, sua atitude diante do abolicionismo era reservada. Embora considerasse a escravatura uma injustiça social, temia que a abolição dificultasse a administração do país.

Entre 1847 e 1849, foi representante de Illinois no Congresso, onde propôs a emancipação gradativa para os escravos, tese que desagradou tanto aos abolicionistas quanto aos escravistas. Mais decisiva foi sua oposição à guerra no México, que o fez perder muitos votos. Sem conseguir se reeleger, afastou-se da política durante cinco anos.


A guerra contra o México ampliara o território da União e não era possível prever se a população das novas terras se declararia a favor da escravidão. Instalou-se uma grande polêmica nacional. Lincoln assumiu atitude antiescravagista e transformou-se no paladino dessa tendência após o debate que travou com o senador democrata Stephen Douglas.

Em 1858, candidato ao Senado pelo novo Partido Republicano, perdeu as eleições para Douglas, mas tornou-se líder dos republicanos. Em 1860, disputou o pleito para a presidência da república e elegeu-se o 16º presidente dos Estados Unidos.

Guerra de secessão

Ao iniciar seu governo, em 4 de março de 1861, Lincoln teve de enfrentar o separatismo de sete estados escravistas do sul, que formaram os Estados Confederados da América. O presidente foi firme e prudente: não reconheceu a secessão, ratificou a soberania nacional sobre os estados rebeldes e convidou-os à conciliação, assegurando-lhes que nunca partiria dele a iniciativa da guerra. Os confederados, porém, tomaram o forte Sumter, na Virgínia Ocidental.

Lincoln encontrou o governo sem recursos, sem exército e com uma opinião pública que lhe era favorável somente em reduzida escala. Com vontade férrea, profunda fé religiosa e confiança no povo, iniciou uma luta que primeiramente lhe foi adversa. Só conseguiu armar sete mil soldados, com os quais começou a guerra. Num só ano, decuplicou o Exército, organizou a Marinha e obteve recursos. Os confederados haviam consolidado sua situação, com a adesão de mais quatro estados aos sete sublevados. Em meados de 1863 chegaram à Pensilvânia e ameaçaram Washington. Foi nesse grave momento que se travou, em 3 de julho de 1863, a batalha de Gettysburg, vencida pelas forças do norte.

Lincoln, que decretara a emancipação dos escravos e tomara outras providências liberais, pronunciou, meses depois, ao inaugurar o cemitério nacional de Gettysburg, o célebre discurso em que definiu o significado democrático do governo do povo, pelo povo e para o povo, e que alcançou repercussão mundial.

A guerra continuou ainda por dois anos, favorável à União. Lincoln foi reeleito presidente em 1864. Em 9 de abril de 1865, os confederados renderam-se em Appomattox.

Embora considerado conservador ou reformista moderado no início da presidência, as últimas proposições de Lincoln foram avançadas. Preparava um programa de educação dos escravos libertados e chegou a sugerir que fosse concedido, de imediato, o direito de voto a uma parcela de ex-escravos. Inclinou-se também à exigência dos radicais por uma ocupação militar provisória de alguns estados sulistas, para implantar uma política de reestruturação agrária.

Em 14 de abril de 1865, Lincoln assistia a um espetáculo no Teatro Ford, em Washington, quando foi atingido na nuca por um tiro de pistola desferido por um escravista intransigente, o ex-ator John Wilkes Booth. Transportado para uma casa vizinha, Lincoln morreu na manhã do dia seguinte.

          O NOME DA ROSA   


Estranhas mortes começam a ocorrer num mosteiro beneditino localizado na Itália durante a baixa idade média, onde as vítimas aparecem sempre com os dedos e a língua roxos. O mosteiro guarda uma imensa biblioteca, onde poucos monges tem acesso às publicações sacras e profanas. A chegada de um monge franciscano (Sean Conery), incumbido de investigar os casos, irá mostrar o verdadeiro motivo dos crimes, resultando na instalação do tribunal da santa inquisição. A Baixa Idade Média (século XI ao XV) é marcada pela desintegração do feudalismo e formação do capitalismo na Europa Ocidental. Ocorrem assim, nesse período, transformações na esfera econômica (crescimento do comércio monetário), social (projeção da burguesia e sua aliança com o rei), política (formação das monarquias nacionais representadas pelos reis absolutistas) e até religiosas, que culminarão com o cisma do ocidente, através do protestantismo iniciado por Martinho Lutero na Alemanha em 1517.

Culturalmente, destaca-se o movimento renascentista que surgiu em Florença no século XIV e se propagou pela Itália e Europa, entre os séculos XV e XVI. O renascimento, enquanto movimento cultural resgatou da antiguidade greco-romana os valores antropocêntricos e racionais, que adaptados ao período, entraram em choque com o teocentrismo e dogmatismo medievais sustentados pela Igreja. No filme, o monge franciscano representa o intelectual renascentista, que com uma postura humanista e racional, consegue desvendar a verdade por trás dos crimes cometidos no mosteiro.

O livro "O Nome da Rosa" pode ser interpretado como tendo um caráter filosófico, quase metafísico, já que nele também se busca a verdade, a explicação, a solução do mistério, a partir de um novo método de investigação. E Guilherme de Bascerville, o frade fransciscano detetive, é também o filósofo, que investiga, examina, interroga, duvida, questiona e, por fim, com seu método empírico e analítico, desvenda o mistério, ainda que para isso seja pago um alto preço. O tempo no livro é tratado no ano 1327, ou seja, a Alta Idade Média. Lá se retoma o pensamento de Santo Agostinho, um dos últimos filósofos antigos e o primeiro dos medievais, que fará a mediação da filosofia grega e do pensamento do início do cristianismo com a cultura ocidental que dará origem à filosofia medieval, a partir da interpretação de Platão e o neoplatonismo do cristianismo. As teses de Agostinho nos ajudarão a entender o que se passa na biblioteca secreta do mosteiro em que se situa o livro. Neste tratado, Santo Agostinho estabelece precisamente que os cristãos podem e devem tomar da filosofia grega pagã tudo aquilo que for importante e útil para o desenvolvimento da doutrina cristã, desde que seja compatível com a fé. Isto vai constituir o critério para a relação entre o cristianismo (teologia e doutrina cristã) e a filosofia e a ciência dos antigos. Por isso é que a biblioteca tem que ser secreta, porque ela inclui obras que não estão devidamente interpretadas no contexto do cristianismo medieval. O acesso à biblioteca é restrito, porque há ali um saber que é ainda estritamente pagão (especialmente os textos de Aristóteles), e que pode ameaçar a doutrina cristã. Como diz ao final Jorge de Burgos, o velho bibliotecário, acerca do texto de Aristóteles – a comédia pode fazer com que as pessoas percam o temor a Deus e, portanto, faz desmoronar todo esse mundo.

Entre os séculos XII e XIII temos o surgimento da escolástica, que constitui o contexto filosófico teológico das disputas que se dão na abadia em que se situa O Nome da Rosa. A escolástica significa literalmente "o saber da escola", ou seja, um saber que se estrutura em torno de teses básicas e de um método básico que é compartilhado pelos principais pensadores da época. A influência de esse saber corresponde ao pensamento de Aristóteles, trazido pelos árabes (mulçumanos), que traduziram muitas de suas obras para o latim. Essas obras continham saberem filosóficos e científicos da Antiguidade que despertariam imediatamente interesses pelas inovações científicas decorrentes. O saber técnico-científico do mundo europeu era nesta época extremamente restrito e a contribuição dos árabes será fundamental para este desenvolvimento pelos conhecimentos de que dispunham de matemática, de ciências (física, química, astronomia, medicina) e de filosofia. O pensamento agora (Aristotélico) será marcado pelo empirismo e materialismo. O enredo desenvolve-se na ultima semana de 1327, num monastério da Itália medieval. A morte de sete monges em sete dias e noites, cada um de maneira mais insólita - um deles, num barril de sangue de porco, é o motor responsável pelo desenvolvimento da ação. A obra é atribuída a um suposto monge, que na juventude teria presenciado os acontecimentos. Este livro é uma crônica da vida religiosa no século XIV, e relato surpreendente de movimentos heréticos. Para muitos críticos, o nome da rosa é uma parábola sobre a Itália contemporânea. Para outros, é um exercício monumental sobre a mistificação.

O titulo do livro é uma expressão "O nome da Rosa" que foi usada na Idade Média significando o infinito poder das palavras. A rosa subsiste seu nome, apenas; mesmo que não esteja presente e nem sequer exista. A "rosa de então", centro real desse romance, é a antiga biblioteca de um convento beneditino, na qual estavam guardados, em grande número, códigos preciosos: parte importante da sabedoria grega e latina que os monges conservaram através dos séculos. Podemos dizer que durante a Idade Média umas das práticas mais comuns nas bibliotecas dos mosteiros eram apagar obras antigas escritas em pergaminhos e sobre elas escreve ou copiar novos textos. Eram os chamados palimpsestos, livretes em que textos científicos e filosóficos na Antiguidade clássica eram raspados das páginas e substituídos por orações rituais litúrgicos. O nome da rosa é um livro escrito numa linguagem da época, cheio de citações teológicas, muitas delas referidas em latim. É também uma crítica do poder e do esvaziamento dos valores pela demagogia, violências sexuais, os conflitos no seio dos movimentos heréticos, a luta contra a mistificação e o poder. Uma parábola sangrenta patética da história da humanidade.

Em suma, os acontecimentos ocorrem em 1327 William de Baskerville , um monge franciscano, e Adso von Melk , um noviço que o acompanha, chegam a um remoto mosteiro no norte da Itália. William de Baskerville pretende participar de um conclave para decidir se a Igreja deve doar parte de suas riquezas, mas a atenção é desviada por vários assassinatos que acontecem no mosteiro. William de Baskerville começa a investigar o caso, que se mostra bastante intrincando, além dos mais religiosos acreditarem que é obra do Demônio. William de Baskerville não partilha desta opinião, mas antes que ele conclua as investigações Bernardo Gui , o Grão-Inquisidor, chega no local e está pronto para torturar qualquer suspeito de heresia que tenha cometido assassinatos em nome do Diabo. Considerando que ele não gosta de Baskerville, ele é inclinado a colocá-lo no topo da lista dos que são diabolicamente influenciados. Esta batalha, junto com uma guerra ideológica entre franciscanos e dominicanos, é travada enquanto o motivo dos assassinatos é lentamente solucionado.

Portanto, do ponto de vista do livro abordado, notamos que a história passa em um mosteiro na Itália Medieval. A idade média assistiu em sua agonia um grande debate Filosófico Religioso. Perdido o equilíbrio do tomismo, o homem medieval caiu em dois extremos opostos. De um lado os humanistas racionalistas Frei Guilherme de Ockham, um édito moderno. Tais humanistas cultivaram o antropocentrismo julgaram que graças para ciências e a técnica, o homem seria capaz de vencer todas as misérias do mundo, até criar uma era de grande prosperidade material e de completa felicidade natural.

De outro lado místicos com visão extremamente pessimista da realidade. Para eles o mundo era intrinsecamente mau e irremediável por ser obra de um DEUS perverso, distinto da divindade. Acreditavam que a razão humana era má e só seria desejável perder-se no nada divino.

No mosteiro, sete monges morrem estranhamente, como se alguém estivesse praticando tais atos para ocultar algo mais grave. Há também uma violência sexual, no qual mulheres se vendem aos monges em troca de comida e muitas vezes depois são mortas para que suas vozes fossem cessadas. Movimentos ecléticos do século XIV, a luta contra a mistificação, o poder, o esvaziamento de valores pela demagogia, são mostrados em um cenário sangrento sobre a política da historia da humanidade.

Portanto a obra abordada, do ponto de vista científico nos trás um parâmetro da relação DEUS-HOMEM, para que possamos ter (ainda que vaga)alguma idéia do que se passava no lado de dentro dos muros religiosos e ás vezes eclodindo em direção a sociedede civil (o povo)e para isso devemos nos abster do senso comum e deixar de lado a ficção que envolve o livro sem cometer o pecado do anacronismo.

Referencias Bibliográficas

Filme O Nome da Rosa, Globo Filmes e Produções e direção de Jean-Jacques Annaud. ECO, Umberto. O Nome da Rosa. Rio de Janeiro. Nova Fronteira, 1983.
          How to remove ViACrypt Ransomware virus from system and infected programs   
Keep Your PC Safe from ViACrypt Ransomware Virus,Malware and Ransomware ViACrypt Ransomware is another file encoder which encrypt files and want victim to pay for that. Research reveals that this ransomware is created by cyber criminals of Norway. The ransomware is reported to target the computer users of Latvia specially those who use the latest [...]
          Hackers take down DC’s CCTV system with ransomware attack   
The Washington DC police department has revealed that a large percentage of its CCTV cameras were taken offline in a ransomware attack. The security breach was discovered earlier in the month, and it left a number of cameras unable to record as the police department worked to remove the ransomware. According to The Washington Post, this breach was first discovered … Continue reading
          Human rights coalition from the global south to W3C: don't put DRM in web standards!   

The Just Net Coalition -- whose membership roll includes leading human rights organisations from across the global south -- have written urgently to the World Wide Web Coalition and its founder, Tim Berners-Lee, calling on him to intervene to stop the Consortium from publishing its first-ever DRM standard, a system for restricting video streams called Encrypted Media Extensions. (more…)

          Petya Ransomware/Malware Recommended Considerations for DeltaV Users   
Over in the Emerson Exchange 365 global community’s DeltaV group, Emerson’s Rick Gorskie posted this update on the Petya Ramsomware / Malware cyber-attack occurring around the world. On the 27th of June 2017, we became aware of the “Petya ransomware/malware” (also called NotPetya) cyber-attack spreading throughout the world causing computers to be encrypted and victims […] The post Petya Ransomware/Malware Recommended Considerations for DeltaV Users appeared first on...
          300M Wireless-N Router Mini Wifi átjátszó Jeltartomány erősítő Booster + WPS - Jelenlegi ára: 3 647 Ft   
The Wireless Multifunction Mini Router features a variety of modes to fill whatever role required in your network. it has enough speed and wireless range to power a complex assortment of devices, enabling you to create a highly efficient mobile office or entertainment network in no time. Small enough to fit in a pocket, with wireless speeds up to 300Mbps and two 10/100Mbps LAN ports, the Mini Router is the perfect choice for high-bandwidth applications like video streaming, VoIP, and online gaming. Only passwords containing letters and numbers are supported (no special characters).
Features: Ethernet Bridge: The Twin Ethernet port allows the Extender to function as a wireless adapter to connect wired devices like Blu-ray players, gaming consoles, DVRs and Internet TVs. At the same time, the device can share wireless network as well.
5 working mode: Wireless Router, Repeater, AP, Client and Bridge.
Plug and Play(wps): With no new wires or cables, within range of their existing wireless network, users can easily extend wireless coverage at a push of the WPS button on their router.
Flexible Placement: The device's miniature size and wall-mounted design make it easy to deploy and move flexibly.
Universal Compatibility: Works seamlessly with all 802. 11 b/g/n wireless devices.
Up to 300Mbps WiFi transmission rate.
QoS function assures the quality of VoIP and multimedia streaming.
Multi-Function : Supports WEP, WPA/WPA2, WPA-PSK/ WPA2-PSK encryptions.
Supports WMM and WMM-APSD, Supports 64/128/152-bit WEP, complies with 128 bit WPA (TKIP/AES).
Specification: Antennas integrated.
Maximum WLAN security with WPA2, WPA and WEP (128/64).
Use it to Extend the Range of your Wifi Network Over a Wider Area or Eliminate dead-spots due to low signal power.
No Trailing Wires around the place.
Distance: Outdoors 500m , Indoor 100m (According to the Actual Environment Change).
Package Included: 1 x Wireless-N Mini Router
1 x User Manual
NO Retail Box. Packed Safely in Bubble Bag.
Vásárlással kapcsolatos fontos információk:
Köszöntjük oldalunkon!
Az adásvétel megkönnyítése érdekében, kérjük olvassa el vásárlási feltételeinket, melyeket rendelésével automatikusan elfogad.
Kedvezmény: Amennyiben termékeink közül minimum 50 db-ot vásárol, kedvezményt biztosítunk. Kérjük igényelje a kedvezményt ügyfélszolgálatunktól.
US hálózati csatlakozós termékeink esetén, külön rendelhető a termékeink között található US-EU átalakító adapter.
Fontos! Ha a leírásban NEM szerepel, hogy ? We dont offer color/pattern/size choice? (szín/minta/méret nem választható), akkor rendeléskor kérjük mindenképp írja bele a megjegyzés rovatba a kiválasztott színt/mintát/méretet, ellenkező esetben kollégáink véletlenszerűen postázzák. Ez esetben utólagos reklamációt nem fogadunk el.
Ahol a ? We dont offer color/pattern/size choice? kijelentés szerepel, sajnos nincs lehetőség szín/minta/méret kiválasztására. Ilyenkor kollégáink véletlenszerűen küldik a termékeket.
Kommunikáció: minden esetben kizárólag email-ben, mert így visszakövethetőek a beszélgetések.
Hibás termék: visszautaljuk a vételárat vagy újrapostázzuk a terméket megállapodástól függően, miután visszapostázta a megadott címre.
Visszautalás: a vételárat visszautaljuk, vagy a terméket újraküldjük ha nem érkezik meg a termék.
Ez esetben kérjük jelezze email-en keresztül, hogy megoldást találhassunk a problémára!
Garancia: 3 hónap! Amennyiben valóban hibás a termék, kérjük vegye fel velünk a kapcsolatot és kicseréljük vagy visszavásároljuk a terméket megegyezéstől függően.
Számlázás: Az elektronikus számlát (pdf. formátumú) Angliában regisztrált cégünk állítja ki, az ÁFA nem kimutatható, az utalás magyar céges számlánkra történik.
A szállítási idő: az összeg átutalása után 9-12 munkanap, de a postától függően előfordulhat a 25-35 munkanap is! A posta szállítási idejéért cégünk nem tud felelősséget vállalni, az említett szállítási idő tájékoztató jellegű!
Nagyon fontos! Kérjük ne vásároljanak akkor, ha nem tudják kivárni az esetleges 35 munkanap szállítási időt!
strong>Postázás: Termékeinket külföldről postázzuk.
Nagy raktárkészletünk miatt előfordulhat, hogy egy-két termék átmenetileg vagy véglegesen elfogy raktárunkból, erről mindenképp időben értesítjük és megfelelő megoldást kínálunk.
Utalás: Kizárólag átutalást (házibank, netbank) fogadunk el (bankszámláról bankszámlára),   Banki/Postai készpénz befizetést/Rózsaszín csekket ill. egyéb NEM!
Átutalásnál a rendelésszámot feltétlenül adja meg a közlemény rovatba, ellenkező esetben előfordulhat, hogy nem tudjuk visszakeresni a rendelését. Ebben az esetben nyilvánvalóan nem tudjuk a terméket postázni ill. Önt sem tudjuk értesíteni, hiszen nincs kiindulópontunk!
-2000Ft felett (postaköltséggel együtt) CSAK es KIZÁRÓLAG ajánlottan postázzuk a terméket az alábbiak szerint:
-Ajánlott posta esetén az első termékre a posta 890Ft , minden további 250 Ft/db.
- Sima Levélként 2000Ft alatt: az első termékre a posta 250Ft, minden további termék posta díja 250Ft/db.
Átvétel: azoknak a vásárlóknak akik nem veszik át a rendelt terméket a postától és visszaküldésre kerül a termék cégünkhöz, a postaköltség újbóli megfizetésével tudjuk csak újraküldeni, illetve amennyiben az összeget kéri vissza, a termékek árát tudjuk csak visszautalni, postaköltség nélkül. A termék átvétele az Ön felelőssége! Amennyiben a Mi hibánkból nem tudja átvenni, pl téves címzés miatt, így a postaköltség minket terhel.
Amennyiben a megrendelést követő 24 órán belül nem kap emailt tőlünk, ez azt jelenti, hogy az email cím (freemail és citromail esetén főleg) visszadobta a küldött email-t. Ilyenkor küldjön üzenetet egy másik e-mail címről.
Kellemes Vásárlást Kívánunk!
300M Wireless-N Router Mini Wifi átjátszó Jeltartomány erősítő Booster + WPS
Jelenlegi ára: 3 647 Ft
Az aukció vége: 2017-07-22 00:33
          CeeHosting Ltd. 50% Off Hosting - cPanel, MariaDB, LetsEncrypt, Softaculous, CloudLinux Included   
Here's CeeHosting's shared hosting offers for LET. Use the promotional code 50LET for 50% off annually. Our shared hosting is located in Garden City, New York. Budget Web Hosting 2GB SSD Diskspace 10G ... - Source: www.lowendtalk.com
          IT: The Next Generation   

Originally posted on: http://ferventcoder.com/archive/2007/08/03/IT-The-Next-Generation.aspx

I was talking with a neighbor who is going to DePaul University for software engineering.  Things have definitely changed since I was in college.  He was working on a Java PDA app and a traffic light controller application.  That is a long way from encryption programs and inventory reports.

One thing that is a little scary is that he says his focus is on project management.  Now maybe my thinking is outdated, but I don't believe that you can effectively manage developers without knowing how to develop yourself. 

Now the question is does taking a few development classes qualify?  To my way of thinking, no.  There are just so many things that you don't encounter in the class room.  Things like how do meetings affect your ability to deliver code on time and the impact of ever changing requirements don't come up in the academic environment.

So let's change the question.  Should they teach project management in school.  Most definitely.  It is just as important for a developer to understand how a project is managed as how to build the software.  I just don't believe that someone right out of college should go straight into project management.

          marvin says file is invalid or encrypted, but...   
Hi All, I have one epub that I am trying to move to Marvin, but continually get the error "file is invalid or encrypted" It should not have any DRM. I have converted it to epub again, then to mobi>epub and it still doesn't work with Marvin. However, I can read the book via Calibre and was able to load and read it in Bookari on my iPad. Any idea why Marvin still won't accept this epub? Thanks Zeph
          Hide IP Easy Full (Crack)   
Our Reader Score[Total: 0 Average: 0] Hide IP Easy Full + Crack Description: Hide IP Easy enables you to hide your real IP with a fake one, surf anonymously, prevent hackers from monitoring your activity, and provide full encryption of your online activity, all with the click of a button. Keeping your privacy is […]
          Avira Phantom VPN Pro v2.8.2.2975 + Crack   
Our Reader Score[Total: 0 Average: 0] Avira Phantom VPN Pro v2.8.2.2975 + Crack Description : Avira Phantom VPN Pro v2.8.2.2975 + Crack, Avira Phantom VPN Pro Crack helps to improve security in the anonymity of the Internet, to protect the connection through robust methods of encryption and access to all web sites and online services.Avira […]
          Dark Matter 3×05 Review: “Give It Up, Princess”   
Adrian leads the crew on what seemed like a wild goose chase. Luckily for the crew, the data file was retrieved along with an encryption key. The only issue being that the fleet of ships is gone ahead of schedule. It’s good that Adrian is different from Talbor. What he lacks in physical abilities he […]
          IT Services Specialist II - Electronic Arts - Redwood City, CA   
MS Offce Suite, MS Visual Studio, Skype for Business, Oracle, OKTA, Adobe Suite, Cisco VPN, Virtual Machines, Data Encryption, Python, Tableau, Slack, Box, Maya...
From Electronic Arts - Tue, 13 Jun 2017 05:11:07 GMT - View all Redwood City, CA jobs
          VP530 Yealink Video Telefone IP   

VP530 Yealink Video Telefone IP 



O que é?

o VP530 Yealink é unificado com áudio, vídeo, aplicações,e também, o VP530 Yealink é um avançado Telefone IP com Vídeo e é muito fácil de usar.

Seu grande display e a facilidade de uso fazem o VP530 Yealink um all-in-one uma ferramenta ideal para executivos ocupados de hoje e gestores, sejam eles no escritório, soho, saúde, etc

O VP530 Yealink ,com sua experiência de usuário  e recursos avançados para negócios, cria uma experiência face-a-face imersiva capacitando-o a colaborar com os outros como nunca antes.

Acesse o blog da Lojamundi e saiba tudo sobre Telefones IP


VP530 Yealink - Funções inteligentes integradas que tornam extremamente fácil de operar

- 4 contas VoIP, 3-way videoconferência

- Câmera de 2 MP CMOS, um ecrã a cores de 7 "touchscreen"


VP530 Yealink - Máxima produtividade para os gestores e executivos

- Agenda telefônica com foto do contato, gerente de grupo

- Métodos de configuração intuitiva baseada na web que tornam mais fácil


Especificações Técnicas


TI DaVinci dual-core chipset, resistive touch screen
7" digital TFT-LCD with 800x480 pixels resolution
Rotatable CMOS sensor camera with 2M pixels
128MB flash and 256MB DDR2 memory
27 keys including 4 soft keys

6 feature keys: Mute/Camera/Phonebook

2xLEDs for power and status indication
2xRJ45 Ethernet 10/100M ports


2.5mm headset port
A/V out (pending)
SD Memory Card, USB 2.0 (pending)


Power adapter: AC 100~240V input and DC 5V/3A output

Power over Ethernet (PoE) optional:  IEEE 802.3af, Class 0
Dimension: 286x89x45mm



Video Features do VP530 Yealink

 Video codec: H.264 and H.263
 Image codec: JPEG,PNG, BMP
 Video call format: CIF/QCIF
 Bandwidth selection: 128kbps~1Mbps
 Frame rate selection: 10~30fps
 Adaptive bandwidth adjustment
 I-frame adjustable
 Picture-in-Picture (PIP)
 Full screen for remote side
 Video control of local side
 Door phone application

Network and Security do VP530 Yealink

 SIP v1 (RFC2543), v2 (RFC3261)
 NAT transverse: STUN mode
 Proxy mode and peer-to-peer SIP link mode
 IP assignment: static/DHCP/PPPoE
 HTTP/HTTPS web server
 Time and date synchronization using SNTP
 QoS: 802.1p/Q tagging (VLAN),Layer 3 ToS, and DSCP
 SRTP for voice and video
 Transport Layer Security (TLS)
 HTTPS certificate manager
 AES encryption for configuration file
 Digest authentication using MD5/MD5-sess
 OpenVPN, IEEE802.1X

Audio Features VP530 Yealink

 HD voice: HD codec, HD handset, HD speaker
 Wideband codec: G.722
 Narrowband codec: G.711(A/μ), G.723.1, G.729AB
 DTMF: In-band, Out-of-band(RFC 2833) and SIP INFO
 Full-duplex hands-free speakerphone with AEC
 Voice activity detection
 Acoustic echo canceling
 Adaptive jitter buffers
 Packet loss concealment
 IP-PBX and BroadSoft Features
 Busy lamp field (BLF), BLF list
 Bridged line apperance(BLA)/SCA
 Message waiting indicator (MWI)
 Intercom, paging, Music on hold
 Call park, Call pickup
 Call completion
 Anonymous call, Anonymous call rejection
 DND & forward synchronization
 Dial Plan, Dial-now
 Loal phonebook up to 1000 entries
 Phonebook with contact picture
 Group manager, Favorites, Black list
 XML/LDAP remote phonebook
 Intelligent search method

 Phone Features VP530 Yealink

 4 VoIP accounts, Video/Voice call
 18 one-touch soft DSS keys
 One-touch speed dial, redial
 Call forward, Call waiting, Call transfer, Call hold
 Call return, Group listening, Group pick up
 Mute, Auto answer
 DND, Caller ID display, Call log
 Voice mail, MWI
 3-way video conferencing
 Direct IP call without SIP proxy
 New message and missed call notification
 Volume control, Ring tone selection
 Wall paper
 Set date time manually or automatically
 National language selection
 Backlight time selection
 Icon-driven menu

Open API do VP530 Yealink
 XML Browser
 Push XML
 Action URI/URL 


Sempre com o menor preço do Brasil. Conte conosco!


          WSS120 Realtone 96FXS    

WSS120 Realtone 96FXS 


O que é?

O WSS120 Realtone 96FXS  é ideal para que médias e grandes empresas desfrutem dos benefícios de comunicações VoIP Asterisk preservando os telefones analógicos e os sistemas tradicionais PBX.

Equipamentos terminais de telecomunicações, como telefone, fax, empresa PBX, etc, em rede de voz baseada em IP que construiu pelo transportador ou a própria empresa. Quando o WSS120 Realtone 96FXS colocado no lado da rede de conexão com interruptor PSTN, pode ser usado para trazer usuário VoIP remoto na rede PSTN.

Para solução de Call Center baseado em IP, é a idéia de gateway de acesso remoto para THR operadores. O WSS120 Realtone 96FXS adota o projeto modular, pode configurar flexível FXS / FXO capacidade de linha e recurso DSP para obter melhor desempenho à relação de custo.

Produto de alta qualidade e segurança.

Acesse o blog da Lojamundi e saiba tudo sobre Gateways Voip 


Suporta 96 chamadas simultâneas

Serviço de telefone residencial ou IP-Centrex com plataforma

Interligação para PABXs, ou linhas de extensão



Gateways VoIP acesso local ou remoto para aplicação IP PBX da empresa, ramos do Governo, Hotel e escolas 

Aplicativo VoIP Long Distance para supermercados de telefone IP e empresas concessionária do serviço de linha primária e secundária


Especificações Técnicas

Specs VoIP

 Protocolos: SIP e MGCP

 Codecs de voz: G.711u / aLaw, G.729A, G.723.1, GSM, iLBC

 DTMF Método: RFC2833, SIP INFO, In-Band

 G.168 cancelamento de eco

 Relé de fax T.38, T.30 fax transparente

 Detecção Voz Ativa: VAD

 CNG: geração de ruído de conforto

 Gerenciamento de buffer jitter dinâmico jitter buffer estático

 QoS: tag IEEE 802.1p

            Código ponto DiffServ (TOS) bits

 Encryption para pacotes RTP e SIP


Cliente DHCP

PPPoE Cliente


Passagem NAT (STUN)




Discagem apoiar tanto de DTMF e Pulso

Geração inversa Polaridade

Geração de ID de chamador (FSK / DTMF, antes e depois de anel anel)

Definição cadência Anel

Definição de frequência Anel

Controle de volume

Gancho configuração momento do flash

Indicador de mensagem em espera (FSK, polaridade inversa)


Processador: FREESCALE PowerQUICC MPC8247


Memória do Sistema: 128M

Memória Flash: 16M

FXO / FXS Conector: RJ45

Off-hook Detection: Laço iniciar ou DDI

Max. Linha do usuário Comprimento 1500 metros

Anel Tensão: 60V 20 RMS

No gancho Tensão: 48V

Anel Valor Equivalente 5 REN (curta distância)

Fonte de alimentação 100 ~ 240V AC, 50/60 Hz, 1A max

Consumo de energia 125W max

Dimensão (H x W x D) 44 x 440 x 300 mm (1U) 88 x 440 x 300 mm (2U)

Peso: Peso líquido: 6,1 kg; Peso bruto (incluindo embalagem): 9,8 kg

Temperatura de operação: 0 ~ 40 ℃; Umidade: 10% ~ 90% (sem conducing)

Não Temperatura de operação: -10 ~ 60 ℃; Umidade: 5% ~ 90% (sem conducing)




SIP ou MGCP VoIP Access Gateway
SIP-PSTN analógico VoIP Gateway
Apoio ao IMS TISPAN Specs
TR 069 para Gestão
RADIUS Client para CDR

          AutoEncryptor Ransomware   
Solution À Effacer AutoEncryptor Ransomware Divers AutoEncryptor Ransomware infections liées AdwareBrowserModifier.KeenValue PerfectNav, Targetsoft.winhost32, Windupdates.E, EverAd, Adware.IPInsight, Adware.Toolbar.MyWebSearch, E-ventures, Nsis:Adware-CJBrowser HijackerZeroPopup, Aim-search.net, Greatresults.info, Openadserving.com, Enormousw1illa.com, Eseeky.com, Antivirart.com, Searchwebresults.com, Webplayersearch.com, Eazel.comRansomware.locky File Extension Ransomware, Cryptofag Ransomware, helpmeonce@mail.ru Ransomware, VapeLauncher, Jhon Woddy Ransomware, .wcry File Extension Ransomware, A_Princ@aol.com Ransomware, Evil Ransomware, Pickles Ransomware, EvilLock Ransomware, CryptXXX Ransomware, KoKo Locker RansomwareTrojanTROJ_TDSS.FAT, Trojan.Downexec.G!inf, Trojan.Win32.FraudPack.ajto, MsnPws Trojan, I-Worm.Kelino.g, Trojan.FavAdd, Hoax.Renos.asa, TrojanDownloader:MSIL/Xertob.A SpywareE-set.exe, Files Secure, WinSpyControl, SysDefender, DyFuCA.SafeSurfing, Win32/Patched.HN, VirusEffaceur, KGB Spy, SpyPal Simple Étapes À Supprimer...

Read More Read More

          htmlencrypt.com 6 999 USD   
Prix: 6 999 USD
Trafic : --
Langue : Anglais
          New ransomware attack – “Nyetya”   

Interview with Scott Manson, Cyber Security Leader for Middle East and Turkey, Cisco

Cisco’s security research organization Talos’ initial analysis of the global ransomware worm attack that has affected multiple organizations worldwide points to the attack starting in the Ukraine, possibly from software update systems for a Ukrainian tax accounting package called MeDoc. This appears to have been confirmed by MeDoc itself. MeDoc is a widely used tax software used by many organizations in or doing business with Ukraine. There have been other reports of this attack appearing in France, Denmark, Spain, the UK, Russia and the US.

Once this ransomware enters your system, it uses three ways to spread automatically around a network, one of which is the known Eternal Blue vulnerability, similar to how last month’s WannaCry attack unfolded.

What’s clear from this, and recent attacks, is that organizations must prioritize patching systems to lower their risk profile. We have to patch as quickly as we can. In addition, making back-ups of key data is a fundamental of any security program.

What can you tell us about the attack?
·         Today we saw our second ever ransomware worm, coming on the heels of WannaCry last month
·         This ransomware outbreak has affected multiple organisations in several countries today, Cisco’s security research organisation Talos is actively investigating this new malware variant.
·         This new ransomware variant encrypts the master boot record (MBR) of a system. Think of the MBR as the table of contents for your hard drive – clearly very important.
·         Talosinitial analysis points to the attack starting in the Ukraine, possibly from software update systems for a Ukrainian tax accounting package called MeDoc.
·         This appears to have been confirmed by MeDoc itself. MeDoc is a widely used tax software used by many organisations in or doing business with Ukraine. There have been other reports of this attack appearing in France, Denmark, Spain, the UK, Russia and the US.
·         Once this ransomware enters your system, it uses three ways to spread automatically around a network, one of which is the known Eternal Blue vulnerability, similar to how last month’s WannaCry attack unfolded.

What is ransomware?
  • A type of malware that locks down your computer/system and takes control/encrypts your data and demands a ransom

What is bitcoin?
  • A crypto currency used online
  • Bitcoin is not controlled by any one government or state
  • Because it allows for anonymity, it is ideal for attackers

Do we know what organisations were impacted?
  • Reported victims so far include Ukrainian infrastructure like power companies, airports, public transit, and the central bank, as well as Danish shipping company Maersk, pharmaceutical company Merck, the Russian oil giant Rosnoft, and institutions in India, Spain, France, the United Kingdom, and beyond.

How did this attack start?
  • Cisco’s security research organization Talos’ initial analysis points to the attack starting in the Ukraine, possibly from software update systems for a Ukrainian tax accounting package called MeDoc. This appears to have been confirmed by MeDoc itself. MeDoc is a widely used tax software used by many organizations in or doing business with Ukraine.

How is it spreading?
  • Once this ransomware enters your system, it uses three ways to spread automatically around a network, one of which is the known Eternal Blue vulnerability, similar to how last month’s WannaCry attack unfolded.

How is this different to WannaCry? Is there a ‘killswitch’ for this attack?
  • This ransomware doesn't seem to incorporate the errors that hindered WannaCry from spreading. Specifically, this attack doesn't seem to have a kill switch function. It is also harder to detect since it moves within a network. It is not scanning of the internet like WannaCry did.

Who is responsible for this attack?
  • Attribution is difficult in attacks like this
  • Cisco is focused on understanding the attack and protecting our customers

What is Cisco’s recommendation for customers to protect against this?
·         Ensure your organisation is running an actively supported operating system that receives security updates.
·         Have effective patch management that deploys security updates to endpoints and other critical parts of your infrastructure in a timely manner
·         Run anti-malware software on your system and ensure you regularly receive malware signature updates
·         Implement a disaster recovery plan that includes backing up and restoring data from devices that are kept offline. Adversaries frequently target backup mechanisms to limit the possibilities a user may be able to restore their files without paying the ransom.

·         If vulnerabilities aren’t patched, an organisation will continue to be at risk for infection by this ransomware.

          Blurry Box, the Unbreakable Software Protection Technology   

A group of worldwide hackers could not crack Wibu-Systems’ new encryption scheme
KARLSRUHE, Germany--(BUSINESS WIRE/ME NewsWire)-- Hundreds of participants from all corners of the globe have taken part in a hackers contest aimed at cracking a game protected with Blurry Box®, the pinnacle of encryption recently launched by Wibu-Systems. The outcome: No one could break the latest software protection technology introduced by the leading provider of secure license management in the industrial world.
The contestants tried frantically for three weeks; two of them submitted their results to the independent jury consisting of IT security scientists from the Horst Goertz Institute (HGI) and the Institute for Internet Security - if(is). Their exploits were proven to be not correct, resulting in a voluntary award of €1,000 each against the total sum of €50,000 that was originally at stake for a complete hacking solution.
Wibu-Systems has been focusing on the protection of digital know-how for almost thirty years, leading to the birth of CodeMeter, its flagship solution for safeguarding software publishers and intelligent device manufacturers from intellectual property piracy, product counterfeiting, software reverse engineering, and code tampering. One of the essential components of CodeMeter is its encryption mechanism: The AxProtectormodule conveniently encrypts the compiled software in a fully automated fashion; the IxProtectormodule, later integrated in AxProtector, extracts and encrypts individual functions for higher protection against typical cracking techniques.
Still, some complex and sensitive software need stronger protections. In 2014, Wibu-Systems, the Karlsruhe Institute of Technology, and the research center FZI took the first prize at the German IT Security Awardsfor Blurry Box. Since then, the encryption scheme has been integrated into CodeMeter and is now publicly validated through the global challenge. It extracts, duplicates, modifies, and encrypts individual functions. Traps and decryption delays stop brute force attacks. With such a robust design, hackers would have an easier time rebuilding the software protected with Blurry Box from scratch.
Oliver Winzenried, CEO and founder of Wibu-Systems, who was just named Top Embedded Innovatorof 2017, shares his excitement: “In today’s world, wars are shifting towards a digital battlefield. Industrie 4.0, IoT applications, and digitized services will have to be hardened with the most stringent security measures. Our mission is to put our greatest business and private life values into safe hands”.
بلوري بوكس، تكنولوجيا حماية البرمجيات الثورية غير قابلة للاختراق

لم تتمكن مجموعة من قراصنة الحاسوب حول العالم من اختراق نظام التشفير الجديد من "ويبو سيستمز"

كارلسروه، ألمانيا- (بزنيس واير/"إم إي نيوز واير"): شارك المئات من المتسابقين من مختلف أنحاء العالم في مسابقة القرصنة التي تهدف إلى اختراق تطبيق للألعاب محميّ بواسطة "بلوري بوكس"، وهو نظام التشفير الثوري الذي أطلقته مؤخراً شركة "ويبو سيستمز". وكانت النتيجة كما يلي: لا يمكن لأحد أن يخترق أحدث تكنولوجيا لحماية البرمجيات التي أطلقتها الشركة الرائدة في مجال إدارة التراخيص الآمنة في العالم الصناعي.

حاول المتسابقون بحماس شديد طوال ثلاثة أسابيع اختراق التطبيق؛ وقدم إثنان منهم نتائجهما إلى لجنة التحكيم المستقلة المؤلفة من علماء في مجال أمن تكنولوجيا المعلومات من معهد "هورست جورتز" (إتش جي آي) ومعهد أمن الإنترنت – "إف إز". وقد ثبت أن محاولاتهم لم تكن صحيحة، مما أسفر عن منحهما جائزة ترضية بقيمة 1,000 يورو لكل منهما من أصل مبلغ إجمالي وقدره 50 ألف يورو الذي كان سيُمنح في الأصل مقابل اختراق نظام التشفير بواسطة حل كامل. 

هذا وتركز "ويبو سيستمز" منذ ثلاثين عام تقريباً، على حماية المعرفة الرقمية، مما أدى إلى ولادة "كود ميتر" وهو الحل الرائد لديها لحماية ناشري البرمجيات ومصنّعي الأجهزة الذكية من قرصنة الملكية الفكرية، وتزوير المنتجات، والهندسة العكسية للبرمجيات، والتلاعب بالتعليمات البرمجية. وتعتبر آلية التشفير من المكونات الأساسية لحل "كود ميتر": تقوم وحدة "إيه إكس بروتكتور" بشكل ملائم بتشفير البرامج المجمعة بطريقة مؤتمتة بالكامل؛ وتقوم وحدة "آي إكس بروتكتور"، التي تم دمجها لاحقاً في وحدة "إيه إكس بروتكتور"، استخراج وتشفير الوظائف الفردية لحماية أكبر ضد تقنيات الاختراق النموذجية.

ومع ذلك، تحتاج بعض البرامج المعقدة والحساسة إلى حماية أقوى. ففي عام 2014، مُنحت شركة "ويبو سيستمز"، ومعهد كارلسروه للتكنولوجيا، ومركز أبحاث "إف زد آي" الجائزة الأولى بفضل "بلوري بوكس" في جوائز أمن تكنولوجيا المعلومات الألمانية. ومنذ ذلك الحين، تم دمج نظام التشفير في"كود ميتر" ويتم الآن التحقق من صلاحيته من خلال التحدي العالمي. ويقوم البرنامج باستخراج، ونسخ، وتعديل، وتشفير الوظائف الفردية. وتساهم المصائد ومعوقات فك التشفير في وقف الهجومات القوية العنيفة. وبفضل هذا التصميم القوي، قد يجد قراصنة الحاسوب أنه سيكون من الأسهل أن يقوموا ببناء البرمجيات المحميّة بواسطة "بلوري بوكس" من الصفر.ويعبّر أوليفر وينزنريد، الرئيس التنفيذي والمؤسس لشركة "ويبو سيستمز"، الذي تم اختياره أفضل مبتكر للحلول المدمجة لعام 2017، حماسته بقوله: "في عالم اليوم، تتحول الحروب نحو ساحة المعركة الرقمية. وسيكون من الضروري تحصين "إنداستري 4.0"، الاتجاه الحالي للأتمتة وتبادل البيانات في تقنيات التصنيع، وتطبيقات إنترنت الأشياء، والخدمات الرقمية بواسطة التدابير الأمنية الأكثر صرامة. وتتمثل مهمتنا في وضع أهم قيمنا التجارية وقيم حياتنا الخاصة في أيدي آمنة".

إنّ نصّ اللغة الأصلية لهذا البيان هو النسخة الرسمية المعتمدة. أمّا الترجمة فقد قدِمتْ للمساعدة فقط، ويجب الرجوع لنصّ اللغة الأصلية الذي يمثّل النسخة الوحيدة ذات  التأثير القانوني.

إن نص اللغة الأصلية لهذا البيان هو النسخة الرسمية المعتمدة. أما الترجمة فقد قدمت للمساعدة فقط، ويجب الرجوع لنص اللغة الأصلية الذي يمثل النسخة الوحيدة ذات التأثير القانوني.

          MarshallSoft dBase AES Library 4.1   
Visual dBase 256-bit AES encryption library
  • You instantly get access to the account (read our FAQ for more info)
  • All our accounts are leveled “by hand”. They will never be banned due to botting!
  • All purchases are made through Paypal/WebMoney/Bitcoin on an encrypted and secure connection
  • You get a five star customer support. Free lifetime support for your league of legends accounts

          First Petya, now Ukrainian state power firm hit by second cyberattack 'similar to WannaCry'   
Shortly after suffering a major cyberattack linked to Petya ransomware on Tuesday 27 June, beleaguered Ukrainian state power company Ukrenergo was targeted yet again by a second cyberattack two days later.
The attack on Thursday 29 June reportedly used a completely different strain of malware from Petya, the malicious piece of software that ripped through tens of thousands computers in the region before spreading across the world earlier this week.
"The virus was slightly different, of a different nature, similar to WannaCry," Ukrenergo's acting director Vsevolod Kovalchuk told a press conference on Friday 30 June, as reported by Reuters.
WannaCry was a ransomware which caused chaos in May across the British national healthcare system, before eventually infecting computers across 150 countries.
However, the multiple attacks indicate hackers remain highly interested in targeting Ukraine's critical infrastructure. Indeed, on the day of the second Ukrenergo incident, a researcher known as MalwareHunterTeam found evidence that a "WannaCry clone" was active in Ukraine.

Ransomware spread like wildfire

On 27 June, Windows computers in Ukrainian banks, business, airports and government departments were hit by an infectious ransomware which encrypted hard drives and demanded $300 worth of bitcoin, a cryptocurrency, for their return.
The variant of Petya, it emerged, was super-charged by two exploits stolen from the US National Security Agency (NSA) titled EternalBlue and EternalRomance. Microsoft, after conducting analysis of the ransomware, reported that it boasted a slew of sophisticated capabilities.
During the Friday press conference, Kovalchuk said evidence suggested the initial Petya infection was caused by a software update. This matches findings of numerous cybersecurity experts, who discovered a widely-used accounting software called Medoc had been hacked to spread the virus.
Researchers now believe the hackers never intended to make money.

No luck in decrypting files

One expert, Matthieu Suiche, found Petya's internal code contained "disk wiping" capabilities which meant it was purposely designed to destroy computers. Russian cybersecurity firm Kaspersky Lab found it lacked the ability to decrypt victims' files.
This is not the first time Ukraine has been targeted in a major cyberattack. In December 2015, a separate power firm suffered a blackout that cut the electricity of more than 200,000 citizens for several hours. Law enforcement found that hackers – possibly of the nation state variety – had tampered with its systems.
Ukraine was the most impacted country in the latest Petya ransomware attack. This has resulted in speculation that Russia may be responsible for the outages. The investigation is ongoing, with the FBI and its British equivalent, the National Crime Agency (NSA), now involved.

          Le Mouvement des Femmes du Kurdistan salue le Conseil indigène de Gouvernement et Marichuy   
Lettre du Mouvement des Femmes du Kurdistan à María de Jesús Patricio Martínez, porte-parole du Conseil Indigène de Gouvernement

Tout d'abord, nous souhaitons envoyer à notre soeur mexicaine notre plus grand sentiment de respect ainsi que des salutations révolutionnaires au-delà des océans, depuis les montagnes du Kurdistan jusqu'à la cordillère de la Sierra Madre. Malgré les fleuves, les montagnes,  les déserts, les vallées, les canyons et les mers qui nous séparent, nous sommes des frères et soeurs indigènes, qu'importe la partie du monde dans laquelle nous vivons.

Notre lutte, notre résistance contre l'occupation et le colonialisme, notre rêve d'une vie libre sont communs et en ce sens, en tant que Mouvement de Libération du Kurdistan, nous déclarons que nous considérons la lutte pour l'autodétermination, pour l'auto-administration et pour l'autodéfense des peuples indigènes du Mexique organisés dans le Congrès National Indigène (CNI) comme notre propre lutte et que nous la soutenons en nous basant sur les principes de solidarité révolutionnaire.

Les peuples indigènes sont les veines par lesquelles se transmettent les principales valeurs culturelles et sociales de l'humanité depuis les premiers moments de la socialisation jusqu'à nos jours. Il n'y a pas de doute sur le fait qu'il n'existe pas de peuple supérieur à un autre, mais à l'heure où la modernité capitaliste tente de détruire toute valeur commune, les peuples indigènes sont la sauvegarde du tissu social de toute l'humanité. Les milliers d'années de mémoire collective ressurgissent dans nos chants, dans nos rituels, dans nos prières, dans nos tatouages, dans nos danses et dans nos traditions. De ce fait, la lutte pour une identité propre contre la modernité capitaliste qui tente d'effacer les racines et la mémoire de nos peuples, se transforme en la plus valeureuse des résistances.

En Amérique Latine comme au Kurdistan, nous, les femmes, nous prenons la tête de cette résistance. Dans nos pays, qui ont été le berceau de milliers d'années de culture de la déesse mère, la femme et la vie, la femme et la liberté, la femme et la terre, la femme et la nature, sont inextricablement liées entre elles. Au Kurdistan, nous exprimons cette réalité dans notre devise “Jin Jiyan Azadî” , qui signifie "Femme Vie Liberté".

Le corps et l'âme de la femme sont le reflet de l'univers sur la terre. Il y a des milliers d'années, pendant la Révolution Néolithique, se sont les femmes qui, à travers leur organisation sociale, ont pris la tête de tous les changements qui ont rendu  possible le travail de la terre et le début d'une vie sédentaire en harmonie avec la nature. C'est la raison pour laquelle la civilisation patriarcale de l'état, qui s'est produite sous la forme d'une contre-révolution basée sur la domination, l'exploitation et l'occupation, a tout d'abord asservi les femmes.

Parallèlement à la domination des femmes, la domination de la nature s’est accélérée. C’est à travers l’oppression de la première nature qu’a été conquise la suivante, en se transformant toutes les deux en les pinces qu’a utilisé la modernité capitaliste pour faire pression avec force sur la société historique et ainsi pouvoir la détruire. L’actuelle domination exercée contre nos peuples est le résultat de cette mentalité. Par conséquent, la résistance légitime apparue par le biais de l’autogouvernement, de l’autodétermination et de l’autodéfense représente la plus grande lutte pour que la liberté puisse être exercée.

Nous, au Kurdistan, nous avons développé notre propre défense contre les forces capitalistes modernistes et contre les attaques des états colonialistes qui occupent notre sol, éclairés par les expériences de lutte des peuples indigènes d’Amérique Latine. Nous voulons que vous sachiez que nous recevons une inspiration constante et spéciale de vos expériences d’autogouvernement, de bon gouvernement et de communalisme. Nous espérons que nos expériences et nos réussites dans la lutte représentent pour vous aussi et de la même manière des sources d’inspiration.

Une des plus grandes conquêtes de notre mouvement est celle de l’égalité de participation et de représentation des femmes. Ceci a été le résultat de grands sacrifices et de luttes intenses réalisés par les femmes, et finalement nous avons réussi notre participation égalitaire dans toutes les instances de prises de décisions. Non pas en tant qu’individues mais en tant que représentantes de la volonté organisée et collective du Mouvement de Libération des Femmes du Kurdistan, nous sommes en train de prendre notre place dans chaque aspect de la lutte.  Grâce à notre système de coprésidences, établies du bas vers le haut, nous représentons la volonté des femmes dans chaque décision et nous développons une politique démocratique contre les formes centralistes et patriarcales de la politique traditionnelle. Mais pour ce faire, il a fallu nous convertir définitivement en une force organisée. Être organisées est le critère le plus important pour atteindre la réussite. Dans la mesure où nous sommes organisées, nous sommes capables de résister contre le système colonial et dominant et de construire notre propre alternative de gouvernement. 

En ce sens, l’organisation est de notre meilleure arme d’autodéfense. Par le passé, beaucoup de peuples et de mouvements n’ont pas pu atteindre les résultats espérés car ils n’étaient pas suffisamment organisés. Il n’a pas été possible de transformer certains moments historiques et grandes victoires précisément à cause de ce manque d’organisation. La signification profonde et l’importance de ce point n’ont peut-être pas été comprises, mais aujourd’hui nous en sommes à cette étape. Nous faisons face avec le devoir de multiplier nos efforts pour augmenter les niveaux d’organisation devant cette nouvelle opportunité de triomphe – en un moment ou le système capitaliste moderniste traverse de nouveau une crise profonde dans ses aspects les plus déterminants. C’est ce que nous demande l’histoire. Vous, en tant que Congrès National Indigène, vous avez su reconnaître cette réalité en déclarant les élections présidentielles au Mexique comme une instance  clef au cœur d’un processus quique débouchera sur l’augmentation de vos niveaux d’organisation.

En tant que Mouvement de Libération des Femmes du Kurdistan, nous voulons exprimer notre soutien à cette décision en nous basant sur la conviction que cet objectif sera accompli et mené à un niveau beaucoup plus haut à partir de ces élections et des stratégies développées en ce sens. Notre leader Abdullah Öcalan, qui se trouve toujours incarcéré par l’état turc depuis 1999 dans les plus sévères conditions d’isolement, a fait une analyse très importante en relation à ceci à la fin du XXème siècle. Notre leader Apo a prévu que le XXIème siècle serait le siècle de la libération des femmes, si nous en tant que telles, nous étions capables de grandir et de déterminer nos modes et mécanismes d’organisation. La raison de cette conclusion a été l’évidente crise structurale du système patriarcal qui s’est basé sur notre servitude.

Le système patriarcal prétend dépasser cette crise en augmentant ses attaques contre les femmes jusqu’à les porter au niveau d’une guerre systémique. En concentrant ses attaques contre les femmes du monde entier via différents moyens et méthodes, le système tente de tronquer le chemin vers la libération que nous avons commencé. Les assassinats de femmes qui ont atteint le stade de génocide dans votre pays et les assassinats de femmes leaders en Amérique Latine sont les indices les plus concrets de cette réalité. Nous voulons que vous sachiez que nous considérons toutes les femmes et les leaders de peuples indigènes assassinées par les bras qui opèrent à partir du système dominant, comme nos propres martyres et que nous luttons aussipour  rendre réels leurs mêmes rêves et espoirs. Pour nous, les martyres ne meurent pas. C’est d’eux que nous prenons la force et ils renaissent dans chaque lutte que nous débutons.

Dans ce contexte, la décision du peuple indigène mexicain de déclarer une compañera représentante de sa volonté et d’en faire la candidate aux prochaines élections présidentielles est très significative. En ce sens, la compañera Marichuy est non seulement la voix des indigènes du Mexique mais aussi dans le même temps celle de toutes les femmes du monde. Nous voulons exprimer que nous considérons très importante et valeureuse la candidature de la compañera Marichuy en tant que représentante des peuples reniés, des femmes asservies et des milliers d’années de sagesse ancestrale que la modernité capitaliste veut faire disparaitre.

En tant que Mouvement de Libération des Femmes du Kurdistan, nous déclarons tout notre soutien et notre solidarité à la compañera et au Congrès National Indigène, non seulement en ce moment de conjoncture électorale mais aussi dans toutes la lutte que votre Mouvement est en train de porter. Nous savons que le résultat des élections en soit n’est pas important puisque qu’il n’est qu’un des chemins que les peuples indigènes du Mexique ont proposé dans ce processus et [qu’il apparait] dans ce moment particulier de la lutte. En ce sens, la victoire est déjà remportée. Car le système capitaliste moderniste s’alimente de la division des forces et de la désorganisation des peuples et des sociétés qu’il veut dominer ; mais vous, vous avez déjà construit le terrain pour le succès en formant votre unité organisée.

‘Wiper Malware’ in Global Attack Actually Destroys Data can be found on Infinite Group Inc..

          clacke: Ok, this doesn't actually look too horrible. https://social.heldscal.la/url/589885 Basically I just want https://f-droid.org/packages/cz.eutopia.snooperstopper/ in there, so I can encrypt the phone without making it an annoyance to use.   
Ok, this doesn't actually look too horrible.


Basically I just want https://f-droid.org/packages/cz.eutopia.snooperstopper/ in there, so I can encrypt the phone without making it an annoyance to use.
          #5858: HLS single file playback broken when encryption enabled   

HLS files generated with encryption enabled and the single segment (byte range) option result in videos that are unplayable in QuickTime? and Safari on OSX. The same videos play without issue when encryption is not utilized.

The specific behavior is that video playback starts, but there are periods where video playback gets stuck and then resumes, get stuck, and then resumes. It seems to be related to the different segment offsets where some segments play without issue while other segments get frozen on a single frame.

I can reproduce this with origin/master checked out on 9/22/16.

Using the following as input:


I created a "good" version here which does not utilize encryption and plays back without issue:


I also created a "bad" version here which utilizes encryption and exhibits the undesired behavior:


Here is the console log for generating the "bad" version:

bash-4.3# openssl rand 16 > output/bad/bad.key
bash-4.3# cat <<EOF > input.conf
> bad.key
> output/bad/bad.key
bash-4.3# ffmpeg -y -i input.ts -c copy -map 0 -hls_flags single_file -hls_list_size 0 -hls_playlist_type vod -hls_key_info_file input.conf output/bad/bad.m3u8
ffmpeg version N-81723-g6d9a46e Copyright (c) 2000-2016 the FFmpeg developers
  built with gcc 5.3.0 (Alpine 5.3.0)
  configuration: --prefix=/usr --enable-avresample --enable-avfilter --enable-gnutls --enable-gpl --enable-libmp3lame --enable-librtmp --enable-libvorbis --enable-libvpx --enable-libxvid --enable-libx264 --enable-libx265 --enable-libtheora --enable-libv4l2 --enable-postproc --enable-pic --enable-pthreads --enable-shared --enable-x11grab --disable-stripping --disable-static --enable-vaapi --enable-libopus --enable-nonfree --enable-libfdk-aac
  libavutil      55. 30.100 / 55. 30.100
  libavcodec     57. 57.101 / 57. 57.101
  libavformat    57. 50.100 / 57. 50.100
  libavdevice    57.  0.102 / 57.  0.102
  libavfilter     6. 62.100 /  6. 62.100
  libavresample   3.  0.  0 /  3.  0.  0
  libswscale      4.  1.100 /  4.  1.100
  libswresample   2.  1.100 /  2.  1.100
  libpostproc    54.  0.100 / 54.  0.100
[h264 @ 0x7fb1ee66fae0] non-existing SPS 0 referenced in buffering period
[h264 @ 0x7fb1ee66fae0] SPS unavailable in decode_picture_timing
[h264 @ 0x7fb1ee66fae0] non-existing SPS 0 referenced in buffering period
[h264 @ 0x7fb1ee66fae0] SPS unavailable in decode_picture_timing
Input #0, mpegts, from 'input.ts':
  Duration: 00:00:30.06, start: 1.415333, bitrate: 3982 kb/s
  Program 1
      service_name    : Service01
      service_provider: FFmpeg
    Stream #0:0[0x100]: Video: h264 (Main) ([27][0][0][0] / 0x001B), yuv420p, 1280x720 [SAR 1:1 DAR 16:9], 23.98 fps, 23.98 tbr, 90k tbn, 47.95 tbc
    Stream #0:1[0x101](und): Audio: aac (LC) ([15][0][0][0] / 0x000F), 48000 Hz, stereo, fltp, 120 kb/s
Output #0, hls, to 'output/bad/bad.m3u8':
    encoder         : Lavf57.50.100
    Stream #0:0: Video: h264 (Main) ([27][0][0][0] / 0x001B), yuv420p, 1280x720 [SAR 1:1 DAR 16:9], q=2-31, 23.98 fps, 23.98 tbr, 90k tbn, 23.98 tbc
    Stream #0:1(und): Audio: aac (LC) ([15][0][0][0] / 0x000F), 48000 Hz, stereo, 120 kb/s
Stream mapping:
  Stream #0:0 -> #0:0 (copy)
  Stream #0:1 -> #0:1 (copy)
Press [q] to stop, [?] for help
frame=  720 fps=0.0 q=-1.0 Lsize=N/A time=00:00:29.99 bitrate=N/A speed=49.3x
video:13001kB audio:471kB subtitle:0kB other streams:0kB global headers:0kB muxing overhead: unknown

          #5948: Encrypted HLS stream lead to broken files   

Summary of the bug: How to reproduce:

Try to download an encrypted HLS stream with ffmpeg:

$ ffmpeg -i http://ipad-streaming.cbsnews.com/media/mpx/2016/11/13/808012355634/1113_FullEpisodeTrump_1179719_5000/1113_FullEpisodeTrump_1179719_5000.m3u8 -c copy output.mp4

Both mpv and VLC says output.mp4 is 17 minutes long, while actually is 42 minutes long.

I've noticed that there are lots of warnings like this:

[mp4 @ 0x558344ee2a00] Non-monotonous DTS in output stream 0:0; previous: 93640192, current: 3795083; changing to 93640193. This may result in incorrect timestamps in the output file.

Is it the main cause of wrong timestamps? If so how can I fix it?

The original video can be found here: http://www.cbs.com/shows/60_minutes/video/atW1AAfWvxA_TjuYUhMwDX4R0obUcW0N/president-elect-trump-letters-on-the-pot-vote-/

Environment: ffmpeg 1:3.2-2 vlc 2.2.4-5 mpv 1:0.21.0-2 OS: Arch Linux x86_64 latest

Downstream report: https://github.com/rg3/youtube-dl/issues/11191

          #6451: ffmpeg not able to decrypt mp4 fragment files   

I am trying to decrypt a mp4 fragment file with ffmpeg.

The mp4 fragment file (attached) has the first three segments unencrypted ('senc' box is not present in the first three segments).

Ffmpeg only parses the first 'senc' box and assumes that has the enough information to decrypt the entire content. When the first 'senc' box (owned by the fourth segment) is parsed, the subsample info is correctly added to the "cenc" structure (MOVStreamContext), but when the reader tries to get the first packet from the forth segment, it assumes that the current segment is the forth encypted, however it is just first one. As a result, the offsets accessing the "cenc" structure are incorrect and these errors are showed in the output:

[mov,mp4,m4a,3gp,3g2,mj2 @ 0x7f82c00015a0] auxiliary info offset 4800 greater than auxiliary info size 1600
[mov,mp4,m4a,3gp,3g2,mj2 @ 0x7f82c00015a0] auxiliary info offset 4816 greater than auxiliary info size 1600
[mov,mp4,m4a,3gp,3g2,mj2 @ 0x7f82c00015a0] auxiliary info offset 4832 greater than auxiliary info size 1600

How to reproduce:

  1. Start the playback with "ffplay" specifying the decryption key:
    % ./ffplay  ~/Descargas/cenc.mp4 -decryption_key "00112233445566778899AABBCDEEFF"
  1. Wait for the fourth segment (10 seconds aprox).

The problem was reproduced in the last stable version (3.3.1), but also in git-master SHA1 id: "35c76f2e138b713928a77a8aa5734bf5c8f9368f"

          #6457: Encrypted HLS - wrong ranges in .m3u8 file   

Summary of the bug: How to reproduce:

% ffmpeg -i input.mp4 -c:v libx264 -crf 28 -profile high -level 41 -keyint_min 25 -c:a libfdk_aac -vbr 1 -hls_time 6 -hls_list_size 0 '''-hls_flags single_file''' -hls_playlist_type vod -hls_key_info_file file.keyinfo -f hls fftest/cle.m3u8
ffmpeg version 3.3.2 Copyright (c) 2000-2017 the FFmpeg developers
built with gcc 5.4.0 (Gentoo 5.4.0-r3 p1.3, pie-0.6.5)
configuration: --prefix=/usr --libdir=/usr/lib64 --shlibdir=/usr/lib64 --docdir=/usr/share/doc/ffmpeg-3.3.2/html --mandir=/usr/share/man --enable-shared --cc=x86_64-pc-linux-gnu-gcc --cxx=x86_64-pc-linux-gnu-g++ --ar=x86_64-pc-linux-gnu-ar --optflags='-march=haswell -mavx2 -msse4.2 -msse4.1 -O2 -pipe -mmmx -msse -msse2 -mssse3 --param l1-cache-size=32 --param l1-cache-line-size=64 --param l2-cache-size=8192 -mtune=haswell' --disable-static --enable-avfilter --enable-avresample --disable-stripping --enable-version3 --disable-indev=oss --disable-outdev=oss --enable-nonfree --enable-bzlib --disable-runtime-cpudetect --disable-debug --disable-gcrypt --enable-gnutls --disable-gmp --enable-gpl --enable-hardcoded-tables --enable-iconv --enable-lzma --enable-network --disable-openssl --enable-postproc --enable-libsmbclient --enable-ffplay --enable-sdl2 --enable-vaapi --disable-vdpau --enable-xlib --enable-libxcb --enable-libxcb-shm --enable-libxcb-xfixes --enable-zlib --disable-libcdio --disable-libiec61883 --disable-libdc1394 --disable-libcaca --disable-openal --enable-opengl --disable-libv4l2 --enable-libpulse --disable-libopencore-amrwb --disable-libopencore-amrnb --enable-libfdk-aac --enable-libopenjpeg --enable-libbluray --disable-libcelt --disable-libgme --disable-libgsm --disable-mmal --disable-libmodplug --enable-libopus --disable-libilbc --disable-librtmp --disable-libssh --disable-libschroedinger --enable-libspeex --enable-libvorbis --enable-libvpx --disable-libzvbi --disable-libbs2b --disable-chromaprint --disable-libflite --enable-frei0r --disable-libfribidi --disable-fontconfig --enable-ladspa --disable-libass --enable-libfreetype --disable-librubberband --disable-netcdf --disable-libzmq --disable-libzimg --enable-libvidstab --disable-libsoxr --enable-pthreads --disable-libvo-amrwbenc --enable-libmp3lame --disable-libkvazaar --disable-nvenc --disable-libopenh264 --disable-libsnappy --enable-libtheora --disable-libtwolame --disable-libwavpack --enable-libwebp --enable-libx264 --enable-libx265 --enable-libxvid --disable-amd3dnow --disable-amd3dnowext --disable-fma4 --disable-xop --cpu=haswell --disable-doc --disable-htmlpages --enable-manpages
libavutil      55. 58.100 / 55. 58.100
libavcodec     57. 89.100 / 57. 89.100
libavformat    57. 71.100 / 57. 71.100
libavdevice    57.  6.100 / 57.  6.100
libavfilter     6. 82.100 /  6. 82.100
libavresample   3.  5.  0 /  3.  5.  0
libswscale      4.  6.100 /  4.  6.100
libswresample   2.  7.100 /  2.  7.100
libpostproc    54.  5.100 / 54.  5.100
$ cat file.keyinfo
file.key is 16-byte file genereted by
openssl rand 16 > fftest/file.key
$ cat cle.m3u8

As workaround I used this:

ffmpeg -i input.mp4 -c:v libx264 -crf 28 -profile high -level 41 -keyint_min 25 -c:a libfdk_aac -vbr 1 -hls_time 6 -hls_list_size 0 -hls_playlist_type vod -hls_key_info_file file.keyinfo -f hls fftest/cle_s.m3u8
cat cle_s*.ts > clex.ts
and computed ranges manually. And it works now.

It seems The ranges are counted right before encrypting since non-encrypted HLS encoding have same ranges. Fix seems to be made easy - count size of encrypted chunk instead of non-encrypted. But i really didn't search source, so I only guessing. Thanks.

          #6467: m3u8 to ts|mp4: Non-monotonous DTS in output stream 0:0... This may result in incorrect timestamps in the output file.   

thank you for the good apps when convering m3u8 to ts|mp4, Non-monotonous DTS....This may result in incorrect timestamps in the output file is displayed. i don't know the way to stop such a change.

The source is https://bitdash-a.akamaihd.net/content/sintel/hls/playlist.m3u8 in https://bitmovin.com/mpeg-dash-hls-examples-sample-streams/. This is the same as that of the comment in #3339.

i tried

ffmpeg -y -i "https://bitdash-a.akamaihd.net/content/sintel/hls/playlist.m3u8" -c copy test.ts|mp4
ffmpeg -y -i "https://bitdash-a.akamaihd.net/content/sintel/hls/playlist.m3u8" -c copy -fflags +genpts (-bsf:a aac_adtstoasc) test.ts|mp4
ffmpeg -y -i "https://bitdash-a.akamaihd.net/content/sintel/hls/playlist.m3u8" -c copy -copyts test.ts|mp4
ffmpeg -y -i "https://bitdash-a.akamaihd.net/content/sintel/hls/playlist.m3u8" -c copy -copytb 1 test.ts|mp4
ffmpeg -y -i "https://bitdash-a.akamaihd.net/content/sintel/hls/playlist.m3u8" -c copy -vsync cfr -r 24 test.ts|mp4
ffmpeg -y -i "https://bitdash-a.akamaihd.net/content/sintel/hls/playlist.m3u8" -c copy -vsync cfr -r 24 -fflags +genpts (-bsf:a aac_adtstoasc) test.ts|mp4

i don't know the relationship with #5948.


ffmpeg -y -i "https://bitdash-a.akamaihd.net/content/sintel/hls/playlist.m3u8" -c copy test.ts
ffmpeg version N-86499-g1edbf5e20c Copyright (c) 2000-2017 the FFmpeg developers
  built with clang version 3.9.1 (tags/RELEASE_391/final)
  configuration: --prefix=/sw --disable-shared --enable-static --enable-gpl --enable-version3 --enable-nonfree --enable-pthreads --optflags=-Ofast --cc=clang-mp-3.9 --cxx=clang++-mp-3.9 --extra-cflags=' -march=native -I/sw/include -I/opt/local/include ' --extra-ldflags=' -L/sw/lib -L/opt/local/lib -fopenmp' --extra-ldlibflags='-L/sw/lib -L/opt/local/lib -static' --target-os=darwin --arch=x86_64 --cpu=corei7-avx --enable-avresample --enable-libfdk-aac --enable-libmp3lame --enable-libopencore_amrnb --enable-libopencore_amrwb --enable-libopenjpeg --enable-libopus --enable-libspeex --enable-libtheora --enable-libvorbis --enable-libvpx --enable-libwavpack --enable-libwebp --enable-libxvid --enable-libfreetype --enable-openssl --enable-gnutls --enable-gcrypt --enable-gmp --enable-librtmp --enable-libass --enable-fontconfig --enable-libfribidi --enable-libbluray --enable-libdc1394 --enable-libmodplug --enable-lzma --enable-libx264 --enable-libx265 --enable-libzimg --enable-libvidstab --enable-libsoxr --enable-libsmbclient --enable-libcdio --enable-opengl --enable-opencl --disable-vda --pkg-config-flags=' --libs --static'
  libavutil      55. 66.100 / 55. 66.100
  libavcodec     57. 99.100 / 57. 99.100
  libavformat    57. 73.100 / 57. 73.100
  libavdevice    57.  7.100 / 57.  7.100
  libavfilter     6. 92.100 /  6. 92.100
  libavresample   3.  6.  0 /  3.  6.  0
  libswscale      4.  7.101 /  4.  7.101
  libswresample   2.  8.100 /  2.  8.100
  libpostproc    54.  6.100 / 54.  6.100
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/audio/stereo/en/128kbit.m3u8' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/audio/stereo/none/128kbit.m3u8' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/audio/surround/en/320kbit.m3u8' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/audio/stereo/none/128kbit.m3u8' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/250kbit.m3u8' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/500kbit.m3u8' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/800kbit.m3u8' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/1100kbit.m3u8' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/1500kbit.m3u8' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/4000kbit.m3u8' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/6000kbit.m3u8' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/10000kbit.m3u8' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/audio/stereo/en/128kbit/seq-0.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/audio/stereo/none/128kbit/seq-0.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/audio/surround/en/320kbit/seq-0.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/audio/stereo/none/128kbit/seq-0.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/250kbit/seq-0.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/500kbit/seq-0.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/800kbit/seq-0.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/1100kbit/seq-0.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/1500kbit/seq-0.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/4000kbit/seq-0.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/6000kbit/seq-0.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/10000kbit/seq-0.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/250kbit/seq-1.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/500kbit/seq-1.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/800kbit/seq-1.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/1100kbit/seq-1.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/1500kbit/seq-1.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/4000kbit/seq-1.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/6000kbit/seq-1.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/10000kbit/seq-1.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/audio/stereo/en/128kbit/seq-1.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/audio/stereo/none/128kbit/seq-1.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/audio/surround/en/320kbit/seq-1.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/audio/stereo/none/128kbit/seq-1.ts' for reading
Input #0, hls,applehttp, from 'https://bitdash-a.akamaihd.net/content/sintel/hls/playlist.m3u8':
  Duration: 00:14:48.00, start: 0.000000, bitrate: 0 kb/s
  Program 0
      variant_bitrate : 258157
    Stream #0:0(en): Audio: aac (LC) ([15][0][0][0] / 0x000F), 48000 Hz, stereo, fltp (default)
      variant_bitrate : 831270
      comment         : English
    Stream #0:1(dubbing): Audio: aac (LC) ([15][0][0][0] / 0x000F), 48000 Hz, stereo, fltp
      variant_bitrate : 831270
      comment         : Dubbing
    Stream #0:4: Video: h264 (Main) ([27][0][0][0] / 0x001B), yuv420p, 426x180 [SAR 7680:7739 DAR 256:109], 24 tbr, 90k tbn, 48 tbc
      variant_bitrate : 258157
  Program 1
      variant_bitrate : 520929
    Stream #0:0(en): Audio: aac (LC) ([15][0][0][0] / 0x000F), 48000 Hz, stereo, fltp (default)
      variant_bitrate : 831270
      comment         : English
    Stream #0:1(dubbing): Audio: aac (LC) ([15][0][0][0] / 0x000F), 48000 Hz, stereo, fltp
      variant_bitrate : 831270
      comment         : Dubbing
    Stream #0:5: Video: h264 (Main) ([27][0][0][0] / 0x001B), yuv420p, 640x272 [SAR 544:545 DAR 256:109], 24 tbr, 90k tbn, 48 tbc
      variant_bitrate : 520929
  Program 2
      variant_bitrate : 831270
    Stream #0:0(en): Audio: aac (LC) ([15][0][0][0] / 0x000F), 48000 Hz, stereo, fltp (default)
      variant_bitrate : 831270
      comment         : English
    Stream #0:1(dubbing): Audio: aac (LC) ([15][0][0][0] / 0x000F), 48000 Hz, stereo, fltp
      variant_bitrate : 831270
      comment         : Dubbing
    Stream #0:6: Video: h264 (Main) ([27][0][0][0] / 0x001B), yuv420p, 640x272 [SAR 544:545 DAR 256:109], 24 tbr, 90k tbn, 48 tbc
      variant_bitrate : 831270
  Program 3
      variant_bitrate : 1144430
    Stream #0:2(en): Audio: aac (LC) ([15][0][0][0] / 0x000F), 48000 Hz, 5.1, fltp (default)
      variant_bitrate : 10285391
      comment         : English
    Stream #0:3(dubbing): Audio: aac (LC) ([15][0][0][0] / 0x000F), 48000 Hz, stereo, fltp
      variant_bitrate : 10285391
      comment         : Dubbing
    Stream #0:7: Video: h264 (Main) ([27][0][0][0] / 0x001B), yuv420p, 960x408 [SAR 544:545 DAR 256:109], 24 tbr, 90k tbn, 48 tbc
      variant_bitrate : 1144430
  Program 4
      variant_bitrate : 1558322
    Stream #0:2(en): Audio: aac (LC) ([15][0][0][0] / 0x000F), 48000 Hz, 5.1, fltp (default)
      variant_bitrate : 10285391
      comment         : English
    Stream #0:3(dubbing): Audio: aac (LC) ([15][0][0][0] / 0x000F), 48000 Hz, stereo, fltp
      variant_bitrate : 10285391
      comment         : Dubbing
    Stream #0:8: Video: h264 (Main) ([27][0][0][0] / 0x001B), yuv420p, 1280x544 [SAR 544:545 DAR 256:109], 24 tbr, 90k tbn, 48 tbc
      variant_bitrate : 1558322
  Program 5
      variant_bitrate : 4149264
    Stream #0:2(en): Audio: aac (LC) ([15][0][0][0] / 0x000F), 48000 Hz, 5.1, fltp (default)
      variant_bitrate : 10285391
      comment         : English
    Stream #0:3(dubbing): Audio: aac (LC) ([15][0][0][0] / 0x000F), 48000 Hz, stereo, fltp
      variant_bitrate : 10285391
      comment         : Dubbing
    Stream #0:9: Video: h264 (Main) ([27][0][0][0] / 0x001B), yuv420p, 1920x818 [SAR 1636:1635 DAR 256:109], 24 tbr, 90k tbn, 48 tbc
      variant_bitrate : 4149264
  Program 6
      variant_bitrate : 6214307
    Stream #0:2(en): Audio: aac (LC) ([15][0][0][0] / 0x000F), 48000 Hz, 5.1, fltp (default)
      variant_bitrate : 10285391
      comment         : English
    Stream #0:3(dubbing): Audio: aac (LC) ([15][0][0][0] / 0x000F), 48000 Hz, stereo, fltp
      variant_bitrate : 10285391
      comment         : Dubbing
    Stream #0:10: Video: h264 (Main) ([27][0][0][0] / 0x001B), yuv420p, 1920x818 [SAR 1636:1635 DAR 256:109], 24 tbr, 90k tbn, 48 tbc
      variant_bitrate : 6214307
  Program 7
      variant_bitrate : 10285391
    Stream #0:2(en): Audio: aac (LC) ([15][0][0][0] / 0x000F), 48000 Hz, 5.1, fltp (default)
      variant_bitrate : 10285391
      comment         : English
    Stream #0:3(dubbing): Audio: aac (LC) ([15][0][0][0] / 0x000F), 48000 Hz, stereo, fltp
      variant_bitrate : 10285391
      comment         : Dubbing
    Stream #0:11: Video: h264 (Main) ([27][0][0][0] / 0x001B), yuv420p, 4096x1744 [SAR 1:1 DAR 256:109], 24 tbr, 90k tbn, 48 tbc
      variant_bitrate : 10285391
Output #0, mpegts, to 'test.ts':
    encoder         : Lavf57.73.100
    Stream #0:0: Video: h264 (Main) ([27][0][0][0] / 0x001B), yuv420p, 4096x1744 [SAR 1:1 DAR 256:109], q=2-31, 24 tbr, 90k tbn, 90k tbc
      variant_bitrate : 10285391
    Stream #0:1(en): Audio: aac (LC) ([15][0][0][0] / 0x000F), 48000 Hz, 5.1, fltp (default)
      variant_bitrate : 10285391
      comment         : English
Stream mapping:
  Stream #0:11 -> #0:0 (copy)
  Stream #0:2 -> #0:1 (copy)
Press [q] to stop, [?] for help
[mpegts @ 0x7fca7100b600] Non-monotonous DTS in output stream 0:0; previous: 176250, current: 176250; changing to 176251. This may result in incorrect timestamps in the output file.
[mpegts @ 0x7fca7100b600] Timestamps are unset in a packet for stream 0. This is deprecated and will stop working in the future. Fix your code to set the timestamps properly
[hls,applehttp @ 0x7fca70801200] No longer receiving playlist 4rate=7266.3kbits/s speed= 6.9x
[hls,applehttp @ 0x7fca70801200] No longer receiving playlist 5
[hls,applehttp @ 0x7fca70801200] No longer receiving playlist 6
[hls,applehttp @ 0x7fca70801200] No longer receiving playlist 7
[hls,applehttp @ 0x7fca70801200] No longer receiving playlist 8
[hls,applehttp @ 0x7fca70801200] No longer receiving playlist 9
[hls,applehttp @ 0x7fca70801200] No longer receiving playlist 10
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/10000kbit/seq-2.ts' for reading
[hls,applehttp @ 0x7fca70801200] No longer receiving playlist 0
[hls,applehttp @ 0x7fca70801200] No longer receiving playlist 1
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/audio/surround/en/320kbit/seq-2.ts' for reading
[hls,applehttp @ 0x7fca70801200] No longer receiving playlist 3
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/audio/surround/en/320kbit/seq-3.ts' for reading
[hls,applehttp @ 0x7fca70801200] Opening 'https://bitdash-a.akamaihd.net/content/sintel/hls/video/10000kbit/seq-3.ts' for reading
frame=  159 fps= 46 q=-1.0 Lsize=   11198kB time=00:00:06.59 bitrate=13916.3kbits/s speed=1.92x
video:10093kB audio:262kB subtitle:0kB other streams:0kB global headers:0kB muxing overhead: 8.133783%
Exiting normally, received signal 2.

          #6215: Fairplay Encryption for HLS m3u8 feeds not supported   

Summary of the bug: Fairplay Encryption for HLS m3u8 feeds not supported. How to reproduce:

ffmpeg -i "https://hlstvnz-a.akamaihd.net/963482467001/963482467001_5337729382001_5337696518001.m3u8?pubId=963482467001&videoId=5337696518001" -c copy sensingmurder.mkv
ffmpeg version 3.2.2 Copyright (c) 2000-2016 the FFmpeg developers
  built with Apple LLVM version 7.0.2 (clang-700.1.81)
  configuration: --prefix=/usr/local/Cellar/ffmpeg/3.2.2 --enable-shared --enable-pthreads --enable-gpl --enable-version3 --enable-hardcoded-tables --enable-avresample --cc=clang --host-cflags= --host-ldflags= --enable-ffplay --enable-frei0r --enable-libass --enable-libfdk-aac --enable-libfreetype --enable-libmp3lame --enable-libopencore-amrnb --enable-libopencore-amrwb --enable-libopus --enable-librtmp --enable-libspeex --enable-libtheora --enable-libvorbis --enable-libvpx --enable-libx264 --enable-libxvid --enable-opencl --disable-lzma --enable-libopenjpeg --disable-decoder=jpeg2000 --extra-cflags=-I/usr/local/Cellar/openjpeg/2.1.2/include/openjpeg-2.1 --enable-nonfree --enable-vda
  libavutil      55. 34.100 / 55. 34.100
  libavcodec     57. 64.101 / 57. 64.101
  libavformat    57. 56.100 / 57. 56.100
  libavdevice    57.  1.100 / 57.  1.100
  libavfilter     6. 65.100 /  6. 65.100
  libavresample   3.  1.  0 /  3.  1.  0
  libswscale      4.  2.100 /  4.  2.100
  libswresample   2.  3.100 /  2.  3.100
  libpostproc    54.  1.100 / 54.  1.100

I have an XML file that I sniffed out using Chrome's Web Developer (Network tab) and found that a "Licence URL" that might help in decrypting the file. Wondering if further development with ffmpeg could include an option/flag to insert such a URL to obtain a decryption licence/key?

A sample of the XML file, pertaining to the protected HLS feed, is below.


          #3493: ffmpeg unable to download when using AES-128 with https protocol   

Hi Recently I was able to download AES-128 encrypted videos using ffmpeg with normal http protocol but since protocol is changed to secure https I am unable to download any video.

Pls find below logs and help.

ffmpeg -i "http://hls.spuul.com/va/movies/12610001-c9e0f902/0011/s_renditions.m3u8" -c copy -absf aac_adtstoasc "Ankhon Dekhi 1080p.mkv" -loglevel verbose ffmpeg version N-61722-gfc567ac Copyright (c) 2000-2014 the FFmpeg developers

built on Mar 22 2014 22:01:33 with gcc 4.8.2 (GCC) configuration: --enable-gpl --enable-version3 --disable-w32threads --enable-avisynth --enable-bzlib --enable-fontconfig --enable-frei0r --enable-gnutls --enable-iconv --enable-libass --enable-libbluray --enable-libcaca --enable-libfreetype --enable-libgsm --enable-libilbc --enable-libmodplug --enable-libmp3lame --enable-libopencore-amrnb --enable-libopencore-amrwb --enable-libopenjpeg --enable-libopus --enable-librtmp --enable-libschroedinger --enable-libsoxr --enable-libspeex --enable-libtheora --enable-libtwolame --enable-libvidstab --enable-libvo-aacenc --enable-libvo-amrwbenc --enable-libvorbis --enable-libvpx --enable-libwavpack --enable-libx264 --enable-libx265 --enable-libxavs --enable-libxvid --enable-zlib libavutil 52. 67.100 / 52. 67.100 libavcodec 55. 52.103 / 55. 52.103 libavformat 55. 34.101 / 55. 34.101 libavdevice 55. 11.100 / 55. 11.100 libavfilter 4. 3.100 / 4. 3.100 libswscale 2. 5.102 / 2. 5.102 libswresample 0. 18.100 / 0. 18.100 libpostproc 52. 3.100 / 52. 3.100

[https @ 02a0e160] HTTP error 404 Not Found Unable to open key file https://secure.spuul.com/keys/va/movies/12610001-c9e0f902/0011/renditions-encryption-00001.key Format mp3 detected only with low score of 1, misdetection possible! [mp3 @ 02a07180] Header missing

Last message repeated 1057 times

[mp3 @ 046e9a60] decoding for stream 0 failed [mp3 @ 046e9a60] Could not find codec parameters for stream 0 (Audio: mp3, 0 channels, s16p): unspecified frame size Consider increasing the value for the 'analyzeduration' and 'probesize' options http://hls.spuul.com/va/movies/12610001-c9e0f902/0011/s_renditions.m3u8: Operation not permitted

          #1806: Audio/video stream order reversed in remuxed VOB files   

Summary of the bug: I am using ffmpeg to edit and remultiplex unencrypted VOB files (from a HD recorder). When copying (ie not transcoding) the streams ffmpeg ALWAYS insists on making the audio stream ID 0 and video stream ID 1 even though the input file was the other way round and it reports itself as NOT doing this.

Using the -map commands also seem to be ignored wherever they appear on the command line.

(This is a problem because I am using dvdauthor on the files and it only seems to work with VOB files with video as the first stream. Fails with infamous ERR: Cannot infer pts for VOBU if there is no audio or video and it is the first VOBU.)

How to reproduce (with any vob file 'input.vob'): % ffmpeg -i input.vob -target pal-dvd -codec copy output.vob ffmpeg version N-45279-g1a104bf Copyright (c) 2000-2012 the FFmpeg developers

built on Oct 10 2012 19:21:13 with gcc 4.7.2 (GCC)

Input #0, mpeg, from 'input.vob':

Duration: 00:01:28.15, start: 137.626044, bitrate: 2858 kb/s

Stream #0:0[0x1e0]: Video: mpeg2video (Main), yuv420p, 352x576 [SAR 24:11 DAR 4:3], 3060 kb/s, 25 fps, 25 tbr, 90k tbn, 50 tbc Stream #0:1[0x80]: Audio: ac3, 48000 Hz, stereo, s16, 256 kb/s

Output #0, dvd, to 'output.vob':


encoder : Lavf54.31.100 Stream #0:0: Video: mpeg2video, yuv420p, 352x576 [SAR 24:11 DAR 4:3], q=2-31

, 3060 kb/s, 25 fps, 90k tbn, 25 tbc

Stream #0:1: Audio: ac3, 48000 Hz, stereo, 256 kb/s

Stream mapping:

Stream #0:0 -> #0:0 (copy) Stream #0:1 -> #0:1 (copy)

But running ffprobe on resulting 'output.vob': Input #0, mpeg, from 'output.vob':

Duration: 00:01:28.15, start: 1.000000, bitrate: 2877 kb/s

Stream #0:0[0x80]: Audio: ac3, 48000 Hz, stereo, s16, 256 kb/s Stream #0:1[0x1e0]: Video: mpeg2video (Main), yuv420p, 352x576 [SAR 24:11 DAR 4:3], 3060 kb/s, 25 fps, 25 tbr, 90k tbn, 50 tbc

Streams swapped round!

          #5696: ffmpeg broken for AES-encrypted HLS stream with Accept-Encoding header   

Summary of the bug: How to reproduce:

$ ffmpeg -loglevel debug -headers "Accept-Encoding: gzip, deflate" -i https://d2sazdeahkz1yk.cloudfront.net/episodes/1b888bc4-d261-481d-a8ba-28c02b31eaab/1/1080p.m3u8 -c copy -f mp4 -bsf:a aac_adtstoasc output.mp4
ffmpeg version 3.1.1 Copyright (c) 2000-2016 the FFmpeg developers
  built with gcc 6.1.1 (GCC) 20160602
  configuration: --prefix=/usr --disable-debug --disable-static --disable-stripping --enable-avisynth --enable-avresample --enable-fontconfig --enable-gmp --enable-gnutls --enable-gpl --enable-ladspa --enable-libass --enable-libbluray --enable-libfreetype --enable-libfribidi --enable-libgsm --enable-libiec61883 --enable-libmodplug --enable-libmp3lame --enable-libopencore_amrnb --enable-libopencore_amrwb --enable-libopenjpeg --enable-libopus --enable-libpulse --enable-libschroedinger --enable-libsoxr --enable-libspeex --enable-libssh --enable-libtheora --enable-libv4l2 --enable-libvidstab --enable-libvorbis --enable-libvpx --enable-libwebp --enable-libx264 --enable-libx265 --enable-libxvid --enable-netcdf --enable-shared --enable-version3 --enable-x11grab
  libavutil      55. 28.100 / 55. 28.100
  libavcodec     57. 48.101 / 57. 48.101
  libavformat    57. 41.100 / 57. 41.100
  libavdevice    57.  0.101 / 57.  0.101
  libavfilter     6. 47.100 /  6. 47.100
  libavresample   3.  0.  0 /  3.  0.  0
  libswscale      4.  1.100 /  4.  1.100
  libswresample   2.  1.100 /  2.  1.100
  libpostproc    54.  0.100 / 54.  0.100
Splitting the commandline.
Reading option '-loglevel' ... matched as option 'loglevel' (set logging level) with argument 'debug'.
Reading option '-headers' ... matched as AVOption 'headers' with argument 'Accept-Encoding: gzip, deflate'.
Reading option '-i' ... matched as input file with argument 'https://d2sazdeahkz1yk.cloudfront.net/episodes/1b888bc4-d261-481d-a8ba-28c02b31eaab/1/1080p.m3u8'.
Reading option '-c' ... matched as option 'c' (codec name) with argument 'copy'.
Reading option '-f' ... matched as option 'f' (force format) with argument 'mp4'.
Reading option '-bsf:a' ... matched as option 'bsf' (A comma-separated list of bitstream filters) with argument 'aac_adtstoasc'.
Reading option 'output.mp4' ... matched as output file.
Finished splitting the commandline.
Parsing a group of options: global .
Applying option loglevel (set logging level) with argument debug.
Successfully parsed a group of options.
Parsing a group of options: input file https://d2sazdeahkz1yk.cloudfront.net/episodes/1b888bc4-d261-481d-a8ba-28c02b31eaab/1/1080p.m3u8.
Successfully parsed a group of options.
Opening an input file: https://d2sazdeahkz1yk.cloudfront.net/episodes/1b888bc4-d261-481d-a8ba-28c02b31eaab/1/1080p.m3u8.
[https @ 0x56373daa0320] Setting default whitelist 'http,https,tls,rtp,tcp,udp,crypto,httpproxy'
[https @ 0x56373daa0320] No trailing CRLF found in HTTP header.
[https @ 0x56373daa0320] request: GET /episodes/1b888bc4-d261-481d-a8ba-28c02b31eaab/1/1080p.m3u8 HTTP/1.1
User-Agent: Lavf/57.41.100
Accept: */*
Range: bytes=0-
Connection: close
Host: d2sazdeahkz1yk.cloudfront.net
Icy-MetaData: 1
Accept-Encoding: gzip, deflate
[hls,applehttp @ 0x56373da9fb20] Format hls,applehttp probed with size=2048 and score=100
[hls,applehttp @ 0x56373da9fb20] HLS request for url 'https://d2sazdeahkz1yk.cloudfront.net/episodes/1b888bc4-d261-481d-a8ba-28c02b31eaab/1/1080p00000.ts', offset 0, playlist 0
[https @ 0x56373e0c8700] request: GET /episodes/S01E03-loading-view-controllers/hls_key HTTP/1.1
User-Agent: Lavf/57.41.100
Accept: */*
Connection: close
Host: talk.objc.io
Icy-MetaData: 1
Accept-Encoding: gzip, deflate
[https @ 0x56373e0c8700] inflate return value: -3, invalid code lengths set
    Last message repeated 1 times
Unable to read key file https://talk.objc.io/episodes/S01E03-loading-view-controllers/hls_key
[AVIOContext @ 0x56373dc811a0] Statistics: 0 bytes read, 0 seeks
[https @ 0x56373deedc20] request: GET /episodes/1b888bc4-d261-481d-a8ba-28c02b31eaab/1/1080p00000.ts HTTP/1.1
User-Agent: Lavf/57.41.100
Accept: */*
Connection: close
Host: d2sazdeahkz1yk.cloudfront.net
Icy-MetaData: 1
Accept-Encoding: gzip, deflate
[hls,applehttp @ 0x56373da9fb20] Error when loading first segment 'https://d2sazdeahkz1yk.cloudfront.net/episodes/1b888bc4-d261-481d-a8ba-28c02b31eaab/1/1080p00000.ts'
[AVIOContext @ 0x56373dbcc380] Statistics: 1050928 bytes read, 0 seeks
[AVIOContext @ 0x56373de18ce0] Statistics: 4997 bytes read, 0 seeks
https://d2sazdeahkz1yk.cloudfront.net/episodes/1b888bc4-d261-481d-a8ba-28c02b31eaab/1/1080p.m3u8: Invalid data found when processing input

The key file is correctly gzipped:

$ curl "https://talk.objc.io/episodes/S01E03-loading-view-controllers/hls_key" | xxd
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100    16    0    16    0     0     16      0 --:--:-- --:--:-- --:--:--    16
00000000: 9016 6c2e 9f21 f436 9478 2438 464e 917a  ..l..!.6.x$8FN.z
$ curl -H 'Accept-Encoding: gzip, deflate' "https://talk.objc.io/episodes/S01E03-loading-view-controllers/hls_key" | gunzip -c - | xxd
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100    43    0    43    0     0     48      0 --:--:-- --:--:-- --:--:--    48
00000000: 9016 6c2e 9f21 f436 9478 2438 464e 917a  ..l..!.6.x$8FN.z
$ curl -H 'Accept-Encoding: gzip, deflate' "https://talk.objc.io/episodes/S01E03-loading-view-controllers/hls_key" | xxd
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100    43    0    43    0     0     45      0 --:--:-- --:--:-- --:--:--    45
00000000: 1f8b 0800 2d89 7f57 0003 9a20 96a3 375f  ....-..W... ..7_
00000010: f18b d994 0a15 0b37 bf89 5500 0000 00ff  .......7..U.....
00000020: ff03 0070 464c a710 0000 00              ...pFL.....

          #4016: DRM protected content should be detected   

AFAIK FFmpeg libraries contain no special code to recognize whether a file has been DRM protected e.g. by Apple's so-called "FairPlay?". mp4 files are decoded and played - but the result is simply garbage.

It would be nice, if it was possible to detect whether a file is protected or not. Please note, that I don't mean to suggest building a decoder (like ticket:1800). Instead, just knowing that we simply cannot decode a file properly is already valuable.

A possible implementation could be for avcodec_decode_audio4(...) to return an appropriate error code, if the packet is encrypted and therefore cannot be decoded properly.

For .m4p this is not hard to detect. It contains an atom called drms. If it is present, the file cannot be properly decoded. For WMA there seems to be also some sort of mechanism (see e.g. https://mail.kde.org/pipermail/taglib-devel/2011-March/001885.html).

Further resources for m4p are:

To illustrate where to find the drms atom, here's an excerpt generated with AtomicParsely?:

> AtomicParsley.exe test.m4p -T +
Atom ftyp @ 0 of size: 32, ends @ 32
Atom moov @ 32 of size: 98194, ends @ 98226
     Atom mvhd @ 40 of size: 108, ends @ 148
     Atom trak @ 148 of size: 39374, ends @ 39522
         Atom tkhd @ 156 of size: 92, ends @ 248
         Atom edts @ 248 of size: 36, ends @ 284
             Atom elst @ 256 of size: 28, ends @ 284
         Atom mdia @ 284 of size: 39238, ends @ 39522
             Atom mdhd @ 292 of size: 32, ends @ 324
             Atom hdlr @ 324 of size: 58, ends @ 382
             Atom minf @ 382 of size: 39140, ends @ 39522
                 Atom smhd @ 390 of size: 16, ends @ 406
                 Atom hdlr @ 406 of size: 57, ends @ 463
                 Atom dinf @ 463 of size: 36, ends @ 499
                     Atom dref @ 471 of size: 28, ends @ 499
                 Atom stbl @ 499 of size: 39023, ends @ 39522
                     Atom stsd @ 507 of size: 999, ends @ 1506
                         Atom drms @ 523 of size: 983, ends @ 1506
                             Atom esds @ 559 of size: 51, ends @ 610
                             Atom sinf @ 610 of size: 896, ends @ 1506
                                 Atom frma @ 618 of size: 12, ends @ 630
                                 Atom schm @ 630 of size: 20, ends @ 650
                                 Atom schi @ 650 of size: 856, ends @ 1506
                                     Atom user @ 658 of size: 12, ends @ 670
                                     Atom key  @ 670 of size: 12, ends @ 682
                                     Atom iviv @ 682 of size: 24, ends @ 706
                                     Atom righ @ 706 of size: 88, ends @ 794
                                     Atom name @ 794 of size: 264, ends @ 1058
                                     Atom priv @ 1058 of size: 448, ends @ 1506
                     Atom stts @ 1506 of size: 24, ends @ 1530
                     Atom stsc @ 1530 of size: 7756, ends @ 9286
                     Atom stsz @ 9286 of size: 27640, ends @ 36926
                     Atom stco @ 36926 of size: 2596, ends @ 39522
     Atom udta @ 39522 of size: 58704, ends @ 98226
         Atom meta @ 39530 of size: 58696, ends @ 98226

          #5375: Can't download a m3u playlist stream that uses AES encryption   

Summary of the bug: I am trying to download a video using a m3u8 playlist but I get the error saying "Sample-AES encryption is not yet supported; Failed to open segment of playlist 0". Then at the end I get "Error loading first segment: <very long url is here> Invalid data when processing input How to reproduce:

% ffmpeg -i "https://once.unicornmedia.com/now/od/aut
44emqp001i0fo5daa1yd3o/content.m3u8" -c copy test.ts
ffmpeg version: 3.0
built on: Unknown

Patches should be submitted to the ffmpeg-devel mailing list and not this bug tracker.

          #1800: support iTunes drm encrypted files   

I have downloaded a video from itunes. The video has .m4v extension and according to MediaVideo? is in some type of AVC/AAC format. Nor VLC neither Windows Media PLayer can play that video. The only one that can play the video and do it correctly is QuickTime? 7 from Apple.

I want to convert it into MPEG2 as video and mp3 as audio, but i have failed both with FFMPEG and with MEncoder. I have also tried to compile ffmpeg from source, but I do not know which codec I need and I don't want to compile all the codecs from scratch.

I have uploaded the video on your FTP server. THe filename is "Love Thy Brother.m4v". There IS the correspondending text file.

I attach here: 1) Mediainfo informations given on the video 2) ffmpeg command line 3) full FFMPEG console output

          Evaggelos Balaskas - System Engineer: STARTTLS with CRAM-MD5 on dovecot using LDAP   


I should have written this post like a decade ago, but laziness got the better of me.

I use TLS with IMAP and SMTP mail server. That means I encrypt the connection by protocol against the mail server and not by port (ssl Vs tls). Although I do not accept any authentication before STARTTLS command is being provided (that means no cleartext passwords in authentication), I was leaving the PLAIN TEXT authentication mechanism in the configuration. That’s not an actual problem unless you are already on the server and you are trying to connect on localhost but I can do better.


I use OpenLDAP as my backend authentication database. Before all, the ldap attribute password must be changed from cleartext to CRAM-MD5

Typing the doveadm command from dovecot with the password method:

# doveadm pw

Enter new password:    test
Retype new password:   test

will return the CRAM-MD5 hash of our password (test)

Then we need to edit our DN (distinguished name) with ldapvi:


userPassword: test


userPassword: {CRAM-MD5}e02d374fde0dc75a17a557039a3a5338c7743304777dccd376f332bee68d2cf6


Dovecot is not only the imap server but also the “Simple Authentication and Security Layer” aka SASL service. That means that imap & smtp are speaking with dovecot for authentication and dovecot uses ldap as the backend. To change AUTH=PLAIN to cram-md5 we need to do the below change:

file: 10-auth.conf


auth_mechanisms = plain


auth_mechanisms = cram-md5

Before restarting dovecot, we need to make one more change. This step took me a couple hours to figure it out! On our dovecot-ldap.conf.ext configuration file, we need to tell dovecot NOT to bind to ldap for authentication but let dovecot to handle the authentication process itself:


# Enable Authentication Binds
# auth_bind = yes


# Enable Authentication Binds
auth_bind = no

To guarantee that the entire connection is protected by TLS encryption, change in 10-ssl.conf the below setting:


ssl = yes


ssl = required

SSL/TLS is always required, even if non-plaintext authentication mechanisms are used. Any attempt to authenticate before SSL/TLS is enabled will cause an authentication failure.

After that, restart your dovecot instance.


# telnet example.org imap

Trying ...
Connected to example.org.
Escape character is '^]'.

1 LOGIN USERNAME@example.org test

1 NO [ALERT] Unsupported authentication mechanism.
telnet> clo

That meas no cleartext authentication is permitted


Now the hard part, the mail clients:


My default webmail client since v1.10.1.123 supports CRAM-MD5
To verify that, open your application.ini file under your data folder and search for something like that:

    imap_use_auth_plain = On
    imap_use_auth_cram_md5 = On
    smtp_use_auth_plain = On
    smtp_use_auth_cram_md5 = On

as a bonus, rainloop supports STARTTLS and authentication for imap & smtp, even when talking to





          Любаша_Бодя: ТОРТИК из ПАМПЕРСОВ: Мастер-классы   

Картинки по запросу из памперсов торт

Каждому новорожденному малышу нужен подарок. Можно преподнести его просто в пакетике, а можно вот таким красивым и очень оригинальным способом.

Для изготовления тортика кроме самих подарков нам понадобится совсем немного. Собирать мы будем его аккуратно, без лишних зажимов, веревочек и креплений, которые могут очень смутить молодую маму. Ведь гигиена в нашем деле будет стоять на первом месте. Итак, отправляемся в магазин и выбираем в качестве подарка малышу все что нравится, но, со вкусом. Всё-таки наша композиция должна гармонировать цветами. 


А у меня собрался вот такой милый набор: 

1. 2 стаканчика для карандашей в качестве основы.
2. 1 обрезанный рулончик из под полотенец. 
3. Бельевая резинка 1,5 м.
4. Медицинские перчатки.
5. Упаковка подгузников для новорожденных 72шт.
6. Детский шампунь Bubchen, 200 мл
7. Ср-во для купания Bubchen, 200 мл
8. Влажные салфетки Pampers 64 шт.
9. 2 фланелевых пеленки 0,75х1,20см
10. 1 плед 75х90см.
11. 1 подушечка 20х32см. в тон пледу
12. Пара носочков
13. Охлаждающий прорезыватель
14. Музыкальная игрушка-погремушка ключики
15. Пустышка
16. Розовый зайчик – мягкая игрушка 24 см.
17. Набор детских булавочек (3 шт.) 

Для того, чтобы вам было удобнее понимать весь процесс работы. 
Условно разделим ее на 4 этапа:


1.Изготавливаем основу. 
Тут нужно четкое соблюдение рекомендаций, чтобы лишний раз не «травмировать» наш деликатный материал для основы. Подгузники очень легко теряют товарный вид, и крутить, разворачивать и сворачивать их по несколько раз, не рекомендуется. Конечно если цель нашего сюрприза максимальное использование по назначению, абсолютно всех деталей. Сразу уточним. В такой технике скрутки уходит много подгузников. Но мы ведь экономим на услугах мастера, поэтому можем себе позволить немного больше затрат и меньше видимости подарка? Ведь дарится он наверняка для самых уважаемых и дорогих нам людей. А значит, тут экономить не стоит!!!

Наша задача – сделать три коржа – основы. Где в верхнем корже одна часть, в среднем – две, а в нижнем три части. Все вместе 6 частей. В Упаковке 72 подгузника. 72/6 = 12. 12 подгузников это 1 часть. Соответственно Верхний корж – 12, Средний – 24, Нижний 36 подгузников.
Предлагаемая техника скрутки позволит вам практически не касаться подгузников, не мять и не нарушать целостность всей укладки и каждого в отдельности. Важно точно выполнять рекомендации, так как корж может повести в сторону и выправить его потом очень сложно. 
1. Открываем упаковку и прямо в ней не разделяя и не отталкивая их друг от друга отсчитываем 36 подгузников. Берем ряд подгузников нужного количества из упаковки, не нарушая порядок кладем на стол.
2. Обвязываем бельевой резинкой, затянув ее не слишком туго чтобы она не нарушила ряд, но и не слишком слабо, чтобы она не дала ему развалиться. На фото резинка обтянута в два оборота, но вы если хотите можете пока обернуть одним оборотом. С верхней стороны подгузников под резинку ставим стаканчик.
3. Подгузники в упаковке всегда имеют легкий наклон в одну сторону. Вот в эту сторону и начнем их поворачивать. Для того чтобы круг сразу правильно формировался слегка обогнем подгузники вокруг стаканчика. 
4. Одной рукой возьмитесь за стаканчик и за подгузники как бы зафиксировав начало круга а другой по 1 штучке начните увеличивать расстояние между спрессованными подгузниками по внешнему периметру. Левой рукой прижимая основание правой скользить по направлению движения круга и слегка вытягивайте каждый последующий подгузник на ровное расстояние. 

5. Наш круг уже начинает формироваться.
6. Чем дальше вы будете продвигаться, тем сложнее будет формироваться круг. Для того, чтобы не испортить уже проделанную работу, левой рукой слегка придерживаем уже выровненные подгузники, чтобы они не деформировались, а правой продолжаем увеличивать расстояние по внешнему периметру.
7. При завершении круга, снова левой рукой придержите основание вместе со стаканчиком. Не давайте подгузникам сдвигаться и менять положение чтобы не испортилась серединка круга. Правой берем оставшуюся часть не сформированных подгузников и заворачиваем их в нужном направлении. 
8. По центру коржа, вокруг стаканчика постоянно поправляйте подгузники, чтобы они не ложились пачками, а закручивались равномерно в нужном направлении. Так они красиво и аккуратно уложатся в центре, и в будущем позволят нам свободно выбирать диаметр круга.

9. У «свежеиспеченного» коржа выравниваем и придерживаем серединку. Подгоняем начало к хвостику.
10. Резинка всегда должна быть строго по середине коржа. Если вы не проследите за ней, корж «поведет» в одну из сторон, и выправить его потом будет сложно.
11– 12.Когда круг готов он очень слабый. Аккуратно развязываем бантик на резинке, (может распасться весь круг, не выпускайте резинку из рук) узелок затягиваем потуже и делаем второй оборот вокруг коржа, завязываем на узелок и бантик. Двойная резинка позволит нам регулировать диаметр круга и плотность.

13. Ставим корж на ребро и начинам последний этап выравнивания расстояния между подгузниками. Тут уже их можно слегка подтягивать. Резинка должна быть затянута не слишком туго, чтобы подгузник легко мог подгоняться до нужного расстояния.
15. Когда пройдёте полностью круг. Корж затягивается резинкой еще плотнее и можно оставить его такой плотности, но эта форма подразумевает наполнение в серединке (наш вариант). А вот если вы решили сделать торт без наполнения, то сейчас самое время убрать из центра стаканчик, и затянуть корж на максимум плотности. Первый и самый большой круг готов. Теперь поэтому же принципу готовим коржи 2 (средний) из 24 подгузников и 3 (маленький) из 12 подгузников.
Вот так мы получили три великолепных коржа для основы торта. Аккуратно, гигиенично и очень красиво уложенная пачка памперсов. Родители малыша будут вам благодарны. 

2. Наполнение. 
Если вы все же немного стеснены в средствах, то можете ничем не наполнять тортик. Для его крепления будет достаточно вставить внутрь, через все три коржа трубочку- основу которая остается от рулона от обыкновенных кухонных одноразовых полотенец. Или такая же есть в рулончиках от фольги, тонкой упаковочной пленки и т.д. Но лично мое мнение таково – если вы все же решили сделать подарок, то зачем его портить таким содержимым? Гораздо интереснее и полезнее спрятать внутрь полезный сюрприз. 
Прячем в торт «начинку». Диаметр от стаканчика в центре на столько не ограничивает наши возможности, что мы туда можем поместить все что угодно. Детская косметика, одежда, игрушка, еще много чего интересного и нужного молодой маме.  Стаканчик выкладываем, а вместо него  вставляем внушительного размера пачку влажных салфеток и шампунь. У второго коржа тоже аккуратно выкладываем стаканчик и насаживаем на первый корж. Третий корж тоже лишаем серединки и насаживаем на второй. В свободное место вкладываем  средство для купания. Это будет основа скрепляющая коржи.

Наш торт снова в первоначальном виде, но на этот раз с начинкой. Теперь на каждом корже развязываем бантик и потуже затягиваем круги. Делается это для уплотнения, и выравнивания всех ярусов. Теперь наш тортик не разрушится, и заметьте, в нем пока еще нет ни одного крепления. Хотя напомню!  Если вы хотите оставить его пустым, то самое время вынуть стаканчики, стянуть круги покрепче и воткнить с верхнего коржа до нижнего обычную деревянную шпажку (одну или две). Или трубочку от фольги. 
3. Оформление. 
Не займёт много времени. Нужно только правильно сложить пеленки и держать под рукой крепления.

Для оформления основы берем пеленки. Складываем их так, чтобы получилась полоса равная одному обороту коржа по длине и по ширине. Делается это очень просто. Складываете примерную полосу и по центру приставляете к ней ребром корж. Ширина видна сразу, а длина определяется соединением двух концов пеленки вокруг коржа. Если пеленка слишком длинная можно подвернуть одну из сторон (на фото первая пеленка подвернута слева). Если короткая используйте ее либо на маленький корж, либо сверните по диагонали. Для скрепления пеленок используем детские безопасные булавочки. Они потом пригодятся и одариваемой маме. После того, как корж скреплен, аккуратно поддеваем резинку и вытаскиваем ее. Теперь уже пеленка будет держать весь корж. Живая конструкция коржа сама регулирует наполняемость. Как только вы снимаете резинку он раскручивается до нужного размера и заполняет собой все пространство внутри пеленки. Так что ваш корж всегда будет идеален по плотности, аккуратности и по внешнему виду. Никаких дополнительных резинок, ленточек и т.д.

4. Украшение. 
Самая приятная часть нашей композиции. Тут вообще не стоит делать рекомендаций. Чтобы не испортить ваш вкус... Но вот парочку секретов, я все же могу вам подсказать.
 Просто берете ваших зайчиков, мишек или пупсов и сажаете на верх, приставляете сбоку или даете им в лапки (руки) ваш торт. Пришиваете банты или ленты, вставляете между подгузников соски, прорезыватели, погремушки и другие ярки и полезные предметы для ухода и развлечения новорожденных. Все из выше указанного крепится тремя способами. На горячий клей. Иголочкой с ниткой. Или подарочной ленточкой. На ваш вкус и возможности.  

Вот такие розочки можно сделать из обыкновенных носочков. 

1. Кладем носочек как на фото.
2. Начинаем сворачивать от носочка к пяточке. Это серединка цветка.
3. Резинку – кайму вывернуть и получатся красивые листики.
Не стоит забывать и про подставочку для торта. Сделать ее очень просто. Вырезаете плотный картон в несколько слоёв и обклеиваете подарочной бумагой. 

Наш торт готов! Согласитесь, торт из подгузников – это одна из самых прекрасных композиций, в которой можно представить набор подарков для новорожденных.
Все гигиенично и ничего лишнего.  

Для девочки: 

А вот еще несколько идей для вашего идеального подарка:
Для мальчика:

А может вы умеете хорошо вязать?

Возможно комбинирование:


А теперь самый главный секрет. Каким бы ни был ваш подарок, главное вложить в него всю свою любовь к деткам. И все получится. Творческих успехов вам и много много поводов дарить такие подарки. 

Источник: podarki.ru  Автор: Ольга Гладкова





Картинки по запросу из памперсов торт


          Now Free: Naula: Your IVF Treatment Simplified   
Naula: Your IVF Treatment Simplified
Kategorie: Medizin
Preis: 6,99 € -> kostenlos
Version: 1.4.1
in iTunes öffnen

Developed with leading fertility doctors and nurses, Naula is the best and only fertility treatment app that keeps all your medications and appointments in one place, with video instructions, reminders and an easy-to-use calendar. Stop shuffling through papers and lists of video links. Don’t fear missing a medication or appointment. Naula creates a customized calendar based on your specific fertility treatment. Every day you can see what medications and appointments are on the horizon, with videos and step-by-step instructions for every medication, checking each off as you finish. FEATURES: - Keep track of all your medications and appointments all in one place - Never forget a medication date or time with automated reminders and alerts on your phone - Adjusts to any timezone your phone is in - Video and step-by-step illustrated instructions - Add your own notes and photos for any appointment or medication - Share a treatment with your partner - Duplicate a treatment with one touch - Complete privacy with 128-bit SSL encryption for data transfer and NSA-level 256-bit AES encryption of personal information - Use Naula for IVF, IUI, FET, Egg Freezing, Surrogacy and Egg Donation HOW IT WORKS: 1. Input Your Treatment Easily input your treatment IVF, IUI, FET, Egg Freezing, Surrogacy or Egg Donation and choose from the most-prescribed medications and appointment types, with the ability to add your own. 2. Stay on Track Get reminders for every appointment and medication so y...

<!DOCTYPE html>
        <META NAME="Author" CONTENT="emu">
        <META NAME="Keywords" CONTENT="webcrypto AES-CBC AES-GCM">
        <div id="out"></div>
        <script type="text/javascript">
function output(sign) {
"out").innerHTML += sign + "<br>";
function bufferToHex(b){
var dataview = new DataView(b);
= "";
for (var i = 0; i < b.byteLength; i += 4) {
= dataview.getUint32(i).toString(16);
+= (tmp.length == 8 ? "" : "0"+ tmp;
return result;

function bufferToString(b){
//new TextDecoder().decode(b)
                var hex=bufferToHex(b);
var result=unescape(hex.replace(/(..)/g,"%$1"));
return result;
function stringToBuffer(s){
//new TextEncoder().encode(s);
                 var a = s.split("");
for (var i = 0; i < a.length; i++) {
= a[i].charCodeAt(0)
var result = new Uint8Array(a);
return result;

var textToBeEncrypted = 'Hello World!';
var bufferToBeEncrypted=stringToBuffer(textToBeEncrypted);
var bufferToBeDecrypted;
var pwd="let me try this password"
var password = stringToBuffer(pwd);
var sAlg="AES-CBC";//AES-GCM部分浏览器不支持
        var c = window.crypto || window.msCrypto;
var subtle = c.subtle || c.webkitSubtle;
var iv = c.getRandomValues(new Uint8Array(16));
var alg = { name: sAlg, iv: iv };
var op=c.subtle.digest('SHA-256', password)
var encryptKey,decryptKey,hash;
if(("then" in op)){
                c.subtle.importKey('raw', hash, alg, 
false, ['encrypt']).then(function(buffer){
                    c.subtle.importKey('raw', hash, alg, 
false, ['decrypt']).then(function(buffer){
var hash=e.target.result;
var op=c.subtle.importKey('raw', hash, alg, false, ['encrypt']);
=c.subtle.importKey('raw', hash, alg, false, ['decrypt']);
function doEncrypt(alg,encryptKey){
var op = c.subtle.encrypt(alg, encryptKey, bufferToBeEncrypted);
"pwd: <b><i>"+pwd+"</i></b> alg:<b>"+sAlg+"</b> <br>encrypt("+textToBeEncrypted + ")="+ bufferToHex(buffer));

function doDecrypt(alg,decryptKey){
var op = c.subtle.decrypt(alg, decryptKey, bufferToBeDecrypted);
"pwd:<b><i>"+pwd+"</i></b>  alg:<b>"+sAlg+"</b> <br>decrypt("+bufferToHex(bufferToBeDecrypted) + ")="+ bufferToString(buffer));

function encryptWithCryptoOperation(alg,encryptKey){
var op = c.subtle.encrypt(alg, encryptKey);
=function(e){output(sAlg+"  unsupported")}
"pwd: <b><i>"+pwd+"</i></b> alg:<b>"+sAlg+"</b> <br>encrypt("+textToBeEncrypted + ")="+ bufferToHex(bufferToBeDecrypted));
function decryptWithCryptoOperation  (alg,decryptKey){
var op = c.subtle.decrypt(alg, decryptKey);
=function(e){(sAlg+"  unsupported")}
"IE is crazy!<br>");
"pwd:<b><i>"+pwd+"</i></b>  alg:<b>"+sAlg+"</b> <br>decrypt("+bufferToHex(bufferToBeDecrypted) + ")="+ bufferToString(e.target.result));




emu 2017-06-12 17:48 发表评论


oke guys disini saya akan bagi artikel bagaimana cara menjadikan monitor bekas mejadi tv.sebagaian banyak orang tau tentang mengubah monitr menjadi tv seperti tv tabung... dan di sini admin akan sedikit menjelaskan bagaimana cara mengubah monitor biasa menjadi luar biasa eh. maksudnya menjadi tv XD oke yang pertama anda harus punya 1 buah monitor yang gak kepake (bukan yang rusak) 

setelah itu anda akan membutuhkan sebuah alat yang bernama TV tuner. apa itu tv tuner? tv tunner box yaitu tv portabel yang kecil dan praktis dan dihubungkan ke port VGA monitorseperti ini bentuknya: 

*bagaimana cara saya mendapatkan TV tunner tersebut? well anda bisa membeli di toko yang jual aksesoris komputer atau kalau anda di daerah surabaya anda bisa membeli nya di HI TECH mall.
*berapa biaya yang dibutuhkan untuk memebeli TV tunner tersebut?mungkin kisaran harga tv tunner sampai130rb-300rb jadi tidak terlalu mahal

selain menonton tv sobat bisa juga memutar film melalui DVD player yang bisa dipasang di TV tunner ini.karena setiap TV tunner dibekali jack video in. jadi jangan khawatir sobat masih bisa menggunakan monitor bekas sebagai TV digital.

oke itu saja dari saya sedikit penjelasan nya. mohon maaf bila ada salah kata

          Clé USB 3.0 Lexar JumpDrive S75 16 Go Violet et Blanc   


Clé USB 3.0 Lexar JumpDrive S75 16 Go Violet et Blanc

Vitesse jusqu’à 130 Mo/s en lecture et 25 Mo/s en écriture

Clé USB 3.0 Lexar® JumpDrive® S75

Hightlights du produit

Stocke et transfère le contenu plus rapidement grâce à la technologie SuperSpeed USB 3.0

Protège efficacement les fichiers grâce au logiciel EncryptStickT Lite, une solution de sécurité avancée avec chiffrement AES 256 bits.

Doté d'un connecteur rétractable avec fermeture coulissante ergonomique

Différentes capacités disponibles en plusieurs couleurs

Stocke et transfère en toute fiabilité vos photos, vidéos, fichiers et plus encore

Compatible avec les systèmes PC et Mac®

Rétrocompatible avec les périphériques USB 2.0 Garantie limitée de trois ans

Transfert de fichiers encore plus rapide grâce à la technologie USB 3.0

Transférez rapidement et en toute sécurité des photos, des vidéos et des fichiers grâce à cette clé USB 3.0 Lexar® JumpDrive® S75 performante et abordable. La clé USB dispose d'un connecteur rétractable avec fermeture coulissante ergonomique. De plus, elle est disponible en différentes couleurs et capacités, allant de 16 Go à 256 Go.*

Solution de stockage portative fiable et pratique

Stockez et transférez du contenu plus rapidement.

Vous êtes probablement très occupé et peut-être régulièrement en déplacement. Bref, vous n'avez certainement pas de temps à perdre avec les transferts de fichiers. La clé USB offre des vitesses pouvant atteindre 150 Mo/s en lecture et 60 Mo/s en écriture.** Transférez rapidement une vidéo HD de 3 Go en moins d'une minute, contre 4 minutes avec une clé USB 2.0 standard.*** Et pour encore plus de polyvalence, la clé est rétrocompatible avec les clés USB 2.0.

Protégez et supprimez vos fichiers en toute sécurité, même lorsque vous êtes en déplacement.

Vous cherchez à protéger des informations confidentielles, des données financières ou d'autres fichiers sensibles, à l'extérieur de votre bureau ? La clé USB JumpDrive S75 inclut le logiciel EncryptStickT Lite, une solution de sécurité avancée avec chiffrement AES 256 bits, pour vous aider à protéger vos fichiers critiques contre la corruption, la perte et la suppression. Créez en toute simplicité une chambre forte protégée par mot de passe, pour un chiffrement automatique des données. Pour votre tranquillité d'esprit, les fichiers supprimés de la chambre forte sont effacés de manière sécurisée sans possibilité de récupération.

Très pratique d'utilisation.

Outre ses performances et son design élégant, la clé JumpDrive S75 est également très pratique d'utilisation. Elle est équipée d'un connecteur rétractable avec fermeture coulissante ergonomique.

Élégante et colorée.

La clé USB Lexar JumpDrive S75 est disponible en plusieurs capacités de différentes couleurs (16 Go en violet, 32 Go en orange, 64 Go en vert, 128 Go en noir et 256 Go en blanc). Avec ces élégantes options, vous trouverez forcément le modèle répondant le mieux à vos besoins et reflétant votre personnalité. En outre, le code couleur vous aide à organiser vos clés et leur contenu.

Lexar, la référence en matière de mémoire.

Notre expérience parle d'elle-même : la mémoire n'a pas de secret pour nous. Grâce à notre technologie, nous sommes extrêmement réactifs et pouvons concevoir la solution dont vous avez besoin. De plus, nous collaborons avec les constructeurs afin d'assurer la compatibilité de nos produits. Nous nous engageons sur la qualité de nos produits à travers des garanties hors pair et un service client attentif. La performance, la fiabilité et l'expertise sont nos priorités. Aussi, lorsqu'il s'agit de conserver les souvenirs qui comptent, vous pouvez faire confiance à Lexar.

* Capacité de 256 Go non disponible dans toutes les régions.

**Vitesse de transfert pouvant atteindre 150 Mo/s en lecture ; vitesse inférieure en écriture. Vitesses basées sur des tests internes. Les performances réelles peuvent varier.

** Selon le modèle de 64 GO. Vidéo de 3,2 Go, HD 1 080 p à 30 ips (46 Mbps).

Pour garantir une compatibilité et des performances optimisées, consultez la page fr.lexar.com/support/downloads pour télécharger la dernière clé USB 3.0.

Les systèmes de sécurité sont, par nature, susceptibles d'être contournés. Lexar ne garantit pas que les données seront protégées à 100 % contre les risques d'accès non autorisé, d'altération ou de destruction.

Une partie des capacités de stockage indiquées est réservée à des fins spécifiques, notamment au formatage, et n'est pas disponible pour le stockage de données. 1 Go équivaut à 1 milliard d'octets. Pour plus d'informations, rendez-vous sur www.lexar.com/capacity.

Les offres logicielles et les emballages peuvent varier selon la date d'expédition et les stocks disponibles.

          RR 312 How to Handle WTF's   

How to Handle WTFs

On today’s episode of Ruby Rogues we are chatting about WTFs. On our panel we’ve got Dave Carmona, Brian Hogan and I’m Charles Max Wood. We talk a bit about some of the recent WTFs we’ve encountered and some of our tricks for handling it, including talking to a Rubber Duck. It’s a fun episode so check it out!

WTF’s in Two Flavors

Charles starts out the episode inquiring to the panel about two different kinds of WTFs. The whats and the whys. WTFs that happen and developers don’t understand what the WTF is, and then on the other hand WTFs that happen and the developer doesn’t know why it’s happening.

Unreadable Perl and the Rubber Duck

David talks a bit about how hard it is sometimes to read and understand what is happening with Perl code, even if you wrote it yourself. Sometimes debugging Perl codes many years later, running into syntax errors end up being a ‘Why’ WTF. He introduces a method to use for ‘Why’ WTFs that he calls the ‘Rubber Ducky Debugging’ method. The ‘Rubber Ducky Debugging Method’ is when you place a rubber duck on your desk, and when you encounter a WTF you can simply talk through the issue to the duck to help you think through your issue. Brian and Charles add that this method works fine with real people as well and have done it many times with their wives, even for issues that don’t involve code.

Blaming it on Past Brian

Brain mentions that sometimes when working with someone else’s code, it’s easy to blame the previous developer. Unfortunately in his case, Brian finds that “Past Brian” has often been the culprit.

Dave and Code he Doesn’t Understand

When encountering classes that are really big with many different methods, find the entry point. If it doesn’t have a traditional initializer or call method for the entry point, you can look around other relevant parts of the code to try and figure it out. Sometimes if it’s obfuscated, you can go through variables and rename them to more relevant names to identify what they are doing to help understand the method at hand.

Puts Debugging

Aaron Patterson had written an article on his blog about ‘Puts debugging’ that turned Dave onto the the untraditional debugging method. Dave will sometimes write a separate debugger class to separate puts into a different log to keep it organized.

Brian’s Version of Puts Debugging

Brian mentions that when working on a rails application he will sometimes raise the object he wants to inspect. Errors in Ruby are often something you wouldn’t expect and being able to quickly inspect the object using raise .Using raises the whole stack including the object, session, and cookies , etc.

Dave’s Ruby Lifesavers

Dave also adds that adding the gems to your development better_errors, and then en binding_of_caller are lifesavers. It allows for a more interruptive session with raised errors. Also, in Rails 4 the console feature was added, allowing you to tweak things and play around to debug. Also, Pry is really useful for loop through and investigate. Dave also notes that Pry, while being a great tool, can sometimes be a bit annoying if you have a large number of loops.

Crazy Bug Story - Brian

Brian talks about how in Elixir the declaring of methods is very similar to Ruby but at the end of Elixir method calls you add keyword do. If you do this in Ruby, the interpreter’s error message is unusual and doesn’t give any information that helps you find the issue, making it very hard to find the issue. This could be very time consuming for the debugger. He adds that having a second pair of eyes helps with issues like these.

Crazy Bug Story - David

David talks about working on a personal project late into the night. Using Rails 5.1.1, he thought that maybe his issue with the enumerators. He considered that maybe the issue was with Rails 5.1.1 being that is newer. To test to find out if he caused the error, he recreated a simple bit of code that uses enumerators and saw that it worked, then created the same project in 5.1.1 and it also worked, concluding that he created the issue. Later he found he declared the datatype for the enumerator as a string instead of an int. Brian added that creating a fresh application to test for errors is a great way to start debugging, in comparison to immediately to asking others what the problem might be. This method of checking can have a quick pay off if the code is simple. Also, creating new applications to test gives a great foundation of knowing that the problem is in your own code.

Crazy Bug Story - Charles

Charles’ bug was something he encountered in his podcast feed application he created in Rails 4. Charles didn’t read the error message very well so he tried it debugging it with Puts Debugging. It’s turned out that he was using a strftime method that he had accidentally formatted the string wrong, using -’s instead of /’s.

Characterizing with a Test

In issues like Charles’ you can take input that’s going into a method and then setup an integration test. Tests like this can be made fairly quickly. By copying and pasting the input parameters into a test like a Capybara test, then you can get a better idea of where the issue actually is.

Creating the Error to Fix the Error

Brain mentions that sometimes when he has a specific error, he will try to write a new set of code that reproduces the issue. Then from there he will try to ‘break’ the broken code in efforts to find a debugging solution in the original code.

Making your Production Environment The Same as Your Development Environment

If you’re using something like caching in your production environment, make sure it is set up in your developmental environment. Debugging caching issues can be some of the most complicated bugs to fix. If you set up your environment to be the same it helps. If you need to start the caching over during development or tests, it’s as simple as a CLI command. When you’re doing feature tests, if you do it with caching enabled, you can use timecopTimecop allows you to essentially time travel to test timing issues without having to wait.

Favorite Development Tools

Some of the panelist’s favorite tools are Prybinding_of_callerbetter_errorsKonami, and SinatraGoogle Chrome’s RailsPanel extension Works like MiniProfiler, but digs in further. By adding this gem to your development environment and running it on Chrome, it shows you all the requests that come through, the controller in action, and lists out all the parameters, as well as active record calls and errors.

Favorite Production Tools

Brian suggests using any tools available to capture exceptions and error messages. Capturing these issues before the user contacts you makes recreating the issue and debugging it a lot easier. Dave mentions using New Relic to capture performance of application as well as error notification. With New Relic you can adjust the notification threshold and give it actions like sending it to a Slack channel. Then use something like Sumo Logic to concatenate and combine the logs if it’s coming from various servers.

Shipping Logs Off

FluentD can be used to ship off logs to analyze. In some cases management won’t be okay with shipping things off. Doing things internally can sometimes be too much and using a third party aggregation tools can be helpful.

Some Tools Can Be Heavy

Sumo Logic applet is Java based and takes up quite a bit of space. Jenkins is also a Java setup and takes many parameters to get running. In some cases with smaller applications, applets like Sumo Logic can take up more space than the application. Trying to parse multiple servers can be daunting and will definitely need a centralized logging option.

Other Logging Tools

Elastic.co and Logstash are other logging tools. They have integrations with tools like Docker and Kibana. If you can roll your own logging tools then great. But it’s usually time consuming and takes resources.

Getting Information from People and Assume It’s Wrong

Charles mentions that in some cases, especially in cases where something you’re using is dated, resources can be limited to get information on a bug you’re having. Brian suggests that when this happens, getting information out of people is a good place to start. Also, when getting information from people, assume that it’s wrong. People tend to have a pretty poor recollection of what happened. You can sometimes take what they say and compare it to the logs to create tests and logically work out how something has happened. Users will sometimes leave out things like accidentally leaving a field blank, or hitting backspace, or something simple. Extracting information from the users to get relevant information is a skill. Sometimes the best way to get information from a user is to just watch them use the application. Sometimes they will use the application in ways unexpected. Approaching the problem with “Let’s fix this together” helps with getting the client to help.

Getting Access with Production Data

David mentions that If there is an issue with the production side of things, pulling data down into your own database and your own separate testing environment can keep it safe while debugging. If you’re able to recreate the issue than most likely it’s an application issue, otherwise it’s something to do with the environment like caching.

Safely Percautions of Having Client Data on Your Computer

If you’re pulling data down, you should absolutely have your devices encrypted. There is no reason not to. Also when pulling data down, you can create a mirror of the data dump. There are systems that dump data that will also obfuscates or remove particular information including personal information like emails.

Troubleshooting ActionCable: Step 1 - Cry in a Corner

David tells how he was troubleshooting an Actioncable issue and his first step was to cry in a corner for 5 minutes. Afterwards he used Chrome Dev tools to trace back the code’s method where it was getting declared. Sometimes if an application is complicated it can be running many moving parts and be difficult. When debugging something complicated start at the browser level. Check for connection then try pushing a message in the console. If you get it then you’re connecting but not broadcasting. If you have a complicated subscription model for authorizing a channel, it can be even harder, again start with checking to see if it’s connecting.

tail -f | grep ‘exception’

Charles remembers a simple way to watch for issues while debugging. A simple use of tail -f | grep ‘exception’ tails the logs and shows only the exceptions. You can use this along with Put debugging by putting the word in all your puts.





His new 5 foot long 12 plug power strip


Microsoft Build
.Net Rocks Podcast
Ketogenic Diet & Livin’ La Vita Low Carb

          Ukraine claims Russian security services behind cyber attack   

Ukraine has alleged that Russian security services were involved in launching a massive cyber attack which locked up computers across the world. The Ukrainian security agency, known as the SBU, said similarities between the malicious software and previous attacks on Ukrainian infrastructure shows Russian intelligence services took part. Ukraine was one of countries hardest hit by the attack on Tuesday, when computers at government agencies, energy companies and cash machines were temporarily disabled as their data was encrypted amid demands for ransom payments. Russian companies, including the state-owned oil giant Rosneft, also said they were hit by the attack. Relations between Russia and Ukraine have collapsed since Moscow annexed Crimea in 2014 and began backing separatists fighting forces loyal to Kiev in eastern Ukraine. Most of the organisations affected by the attack recovered within 48 hours. The SBU said the attackers appeared uninterested in making a profit from the ransomware program and were more focused on sowing chaos in Ukraine. There was no immediate official response from the Russian government, but Russian lawmaker Igor Morozov said the Ukrainian charges were “fiction” and that the attacks were likely to be the work of the United States. Ukraine has repeatedly accused Russia of sponsoring hacking attacks, including the hack of Ukraine’s voting system ahead of the 2014 national election and an assault that knocked its power grid offline in 2015.

The post Ukraine claims Russian security services behind cyber attack appeared first on Glossy Post.

          Folder Lock - 7.7.0   
File locking software that Encrypts your important files and lets you shred the unnecessary space consuming files. Furthermore, Clean history and create online wallets to protect banking details, ATM pin number, credit card details and more.
Make your own free website on Tripod.com
baby diary
« March 2009 »
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31
You are not logged in. Log in
Entries by Topic
All topics  «
Sunday, 15 March 2009

Adobe PDF Creator

Create Professional Adobe® Compatible PDF Documents

Adobe PDF Creator is a price effective solution instead of the best PDF product, Adobe Acrobat® 8. Adobe PDF Creator permits you to erect PDF files from documents, spreadsheets, presentations, emails, websites, and practically any folder that can be printed. Adobe PDF Creator is a virtual printer so it's vitally integrated and arranged for adoption in all of your favored Windows® programs. This includes any of your Business applications, Multimedia applications, Web applications, Presentation applications and the menu goes on and on. If you can print it, you can turn it into a PDF document.

Combine Multiple Files Into Adobe® Compatible PDF Documents

Adobe PDF Creator will even approve you to fuse multiple files into one easy to share PDF document. You can merge your PowerPoint sales presentation with your sales spreadsheet into one helpful PDF document in the blink of an eye. You can join any number of files of unalike file type into one expert PDF document. You can consolidate your multimedia documents with your sales brochure or combine website pages with excel spreadsheets. The potentiality are limitless when using Adobe PDF Creator for your PDF development needs.

Secure Your Adobe® Compatible PDF Documents

Adobe PDF Creator has many that allow you full control when it comes to safeguarding your PDF documents. Adobe PDF Creator includes secure 128bit encryption and will let you to password safeguard your PDF documents. You can even set a password for more advanced features like alternating user permissions and passwords. With Adobe PDF Creator you can deny Printing of the document, veto Copying of Text and Images, inhibit Modifications to the document and forbid Modifications to comments. You can even set your PDF document to allow or disallow the following features: Low Res Printing, Screen Readers, Filling in form and Changes to the Assembly. With Adobe PDF Creator you are in absolute control of your PDF document.

Click Here For Your Adobe PDF Creator

Posted by olivermeadows822 at 11:29 PM EDT

View Latest Entries

          Importing My Letsencrypt SSL Certificates   

I have been trying to import my letsencrypt SSL certificates into Openfire, I have used this script keytool -import -keystore keystore -alias perthdronephotos.com -file cert.pem

it created the file then I copied it into the /etc/openfire/security directory and sudo chown -R openfire:openfire keystore so openfire could access it. It all seemed to change over without any errors until I tried to login to the https admin console of my site and it would open, I had to access it via the IP address or the http site, I changed everything back to the original and it is working fine again just saying site is unsecure with a red line through https. I hope someone can help me get this sorted


There are 4 .pem files within my letsencrypt directory they are





          Our Father-- Matthew 6:9   
Foundations for Prayer
Jesus, in giving us the Lord’s prayer, isn’t just telling us what words to pray, but he is telling us the way God wants us to pray. Some call the Lord's Prayer the "summa evangelia"-- the summary of the gospel.  Because in the Lord's Prayer in the heart of Jesus' teaching.

Right at the beginning, Jesus makes a radical statement—that we are to begin our prayers with “our Father.” But what does this mean, what is he implying? There are two basic questions that need to be answered in understanding what Jesus means in teaching us to address God as “our Father”: What does “father” mean, and who are God’s children?

Which Father?In the first century, when Jesus taught the Lord’s prayer, there were many people called “father.” Of course, there was one’s male parent, but also his grandparent or anyone else who was an ancestor. Also, the ruler of one’s nation or one’s ultimate authority was called “father”. What did Jesus mean?

First of all, of course, Jesus stated clearly that we are not praying to any earthly father, but to our Father in heaven. This is the Most High God, the king of the universe. (Matthew 23:9) But when we are praying to God as Father, what does that mean, apart from praying to Him as Lord or as God?

Concern—A father is concerned about his children, and so wants to meet their needs. He isn’t distant or have apathy, but he is always there, always ready to help if the need arises. This is different from a distant Lord or an uncaring God. Luke 11:11-13

Protection—A father cares about his children and so he protects them from harm. If anyone is attacking his children, he is always there to deliver them from that attack.

Provision—A father wants his children to have everything they need, so he provides them with food, clothing, warmth—everything they need. Luke 12:22-30

Teaching—A father not only is concerned about his children’s physical needs, but also their social and moral ones. He wants to make sure they know the right way to live and will provide them with what they need to live that life. Ephesians 6:4

Leadership—A father guides his children, sometimes with wisdom and sometimes with commands.
Discipline—A father allows his children to go through hardship at times, not to punish them, but to help them live the life that he wants them to live. Hebrews 12:5-7

Care—But ultimately, even if he disciplines or is training them and the situation the father places his children in seems difficult, he is constantly displaying his care to them, giving them his great love and compassion toward them. I Peter 5:7

Thus, when we call God “Father”, we are not praying to a distant god or an uncaring Lord—God is with us and in tune with what situations we are in and what we really need and is ready to give that to us (Matthew 6:8, 31-33)

Which Children?Everyone wants to recognize themselves as God’s children. And, in a sense, every human on earth is a child of God. We have all been created by God, and God provides food for all of us. God loves us all and has given us all his Son to die for us. However, does this really mean anything to us, really? After all, God loves every human, even Adolf Hitler and the man who spits on the ground at every mention of God’s name. Are we really equal children of God with these?

Jesus distinguishes those whom God loves generally from those whom God desires to grant great blessings upon. The kingdom of God and all the blessings that come with it are not for everyone, but only for some whom Jesus called “sons of God.” Who are these children, who will receive all that God has to give them?

Relationship with God—These children are those who seek God to have a relationship with Him. They do not just passively accept God’s blessings, but thank God, praise Him and act out of their love for God. Mark 10:28-30

Dependence—These children are openly dependent on God and will sometimes refuse the easy way in order to have a better relationship with God. When they refuse the easy way, they are dependent on God for his provision—taking the chance that if God does not provide, they are in trouble. Luke 18:1-8

Trust—These children trust God for his provision, asking him for what they need and relying on him to provide it to them. They know that God rewards those who love him and wait on his reward in His time. Matthew 6:31-33; Hebrews 11:6

Obedience—These children listen to God and do what he says because they know their Father cares for them and will not command them to do something that is harmful to them. Matthew 7:21; 12:50

Likeness—These children not only do what God says, but they even act like God in some ways. They love everyone as God does and they refuse to have anything to do with evil as God does. John 8:39-44; Matthew 5:9

Thus the children that cry “our Father” are not just the run of the mill children of God—they are God’s chosen, God’s people and kingdom in Jesus.

OUR FatherOne last thing needs to be pointed out. When Jesus told us to call God “Father”, he told us to recognize that the Father is not just “mine”—as if a relationship with God is just between two people. Rather, Jesus told us to pray “OUR Father”—we are a part of a community of children, not just an only child trying to figure out our relationship with our parent on a solitary basis. We are not independent individuals—we are a part of a community. This means that we need to act like it. We need to be with people who are our Father’s children, pray with them and depend on them, even as we are all dependent on our Father.

          Kingdom Come-- Matthew 6:10   
In the Lord’s Prayer, the second request is to ask for God’s kingdom to come. We may think we know what it means, but on closer examination it requires more effort—what is a kingdom? Does God really have one? If so, where is it? And how can a kingdom move? If it can’t move, how can it “come”? Let’s explore some of these questions:

Doesn’t God rule everywhere?Jesus commands us to ask God for God’s kingdom to come. Fundamentally, this is asking God to rule. But for those of you already familiar with the Bible, you probably know that it says that God already rules over all the earth—over the whole universe! This is true. (Psalm 97:9) But does God actually get to do all he wants to do with the earth? No. That’s because he handed the rule of the earth off to someone else—humanity.

Right from the beginning of creation God promised humanity the rule of the earth (Psalm 8). But humanity hasn’t done with the earth what God wanted—they made the rules themselves instead of listening to God. So we chose our own rulers—and we chose Death and Satan (Genesis 3; Hebrews 2:14). And so God’s rule was thwarted on earth, and the whole planet is ruled by rebels to God. Which would be okay, I guess, if they had humanity’s and the earth’s best interest at heart. But they don’t.

What is God’s kingdom?
So that’s our situation. We are on a planet stuck with bad rulers. And these bad rulers created the mess that we live in everyday (Romans 5:14). So what else is new, you might say. Well, the new thing is that God hasn’t given up on us. He is interested in changing this situation. God will get rid of the lousy rulers and put his perfect ruler in charge who is interested in helping everyone, not just himself—Jesus Christ (Daniel 2:44; Revelation 5:9-12). God will deal with all the bad people and the mess that we live in and just get rid of it (Psalm 37:11-12). God will give benefits to the humble who trust in Him in the midst of this perpetual crisis (Matthew 5:3-10). And He will make everything new—turn it all upside down and inside out (Isaiah 65:17-24). God is going to establish a new reality out of this chaotic, evil jungle. And that change, that utopia is called the Kingdom of God.

That’s right. So when we are praying for Kingdom Come, we are praying for this mess humanity has created to be re-made new—something good in God’s imagining. But we need to recognize that Jesus is telling us to pray for this. He isn’t telling us to create democracies to make this kingdom come. He isn’t telling us to enact tough love to make the kingdom come. He isn’t telling us to build a lot of churches to make the kingdom come. He is telling us to pray. Why? Because the kingdom won’t come by our effort, but only when God is ready for it to happen. God’s kingdom is God’s work, and our main participation in that work is through prayer. (Psalm 146:3-10)

God’s kingdom—TodaySo if we were looking for God’s kingdom, how would we recognize it? Does God have an embassy that we can visit or a website? Well, yes and no. First of all, we recognize God’s kingdom because it looks like what Jesus talked about. Jesus said that God’s kingdom would be helping the poor (Luke 12:33). That it would be forgiving people who don’t deserve it simply because they repent (Luke 17:3-4). That it would be filled with people who live according to God’s righteous standard (Matthew 12:50). That it would be characterized by healings and words directly from God (Mark 16:16-17). That it would be loving and merciful (John 13:34-35). It is righteousness, peace and joy in the Holy Spirit (Romans 14:17).

“Hey,” some people say, “that sounds like the church.” Well, I would offer a corrective to that. It sounds like how the church is supposed to be, but it is in only a few places. That is why we are asking for God’s kingdom to come. It isn’t here yet. It has started, and it’s growing but it is still pretty small compared to the amount of people who claim to be a part of God’s kingdom.

So how can we participate in God’s kingdom? Two ways—first of all, we willingly submit to Jesus, the leader of God’s kingdom. If we commit ourselves to Him, then he will help us to be a part of the solution, not the problem (Acts 2:35). Secondly, we need to receive the Spirit of God from Jesus (John 14:26). The Spirit is the only one who can help us live out the ideal. Thus, when we pray “Your kingdom come” we are really praying, “God put your Spirit in my life so I am a part of that kingdom now.”

God’s kingdom—Coming
As great as this community of God’s Spirit is, it is still not complete. God’s kingdom will not be completed until God is completely in charge of the whole earth. Sure, ruling over a bunch of outcasts is great, but it’s not what God really is looking for. He wants all that is owed to him—the whole thing.

And God has that in his plans. His plan is to have every single human being—both living and dead—recognize that Jesus’ is the only true ruler over the earth under the Father (Philippians 2:10-11). And this can only take place with a cataclysmic event—the destruction of the current world order. God will set aside all the rulers of the world and establish his own ruler (Revelation 19:1-16). Then the dead will have to be raised, and every human being will bow to Jesus as the Lord over the earth (Matthew 25:31-32). Then Jesus will choose those who were most merciful and humble and righteous before God and will establish them as rulers with him (I Peter 5:6).

This great event hasn’t happened yet, but every time we pray “Your kingdom come” we are asking for God to make it happen. So if you like the governments and system of the world the way they are, you need to stop praying the Lord’s prayer. Heck, you need to stop following Jesus, if that’s the case, because he’s looking to take over. But if you forsake Jesus, you won’t be ready when the change does come. So be ready by following Jesus. (Matthew 24:42-25:13)

What is God waiting for?
So why hasn’t this event happened yet? Well, God is waiting for a few thing to happen: First, he needs to allow the governments of the world to become corrupt enough that they are ready to be brushed aside. When they all oppress God’s people, then they will be ready (Revelation 6:10-11). Second, he needs to have his people purified from sin and dependent on Him for obedience so they will be ready to rule. And third, he is waiting on those whom he loves and has chosen to repent so his people will be complete with them (II Peter 3:3-9). Yes, God has waited two thousand years—but if he had come twenty years ago, would you have been ready for him?

The real question is: are you ready now? To pray “your kingdom come” is to claim readiness for God. For God to come into your life and change it to His liking. For God to come into the world and change it forever. Are you ready for that? If you are, then we can pray the Lord’s prayer together.

Kingdom Come is God’s Spirit ruling in our lives.
Kingdom Come is God’s Son ruling over the earth.
Are we ready?

          Forgiving Debts-- Matthew 6:12   
What is forgiveness?Forgiveness is, in it’s root, an economic term. If I owed someone some money, and then failed to pay it, I have defaulted on my loan, I have messed up my credit. The person whom I still owe money to will speak of nothing to me except my debt, and so I don’t want to talk to them at all. Our relationship is ended. But if I am “forgiven”, then my debt is wiped away. I no longer need to worry about paying off that debt, because the one whom I owed has wiped it away, erased it from the accounting book.

When we forgive someone else, often we think of it as “no hard feelings.” In other words, we are willing to set aside our anger, and not hold a grudge against them. We will not harm them, nor sue them, nor do anything to attack them in any way. And that is a difficult pill for many to swallow. But it is our Christian duty, so we will forgive.

The question is: will we accept? Many of us aren’t sure we want to do that. For if we accept the person, treating them as if nothing had happened, then they will think that their wrong against us was “nothing”. If we fully accept them, with no punishment involved, completely loving them as before their wrong against us, then we are opening ourselves up for a fall. “If you fool me once, shame on you; if you fool me twice, shame on me.” After all, we need to protect ourselves, right?

Well, in the Bible, forgiveness isn’t just a matter of our feelings. It is, first of all, wiping away the debt. For those who wronged us, the wrong is no longer there. It is as if it didn’t exist. This doesn’t necessarily mean that you don’t need to be careful with people in their areas of weakness, but we don’t allow their weakness interfere with our relationship. Forgiveness is mostly a matter of relationship. To forgive is not just to say, “I’m not angry about that anymore.” It is saying, “We are still in relationship.” I will still treat you as part of my family. To not forgive, in the Bible, is separating oneself from the one who offended you. Lack of forgiveness means we still remember the wrong done to us, and it hangs between us every time we interact with the person who wronged us. Forgiveness means that the relationship may continue without that wrong tainting every part of our relationship.

Why do we need forgiveness from God?
The fact is, we owe God a huge debt. Not economically, for God freely gave us all the food, clothing and basic needs we had. We owe God nothing for that. But for creating us and loving us and giving us a planet to rule, for that we owe him big time. It is similar to what we owe our parents for making us. Even if we don’t like them, we owe them something for without them we wouldn’t exist. Well, what God asks of us is our respect and obedience. He just wants us to listen to Him when he tells us to do things, because, after all, it’s for our own good anyway.

But we defaulted on our debt. We have disobeyed God again and again. In fact, we can almost say that a good portion of our lives are characterized by us owing God more and more and more. Almost every day we owe God such a huge debt of obedience, that we can never catch up. And frankly, we never will. The debt is too huge already.

So what did that do to our relationship with God? Well, though God loves us and wants to be with us, He can’t live with people who constantly disobey him. It’s kind of like living with someone who is constantly grating on your nerves, always doing the very thing you hate. You just can’t stand to live with that person. Life is like a torture. And God, the king of the universe, will not accept that. So we will not live in relationship with Him. Not until the debt is settled. Not until we deal with our disobedience.

Is God willing to give us forgiveness?
But God loves us. He really does. We may think, “Why doesn’t God just forget about our sin and leave it behind, if he loved us so much?” Well, it’s because we keep bringing it up. We are constantly disobeying God. But God loves us so much that he is willing to go to any length to restore our relationship. He is willing to do anything, short of giving up on us and our obedience. And frankly, God gave us a great opportunity. He gave us the possibility of forgiveness. It costs us a lot—I must admit— and yet we can gain so much. So how can this debt be wiped away?

Death of JesusFirst of all, God sent his Son, Jesus to die for us. Jesus death created a new nation called “the Kingdom of God” which anyone is allowed to enter. Those in the Kingdom of God can speak with God and have a free and open relationship with Him. They can pray to God and have their prayers heard and answered. They can receive wonderful blessings of God like His Holy Spirit and daily provision and healing. And they can understand what God says to them. To enter this kingdom, all one has to do is to commit to Jesus as their king. This means Jesus is in charge of our lives, and tells us what to do. And then we can have full access to God. If we commit ourselves to Jesus, then our debt of disobedience is fully forgiven.

Confession of Sin
However, we still have a problem. We still disobey God. Sometimes quite a bit. Does this make Jesus’ death null and void? No, because in Jesus we are told how to deal with the sins we do. We confess and repent of our sins. Yes, we will sin and disobey God. But if we admit our sin and then turn from anything that might cause us to sin, then we are forgiven. If we do this, Jesus gives us the strength to not return to our sin, if we would depend on him. That takes care of the sins we do daily.

Forgiving others
Well, then, our sinful life is erased, and our daily sins are repented of—everything is okay, right? Well, there still is one more thing, according to Jesus. You see, God hasn’t only forgiven us, but He has forgiven a number of others. We are all a part of Jesus’ kingdom together. But what happens if those who are forgiven by God don’t forgive each other? Well, suppose there were three people stuck in an elevator. Two of them hate each other’s guts, but they both like the other. Even though they have a relationship with one person, the anger and hatred of the other will make their life a living hell.

Even so, the kingdom of God doesn’t work unless we are willing to forgive each other even as God forgave us. If we agree that God has a relationship with someone—that He has forgiven their sins, and they are right before Him—then we need to have a relationship with them as well. Jesus is very clear about this—if we reject the one whom God accepts, then we will be rejected by God. If we are looking for God’s forgiveness, we will need to forgive others when they do us wrong.

Do we forgive literal “debts”?
There is still one more issue. We remember that forgiveness isn’t only relational, but economic. Does that mean that we need to forgive the literal, monetary “debts” as well? In Luke 6, Jesus said this: “Do good and lend, expecting nothing in return.” In other words, if someone owes you money—cold, hard cash—and they can’t pay it back, forgive it. Wipe it away. Just forget about it. Forgiveness of others isn’t just about sins, nor just about hurt feelings—although it includes all that. It also includes financial debts.

          Creating Corporate Windows Phone Applications   

Originally posted on: http://bobgoedkoop.nl/archive/2012/06/22/creating-corporate-windows-phone-applications.aspx

Most developers write Windows Phone applications for their own gratification and their own wallets.  While most of the time I would put myself in the same camp, I am also a consultant.  This means that I have corporate clients who want corporate solutions.  I recently got a request for a system rebuild that includes a Windows Phone component.  This brought up the questions of what are the important aspects to consider when building for this situation.

Let’s break it down in to the points that are important to a company using a mobile application.  The company want to make sure that their proprietary software is safe from use by unauthorized users.  They also want to make sure that the data is secure on the device.

The first point is a challenge.  There is no such thing as true private distribution in the Windows Phone ecosystem at this time.  What is available is the ability to specify you application for targeted distribution.  Even with targeted distribution you can’t ensure that only individuals within your organization will be able to load you application.  Because of this I am taking two additional steps.  The first is to register the phone’s DeviceUniqueId within your system.  Add a system sign-in and that should cover access to your application.

The second half of the problem is securing the data on the phone.  This is where the ProtectedData API within the System.Security.Cryptography namespace comes in.  It allows you to encrypt your data before pushing it to isolated storage on the device.

With the announcement of Windows Phone 8 coming this fall, many of these points will have different solutions.  Private signing and distribution of applications will be available.  We will also have native access to BitLocker.  When you combine these capabilities enterprise application development for Windows Phone will be much simpler.  Until then work with the above suggestions to develop your enterprise solutions.

The protector of our brain and mind. Symbol of human in general or individual together his wisdom and knowledge. Skulls or skull shaped object have often legends or aura of mysticism surrounding them, e.g. crystal skull which is said by some sources to been worshiped by native americans, not to mention the new age religion.

But skulls have also been in everyday usage since around 15,000 BC, in the form drinking cups. Later have their significance become more ritualistic as a cup, used in rites by celtic tribes, pagan cults and treated many others to celebrate battles and vanguished foes. Warlords made cups from enemies skulls long til nowadays (though someone somewhere is probably still drinking from one right now) in Europe, as well in Asia, Africa, The New World and basically everywhere with the material and reason to do it.

Now we have lots of imitated skull cups, since the making from real skull is regarded as barbaric. Still the meaning of the symbol is well known and therefore used by both poets an warriors, and by all devoured by consumerism or in search for aesthetics. Skull as an art is covered in all areas, althought the question remains about the importance of its original meaning.

An interesting story coverning skulls is about Lord Byron from 19th century England. His gardener had found an unknown skull near an old abbey, from which he had made a drinking vessel. It was said to be turtoiseshell coloured and nicely polished; on it he had written a few dark poems. So he sometimes sat, accompanied only by the skull, and wrote.

          On camels and apples   

The difference? Everything, from head to toe, since the apple is absent of both.
Still, they are both whole. Whole as an object or sign, abstract or clear.

Camels are fast animals, but an apple heading towars the ground (or Einstein`s head) may not stay behind.

The both have curves and parts of them that are of different shape, taste and consistency.

They both have a beginning and an end.

Both camel and apple provide life.

So for the love of apples:

I ate my cake.
New I must make
but no apples to bake.
There, I go to the lake
to visit the drake.

He tells me of one rarity
with apple kind similarity.
But he gave it to charity.

Long I searched
under a birch
til I came to red little church.

Full of strange creatures
each one of a kind
striking all features
and their intelligent mind.

They spoke near...
Hear me traveller!
and have no fear,
if youre not scavenger
one who looks for pear.
Apple is here
yet not yours to pick.
But stay! We have pies for your fit.

Starving I was,
stayed even for dinner
and breakfast and lunch.
Felt like winner!
even more with the brunch.

And the new found cake
-Oh for apple`s sake!
was to good for one to make.

          IT Security Officer at Stanbic IBTC   
Stanbic IBTC Bank is a leading African banking group focused on emerging markets globally. It has been a mainstay of South Africa's financial system for 150 years, and now spans 16 countries across the African continent. Standard Bank is a firm believer in technical innovation, to help us guarantee exceptional client service and leading edge financial solutions. Our growing global success reflects our commitment to the latest solutions, the best people, and a uniquely flexible and vibrant working culture. To help us drive our success into the future, we are looking for resourceful individuals to join our dedicated team at our offices. Job ID: 24894 Location: Lagos Island, Lagos Job Sector: Information Technology and Services Job Details Group Information Technology: systems development, business analysis, architecture, project management, data warehousing, infrastructure, maintenance and production Job Purpose To provide an operational IT Security support to ensure that the bank is not compromised in anyway. The operation support includes anti-virus, intrusion detection, key management as well the delivery of and content scanning of all internet mail incoming and outgoing. Ensuring that all incidents are responded to, actioned and resolved within the required MTTR. Also ensure that calls are escalated and communicated to the required support area and user. Key Responsibilities/Accountabilities Configure, install and support all security software Responsible for administration of the firewall and monitoring of security tools & software with special focus on infrastructure and network security Testing of security software for new technologies Test and implement approval firewall rules Support of Firewall, ISA, Mail Marshal, Blackberry, OWA,E-Mail, Encryption Tools, Mail Marshal, AD, Equinox, Anti Virus Testing of security software for new technologies Generating, loading and maintaining the life cycle of all encryption keys for the Bank Responding to and resolving all Firewall, ISA, Mail Marshal, Blackberry, OWA incidents Administration and monitoring of Intrusion detection & intrusion prevention tools for workstations and servers Engagement: Partner with relevant stakeholders to maintain and improve the security posture of Business and IT. Develop appropriate measures to understand the effectiveness of securing the bank through the availability of systems. Service Delivery: Perform monitoring via the Security Information and Event Management (SIEM) tool as well as from external sources (e.g. telephone or email). Report on false positives and escalate those to the Lead Analyst for verification. Undertake incident analysis, tracking, recording, and response. Work with or assist other Cyber Security Incident Response Team (CSIRT) members in analysis activities. Report new attack types or suspicious activity to the Lead Analyst. Update the Case Management tools with evidence trails of all analysed incidents. Document results of incidents. Escalate and provide feedback on incidents as per Incident Handling Classification Standard and process. Provide support to Lead Analyst and coordinate activities in support of Incident Containment. Interact with the CSIRT team by assignment from Lead Analyst or Manager of Cyber Security Operations Centre. Mitigation of Risk: Continuously report on incidents identified via the SIEM. Spot patterns across a number of systems to provide advanced warning on new threats. Have an in-depth knowledge of Stanbic IBTC's policies, procedures, or overall IT environment. Adherence to all applicable Policies and Procedures is mandatory. Reporting: Ad- hoc compilation and submission of M.I.S reports. Security incidents reporting. Preferred Qualification and Experience B.Sc. in any Science Courses MCSE / CISA / CISM / CISSP etc would be beneficial Understanding of the CSOC and CSIRT objectives and requirements. IT Security experience / Communication or Network experience will be beneficial IT Security Awareness Working knowledge of relevant Operating Systems. Demonstrate knowledge of standards associated with the role, e.g. ISO, CobiT, ITIL. Understanding of incident management and case management technologies (ticketing systems). Knowledge/Technical Skills/Expertise Working knowledge of the IT and IT Security field including TCP/IP, HTTP, encryption, network access controls, intrusion detection and prevention systems. IT Security penetration testing
          The New Screen Savers 111: Echo Show Time   

The New Screen Savers (MP3)

Leo Laporte and Megan Morrone demonstrate the new Amazon Echo Show personal assistant. Adding a screen and camera make this the most impressive Echo yet, plus it raise new privacy issues. As soon as iFixit.com got their Echo Show they tore it down! Kelsea Weber shows us some surprises on the inside. We discuss why iOS 11 is a tremendous shift for Apple. Nathan Oliveras-Giles walks us through how to set-up PGP encryption for Outlook or Gmail. Jason Howell shows off the Firefox Focus privacy browser for Android. Plus, we answer your questions on Call for Help and Mail Bag.

Hosts: Leo Laporte and Megan Morrone

Guests: Kelsea Weber, Nathan Olivarez-Giles, and Jason Howell

The New Screen Savers records live every Saturday at 3PM Pacific on twit.tv/live. Episodes are available for download and streaming later that evening at https://twit.tv/shows/new-screen-savers.

Thanks to CacheFly for the bandwidth for this show.

          filtración de correos, mejor que mailgate   

Resultado de imagen de anglicismo innecesario

Filtración de correos el caso de los correos son alternativas preferibles a mailgate.
Con motivo de la reapertura de la investigación de los correos electrónicos de Hillary Clinton, en los medios de comunicación pueden leerse frases como «Hillary acusa el golpe y busca frenar el impacto del mailgate», «El mailgate vuelve a complicar a Hillary Clinton» o «Trump le saca partido al mailgate y gana algo de aire en los sondeos».
El elemento compositivo -gate se está empleando cada vez más en inglés para crear términos que aluden a un escándalo o caso notorio, sobre el que a menudo se presume alguna irregularidad.
En español, es posible optar por estos últimos sustantivos (escándalo caso) y, en el asunto de los correos investigados de Hillary Clinton, también por filtración (de correos).
Así pues, en los ejemplos iniciales habría sido preferible escribir «Hillary acusa el golpe y busca frenar el impacto de la filtración de correos», «El caso de los correos vuelve a complicar a Hillary Clinton» y «Trump le saca partido al escándalo de los correos y gana algo de aire en los sondeos».

          RE: Wait.. but..   
That's not necessarily the point. For example, let's say you (major corporation) have a key custom client-server app that you need to distribute to a few hundred suppliers. The suppliers are providing the desktops, but you're providing the server and data warehouse accessible via an encrypted channel over a wide area network. You have at least three options. (1) Rewrite the client as a web app. This takes probably a year, includes considerable risk, may affect performance, and may not be feature-complete. (2) You can send the client to each supplier, work through each of their app approval processes, and provide remote technical support - for every version you release. (3) You can set up a virtual terminal server such as SPICE or Citrix and run the client on your own servers. To your supplier-based users, it launches like a web app but runs like a native app. You keep full control of the client code, and distribute new versions with a centralized server install. Tech support drops to usability issues, as you it's installed correctly on a capable machine. And you needn't change a single like of code in the client or server to do it. Really, for rather common scenarios such as this, it's a no-brainer.
          Getting Started with Tipcoin – The Internet of Money   
1st Jul, 2017 – In modern time, crypto currency, like bitcoins are expanding rapidly in market. CRYPTO CURRENCY IS a digital currency in which encryption techniques are used to regulate
          Cara membuat total download di blogspot   

Cara membuat total download di blogspot - portal pilihan
Mungkin kita semua cinta untuk tahu berapa kali file pada situs kami di-download. Anda dapat mengamati bahwa saya melacak semua download saya apakah template yang, ikon, tombol atau sumber daya blogger lain. Ini membantu saya tahu seberapa populer bahwa file tertentu. Banyak yang mempertanyakan kami tentang naskah yang kita gunakan untuk melacak file kami dan hari ini kita akan berbagi setiap detail pada bagaimana kita benar-benar melacak download di Blogger.
Bagaimana cara melacak download di Blogger?

Saya menggunakan layanan Dstats untuk melacak jumlah download. Metode ini sederhana. Ada dua langkah yang,

Dalam posting Anda hanya paste kode di bawah ini. Mengganti pasta-FILE-LINK-sini dengan link file Anda ingin pembaca untuk men-download. Dan mengganti gambar URL dari tombol Download dengan Link gambar dari tombol Download Anda.

<a href="http://dstats.net/download/PASTE-FILE-LINK-HERE"><img src="Image URL OF Download Button" border="0"/></a>
<p>Downloads:<a href='http://dstats.net/download/PASTE-FILE-LINK-HERE'></a>
<script type='text/javascript' src='http://dstats.net/dstatsjs.php?file=PASTE-FILE-LINK-HERE'></script>
<script type='text/javascript'>document.write(dsCounter);</script></p>

Kemudian ambil Contoh tombol Download ini.

contoh download contoh download
contoh download contoh download
contoh download contoh download

Anda dapat menggunakan tombol Download diatas hanya klik kanan gambar dan pilih "Copy gambar lokasi" dan ini akan memberi Anda URL gambar untuk tombol.
Setelah Anda selesai, mempublikasikan posting Anda dan melihat tombol Download indah dengan auto download tracker gantung dalam posting Anda. Selamat mencoba!
          Heartbroken and Confused   

My heart feels like it’s torn in two,Why can't I just be with you?Everyday another tear,Everyday a lot more fear.I want to hold you in my arms,I want to keep you safe from harm.I act like things are all okay,But I really want to run away.I act like things are all alright,But always end up in a fight.I cry more tears than I can count;Why won't they just let me out?I tell myself these things won't stay,But I don't think they'll go away

          NTC ... 368. NOVIEMBRE, 2013   
NTC ... 368 


NOVIEMBRE 1 - 30, 2013

Nos Topamos Con  (Año 13)

“Enetecear”: leer+escribir+navegar+compartir+colaborar+difundir+celebrar+
fortalecer afinidades+agradecer+… (De RAE)
De navegaciones-e en nuestro "potrillo a vela" ( 1 ),

Número anterior:

*** Eventos a partir de Noviembre 24, 2013:  NTC ... AGENDAhttp://ntc-agenda.blogspot.com/ . Allí: más detalles, información, enlaces, otros eventos, ... . Se actualiza periódicamente. Nuestra NTC ... Agenda es mucho más ... 
*** LUNA DE LOCOS. Quince Años. Comienza la celebración  con un reconocimiento de la Asamblea Departamental de Risaralda la publicación del número 23 (Nov. 2013) de su revista de Poesía
*** El Cronopio  Nacho Ramírez estaría de muchos 69 años el 30 de noviembre, 2013 . Les comparto este actualizado y reencauchado recorderis.  Por Óscar Domínguez
*** COMO SE INCLINA LA HIERBA. Antología poética de Manuel Iván Urbina Santafé,  No. 97, Noviembre 2013,  en la colección Un libro por centavos de U. Externado.
En el portal del Poeta: http://escrituracreativa.jimdo.com/
*** PEN INTERNACIONAL / COLOMBIA, Corporación. Entidad sin ánimo de lucro, de derecho privado y con finalidad cultural y social.
Web de organización: http://pencolombiadeescritores.com/index.html . Publicaciones digitales recientes:

*Destacamos: en la página 23 uno de los Relatos de de la Poeta y cuentista Ana Milena Puerta,  ganadores del premio IV concurso de Cuento de la Camara de Comercio y del Grupo Cultural El Tunel de  Montería.

*** Y OCCIDENTE CONQUISTÓ EL MUNDO  . Entre el gran pavor del 1.000 y el gran terror del 2.004. Antonio Caballero. El Ancora Editores, Primera Edición 2.000. 114 páginas.
VER y NAVEGAR: http://ntc-narrativa.blogspot.com/2013_11_20_archive.html . Allí: Detalles del libro, textos, enlaces, ... 
*** Poemas sobre el vientoArmando Barona Mesa
 Presentación del libro. Cali,  14 de noviembre, 2013,  Cali,  7:00 pm. Presentadores: Julio César Londoño y Medardo Arias. Registros, textos, enlaces, ver y navegar: http://ntc-libros-de-poesia.blogspot.com/2013_11_19_archive.html
*** Kioskos Vive Digital,  hoy (18 de Sept. 2013) se inauguran 500 en todo el país. 
En un solo día y de manera simultánea en 10 departamentos, el Presidente Juan Manuel Santos, todos los ministros del Gabinete y las Fuerzas Militares, harán la entrega más grande de tecnología al servicio de la Colombia rural: los primeros 500 de un total de 5.300 kioscos que se instalaron en todo el país. Ver y navegar: 

*** MARUJA  VIEIRA  . Por Margarita Vidal. Entrevista. Revista Credencial. No. 324. Noviembre 2013.
          Security Architect - Ohio Virtual - Amazon Web Services, Inc. - Ohio   
Significant technical expertise in Cloud Computing technologies, scripting languages (Python, RoR, etc), integrating 3rd party monitoring tools, encryption...
From Amazon.com - Wed, 21 Jun 2017 14:59:53 GMT - View all Ohio jobs
          Write some Software by rxtab   
looking for a programmer to write a code to encrypt my music (Budget: $30 - $250 AUD, Jobs: PHP, Software Architecture)
          Lucky Dog!   

In a big city like London there is always something interesting going on.  So much so that I often succumb to apathy and give up, choosing to sit inside with a glass of wine rather than make a decision regarding what to do and where to go.    Still, some things cannot be missed and it is with thanks to this blog that I have managed to get myself onto a few very useful mailing lists and get notified of interesting theatrical events in time to organise myself for a visit.

When an email popped into my inbox for a silent movie screening evening I jumped at it, especially as it was being held at Wilton’s – my very favourite theatre in London .  I hope to visit them for their theatre tour soon.

The Lucky Dog Picturehouse were hosting the event.  Perchance many of you will have heard of them but they were all new to me.  They specialize in screening silent films from the end of the 1800s to the 20s – with the aim of providing an authentic silent film experience.  

I watch silent movies at home but I had never seen one in a cinema with live musical accompaniment.  I have to say it was an incredible experience.  Hearing the crowd gasp or laugh in unison really heightened the drama playing out on screen. 

We were treated to five wonderful films:

Une Homme de Tetes (1898)

George Melies, the actor and magician, using film in an amazing inventive way for the time – by removing his head!  Special effects have been around for a very long time.

The Adventurer (1917)

A Chaplin short I had not had the pleasure of seeing before and probably my favourite film of the bunch.  This was where the audience really started to react as one – the laughter was loud and joyous as the Little Tramp tried to escape the cops.  As usual there is that sentimental side – Charlie saves a beautiful woman and her mother from drowning (though he caused the accident in the first place) and ends up trying to convince everyone that he is a rich yacht owner.

The lovely Edna Purviance co-stars.

Never Weaken (1921)

Ah, Harold Lloyd doing what he does best – stuntwork.  The audible gasps as Harry dangled high above the streets were fantastic to hear.  As usual, Harold’s unlucky everyman is in love and believing his betrothed has agreed to marry another man he decides to kill himself.  Of pourse things don't go entirely to plan....

 Felix in Hollywood (1923)

Felix the cat – in Hollywood – nothing more to add really – Miaow!

Sherlock Jnr (1924)

A Buster Keaton film was chosen to end the night – Sherlock Jr sees a down on his luck Buster working in a cinema.  He day dreams during a film and we are treated to some amazing special effects as his character joins the action on the film he is projecting.

Now, I'm desperately in love with Buster so this just made the evening for me.

Look at that face!

It also features the adorable Kathryn McGuire in one of the most incredible dresses I have ever seen, with a long beaded fringe down the back which trailed as she walked.

It really was a marvelous evening, finished off with a couple of drinks in Wilton’s gorgeous Mahogany bar.  

If you are able to attend any of TLDP events then I really encourage you to do so, they have a couple 

          The mystery of the undead detective?    

A sneak peek at the cover

So, I was idly flicking through a discarded newspaper (the Evening Standard, I know, vile rag but it just happened to be there) in the works kitchen this week when my eye was drawn to the magic word....Poirot.

It seems that this is old news, google-fu suggests it was first released to the press in September 2013, but a new Poirot novel is being written.  HERESY! I hear you say.  Christie died in 1975 and Poirot, the novelist’s leading man, was killed off in his final tale, “Curtain” slightly earlier that same year. 

Worry not I say, as neither Poirot nor Christie are being brutally raised from the grave.  In fact, as part of what seems to be quite the new trend, a more modern crime writer is putting her name to a Poirot tale, which I understand will be sandwiched into the period between 1928 and 1932 where Christie did not set any of her original tales.

Sophie Hannah is a crime writer of good standing and long time fan of Christie, describing herself as “obsessively” devoted.  Her favourite tale is Murder on the Orient Express, which she has named as one of the books she would take to a desert island. 

The book has been commissioned by the Christie Estate and will be published in September this year to commemorate what would have been Agatha’s 125thbirthday. 

I’m thoroughly looking forward to reading it but I am sure a lot of you out there have reservations.  But, in the words of the author “I regard every word Agatha Christie ever wrote almost as a holy text, so I’m not going to be taking any liberties.  He won’t be taking up rollerskating.”

The author and members of the Christie Estate

          The obligatory vintage inspired Winter coat roundup   
Well, Summer is definitely over here in the UK, it has been all torrential rain lately and it will soon be time to dig out those Winter woollens.

My good old stalwart Winter coat, a princess cut number I hunted down in T K Maxx about 5 years ago, seems to be finally looking a bit tired.  I do have a couple of magnificent 30s and 40s coats but they are both too warm and too precious for everyday wear, and so the hunt began for a new everyday coat.  I saw a lot of great options online and thought I’d share them with you.



The "boyfriend" coat is really in this year and I think this is a style that can easily be dressed for a 20s look.  

This Navy wool coat (£210) from Topshop would look splended with a cloche hat or even belted with a scarf.  If you really wanted to go all out a couple of decorative buttons added here or there could amp up it's innate 20s style.  The length is just perfect for the era.

Another boyfriend design, this time feminised by lovely pink mohair fabric.  This model comes from New Look at £64.99 and would look lovely with a vintage style scarf such as this "Greetz from Tiz" number, which is great for a number of eras with its deco design.

I am loving this menswear inspired design from Oasis at £110, the contrast collar and buttons are wonderful and while this is a little short in length for a truly 20s coat it would work well for a mannish style.

My final 20's-esque suggestion is this Phase Eight ombre knit number, again at £110.  It's the length and the shawl collar that does it.  I'd buy this a size bigger to ensure a room fit and team with a repro cloche hat.  


For me at least, the classic 30s coat style is really one of long lengths and big fur collars.  These are always easy to pick up as they are a classic design, but - not being particularly fashionable - they don't tend to come cheap.  John Lewis is the place to go for this sort of style.


This fur collared number from Jaques Vert (£249) comes in a few colours, my favourite being this rich dark blue.  

Again at £249, this number from Precis Petite has a vaguley Russian Military air.

If you happen to have won the lottery you could spend £1,200 - yes - £1,200 on this AMAZING Jaeger cashmere number.  


40s coats were clearly affected by the war, as was most fashion of time, being shorter, neater and more military in design.  The classic 40s coat being the trench, favoured by spies everywhere....

You can find a Trench almost anywhere, I particularly like this one from Joules Maycroft for £129 however, due to the darker tone of the fabric and the wide buckled rather than tie belt.

For a bit of 40's whimsy, this Red Riding Hood number evokes the 40s Skater Style of Hollywood Christmas movies and comes from Collectif at £175

Finally, this J by Jasper Conran coat in wine red crepe - yes - crepe, and with covered buttons is a perfect classic which can work with any 40s look.  currently on sale at only £119.  Thanks to Lori for alerting me to this baby.

In the end, I have plumped for a vintage number.  Purely because, unusually for a coat, it was cheaper than anything I could find on the High Street.  It is currently winging it's merry way across the Atlantic to me.  If it fits, which it arrives, I'll have to take some photos and share.  If it doesn't, I'll be buying that navy Jaques Vert number above.

          Vintage TV: The House of Eliott   

I've been feeling distinctly under the weather the last few days; achey, stuck in bed and miserable.  Proper cup of tea and an old movie while feeling sorry for myself ill.  OK, that's my usual mood, but you know what I mean.  I get sick at about the same time every year, I am sure it has something to do with the suddenly rainy weather making the Hackney miasma more easily transported into the lungs.

As such, I was in desperate need of something pretty to look at.  Ideally something pretty to look at and essentially non taxing.  this was  no time for trying to work out a whodunit so Poirot and miss Lemon would have to wait.  After a scout about the Internet I fixed on The House of Eliott.

The show was broadcast in the early 1990s and I vaguely recall my aunt being a fan at the time.  Written by Dame Eileen Atkins and Jean Marsh (is she not a Dame yet...tsk) - yes - them what wrote the original Upstairs, Downstairs, it had a good enough pedigree to be guaranteed entertainment.  Plus all available online for free courtesy of the BBC.  What luck!

Episode 1, Series 1.

The story hinges around well to do sisters, Beatrice and Evangeline Eliott (Bea and Evie for short), whose overbearing Papa dies and leaves them all but destitute - have squandered his money on the usual foibles.  The ladies have always been interested in fashion and, through a mix of talent, connections and sheer dumb luck they manage to create a successful fashion house - changing the face of London fashion in the process.  Of course there are plenty of twists and turns along the way in the shape of love, death, swindling bankers and even Amber from the Broken Hearts (joke - but really - Grace in series 3 in the absolute spit of that fine modern day fashionista.

The first two series come in at twelve episodes each and the third and final at just 10, though the ending feels inconclusive. It seems the series was pulled due to budgetary issues.  Unsurprising given the clearly expensive wardrobe.

Unexpectedly, it wasn't the classic bead gowns that caught my eye.  Perhaps it was the cold weather outside but I found myself drawn to the amazing wardrobe of 20s coats and cloches on display.  Here are some of my favourites.

Tilly, the classic stalwart working class heroine in a love two tone coat and matching hat.
Bea and Evie.  Bea in a delicious eau de nil number with collar and cuff detail and Evie with a belted jacket with richly embroidered sleeves.

The girls in some fur collared beauties

A bit part character - can't for the life of me remember
her name, in the most crazy fur collared number.

I was also in raptures at the headdresses and scarves on display, and now quite determined to wear more scarves myself.  I tend to only do the classic 40s landgirl thing but some of these are great.

I love Bea's chunky turban style headwrap.

This sort of "diadem"style headband is absolutely stunning.  I'm thinking about making something similar with some seashells and some broken faux pearl necklaces I have laying around.
I only wish I were talented enough to craft something like this, just wonderful

More thick wraps from Bea and pearl headdresses from Evie

A casual scarf look from Evie

Despite the rather unfinished feel of the end of the show I would still thoroughly recommend this series for the fashion alone. The weather is shocking, so stick the kettle on and immerse yourself in beads.

          Update: Egocast - fill your WiFi! (Social Networking)   

Egocast - fill your WiFi! 2.1

Device: iOS Universal
Category: Social Networking
Price: Free, Version: 2.0 -> 2.1 (iTunes)


Egocast allows you to create and manage social group inside WiFi. In egocast network you can make calls, exchange messages, send files and photos. Communicate with friends and meet new people where there is WiFi. Anytime and anywhere: cafe, airport, library, hotel, shop, conference...

Main features:
- Exchange messages
- Sending several files and photos simultaneously
- Audio calls
- Control your contact list with ban function
- Local file browser and storage with share function
- Full traffic end-to-end encryption, AES-128 encryption
- Personal profile settings: profile information, email, web page, skype profile
- Network status
- Import and export personal profile information
- Periodic background synchronization of messages and files, every 10 mins
- Long term network sessions, save history during 24 hours
- Share extension, support image/audio/video content
- Support import files function from other applications
- Automatic receive of image files
- Based on new peer-to-peer Netstream technology

Simple usage:
- Automatic users discovery and building of contact list
- Absolutely free, registration is not required
- Internet connection is not required, just WiFi network
- No need in servers, just download egocast application

Feel free if you have opinion or questions, write your review in the App Store or by email!

What's New

- bug fix

Egocast - fill your WiFi!

          Plasma Vault - Easily Create Encrypted Directories on KDE Desktop   

FOSSmint: Plasma Vault is an open-source encryption solution for KDE Neon with which you can create encrypted folders to contain private files of any format.

          Lessons From the Latino Playbook: Emphasize Family and Love More Than Rights   
Philippine and Hispanic cultures have so much in common.  Heavily influenced by the 16th- and 17th-century culture of Habsburgian Spain of old, the parallels between the two in terms of family life, customs, mores, and of course, Roman Catholic religion, are easily recognizable.

It is because of this commonality that I took notice of something that happened in the U.S. last week.  A coalition of 21 different Hispanic organizations, whose members range from second and third-generation Hispanic-Americans to recent immigrants from Central and South America, announced a joint pro-LGBTQ equality campaign.

The name:  Familia es Familia, or in English, "Family is Family."  Its aim:  to further build support for LGBT equality within the wider Latino community through public education, resources, and engaging the community through social media, and to heighten acceptance of LGBT family members within the Latino community.

While 54% of Latinos currently support marriage equality, and 59% feel that homosexuality should be wholly accepted in society (68% of second-generation Latinos said the same), there is still work to be done to increase those numbers even more.  This is especially true among those who come from very conservative Roman Catholic backgrounds and communities.  Familia es Familia cuts to the heart of the matter in a way that resonates with all Latinos, and by cultural extension, Filipinos as well.

IMO, the Familia es Familia campaign is brilliant.  Traditional Latino Catholic families are tight-knit, protective, and engaged in their community.  Their values, outlook, essence, and guidance all come from the wellspring that is the family.  This is known as "the Catholic family dynamic."  Filipino families are absolutely no different in this regard, and this, to my mind, gives great cause for hope for the future prospects of gay rights and equality in the Philippines.

Familia es Familia  carries a two-pronged message:  1) Your family members are your family members, no matter how they were born or who they fall in love with.  Blood is thicker than water.  And 2) All families are families and are worthy of dignity, support, and respect -- whether they're traditional nuclear, single-parent, or two parents of the same sex.  The campaign appeals to the strong ties of the Latino Catholic family dynamic.  The coalition of Latino organizations recognized this.  They know what they're doing.

In Western cultures, which largely encourage independence of the individual, the issue of LGBT equality has been played almost purely from a rights perspective.  "This group is denied the rights that this group have."  "This person, by virtue of her sexual orientation, is being denied her rights and treated unequally."  That's not cool.  If there's disparity in society, it starts to make us very uncomfortable - especially for Scandinavian social democrats like me.

This is effective to a large degree for Westerners, and in cultures where equality is engrained into us from our toddler years onward.  Hispanics, however, like Filipinos, aren't so big on individualism.  In modern cultures influenced (or should I say dominated) by the antique customs of the so-called "Golden Age of Spain," the family supersedes the individual.  The individual often submits to the family (and to tradition) for the good of the family as a whole, and for the good of the community.  The boat should not be rocked.  If you stand out too much or squawk for individual rights too loudly, you run the risk of being labeled a "me first" character.

Family is more than just the top middle circle.
I think the Filipino LGBTQ community could profit by tapping into the ideals of the Familia es Familia campaign.  Approaching the issue of equality in the Philippines solely from a rights perspective may not be the best route through which to achieve progress.  It works well in a court of law, but maybe not so well in the court of public opinion -- and let's face it, on the issue of LGBT equality, both of those "courts" are hugely important.

The better approach, especially in places with a strong Catholic family dynamic, is an approach emphasizing love rather than rights, i.e. the concept that families -- all families -- are something to be valued.  This resonates with Filipinos; rich and poor, educated and non-educated, religious and non-religious alike.  Shouting "Rights!  Rights!  Give us our rights!" may not resonate quite as well with the average Pinoy or Pinay as saying "We're your family and your friends.  We value families.  We value your families.  So please value our families, too."  The latter strikes a subtler chord; a chord that appeals to peoples' humanity.

Personal stories simply carry more weight than appeals to legal rights, which are often misconstrued as a push for "special rights", and equality proponents in many countries are starting to realize this.  Framing the discussion in legal terms doesn't win over very many hearts and minds.  It doesn't resonate well with the Average Joe on the street, or with lawmakers for that matter.  Emphasizing love, commitment, stability, and family, however, can pack an emotional wallop.  As the Freedom to Marry campaign in the U.S. says:  speak to the heart first, then the head.

In light of this, the Filipino LGBTQ community actually has a unique opportunity to step back and observe the wider picture of the struggle for equality from other countries that have already forged ahead.  Gay rights activists in the Philippines can see what has worked and what hasn't, and tailor fit the different options to create a uniquely Filipino approach that will work best in their own communities.  What worked in my country, which values liberality and fosters personal independence, may not work so well in yours.

From my observation, Familia es Familia could fit the Filipino "Catholic family dynamic" culture like a glove.  Perhaps it's time for a Pamilya ay Pamilya campaign to kick-off in the Philippines.  It certainly couldn't hurt.

»» For those interested in ideas on how to move equality conversations forward in your community, I highly recommend reading this pdf report by Freedom to Marry.  (It is tailored to the U.S., but it has some EXCELLENT concepts that would work equally well in the Philippines, or anywhere else for that matter.)
          Checking if your JRE has the Unlimited-strength Policy Files in place   
To use the included 256-bit encryption algorithms within Java, Oracle Java JDK or JRE requires you to download and replace the US_export_policy.jar and local_policy.jar files under your $JAVA_HOME/jre/lib/security/ directory with a variant of these files called ‘JCE Unlimited Strength Jurisdiction Policy Files’ obtained here. These jars, commonly referred to as the ‘Unlimited JCE files‘, control […]
          Re: hoe verwarm je een etensblik leger   
Beste Lange,

bedankt voor je vraag.
Zo'n blik heet een mestin. Deze kun je op een esbitbrander zetten. Je kunt er zowel eten in klaarmaken als bijv. water koken voor koffiee.d.


Je hebt verschillende soorten voedselpakketten.
-Er zijn blikken met eten (worden tegenwoordig nog maar zelden gebruikt). Deze kon je, afhankelijk van de inhoud, rechtstreeks op een brander zetten of ze in de mestin doen en het daarin koken.

Statistieken : Geplaatst door Verzamelaar • op zo jan 12, 2014 11:16 pm • Reacties 2 • Bekeken 16080

          Baroque Threads: Studies in Immanence and Expressivity   
Introduction to a proposed collection of essays: Seeking to legitimate expressivity in a climate enamored of constructivist and conceptual poetics, I turn to modern and contemporary forms of baroque production in poetry and the visual arts. I examine a variety of intercultural texts, texts that are a mélange of European, African, indigenous and colonial sources. Some are multilingual hybrids. Some have been described as neo-baroque or neo-barroco. Some resist the siren song of global modernism and speak for a people whose identity has been repressed and dismissed as only marginal. Leading figures for my purposes are Nicolás Guillén, José Lezama Lima, and Aimé Césaire. Some of these texts bear traces of surrealism. Other texts that I engage are associated with continental North America: Ezra Pound, William Carlos Williams, and Langston Hughes. Each of these North American authors is multilingual. Each chose a life that engaged multiple cultures and venues. Hughes was both a world traveler and resident of Harlem. The polyphonic Pound notoriously chose exile in Italy, after periods of residency in England and France. Williams, whose first language was Spanish, worked as a pediatric doctor serving the mixed-race poor of Paterson. The work of these North American authors is representative of a modernist aesthetic that is both prior to and a source for the neo-barroco. The over-arching thesis of these studies is that an address to immanence will elucidate the expressivity that animates both modern and contemporary poetry. A secondary unifying purpose is that the Latin American and Caribbean poets that I engage require reading by North Americans who wish to keep abreast of post-colonial and contemporary world poetics. An emergent intercultural poetics will necessarily draw on these sources.

My work as a poet and scholar, like that of many of my peers, is intercultural. I pursue a way of reading in which translation is central. Among the titles that I produced as editor of O.ARS was a volume called Translations: Experiments in Reading. I might argue, reductively, that expressivity is immanent to translation. The translator will always and necessarily color the translation with hints of subjectivity. Similarly the reader of conceptual texts will envisage scenarios that yield some degree of subjective satisfaction.[1]The distance between the uncertainties generated by neo-baroque productions and post-language or post-avant work may be less prominent than some readers assume.

My first love is prosody; musical elements and sonic vistas seduce me. Reading aloud or silently, interiorized voicing follows the curve of the line. Many of the observations that populate my essays derive from a close reading of selected texts. In particular, the neo-barroco offers intricate models of multi-layered and sinuous engagement, perception, and performance. Performance, bearing a relation to but not imitative of traditional cadences, generates a poetry, that in its embrace of orality, eschews established measures that have the force of dictating or constraining the shape of the work, imposing meter or rhyme scheme. At the same time it must be recognized that rigorous formulae derived from conceptual principles can also force language to pour itself into predetermined channels or follow randomly generated rules. At this juncture I am thinking of Oulipo and the works of Jackson Mac Low or my translation of the Old English “Seafarer.”[2]

From a certain angle, “modern” and “baroque” are cognate terms. Think of Galileo, the instrument maker whose telescope extended the range of human perception and whose father was famous for his Baroque violins. Galileo was first among those to reduce the world to experimentally verified computations. The information economy began with his calculations. Unlike revivals of tribal arts designed to awaken alienated emotions, as may be found in Picasso’s use of African materials, the neo-barroco offers intricate models of multi-layered and sinuous engagement, perception and performance. Developments in response to modernism or to modernity itself (as opposed to the theory) and coeval with both modernity’s economic benefits and its alienating effects are prior to and enabling of the poetry that I have chosen to write about.

Here I offer a purely preliminary but theoretical construct. My purpose is to redeem the word “immanent” for use in a poetics of inquiry. Imagine that each known language exists on a plane of transcendent immediacy: French, Spanish, English, Mandarin, etc. These virtual constructs have empirical reflections subject to change. Virtual or immanent planes are independent of such empirical reflections. The reflections themselves are clouds with energies and integrities derived from physical processes unique to their plane of actualization, if only the weather. To posit planetary cooling would not take us too far afield. It is to superpose another layer. To illustrate my explication of the distinction between immanent and empirical: readers of any particular written language are able to recognize a pure virtuality, which is wholly independent of normative practice. Grammar and phonology are immanent to speech or speaking, just as prosody is immanent to enunciation. Fernand de Saussure made a similar distinction between langueand parole. Further, in the model that I propose, as the physically embodied planes identified with each language come into contact with one another, sliding, rupture, penetration, and folding occur. These inter-lingual or trans-lingual contact zones are the sites of language transformation and the sites of poetry production. They are also sites of untranslatability. Emily Apter in Against World Literature: On the Politics of Untranslatability explores the role of the untranslatable in the history of philosophy. She writes, Alain Badiou’s “elevation of univocity over equivocation, of idea over language, of transparency over opacity, of transmission over hermeneutics, results in the subordination of translation to philosophy.”[3]An encrypted poetics: language comes before translation, and translation enables language. The matter is beyond explanation.

As a consequence, then, of having been captivated by inevitable aporias of untranslatability, I read with attention to multilingual connotations, negotiating expressions that mean differently in different languages, so-called “false friends.” Examples: Spanish, “vigilante” [watcher] means something different from English “vigilante.” Mistranslations have an inspirational value to the poet who stumbles upon false etymologies, constructing realms or reams or Rheims of cathedrals on shaky linguistic ground. Robert Duncan and Ronald Johnson did this.[4]More in keeping with my theme are passages in which multilingual connotations, drawing from a variety of cultural realms, convey something like a translucent sheen that is to some degree animate and felt as a breath within the lines of a poem. In Jay Wright’s The Presentable Art of Reading Absence, I am compelled by its different languages and levels of allusion.[5]
Only here
can the rekindled silence
            one and one,
and over again,
            to reach the limits of my craft,
the ambiguous shape of a fugitive force.
                        You now:
                        aggrey bead
                        Akua ba
                        a Kanaga mask (51).
Asanti vocabulary merges with the Yoruba of Cuban Santería and the cante jondo of Federico Garcia Lorca,
¡O ritmo de semillas secas!
That would stir the salutary
orientation of a crystal rug,
a kente cloth and a dancing kilt. (55)
The first line immediately above is from Lorca’s “Son de negros en Cuba.” Wright has lived in the various lands from which he has borrowed the languages of the poem, Ghana, Germany and Scotland, as well as his native New Mexico. His is an American Baroque. At the limits of his craft he seeks absence. He walks away. The “fugitive force” to which he refers in the first selection above, is a plane of immanence, a plane of melancholy and loss. His objective is to cross from the here and now of meditation and pilgrimage into silence.

If immanence is independent of empirical subjects, then "composition” is “performance” (a processural actualization not adhering to a predetermined paradigm). One is left at the threshold of insubstantial realms howsoever transcendence may be postulated.  In the case of poetry, the "language" employed has both a virtual and an expressivist dimension. To elaborate further: I point to “Immanent Occasions,” a blog where I post thoughts on “immanence” like those that I am sharing now.[6]Suddenly it appears that the truly problematic term in the phrase “immanent occasions” may be “occasions,” not “immanent.” I have so far already been flirting with a concept of immanence derived from the work of Giles Deleuze and Félix Guattari. Let me clarify that before turning to “occasions.”

In a brief essay on immanence Deleuze writes, “The transcendent is not the transcendental. Were it not for consciousness, the transcendental field would be defined as a pure plane of immanence.”[7]The distinction between “transcendental” and “transcendent” needs to be dwelt upon. Transcendental entities be they “souls,” “gods” or mathematical expressions, clutter the mind with multiple forms of imputed consciousness, useful perhaps to a sophist. For empirical purposes, I prefer Nathaniel Mackey’s gnosticism. In Anuncio’s Last Love Song, Mackey refers to “paper” as “wood’s pressed immanence.”[8] A plane of immanence is always virtual, Deleuze writes, and then he continues, “Absolute immanence is in itself; it is not in something, or to something: it does not depend on an object or belong to a subject.” Immanence has a life and its life is found not in moments that happen to collide or build upon one another. It exists between moments and “offers the immensity of an empty space where one sees the event yet to come and already happened, in the absolute of an immediate consciousness” (29). “Paper” in Mackey’s poem is subsequent to virtual rings that circle like halos and are likened to pearls, a gnostic image for the soul. His lines require context:
                                    Self’s lyric digest. Circling round our
                        heads went rings of paper, wood’s pressed
                                    immanence, pearls we cut our teeth on,
                                    string broken, let’s go …
Comments on the unwinding of Mackey’s baroque syntax, notes sustained for many bars on a  singular horn, further implicates immanence as transcendent to the page, an extended modality beyond reading’s suggestions.

“Occasions,” as I employ the term in the title of my blog, exist between “moments” of perception. Here are glimpses of virtualities that are not time-bound. In that usage of “occasions,” I intend to indicate a plane of consistency populated by multiple moments of perception. Another source for this stance is Robert Creeley who writes of “glimmers” on the edge of consciousness. The immanent plane, is decidedly only one of many plateaus, in this case a liminal presence, existing as an “in-between,” like the in-between that exists when a layer of paint forms a virtual machine with a layer of canvas, one of Deleuze’s many machinic assemblages. The relation between the two layers: the painting and the canvas, is not one of dependency or contact, but a perception of a transcendent value that is neither subject to nor dependent on the material presence of either layer. The distributed force produces a singularity.

When my daughter was five she had a long-distance telephone conversation with an eight-year-old Inupiaq girl who lived then in Point Hope Alaska. The subject, Disneyland. Their conversation gave glimpses of a plane of immanence, manifested as giggles and producing a sensation of uncontaminated joy. Apparently the immanent does not depend on pragmatic or empirical considerations. How does one get to Disneyland? Their bliss was such a singularity as understood by Deleuze.[9] A singularity is a virtual construct that may be contrasted with individuation or the coming into self-understanding of an individual. A singularity has transcendent properties, overarching qualities that form a plane of consistency, unlinked or de-linked from historical vectors.

Deleuze concludes his meditation on immanence with this analogy: as is the case with small children, immanence is “pure power and even bliss” (30). It is distinct from individuation, which is a result of empirical experience. It exists only in those moments when the plane of immanence opens upon and is the equivalent of a transcendental field. A virtual field of this order is neither momentary as an epiphany nor eternal. It is and is separate or independent from consciousness. The understanding presented here allows a de-individualized display of affect and that display is neither prior to nor after language.  

Displays of affect often reside in the music of intercultural texts, where the resources of multiple languages and their varied imaginaries are in play, even when most incommensurable. The virtual may lie in the time signature while the empirical is a matter of performance. Other transformations of an intercultural order follow upon contact between different peoples, seeding the inception of new or emergent subjectivities. Nations or nationalities too, after the injustice of slavery, for instance, can be said to produce emergent subjectivities that can be likened to intercultural singularities. Identities such as American, Cuban, or Ojibway have intercultural or translingual characteristics due to the varieties of ways in which different people interact with one another and influence one another. The immanent does not depend on pragmatic or empirical factors. A perception of emergent subjectivity constitutes what is for Deleuze a singularity.[10]

A singularity is a virtual construct that may be contrasted with individuation or the coming into self-understanding of an individual. A singularity has immanent properties, overarching qualities that form a plane of consistency, unlinked or de-linked from historical vectors. A community possessing a mindfulness composed of identifiable characteristics is such a singularity. Mestizo or criollo (creole) might indicate broad characteristics applicable to mixed race communities. Cubanidad is a more narrowly distinctive quality associated with an identifiable population. Such singularities, almost instinctive in their force, can form a cross-weave with other singularities or planes of immanence. There are mestizo populations of an African European origin who are Cubans. And there are also criollo populations that owe their origins to intercultural marriages but whose African elements have been suppressed as a result of adapting to largely European values. These divisions do not necessarily align with skin color. An economic or class-based association is likely to be more determinative than skin color in such circumstances. I refer here to the Caribbean, not continental North America, where racism seems still to be virulent.[11]For North American tourists, the intercultural kaleidoscope of differently mixed peoples in the Caribbean is only a footnote to an island vacation. The work of Nicholás Guillén and that of José Lezama Lima is indicative of very different singularities. Each poet is associated with different constructs of creolité in which the weight of Africanicity varies. In the case of Williams an undefinable creole singularity haunts his writing and is sometimes glimpsed as embodied grotesqueries. In the course of these studies I use “subjectivity” to denominate the empirical or performative aspect that is tangent to or parallel with the Deleuzian concept of singularity. This notion of vectors along which such forces travel is of course, Spinozistic. There’s no god but the good.

The works under discussion in these essays enact or perform subjectivity differently. I understand “subjectivity” as Immanuel Kant and Jean-François Lyotard have, as the site of aesthetic judgments, not a discursive, argumentative or ego-involved intelligence. Deleuze’s concept of folded forms includes an analysis of the direction and duration of flow. In baroque painting light becomes fluid. Watery and mirrored surfaces refract and bend perception. The transformative nature of perception is central to my reading of both modernist and postmodernist work from the Americas. The neo-baroque represents a historical shift valuing music over concept, irony over syllogism.

My emphasis on expressivity is a supplement to the main stream of modernist studies where a history of image-based innovations yields to a constructivist impulse, designed to free the work of the artist’s fingerprints. The porcelain surface of Marcel Duchamp’s Fountain is emblematic. James Joyce, in his Portrait of the Artist as a Young Man, at least presents the creator as paring his fingernails. Irony is the modernist mode of expression par excellence. Deadpan is valued over affect. That history, shunning expressivist aesthetics, moves from a series of avant-garde innovations (Pound or Picasso) through various forms of constructivism to a language-centered or a post-avant aesthetic that identifies itself as purely conceptual. The centrality of poetic methods that descend from the modernist works of Pound and Williams is in any case self-evident but requires interrogation, especially in relation to expressivist values that exist in critical tension with the pure products of the imagination.[12]  What role has prosody played in this history? My translations of marginally recognized modernists such as Yvan Goll or Blaise Cendrars seeks to fold  their collage-based and surrealist works within the larger mantel of expressivity.

Machines made out of words, reputedly, do not have souls. For Deleuze and Guattari, machinic couplings or assemblages are conduits for lines of force, as if inhabited. In my reading machines allow blurred or even etherealized perceptions of immanent constructs.[13] Modernism as an identifiable style of composition began with an embrace of futuristic machines. For Wyndham Lewis, the soul is an elaborate artifice, “Deadness is the first condition of art,” he wrote in Time and the Western Man.[14] On the hook of a similar enthusiasm, Williams in his introduction to The Wedge, proclaimed that poems are machines made of words. Can such assertions find a balancing point, or are they purely opposed to expressivity? Gertrude Stein wrote that souls do not interest him, meaning Picasso. Dada in its anti-art posture also, often builds abstract machines, Tzara and Picabia, especially. Sex machines. Alternative machines with diagrammatic parts. Machines populate the expressionistic landscape of Metropolis, factory labor producing drones even as for entertainment purposes a robotic Maria emerges from the oyster shell, sporting a lunar tiara. Do not Jean Tinguely’s animate machines have souls?

“Modernization,” using the term to signify an unavoidable trope and history, has an alienating relation to expressivity and a troubling history with respect to labor, the work force often being an intercultural as well as an exploited mass. “Modernism” has been nominally understood in relation to worthy goals for productivity, efficiency and scale, and therefore envied in newly established postcolonial societies. Poets and anthropologists of the Caribbean have also been compelled to address a history of production associated with slavery. In an account that I find corrosive, the cane factory for Fernando Ortiz is a site of purification as the molasses produced by black people in the fields is transformed into a purely white, crystalline sugar, providing a model for race and the emergence of mixed race culture where black and white, in their mutually shared cubanidad worked to the same economic end. More starkly, in keeping with the reality of economic slavery, a father in a surreptitiously stolen balloon flies over a cane field in Haiti and jumps from the basket to his death while his son on the ground below channels Boukman hypnotically. Edwige Dantecat’s story “A Wall of Fire Rising” (cited here from Krick? Krack!) captures the despair of postcolonial economic slavery, citing the bewilderment of contemporary surviving children who mouth incomprehensible mantras promising freedom.

War machines offer differently inflected intercultural perspectives. Dada willingly constructed alternative machines as it engaged in political and antiwar protest. During the 1920s, works by El Lissitsky and Malevich, promoting art for the sake of revolution in a newly industrializing Russia, hung alongside socially disruptive works like those of Kurt Schwitters or Hannah Hoch, Hoch’s collages especially illustrating transformative, multicultural affinities. Following such endearing chaos, as Dada provides, with its performative energies of a deeply expressivist order, it remained to Surrealism to redeem subjective affinities in the realm of poetry, freeing rather than further erasing affect. The influence of surrealism on the art of both Aimé Césaire and José Lezama Lima testifies, in each case very differently, to expressivist urgencies that open new language channels and possibilities of “making it new.” The archaic and the political are two sides of a coin, not only for Pound, who used the phrase in his Cantos but also for modern and contemporary poets in search of coherence, howsoever impossible of attainment that goal may be.

Machines are not themselves necessarily mechanical They are constructs that allow different modes of conjunction or continuity between parts of different orders. My polarities of the expressivist and the constructivist may themselves be only a word machine, generating an oscillating force field, designed to bring forward a new angle of vision.[15]  An expressivist work, engaged as it is with subjectivity, often displays the most energetic aspects of baroque forms, but expressivism doesn’t rule out the practices of direct statement. Langston Hughes, with his fluency in several languages, is perhaps the most intercultural North American poet of his time, having a wide influence in Latin America because of the many translations of his work into Spanish. The work of Jay Wright has a similar intercultural balance and displays more baroque properties than does Hughes’s. His work most nearly incorporates the range of inquiry that I pursue in this collection.

In their individual ways, Williams and Hughes contributed to the development of a “new world poetics,” a sadly unacknowledged brotherhood. Wiiliams’s poetics is profoundly intercultural, in Williams’s case incorporating his Caribbean heritage and speaking to projects like his In the American Grain, a study that draws on Spanish and French, as well as English sources. His incorporation of that material into his poetry and his translations from Spanish speak to compositional practices that are intercultural. Lyrics like “Danse Russe” respond with imaginal exuberance to grotesque reflections in a mirror. There are dwarfs and grotesqueries in Paterson similar to those that populate the Spanish Baroque. Hughes’s autobiography too is multicultural beginning with long residences in Mexico as a young man, followed by travels as a sailor and later as a poet invited to visit Russia and then as reporter for the Baltimore African American in Spain. As a result of visits to Cuba and Spain he took a particular lifelong interest in the works of Guillén and Jacques Roumain. He translated poems and plays by Federico Garcia Lorca, a figure of deep interest to Williams also.

Nonetheless, the proposed volume is not a survey of literary history. It is a collection of essays. Often I incorporate sideways leaps into art history. Henri Matisse, Wilfredo Lam, Francis Bacon, Robert Rauschenberg, and Ana Mendieta, for instance. Each uniquely registers the expressivist values that are central to my thought. I am especially responsive to transcultural and expressivist poetics on several fronts. I embrace the poetics of a polyphonic Pound, as well as the tangled webs of syntax found in the poets of the  Latin American neo-barroco: Eduardo Milan, José Kozer, and Roberto Echavarren.

[1] In his essay, “Migratory Meaning,” Ron Silliman employs’ Charles Fillmore’s meta-syntactical concept of envisagement in order to discuss the different degrees o coherence and disjuncture with which a reader responds to “shifts” in the possible meaning of a passage. He quotes Fillmore’s definition of envisagement, “some coherent ‘image’ or understanding of the state of affairs that exist in the set of possible worlds compatible with the language of the text” The New Sentence (NY: Roof, 1987): 112-120.
[2] The Cranberry Island Series (Loveland OH: Dos Madres, 2012): 24-25.
[3] Against World Literature: On the Politics of Untranslatability (London and Brooklyn: Verso, 2013): 23.

[4]Duncan found poetic resources in relating ‘verse’ to “ploughing,” tracing the etymology of each word back to Greek forms. “It is a fanciful etymology, “verse” shares a root with “ploughing.” To demonstrate that, once words cease to be conventional, customary of taken for granted in their meanings, all things are set into motion, in the figure of ploughing, we see that prose and verse are two necessary movements in the one operation of writing. That here what we call ploughing of the field we also call poetry or our own operations in language. Writing that knows in every phase what it is doing. Forward and back, prose and verse, the shuttle flies in the loom.” The H. D. Book, ed. Michael Boughn and Victor Coleman (Berkeley: U Cal 2011): 449-450. I hear such etymologies at play in these lines from Johnson’s “Ark 30,” “—Elysian elision,” ARK  (Chicago: Flood Editions, 2013):85.

[5]Champagne and London: Dalkey Archive Press, 2008.

[6]Following her recent death, I turned to the work of C. D. Wright, and found these sentences or paragraphs, where it would seem that the post-human in its minute actions of sampling and engineering dna-like substances exposes briefly what Giles Deleuze calls a plane of pure immanence (see below), “there’s a poet in the desert who tweezes the glittering particulars of the species from mounds of dead cells and arranges them along the hairline fractures of our souls / (if there are such immanences” Cooling Time: An American Poetry Vigil (Townsend, WA: Copper Canyon, 2005): 25.

[7] Pure Immanence: Essays on a Life, Tr. Anne Boyman (NY: Zone, 2012): 26. A sub-textual meditation on “immanence” will be found in the notes to this introduction.

[8]Durham NC: A Three Count Pour Chapbook, 2013.
[9]The concept of a “singularity” is central to the “Objectivist” strand of North American poetry, for instance, that of George Oppen, who seems to have posited a relationship between “singularity” and “numerousness” that may be similar to the immanent and empirical planes of Deleuze’s thought. Both Lyn Hejinian herself and Peter Nichols in comments on Hejinian’s work argue that the concept of “humanity” is something both confirmed and lost in a momentary glimmer associated with “the shipwreck” of the singular. Hejinian holds that “this is not a poetry of single moments, however—Oppen’s singularities may be impenetrable but they are not transcendent” qtd. Nichols, “Numerousness and its Discontents: George Oppen and Lyn Hejinian” Aerial  (10): 139. Wright’s The Presentable Art of Reading Absence opens and closes with a use of the term “singularity” that is cognate with Deleuze’s use. Deleuze’s mapping of plateaus untangles a confused terminology and puts “immanence” to serviceable work.
[10]The concept of a “singularity” is central to the “Objectivist” strand of North American poetry, for instance, that of George Oppen, who seems to have posited a relationship between “singularity” and “numerousness” that may be similar to the transcendental and empirical planes of Deleuze’s thought. Both Lyn Hejinian and Peter Nichols in comments on Hejinian’s work argue that the concept of “humanity” is something both confirmed and lost in a momentary glimmer associated with “the shipwreck” of the singular. Hejinian holds that “this is not a poetry of single moments, however—Oppen’s singularities may be impenetrable but they are not transcendent” qtd. Nichols, “Numerousness and its Discontents: George Oppen and Lyn Hejinian” Aerial  (10): 139. Wright’s The presentable Art of Reading Absence opens and closes with a use of the term “singularity” that is cognate with Deleuze’s use. Deleuze’s mapping of plateaus untangles a confused terminology and puts “transcendental” to serviceable work.
[11]At the time of this writing, Donald Trump, with his anti-immigrant harangue and Islamophobia, has ripped the mask off the face of color-blind tolerance.
[12]Charles Altieri makes a similar use of the term “expressivist.” His use adumbrates my use of forclusion in these pages. “… an aesthetic approach to values requires an expressivist framework for making our fundamental assumptions. This case depends on Kant for its specific framing of the aesthetic because Kant is still our best exemplar for first specifying the limitations of reason and then transforming that negative case into a psychology that opens new ways of thinking about values,” “Towards an Expressivist Theory of the affects,” (Altieri Manuscripts, 2005): 15, http://socrates.berkeley.edu/~altieri/manuscripts/affects_2005.pdf 

[13]Barrett Watten in a discussion of Lyn Hejinian’s  A Border Comedy makes the claim that “The person of the poem is not given but constructed” (Aerial/Edge 10 [2016]): 252. This claim is consonant with the constructivist position Watten generally advocates in such books as Total Syntax. The logic here implies that there is no exterior position for either author or reader outside of the highly discontinuous unfolding of the poem, and yet the notion of such a position is immanent to the construction of the poem. The footnotes to this introduction so far are intended as a commentary on North American “language poetry,” in order to construct a plane adjacent or parallel to the intercultural poetics that I am elaborating, above the line, as it were.

[14] Time and the Western Man (Boston: Beacon: 1957): 279.
[15]Deleuze illustrates my sense of “constructivism,” when he discusses multiplicities in relation to the “field of Immanence.” He argues that “Setting out a plane of immanence, tracing out a field of immanence, is something that all the authors I have worked with have done (even Kant—by denouncing any transcendent application of the syntheses of the imagination …) Abstractions explain nothing, they themselves have to be explained: there are no such things as universals, there’s nothing transcendent, no Unity, subject (or object), Reason: there are only processes, sometimes unifying subjectifying, rationalizing, but just processes all the same. These processes are at work in concrete “multiplicities,” multiplicity is the real element in which things happen. It’s multiplicities that fill the field of immanence, rather as tribes fill the desert without it ceasing to be a desert.” “On Philosophy,” in Negotiations, 1972-1990 tr. Martin Joughin (NY: Columbia, 1990): 145-46. See also p. 3 above where Deleuze’s use of “transcendent” and “transcendental” are discussed. 

          Reading Deleuze on "Immanence"   
From Emily Apter, Against World Literature: On the Politics of Untranslatability: Badiou’s “elevation of univocity over equivocation, of idea over language, of transparency over opacity, of transmission over hermeneutics, results in the subordination of translation to philosophy” (23). I offer an encrypted poetics: language comes before translation, and translation enables language. The matter is beyond explanation.

"Translation” is a “performance” and "language" perhaps lies on a coherent plane belonging to a different or virtual dimension. 

Now to turn to “immanence.” The title of blog where I post thoughts like the above is “immanent occasions.” The problematic term here is “occasions,” not “immanence.” I seek a way that does not threaten my view of the relation between performance and a plane where something radiant, perhaps melancholic, lingers.

In a brief essay Giles Deleuze writes, “The transcendent is not the transcendental. Were it not for consciousness, the transcendental field would be defined as a pure plane of immanence” (26). Ideas about transcendental entities be they “souls,” “gods” or mathematical expressions, clutter the mind with multiple forms of consciousness, usefully perhaps for empirical purposes. “Clutter” is my word, not Deleuze’s. The previous sentence is my reading of Deleuze’s text. A plane of immanence is always virtual, he writes and he continues, “Absolute immanence is in itself; it is not in something, or to something: it does not depend on an object or belong to a subject.” Immanence has a life and its life is found not in moments that happen to collide or build upon one another. It exists between moments and “offers the immensity of an empty space where one sees the event yet to come and already happened, in the absolute of an immediate consciousness” (29). 

Occasions, as I employ the term in the plural, exist between “moments” of perception. In that usage I meant to indicate a plane of consistency populated by multiple moments. This plane, both virtual and liminal, is decidedly one of many plateaus, existing as an “in- between,” like the between that exists when a layer of paint forms a virtual machine with a layer of canvas. If I follow Deleuze, and I love how his words invert the meanings of many ordinary terms, then the relation between the two layers of the painting is not one of dependency or contact, but a perception of a transcendental value that is neither subject to nor dependent on the material presence of either layer. 

Deleuze concludes his mediation of Immanence with this analogy: as is the case with small children, immanence is “pure power and even bliss” (30). It is distinct from individuation which is a result of empirical experience, it exist only in those moments when the plane of immanence opens upon and is the equivalent of a transcendental field. A virtual field of this order is neither momentary as an epiphany nor eternal. It is and is separate or independent from consciousness. The understanding of the terms presented here allows a de-individualized display of affect and that display is neither prior to nor after language. (Pure Immanence: Essays on a Life, Tr. Anne Boyman, NY: Zone, 2012).

Don Wellman, 2.12.16

          Gender and the Poetry of Roberto Echavarren   
Gender and the Poetry of Roberto Echavarren

Is there a creature for whom gender is not a transformative conundrum? Consider the adolescent who wishes never to grow up. Many harbor a secret Peter Pan. Wendy too? Still the age of polymorphic bliss may prove to have been an adult projection. Peter, after all, is circumscribed by certain male attributes, his attraction to sword play and feats of prowess that excite other boys. Still, like any eight-year old, he is sexless. In performance he is often she flying on guywires over the arena. When did the use of weapons become gendered? Kristeva writes about this somewhere. Is Joan of Arc a transgender figure or a girl who saw herself as unconstrained by gender?

Roberto Echavarren, is absorbed by images that originate in the celebrated androgyny of the 70s. He’s in love with boys who are girls. He has written of “we, men by definition / but not from taste or comportment” (“Inquest” in El expreso entre el sueño y la vigilia, Montevideo 2009, my translation). These men refuse sexual assignment at the level of genitalia and stage androgynous performances, Jim Harrison or David Bowie. The tribal and Dionysian excesses of the 70s stimulated the ambiguities of my own sexuality. Yet no one will doubt my gender, even as I beg to suck the cock of the golden boy of my dreams, glorious abjection!

I asked a poet friend, younger than myself, about the cis / transsexual divide. I speculate now that to aspire to realize a gender identification, transsexual-male or transsexual female, innate as each position maybe, is to aspire to a set of restraints. For some it is to fetishize the hemline or the breasts, for others a ghost penis or an inverted vagina are sacred and esteemed.  At the level of sexuality I get it. Glorious release of stifled inhibitions! At the level of gender I am suspicious. Gendered norms homogenize diversity and censor the individual. This is an argument often repeated in the essays of Echavarren’s Fuera de genero. This was the lesson of my feminist and anti-masculinist apprenticeship upon attaining adulthood. I must ask is there a gender free reality for anyone given materialistic conditions and habits of consumption? Bern Porter at my age (70 or so) wore pantyhose as a practical necessity for coping with the artic winds of coastal Maine. He had floppy breasts like Tiresias. Wrap me in my shawl, for love’s sake! I honor the hedonism of the 70s and the paranoia a trans-woman may feel regarding her hemline. Gender remains to me personally a matter of performance and rules. Maddeningly, nonetheless, within the constructs of my anthropology, on carnival nights, there are no rules.

Compulsions of a private and personal order have led me to make translations of Echavarren’s passionate, surreal, and multivalent work, each level caught in a species of frottage, planes that slide over other planes, liquids that ooze among planes of differing consistencies. Infiltrations and plasticities that affect performance and cherish liminalities. This the seedbed of a wildly vegetative baroque sensibility, a species of inundation and physical contortion at the heart of his poetry, characteristic also of the work of other Latin, Neo-baroque poets.

Inspired then to imagine a difficult liminality, an in-between marked by compromise and bizarre, even demoniacal transgressions of corporeal space, I turn to images from carnival, perhaps the underlying plenum of these lines from, “Inquest.”

The kerchief that you liked inside your dress:
we, men by definition
but not from taste or comportment,
held up by a grand throne of air
that collapses each minute,
equal by definition, but undefined,
we hold up the grand throne of air
before it collapses.
The throne depends on what you decide, or accede to.

The horses go down the empty street.
It’s early morning and I wake up.
Some birds begin the samba, batucada,
a wreathe of whistles
ringlets like leaves.
The grand throne is here
but within the hour that peels the chirping
there’s nothing.
The hour is here and afterwards nothing:
insistent jeering of doves
and rapid wings, unexpected.

We are other by definition
and the state in which we find ourselves
is neither good nor bad.

A carnival float traverses an avenue in my mind, floating on waves of intoxication and music. The troupe dances in uniforms, breastplates and thigh-high plastic boots, with the Roman cingulum covering the genitals. The “batucada” is insistent, a highly percussive form of samba, played by an ensemble of percussion instruments. An example is "El Matador" from the Argentine band Los Fabulosos Cadillacs. The rhythm is inspired by the Samba-reggae style from Bahia, Brazil, home of ritual candomblé. The track contains choral shouting with some qualities of flamenco. Encrypted multicultural constructs, the development is condensed and sparsely rendered. This complex referentiality reminds me that multiculturalism need not be an Anglo-centric or Euro-centric cultural construct. When the music stops, I hear the nothing of morning, littered streets. Imagined thrones have collapsed and the street must be swept. I hear pigeons, “jeering.” “The hour is here and afterwards nothing: / insistent jeering of doves / and rapid wings, unexpected,” a return to quotidian reality after the excess of carnival and its heady release and renewal. That’s how Victor Turner reads Carnival. Speaking of performativity, following Turner, Richard Schechner claims that “Once bits are freed from their attachment to larger schemes of action, they can be rearranged—almost as the frames of a film being edited are rearranged to make new actions” (Schechner, By Means of Performance, Cambridge 1990: 41). In Echavarren’s poetry these frames or actions represent only themselves, becoming moments and images, inversions of liminality, invested with transgendered intimacies and celebration. The stream of allusions troubles the surface, neutralizing gendered codes while celebrating phallic and androgynous excess. Call it bacchanalian. I’m the paunchy melancholic in the corner. Silenus, John Falstaff.

Donald Wellman

          Brute Force: Cracking the Data Encryption Standard   

          Update: sipphone (Utilities)   

sipphone 1.2.1

Device: iOS iPhone
Category: Utilities
Price: Free, Version: 1.2.0 -> 1.2.1 (iTunes)


sip:phone is a Unified Communication Client brought to you by Sipwise GmbH, the open source soft-switch vendor.

sip:phone requires an existing account on any Sipwise-based system (e.g. a Sipwise sip:provider CE, sip:provider PRO or sip:carrier system on version 3.x or higher) and does NOT provide a VoIP service on its own.

• Secure VoIP softphone for voice, presence and instant messaging.
• Auto-Discovery of contacts in your address book.
• Encrypted SIP and XMPP communication for secure calls and messaging.
• Recent Calls List
• Recent Chat List
• Avatar support in Chat and Contact List
• Put calls on Mute and Speaker Phone
• DNS SRV Support for SIP and XMPP
• DTMF Support for operating voice menus an auto attendants

Some mobile network operators may prohibit or restrict the use of VoIP functionality over their network and may also impose additional fees, or other charges in connection with VoIP. You agree to learn and abide by your cellular carrier's network restrictions. Sipwise GmbH will not be held liable for any charges, fees or liability imposed by your carrier for use of VoIP over Mobile/Cellular Data.

The sip:phone application delivers calls on a best-effort basis to the service you are signed up with. As a consequence, the sip:phone application is not intended, designed, or fit for placing, carrying or supporting Emergency Calls. Sipwise GmbH will not be liable for any costs or damages arising either directly or indirectly from the use of the software for Emergency Calls. Using sip:phone as a default dialer may interfere with dialing emergency services.

What's New

Small bug fix.


          (USA-FL-Tampa) Network Admin   
Supports a Windows Active Directory infrastructure including all ancillary services such as: DNS, DHCP, RRAS, Certificates, Clustering, DFS/DFS-R, Group Policies, Share and Storage Management, IIS (6 – 8.5), and IPSec Performs MS Exchange administration versions 2013 through 2016 Performs MS SQL Server administration versions 2008 through 2016 Performs MS server and client operating system administration Performs MS SharePoint administration versions 2010 through 2013 Performs network administration including but not limited to IP subnetting, IP Routing and smart switches Administers infrastructure security including hardening servers, traffic encryption, switch/router hardening, Advanced Next Gen Application Layer Firewalls and antivirus/anti-malware Monitors backup, failover and disaster recovery implementations for servers and networking hardware Performs workstation image management Administers IP Telephony/Phone system Administration Provides Help Desk Support to users throughout the organization **Technology doesn't change the world. People do.** As a technology staffing firm, we can't think of a more fitting mantra. We're extreme believers in technology and the incredible things it can do. But we know that behind every smart piece of software, every powerful processor, and every brilliant line of code is an even more brilliant person. **Leader among IT staffing agencies** The intersection of technology and people — it's where we live. Backed by more than 65 years of experience, Robert Half Technology is a leader among IT staffing agencies. Whether you're looking to hire experienced technology talent or find the best technology jobs, we are your IT expert to call. We understand not only the art of matching people, but also the science of technology. We use a proprietary matching tool that helps our staffing professionals connect just the right person to just the right job. And our network of industry connections and strategic partners remains unmatched. Apply for this job now or contact our branch office at 888.674.2094 to learn more about this position. All applicants applying for U.S. job openings must be authorized to work in the United States. All applicants applying for Canadian job openings must be authorized to work in Canada. © 2017 Robert Half Technology. An Equal Opportunity Employer M/F/Disability/Veterans. By clicking 'Apply Now' you are agreeing to Robert Half Terms of Use. *Req ID:* 01070-9500630115 *Functional Role:* Account Executive/Staffing Manager *Country:* USA *State:* FL *City:* Tampa *Postal Code:* 32765 *Compensation:* $50,000.00 to $65,000.00 per year *Requirements:* Additional Technical Skills: Familiarity with MS deployment tools including Windows AIK, DISM and PXE Strong PowerShell scripting skills Strong in MS Office and Google's G-Suite Cisco, Fortinet, and HP Procurve experience highly desired Shoretel experience a strong plus Experience with AWS and MS Azure desired Oh And You'll Need… 5+ years experience working as a network administrator in a medium/large enterprise environment (gotta know your stuff) Excellent interpersonal, oral and written communication skills (gotta be nice) Excellent attention to detail while balancing several concurrent projects (gotta juggle, gotta dance) The ability to handle challenging situations and respond to unplanned occurrences outside of core business hours (can't crack under pressure) Finally, you must be smart, motivated, flexible, fearless in the face of new technologies, and eager to learn and grow.
          (USA-FL-Tampa) IT Security Analyst 4   
Executes security controls to prevent hackers from infiltrating company information or jeopardizing e-commerce programs. Researches attempted efforts to compromise security protocols. Maintains security systems for routers and switches. Administers security policies to control access to systems. Maintains the company s firewall. Uses applicable encryption methods. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information. Leading contributor individually and as a team member, providing direction and mentoring to others. Work is non-routine and very complex, involving the application of advanced technical/business skills in area of specialization. Prefer 8 years relevant experience and BA/BS degree. *Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans status or any other characteristic protected by law.* Job Description: Cloud Security Risk ManagementAnalyst Problem Statement: Public cloud needsto begin cataloging and managing risk and mitigation tasks and currently lacksthe capacity to do so effectively We need anend-to-end process to manage security architecture & engineering projects,tasks, and technology debt remediation Minimaldocumentation exists creating human information silos Regulatorycompliance requires documented standard operating procedures, cloud standards,and corporate policies - as well as evidence that Oracle Cloud adheres to each. This individual will: Manage securityrisks, issues, and work end-to-end through the architecture and engineeringworkflow. Improve cloudsecurity governance by translating security operations information intoconsumable security content. Build and improveteam processes and workflow to maximize efficiency and productivity Understand at both atechnical and business level Oracle Cloud security practices. Act as thepoint-of-contact for Oracle Cloud security inquiries. Understand theOracle Cloud regulatory compliance posture and assist with any assets requiredto satisfy compliance requirements. Assist with OracleCloud security reviews. The individual willbe focused on serving other teams inside the Oracle Cloud security community byproviding insight, expertise, and content. As the role matures, the candidateis expected to become a key partner in the overall Oracle Cloud security lifecycle The ideal candidatehas the following skills: o Strong cloud computing and/orinformation security background o Experience operating, designing,and/or documenting complex public and/or private network structures o Exceptional written & oralcommunication skills o Technical documentation experience o Success at partnering with remoteglobal team members o Comfortable engaging technical ITresources regarding technical subject matter This position livesin the Oracle Cloud Architecture and Engineering team. This team handles cloudassets inventory and approvals, cloud security standards, corporate reviewprocess guidance and consulting, and general corporate compliance questions andprocesses. **Job:** **Information Technology* **Organization:** **Oracle* **Title:** *IT Security Analyst 4* **Location:** *United States* **Requisition ID:** *17000NA6*
          Creating Corporate Windows Phone Applications   

Originally posted on: http://blogs.shaunxu.me/archive/2012/06/22/creating-corporate-windows-phone-applications.aspx

Most developers write Windows Phone applications for their own gratification and their own wallets.  While most of the time I would put myself in the same camp, I am also a consultant.  This means that I have corporate clients who want corporate solutions.  I recently got a request for a system rebuild that includes a Windows Phone component.  This brought up the questions of what are the important aspects to consider when building for this situation.

Let’s break it down in to the points that are important to a company using a mobile application.  The company want to make sure that their proprietary software is safe from use by unauthorized users.  They also want to make sure that the data is secure on the device.

The first point is a challenge.  There is no such thing as true private distribution in the Windows Phone ecosystem at this time.  What is available is the ability to specify you application for targeted distribution.  Even with targeted distribution you can’t ensure that only individuals within your organization will be able to load you application.  Because of this I am taking two additional steps.  The first is to register the phone’s DeviceUniqueId within your system.  Add a system sign-in and that should cover access to your application.

The second half of the problem is securing the data on the phone.  This is where the ProtectedData API within the System.Security.Cryptography namespace comes in.  It allows you to encrypt your data before pushing it to isolated storage on the device.

With the announcement of Windows Phone 8 coming this fall, many of these points will have different solutions.  Private signing and distribution of applications will be available.  We will also have native access to BitLocker.  When you combine these capabilities enterprise application development for Windows Phone will be much simpler.  Until then work with the above suggestions to develop your enterprise solutions.

          IAM Consultant - The Herjavec Group - Canada   
Experience with J2EE technologies, scripting, directories, certificates (PKI), and encryption are highly desirable....
From The Herjavec Group - Wed, 17 May 2017 15:13:43 GMT - View all Canada jobs
          SSDs: Fast Storage Made Simple—and Economical   
Download this infographic to get a snapshot view of all-flash storage arrays that deliver simply consistent performance, more than 5x data reduction with inline pattern removal, data-at-rest encryption across all managed data sets, and more. Here's your chance to mitigate your storage architecture complexities. Published by: IBM Tectight
          Need - kandharamMatrimony.com - Find lakhs of Brides and Grooms on kandharammatrimony - INDIA   
kandharamMatrimony - Find lakhs of Brides and Grooms on kandharammatrimony.com the most trusted wedding destination to find your special someone. Register Free! Create your profile with every possible data that you want to show. Your profile will be visible to All (You can also choose to hide contact details). You can send messages directly to partner. You can view other members contact details.You can view other members horoscope details. You can directly send a profile link to anyone who you want to show your profile for reference although your partner would not see your contact details unless he/she logs in and have permission from you. Know your Match-Making with your partner. Online chat is available for everyone. No Registration fee No Sign Up Fee it's completely free. You will also get alerts to your mobile number if anyone sends photo request , album request , video request, contact request, horoscope request and many more. All this feature is for Free. All the information you pass is encrypted to maintain total security appear in Kandharam Matrimony. Only approved and moderated members appear in Kandharam Matrimony. Matrimonial, Matrimony, Indian Matrimonial - India Matrimonials. Kandharammatrimony.com - The No. 1 & Most Successful Indian Matrimonial Website. Trusted by millions of Indian Brides & Grooms globally. Register FREE. [Posted ID IM17F3368]
          Need - kandharamMatrimony.com - Find lakhs of Brides and Grooms on kandharammatrimony - INDIA   
kandharamMatrimony - Find lakhs of Brides and Grooms on kandharammatrimony.com the most trusted wedding destination to find your special someone. Register Free! Create your profile with every possible data that you want to show. Your profile will be visible to All (You can also choose to hide contact details). You can send messages directly to partner. You can view other members contact details.You can view other members horoscope details. You can directly send a profile link to anyone who you want to show your profile for reference although your partner would not see your contact details unless he/she logs in and have permission from you. Know your Match-Making with your partner. Online chat is available for everyone. No Registration fee No Sign Up Fee it's completely free. You will also get alerts to your mobile number if anyone sends photo request , album request , video request, contact request, horoscope request and many more. All this feature is for Free. All the information you pass is encrypted to maintain total security appear in Kandharam Matrimony. Only approved and moderated members appear in Kandharam Matrimony. Matrimonial, Matrimony, Indian Matrimonial - India Matrimonials. Kandharammatrimony.com - The No. 1 & Most Successful Indian Matrimonial Website. Trusted by millions of Indian Brides & Grooms globally. Register FREE. [Posted ID IM17F3368]
          Re: hoe verwarm je een etensblik leger   
Beste Lange,

bedankt voor je vraag.
Zo'n blik heet een mestin. Deze kun je op een esbitbrander zetten. Je kunt er zowel eten in klaarmaken als bijv. water koken voor koffiee.d.


Je hebt verschillende soorten voedselpakketten.
-Er zijn blikken met eten (worden tegenwoordig nog maar zelden gebruikt). Deze kon je, afhankelijk van de inhoud, rechtstreeks op een brander zetten of ze in de mestin doen en het daarin koken.

Statistieken : Geplaatst door Verzamelaar • op zo jan 12, 2014 11:16 pm • Reacties 2 • Bekeken 16080

          Visa And Square Partner Up To Buff Up Security   
Since Visa's investment with the mobile payment company, Square, we see that the two have announced a new version of the Square dongle that adds encryption and enhances security. Square has received much criticism in the past from Verifone, claiming that Square's system is insecure and outdated.

Although Square has denied these allegations (who wouldn't deny such allegations?), the company has introduced a new version of the Square reader that employs encryption, hinting that perhaps they did agree that security needed to be enhanced. Of course all this comes after Sony's PlayStation Network gets hacked, is down for seven days, and has personal information of 70 million members stolen.
          IAM Consultant - The Herjavec Group - Canada   
Experience with J2EE technologies, scripting, directories, certificates (PKI), and encryption are highly desirable....
From The Herjavec Group - Wed, 17 May 2017 15:13:43 GMT - View all Canada jobs
          File encryption on the command line   
This list is just a reference which hopefully saves some googling. Let's make it clear that we're talking about symmetric encryption here, that is, a password (or better, a passphrase) is supplied when the file is encrypted, and the same password can be used to decrypt it. No public/private key stuff or other preparation should […]
          How to get around, bypass or defeat "A program is trying to automatically send email on your behalf" in Outlook 2010   
If you've encountered this error like I have, you know it is a pain in the ass. You're writing code and trying to test it and you get blocked by Outlook security. Today I found a good solution that should be more widely available on the internet, then it is. These two registry keys disable that functionality. A C sharp code example is below and what I used to send emails in a console app. It loops and send a new incrementing subject email every 5 seconds. The code is from the internet and other people, that I've tweaked, same as the reg hacks. I have not tried this with some of the other programmatic ways to interact with Office, nor with other versions of Office. This may also work or affect the "A program is trying to access e-mail addresses you have stored in Outlook" as well.

[HKEY_CURRENT_USER\Software\Policies\Microsoft\Security] "CheckAdminSettings"=dword:00000002
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Outlook\Security] "ObjectModelGuard"=dword:00000002

using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
using System.Reflection;
using System.Threading;


Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Software\Policies\Microsoft\Security] "CheckAdminSettings"=dword:00000002
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Outlook\Security] "ObjectModelGuard"=dword:00000002


namespace LateBindingTest
class OutlookEmailerLateBinding

private object oApp;
private object oNameSpace;
private object oOutboxFolder;
public static int messageNumber = 0;

public OutlookEmailerLateBinding()
int loopNumber = 0;
Type outlook_app_type;
object[] parameter = new object[1];
//Get the excel object
outlook_app_type = Type.GetTypeFromProgID("Outlook.Application");
//Create instance of excel
oApp = Activator.CreateInstance(outlook_app_type);
//Set the parameter which u want to set
parameter[0] = "MAPI";
//Set the Visible property
oNameSpace = outlook_app_type.InvokeMember("GetNamespace",
BindingFlags.InvokeMethod, null, oApp, parameter);

var Logon_parameter = new object[4] { null, null, true, true };
BindingFlags.InvokeMethod, null, oNameSpace, Logon_parameter);

var GetDefaultFolder_parameter = new object[1] { 6 };
oOutboxFolder =
BindingFlags.InvokeMethod, null, oNameSpace,

Console.WriteLine(messageNumber + " - Press enter to exit");

static void Main(string[] args)
//int messageNumber = 0;
while (true)
messageNumber += 1;
OutlookEmailerLateBinding app = new OutlookEmailerLateBinding();
app.SendOutlookEmail("user1@domain.com; user2@domain.com", "Duplicate test message email " + messageNumber, "Test message. Testing. Only reply back if you see a duplicate.");
catch (Exception e)
Console.WriteLine("Error Stack {0} ", e.Message);



public void SendOutlookEmail(string toValue, string
subjectValue, string bodyValue)
var CreateItem_parameter = new object[1] { 0 };
object oMailItem =
oApp.GetType().InvokeMember("CreateItem", BindingFlags.InvokeMethod,
null, oApp, CreateItem_parameter);

var mail_item_type = oMailItem.GetType();
BindingFlags.SetProperty, null, oMailItem, new
object[] { toValue });
BindingFlags.SetProperty, null, oMailItem, new
object[] { subjectValue });
BindingFlags.SetProperty, null, oMailItem, new
object[] { bodyValue });
BindingFlags.InvokeMethod, null, oMailItem, null);



On a side note, here is how to do it in PowerShell in a slightly different way by connecting directly to the Client Access Server (CAS).
if ( (Get-PSSnapin | Where-Object { $_.Name -eq "Microsoft.Exchange.Management.PowerShell.Admin"}) -eq $null )
add-pssnapin Microsoft.Exchange.Management.PowerShell.Admin

$emailattachment = "xx" # full path to attachment file

$body = "xx" # body of email

$smtp = new-object Net.Mail.SmtpClient("xxx") # Dns name or IP of your cas server
$smtpuser = new-object System.Net.networkCredential
$smtpuser.domain = "xx" # your domain
$smtpuser.username = "xx" # your username
$smtpuser.password = "xx" # your password
$smtp.Credentials = $smtpuser

$SmtpClient = new-object system.net.mail.smtpClient
$MailMessage = New-Object system.net.mail.mailmessage
$SmtpClient.Host = "xxx" # Dns name or IP of cas server
$mailmessage.from = "xxx" # your email address
$mailmessage.To.add("xx@xx.xx") # email address to send to
$mailmessage.Subject = "xxx" # subject
$MailMessage.IsBodyHtml = $False
$mailmessage.Body = $body
$attachment = New-Object System.Net.Mail.Attachment($emailattachment, 'text/plain') # you may have to change the file type or encrypt file with 7zip to get around gmail file attachment restrictions

          Windows Phone Summit Highlights   

This information is hot off the Windows Phone 8 Summit held on June 20th 2012 in San Francisco. The show was kicked of by the same DJ using the transparent touchscreen seen before the opening keynote at TechEd North America 2102 in Orlando last week. The major highlights of the event are:
  1. No device upgrade to Windows Phone 8 OS(Apollo)
  2. Hardware Multicore Processor support
  3. A new Start Screen with different Tile Sizes
  4. Mobile Wallet Hub
  5. New "Shared" Kernel
Here is a bit more about the major highlights I listed above:

No device upgrade to Windows Phone 8 OS(Apollo)
This one hurt me the most.  There will be a Windows Phone 7.8 OS upgrade for devices running Windows Phone 7.5 (Mango) that cannot take advantage of all the new features due to hardware requirements. It seems that all devices will get this upgrade independent of carrier and over the air (3G, 4G or WiFi) instead of being forced through Zune. Windows Phone 8 is expected to be available by fall 2012.

Hardware Multicore Processor support
Windows Phone 8 will support for multi-core processors including dual core initially and quad core and more in the future. The first devices are expected to be dual core processors.

A new Start Screen  with different Tile Sizes
Microsoft introduced three sizes of Live tiles, small, medium, and large. Please note that existing Windows Phone devices have the medium and large Live tiles but are not resizable. Windows Phone 7.8 and Windows Phone 8 should support three resolutions in total: WVGA, WXGA,(both 15:9) and 720p (16:9). The new screen also offers more color customization and personalization options. The arrow on the right side of the screen is gone and all tiles now take up the whole screen with a smaller tile layout.

Mobile Wallet Hub
The Mobile Wallet in Windows Phone 8 will support Near Field Communication (NFC) payments as well as the Passbook type of e-wallet offered by Apple on their iOS Devices. Microsoft promises the “most complete” mobile wallet solution, because they are working directly with the carriers.

New "Shared" Kernel
Windows Phone 8 will share the same kernel as Windows 8. This will allow the use of Micro SD cards as external storage which is a big change from how it was done in Windows Phone 7 and Windows Phone 7.5. Device Encryption, Secure Boot and Device management are another benefits gained via the new shared kernel. Developers will be able to use managed code developed fo