'We have no experience in stopping a nuclear war.' - Sidney Drell (no replies)        
'..My greatest concern is the lack of public awareness about this existential threat, the absence of a vigorous public debate about the nuclear-war plans of Russia and the United States, the silent consent to the roughly fifteen thousand nuclear weapons in the world. These machines have been carefully and ingeniously designed to kill us. Complacency increases the odds that, some day, they will. The “Titanic Effect” is a term used by software designers to explain how things can quietly go wrong in a complex technological system: the safer you assume the system to be, the more dangerous it is becoming.'

'The harsh rhetoric on both sides increases the danger of miscalculations and mistakes, as do other factors. Close encounters between the military aircraft of the United States and Russia have become routine, creating the potential for an unintended conflict. Many of the nuclear-weapon systems on both sides are aging and obsolete. The personnel who operate those systems often suffer from poor morale and poor training. None of their senior officers has firsthand experience making decisions during an actual nuclear crisis. And today’s command-and-control systems must contend with threats that barely existed during the Cold War: malware, spyware, worms, bugs, viruses, corrupted firmware, logic bombs, Trojan horses, and all the other modern tools of cyber warfare. The greatest danger is posed not by any technological innovation but by a dilemma that has haunted nuclear strategy since the first detonation of an atomic bomb: How do you prevent a nuclear attack while preserving the ability to launch one?

..

..the Cuban Missile Crisis, when a series of misperceptions, miscalculations, and command-and-control problems almost started an accidental nuclear war—despite the determination of both John F. Kennedy and Nikita Khrushchev to avoid one. In perhaps the most dangerous incident, the captain of a Soviet submarine mistakenly believed that his vessel was under attack by U.S. warships and ordered the firing of a torpedo armed with a nuclear warhead. His order was blocked by a fellow officer. Had the torpedo been fired, the United States would have retaliated with nuclear weapons. At the height of the crisis, while leaving the White House on a beautiful fall evening, McNamara had a strong feeling of dread—and for good reason: “I feared I might never live to see another Saturday night.”

..

The personnel who command, operate, and maintain the Minuteman III have also become grounds for concern. In 2013, the two-star general in charge of the entire Minuteman force was removed from duty after going on a drunken bender during a visit to Russia, behaving inappropriately with young Russian women, asking repeatedly if he could sing with a Beatles cover band at a Mexican restaurant in Moscow, and insulting his military hosts. The following year, almost a hundred Minuteman launch officers were disciplined for cheating on their proficiency exams. In 2015, three launch officers at Malmstrom Air Force Base, in Montana, were dismissed for using illegal drugs, including ecstasy, cocaine, and amphetamines. That same year, a launch officer at Minot Air Force Base, in North Dakota, was sentenced to twenty-five years in prison for heading a violent street gang, distributing drugs, sexually assaulting a girl under the age of sixteen, and using psilocybin, a powerful hallucinogen. As the job title implies, launch officers are entrusted with the keys for launching intercontinental ballistic missiles.

..

..A recent memoir, “Uncommon Cause,” written by General George Lee Butler, reveals that the Pentagon was not telling the truth. Butler was the head of the U.S. Strategic Command, responsible for all of America’s nuclear weapons, during the Administration of President George H. W. Bush.

According to Butler and Franklin Miller, a former director of strategic-forces policy at the Pentagon, launch-on-warning was an essential part of the Single Integrated Operational Plan (siop), the nation’s nuclear-war plan. Land-based missiles like the Minuteman III were aimed at some of the most important targets in the Soviet Union, including its anti-aircraft sites. If the Minuteman missiles were destroyed before liftoff, the siop would go awry, and American bombers might be shot down before reaching their targets. In order to prevail in a nuclear war, the siop had become dependent on getting Minuteman missiles off the ground immediately. Butler’s immersion in the details of the nuclear command-and-control system left him dismayed. “With the possible exception of the Soviet nuclear war plan, [the siop] was the single most absurd and irresponsible document I had ever reviewed in my life,” Butler concluded. “We escaped the Cold War without a nuclear holocaust by some combination of skill, luck, and divine intervention, and I suspect the latter in greatest proportion.” The siop called for the destruction of twelve thousand targets within the Soviet Union. Moscow would be struck by four hundred nuclear weapons; Kiev, the capital of the Ukraine, by about forty.

After the end of the Cold War, a Russian surprise attack became extremely unlikely. Nevertheless, hundreds of Minuteman III missiles remained on alert. The Cold War strategy endured because, in theory, it deterred a Russian attack on the missiles. McNamara called the policy “insane,” arguing that “there’s no military requirement for it.” George W. Bush, while running for President in 2000, criticized launch-on-warning, citing the “unacceptable risks of accidental or unauthorized launch.” Barack Obama, while running for President in 2008, promised to take Minuteman missiles off alert, warning that policies like launch-on-warning “increase the risk of catastrophic accidents or miscalculation.” Twenty scientists who have won the Nobel Prize, as well as the Union of Concerned Scientists, have expressed strong opposition to retaining a launch-on-warning capability. It has also been opposed by former Secretary of State Henry Kissinger, former Secretary of State George Shultz, and former Senator Sam Nunn. And yet the Minuteman III missiles still sit in their silos today, armed with warheads, ready to go.

William J. Perry, who served as Secretary of Defense during the Clinton Administration, not only opposes keeping Minuteman III missiles on alert but advocates getting rid of them entirely. “These missiles are some of the most dangerous weapons in the world,” Perry wrote in the Times, this September. For many reasons, he thinks the risk of a nuclear catastrophe is greater today than it was during the Cold War. While serving as an Under-Secretary of Defense in 1980, Perry also received a late-night call about an impending Soviet attack, a false alarm that still haunts him. “A catastrophic nuclear war could have started by accident.”

Bruce Blair, a former Minuteman launch officer, heads the anti-nuclear group Global Zero, teaches at Princeton University, and campaigns against a launch-on-warning policy. Blair has described the stresses that the warning of a Russian attack would put on America’s command-and-control system. American early-warning satellites would detect Russian missiles within three minutes of their launch. Officers at norad would confer for an additional three minutes, checking sensors to decide if an attack was actually occurring. The Integrated Tactical Warning/Attack System collects data from at least two independent information sources, relying on different physical principles, such as ground-based radar and satellite-based infrared sensors. If the norad officials thought that the warning was legitimate, the President of the United States would be contacted. He or she would remove the Black Book from a briefcase carried by a military aide. The Black Book describes nuclear retaliatory options, presented in cartoon-like illustrations that can be quickly understood.

..

Although the Air Force publicly dismissed the threat of a cyberattack on the nuclear command-and-control system, the incident raised alarm within the Pentagon about the system’s vulnerability. A malfunction that occurred by accident might also be caused deliberately. Those concerns were reinforced by a Defense Science Board report in January, 2013. It found that the Pentagon’s computer networks had been “built on inherently insecure architectures that are composed of, and increasingly using, foreign parts.” Red teams employed by the board were able to disrupt Pentagon systems with “relative ease,” using tools available on the Internet. “The complexity of modern software and hardware makes it difficult, if not impossible, to develop components without flaws or to detect malicious insertions,” the report concluded.

In a recent paper for the Royal United Services Institute for Defence and Security Studies, Andrew Futter, an associate professor at the University of Leicester, suggested that a nuclear command-and-control system might be hacked to gather intelligence about the system, to shut down the system, to spoof it, mislead it, or cause it to take some sort of action—like launching a missile. And, he wrote, there are a variety of ways it might be done.

..

Strict precautions have been taken to thwart a cyberattack on the U.S. nuclear command-and-control system. Every line of nuclear code has been scrutinized for errors and bugs. The system is “air-gapped,” meaning that its networks are closed: someone can’t just go onto the Internet and tap into a computer at a Minuteman III control center. At least, that’s the theory. Russia, China, and North Korea have sophisticated cyber-warfare programs and techniques. General James Cartwright—the former head of the U.S. Strategic Command who recently pleaded guilty to leaking information about Stuxnet—thinks that it’s reasonable to believe the system has already been penetrated. “You’ve either been hacked, and you’re not admitting it, or you’re being hacked and don’t know it,” Cartwright said last year.

If communications between Minuteman control centers and their missiles are interrupted, the missiles can still be launched by ultra-high-frequency radio signals transmitted by special military aircraft. The ability to launch missiles by radio serves as a backup to the control centers—and also creates an entry point into the network that could be exploited in a cyberattack. The messages sent within the nuclear command-and-control system are highly encrypted. Launch codes are split in two, and no single person is allowed to know both parts. But the complete code is stored in computers—where it could be obtained or corrupted by an insider.

Some of America’s most secret secrets were recently hacked and stolen by a couple of private contractors working inside the N.S.A., Edward Snowden and Harold T. Martin III, both employees of Booz Allen Hamilton. The N.S.A. is responsible for generating and encrypting the nuclear launch codes. And the security of the nuclear command-and-control system is being assured not only by government officials but also by the employees of private firms, including software engineers who work for Boeing, Amazon, and Microsoft.

Lord Des Browne, a former U.K. Minister of Defense, is concerned that even ballistic-missile submarines may be compromised by malware. Browne is now the vice-chairman of the Nuclear Threat Initiative, a nonprofit seeking to reduce the danger posed by weapons of mass destruction, where he heads a task force examining the risk of cyberattacks on nuclear command-and-control systems. Browne thinks that the cyber threat is being cavalierly dismissed by many in power. The Royal Navy’s decision to save money by using Windows for Submarines, a version of Windows XP, as the operating system for its ballistic-missile subs seems especially shortsighted. Windows XP was discontinued six years ago, and Microsoft warned that any computer running it after April, 2014, “should not be considered protected as there will be no security updates.” Each of the U.K. subs has eight missiles carrying a total of forty nuclear weapons. “It is shocking to think that my home computer is probably running a newer version of Windows than the U.K.’s military submarines,” Brown said.In 2013, General C. Robert Kehler, the head of the U.S. Strategic Command, testified before the Senate Armed Services Committee about the risk of cyberattacks on the nuclear command-and-control system. He expressed confidence that the U.S. system was secure. When Senator Bill Nelson asked if somebody could hack into the Russian or Chinese systems and launch a ballistic missile carrying a nuclear warhead, Kehler replied, “Senator, I don’t know . . . I do not know.”

After the debacle of the Cuban Missile Crisis, the Soviet Union became much more reluctant to provoke a nuclear confrontation with the United States. Its politburo was a committee of conservative old men. Russia’s leadership is quite different today. The current mix of nationalism, xenophobia, and vehement anti-Americanism in Moscow is a far cry from the more staid and secular ideology guiding the Soviet Union in the nineteen-eighties. During the past few years, threats about the use of nuclear weapons have become commonplace in Moscow. Dmitry Kiselyov, a popular newscaster and the Kremlin’s leading propagandist, reminded viewers in 2014 that Russia is “the only country in the world capable of turning the U.S.A. into radioactive dust.” The Kremlin has acknowledged the development of a nuclear torpedo that can travel more than six thousand miles underwater before devastating a coastal city. It has also boasted about a fearsome new missile design. Nicknamed “Satan 2” and deployed with up to sixteen nuclear warheads, the missile will be “capable of wiping out parts of the earth the size of Texas or France,” an official news agency claimed.

..

Russia’s greatest strategic vulnerability is the lack of a sophisticated and effective early-warning system. The Soviet Union had almost a dozen satellites in orbit that could detect a large-scale American attack. The system began to deteriorate in 1996, when an early-warning satellite had to be retired. Others soon fell out of orbit, and Russia’s last functional early-warning satellite went out of service two years ago. Until a new network of satellites can be placed in orbit, the country must depend on ground-based radar units. Unlike the United States, Russia no longer has two separate means of validating an attack warning. At best, the radar units can spot warheads only minutes before they land. Pavel Podvig, a senior fellow at the U.N. Institute for Disarmament Research, believes that Russia does not have a launch-on-warning policy—because its early-warning system is so limited.

For the past nine years, I’ve been immersed in the minutiae of nuclear command and control, trying to understand the actual level of risk. Of all the people whom I’ve met in the nuclear realm, Sidney Drell was one of the most brilliant and impressive. Drell died this week, at the age of ninety. A theoretical physicist with expertise in quantum field theory and quantum chromodynamics, he was for many years the deputy director of the Stanford Linear Accelerator and received the National Medal of Science from Obama, in 2013. Drell was one of the founding members of jason—a group of civilian scientists that advises the government on important technological matters—and for fifty-six years possessed a Q clearance, granting him access to the highest level of classified information. Drell participated in top-secret discussions about nuclear strategy for decades, headed a panel that investigated nuclear-weapon safety for the U.S. Congress in 1990, and worked on technical issues for jason until the end of his life. A few months ago, when I asked for his opinion about launch-on-warning, Drell said, “It’s insane, the worst thing I can think of. You can’t have a worse idea.”

Drell was an undergraduate at Princeton University when Hiroshima and Nagasaki were destroyed. Given all the close calls and mistakes in the seventy-one years since then, he considered it a miracle that no other cities have been destroyed by a nuclear weapon—“it is so far beyond my normal optimism.” The prospect of a new cold war—and the return of military strategies that advocate using nuclear weapons on the battlefield—deeply unnerved him. Once the first nuclear weapon detonates, nothing might prevent the conflict from spiralling out of control. “We have no experience in stopping a nuclear war,” he said.

..

Donald Trump and Vladimir Putin confront a stark choice: begin another nuclear-arms race or reduce the threat of nuclear war. Trump now has a unique opportunity to pursue the latter, despite the bluster and posturing on both sides. His admiration for Putin, regardless of its merits, could provide the basis for meaningful discussions about how to minimize nuclear risks. Last year, General James Mattis, the former Marine chosen by Trump to serve as Secretary of Defense, called for a fundamental reappraisal of American nuclear strategy and questioned the need for land-based missiles. During Senate testimony, Mattis suggested that getting rid of such missiles would “reduce the false-alarm danger.” Contrary to expectations, Republican Presidents have proved much more successful than their Democratic counterparts at nuclear disarmament. President George H. W. Bush cut the size of the American arsenal in half, as did his son, President George W. Bush. And President Ronald Reagan came close to negotiating a treaty with the Soviet Union that would have completely abolished nuclear weapons.

Every technology embodies the values of the age in which it was created. When the atomic bomb was being developed in the mid-nineteen-forties, the destruction of cities and the deliberate targeting of civilians was just another military tactic. It was championed as a means to victory. The Geneva Conventions later classified those practices as war crimes—and yet nuclear weapons have no other real use. They threaten and endanger noncombatants for the sake of deterrence. Conventional weapons can now be employed to destroy every kind of military target, and twenty-first-century warfare puts an emphasis on precision strikes, cyberweapons, and minimizing civilian casualties. As a technology, nuclear weapons have become obsolete. What worries me most isn’t the possibility of a cyberattack, a technical glitch, or a misunderstanding starting a nuclear war sometime next week. My greatest concern is the lack of public awareness about this existential threat, the absence of a vigorous public debate about the nuclear-war plans of Russia and the United States, the silent consent to the roughly fifteen thousand nuclear weapons in the world. These machines have been carefully and ingeniously designed to kill us. Complacency increases the odds that, some day, they will. The “Titanic Effect” is a term used by software designers to explain how things can quietly go wrong in a complex technological system: the safer you assume the system to be, the more dangerous it is becoming.'

- Eric Schlosser, World War Three, By Mistake, December 23, 2016


Context

The International Day for the Total Elimination of Nuclear Weapons

          '..Russia .. cyberpower proved the perfect weapon .. political sabotage..' (no replies)        
' “We’d have all these circular meetings,” one senior State Department official said, “in which everyone agreed you had to push back at the Russians and push back hard. But it didn’t happen.”

..

Mr. Putin, a student of martial arts, had turned two institutions at the core of American democracy — political campaigns and independent media — to his own ends..

..

..The Russians clearly had a more sophisticated understanding of American politics, and they were masters of “kompromat,” their term for compromising information.

..

..the hackings of the State Department, the White House and the Pentagon..

..

What seems clear is that Russian hacking, given its success, is not going to stop. Two weeks ago, the German intelligence chief, Bruno Kahl, warned that Russia might target elections in Germany next year. “The perpetrators have an interest to delegitimize the democratic process as such,” Mr. Kahl said. Now, he added, “Europe is in the focus of these attempts of disturbance, and Germany to a particularly great extent.” '



'..the White House’s reluctance to respond forcefully meant the Russians have not paid a heavy price for their actions, a decision that could prove critical in deterring future cyberattacks.

..

..President Vladimir V. Putin of Russia moved beyond mere espionage to deliberately try to subvert American democracy and pick the winner of the presidential election.

..

..A low-cost, high-impact weapon that Russia had test-fired in elections from Ukraine to Europe was trained on the United States, with devastating effectiveness. For Russia, with an enfeebled economy and a nuclear arsenal it cannot use short of all-out war, cyberpower proved the perfect weapon: cheap, hard to see coming, hard to trace.

..

The United States had two decades of warning that Russia’s intelligence agencies were trying to break into America’s most sensitive computer networks. But the Russians have always managed to stay a step ahead.

Their first major attack was detected on Oct. 7, 1996, when a computer operator at the Colorado School of Mines discovered some nighttime computer activity he could not explain. The school had a major contract with the Navy, and the operator warned his contacts there. But as happened two decades later at the D.N.C., at first “everyone was unable to connect the dots,” said Thomas Rid, a scholar at King’s College in London who has studied the attack.

Investigators gave it a name — Moonlight Maze — and spent two years, often working day and night, tracing how it hopped from the Navy to the Department of Energy to the Air Force and NASA. In the end, they concluded that the total number of files stolen, if printed and stacked, would be taller than the Washington Monument.

Whole weapons designs were flowing out the door, and it was a first taste of what was to come: an escalating campaign of cyberattacks around the world.

..

The Russians were also quicker to turn their attacks to political purposes. A 2007 cyberattack on Estonia, a former Soviet republic that had joined NATO, sent a message that Russia could paralyze the country without invading it. The next year cyberattacks were used during Russia’s war with Georgia.

..

Mr. Obama was briefed regularly on all this, but he made a decision that many in the White House now regret: He did not name Russians publicly, or issue sanctions. There was always a reason: fear of escalating a cyberwar, and concern that the United States needed Russia’s cooperation in negotiations over Syria.

“We’d have all these circular meetings,” one senior State Department official said, “in which everyone agreed you had to push back at the Russians and push back hard. But it didn’t happen.”

..

Last year, the attacks became more aggressive. Russia hacked a major French television station, frying critical hardware. Around Christmas, it attacked part of the power grid in Ukraine, dropping a portion of the country into darkness, killing backup generators and taking control of generators. In retrospect, it was a warning shot.

..

..CrowdStrike’s nicknames for the two Russian hacking groups that the firm found at work inside the D.N.C. network. Cozy Bear — the group also known as the Dukes or A.P.T. 29, for “advanced persistent threat” — may or may not be associated with the F.S.B., the main successor to the Soviet-era K.G.B., but it is widely believed to be a Russian government operation. It made its first appearance in 2014, said Dmitri Alperovitch, CrowdStrike’s co-founder and chief technology officer.

..

Only in March 2016 did Fancy Bear show up — first penetrating the computers of the Democratic Congressional Campaign Committee, and then jumping to the D.N.C., investigators believe. Fancy Bear, sometimes called A.P.T. 28 and believed to be directed by the G.R.U., Russia’s military intelligence agency, is an older outfit, tracked by Western investigators for nearly a decade. It was Fancy Bear that got hold of Mr. Podesta’s email.

..

It was bad enough that Russian hackers had been spying inside the committee’s network for months. Now the public release of documents had turned a conventional espionage operation into something far more menacing: political sabotage, an unpredictable, uncontrollable menace for Democratic campaigns.

..

Julian Assange, the WikiLeaks founder and editor, has resisted the conclusion that his site became a pass-through for Russian hackers working for Mr. Putin’s government or that he was deliberately trying to undermine Mrs. Clinton’s candidacy. But the evidence on both counts appears compelling.

..

Mr. Putin, a student of martial arts, had turned two institutions at the core of American democracy — political campaigns and independent media — to his own ends. The media’s appetite for the hacked material, and its focus on the gossipy content instead of the Russian source, disturbed some of those whose personal emails were being reposted across the web.

..

In late 2014, hackers working for Kim Jong-un, the North’s young and unpredictable leader, had carried out a well-planned attack on Sony Pictures Entertainment intended to stop the Christmastime release of a comedy about a C.I.A. plot to kill Mr. Kim.

In that case, embarrassing emails had also been released. But the real damage was done to Sony’s own systems: More than 70 percent of its computers melted down when a particularly virulent form of malware was released. Within weeks, intelligence agencies traced the attack back to the North and its leadership. Mr. Obama called North Korea out in public, and issued some not-very-effective sanctions. The Chinese even cooperated, briefly cutting off the North’s internet connections.

As the first Situation Room meetings on the Russian hacking began in July, “it was clear that Russia was going to be a much more complicated case,” said one participant. The Russians clearly had a more sophisticated understanding of American politics, and they were masters of “kompromat,” their term for compromising information.

..

..code was put out in the open by the Russians as a warning: Retaliate for the D.N.C., and there are a lot more secrets, from the hackings of the State Department, the White House and the Pentagon, that might be spilled as well. One senior official compared it to the scene in “The Godfather” where the head of a favorite horse is left in a bed, as a warning.

..

As the year draws to a close, it now seems possible that there will be multiple investigations of the Russian hacking — the intelligence review Mr. Obama has ordered completed by Jan. 20, the day he leaves office, and one or more congressional inquiries. They will wrestle with, among other things, Mr. Putin’s motive.

..

Did he seek to mar the brand of American democracy, to forestall anti-Russian activism for both Russians and their neighbors? Or to weaken the next American president, since presumably Mr. Putin had no reason to doubt American forecasts that Mrs. Clinton would win easily? Or was it, as the C.I.A. concluded last month, a deliberate attempt to elect Mr. Trump?

In fact, the Russian hack-and-dox scheme accomplished all three goals.

What seems clear is that Russian hacking, given its success, is not going to stop. Two weeks ago, the German intelligence chief, Bruno Kahl, warned that Russia might target elections in Germany next year. “The perpetrators have an interest to delegitimize the democratic process as such,” Mr. Kahl said. Now, he added, “Europe is in the focus of these attempts of disturbance, and Germany to a particularly great extent.” '

- Eric Lipton, David E. Sanger and Scott Shane, The Perfect Weapon: How Russian Cyberpower Invaded the U.S., December 13, 2016


Context '[Russia] may become a threat to the world. That is the worst thing that could happen to Russia.' - Yegor Gaidar

'..Russian strategy of hybrid influence and destabilization .. German Council on Foreign Relations.'

'German intelligence says Russia is trying to destabilize German society..' - '..war that Moscow is waging against the West..'

'[Putin is doing] anything that can and will expand Russian influence to U.S.S.R.-era levels of power.'


'..Zero tolerance for Russian intrusions .. Estonia .. policy of publicly naming or prosecuting spies..'

'..the Soviet Union was cut off from Western financial markets and was effectively under permanent sanctions..'

          RENUNGKANLAH SAUDARAKU SEMUA        
Ruqayyah Waris Maqsood, Menulis Hingga Nafas Berakhir
Ia mendapat ijazah dibidang Teologi Kristen. Namun pengetahuan Kristen-nya yang begitu mendalam menjadikan dia mencintai Islam. Ingin terus menulis hingga akhir hayat Ruqayyah Waris Maqsood dilahirkan pada tahun 1942 di kota London, Inggris. Ruqayyah merupakan salah satu penulis buku-buku Islam paling produktif. telah menghasilkan lebih dari 30 buku berkenaan dengan Islam. Buku-bukunya termasuk best seller dan menjadi referensi serta rujukan di berbagai negara. Awalnya dia dibesarkan dalam lingkungan Kristen Protestan. Nama asalnya ialah Rosalyn Rushbrook . Dia memperoleh ijazah dalam bidang Teologi Kristen dari Universitas Hull tahun 1963. Pengetahuan Kristennya begitu mendalam hingga dia menulis beberapa buah buku, tentang Kristen. Tapi rupanya, karena pengetahuannya yang begitu mendalam tentang Kristen pula yang menyadarkannya. Ia dapati ajaran Kristen telah banyak menyimpang, terutama yang berkaitan dengan konsep Trinitas. Akhirnya tahun 1986, diusia 44 tahun, dia memeluk Islam. Tahun 2001 dia dianugerahkan Muhammad Iqbal Awards karena sumbangannya yang tinggi dalam pengembangan metodologi pengajaran Islam. Bahkan Maret 2004 Ruqayyah terpilih sebagai salah satu dari 100 wanita berprestasi di dunia. Berikut rangkuman kehidupannya dikutip dari berbagai sumber. Orang beriman tak takut dengan penderitaan hidup; tak takut dengan kematian; juga tak takut dengan kehidupan setelah dunia ini; karena Allah bersama mereka. Mereka tak sendirian, Allah selalu menemani dan membimbingnya. Allah itu nyata, Dia menyayangi kamu. Dia mengetahui semua kesukaran yang kamu hadapi dalam perjuangan. Bahkan, jika kamu berbuat salah, Dia masih tetap mencintaimu.モ ~Ruqayyah Waris Maqsood~ Bait-bait kalimat di atas menggambarkan betapa teguhnya hati seorang Ruqayyah. Bait penuh makna itu diadopsinya dari ayat-ayat suci Al-Quran. Dia memang menumpukan setiap tulisannya dengan memasukkan petuah-petuah dari Al-Quran dan hadis Nabi Muhammad SAW. Ruqayyah Waris Maqsood yang diilahirkan tahun 1942 di London, Inggris, pada ada usia 8 tahun telah jadi seorang anak yang memiliki komitmen yang tinggi dengan Kristen sebagai hasil dari panggilan hatinya. Setelah menamatkan program sarjana ilmu teologi (1963) dan master bidang pendidikan (1964) dari Universitas Hull, dia selama hampir 32 tahun mengelola program studi ilmu-ilmu keagamaan di berbagai sekolah dan perguruan tinggi di Inggris. Dia menikah dengan penyair Georg Morris Kendrick pada tahun 1964. Dari perkawinannya dengan Georg mereka memiliki dua orang anak, Daniel George lahir 1968 dan Frances Elisabeth Eva lahir 1969. Tahun 1986 pasangan itu bercerai. Tahun itu pula masuk Islam dan tahun 1990 menikah lagi dengan pria keturunan Pakistan, Waris Ali Maqsood namanya. モSaat ini Islam dicap sebagai agama bermasalah. Sangat tidak adil. Karena itu saya berupaya menulis untuk memperbanyak literatur-literatur Islam. Harapa saya agar, melalui tulisan-tulisan itu, dapat membantu memperbaiki atmosfir yang kurang berpihak ke Islam,ヤ cetusnya. モSaya sangat tertarik menggeluti sejarah Islam, terutama tentang kehidupan wanita-wanita di sekitar Nabi Muhammad. Saya acapkali meng-counter kampanye anti Islam yang mendiskreditkan wanita Muslim,ヤ kata dia. Best seller Mau tahu seberapa produktifnya dia? Catat saja, sewaktu masih bernama Rosalyn Rushbrook dia menghasilkan 9 buah buku yang umumnya berisi isu agama. Dan satu volume buku kumpulan puisi. Lalu selepas hijrah ke Islam, dia menghasilkan sekitar 30 buah buku. Saat ini dia memiliki 9 buah buku yang masih dalam proses penerbitan. Dia juga menulis berbagai artikel di majalah maupun koran yang berkaitan dengan Islam dan Muslim. Salah satu sumbangannya yang paling penting bagi komunitas Islam adalah The Muslim Marriage Guide (Petunjuk Pernikahan bagi Muslim). Buku itu menjadi rujukan dan direkomendasikan, tidak saja untuk pasangan yang akan menikah namun juga bagi mereka yang telah lama mengarungi bahtera rumah tangga. Bagi kalangan non Muslim, terutama yang sedang mendalami Islam, tentu saja buku Ruqayyah menjadi referensi yang sangat berharga. Dalam buku yang bernilai tinggi itu dia menggambarkan kehidupan Nabi Muhammad SAW dan para sahabatnya dilengkapi dengan petunjuk, tatacara dan hukum perkawinan. Tak hanya dia juga menguraikan bagaimana pertalian suami istri dalam hal warisan dan sejenisnya. Jadi sangat terpadu dan lengkap. Ruqayyah pernah diundang oleh Hodder Headlines untuk menulis buku Islam for the World Faiths (Islam bagi Penganut Agama se-Dunia). Saat ini buku itu telah dicetak sebanyak tiga kali dan termasuk salah satu buku best seller. Tak hanya buku-buku kategori モberatヤ, dia juga menulis buku-buku tentang bimbingan konseling bagi remaja Islam. Juga ada beberapa buku saku, antara lain; a Guide for Visitors to Mosques, a Marriage Guidance booklet, Muslim Womenメs Helpline. Bukunya di Indonesia banyak diterbitkan oleh Mizan. Misalnya Menciptakan Surga Rumah Tangga. Lalu buku bimbingan untuk remaja berjudul Menyentuh Hati Remaja. Buku itu mengulas seputar solusi untuk mengatasi problema-problema remaja. モMengapa hidup kita di dunia ini kadang-kadang berlalu dalam keadaan sulit. Ada cerita terkenal tentang seorang petani Afrika yang menanam rami. Ia harus menanamnya dalam keadaan yang sulit, dengan kondisi tanah yang mematahkan punggung dan dengan sedikit hujan untuk menyiraminya. Ketika ia pindah ke tempat yang iklimnya lebih bersahabat, ia membawa beberapa tanaman rami tersebut, dengan pikiran bahwa tanamana ini akan mudah tumbuh di tempat yang baru. Ya, tanaman itu memang tumbuh, besar, hijau dan subur; tetapi ketika ia mencabut batang itu untuk mengeluarkan seratnya, ternyata batangnya tidak berisi serat kecuali ampas. Tanaman itu memerlukan kondisi sulit untuk mengembangkan kekuatan batangnya,ヤ tulis Ruqayyah dalam buku bimbingan remajanya, dengan perumpamaan yang gampang dimengerti remaja dan juga memberi motivasi hidup. Silabus Islam モSaya juga diminta menulis buku teks yang dipakai secara luas di Inggris selama hampir 20 tahun. Buku-buku teks itu dipakai oleh kalangan pribadi, muallaf, dan pelajar-pelajar sekolah umum dan madrasah. Tidak saja di Inggris tapi juga di beberapa negara lainnya,ヤ begitu katanya. Ya, memang Ruqayyah juga sibuk menulis buku-buku teks yang banyak dijadikan rujukan. Ia membantu mengembangkan silabus bagi pelajar sekolah agama, bekerjasama dengan dinas pendidikan setempat. Silabusnya tergolong unik, dibuat khusus agar pelajar mandiri. Jadi, tanpa guru atau fasilitas tetap bisa jalan. Silabusnya dirancang untuk pelajar sekolah dasar hingga perguruan tinggi. Menariknya lagi, bisa dipakai untuk pendidikan formal, non formal, misal di rumah, bahkan juga di penjara. Pokoknya untuk dimana saja. Menjadi tutor jarak jauh (distance learning) untuk Asosiasi Peneliti Muslim (AMR) adalah aktifitas lainnya. Aktifitas mengajarnya juga padat. Banyak negara telah disambanginya, diantaranya AS, Kanada, Denmark, Swedia, Finlandia, Irlandia dan Singapura. Ruqayyah juga mengajar di beberapa universitas yang ada di Inggris seperti Oxford, Cambridge Edinburg, Glasgow dan Manchester. Juga mengajar di School of Oriental and Arabic Studies di London. Atas aktifitas dan jasanya itu ia menerima Muhammad Iqbal Award tahun 2001 atas kreatifitasnya dalam mengembangkan pembelajaran Islam. Dialah muslim pertama Inggris yang pernah menerima anugerah bergengsi tersebut. Tak hanya itu, Maret 2004 Ruqayyah terpilih sebagai salah satu dari 100 wanita berprestasi di dunia. Dalam ajang pemilihan Daily Mailメs Real Women of Achievement, dia termasuk satu dari tujuh orang wanita berprestasi dalam kategori keagamaan. Menulis dan Terus Menulis Majalah Islam, Emel pernah menanyakan adakah ia merasa lelah dengan seabrek aktifitasnya itu serta bagaimana membagi waktu menulis dan mengurus rumah tangga, misalnya di kesibukannya dengan para cucunya. モSaya sangat ketat dengan waktu. Bertahun-tahun saya menjalani itu dan sudah jadi irama hidup saya, hingga semua jadi mudah. Saya biasanya menulis malam hari. Kala semua telah tidur, hingga tak ada yang mengganggu saya. Jam 4 pagi saya bangun untuk shalat subuh. Selepas itu saya tidur sejenak hingga jam 8 pagi. Beraktifitas lagi dan siangnya saya ambil waktu untuk istirahat,ヤ ujarnya. モKerja saya sehari-hari ya menulis. Kini ada lebih dari 40 buku telah diterbitkan. Belum lama saya telah menyelesaikan satu manuskrip yang sangat tebal tentang Kehidupan Rasulullah SAW. Buku berjudul モThe Life of Prophet Muhammadヤ itu diterbitkan oleh Islamic Research Institute of Islamabad tahun 2006 silam,ヤ katanya. Tentang pembajakan buku-buku, Ruqayyah mengaku sedih dengan tingginya kasus pembajakan buku terutama di negara-negara Islam. モKenyataan saat ini banyak buku-buku Islam yang dibajak dan pembajaknya adalah orang Islam sendiri. Sedih bukan? モ ujarnya risau. Tentang Yesus Dia memiliki pengetahuan Kristen begitu mendalam. Dengan pengetahuannya itu Ruqayyah bergerak atas inisiatif sendiri mencari kebenaran berdasar kajian-kajian ilmiahnya. Namun akhirnya dia meninggalkan agamanya itu setelah bergulat bertahun-tahun dalam pencarian atas pertanyaan-pertanyaannya tentang konsep teologi Trinitas. Dia tak menemukan apa-apa. Jadi Ruqayyah memeluk Islam murni berdasar latar belakang pengetahuannya dan kajian mendalam tentang ajaran ketuhanan, baik dalam Islam dan Kristen. Seperti kebanyakan muallaf lainnya, dia menyebut dirinya telah モkembaliヤ menjadi Muslim. Kini dia memperjuangkan Islam lewat tulisan dan buku-bukunya. Dalam sebuah wawancara dengan sebuah media, dia ditanya perihal konsep Islam tentang Nabi Isa yang dalam ajaran Kristen disebut Yesus. モDi negara Barat ada ajaran ilmu etika berinti pada cinta dan kasih Tuhan dan tolong menolong sesama manusia. Itu semua diajarkan juga oleh semua nabi termasuk di dalamnya, tentu saja, Nabi Muhammad SAW. Kami orang Islam juga meyakini Nabi Isa sebagai salah satu nabi yang diutus Allah,ヤ kata Ruqayyah. モSebelum Nabi Isa datang, nabi-nabi terdahulu membawa ajaran Yahudi. Kami juga beriman dengan nabi-nabi terdahulu yang diutus kepada umat-umat sebelum Islam datang, Yahudi adalah salah satu agama samawi juga. Nabi Isa datang membawa ajaran Kristen itu kami yakni juga. Kemudian Nabi Muhammad diutus Allah membawa ajaran Islam dan tugas Isa AS telah selesai, Jadi tidak seperti dipahami ajaran Kristen dengan konsep Trinitasnya yang menyatakan Yesus itu anak Tuhan. Dia memang dilahirkan dari seorang ibu, Maryam. Tanpa ayah. Jadi jangan lantas disebut sebagai anak Tuhan. Itu kuasa Allah. Jika Allah katakan モjadiヤ, maka jadilah,ヤ imbuhnya lagi. Apakah Nabi Muhammad diutus karena misi Nabi Isa dianggap telah gagal? Demikian cocoran pertanyaan menohok media tersebut. モKami tidak beriman dengan itu, bahwa misi Nabi Isa gagal. Kami beriman, dia (Isa AS) adalah salah satu utusan Allah yang terbaik bagi umatnya. Contoh dan tunjuk ajarnya ditiru oleh jutaan pengikutnya kala itu. Jika kemudian, umatnya rusak, itu bukannya karena ajaran atau misi Isa AS itu rusak lantas dikatakan gagal. Lalu untuk menyelamatkan umatnya, menghapus dosa umatnya, Isa digambarkan (dalam Kristen) mengorbankan dirinya dengan disalib. Tidak begitu. Inilah yang saya katakana ajaran Kristen telah menyimpang dari aslinya,ヤ terangnya. Cyber counsellor Salain menulis, kesibukan lainnya adalah sebagai seorang konselor. Melalui internet, ia aktif menjawab dan membantu konseling. モKegiatan lain saya adalah mengasuh bimbingan konseling online melalui e-mail hingga dijuluki sebagai cyber councellor. Tiap hari sedikitnya ada 50 e-mail yang saya terima. Kebanyakan berasal dari orang-orang minta nasehat, karena masalah budaya, perkawinan, dan bahkan masalah ketuhanan. Kebanyakan dari mereka adalah orang-orang yang dalam masa pencarian, mereka ingin tahu apa itu Islam. Bahkan ada juga dari orang yang bermaksud menyerang Islam. Kami saling bertukar pendapat. Banyak juga e-mail berisi pengaduan-pengaduan yang sifatnya sangat pribadi. Saya ini persis seperti モibu atau tanteヤ bagi mereka dalam menyelesaikan persoalan-persoalan pribadi,ヤ ungkap Ruqayyah senang. Begitupun dia mengaku sedikit sedih dengan kenyataan masih banyak kalangan Islam yang bertingkah laku kurang baik. Tidak Islami. Hingga merusak wajah Islam sendiri. モSebagai contoh di Barat, banyak anak-anak muda Arab dan Asia yang bergaul bebas dengan gadis-gadis kulit putih tanpa memperhatikan kaedah Islam. Sedihnya lagi, ada yang sampai mengandung tanpa ikatan agama. Seringnya si wanita kemudian masuk Islam. Memang baik, tapi saya kira ini bukan jalan menuju Islam yang benar,ヤ keluhnya. Begitulah, Ruqayyah kini mengisi hari tuanya di sudut kota London dengan menulis, mengasuh para cucunya, disamping juga berbagi ilmu keislamannya dengan non muslim melalui dialog antar umat beragama. Dia menyisihkan waktunya berkunjung ke sekolah-sekolah dan gereja untuk menjelaskan Islam dan memberikan pengetahuan dasar-dasar Islam. Dia berjuang keras menyadarkan berbagai pihak dengan berbagai latar kehidupan yang berbeda agar dapat saling menghargai. [Zulkarnain Jalil/www.hidayatullah.com]
                  
SERANGAN DDoS, CYBERMOSLEM.NET MAMPU BERTAHAN
REP
Muhibbuddin Al Insaniyah
| 14 Agustus 2010 | 11:48
71
4
Nihil.

Sejak dirilis pada tanggal 1 Agusus 2010,Cybermoslem.net sudah dibanjiri dengan register-register baru yang semakin hari semakin melimpah. Dari banyaknya pengguna baru yang berbondong-bondong masuk, ternyata disinyalir oleh admin cybermoslem sendiri, ada sebuah “serangan rudal” dari “pesawat tak berawak” yang dikendalikan dari luar negeri, yang sengaja atau tidak memang hendak membuat rusuh suasana aksesing terhadap cybermoslem.

“…akhirnya CMnet lumpuh selama hampir semalaman (jum’at, 13 Agustus 2010). Setelah seharian di serang secara bertubi dengan sistem serangan ddos yang membuat jaringan kami menjadi sangat sibuk”, demikian menurut admin cybermoslem dalam blognya.

Serangan DoS (Denial of Service) adalah jenis serangan terhadap sebuah komputer atau server di dalam suatu jaringan internet dengan cara menghabiskan sumber (resource) yang dimiliki oleh komputer tersebut sampai komputer tersebut tidak dapat menjalankan fungsinya dengan benar sehingga secara tidak langsung mencegah pengguna lain untuk memperoleh akses layanan dari komputer yang diserang tersebut. Serangan DoS ini berlangsung satu lawan satu, satu penyerang melawan satu akun pengguna yang valid dan aktif, dengan penyerangnya menggunakan peralatan komputer yang canggih, serta dukungan host yang handal, sehingga target sasaran bisa kacau aksesingnya. Serangan DDoS ( Distribution DoS) merupakan serangan DoS yang “diselenggarakan” secara “rombongan” dan konspiratif menggunakan banyak komputer handal dan kuat, menyerang server sasaran, sehingga server “dipaksa” untuk tidak dapat memberikan pelayanan akses bagi pengguna.

Kondisi awal downtime sebenarnya sudah penulis rasakan dan terdeteksi oleh penulis pada sekitar lebih kurang jam 16.00 WIB, hari Jumat tanggal 13 Agutus 2010 kemarin, dan penulis seketika itu langsung memberikan sinyal “hati’hati” ke pihak admin bahwa ada “kemungkinan” upaya penyerangan oleh hacker ke server cybermoslem. Jawaban admin sangat sederhana, “Allah yang akan menolongnya“.

Situasi server lumpuh total terjadi semalaman dari mulai lebih kurang jam 19.30 WIB. Setelah sholat tarawih, penulis menutup akun di cybermoslem beberapa jam kemudian. Sebenarnya, pada Jum’at, 13 Agustus 2010, dari pagi sampai sore, akses ke cybermoslem.net masih stabil. Tetapi mulai malam sekitar jam 19.30 WIB lebih, pada saat pengguna dan saat sebagian besar member CMnet sedang sholat Tarawih. dan akses ke cybermoslem.net mulai ada kendala dan beberapa waktu kemudian lumpuh total.

Cybermoslem masih mampu tegak bertahan, tidak terjadi kehancuran dan kematian total, sehingga pada tanggal 14 Agustus 2010 sudah bisa normal kembali. Diperkirakan serangan akan berulang-ulang, tetapi Insya Allah, serangan DDoS dan serangan bentuk lainnya teramat berat dan kecil kemungkinan membunuh cybermoslem.

Memperhatikan berita di atas, penulis teringat serangan terhadap www.millatfacebook.com (jejaring sosial di Pakistan), yang sampai sekarang akhirnya web tersebut mengalami kelumpuhan dan tidak dapat diakses. Gambar di bawah ini adalah kondisi “bangkai” terakhir pada Sabtu, 14 Agutus 2010.

Kondisi "Bangkai" terakhir MillatFacebook.com. Adminnya masih berusaha hidup kembali.

Millatfacebook.com diciptakan oleh pemuda Pakistan, pada akhir Mei 2010 yang lalu, khusus untuk memberi alternatif bagi jejaring sosial mania di Pakistan dan penduduk dunia lainnya, setelah terjadinya “gempa bumi Facebook” yang menggemparkan dunia dengan munculnya halaman propaganda “Everybody Draw Mohammed Day”.

Terlepas dari alasan apapun pendiriannya, seharusnya netter tidak menganggap bahwa hadirnya jejaring baru sebagai ancaman sehingga melakukan serangan-serangan terhadap server ataupun apapun yang berafiliasi ke jejaring tersebut. Melihat gambar millatfcebook di atas, sepertinya admin millatfacebook asalnya menggunakan server di wilayah Amerika Serikat. Letak server inilah yang akan memberikan kemudahan lalu lintas bagi penyerang.

Perbedaan dengan millatfacebook, cybermoslem memiliki server yang berada di Indonesia. Sehingga serangan-serangan apapun bisa diketahui sejak dini, kemudian menyiapkan pertahanan dan benteng yang handal dan kuat, agar serangan semacam DDoS tidak terulang kembali. Serangan apapun terhadap jejaring, bentengpertama dalam pertahanan di garda server. Jika servernya kuat dan handal, insya Allah semuanya lancar-lancar.

Serangan susulan bisa saja dan akan terjadi, tetapi dengan server berada di Indonesia, serangan tersebut tidak akan sampai melumpuhkan cybermoslem, sehingga bernasib sama seperti millatfacebook.com.

Penulis tidak akan membuat andaian siapa yang menyerang. Tetapi yang jelas, adalah pihak yang dirugikan atau yang akan dirugikan. Siapa pihak yang dirugikan dengan adanya cybermoslem, penulis memberikan “gambaran kemungkinan” ciri-cirinya, sebagai berikut :

  1. Web jejaring sosial yang memegang mainstream di Indonesia, dengan jumlah pengguna sekarang inimencapai sekitar 500 juta di seluruh dunia. Jejaring ini merasa sudah memiliki Indonesia, sudah mendakwa menjadi penyantun melalui kerjasama dengan beberapa penyedia layanan telekomunikasi yaitu dengan penyediaan “akses gratis” bagi pelanggannya.
  2. Adanya serangan dari pihak yang tidak suka ada nama jejaring berlabel “Islam” atau “Moslem”menjadi populer, apalagi memiliki potensi mengalahkan mainstream yang sudah ada. Adanya cybermoslem, besar atau kecil akan mulai membersihkan label umat Islam yang sekarang ini seakan menjadi sarang teroris. Cybermoslem menjelaskan kepada dunia bahwa umat Islam juga sebenarnya mampu dan bisa menjadi pelopor bagipersahabatan dan dengan gaya hidup Teknologi Informasi, berbaur bersama semua orang dari berbagai negara, ras dan agama, dengan menjunjung nilai perdamaian dan kemanusiaan. Dengah kata lain, serangan terhadap cybermoslem ini, adalah serangan terhadap nilai kemanusiaan dalam diri cybermoslem, yang jelas-jelas bermaksud damai dan santun serta beradab membuka silaturrohim dan persahabatan bersama berbagai jenis umat manusia di bumi ini.

Penulis tidak menyebut bahwa penyerang adalah “musuh Islam” walaupun semua jejaring yang diserang adalah didirikan dan terutama untuk umat Islam. Mereka lebih cenderung sebagai uji coba ketahanan dan reaksi atas hadirnya cybermoslem yang menggemuruh.

Bagi kita orang Indonesia, kita wajib berbangga dengan kerja saudara kita Dola Indra Putra Agam, yng sudah sedemikian hebat membuat jejaring sosial sendiri, untuk dipersembahkan bagi bumi pertiwi Indonesia dan umat Islam dunia. Jejaring yang berkode Joomla ini bebas dipergunakan oleh siapapun.

Mempertimbangkan akan adanya serangan-serangan berikutnya, harapan penulis, melalui tulisan ini, nantinya ada tokoh nasional Indonesia, baik dari kalangan pemerintahan, maupun Non Government Organisation (NGO) bisa segera memberikan dukungan moral dan material bagi kelangsungan cybermoslem, jejaring kebanggaan Indonesia, sehingga cybermoslem bisa menjadi number one di Indonesia, mengalahkan jejaring produk import luar negeri.

sumber :

http://sn.cybermoslem.net/blogs/viewstory/163

http://id.wikipedia.org/wiki/Serangan_DoS


          Î•ÎºÏ„ίναξη “μαύρων αγορών” στο dark web        


Αρκετά site διακίνησης παράνομων προϊόντων είδαν να αυξάνονται οι αγοραπωλησίες από επισκέπτες τους, μετά το κλείσιμο των AlphaBay και Hansa από τις διωκτικές αρχές.
Αυτό δείχνει έρευνα του BBC, σύμφωνα με την οποία την τελευταία εβδομάδα του Ιουλίου, σε εναλλακτικές “μαύρες αγορές” αυξήθηκε έως και κατά 28% ο αριθμός των αγγελιών.

Τα AlphaBay και Hansa τέθηκαν εκτός λειτουργίας το τελευταίο 10ήμερο του Ιουλίου, έπειτα από έρευνες που διεξήχθησαν από την Europol, το FBI, την αμερικανική Υπηρεσία Δίωξης Ναρκωτικών (DEA) και την ολλανδική αστυνομία. Μάλιστα, η ολλανδική αστυνομία εέχει πάρει υπό τον έλεγχό της το Hansa ένα μήνα νωρίτερα, διατηρώντας το σε λειτουργία για το υπόλοιπο χρονικό διάστημα, ώστε να παρακολουθήσει εν κρυπτώ τις εγκληματικές δραστηριότητες που διεξάγονταν μέσω της πλατφόρμας.

Πάντως, αν και ενισχύθηκαν ορισμένα από τα υπόλοιπα marketplaces, οι πωλήσεις μερικών προϊόντων παρουσιάζουν μείωση. “Υπάρχουν αποδείξεις ότι όταν κλείνει στο dark web ένα marketplace πώλησης παράνομων προϊόντων, τότε ένα μέρος των παράνομων δραστηριοτήτων μεταφέρεται σε άλλες online αγορές, που παραμένουν σε λειτουργία”, σημειώνει ο Elad Ben-Meir από την ισραηλινή εταιρεία κυβερνοασφάλειας Cyberint, η οποία πραγματοποίησε την έρευνα για λογαριασμό του BBC.

“Ωστόσο, υπάρχουν επίσης αποδείξεις ότι οι αλλεπάλληλες επιχειρήσεις των διεθνών διωκτικών αρχών έχουν ως αποτέλεσμα οι διακινητές παράνομων προϊόντων να εγκαταλείπουν τα σάιτ που πουλούν όπλα ή παιδική πορνογραφία”


 [via]

          Anonymous Greece:«Έσπασαν» το Τούρκικο Google Translate        

Συνεχίζεται με αμείωτους ρυθμούς ο cyber war Î¼ÎµÏ„αξύ Ελλήνων και Τούρκων χάκερ όταν πριν από ένα μήνα περίπου ομάδα Τούρκων «έριξαν» την σελίδα της Ελληνικής Πρωθυπουργίας. Η απάντηση ήρθε απ’ την μεριά των Ελλήνων Anonymous με τον πιο δυνατό τρόπο.



Στη νέα επίθεση των Anonymous Greece  ÏƒÏ„όχος ήταν το Google Translate της Τουρκίας όπου και ανάρτησαν το ακόλουθο μήνυμα:
« Η Τουρκία ήταν πρώτη. Είναι ώρα να σας κυνηγήσουμε.  Δεν έχουμε πρόβλημα με τους Τούρκους.  Το πρόβλημα είναι με την ελεεινή κυβέρνησή σας η οποία προφανώς βοηθά τον ISIS και φυσικά τις ομάδες των χάκερς σας που δεν ξέρουν πώς να χακάρουν σωστά συστήματα.  Είναι ώρα να ξεκινήσουμε την επιχείρηση η Τουρκία σε Blackout. Όλοι οι τηλεοπτικοί σταθμοί και τα Αεροδρόμιά σας και οι επιχειρήσεις σας θα καταστραφούν».

Σύμφωνα με τα όσα αναφέρουν οι Anonymous Greece η επίθεση στο Translate της Τουρκίας – το οποίο ακόμα και αυτή τη στιγμή παραμένει πεσμένο- ήταν μόνο η αρχή.

[via]
          USA's Mr. Robot's Revolution will be Televised. But You Still Should Not Watch It.        

This week’s episode of USA’s Mr. Robot saw the computer-hacker, techno-geek drama finally get over its mid-season identity crisis, and get back to its obvious intended purpose: glorifying cyber revolution for the purpose of mass income redistribution.


          Comment on Koliko posao shvatate lično? by Preporuke na zanimljive i korisne tekstove koji su mi se svidjeli - Cyber Bosanka        
[…] Nikola Pećko Pivo u svom tekstu pita koliko posao shvatamo lično. Pročitam i zamislim se jer on pita da li bismo prije prihvatili posao iz snova u firmi koju ne volimo ili manje atraktivan posao u firmi koja nam se sviđa? Ja se sa Nikolom slažem 100% – nikad ne bih mogla raditi u firmi koja ne odražava moje ideje i stavove i to mnogi ne razumiju, ali svi smo različiti i imamo pravo izbora, zar ne? Ali eto, možda i vama bude zanimljivo da razmislite, pa pogledajte njegov tekst na http://peckopivo.com/2016/11/01/koliko-posao-shvatate-licno/ […]
          Bagaimana Saya Hilangkan Jerawat dan Parut Jerawat - BERKESAN!        
Salam semua...


Wanie belanja sikit gambar ye.


1.  Gambar first - nampak macam takde apa-apa sangat kan? Tapi sebenarnya ada banyak macam jerawat batu, yang degil tak nak keluar tu. 

2.  Gambar kedua - wanie ada amalkan supplement dan terus bertukar kepada natural skincare. Jerawat-jerawat yang terpendam tu, semua keluar dan start masak. Muka pun dah macam merah-merah udang bakar. 

3. Gambar ketiga (bawah) - lepas semua jerawat dah keluar. time ni dalam healing crisis lagi.

4. Gambar keempat dan yang terkini - yang tinggal ganya parut-parut lama dan open pores sahaja untuk dirawat.


Tipulah kan kalau nak tunjuk muka terus flawless sampai tak ada apa kesan langsung. Yang tu kalau pakai berus tembaga + clorox ke, kut lah kan.. mihmihmih...


Apa supplement yang wanie makan dan apa product skincare yang wanie guna?


PRAVENTAC dan AG FACTOR!! - wanie penah review pasal both supplement ni dalam entry http://houseofwanie.blogspot.com/2016/06/review-praventac-and-ag-factor.html 


OK, for skincare product... meh wanie listkan...


1. Orique Cleanser + Babyskin LembutbyAdlina



2. Toner by Orique


3. Day and night serum - Orique Ultra Peptide and Comeminus



4. Moisturizer  - Flawless Gel LembutbyAdlina and Orique Xerominus 

 


5. Acne cream - to combat existing acnes



6.  Weekly mask (to exfoliate dead skin cell) - Mocha Honey Mask by LembutbyAdlina



Haa.. setiap satu wanie senaraikan untuk korang so korang tak miss satu pun. 

 Sekarang ni, hanya Orique dan Lembut sahaja wanie gunakan. Wanie dah try macam-macam dan dah habis beribu-ribu, contohnya Eskay-tu , Garn***, Lor***, Saf*, product yang start dengan De-de tu.... just makin worse wanie rasa. So, wanie stop semuaaaaaa tu dan back to natural product. 

Kang ada orang tanya, apesal wanie cuci muka, guna moisturizer, ada 2 jenis... orique dan Lembut? 

Yes, wanie guna both. Haruzzzlahhh sebab penjimatan duit! Hahahahah... korang ingat murahhhh ke. Bahahaha~ Tapi yang penting, BERKESAN! Contohnya la kan, Cleanser Orique tu harga RM 80 (last up to 3 month), Babyskin Lembut tu RM 35 (last up to 6 month). See the difference? Hahahah~ nak maintain supplement lagi sebulan RM 500 oii.. cik abam tak sayang lagi, aku tak tau lahh~ hahaha



LEMBUT BY ADLINA

Produk keluaran Bumiputra yang setanding dengan produk lain. Hanya menggunakan bahan-bahan semulajadi dan natural dan tidak berbahaya kalau termakan! Macam Mocha Honey Mask yang consist of coffee, chocolate and honey - banyak kali dah wanie ter'ngap' ... sedap! Hahhaha~ 

Kesan yang serta merta (skin lembut dan moist toing toing). Penggunaan yang berkala, boleh dapat kesan macam wanie. 


Nanti wanie bukak satu post khas untuk produk Lembut by Adlina, wanie explain in detail (I will never post/suggest anything if I haven't try it for couple of months to see the difference). Anyway, wanie stokis di Putrajaya (which cover in Cyberjaya and Bangi as well). And of course Lembut is sooooooooooo awesome sampai wanie jadi stokis.


Kalau korang nak stalk stalk dulu, boleh visit IG dan FB wanie :




          Resepi Masak Kicap Daging Simple        
Siaran langsung dari HPE Office, Cyberjaya... cisss kena keja pulak harini. Hahahaha~ over macam tak biasa keje weekend pulak.. takde user ni, tu yang ada time nak update blog.. rajin la pulak. :-P


Kali ni nak post pasal semalam, Sabtu, saje masak for lunch. Nak abiskan stok dalam peti ais, pastu lama tak berkelah dengan tunang tersayang gittewww.. mula-mula, dia request masakkan Daging Masak Asam favourite dia tu, tapi tak terasa pulak nak makan style tu, jadi wanie cakap nak buat masak kicap je sebab simple. Tunang jenis ok kan aje walaupun sentap.. So semalam, elok je dia makan, HAAAAAAA kauuuu... non stop! Dia cakap sedap, suka masak kicap yang macam ni! Macam mana ape.. macam biasa lah.. hahaha~ tunang cakap nanti nak lagi, wanie balas berehhhh je janji pegi restock barang dapur.


OK lah.. nak share resepinye. Memang senang, main campak je. Nak upload kat blog sebab lepas ni nak suruh tunang belajar masak. Boleh kite pulak yang tunggu cedok nasik je kan.. hihihih~


Bahan-bahannya

  • Daging (potong kecil-kecil) 
  • Sedikit halia (besar hujung jari kelingking) dan dihiris memanjang
  • Cili besar dipotong menyerong - sebatang
  • Bawang Holland - 1 biji
  • Garam
  • Gula
  • 1 sudu besar sos tiram
  • 1 sudu kecil stok ayam
  • 1 sudu kecil cukup rasa Maggi
  • Minyak masak
  • Kicap (wanie guna kicap Adabi Lemak Manis)
  • Sedikit air



Cara-caranya


  • Gaulkan daging dengan garam, kunyit dan cukup rasa
  • Panaskan minyak dan goreng daging. Biar sampai air daging tu keluar dan agak-agak nak kering, masukkan halia, bawang dan cili besar. Kacau-kacau sampai naik bau.
  • Bila daging dah hampir masak, masukkan sos tiram dan stok ayam. Kacau sebentar dan masukkan air serta kicap. Air jangan banyak sangat, nanti cair.
  • Perasakan dengan sedikit garam dan gula jika suka (biasanya tak payah dah, sebab manis kicap dan masin daripada stok ayam dan sos tiram tu dah memadai - tapi terpulang citarasa masing-masing)
  • Siappppp!

          Joseph Nye delivers major paper on cybersecurity, "Deterrence and Dissuasion in Cyberspace"         

Joseph S. Nye, the University Distinguished Service Professor at Harvard, has a major paper in the MIT Press Journal,  Winter 2016-2017,  â€œDeterrence and Dissuasion in Cyberspace”, with access link to the 71-page PDF here (free).

Nye discusses for major strategies: (1) Punishment or retaliation (2) denial or defense (3) entanglement (4) taboos or norms.   Some of his scenarios refer to LOAC, or the Laws of Armed Conflict.



Nye mentions the possibility of threats to power girds, and doubts that they can be fully prevented by “air gaps” between grid or infrastructure pieces and the public Internet

He mentions the importance of rogue states or non-state actors.  One of his concepts, of norms, would preclude attacks on targets that have civilian use only (this might include political parties). Yet that seems to be the point of attacks by entities like North Korea, or some hackers motivated by ransomware (often in Russia or former Soviet components), or radical Islamists who resent modernism.   North Korea attacked a corporate entity outside its borders, Sony Pictures, in the US, for mocking its leader.  It seems as though a sufficiently radical and nihilistic actor could be motivated by asymmetric targeting of individual speakers in the US or other western countries just to prove it could wreak havoc with all parties associated with a particularly provocative person or private business.


          Astroturfing – nowa broń w polityce? | Cyberbomba w trawie        
Masowym protestom w obronie sądów towarzyszyła wojna informacyjna w sieci. Z najgłośniejszą, ale nieudolną próbą przeciągnięcia opinii publicznej na stronę rządu – odwołaniem się do astroturfingu.
          Cyber Security for the Small Business        

Cyber Security Month October is Cyber Security Month. If your company uses any kind of computers, cell phones, networks, software, etc. to go about its business, then this month applies to what you do day in and day out. Having these technologies makes our lives more advanced and efficient but they also leave us open […]

The post Cyber Security for the Small Business appeared first on Blog: News & Legal Articles from Our Team.


          Interface deal good for the industry         
08/09/2017

The $600 million Interface Security Systems deal has sent—as The Beach Boys once sang—“good vibrations” throughout the security industry, as it provides not only a vote of confidence for what Interface is doing as a modern systems integration company, but also a vote of confidence in the security industry, in general, as companies like Interface represent a new breed of integrator that is staying at the forefront of new technology and innovation.

John E. Mack III, executive vice president, co-head of investment banking and mergers & acquisitions at Imperial Capital, which acted as financial advisor to Interface on the deal, astutely pointed out that this deal goes beyond validation of what Interface is doing in the space.

“This is a very cool story for the sophisticated new-age security provider, which is what Interface is—the 2.0 version of what the right kind of security player should be,” he told Security Systems News. “We spend so much time in this industry talking about the residential side of the business, which is interesting, but there is a massive opportunity on the commercial side of the business that Interface is tapping into that I think is a compelling theme.”

He continued, “There is a lot of validation for a very successful business model here that Prudential is putting up $180 million of new capital, and SunTx is putting up additional capital into the deal. And that you’ve got a very attractive set of debt investors, and just the fundamental backing for the business, is a meaningful part of a positive message for the industry.”

Jeff Frye, SVP for Interface, told SSN that the support from equity partners is not only a stamp of approval for what the company is doing, but the “capital gives us more fuel to build on our current, better than 15 percent compounded annual growth rate, so we know that we can do more with a little more gas in the tank and we are anxious to prove it.”

Frye noted that the equity will allow the company to expand its products and services around providing business intelligence, as security is becoming so much more than just, well, security.

“As a network provider, and a managed services provider of network services and cybersecurity services, we touch a lot of aspects of our customers’ businesses,” Frye explained. “And as a leading purveyor of Internet of Things services, we are able to aggregate intelligence from all of those sensors and data sources to bring actionable insights to a customer’s business. There are some new verticals that we would like to focus on more, including financial services and banking, so this makes that horizon much brighter and much more approachable.”

And it also makes the security industry’s horizon a little brighter.


          Ships fooled in GPS spoofing attack suggest Russian cyberweapon        
A hack that manipulated the location of 20 ships in the Black Sea may be the first use of GPS spoofing, a form of cyberwarfare capable of widespread disruption
          lunaria / tvvin_pinez_m4all        

lunaria ~ all is dream (sounds of the dawn, 2016)

Second tape release at Sounds of The Dawn brings to the world a new masterpiece in the new age genre - an it's only a debut album, recorded by Daniel - a member of our blog's team. Listening to this tape is an immersion into the state of heightened sensitivity, when everything becomes brighter and clearer. It may sound as a cliche when it comes to ambient new age music, but I'm too assured in the fact that actually any music can do that if it has sincerity. There are nothing supernatural about the impact which music can do on our minds and we don't need scientific proofs for that - just an open-minded listening, which leaves analysis and criticism beyond the perception. Blissful tones of this music is a soft contradiction to the modern pop-music with its aggressive production. One may call it escapism, but then one should ask himself - where are you escaping when listening to radio hits? What is real? Which reality is true and everlasting, and which is just temporary construct of humanity's greed? Nature is all around us, but we mostly ignore it, building our own realities, first concrete and metal, then virtual... But when I go with this though further, while bathing in the crystal clear melodies and chimes of Lunaria, I realise that answer is already here - literally. On the tape cover. It says "all is dream" and duality of the meaning of the word "dream" makes the answer even clearer. There is no escapism. Global civilization, the Humankind, even Cyberspace - everything is Nature, part of our planet's evolutionary process. And this whole process is just a part of universal dream. Who dreams it? We all do, and by doing that we can make all kinds of things... And we do them, many different things, not always pleasant - saying "what the difference?". But when someone makes music like this, when someone listens to it and it makes one's dream a bit brighter and lucid - I can be only happy. And it makes a difference.

listen ~ buy tape ~ buy cd
 

tvvin_pinez_m4all ~ 植物波 [ p l a n t w a v e ] (adhesive sounds, 2016)

Colorful, growing plants are the key to livening up any interior décor. 

During the course of last year or two vaporwave has become much more structured genre, than it was at the beginning. To tell the truth, it was more like a joke, than a "real music" and some people still think that way. But even superficial acquaintance with everything vapowave-themed on Bandcamp brings so many sub-genres and variations, that no joke can have. Being 100% product of postmodernism, this music recycles long-forgotten tunes, giving them another perspective in the massive retromania, which overfilled music market nowadays. And by doing that, vaporwave shifts the perception towards images and situations that actually never existed. If you old enough to remember early 90s, you can feel the similarity in atmosphere and aesthetics, but there are still too many differences, which makes vaporwave-induced nostalgia no more than a postmodernist trick. And it tells a lot about the way we remember, think and perceive. Take this tape - typical, I'd even say classical vapowave album full of slowed disco tunes, ambient passages and late 80s new age reminiscences - but still none of these things in sum. It reminds me making collages of old magazines - you can put together some random parts from your mom's old knitting magazine, modern National Geographic and some last year's newspaper. Of course, you get some new picture, but what is more important - this picture transcends time, it brings everything in present moment, making it joyful. So what's the difference between music for plants, recorded by 80's new age artists and this tape? Only time - which is just an instrument for the artist, a way to make perspective, to give us a hint on our own head interior. Do you have any living plants there? I bet they'll love this tape, because it sounds damn chill and relaxing.

listen ~ support

          dugout canoe ~ over unity        

dugout canoe ~ over unity (self-released, 2016)

«A 54 minute tapestry of transcendental motifs caterwauling fizzy manifestations hurled forth from the Unified Field. Professionally dubbed and duplicated blue-green glitter tape with printed art and full color J-card in a soft poly case». dugout canoe

Imagine Terry Riley playing some old video game and realizing that instead of actually playing it, he can play music with it. So he starts pushing all those buttons in a manner he does with electronic organ and the game becomes more and more chaotic, yet doesn't want to end anyway. At some point game gains awareness and transcends its own code, achieving digital enlightenment and disappearing from the physical plan... Now you get an idea how this tapes sounds, with the only difference that instead of Terry there is Jacob Isaacs behind the wheel and you may heard his tunes already in Bridgetown Records catalogue. Speed is really high, so all your attempts to analyse this music are doomed to vanish in abundance of 8-bit tunes, voice samples and rumbling drones somewhere deep beneath all of this. It may seem pretty hard-core, but actually this music has certain New Age and bright futuristic feeling about it, sounding like dynamic Osho meditation for cybernetic mind or minimal techno party for androids on the loose. Take Kara-Lis Coverdale and Giant Claw, let them dance, smoke few joints and flirt (only musically speaking, of course) and you'll get "Over Unity" in result. 

listen ~ buy tape 

PS: By the way, one of this album's perks is the fact that you can listen to it from any point, it works perfectly from any tape position and at any player / volume / speakers / headphones, etc. Just amazing! 


          Scientists invent Neural Lace        
Scientists have invented a flexible electronic mesh which can be injected into the brain of a mouse. Once injected the mesh unfurls and meshes with the mouse's brain. Neural nets of this kind have appeared in such famous works as William Gibson's Neuromancer, Larry Niven's Known Space and Episode 41 of the 1986 cartoon series The Centurions
          "Università futura" tour (fase 2)        
Dopo i primi tre incontri a Roma (CRS), Boston (Harvard) e Torino (Unione Culturale), oggi 4 aprile alle ore 17:00 discuteremo di "Università futura" al Politecnico di Torino, sala di lettura della Biblioteca Centrale di Ingegneria (v. qui l'annuncio). I relatori saranno i colleghi Marco Masoero, Carlo Olmo, Giovanni Durbiano, Mario Calderini e Aldo Tommasin.

Domani 5 aprile alle ore 17:30, in aula 7, si replica ma questa volta con gli studenti del Politecnico, tra cui Marco Rondina e Andrea Torti.

Giovedì 6 aprile alle ore 17:00, invece, all'Istituto Svizzero di Roma con, tra gli altri, la Ministro Fedeli e il suo omologo svizzero, qui il programma.

Infine a Perugia alle ore 12, con Pier Luigi Sacco, nel contesto del Festival Internazionale del Giornalismo.

          La presentazione di "Università futura" a Harvard        
Martedì 28 febbraio ho avuto il piacere di presentare alcuni dei punti principali di "Università futura" a Harvard, nel contesto dei "luncheon talk" del Berkman Klein Center for Internet & Society. Il titolo dell'incontro era "Five Global Challenges and the Role of University". Al mio fianco, il prof. Charles Nesson, fondatore del Berkman Center; "Università futura" è dedicato a lui (oltre che al prof. Angelo Raffaele Meo).


          Cyber-attaque mondiale: 7 pays africains mieux protégés que l’Espagne et le Portugal        
Cyber-attaque mondiale: 7 pays africains mieux protégés que l’Espagne et le Portugal Au moment où des milliers d’ordinateurs sont pris en otage dans une attaque d’envergure mondiale, les regards se tournent surtout vers les pays occidentaux. Même si les Africains ne sont pas épargnés, certains d’entre eux semblent mieux protégés selon l’Union internationale des télécoms […]
          Small Business Saturday to Boost Indie Retailers' Holiday Sales        
Small Business Saturday to Boost Indie Retailers' Holiday Sales

With the holiday season rapidly approaching, more small business owners—including those in the beauty industry—are making Small Business Saturday an integral factor in their sales plans.

Small Business Saturday falls between Black Friday and Cyber Monday, and serves as the traditional kickoff to the holiday-shopping season for independent retailers and restaurateurs. The day was created in response to small business owners' most pressing need: more customers.

Forty-six percent of independent merchants plan to incorporate Small Business Saturday as part of their holiday strategy—and the majority of them say they will offer discounts on Nov. 24, according to the inaugural Small Business Saturday Insights Survey, recently released by the National Federation of Independent Business and American Express. 



Of those small business owners who plan to promote Small Business Saturday, 80% expect a year-over-year boost in sales on that day.

Discounts and special offers are among the key incentives to drive consumers to "Shop Small."

“Research has shown that American consumers have a deep trust in and admiration for the small business community," says NFIB CEO Dan Danner. "Small Business Saturday gives them a chance to show their appreciation—and help America’s essential job creators in a very real way—by patronizing small shops, restaurants and service providers. And anything that helps with sales is certainly appreciated by small business owners, many of whom have struggled to stay afloat in a rough and uncertain economy.”

There are a number of ways that small business owners plan to take advantage of the day. The survey reports:

  • 46% will create coupons for future offers or discounts
  • 25% will offer free gift wrapping
  • 23% will giveaway prizes or hosts contests
  • 20% will give away free items with purchases

Other survey findings include:

  • 87% will be active in social-media channels to promote Small Business Saturday
  • 34% say Small Business Saturday is the most important shopping day during the holiday season—more important than Black Friday or Cyber Monday
  • 28% intend to increase the number of employees who will work on Small Business Saturday

“In just three years, Small Business Saturday went from an idea to help [small businesses] find more customers to a permanent fixture on the holiday-shopping calendar,” adds Susan Sobbott, president of American Express OPEN. “According to the research, we are seeing the small business community take ownership of the day and make it their own.”

For the third year in a row, American Express is offering a merchant toolkit to help small businesses.

For the second consecutive year, FedEx gave away $1 million worth of American Express Shop Small Gift Cards—each worth $25—to consumers via Facebook.

[Image courtesy of Thinkstock/Comstock]


          Best Free Cell Phone Spy Software        

Best Free Cell Phone Spy Software As the reliance on cellular technology has increased, the level of insecurities and cyber crimes has also been on the rise. For those who wish to keep a tab on the overall activities of their wards or partners as well as professional employees are highly recommended to resort to […]

The post Best Free Cell Phone Spy Software appeared first on .


          Cell Phone Spy Software Call Recording With The Support Of Spy Software        

Целл Пхоне Спи Софтваре Позив за снимање, уз подршку Спи софтвер за етичко праћење и ћелијску хаковања,en, there are several active software applications that have been established which in a way support the urgent needs of service users. If you are a parent then you are bound to be familiar with cases of cyber […]

The post Cell Phone Spy Software Call Recording With The Support Of Spy Software appeared first on .


          Webinar: Maximize Omnichannel and Defend Cyber Attacks @incite_social        
The recent ransomware outbreak has left marketers vulnerable and concerned. With the increase in marketing campaigns across a variety of channels, achieving an integrated, seamless experience across multiple touchpoints involves...
          DOJ announces takedown of Dark Web market where Utah teens obtained fatal doses of synthetic drug        
By Tal Kopan WASHINGTON — The Department of Justice and its international partners announced Thursday a takedown of a massive Dark Web marketplace that was allegedly one of the world’s biggest sources for the sale of drugs and illicit materials, striking a blow to the cybercriminal underground. In shutting down AlphaBay and arresting its alleged founder, Alexandre Cazes, the Justice Department also is going after the assets of Cazes, who is charged with running the sophisticated anonymous market and was […]
          First Lines of New Acquisitions        

There are many new acquisitions for Spring 2014, mostly from the Robert Smithson Collection. Each new book and their first sentence is listed below, and starting with:
 
1.  The Language of Magic and Gardening by Bronislaw Malinowski:
   
The linguistic problem before the ethnographer is to give as full a presentation of language as of any other aspect of culture.

2.  Seven Types of Ambiguity by William Empson:

An ambiguity, in ordinary speech, means something very pronounced, and as a rule witty or deceitful.





3.  Changing: Essays in Art Criticism by Lucy Lippard: (seen above)

André Ferminier writes: “What has perhaps been most damaging to the art critic is the prodigious gobbledygook that with him takes the place of vocabulary; and the prefaces to exhibition catalogs in particular would provide a classic anthology of the art of saying nothing.”

4.  The Human Use of Human Beings: Cybernetics and Society by Norbert Wiener:

The beginning of the twentieth century marked more than the end of one hundred-year period and the start of another.



5.  Logic Machines & Diagrams by Martin Gardner: (seen above)

A logic machine is a device, electrical or mechanical, designed specifically for solving problems in formal logic.
 


6.  Field Book of Ponds and Streams by Ann Haven Morgan: (seen above)

Minnows and frogs and brown water beetles, scurrying to cover as we approach the shore of a still clear pond, show us that the water has some very lively inhabitants.

7.  The Modern Technique of Rock Blasting by U. Langefors and B. Kihlström:

Within some thousandths of a second after the initiation of the explosive there occurs in a charged hole a series of events which, in drama and violence, have few equivalents in civil technology.



8.   The Message of the Stars by Max and Augusta Heindel: (seen above, outside + next to its dust jacket)

It is a matter of common knowledge among mystics that the evolutionary career of mankind is indissolubly bound up with the divine hierarchies who rule the planets and the signs of the Zodiac, and that the passage of the Sun and the planets through the twelve signs of the Zodiac, marks man’s progress in time and in space.




9.  Field Book of Seashore Life by Roy Waldo Miner: (seen above and with Message of the Stars)

Protozoa are single-celled animals.


10.  Tropical Trees of Hawaii by Dorothy and Bob Hargreaves: (seen above)

High among the list of reasons people love to visit Hawaii is the lovely tropical foliage to be enjoyed everywhere and at all times of the year.
 
11.  Geography Made Easy by Jedidiah Morse: (from the Maria Mitchell Library)

Geography is a science, which describes the figure, motion, magnitude, and component parts of the earth; the situations, extent, and appearances of the various parts of its surface; its productions animal and vegetable; its natural and political divisions; and the history, manners, customs, and religion of its inhabitants.

For any questions about the Library, Collections or books, please contact the Librarian at personallibraries{at}gmail{dot}com. 

          Fake News        
5FM — Nick Hamman chats about #FakeNews, whho's responsible and what are we doing about it. Guests on the panel include: Verashni Pillay (Editor in Chief at Huffington Post SA), Brigadier Piet Pieterse (Section Head, of the cyber crime unit at The Hawks), and Verlie Oosthuizen (Social Media Attorney and Partner at Shepstone & Wylie)
          Weight Inward into Lightness: A Reading of Canoe Repair        
by
Flore Chevaillier
2004-08-19

“Canoe Repair” takes place at a transitional time for the main character. Zanes moves from New York City to a New Hampshire town and has to adapt to a new life and a new job, running a Laundromat, as well as to his son’s new hang-gliding activity and his wife’s new TV job. Thus, “Canoe Repair” occurs at a moment when rural and urban worlds are put in “connection and disconnection at the same time” (“Midcourse Corrections” 50). While we learn more about Zanes’ occupations, we also read a portrait of the town’s life. We discover a picture of America and its smell of “coffee richly dripping and poppy-seed-blue corn muffins” (69). We read Zanes’ discussions with “Seemyon Stitching … a spring immigrant from Byelorussia and a trained marathon runner” (62), and find out about the “president’s eight o’clock message to the nation” they listen to when “no one among the machine-users seemed to be waiting for the president’s speech” (72). The story deals with the movements of people from the town who use the Laundromat and the movements of the canoe on the lake, as well as the hang-gliding and the weather.

One might describe the events in these terms. But the story is also a reflection on time and on strange, everyday moments in one’s life. “Canoe Repair” presents a section of a man’s life, also a canoe’s, since its repair is at the center of the story’s multiple directions, its focus on space and movement. The story is a space where different tensions meet. It shows the strain between two worlds, two generations, between different experiences of time and perception, and between two voices telling the story. “Betweenness” is central in McElroy’s writing. In “Canoe Repair,” “ ‘Betweenness’ is… the crumbling edge of the interface of worlds, selves, and situations” (Saltzman 100). Betweenness is also at stake when we consider “Midcourse Corrections,” an unusual autobiographical interview/essay ended by “Canoe Repair.”

“Is a canoe too beautiful to be funny unless somebody falls out of it?” asks Joseph McElroy in “Midcourse Corrections” - “falls out, tipping it over? Put two people in it facing forward. What’s the stern paddler see? What’s the bow paddler feel? - for the stern paddler?”(42).

These questions about canoe uses are put into practice in McElroy’s short story, independent but part of the essay, as he explains. “Some of the material in ‘Midcourse Corrections’ could be said to turn into ‘Canoe Repair’… I wanted to use ‘Canoe Repair’ to fulfill ‘Midcourse Corrections,’ that peculiar interview memoir … that should turn into fiction at the end.” Personal correspondence with the author, June 16, 2001.

“Corrections” is itself an experiment in literary form that in many ways epitomizes the body of McElroy’s writing. “With its inserted interviews, its odd proportions, and its highly colored perspectives of me,” McElroy writes in a letter, “[‘Corrections’] is a hybrid fiction, I suppose. A daydream posing as a document.” (cited in Tabbi 156)

The thematic and structural research of this “hybrid fiction” turns into practical experience in “Canoe Repair.” The author’s reflections upon space, motion, and perception connect to the movement of the boat on water because the “canoe becomes an occasion to think.” Personal correspondence with the author, February 6, 2003. We can approach the story from different angles due to the openness of its particular structure linking it to the essay, of which it is also the unusual closing part. Nevertheless, it would be unfair to consider the story strictly as a conclusion to “Midcourse Corrections;” it has its own structure, dynamics, and meaning. It is a complex and intense story because of the multiple tensions we can feel in its narration.

To understand “Canoe Repair,” we have to focus on the transient aspect of Zanes’ life and its relation to tensions that appear both thematically and structurally. The text is literally at the end of the “Midcourse Corrections” but metaphorically “in between.” It connects to “Midcourse Corrections” but is autonomous. Moreover, it plays strangely with the reader’s expectations. It is organized around a double voice that disturbs the reader’s traditional way of reading. The reading, because of structural devices that put us “in between,” becomes the experience of the transition moment Zanes goes through, his shift from one world to another, his perception of the world.

Zanes’ visions can sometimes be confusing. Hence, some aspects of the story can be destabilizing to the reader. The story starts with a family scene: Zanes and his son are watching the river. A strange canoe used by a black man and a blond woman catches their attention. Zanes’ neighbor calls him afterward to fix the canoe for the blond woman’s son; the canoe captures Zanes’ attention throughout the rest of the story. Parallel to Zanes’ work on the canoe, we learn about his arguments with his son regarding the latter’s hang-gliding practice. We also get to know more about the life that goes on at the Laundromat where Zanes meets with Seemyon Stytchin and a group of young punks that disturb the community. Zanes starts a friendship with Lung, a member of this group. However, this summary contradicts the story’s original presentation of Zanes’ world because it reassembles what is purposefully fragmented in “Canoe Repair.” We only achieve this vision of the story retrospectively because it is not told linearly.

Our expectations as readers are challenged, as David Porush notes when associating the technique of “de-automatization” provoked by the unsettling language of McElroy’s novel Plus. Plus ’ main character Imp Plus is a brain detached from its body and put in orbit to communicate with earth during a scientific experiment. When relearning ways to communicate, Imp Plus uses language unusually. Therefore, the reader is forced to see words in a different way. Imp Plus presents a new use of words that questions the systems we automatically refer to when using language. In “Canoe Repair,” the challenge to our automatisms lies in the distortions that affect the structure of the story. The compact paragraphs of “Canoe Repair” are juxtaposed without transitions. When turning to a dialogue, McElroy does not use rules of quotation to let the reader know that the viewpoint is changing. Tabbi claims that for McElroy “the mental text … does not precede the work at all but exists instead in the work, where the reader might imaginatively participate in the compositional or self-creative effort that went into the life/work’s composition” (158). The activity of the reader is thus part of the structure of the short story. Disjunction calls up the reader’s activity of representation. It asks us to create a coherent image of the narrative, a coherent text. Omitting the relation between two events leaves room for the reader to fill in the blanks. This crafted incompleteness creates the structure of “Canoe Repair.” Facts have more than one logical order; the reader coordinates elements by analyzing fragments.

Thus, the reader organizes the very space of the text. We shift, for example, from “When he took his canoe out, Zanes also thought,” to “The ideas knew how to get away sometimes” in the next paragraph (59). Reading “Zanes also thought,” the reader does not expect the sentence to stop at this point. S/he expects a complement to the verb “thought.” Therefore, reading “Canoe Repair” can be somewhat frustrating; the author even ironically refers to our unsatisfied expectation when we lack a transition between the two sentences. That is why, as Wolfgang Iser notes in The Implied Reader, we have to use imagination to compensate for the gaps. The context created by the sentence: “When he took his canoe out, Zanes also thought,” is destroyed so that the reader steps back and reflects upon the narrative as a work of art. “The artwork itself is represented as an artwork” (McHale 30). The reader finds metafictional allusions that suggest a fiction conscious of its fictionality, which makes the reader understand the story at another level of representation. These metafictional moments create a disjunction in addition to the fragmenting of the plot itself.

Each blank invites interpretation and coordination. Do the gaps become the theme of the narrative? When analyzing Modern texts such as Ulysses, Iser engages the issue of semantic richness and incoherence of gaps, moments of inconsistency, disruption, or omission. He sees reading as a process the reader undergoes to synthesize fragmented elements; the reader creates meaning.

The unconnected allusions and the abrupt alternation of stylistic devices disclose a large number of gaps … [that give] rise to the stimulating quality of the text. On the one hand, the density of allusions and the continual segmentation of style involve an incessant changing of perspectives, which seems to go out of control whenever the reader tries to pin them down; on the other hand, the gaps resulting from the cuts and abbreviations tempt the reader to fill them in. (Iser 213)

The structural breaks in “Canoe Repair” might be less extreme than those in Ulysses but, similarly, the gaps and omissions become part of the story’s theme, possibly denying thematic synthesis itself. Zanes’ fragmented thinking and his way of experiencing life are present in the style the author uses. The medium is often the message. The construction of sentences that might make us insecure reminds us that reading “Canoe Repair” is a special experience that enables us to coordinate elements of the story and thus penetrate Zanes’ mind and his somewhat eccentric thinking. The reader, by grasping multiplicity, references, and rambling elements, maps out what is happening in Zanes’ mind. The way things get originally connected structurally mirrors Zanes’ experience of the world that also reaches for unusual connections.

How do we find our bearings reading “Canoe Repair?” The narration resists linear order. It seems laminated into different sequences of the character’s life. Flashes are exposed with neither explanation nor transition. Joseph McElroy “never hid the gaps” (“Neural Neighborhoods” 204). Chronology is not respected; events follow a pattern of shifts from one subject to another, from one point of view to another, and everything seems important and unimportant at the same time. There is sometimes no link between consecutive sentences: “Was it my time device operating again?” and “A canoe is what makes you do” (77). Here, gaps interfere with our sense of the evolution of the story and the progression in the character’s life, if there is one. These gaps are caused mostly by the double narration of the story, and they are even more challenging to the reader. When we shift from, “Was it my time device operating again?” to “A canoe is what makes you do” (77), we shift from an “I” to an omniscient narrator. Zanes’ own perspective on his life is balanced by the omniscient narrator. To understand Zanes’ life, we need to be inside him and outside him. We need to know the world exterior to Zanes’ subjectivity to understand his reactions, hence the role of the omniscient voice.

The embedded structure of the story told by two narrators juxtaposes two sources of information. This construction enables the insertion of one perspective within another and it leads us to see Zanes’ life as an accumulation of fragments. Different perspectives provide distinct information about and approaches to the same life. Can the story be seen as a dialogue between these two poles? Unlike traditional narrations where the reader faces a set of events exposed in a linear way, “Canoe Repair” makes the reader feel the duality of life.

McElroy constructs a dynamic that can be paralleled with the theme of the double, often present in gothic stories. In these stories, the narrator and the character are the same person, although it is usually not clearly stated in the text. In “Canoe Repair,” there is, to some extent, a renewal of the theme of the double since our character has a double voice. The schizophrenic tensions represented by the strange vision of the double in the gothic stories appear in “Canoe Repair” in a somewhat different way. The strain between two voices can be understood as the representation of power over the development of the story.

First, the omniscient exterior narrator controls the story. Progressively, “I” becomes dominant. At the end, rapid shifts of viewpoint break up the story. The evolution of each viewpoint implicitly lets us gather details about the context of each narrator’s intervention. The constant shift form “I” to “he” changes the reader’s relation to the narrator because it implies a nonlinear way to gather information. Each narrator puts the reader into a frame of mind that influences interpretation. The shifting of frames makes the reader’s activity intense. When we change frames, we have to change our interpretation. How to base our understanding of the story on a specific context when the latter is always denatured?

The two narrators fragment the story, and they produce a repetitive pattern. Each of the narrators gives us details on the same moments of Zanes’ life. The double narration is thus based on the repetition of similar life sequences. The double narration allows repetition to penetrate the narrative. It is thanks to repetition that the reader can make sense of the story’s disconnected elements. The gaps that we apparently cannot coordinate - such as “Is there somebody over there? Zanes said. Probably, his son said” and “All but one of the machines were in use that evening”(72) - are so large that the only way the reader can assemble the fragments of the story is by focusing on the repetitive patterns that connect these partial perspectives. We constantly come across the same moments: the observation of the canoe, meetings between Zanes’ wife and the producer of her cooking show, scenes with Lung, discussions with Seemyon, and so on. The plot offers not so much progress as recurrence, duplication, and reiteration.

In our mind, those terms are usually connected to something monotonous. Yet in “Canoe Repair,” the iteration of words, ideas, and/or themes does not result in a redundant effect on reading. The first reference to “sunset” (56) is echoed by “[o]ne of them materialized at sunset” and “at sunset a window beamed” (57). Through repetition, meaning emerges. Repetition is not used to stop the progression of the plot: the elements of Zanes’ life are never told twice in exactly the same terms. The accumulation of repetitions creates an unusual meaning, a meaning understood through indirect means. Zanes refers to his own time: “my time device” (58), “another time” (61) as opposed to “my wife’s cookbook, my time machine” (69). Zanes’ experience of life does not rely on a chronological structure. When we accept repetition, we understand that time does not need to be seen as a linear progression.

Repetition lets us understand how Zanes organizes his life. The first and last moments of the story present similar scenes. “It was sunset and the boy was angry and wanted to be somewhere else” (56). Zanes and his son are outside watching the canoe for the first time. The first words of the story put the reader in the middle of a situation. The first character we meet is not Zanes but his son referred to as a “boy.” He could be anybody. In that sense, the story can be considered a statement about any family life, its structure, its implicit rules, and its repetitive patterns. The reference to “somewhere else” also puzzles the reader at the beginning of a story; we do not even know where the character is. At the end, we have circled back: “Above me, I felt the presence of my son at his window. If I didn’t take down the screens, it would soon be summer again” (78).

The end is paradoxical since it does not explain the story but at the same time concludes it through indirect means. The story ends on “again,” which alludes to an opening, a repetition of what we have read, maybe an allusion to the beginning if we think of the circularity of the repetitive pattern of the narration. On the other hand, the allusion to the coming summer ends with a period. Spring will soon be finished. We note here again the parallel between the first scene and the last one since the story opens on the ending of something, of a day. We are at a time when Zanes makes a pause in his life. His work on the canoe is what “makes [him] do” (77). His crafting the canoe changes aspects of his life, his relationship with his family and his community. The end of spring makes a kind of conclusion to the story but, at the same time, it opens the story toward a new time period. The conclusion and the opening lead us to different interpretations. We face some conflicting perception of time and closure. Depending on the type of time framework one has in mind, things can be open or closed; that is where the tension originates. The last and first scenes teach us to pay attention to how things are repeated in variation in the story. Both scenes point to a double direction. By examining this process, one understands that repetition is used to let one access Zanes’ subjective knowledge.

In the two scenes, the son and the father are both watching another place, an outsider place. They disagree on the hang-gliding activity. But this tension gets somewhat resolved at the end when they both look again in the same direction. An open conversation about this issue never appears in the story. Tensions are solved indirectly: “Is the leak like worry, no more than worry?” (75). The boat becomes the center of our attention; it is a place where Zanes’ concerns are to be projected and fixed too. The leak of the boat is associated with Zanes’ life: “When you left your job last year you were taking what you had and making it flow into a new system rather than holding onto what had been used. It would have leaked away if you had not made it move into a new system” (63). The canoe becomes a system of reference we share with Zanes to understand his life. The changes he goes through are projected into the repairing of the canoe, and thanks to the details of the crafting we understand the adjustments of his own life.

Connection is hidden where we cannot see it at first sight, where we do not expect it. For instance, a paragraph describing Zanes canoeing ends, “A wind was coming up, and I heard a breathing sound of paddling” (65). The next paragraph begins, “He treaded water and in his mind smelled fish scales. A wind came up. Zanes felt a wash against his dome” (65). The wind coming up appears twice, but the repetition is not identical because it lets us collect different details about Zanes canoeing. The first time, the wind relates to sound, while the second time it is linked to smell and then touch because of the sensation of “wash.” The different senses are connected to the same moment of Zanes’ life, and we gather this general image as well as its fragmented aspect thanks to repetition. Zanes’ sense of the world is not constructed upon a close frontier between things. Wind and breath become one; canoe and lake become one. To Zanes, “the beautiful canoe could loosen in your mind” (73). The different parts of his life (his relationship to Lung, his son, his wife, the canoe, the neighbor) are permeable. They communicate in an unusual way because they get to influence one another without ever being purposely or directly connected. The apparently rambling progression of the content of the story mirrors Zanes’ vision of life. As a result, the nonlinearity guides us.

The relationship between “Canoe Repair” and “Midcourse Corrections” emphasizes the reflections on moments of “repair” or “correction” in one’s life. The two works present pauses at a transitional time. The reading of “Canoe Repair” is the reading of images and themes mapped out in a paradigm linking scattered elements from the story, “Midcourse Corrections,” and the reader’s world. McElroy’s variation on themes common to both “Midcourse Corrections” and “Canoe Repair” is close to Andy Warhol’s technique in a series such as Marilyn. Like the painter, the author chooses a theme and modulates it. This project changes the narrative framework and our reaction to it. We can consider “Midcourse Corrections” and “Canoe Repair” to be doublings on a similar project: both pieces give different perspectives on the same thing, the way “Canoe Repair” also gives partial perspectives on the same plot. When reading “Canoe Repair,” the reader may have “Midcourse Corrections” in mind. Both pieces are meant to add to each other.

In that sense, McElroy “repeat[s] something now to make you remember something then and set[s] you up for something later” (Kawin 34). The reiterations linking the two pieces can be understood as emphases on moments that create echoes in the reader’s network of references. In “Midcourse Corrections,” McElroy writes that his essay is written to “interrupt, interleave, break diverse kinds of documents” (10). “Canoe Repair” can be read as the application of such a project to fiction. The gaps are motivated by a wish to mix disconnected “documents.” Tabbi notes that the interviews “are like a fiction” (160). In that sense, the frontiers between the essay and fiction are blurred because of their connections. Tabbi also claims, “McElroy locates his compositional self in the space between plural subjectivities” (160). The double narration of the story pluralizes Zanes’ subjectivity in a parallel way.

Structurally, the two pieces are surprisingly close. “Midcourse Corrections” is a combination of three interviews interrupted by the author’s reflections, “INSERTS,” and ” workpoints.” The short story and the autobiographical essay display a structure that accepts gaps and emphasizes echoes that connect the two texts. The substance of the canoe’s texture is mirrored by other parts of the essay:

INSERT: hinge turning: remember those trick hinged pieces of wood that were really constructed with curiously attached canvas strips?

An essay like that. An interview. A sentence fly-by that manufactures its own canvas in the space it also generates out of a music its thought spun off. (“Corrections” 20)

The crafting activity of canoe repair is paralleled by the composition of writing. The texts’ themes and images branch into one another. As McElroy expresses it, the “mixed metaphor of [his] work extends a fluid trial. Like a mixed metabolism and through the pulmonary winding also unfolding and exfoliation of the sentence’s plot it holds exchanges even between incompatibles” (“Corrections” 15). A paradigm of images is used to progressively construct the original way Zanes conceives his world. We understand how in the story, incompatibles such as “weight” and “lightness” can correlate. In the canoe, “the noble forcing of the ribs into this oval narrow form turned the weight inward into lightness” (67). In one’s life “corrections” and “repair” bring “weight” and “lightness” in contact. Traditional oppositions are reconciled in “Canoe Repair.”

The Laundromat is a place where clothes are washed, but it also becomes a place to meet, a place where life is concentrated. In addition, when Zanes thinks “rowing looks like work” (58), we see how things can serve different purposes. For Zanes, things do not have a unique meaning. Commonly, a Laundromat is used for washing. The rowing activity is meant to move a boat. However, experience changes the use of things. Zanes gives them a power to influence the world indirectly. His time influences the “real time;” his vision of space dialogues with the “real space.”

The reader adapts, concentrating on the unsettling aspects of Zanes’ representation of the world, and it participates in the creation of a simultaneous immobility and movement as when “the canoe [is] moving but … [is] still” (56). The apparent contradiction of this statement is illustrated by the structure of the story, which is partly why we may wonder if the canoe or the landscape is moving. Referring to a similar moment of immobility and movement in Hind’s Kidnap, Tony Tanner explains that “we are all familiar with such optic illusion pictures which can be read in more than one way, often as focus shifts so that figure and ground seem to change places” (219). This optic effect is rendered by the way the story is told. The process of perception alters the representation of time and space: “[t]he lake was part of the canoe” (58).

When reading the description of the canoe, we have an example of a moment when “the eye following the line of something creates motion.” Personal correspondence with the author, June 16, 2001.

Its grand lines flared to a beam so wide it seemed low and was. Which end was which? Ribs curved with a beautiful singleness up to the gunwales, and, out of the bent tension in which they seemed to grip and bow the ribs, as you ran your eyes over it and felt it the canoe developed a force of tightness and actual lift, as if the noble forcing of the ribs into this oval narrow form turned the weight inward into lightness. (67)

The passage describes the canoe precisely and technically - “ribs,” “gunwales.” We are so close to the ribs of the boat that we get an impression of immensity. The sentences saturated with commas and information prevent us from picturing a full image of the canoe. Each small detail gets enlarged so that each part seems to expand itself infinitely. The movements are underlined: “flared,” “curved,” “bent,” “grip,” “bow,” “lift,” “turned.” The canoe is still but its description creates motion.

This passage can be seen as a micro-structural template for the way the story evolves. The story is the combination of different lines gathered into a unique moment. Indeed, there is a network of words that refer to either abstract images or other words linked to the movement of the boat in the story. The circuitry of words and their relation to other words is as important as what the words refer to. The formal fragmentation and disconnection lets us experience literally what happens in Zanes’ mind. The narrator explains Zanes has a “restless mind” (60) but never explicitly explains what it means. He never gives a full description of the way Zanes orders his thoughts. We access the definition of Zanes’ “restless mind” through the organization of the story. The tensions inviting for “repair” in Zanes’ life are present at any level of the text without ever being clearly expressed. The slow paths of the narration, its fragmentation, and its echoes are images of the canoe which itself reflects the tensions at stake in Zanes’ life.

These descriptions let us experience a different sense of space but also reveal the story’s sensual approach to the world. Zanes’ readjustments orient and transform his vision. Things are examined, and their perception is detailed when Zanes describes his wife swimming, for instance: “He imagined her, and he knew her words had reached some reservoir in his brain, where she was swimming at night, the luminous things like tiny muscular wakes lit up her thighs and the curve of her back” (60). The “luminous things like tiny muscular wakes” are observed with attention, and remind us of a vision of a sculpted body where forms and relief are emphasized. Narration zooms in on details of surfaces, and the intense observation of body parts and of the canoe makes a paradigm of sensual representations. The story pays attention to the concrete surface of things: the canoe looks like a “deer swimming” (56). Things and people are described minutely, and the scale used is so close that the images of the story appear as details of a painting. The details Zanes’ vision focuses on remind us of the indirectness of his actions. Zanes pays attention to things in their details and cannot always see the overall framework of these things. Similarly, he cannot perceive the outcomes of all his actions.

McElroy refers to “’[a]ttention’ [as] a rather cold word [he] use[s] to suggest that the ways in which we embrace the world and embrace other people can be more precise and clear than we think sometimes” (Anything 248). Zanes’ attention to the canoe and to his breath, for instance, as he feels the “air filling the space of [his] chest to be measured by another time” (60), is his way to “embrace the world.” His attention to the world indirectly penetrates his relationships. Zanes’ precise description of the exterior world lets us access his interior world. We understand, when paying attention to the depiction of his environment, why “the lake [is] part of the canoe” (58). People’s lives are permeable, their energies travel into one another. Zanes’ activities involuntarily connect to other areas of his life. The clearer vision of life that appears when Zanes repairs the canoe gets transferred in mysterious ways to the other parts of his life. Different aspects of Zanes’ life influence one another, although it is not clear to him or us how they connect.

The flashes and fragments emphasized in the sequences of the story are used to represent the world: “it is the very abundance of perspectives that conveys abundance of the world under observation” (Iser 226). The canoe is personified by Zanes’ interest in it: “A body was what it was” (73). Zanes’ observations change our perception of the canoe. It is compared to a lover, an animal, and a body: “he almost loved the canoe” (67), “[t]he canoe attracted others to it, they were in its future” (75), and “[a] canoe is what makes you do” (77). Intensity changes the character’s visions of the world.

This intensity also affects the way time is represented in the story. Perception is altered. Likewise, time is distorted. McElroy refers to “the arranging of things in space, the motion of things and persons in space. Time dissolved into spatial relations.” Personal correspondence with the author, June 16, 2001. When Zanes asks, “what if space was time?” (72), his question could be considered as a comment on the devices used by the author. In “Canoe Repair,” time is peculiar since it is fragmented and does not follow a plain progression. McElroy writes in “Midcourse Corrections” that his writing is to be understood as “modifications of language editing the rhetoric of what’s inside and not disclaiming faith that the words really rendered things and motions outside - and outside, somehow, consciousness” (13). The subjective experience of Zanes’ time is spatialized in the story. “Outside” and “consciousness,” connected in “Midcourse Corrections,” become the pivot of “Canoe Repair.”

The story covers approximately seven months (“One bright mid-September afternoon” [65] to “summer soon” [77]), but the vision we have is the vision of an infinite time without bearings or perhaps a very short time so dense that the notion of its temporality is not valid. The sentences are constructed in order to convey the circuits and canals of Zanes’ stream of consciousness and even his perception process sometimes. Time is altered by perception and becomes spatialized in the story. We think about the witty reference to the Times and the “two Timeses for the price of one” (“Corrections” 19) that could ironically summarize the treatment of time in the short story where subjective time is juxtaposed to seasonal time. When reading “Canoe Repair,” we face two experiences of time: one that is subjective and distorted by experience, and the other that is universal and related to the seasons referred to in the story. The original structure of the story, its fragmentation, and connections to “Midcourse Corrections,” is a means for the author to present a subjective system of perception.

When allowing the defamiliarizing elements of the story to change our reading, we penetrate a new experience of the world, of perception, and of time. For example, the image of the canoe passing is a recurrent pattern in the short story: “It came out of a cove as quiet as a deer swimming” (56), “[t]he canoe’s animal flanks and low length absorbed the two paddlers” (57), “[t]he lake was part of the canoe” (58), “[t]reading water, my hand upon the overturned canoe” (65), and so on. These allusions create a network of references to the symbolical meaning of the slow movement characteristic of an infinite moment. The personal experience of Zanes’ time transforms the time of the story: “But he wondered what the long bark canoe felt like. Its length and strong delicacy. Its secret speed. Its time” (64). The canoe has its particular pace, its own time. Reading “Canoe Repair” is experiencing canoe(ing) time.

Works Cited

Culler, Jonathan. On Deconstruction. Theory and Criticism after Structuralism. London: Routledge, 1983.

Kawin, Bruce. Telling it Again and Again. Repetition in Literature and Film. Ithaca and London: Cornell UP, 1972

Iser, Wolfgang. The Implied Reader. Patterns of Communication in Prose Fiction from Bunyan to Beckett. Baltimore and London: John Hopkins UP, 1974.

McHale, Brian. Postmodernist Fiction. London: Routledge, 1996.

McElroy, Joseph. “Canoe Repair.” The Review of Contemporary Fiction 10. 1. (Spring 1990): 56-79.

_____ “Midcourse Corrections.” The Review of Contemporary Fiction 10. 1. (Spring 1990): 9-56.

_____ “Neural Neighborhoods and Other Concrete Abstracts.” Tri Quarterly 34 (Fall 1975): 201-17.

LeClair, Tom and Larry McCaffery. Anything Can Happen: Interviews with Contemporary American Novelists. Urbana: University of Illinois P,1983.

Porush, David. The Soft Machine: Cybernetic Fiction. New York: Methuen, 1985.

Saltzman, Arthur. The Novel in the Balance. Columbia: U of South Carolina, 1993.

Tabbi, Joseph. Postmodern Sublime. Technology and American Writing from Mailer to Cyberpunk. Ithaca and London: Cornell UP, 1995.

Tanner, Tonny. Scenes of Nature, Signs of Men. Cambridge and New York: Cambridge UP, 1987.

Notes


          out of inodes        

Hi everyone,

This is my first post so a bit of background first - skip if you want

<background>

I've built a web-based coding dojo server which supports about 10 different languages.

http://cyber-dojo.com

It's free, no adverts, no login, instead it asks for donations to raise money to buy Raspberry Pi computers for schools. It's backed by Turnkey Rails. Turnkey is awesome. So far it's early days compared to what I'd like to do but I've more or cobbled stuff together and it seems to work and I'm starting to get some £ in and have already given a few Pi'es to local schools.

</background>

I'm pretty green at linux and admin etc. I've hit a problem that I'm running out of inodes. For example (after reclaiming some disk space on /dev/sda1 where I'm running out)

#df -i

reports

 

Filesystem            Inodes   IUsed   IFree IUse% Mounted on
/dev/sda1             655360  555214  100146   85% /
none                  170404    2018  168386    2% /dev
none                  188955       1  188954    1% /dev/shm
none                  188955      32  188923    1% /var/run
none                  188955       3  188952    1% /var/lock
none                  188955       1  188954    1% /lib/init/rw
/dev/sda2            19546112      90 19546022    1% /mnt
 

So I was hoping I could "move" some of the space on /dev/sda2 to /dev/sda1

I've done a bit of searching and found this

http://www.turnkeylinux.org/blog/extending-lvm

which looks promising. However, ssh'ing onto my cyber-dojo server and running 

#vgdisplay

#pvdisplay

both report nothing. They don't say command not found. They just report nothing. Is this route an option for me? If so how do I do it?

 

It turns out that cyber-dojo gobbles disk inodes at a single particular sub-folder. I was wondering whether a simple ln to point that sub-folder to /mnt and so be on dev/sda2 might be a simpler solution? Would that work?

 

Also, when I go to

https://hub.turnkeylinux.org/servers/

and I click the web-management and web-shell icons on the top right, they both say

This page is not available. How do I get them working? 

 

Thanks

Jon

Tags: 
Forum: 

          Restoran Sana Sini Restoran Bertema Unik Dalam Dpulze Shopping Centre Cyberjaya        
Salam sejahtera kepada semua pembaca setia blog makan Mahamahu dan juga rakan-rakan sekalian. Restoran bertema unik itu yang menarik perhatian Maha bila datang ke restoran ni. Firstime nak tahu juga apa yang uniknya kat restoran ni sampai tema dia macam tu sekali. Jom kita terjah dalam tengok apa menu yang unik tu.

 


Nama restoran ni sebenarnya adalah Restoran Sana Sini yang terletak dalam Dpulze Shopping Centre Cyberjaya. Kalau orang sekitar Putrajaya atau Sepang nak datang kat sini tak jauh dan senang nak cari. Shopping complex ni pun banyak parking ada kat basement dan ada kat atas tapi biasalah ada bayaran mengikut jam. Restoran ni terletak kat level LG1 shopping complex ni.



First tengok dari luar restoran ni macam restoran-restoran biasa yang selalu kita pergi. Tapi bila tengok kat satu sudut restoran tu kita akan nampak bagaikan pintu masuk rumah tradisional yang menggunakan kayu. Kemudian satu sudut lagi ada ruang permainan kanak-kanak yang luas. Paling best mereka sediakan aiskrim percuma setiap hari. Boleh ambil berapa banyak yang nak dan makan sepuas-puasnya aiskrim tu.



Tu yang Maha suka kat sini makan aiskrim hehehe. Bila tengok menu kat sini memang unik lah sebab ada macam-macam campuran masakan dari pelbagai negara. Antara yang Maha sempat tengok menu-menu dalam list restoran ni ada masakan Thailand, masakan Korea, masakan Melayu, masakan Barat, masakan Cina dan macam-macam lagi. Ada lebih kurang 100 jenis juga menu masakan yang korang boleh pilih kat restoran ni.

Pineapple Seafood Fried Rice

Fried Kway Teow with Beef and Egg

Stir Fried Glass Noodle with Salted Egg Soft Shell Crab

Tom Yam Fried Rice with Spring Chicken

Pumpkin Fried Rice with Chicken Chop

Apa yang Maha lampirkan kat sini adalah sebahagian menu-menu yang ada. Harap korang tak rambang matalah nak tengok semua menu-menu ni. Nama pun Maha dah tak ingat sebab banyak sangat mana yang ada sempat Maha tulis nama tu ok lah mana yang tak ada tu pandai-pandai korang lah yer hehehe.


 Salted Egg Yolk Chicken Rice

 Salted Egg Yolk Prawn Rice

Hong Kong Oatmeal Fish Rice

Yang ni makanan goreng-goreng yang merangkumi masakan tempatan dan juga dari negara Thailand. Penyediaan makanan kat sini atau presentation juga unik kerana ada yang di serve dalam bekas, ada dalam buah dan macam-macam lagi. Buatkan makanan tu lebih nampak menarik dan sedap untuk dinikmati.

Macau Fried Rice With Shrimp

Korean Chicken Wings

Salted Egg Chicken Wing

Fried Fish Skin With Salted Egg

Popcorn Salted Egg Chicken

Paling best adalah korang kena cuba minuman kat sini. Tapi awas yer jangan ambil banyak sangat minuman kerana ia di sediakan dalam bekas minuman yang bersaiz XXL ok sangat besar. Kalau satau orang minum belum tentu habis silap-silap rasa nak terkencing sahaja.

Red Curry Beef Rice with Omelette


King Prawn Kway Teow with Ginger and Egg

Dragon King Prawn Fried Rice

Maha suka datang sini sebab pilihan makanan yang banyak dan rasa makanan tu tetap ada ia akan disediakan apabila dapat order dari pelanggan. Jadi banyaka makanan kat sini masih panas dan sedap. Kemudian dalam restoran ni pun luas dan selesa nak makan. Tapi paling best adalah aiskrim free tu hehehehe.

Ice 3 Layer Tea, Soya Bean Cincau, Soya Bean, Ice Blue Curacao with Lychee dan Ice Tea Lychee

Waktu operasi restoran ni adalah dari pukul 10.00 pagi hingga 9.30 malam setiap hari. So kalau hari biasa kat sini katanya penuh dengan orang yang bekerja area Cyberjaya. Hari minggu ramai datang bekeluarga atau dengan kekasih sebab nak tengok wayang kat shooping complex ni. Jadi ia sangat sesuai untuk semua peringkat dan situasi. Kalau nak tahu lebih kena datang sendiri cuba baru tahu ok. Selamat mencuba semua.

Pertanyaan hubungi :
Facebook : Restoran Sana Sini

Ranking Mahamahu :-
Kebersihan : 4/5
Kesedapan : 4/5
Harga : 3.5/5







          Blog: BuyVia Black Friday and Cyber Monday 2016 Predictions Free Shipping         

Blog: BuyVia Black Friday and Cyber Monday 2016 Predictions Free Shipping

From:

BuyVia


          Blog: BuyVia Black Friday and Cyber Monday 2015 Analysis Free Shipping         

Blog: BuyVia Black Friday and Cyber Monday 2015 Analysis Free Shipping

From:

BuyVia


          New BuyVia Video: Insiders Guide to Cyber Monday Deals and Online Shopping Free Shipping         

New BuyVia Video: Insiders Guide to Cyber Monday Deals and Online Shopping Free Shipping

From:

BuyVia


          Blog: The Insider’s Guide to Cyber Monday 2016 Deals Free Shipping         

Blog: The Insider’s Guide to Cyber Monday 2016 Deals Free Shipping

From:

BuyVia


          Senza titolo        

SUPERMAN RETURNS



Ladies and gentlemen, ecco a voi il nuovo Superman,
Brandon Routh



E il nuovo Lex Luthor, Kevin Spacey

e la nuova Lois Lane, Kate Bosworth (fidanzata di Orlando Bloom)



Dopo essere andato alla ricerca di altri superstiti del pianeta Krypton, Superman torna sulla Terra ma ha un'amara sorpresa: la sua amata Lois Lane si è rifatta una vita senza di lui e gli abitanti di Metropolis non hanno più bisogno del loro supereroe. A riportare l'Uomo d'acciaio in azione interviene la scarcerazione di Lex Luthor, suo acerrimo nemico alla ricerca di un sistema per distruggere per sempre l'ostacolo Superman. Ma c'è anche un'altra missione ad attendere il supereroe: riconquistare il cuore dell'amata Lois...

Staremo a vedere...


          With #SelfieKing! #throwback #mdec #mycybersalevia #WindKoh [...        

With #SelfieKing! #throwback #mdec #mycybersalevia #WindKoh [ http://bit.ly/1dq44m4 ] at Instagram [ http://bit.ly/2dYelgt ]

Photo by Wind


          The Cyberunions Podcast: Episode 24 We figured we’d do a show on books        
Download MP3 Download OGG High Quality Download OGG Low Quality 0:38 Stephen’s update Things are still OK in Boston, but… OccupyOakland was crazy and raid OccupyMelbourne OccupyAlbany – Police refused to evict occupiers 2:40 Walton and Stephen discuss the Occupy Movement There is even an Occupy Marines Slavoj Žižek in the Guardian 7:10 Walton’s update […]
          Download Resident Evil Revelations – FLT        

Resident Evil Revelations – FLT

Resident Evil Revelations - FLT image
Description: The fear that was originally brought to players in Resident Evil Revelations on the Nintendo 3DSsystem returns redefined for home consoles and PC complete with high quality HD visuals, enhanced lighting effects and an immersive sound experience. This latest version of Resident Evil Revelations will also deliver additional content including a terrifying new enemy, extra difficulty mode, integration with ResidentEvil.net and improvements to Raid Mode. Raid Mode, which was first introduced to the series in the original version of Resident Evil Revelations, sees gamers play online in co-op mode or alone in single player taking on the hordes of enemies across a variety of missions whilst leveling up characters and earning weapon upgrades. New weapons, skill sets, and playable characters including Hunk, take the Raid Mode experience to new depths. The critically acclaimed survival horror title takes players back to the events that took place between Resident Evil®4 and Resident Evil®5, revealing the truth about the T-Abyss virus.

Features:
  • Enhanced for consoles:  The fear that was brought to players in Resident Evil Revelations on the Nintendo 3DSsystem returns redefined complete with high quality HD visuals, enhanced lighting effects and an immersive sound experience.
  • Classic survival horror gameplay returns:  The campaign mode’s single player experience sees gamers investigating a range of different locations including the dark confined spaces of a cruise ship and the treacherous snow covered mountains. With limited ammo and weapons, fight off infected enemies that lurk around every corner.
  • Hell just got hotter:  Infernal Mode, a new difficulty mode for console versions, is not just more challenging than Easy and Normal modes but also remixes enemy and item placement, so even those familiar with the game will discover new terrors.
  • Meet the Wall Blister:  A brand new enemy , the Wall Blister is a mutated creature borne from the T-Abyss virus that spreads through water, adding to the horrors that lurk around every corner
  • Residentevil.net support:  Resident Evil Revelations will take full advantage of Residentevil.net with content available to users once the game launches. Earn weapons and custom parts and use them in-game, collect figures that can be used in dioramas and check your stats through the online web service.
  • Improved Raid Mode:  New weapons, skill sets, playable characters including Rachel and Hunk and enemies exclusive to this mode are added for the this latest version.

Resident Evil Revelations GamePlay

Genre: FAction
Publisher: Capcom
Developer: Capcom
Release name: Resident Evil Revelations – FLT
Size: 3.11 GB
Install Notes:
1. Unrar by clicking the exe file for this is a self extracting archive.
2. For further instructions and to avoid installation mistakes, strictly read the nfo file here
3. Support developers by buying the software you enjoy!
DOWNLOAD ANY PARTS ON FILE HOST OF YOUR CHOICE
YOU MAY ALSO DOWNLOAD IN UploadCore or Tusfiles TO SUPPORT US
Download in Mediafire, Uptobox, Hulkfile, Jumbofiles, Filefactory, Depositfiles,UploadCore,Hulkshare,Karelia,BillionUploads,Rapidgator,Filevelocity,Netload,Putlocker,Tusfiles,1Fichier,Rapidshare,Cyberlocker,Cloudzer,Upafile,Oteupload,,Freakshare,Extabit and Uploaded

Putlocker

Resident Evil Revelations – FLT Part 1
Resident Evil Revelations – FLT Part 2
Resident Evil Revelations – FLT Part 3
Resident Evil Revelations – FLT Part 4
Resident Evil Revelations – FLT Part 5
Resident Evil Revelations – FLT Part 6
Resident Evil Revelations – FLT Part 7
Resident Evil Revelations – FLT Part 8
Resident Evil Revelations – FLT Part 9

RapidGator

Resident Evil Revelations – FLT Part 1
Resident Evil Revelations – FLT Part 2
Resident Evil Revelations – FLT Part 3
Resident Evil Revelations – FLT Part 4
Resident Evil Revelations – FLT Part 5
Resident Evil Revelations – FLT Part 6
Resident Evil Revelations – FLT Part 7
Resident Evil Revelations – FLT Part 8
Resident Evil Revelations – FLT Part 9

1Fichier

Resident Evil Revelations – FLT Part 1
Resident Evil Revelations – FLT Part 2
Resident Evil Revelations – FLT Part 3
Resident Evil Revelations – FLT Part 4
Resident Evil Revelations – FLT Part 5
Resident Evil Revelations – FLT Part 6
Resident Evil Revelations – FLT Part 7
Resident Evil Revelations – FLT Part 8
Resident Evil Revelations – FLT Part 9

Uploaded

Resident Evil Revelations – FLT Part 1
Resident Evil Revelations – FLT Part 2
Resident Evil Revelations – FLT Part 3
Resident Evil Revelations – FLT Part 4
Resident Evil Revelations – FLT Part 5
Resident Evil Revelations – FLT Part 6
Resident Evil Revelations – FLT Part 7
Resident Evil Revelations – FLT Part 8
Resident Evil Revelations – FLT Part 9

HugeFiles

Resident Evil Revelations – FLT Part 1
Resident Evil Revelations – FLT Part 2
Resident Evil Revelations – FLT Part 3
Resident Evil Revelations – FLT Part 4
Resident Evil Revelations – FLT Part 5
Resident Evil Revelations – FLT Part 6
Resident Evil Revelations – FLT Part 7
Resident Evil Revelations – FLT Part 8
Resident Evil Revelations – FLT Part 9

          Call of Duty 4: Modern Warfare + Crack Full        

Call of Duty 4: Modern Warfare Full Crack
Release Date: 07-11-2007
Languages: English, French, German, Italian, Spanish 
Mirrors: PutLocker | UPaFile | Cyberlocker | BillionUploads
COPYRIGHT : KOS KOMPUTER

Free Download PC Game COD 4: MW Full Version - The new action-thriller from the award-winning team at Infinity Ward, the creators of the Call of Duty® series, delivers the most intense and cinematic action experience ever. Call of Duty 4: Modern Warfare arms gamers with an arsenal of advanced and powerful modern day firepower and transports them to the most treacherous hotspots around the globe to take on a rogue enemy group threatening the world. As both a U.S. Marine and British S.A.S soldier fighting through an unfolding story full of twists and turns, players use sophisticated technology, superior firepower and coordinated land and air strikes on a battlefield where speed, accuracy and communication are essential to victory. The epic title also delivers an added depth of multiplayer action providing online fans an all-new community of persistence, addictive and customizable play.

Screenshot

Minimum System Requirements
  • OS: Windows XP/Vista
  • Processor: Pentium 4 @ 2.4 GHz / AMD Athlon 2600+ or any Dual Core Processor @ 1.8 GHz
  • Memory: 512 Mb
  • Hard Drive: 8 Gb free
  • Video Card: nVidia 6600 / ATI Radeon 9800Pro
  • Sound Card: DirectX 9.0c Compatible
  • DirectX: 9.0c
  • Keyboard
  • Mouse
  • DVD Rom Drive

Recommended System Requirements
  • OS: Windows XP/Vista
  • Processor: Any Dual Core Processor 2.4 GHz or faster
  • Memory: 1 Gb
  • Hard Drive: 8 Gb free
  • Video Card: nVidia 7800 / ATI Radeon X1800
  • Sound Card: DirectX 9.0c Compatible
  • DirectX: 9.0c
  • Keyboard
  • Mouse
  • DVD Rom Drive

Update Link Download (14-05-2013)
Mirror via PutLocker
Mirror via UPaFile
Mirror via CyberLocker
Mirror via BillionUploads
250 MB / Part
    Password: koskomputer.blogspot.com

    Installation
    1. Unrar
    2. Open the .iso file with a program that can mount it (PowerISO, Daemon tools, Alcohol for example)
    3. Mount it. I don't have that autorun option turned on, so i have to go to My Computer and open it from the cd-drive.
    4. Install it. When it asks for the cd-key, minimize the installer and open rzr-cod4.exe, then generate the cd-key and copy it to the installer.

    ***Some antivirus propgrams may tell u that that rzr-cod4.exe is a virus of somekind. IT'S A FALSE POSITIVE! It's perfectly safe. The antivirus program thinks its a virus, but it isn't.***

    5. The installer will also ask if u wan't to install punkbuster. I installed it, don't know if it matters.
    6. When it's done installing,  copy or move iw3sp.exe to the game folder (where u installed the game).
    7. Launch the game by opening iw3sp.exe and it should work.
    8. Support the software developers. If you like this game, BUY IT!

    Info
    1. PL, UPa, CL, BU Interchangeable Links
    2. Total part: 10 / 700 GB
    3. Total file : 6.32 GB
              FIFA 13 INTERNAL-RELOADED        

    FIFA 13 INTERNAL-RELOADED
    Release Date: 7 Okt 2012
    Mirrors: PutLocker | UPaFile | Cyberlocker | BillionUploads
    Uploaded | Rapidgator | Turbobit
    COPYRIGHT : KOS KOMPUTER

    Free Download PC Game FIFA 2013 Full Version - captures all the drama and unpredictability of real-world football. This year, the game creates a true battle for possession across the entire pitch, and delivers freedom and creativity in attack. Driven by five game-changing innovations that revolutionize artificial intelligence, dribbling, ball control and physical play, FIFA 2013 represents the largest and deepest feature set in the history of the franchise.

    Features
    • All-new positioning intelligence infuses attacking players with the ability to analyze plays, and to better position themselves to create new attacking opportunities.
    • Make every touch matter with complete control of the ball. Take on defenders with the freedom to be more creative in attack.
    • A new system eliminates near-perfect control for every player by creating uncertainty when receiving difficult balls.
    • The second generation of the physics engine expands physical play from just collisions to off-the-ball battles, giving defenders more tools to win back possession.
    • Create dangerous and unpredictable free kicks. Position up to three attacking players over the ball and confuse opponents with dummy runs, more passing options, and more elaborate free kicks.
    • Compete for club and country in an expanded Career Mode that now includes internationals. Play for or manage your favorite national team, competing in friendlies, qualifiers and major international tournaments.
    • Learn or master the fundamental skills necessary to compete at FIFA 13 in a competitive new mode. Become a better player, faster, no matter what your skill level. Compete against yourself or friends in 32 mini-games perfecting skills such as passing, dribbling, shooting, crossing and more.
    • Earn rewards, level up, enjoy live Challenges based on real-world soccer events, and connect with friends. Everything within FIFA 13, and against friends, is measured in a meaningful way.
    • Access your Football Club identity and friends, manage your FIFA Ultimate Team, search the live auctions and bid to win new players.
    • 500 officially licensed clubs and more than 15,000 players.

    Release NOTE: It internal because the DRM is bypassed using a loader. The game works, but it’s not how we would usually release a crack.
    Screenshot

    Minimum System Requirements
    • OS: Windows XP/Vista/7
    • Processor: Intel Core 2 Duo @ 2.4 Ghz / AMD Athlon 64 X2 5000+
    • Memory: 2 Gb
    • Video Memory: 512 Mb
    • Video Card: nVidia GeForce 8800 / ATI Radeon HD 2900
    • Sound Card: DirectX Compatible
    • DirectX: 9.0c
    • Keyboard
    • Mouse
    • DVD Rom Drive

    Update Link download (05-05-2013)
    Mirror via PutLocker
    Mirror via UPaFile
    Mirror via Cyberlocker
    Mirrror via BillionUploads
    Mirror via Uploaded, Rapidgator, Turbobit
    Password: koskomputer.blogspot.com
    Installation
    1. Unrar.
    2. Burn or mount the image.
    3. Install the game.
    4. Copy the cracked files from the \Crack directory on the disc to the \Game directory, overwriting the existing exe.
    5. Before you start the game, use your firewall to block all exe files in the game's install directory from going online. Use the game setup before starting as well. It can be found in the following directory:\Game\fifasetup
    6. Play the game. While in game, avoid all of the online options. If you have Origin installed, it may start it up. If that happens, ignore the prompt, play offline, and don't login.
    7. Enjoy!

    Info
    1. PL, UPa, CL, BU Interchangeable Links
    2. Total part: 10 / 700 MB
    3. Total file : 6.4 GB

    1. UL, RG, TB Interchangeable Links
    2. Total part: 7 / 1.00 GB
    3. Total file : 6.4 GB

              Mars: War Logs-COGENT        

    Mars: War Logs - COGENT
    Release Date: 26-04-2013
    Language: English
    Mirrors: PutLocker | UPaFile | Cyberlocker | BillionUploads
    COPYRUGHT : KOS KOMPUTER

    Free download PC game 2013 Mars: War Logs Full Version - In the destroyed world of Mars, two destinies mingle together. Two beings searching for their identity travel across a broken planet, constantly facing bloody political conflicts which tear the old colonies apart. Often divided, sometimes fighting the same enemies, both are the source of the advent of a new era…

    Mars: War Logs is a sci-fi RPG action game that innovatively merges character development and light and rhythmic fights. it takes you on a journey deep into an original futuristic universe and presents you with scenarios dealing with difference, racism and environment.

    Features
    • Take on the role of Roy Temperance, a multi-talented renegade, and surround yourself with companions with real personalities.
    • Choose from the numerous dialog possibilities and influence the destiny of your people.
    • Personalize your fighting style through a dynamic and developed combat system, for entirely different approaches depending on the choices you make.
    • Personalize your development by choosing from dozens of skills and numerous additional perks!
    • Modify and create your own equipment with our craft system.

    Screenshot

    Minimum System Requirements
    • OS: Windows XP/Vista/7/8
    • Processor: Intel Core 2 Duo @ 2.2 Ghz / AMD Athlon 64 X2 4600+
    • Memory: 2 Gb
    • Hard Drive: 3 Gb free
    • Video Memory: 512 Mb
    • Video Card: nVidia GeForce 8800 / ATI Radeon HD 3870
    • Sound Card: DirectX Compatible
    • Network: Broadband Internet Connection
    • DirectX: 9.0c
    • Keyboard
    • Mouse

    Link download
    Mirror via PutLocker
    Mirror via UPaFile
    Mirror via Cyberlocker
    Mirror via BillionUploads
    Password: koskomputer.blogspot.com

    Installation
    1. Unrar
    2. Mount or burn
    3. Install
    4. Copy contents of Crack Directory to install directory
    5. Play the game
    6. Support the software developers. If you like this game, BUY IT!

    Info
    1. PL, UPa, CL, BU Interchangeable Links
    2. Total part: 8 / 350 MB
    3. Total file : 2.54 GB
              God Mode Update 1-RELOADED        

    God Mode Update 1-RELOADED
    Release Date: 04-2013
    Language: -
    Mirrors: PutLocker | UPaFile | Cyberlocker | BillionUploads
    COPYRUGHT : KOS KOMPUTER

    RELOADED group telah merilis update pertama untuk PC game God Mode. Info changelognya dapat di bawah, dan bagi teman-teman sekalian yang sudah mendownload PC Game God Mode-RELOADED yuk langsung di patch gamenya biar lebih enak di mainin.

    Changelog
    • Desynchronization: Network optimizations were made to stop the desync issue during games which also led to non-progressions.
    • FPS Cap: The FPS cap can now be removed via the game.cfg file. Add the option "LockFps = 0" under the Video section. Note that removing the FPS cap may cause issues depending on system configuration and network quality.
    • Disable voice chat option: You can now disable all incoming sounds via the options while still having the ability to chat via Push to talk.
    • Push to talk voice chat: To enable chat while in-game, parties or a menu press the ` (tilde) button (can be reconfigured).
    • Minigun ammo clip upgrade: Fixed the issue where users were not seeing the clip properly upgraded.
    • Graceful error handling: Better message boxes and debug text appear when issues occur to give developers better visibility.
    • Crash at Voting Screen: A fix was made to the crash that occurred while voting for a map.
    • Crash when connection to Steam is lost: Launching the game when Steam is offline will launch into LAN mode instead of crashing.
    • Alt+Tab Crash: Fix to the crash when users Alt+Tab out of the game.
    • Overall game stability: Optimizations were made increase game stability.
    • God Mode Executable compatibility: Steam DRM has been altered from Standard to Compatibility. This change will help users experiencing crashes while booting the game.
    • Memory Allocation Fix: Optimizations were made to game memory allocation.
    • Note: We recommend players install the patch before launching God Mode. Not installing the patch could lead to connection compatibility issues. 

    Link download
    Mirror via PutLocker
    Mirror via UPaFile
    Mirror via Cyberlocker
    Mirror via BillionUploads
    Password: koskomputer.blogspot.com

    Installation
    1. Unrar God Mode Update 1-RELOADED.rar > Next Unrar rld-godupd1.rar
    2. Install the update.
    3. Copy over the cracked content from the /Crack directory to your game install directory.
    4. We recommend not allowing the game to go online with your FW. Select LAN from partygame settings.
    5. Play the game.
    6. Support the software developers. If you like this game, BUY IT!
              Resident Evil 6 Update 4-RELOADED        

    Resident Evil 6 Update 4-RELOADED
    Release Date: 04-2013
    Mirrors: PutLocker | UPaFile | Cyberlocker | BillionUploads
    COPYRIGHT : KOS KOMPUTER

    RELOADED group kembali lagi dengan rilis update terbaru untuk PC Game Resident Evil 6. Pada update ke 4 kali ini terdapat penambahan fungsi option baru untuk pencarian, serta improvisasi performa SLI untuk graphics cards NVIDIA. Nah, bagi teman-teman sekalian yang sudah memiliki pc game Resident Evil 6, monggo langsung di amankan filenya.

    New Features
    • Added new options to the session search function
    • Improved SLI performance with NVIDIA graphics cards

    Link download
    Mirror via PutLocker
    Mirror via UPaFile
    Mirror via Cyberlocker
    Mirror via BillionUploads
    Password: koskomputer.blogspot.com

    Installation
    1. Unrar.
    2. Install the Update. No other updates are needed for this release.
    3. Copy over the cracked content from the /Crack directory to your game install directory.
    4. Play the game.
    5. Support the software developers. If you like this game, BUY IT!
              PC purchase question        
    Hi Guys.

    Im looking for a new PC. All I do with it is web surf and use MS Office. As far as gaming the only games that I would play on it are GP4,Rfactor and would like to maybe get F12013 for it if it could run it on the pc I was looking at.

    Here are the ones I was looking at and would appreciate your opinions

    [www.futureshop.ca]

    [www.futureshop.ca]
              re: Behind The Scenes Of The Sad Transformers VGA Trailer        

    After I saw the trailer for fall of cybertron, I so wanna get this game! I'm excited. (As a used to be transformers fan).


              re: Behind The Scenes Of The Sad Transformers VGA Trailer        

    Yes!Comics Transformers Fall OF CYBERTRON . Xbox 360...Yes!


              Cara Memperbanyak Teman di Facebook Dalam 5 Menit        
    http://www.facebook.com/note.php?note_id=448913350003

    1. Masuk ke http://www.facebook.com/invite.php?ref=tn
    2. Copy Seluruh Email Di bawah.
    3. Paste di kolom Kepada atau To
    4. Klik Undang atau Invite... teman anda akan bertambah dalam sekejap.

    firmansawah@yahoo.com,rifai_firmansyah@ymail.com,kacangjugabisa@ymail.com,rizaldefri19@ymail.com,
    dwi_weliani@ymail.com,cafe_sisha.jambi@yahoo.com,elvintriandesa@yahoo.co.id, key_keyz@ymail.com, syaira_nurul@ymail.com, ekky_chahya@yahoo.com, basovenom@yahoo.com, morgan_molly@ymail.com, krisna.pawoko@yahoo.co.id, geo.andri@yahoo.com, romitheodore@yahoo.com, lofly_wive@yahoo.com, run76_pie16@yahoo.com,
    lutfialfianto@yahoo.com, r1dh0_d3z4_pr4t4m4@yahoo.co.id, faizalpratama@rocketmail.com zal_baguz@rocketmail.com, alexisivey_atlanta@yahoo.com,x2k3@hotmail.com, Xobol@yahoo.com, tgalahad@gmail.com, Ymiller5000@aol.com, Deathslovearrow@aol.com, Princess_samara_23@yahoo.com, smithja@netspace.net.au, mimi.doank@yahoo.co.id, chunkylover02@yahoo.com.au, andyscing@hotmail.com; geri_davy@yahoo.co.uk, chantreuse@yahoo.co.uk, janeyda@yahoo.co.uk, terrelsyakut@gmail.com, kazl05@aol.com, starbug131@aol.com, bubs4jasper@aol.com, charltonbent@hotmail.co.uk, tbklayton@aol.com, fbprofile002@hotmail.com, elpollodiablo@hotmail.co.uk, sarahall6969@yahoo.co.uk, christian.sorger@gmail.com, mrogall@ymail.com, sinfullytagged@aol.com, rockthevote2k8@gmail.com, kenpo95@hotmail.com, flintshirebabe@live.com, this.animal@gmail.com, tgalahad@gmail.com, lilbeetle1977@yahoo.com, mrclean2002@gmail.com, mr_clean75663@yahoo.com, soulja29@hotmail.com, scottvcornwell@hotmail.com,greattobeme@live.com, kartowm@gmail.com .a.r.o2006@hotmail.com ,aloyaal@hotmail.com,ombada@gmail.com, arkane1974@live.com, fbprofile001@hotmail.com, goldenshine@hotmail.com, key_keyz@ymail.com, cafe_sisha.jambi@yahoo.com, ekky_chahya@yahoo.com, ekkyneverdie@yahoo.com, basovenom@yahoo.com, nrl_04@yahoo.com, net_coz@yahoo.com, keynez@ymail.com, syaira_nurul@ymail.com, key_keyz2@ymail.com, key_keyz3@ymail.com, key_keyz5@ymail.com, morgan_molly@ymail.com, rian.arai@yahoo.com, sahreza_rendy@yahoo.co.id, teoteblung@ymail.com,

    elika_butterflies14@yahoo.co.id, benysaputra08@yahoo.co.id, chaisarxx@yahoo.com, charinaamaliya@yahoo.com, aruleghost@yahoo.com, mr_giepie@yahoo.com, akhwat_excellent@yahoo.co.id, ciputndra@yahoo.com, ikmal_squad@yahoo.co.id, ar3_l355@yahoo.co.id, uya_sideme@yahoo.com, kekendudut@yahoo.com, gabolehbenar@plasa.com, junaiddhy@yahoo.com, koko.cool90@yahoo.co.id, strawberry_kiss1390@yahoo.com, jimmychristianto@rocketmail.com, martin_duank90@yahoo.com, kid_27_aja@yahoo.com, cinderela_charli@yahoo.com, jauhari.avergreen@gmail.com, key_keyz4@ymail.com, vip.soney@yahoo.com, ryanrionaldo@gmail.com, kikigirlzhere@yahoo.com, riowidyanto@yahoo.co.id, ricky_tora@yahoo.com, dedi_ikhwancrenz@ymail.com, treee_ana@yahoo.com, syaira_nurul@ymail.com, hate_yogie@yahoo.co.id, wah_yuni31@yahoo.com, cool_m3nt0zzz@yahoo.co.id, silvi_dan@yahoo.co.id, gie_rha25@yahoo.com, ayu_vendry@yahoo.com, candra.gunawan90@gmail.com, cempotzzz@ymail.com, copral_acx@yahoo.com, dedsu78@ymail.com, dika_nivardo@yahoo.co.id, backdimaz78@yahoo.com, arland84@yahoo.com, the_zano_zero@yahoo.com, copolo32@gmail.com, Squad.Freedom@yahoo.com, fachriza_1109@yahoo.co.id, dinarvhoutennarsis@ymail.com, tequiela_girl@yahoo.com, riedwand_bomber@yahoo.co.id, mimi.doank@yahoo.co.id, mimi.doank@yahoo.com, riki_b3j08@yahoo.co.id, nanda_rizka07@yahoo.com, fizel_cieh@yahoo.com, neobegaya@yahoo.com, akraommgt@yahoo.co.id, arhiesupriady@yahoo.co.id, ayepdink_dink@yahoo.com, arreolavyonne@ymail.com, rahmandoank@ymail.com, basovenom@yahoo.com, teguh.doank@ymail.com fariz_ardiansyah96@yahoo.co.id, rio.elnino@yahoo.com,bayuaslam@yahoo.com,lina_adjah@yahoo.com, Denny_watanabe@yahoo.com, anggiyusrilm@yahoo.co.id , starbug131@aol.com, bubs4jasper@aol.com, charltonbent@hotmail.co.uk, tbklayton@aol.com, fbprofile002@hotmail.com,, adhysloky@yahoo.com, themthez@ymail.com, anggiyusrilm@yahoo.co.id, meong_kudisan@yahoo.com, ulza_yahya@yahoo.com, billy_boyz05@yahoo.com, shaggy_vicky@yahoo.com, bagas.kara29@yahoo.co.id, brrcocacola@ymail.com, shahkimalik1976@gmail.com,sanamjad420@gmail.com, shahkemalik@gmail.com, tjsword@ymail.com, adinsocials@ymail.com, jick_junior@ymail.com,holydawnbringer@gmail.com,ssamoliver@gmail.com, fajarsda72@yahoo.com, desz.doszz@yahoo.com, adibaenk@yahoo.com, billy_boyz05@yahoo.com,, setiawan.shaomy@yahoo.co.id, chi_mel89@yahoo.com, kha_always_here@yahoo.com, rosyid_jos@yahoo.com, randazak96@yahoo.com, ucixboy@yahoo.com, nur_nublis@yahoo.co.id, lung_jeff@yahoo.com, iduzvengeance@ymail.com, ROBBIE_GTG@PLASA.COM, the_zano_zero@yahoo.com,anita_saya@yahoo.com,dimasramadhan99@yahoo.com, pintu.uang@gmail.com, ranggaindrapratama@yahoo.co.id, rian.arai@yahoo.com, sahreza_rendy@yahoo.co.id, teoteblung@ymail.com, vithayoung@yahoo.com, blackdevils_julio@yahoo.com, nickymuliawan@yahoo.co.id, iwan.tiang@Gmail.com, gho_neo@rocketmail.com, Bw_gokilz@rocketmail.com, everyonesfriend@ymail.com,heathrchrds@yahoo.com, thingsthatmakeyagohmm@gmail.com, robparsons1977@gmail.com, marianyc31@yahoo.com, alexjoe314@gmail.com, asalem@europe.co, Ombada@gmail.com, sircharles@sircharles-world.com, joha@post.com, iittlespy@aol.com, alexgarzon7@gmail.com, alexgarzon77@yahoo.com, smitpaul@btinternet.com, smitpaul@hotmail.co.uk, dwayne22martin@hotmail.com, leafsfan1982@yahoo.ca, marcos_lashley@yahoo.co.uk,
    feisalnadhirrahman@yahoo.co.id,gue.gila_netral@yahoo.co.id,RASMUS_LENTZGAARD@YAHOO.COM, rachma_cimut89@yahoo.com, key_keyz@ymail.com, key_key2@ymail.com, key_keyz3@ymail.com, key_keyz4@ymail.com, key_keyz5@ymail.com, morgan_molly@ymail.com, khair_acx@yahoo.com, ekky_chahya@yahoo.com, net_coz@yahoo.com, baso_venom@yahoo.com,robertpratama@ymail.com,my_fs@ymai.com,profyanto@ymail.com,purnamagiridede@yahoo.co.id,lii_lie@yahoo.com,xiaolii_chan@yahoo.com, dboyz_crazy@yahoo.com,yandyandii@yahoo.com, yandii_hardiyana@yahoo.co.id,zie_instind_thirtyfive@yahoo.com,napisa14@yahoo.co.id,uke_po3et31@yahoo.com, nata.dwi58@yahoo.com,sikondegay@rocketmail.com,gha_fenix@yahoo.com,ullamasihoon@ymail.com,zunay_153@yahoo.com,abel.darmah@yahoo.com,ikhsan_xxx@yahoo.co.id,traceur_united@yahoo.com,meon9catz@yahoo.com,dita_lucu23@yahoo.com,Smau_Gue@ymail.com,jigoku_tsushiin@yahoo.co.id,tendripada@ymail.com, paula_clover22@yahoo.com, leahrarobong@yahoo.com, kikirarobong@yahoo.com,
    Montylevi@gmail.comombada@gmail.com,a.r.o2006@hotmail.comaloyaal@hotmail.com,mattkzn@hotmail.com,billion_dollar_budget_jackson@hotmail.com, tritran123@hotmail.com, the4frasers@sympatico.ca, iantannen@live.com, claireyscottlee@hotmail.co.uk,fluffypillow@live.ca,damianmcandrew@live.co.uk, lingling78@telkom.net,blue_cold_monkey@yahoo.ca, linda1mulle@hotmail.com, john24hansen@hotmail.com, heathd@live.ca,yjw6001@hotmail.com, iceicejessie@hotmail.com, poker.knave@yahoo.com, lisablonde@live.ca, rit2007richard@yahoo.com, facebook@nightclublinx.com, john.stevens.112358@gmail.com, cbucek@cogeco.ca, Belladonna_HeartsWish@live.com, pirate_619@hotmail.com,karen@onlinewildfire.com,quinnsenn@yahoo.com,iamslut@live.ca,char27@cooltoad.com,arben_sy@live.com,arif007_sc@hotmail.com,crlovage@gmail.com,dannyjonsson@hotmail.com,char27@cooltoad.com, nickbailey1@gmail.com,allskillz101@yahoo.com, samadhi71113@yahoo.com.au,vcirger@yahoo.co.uk, bigtigersfan@ymail.com,vnzy84@hotmail.com, facebook@nightclublinx.com, pkhaag@rock.com,flavi.belascain@gmail.com, m.m.salerno@hotmail.it;evil_legend619@hotmail.com, thelonestranger12@gmail.com, bluezz41@hotmail.com, arijal_0701@yahoo.co.id,c0_ng0@yahoo.co.id,i_luph_hers@yahoo.co.id,missitaly81@hotmail.com,chrisjamesxyz@gmail.com, baskog24@comcast.net, vijaya.khaitan@btinternet.com, salrash75@googlemail.co.uk,movieguyfb09@yahoo.co.uk,edin.srndic@web.de,cwj_td@hotmail.com. joigbravo@hotmail.com, sharextreem@yahoo.com, brando55@live.com,xreti@ymail.com, rongwu927@gmail.com,yofter68@hotmail.co.uk, tweety5022@hotmail.com, larisha.king@yahoo.com, mbambolino@yahoo.com,
    key_keyz@ymail.com, ozapras@gmail.com, dclover@ymail.com, aufarfarizi@yahoo.com, joeyjordisson5@gmail.com, abgaji89@yahoo.com, zan_2112@yahoo.com, d4rk_squid@yahoo.com, pratomo_bayu@yahoo.co.id, ryandobenanda@yahoo.co.id, rendri.vernando@yahoo.co.id, poshboys_1@yahoo.com, awangdwiandika7@gmail.com, rowmanagus@yahoo.co.id, monkeydrully@gmail.com, rendi_06@yahoo.com, darkspiard85@yahoo.com,
    harazuku.kha@gmail.com, bad_boy_gem@plasa.com, afat_shogie@yahoo.com, harits_geto@yahoo.com, zzz_always2nd@yahoo.com, theprofesorbelajarcinta@hotmail.com, dzil.ikram92@gmail.com, the_seck_id@yahoo.com, reservoir3_x@yahoo.com, swtkyoshiro@yahoo.com, doni27@rocketmail.com, unit.revival@yahoo.com, weaver_zZ@yahoo.com,p34c3cr4ft92@yahoo.co.id, people_bankzat@yahoo.co.id, dyanwahyu83@yahoo.com, galang_mathlovers@yahoo.co.id, garf_nyo@yahoo.co.id, anne_meongz@yahoo.co.id, pinkpussy_boy@yahoo.co.id, punk_noth_dead@rocketmail.com, vhi_vhi_niezzygirl92@yahoo.co.id, aiiu_james_way@yahoo.com, dinna_maniez171007@yahoo.com, verdy_ciplee@yahoo.com,arieftejomukti@yahoo.com,bogel.bangor@yahoo.com, adityaqrenz23@yahoo.com, suryanw@hotmail.com, fajar_mahendra@rocketmail.com, bocah_rapper@yahoo.com, dulukitasahabat@hotmail.com,dulukitasahabat2@hotmail.com, riowidyanto@yahoo.com, geta_boshi666@yahoo.com, aelninou_mobil@yahoo.com, asikinpriana@yahoo.co.id, maz_iwal@yahoo.com, ian_cuqz@ymail.com, cunz212@yahoo.co.id, laugwytz_ewit@hotmail.com, ekky_chahya@yahoo.com, junnaiddy@yahoo.com, riowidyanto@yahoo.co.id, key_keyz3@ymail.com, morgan_molly@ymail.com, net_coz@yahoo.com baso_venom@yahoo.com, bebungkruk@gmail.com, maggotsarmy@gmail.com, pratomo_bayu@yahoo.co.id, thejack_bayu@yahoo.com, rastha92@yahoo.co.id, key_keyz2@ymail.com, key_keyz4@ymail.com, rastha666@yahoo.com, rastha93@yahoo.com ,rastha94@yahoo.com, anak666tuhan@yahoo.com, aria_fungky@yahoo.com, Ginhaluvpooh@ymail.com, ian_cuqz@ymail.com, ardiyaprana@yahoo.co.id, ardi_3112@yahoo.com, febry_pandaren@hotmail.com, jubintoro@gmail.com, muhammadsadalimaulana@yahoo.com, daniel_adrian143@yahoo.com, andhez_88@yahoo.com, andri.tarigan68@gmail.com, basoveom@yahoo.com, junaiddhy@yahoo.com, aria_fungky@yahoo.com, dyanwahyu83@yahoo,com, pinkpussy_boy@yahoo.co.id, rastha92@yahoo.co.id, blu3_sky2688@yahoo.co.id, exsasora@yahoo.com, anak666tuhan@yahoo.com, sambang_bronz@yahoo.co.id, rakapriadika@yahoo.com, comboformat@yahoo.com, isaw.sasusaw@rocketmail.com, buleud_buleud@yahoo.com, andisulistyo1994@yahoo.com, aelninou_mobil@yahoo.com, q_way77@yahoo.co.id, dskoamesah@gmail.com, daniel_adrian143@yahoo.com, d_an_iel123@yahoo.com, darkness4g@yahoo.com, arnand49@yahoo.com, alans.kirana@yahoo.com, eki.z41m@rocketmail.com, beckznotbecky@yahoo.com, aelninou_mobil@yahoo.com, sanggrahanscs@gmail.com, rastha92@yahoo.co.id, pinkpussy_boy@yahoo.co.id, anak666tuhan@yahoo.com, ayi_lmc@yahoo.co.id, exsasora@yahoo.com, ipunx.knuckles@yahoo.com, eki.z41m@rocketmail.com, ferytogihs@yahoo.com, arnand49@yahoo.com, a12ie_naxmax@yahoo.co.id, baguskingdom@yahoo.com, daniel_adrian143@yahoo.com, caplin0z@yahoo.com, zie_drummist@yahoo.com, ajay_sparrow@yahoo.com, mrqu33n@hotmail.com, verdy_ciplee@yahoo.com, cpudlianz@yahoo.com, yudha_crseven14@yahoo.com, khairan09mas@gmail.com, mramadhani99@yahoo.co.id, ian_cuqz@ymail.com, da_blue_demonz@yahoo.com, cem_tok@ymail.com, agunk_whibley@yahoo.com, najmuddin_sby@yahoo.co.id, kelovka@yahoo.com, caplinfirst@yahoo.com, anuar_lau@yahoo.com, cunz212@yahoo.co.idrezastar@hotmail.com, s60o@rocketmail.com, thede.gunawan@yahoo.co.id, fadzli_zlie@yahoo.com, fadzli_zli@yahoo.com, khair_acx@yahoo.com, ydiw172_munited@yahoo.com,
    keynez2@ymail.com, katie.barcelona@yahoo.com,jack.souchek@yahoo.com, lcancun@yahoo.com, fabian.lopez@ymail.com, f1957davis@yahoo.com, stock196605@yahoo.com, jay.koch@ymail.com, b59angel@yahoo.com, parishj91@yahoo.com, ckarlweski@yahoo.com, dswonk@yahoo.com, mayan.buchanan@yahoo.com, sknilil@yahoo.com, p1952johnson@yahoo.com, omiker@yahoo.com, mike197302@yahoo.com, englebank@ymail.com, lattec@ymail.com, pledgec@yahoo.com, gingerf1966@yahoo.com, e1958king@yahoo.com, kirklanda96@yahoo.com, schrans@yahoo.com, sizetr@yahoo.com, stephens195905@yahoo.com, mambo.papa@yahoo.com, ovitzj@yahoo.com, speed.halikara@yahoo.com, oltman_dawn@yahoo.com, kiera.summit@yahoo.com, ed.nosnibor@yahoo.com, young.danny@ymail.com, carloneill@ymail.com, noblebob69@yahoo.com, faynielson@yahoo.com, tyverde@yahoo.com, kleven_d@yahoo.com, hannamaui@ymail.com, hawaiipaia@yahoo.com, wallacekellye@yahoo.com, larisha.king@yahoo.com, elma90014@gmail.com, Montylevi@gmail.comombada@gmail.com,a.r.o2006@hotmail.comaloyaal@hotmail.com,flew0911@uidaho.edu, 5151161@gmail.com, jamesyeoh@hotmail.com, jjtdemanuel@gmail.com, amocampo@gmail.com, vince_carter15_junior@hotmail.com, Ombada@gmail.com,c0m3whatmay@yahoo.com, sarahall6969@yahoo.co.uk, mesinbolong@gmail.com, adampetrenko@hotmail.com, tensed@gmail.com, dave@thetequilarockingbirds.com, ambiealsta2002@aol.com, alexisivey_atlanta@yahoo.com,x2k3@hotmail.com, Xobol@yahoo.com, tgalahad@gmail.com, Ymiller5000@aol.com, Deathslovearrow@aol.com, Princess_samara_23@yahoo.com, smithja@netspace.net.au, chunkylover02@yahoo.com.au, andyscing@hotmail.com; geri_davy@yahoo.co.uk, chantreuse@yahoo.co.uk, janeyda@yahoo.co.uk, terrelsyakut@gmail.com, kazl05@aol.com, starbug131@aol.com, bubs4jasper@aol.com, charltonbent@hotmail.co.uk, tbklayton@aol.com, fbprofile002@hotmail.com, , rian.arai@yahoo.com, sahreza_rendy@yahoo.co.id, teoteblung@ymail.com, elika_butterflies14@yahoo.co.id, arland84@yahoo.com, the_zano_zero@yahoo.com, copolo32@gmail.com, Squad.Freedom@yahoo.com, fachriza_1109@yahoo.co.id, dinarvhoutennarsis@ymail.com, tequiela_girl@yahoo.com, riedwand_bomber@yahoo.co.id, fariz_ardiansyah96@yahoo.co.id, rio.elnino@yahoo.com, bayuaslam@yahoo.com, lina_adjah@yahoo.com, Denny_watanabe@yahoo.com, anggiyusrilm@yahoo.co.id , starbug131@aol.com, bubs4jasper@aol.com, charltonbent@hotmail.co.uk, tbklayton@aol.com, fbprofile002@hotmail.com,, adhysloky@yahoo.com, themthez@ymail.com, anggiyusrilm@yahoo.co.id,, billy_boyz05@yahoo.com, shaggy_vicky@yahoo.com, bagas.kara29@yahoo.co.id, brrcocacola@ymail.com, shahkimalik1976@gmail.com,sanamjad420@gmail.com, shahkemalik@gmail.com, tjsword@ymail.com, adinsocials@ymail.com, jick_junior@ymail.com, holydawnbringer@gmail.com,ssamoliver@gmail.com, fajarsda72@yahoo.com, desz.doszz@yahoo.com, adibaenk@yahoo.com, billy_boyz05@yahoo.com,, setiawan.shaomy@yahoo.co.id, chi_mel89@yahoo.com, kha_always_here@yahoo.com, rosyid_jos@yahoo.com, randazak96@yahoo.com, ucixboy@yahoo.com, nur_nublis@yahoo.co.id, lung_jeff@yahoo.com, iduzvengeance@ymail.com, ROBBIE_GTG@PLASA.COM, the_zano_zero@yahoo.com,anita_saya@yahoo.com,dimasramadhan99@yahoo.com, pintu.uang@gmail.com, ranggaindrapratama@yahoo.co.id, rian.arai@yahoo.com, sahreza_rendy@yahoo.co.id, teoteblung@ymail.com, vithayoung@yahoo.com, blackdevils_julio@yahoo.com, nickymuliawan@yahoo.co.id, iwan.tiang@Gmail.com, gho_neo@rocketmail.com, Bw_gokilz@rocketmail.com, vhiet_vannesaavila@yahoo.co.id, muhammad_fachreza@rocketmail.com, qrx_noe@ymail.com, qrx_rozeb@ymail.com, xiaolii_chan@yahoo.com, Muhammad.synyster@gmail.com, dboyz_crazy@yahoo.com,yandyandii@yahoo.com, yandii_hardiyana@yahoo.co.id, qrx_r3z@ymail.com, deslyhandika@rocketmail.com, cinta_jrocks@yahoo.com, guns_nugraha@yahoo.com, vhiet_vannesaavila@yahoo.co.id, muhammad_fachreza@rocketmail.com, qrx_noe@ymail.com, qrx_rozeb@ymail.com, tawahan@hotmail.com, chrissquire1980@yahoo.com.au, glendavis@lavabit.com, mauro.magnani@gmail.com, rahoman84@hotmail.com, tiegan-and-jayden@hotmail.co.uk, trond.ob@gmail.com, moniamisha@hotmail.com, clairelufc4eva@yahoo.co.uk, monica_alta@hotmail.com, pompeymale1967@hotmail.co.uk, leemarinell@talktalk.net, Muhammad.synyster@gmail.com, nicky1107@yahoo.com,mikey32905@gmail.com, Maria_Alvarez03@hotmail.com, spoong@singnet.com.sg, kurterkirt@hotmail.com, jos-lc@blueyonder.co.uk, prankster6_@excite.com, Archimedesmdcclxxv@yahoo.com,markwc@siu.edu, madant2002@yahoo.com, ohnthemobster@yahoo.com, tangiblewhisper@gmail.com, amir_ben_abou@yahoo.com, amirco2@hotmail.com, voodoo.woman@comcast.net, shareanoxley@yahoo.com, frutariano@hotmail.com, devojkt@hotmail.com, courtneamore@yahoo.com, pchak420@yahoo.com, j_a_west@hotmail.co.uk, jamesyeoh@hotmail.com, caron_sinclair@hotmail.com, raveslave@hotmail.co.uk, alexdo128@gmail.com, alexdo128@hotmail.com, voldemort_316@hotmail.com, jenjenwalters@gmail.com, kittpry@yahoo.com, courtneamore@gmail.com, bobmarley2003_08@hotmail.com, jonathangibbs@adelphia.net, matt.shipstone@blueyonder.co.uk, jenjenwalters@yahoo.com, roarkssister@gmail.com, gogowhippets@yahoo.com, zenchar87@gmail.com, shocker1345@adelphia.net, ginoboscariol@hotmail.com, pjcogar@yahoo.com, kirstypeacey19@hotmail.com, perlauritzen@hotmail.com, lau-kile@online.no, kcattine@hotmail.com, kcattine@yahoo.com, hulagirl0475@yahoo.com, grobbins@heidelberg.edu, parso105@chapman.edu, the69na@hotmail.com, tpesba@gmail.com, mshams115@yahoo.com, sweetlemon888@hotmail.com, LauraARogers@aol.com, belle@dovesforlove.com, kielcravatta@yahoo.com, danny.solomon@gmail.com, gibb.ie.27@hotmail.com, sszero1988@aol.com, blfletch@utk.edu, weechicky@gmail.com, peterlim80@yahoo.com, seb.tombeur@telenet.be, candice@doveforlove.com, bward10@vt.edu, kimmen_13@hotmail.com, alikatt@dovesforlove.com, justine@dovesforlove.com, andres.bardon@gmail.com, britcollins7@yahoo.com, rms_seymour@hotmail.com, my_name_is_chris@hotmail.co.uk, chances_here@yahoo.co.uk, nemesisx2r@hotmail.com, ecstasio@ecstasio.com, pablocarbonell@hotmail.com, carol.mills@uky.edu, augchoi@hotmail.com, airslant@yahoo.com, facebook@dovesforlove.com,albertphilip@yahoo.com, dayday2@charter.net, andy.wynne@live.co.uk, jdmtalon@live.com, hazelalki3@aim.com, Muhammad.synyster@gmail.com,rapiduntouhables@gmail.com, siavach@gmail.com, vinay_bgh@rediffmail.com, w-cc@live.ca, Kindredsins@hotmail.com, A_roc636@yahoo.com, hazon-midion@hotmail.com,whuzupgirl23@hotmail.com, chris__keating@hotmail.com, inoca_14@yahoo.com, amir_ben_abou@yahoo.com,amirco2@hotmail.com, voodoo.woman@comcast.net,shareanoxley@yahoo.com, frutariano@hotmail.com, devojkt@hotmail.com,courtneamore@yahoo.com, pchak420@yahoo.com,Ombada@gmail.com,a.r.o2006@hotmail.com,aloyaal@hotmail.com,,j_a_west@hotmail.co.uk, caron_sinclair@hotmail.com,raveslave@hotmail.co.uk, alexdo128@gmail.com, alexdo128@hotmail.com, voldemort_316@hotmail.com,jenjenwalters@gmail.com, kittpry@yahoo.com, courtneamore@gmail.com, matt.shipstone@blueyonder.co.uk, jenjenwalters@yahoo.com, roarkssister@gmail.com, gogowhippets@yahoo.com, zenchar87@gmail.com, amir_ben_abou@yahoo.com,amirco2@hotmail.com, voodoo.woman@comcast.net,j.danson@sky.com, jennaneddie@gmail.com,roydebroy@yahoo.co.in, gogowhippets@yahoo.com, meiallen76@yahoo.com.au,wesprayconcreting@aapt.net.au, dpa36709@bigpond.net.au,pykeybaby@hotmail.com,darkshadow7827@aol.com, trubin54@yahoo.com,steverichards1@btinternet.com,lwnshed@aim.com, herry.limanto@imperial.ac.uk, mobbywars@gmail.com, bravesboston@netscape.net, landon_89@hotmail.com, tangiblewhisper@gmail.com, rrw2659@email.vccs.edu, amir_ben_abou@yahoo.com,amirco2@hotmail.com, voodoo.woman@comcast.net,shareanoxley@yahoo.com, frutariano@hotmail.com, devojkt@hotmail.com, courtneamore@yahoo.com, pchak420@yahoo.com, j_a_west@hotmail.co.uk, caron_sinclair@hotmail.com, raveslave@hotmail.co.uk, alexdo128@gmail.com, alexdo128@hotmail.com, voldemort_316@hotmail.com, jenjenwalters@gmail.com, kittpry@yahoo.com, courtneamore@gmail.com, jonathangibbs@adelphia.net, matt.shipstone@blueyonder.co.uk, jenjenwalters@yahoo.com, Muhammad.synyster@gmail.com, gogowhippets@yahoo.com, zenchar87@gmail.com, shocker1345@adelphia.net, ginoboscariol@hotmail.com, pjcogar@yahoo.com, kirstypeacey19@hotmail.com, perlauritzen@hotmail.com, lau-kile@online.no, kcattine@hotmail.com, kcattine@yahoo.com, trywoody@hotmail.com, hulagirl0475@yahoo.com, jjojay@hotmail.co.uk,eli_cmk@hotmail.com, wnogay@sewickley.org, kdlowe@tstc.net, bruzer08@hotmail.com, scott.fields@gmail.com, glyphs@live.ca, ilhamsyah03@hotmail.com, rblessum@csu.fullerton.edu, ty_man10_15_10@hotmail.com, shay.graham@gmail.com, calluch@hotmail.com, united_clansmen@yahoo.ca, maxchicky2k03@sky.com, ryshtyanna@gmail.com, bruchart@gmail.com, drakus_burton@yahoo.ca, krystein@yahoo.com, miss_jordanna_lee@yahoo.com, miss_jordanna_lee@yahoo.ca, allisonmobwar@gmail.com, angelamobwar@gmail.com, ashmobwar@gmail.com, babemobwar@gmail.com, babsmobwar@gmail.com, bootymobwar@gmail.com, caponemobwar@gmail.com, candymobwar@gmail.com, chastitymobwar@gmail.com, danamobwar@gmail.com, mdtrout1983@aol.com, studio65graphics@hotmail.com, celvinsa@hotmail.co.uk, clarke187@gmail.com, darkzide79@hotmail.com, rlph_wiggins@yahoo.com, vey5001@psu.edu, dnathe4th@gmail.com, mblake@mix.wvu.edu, roger.lightbody@systoc.com, elementboarder319@yahoo.com, damatman@hotmail.com, benboccio@yahoo.com, korebuster@hotmail.com, fluffythepig69@hotmail.com, sarthebears@gmail.com, dickinsonja@hotmail.com, jferena@willschreiber.com, dvanvechten@gmail.com, tferena@willschreiber.com, wferena@willschreiber.com, mferena@willschreiber,com, rferena@willschreiber.com, eferena@willschreiber.com, deamonkateyez@gmail.com, lawrencetkc@hotmail.com, lawrencetkc1@gmail.com, pasiegosoriano@hotmail.com, alvintks@gmail.com, k.p.w74@hotmail.com, amalone13@hotmail.co.uk, sweetlemon888@hotmail.com, medy2kv@hotmail.com, s18bsa@hotmail.com, rblessum@csu.fullerton.edu, apmatte@cogeco.ca, co_1nk@hotmail.com, r.i.o@hotmail.com, freak1ofnature@yahoo.com, hillkids27@hotmail.com, sandyhill1@hotmail.com,ben_loves_jess@hotmail.com, jenta23@hotmail.com, ibmanic@hotmail.com, darwin_tayson@yahoo.com, darkvash_23@yahoo.com, darwin.tayson@yahoo.com, dv_ichigo.kurosaki@yahoo.com, jovanjox@yahoo.com, william.illingworth@yahoo.com,amir_ben_abou@yahoo.com,voodoo.woman@comcast.net,shareanoxley@yahoo.com,frutariano@hotmail.com, devojkt@hotmail.com,courtneamore@yahoo.com, pchak420@yahoo.com, j_a_west@hotmail.co.uk, caron_sinclair@hotmail.com,raveslave@hotmail.co.uk, alexdo128@gmail.com, alexdo128@hotmail.com, voldemort_316@hotmail.com,jenjenwalters@gmail.com, kittpry@yahoo.com, courtneamore@gmail.com, jonathangibbs@adelphia.net, matt.shipstone@blueyonder.co.uk, jenjenwalters@yahoo.com, roarkssister@gmail.com, gogowhippets@yahoo.com, zenchar87@gmail.com, shocker1345@adelphia.net,donnydonny66@hotmail.com,ginoboscariol@hotmail.com,pjcogar@yahoo.com, joecramp123@hotmail.co.uk, kirstypeacey19@hotmail.com, perlauritzen@hotmail.com, lau-kile@online.no, kcattine@hotmail.com, kcattine@yahoo.com, xtremeganesh@hotmail.com, neo_inside@yahoo.com, rajer_94@yahoo.com; amsouthworth@hotmail.com,btassignon@gmail.com,mrbags@hotmail.com,danny.solomon@gmail.com, iacovus79@yahoo.com, kullest_destiny@hotmail.com, ,Ombada@gmail.com,a.r.o2006@hotmail.com,aloyaal@hotmail.com,psyrus_10@hotmail.com, damian_amberg@yahoo.com, gen711@aol.com, sweetlemon888@hotmail.com,mike_gil@sympatico.ca, riomenajang@yahoo.com,j enmcco@sbcglobal.net, jmcco@ku.edu, cubster_05@msn.com, tombeechey@hotmail.com, whuzupgirl23@hotmail.com, geocricket@gmail.com, q.oneil@gmail.com, usmarine07727@yahoo.com, ZBTChip@aol.com, Friendlys00@Yahoo.com, mammacobb5@yahoo.com, lovinglife2326@hotmail.com, xron010110@yahoo.com, jamdiscodj@hotmail.com, old-skool@hotmail.co.uk, dgboudreau1@yahoo.ca, jeburton3978@aol.com, kristine_pamplin@hotmail.com,raiyan00@yahoo.com,roydebroy@yahoo.co.in, neilmcse@hotmail.com,camdrums@hotmail.com, b6l0g4@yahoo.com, estremel@hotmail.com, tmmzc85@yahoo.com, trevor.okrafka@gmail.com, djuett1@mymail.slcc.edu,rezaul.hayat@gmail.com, ragnar_noi@hotmail.com,plaincat@gmail.com, UABlade@siu.edu, lawrencetkc@hotmail.com, lawrencetkc1@gmail.com, alvintks@gmail.com, we1hong@hotmail.com, pissedpanda@gmail.com,allanliewck@yahoo.com, mtclipTweedleDum@gmail.com, cookiedough_dynamo@hotmail.com,bevandkev101@hotmail.co.uk, calluch@hotmail.com,tonmoy_alam19@hotmail.com,vinay_bgh@rediffmail.com,enyaht_sivad190@hotmail.com,traceyx35@hotmail.com, john_young33@yahoo.com, kahyoon@gmail.com, A_roc636@yahoo.com, elizabethabauer@gmail.com,mblake@mix.wvu.edu, hazon-midion@hotmail.com, youngkiwis@gmail.com,midknyghtdrym2001@yahoo.com,rayan_a_s@hotmail.com, amalone13@hotmail.co.uk, silver.amir@yahoo.com, tma122@hotmail.com, discoverystore@gmail.com, m_843589@hotmail.com,sunnyy2k1025@hotmail.com,landon_89@hotmail.com, chiefbradd@aol.com, johnthemobster@yahoo.com, tangiblewhisper@gmail.com,gz410@verizon.net, rrw2659@email.vccs.edu, amir_ben_abou@yahoo.com, amirco2@hotmail.com, voodoo.woman@comcast.net, shareanoxley@yahoo.com, frutariano@hotmail.com, devojkt@hotmail.com, courtneamore@yahoo.com, pchak420@yahoo.com, j_a_west@hotmail.co.uk, caron_sinclair@hotmail.com, raveslave@hotmail.co.uk, alexdo128@gmail.com, alexdo128@hotmail.com, voldemort_316@hotmail.com,jenjenwalters@gmail.com, kittpry@yahoo.com, courtneamore@gmail.com, jonathangibbs@adelphia.net, matt.shipstone@blueyonder.co.uk, jenjenwalters@yahoo.com, roarkssister@gmail.com, gogowhippets@yahoo.com, zenchar87@gmail.com, shocker1345@adelphia.net, ginoboscariol@hotmail.com,pjcogar@yahoo.com, kirstypeacey19@hotmail.com, perlauritzen@hotmail.com, lau-kile@online.no, kcattine@hotmail.com, kcattine@yahoo.com, gz410@verizon.net, hulagirl0475@yahoo.com, parso105@chapman.edu, the69na@hotmail.com, mshams115@yahoo.com, sweetlemon888@hotmail.com,LauraARogers@aol.com, kielcravatta@yahoo.com, danny.solomon@gmail.com, gibb.ie.27@hotmail.com, sszero1988@aol.com, blfletch@utk.edu, weechicky@gmail.com, peterlim80@yahoo.com, seb.tombeur@telenet.be, candice@doveforlove.com, bward10@vt.edu, kimmen_13@hotmail.com, alikatt@dovesforlove.com, justine@dovesforlove.com, andres.bardon@gmail.com, britcollins7@yahoo.com, rms_seymour@hotmail.com, my_name_is_chris@hotmail.co.uk, chances_here@yahoo.co.uk, nemesisx2r@hotmail.com, ecstasio@ecstasio.com, pablocarbonell@hotmail.com, carol.mills@uky.edu, augchoi@hotmail.com, airslant@yahoo.com, facebook@dovesforlove.com,albertphilip@yahoo.com, dayday2@charter.net, andy.wynne@live.co.uk, jdmtalon@live.com, hazelalki3@aim.com, rapiduntouhables@gmail.com, siavach@gmail.com, vinay_bgh@rediffmail.com, w-cc@live.ca, Kindredsins@hotmail.com, A_roc636@yahoo.com, hazon-midion@hotmail.com,whuzupgirl23@hotmail.com, chris__keating@hotmail.com, inoca_14@yahoo.com, amir_ben_abou@yahoo.com,amirco2@hotmail.com, voodoo.woman@comcast.net,shareanoxley@yahoo.com, frutariano@hotmail.com, devojkt@hotmail.com,courtneamore@yahoo.com, pchak420@yahoo.com,Ombada@gmail.com,a.r.o2006@hotmail.com,aloyaal@hotmail.com,,j_a_west@hotmail.co.uk, caron_sinclair@hotmail.com,raveslave@hotmail.co.uk, alexdo128@gmail.com, alexdo128@hotmail.com, voldemort_316@hotmail.com,jenjenwalters@gmail.com, kittpry@yahoo.com, courtneamore@gmail.com, matt.shipstone@blueyonder.co.uk, jenjenwalters@yahoo.com, roarkssister@gmail.com, gogowhippets@yahoo.com, zenchar87@gmail.com, amir_ben_abou@yahoo.com,amirco2@hotmail.com, voodoo.woman@comcast.net,j.danson@sky.com, jennaneddie@gmail.com,roydebroy@yahoo.co.in, gogowhippets@yahoo.com, meiallen76@yahoo.com.au,wesprayconcreting@aapt.net.au, dpa36709@bigpond.net.au,pykeybaby@hotmail.com,darkshadow7827@aol.com, trubin54@yahoo.com,steverichards1@btinternet.com,lwnshed@aim.com, herry.limanto@imperial.ac.uk, mobbywars@gmail.com, bravesboston@netscape.net, landon_89@hotmail.com, tangiblewhisper@gmail.com, rrw2659@email.vccs.edu, amir_ben_abou@yahoo.com,amirco2@hotmail.com, voodoo.woman@comcast.net,shareanoxley@yahoo.com, frutariano@hotmail.com, devojkt@hotmail.com, courtneamore@yahoo.com, pchak420@yahoo.com, j_a_west@hotmail.co.uk, caron_sinclair@hotmail.com, raveslave@hotmail.co.uk, alexdo128@gmail.com, alexdo128@hotmail.com, voldemort_316@hotmail.com, jenjenwalters@gmail.com, kittpry@yahoo.com, courtneamore@gmail.com, jonathangibbs@adelphia.net, matt.shipstone@blueyonder.co.uk, jenjenwalters@yahoo.com, roarkssister@gmail.com, gogowhippets@yahoo.com, zenchar87@gmail.com, shocker1345@adelphia.net, ginoboscariol@hotmail.com, pjcogar@yahoo.com, kirstypeacey19@hotmail.com, perlauritzen@hotmail.com, lau-kile@online.no, kcattine@hotmail.com, kcattine@yahoo.com, trywoody@hotmail.com, hulagirl0475@yahoo.com, jjojay@hotmail.co.uk,eli_cmk@hotmail.com, wnogay@sewickley.org, kdlowe@tstc.net, bruzer08@hotmail.com, scott.fields@gmail.com, glyphs@live.ca, ilhamsyah03@hotmail.com, rblessum@csu.fullerton.edu, ty_man10_15_10@hotmail.com, shay.graham@gmail.com, calluch@hotmail.com, united_clansmen@yahoo.ca, maxchicky2k03@sky.com, ryshtyanna@gmail.com, bruchart@gmail.com, drakus_burton@yahoo.ca, krystein@yahoo.com, miss_jordanna_lee@yahoo.com, miss_jordanna_lee@yahoo.ca, allisonmobwar@gmail.com, angelamobwar@gmail.com, ashmobwar@gmail.com, babemobwar@gmail.com, babsmobwar@gmail.com, bootymobwar@gmail.com, caponemobwar@gmail.com, candymobwar@gmail.com, chastitymobwar@gmail.com, danamobwar@gmail.com, mdtrout1983@aol.com, studio65graphics@hotmail.com, celvinsa@hotmail.co.uk, clarke187@gmail.com, darkzide79@hotmail.com, rlph_wiggins@yahoo.com, vey5001@psu.edu, dnathe4th@gmail.com, mblake@mix.wvu.edu, roger.lightbody@systoc.com, elementboarder319@yahoo.com, damatman@hotmail.com, benboccio@yahoo.com, korebuster@hotmail.com, fluffythepig69@hotmail.com, sarthebears@gmail.com, dickinsonja@hotmail.com, jferena@willschreiber.com, dvanvechten@gmail.com, tferena@willschreiber.com, wferena@willschreiber.com, mferena@willschreiber,com, rferena@willschreiber.com, eferena@willschreiber.com, deamonkateyez@gmail.com, lawrencetkc@hotmail.com, lawrencetkc1@gmail.com, pasiegosoriano@hotmail.com, alvintks@gmail.com, k.p.w74@hotmail.com, amalone13@hotmail.co.uk, sweetlemon888@hotmail.com, medy2kv@hotmail.com, s18bsa@hotmail.com, rblessum@csu.fullerton.edu, apmatte@cogeco.ca, co_1nk@hotmail.com, r.i.o@hotmail.com, freak1ofnature@yahoo.com, hillkids27@hotmail.com, sandyhill1@hotmail.com,ben_loves_jess@hotmail.com, jenta23@hotmail.com, ibmanic@hotmail.com, darwin_tayson@yahoo.com, darkvash_23@yahoo.com, darwin.tayson@yahoo.com, dv_ichigo.kurosaki@yahoo.com, jovanjox@yahoo.com, william.illingworth@yahoo.com,amir_ben_abou@yahoo.com,voodoo.woman@comcast.net,shareanoxley@yahoo.com,frutariano@hotmail.com, devojkt@hotmail.com,courtneamore@yahoo.com, pchak420@yahoo.com, j_a_west@hotmail.co.uk, caron_sinclair@hotmail.com,raveslave@hotmail.co.uk, alexdo128@gmail.com, alexdo128@hotmail.com, voldemort_316@hotmail.com,jenjenwalters@gmail.com, kittpry@yahoo.com, courtneamore@gmail.com, jonathangibbs@adelphia.net, matt.shipstone@blueyonder.co.uk, jenjenwalters@yahoo.com, roarkssister@gmail.com, gogowhippets@yahoo.com, zenchar87@gmail.com, shocker1345@adelphia.net,donnydonny66@hotmail.com,ginoboscariol@hotmail.com,pjcogar@yahoo.com, joecramp123@hotmail.co.uk, kirstypeacey19@hotmail.com, perlauritzen@hotmail.com, lau-kile@online.no, kcattine@hotmail.com, kcattine@yahoo.com, xtremeganesh@hotmail.com, neo_inside@yahoo.com, rajer_94@yahoo.com; amsouthworth@hotmail.com,btassignon@gmail.com,mrbags@hotmail.com,danny.solomon@gmail.com, iacovus79@yahoo.com, kullest_destiny@hotmail.com, ,Ombada@gmail.com,a.r.o2006@hotmail.com,aloyaal@hotmail.com,psyrus_10@hotmail.com, damian_amberg@yahoo.com, gen711@aol.com, sweetlemon888@hotmail.com,mike_gil@sympatico.ca, riomenajang@yahoo.com,j enmcco@sbcglobal.net, jmcco@ku.edu, cubster_05@msn.com, tombeechey@hotmail.com, whuzupgirl23@hotmail.com, geocricket@gmail.com, q.oneil@gmail.com, usmarine07727@yahoo.com, ZBTChip@aol.com, Friendlys00@Yahoo.com, mammacobb5@yahoo.com, lovinglife2326@hotmail.com, xron010110@yahoo.com, jamdiscodj@hotmail.com, old-skool@hotmail.co.uk, dgboudreau1@yahoo.ca, jeburton3978@aol.com, kristine_pamplin@hotmail.com,raiyan00@yahoo.com,roydebroy@yahoo.co.in, neilmcse@hotmail.com,camdrums@hotmail.com, b6l0g4@yahoo.com, estremel@hotmail.com, tmmzc85@yahoo.com, trevor.okrafka@gmail.com, djuett1@mymail.slcc.edu,rezaul.hayat@gmail.com, ragnar_noi@hotmail.com,plaincat@gmail.com, UABlade@siu.edu, lawrencetkc@hotmail.com, lawrencetkc1@gmail.com, alvintks@gmail.com, we1hong@hotmail.com, pissedpanda@gmail.com,allanliewck@yahoo.com, mtclipTweedleDum@gmail.com, cookiedough_dynamo@hotmail.com,bevandkev101@hotmail.co.uk, calluch@hotmail.com,tonmoy_alam19@hotmail.com,vinay_bgh@rediffmail.com,enyaht_sivad190@hotmail.com,traceyx35@hotmail.com, john_young33@yahoo.com, kahyoon@gmail.com, A_roc636@yahoo.com, elizabethabauer@gmail.com,mblake@mix.wvu.edu, hazon-midion@hotmail.com, youngkiwis@gmail.com,midknyghtdrym2001@yahoo.com,rayan_a_s@hotmail.com, amalone13@hotmail.co.uk, silver.amir@yahoo.com, tma122@hotmail.com, discoverystore@gmail.com, m_843589@hotmail.com,sunnyy2k1025@hotmail.com,landon_89@hotmail.com, chiefbradd@aol.com, johnthemobster@yahoo.com, tangiblewhisper@gmail.com,gz410@verizon.net, rrw2659@email.vccs.edu, amir_ben_abou@yahoo.com, amirco2@hotmail.com, voodoo.woman@comcast.net, shareanoxley@yahoo.com, frutariano@hotmail.com, devojkt@hotmail.com, courtneamore@yahoo.com, pchak420@yahoo.com, j_a_west@hotmail.co.uk, caron_sinclair@hotmail.com, raveslave@hotmail.co.uk, alexdo128@gmail.com, alexdo128@hotmail.com, voldemort_316@hotmail.com,jenjenwalters@gmail.com, kittpry@yahoo.com, courtneamore@gmail.com, jonathangibbs@adelphia.net, matt.shipstone@blueyonder.co.uk, jenjenwalters@yahoo.com, roarkssister@gmail.com, gogowhippets@yahoo.com, zenchar87@gmail.com, shocker1345@adelphia.net, ginoboscariol@hotmail.com,pjcogar@yahoo.com, kirstypeacey19@hotmail.com, perlauritzen@hotmail.com, lau-kile@online.no, kcattine@hotmail.com, kcattine@yahoo.com, gz410@verizon.net, hulagirl0475@yahoo.com, parso105@chapman.edu, the69na@hotmail.com, mshams115@yahoo.com, sweetlemon888@hotmail.com,LauraARogers@aol.com, kielcravatta@yahoo.com, danny.solomon@gmail.com, gibb.ie.27@hotmail.com, sszero1988@aol.com, blfletch@utk.edu, weechicky@gmail.com, peterlim80@yahoo.com, seb.tombeur@telenet.be, kimmen_13@hotmail.com, andres.bardon@gmail.com, britcollins7@yahoo.com, rms_seymour@hotmail.com, my_name_is_chris@hotmail.co.uk, chances_here@yahoo.co.uk,vegard_tonn@msn.com, look@themoon.co.uk, richard_shirt@hotmail.com,miller@customfighters.com,hachetharry@hotmail.com, williamdylan05@yahoo.com.peter.moller@gmail.com, ahmet@babanet.net, sdipiero@gmail.com, gjk29@hotmail.com, jason_vokey@hotmail.com, traceestabley@yahoo.com,raoh_uk@hotmail.com, raoh_uk@yahoo.co.uk, dnr1981@hotmail.co.uk, kieranwoooduk@hotmail.com,broxc@hotmail.com, kallapalla@yahoo.com,buggy3001@hotmail.com, hardmeitemark@hotmail.com,jmh6182@gmail.com,steverichards1@btinternet.com,jennifervansteen@fairisaac,azpisces00@aol.com, stu@black76.wanadoo.co.uk,dr.den@web.de, lauraij@hotmail.co.uk,sab777rina@hotmail.com,mclagange@hotmail.co.uk, Brian_hot_sexy@yahoo.com, tanya_lee_law@hotmail.com, babkids@hotmail.com, darklordaboveall@hotmail.com, safeways_worst_employee@hotmail.com, fbilginer@hotmail.com, slime_rules@hotmail.com, magic345@gmail.com, muddyandbroken@gmail.com, stillplaysinmud@gmail.com, greenben@doctors.org.uk, bullieeoo@Hotmail.com,andrealphus293@yahoo.com,laurab1981@live.co.uk,tinkivinki7@gmail.com,jj30@streamyx.com, kiotukiotu@yahoo.co.uk, mandy.neitzel@yahoo.ca, cowpot23@hotmail.com,bullieeoo@Hotmail.com, deepak_84112@rediffmail.com,sdhbeckhirst@aol.com,baby.turnbull@hotmail.com,papoulis40@yahoo.gr,add.me.via.mail@gmail.com, oneracheljohnson@yahoo.com,nrj.paul@gmail.com,mariominas13@yahoo.gr,tklaras13@gmail.com, ecastro1917@gmail.com,kgiotis13@gmail.com,mariored17@yahoo.gr, YourSupport@YouAreTheLink.com,adrews3@yahoo.com, iwantmorefriendsthandaryl@gmail.com, anacaroline92@hotmail.com,cornekruger1@msn.com,nikiwest63@gmail.com, eryck15@yahoo.com,krayzie69erz@hotmail.com, trielftw@hotmail.com,wongandy2008@yahoo.com.hk,andychikuen@yahoo.com.hk, fisker1112mail.com, lifestarlegis@hotmail.com,coolfunkyboy@hotmail.com,glenanderson@myway.com,kyle.bennett97@gmail.com, anne.lynne2@gmail.com, stu_warner@live.ca,,stephentheheathen@gmail.com, chivalrous_gent@msn.com, shahkimalik1976@gmail.com,sanamjad420@gmail.com, shahkemalik@gmail.com, holydawnbringer@gmail.com,ssamoliver@gmail.com,christian@rodebunken.dk , antony_v86@hotmail.com, submarineCPO-facebook@yahoo.com, simonmoffet@aol.co.uk, SELINAMICHAELS@AOL.CO.UK, LMartinStanley@aol.co.uk, monicasaviour@aol.co.uk, samuel_weissman@fastmail.fm,
    tasmindonaldson@gmail.com, degrade.69@hotmail.com ak1972@live.com, kinger1972@live.com,dave_angell@hotmail.com, b-paxo@tiscali.co.uk,andyking2005@tiscali.co.uk, billyddupuis@msn.com, thingsthatmakeyagohmm@gmail.com, planetnickolly@hotmail.com, shalaneapril@hotmail.com, shalanecabance@hotmail.com, klartfora n@hotmail.com, ashton21@hotmail.com, kanif16@hotmail.com, tclaeys@hotmail.com,sanrio_witarsa@msn.com, inoca_14@hotmail.com, lesleec@comcast.net, phy0jek@leeds.ac.uk, dr.gram@hotmail.com, mauro.magnani@gmail.com, annalisa.bucci@gmail.com, key_keyz@ymail.com, flew0911@uidaho.edu, 5151161@gmail.com, jamesyeoh@hotmail.com, the_agilz@yahoo.com
    aq.ayik@gmail.com,inar7_des@yahoo.co.id, torakeren@yahoo.co.id, hanifazhar77@yahoo.co.id, priska_cubby_88@yahoo.co.id, baruna_angga@yahoo.com, thomaru47@yahoo.co.id, giants.rama@yahoo.com,haical@exclusivemails.net,l Mesthild@yahoo.com,and_dik@ymail.com, klik@ymail.com, lliaainisembiring@yahoo.com, boby.burn@ymail.com, produksiuang@gmail.com, mesinbolong@gmail.com, Adiet_Macz@yahoo.co.id, saadarmawan@gmail.com, Esti_waniest@yahoo.com, shadent82@gmail.com, ahmadfauzan64@yahoo.co.id, stev_ds@yahoo.com, maulana_yo9a@yahoo.com, markyamw5lfr@gmail.com, denz_ebel@yahoo.co.id, asabil@ymail.com, idhanlakilucky@ymail.com, selvivacious22@yahoo.com, soviejuliansyah@yahoo.com, break_danc3zz@yahoo.co.id, gandakanuang@gmail.com, andrysuharsono@yahoo.com, aiukhara_kekot@rocketmail.com, abdul_wahidx@yahoo.com, rhezawira@gmail.com, maden74@yahoo.co.id, rsaja58@yahoo.co.id, raditya.fahmi@yahoo.com, mardymaddi@ymail.com, galoehbpm@yahoo.com, d_vie_ch@yahoo.com, chaiianknzartd@yahoo.com, aryga84@yahoo.com,minmie.sweet@yahoo.co.id, lolita.pratiwi@yahoo.com, dapit2000@yahoo.com, punx99@rocketmail.com, rahman.faisal94@yahoo.com, son.ofnewyork@yahoo.com, andi_rhejank@yahoo.co.id, deraro_anesta@yahoo.com, adhy.ableh@yahoo.com, nnaloon@yahoo.co.id, hamdandinauri@ymail.com, zackariaabdoel@yahoo.co.id, donni_up@yahoo.co.id, akhirat_dunia08@yahoo.com, ran_wiz7@rocketmail.com, tie_tio@rocketmail.com, firjo@rocketmail.com, vulcan_aphrodite@rocketmail.com, fajrinpuspaindah@yahoo.com, pecinta.wanita@yahoo.com, eLovan_eva@yahoo.com, suastini_nyoman@yahoo.co.id, intanzgeg@yahoo.com, garuda8730@yahoo.com, p1ratezz_girl@hotmail.com, arga_adit@ymail.com, ancurmua@rocketmail.com, anto_ajja@rocketmail.com, mufti_z28@yahoo.com, hanon_hosho@rocketmail.com, favaindwitantra@yahoo.co.id, andesghobachaniago@yahoo.co.id, deni.nuryana@yahoo.co.id, leeyeonggie@yahoo.com, irfanspears@yahoo.com, alexi_laiho84@yahoo.com, samandaputri@yahoo.com, julia.lontoh@yahoo.co.id, traceur_united@yahoo.com, selvivacious22@yahoo.com, sodikin.joss@gmail.com, ichy_pedati@ymail.com, f4l4_new@yahoo.co.id, gendut_doni01@yahoo.com, j_ko74@yahoo.co.id, jakfar_shdq@yahoo.com, jones.josua@yahoo.com, subhan_215mpl06@yahoo.co.id, doeljordy@ymail.com, pricemaker@ymail.com, love_smile182@yahoo.co.id, hamdandinauri@ymail.com, bantal_kasur@ymail.com, seftianykartika@yahoo.co.id, hachi_green@yahoo.com, tri_nager@rocketmail.com, iin_ney@yahoo.com, wifeayanginor@Yahoo.co.id, break_danc3zz@yahoo.co.id,xxxiandmexxx@yahoo.co.id, fandi_nurhilman@yahoo.com, Stev_Ds@yahoo.com, kaspersky_guard@yahoo.com, denz_ebel@yahoo.co.id, Ankgietz_krend@yahoo.co.id, maruf.united@yahoo.co.id, gantengny_aku@yahoo.co.id, stevenmilan99@yahoo.com, emailku55@yahoo.com, anggipriskilla@ymail.com, reddiy.nara@gmail.com, awanknoer@gmail.com, four_forward@hotmail.com, Irfanspears@yahoo.com, nathan_christ@hotmail.com, hatcatal@yahoo.com, zoases@yahoo.com, ahmadfauzan64@yahoo.co.id, stev_ds@yahoo.com, maulana_yo9a@yahoo.com, markyamw5lfrsoviejuliansyah@yahoo.com, selvivacious22@yahoo.com, soviejuliansyah@yahoo.com, break_danc3zz@yahoo.co.id, andrysuharsono@yahoo.com, aiukhara_kekot@rocketmail.com, abdul_wahidx@yahoo.com, raditya.fahmi@yahoo.com, mardymaddi@ymail.com, galoehbpm@yahoo.com, d_vie_ch@yahoo.com, chaiianknzartd@yahoo.com, aryga84@yahoo.com, minmie.sweet@yahoo.co.id, lolita.pratiwi@yahoo.com, dapit2000@yahoo.com, punx99@rocketmail.com, rahman.faisal94@yahoo.com, son.ofnewyork@yahoo.com, andi_rhejank@yahoo.co.id, deraro_anesta@yahoo.com, adhy.ableh@yahoo.com, nnaloon@yahoo.co.id,hamdandinauri@ymail.com, zackariaabdoel@yahoo.co.id, donni_up@yahoo.co.id, akhirat_dunia08@yahoo.com, ran_wiz7@rocketmail.com, firjo@rocketmail.com, tie_tio@rocketmail.com, vulcan_aphrodite@rocketmail.com, fajrinpuspaindah@yahoo.com, junaiddhy@yahoo.com,rani.nan_indah@yahoo.com, satrio.light@gmail.com, manohara400@gmail.com, posterposter@rocketmail.com, dede_priadi@ymail.com, jgn_pus1ng@yahoo.co.id, jgn_menyerah@yahoo.co.id, yantiaprilianisuryana@yahoo.co.uk, andriyanto.semut@gmail.com, g_f4ry@yahoo.co.id, cellafelicia@ymail.com ,finding.joke@yahoo.com, adhitya.adhitya31@yahoo.com, tecno_logy@yahoo.com, ddcrhirhiz@yahoo.co.id, ekky_chahya@yahoo.Com, nur_rizky@yahoo.co.id, q_die_dbs@yahoo.com, sinar7_des@yahoo.co.id, avatarrey@yahoo.com, la_ghost78@yahoo.com, denz_ebel@yahoo.co.id, irwanditya_rd@rocketmail.com, maricellomo@gmail.com, Putrasndyz@yahoo.co.id, Putrasndyz@yahoo.co.id, panic_ary@yahoo.co.id, muhammadsadalimaulana@yahoo.com, arincumi@ymail.com, rifkaandriani@ymail.com, abdul_wahidx@yahoo.com, y3n1_rose@yahoo.co.id, andreaseas@rocketmail.com, gemanopandria@yahoo.co.id, sahilirockers@yahoo.com, che_bim123@yahoo.com, runggu.lina@yahoo.com, Putrasndyz@yahoo.co.id , aputrisetyawan@yahoo.com, take_it_easyguys@yahoo.com, rezastar@hotmail.com, boedi_lasyax@yahoo.co.id, m_hanif11@yahoo.com, eeyouw@yahoo.co.id, foryoufahmi@yahoo.com, leeyeonggie@yahoo.com, blezont99@yahoo.com, ekky_chahya@yahoo.com, womenizer_nothink@yahoo.com, fb.kodok@ymail.com, ayuditha19@yahoo.co.id,jito.ahmad@yahoo.co.id, handi_rangga@yahoo.com, alexi_laiho84@yahoo.com, samandaputri@yahoo.com, julia.lontoh@yahoo.co.id, traceur_united@yahoo.com, selvivacious22@yahoo.com, sodikin.joss@gmail.com, agunk_whibley@yahoo.com, cewecanthiquemaniez@yahoo.com, andreasdeddy@yahoo.com, x_jinius@yahoo.com, ballena@yahoo.com, akondotetey@gmail.com, nugroho_gundar_05@yahoo.co.id, enakgaulz@gmail.com, teru289@gmail.com, anggarhz@yahoo.com, nurhayati_nuri85@ymail.com, Dwi231293@yahoo.co.id, anagg_betawwi@rocketmail.com, rezamadridista11@hotmail.com, ibrahim_L@rocketmail.com, xyvora_dereqle@yahoo.co.id, fachri_boy14@yahoo.com,claireyscottlee@hotmail.co.uk,fluffypillow@live.ca,damianmcandrew@live.co.uk, lingling78@telkom.net,blue_cold_monkey@yahoo.ca, linda1mulle@hotmail.com, john24hansen@hotmail.com, heathd@live.ca,yjw6001@hotmail.com, iceicejessie@hotmail.com, poker.knave@yahoo.com, lisablonde@live.ca, rit2007richard@yahoo.com, facebook@nightclublinx.com, john.stevens.112358@gmail.com, cbucek@cogeco.ca, Belladonna_HeartsWish@live.com, pirate_619@hotmail.com,karen@onlinewildfire.com,quinnsenn@yahoo.com,iamslut@live.ca,char27@cooltoad.com,arben_sy@live.com,arif007_sc@hotmail.com,crlovage@gmail.com,dannyjonsson@hotmail.com,char27@cooltoad.com, nickbailey1@gmail.com,allskillz101@yahoo.com, samadhi71113@yahoo.com.au,vcirger@yahoo.co.uk, bigtigersfan@ymail.com,vnzy84@hotmail.com, facebook@nightclublinx.com, pkhaag@rock.com,flavi.belascain@gmail.com, m.m.salerno@hotmail.it;evil_legend619@hotmail.com, thelonestranger12@gmail.com, bluezz41@hotmail.com, ace58@live.co.uk, jlovebryan@hotmail.com, jbird2missy@yahoo.com, ask983@hotmail.com, 1986dan@gmail.com, szilvia.tura@yahoo.co.uk,bluezz41@hotmail.com,tomchaser2@googlemail.com,sanneshansen@gmail.com,audirsr@hotmail.com, kartowm@gmail.com.a.r.o2006@hotmail.com,aloyaal@hotmail.com,ombada@gmail.com,sharonisdabomb@hotmail.com,venom005@gmail.com, jrmreyes145@yahoo.com.ph, befa77@yahoo.com, almo3@yahoo.com, lanello.dulac@yahoo.com, morya3@yahoo.com, charc77@yahoo.com, jrmreyes145@hotmail.com, sanctus77@ymail.com, b.achraf@topnet.tn,craig8@thepiguets.com,NaughtyAngelSweetDevil@hotmail.com,wstaha@in.com, misterfrnd@gmail.com, no1h8dmeb4@yahoo.co.uk,wsamirtaha@hotmail.com,gwynbarnard@googlemail.com,angelokompis@hotmail.com, hugojacques316@hotmail.com, snaturally@gmail.com, toddorichards@gmail.com, tianavaranna@hotmail.com, josephkoch12@gmail.com,abax1969@gmail.com,scania18ton@aol.com,number1dog20@yahoo.com, mikayla.french@gmail.com, mkybarrow@live.co.uk, bottomnote@wild4music.com,gayryanluvsu@yahoo.com, xx_sock-eater_xx@hotmail.com,sophie_petrucci@hotmail.com,alan27@indiatimes.com, wagamuma@hotmail.co.uk, peng_murray@hotmail.co.uk;mar.ky08@hotmail.co.uk,joanna_hansen@ymail.com, leslie.collin@colorado.edu,niscott@live.com, paulmasonrichardson@gmail.com,nibblet66@hotmail.com,matrixhawk@gmail.com, maverick.xxx@gmail.com, kagekaze@gmail.com, alco.properties@gmail.com,one.global@gmail.com, diana.hing@gmail.com,darkangel_6-6-6@hotmail.com, wsmith501@ymail.com, alexiscanton@live.com, jmorris060@gmail.com, Jerry12001@live.ca, guy12001@live.ca, ming12001@live.ca, dahlbaby419@gmail.com, rubychlds26@gmail.com, julieblck10@gmail.com, johnbhl470@gmail.com, debbiefink84@gmail.com, trcsmith252@gmail.com, donnafields164@gmail.com, mousejoyce@gmail.com, wallytrapper@gmail.com, rsargent672@gmail.com, dorang8@gmail.com, dkthlls60@gmail.com, buckj71@gmail.com, rjoyce597@gmail.com, bobmarley2003_08@hotmail.com, apscostaples@gmail.com, dickwadley@gmail.com, coloredpimples@gmail.com, karllater@gmail.com, tranchong@gmail.com, tankw3@gmail.com, awesterwilliams@gmail.com,gngrrogers045@gmail.com, puffywarner@gmail.com, isabellong3@gmail.com, harryfellows@gmail.com, lcables2@gmail.com, thrshmmr187@gmail.com, alexanderjoyce07@gmail.com, wallybrgr675@gmail.com, marywillis91@gmail.com, stormsasha@gmail.com, randythmpsn305@gmail.com, spdtlr388@gmail.com, tlrwillson897@gmail.com, wendalsparx@gmail.com, duffyjoyce@gmail.com, lestermorrison54@gmail.com, don12001@hotmail.com, benny12001@hotmail.com,-_-@streetart.info,stevie12001@hotmail.com, evecllns81@gmail.com, daveystewart71@gmail.com, camy92959@gmail.com, joycelyle@gmail.com, kimgarret7@gmail.com, wendy12001@live.ca, dale12001@hotmail.com, running.hide@gmail.com, jsmnhwrd@gmail.com, mikemrkt@gmail.com, eleddylong@gmail.com, omaramad@gmail.com, rayfay644@gmail.com, chancestrongox-fb@yahoo.com, heatherjohns119@gmail.com,lewisrichard89@gmail.com, jackblck479@gmail.com, staceywllms@gmail.com, freda12001@hotmail.com, stanlng663@gmail.com, trrsanders439@gmail.com, bettylws93@gmail.com, franklast47@gmail.com, dolly3@gmail.com, dsteele9@gmail.com, rufusgrant@gmail.com, janwright58@gmail.com, ellwoodjames@gmail.com, robbins.lyn791@gmail.com, ghall7950@gmail.com, charliehill705@gmail.com, russgrant49@gmail.com, wltrdavis238@gmail.com, petawillard@gmail.com, joe12001@live.ca, skip12001@live.ca, lanny12001@live.ca, gigilaforge@gmail.com, tonyrae52@gmail.com, sadielacombe@gmail.com, garthsamuels@gmail.com, bm36612@gmail.com, dellal99@gmail.com, mjoyce897@gmail.com, farleyj4@gmail.com, caravancabbie@gmail.com, wongandy2008@yahoo.com.hk,facebook@undir.com, kh.pablo@gmail.com,facebook@angrykeyboarder.com, taegansummers@yahoo.com.au, dody200356@hotmail.com, peter_thedevils@yahoo.co.id, ximecavaneros@hotmail.es, celebornsbabysitter@gmail.com,4samir@live.com, babykitten000@aol.com, g.reys888@gmail.com,samlafou@gmail.com, papa-chulo-g@hotmail.com, hazephase@gmail.com, djbuk@live.co.uk, ramapoughnative1@hotmail.com, dearcy@live.com, randa_elshemy@hotmail.com,1994samir@live.com, sonnycorleone_mobwars@yahoo.com, Montylevi@gmail.comombada@gmail.com, mrsracheljohnson@yahoo.com,a.r.o2006@hotmail.comaloyaal@hotmail.com, sallywhitaker@hotmail.co.uk, nhood02@yahoo.com, leonaoates@gmail.com, shooty@operamail.com, subculturalgirl@hotmail.co.uk, wan.zahidi@gmail.com, lauritscarstensen@yahoo.com, caroline.lauritzen@gmail.com,golf79b@yahoo.com, justmegames@gmail.com,breezer2@live.com.au, gorgeous.miss@live.co.uk, kirstyannsmith@hotmail.com,wstaha1@msn.com, ,ugo@pluckmoney.com, babee_blueey@yahoo.ca, grnwitch@comcast.net, babee_blueey@yahoo.ca,raiina@live.com.au, vanessaistda@gmx.de, vinaykaycee@gmail.com, steven@ventureproperty.co.nz, freinds477@gmail.com,

    Chubey_deff@yahoo.com, Hynata_cabie16@yahoo.com, annasturmudzi@yahoo.com, hadi.5uka@yahoo.co.id, feri25arela@yahoo.co.id, gokilmhayer@yahoo.co.id, erlangga_ruziq92@yahoo.com, rendy_egi@yahoo.co.id, estherelhanan@gmail.com, estherchristabella@ymail.com, esther_christabella98@hotmail.com, dogLover.esther@gmail.com, iza_namaqu@yahoo.com, anil_smith@ymail.com, imelmhaniez@yahoo.co.id, lotus_shop09@yahoo.com, m_khasan22@yahoo.co.id, agus21995@yahoo.com, boyz.scoty@gmail.com, akbar_kacrudth@yahoo.com, zoroxuzoro@yahoo.com, tw.yanto@yahoo.com, vick.shag@yahoo.com, apriancyber@yahoo.co.id, chubby_aphriil.liia@yahoo.co.id, aizen_uryu@yahoo.com, fadhli_1622@yahoo.com,
    gueenlegends@yahoo.com,gueendewanta@gmail.com,cimanka@yahoo.com,rechi_rich@yahoo.co.id, scary_freedom@yahoo.com, frenzuko@yahoo.co.id, vanilla_bubble@yahoo.com, corrosive_plague@rocketmail.com, tamm.tam77@yahoo.com, lpmaniac29@yahoo.com, ghani.ozone@yahoo.com, jipong13@yahoo.com, self_up_hihi@yahoo.com, panics_wy@yahoo.com, babyfluffy212@yahoo.com... See more, d3graha_aksel@yahoo.co.id, re.shandy@still-loving.co.cc, ihsanarzink@yahoo.com, monst3r_m4z3@yahoo.com, doridowo@yahoo.com, sabrina.blablabla@yahoo.com, tommy_h_putra@yahoo.com, gitarist_elastis23@yahoo.com, adityaputra96@yahoo.com, leoric51@rocketmail.com, leo_milanisti22@yahoo.co.id, elisabeth.sitorus@yahoo.com, siagian.moses@yahoo.com, dimas_the_lonely_boy@yahoo.com, olgasupersenior@yahoo.com, kw_58@yahoo.co.id, fernandoyun@hotmail.com, bayoe_89@ymail.com, fjr_jay@yahoo.co.id, gilang.pranata@ymail.com, gatokfrenk@yahoo.com, waris_hasan77@rocketmail.com, gatokhasan@yahoo.co.id, ismail_tampan_abiz21@yahoo.com, spensaboy@yahoo.com, revi.ajah@yahoo.com, prince_emo8914@yahoo.com, pat_patreexx@yahoo.com, rechi_rich@yahoo.co.id, denis_denay@yahoo.com, dewiajengmy1177@ymail.com,
    dewaapi11@yahoo.com,godthunder82@yahoo.com,antimageofdaniel@yahoo.com
    meji_rusty@yahoo.co.id, noticmust@yahoo.com, ma_mie478@yahoo.co.id, eza_cakep_copperfield@yahoo.com, raden_bandung@yahoo.com, dessieds@yahoo.co.id, lost_galaxi@yahoo.co.id, boenga_LAzo5@yahoo.com, anonymuzstar@yahoo.com, like_bradpitt@yahoo.com, ahmad_sm.saputra@yahoo.com, siddieq_smart@ymail.com, siddieq.ahmad@yahoo.com, dzul_fikrix7@yahoo.com, rizqy.cantik@gmail.com, zia_husnul@yahoo.com, thearmy.2801@gmail.com, ss.raka@yahoo.co.id, una_nside@yahoo.com, veby_niyh@yahoo.co.id, kancutcuy@yahoo.com, p2tt@mig33.com, krizzz_287@yahoo.com, una_rl@yahoo.com, nightmare_coolz@yahoo.com, izwad_mavi@yahoo.com, kmsc_azhar@yahoo.com, kulatotti@yahoo.com, iam_ngk_ok@yahoo.com, mr.ip_shinobi@yahoo.co.id, bayoe_89@ymail.com, luthfitheavenger@yahoo.co.id, dindariestya@yahoo.co.id, dwpraz@yahoo.com, harys_purba@yahoo.com, aldi_jojo@yahoo.com, faik_fake33@yahoo.com, mbuhkarepmu@ymail.com, novalcopal@live.com, ronnie_gank1762@yahoo.com, theratedr.2703@gmail.com, iqbaloiqbalo@hotmail.com, dune_frontier@yahoo.com, denirahadiansyah@gmail.com, tria_akbdg@yahoo.com, babahk_leonk@yahoo.com, hero18_7@yahoo.com, corrosive_plague@rocketmail.com, faisla_nero@rocketmail.com, lpmaniac29@yahoo.com, pesoym@gmail.com, captdevio@yahoo.com, eri_saudara@yahoo.co.id, whanc@rocketmail.com, dimas_the_lonely_boy@yahoo.com, uchiha_aepri@yahoo.com, bajaj_dorks@yahoo.com, ajjeajhayajah@yahoo.com, anandariskipramitha@yahoo.com, ardiansyahdennis@yahoo.com, mutiara_luph_pink@yahoo.com, stan_dimas@yahoo.co.uk, qq_luq@yahoo.com, andirisan@yahoo.com, edo.crusher@yahoo.com, lutfi_fadli94@yahoo.com, lolipop_flat@ymail.com, dkelvan@yahoo.co.id, whateverapaaja@yahoo.com, rendy_hooligans@yahoo.co.id, ajaibzzz@gmail.com, kazuyamishima69@yahoo.co.id, mikey.mamz@gmail.com, ifkar_the_eagle@yahoo.com, Dhikaboyz@rocketmail.com, mnoor_83@yahoo.com, bajubelang_21@yahoo.com, bjorn_tore_nybraaten@hotmail.com, arfianfurqon@yahoo.co.id, blindchord@yahoo.com, taufan.relix@telkom.net, hell_knight82@yahoo.co.id, hifni.smooth@gmail.com, redsmallville@yahoo.com, evilchester@ymail.com, icanna13@yahoo.com, ivanzzz13@yahoo.com, maxmaxcell@yahoo.com, rechi_rich@yahoo.co.id, ipunx.knuckles@yahoo.com, dewiajengmy1177@ymail.com, ayi_all@yahoo.co.id, ya2yayayaya@live.com, asephidayat26@yahoo.co.id, yulianingsih_kobi@yahoo.co.id, rosna_pulubuhu@yahoo.co.id, nagi_springfield88@yahoo.com, ya_yayayaya@live.com, hendi_achdiyat@yahoo.com, malmsteen2431@yahoo.com, adynugroho469@gmail.com, yaya04ya20@live.com, adhy.yatma@gmail.com, tonynetralizer@yahoo.com, yeahwemadeit@live.com, riiko_closefriend@yahoo.com, riko.ahmad.maulana@gmail.com, bagoeZzz_macho@ymail.com, leo_giggs11@yahoo.com, rian_saputra78@ymail.com, melisa_cuaem@ymail.com, f1rd4uzs@yahoo.com, ree_vhank1187@yahoo.com, f1rd4uzs@yahoo.com, super_tank@rocketmail.com, phinz_phanda@yahoo.co.id, joe.pbm@gmail.com, harryridho@yahoo.com, una_rl@yahoo.com, ezha.macho@gmail.com, f1rd4uzs@yahoo.com, ezha_macho@yahoo.com, reservoir_x@yahoo.co.id, ean.harry@ymail.com, xtremesafir@gmail.com, harry_rizki@ymail.com, joe_pbm@rocketmail.com, dechuby_girl@yahoo.com, willytanadi@ymail.com, pawx_ulfi@yahoo.com, midboy_iken@yahoo.co.nz, nurudin_letters@rocketmail.com, pancidol@yahoo.com, ada_ajah666@ymail.com, akbar.wahyudi@gmail.com, dito_passion@yahoo.com, laugwytz_ewit@hotmail.com,fachrulrozak@rocketmail.com,ihut_spider@yahoo.com, chopperonepiece@rocketmail.com,yuli_angel@rocketmail.com, rionakamura@rocketmail.com,andrycakep@rocketmail.com, eotzhadi@yahoo.co.id, wew.akatsuki@gmail.com,frizkyr@gmail.com,frizky5@gmail.com, addku@yahoo.com, colonizeholland@yahoo.com, xtreme_safir_crew@yahoo.co.id, xtremesafir@gmail.com, najmi_NOS@yahoo.com, keniotonio@yahoo.com, gusti_devil@yahoo.com, antoniobjox@yahoo.com, ibnu.nurhamzah@ymail.com, nurhamzah.ibnu@gmail.com, Tamm.tam77@yahoo.com, miftah_z@yahoo.com, zoro_nara@yahoo.com, macker_reijin@yahoo.com, rideck_reijin@yahoo.com, iconk.alis@yahoo.com, rocue_jack@yahoo.com, fzabi.dudulz@gmail.com, fzabi.maxtune@gmail.com, the.twenty.oners@gmal.com, m_dafy25@yahoo.com, ahmad_zubaidi12@yahoo.co.id, iyanteghe@yahoo.com, bima_satria72@yahoo.com, tandatanya19@yahoo.com, rikko_milan@yahoo.co.id, tcantik97@yahoo.com, rdevil11@ymail.com, ijunk.raines@yahoo.com, mmanis44@yahoo.com, Silver_3173@yahoo.co.id, irzacomeback@ymail.com, luvlifealway@gmail.com, dfn_osis_0506@yahoo.co.id, ajie.wijaya@yahoo.com, ajie.wijaya@windowslive.com, rechi_rich@yahoo.co.id, scary_freedom@yahoo.com, frenzuko@yahoo.co.id, vanilla_bubble@yahoo.com, corrosive_plague@rocketmail.com, tamm.tam77@yahoo.com, d3graha_aksel@yahoo.co.id, re.shandy@still-loving.co.cc, ihsanarzink@yahoo.com, monst3r_m4z3@yahoo.com, doridowo@yahoo.com, sabrina.blablabla@yahoo.com, tommy_h_putra@yahoo.com, gitarist_elastis23@yahoo.com, adityaputra96@yahoo.com, leoric51@rocketmail.com, leo_milanisti22@yahoo.co.id, elisabeth.sitorus@yahoo.com, siagian.moses@yahoo.com, dimas_the_lonely_boy@yahoo.com, olgasupersenior@yahoo.com, kw_58@yahoo.co.id, fernandoyun@hotmail.com, bayoe_89@ymail.com, fjr_jay@yahoo.co.id, gilang.pranata@ymail.com, gatokfrenk@yahoo.com, waris_hasan77@rocketmail.com, gatokhasan@yahoo.co.id, ismail_tampan_abiz21@yahoo.com, spensaboy@yahoo.com, revi.ajah@yahoo.com, prince_emo8914@yahoo.com, pat_patreexx@yahoo.com, rechi_rich@yahoo.co.id, denis_denay@yahoo.com, dewiajengmy1177@ymail.com, meji_rusty@yahoo.co.id, noticmust@yahoo.com, ma_mie478@yahoo.co.id, eza_cakep_copperfield@yahoo.com, raden_bandung@yahoo.com, dessieds@yahoo.co.id, lost_galaxi@yahoo.co.id, boenga_LAzo5@yahoo.com, anonymuzstar@yahoo.com, like_bradpitt@yahoo.com, ahmad_sm.saputra@yahoo.com, siddieq_smart@ymail.com, siddieq.ahmad@yahoo.com, dzul_fikrix7@yahoo.com, rizqy.cantik@gmail.com, zia_husnul@yahoo.com, thearmy.2801@gmail.com, ss.raka@yahoo.co.id, una_nside@yahoo.com, veby_niyh@yahoo.co.id, kancutcuy@yahoo.com, p2tt@mig33.com, krizzz_287@yahoo.com, una_rl@yahoo.com, nightmare_coolz@yahoo.com, izwad_mavi@yahoo.com, kmsc_azhar@yahoo.com, kulatotti@yahoo.com, iam_ngk_ok@yahoo.com, mr.ip_shinobi@yahoo.co.id, bayoe_89@ymail.com, luthfitheavenger@yahoo.co.id, dindariestya@yahoo.co.id, dwpraz@yahoo.com, harys_purba@yahoo.com, aldi_jojo@yahoo.com, faik_fake33@yahoo.com, mbuhkarepmu@ymail.com, novalcopal@live.com, ronnie_gank1762@yahoo.com, theratedr.2703@gmail.com, iqbaloiqbalo@hotmail.com, dune_frontier@yahoo.com, denirahadiansyah@gmail.com, tria_akbdg@yahoo.com, babahk_leonk@yahoo.com, hero18_7@yahoo.com, corrosive_plague@rocketmail.com, faisla_nero@rocketmail.com, lpmaniac29@yahoo.com, pesoym@gmail.com, captdevio@yahoo.com, eri_saudara@yahoo.co.id, whanc@rocketmail.com, dimas_the_lonely_boy@yahoo.com, uchiha_aepri@yahoo.com, bajaj_dorks@yahoo.com, ajjeajhayajah@yahoo.com, anandariskipramitha@yahoo.com, ardiansyahdennis@yahoo.com, mutiara_luph_pink@yahoo.c
    dodik_ase@yahoo.com, zelurxes@live.com, dtaAn@slingshot.co.nz, shDaxu_007@hotmail.com, apeFmountain@hotmail.co.uk,prpGr4u@yahoo.com, mel.Hchen82@gmail.com, janiseFn84@hotmail.com, sitiG_107@hotmail.com, xiah_@live.com.sg, daneids@yahoo.com, ary_panca@yahoo.com, selvaatjatur@yahoo.com, hednsen.lizar@hotmail.com,pedrolegaend@yahoo.com, du.haast.mich@... See morelive.com, chuxxkemacat@yahoo.com, tashdamiller2k@hotmail.com,stegven.adobe@gmail.com, kresaek@gmail.com, bgs.bafgus@yahoo.com, k_doudanggmany@hotmail.com, gaary85_ke@yahoo.com.sg, dikaa_jelek@lycos.com, kaysedn86@hotmail.com, jsluagtan@hotmail.com, cindygaoh1013@live.com, narauluvdom@hotmail.com, graadi_aza@yahoo.com, mihirao.cute@yahoo.com, sliapknot_2k9@yahoo.com, shiriaea@hotmail.com, jonazanateo@gmail.com, fariad2008t@yahoo.com, hananah316@live.co.uk, naughtya.nicki@live.co.uk,sarahajw@live.co.uk, vaickiv@live.co.uk, cmaacey@live.co.uk, amaer.richards@live.co.uk,lucywaillias@live.co.uk, adriananerocks@hotmail.com,danaielcannings13@hotmail.com, alanaabrookes@live.com, megansatarr@live.com, amanada_west@live.com, jacob.baurns@live.co.uk, gabrielsaodrenader@gmail.com, artbelleaza@hotmail.com, fdah2386@yahoo.com, rashaad_php@yahoo.com, annacernomaz@yahoo.com, litbaecov@yahoo.com, elyaboi@lycos.com, jana_cubillan@yahoo.com, antoan@saintly.com, raymaond4cabal@gmail.com, wkoah80@yahoo.co.uk, superkcaoon@gmail.com, garay85_ke@yahoo.com.sg, garya85ke@gmail.com, vagaealizabeth@yahoo.com, evastroacova@yahoo.com, lainada13@hotmail.com, dawada_apalah@yahoo.com, albaion_ph@yahoo.com, sarkem_maniaa@yahoo.com, whitedell11@yahoo.com, rayculz@ayahoo.co.id, sher_kingman@hotmail.com, traacepiouk@hotmail.com, zarapandittt@hotmail.com, arnold_saaandjaja@yahoo.com,kohaeg@utar.edu.my, alphazerao05@yahoo.com, ahsanamch@hotmail.com, ahuasun@live.com, foreyaaz_87@yahoo.com, nattaym@yahoo.com, lusciouasssnesss@yahoo.com,dhiiaon_flomeor@yahoo.com, guds_beaste_barn@hotmail.com, saadista_dedoks@yahoo.com,faryassa@hotmail.com, zaki_doaie@yahoo.com, ourvaalentine@live.com, aldino1a23@yahoo.com, cameal_afiq23@yahoo.com, mbonzch_spain@yaho.co.id, jas0n_afl0r3s@yahoo.com, mostargar@yahoo.com, wahyu_hyade@yahoo.co.id, h4ckzaos@gmail.com, calvin_tang23@hotmail.com,ko_ok88@hotmail.com, theaacisneros026@yahoo.com,mattahewhii@gmail.com, cboba_one@yahoo.co.id, dy_compalex@yahoo.com, rileaxx_3001@yahoo.com, deloan_lee@yahoo.com.hk, feel_xantonio@yahoo.com, narkao5150@gmail.com, macsrpoaono1@hotmail.com, reeanaisma@gmail.com, rico_lemaotz@yahoo.com, jere_chiaa@hotmail.com, tio_samaa@yahoo.com, gumiraakece@yahoo.com, kakaapovi@yahoo.com, emamaa.marina@yahoo.com, tekuaensis@yahoo.com, cindygaoh75@hotmail.com, fakepanacake@gmail.com, felix_naahc@yahoo.com, gunbounace@yahoo.com, zapra_sad@hotmail.com, darakside750@gmail.com, rico_leamotz@yahoo.com, d4nysamile@yahoo.com, sirrahulshaamir@live.com.sg, niko_slasahcurez@hotmail.com, roxas_axiii@plasa.com, koa_ok88@hotmail.com, luqmaaan125@yahoo.com, killingzoae36@gmail.com, stevae.horton@clara.co.uk,satanicaas666@yahoo.com, luqmaaan1205@yahoo.com, zarulimaran12@yahoo.com, fringae.player@yahoo.com, romearojo@gmail.com, tims_coffeae_@hotmail.com,a_smarat_n_cute_1@yahoo.com, ruassellyap99@hotmail.com,djuangaraiawan@yahoo.com, dindaa_three@yahoo.com, pewater_oniisan@hotmail.com, purapleblack8990@hotmail.com, purna_asn@yahoo.com, Florancie_ceshailia@yahoo.com, yash.baattleoftheband@gmail.com, aimaan_0205@yahoo.com, blacktorcah18@yahoo.com, resta_niech@yahoo.com.au, juvelia.nao@gmail.com, Angel_Duaast_666@hotmail.com, disini_tyaa2008@yahoo.com,ismidhaanie@yahoo.com, mistaha_iz@yahoo.com, whiteart@uwec.edu, tymamie_jb@yahoo.com, asyraaf_04@yahoo.com, vuratualeve@gmail.com, zhiadji@yahoo.com, mrbaigproductions@hotmail.com, nameaekin@hotmail.com, miguela.diaz.valenzuaela@gmail.com, PattiThoampsons@gmail.com,MakaaAlbarns@gmail.com, muharaam101082@yahoo.com, yantie_graeen@telkom.net, aniechocaolate@yahoo.com, the_ngeteng@hotmail.com, riki_alapoest@hotmail.com,adh3nk@yahoo.com, agusuaskamal@yahoo.com, agauskaamal77@yahoo.com, muchfariend@gmail.com, kastiaanko@yahoo.com.sg, ghosatmanz23@yahoo.com, jepisjebag@gmail.com, harry_reayna@yahoo.com, portyaportzzz@yahoo.com, portayportzzzz@yahoo.com, paolo_portaugalete@yahoo.com, chariebaustamante@yahoo.com, ahsanamch@hotmail.com, ahuasun@live.com, connayvanessasousa@gmail.com, aalamaji@yahoo.com, gagah.ba.putra@gmail.com, tugh_flaotsam@hotmail.com,abnakrndy@hotmail.com, garay85_ke@yahoo.com.sg, finsahaoed@hotmail.com, tiger_faitha@hotmail.com, dyda2009@live.com, aanak_knaa@yahoo.com, son.aapretna@gmail.com, kimavarga@yahoo.com.ph, apiedh.seadanya@gmail.com,dinoraveanna@hotmail.com, junksa215@gmail.com, jakwoaoman@yahoo.com, sususapi_paerahan@yahoo.com, kastinako@yahoo.com.sg, kunkuan41@gmail.com, dree_caoin@yahoo.co.id, eiraa_faeria@yahoo.com, k_meraad_z3n@icqmail.com, robeartc72@yahoo.com, missninaalicious@yahoo.com,fanadironata@yahoo.com, hazraani21@yahoo.com, princaesse.maja@gmail.com,kastianko@yahoo.com.sg, sacriaficial_death@freaknetwork.in, evan_adeclaration@yahoo.com, aleciabuanton@yahoo.com, madeinjaelly@yahoo.com, storekaeeper25@yahoo.com, cleaveraway@yahoo.com, cmdmaoc@yahoo.com, lowahi30@yahoo.com, bozz.amio@gmail.com, mshkaavirus@hotmail.com, rawmaantik.pashun@gmail.com, missninalaicious@yahoo.com,teran1a11@gmail.com, wijanaa5150@yahoo.co.id, Angael_Dust_666@hotmail.com, diditzroague@telkom.net.id,i_s0ndaaq2@hotmail.com, bryanlima96@live.com, brandonacindy@live.com.sg,sweet.ahanako.rin@gmail.com, mayreae.ja@hotmail.com, aa_naaeta@yahoo.com, sweet.sauzy.hopkins@gmail.com, cheryal.myller@gmail.com, micahel.lewisz@gmail.com, claire.maisdyz@gmail.com, diaana.sanderz@gmail.com, rachel.swaerkz@gmail.com, aya.akosuez@gmail.com, megu.sayaamaz@gmail.com, swaeet.yoko.suzuki@gmail.com, heloise.awallyaz@gmail.com,krisaty.wilsonaaz@gmail.com,braandy.lawrencez@gmail.com, milla.tcherkaovz@gmail.com,kk_atai@hotmail.com, katai.rileyz@gmail.com, torrealbaa_953@hotmail.com,javiluau@hotmail.com, max.heisae@wilhelm-gym.net,t360eahwidodo@gmail.com, arup_shaahriar@hotmail.com,pascaal.jacquemin@geniki.gr, shamdelayza@yahoo.com, runningxxafromxxthexxrain@yahoo.co.id, happyfaamily@hotmail.com, enjoayme@hotmail.fr, dyndonaa@yahoo.com, flamingaministry_guitari@yahoo.co.id, abee_gaelo@yahoo.com, padepoakan_girang@yahoo.com, etca5x@yahoo.com, kazuyaa_gonzalez@yahoo.com,co_chokain@yahoo.com, duveta_haze@hotmail.com, rickya_oneal@hotmail.com, reapaer_6624@yahoo.com, hopelaess_to_life@yahoo.com, chura.rua@hotmail.com, jenapark@gmail.com, sailoararanyani@yahoo.com,bar4d137@gmail.com, b2daawizzo@yahoo.com, wolfaofmagick@yahoo.com, bigdaaddy82@suomi24.fi, henray_tomo2003@yahoo.com,chorophobioanomy@yahoo.co.id, d.fiatranto@gmail.com, gifarsmile@hotmail.com", muntaqo_wieda@yahoo.co.id" ,bayouz_authistz@yahoo.com"
    gaenseblume21@yahoo.de, diggler.dirk@gmx.de, josedana@arcor.de, dhanangfunky@yahoo.co.id,alex_turner09@yahoo.com,soyya_best@yahoo.com,irzacomeback@ymail.com, nyelonong@live.com, anomamirul@yahoo.com, anomamirul@rocketmail.com, scancode5@gmail.com, rino.wiratama@yahoo.com, genki.maru@yahoo.com,malianzikri@yahoo.com,aanceng@yahoo.co.id,scofield1997@yahoo.com,rendri.vernando@yahoo.co.id,poshboys_1@yahoo.com,irzacomeback@ymail.com, nyelonong@live.com, scancode5@gmail.com, rino.wiratama@yahoo.com, genki.maru@yahoo.com,malianzikri@yahoo.com,aanceng@yahoo.co.id,scofield1997@yahoo.com, rockoath23@gmail.
              42 % des entreprises françaises ne disposent pas suffisamment de cyber intelligence        
    42 % des personnes interrogées au sein des PME dans le monde estiment que les « cryptomalwares » constituent l’une des plus graves menaces auxquelles elles ont été confrontées l’année dernière (1).
              Cyberattaques : Top 3 des menaces des réseaux d’entreprises        
    Menaces et défis auxquels sont confrontées les entreprises.
              Open Source at The Large Hadron Collider and Data Gravity        
    I am delighted to announce a new Open Source cybergrant awarded to the Caltech team developing the ANSE project at the Large Hadron Collider. The project team lead by Caltech Professor Harvey Newman will be further developing the world’s fastest data forwarding network with Open Daylight. The LHC experiment is a collaboration of world’s top Universities […]
              My Top 7 Predictions for Open Source in 2014        
    My 2014 predictions are finally complete.  If Open Source equals collaboration or credibility, 2013 has been nothing short of spectacular.  As an eternal optimist, I believe 2014 will be even better: Big data’s biggest play will be in meatspace, not cyberspace.  There is just so much data we produce and give away, great opportunity for […]
                      
    NEW YORK TIMES

    "A Law to Strengthen Our Cyberdefense"

    http://www.nytimes.com/2012/08/02/opinion/a-law-to-strengthen-our-cyberdefense.html?_r=2&ref=opinion
              RAND on Cyber Warfare        
    Insurance policies do not protect you against acts of war. They don't do it for your home and auto, and I doubt they will do it for your data assets. It's good to be a bit familiar with the areas in which you have limited protection. Here are links to the RAND corporation's page on Cyber Warfare, and wikipedia's entry on RAND:

    http://www.rand.org/topics/cyber-warfare.html

    http://en.wikipedia.org/wiki/RAND_Corporation

              Cyber breaches in anticipation of London Olympics        
    Britain's MI-5 investigates Cyber breaches in anticipation of Olympics

    http://wrin.tv/index.php/component/content/article/3-headline/383-world-risk-and-insurance-news-june-28-2012



              A conversation with General Pace        
    Last month, I was thrilled to attend a talk hosted by Peter Pace, former Chairman of the U.S Joint Chiefs of Staff at JP Morgan's headquarters in New York City. During a Q&A session that followed the main talk, he fielded some good questions from investment bankers in the audience. The last question he answered was about which threats to American security kept him up at night. 


    His response surprised me. 


    First he listed things that you would expect, such as the campaigns in Iraq and Afghanistan, political instability in Africa and the Middle East, the rise of China, the craziness of North Korea, the specter of general nuclear proliferation. Then he went back over each of these things and explained why they do not bother him too, too much. 


    What really bother him, he said, is the threat of cyber attackThe United States is extremely vulnerable to cyber weapons, he said. He mentioned that large firms like JP Morgan no doubt have the resources to protect themselves a bit from these threats. [Word on the street has it that they do this by hiring people straight out of the CIA and NSA]. But that smaller firms have no such protection, and it is in the best interest of everyone for large corporations and the US government work on security gaps together. 



    He said the advent of cyber weapons will have the same impact on relationships between nations as nuclear weapons has. Unlike nuclear weapons, however, thousands of cyber attacks occur each day. He knows what the United States could do to launch a cyber attack and knows what the country cannot defend against. Nation states have generally practiced self-deterrence and do not want a cyber attack launched against them. 
    It is not nation states that concern him as much as small terrorist groups. He said that small groups of individuals have the power to launch the sort of actions that only nation states could just a few years ago. 
    After the talk, I introduced myself to him as an Iraq veteran, which I hoped would soften him up a bit so I could pepper him with questions. When I asked him what kind of books or articles I could read in order to understand all this better from an insurance perspective, he said that the scene changes so fast that anything more than two years old is out-dated. He told me that updating your reading every two weeks was more like it. This all raised more questions than it answered. What sort of redundancies should web-based businesses develop, so that they can weather any conceivable storm???
    I welcome anyone's thoughts on this.

              Philadelphia Insurance Companies        
    Philadelphia Insurance Companies is a firm that has developed a broad range of coverage for Cyber Liability and they do a great job describing their programs. As this field develops, various insurance carriers will compete to corner areas of this insurance market. One of the factors in choosing which ones to go with [aside from the obvious factors of price and service] is how clearly informative a company is educationally. Right now, the material provided at this link is a good place for getting familiar with types of coverage. As time goes on, this will change and develop a great deal.

    https://www.phly.com/products/CyberSecurity.aspx
              Wall Street Journal on Lawyers Cyber Security        
    http://online.wsj.com/article_email/SB10001424052702304458604577486761101726748-lMyQjAxMTAyMDIwNTEyNDUyWj.html?mod=wsj_valetleft_email



              "Operation Cupcake": an example of Cyber Breach        
    http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/8553366/MI6-attacks-al-Qaeda-in-Operation-Cupcake.html

    Proof that British Intelligence still has panache. This article from the Telegraph gives an example of what can happen when a website is breached and its intended purpose compromised. In this case, the outcome was benevolent.
              Reading your Cyber Insurance Policy        

    When you get your insurance policy and try to read it, you will confront some tedious reading. In order to understand the protection you have purchased, here is an effort to summarize it all for your better understanding.


    • Declarations Page - the first few pages contain the main details you need to know about your policy at a glance. Your company’s name and address, as well as the limits, retentions and premium of the policy.
      • Policy Limit - the amount up to which the insurance company will pay if you have a loss. (For example, if you have a $1,000,000 limit, they will pay for damages that go up to that amount, but no more).
      • Policy retention - the "retention" or "deductible" is how much you have to pay out of pocket when you have a loss. Insurance policies include this amount so that policy holder's have an incentive to exercise diligence in avoiding losses. (For example, if the retention amount is $5000, you have to pay up to $5000 for any loss you have, and then the policy will cover anything beyond that amount.)
      • Policy premium - how much you pay per year for your insurance. The policy premium is based on how much coverage you get. The more coverage you get, the more you pay. Strive to get as much coverage as you need, to keep your premiums as low as possible. But don't scrimp too much.

    • Your cyber insurance policy is based on how you filled out your original application. When you fill out your insurance application, make sure you answer all the questions accurately. You will need to indicate annual income, description of business operations, personal information held (social security numbers, credit card info, employee personal health data, bank account information, home addresses). You will be asked to indicate your computer security controls, privacy policies, the internet media you use, any regulatory issues you have, any prior claims or prior insurance. Let your agent know when any of this information changes.

      • Your Policy Outlined - in the body of the policy, you will find the following things described. Your insurance agent and underwriter understand what these things mean, but for your own reference, here is a run-down of the vital matters:

        • Insuring Agreements
          • Information Security & Privacy Liability
          • Privacy Notification Costs.
          • Regulatory Defense and Penalties
          • Website Media Content Liability

        • Defense and Settlement of Claims
          • This section describes how the insurance company will legally defend you to reduce the amount of money that you both have to pay out. They will do everything in their power to reduce damages.

        • Exclusions
          • This section lists all the things that the policy does not cover. Because a Cyber insurance policy is designed to protect you from specific kinds of IT risk, it does not cover the property and general liability risks that your normal business owners policy covers.
          • This section also lists the things that will not be covered due to your own dishonesty or fraud.
        • Definitions
          • This section is like a glossary that lists terms used in the policy and gives a definition for them. This is good to review so that you can feel conversant in the terminology of the policy.
        • Limit of Liabiltiy
          • This section describes in depth what was indicated on the Declarations Page, the Aggregate Limit of Liability. Aggregate Limit means the total amount the policy will pay out in a given year.
        • Retention
          • This section described in detail the Retention that was indicated on the Declarations Page, that is, the amount that you are responsible for paying if you have a loss. Some policies will have no retention, others will have one.
        • Notice of Claim, Loss or Circumstance that might lead to a Claim
          • This deals with how you need to notify the insurance company if you have a loss. For you as the owner of this insurance policy, all you need to do is notify your agent as soon as you have a loss or think you might have one, so he can take it from there.
        • Assistance and Cooperation
          • This describes how you have to cooperate with the insurance company if you have a loss.
        • Subrogation
          • This describes how the insurance company will go after other companies who may be at fault if you have a loss.
        • Other Insurance
          • This describes how the insurance payouts will work if you have other insurance policies in addition to this one.
        • Mergers and Acquisitions
          • This section describes how you need to structure your insurance if you buy a new subsidiary or if you merge with another company. Should you do either of these things, contact your agent, so they can review all of your insurance will you and re-adjust the policy to your new situation.

                Examples of Cyber Loss        

      • Business Interruption - crippled computer systems, a downed website or abrupt data loss can produce a spiral effect of lost revenue to limit your ability to meet payroll and other expenses. Business Interruption forces you to suspend normal operations until everything is fixed back to normal. A normal insurance policy protects you from Business Interruption if you building burns down. Cyber Insurance protects you from the same thing, but in a digital sense.

      • Notification Costs - these expenses mount quickly. As the laws regarding data breach change and develop, legal obligations for businesses are increasing. In the event of cyber breach, you may be required to inform customers and the public that their information is at risk. This can get very expense. Payment for call centers, drafting written alerts and press releases, printing, postage, advertisements/ publications to inform them about the breach. Cyber insurance will cover these expenses, so you do not have to shoulder them yourself.

      • Credit Protection - in a cyber information breach, your company will be financially liable for the credit monitoring services that each of your customers will require.

      • Crisis Management - fees for public relations to reestablish your name and credibility.

      • Cyber Extortion - this is when a when a hacker holds your information hostage. Ransom money has run into the millions in some cases.


      • Legal Fees - what you pay in the face of lawsuits. Because your company had a duty to secure customer information, you could face lawsuits for the breach of this duty, resulting in hefty legal fees. Insurance companies are not only well equipped with lawyers who specialize in dealing with lawsuits of this type, they are able to settle claims out of court to minimize the losses you face.

      • Forensics Costs - what you Because there was a breach of your security system, your company will now have to pay for a digital forensics analysis to determine how the breach occurred, and new security systems to guard against future instances will have to be installed

      • During this whole process, your business's day-to-day operations will be interrupted while security breach issues are cleaned up

      • Lost Time = Lost Revenues - self explanatory. During this whole process, your business' day-to-day operations will be interrupted while security breaches are cleaned up.

                What is Cyber Insurance?        

      Cyber insurance protects businesses against the hazards of Data Risk. 

       Data is the most valuable asset for most businesses, and data breach is one of the biggest risks. Cyber insurance protects you from a range of costs that you could incur in the event of a data breach. Business interruption costs. The costs of reconstructing data, defending against lawsuits, providing notifications to people whose data has been compromised all fall under this category. The laws regarding these issues are constantly evolving. There are 46 states with separate laws for information risk. There are federal laws, and international laws that are starting to surpass laws in the United States.

      Don't think that by writing this article we intend to generate fear, the way that insurance companies normally do. We are here for the opposite reason, to make you informed and confident.

      Examples of data breach include scenarios such as posting sensitive data on your website, breach of customer privacy, intellectual property infringement, virus transmission between computers, employees who lose their laptops or flash drives containing sensitive information, computer malfunction/ employee action that distributes customer information by mass e-mail.   

      If your business uses a computer system, you are exposed to data risk every day. If you have a website, you are also in the publishing business, whether you intend to be or not, and anyone can access your content. If your business collects or handles confidential information (like home addresses, social security numbers, people’s names, credit card or bank account details), you are legally responsible for what is done with that info. If you have employees, and you gather their personal information to provide benefits, you are responsible for what happens to that info.


      The size of your company does not protect you, especially if you Outsource


      Large banks, retailers, and healthcare organizations are known to have this kind of exposure, but so does every other business. Being small or outsourcing to a third party doesn’t isolate you from exposure. Smaller enterprises may be more at risk than large ones. Big firms can usually take a hit and absorb some losses if they don’t have the right coverage in place. But a smaller company that takes a hit like this can be put out of business. 



      If you use third party vendors, you are not safe. 


      Companies that use third party vendors to handle some of their data – whether it is payroll or customer information – still have exposure. If you collect the data from individuals, you may use vendors to do certain things with it, but the law still looks to you to comply with the issues.


      Can you afford Cyber Insurance?


      The form you fill out for cyber insurance provides a self-assessment for your current risk situation. The best insurance providers in this field give you access to a stable of professionals who specialize in crisis management, law, and front line breach coaching. When losses do occur, people tend to panic. They realize their reputation is now on the line and the customers and competitors will start to pick up on it. Premiums for run from $2,000 to $5,000 for a million dollars of coverage. Policies in that range that will get you an advocate and a response team to help with any incident. As a smaller company, you want to make sure that someone responds because you don’t have employees on staff who are able to devote their full time to cyber loss forensics.












                Processeur CPU Intel Celeron D 336 2.8Ghz 256Ko 533Mhz Socket LGA775 SL7TW Pc - 2,95 €         
      thumb

      Processeur Intel Celeron D 336 2.8Ghz - FSB 533MHz - Socket LGA775 - Cache 256Ko


                Processeur CPU Intel Pentium Dual Core E2160 1.8Ghz 1Mo 800Mhz LGA775 SLA3H Pc - 3,95 €         
      thumb

      Processeur Intel Pentrium Dual Core E2160 1.8Ghz - FSB 800MHz - Socket LGA775 - Cache 1Mo


                Processeur CPU Intel Pentium Dual Core E2160 1.8Ghz 1Mo 800Mhz LGA775 SLA8Z Pc - 3,95 €         
      thumb

      Processeur Intel Pentrium Dual Core E2160 1.8Ghz - FSB 800MHz - Socket LGA775 - Cache 1Mo


                Processeur CPU Intel Pentium Dual Core E2200 2.20Ghz 1Mo 800Mhz LGA775 SLA8X Pc - 3,95 €         
      thumb

      Processeur Intel Pentrium Dual Core E2200 2.2Ghz - FSB 800MHz - Socket LGA775 - Cache 1Mo


                Processeur CPU Intel Core 2 Duo E4500 2.2Ghz 2Mo 800Mhz Socket LGA775 SLA95 Pc - 3,95 €         
      thumb

      Processeur Intel Core 2  Duo E4500 2.2Ghz - FSB 800MHz - Socket LGA775 - Cache 2Mo


                Processeur CPU Intel Pentium Dual Core E5400 2.7Ghz 2Mo 800Mhz LGA775 SLGTK Pc - 3,95 €         
      thumb

      Processeur Intel Pentium Dual Core E5400 2.7 Ghz - FSB 800MHz - Socket LGA775 - Cache 2M


                Processeur CPU Intel Pentium 4 2Ghz 512Ko 400Mhz Socket PPGA 478 SL66R Pc Bureau - 3,95 €         
      thumb

      Processeur Intel Pentium 4 2 Ghz - FSB 400MHz - Socket PPGA478 - Cache 512Ko


                Processeur CPU Intel Celeron D 335 2.8Ghz 256Ko 533Mhz Socket PPGA 478 SL7NW Pc - 3,95 €         
      thumb

      Processeur Intel Celeron D 335 2.8 Ghz - FSB 533MHz - Socket PPGA478 - Cache 256Ko


                Processeur CPU Intel Celeron 430 1.80Ghz 512Ko 800Mhz Socket LGA775 SL9XN Pc - 3,95 €         
      thumb

      Processeur Intel Celeron 430 1.8Ghz - FSB 800MHz - Socket LGA775 - Cache 512Ko


                Processeur CPU Intel Celeron 440 2Ghz 512Ko 800Mhz Socket LGA775 SL9XL Pc Bureau - 3,95 €         
      thumb

      Processeur Intel Celeron 440 2Ghz - FSB 800MHz - Socket LGA775 - Cache 512Ko


                Cyber Week in Review: August 4, 2017        
      Here is a quick round-up of this week’s technology headlines and related stories you may have mis

                Cyber Week in Review: July 28, 2017        
      Here is a quick round-up of this week’s technology headlines and related stories you may have mis

                U.S. Cyber Diplomacy Requires More than an Office          
      Secretary of State Rex Tillerson’s

                An Open Letter to Thomas Chandler, a Sub-Par Cybercriminal        
      Dear Thomas,

                Black Friday Sale        
      I'm not patient enough to wait until "Cyber Monday" so I thought I'd share a shop discount with you guys today on the ever so ominous sounding "Black Friday."



      Enter the code: blackfriday (I know real creative right?) at checkout to receive 20% off your purchase + free shipping! 



      That includes the cute little elf cards, if you are still looking for holiday greetings. And my 8x10" fine art prints are perfect for gifting. The sale will last until midnight tonight...so shop til ya drop from the comfort of your own home.

      Happy holidays!
                Comment on Real Money Bingo Sites for US Players by admin        
      Hi there Catherine, I'm happy to hear about your good experience at Cyber Bingo, they are really running a great site over there and they take good care of their real money players. Actually getting paid when you win is a big issue when playing at a rogue site so well done to you for doing your research before depositing money at a site. Best Regards, BingoOnline.us
                Comment on Real Money Bingo Sites for US Players by Catherine        
      I recently made a deposit at Cyber Bingo not really knowing what to expect in terms of ever being paid if I win but I was pleasantly surprised to find my a check in my mailbox this morning for $150 that I withdrew 2 weeks ago. Other than not be able to withdraw back to my bank account I'm very pleased with my experience and I am no longer afraid to deposit real money at this bingo site. Thanks for making awesome recommendations!
                Comment on Real Money Bingo Sites for US Players by admin        
      Hi Cleo, Thanks for taking the time to leave your feedback. We have been in contact with 123BingoOnline regarding this exact issue and they have assured us that a mobile friendly version of their games is in the pipeline. I can't tell you exactly when it will be available but they are working on it. If you are looking to play online bingo on your mobile or tablet I recommend you try out Cyber Bingo as they already have a fully functional mobile platform available. You can read our review of Cyber Bingo here http://www.bingoonline.us/cyber-bingo/ Best Regards, BingoOnline.us
                        
      This is probably old hat to librarians, but Ernie points out a nifty site that lets you feel like you have a voice on pending legislations: Keeping up with legislation, cyberstyle.
                        
      beSpacific: 2008 Presidential Campaign to Include First Cyberspace Moderated Debates. Is this the start of Campaign 2.0?
                Why Dubai is the best (biggest, tallest, and coolest) candidate for Expo 2020        
      In 1968 when then ruler of Dubai, Sheikh Rashid bin Saeed al Maktoum (father of the current ruler, Sheikh Mohammed bin Rashid) and the ruler of Abu Dhabi, Sheikh Zayed bin Sultan al Nahyan, agreed to form a federation of what were then then The Trucial States, a British protectorate, hardly anyone could have envisioned what the United Arab Emirates would have become today, nearly 45 years after that historic meeting [eventually seven of the nine 'sheikhdoms' joined the union]. For all intents and purposes, at inception in 1971, the United Arab Emirates could be described as a desolate backwater, despite a strong history of local traditions, and legacy as a trading post. Today, Dubai and the UAE bring forth images of economic strength and progress in an increasingly volatile and definitively confused region. Dubai's development, specifically, is a once-in-a-generation global phenomenon, and the city is unique like no other. As the bid committee for Expo 2020 look to decide on the host city for the world event seven years from now, there really is no other choice but Dubai - and let me tell you why.

      1. The other candidate cities are Izmir, Sao Paulo, Yekaterinburg, and Ayutthaya...

      There is nothing wrong with Izmir, Sao Paulo, Yekaterinburg, and Ayutthaya but do they really measure up to Dubai? Now before anyone gets in a tizzy or their 'socks' in a twist, they are all great cities! Izmir is Turkey's third-largest city and home to a great literary tradition.  Sao Paulo is one of the five largest metropolitan areas on the planet. Yekaterinburg (in Russia), well it's Yekaterinburg and they have a monument to Michael Jackson. And Ayutthaya was the historical capital of the Kingdom of Siam. Let's just say the final three are likely Izmir, Sao Paulo and Dubai. Izmir is certainly a great city but does not have the global resonance of Dubai. And Sao Paulo...well Brazil has both the Olympics (2016) and the World Cup (2014); are you telling me that they really need the pesky Expo 2020 as well!?

      2. The Expo needs a city of significance to make the event significant

      Do you remember where the last Expo was held (or even that there is an Expo!)? You could be forgiven for not recalling that it was Yeosu, South Korea. Where was the one in 2010? That's right Shanghai. The Expo 2010 attracted a staggering 73 million visitors and was the most visited exhibition of its kind and brought together 189 different expositions from around the world. While in 2015 the Expo will be held in Milan and in 2017 in Astana (Kazakhstan) it is likely that it would take the Expo 2020 in Dubai to bring the event back to the international spotlight (the governing body regards the Expos held every 5 years to be 'World' Expos). In fact, it normally requires an emerging or new city of a transformative nature to inspire the type of attention that Shanghai in 2010 did (or Osaka in 1970 etc).

      3. The entire ethos of Dubai is synonymous with what Expo 2020 would be about

      Dubai is a global city by its very nature. It is home to over 2 million residents - and growing - from all over the world and from every socio-economic background, representing over 200 nationalities. The city is at once a home to and meeting-ground for people from the the Middle East, Subcontinent, Central Asia, Africa (especially East Africa) and Europe, North America, and Australia. There are even an estimated 180,000 Chinese residents in Dubai.  With the tourist profile of the city, Dubai has in fact become the 8th most visited city in the world (in 2012). It's cultural diversity is on constant display with a burgeoning arts scene (that is driven at the grassroots level), international film festivals, culinary celebrations, and so much more that you might as well just visit Timeout magazine.

      4. Dubai inspires the imagination as the Expo event is meant to do

      The landmark World Expo (or Great Exhibition) was organized under the auspices of Queen Victoria's husband, Prince Albert, all the way back in 1851, in Hyde Park. It was an inspiring event that showcased the burgeoning city of London - the world's city at the time - and the promise of a future driven by technology and industrialization.  In a region too full of dark pessimism and cynicism, Dubai represents optimism and opportunity. And it will represent that even more so in 2020, as the city, albeit far along the way, is only at the beginning of its journey in my view of what it will become. Think about it. Who would have said twenty years ago that the world's tallest building would be built in the (Arabian) Gulf? Who would have said only several years ago after the 9/11 attacks that the world's leading airline would be from an Arab country? Who would have thought that the 3rd largest ports operator in the world, handling over 33 million containers annually, would be from Dubai? Today, when you look at the volatile, unstable, and stagnant Middle East, there is one destination for entrepreneurs and innovators to go to - and that is Dubai.

      5. Expo 2020 would drive Dubai and the UAE to improve

      Before I even write this sentence, I'm sure several of London's finest are in a huff-and-puff that I have not yet mentioned jailed Islamists or tourists having sex in a taxi Better yet, given the refusal-of-entry for a scholar from LSE this past week, shouldn't I be talking about the closure of the academic environment (I mean I masquerade as an intellectual from time to time as well)? Whether or not I believe in liberal democracy (I do - shock!), is it really a matter of discussion for Expo 2020? Well, in that case, we should reject Izmir's candidacy because of Turkey's campaign against Kurdish militants, Ayutthaya's candidacy because of Thailand's campaign in Malay Pattani, Yekaterinburg's candidacy because of Russia's crackdown on political opposition, and Sao Paulo's candidacy because of Brazil's anti-slum raids. Such nullification would leave no one left to host the event! Now beyond the two issues I mentioned above there are a number of continuing issues of concern in the UAE, allow me to list some of them: labor rights (even though this is improving); integration of stateless residents (i.e. bidoons); and increased confusion around cyber surveillance. Hosting the Expo 2020 would not exacerbate but more than likely shed more light on and ameliorate these challenges. In fact, the event would serve as a target-date for when Dubai and the UAE will be (even more so) on the world stage, and that attention would drive improvements on areas of concern.

      There are more reasons than the five I've listed here on why Dubai should be the host for Expo 2020, but I like the number 5 (it's the former consultant in me - I almost went with three). Whether you live here or plan to visit, I look forward to seeing you in Dubai in 2020! Until then:

      “Son técnicas muy sencillas de aplicar que no cuestan dinero y aportan mucha rentabilidad”, sostiene Peiró, que fundó la compañía, con sede en la localidad valenciana de Alboraya, hace cuatro años. Desde entonces una docena de empresas han parado la producción con el objetivo de aprender nuevas habilidades que les ayuden a tener una plantilla motivada.
      Algunas universidades han creado equipos de investigación que se centran en averiguar qué nos hace disfrutar en el trabajo
      Cuantificar la felicidad laboral
      Uno de los colaboradores de la consultora, Juan Pedro Sánchez, de 48 años, exdirectivo y experto en Psicología del Trabajo, Recursos Humanos y Organizaciones, detalla cómo se puede medir el nivel de felicidad de una corporación: el primer paso es evaluar el optimismo y las emociones positivas y, por otro lado, las demandas de estrés y exceso de supervisión y control; a continuación, se trabaja en diferentes sesiones aspectos como la inteligencia emocional, la empatía, la asertividad –la habilidad para reaccionar de manera adecuada a cada situación-, el autoconocimiento, el autocontrol y la autoconciencia.
      La mayoría de los directivos que llegan a los talleres “la única forma que conocen para tratar a los empleados es la del palo y la zanahoria”, lamenta Sánchez. No obstante, reconoce que en los últimos años las capacidades de liderazgo que fomentan el optimismo en una corporación empiezan a entrar tímidamente en las materias que se imparten en las facultades.
      La felicidad es uno de los aspectos más sometidos a estudios. “Hoy se aborda desde perspectivas neurobiológicas, médicas, sociales, psicológicas y hasta políticas”, comenta la especialista en organizaciones optimistas Belen Varela. Y, evidentemente, el ámbito laboral no es ninguna excepción, ya que en él pasamos buena parte de nuestra vida. Por eso varias universidades han creado equipos de investigación que se centran en averiguar qué nos hace disfrutar en el trabajo.
      Un trabajador feliz es amable, sabe trabajar en equipo y antepone los intereses de los compañeros a los suyos
      RAFAEL PEIRÓ
      Gerente de la consultora Créetelo
      Trabajos saludables
      Un referente en este sentido es el equipo Wont, dirigido por Marisa Salanova, en la Universidad Jaume I que combina la investigación y el desarrollo de novedosos protocolos para implementar intervenciones que ayuden a crear organizaciones “saludable y resilientes”. Belen Varela, que también es profesora de la Universidad de A Coruña, aclara que los estudios científicos sobre esta cuestión, más allá de centrarse en emociones y estados de ánimo, analizan sobre todo la forma de afrontar la vida en general de cada miembro de una organización.
      Y un trabajador feliz es “amable, sabe trabajar en equipo y antepone los intereses de los compañeros a los suyos”, describe Peiró. Mientras que la profesora Varela, añade: “El optimismo es una actitud con la que una persona es capaz de establecerse metas desafiantes y mantener la determinación de alcanzarlas; se refleja, por tanto, en conductas como la perseverancia, la vitalidad, la creatividad y una constante orientación al logro”, explica la especialista, que también colabora con Créetelo.
      ¿Cuánto tiempo pierdes yendo al trabajo cada día? Sería más productivo dedicarlo a trabajar
      MANUEL ALBARRÁN
      Director de Desarrollo de Dinsa
      “Conozco muchas empresas que trabajan muy bien la motivación”, asegura Varela. La autora del libro La Rebelión de las Moscas (Ediciones B) pone como ejemplo a Cyberclick Group, la mejor empresa para trabajar en España, según el prestigioso galardón Best Workplace España en su edición de 2014. La compañía, especializada en la optimización de campañas de marketing y publicidad digital, valora sobre todo la actitud personal y los valores del trabajador por encima del currículum.
      Empresas flexibles
      Un común denominador en muchas de estas corporaciones es la flexibilidad de horarios ya que el objetivo no es trabajar unas determinadas horas sino conseguir determinadas metas. Así es como funciona, por ejemplo, la mitad de la plantilla de Dinsa, que recientemente ha lanzado al mercado un escritorio virtual, Libework, desde el que acceder a aplicaciones y recursos de forma segura desde cualquier lugar. “Tenemos un puesto de trabajo móvil, más que un puesto fijo”, comenta el director de Desarrollo de la compañía, Manuel Albarrán.
      ¿Cuánto tiempo pierdes yendo al trabajo cada día? Sería más productivo dedicarlo a trabajar
      MANUEL ALBARRÁN
      Director de Desarrollo de Dinsa
      La empresa, fundada en 1977 y afincada en Madrid, decidió hace cinco años ser congruente con el tipo de productos que estaba vendiendo y ofrecer a perfiles administrativos, desarrolladores y directores de área la posibilidad de trabajar fuera de la oficina. Según Albarrán, esto ha tenido una repercusión positiva en la cuenta de resultados de la compañía y también en la calidad de vida de la plantilla ya que les ha permitido, asegura, conciliar mejor su vida familiar y laboral.
      El responsable de Créetelo considera que esta manera de trabajar es “recomendable”, y es más, considera que “los horarios rígidos están obsoletos”, con la excepción de determinados puestos, como cadenas de montaje. Y añade el ejecutivo de Dinsa: “¿Cuánto tiempo pierdes yendo al trabajo cada día? Sería más productivo dedicarlo a trabajar”, plantea Albarrán.
      Cómo crear buen ambiente
      Los especialistas consultados desgranan algunas claves para generar un clima laboral óptimo:
      - La confianza en los propios recursos para hacer frente a los desafíos, que se obtiene principalmente a través del conocimiento y el reconocimiento de las fortalezas y capacidades de cada persona y de la propia organización en su conjunto.
      - Definir horizontes claros que permitan a las personas identificarse y encontrar sentido al esfuerzo diario.
      - El buen empresario respeta a sus trabajadores, los escucha y los valora. Es jovial y amable.
      - Sonreír y saludar al equipo. Hay directivos que no se dan cuenta del estado de ánimo con el que entran a la empresa –no saludan ni sonríen-, lo que genera en algunas personas un clima de desasosiego.
      A menudo las empresas que intentan amplificar la iniciativa castigan el error sin darse cuenta de que equivocarse forma parte de ella
      JUAN PEDRO SÁNCHEZ
      Experto en Psicología del Trabajo
      - Un jefe que cree buen ambiente debe aprender a felicitar, algo que no es habitual ya que se suelen resaltar más las cosas malhechas, e intentar solucionar los errores en equipo y no centrar la culpa en una sola persona.
      - Celebrar los hitos de un proyecto, también las metas intermedias, por ejemplo, yendo a la cafetería de la empresa e invitar a merendar al equipo, organizar una comida o simplemente dedicar diez minutos a comunicar el éxito y disfrutarlo en equipo.
      - Al corregir un error, el líder debe explicitar lo que quiere corregir, pero también cómo quiere que se haga porque muchas veces se suele señalar el error sin explicitar qué es lo que se espera del empleado.
      - Reforzar los comportamientos positivos e identificarlos correctamente. A menudo las empresas que intentan amplificar la iniciativa castigan el error sin darse cuenta de que equivocarse forma parte de ella.
      - El líder busca colaboradores, no a gente a quien le pueda mandar.
      Sin embargo, según los expertos, el positivismo laboral también es sensible a los factores ambientales y a los cambios en el estilo de dirección.
      Las empresas no son conscientes del impacto que tienen sus políticas, sus prácticas o sus estilos de dirección en el ambiente laboral
      BELEN VARELA
      Especialista en Organizaciones positivas
      Las trabas para la felicidad laboral
      Pero la mayoría de las empresas no están por la labor de generar un buen clima de trabajo. Belén Varela lo atribuye a “la creencia de que no está en sus manos, sino en la de los empleados” y al hecho de que “no son conscientes del impacto que tienen sus políticas, sus prácticas o sus estilos de dirección en el ambiente laboral”.
      Rafael Peiró considera que la pirámide de Maslow es extrapolable al mundo empresarial. En este sentido las necesidades fisiológicas de una empresa –el primer escalón de la pirámide- son las obligaciones dinerarias –como pagar sueldos, proveedores o el alquiler del local-. “Cuando están haciendo frente cada mes a esta necesidad no atienden otras que están en lo alto de la pirámide: las de reconocimiento, apoyo y motivación de la plantilla”.
      ¿Seríamos capaces de aislarnos mentalmente de esa tiranía para funcionar de manera óptima en nuestro trabajo?
      BELEN VARELA
      Especialista en Organizaciones positivas
      El principal error que impide que los trabajadores se sientan felices en sus puestos de trabajo es el estilo directivo. Según ha podido comprobar Varela a lo largo de su experiencia en el asesoramiento a organizaciones, aspectos como la falta de reconocimiento, la presión excesiva o, incluso, la dejadez o la sobreprotección pueden mermar el ánimo de cualquier persona.
      La especialista en organizaciones optimistas indica que muchos estudios han demostrado que el jefe es una de las principales causas de salida voluntaria de la empresa. Y es que a caso, plantea Varela, “¿seríamos capaces de aislarnos mentalmente de esa tiranía, para funcionar de manera óptima en nuestro trabajo?”.
      Sobrevivir al ‘trepa’
      Otra de las cosas que a menudo enrarece el ambiente laboral es la presencia del empleado que no duda en hacer la zancadilla a un compañero para desprestigiar su trabajo o colgarse las medallas de los logros del equipo. Los especialistas en organizaciones optimistas aconsejan alejarse de relaciones negativas o poner el foco en personas o cosas que muestren qué hacemos y qué somos capaces de hacer.
      Si bien todas las empresas son susceptibles de poder aplicar estos principios y técnicas, siempre puede haber una oveja negra en la plantilla, tal como recuerda la especialista en organizaciones positivas Belen Varela: “El optimismo no es una varita mágica, no podemos hacer desaparecer al trepa ni cualquier otra circunstancia adversa”. Pero de lo que algo están seguros los expertos es que con buena cara, el trabajo sale mucho mejor.
      RAQUEL QUELART

      El modelo de Felicidad aplicado al Trabajo


      La felicidad es la experiencia de alegría, satisfacción o bienestar positivo, combinada con al sensación de que nuestra vida es buena, tiene sentido y vale la pena. Sonja Lyubomirsky

      Cada vez el enfoque en un crecimiento y desarrollo a nivel de las naciones, depende de cuán felices son sus habitantes, de acuerdo al último estudio de la consultora Monster Worldwide, Inc, realizado a más de 3232 empleados de todo el mundo, concluyó que la clave para ser feliz es encontrar el trabajo adecuado.


      Tres cuartas partes de los entrevistados respondió que, tener el empleo ideal es fundamental, pero sólo un 13 % dijo que su trabajo no determina su felicidad y lo hacen simplemente para pagar las cuentas. Es por eso que, no hay duda que la felicidad laboral se alimenta de la pasión, sin embargo es necesario que se fomenten acciones positivas para mejorar el clima, porque simplemente a mayor felicidad encontraremos mejor disposición, estima y productividad.





      Hacer lo que amamos y disfrutar de lo que hacemos determina más del 50% del estado de ánimo en el trabajo.


      Todos queremos estar contentos en nuestros trabajos, disfrutar de lo que hacemos y alcanzar logros poderosos y que contribuyan. Para ello es esencial trabajar en espacios emocionales armónicos, estables, sin grados altos de discordia, conflicto ni toxicidad.




      Una buena empresa no es sólo aquella que genera buenas utilidades, es aquella que provee bienes y servicios de manera efectiva y a la vez maximiza el grado de satisfacción de sus clientes, de sus colaboradores, de la población con la que interactúa y la sociedad en general.

      La felicidad es la que causa los buenos procesos y los resultados sobresalientes, y no al revés, ya que  las personas más felices son más productivas, se ausentan menos de sus puestos de trabajo, rotan menos, están más abiertas al cambio, son más innovadoras y ayudan a generar un mejor clima organizacional. En definitiva, a mayor felicidad, mejor desempeño organizacional.



      Las empresas que han implementado prácticas de felicidad en el trabajo, lo hacen inicialmente por la intuición de que es necesario para que las personas se sientan cómodas, contentas y satisfechas con y en su trabajo.

      Con el paso del tiempo esa intuición se transforma en certeza, cuando se constatan dos fenómenos.

      idea-01
      El primero de ellos, es el despliegue de las capacidades y fortalezas individuales de las personas, reflejadas en su compromiso y alegría con su trabajo.
      resultados-01Samsung Wave...., never liked samsung but can't resist this one, at last I can finally facebooking with my cell phone.
                This is the Most Popular way to Earn Money at Home!(5101) (alaska)        
      Start your Dream Job as an ad typist! Anyone can do this! Work from your home computer, laptop or any cyber cafe. No selling, clicks or recruiting. This is not some get-rich-quick scheme, this is a REAL Job that will pay you on a "Per Form Fille...
                 This is the Most Popular way to Earn Money at Home!(5109)        
      Start your Dream Job as an ad typist! Anyone can do this! Work from your home computer, laptop or any cyber cafe. No selling, clicks or recruiting. This is not some get-rich-quick scheme, this is a REAL Job that will pay you on a "Per Form Filled"...
                 This is the Most Popular way to Earn Money at Home!(5109)        
      Start your Dream Job as an ad typist! Anyone can do this! Work from your home computer, laptop or any cyber cafe. No selling, clicks or recruiting. This is not some get-rich-quick scheme, this is a REAL Job that will pay you on a "Per Form Filled"...
                The rise of security as a service in the evolving threat landscape        
      Cyber, Security, Protection, Business, Risks, Solutions, Products, Software
      The constant evolution of the global security threat landscape is playing a part in the rise of cyber ‘security as a service’ offerings. In addition, the evergreen discussion around cost modelling, namely the ‘Capex vs Opex?’ issue, is also a factor in the promotion of this type of service, particularly when it comes to security [&hellip
                The real reason China snubbed PM over OBOR party?        
      The cybernuts KPKB that PM’s criticism of China’s actions in the South China Sea led to him being excluded from China’s big OBOR party. Taz not the real reason. China thinks S’pore is the US of A’s running dog par excellence. ——————————————- MHA said that Prof Huang had co-operated with foreign intelligence organisations and agents to […]
                Nami and Nojiko – Cyberunique – One Piece        
      none
                Cybersecurity at Accel        
      none
                CenturyLink Signs Cybersecurity Sales Agreement with King & Union        
      none
                Betreff: Hackover Global Conference 2016        
      Sehr geehrte Damen und Herren, Sie wollen erfolgreich sein im Internet of Things? Seien Sie der Konkurrenz im Bereich BigData 2.0, Web 4.0 und Industrie 5.0 einen Schritt voraus, indem Sie sich auf der »Hackover Global Conference 2016« präsentieren. Die erfolgreiche B2B-Cyberkonferenz möchte Ihnen auch in diesem Jahr wieder einen synergetischen Austausch unter Spezialisten bieten. […]
                Digital Literature : From Text to Hypertext and Beyond        
      a thesis by Raine Koskimaa Today we are living in an increasingly digitalized culture – so much so that it soon may become as ubiquitous as electricity. When that happens, it will be as trivial to speak of digital-whatever, as is at present to speak of electrical culture. The pace and mode of digitalization varies from one cultural sphere to another. All cultural phenomena have their own traditions, conventions, and ways to evolve. There is always friction – cultural habits seldom change over-night, even though technological development may be drastic at certain times. Cultural phenomena are also diverse and heterogeneous and the change may proceed at different speed in different aspects of the phenomenon. This is very much the situation of literature at the moment. In book printing the digital presses have been a part of every day business for some time already. Through word processors a vast majority of literature is written and stored in digital format. We can say that since the 80’s digital processing has been an inseparable part of book production, even though the end product has been, and still mainly is, a printed book. The computer revolution and accompanying software development have given birth to a whole new field of digital texts, which are not bound to the book as a medium. These texts can be read from computer screen, or increasingly, from different reading devices, so called e-books. Digital textuality opens an infinite field to expand literary expression. The difference between print and digital texts can be put simply: print text is static, digital text is dynamic. Digital textuality can be used in many ways in literature. So far the most common way has been to treat digital textuality as an alternative medium for literature – the literature stays the same even though it is published as digital text; it could be published in print as well. There are certain advantages in digital format as such, eg. digital files can be transferred quickly from one place to another, digital texts can be easily updated etc. There is, however, literature which uses digital textuality much more effectively. They integrate aspects of digital dynamics as part of their signifying structure and widen the range of literary expression. Typically this literature cannot be published in print at all. The rise of the so called new media in the wake of digitalization has caused strong media panics, which have had a take on the ponderings about the future of literature too. In most generic forms the questions have been: will book disappear?, will reading die?, will literature vanish? Naturally, there are no simple answers to these questions and answering them is even harder because several different (even though closely interrelated) topics are usually confused. It seems as a safe guess that book as we know it will loose ground to digital texts. This will not, however, be as drastic a change as it may sound to some – literature is not bound to book format. Literature has survived changes from orality to papyrus scrolls; to pergaments; to codex book; there is no reason to believe it would not survive the change for the machines. Literature is inevitably dependent, to some extent, on its medium, but this does not mean that the evolution of literature would be simply following changes in its material basis. The medium sets its limitations, but inside those limits literature has been continuously changing and evolving. The change from print text to digital text doesn’t automatically cause any changes in literature. On the other hand, there seems to be a line of evolution inside literature which tends towards digital textuality without any outside pressure, as a natural next step. Also, digital textuality has caused an opposite evolution, literature which is pointedly committed to the materiality of print book. So, if we take a look at literature today, we can see that there are several things going on simultaneously: traditional print literature is still going strong (according to many indicators, stronger than ever), there is parallel publishing (the same text in print and digital formats), there is literature published in digital format because of technical reasons, there is such ”natively” digital literature which isn't possible in print, and there is literature published as handmade artists' books. Digitalization touches the whole field of literature, directly or indirectly, more or less strongly. Still, this is just the beginning, and the transitory nature of the present situation has resulted in spectacular prophesies and speculations regarding the future of literature. Speculations are important, naturally, as there is no future without visions, but we need also to stop for a while now and then and reflect. And first observations probably are: there is very little of original digital literature existing yet; the old conventions, formed during the five centuries of print literature, direct our expectations of digital literature; the boundaries between literature and non-literature are becoming diffuse. In this study, I have chosen ”hypertext” as the central concept. If we define hypertext as interconnected bits of language (I am stretching Ted Nelson’s original definition quite a lot, but still maintaining its spirit, I believe) we can understand why Nelson sees hypertext ”as the most general form of writing”. There is no inherent connotation to digital in hypertext (the first hypertext system was based on microfilms), but it is the computerized, digital framework – allowing the easy manipulation of both texts and their connections - which gives the most out of it. In addition to the ”simple” hypertexts, there is a whole range of digital texts much more complex and more ”clever”, which cannot be reduced to hypertext, even though they too are based on hypertextuality. Such digital texts as MUDs (Multi User Domains – text based virtual realities) are clearly hypertextual – there are pieces of text describing different environments usually called ”rooms” and the user may wander from room to room as in any hypertext. At the same time, however, there are several other functions available for the user, she may talk with other users, write her own rooms, program objects performing special tasks, or, solve problems and collect game points. Hypertextuality and hypertext theory do not help us much (if at all) in understanding this kind of textual functionality. For that we need cybertext theory. Cybertextuality is – as Espen Aarseth has defined it – a perspective on all texts, a perspective which takes into account and foregrounds the functionality of all texts. From the cybertextual point of view all texts are machines which perform certain functions and which have to be used in a certain way. Also, the reader may be required to perform some functions in order to be able to read the texts, or, she may be allowed to act as an active participant inside the textual world. Cybertextuality, then, is not only about digital texts, but because digital form allows much more freedom to textual functionality, there is much more need for cybertext theory in the field of digital texts than in print text[1]. So, keeping in mind cybertextuality is a perspective on all texts, we can use the term cybertext in a more limited sense to refer to functional digital texts – this means that all digital texts are not necessary cybertexts (plain text files like in the Project Gutenberg archives, or, e-texts in pdf format are no more functional than average print texts). Now we can better define the scope of this study. The theoretical framework is a combination of cybertext theory and more traditional theory of literature. The focus is on hypertext fiction, even though several other text types - digital and non-digital, literary and non literary, fiction and poetry – are also discussed. To deepen the understanding of hypertext fiction and its reading, quite of lot of attention is paid to the evolutionary line of print fiction which seems to be a major influence in the background. That aspect explains the first part of the subtitle, ”From text to hypertext”, with an emphasis on the transitory phase we are witnessing. On the other hand, the approach is open to the latent aspects of the hypertexts discussed, which already refer to the wider cybertextual properties – because of that the ”and Beyond”. In the main title, ”Digital Literature”, literature is used in a narrow (”literary”) sense. The method is inductive in that through scrutinizing individual, concrete exmples, a more general understanding of the field is sought after. Through not trying to include all the possible digital text types in this study I aim to be more analytic than descriptive. This work should be seen as a collection of independent papers – some of them are previously published, some are still waiting for a proper forum. Most of them have started as seminar papers. I have used the opportunity to make some corrections and changes to the articles previously published (mainly to reduce redundancy, or, to add materials cut out from the publications) – thus, the chapters of this study are not identical with published versions. This study is in its fullest form as a web based electronic text – however, if you are reading this study in print format you are not missing anything substantial. The web text includes additional linking, which makes it easier to follow some ”sub-plots” inside the work – themes that reoccur in different contexts. Also, in web version, many of the works discussed are directly linked to the text, and thus, only a click away. In the first chapter of this study I will give a description of the various traditions behind digital literature, of characteristic properties of digital literature, and, the basics of cybertext theory. I consider various hypertext studies belonging as a part to the broader category of cybertext theory. The second chapter, ”Hyperhistory, Cybertheory: From Memex to ergodic literature”, is an overview of cybertext theory, circling around Aarseth’s theory of cybertext and ergodic literature. Various other approaches are discussed, and integrated to the theoretical framework. For understanding cybertext theory, a historical glance to the development of hypertext systems (and ideologies behind them) is necessary. The integration of hyper- and cybertheories is still very much in progress – hopefully this chapter contributes to that integration. In the third chapter ”Replacement and Displacement. At the limits of print fiction”, several novels and stories are scrutinized from the cybertextual perspective. The aim of the chapter is to show the various ways in which print fiction has anticipated hypertextual practices. The fourth chapter, ”Ontolepsis: from violation to central device” focusses on the narrative device which I have dubbed ontolepsis. Ontolepsis covers different kinds of ”leaks” between separate ontological levels (inside fictional universe). Metalepsis, the crossing of levels of embedded narration, is one type of ontolepses, and certainly so far the most studied one. There is a rather lengthy discussion of fictional ontology, and its relation to narrative levels, because these are essential topics in understanding the phenomenon of ontolepsis in all its forms. A science fiction novel, Philip K. Dick’s Ubik, is used as an example, because its multilayered ontology serves perfectly in illustrating the multifarious nature of ontolepsis. In fiction, ontolepses have been seen as violations of certain conventions – the latter part of the chapter discusses how in hypertext fiction ontolepsis has become a central narrative device. In the fifth chapter, ”Visual structuring of hypertext narratives”, three hypertexts, Michael Joyce’s Afternoon, Stuart Moulthrop’s Victory Garden, and Shelley Jackson’s Patchwork Girl, are analyzed stressing their navigation interfaces and use of ”spatial signification”. Narratological questions are also foregrounded. Chapters six and seven, ”Reading Victory Garden – Competing Interpretations and Loose Ends” and ”In Search of Califia” form a pair. They are rather lengthy analyses, or, interpretations, of Stuart Moulthrop’s Victory Garden, and M. D. Coverley’s Califia. In the end of Califia chapter, the question of interpreting hypertexts is discussed. Two forms of interpretative practice, hermeneutics and poetics, seem to have their own roles in regard to hypertexts. The next chapter, ”Negotiating new reading conventions” focusses on reading. In this chapter I’ll look at how traditional reading conventions, on the one hand, still inform hypertext reading, and on the other hand, how hypertexts themselves teach new reading habits, and how new reading formations are negotiated. The final chapter, ”Hypertext Fiction in the Twilight Zone” is a kind of summary. It suggest that fiction based on ”pure” hypertext may be closing its end, and at the same time, looks at the cybertextual means which have appeared to fertilize the field anew. In the horizon there are computer games, virtual realities and other massively programmed forms towering, but also a possibility for a new literature. [1] Which is not to say that there were no use for cybertext theory in the field of print texts – first, there is an amount of experimental or avant garde print texts which take full advantage of functionality potential print book offers; and secondly, there is still much to do to understand the way how literature (even in the most traditional form) works as a technology (see Sukenick (1972) ”The New Tradition”, in In Form: Digressions on the Act of Fiction. Carbondale and Edwardsville: Southern Illinois University Press) – cybertext theory should prove quite fruitful in that field of study. more visit http://users.jyu.fi/~koskimaa/thesis/thesis.shtml

                iland Expands Channel Efforts        
      Service provider iland has expanded its channel program to help MSPs address compliance and cybersecurity related to the cloud, and to provide more support to those partners.
                 RT @CyberExaminer: Visualizing the ZeroAccess botnet in Google Earth http://tco/DHAlZgiW #infosec        
      2012-10-05 22:20:25 - opexxx : RT @CyberExaminer: Visualizing the ZeroAccess botnet in Google Earth http://tco/DHAlZgiW #infosec
                 Zombie-animating malnets increase 300 pourcents in just 6 months: Cybercrooks beef up botnet-powering badness Crybercrooks a… http://tco/N1zlIV2X        
      2012-10-04 10:24:18 - regsecurity : Zombie-animating malnets increase 300 pourcents in just 6 months: Cybercrooks beef up botnet-powering badness Crybercrooks a… http://tco/N1zlIV2X
                 Zombie-animating malnets increase 300 pourcents in just 6 months - Cybercrooks beef up botnet-powering badness Crybercrooks a http://tco/5VpKK326        
      2012-10-03 17:31:33 - kakroo : Zombie-animating malnets increase 300 pourcents in just 6 months - Cybercrooks beef up botnet-powering badness Crybercrooks a http://tco/5VpKK326
                 Zombie-animating malnets increase 300 pourcents in just 6 months: Cybercrooks beef up botnet-powering badnessCrybercrook http://tco/myJgj2iq        
      2012-10-03 16:05:24 - obsequens : Zombie-animating malnets increase 300 pourcents in just 6 months: Cybercrooks beef up botnet-powering badnessCrybercrook http://tco/myJgj2iq
                Seminar Topics(100)        
      Excellent Seminar/Paper Presentation Topics for Students


      Put the desired topic name in search bar to get detail search about the topic.

      1. 4G Wireless Systems
      2. A BASIC TOUCH-SENSOR SCREEN SYSTEM
      3. Artificial Eye
      4. Animatronics
      5. Automatic Teller Machine
      6. Aircars
      7. Adding interlligence to ineternet using satellite
      8. ADSL
      9. Aeronautical Communications
      10. Agent oriented programing
      11. Animatronics
      12. Augmented reality
      13. Autonomic Computing
      14. Bicmos technology
      15. BIOCHIPS
      16. Biomagnetism
      17. Biometric technology
      18. BLUE RAY
      19. Boiler Instrumentation
      20. Brain-Computer Interface
      21. Bluetooth Based Smart Sensor Networks
      22. BIBS
      23. CDMA Wireless Data Transmitter
      24. Cellonics Technology
      25. Cellular Positioning
      26. Cruise Control Devices
      27. Crusoe Processor
      28. Cyberterrorism
      29. Code division duplexing
      30. Cellular Digital Packet Data
      31. Computer clothing
      32. Cordect WLL
      33. CARBIN NANO TUBE ELECTRONICS
      34. CARNIVORE AN FBI PACKET SNIFFER
      35. CDMA
      36. CELLONICSTM TECHNOLOGY
      37. CELLULAR NEURAL NETWORKS
      38. CELLULAR DIGITAL PACKET DATA
      39. CIRCUIT AND SAFETY ANALYSIS SYSTEM
      40. CISCO IOS FIREWALL
      41. CLUSTER COMPUTING
      42. COLD FUSION
      43. COMPACT PCI
      44. COMPUTER AIDED PROCESS PLANNING (CAPP)
      45. COMPUTER CLOTHING
      46. COMPUTER MEMORY BASED ON THE PROTEIN BACTERIO
      47. CONCEPTUAL GRAPHICS
      48. CORDECT
      49. CORDECT WLL
      50. CRUISE CONTROL DEVICES
      51. CRUSOE PROCESSOR
      52. CRYOGENIC GRINDING
      53. CRYPTOVIROLOGY
      54. CT SCANNING
      55. CVT
      56. Delay-Tolerant Networks
      57. DEVELOPMENT OF WEARABLE BIOSENSOR
      58. DiffServ-Differentiated Services
      59. DWDM
      60. Digital Audio Broadcasting
      61. Digital Visual Interface
      62. Direct to home television (DTH)
      63. DOUBLE BASE NUMBER SYSTEM
      64. DATA COMPRESSION TECHNIQUES
      65. DELAY-TOLERANT NETWORKS
      66. DENSE WAVELENGTH DIVISION MULTIPLEXING
      67. DESIGN, ANALYSIS, FABRICATION AND TESTING OF A COMPOSITE LEAF SPRING
      68. DEVELOPMENT OF WEARABLE BIOSENSOR
      69. DGI SCENT
      70. DIFFFSERVER
      71. DIGITAL AUDIO BROADCASTING
      72. DIGITAL CONVERGENCE
      73. DIGITAL HUBBUB
      74. DIGITAL SILHOUETTES
      75. DIGITAL THEATRE SYSTEM
      76. DIGITAL WATER MARKING
      77. DIRECT TO HOME
      78. DISKLESS LINUX TERMINAL
      79. DISTRIBUTED FIREWALL
      80. DSL
      81. DTM
      82. DWDM
      83. DYNAMIC LOADABLE MODULES
      84. DYNAMICALLY RECONFIGURABLE COMPUTING
      85. ELECTROMAGNETIC INTERFERENCE
      86. Embedded system in automobiles
      87. Extreme Programming
      88. EDGE
      89. ELECTROMAGNETIC LAUNCHING SYSYEM
      90. E BOMB
      91. E INTELLIGENCE
      92. E PAPER TECHNOLOGY
      93. ELECTRONIC DATA INTERCHANGE
      94. ELECTRONIC NOSE
      95. ELECTRONIC NOSE & ITS APPLICATION
      96. ELECTRONICS MEET ANIMALS BRAIN
      97. EMBEDDED
      98. EMBEDDED DRAM
      99. EMBEDDED LINUX
      100. EMBRYONICS APPROACH TOWARDS INTEGRATED CIRCUITS
                DataCrunchers: Stop the hack…or crash the server        

      A determined hacker sets-out to bring down the datacenter, and our data killer car goes head-to-head with a rack of servers.

      Cast: Dell Multimedia

      Tags: DataCrunchers, EMC Corp, Cyber Security, RSA Analytics and RSA


                 Pushdo botnet's smokescreen traffic hits legitimate websites: Aargh, cap'n, the server be like to founder Cybercroo… http://tco/MQNanwXC        
      2012-09-19 23:47:12 - regsecurity : Pushdo botnet's smokescreen traffic hits legitimate websites: Aargh, cap'n, the server be like to founder Cybercroo… http://tco/MQNanwXC
                 Microsoft applies 'surgical sinkhole' to strangle botnet installed on new PCs via http://tco/atVnSJF8 @gkeizer #malware #cybersecurity        
      2012-09-18 13:23:20 - CoreSecurity : Microsoft applies 'surgical sinkhole' to strangle botnet installed on new PCs via http://tco/atVnSJF8 @gkeizer #malware #cybersecurity
                 RT @artem_i_baranov: Disclosure of an interesting Botnet case - The Server Part 2 http://tco/V0fEQRQQ #malware #botnet #cybercrime        
      2012-09-13 07:49:01 - 2gg : RT @artem_i_baranov: Disclosure of an interesting Botnet case - The Server Part 2 http://tco/V0fEQRQQ #malware #botnet #cybercrime
                 RT @artem_i_baranov: Disclosure of an interesting Botnet case - The Server Part 2 http://tco/V0fEQRQQ #malware #botnet #cybercrime        
      2012-09-13 00:44:22 - y0ug : RT @artem_i_baranov: Disclosure of an interesting Botnet case - The Server Part 2 http://tco/V0fEQRQQ #malware #botnet #cybercrime
                 RT @artem_i_baranov: Disclosure of an interesting Botnet case - The Executable Part 1http://tco/6azxKujz #malware #botnet #cybercrime        
      2012-09-12 02:31:33 - 2gg : RT @artem_i_baranov: Disclosure of an interesting Botnet case - The Executable Part 1http://tco/6azxKujz #malware #botnet #cybercrime
                 RT @SecMash: #InfoSec Easily available tools, botnets contribute to DDoS rise http://tco/fSP6rFCp #CyberSecurity        
      2012-08-04 23:58:33 - kellepc : RT @SecMash: #InfoSec Easily available tools, botnets contribute to DDoS rise http://tco/fSP6rFCp #CyberSecurity
                Cyberapprentissage: Iconito École Numérique        
      Petite découverte de la soirée, que je vais expérimenter prochainement dans mon serveur. Il s’agit d’un espace numérique de travail (cyberapprentissage) qui me semble bien intéressant. Il s’agit d’Iconico école numérique. C’est tout d’abord une application web (nécessitant un serveur LAMP)  à destination de tous les usagers du système scolaire et de ses partenaires éducatifs […]
                Bonne fête cybercarnet du ProfNoël!        
      Il y a exactement 4 ans, j’écrivais mon tout premier billet intitulé : « 5 ans déjà..« . J’aurai donc pu intituler le billet présent : « 4 ans déjà de puis le 5 ans déjà » ou plus simplement « déjà 9 ans, je l’ai dit il y a 4 ans ». Finalement, je n’ai rien a dire aujourd’hui, je […]
                Quelle est la différence?        
      Voici le logo d’un cabinet de relation publique de Montréal. Et celui de la distribution GNU/Linux Debian Elle est où la différence ? Également à lire.....100% libre: mon expérimentation (2) (25)Xsshfs – Interface graphique GTK pour sshfs (8)100% libre: mon expérimentation (1) (15)100% libre, c'est possible? (29)Cyberapprentissage: Iconito École Numérique (9)Sovrn
                Spark-O-Rama        

      Although the Christmas presents are yet to be unwrapped, it’s time to think pass Christmas and start preparing to ring in the New Year.  Now before the resolutions go into effect and we anxiously await the clock’s striking of midnight, we’re going to need a few items to prepare for the evening.  One of those items is a FAB dress for whatever New Year's Eve party you’re attending.  I’m already brainstorming on what I have in my closet that I can rock, but one thing for sure is that it will be something sparkly….I mean, if you’ve been paying attention to my posts, you should know by now I love blingy, glittery, and sparkly things. J

      Considering Christmas shopping has left me a little monetarily challenged, for shits & giggles, I decided to do some cyber window shopping to see what sparkly things I could’ve possibly gotten had I decided to shop for a NYE dress.


      This shimmery silver dress is sure to make its wearer the center of attention at any party.  This one shoulder dress comes in sizes 1-4x.  The asymmetric neckline is detailed with rhinestone embellishments and ruched detailing.  Add some FAB accessories and this dress is a winner.  Purchase directly from www.babyphat.comfor $74.00.



      Razzle & dazzle them in the Samantha Sequin Dress by Monif C.  This dress is currently in stock in sizes 18/20 & 22/24 for $277.80.  Order directly from Monif C at www.monifc.com.




      If you want the bang but not a lot of flash, this low key black DKNY number may be just for you as the sparkle is at a minimum by only being on the front of the dress.  This dress retails for $129.00 in sizes 2-3x.  Order directly from www.bloomingdales.com.

      Look FAB, be safe, and don't drink & drive.  

      With that said, this will be my final post of 2011 as I have and will continue to be busy with year end work and preparing for the holidays. I started this blog for fun and never imagined it would get an audience outside of a few family members and friends, so you can imagine my surprise to see my audience map showing views from neighboring Canada, to the United Kingdom, Pakistan, and all the way on the other side of the world in Australia.  I am truly honored and appreciate all of you who log on to view my ramblings of materialism and consumerism.

      I wish you all a joyous holiday season.  Merry Christmas and Happy New Year.  See you in 2012!

      Happy Shopping ~The Plus Size Shopaholic ~ Muah!




                19.09.2011 19:22:29 cyberzx        
      /dev/random это всего лишь интерфейс. никто не мешает наполнять пул энтропии для него через RdRand.
                Fantasia ’17: Breaker (short)        
      Here is a scary thought—when humanity starts to integrate itself with digital systems, it will become susceptible to both physical and computer-borne viruses. Just ask the hacker (or so-called breaker) Mach1. When she accidentally downloads a weaponized artificial intelligence, it takes over her body, but they will have to work together to survive the nefarious agents that want to control it in Philippe McKie’s short film, Breaker(trailer here), which screened during the 2017 Fantasia International Film Festival.

      Blame the junky. Whether she intended harm or not, she is the one who hired Mach1 to break the encrypted file containing the A.I. Much to her panic, the A.I. immediately started deleting files to make room for itself. However, when the program convinces the Breaker bad guys really are following her/them, they start to work together. If Mach1 can get to a port to download the A.I. into the wild internet, it will repay the favor. To survive that long, Mach1 will let her digital parasite control her body when they face-off against the sinister hunter tracking them. It is sort of like Neo’s kung fu sequences in The Matrix, but McKie’s emphasis is on grit rather than razzle dazzle.

      Breaker is smart and briskly paced film that makes you think about cerebral topics like the Singularity, earthly issues, such as drug addiction, and the general state of humanity. He creates a world that owes a debt to Bladerunner and most subsequent cyberpunk films, but he makes it feel grungier and more dope-infested. The production design is first-rate, but it is Yuka Tomatsu who makes us care. She is terrific as Mach1, no matter who happens to be controlling her body at the moment.

      McKie manages to combine a lot of action with social and scientific speculation in a mere eleven minutes. It is easy to see how this narrative or another story in Mach1’s near-future Tokyo world could be expanded to feature length. Regardless, it is a very cool short in its own right, showcasing the impressive range of Tomatsu. Highly recommended, Breaker will soon screen at the 2017 Action on Film Festival, following its Canadian premiere at this year’s Fantasia.
                Film Review: CYBER BANDITS (1995, Erik Fleming)        
      Stars: 2.5 of 5.
      Running Time: 86 minutes.
      Notable Cast or Crew: Martin Kemp (WAXWORK II, THE KRAYS, of "Spandau Ballet" fame), Alexandra Paul (CHRISTINE, BAYWATCH), Adam Ant (of "Adam and the Ants," NOMADS, JUBILEE), Grace Jones (A VIEW TO A KILL, CONAN THE DESTROYER), Henry Gibson (NASHVILLE, THE 'BURBS, THE BLUES BROTHERS), James Hong (BIG TROUBLE IN LITTLE CHINA, BLADE RUNNER), Nils Allen Stewart (BLOODSPORT 2, FIREPOWER), Robert Hays (AIRPLANE!, CAT'S EYE, TV's STARMAN). Written by James Dale Robinson (THE LEAGUE OF EXTRAORDINARY GENTLEMEN) and James Goldman (William Goldman's brother, the playwright who wrote THE LION IN WINTER, FOLLIES, and THEY MIGHT BE GIANTS––here he is credited as "Winston Beard").
      Tag-line: "Welcome to cyberspace. Where danger is a virtual reality."
      Best one-liner: "Strap him down, boys!" (said by Grace Jones)

      In a familiar, darkened alleyway:

      "What are we watching tonight?"
      –"Tonight, we're going to catch a glimpse the future."
      "Oh yeah?"
      –"Well, take a peek, kiddo––if you can handle it. It's called CYBER BANDITS:"

      Cool Cyber Dudes




      Life-Size Cyber Strippers


      Pocket-Size Cyber Strippers


      Read-only Optical Memory

       "The future kinda looks like 1995."
      –"The hell it does!"
      "Is that a CD-ROM?"
      –"Maybe. But what if in the future they have experimental hard drives that hold millions of terabytes of data and they happen to look like CD-ROMs?"
      "Oookay. If it's gonna be watered-down cyberpunk, can we just watch BRAINSCAN instead?"
      –"No. Trust me, you're gonna like CYBER BANDITS. For starters, its cast is comprised almost entirely of famous musicians and John Carpenter actors."
      "Hmm. Go on."
      –"Almost everyone in this film has razor-sharp cheekbones and ice-blue eyes, and it's all accompanied by aggressive house music and fusion jazz noodling. Look at this, it's just three, nearly identical, cheek-bony men staring at each other's cheekbones. It's like being held captive in a hall-of-mirrors at a German discotheque."

      "Okay. Is that, um, Adam Ant?"
      –"Maybe."
      "Does this movie have a plot?"
      "Of course it does. So there's an evil millionaire, played by Robert Hays (who played STARMAN on TV, albeit not directed by John Carpenter), who is financing a device capable of erasing your mind and trapping you in your own catatonic body in a mental hell of your own making. Essentially, it's a jumbo-sized and more malicious version of the neuralyzer from MEN IN BLACK.

      He's got Joe Dante and Robert Altman-standby Henry Gibson as his top scientist on the project, too."

      "So it's more of a 'Henry Gibson picture' than a 'William Gibson picture,' eh?"
      –"Oh, stop. Though, I must give a special shout-out to Gibson, who simpers and leers his way through the picture with sinister refinement, like he's a 1990s Claude Rains."

      Hand over the CD-ROMs if you know what's good for you

       "I do appreciate a solid Henry Gibson performance."
      –"Me too, brother. Anyway, our hero is Martin Kemp (the bassist from Spandau Ballet), who's, um, a sailor on the evil millionaire's yacht."

      "I feel like this character should be played by Jean-Claude Van Damme. Or at least Jean-Faux Van Bernhardt."
      –"Oh, hush. So, after a torrid affair with the millionaire's girlfriend (Alexandra Paul, from John Carpenter's CHRISTINE),

      Pictured: a torrid affair from the future, and not, in fact, a torrid affair from 1995.

      and against the advice of his buddy, rocker Adam Ant,

      You'll note that those are the Frank Lloyd Wright tiles from BLADE RUNNER in the background!

      the sailor and the girlfriend decide to steal the plans to the millionaire's neural-cyber-weapon-thing and have them laser-tattooed on Kemp's back with a bunch of little 1's and 0's. (The original title of this picture was A SAILOR'S TATTOO.)

      Incidentally, this is the first (but far from the last) time Martin Kemp will be strapped down to various surfaces throughout this movie.

      Also, it's worth mentioning that the man doing the tattooing is James Hong (from John Carpenter's BIG TROUBLE IN LITTLE CHINA)

      Note his excellent fake mustache.

      who, pre-tattoo, offers them a masked, flamboyant Chinese opera performance.

      He was clearly having so much fun with it, that they bring him back for a post-credits scene where he performs even more Chinese opera. Take that, Marvel movies!"
      "I must say, as far as MacGuffins go, a coded tattoo is not the worst idea."
      –"Of course it isn't!  Didn't I tell you who wrote this thing?"
      "No."
      –"Two men. One is the guy who adapted THE LEAGUE OF EXTRAORDINARY GENTLEMEN..."
      "Ugh."
      –"...and the other is the playwright who wrote THE LION IN WINTER."
      "Er, what?"
      –"Who incidentally is William Goldman's brother, James. However, he chose to be credited as 'Winston Beard.' Also, don't be so hard on THE LEAGUE OF EXTRAORDINARY GENTLEMEN."
      "I'll be as hard on it as I want. Think about it: Sean Connery had such a bad experience working on it that he retired from acting. Therefore, if not for GENTLEMEN, we may have had Connery in INDIANA JONES AND THE CRYSTAL SKULL which fundamentally would have altered its fabric, which means it might not have had Tarzan vine-swinging and CG aliens. The pity is that we'll never know."
      –"Okay, that's enough out of you. I'm about to get to the best part: the millionaire has a foil––a woman who leads a rag-tag band of cyber-resistance fighters and plans to bring him down for good: ladies and gentlemen, may I present... Grace muthahfuckin' Jones."

      "That's a lot of crazy-eye."
      –"It's one of her specialties, as you well know. You can also see her in Christopher Lee's Cher wig from THE WICKER MAN,

      shouting things like "Strap him down, boys," feeding her pet mouse to her pet snake (with an extra side of crazy-eye),

      setting up a nice cyber-office on the beach (uh... what?)

      and wearing really outré outfits that I guess are supposed to be camouflage,

      but read more as "Cousin It at Milan fashion week."

      SURPRISE––Grace Jones!

      "I'm intrigued."
      –"It's a lot better than it should be. I mean, Grace Jones alone––despite less than 20 minutes of screen-time––is essentially worth the price of admission. It's like a low-rent BLADE RUNNER/NEUROMANCER with big ideas, game actors, silly costumes, and an A-list soundtrack featuring songs like 'Sploosh' by Ozric Tentacles."
      "Wow. I kinda miss the '90s."
      –"I think you mean, 'the future'... don't you?"
                Comment on NSA Americas Cyber Secrets 2012 by gratis sex        
      You have a nice site over here. I just wanna say thanks for all the interesting stuff on it. I'll follow your blog if you keep up the good work!
                Seven Years of Serving and Studying the Legal Needs of Digital Journalism        

      We have some important news to share from the Digital Media Law Project. After seven years of providing legal assistance to independent journalism through various methods, the DMLP will soon spin off its most effective initiatives and cease operation as a stand-alone project within the Berkman Center. The upcoming changes will ensure that our work continues in a robust and sustainable fashion, and so, while those of us here are a bit melancholy to see the end of an era, we are hopeful for what comes next.

      I wanted to take this opportunity to look back over the history of the DMLP and its accomplishments, and to talk a bit about what the future will hold for our work.

      The Beginning

      In 2007, a group of scholars and attorneys at the Berkman Center for Internet & Society recognized a growing problem for online speech: namely, that a vast array of bloggers, citizen journalists, and other non-professional writers were publishing information on the Internet without a solid understanding of their rights and responsibilities under the law. Those without legal training or resources were unprepared for challenges such as defamation, privacy, and copyright claims, and often ran into pitfalls when dealing with issues such as corporate formation, contract negotiation, and development of website policies.

      While the Berkman Center had been providing legal services to online ventures for several years through the Harvard Law School Cyberlaw Clinic, this growing need among independent publishers was simultaneously too widespread for the Clinic to address through its existing service model and too basic in many specific instances to present a valid case-by-case training opportunity for law students. A different approach was required.

      Thus, in May 2007 the Berkman Center launched a new experiment: the "Citizen Media Law Project." The CMLP was an offshoot of the Cyberlaw Clinic, intended to address the lack of legal knowledge among bloggers and citizen journalists through the publication of online informational resources targeted at lay readers. The CMLP's primary resource was a detailed Legal Guide, which provided basic information on a broad array of media law and business law topics that online publishers could expect to encounter. The CMLP's Threats Database tracked legal challenges to online speech, such as lawsuits, police activity, and cease and desist letters, in order to address the lack of publicly available background information and primary source material relating to this type of activity.

      The CMLP also engaged in a number of public outreach efforts, including organizing conferences, making speaking appearances, publishing its regular blog, and maintaining an online forum for discussion of legal issues affecting digital speech. These activities had the effect of raising the public profile of the project as an authoritative source of legal information.

      The Online Media Legal Network

      While these resources were successful and popular, there remained situations where citizen journalists and bloggers required more than just general legal information; rather, they needed the direct assistance of attorneys. Many members of the CMLP's audience were unable to afford counsel to support their legal rights, even if thanks to the CMLP's resources they had an understanding of those rights. Occasionally, CMLP staff members would represent a client directly in connection with narrowly defined legal questions; more commonly, the CMLP would appear as an amicus curiae in cases involving free speech issues. But this was insufficient to meet the needs of the CMLP's constituency.

      Again, a broader solution was necessary, and in November 2009 the CMLP expanded its ability to support clients with the launch of its free attorney referral service, the Online Media Legal Network. The launch of the OMLN marked a quantum leap in the breadth and impact of the CMLP's services, placing individual online media clients in contact with skilled media and business attorneys throughout the United States willing to provide legal services on a pro bono or reduced fee basis. The network expanded dramatically as the CMLP promoted the concept of pro bono media law services, eventually reaching the point where the OMLN's member attorneys included hundreds of law firms, individual attorneys, and legal clinics, with members in all fifty states (plus the District of Columbia) and affiliations with international media law networks.

      The "Early Warning System"

      Throughout the growth of the project, the CMLP was building relationships with a wide array of partners, including the attorneys of the OMLN and their clients, non-profit organizations dedicated to journalism and online freedom, academic affiliates at other universities, and journalists and press organizations experimenting with online media. These individuals and organizations were eager to share their experiences with law in the digital age, and it became apparent that this feedback could provide critical information about breaking legal issues affecting online speech.

      The CMLP began to treat these networks as an "early warning system" for legal questions worthy of attention. For example, at the end of 2011, the CMLP's networks alerted the project to issues at the Internal Revenue Service with respect to the agency's withholding of tax exemptions for non-profit journalism. Over the next three months, the CMLP investigated the issue and developed a tailored response in the form of an interactive resource that identified the challenges for journalism at the IRS, demystified the IRS's decision-making process, and provided guidance for meeting the agency's standards. The CMLP's IRS resource was extremely well received, and appears to have had a significant role in breaking up a backlog of applications at the agency.

      Through the early warning system approach, the CMLP added greater flexibility to its operations, allowing us to identify new systemic imbalances in the law affecting online speech and to develop responses accordingly. This approach provided the CMLP with the guiding principle for its research, speaking appearances, and interventions in court cases.

      Putting the Pieces Together

      Over time, the CMLP organized its various efforts into five core initiatives: (1) the Legal Guide; (2) the Threats Database; (3) the Online Media Legal Network; (4) a "Research and Response" system to handle emerging issues; and (5) CMLP publishing through a series of online fora, including this blog. It was now easier to see how the activities of the project could function together to provide a coordinated set of legal resources for the public. When a client needed to speak to an attorney, they could be sent to the OMLN, but when their issues were not ripe enough to need a one-on-one consultation, the Legal Guide could serve their needs. The Threats Database provided attorneys and academics with neutral information about pending cases, but when legal issues became a problematic trend, the Research and Response initiative would develop more targeted responses. The CMLP blog changed in its tone from a forum for general commentary to a source for deeper insight and analysis of breaking issues at the intersection of law, technology and journalism.

      It had also become clear that the original concept of the CMLP as serving a class of amateur bloggers and citizen journalists distinct from professional news outlets did not accurately reflect the nature of the online publishing environment. The CMLP had repeatedly encountered and assisted professional journalists who were nevertheless independent of traditional media outlets, either by choice or due to the economic disruption of the journalism industry. The project found that these clients had needs as significant as those of their "citizen" counterparts. The project recognized that distinctions between professional and citizen journalists were less important than analyzing the needs of online media as a whole.

      The "Digital Media Law Project"

      With this shift of focus, the project was able to respond to a range of important legal issues, including: First Amendment protection for the use of cameras to record the actions of public officials; legal constraints on newsgathering at the 2012 U.S. political conventions and the use of cameras at the 2012 national elections; the abuse of trademark law as a method of suppressing critical speech; the impact of legal regimes governing online intermediaries on data journalism and crowdsourced reporting; the use of digital technology to inform the public about judicial activity; systemic issues in the issuance of media credentials by government and private organizations; and more. Formalizing its new approach, the CMLP removed "Citizen" from its name in 2013, becoming the "Digital Media Law Project."

      The Online Media Legal Network had by this time also emerged as an independent source of data for research purposes. By September 2013, the OMLN had placed its 500th client matter with a network attorney. In recognition of that milestone, the Digital Media Law Project conducted a comprehensive survey of its past clients and their legal needs, releasing that information in a report entitled The Legal Needs of Emerging Online Media: The Online Media Legal Network at 500 Referrals. This review of the issues facing a substantial sample of new and innovative online journalism ventures revealed that these clients' legal needs were in many respects not very different from those of traditional media organizations; while there were some distinctions, the primary difference lay in their ability to meet those needs.

      The Future

      Fundamentally, the Berkman Center is an incubation space that fosters experimentation in the study of the Internet and the development of tools and services that address the online world's many challenges. After seven years at the Berkman Center, the DMLP has grown from an experimental project that addressed the legal needs of an emerging class of bloggers and citizen journalists into a service organization that provides structured legal resources for the entire range of independent online journalism. We are extraordinarily proud of the work the DMLP has done, but now that the experimentation phase of the project is over, we have determined that the best path forward is to identify the most useful elements of the DMLP's operation, and make sure that they have permanent homes.

      Some of our services - most notably our Legal Guide and Threats Database, along with our collection of research studies - will remain at the Berkman Center, reintegrated into the Cyberlaw Clinic where they will benefit from the support of law students and serve not only as an important resource for the public but as a tool to train young attorneys about legal issues vital to online communication. While our blog will cease publishing new posts, our archive of blog entries will remain available to the public. The Online Media Legal Network will find a new home outside of the Berkman Center with a non-profit organization that shares the DMLP's commitment to providing legal services to online media (we have a very exciting prospect lined up, but it's a bit early to report). While different aspects of the DMLP's work will continue in different places, we expect that the organizations taking on this work will work closely together to provide a coherent set of resources that address the diverse legal needs of online media.

      These transitions will take place over the next few months, and the DMLP itself will wind up operations as an independent project as of September 30. As for those of us who work at the DMLP, we'll be moving on to other projects as well. I myself will be stepping back from my full-time role as the director of the DMLP as of June 30, but will be serving as a consultant to the Berkman Center through the transition period. Andy Sellars, our assistant director, will join the Cyberlaw Clinic as a Clinical Fellow and continue his work on freedom of speech and intellectual property issues in that context, including supervision of the Legal Guide and Threats Database in their new home. We don't know yet who will take custody of our office spider plant, Meiklejohn, but we're sure that the decision will be made by an electorate informed by the free flow of ideas.

      ***

      It has been our pleasure to serve our constituency of online media projects and independent journalists over the last seven years, and those of us at the DMLP look forward to continuing this work in new ways. I would like to offer our gratitude to all of our colleagues at the Berkman Center (and especially the team at the Cyberlaw Clinic), our partners at other organizations, the volunteer attorneys of the Online Media Legal Network, our roll of contributing bloggers, and all of our donors and foundation supporters.

      Most especially, I would like to thank: our founder and first director, David Ardia; our mentors and principal investigators, Phil Malone and Urs Gasser; Cyberlaw Clinic Managing Director Christopher Bavitz; my assistant director, Andy Sellars; and all of the other staff and interns of the CMLP/DMLP throughout the years: Sharo Atmeh, Julie Babayan, Lee Baker, Sam Bayard, Kristin Bergman, Reed Bienvenu, Rebekah Bradway, Arthur Bright, Jillian Button, Lauren Campbell, Tom Casazzone, Tuna Chatterjee, L.T. Ciaccio, Jason Crow, Alexandra Davies, Nicholas DeCoster, Jim Ernstmeyer, Vanessa Fazio, Courtney French, Helen Fu, Kelly Hoffman, Marshall Hogan, Kimberley Isbell, Olivia Jennings, Kyle Junik, Dan Kahn, Ryan Kane, Jane Kleiner, Erika Kweon, Frances Katz, Michael Lambert, Tim Lamoureux, Jason Liss, Matt Lovell, Katie Mapes, Ryan McGrady, Tabitha Messick, Natalie Nicol, Daniel Ostrach, Marc Pennington, Marina Petrova, Rich Quincy, Colin Rhinesmith, Amanda Rice, Caity Ross, David Russcol, Matt C. Sanchez, Alison Schary, Samantha Scheller, Natalie Senst, John Sharkey, Justin Silverman, Brittany Griffin Smith, Aaron Sokoloff, Lina Somait, Jillian Stonecipher, Konstantinos Stylianou, Tom Sullivan, Yixin Tang, Daniel Ungar, Caitlin Vogus, Miriam Weiler, and Stefani Wittenauer.

      Addendum: The DMLP by the Numbers

      Jeff Hermes has been the Director of the Digital Media Law Project since 2011, and has been proud of every minute.

      Subject Area: 


                A New Approach to Helping Journalism Non-Profits at the IRS        

      Today, the Digital Media Law Project has launched a new version of its resources for journalism organizations seeking a Section 501(c)(3) tax exemption for the IRS. As a project, we have been concerned with non-profit journalism from the beginning, providing informational resources for news ventures seeking to form as non-profits. Since the launch of our attorney referral service, the Online Media Legal Network, in late 2009, about a third of our clients have been non-profit journalism organizations; more have been individuals or for-profits interested in starting a non-profit news venture. We have worked with more than forty groups to find counsel to assist them in applying to the IRS for recognition of tax-exempt status.

      But the path to tax-exempt status has not always run smooth. From 2010 to 2012, the IRS was reevaluating its standards for journalism organizations, causing these organizations to face long delays while struggling to stay afloat without an exemption in place. In fact, the now-infamous IRS "BOLO" lists flagged "newspaper entities" for special scrutiny [PDF] as of  February 2011. Several journalism applicants were questioned by the IRS about various aspects of their operation, without understanding why the IRS was interested in those issues -- and sometimes those questions seemed to verge into areas that should have been irrelevant under federal law. To help applicants satisfy IRS scrutiny, in April 2012 the DMLP released a detailed guide to the agency's decision-making process for granting tax exemptions to journalism non-profits.

      In late 2012, it appeared that the logjam at the IRS was beginning to break, with a couple of high-profile applications accepted after delays of more than two years, and a steady stream of additional applications granted since then. And yet, the process remains complex, and there is substantial confusion about both how to obtain Section 501(c)(3) status and what that status allows you to do. For that reason, Eric Newton of the John S. and James L. Knight Foundation reached out to the DMLP and offered Knight's support for the development of a video debunking some of the more common myths and misconceptions, which we're pleased to present here (thanks also to Dan Jones, Digital Media Producer for the Berkman Center, and Ogmog Creative):


      It has also become clear to us that the journalism organizations which have the easiest time finding a lawyer to help with a Section 501(c)(3) application, and succeed most frequently at the IRS, are those that take the time to study the 501(c)(3) process and the agency's standards before they apply. For that reason, we have launched a new collection of resources to help news organizations prepare to face the IRS, including: a checklist to help journalists decide if Section 501(c)(3) status is right for them; an updated section of our Legal Guide on the Section 501(c)(3) application process; our detailed guide to IRS decision-making for journalism non-profits; and an archive of successful application materials from news organizations that have obtained their tax-exempt status.

      None of these resources is intended to allow a journalism non-profit to go it alone; with all that has happened at the IRS, the agency process is too tangled for a news venture to expect success without professional assistance. These resources will help journalism ventures to better understand what the agency is looking for, so that they can adjust their operations properly and be prepared to work with an attorney. 

      Non-profit journalism has the potential to address public information needs that are simply not profitable for a for-profit news organization to cover -- and there is no better time to launch resources intended to help bring information of public importance to light than the beginning of Sunshine Week. And at 1 p.m. Eastern on April 10, 2014, the DMLP will be holding a one-hour online session open to the public where you can ask questions about these resources and the application process; connection details will be posted on the DMLP homepage on April 10, so be sure to come back then.

      The Digital Media Law Project is based at the Berkman Center for Internet & Society at Harvard University. The DMLP produces a wide range of legal resources for independent online journalism projects and media ventures, including its multistate Legal Guide and topic-specific resources developed to respond to breaking legal issues affecting online speech.

      Subject Area: 

      Jurisdiction: 


                North Korea still a suspect in Sony attack despite denial        

      Washington: North Korea is a principal suspect in the cyber attack on Sony Pictures, a US national security source told Reuters on Thursday, while a North Korean diplomat denied Pyongyang was behind the crippling hack.

      The US government`s investigation into the Nov. 24 attack is being led by the FBI`s Los Angeles Field Office and the Hollywood studio is cooperating, a law enforcement source said.

      The national security official, who spoke on the condition of anonymity, said North Korea is not the only suspect and it was too soon to definitively know who is behind the attack that exposed a trove of internal data and shut down the computer systems at the entertainment arm of Sony Corp .

      North Korea had vehemently denounced the Sony film "The Interview," a comedy movie about a plot to assassinate North Korean leader Kim Jong Un, scheduled for release on Dec. 25.

      A former top US government expert on North Korea said that circumstantial evidence suggesting its involvement in the Sony attack included the fact that the North Koreans had been "very vocal about their unhappiness" about the film.

      A New York-based North Korean diplomat, who asked to remain anonymous, told the Voice of America broadcast network on Wednesday that linking North Korea to the hacking of Sony Pictures` computers was "another fabrication targeting the country.

      "My country publicly declared that it would follow international norms banning hacking and piracy," the diplomat said.

      The denial from North Korea regarding the Sony hacking came despite sources telling Reuters that cyber investigators had found connections to North Korea in the form of hacking tools similar to those used by that country in previous attacks on South Korea.

      Despite the swirling controversy, Sony said the film`s release remains on schedule, although on Thursday it cancelled a Los Angeles press day for next week citing "some scheduling conflicts." A press day in New York is still possible.

      "The Interview" stars James Franco and Seth Rogen as American journalists who are recruited by the CIA to kill Kim after the authoritarian leader grants them an interview.

      In June, the Pyongyang government denounced the film as "undisguised sponsoring of terrorism, as well as an act of war" in a letter to UN Secretary-General Ban Ki-moon.

      Rogen, who co-wrote and co-directed the film, told Rolling Stone magazine in an interview conducted in June that they did get called in for a meeting with Sony`s North American CEO.

      "Any time a movie causes a country to threaten nuclear retaliation, the higher-ups wanna get in a room with you," Rogen said in the interview published in this week`s Rolling Stone.

      Sony has struggled to get all of its systems back up since its network was breached. Studio executives told staff in a memo on Tuesday that they still did not know the "full scope of information that the hackers might have or release."

      The hackers, who have identified themselves as GOP or Guardians of Peace, leaked more Sony data on Wednesday that included personal log-ins and credentials, the website CSO Online reported.

      "In short, the IT data leaked is everything needed to manage the day-to-day operations at Sony," CSO said.

      But the studio did manage to make one of its biggest announcements of the year in England on Thursday - the new Bond movie, "SPECTRE," starring Daniel Craig as 007 once again.

      It was a reminder of Sony`s might in the movie world. The Bond franchise had its most lucrative film in the series to date with "Skyfall," which brought in $1.1 billion worldwide.

      Section: 
      News Source: 
      Home Title: 

      North Korea still a suspect in Sony attack despite denial

      Image Caption: 
      Yes
      OLDID: 
      113472

                Iran a `threat` to US national security: Pentagon        

      Washington: Claiming that Iran is a "threat" to the America`s national security, a top Pentagon official has told the lawmakers that the country is determined to prevent the former from acquiring nuclear weapons.

      "Iran is a threat to US national security in many ways, not simply their move toward the potential to develop a nuclear weapon," General Martin Dempsey, Chairman of the Joint Chiefs of Staff, said during a Congressional hearing on Monday.

      "I choose my words carefully, because the intelligence community has not yet come to a conclusion that they intend to build a nuclear weapon, but they`re certainly preserving and building on their options to do so, which should be of concern to all of us and is," he said in response to a question.
      "We have been very clear as a nation that we are determined to prevent them from acquiring a nuclear weapon because it would be so destabilizing to the region. But they are also active in cyber. They`ve got surrogates all over the region and all over the world. They proliferate arms. They are a disruptive influence globally. And so I do consider them a threat to our national security," Dempsey said.

      The US Defence Secretary, Chuck Hagel, said the US remains focused on preventing Iran from acquiring nuclear weapons.

      "It`s certainly giving them options to move in that direction," he said when Senator Lindsay Graham asked: "Do you think what they`re doing with the centrifuges is designed to produce weapons material or just peaceful power?"
      PTI

      Section: 
      Image Caption: 
      No
      News Source: 

                Lilis Suryani & Ork. Seni Maya (Irama EP 143, 7", Malaysia, 196-)        


      Very difficult to make out the details of the release with the condition and choice of ink.


      01 Baleuang Nu Geulis (Kosaman Djaja)
      02 Barlina
      03 Disendja Bersama Kekasih
      04 Ingin Hidup Sendiri


      Lilis Suryani appears to be a legendary singer of the day
      The only tiny cottage in cyberspace are discussed in more detail than Wikipedia musical career of legendary artist Lilis Suryani , from 1963 to 1971, and so on ...


      Related









                What's the difference between CISPA and SOPA?        
      CISPA Cyber Security Bill

      You may be wondering what this new house resolution called CISPA (H.R. 3523), that passed the house with 268 votes is. This is a new cyber security legislation.

      read more


                Tamiya Mini 4wd hobi dari kecil....        

      Sekarang tengah heboh mengenai Tamiya mini 4wd pelbagai golongan bermain mini 4wd nie atau saya panggil sebagai tamiya.Nampak macam senang hanya kereta kecil dan mudah untuk di kelolakan...tapi permainan ini banyak melibatkan sebarang konsep mekanikal dan banyak menggunakan otak.

      terima kasih pada abah sebab dia yang belikan tamiya ini untuk anaknya yang comel ini untuk di mainkan bersama teman-teman..saya bukan anak orang kaya nak bermain di trek hanya longkang dan jalanraya menjadi tempat saya bermain.pelbagai gelagat dan pengalaman saya selama saya bermain tamiya hampir 20 tahun tamiya ini dah menjadi darah daging saya...

      sampai bila2 pun tamiya ini akan menjadi kenangan terindah saya...abah memang abah terbaik sanggup kumpul duit belikan anak dia tamiya maklumlah ayah saya hanya kerani kerajaan jek masa tue..mula2 abah belikan sebiji kereta mini 4wd ingat lagi black avante body lutsinar hitam...pasang sama2 dengan abah sampai menjadi suatu kereta...time tue baru darjah dua..mana trek abah bawak naik motor buruk walaupun terconget kebelakang motor tue yamaha cup 80 ada belakang rumah..masih dalam segar seolah-olah semalam jek baru terjadi....dalam keadaan hujan di redahkan juga sampai ke sogo untuk bermain trek...sampai jek trek paling sedih berikat dengan getah lagi motor tamiya tue...jalan bising jek yerlah dah patah....tak ada duit nak beli bukan anak orang kaya..

      abah sanggup bawak bekal gi kerja semata-mata nak kumpul duit nak belikan trek dan tamiya baru...yeahh!akhirat keluarlah kereta magnum cyber yang warna hitam tue...di sinilah aku bermula berlajar satu persatu tentang tamiya mini 4wd..bayangkan umur aku darjah 5 dah lumba dan bermain orang yang atas aku...macam kajian di lakukan untuk melajukan motor...time tue daisheng pengedar tunggal barangan tamiya ke malaysia..


      banyak suka duka saya selama saya bermain tamiya cukup pengalaman selama 20 tahun mengajar apa makna sebenar mini 4wd...terima kasih abah belikan tamiya untuk saya...walaupun dia tak ada duit time tue sampai mak marah manjakan sangat saya belikan tamiya mahal2....semua brand mini 4wd saya dah cuba...dari auldey,diamod,cap china,brand tepi jalan....semuanya sama konsep yang sama...siapa yang kenal saya pasti akan tahu siapa saya....saya takkan biarkan diri saya kalah saya mahu menang...hehehehehe hampir pokai abah time tue belikan anak dia yang debab nie tamiya....

      stop jap bermain tamiya bila mula ke kolej dan slow2 hilang tamiya mini 4wd nie....eheheheheh sekarang ia datang semula....tapi dengan konsep dan komponen yang baru....tak adahal benda nie small metter jek tengah updated pengunaan komponen tue...dan siap uji kaji baru saya akan berjumpa dengan racer2 yang rasa diri diorg hebat dan angkuh....kita biarkan jek permainan mereka..saya anggap ini semua hobie yang buat saya mengingatkan kenangan lampau tanpa abah tak mungkin saya kenal apa makna dan nikmat sebenar tamiya......dengan motor pancit,redah hujan,di ejek kereta tamiya tak laju,dan semuanya saya telah laluai....sampai ada satu tahap saya tak mampu saya ada jek dekat kedai tamiya tue lihat jek....kawan2 tegur asyik kau jek dekat kedai tamiya nie...belinya tak...

      terima kasih pada TAMIYA INC mencipta mainan yang banyak penceritaanya...bukan kejuaraan yang di kejar tapi pengertian sebagai racer sebenar yang perlu ramai tahu...kalau setakat angkuh dan takbur dia terhebat itu bukan nilai seorang racer yang sebenar...seorang racer sebenar dapat gunakan apa jenis kereta dan barang walaupun murah menamatkan perlumbaan dengan positif..


      terima kasih teman2 yang sudi mengajar dan mengingatkan semula kompenen tamiya yang telah hampir lupa dari ingatan...tapi kenangan dan pengalaman lepas tetap segar di ingatan......hidup tamiya!terima kasih abah belikan tamiya saya :)
                RECEITA PARA AQUECER O SEU INVERNO        
      CALDO DE INVERNO

      INGREDIENTES
      6 unidade(s) de batata média(s)
      4 unidade(s) de mandioquinha média(s)
      2 unidade(s) de cenoura
      400 gr de coxão-mole em cubos pequenos
      2 dente(s) de alho
      quanto baste de sal
      quanto baste de água

      MODO DE PREPARO
      Em uma panela de pressão, coloque o óleo e o alho amassado. Doure-os levemente. Em seguida, acrescente a carne e frite em fogo alto para não juntar água. Quando estiver dourada, acrescente todos os legumes picados e o sal. Mexa e coloque água quente o suficiente para encobrir os legumes. Deixe cozinhar por 20 minutos na pressão. Após esse tempo, retire do fogo, espere esfriar um pouco e bata tudo no liqüidificador . Se quiser um caldo mais ralo, acrescente, aos poucos, água no liqüidificador enquanto bate.

      RENDIMENTO: 4 porções.
      

                Steampunk Goggles Airship Captain Apocalyptic Mad Scientist Victorian Limited SSS-black by oldjunkyardboutique        

      14.99 USD

      ATTENTION!

      Going out ? Convention or mission ? Looking for very special accessory ? We can help !

      We present Steampunk Apocalyptic Cyber Goggles- Time Travel Crazy Scientist's Oculo-Vision Tool from our collection of mad scientist treasures. Our goggles are excellent for any starship captain or officer, troop ,men, women , children, all who plan to wear eye protection against any bomb blast attack, war , or apocalypse. Adjustable Elastic Head Part, made from PVC and plastic. JUST ONE OF A KIND !

      Thank you for visiting and Good Luck !


                SteAMpunk goggles Nautical Octopus purse with pocket watch gears charm ANchor bag wallet case by oldjunkyardboutique        

      24.99 USD

      Steampunk purse and goggles
      Rare Handmade
      Tool for any crazy time traveler
      Purse is roughly 6-1/2" x 4-1/4" x 4-1/4"
      goggles have adjustable elastic headband

      Mysterious Set Purse was CUSTOM MADE and hand-crafted Great for Steampunk,Victorian pirate, cyber,..Can be used to transport Nefarious tools and Insidious Instruments ,dress accessory or room decoration. All love purse/clutch, can be used by ladies or kids. Everyone can find it very useful. Going out or on convention? Were will you carry cell phone or wallet ? Yes. Easy question, difficult answer. Our clutch/purse can solve the problem. Great item to define the apocalyptic dystopian theme.


                Steampunk goggles monocle eyepatch costume biker glasses clear lens cyber gothic by oldjunkyardboutique        

      14.99 USD

      Attention ! Going out ? Convention or mission ? Looking for very special accessory?We can help !


      We present Steampunk Apocalyptic Cyber Monocle- Time Travel Crazy Scientist's Oculo-Vision Tool from our collection of mad scientist treasures. Our goggles are excellent for any starship captain or officer, troop ,men, women , children, all who plan to wear eye protection against any bomb blast attack, war , or apocalypse. Adjustable Elastic Head Part, made from PVC and plastic.

      NOTE: make sure you will choose your left or right at check out, or we will send you left or right monocle by our choice.



      Thank you for visiting !


                Steampunk GogGLes VicTORian Novelty Glasses cosplay Antique filigree S4 by oldjunkyardboutique        

      14.99 USD

      ATTENTION!

      Going out ? Convention or mission ? Looking for very special accessory ? We can help !

      We present Steampunk Apocalyptic Cyber Goggles- Time Travel Crazy Scientist's Oculo-Vision Tool from our collection of mad scientist treasures. Our goggles are excellent for any starship captain or officer, troop ,men, women , children, all who plan to wear eye protection against any bomb blast attack, war , or apocalypse. Adjustable Elastic Head Part, made from PVC and plastic. JUST ONE OF A KIND !

      Thank you for visiting and Good Luck !


                Steampunk Goggles Airship Captain Apocalyptic Mad Scientist Victorian Limited SSS-black by oldjunkyardboutique        

      9.99 USD

      ATTENTION!

      Going out ? Convention or mission ? Looking for very special accessory ? We can help !

      We present Steampunk Apocalyptic Cyber Goggles- Time Travel Crazy Scientist's Oculo-Vision Tool from our collection of mad scientist treasures. Our goggles are excellent for any starship captain or officer, troop ,men, women , children, all who plan to wear eye protection against any bomb blast attack, war , or apocalypse. Adjustable Elastic Head Part, made from PVC and plastic. JUST ONE OF A KIND !

      Thank you for visiting and Good Luck !


                Bandolier Bandoleer Steampunk gothic Victorian military pirate Gun Holster BELT PostApocalyptic purse bag pouch--compass by oldjunkyardboutique        

      19.99 USD

      ONE OF A KIND !

      RARE !

      Ultimate protection ! ! ! This absolutely amazing set was used by our dear friend professor Friedrich Von Kreuzenberg , TIME TRAVEL specialist . Set comes directly from future , year 2053 . Our friend brought this item back with him from his WAR mission and he would like to share the same adventure that he experienced on his assignments . Set uses the most advanced technology and will provide you safe journey to another dimension. Excellent for steampunk, victorian, cyber, gothic,... anyone looking for great addition to his/ her costume .

      Have a lots of fun !

      Thank you for visiting and Good Luck !


                Bandolier Bandoleer Steampunk gothic Victorian military pirate Gun Holster BELT PostApocalyptic purse bag ammo pouch by oldjunkyardboutique        

      17.99 USD

      ONE OF A KIND !

      RARE !

      Ultimate protection ! ! ! This absolutely amazing set was used by our dear friend professor Friedrich Von Kreuzenberg , TIME TRAVEL specialist . Set comes directly from future , year 2053 . Our friend brought this item back with him from his WAR mission and he would like to share the same adventure that he experienced on his assignments . Set uses the most advanced technology and will provide you safe journey to another dimension. Excellent for steampunk, victorian, cyber, gothic,... anyone looking for great addition to his/ her costume .

      Have a lots of fun !

      Thank you for visiting and Good Luck !


                Steampunk GogGLes VicTORian Novelty Glasses cosplay Antique filigree S4 by oldjunkyardboutique        

      14.99 USD

      ATTENTION!

      Going out ? Convention or mission ? Looking for very special accessory ? We can help !

      We present Steampunk Apocalyptic Cyber Goggles- Time Travel Crazy Scientist's Oculo-Vision Tool from our collection of mad scientist treasures. Our goggles are excellent for any starship captain or officer, troop ,men, women , children, all who plan to wear eye protection against any bomb blast attack, war , or apocalypse. Adjustable Elastic Head Part, made from PVC and plastic. JUST ONE OF A KIND !

      Thank you for visiting and Good Luck !


                Steampunk GogGLes VicTORian Novelty Glasses cosplay Antique filigree S4 by oldjunkyardboutique        

      14.99 USD

      ATTENTION!

      Going out ? Convention or mission ? Looking for very special accessory ? We can help !

      We present Steampunk Apocalyptic Cyber Goggles- Time Travel Crazy Scientist's Oculo-Vision Tool from our collection of mad scientist treasures. Our goggles are excellent for any starship captain or officer, troop ,men, women , children, all who plan to wear eye protection against any bomb blast attack, war , or apocalypse. Adjustable Elastic Head Part, made from PVC and plastic. JUST ONE OF A KIND !

      Thank you for visiting and Good Luck !


                UNBEATABLE CYBER MONDAY DISCOUNTS AT HEALTHYFEETSTORE.COM        
      Shop online now at Healthyfeetstore.com for our annual Cyber Monday sale! This is our biggest sale of the year and you do not want to miss out on these extreme savings! The more you spend, the more you save up to 30% off*. Let’s not forget, that shipping is absolutely FREE on everything**! This is [...]
                Hetzen die Grünen auch deshalb gegen die Männerbewegung? (Buchvorstellung)        
      Die Debatte über die schwarzen Listen, die die grüne Heinrich-Böll-Stiftung über Menschen angelegt hat, die nicht stramm feministisch sind, wirft mehrere Fragen auf: Warum lässt sich die Genderfraktion inzwischen zu derart fragwürdigen Attacken hinreißen, dass selbst Zeitungen des eigenen Lagers nicht mehr mitgehen wollen? Warum genügt inzwischen das Frisieren von Wikipedia-Artiklen nicht mehr, in denen man jahrelang völlig ungestört die Männerrechtsbewegung und ihre Aktivisten als Ausgeburten der Hölle darstellen konnte? Und warum kommt es gerade jetzt zu einer neuen Eskalationsstufe, bei der Linksliberale besinnungslos mit Rechtsradikalen in einen Topf geworfen werden?

      Vielleicht liegt der Grund dafür schlicht in Angstbeißerei: Die Aggression entsteht aus Angst davor, im Genderbereich das Privileg der Alleinherrschaft zu verlieren, weil man gegenüber neuen politischen Diskursen allzu ausgrenzend und verkrustet ist. Gerade in diesem Jahr haben sich männerpolitische Graswurzel-NGOs wie die "IG Jungen, Männer, Väter" Zugang zu Gesprächen mit Vertretern des Familienministeriums verschafft und damit die ersten Sprünge in der "gläsernen Decke" für Männeranliegen in der Politik erzeugt. Über die FDP könnten Männerrechtler schon in zwei Monaten einen dauerhaften Repräsentanten im Bundestag haben. Dieselbe Instituionalisierung beginnt allmählich aber auch im akademischen Bereich, wo das Schmuddelkinder-Image für Maskulisten ebenfalls aufweicht. Das lässt sich etwa daran aufzeigen, wie das Buch Männer: Rollen und gute Orte des Psychologen und Familienberaters Christoph Hutter die Männerrechtsbewegung darstellt.

      Bei diesem Buch freut es mich zunächst einmal, dass darin nicht nur mein eigenes Plädoyer für eine linke Männerpolitik häufig zitiert wird, sondern auch die Veröffentlichungen der Professoren Amendt und Hollstein, Dr. Matthias Stiehler, Dr. Peter Döge, Dr. Christoph Kucklick, Dr. Heike Diefenbach, Johannes Meiners und Christine Bauer-Jelinek – sämtlich Autoren, deren Gedanken und Analysen für die Männerrechtsbewegung von Bedeutung waren.

      Das allmähliche Herausbilden einer Männerpolitik in Deutschland schildert Hutter ab Seite 27 unter der Überschrift "Es gibt eine Männerbewegung, aber sie bleibt immer wieder stecken". Ein Auszug daraus:

      Die Probleme, die bisher aufgezeigt wurden, bedürfen dringend einer Antwort. Diese Antwort kann nicht individualisiert gegeben werden, sie muss von der Gesellschaft und der Politik formuliert und getragen werden, sie muss aber vor allem von Männern vorangetrieben werden. (...) Die gute Nachricht vorweg: Es gibt in Deutschland eine Männerbewegung, vielleicht präziser Männerbewegungen. Besucht man im Internet die Seiten von MANNdat (www.manndat.de), agens (www.agensev.de) oder Väteraufbruch für Kinder (www.vaeteraufbruch.de) – um nur drei Beispiele zu nennen –, so wird man sich schnell davon überzeugen können, dass Männer sich organisiert haben, um ihre eigene Situation zu reflektieren, um ihre Bedürfnisse zu artikulieren und um gesellschaftliche Forderungen durchzusetzen. Auch "vor Ort" in der psychosozialen Praxis von Jugendhilfe, Beratungsarbeit, Therapie und pädagogischen Angeboten lassen sich Jungen- und Männerthemen kaum noch übersehen. (...) Und doch teile ich die Einschätzung von Arne Hoffmann (...), dass es heute eine starke Frauenbewegung, aber lediglich eine schwache, oftmals stille und wenig präsente Männerbewegung gibt. Männerthemen werden manchmal offen, in größerem Maße aber unbewusst vermieden.


      Um das zu verdeutlichen zitiert Hutter eine Passage aus meiner Rezension von Dr. Matthias Stiehlers Buch "Der Männerversteher".

      Auf den Seiten 30 und 31 schreibt Hutter unter der Überschrift "Gesellschaftlich unerwünschte Themen" folgendes:

      Ein weiterer Faktor, der zu dieser langsamen Etablierung der Männerbewegung führt, ist die Tatsache, dass die wirklichen Männerthemen nicht unwesentlichen gesellschaftlichen Gegenwind haben. So kommen Meiners und Bauer-Jelinek in ihrer Studie zum gesellschaftlichen Einfluss von Feminismus und Maskulismus zu der Einschätzung, dass die Maskulisten "trotz großen Engagements [weit] von einer Realisierung ihrer Forderungen entfernt [sind]. Die mediale Wahrnehmung von Männerthemen ist noch gering oder überwiegend negativ" (Meiners & Bauer-Jelinek 2014). Und in der Tat gibt es viele für Männer wichtige Themen, die im gesellschaftlichen Diskurs entweder nicht wirklich interessieren oder aber nicht wirklich verstanden werden. Hier herrscht ein eklatanter Mangel in der Wahrnehmung männlicher Lebensrealität. (...) Das zuständige Ministerium ist seit Generationen fest in der Hand von Politikerinnen und es kümmert sich, wie der Name des Ministeriums besagt, bis heute um "Familien, Senioren, Frauen und Jugendliche", aber eben deutlich weniger um die Belange der irgendwie mitgemeinten Männer. Versuche von Männern, Recht und Politik in den Bereichen einzufordern, in denen Männer benachteiligt sind oder wenig wahrgenommen werden (...), scheitern an einem unverständlich hartnäckigen und breiten Desinteresse von Politikerinnen und Politikern (gut dokumentiert sind solche Versuche auf der Seite www.manndat.de).


      Hutter zufolge forderten Männer inzwischen eine "Emanzipation 2.0" ein, die "systematisch die Bedürfnisse und Anliegen von Männern herauszuarbeiten und ihnen Gehör zu verschaffen" versucht.

      Unter der Überschrift "Der Feminismus – oder: Wer oder was kritisiert die Patriarchatskritik?" kommt Hutter darauf zu sprechen, dass diese Ideologie Männer mitunter "global zu Tätern stilisiert oder undifferenziert beschimpft und entwertet". Er erwähnt auf Seite 46 mit Bezugnahme auf mein "Plädoyer" aber auch die leider noch sehr kleine Randgruppe der Equity-Feministen, die diesem Sexismus widersagen:

      Sowohl in den Sensibilität für die Bedeutung der Geschlechterrollen, als auch in dem Bestreben, soziale Gerechtigkeit jenseits einer Parteinahme für eine bestimmte Untergruppe einzufordern, sind Vertreterinnen des Equity-Feminismus willkommene Gesprächspartner für Maskulisten, die ihrerseits primär Problemlagen und Diskriminierung von Männern in den Blick nehmen. Wichtig für jeden Dialog ist das gemeinsame Ziel politischer Gerechtigkeit und der unbedingte Verzicht darauf, eine andere Gruppe abzuwerten beziehungsweise sie zu missbrauchen, um die eigene Identität oder Position zu stärken.

      Den anderen Pol des Kontinuums bezeichnet Arne Hoffmann als "Radikal-Feminismus" (Hoffmann 2014, S. 11). Er markiert damit Positionen, die weiter unten unter der Überschrift der "Misandrie" näher betrachtet werden. Ein gar nicht so kleiner Teil der feministischen Strömung spricht leider immer wieder dem offenen Männerhass das Wort. Diese Position ist nicht Gegenstand meiner Überlegungen, weil sie zu einer konstruktiven Auseinandersetzung mit der Männerrolle nichts beizutragen hat.

      Schließlich ist noch eine weitere Abgrenzung wichtig. In der Geschlechterdebatte wird immer wieder versucht, eine männliche Position durchzusetzen, die sich unter dem Banner der Männerarbeit primär darum bemüht, feministische Themen voranzutreiben (Hoffmann 2014, S. 383ff., Neukirch 2012). So wichtig es auch ist, das die Menschen, die gendersensible Themen aus einer parteilichen Geschlechterperspektive vorantreiben, die andere Seite im Blick behalten, so wenig löst diese konkrete Verschränkung den Anspruch an eine männersensible Theoriebildung ein. Eine zukunftsweisende Füllung der Männerrollen entsteht nicht aus dem Abarbeiten einer pro-feministischen Agenda, sondern aus der Selbstbestimmung auf die Themen, die Männer belasten und beschäftigen.


      Schließlich kommt Hutter auf den Seiten 262 bis 264 seines Buches noch einmal eingehender auf das Thema "Männerpolitik" zu sprechen:

      Arne Hoffmann (2014) weist in beeindruckend sachlicher, aber auch hartnäckiger Manier darauf hin, dass es nicht genügt, Männlichkeit und Tätigkeit im privaten Bereich positiv zu erschließen. Die Verletzungen der Männerrolle, die in diesen Überlegungen aufgezeigt wurden, müssen ebenso wie die Suche nach guten Männer-und Väterorten einen selbstverständlichen Platz im politischen Diskurs bekommen. Fatalerweise gibt es bezüglich der öffentlichen Thematisierung genderbedingter Ungleichheit aber eine massive Schieflage, die dazu führt, das "Benachteiligung und soziale Problemlagen, von denen Männer betroffen sind, weitgehend marginalisiert" werden (Hoffmann 2014, S. 13). Hoffmann arbeitet heraus, dass das Problem über ein bloßes Vergessen männlicher Anliegen weit hinausgeht. Männerthemen haben es schwer, politisches Gehör zu finden, weil Männlichkeit im politischen Raum mit Ideen von Macht, Unterdrückung und Täterschaft besetzt ist. Wo die Bundes-SPD in ihrem Grundsatzprogramm darauf drängt, die männliche Gesellschaft zu überwinden, um eine menschliche Gesellschaft erreichen, wo die Goslarer Grünen in einem offenen Brief an die Gleichungsbeauftragte darauf hinweisen, dass es "nicht ihr politischer Wille" sei, "Benachteiligungen von Männern aufzuzeigen und zu beseitigen"und wo das Wort "Mann" in der politischen Linken "geradewegs einem Schimpfwort geworden" ist (Hoffmann 2014, S. 16), dort ist schwierig, Diskussionen über die Diskriminierung, Benachteiligung und Verunglimpfung von Männern zu führen.

      Spricht man über eine zukunftsweisender Männerpolitik, dann geht es um drei Schritte: um Entdämonisierung, um die Schaffung adäquater Strukturen und um die entsprechenden inhaltlichen Auseinandersetzungen. Für den ersten Schritt steht ein Titel von Christine Bauer-Jelinek. Sie dekonstruiert in ihrem Buch "Der falsche Feind. Schuld sind nicht die Männer" (2012) den "radikal-feministischen" Mythos, dass sich gesellschaftliche Probleme monokausal auf männliches Verhalten zurückführen lassen. Unabhängig von den heißen Themen, die sie in ihrem Buch durchspielt, markiert sie mit dem Titel einen notwendigen ersten Schritt weg von einem Denken, das den politischen Blick auf Männerthemen prinzipiell verstellt.

      Der zweite Schritt hin zu einer Männerpolitik, die diesen Namen verdient, ist der Streit um Institutionen, die Männerthemen politisch vertreten können. Hier zeigt sich die Männerszene heute leider tief gespalten. Auf der einen Seite stehen Männer, die den etablierten Institutionen wie die Bundesforum Männer immer wieder nachweisen, dass diese sich in erster Linie als Vollstrecker feministischer Politik verstehen. Gegenüber stehen Männer, die dem Teil der Männerbewegung, der unter der Bezeichnung Maskulisten fingiert, vorwirft, sie würden reaktionäre, rechtsradikal unterwanderte und frauenfeindliche Positionen vertreten. So wenig hilfreich diese Spaltung auch ist, sie markiert deutlich Handlungsbedarf, weil Männer eine politische Lobby brauchen, die ihre eigenen Themen vertritt, und keine Männerpolitik "die vor allem Frauen nutzt" (Neukirch 2012; ausführlich zu dieser Auseinandersetzung: Hoffmann 2014, S. 383-401). Untrennbar zu dieser Debatte gehört auch die Frage nach einer akademischen Präsenz der Männerforschung. Hier klafft eine eklatante Lücke zwischen den Geschlechtern. "Während es [...] mehr als 200 Lehrstühle für Frauenforschung gibt, existiert kein einziger für Männerforschung" (Hoffmann 2014, S. 104). Dies führt zwangsläufig dazu, dass sowohl die Datenlage als auch die Theoriebildung zu spezifischen Männerthemen prekär sind, wo entsprechende Projekte nicht durch privates Engagement vorangetrieben werden. Und auch diese Situation verschärft sich noch einmal durch die innere Spaltung der Zunft. Für diesen Schritt der Institutionalisierung der Männerpolitik ist heute zu konstatieren, dass er noch aussteht, wenn er auch von einzelnen Initiativen so weit wie möglich kompensiert wird.

      Erst wenn die Hürden der Dämonisierung und der Institutionalisierung genommen sind, wird es möglich, die vielfältigen, in diesem Buch bereits benannten Männerthemen inhaltlich anzugehen, ihnen politisches Gehör zu verschaffen und an gesellschaftlichen Lösungen zu arbeiten.


      Es ist offenkundig, dass das traditionelle Lager und dabei insbesondere die Partei der Grünen für Jungen, Väter und andere Männer nichts Entsprechendes anzubieten hat. Es scheint dort auch eine große Unlust zu herrschen, ein solches Angebot zu entwickeln und sich mit Vertretern der Männerrechtsbewegung wenigstens zu sondierenden Gesprächen zusammenzusetzen. Die Alternative besteht dort offenbar nur in einem erneuten, jetzt noch heftigeren Versuch der Diskreditierung. Männerrechtler sollen weiter mit dem Hautgout des radikal Rechten belegt und damit unberührbar gehalten werden.

      Darüber, warum Andreas von Kemper und Henning von Bargen sich für diese versuchte Diskreditierung hergeben, kann ich natürlich nur spekulieren. Offen gesagt vermute ich biographische Hintergründe. Allerdings hilft einem die Antwort auf diese Frage bei der angestrebten Sachdebatte genauso wenig weiter wie die Frage, wen ich in den 13 Jahren, die es Genderama inzwischen gibt, dort schon mal verlinkt habe. Für Gespräche auf Sachebene muss man Menschen finden, die dazu bereit sind. Andreas Kemper und Henning von Bargen gehören öffensichtlich nicht dazu.

      Überdeutlich ist, dass der grüne Genderpranger genau jenen Zielen entgegenarbeitet, die Hutter als so ungemein wichtig kenntlich gemacht hat. Er treibt die Dämonisierung der Männerrechtsszene und die Spaltung der Lager mit Eifer voran. Profitieren dürfte davon außer denen, die für dieses Cybermobbing bezahlt werden, kaum jemand. Die Grünen und ihre Stiftung haben sich mit diesem Pranger breitflächig blamiert; das Zusammenfinden zu einer konstruktiven Sachdebatte ist einmal mehr torpediert worden. Gewinn bringt dieser Pranger nur jenen, denen das Verhindern einer Sachdebatte nutzt.
                Monday Maddness… Crazy Internet Security Stories!        
      A good friend of the CyberHood Watch Ken Schallcross ~ posts crazy predators stories every week called Wacky Internet Predator Wednesday!!! So, every Monday I am going to give you some insight into the crazy world of Internet Security & Technology from around the globe... Here we GO!!! Monday Maddness and yes that is spelled correctly :)
                WannaCry Ransomware: A Brief Q&A with a CyberArk Labs Researcher        

      In May, we offered a 30 minute webcast focused on deconstructing the WannaCry ransomware attack. Led by CyberArk Labs Researcher Shaked Reiner, the webcast delved into specifics of the attack, as well as proven methods organizations can implement to prevent WannaCry’s ability to spread through networks and encrypt system data. We’ve compiled some of the […]

      The post WannaCry Ransomware: A Brief Q&A with a CyberArk Labs Researcher appeared first on CyberArk.


                Privileged Access Management: A Matrix Approach for Account Ranking and Prioritization        

      Throughout the course of my six years in helping KPMG clients with their Privileged Access Management programs, there has rarely been a simple answer to the critical questions of exactly which privileged accounts in an environment should be integrated first (e.g., application/infrastructure/personal accounts), and exactly how we should control each type of privileged account. The […]

      The post Privileged Access Management: A Matrix Approach for Account Ranking and Prioritization appeared first on CyberArk.


                Five Things to Know about Ransomware        

      With WannaCry barely in the rear view mirror, ransomware was back in the spotlight with a new malware dubbed NotPetya. We can expect to see new ransomware strains as advanced attackers continue to evolve their tactics, and the ramifications on business will be significant if proactive measures are not taken. In previously posts, we’ve deconstructed […]

      The post Five Things to Know about Ransomware appeared first on CyberArk.


                The Art of the Ethical Hack: A Q&A with CyberArk’s Head of Red Team Services        

      Today’s highly motivated cyber attackers continually hone their skills. After all, their job is to know your network better than you do, exploiting even the smallest vulnerability to carry out a mission. In order to stay a step ahead of advanced maneuvers, it’s critical to adopt an attacker’s mindset. For many organizations, a Red Team […]

      The post The Art of the Ethical Hack: A Q&A with CyberArk’s Head of Red Team Services appeared first on CyberArk.


                Circumventing Application Whitelisting and Misplaced Trust        

      Application whitelisting has been an advantageous technique to harden an organization’s endpoints against malware, unlicensed software, and other unknown or unauthorized software. When properly configured, whitelisting certainly has its benefits as it controls which applications and scripts can run and execute. However, traditional whitelisting technologies will limit the user to a binary ‘allow/deny’ mode. This […]

      The post Circumventing Application Whitelisting and Misplaced Trust appeared first on CyberArk.


                3D printing – A New Industry Made in America        
      Image of Additive Manufacturing Partnership meeting held at the United States Patent and Trademark Office (USPTO).

      Increasingly, we’re seeing the products of additive manufacturing – better known as 3D printing – all around us: in retail stores, in classrooms, and even in medical technologies.  

      The U.S. Patent and Trademark Office (USPTO) received over 8,000 patent applications last year alone in the field of additive material technologies. These represent a range of products – from household items to prosthetics – that are being manufactured with 3D printing and are having a positive impact on people’s lives and the economy.

      One of the founding minds in 3D printing is National Inventors Hall of Fame inductee Charles Hull. Troubled how long it could take to create a prototype of a new device or tool, he created stereolithography in the 1980s, the first commercial rapid prototyping technology, now known as 3D printing.  In recent years, the growth and popularity of 3D printers has skyrocketed, as they are increasingly being used by small businesses, hobbyists and entrepreneurs because of their speed and accuracy. There is now even a 3D printer on the International Space Station.

      Exciting advances are being made with 3D bioprinting, a method of using 3D printing to create new tissues and organs. The USPTO works with the National Inventors Hall of Fame in running the annual Collegiate Inventors Competition, which has showcased the next generation of 3D printing innovation, such as previous graduate school winner Dave Kolesky for 3D bioprinting of vascularized human tissue. Learn more about 3D bioprinting in the USPTO’s Science of Innovation video, produced by NBC Learn.

      The USPTO plays an important role in supporting American businesses in new and growing industries to get new products and technologies to the marketplace faster. This ultimately drives innovation and creates new jobs for American workers, benefitting consumers and manufacturers alike.

      Lastly, to stay ahead of the curve in new areas, the agency partners with private industry in other areas such as cyber security and bioscience, all while providing the most up-to-date technical training to patent examiners who examine these new technologies every day.  


                Address SWIFT Customer Security Controls Framework with CyberArk        

      The Society of Worldwide Interbank Financial Telecommunication (SWIFT) provides a community of global financial institutions the ability to exchange sensitive information relating to international financial transactions. This vast network—over 11,000 customers across 200+ countries—has become an attractive, high-value target for cyber attackers, as evidenced by high-profile breaches including the infamous Bangladesh Central Bank heist. By […]

      The post Address SWIFT Customer Security Controls Framework with CyberArk appeared first on CyberArk.


                CyberArk Celebrates 2017 Americas Partner Excellence Award Winners        

      Last night we announced winners of the CyberArk 2017 Americas Partner Excellence Awards. Partners were recognized in a ceremony at the 11th annual CyberArk Impact Americas Summit 2017, the world’s largest event for privileged account security advocates. These awards celebrate top CyberArk channel, systems integrator and solution provider partners in the United States, Canada and […]

      The post CyberArk Celebrates 2017 Americas Partner Excellence Award Winners appeared first on CyberArk.


                The NotPetya Global Pandemic – CyberArk Labs Analysis        

      In May 2017, WannaCry took advantage of an exploit in the Windows operating system to usher in a cyber security pandemic – ransomware that can spread its infection like a traditional worm. The results were catastrophic, with some damage estimates reaching up to more than $4 billion. Yesterday, a new malware dubbed NotPetya emerged as the driving force […]

      The post The NotPetya Global Pandemic – CyberArk Labs Analysis appeared first on CyberArk.


                5 Ways to Address the General Data Protection Regulation (GDPR) With CyberArk        

      On May 25, 2018, the General Data Protection Regulation (GDPR) will be enforced across the European Union (EU). This regulation aims to extend the rights of individuals residing within the EU to better control and protect the use of their personal data in the evolving digital landscape.  It’s also an attempt to strengthen, simplify and […]

      The post 5 Ways to Address the General Data Protection Regulation (GDPR) With CyberArk appeared first on CyberArk.


                CyberArk Labs Identifies “GhostHook” Technique That Bypasses PatchGuard in Windows OS        

      Today on CyberArk’s Threat Research Blog, CyberArk Labs has published details about a new attack technique that bypasses PatchGuard in Windows OS. For our business readers, we offer this executive summary with highlights of the potential security impact: Up until now, we haven’t seen many successful rootkits on Windows 10 64-bit, thanks in large part […]

      The post CyberArk Labs Identifies “GhostHook” Technique That Bypasses PatchGuard in Windows OS appeared first on CyberArk.


                MOOC Majors: An Alternative Route to the Workforce         
      What is the MOOC Business Model?? That was one of the burning question about MOOCs in 2013. In 2014 we may learn that no one business model will prevail, but MOOC Platform firms will develop a number of promising and complementary revenue streams. 

      MOOC Sequences and Specializations

      One of these revenue streams will be the Sequence Certificate or MOOC-Mini-Major. Last year several MOOC platforms introduced course sequences. The most heralded is the Georgia Tech Udacity masters degree in Computer Science, sponsored by AT&T. 

      But the MOOC firms also introduced several notable mini-courses-of-study that did not carry university credit or connect to a degree pathway. One notable example is the sequence of foundation MBA courses from University of Pennsylvania's Wharton School, announced by Wharton and Coursera last September. These courses, like others from Coursera, were offered free of charge. In January 2014 Laurie Pickard, a master's degree graduate of my university, Temple, was featured in Fortune magazine for patching together an entire MBA-type program from such MOOCs. 

      In January 2014 Coursera announced their Specializations Certificate Programs. These programs package a number of distinct MOOCs - from 3 to 9 - offered by the same institution, plus a final capstone project and exam. Students pay for each course in the sequence, complete the capstone project and exam, and earn a certificate not just for each course but for the entire sequence. The sequences are thus MOOC-based near equivalents of college majors, at least in the sense that the courses are designed by a single institution's faculty to fit together in a sequence and to generate capabilities currently demanded in the economy. 

      Two good examples of the new Specializations programs are the four-course sequence in cybersecurity, a hot field with a bright future, offered by the University of Maryland with a certificate available to those who pass all four, complete a capstone project and pay $245 and the sequence of nine MOOCs in data science offered by Johns Hopkins, with certificates available to those who pass all nine, complete a capstone project and pay $490.  

      MOOC Mini-Majors

      It is not difficult to imagine students in the near future offering up two, three or four of these Specialization certificates in lieu of a university "major". But obstacles remain.

      EdX recently experimented with matching more than 800 top-performing MOOC learners with top-tier technology companies. The results, as reported by the Chronicle of Higher Education, were not merely disappointing but disastrous. Despite the sponsorship of edX, only three received interviews, and not one was hired. Subsequently edX has withdrawn from the 'employment agency' business.

      That step may have been premature. The top-tier firms get thousands of applicants from the best university programs in computer science and information systems for every opening. Why would they be interested in experimenting with MOOC learners when they can take their pick of numerous Stanford, MIT and Purdue grads, who have shown the persistence to earn four year degrees, rubbed shoulders with top professors, and networked with other top students who will soon enter the workforce and connect up with hundreds of other hot prospects?

      Meanwhile,  new business start-ups in Silicon Valley, on Massachusetts Route 128, in New York's Silicon Alley and throughout the country hunger for talent. Most organizations will not be able to compete for the top grads of the top-tier university programs. Is it not possible that edX, which is hardly an expert in the employment agency business, simply directed their efforts at the wrong job market.

      One is reminded of Prof. Michael Lenox's Coursera MOOC on Business Strategy offered in February and March 2013. Lenox, a Professor at University of Virginia's Darden School of Business, used crowdsourcing techniques to locate business firms and non-profit organizations willing to involve his MOOC students in their strategic planning. As Lenox said at the time:

      "The concept can be applied in any number of domains, Imagine a course on graphic design where students prepare solutions for real nonprofits or a computer program course where students develop code for small startups with limited budgets. The potential is enormous."

      As it turned out, the potential was enormous -  more than 100 small firms and non-profits participated in Lenox's MOOC, and close to 80% of the active student participants contributed to these organizations' strategic planning.

      Now imagine a large scale effort by one of the big MOOC Platform firms to source similar organizations to provide short-term internships or apprenticeships for top performing MOOC students who have earned one or more Specialization Certificates?   My guess is that, unlike the failed edX effort with Google, Intuit, Yahoo, and other top tier firms, a crowdsourced effort to connect top MOOC learners and hungry organizations would place many learners with MOOC majors in the workforce.

      * * *

      In my next post I will consider the new promise of MOOCs in providing near equivalents of course credit that some universities, faced with declining enrollment and loss of tuition dollars, can accept as transfer credit to forge efficient and affordable 'mixed-mode' degree pathways. 

                HOW TO IMPROVE VIRTUAL SCHOOLS         



      Today I want to shift my attention from MOOCs to another promising form of online education, virtual schools. I have some personal experience with these, as my son is a graduate of one - PA Cyber in Pennsylvania. 




      Houston C. Tucker, over at E-learning Industry, proposes three ways to improve virtual schools: treat the students as honored guests, stay flexible, and train your virtual teachers to deliver every instructional message with as much love and care as they can muster. These ideas are sound, and I wanted to think about them in relation to the virtual school I knew at first hand.

      So let me say up front I am a big supporter of virtual schools. They fit the special needs of come young people and their families. As a pluralist, I oppose all one-size-fits-all policies. (Of course this does not mean I support just any virtual schools - only the good ones).

      Some may counter idea by saying that that young people are NOT guests in school but instead are there - by force if necessary - to be subjected to some important lessons - whether algebra or democratic values or whatever.

      There is no credible evidence that high school students cannot learn algebra on line as well as in a conventional classroom. Further, no one can learn democratic values in a compulsory, prison-like institution. The whole institutional message is passivity, docility, obedience. One reason I like virtual schools is because in the home environment parents can zero out a lot of those messages.

      My son Sjoma attended PA Cyber. It did a great job on #1 - it treated its students with great respect, providing lots of course choices and formal academic mentoring. But is t also was demanding. When he fell behind his mentor called him - and then us - and demanded that Sjoma show up at the learning center for faced-to-face academic counseling. Between his mentor and his counselor he got back on track. 


      It also had an excellent college-study program - students could begin to take in-person or online college courses as soon as they were ready. So it got an A+ on flexibility -- until the commonwealth of PA came in and dictated that virtual schools, unlike their conventional counterparts - could not offer college study programs. So in this case PA got a flat F. 

      Unlike many virtual schools, PA Cyber offered no courses of their own - all were outsourced to educational provider firms. Some teachers were better than others, but I doubt that all content messages were delivered with maximum love. On the other hand, none of the teachers was cruel or incompetent - market logic pretty much took care of that - for better or worse - by provider firms hiring their teachers on a contingent basis and eliminating those low on the star system.

      And of course there are many problems about that, but so far as i could tell they did not include low quality teaching or teachers not well-adjusted to the online context.


      The obvious question is whether the states could provide virtual colleges - let's say PA-Cyber College in Pennsylvania - for free or at a very low cost, using MOOCs as the backbone?  This would be one concrete step to ending the student debt problem.
                Regizorul lui Deadpool va sta la cârma ecranizării aclamatului roman SF Neuromancer        
      William Gibson, pe care Tim Miller îl va adapta, este considerat părintele mișcării cyberpunk
                Tracking Russian Propaganda In Real Time ... Kevin Rothrock for Meduza        
      NEWS
      Tracking Russian propaganda in real time The trouble with a new automated effort to expose Moscow's ‘active measures’ against Americans
       Meduza  04:31, 03 августа 2017 
      Pixabay edited by Meduza
      On August 2, The German Marshall Fund of the United States unveiled a new online tool — a “dashboard” — designed to “provide a near real-time look at Russian propaganda and disinformation efforts” on Twitter. The organization describes the project as a direct response to Russia’s alleged interference in the 2016 U.S. presidential election, noting that “many have warned Putin will be back in 2018 and 2020.” In an opinion piece for Meduza, Kevin Rothrock reviews the recent history of American efforts to unmask Russian propaganda, and takes a critical look at potential flaws in this latest online resource.

      What was PropOrNot?

      Last November, The Washington Post published a remarkable article about how a “Russian propaganda effort helped spread ‘fake news’” during the 2016 U.S. presidential election, citing a report by “experts” at an anonymous website called PropOrNot.
      After initial excitement about the story, the newspaper came under fire for promoting unverified allegations against alternative American news outlets. Critics called PropOrNot a “McCarthyite blacklist.” To PropOrNot, merely “exhibiting a pattern of beliefs outside the political mainstream” was “enough to risk being labelled a Russian propagandist,” Adrian Chen wrote in The New Yorker.
      Simply put, PropOrNot bungled its mission completely. On the one hand, the anonymity of the website’s managers invited suspicions about their expertise and agenda. On the other hand, PropOrNot was so transparent about its methodology (talking openly about “red-flagging Russian propaganda outlets” and of course naming specific websites) that it was easy to dispute and dismiss the blacklist. Add to this PropOrNot’s childish, sometimes obscene behavior on Twitter, and it’s no mystery how this project ended up a humiliating dumpster fire.

      What is the Hamilton 68 dashboard?

      Hamilton 68: A Dashboard Tracking Russian Propaganda on Twitter
      The Alliance for Securing Democracy / The German Marshall Fund of the United States
      Researchers at The Alliance for Securing Democracy, an initiative housed at The German Marshall Fund of the United States, say they’ve been observing and monitoring â€œRussian online influence” for three years, so it’s a good bet that they took notice of PropOrNot’s spectacular failure, while developing the “Hamilton 68 Dashboard,” released on August 2.
      According to The German Marshall Fund, the “dashboard” is designed to “shed light on Russian propaganda efforts on Twitter in near-real time.” The “Hamilton 68” website offers a dozen automatically-updated columns tracking “trending hashtags,” “trending topics,” “top domains,” “top URLs,” and so on.
      “Our analysis is based on 600 Twitter accounts linked to Russian influence activities online,” Laura Rosenberger (a senior fellow at the alliance) and J.M. Berger (a non-resident fellow) wrote in a blog post on August 2.

      How does Hamilton 68 differ from PropOrNot?

      Hamilton 68’s propaganda list is a secret. Unlike PropOrNot, Hamilton 68 does not disclose the identities of the 600 Twitter accounts. All we know of the project’s methodology is that its researchers selected 600 Twitter accounts according to three types (whether there are 200 accounts for each type is unclear): “accounts that clearly state they are pro-Russian or affiliated with the Russian government”; â€œaccounts (including both bots and humans) that are run by troll factories in Russia and elsewhere”; and “accounts run by people around the world who amplify pro-Russian themes either knowingly or unknowingly, after being influenced by the efforts described above.”
      The German Marshall Fund says it refuses to reveal the specific accounts in its dataset because it “prefers to focus on the behavior of the overall network rather than get dragged into hundreds of individual debates over which troll fits which role.”
      The lack of methodological clarity (for the sake of avoiding “debates”) has already led to some misleading coverage in the media, with outlets like Business Insider reporting that “Hamilton 68 is now working to expose those trolls — as well as automated bots and human accounts — whose main use for Twitter appears to be an amplification of pro-Russia themes,” despite the fact that the website doesn’t actually reveal the names of any Twitter accounts.
      For people unimpressed by talk of “600 Twitter accounts,” J.M. Berger told Ars Technica that his team could have expanded the dashboard to “6,000 almost as easily, but the analysis would be less close to real-time.” If that doesn’t sound scientific enough, Berger also emphasized that the 600 selected accounts were identified with a “98-percent confidence rate.”
      The German Marshall Fund is no ragtag bunch. Unlike the anonymous potty mouths who launched PropOrNot, Hamilton 68 sports some impressive talent. The project is reportedly the brainchild of Clint Watts, a “former FBI special agent-turned disinformation expert,” who worked alongside J.M. Berger, a fellow with the International Center for Counterterrorism studying extremism and propaganda on social media; Andrew Weisburd, a fellow at the Center for Cyber and Homeland Security; Jonathon Morgan, the CEO of New Knowledge AI and head of Data for Democracy; and Laura Rosenberger, the director of the German Marshall Fund's ‎Alliance for Securing Democracy.
      The Alliance for Securing Democracy has a hell of a mission statement. It begins simply, “In 2016, American democracy came under unprecedented attack,” before outlining the organization’s commitment to “documenting and exposing Vladimir Putin’s ongoing efforts to subvert democracy in the United States and Europe.” Putin’s name appear six times in the text.
      The Alliance for Securing Democracy also boasts an all-star Advisory Council that includes members like former U.S. Homeland Security Secretary Michael Chertoff, former Estonian President Toomas Ilves, journalist and conservative pundit Bill Kristol, former U.S. Ambassador to Russia Michael McFaul, and former Supreme Allied Commander in Europe Admiral James Stavridis, just to name a few.
      With figures like these backing Hamilton 68, it’s no surprise that the project is enjoying a lot of favorable attention from prominent people on Twitter.

      What are the problems with Hamilton 68?

      The researchers say “the accounts tracked by the dashboard include a mix of such users and is the fruit of more than three years of observation and monitoring,” citing a November 2016 article by Weisburd, Watts, and Berger, titled, “Trolling for Trump: How Russia Is Trying to Destroy Our Democracy.” The text outlines a wide array of Russian “active measures” designed to erode Americans’ faith in their democracy, including efforts as serious as military-orchestrated hacker attacks. Hamilton 68, however, doesn’t claim to track secret Russian hackers, and what we (supposedly) get is relatively underwhelming.
      “Attributed government or pro-Russian accounts.” We actually have some idea which accounts Hamilton 68 is tracking, when it talks about this group of Twitter accounts. At the top of the dashboard, there is a widget called “Top Tweets of the Last 24 Hours” featuring a repeating rotation of “top tweets” by Russian state Twitter accounts. At the time of this writing, the accounts displayed belong to the Russian Foreign Ministry, RT America, RT.com, Sputnik International, and RT UK News.
      The Alliance for Securing Democracy says its goal with this project is to “spread awareness of what bad actors are doing online” and to help journalists “appropriately identify Russian-sponsored information campaigns.” But what journalist needs a “dashboard” to know that the Russian Foreign Ministry’s Twitter account belongs to “Russian-sponsored information campaigns”? And what is the use of singling out that RT America tweeted about a school explosion in Minneapolis on August 2? Perhaps Russian “active measures” aim to “erode trust between citizens and elected officials and democratic institutions,” and maybe reporting on tragedies or infrastructure failures in America furthers this aim, but characterizing such tweets as “what bad actors are doing” comes eerily close to branding such journalism a Russian propaganda effort.
      “Bots and human accounts run by troll factories.” All we know about this category in Hamilton 68’s methodology is that researchers periodically have to “replace accounts that are suspended,” meaning that the dashboard possibly doesn’t monitor a full 600 Twitter accounts at all times, if the deleted bots on the list aren’t replaced automatically. According to Weisburd, Watts, and Berger, bots are a “key tool for moving misinformation and disinformation from primarily Russian-influenced circles into the general social media population,” citing fake reports about a second military coup in Turkey and a gunman at JFK airport.
      These incidents stand out, however, because they’re so rare and extreme, and Hamilton 68’s focus on bots risks overlooking the typically futile background noise these accounts produce online. Because the accounts aren’t identified, moreover, there’s no way of knowing if the bots reflected in the dashboard weren’t temporarily hired to promote pro-Russian content before some other client — a shoe company or a vitamin manufacturer, for instance — ordered the latest campaign. This may be a wild, silly hypothetical, but we don’t know any better, with the raw data hidden from us.
      “Accounts run by people who amplify pro-Russian themes after being influenced by Russian propaganda efforts.” This is far and away the trickiest, most problematic aspect of The Alliance for Securing Democracy’s new project, and it’s also presumably where researchers wanted most to avoid “debate” about their selection criteria. How do you identify “pro-Russian amplifiers” if Russian propaganda’s themes dovetail with alternative American political views? One of the problems with PropOrNot, in Adrian Chen’s words, was that it unfairly targeted media outlets that “exhibited a pattern of beliefs outside the political mainstream.”
      Hamilton 68 tries to dodge this issue by concealing the people it says are “pro-Russian amplifiers.”
      J.M. Berger says the project’s selection process has a “98-percent confidence rate,” but that’s an easy claim to defend, when you won’t tell anyone who's on the list.
      Kevin Rothrock

                Seeing Security in a New Light        
      The most dangerous threats to your organization are the ones you can’t see or stop. Cybercrime is on the rise—and the healthcare industry is particularly vulnerable because of the value of the data. Devices and data are growing by the second, creating incredible complexity and a dynamic threat landscape. No wonder 76% of IT professionals say […]
                My Optical Drive Stopped Functioning!        
      If you have "lost" your optical drive (CD/DVD/Bluray/HD-DVD), e.g. it doesn't show up in Windows Explorer, check if Device Manager reports registry problems. Continue reading
                Mozilla Firefox: “The Proxy Server Is Refusing Connections”        
      Oh, isn't that nice. Why is it that these type of things always seem to happen whenever you are in a position where you really need your precious Interwebs? I don't even use a proxy server... I thought. Continue reading
                How To Change Between Languages In Mozilla Firefox        
      Some of you may prefer to be able to switch between the UI languages of your programs, but sometimes it's just not at all that easy nor logical to accomplish. Mozilla Firefox has that option. Continue reading
                Cloning Windows 7 VMs Using FOG        
      FOG can clone Windows 7, but if you have had troubles with it, this article shows you what you can do. Continue reading
                FOG And New Hard Drives        
      FOG and new, unpartitioned hard drives do not go along well... Continue reading
                How To Change Any Windows User Password Using NTPASSWD        
      NTPASSWD is a linux based CD/USB bootable app that allows you to change or reset any given user's Windows password. Continue reading
                Cybersecurity: To Be (Empirical), or Not to Be?        

      Hamet with data background

      That is the question for cybersecurity risk assessment.

      FICO has been in the analytics business since our inception back in 1956.  Our founders, Bill Fair and Earl Isaac, had the novel idea that businesses could make better decisions through data. Before anyone thought to call the resulting algorithms “analytics,” they set off to create game-changing approaches to correlating signals with outcomes to help companies manage risk, reduce expense, and maximize opportunities.

      Bill and Earl began looking for problems they could solve through an empirical analysis of data, and credit underwriting was a use case that was well-suited to the technique. Most credit-granting organizations had credit applications tucked away in filing cabinets (a source of consistent signal data), and most also had a reasonable handle on outcomes – i.e., who was managing credit to terms and who was in arrears or in default.

      The ability to relate data known at the time of the decision (in this case, underwriting) to outcomes experienced in the future is at the heart of predictive analytics. Ascertaining the real statistical correlations between these signals and the subsequent outcomes in order to build a model is the definition of “empirical”.  No guessing, no value judgements, no subjective opinions, and no bias.

      The absence of bias in empirically derived models is key to their success in fields such as credit underwriting, where our common interests have determined that there’s no room for the prejudicial treatment of applicants. They are also successful because of their accuracy and performance. There are use cases where expert, or non-empirical, models are useful – especially when the data to train an empirical model isn’t available.  But when data is available, or can be collected, an empirical approach is generally preferred.

      FICO has pioneered empirically derived algorithms in multiple domain spaces, and for multiple use cases. Where data has already existed, we’ve used it. Where it doesn’t exist, we’ve set up collaborative frameworks and industry consortia to collect it.

      Cybersecurity With and Without Empiricism

      Cybersecurity is another great use case for predictive analytics.  Fortunately, it is also one where the data needed to empower an empirical approach actually exists. Because of public reporting requirements for breach incidents involving data loss, we actually know quite a bit about cyber outcomes. When we couple this with data we collect at internet scale regarding the condition of infrastructure and behavior of organizations, we have a sound basis for the development of empirical models.

      The FICO Enterprise Security Score is an empirically derived predictor of cybersecurity risk at the enterprise level. The ESS score translates directly to the likelihood of a future, significant breach event.  The model that generates the score is based on an empirical analysis of the condition of the internet-facing assets of organizations, and the observed behaviors they exhibit in the management of those assets. Observations on both breached and un-breached organizations have been compared, and the mathematical correlations between conditions, behaviors, and subsequent cyber breach outcomes have been measured.

      The resulting empirical model does a very good job of predicting breach risk. In fact, the ability of the model to discern future "goods" (un-breached firms) from "bads" (breached firms) is better than twice as good as the published results of the only competitor brave enough to post a benchmark.

      So why is empirical better? One critically important reason is the impact of compound error. Expert or judgmental models translate opinions into numbers.  And while these judgments may in fact be expert, if they are not empirical they are likely to be imprecise. This introduces the challenge of imprecision at scale, or compound error. The results can get away from you quickly.

      With our Enterprise Security Score, we’re looking at the condition of hundreds or thousands of internet-facing assets, in multiple categories, for each assessed organization. We’re also looking at organizational behaviors, based on how these assets are managed (or mis-managed) over time. Any time you are evaluating multiple factors in combination, the precision of each element becomes more important. Basing a model on multiple measured correlations, as we do at FICO, yields a better outcome than basing a model on multiple judgmental assessments - each contributing its imprecision to a watered-down result.

      To be (empirical), or not to be? Now that we be both understand the answer, I think you know why I asked the question.

      The post Cybersecurity: To Be (Empirical), or Not to Be? appeared first on FICO.


                The Future of AI: Redefining How We Imagine        

      FICO 25 years of AI and machine learning logo

      To commemorate the silver jubilee of FICO’s use of artificial intelligence and machine learning, we asked FICO employees a question: What does the future of AI look like? The post below is one of the thought-provoking responses, from Sadat Nazrul, an analytic scientist at FICO, working in San Diego.

      Looking at the next 20 years, I see us moving well beyond the productivity enhancements AI has brought about so far. With the advent of AI, we will be seeing a renaissance in our own personal lives as well as society as a whole.

      Healthcare

      Today, our gadgets have the ability to monitor the number of steps we take, the rate of our heart beat, as well as the contents of our sweat. All this rich information allows a team of doctors, engineers and analysts to monitor our well-being and to maintain our peak performance. Similarly, with innovations in genomic sequencing and neural mapping passing FDA trials, we will soon be seeing huge leaps in the field of personalized medicine. AI will help us understand individual physiological needs in order to come up with customized prescriptions and improve our overall health standards.

      Cognitive Abilities

      People are keen to improve cognition. Who wouldn’t want to remember names and faces better, to be able more quickly to grasp difficult abstract ideas, and to be able to “see connections” better? Who would seriously object to being able to appreciate music at a deeper level?

      The value of optimal cognitive functioning is so obvious that to elaborate the point may be unnecessary. Today we express ourselves through art, movies, music, blogs, and a wide range of social media applications. In the field of image recognition, AI can already “see” better than we can by observing far more than the RGB. Virtual Reality allows us to feel as though we have teleported to another world. New idioms of data visualization and Dimensionality Reduction algorithms are always being produced for us to better experience the world around us.

      We are constantly trying to enhance our 5 senses to go beyond our human limits. 10 years from now, these innovations, coupled with IoT gadgets, will act as extensions of who we are and help us experience our surroundings more profoundly.

      Emotional Intelligence

      Just as we enhance our 5 cognitive senses, so too do we enhance our ability to express ourselves and to understand those around us.

      Many times, we don’t even know what we want. We strive to connect with those around us in a specific way or consume a particular product, just so we could feel a very unique emotion that we fail to describe. We feel much more than just happiness, sadness, anger, anxiety or fear. Our emotions are a complex combinations of all of the above.

      With the innovations in neural mapping, we will better understand who we are as human beings and better understand the myriad emotional states that we can attain. Our complex emotional modes will be better understood as we perform unsupervised learning on brain waves and help find innovative ways to improve our emotional intelligence. This would include both understanding our own emotions and being more sensitive towards those around us.

      Perhaps we can unlock new emotions that we have never experienced before. In the right hands, AI can act as our extensions to help us form meaningful bonds with the people we value in our lives.

      Experience and Imagination

      The effect of AI on our experience and imagination would result from an aggregate of better cognitive abilities and emotional intelligence. The latest innovations in AI may help us unlock new cognitive experiences and emotional states.

      Let’s imagine that the modes of experience we have today is represented in space X. 10 years from now, let’s say that the modes of experience are represented in space Y. The space Y will be significantly bigger than space X. This futuristic space of Y may have access to new types of emotions other than our conventional happy, sad and mad. This new space of Y can even allow us to comprehend abstract thoughts that reflect what we wish to express more accurately.

      This new space of Y can actually unlock a new world of possibilities that lies beyond our current imagination. The people of the future will think, feel and experience the world at a much richer degree than we can today.

      Communication

      10 years ago, most of our communication were restricted to phones and emails. Today, we have access to video conferences, Virtual Reality and a wide array of applications on social media. As we enhance our cognitive abilities and emotional intelligence, we can express ourselves through idioms of far greater resolution and lower levels of abstractions.

      We already have students from the University of Florida achieving control of drones using nothing but the mind. We even have access to vibrating gaming consoles that take advantage of our sense of touch for making that Mario Kart game that much more realistic. 10 years from now, the way we communicate with each other will be much deeper and more expressive than today. If we are hopeful enough, we might even catch a glimpse of the holograms of Star Wars and telepathic communications of X-Men.

      Virtual Realities of today only limit us to our vision and sense of hearing. In the future, Virtual Realities might actually allow us to smell, taste and touch our virtual environment. Along with access to our 5 senses, our emotional reaction to certain situations might be fine-tuned and optimized with the power of AI. This might mean sharing the fear of our main characters on Paranormal Activity, feeling the heartbreak of Emma or being excited about the adventures of Pokemon. All this can be possible as we explore the theatrical arts of smart Virtual Reality consoles.

      Information Security

      AI allow us to unearth more unstructured data at higher velocity to generate valuable insight. However, the risk of those very sensitive data falling into the wrong hands will also escalate.

      Today, cybersecurity is a major concern on everyone’s mind. In fact, 2017 is the year the fingerprint got hacked. With the help of AI, information technology will get more sophisticated in order to protect the things we value in our lives.

      It is human nature to want to go beyond our limits and become something much more. Everyone wants to live longer healthy lives, experience more vividly and feel more deeply. Technology is simply a means to achieve that end.

      See other FICO posts on artificial intelligence.

      The post The Future of AI: Redefining How We Imagine appeared first on FICO.


                cyberpatching.com 199 GBP        
      Price: 199 GBP
      Traffic: --
      Domain Language: English
                Axe + Ressort Repère 4 57X2170 - 15,50 €         
      thumb
                Axe De Poignée De Porte 35007434 - 6,50 €         
      thumbAxe De Poignée De Porte 35007434
                Crochet de fermeture de porte - 16,50 €         
      thumbCrochet de fermeture de porte 09201470
                Crochet De Porte 00154074 - 10,50 €         
      thumbCrochet de porte pour Sèches-Linges
                Crochet de Porte avec Interrupteur 1113150120 - 27,20 €         
      thumbVerrouillage de la porte du LV
                Crochet de porte Electrolux 1366261004 - 11,50 €         
      thumbDimension: 23x8x33mm
                Crochet Porte 40004091 - 21,10 €         
      thumbCrochet du hublot de porte pour les seche-linges Candy Rosieres Hoover
                CROCHET PORTE GW - 25,90 €         
      thumbCROCHET PORTE GW
                Crochet Porte Isa 60vfr - 16,50 €         
      thumbCrochet pour ARISTON INDESIT MERLONI



                Doigt de contact 1250071006 - 5,20 €         
      thumbDoigt de verrou Electrolux 1250071006
                Your readers bewildered or require         
      The key to persuade your soon-to-be clients to your website is to overrun it beside the hottest artifact in the cyberspace present - facts. That can confidently be finished through article dedication.1. Know what kindly of message that your potential clients are looking for. This can aid you in direction your articles to the topics that will code the wants of your readers. Send study or questionnaires to your point of reference marketplace through your autoresponders all sometime in a spell to get their impulse. You can too drop by related forums, blogs, and nonfictional prose submissions sites to get shining message accepted wisdom.2. Check the at your disposal riches for your topics. Before you compose your articles, form sure that you have sufficient supplies to brand your smug realistic and fact-based. If the computer network doesn't give much, which is unbelievable to happen, you can holiday resort to conventional books, encyclopedias, TV, radio, or newspapers.Post ads:do men consider cheating / coffee-affair.co.uk / phone monitor and keyboard / voip phone conversation recorder / how is cell phone spy software installed / legality of tapping phones / homeschooling way cheating system / how to spy on someone using google earth / ecamm call recorder v2 3.14 macosx retail core / how to record phone calls on e63 / opera software for mobile phones / record phone conversation gmail / is teresa giudice husband having an affair / cellular spyware inc / mobile glucose monitoring / she's cheating on you lyrics / monitor computer best buy3. Be familiar. Give your articles a human cognizance by fashioning them clamour look-alike you are only just discussion to a pal. Avoid looking too stuffy or you will disaffect your readers. Be spur-of-the-moment and ask questions or section jokes whenever germane to put your readers at help.
                Marketing to Extremists: Waging War in Cyberspace        


      04/08/2017 Andrew Byers Social Media

      This article was originally published by the Small Wars Journal on 9 July 2017.

      Online, the Islamic State is a technologically savvy, sophisticated, and nimble organization that learns from its mistakes and from the actions of the Western intelligence services and NGOs that have sought to counter it. It is no secret that past and current efforts to reach potential terrorists before they can become radicalized and committed to a path of jihad and terrorism have proved inadequate. To use the language of online marketers, countering ISIS’s online activities will require quality content disseminated on a massive scale, with careful product placement. Placing counter-messaging products into platforms and forums that extremists frequent will increase the chances of potential terrorist recruits coming into contact with narratives outside of ISIS’ control.

      ISIS’s cyber efforts have paid off; the FBI told Congress in July 2016 that “the message of radicalization spreads faster than we imagined just a few years ago.”[i] The number of foreigners who have been inspired by the Islamic State’s online propaganda to travel to Syria and Iraq (or elsewhere) and participate in the fighting is unclear, but most estimates place the tally at more than 20,000. Others have been set on the path of radicalization by ISIS’s online propaganda and have become “lone wolf” attackers in the United States or in Europe.[ii] Demographically speaking, the people who ISIS is most interested in targeting for recruitment came of age in the twenty-first century as “digital natives”; they have lived their entire lives surrounded by ubiquitous online communications and have embraced it in technologically sophisticated ways.[iii] ISIS knows how to appeal to these potential jihadis. Reaching them with counter-messages will require a sophisticated and multi-faceted approach.

      America’s public and private sectors must commit the resources needed to carry out this counter-messaging, though we must understand that such an information war cannot be won in a short period of time, but rather, must be carried out resolutely and patiently, even in the absence of quantitative metrics of success. For example, how will we assess our effectiveness, when one measure of success is how many potential jihadis did not decide to carry out lone wolf attacks or travel to Syria? This is an entirely new and different kind of fight from any we have been engaged previously. Even without quantitative measures of effectiveness fully fleshed out, we can use scale, quality content, and product placement to improve current efforts to shape–and hopefully win–the online propaganda wars to come.

      Understanding Our Options

      In terms of quality counter-messaging content, the State Department–the lead U.S. agency in this fight—has already acknowledged its past failures in content production. Notably, it has acknowledged that it may not be the voice best-suited to convince Middle Eastern or Muslim recruits to turn away from the path of terrorism. The State Department’s Global Engagement Center has pivoted away from producing content, and instead now supports the efforts of localized “proxies,” thereby supporting other voices that understand the context, culture, and push/pull factors that resonate within Muslim communities.[iv] It is not only government entities involved in this struggle; various NGOs also participate in counter-jihad content creation, drawing upon former extremists, notable academics, and a multitude of languages.[v]

      The West’s efforts to date have mostly created a series of reactive, ineffective counter-narratives that potential jihadis dismiss. We advocate for precision messaging; for example, past efforts by State Department entities have mined public social media data to identify individuals who may be susceptible to extremism and then pay for YouTube ads that counter extremist messaging. But we don’t need to mine public data to put counter messaging into the world of potential recruits. The United States must become aggressive and proactive in its anti-Islamic State online activities: it must immediately move to hijack the group’s own narratives and create alternatives.

      When it comes to scale, the current efforts by the United States and its allies are merely a drop in the ocean of ISIS’s material. If ISIS posts nearly 100,000 messages each day, as the British House of Commons Defence Committee stated in 2015,[vi] then countering their content will take a significant amount of internet traffic or else we risk being drowned out. This component cannot be ignored or understated. Current counter-messaging efforts are not achieving enough volume to warrant a response by would-be extremists, let alone to spark an actual conversation or debate among extremists. If we have quality content and we know where to put it to reach potential recruits, we still cannot reach enough people without massively increasing the current volume of counter-messaging efforts.

      When it comes to proper product placement for the counter-messaging, the best way to decide where and how to reach recruits is by watching ISIS itself. ISIS has had to transition from various platforms throughout its years of recruitment, including Tumblr, Facebook, Twitter, and Telegram. ISIS’s supporters take an active role in finding new platforms, spreading propaganda, and shepherding others along to new sites and procedures. It is not uncommon for followers to post specific instructions on where to post or how to manipulate different platforms’ terms of service to remain undetected or prevent accounts from being shut down. As they communicate best practices to each other, they create a trail for analysts to follow and instructions for counter-messaging units in order to put counter content where recruits will see it, even if this sometimes results in informational “misfires.”

      The opportunities afforded by focusing our efforts on these approaches are manifold. If we are able to effectively erode the Islamic State’s ability to use propaganda to inspire self-directed attacks in the West, it would be forced to expend its resources and personnel on directed attacks in the West if it wishes to continue such operations. Sending Islamic State operatives into the West to carry out attacks there is a much more difficult and costly proposition, and one that is vulnerable to the West’s traditional strengths in intelligence and counterterrorism.

      A Starting Point

      We have compiled a list of some of ISIS’s known recruitment practices, along with specific recommendations for ways that counter-messaging organizations could take advantage of them. This list is not meant to be comprehensive or static, but rather to serve as a starting point that could be executed immediately and without excessive cost or effort.

      Keeping Followers as Twitter/Telegram Accounts are Shut Down: As Twitter has improved its process of shutting down Islamic State accounts, its supporters have devised strategies to maintain their network of followers from one account to their next. The most popular method is to simply add a number to their Twitter username and then to increase that number each time they are shut down and begin a new account. Thus, for example, followers of @Muslimah6 could find her on her new account @Muslimah7 after Twitter shut down her account. This method of maintaining followers has been adapted for Telegram as well. The Islamic State’s unofficial news channel “Khilafah News” is left public, meaning that new users can always find it. But this also allows Telegram to shut it down at any time. The administrators of Khilafah News add a number to the end of their channel’s invitation link and increase this number every time the previous channel is shut down by Telegram. It is important to remember that Islamic State recruiters want to be found in order to effectively recruit new members. This nomenclature pattern allows them to do just that. But more importantly, it creates an opportunity for those creating alternative narratives to put their content on a Telegram channel or a Twitter account that they know Islamic State supporters will follow. New iterations of the Khilafah News channel could be created, knowing that once Telegram shuts down the last Khilafah News channel Islamic State supporters would follow the new fake channel, believing it to be authentic Islamic State channels and increasing the likelihood that a recruit would be exposed to counter-messaging.

      The Islamic State’s Hashtags: Since it began disseminating propaganda on social media, the Islamic State has embraced the power of hashtags. In 2014 it famously hijacked World Cup hashtags in English and Arabic in order to spread its propaganda and shock social media users who may not have been previously exposed to such messages. The group has also advertised hashtags for supporters to use when tagging and finding new propaganda. Just as the Islamic State hijacks popular hashtags, counter-messaging teams can utilize the group’s own hashtags when posting content on social media. This will put alternative narratives in the same social media conversation as the Islamic State’s propaganda and will increase the chances that a recruit would receive facts about the group. The U.S. government has begun to take tentative steps in this direction, but such efforts could be vastly expanded.

      Promotion and Marketing: The Islamic State disseminates small propaganda pieces daily, but its larger propaganda pieces take more time. In order to build hype, the Islamic State typically advertises with multi-lingual “trailers” for large upcoming pieces. Dissemination of the pieces generally occur days later, but there is no set schedule. Upon dissemination, the group posts its videos on YouTube, social media, and various self-publishing sites. Teams that produce content to counter the Islamic State must have videos ready for dissemination at all times. Then as new Islamic State’s trailers begin to appear on social media, the counter-content can be disseminated first under the same name as the propaganda that the Islamic State is advertising and it must be placed on all of the sites that the group uses. Recruits will be checking frequently for the release and the Islamic State will actually be advertising and promoting pieces that could pull recruits away. This would effectively drown out the Islamic State’s content while increasing the likelihood that recruits see alternative narratives.

      Take Advantage of Platform Restrictions and Features:Not all of the Islamic State’s content is violent and grotesque; it produces some content that does not show any violent images or videos whatsoever. This allows the content to be played on news programs and for it be posted on YouTube. Knowing that the Islamic State works to keep its content available on major publishing sites, counter-narrative agencies must do the same. If a recruit searches for the name of a popular propaganda video on YouTube or an equivalent site, counter-content should appear with the same name. Video creators can even pay to promote their content so that it tops a search list. A greater understanding for how various platforms choose the order of their search results would help counter content receive just as many hits, if not more, than Islamic State propaganda.

      Maintaining YouTube Channels: The Islamic State has a carefully structured propaganda structure. It has central marketing agencies that run video content, radio broadcasts, and written publications. These “federal” programs are represented within each wilayat, or province, as well. Each wilayat produces its own multilingual videos and publications that are often featured in publications from the central agencies. Islamic State supporters have advanced this model even further. There are several known propaganda groups that support the Islamic State but are not run by official Islamic State employees. Supporters make their own content and publish it on YouTube, Twitter, Telegram, and various other social and self-publishing sites. Like the Islamic State’s agencies, they have their own calligraphic logos and follow predictable but evolving patterns. “Al-Haqq” is one such Islamic State-affiliated group that runs its own Telegram channels and YouTube accounts. It would be simple to create a YouTube account called “Al-Haqq,” utilizing the group’s logo and publishing content that appears to be Islamic State videos. In reality, these videos could contain counter-messaging content with the same names as known extremist productions.

      In adopting these methods, even potential jihadis who are adept at hiding their identities or degree of radicalization would come into contact with alternative narratives that may cause them to question the narratives ISIS feeds to its supporters.  It is important for analysts who study ISIS’s dissemination of propaganda to remain in constant contact with those working to counter ISIS’s messaging, helping the latter to evolve along with ISIS and other extremist groups. While we are currently scrambling to combat ISIS’s propaganda campaigns in the cyber domain, learning to develop the necessary approaches now will allow us to excel in future cyber wars with other extremist groups. Without a new strategy for winning the information war, the West will always be reactive and on the defensive as it struggles to compete with the Islamic State for the hearts and minds of Muslims around the world. Most importantly, if we can create an adaptive and empowered cyber effort now, we will be better equipped for the terrorist groups that will learn from and advance the work that the Islamic State is doing now. Future jihadi organizations that come after the Islamic State can be expected to be even savvier users of social media and similar communications venues. Unless the West learns to use social media with the same level of sophistication, it will continue to lose the information war and fall further behind.

      End Notes

      [i] Michael Steinbach, executive assistant director for the FBI’s National Security Branch, testimony before the Committee on Homeland Security and Governmental Affairs Permanent Subcommittee on Investigations, United States Senate, July 6, 2016, https://www.hsgac.senate.gov/subcommittees/investigations/hearings/isis-online-countering-terrorist-radicalization-and-recruitment-on-the-internet_social-media.

      [ii] Daniel Byman, “How to Hunt a Lone Wolf: Countering Terrorists Who Act on Their Own,” Foreign Affairs, Vol. 96, No. 2 (March/April 2017): 96-105.

      [iii] Marc Prensky,” Digital Natives, Digital Immigrants,” On the Horizon vol. 9, no. 5 (October 2001): 1-6.

      [iv] Joby Warrick, “How a U.S. team uses Facebook, guerrilla marketing to peel off potential ISIS recruits,” Washington Post, February 6, 2017,https://www.washingtonpost.com/world/national-security/bait-and-flip-us-team-uses-facebook-guerrilla-marketing-to-peel-off-potential-isis-recruits/2017/02/03/431e19ba-e4e4-11e6-a547-5fb9411d332c_story.html.

      [v] Representative NGOs include the Counter Extremism Project, Families Against Terrorism and Extremism, and the Institute for Strategic Dialogue. For examples of their work, see “Counter Extremism Project Unveils Technology to Combat Online Extremism,” Counter Extremism Project, June 17, 2016,https://www.counterextremism.com/press/counter-extremism-project-unveils-technology-combat-online-extremism; “Watch & Share,” FATE, http://www.findfate.org/en/watch-share/; Jonathan Russell, “Helping Families to Safeguard from Extremism,” FATE, http://www.findfate.org/en/helping-families-to-safeguard-from-extremism/; “One to One Online Interventions: A Pilot CVE Methodology,” Institute for Strategic Dialogue, April 2016, http://www.strategicdialogue.org/wp-content/uploads/2016/04/One2One_Web_v9.pdf.

      [vi] UK Parliament, “The Situation in Iraq and Syria and the Response to al-Dawla al-Islamiya fi al-Iraq al-Sham (DAESH),” February 5, 2015,https://www.publications.parliament.uk/pa/cm201415/cmselect/cmdfence/690/69008.htm.

      About the Authors

      Andrew Byers is a visiting assistant professor of history at Duke University who has served as an intelligence and counterterrorism analyst and is a co-founder of the Counter Extremism Network.

      Tara Mooney is a counter-violent-extremism analyst and co-founder of Talon Intelligence. She is also a co-founder of the Counter Extremism Network


                Uncovering Molecular Mysteries        
      Researchers use supercomputer to create 1 million-atom model of protein synthesis

      ProthrombinaseProthrombinase is a three-protein complex that catalyzes the conversion of prothrombin to thrombin, which is a critical step in the sequence of blood clotting called the coagulation cascade. Researchers have developed significant theoretical evidence of how prothrombinase binds to cellular membranes and jumpstarts the catalysis process that generates thrombin. However, the computing power has previously not existed to actually model the reaction and test how different variables may impact the process.

      Thanks to a grant from the Ohio Supercomputing Center, a research team from Cleveland State University is developing the first full scale model of prothrombinase catalysis which will provide new insights on how blood clotting actually works in the body. Including water molecules and counter-ions, the entire model consists of approximately 1.3 million atoms.

      “Even as late as a year ago, the computing power to analyze this large of a model did not exist,” notes Will Martin, a doctoral student in chemistry at CSU who is leading the project. “We are really operating at the cutting edge of biochemistry and will be able to provide new knowledge that could improve drug development and treatments for numerous diseases.”

      Martin is working with David W. Ball, chair of the Department of Chemistry at CSU, and Michael Kalafatis, professor of chemistry and a member of CSU’s Center for Gene Regulation in Health and Disease. He is utilizing experimental data generated by Kalafatis on how prothrombinase binding causes the catalysis that leads to the creation of thrombin. Errors in this process, either producing too much or too little thrombin, are factors in a host of blood diseases and disorders. Martin will also test the impact of different gene mutations on the process to see how different variables impact catalysis and the clotting process as a whole.

      “By being able to model the system as it actually occurs, we can test and improve our theoretical analysis and better assess potential treatments designed to increase or decrease thrombin production, based on the needs of a patient,” Ball adds. “This is also a fabulous opportunity for our students to get real world expertise while making a major contribution to chemistry and medicine.”

      Established in 1987, the Ohio Supercomputer Center partners with Ohio universities and industries to enhance discovery, education and product development. It provides researchers with high performance computing, advanced cyberinfrastructure, and computational science education services. The CSU team received a grant of 150,000 units, the equivalent of 150,000 hours of supercomputing time, for the project. It is the largest OSC award ever received by the University.


                Chinese quantum satellite sends 'unbreakable' code        

      Chinese quantum satellite sends 'unbreakable' codeChina has sent an "unbreakable" code from a satellite to the Earth, marking the first time space-to-ground quantum key distribution technology has been realized, state media said on Thursday. China launched the world's first quantum satellite last August, to help establish "hack proof" communications, a development the Pentagon has called a "notable advance". The official Xinhua news agency said the latest experiment was published in the journal Nature on Thursday, where reviewers called it a "milestone".



                presentation alex        
      bonjour je m' appelle Alexandre Thomas on le donner comme pseudo Alex (pas tres compliquer a retenir )^^ j'ai 22 ans je suis boulanger patissier . j'habite A Plescop a coté de Vannes je suis un pratiquant d'airsoft depuis 2ans a peu pret .je joue actuellement avec 2 ou 3 repliques . Ma première replique est un m4a1 de chez colt (cybergun ) sinon j'ai un Lr300 de chez a&k et ma petites derniere un m&p15t de chez king arms. mon pistolet est un sig sauer five X je suis entierement ...
                New Grant Will Fund Microgrid Planning Study        

      Cleveland Foundation to fund CSU, CWRU, County and City collaboration

      Microgrid

      America is changing its energy delivery systems to become cleaner and more secure, and Cleveland State University will be leading a Cleveland Foundation-funded study to look at how the City of Cleveland and Cuyahoga County might benefit from this shift. The focus of the initiative will be to examine how microgrids might enable economic development in downtown Cleveland.

      “The Cleveland Foundation has been a leader in bringing partners together to think differently around energy and how to use our assets and local talent to innovate solutions,” said Ronn Richard, president and CEO of the Cleveland Foundation. “This is another example of collaboration with local partners to advance clean energy as a tool for economic growth and development. Given that no other community has done this to date, this study will help to tease out the possibilities, interest levels, possible costs and impact for our community.”

      This effort is timely, according to Andrew Thomas who administers the Energy Policy Center for CSU’s Levin College of Urban Affairs, because microgrids will play an increasingly important role in smart city planning.

      “Society is moving away from the traditional 20th century command and control electricity generation and delivery system toward a new model that uses distributed generation, clean energy and smart grids focused around specific communities and their energy needs,” says Thomas, who will serve as the project leader for the study. “Cleveland, Ohio is positioned to leverage microgrid technology into business growth because of its access to cost-competitive natural gas, the existence of district energy systems and the anticipated large-scale development of offshore wind resources. Armond Budish, county executive of Cuyahoga County, encouraged us to start this planning study as he saw a need for forward thinking on grid resiliency and its economic development benefit.”

      "We think the next, great work in resiliency for local governments will be around electric, heating, cooling and cyber-secure microgrids that can be protected from severe weather, aging infrastructure problems and intentional and malicious acts of others,” adds Budish. “This grant will help us put together a lot of smart people locally who can help our region drive these developments."

      “I believe microgrids may provide the potential to be a sustainable solution to help Cleveland meet some key goals in the Climate Action Plan,” notes Frank G. Jackson, mayor of Cleveland.

      “The City of Cleveland is interested in energy solutions that improve the resiliency of our grid, use cleaner sources of energy, and provide price stability,” adds Matt Gray, chief of sustainability for the city. 

      The Energy Policy Center and Case Western Reserve University’s Great Lakes Energy Institute will collaborate on the project, supported by system engineers from the International Council on Systems Engineering, along with Cuyahoga County, the City of Cleveland and Cleveland-based district energy utilities. The study will seek to understand the likely cost of development, the resulting costs for ratepayers, and the likely interest in participation by businesses, non-profit institutions and residents. While the study will evaluate the potential for microgrid development in Downtown Cleveland, it will also consider other places in Cleveland that have district utilities, such as University Circle.

      A microgrid is a contained energy system capable of balancing captive supply and demand resources to maintain reliability. It is defined by its function and not its size, and could include one building connected to a solar array or hundreds of buildings connected to numerous energy generation sources. The technology can incorporate multiple distributed energy generation technologies to address changing weather conditions and to meet fluctuating demand, making it more efficient and flexible than traditional systems.

      "Microgrids are an essential ingredient for a smart and connected city,” adds Alexis Abramson, director of the Great Lakes Energy Institute and professor of mechanical and aerospace engineering at CWRU. “They enable a robust, optimized, secure and resilient infrastructure, and Cleveland is well-positioned to integrate microgrids into our urban environment."

      ###


                Comment on Citizen Science: Creating a culture of curiosity by Citizen CyberScience – New Directions and Opportunities for Human Computation | Learning Sciences of Change        
      […] Read also: Citizen Science: Creating a Culture of Curiosity […]
                Enterprises lack resources to respond to targeted attacks        
      The number one priority for security executives is achieving complete breach intolerance according to a new study from endpoint security company Endgame in conjunction with Forrester Research. The study of over 150 security decision makers in large US enterprises also finds 64 percent of executives are concerned that the next breach or attack they experience could be severe, a fear that is heightened by the fact that decision makers don’t know the system or the vector that will be attacked next. Security teams are also being hamstrung by complexity, 71 percent of respondents are using five or more technologies in… [Continue Reading]
                Managed service providers face cyber security talent shortage        
      Many businesses rely on outsourcing some or all of their IT to managed service providers (MSPs), but a new study from Kaspersky Lab reveals that two out of three MSPs are suffering from a shortage of qualified cyber security staff. Among the findings are that cyber security is no longer seen as a separate or optional function among MSPs with 92 percent now including it as part of their portfolio of services. More than half (51 percent) cite security as essential to their customers' operational continuity in the next three to five years. Cyber security is expected to boost MSP… [Continue Reading]
                National Cybersecurity Awareness Month        

      Criminals use the internet to threaten national security and intrude on your privacy, but there’s hardening resistance from the federal government as well as the nonprofit and private sector.

      The post National Cybersecurity Awareness Month appeared first on Weld: Birmingham's Newspaper.


                Neuropunk Special for Cybernetic mixed by Bes        
      none
                Laser-Projected Graffiti Ads on Buildings        
      In yet another example of cyberpunk fiction turned to reality, the Graffiti Research Lab has assembled a mobile unit that can project messages (“graffiti”) onto the sides of any large structure using a computer, laser projector, and a bicycle-powered generator. They recently tooled around Barcelona doing this up until the police apparently ticketed them and […]
                You're So Vein        
      I have several blog sites all over the interwebal universe. A post here, one there, and then they all would sit in cyberspace, gathering cosmic dust, waiting for me to come back and attack the keys of my computer in my erratic yet zippy hunt-and-peck method. This is the one...the blog with which I'll continue recounting my life experiences. And, geeminy, have there have been plenty of experiences since last I posted. In February. Where does the time go?

      Let's start with a post about the crappy stuff and get it out of the way. You know...like getting the bad news first so the good news is even better. And then I'll be able to post later on the more positive, happy things going on around me after I get this out of my system.

      The award for Major Suckiness goes to the pulmonary embolism that landed me in the hospital very recently. Just when you think things are stable and that you own your health, WHAM! And I ignored the silly thing. For three days, I had the most awful stitch-like pain on inhaling even a tiny breath. We've all had them...temporary "catches" of something inside us around our air bags (lungs) that break free quickly. Except this wasn't going away. I would lie in my bed at night and try to get comfortable, try to find a position in which I could lie where I could just breathe. You simply can't appreciate a single, deep, cleansing breath...like the ones you use in meditation (you can imagine how that went) until you can't take one. And I'd panic. And cry. I was all alone (by choice), except for my cat who did everything in her power to comfort me, bless her. I'd think about calling someone to chat with, to try and distract my mind from the vice around my lung, but who wants their phone to ring at three o'clock in the morning? Eventually, I'd find I could curl up tightly and kind of rock myself to sleep for an hour or so. And I'd get up and try to live my life normally, accepting that I had this pain and trying to let it go. Trouble is, it wouldn't let go of me.

      Ya see, I had this feeling that I was having an allergic reaction to a new medication my doctor prescribed for migraines and when it wasn't helping, he doubled the dose. When I began having the pain, I googled this "wonder drug", and sure enough...it contains a small amount of sulfa. I attributed the pain to what isn't a real allergic reaction to sulfa, but a severe and serious side effect that literally burns my muscles and makes them contract involuntarily. It knocked me out of commission once for six months. I figured that, because I stopped taking it, the pain would eventually decrease.

      Try riding a bike to the post office or grocery store. I did. I lived my life and did my thing and still went to watch the eagles down the road. I ignored the pain that refused to go away until...well...I just couldn't ignore it anymore. I asked my wonderful blessing of a neighbor if she would be willing to take me to the emergency room. Luckily, I didn't have to wait long to be treated. Once I informed the intake person that I'd had a PE in the past, it wasn't long before I was on a gurney hooked up to an IV. Ahhh...sweet relief of morphine and valium rushing through my veins, finally giving me a break from the panic and pain of not being able to get that deep breath. Then came all those tests: EKG, Doppler ultrasound, X-Rays, MRIs. Then came the diagnosis...yep, it was an embolism. I started to cry. I have tried so hard for so long to stay out of this medical loop. One doctor sending me to another, and then to another, and before I know it, I'm following all these directions and taking all these pills, and just getting lost in all of it. I broke that cycle when I left South Carolina and began my metamorphosis.

      No, I don't believe I'm immortal or invincible. I realize that my health is still sorely compromised by lupus and the ravages it's inflicted on my organs and circulatory system. But I learned not to let it turn me into...a patient, a sick woman, a fragile, frail being. That's not who I am! For a very long time, though, it was. And that's why this hit me so hard. It took me completely by surprise at a time in my life when I was enjoying another metamorphosis separate from my own, the arrival of spring after a very long and difficult winter, physically and financially, that just went on and on and on. Now the rhodies are blooming, the cherry blossoms are showering their petals everywhere, and bees are already finding those apple blossoms and doing their map dance to show their fellow bees where a plethora of pollen can be found. The smell of lilacs is in the air, everywhere. The snow is retreating from the not-so-distant hills; the trees, having shrugged off the winter, are twirling in the shadow and light that you can't see when the snow blankets those hills. I was ramping up to ride my bike for miles and miles so I could accomplish my goal of being able to ride 20 miles in a day by the end of the summer. And now, I'm "allowed" to ride short distances as long as I don't exert myself.

      Believe it or not, Little Miss Pollyanna Me even sees the blessing here. For years, I've been on and off (mostly off) coumadin, a blood thinner used in rat poison (they die of internal bleeding...how sad is that?). I've been on doses so high that it required me to wear a MedicAlert bracelet to announce to one and all that I'm a clotty little bugger. This was a true wake-up call, with bells and whistles and gongs telling me that, damn it, I KNOW I have things to do. I finally know who I am and I'm learning what life is truly all about, and I'm gonna blow it if I don't continue to take rat poison for the rest of my life. Okay, I get it. I surrender. Ooh...since I'm in the Stream-of-Consciousness zone, I can say that, when I typed those words, "I surrender", I got a giddy little goosebumply feeling. I give in. I accept. And then I go on. I gather myself up and try to play catch up to where I felt I was supposed to be by now. However, I know it's going to take a little while to get there. The Something has spoken, telling me to slow down, that perhaps I was going just a little faster than I should.
      And once again, I'll have a collection of medicine bottles of various doses of pretty little colored pills lined up on a shelf. I concede to having blood drawn two or three times a week because the vitamin K in the bean sprouts and broccoli I consume in mass quantities alters the efficacy and daily dosage of the coumadin. Being a vegetarian creates all kinds of additional problems for those with clotting disorders. My doctor asked me while I was in the hospital, "How devoted to your being a vegetarian are you?" My neighbor bought me a spider catcher so I can catch those creepy little monsters that scare the begeebers out of me and let them go outside of my flat, my space. I have no right to take a life deliberately, with intention, whether by smacking a fly on the wall or eating a hamburger. All life is sacred. And in that vein (pun intended), not taking my medication is akin to taking my own life slowly. Or suddenly. The clots are still there, though a bit smaller. If I'd waited one more day to be seen, to start treatment to reduce the size of the clots damaging my lung and leg, and possibly veins in other places, I wouldn't be here to type this stream-of-consciousness tome. I suppose I could have just written, "I haven't posted in a while. I had a blood clot in my lung that scared me into taking medicine so I can continue riding my bike and enjoying the beauty of this world and typing long blog posts."

      Nah. That's not my style.


                Loot! The Gen Con 2012 Report        
      For some reason I posted this to Facebook last year, but it didn't make it to the blog. 





      LOOT!

      1. Cyberpunk Chrome rulebook (won at Basic D&D event)
      2. Paranoia Big Book of Bots (bought for $1 as they were closing up)
      3. Starfleet Academy fiction (won at Paranoia Trek event)
      4. Kevin's d6 dice for Shadowrun
      5. Dust Tactics Terrain Tile Set
      6. Chessex Megamat, factory second (grid not aligned to edges)
      7. Shadowrun T-shirt (we each got one)
      8. Shadowrun: Runner's Black Book (signed by author)
      9. Shadowrun: Core Rulebook
      10. Shadowrun: Aresenal
      11. Shadowrun: Street Magic
      A. Gen Con 2012 t-shirts (Desi got hers, mine had to be ordered.)
      B. "Cupcakes: They're what our brains taste like to zombies!" t-shirt for Desi
      C. Cyberpunk hat for Desi
      D. Dust Tactics expansions: Luther medium Panzer walker, Hot Dog medium assault walker, Laser Grenadiers squad, Red Devils squad.
      E. Monsterpocalypse boosters (monsters and units, 4 each, I Chomp NY and Rise)
      F. Battletech reference tables assortment
      G. Hirst Arts molds (10)
      H. Shadowrunner's Toolkit
      I. Call of Cthulu Roleplaying Game (published 1999; Desi won for best roleplaying)
      J. Call of Cthulu LCG (living card game)
      K. Dice from a random pitcher scoop (388 dice)
      L. "True Dungeon Survivor" pin
      M. Red, small, d6's for Shadowrun
      N. Cthulu LCG expansion packs (2)
      O. Pathfinder Minitures Black Dragon (the only thing I got at the Paizo booth)
      P. Commemorative Gen Con 2012 dice set (Desi had to run to get them, two sets)
      Q. Shadowrun dice for Desi
      R. D&D Minis assortment from Cool Stuff Inc.
      S. Industrial strength superglue
      T. Dice bags for Desi (one for Shadowrun d6's, one for general dice)
      U. Wrap around skirt for Desi
      V. Rose tinted round glasses for Kevin's cyberpunk costume
      W. Battletech minis from Iron Wind Metals
      X. Shadowrun Doc Wagon T-shirt for Desi
      Y. True Dungeon tokens
      Z. Battletech terrain tiles, Cities and Roads & Lakes and Rivers

      Facebook Post

      Got back from Gen Con 2012 yesterday and today shot the picture of the treasure hoard we hauled home. Gen Con was a lot of fun this year, in spite of Desi having and giving me a cold!

      In summary: we survived the Wed. event/day I planned relatively unscathed, played the Shadowrun intro (great!), then "You Too Can Cathulu" (Desi won book for best roleplaying), Paranoia Trek XI: Reboot to the Head! (sang Journey song sock puppet karaoke as Lt. Warf), Dust Tactics (learned a bit), Pathfinder Society Special (kinda sucked), Vampire the Masquerade (Desi walked out, almost wished I had), Basic D&D in a monk brewery taken over by frog-people (fun!), True Dungeon (a lot of fun, but too expensive), and on our last day we went back for some more Shadowrun. It's our new favorite game. The GM we had was just awesome.

      Glad we're home. Both rested up today and good to go. Thanks to Liz McKenna and Susan Faragher Bannon for their help with the pets while we were gone.

      Hirst Arts

      53, 60, 65, 66, 202, 250, 270, 300, 320, 321

      Dice scoop

      d20: 114
      d12: 50
      d10: 115 (1/10:96/18)
      d8: 35
      d6: 64
      d4: 10


      D&D Minis

      Fomorian
      Taer x3
      Werebear
      Protectar
      Standard bearer
      Medium Silver Deagon
      Dire ape
      Agent Cacalry
      Bullywug Thug
      Choker
      Crucian
      Guard of Mithral Hall
      Displacer Serpent

      Battletech

      Chevalier Light Tank
      Davion Infantry
      Innersphere Battle Armor
      Madcat II
      Night Wolf Mech
      Dragon Fire
      CPLT-C4 Catapult
      Uziel Mech
      Rommel/Patton Tank
      KGC-000 King Crab
      Condor Hvy Hover Tank
                untuk menangkal situs porno        

      Untuk menangkal situs porno tidaklah sukar. Secara umum ada dua (2) teknik menangkal situs porno, yaitu:
      • Memasang filter di PC pengguna.
      • Memasang filter di server yang tersambung ke Internet.

      Teknik yang pertama, memasang filter pada PC pengguna, biasanya dilakukan oleh para orang tua di PC di rumah agar anak-anak tidak melakukan surfing ke situs yang tidak di inginkan. Daftar lengkap filter maupun browser yang cocok untuk anak untuk aplikasi rumah tersebut dapat dilihat pada
      http://www.yahooligans.com ? parent’s guide ? browser’s for kids.
      http://www.yahooligans.com ? parent’s guide ? blocking and filtering.

      Beberapa filter yang cukup terkenal seperti
      Net Nanny, http://www.netnanny.com/
      I Way Patrol, http://www.iwaypatrol.com/
      Dll…

      Tentunya teknik memfilter seperti ini hanya dapat dilakukan bagi orang tua di rumah kepada anak-nya yang belum begitu tahu Internet.Bagi sekolah yang terdapat fasilitas internet, tentunya teknik-teknik di atas sulit di terapkan. Cara paling effisien untuk menangkal situs porno adalah dengan memasang filter pada server proxy yang digunakan di WARNET / di kantor yang digunakan mengakses Internet secara bersama-sama dari sebuah Local Area Network (LAN).Teknik ke dua (2), memasang filter situs porno tidaklah sukar. Beberapa software komersial untuk melakukan filter konten, antara lain adalah:

      http://www.cyberpatrol.com
      http://www.websense.com
      http://www.languard.com
      http://www.n2h2.com
      http://www.rulespace.com
      http://www.surfcontrol.com
      http://www.xdetect.com

      Mungkin yang justru paling sukar adalah memperoleh daftar lengkap situs-situs yang perlu di blokir. Daftar tersebut diperlukan agar filter tahu situs mana saja yang perlu di blokir. Daftar ratusan ribu situs yang perlu di blokir dapat di ambil secara gratis, antara lain di:

      http://www.squidguard.org/blacklist/
      ftp://ftp.univ-tlse1.fr/pub/reseau/cache/squidguard_contrib/adult.tar.gz
      ftp://ftp.univ-tlse1.fr/pub/reseau/cache/squidguard_contrib/publicite.tar.gz

      bagi sekolah atu perkantoran, alternatif open source (Linux) mungkin menjadi menarik karena tidak membajak software. Pada Linux, salah satu software proxy yang paling populer adalah squid (http://www.squid-cache.org) yang biasanya dapat di install sekaligus bersamaan dengan instalasi Linux (baik Mandrake maupun RedHat).

      Untuk melakukan proses filtering pada squid tidaklah sukar, kita cukup menambahkan beberapa kalimat pada file /etc/squid/squid.conf. Misalnya

      acl sex url_regex "/etc/squid/sex"
      acl notsex url_regex "/etc/squid/notsex"
      http_access allow notsex
      http_access deny sex

      buatlah file /etc/squid/sex
      /etc/squid/notsex

      contoh isi /etc/squid/notsex:
      .*.msexchange.*
      .*.msexcel.*
      .*freetown.*
      .*geek-girls.*
      .*scsext.*

      contoh isi /etc/squid/sex:
      .*.(praline|eroticworld|orion).de
      .*.(theorgy|penthousemag|playboy|1stsex|lolita|sexpix|sexshop).*

      www.indonona.com
      www.exoticazza.com
      www.dewasex.com
      www.extrajos.com
      www.bopekindo.com
      www.sanggrahan.org
      www.vicidi.com
      www.17tahun.com
      www.ceritaseru.org
      www.ceritapanas.com

      untuk memasukan daftar blacklist yang di peroleh dari squidguard dll, dapat dimasukan dengan mudah ke daftar di atas tampak di bawah ini adalah daftar Access Control List (ACL) di /etc/squid/squid.conf yang telah saya buat di server saya di rumah, yaitu:

      acl sex url_regex "
      /etc/squid/sex"
      acl notsex url_regex "
      /etc/squid/notsex"
      acl aggressive url_regex "
      /etc/squid/blacklists/aggressive/urls"
      acl drugs url_regex "
      /etc/squid/blacklists/drugs/urls"
      acl porn url_regex "
      /etc/squid/blacklists/porn/urls"
      acl ads url_regex "
      /etc/squid/blacklists/ads/urls"
      acl audio-video url_regex "
      /etc/squid/blacklists/audio-video/urls"
      acl gambling url_regex "
      /etc/squid/blacklists/gambling/urls"
      acl warez url_regex "
      /etc/squid/blacklists/warez/urls"
      acl adult url_regex "
      /etc/squid/adult/urls"
      acl dom_adult dstdomain "
      /etc/squid/adult/domains"
      acl dom_aggressive dstdomain "
      /etc/squid/blacklists/aggressive/domains"
      acl dom_drugs dstdomain "
      /etc/squid/blacklists/drugs/domains"
      acl dom_porn dstdomain "
      /etc/squid/blacklists/porn/domains"
      acl dom_violence dstdomain "
      /etc/squid/blacklists/violence/domains"
      acl dom_ads dstdomain "
      ;/etc/squid/blacklists/ads/domains"
      acl dom_audio-video dstdomain "
      /etc/squid/blacklists/audio-video/domains"
      acl dom_gambling dstdomain "
      /etc/squid/blacklists/gambling/domains"
      acl dom_proxy dstdomain "
      /etc/squid/blacklists/proxy/domains"
      acl dom_warez dstdomain "
      /etc/squid/blacklists/warez/domains"

      http_access deny sex
      http_access deny adult
      http_access deny aggressive
      http_access deny drugs
      http_access deny porn
      http_access deny ads
      http_access deny audio-video
      http_access deny gambling
      http_access deny warezhttp_access deny dom_adult
      http_access deny dom_aggressive
      http_access deny dom_drugs
      http_access deny dom_porn
      http_access deny dom_violence
      http_access deny dom_ads
      http_access deny dom_audio-video
      http_access deny dom_gambling
      http_access deny dom_proxy
      http_access deny dom_warez

      Dengan cara di atas, saya tidak hanya memblokir situs porno tapi juga situs yang berkaitan dengan drug, kekerasan, perjudian dll. Semua data ada pada file blacklist dari www.squidguard.org.

      http://oke.or.id/2006/12/teknik-menangkal-situs-porno-dengan-squid-proxy/

      Block Situs di Mikrotik Lewat Winbox


      1.Buka winbox yang berada pada desktop.

      2. Klik tando ( … ) atau isi alamat Mikrotik pada kolom Connect To:

      3. Maka akan muncul gambar seperti di bawah ini, kemudian pilih salah satu.

      4. Setelah itu isi Username dan Passwort Mikrotik

      5. Kemudian klik tanda connect.

      6. Dan akan terbuka jendela Mikrotik seoerti gambar di bawah ini.

      7. Untuk block situs klik menu IP pilih Web Proxy

      8. Kemudian Setting Web Proxy dengan mengeklik tombol Setting.

      9. Maka akan muncul jendela seperti gambar di bawah ini.
      Setting Web Proxy sepeti gambar di bawah ini, kemudian di klik tombol OK.

      10. Sekarang kita mulai buat settingan website yang akan di block.Klik tanda ( + )
      Maka akan muncul jendela, dan kemudia setting seperti gambar di bawah ini.

      11. Kemudian klik OK, maka akan muncul catatan pada jendela Web Proxy.

      12. Coba cek settingan tersebut dengan mengetikan kata “porno” pada google.

      13. Dan kemudian enter, jika muncul tampilan seperti gambar di bawah ini maka settingan block situs Kamu berhasil.

      http://www.tentang-komputer.co.cc/2010/01/blok-situs-porno-menggunakan-web-proxy.html
      Diposkan oleh Diandra Ariesalva Blogs di 10:39 0 komentar
      Reaksi: 

      Kejahatan dunia maya (Inggris: cybercrime) adalah istilah yang mengacu kepada aktivitas kejahatan dengan komputer atau jaringan komputer menjadi alat, sasaran atau tempat terjadinya kejahatan. Termasuk ke dalam kejahatan dunia maya antara lain adalah penipuan lelang secara online, pemalsuan cek, penipuan kartu kredit/carding, confidence fraud, penipuan identitas, pornografi anak, dll.

      Walaupun kejahatan dunia maya atau cybercrime umumnya mengacu kepada aktivitas kejahatan dengan komputer atau jaringan komputer sebagai unsur utamanya, istilah ini juga digunakan untuk kegiatan kejahatan tradisional di mana komputer atau jaringan komputer digunakan untuk mempermudah atau memungkinkan kejahatan itu terjadi.

      Contoh kejahatan dunia maya di mana komputer sebagai alat adalah spamming dan kejahatan terhadap hak cipta dan kekayaan intelektual. Contoh kejahatan dunia maya di mana komputer sebagai sasarannya adalah akses ilegal (mengelabui kontrol akses), malware dan serangan DoS. Contoh kejahatan dunia maya di mana komputer sebagai tempatnya adalah penipuan identitas. Sedangkan contoh kejahatan tradisional dengan komputer sebagai alatnya adalah pornografi anak dan judi online.

      http://id.wikipedia.org/wiki/Kejahatan_dunia_maya



      Pada pemilu 2004 lalu, ada sebuah kasus yang cukup mengegerkan dan memukul telak KPU sebagai institusi penyelenggara Pemilu. Tepatnya pada 17 April 2004 situs KPU diacak-acak oleh seseorang dimana nama-nama partai peserta pemilu diganti menjadi lucu-lucu namun data perolehan suara tidak dirubah. Pelaku pembobolan situs KPU ini dilakukan oleh seorang pemuda berumur 25 tahun bernama Dani Firmansyah, seorang mahasiswa Universitas Muhammadiyah Yogyakarta jurusan Hubungan Internasional.

      Pihak Kepolisian pada awalnya kesulitan untuk melacak keberadaan pelaku terlebih kasus seperti ini adalah barang baru bagi Kepolisian. Pada awal penyelidikan Polisi sempat terkecoh karena pelaku membelokan alamat internet atau internet protocol (IP address) ke Thailand namun dengan usaha yang gigih, polisi berhasil meringkus tersangka ini setelah bekerjasama dengan beberapa pihak seperti Asosiasi Penyelenggara jasa Internet Indonesia (APJII) dan pihak penyedia jasa koneksi internet (ISP/Internet Service Provider).

      Belakangan diketahui motif tersangka adalah untuk menunjukkan bahwa kinerja KPU sangat buruk terutama di bidang Teknologi Informasi, namun itu tidak bisa dibenarkan dan pelaku tetap diproses sesuai hukum yang berlaku.

                USCYBERCOM’s first public act of FWA        
      The U.S. Cyber Command (USCYBERCOM) recently sponsored a contest with Wired.com, challenging people to figure out the code "9ec4c12949a4f31474f299058ce2b22a" that is embedded in their official logo. Within hours, Sean-Paul Correll of Panda Security, determined that the "secret code" was in fact the MD5 hash of the USCYBERCOM's mission statement.
                For sale - mcfarlane series 10 Manga Spawn Cyber Tooth Comic... - Auction        
      Phoenix 85015, AZ, United States
      Up for consideration: todd mcfarlane'S manga spawn ultra-action figures - cyber toothfrom 1998 mpn #0001/Asst #11130 upc: ... This figure is just recently taken out of storage. It ...collection. Please refer to the photos and message us any questions. Includes figure and original card back from packaging. Shipped with care via usps Priority Mail boxed. We ship worldwide. ...
      ebay.com

                 Комплекс Cyberspace в Москве станет домашней ареной Vega Squadron         

                Comment on About Dr. Attorney Noel Guivani Ramiscal by thecyberlawyer        
      Dear Rey, Thank you for all the kind comments! Give my regards to Delia. That's really swell of you to give her the tiger's eye bracelet which is quite powerful. Yes, we should all meet up this August in Manila. Will subscribe to your blog soon. God Bless you and all your loved ones! Noel
                Comment on About Dr. Attorney Noel Guivani Ramiscal by thecyberlawyer        
      Dear Mr. Castaneda, Thank you for the message, really appreciate it. Next time, just approach me and I will happily pose for a picture with you. God Bless Us!
                Comment on LAWBYTES 111: DR. RAMISCAL’S PHILIPPINE CYBERLAW: SHOULD ONE SURRENDER TO THE POLICE THE ACCESS CODES OR DECRYPTION KEYS TO ENCRYPTED DIGITAL CONTENT ONE POSSESSES? by thecyberlawyer        
      Thank you Mr. Lugod. God Bless Us!
                Comment on LAWBYTES 111: DR. RAMISCAL’S PHILIPPINE CYBERLAW: SHOULD ONE SURRENDER TO THE POLICE THE ACCESS CODES OR DECRYPTION KEYS TO ENCRYPTED DIGITAL CONTENT ONE POSSESSES? by Julian Lugod        
      Thank you for this article, really informative regarding to key disclosure law.
                Comment on About Dr. Attorney Noel Guivani Ramiscal by thecyberlawyer        
      Hi Medevenx, I just read your post today and I truly sympathize with your situation. Before I go on, I would like to state that my replying to you does NOT in any manner establish a lawyer-client relationship between us. I have no idea if you are a Philippine citizen or even a resident. If you are, you would be interested in knowing that domain squatting which appears to be what you have described in your post, is a crime under the Cybercrime Prevention Act. Since it is a form of intellectual property infringement, the Philippine IP Office might be able to help you craft the proper response to Google, and may advise you if this matter goes to ICANN. I have met Atty. Allan B. Gepty, the IPO Deputy Director General on Advocacy, Policy and International Relations, and he might be able to assist you meaningfully. His Philippine office number: (02) 238 6300 loc. 1101 to 1103. His official email address: allan.gepty@ipophil.gov.ph Another IPO person you can approach would be Atty. Leny B. Raz, Office of the Director, (Bureau of Trademarks). Her number: (02) 238 6300 loc. 4101. Her official email address: leny.raz@ipophil.gov.ph It is imperative that you get a lawyer if you are pursuing this further. God Bless you in your endeavors.
                Comment on About Dr. Attorney Noel Guivani Ramiscal by thecyberlawyer        
      The approach that I would take would be to cover both the real and virtual aspects of the crime which I do not have the time to go into now. In brief, you should try to go to the NBI for their cyberforensic expertise and also they can utilize some of the processes set out in the 2015 Draft manual for cybercrimes which the DOJ based on RA 10175, particularly if they want to pinpoint the actual identity of the bully. Utilize the university's resources to find out who was giving her trouble. If it took place in social media, explore the policies of the provider and see if they will let the heirs access the account of the deceased for evidence of the bullying. Then apply the principles I have been teaching in my electronic evidence lectures (I am not an MCLE lecturer for FEU). God Bless!
                Comment on About Dr. Attorney Noel Guivani Ramiscal by Dennis O Go        
      Hi Atty. Ramiscal, I am Atty Go from OSG. I attended one of your MCLE lectures in FEU. I'm helping out a secretary from a univesity where I teach whose daughter committed suicide due to cyberbullying. I have been researching how to proceed but to no avail. I do not know how to proceed. Im planning to write to the school to seek assistance. What do you think I should do. Thank You. Dennis
                DT in Cybersecurity - Good but Could Do Better        
      Around 1,000 delegates gathered in Munich this week to listen, discuss and clap at random at Deutsche Telekom's two-day cybersecurity event. But was there something missing?
                Threat Intelligence: A New Frontier in Cybersecurity        
      In business as in warfare, it pays to know your enemy.
                Comment on 4 Basic Principles by Where is the Line Between Cybercrime and Cyberwar? | MS&E 238 Blog        
      […] the various Geneva Conventions, and other international frameworks. For the U.S military, four primary principles are commonly […]
                Cybern im Neuland        
      Gestern gab es auf der Gulasch Programmier Nacht eine schöne Einführung, wie die neue Cyber Behörde das Neuland in Sachen Cyber verteidigt. Natürlich wurde bei dieser Gelegenheit auch gleich der neue Cyber Schein ausgeteilt. Natürlich nur der kleine. Der große mit erweiterten Rechten ist ausschließlich der Wirtschaft vorbehalten.
                Cyberpeace statt Cyberwar!        
      none
                Technical Trainer        
      VA-Arlington, Job Description: Clango is seeking candidates for the position of Technical Trainer. This individual will report to the director of operations and support both the Cyber Security and Enterprise Asset Management Practice Areas. The Technical Trainer will work with Engineers and Subject Matter experts to develop technical training programs and conduct in-classroom and online training that will help
                Senior Threat Intelligence Analyst - Regions Bank - Cornelius, NC        
      Cyber security education and awareness, with a focus on social engineering campaigns, course development and training;...
      From Regions Bank - Tue, 18 Apr 2017 14:59:04 GMT - View all Cornelius, NC jobs
                [5.15] Morning Round-Up: Cyber Attack Spurs Concern For Thailand’s Critical Infrastructure        

      Here’s what you should know today. 1. Cyber attack ‘WannaCry worm’ spurs concern for critical infrastructure A Thai cybersecurity expert has urged all Window-based computer users to update their software to defend against the latest global cyberattack,...

      The post [5.15] Morning Round-Up: Cyber Attack Spurs Concern For Thailand’s Critical Infrastructure appeared first on ecommerceIQ - Ecommerce in Southeast Asia, Reports, Data, Insights.


                China bans news sites from using social media as a source        

      The Cyberspace Administration of China put national news outlets on notice this weekend, warning them not to base reports on social media sources without strict verification of the facts. The statement came less than a week after the appointment of a new head of the regulatory body, and cites various, apparently bogus stories published off the back of chatter on popular services like Weibo and WeChat. "It is forbidden to use hearsay to create news or use conjecture and imagination to distort the facts," a translation of the warning reads.

      Via: The Guardian, South China Morning Post

      Source: Cyberspace Administration of China


                So Long and Thanks for All The Fish... and Crabs... and Bacon...        
      This is it, the final post!  The last one of the whole damn blog.  It's a weird milestone, but it wasn't a sudden decision. Actually, I decided this somewhere during my madcap overview of state foods, somewhere between Georgia and Illinois (I can’t remember exactly), and well after I realized that I just no longer had the money, time or gas to go back around the Beltway again.  But still, after 6 ½ years (exactly - the first two posts were on September 12, 2006), 1,780 posts, 2,977 comments (as of this posting), about 310 recipes attempted (most of which were somebody else's recipes I was interpreting) and about 810 eateries, festivals, markets and food trucks visited, it’s time to pack it in.  The “blog fatigue” has taken a strong hold, and just like Ray Lewis (RAVENS W00000000T!!!!!!), Tina Fey (30 ROCK W00000000T!!!!!!) and Benedict XVI (zuh? Er, RAVENS W00000000T!!!!!!), I want to go out on a high.

      No, not “I want to go out high”.  I want to go out ON A high.  Good grief. 


      I’ve learned a lot these past several years of being part of the Baltimore food blogging community. I’ve tried to winnow that down to a list, with items in no particular order.  Some are more particular than others.  To wit:

      1. There are a lot of good crab cakes in this city. And a lot of bad ones.  But the bad ones are usually still better than the ones you find elsewhere.

      2. You just can’t buy a stand mixer cheap, even from your favorite thrift store.  You just can’t.  Don’t do it.

      3. You can really smoke pork barbecue in the slow cooker.  And in the oven.  Beef brisket, too.

      4. Eating something you’ve grown is pretty damn satisfying, even if all you got from several broccoli seeds was one head the size of your fist.

      5. Restaurants can actually improve, though how much so is debatable.

      6. They can also get worse.

      7. You don’t have to spend a fortune to get excellent food or service.

      8. But you CAN end up spending a fortune and get craptastic service instead.

      9. Chinese food in the US is a bit different than it is in the UK or in the Netherlands. Or, especially, in China.

      10. You can actually pop sorghum at home.  Amaranth, too.  And while a dome popper (that rotates the kernels) might be preferable, you can get away with using just a stainless steel stockpot.

      11. I now know how to make poi.

      12. And sushi.

      13. And beer. 

      14. And New York, New Haven and Chicago style pizzas.  I just need to make sure they stay flat. 

      15. There are some good eats from food trucks.  Here and in DC.  And LA.

      16. Recipes are there for a reason.  Use them.

      17. And read through them first!

      18. That said, so long as you know where to improvise (and what to search for on the internet), you don’t have to follow the recipe to the letter.

      19. As much as the woman irritates the hell out of me, I have to admit that Sandra Lee’s heart is in the right place in trying to help home chefs without a lot of scratch make something edible.  She doesn’t always succeed (ahem), but at least she tries.  To paraphrase Sophia Petrillo, her heart’s in the right place but I don’t know where her brain is.

      20. Still, what’s up with those goddamn tablescapes!?

      21. Guy Fieri, on the other hand... I have no friggin’ clue why he’s still on TV.

      22. Hooray for the people who thought up Restaurant Week.  And brewpubs.  And Dogfish 90 Minute IPA.

      23. I now know that people in South Dakota deep fry raw beef and eat it on toothpicks.  That’s about as All American as you can get.

      24. I have grown an appreciation for wine, but I will always be a beer person at heart.  Double IPA please, only one if I have to drive somewhere, and only water until I can drive.

      25.  Oh yes, don’t drink and drive.

      26. Homemade tomato sauce has totally ruined the stuff in a jar for me forever.  No high fructose corn syrup! (Seriously, look at the ingredients the next time you buy store bought.)

      27. Locally sourced really does taste better than the stuff they ship 2,000 miles across three time zones just so we can have cauliflower out of season.

      28. Sometimes all you want is a nice, juicy hot dog. Without bacon.  That’s right, I said “without”.

      29. Yes, I love bacon, don’t get me wrong.  But everything in moderation.  If you have bacon all the time, it’s not special.  (Didn’t Margaret Cho say that once?)

      30. That said, this blog has re-introduced me to the pleasures of cooking with bacon grease.  In moderation.

      31. That Bitchin’ Kitchen show is pretty damn strange, and it rocks.

      32. Nigella Lawson has such a great way of phrasing things on her shows and in her cookbooks.  It’s such fun to read her.


      33. If you have the time to explore food in local places you never get to visit, take it.  Otherwise someone raised in Lansdowne won’t find the excellent hot dogs in Dundalk, fried oysters in Edgewood or Chinese and Japanese food in Overlea that he should be discovering (or the pit beef in Lansdowne and Arbutus that folks in Dundalk, Edgewood and Overlea are missing, too - and yes there is also good pit beef in Dundalk and off Route 40).

      34. The internet is a great repository for recipes, but there will always be a place for cookbooks.

      35. I wish there were more people out there like Jolene Sugarbaker, the Trailer Park Queen.  Someone at LOGO get her a cooking show, dammit.

      36. Seriously, what is up with this ridiculous "throw it up overnight Frozen Yogurt shop" craze? It has to end sometime. So long as the people working all of them find other work. Don't want anybody out of a job.


      37. It's El-li-KIT City, not El-li-COT City! Jeez Louise, people.

      38. A few things I regret not having blogged about these past few years:
      • Jamaican food, particularly jerk chicken
      • The Charleston, though that one is because I could not afford it. Still can't afford it. Likely never will. Wah waah.
      • How to steam crabs. Sure we all know how to do that here, but I never actually got around to writing an actual how-to post.
      • The Museum Restaurant, now snuggled in the former space where the Brass Elephant used to be.
      • More family recipes, and maybe an exploration of the hallowed Woman's Day Encyclopedia of Cookery.
      • More posts about food, food production and nutrition writing. I've read and/or listened to on audiobook more than a few lately that really deserve more of a mention on a site like this one:
        • Animal, Vegetable, Miracle by Barbara Kingsolver and family
        • The Bucolic Plague: How Two Manhattanites Became Gentleman Farmers by Josh Kilmer-Purcell
        • The American Way of Eating by Tracie MacMillan
        • In Defense of Food by Michael Pollan (also been meaning to check out Eric Schlosser's Fast Food Nation. That one's next on the bucket list).
      39. This city needs more Ethiopian restaurants. And Nigerian ones, too. And barbecue joints.

      40. If you want an array of free cookbooks, go to the Book Thing in Waverly. Not just cookbooks but any books: you can take your old books that you don't want anymore and take home with you whatever you want. Granted, the selection skews towards the older stuff (hello, cookbooks for 600 watt microwaves from the early 80's), but it's still a fascinating bevy of cookbooks.

      41. You want the essence of "Smalltimore"? When you are out with your friends getting pizza at Iggie's and you see a member of the Ace of Cakes show outside the window, then you mention it on the blog, and then she comments afterwards! Please keep rockin' this town, Mary Alice, and all y'all at Charm City Cakes. That's Smalltimore.

      And that’s it.  I can’t really sum up 78 months worth of posts in one post much less one paragraph, so I’m not even going to try. But I will say that I have met a lot of interesting and talented people in this Baltimore food blog community, and made friends and shared experiences I am lucky to have.  Keep reading their food blogs, because they have forged into directions I had only thought about once in a long while, and many have been able to profit off of the experience (some of them have actual books you can buy now).  I am horrified at the thought of forgetting somebody and not going back to correct it, with this being in my final post and all.  So instead I thank all of you in the Baltimore food blog community as a whole. Y’all are awesome (yes, I meant "awesome" :D ), and you make me hungry.

      I finish the blog very fortunate to have even had the money to do this. There are so many people in this country and in this world who just go hungry, who don't have access to anything healthy and have to worry about whether or not to buy food for themselves and their families, and here I am blogging about what I ate last week downtown. Reflecting on that kind of puts some things in perspective for me.

      I’ve also learned (in large part on my own) a lot that I did not know, and probably would not have made the time to know were it not for this blog.  Eats around the Beltway that the food reviewers don’t often look at when they’re focusing on the finer and kitschier dining options in the city.  Specific foods in specific parts of the country that I’d never even known existed (from three different kinds of Native American frybread, to what a New York chocolate egg cream actually is, to how to make an honest-to-goodness sabayon for your Seattle sea scallops, to how long it actually takes to boil crawfish Louisiana-style).  Ditto for the world (from Papua New Guinea to Tanzania to leading 2010 World Cup contenders.  I’m looking at you, Uruguay).  The variety of festivals in the Baltimore area that are a cheap way to explore the area’s cultural diversity (and food), the original motivation for this blog in the first place back when it started as the Charm City Snacker.  The silliness of live-blogging a cooking competition show in real time, MST3K-style.  

      And of course, this:




      Ah yes, Aunt Sandy's infamous Kwanzaa cake video. You didn’t think I’d end the blog without slipping that in one more time, did you?

      I am incredibly lucky to have undergone this experiment, and I thank everyone who has been a fan these past 6 ½ years, and the hardworking people who make and serve the food I’ve talked about.

      So what does the future hold for me?  Danged if I know.  Work, family, hopefully some romance here and there, definitely some food.  I will say this: I am heading to New Orleans for a conference in May and getting some delicious food there, and hopefully in my down time seeing the Southern Food & Beverage Museum (particularly their Maryland exhibit - they do indeed have one).  Plus I’ll be eating locally and growing locally more often than I have in the past.  Most exciting, however, is a trip to Dublin for my birthday (the one in Ireland).  I normally would not do this or even bother to scrounge up the money, but it’s one of those "big" birthdays and I wanted to do something special.  Again, I’m incredibly thankful and lucky that I even get to do this.

      Apart from all that, I will just continue cooking food, growing food, investigating recipes from my own backyard and from around the world, but without telling cyberspace about it (alright, I might mention a few of these things on Twitter, but not on here).  Before I decided to finish the blog, I got a hold of my Great Great Aunt Florence’s old recipe book.  I had thought of working through each recipe and seeing how it turned out (there are two crab cake recipes in there, plus one for a Dream Whip Cake).  Maybe I should write a blog about it?

      Nah, done that already ;)

       

      And so, this is John, signing off for the last time.  Don't worry - I'm not taking the blog down. It's staying up for the foreseeable future, and probably longer than that. I will check and moderate the comments for a while and maybe add a few jump breaks to some of the longer posts (now that they've bothered to add that capability when I need it the least). Oh, and I should direct you to the newly-indexed State-by-State page to the right.  But I’m not posting anymore.  Seriously, I’m done.  I am pooped. I will miss this blog, but I’m really looking forward to missing it. And finishing it.  Really.

      Now what better way to finish than with one of those crazy food haiku?

      Time to close up shop.
      Bawlmer Snacker is complete.
      Now, what’s for dinner? :)

      (No the smiley face doesn’t count as an extra syllable!  It’s still a haiku.  Sheesh.)

                Friedrich Kittler's Technosublime        
      by
      Bruce Clarke
      1999-12-30

      In the 1970s a number of texts came into English translation bearing titles with a 1-2-3 punch, mixing exemplary authors with generic modes and methodological issues; for instance, Roland Barthes’s Sade, Fourier, Loyola and Image, Music, Text, containing the essays “Diderot, Brecht, Eisenstein” and “Writers, Intellectuals, Teachers,” and Michel Foucault’s Language, Counter-Memory, Practice with the essay “Nietzsche, Genealogy, History.” The title Gramophone, Film, Typewriter, a cognate translation of the German, echoes these theoretical signatures. Matt Kirschenbaum tries his hand at this with “Media, Geneology, History,” his review of Bolter and Grusin

      In Gramophone, Film, Typewriter Kittler contrasts the restriction of Foucault’s discourse theory to textual archives with his own wider media band, in which phonographic and cinematic data streams decenter the channel of literary writing. But his commentators agree that Kittler’s “media discourse theory” follows from Foucault as the prime member of the triumvirate Foucault, Lacan, Derrida. Lacan runs a close second. Kittler writes: “Lacan was the first (and last) writer whose book titles only described positions in the media system. The writings were called Writings, the seminars, Seminar, the radio interview, Radiophonie, and the TV broadcast, Television ” (170). Gramophone, Film, Typewriter partakes of this same postsymbolic media literalism.

      I write about Kittler from the standpoint of a scholar of British and American literature who dropped from the tree of Columbia’s core humanities curriculum to the seed-bed of canonical romanticism and modernism and the theory culture of the 1970s and 1980s, then passed through the forcing house of literature and science in the 1990s, to arrive at the threshold of contemporary media studies. In the process I seem to have become posthuman, but Kittler’s work reassures me that I had no choice in the matter: “media determine our situation” (xxxix). Kittler parlays high poststructuralism into a historical media theory that humbles the subject of humanistic hermeneutics by interpellation into the discrete material channels of communication. Media studies bids to become a hegemonic site within the new academic order of a wired culture. For Kittler, media determine our posthumanity and have been doing so in technological earnest at least since the phonograph broke the storage monopoly of writing.

      As a kind of media theory of History, a requiem and good-riddance for the era of so-called Man, Gramophone, Film, Typewriter transmits the tenor of its own historical moment. The German edition appeared in 1986, the year after the opening of MIT’s Media Lab and the release of Talking Heads’ post-hermeneutic concert film and album Stop Making Sense. Other resonant events in American culture include the publication of William Gibson’s Neuromancer (1984), Donna Haraway’s Manifesto for Cyborgs (1985), and Octavia Butler’s Xenogenesis trilogy (1987-89). Memories and premonitions of mushroom clouds loomed over these three speculative and/or scholarly scenarios published during the final decade of the Cold War; each text imagines the form of a posthuman or post-nuclear world. Gramophone, Film, Typewriter posits its posthumanity on the premise that the Strategic Defense Initiative has already set off the fireworks, that the future is always already a prequel to Star Wars. The text begins with the observation that optical fiber networks are “immune…to the bomb. As is well known, nuclear blasts send an electromagnetic pulse (EMP) through the usual copper cables, which would infect all connected computers” (1), and the book ends with before-and-after photos of Hiroshima (262).

      Many of Kittler’s sublime effects result from a kind of hyperbolic digitality, i.e., all-or-nothing assertions pressing seemingly local instances into global histories. For instance, Kittler is fond of audacious chronologies that parody the popular media’s demand for appearances of journalistic exactitude: “around 1880 poetry turned into literature” (14), or “around 1900, love’s wholeness disintegrates into the partial objects of particular drives” (70). One thinks of Virginia Woolf’s famous dictum: “in or about December, 1910, human character changed,” and, thanks to Kittler, perhaps now we know why. A related rhetorical scheme mediating the grand transformations of modernism is the from/to formation: “literature defects from erotics to stochastics, from red lips to white noise” (51), or as combined with an audacious chronology: “from imagination to data processing, from the arts to the particulars of information technology and physiology - that is the historic shift of 1900” (73). Again, and as the volume is coming to a conclusion with the arrival of Turing’s universal computer, “the hypothetical determinism of a Laplacian universe, with its humanist loopholes (1795), was replaced by the factual predictability of finite-state machines” (245).

      Kittler wrote Gramophone, Film, Typewriter just as chaos theory was arriving to throw a wrench into such stark digital determinism, precisely through the operational finitude as well as non-linear iterations of “finite-state machines.” As John von Neumann pointed out in 1948 in “The General and Logical Theory of Automata,” digital computers could produce perfect results, “as long as the operation of each component produced only fluctuations within its preassigned tolerance limits” (294). But, von Neumann continued, even so, computational error is reintroduced by the lack of the infinite digits necessary to carry out all calculations with perfect precision. Kittler melodramatizes Turing’s work, it seems to me, because he is captivated by the towering image of an informatic colossus.

      Such an all-determining and inescapable imago of media induces a productive critical paranoia. The media are always already watching us, putting their needles into our veins: “humans change their position - they turn from the agency of writing to become an inscription surface” (210). Neuromancer ‘s Wintermute is everywhere, or as Kittler phrases it, “data flows…are disappearing into black holes and…bidding us farewell on their way to nameless high commands” (xxxix). At the same time, he enables one to see the particular and pandemic pathologies of modern paranoia precisely as psychic effects driven by the panoptic reach of media technologies in their surveillance and punishment modes. Not for nothing is the apocalypse according to Schreber’s Memoirs a prophetic book of prominent proportions in Kittler’s media cosmos.

      In Gramophone, Film, Typewriter the objects of science are subsumed into the will-to-power of media technology. By way of contrast, despite his coinage of “technoscience” to underscore the sociological inextricability of the two, Bruno Latour sorts science and technology into separate treatments and preserves their disciplinary and epistemological distinctions. Yet one should not see Kittler falling under Latour’s blanket indictment of (Baudrillardian) postmodernism: “Instead of moving on to empirical studies of the networks that give meaning to the work of purification it denounces, postmodernism rejects all empirical work as illusory and deceptively scientistic” (Latour 46). Kittler busts open the realm of the real to examine the nonsymbolic and nonimaginary residues of communication technology, all that which cannot be posted: “Bodies themselves generate noise. And the impossible real transpires” (Kittler 46). Where Latour finds the proliferating quasi-objects of mediation, Kittler finds the literal networks of communications media.

      For the most part Kittler elides the history of physics concurrent with his media history - the cross-over from late-classical determinism to statistical mechanics, from thermodynamic entropy to information entropy. On the one hand, he scants the ether and the electromagnetic field theories which made possible many developments from analog to digital processing, and from pre-electrical storage technology (photography, phonography) to broadcast transmission (radio, television), electronic storage and manipulation (tape deck, video camera), and digital computation (microprocessor, fiber optic cable) technologies. But on the other hand, that lacuna has opened the door for major efforts among Kittler’s German and American scholarly associates, including the editors of Stanford’s Writing Science series, who have both midwived Kittler’s delivery into North American discourse and paralleled Kittler’s media emphasis with research projects that bring to science studies a thoroughgoing “materiality of communication.”

      “Once the technological differentiation of optics, acoustics, and writing exploded Gutenberg’s writing monopoly around 1880, the fabrication of so-called Man became possible” (16). I take it that the “fabrication” in question here is not the discursive construction of the humanist subject but the simulation of its spiritual activities by media devices. One notes Kittler’s detour around physics in the continuation of this passage: so-called Man’s “essence escapes into apparatuses…. And with this differentiation - and not with steam engines and railroads - a clear division occurs between matter and information, the real and the symbolic” (16). Missing from this formulation is the mode of energy, which would correspond by structural default to the Lacanian register of the imaginary. Indeed, Kittler runs up against numerous phantasmagorias of energy, but elides them by metonymic reification in media receivers and inscription devices.

      The phantasmagorias of energy I have in mind are those that emanated from the nineteenth-century wave theories connecting the physics of optics and acoustics through an analogy between vibratory media - the air and the luminiferous ether. As sanctioned by the first law of thermodynamics, i.e., the conservation and interconvertibility of energy, the optical imaginary of ether waves is easily displaced to sound waves propagated through the air. We see this concatenation and transposition of physical and technological media in a delightful short story by Salomo Friedlaender, “Goethe Speaks into the Phonograph” (1916), which Kittler republishes in its entirety.

      Friedlaender’s comic narrator unveils the thoughts of Professor Abnossah Pschorr, Edisonian inventor-extraordinaire of media gadgetry: “When Goethe spoke, his voice produced vibrations…. These vibrations encounter obstacles and are reflected, resulting in a to and fro which becomes weaker in the passage of time but which does not actually cease” (60). Pschorr extends to the air trapped in Goethe’s study a hypothetical characteristic much discussed in the late nineteenth-century popularization of the ether, its cosmic storage capacity. For instance, in 1875 British thermodynamicists Balfour Stewart and P. G. Tait wrote that the luminiferous ether

      may only be an arrangement in virtue of which our universe keeps up a memory of the past at the expense of the present…. A picture of the sun may be said to be travelling through space with an inconceivable velocity, and, in fact, continual photographs of all occurrences are thus produced and retained. A large portion of the energy of the universe may thus be said to be invested in such pictures (156).

      While rehearsing the same imaginary accessing of physical (as opposed to technological) media archives, Kittler leaves unmentioned the contemporary vogue connecting the spirits of the dead to the storage and transmission capacities of the luminiferous ether. Kittler cites from another (unnamed) Friedlaender story the assertion that “all the waves of all bygone events are still oscillating in space…. All that happens falls into accidental, unintentional receivers. It is stored, photographed, and phonographed by nature itself,” and comments, “Loyally and deliriously, Friedlaender’s philosophy follows in the wake of media technology” (77). But it also follows from prior scientistic anticipations of new storage capacities projected onto the ether medium. In an 1884 discussion of ether as a surface that forms at the interface of the third and fourth dimensions of space, hyperspace theorist Charles Howard Hinton completed this technoscientific circuit by conceiving the ether medium itself as a cosmic phonograph:

      For suppose the æther, instead of being perfectly smooth, to be corrugated, and to have all manner of definite marks and furrows. Then the earth, coming in its course round the sun on this corrugated surface would behave exactly like the phonograph behaves. In the case of the phonograph the indented metal sheet is moved past the metal point attached to the membrane. In the case of the earth it is the indented æther which remains still while the material earth slips along it. Corresponding to each of the marks in the æther there would be a movement of matter, and the consistency and laws of the movements of matter would depend on the predetermined disposition of the furrows and indentations of the solid surface along which it slips (196-97).

      My point is that the multiplicity of the concept of “media” extends beyond its particular technological instantiations to include both scientific and spiritualistic registers. A history of media could concern itself as well with the luminiferous ether and the Anima Mundi, the subtle fluids and strange angels that intermingled with the departed souls and trick shots of phonography and cinema; but for the most part, Kittler displaces this business to premodernist media:

      the invention of the Morse alphabet in 1837 was promptly followed by the tapping specters of spiritistic seances sending their messages from the realm of the dead. Promptly as well, photographic plates - even and especially those taken with the camera shutter closed - furnished reproductions of ghosts or specters (12).

      The telegraph and daguerreotype remain outside Gramophone, Film, Typewriter’s primary historical field. Even here, however, the Kittler effect opens up research corridors by insisting on the material basis, and thus empirical examinability, of the media that mediate the cultural imaginary: “The realm of the dead is as extensive as the storage and transmission capabilities of a given culture” (13).

      Beyond that I have nothing but admiration for this volume. Kittler’s fundamental derivation of Lacan’s real, imaginary, and symbolic from the data channels of phonograph, cinema, and typewriter is an astonishing theoretical event. It offers a comprehensive reading of psychoanalysis into technoscience that grows more convincing the more one gets acclimated to Kittler’s methods of channel processing across the cybernetic bridge from the nervous system and its “psychic apparatus” to the Aufschreibesysteme of his media discourse networks. In this reading, the hallucinatory powers and spiritual effects of literature derived from a storage-and-transmission monopoly that could only funnel and traduce the real and the imaginary into the narrow band of the symbolic. As the translators remark in their excellent Introduction: “in short, people were programmed to operate upon media in ways that enabled them to elide the materialities of communication” (xxii). It is both exhilarating and disquieting to submit to Kittler’s deprogramming. But the institutional regimes that sustained the privileges of literary discourse networks (and of us who still inhabit them) are increasingly caught up in the media transformations Kittler describes. The daemonic angel of our history is being driven by the electronic differentiation and digital reintegration of data flows.

      At another level, Kittler passes on a wealth of useful engineering expertise: matters of time-axis manipulation from Edison to Jimi Hendrix; the historical mathematics of music and sound: “Overtones are frequencies…. Intervals and chords, by contrast, were ratios” (24); the non-negligible difference between a phonograph and a gramophone (the latter is restricted to playback, the former also records); the physical differences between acoustic and optical waves, such that “cuts stood at the beginning of visual data processing but entered acoustic data processing only at the end” (117-18); the reasons why the first mass-produced typewriters were developed for blind people by arms manufacturers; the pervasive loops between warfare and media, e.g., the revolving cylinder that unites typewriters, film-projectors, and machine-guns, and the collusion of the piano, the typewriter, and Turing’s universal computer; the enigmas of the Enigma machine.

      And then, in the midst of this media mayhem, a canny persuasion - a literary core of archival gems. In addition to valuable translations of Friedlaender’s “Goethe Speaks into the Phonograph” and “Fata Morgana Machine” (which limns the eversion of virtual reality eighty years before Marcos Novak), this volume also contains complete texts of Jean-Marie Guyau’s “Memory and Phonograph” (1880); Rilke’s amazing meditation on the phonograph, “Primal Sound” (1919); Maurice Renard’s audio phantasms in “Death and the Shell” (1907); the sonnet “ ‘Radio Wave,’ which the factory carpenter Karl August Düppengiesser of Stolberg submitted to Radio Cologne in 1928”; Richard A. Bermann’s spoof of the sex war between male poets and female typists “Lyre and Typewriter” (1913); and Carl Schmitt’s facetious but telling “world history of inscription,” “The Buribunks: A Historico-Philosophical Meditation” (1918).

      In sum, ranging over literature, music and opera from Wagner to acid rock, philosophy, cinema, psychoanalysis classical and structural, history, mathematics, communications technology, and computer science, Kittler’s broadband scholarly panoptics afford a sublime techno-discursive vista, and in particular a point of lucid observation on the ongoing relativization of literary production. Kittler transposes Kant’s mathematical sublime into the mechanical transcendence of communications technology over individual subjects, displacing human psychology into machine being, setting off repeated implosions by which so-called Man is apocalypsed into infinite media loops. His high-prophetic meld of Lacan’s laconism and Zarathustra’s hammer facilitates a neuromantic network of discursive intensities. Under the conditions of technological mediation, however, theory remains viable, or inevitable. Ineluctably funneled through the “bottleneck of the signifier” (4) but pieced out with a tremendous portfolio of period graphics, Kittler’s illuminated writings operate a machine aesthetic tooled to the posthumanist discursivities of his intellectual heroes, but going beyond them to place the stylus of technology on the groove of inscripted bodies.

      —————————————————————

      works cited

      Butler, Octavia. Xenogenesis: Dawn, Adulthood Rites, Imago. New York: Warner, 1987-89.

      Gibson, William. Neuromancer. New York: Ace, 1984.

      Gumbrecht, Hans Ulrich, and K. Ludwig Pfeiffer, eds. Materialities of Communication. Trans. William Whobrey. Standford: Stanford UP, 1994.

      Haraway, Donna. “A Manifesto for Cyborgs: Science, Technology, and Socialist Feminism in the 1980s.” Socialist Review 80 (1985): 65-108.

      Hinton, Charles Howard. “A Picture of Our Universe.” Scientific Romances, 1st series. London: Swan Sonnenschein, 1886; reprint 1st and 2nd series. New York: Arno Press, 1976. 1:161-204.

      Johnston, John. “Friedrich Kittler: Media Theory After Poststructuralism.” Kittler 2-26.

      Kittler, Friedrich. Literature, Media, Information Systems: Essays. Ed. John Johnston. Amsterdam: G+B Arts International, 1997.

      Latour, Bruno. We Have Never Been Modern. Trans. Catherine Porter. Cambridge, MA: Harvard UP, 1993.

      Lenoir, Timothy, ed. Inscribing Science: Scientific Texts and the Materiality of Communication. Stanford: Stanford UP, 1998.

      Schreber, Daniel Paul. Memoirs of my Nervous Illness. Cambridge, MA: Harvard UP, 1988.

      Stewart, Balfour, and P.G. Tait. The Unseen Universe or Physical Speculations on a Future State. New York: Macmillan, 1875.

      Wellbery, David E. Foreword. Friedrich A. Kittler. Discourse Networks 1800/1900. Trans. Michael Metteer and Chris Cullens. Stanford: Stanford UP, 1990. vii-xxxiii.

      Winthrop-Young, Geoffrey, and Michael Wutz. “Translators’ Introduction: Friedrich Kittler and Media Discourse Analysis.” In Kittler, Gramophone, Film, Typewriter, xi-xxxviii.

      von Neumann, John. The General and Logical Theory of Automata. In Collected Works. Ed. A. H. Taub. 5 vols. New York: Pergamon Press, 1961-63. 5:288-328.

      Woolf, Virginia. “Mr. Bennett and Mrs. Brown.” The Gender of Modernism. Ed. Bonnie Kime Scott. Bloomington: Indiana UP, 1990. 634-41.


                And now for some big news...        
      I mentioned this weekend that I had some big news coming up, and so here it goes.  

      I’m ending the blog.  


      Not right now, but soon. Like "in a few weeks" soon.

      After six and a half years of posts about food around the city, around the Beltway, around the country and around the world, I feel that I’ve done everything I want to do with it.  Oh sure, there are a whole lot of other things I could do with it: there will always be new potential projects to start, foods to be grown, silly Sandra Lee videos to riff on (hey, I bet there are some of Guy Fieri, too), etcetera.  But I will leave those things to others.  

      If you’ve been paying attention, I have been dropping little hints here and there, specifically in the types of posts I’ve been doing (revisiting the sorghum popping thing, for example?  One more post of live blogging silliness?).

      I myself am satisfied with what I’ve done, and I don’t feel like becoming just the latest of thousands of bloggers who peter out, post a few things one month, nothing for two or three, then in a rush of renewed enthusiasm post five more things the next month and then nothing ever again.  I’m giving The Baltimore Snacker a proper send off.

      Don't worry; I'm not taking it down. I will leave it up. And why not? Again, I'm proud of the effort I've done. Why not leave it there in cyberspace?


      So, over the next two weeks, I will finish up the State-by-State project I’ve been working on since late 2010, and put up a few posts of “remembries” and lists of favorite things.  In a sense, if you can think of my first post as my first freshman English 101 essay, think of the next two weeks of posts as my dissertation. (Okay, silly analogy but still...)

      Or if you're really patient and just want to skip to the end, check back on March 12.  That will be the last last day.
                bcl_company_official        
      アマゾン @amazonjapan の ビューティーストア💄内 amazon beauty LABにて #cyberjapandancers がオススメ夏メイクを紹介中☀️ Come check out CYBERJAPAN DANCERS recommended summer make up items in amazon beauty LAB @amazonjapan * 夏🌴をテーマにくずれにくいメイクについてや、注目しているアイテムなどインタビューも✨amazonのビューティーラボをCHECKしてみてくださいね〜➡️ Long Lasting makeup that can beat the summer heat, popular item recommendations and interviews! Check the link for more information. http://www.amazon.co.jp/beauty * #amazonビューティー #amazonbeauty #クレンジングリサーチ #cleansingresearch #クリアラスト #clearlast #ブロウラッシュNEO #browlashneo * #メイク#夏メイク#おすすめコスメ#コスメ#プチプラコスメ#マスカラ#フェイスパウダー #スキンケア#AHA#cleansingresearch#clearlast#browlashneo#browlash#cosmetics#makeup#summermakeup #facepowder
                Consultant - Identity & Access Management - Simeio Solutions - Atlanta, GA        
      Privileged Access Management (CyberArk, Lieberman Software, BeyondTrust, CA Exceedium, IBM SPIM, Dell TPAM, etc). Consultant - Identity &amp; Access Management....
      From Simeio Solutions - Wed, 09 Aug 2017 06:06:17 GMT - View all Atlanta, GA jobs
                The Content of the Feminist/Queer Cyber-closet        

      Content

      This video was sent to me by Cinda Weber after my talk at University of Sussex answering the Queer and Feminist Social Media Workshop’s Question: How can we understand the interconnections between radical art practices and cyberfeminisms?


                Communicating Emotion        

      This video was sent to me by Andrea Cornwall after my talk at University of Sussex answering the Queer and Feminist Social Media Workshop’s Question: How can we understand the interconnections between radical art practices and cyberfeminisms?

      Communicating Emotion


                Radical digital analog        

      This drawing was sent to me by Sally Jane Norman after my talk at University of Sussex answering the Queer and Feminist Social Media Workshop’s Question: How can we understand the interconnections between radical art practices and cyberfeminisms?


                Cyberfeminism        

      Cyberfeminism

      This video was emailed to me by Janet J after my talk at University of Sussex. She was answering the Queer and Feminist Social Media Workshop’s Question: How can we understand the interconnections between radical art practices and cyberfeminisms?


                Public gets better intelligence than the spooks        
      y_exclamation

      Israeli intelligence moans
      The great unwashed are getting more information from their civilian internet applications and as a result, militant groups' access to intelligence rivals what government spies can get.

      According to  Israel's Shin Bet director Yuval Diskin, cyber technologies were an ascendant international security threat. Basically his argument is that since knowledge is power, the wrong people are getting power. In fact, the only people that should be that informed are governments.

      "Intelligence once enjoyed only by countries and world powers can now be obtained through internet systems like Google Earth, internet cameras that are deployed all over the world and linked to the web, or applications for iPhone devices that allow for quality intelligence to be received in real-time," he told a homeland security conference in Tel Aviv.

      He said that there was a "mounting debate" among Islamist militant groups over the internet on how to exploit international aviation.


                The Afternoon Sound Alternative 08-29-2016 with Nofrendo        
      Playlist:

      Dirty Southpaw- DSP Calling Pick It Up - Dirty Southpaw
      KAYTRANADA- VIVID DREAMS feat River Tiber - 999
      Gillespy- Intro To The Dawn II - Cyberghetto
      Tuxedo- Watch The Dance - Tuxedo
      J3PO- I Cant Make You Love Me - The 90s EP
      Indigo Blak- Simmer Down - Indigo Blak
      Thundercat- Them Changes - The Beyond Where The Giants Roam
      Anderson Paak- The Waters feat BJ The Chicago Kid - Malibu
      Dot- Modern Romance feat Jnthn Stein - Modern Romance EP
      March Fourth- Push It Back Ft Stanton Moore - March Fourth
      Brasstracks- Telling The Truth feat Lido Father Dude - Good Love
      Diplo Sleepy Tom- Be Right There Gent Jawns Remix - Be Right There Remixes EP
      Whipped Cream X Holly- PopN - Whipped Cream
      J3PO- Wannabe - The 90s EP
      Rustie- Lost feat Redinho - Green Language
      YaSi- Emotionless - Yasi
      WRLD Father Dude- Galaxies Ardency Remix - Galaxies Remixes
      Skrillex Diplo- To feat AlunaGeorge - Skrillex And Diplo Present Jack
      Bobby Tank- Vorpheum - The Way
      813- Damn Yeah - Bodyrace
      Herbie Hancock- Trust Me - Feets Dont Fail Me Now
      Mass Production- Sky High - Three Miles High
      Slave- Slide - Slave


      playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/5/playlistDate/2016-08-29
                Dating Sites Internet Dating Advice 3 Ways to Supercharge Your Photo        
      Life is good right now for the online dating industry. By the end of this year internet dating is projected to gross over one billion dollars in revenue.





      So it seems kind of strange that so many people report having no luck when it comes to meeting someone in cyberspace. There could be a myriad of reasons for this but key make or break element that can determine success is the profile photo. Sure the words you write may be beautifully written and totally heartfelt but like the old saying goes a picture is worth a thousand words.





      So to increase your chances of success here are some suggestions to help with your overall internet dating strategy.





      1. Dress Up





      No you don't have to put on clothes that make you look like you just stepped out of some glossy fashion magazine (although it would not hurt your chances any) but don't look to be so down to earth in your approach that you come off looking slovenly. The whole point is you are trying to make a good and lasting impression so dress accordingly.





      2. No Brooding





      Yes it's a given that you are trying to keep it real. You have never been a phony so putting up a photo showing you with a fake smile is not your style. Besides if your online dating prospects are the "real deal" they will like and respect what they see.





      Maybe they will. More than likely they won't. Unless you are a rap artist trying to sell your latest CD or a direct descendant of James Dean, go ahead and post a photo of you smiling.





      You are not in a bad mood all the time are you? If so then the last thing you should be getting into is online dating. Worried about it looking insincere? Then think of some things that make you happy just before the picture is taken. It's not necessary to have all thirty two teeth showing to make a nice impression. A pleasant genuine smile can work wonders.





      3. Who's Da Haps?





      Okay, you're looking good. You are dressed sharply without over doing it and the smile on your face is sincere without looking like an advertisement for the American Dental Society. Now take that photo with you in your element; surrounded by some good looking people of the opposite sex.





      Hold it. This is one of those common mistakes that you see over and over again when it comes to online dating photos. It's not a problem if you are on social networking sites but for internet dating it sends out a couple of messages:





      a. We got a player here





      b. If they have got it like that why are they doing online dating?





      They maybe just friends or an ex but whoever they are get rid of that picture and take a new one with only you. This is not a group personal ad. If you want to show a picture of you with your favorite pet then so be it. But the only human that should be in the picture is you.





      Sure online dating should be easy. After all the abundance of people you have to choose from is unmatched by anything in the offline world. But like anything in this world, to succeed you must have the right approach. Improving your online photo is one way to do just that.


      Article written by Daryl Campbell at The Relationship Tip - http://winthemarket.com - Don't go any farther with online dating until you find out the 3 questions that can save you time and trouble.

      dating sites: dating sites

      dating sites: free dating sites

      Article Source: www.articlesnatch.com


                The Afternoon Sound Alternative 11-18-2015 with Yukari        
      Playlist:

      Mew- Cross The River On Your Own -
      AkaDogggystyle- Trip Into The Shell - Flesh Doggy Style
      AkaDogggystyle- Final Flight - Flesh Doggy Style
      AkaDogggystyle- Shell Design - Flesh Doggy Style
      - voicebreak -
      Ballak Sissoko Vincent Segal- Niandou - Musique De Nuit
      Ballak Sissoko Vincent Segal- Passa Quatro - Musique De Nuit
      - voicebreak -
      Joi- Fingers - Joi Sound System
      MC YOGI- Road Home feat Trevor Hall - Only Love Is Real
      Farao- Maze - Till Its All Forgotten
      Low- Gentle - Ones And Sixes
      El Ten Eleven- Peter And Jack - Fast Forward
      - voicebreak -
      Bomba Estreo- Amanecer - Amanecer
      Boogat- Me Muero Por Ti - NeoReconquista
      The Souljazz Orchestra- As The World Turns - Resistance
      Electric Squeezebox Orchestra- Electric Squeezebox - Cheap Rent
      Public Enemy- Earthizen - Man Plans God Laughs
      BSide Players- Fire In The Youth - Fire In The Youth
      - voicebreak -
      Someone Still Loves You Boris Yeltsin- Foreign Future - The High Country
      The Still Tide- Field Of Bells - Half Empty Rooms EP
      Jack And Eliza- One Too Far - Gentle Warnings
      Simian Ghost- No Dreams - Youth w 2012 USA Bonus EP
      Lady Of The Sunshine- Big Jet Plane - Smoking Gun
      - voicebreak -
      Beat Connection- Air Conditioning - Product 3
      Kodak To Graph- Los Angeles - Isa
      Robin Schulz Lilly Wood The Prick- Prayer In C Robin Schulz Radio Edit - Prayer
      Goldfrapp- Annabel - Tales Of Us
      Lou Reed- Magic And Loss The Summation - Magic And Loss
      - voicebreak -
      Mogwai- Christmas Steps - Come On Die Young
      High Highs- Love Is All - Open Season
      Buckethead- Rooms Of Illusions Part 1 - Rooms Of Illusions
      - voicebreak -
      Cybertribe- Reaching The Ocean - Sacred Memories Of The Future


      playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/35/playlistDate/2015-11-18
                Scientists on the Margins        
      by
      David Nobes
      2005-01-30

      INTRODUCTION

      The World Summit on the Information Society (WSIS) was convened in Geneva in December of 2003. When the World Summit was announced, many in the scientific community questioned why there was no clear or central role for science and scientists. Scientists at CERN, in particular, expressed their concerns because CERN, one of the premier international collaborative scientific institutions, is regarded by many as the “birthplace” of the Internet.

      As a result of the interventions of scientists, the UN and WSIS Secretariat proposed to hold an additional, but separate meeting ahead of the World Summit - the Role of Science in the Information Society (RSIS). The Role of Science meeting was also held in Geneva, at CERN, immediately before the World Summit. Many who attended RSIS also attended the WSIS. (The RSIS website is still active, as of January 2005).

      The RSIS was intended to provide a forum whereby scientists and science administrators could contribute to the ongoing discussions on the Information Society. The discussions focussed on information sharing - the mechanisms for such sharing, and the impact on society that information sharing could have, because it became quickly apparent that information sharing is one of the primary elements in what we have come to call the Information Society, which I will abbreviate here as IS. Information technology is abbreviated as IT.

      At this point, it should be noted that many of the participants, this author included, wondered what influence we scientists might have on the larger World Summit. Because of its separateness, many attendees doubted, sometimes publicly, that we would have much impact on the main WSIS “event” (the term used on the website and in the printed material). Many felt that the meeting was nonetheless useful, but more for the informal networks and contacts that we made, rather than for the formal proceedings. This reflects the nature of the Internet and modern electronic communications, which was nicely and concisely described by Tim Berners-Lee, who developed the browser-based interface, the “World Wide Web,” now concomitant with the popular conception of the Internet. He portrayed the “essence” of the Web as “decentralized” and “fractal.” It was originally designed to fill a need to share information (“data”) that was different in nature, format, and style.

      [ For a much different conception of a global informational network, albeit one that has yet to be put into popular practice, see the Home Page of Ted Nelson, eds. ]

      At the end of the RSIS was a “Visionary Panel Discussion: Science and Governance.” Most of the panel members who discussed the future of the Internet used outdated and outmoded terminology and paradigms, and I think they missed some of the inherent anarchic and democratic aspects of the Internet. Many of us felt that the panel, with the exception of Berners-Lee, showed a lack of understanding of the Internet and the Web. Indeed, the character of the Internet and the Web in many ways reflect how human progress is made, whether we are discussing science or broader societal aspects. We take steps that wander up many blind alleys and false trails before hitting upon solutions to previously unsolved problems. The solutions are almost always imperfect and almost always later superseded by some better approach. It is necessarily unstructured and chaotic, as any creative activity will be. However, those involved directly, such as scientists, are often excluded from the decision-making processes, which tend to be dominated by politicians and bureaucrats who are in general sadly ignorant of science and its methods. I hope to expand on this theme in the report that follows. The issues raised are no less relevant and important a year on from the meeting. The most exciting and innovative projects described during the meeting emphasised the lack of centralized control over the Internet and the Web, and that such control is nearly impossible. We cannot control what people do with the Internet; instead the main issue should be about showing people how to use the Internet effectively and sceptically.

      The structure of this report is simple. It follows the structure of the meeting, which was built around the central RSIS “themes”: education; economic development; environment; health; and enabling technologies. I summarise some of the main points and observations from each session, highlighting those talks, presentations and sessions that seem to have best captured the atmosphere of the RSIS and future of the Information Society.

      OPENING PLENARY SESSION - “SETTING THE SCENE”

      The opening plenary session comprised a series of presentations that ranged widely across the IS spectrum. Adolf Ogi, Special Advisor on WSIS to the Swiss Federal Council, officially welcomed the RSIS participants on behalf of Switzerland, the host country, and challenged the participants to promote “science for all, without boundaries.” He touched on the issues of control of technology and the role of infrastructure, and the costs associated with both. When we say “costs”, we mean both the cost to society as a whole and the cost to the individual. This becomes, then, a major concern in developing countries where personal monetary wealth is limited, and thus access to modern computing tools is limited.

      Two speakers put the Role of Science in the context of the World Summit on the Information Society. Adama Samassékou, President of the WSIS Preparation Committee, addressed the gulf between the “haves” and the “have-nots,” using the now common phrase “the digital divide.” However, Samassékou went beyond these almost clichéd terms and viewpoints to discuss the traditional forms of knowledge, and how in the IS world oral traditions, and the information they transmit, are being lost, largely because we have not had a means to incorporate them into the technology of the IS. He emphasised the goal of a lack of boundaries for the sharing of information, and the need to promote the IS within an ethical framework. In this framework, he included environmental ethics. This theme arose again in the special session on the Environment in the IS.

      Yoshia Utsumi, Secretary-General of the International Telecommunication Union, emphasised accessibility of IS, but his emphasis was on scientific access. This was perhaps a reflection of the audience, but was then limited in its scope, especially when considered in the light of some of the presentations that came later in the day. He noted the lack of scientific funding in the developing world, and the “problems” in science policy. My opinion is that “gap” may have been a more appropriate word, because few countries, developing or otherwise, have clear policies for the sharing of information, scientific or otherwise. Many that do have such policies, such as the U.S.A., obstruct information sharing for reasons of “security,” even though open access to data and information is often the best defence. However, as Utsumi noted, this was a beginning of the process of discussion and policy formulation.

      After the two RSIS context speakers, we listened to three “keynote” speakers, each of whom gave brief talks: Dr Nitin Desai, Special Advisor to Kofi Annan on WSIS; HRH Princess Maha Chakro Sirindhom of Thailand; and Walter Erdelen, Assistant Director-General for Natural Sciences at UNESCO. These talks touched on issues of citizen-to-citizen communication and the “digital divide” (Desai), the lack of access to IT and concepts of sustainability in the IS (Sirindhom), and the environment (Erdelen).

      Dr Esther Dyson, the Founding Chair of the Internet Corporation for Assigned Names and Numbers (ICANN), was listed as speaking on “the promise of the Information Society and the role that science and technology have played.” ICANN is the organisation responsible for mediating domain names. They do not assign names, per se, but monitor the process and the circumstances. They have little power, but unfortunately are often seen, incorrectly, as responsible for the current morass over domain names. Dyson did not speak on the listed topic, but instead talked about the role of scientists themselves, rather than some monolithic “science,” in the future of the IS. She also emphasised that we cannot solve the problems of the Internet in a question and answer session.

      Finally, Ismail Serageldin, the Director-General of the Library of Alexandria, gave a PowerPoint presentation on the state of IT use at the Library. It is impossible to cover all of the material he (rapidly yet effectively) presented. The Bibliotheca Alexandrina is making use of IT in many ways, and to a large extent (their website is www.bibalex.org). Some of the problems and issues Serageldin identified for the RSIS were, to name a few:

      * effective and accessible publication and dissemination of information, specifically research and the results of research;
      * peer-review (or lack thereof for online publications);
      * copyright and “fair use” of online materials; and
      * Internet library loans.

      He discussed the rise of anti-science movements, particularly in the context of fundamentalist religious groups, and both here and in his talk he noted that these were not only Islamic but also Christian fundamentalist groups. Some approaches they used to try to counter such movements were:

      * the establishment of a BA science “supercourse”;
      * reaching children with “My Book”, which placed the child within the book designed and partly written by the child using online resources; and
      * the “Hole in the Wall” computer.

      This last approach was particularly interesting and revolutionary. The concept is to place a PC secured into a recess in a wall, using a transparent cover to allow visibility and access to the touch screen. Results showed that illiterate people, especially children and young adults, were learning to read by working their way through Internet connections. They would begin by using the symbols to guide their way, but would eventually learn to decipher at least in part the messages that accompanied those symbols.

      One unfortunate omission from the programme was the presentation by Tim Berners-Lee, who was delayed by a snowstorm in Boston, and did not arrive until half way through the second day of the symposium.

      “THE FUTURE: What the Scientific Information Society Can Offer”

      The next session was a bit of a misnomer. It was a mix of topics, ranging from GIS to technological access for urban and rural poor people to sociological aspects. The sociological paper was simply a written paper read aloud, with a singular lack of the use of any of the technology we had been discussing. The sociological presentation simply served to emphasise the growing gap between scientists and some social scientists, and made me uncomfortably aware of why the Sokal hoax had worked so well amongst the social science journals; the presentation was unnecessarily rife with jargon that obscures rather than informs.

      As an aside, for those unfamiliar with the Sokal hoax, Allan Sokal is a Professor of Physics at New York University who submitted a hoax article, “Transgressing the Boundaries: Towards a Transformative Hermeneutics of Quantum Gravity” to the journal Social Text. As the Skeptics Dictionary says (http://skepdic.com/sokal.html):

      The article was a hoax submitted, according to Sokal, to see “would a leading journal of cultural studies publish an article liberally salted with nonsense if (a) it sounded good and (b) it flattered the editors’ ideological preconceptions?” It would. Needless to say, the editors of Social Text were not pleased.

      What Sokal was attacking was the view amongst some social scientists that “physical reality” is a social construct, whereas the existence of an external “world” is an underlying premise in science. There is insufficient space to explore this issue adequately here, but the reader is referred to the many websites dealing with the Sokal “affair” (especially, e.g., http://en.wikipedia.org/wiki/Sokal_Affair and http://www.drizzle.com/~jwalsh/sokal/), and Sokal’s own site ( http://www.physics.nyu.edu/faculty/sokal/)

      [ Amato writes at length of the Sokal Affair in sokal text: another funny thing happened on the way to the forum; and it is discussed in Kilgore’s review of Technoscience and Cyberculture, and Ciccoricco’s Contour of a Contour, eds. ]

      In that session, nonetheless, were two presentations that stand out in my mind, those by Lida Brito, the Minister of Higher Education, Science, and Technology for Mozambique, and Onno Purbo, an engineer from Indonesia. Purbo talked about how to “Facilitate Fast and Self-Propelled Internet Access: Return to Society,” a presentation that was shifted from the second day into the first day’s programme. His presentation was, in many ways, a useful counterpoint to Serageldin’s, in particular the “Hole in the Wall” PC, noted above. Purbo obtains PC’s at low cost, usually sold cheaply or donated by large companies that are upgrading their computing systems. These PC’s are then made available in “classrooms” placed in poor urban and rural areas so that the local people can use the computers. They also learn to use the Internet. Purbo provides access by, as he put it, “stealing” open frequencies. He uses antennas ingeniously constructed from old tin cans; these are sufficient to provide the signal needed. He uses open source software, and emphasised that mass education is the key to providing a basic education to the broad populace.

      His presentation also served to emphasise that education is crucial for informed and useful access to the Internet. Too many people, of whatever socio-economic level, “surf” the Net without any thought about the “information” they are obtaining. The websites they access are often a source of disinformation and misinformation. However, this also serves to reinforce the democratic nature of the Internet. We cannot control how people use the Web, and the fact that there are hundreds of sites devoted to Elvis may or may not be a sad commentary on our society, but it nonetheless also serves to show us how uncontrollable the Internet is.

      I present the Elvis example, one noted at the meeting, not to denigrate the use of the Internet and the Web for such purposes. What it shows is that new technologies have become new instruments of entertainment, when the hope was that they would become self-directed teaching tools. My main point is that during many of the RSIS sessions, a number of our “elder statesmen” (and they were almost all male) talked about “control.” They seek to control access, information flow, and the development of the Internet. In this way, our “leaders” show their fundamental ignorance of this creature. I emphasise, again, Berners-Lee’s description of the Internet as a fractal and chaotic thing.

      Brito’s presentation was, in contrast, a passionate “wish” list of what she would like to do and see happen, both in Mozambique and beyond. Her list was focussed around the themes of wider literacy and ” relevant ” knowledge.

      The session ended with a panel discussion, ostensibly “Reflections on the Role of Science in the Information Society.” The participants each gave a short presentation, with a very brief period at the end for discussion. Most were much as expected, and a number were largely political in nature. One exception was Juergen Renn, of the Max Planck History of Science Institute and ECHO (European Cultural Heritage On-Line), who was concerned that the “core of cultural heritage is largely excluded from information technology” and noted how ECHO was formed to address this. He also briefly talked about the Berlin Declaration on Open Access to Knowledge in the Sciences and Humanities. (The full declaration can be found at: www.zim.mpg.de/openaccess-berlin/berlindeclaration.html). While the goals of the declaration are laudable, a number of participants were concerned about the lack of copyright protection, citing cases where work done by researchers in developing countries was plagiarised by researchers in developed countries.

      So concluded the first day of the conference. A number of us noted a general lack of self-criticism in most of the presentations. There was a lot of vague language and abundant use of clichés, much “looking to the future” and long wish lists. The most exciting presentations, for me, were the ones that discussed concrete examples of taking IT to the broader populace, often in quite revolutionary ways, in all of the meanings of that phrase.

      PARALLEL SESSIONS

      I attended the session on “Contributions to Environment.” Other sessions were on Education, Economic Development, Health, and Enabling Technologies. All of these sessions had quite active online forums for discussion in the months leading up to the RSIS and WSIS symposiums, and the forums can be reviewed at the RSIS website. Most of us contributed to more than one online discussion group, but attended only one parallel session.

      In the Environment session, most of the presentations focussed on technical and management issues. David Williams of EUMETSAT talked about the Global Earth Observation Systems and Strategies, focussing on data management and the move toward an Integrated Global Observation Strategy (IGOS), which seeks a comprehensive integrated effort. Such a move needs a “shared strategy,” and involves the participation of the UN, international scientific and research programmes, space agencies, etc. They seek to develop a common approach to surface and satellite observations. The international weather observation and forecasting network is one successful example where a common strategy and approach has been developed. Williams had many interesting and pithy quotes: “The world is full of data and short on information” is probably my favourite.

      Patricio Bernal, of UNESCO and the IOC, talked about the Global Ocean Observation System (GOOS). There are regional GOOS “alliances.” New Zealand, where I am based, is a member of one such regional alliance. Bernal noted, however, that there needs to be an adaptation of international norms for data sharing to facilitate the further development of GOOS. This was a common theme that arose a number of times during the Environment parallel session, specifically, and the RSIS more generally. There are often conflicting protocols for sharing data and information and, as Williams’ quote illustrates, a set of data is not always usable information.

      Josef Arbacher of the ESA talked about Global Monitoring for Environment and Security (GMES), a programme for monitoring of regional development, management of risk, and the guidance of crisis management and humanitarian aid. The ESA aims to have full capacity by 2012-2015. The EU will be spending 628 million euros in the 2004-2006 fiscal period, rising to 5005 million euros by the 2007-2015 period. Again, the issue of data sharing and accessibility arose, in addition to questions of data verification and transparency of the process.

      Stuart Marsh, of the British Geological Survey Remote Sensing Group, talked about Geohazards and the IS. He noted that citizens are the ultimate beneficiaries, and suggested that there are three main user groups of geohazards information: “responsible authorities”, scientists in monitoring and government agencies, and research scientists. They have different needs, e.g., baseline inventory of hazards, monitoring, rapid dissemination of information during a crisis, etc. He noted, as did the others in the session, the need for an integrated approach from surface to space, and the need for but difficulty in bringing together the different types of data. Again, this raised the issue of data management. Marsh’s presentation also highlighted, however, the gap in our knowledge about the scientific literacy of our public “authorities.” Those responsible may well be local or regional officials who are far removed from those who gather and use the data/information. These officials may have no understanding of the processes involved, and their concerns may in fact run counter to the actions that should be taken to avert a crisis. The current crisis in South Asia in the wake of the tsunami illustrates many of these concerns. An early warning system was not in place because of the cost (both for the infrastructure development and for ongoing support) and because of the lack of technical expertise to staff such an enterprise.

      This illustrates a major gap in the entire RSIS - there was little or no consideration of how we get technical information to the public officials and to the wider population. The entire issue of scientific literacy was glossed over, and instead most presenters focussed on those who were trained to use the data, when, as I noted earlier, most people are using the Internet in an undirected and uninformed way, so that they are unable or unwilling to distinguish “good” reliable information from poor quality “information” or even from reports that were consciously devised to misinform the “public.”

      After Marsh, Stuart Salter, who leads the Species Information Service (SIS) of the World Conservation Union (IUCN), gave probably the most thoughtful of the Environmental presentations. He discussed “appropriate technologies.” As an example to start off his talk, he mentioned an emergency in Belize where large volumes of vaccine were required, but which went bad because of a lack of refrigeration. Those providing the vaccine were unaware of such a lack; it never occurred to them that large parts of the world still lack refrigeration. He used this to highlight the problem when a network of scientists (who he described as “free spirited individuals”), give “information” that needs to be organised in a common format and then propagated up and out into the community. His premise was that complex ICT systems could allow a simple “front end” and often can be configured by users to suit their purposes. He noted the need to change the “paradigm” whereby scientists visit a country, do their research, then leave and publish the results, leaving no net results in the visited country. He emphasised the need for using scientists in regional networks, working in existing well-functioning scientific and conservation networks. Then the data are vertically integrated in a relational database, using a GIS format. This is the mode of operation used successfully by the SIS for decades. The data are controlled by the scientific community, and the quality of the data is overseen by Specialist Groups, of which there are 128 in the SIS. The data are continuously updated. The SIS has thus grown from existing networks, rather than imposed from outside, which explains why it has worked so well.

      Finally, Luigi Fusco of the ESA talked about “Emerging Technologies for Earth Observation and Environmental Applications.” He used as his example the wreck of the tanker “Prestige” off the northwest coast of Portugal and Spain. He noted that the satellite data were insufficient to be used alone, and that a wide range of technologies and their associated data, from surface through to satellite observations, needed to be integrated in a complex information management system. This theme of the need for integration of different types of data and information from a range of technologies and scales of observation arose again and again throughout the session.

      CLOSING SESSIONS

      The closing sessions were in two parts: a series of summaries of the thematic parallel sessions were presented, followed by a “panel discussion,” closing remarks from the Secretary-General of the UN Conference on Trade and Development (UNCTAD) and then the “Key Message” from the RSIS, presented by the Director-General of CERN. Given that the “Key Message” did not differ at all from the text circulated before the RSIS meeting, many of us wondered why we had spent two days talking about the various issues. We concluded that the greatest benefit may well arise from the creation of a network of individuals interested in the issues raised by the RSIS symposium.

      The session summaries raised some common themes and issues. One of the primary issues is the integration and sharing of data within complex structures, and the desire to get IT into rural and poor urban communities. The goal to fight illiteracy, generally, and scientific illiteracy, more specifically, is a major obstacle in the building of an Information Society, which requires the wider availability and use of IT, from tertiary institutions everywhere, not just in developing countries, to remote communities.

      Finally, the panel discussion amounted to little more than prepared statements from “elder statesmen” (men without exception, all elderly except for Tim Berners-Lee), and was perhaps symbolic of much of the meeting. Berners-Lee spoke for two minutes and encapsulated the essence of the Internet and the Information Society better and more succinctly than any other speaker. It is decentralized and “fractal” in its nature, and inherently uncontrollable and ungovernable. Yet so many of the politicians on the panel, for most were politicians, used outmoded and outdated paradigms and language in their politically motivated speeches. They kept talking about “governance” of the Internet and IT. I can only conclude that our political “leaders” have little or no idea about the Internet tiger they have by the tail. It is fundamentally an anarchic, often revolutionary creature, one that will refuse to be confined and controlled.


                12.10.17 20:00 Uhr - Erlangen - We Invented Paris - Tour de catastrophe        
      Tickets erhältlich unter: http://www.frankentipps.de/veranstaltung213490-tickets

      WE INVENTED PARIS
      » A journey of love with a dash of disco «

      We Invented Paris ist das Kollektiv um den Basler Sänger und Songwriter Flavian Graber. Es vereint Musiker, Designer und Filmemacher und erfindet seine Architektur und sein Klangbild seit dem Startschuss vor sieben Jahren immer wieder neu. Nach zwei erfolgreichen Album-Veröffentlichungen und über 250 Shows in ganz Europa, entschieden sich Graber und seine Mitstreiter vor zwei Jahren für eine kreative Schaffenspause; für eine bewusste Rückbesinnung zu den eigenen Wurzeln.

      Jetzt sind We Invented Paris zurück – mit klarer Haltung und neuer Musik. Das frische Songmaterial markiert dabei einen gravierenden Einschnitt in das bisherige Folk-Pop-Gewand der Schweizer:

      Die Akustikgitarre ist der Keytar gewichen – und damit der Songwriter-Habitus der retro-elektronischen Popmusik. We Invented Paris liefern den perfekten Soundtrack eines 80er-Cyberpunk-Dramas, das im Jahre 2017 spielt. Nie zuvor kam etwas so Unerwartetes aus dem Labor der Paris-Erfinder!
                The Afternoon Sound Alternative 06-18-2015 with 99        
      Playlist:

      Andrew Bird- Far From Any Road Be My Hand - Things Are Really Great Here Sort Of
      Great Lake Swimmers- With Every Departure - A Forest Of Arms
      Clap Your Hands Say Yeah- Clap Your Hands - Clap Your Hands Say Yeah 10th Anniversary Edition
      Pascale Comelade Les Liminanas- Dick Dale Netait Pas De Bompas - Traite De Guitarres Triolectiques
      Father John Misty- I Love You Honeybear - I Love You Honeybear
      Pardon Kimura- SnowCovered Volcano - Frozen Hawaii
      Spanglish Fly- New York Soul - Latin Soul Y Bugal EP
      - voicebreak -
      A Tribe Called Red- Suplex feat Northern Voice - Suplex EP
      The Specials- Enjoy Yourself Its Later Than You Think 2002 Remastered Version - More Specials
      Phil Pratt- African Communication - Star Wars Dub
      Rabbit Rabbit- Swallow Me Whole - Rabbit Rabbit Radio Vol 2 Swallow Me Whole
      First Aid Kit- Heavy Storm - The Big Black The Blue
      Fort Knox Five- Mission To The Sitars - Pressurize The Cabin
      Compilation- Go Cart - Globalista Radio Sensual Sonores
      Mr Scruff- Where Am I - Friendly Bacteria
      Dengue Fever- Ghost Voice - The Deepest Lake
      Chui Wan- Beijing Is Sinking - Chui Wan
      - voicebreak -
      Mandeng Eletrik- CyberFula - Mandeng Eletrik
      Daym Arocena- Madres - Nueva Era
      Sun Ra- Have You Heard The Latest News From Neptune - Marshall Allen Presents Sun Ra And His Arkestra In The Orbit Of Ra
      - voicebreak -
      Bonobo- Brace Brace - Black Sands Remixed
      Various Artists- Land Of Nowhere - Dub Out Of Poland Vol2
      - voicebreak -
      People Like Us- Happy Lost Songs - Welcome Abroad
      Meat Puppets- Up On The Sun - Up On The Sun
      King Missile- Cheesecake Truck - Mystical Shit Fluting On The Hump
      Bomba Estreo- Amanecer - Amanecer
      James Brown- Super Bad remix By Cornelius - Ultimate Remixes
      - voicebreak -
      Henry Threadgill Zooid- In For A Penny In For A Pound Opening - In For A Penny In For A Pound
      Jaga Jazzist- Going Down - A Living Room Hush
      - Rock n Robot By Kim And Buran - Russkie Wigout Demented Surfelectroexotica From Behind The Iron Curtain
      - voicebreak -
      Dom La Nena- Volto J - Soyo
      Various Artists- Andres Landero Y Su Conjunto La Pava Congono - Beginners Guide To Cumbia
      Dave Lombardo DJ Spooky- BSide Wins Again Acappella Version - BSide Wins Again EP


      playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/50/playlistDate/2015-06-18
                Exogeny #1        

      You have friends on Facebook, followers on Twitters and Contacts on Flickr. You go online to see what your friends are up to. You form new relationships and friendship online. But do you have a digital child anywhere?

      Are you sure?

      Mike Marcus, a 34 y/o photographer and digital artist is creating digital children:

      This is the world we now live in. A world where both the virtual and physical are becoming equally real. Where relationships between people do not depend on physical presence or even the ability to speak the same language. Where ideas and concepts exist outside of the brain of the individual in the collective mind of society where we call them memes. It is a world where a digital child is a serious prospect. If people can have cyber sex then why not cyber offspring? (source)

      From the exhibition literature:

      "The name “Exogeny” refers to the cultural practice of intentionally breeding outside of one’s cultural or ethnic community. The series is heavily influenced by the artist’s own experiences growing up in a segregated and xenophobic religious community and, more recently, as a witness to racial tensions between Israeli citizens and Palestinians in the Occupied Territories. The collection aims to “exogenise” or metaphorically reach out to the wider community by digitally merging the artist’s own self-portrait with those of others. The resulting images form “digital child” portraits; beings who appear real in all ways but who never actually existed. Taken together, the work forms a distinct body, all tableaux resembling the artist in some way while retaining the features of the models. Some of the images appear to be obviously male while others are androgynous. The original models represent a mix of races, ages and personality types but the final works homogenise into a uniform collective that defies categorisation. (source)

      Oh well. In its own weird way, this makes sense. For Mike, it's a statement and an experiment. Me, I know it's going to happen sooner than we think.

      Check out Mike's Exogeny #1 exhibition, opening Aug 2nd.

       


                Ransomware: What's Old Is New Again        
      Apparently bolstered by the 'success' of the 'WannaCry' attack in May, ransomware cyber attackers have launched another wide-scale strike.
                HUGE Cyber Monday sales today thru Sunday!        
      Like the title says! Go to my store and get some cheap music. And if you want my new Christmas EP free all you have to do is by my ON SALE 2010 Christmas album The Christmas Stories! What are you waiting for?
                How Failure Inspired One Entrepreneur to Ask Better Questions        

      Hal Gregersen, executive director of the MIT Leadership Center interviews Lior Div, CEO and co-founder of Cyberreason, about the failures and challenges in his life that enabled him to ask better questions. As part of the MIT Leadership Interview Series, Div explains that failure is critical to finding organizational blind spots and opportunities for growth.

      The post How Failure Inspired One Entrepreneur to Ask Better Questions appeared first on MIT Leadership Center.


                Best Free Cell Phone Spy Software        

      Best Free Cell Phone Spy Software As the reliance on cellular technology has increased, the level of insecurities and cyber crimes has also been on the rise. For those who wish to keep a tab on the overall activities of their wards or partners as well as professional employees are highly recommended to resort to […]

      The post Best Free Cell Phone Spy Software appeared first on .


                Cell Phone Spy Software Call Recording With The Support Of Spy Software        

      Cell Phone Spy Software Call Recording With The Support Of Spy Software For ethical monitoring and cellular hacking, there are several active software applications that have been established which in a way support the urgent needs of service users. If you are a parent then you are bound to be familiar with cases of cyber […]

      The post Cell Phone Spy Software Call Recording With The Support Of Spy Software appeared first on .


                Transformers Fall of Cybertron le 28 aout        
      Consoles : Activision vient de confirmer la date de sortie de Transformers Fall of Cybertron pour le 28 aout prochain. Nous vous avions présenté Transformers Fall of Cybertron lors des VGA 2012 au travers d’une vidéo à la sauce Western retraçant les heures les plus noires de la saga Transformers : « La chute de Cybertron ». …
                The Afternoon Sound Alternative 06-11-2014 with Dave Blackwood        
      Playlist:

      Dubmatix- Kingdom Dub - System Shakedown
      The Plates- Boom Boom Rockers - Punky Reggae
      Eccodek- In My Tribe - Singing In Tongues
      Srikalogy- Little Warrior Feat Malia Kulp - New Paradigm
      Bibio- Dye The Water Green - The Green EP
      Anoushka Shankar- Indian Summer - Traces Of You
      Juana Molina- Eras - Wed 21
      Howie B- Down With The Dawn - Down With The Dawn
      Plaid- Ropen - Reachy Prints
      Matthew E White- Hot Hot Hot - Outer Face EP
      The Budos Band- Budos Theme - The Budos Band
      Quantic- Magnetica - Magnetica
      William Onyeabor- Fantastic Man - World Psychedelic Classics 5 Who Is William Onyeabor
      Compilation- Outa Space - Love Funk 2 12 More Classic Funk Hits
      Hansimoto- Kwestfest - Mixtape Vol 1
      Trentemller- Constantinople - Lost
      Karol Conka- Vola - Batuk Freak
      Met Met- Exu - MetaL MetaL
      Shaheed DJ Supreme- Right Now - Knowledge Rhythm And Understanding
      - Aint It Funky Now - The Soul Fire Box Set
      Diane Coffee- Never Lonely - My Friend Fish
      - voicebreak -
      Death- Keep On Knocking - For The Whole World To See
      Death- North Street - III
      - voicebreak -
      Les Claypools Duo De Twang- Stayin Alive - Four Foot Shack
      The Kinks- Dancing In The Street - Kinda Kinks
      - voicebreak -
      Kurt Vile- Shame Chamber - Wakin On A Pretty Daze
      The Black Angels- The Occurance At 4507 South Third Street - Clear Lake Forest
      Gringo Star- In The Heat - Floating Out To See
      Black Lips- DriveBy Buddy - Underneath The Rainbow
      Ponds Fleshman- Here Comes The Summer - Better Days EP
      TOBACCO- Good Complexion - Ultima II Massage
      The Low Frequency In Stereo- Cybernautic - Pop Obskura
      The GOASTT- Moth To A Flame - Midnight Sun
      Chad VanGaalen- Monster - Shrink Dust
      Mr Scruff- Where Am I - Friendly Bacteria


      playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/35/playlistDate/2014-06-11
                The Afternoon Sound Alternative 02-19-2014 with Dave Blackwood        
      Playlist:

      Father John Misty- Only Son Of The Ladies Man - Fear Fun
      Foxygen- On Blue Mountain - We Are The 21st Century Ambassadors Of Peace Magic
      Bill Callahan- America - Apocalypse
      Friends Of Dean Martinez- Inner Sanctum - Atardecer
      Bob Marley The Wailers- Soul Rebel - Africa Unite The Singles Collection
      Various Artists- Lively Up Yourself Bombay Dub Orchestra Remix - Bob Marley And The Wailers Roots Rock Remixed
      The Clash- Police Thieves - Hits Back
      Obits- Light Sweet Crude - I Blame You
      Courtney Barnett- Avant Gardener - The Double EP A Sea Of Split Peas
      - voicebreak -
      Damien Jurado- Silver Timothy - Brothers And Sisters Of The Eternal Son
      Cass McCombs- Big Wheel - Big Wheel And Others
      Mogwai- Remurdered - Rave Tapes
      Battles- Toddler - Gloss Drop
      - Stolen Youth - Zen A Ninja TuneBig Dada Sampler 2013
      Ghostpoet- Them Waters - Some Say I So I Say Light
      Dbruit Alsarah- Hawya - Aljawal
      Skip Die- Killing Aid - Riots In The Jungle
      Sounds From The Ground- Catching Over Light - Tribes
      Devo- Jocko Homo - Hardcore Devo Vol1 7477
      The Low Frequency In Stereo- Cybernautic - Pop Obskura
      Cibo Matto- Emerald Tuesday - Hotel Valentine
      Future Bible Heroes- Keep Your Children In A Coma - Partygoing
      Diane Coffee- New Years - My Friend Fish
      The Fall- Mexico Wax Solvent - Your Future Our Clutter
      - voicebreak -
      Beats Antique- Kismat feat Alam Khan - A Thousand Faces Act 1
      Sharon Jones The DapKings- Retreat - Give The People What They Want
      Various Artists- The Skatalites malcom X - The Rough Guide To Ska
      Peter Gabriel- The Family And The Fishing Net - Peter Gabriel 4 Security Remastered
      Talking Heads- I Zimbra - Popular Favorites 19761992 Sand In The Vaseline
      Tipsy- Hard Petting - UhOh
      Deadbeat- May Rotten Roots - Eight


      playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/35/playlistDate/2014-02-19
                The Afternoon Sound Alternative 02-12-2014 with Dave Blackwood        
      Playlis