Monday, December 26, 2016
Sunday, December 25, 2016
What is Metadata? | ExpressVPN
Originally shared by Government GangStalking and Electronic Harassment
https://www.expressvpn.com/internet-privacy/guides/metadata-mean/
https://www.expressvpn.com/internet-privacy/guides/metadata-mean/
What Is Off-the-Record Messaging (OTR)? | ExpressVPN
Originally shared by Government GangStalking and Electronic Harassment
https://www.expressvpn.com/internet-privacy/otr/
https://www.expressvpn.com/internet-privacy/otr/
Friday, December 23, 2016
Wednesday, December 21, 2016
DID YOU KNOW THAT CASHIERS CAN BE REPLACED WITH ROBOTS ?
Originally shared by Government GangStalking and Electronic Harassment
DID YOU KNOW THAT CASHIERS CAN BE REPLACED WITH ROBOTS ?
http://investmentwatchblog.com/no-more-cashiers-watch-the-new-checkout-robot-that-can-scan-and-bag-all-your-groceries-then-take-your-payment/
DID YOU KNOW THAT CASHIERS CAN BE REPLACED WITH ROBOTS ?
http://investmentwatchblog.com/no-more-cashiers-watch-the-new-checkout-robot-that-can-scan-and-bag-all-your-groceries-then-take-your-payment/
ALSO SEE
Originally shared by Government GangStalking and Electronic Harassment
ALSO SEE
https://www.youtube.com/watch?v=6MKlxC41mfU
https://www.youtube.com/watch?v=KTDGFzPAI2Q
https://www.youtube.com/watch?v=dXdCptD6HoM
https://www.youtube.com/watch?v=nOGpFJnLP3A
https://www.youtube.com/watch?v=mxxxcLi2FVw
https://www.youtube.com/watch?v=X8tGVy9LJRE
https://www.youtube.com/watch?v=n8LMyRqBViM
https://www.youtube.com/watch?v=D-3LM0FbDSs
https://www.youtube.com/watch?v=AWNykj-lb-I
https://www.youtube.com/watch?v=X8tGVy9LJRE
https://www.youtube.com/watch?v=uO0Q7SMZvfg
https://www.youtube.com/watch?v=nOGpFJnLP3A
https://www.youtube.com/watch?v=bfs25NijwwA
https://www.youtube.com/watch?v=EC1CFndkdgk
https://www.youtube.com/watch?v=lMWbjQE-Ldo
https://www.youtube.com/watch?v=zpicVWbPatk
https://www.youtube.com/watch?v=7KpnkOUolfw
ALSO SEE
https://www.youtube.com/watch?v=6MKlxC41mfU
https://www.youtube.com/watch?v=KTDGFzPAI2Q
https://www.youtube.com/watch?v=dXdCptD6HoM
https://www.youtube.com/watch?v=nOGpFJnLP3A
https://www.youtube.com/watch?v=mxxxcLi2FVw
https://www.youtube.com/watch?v=X8tGVy9LJRE
https://www.youtube.com/watch?v=n8LMyRqBViM
https://www.youtube.com/watch?v=D-3LM0FbDSs
https://www.youtube.com/watch?v=AWNykj-lb-I
https://www.youtube.com/watch?v=X8tGVy9LJRE
https://www.youtube.com/watch?v=uO0Q7SMZvfg
https://www.youtube.com/watch?v=nOGpFJnLP3A
https://www.youtube.com/watch?v=bfs25NijwwA
https://www.youtube.com/watch?v=EC1CFndkdgk
https://www.youtube.com/watch?v=lMWbjQE-Ldo
https://www.youtube.com/watch?v=zpicVWbPatk
https://www.youtube.com/watch?v=7KpnkOUolfw
FOR THOSE WHO ARE FASCINATED BY THE SUBJECT MATTER AS MUCH AS I AM
Originally shared by Government GangStalking and Electronic Harassment
FOR THOSE WHO ARE FASCINATED BY THE SUBJECT MATTER AS MUCH AS I AM
I AM A COMPUTER GEEK... I CAN'T HELP MYSELF...
ALSO SEE
https://www.youtube.com/watch?v=HQJMg6FdcvQ
Defeating The Hackers - BBC Documentary
https://www.youtube.com/watch?v=Y47m1cOyKjA
Discovery Channel - The Secret History Of Hacking
https://www.youtube.com/watch?v=GWr5kbHt_2E
Can you hack it? Hacking Documentary
https://www.youtube.com/watch?v=TVgJmAJsOeQ
The Life of Hackers [Full Documentary]
https://www.youtube.com/watch?v=gPz1OG4ih_o
Web Warriors - CBC Hacking Documentary
https://www.youtube.com/watch?v=SVgle2Dh0Fk
How Anonymous Hackers Changed the World [Full Documentary]
https://www.youtube.com/watch?v=gpvcc9C8SbM
Anonymous - The Story of Aaron Swartz Full Documentary
https://www.youtube.com/watch?v=F8uuRSfDqiU
Code 2600 - Computer History, Hacking and Surveillance Documentary
https://www.youtube.com/watch?v=5ZgBvkFrPrU
Hackers: Outlaws and Angels Full Documentary
https://www.youtube.com/watch?v=JexQv7-A2D0
Hacker Documentary Hackers 1995 by Phon E and R F Burns
https://www.youtube.com/watch?v=78hlL_UMb54
We Are Legion - The Story of the Anonymous Hacktivists
https://www.youtube.com/watch?v=6qpudAhYhpc
ALGORITHM: The Hacker Movie
https://www.youtube.com/watch?v=fXcvTYZGp5s
FOR THOSE WHO ARE FASCINATED BY THE SUBJECT MATTER AS MUCH AS I AM
I AM A COMPUTER GEEK... I CAN'T HELP MYSELF...
ALSO SEE
https://www.youtube.com/watch?v=HQJMg6FdcvQ
Defeating The Hackers - BBC Documentary
https://www.youtube.com/watch?v=Y47m1cOyKjA
Discovery Channel - The Secret History Of Hacking
https://www.youtube.com/watch?v=GWr5kbHt_2E
Can you hack it? Hacking Documentary
https://www.youtube.com/watch?v=TVgJmAJsOeQ
The Life of Hackers [Full Documentary]
https://www.youtube.com/watch?v=gPz1OG4ih_o
Web Warriors - CBC Hacking Documentary
https://www.youtube.com/watch?v=SVgle2Dh0Fk
How Anonymous Hackers Changed the World [Full Documentary]
https://www.youtube.com/watch?v=gpvcc9C8SbM
Anonymous - The Story of Aaron Swartz Full Documentary
https://www.youtube.com/watch?v=F8uuRSfDqiU
Code 2600 - Computer History, Hacking and Surveillance Documentary
https://www.youtube.com/watch?v=5ZgBvkFrPrU
Hackers: Outlaws and Angels Full Documentary
https://www.youtube.com/watch?v=JexQv7-A2D0
Hacker Documentary Hackers 1995 by Phon E and R F Burns
https://www.youtube.com/watch?v=78hlL_UMb54
We Are Legion - The Story of the Anonymous Hacktivists
https://www.youtube.com/watch?v=6qpudAhYhpc
ALGORITHM: The Hacker Movie
https://www.youtube.com/watch?v=fXcvTYZGp5s
Tuesday, December 20, 2016
Sunday, December 18, 2016
How Hackers Really Crack Your Passwords – InvestmentWatch
Originally shared by Government GangStalking and Electronic Harassment
http://investmentwatchblog.com/how-hackers-really-crack-your-passwords/
http://investmentwatchblog.com/how-hackers-really-crack-your-passwords/
Thursday, December 15, 2016
Snowden: New Law Gives Govt Secret Backdoor To All Tech – InvestmentWatch
Originally shared by Government GangStalking and Electronic Harassment
http://investmentwatchblog.com/snowden-new-law-gives-govt-secret-backdoor-to-all-tech/
http://investmentwatchblog.com/snowden-new-law-gives-govt-secret-backdoor-to-all-tech/
Wednesday, December 14, 2016
LEARN MORE ABOT GOOLGE FROM ONE OF OUR OWN
LEARN MORE ABOT GOOLGE FROM ONE OF OUR OWN
Julian Assange about Google Meeting Must
https://www.youtube.com/watch?v=hDgIyKBP6vA
Julian Assange about Google Meeting Must
https://www.youtube.com/watch?v=hDgIyKBP6vA
Saturday, December 3, 2016
Understanding Spamming on Google+

Originally shared by John Skeats
Understanding Spamming on Google+
A lot of people find themselves in trouble on Google+ because they have serious misunderstandings about spamming. Let me start with two of the most common misunderstandings and then get to the facts about what spamming is. I'll close with the "secret" to avoid being flagged as a spammer.
Misconception #1: Spamming involves sharing promotional content.
The most common misconception -- and the one that leads many people who have no intention to spam to be flagged as spammers -- is that spamming involves sharing promotional content. Who the content (a post or comment) is shared with, how content is shared, and the overall sharing behavior of the person sharing the content play a much greater role in determining whether content is viewed as spam or not. Any post (even this one) could be spam.
Misconception #2: You can determine what is or is not spam simply by looking at it.
This comes down to the same point as Misconception #1: the fact that spamming is generally determined by how content is shared, who the content is shared with, and the overall behaviors of the person sharing the content. You can sometimes recognize that content is spam based on its context (e.g., an off-topic post shared in a community), but you cannot determine that a post is not spam by looking at it even in context. For example, you cannot tell by looking at this post whether I shared it excessively in a spammer-like manner, which would make it spam. You therefore cannot judge by simply looking at a flagged post whether the Google+ spam filters flagged the post appropriately or not.
Misconception #3: Political and religious posts are treated differently by the spam filters.
People with all political views and from all religions often complain that their posts on those subjects are being flagged because of their political or religious views. That's not true. The reasons for their posts being flagged are the issues discussed in the remainder of this post, all of which are conspicuously apolitical and non-denominational.
What is spamming?
At the highest level, spamming is delivering unwanted content to significant numbers of people. It is generally not about what the content itself is other than to the degree that the content is delivered to people who do or do not want to receive it.
Assuming a post doesn't violate any other rules, it might be perfectly fine when shared with one audience but spam when shared with others. It might even be perfectly fine if shared one way with an audience but spam if shared in different manner. Or a post might be perfectly fine if shared individually with different audiences but become spam if shared with all of them. On top of that, a person's overall sharing behavior could make whatever they might share at that moment unwanted.
Let's assume for the remaining discussion that we are talking about a great post that doesn't violate any of the rules in Google’s User Content and Conduct Policy (http://www.google.com/+/policy/content.html) other than the spamming rule.
Sharing that hypothetical post with specific circles, a collection, or Public would not be spamming unless options I will mention in the next two paragraphs were selected. Sharing the post in a community could be either perfectly acceptable or spamming depending on whether the post complies with the community's rules. (Remember that each community has its own rules in addition to Google's rules.) The community's rules are a consideration because community posts are presented to all members of a community. Members joined the community with the expectation that they would receive only posts through the community that comply with the community's rules. Therefore, any post delivered to the members through the community that violates the rules is implicitly unwanted by the membership -- and therefore spam.
As I said, there are options in classic Google+ that one can choose which can make sharing the same post with the same audience a form of spamming. If you select the option to send emails when sharing a non-community post in classic Google+, that runs a high risk of changing acceptable sharing into spamming. Without that option, your posts will be displayed only to people who follow you. They made the decision to follow you, so that's okay unless there are more general issues (which I'll talk about in a moment). Selecting that option, however, can force emails and notifications to people who might not want to receive them. It's spamming if you trigger unwanted emails or notifications, so using that option can lead you to being flagged for spamming.
A similar problem would occur if you were to add Extended circles, Your circles, or the names of specific circles when sharing with Public in classic Google+. That can also trigger unwanted notifications to anyone in the groups you added to Public -- and therefore be spamming.
Fortunately, both of the possibilities I just mentioned have been eliminated in the new Google+ to avoid the problems I discussed.
The next problem involves the same post being delivered to the same people multiple times. No one (at least virtually no one) wants to see the same content repetitively. The issue with sharing content with multiple audiences each of whom it might have been reasonable to share a post with arises when there is overlap in the audiences. Sharing the same post to multiple collections or communities is an issue because there is a very high probability that the same people follow more than one of a person's collections or are members of the same communities the poster wants to share to. As a result, those people could see one instance of the post for each of the collections or communities the post was shared with. That's just as bad as if you explicitly shared the same post with them multiple times -- and therefore considered to be a form of spamming.
Yet another issue relates to the fact that virtually no one wants to see their Home streams or the streams of the communities they join dominated by posts by a single individual. Therefore, the sheer volume of posts one shares can become a spamming issue. When a person shares too many posts in too short a period of time -- even if they might be shared with what appear to be different audiences, it presents a high probability that people would see an excessive number of posts by that person, which would be perceived as spamming.
Note that while I have spoken thus far about sharing "the same post," all of the above applies to sharing posts that are substantially similar. Making relatively minor changes to posts doesn't prevent them from being perceived as being the same -- and therefore as spam -- by recipients. The same applies when people include similar blocks of text frequently. This is especially true if the blocks of text contain the same or substantially similar links (e.g., links to different posts in the same blog). One common practice that gets people into trouble this way is including a "signature block" in their posts because they can be picked up by the spam filters as substantially similar content.
I have focused primarily on posts thus far, but there are still other things that can lead to a person being viewed as a spammer:
* Sharing the same or substantially comments too frequently -- because the same people are likely to see the repetition.
* Excessive commenting in a community -- again, because no one wants to see a community dominated by one individual.
* Excessive +1ing -- because one's +1s become meaningless when used excessively. It also appears to Google as an attempt to manipulate rankings.
How to avoid being flagged as a spammer
The secret for avoiding being flagged for spamming lies in the statement I made about spamming earlier: "At the highest level, spamming is delivering unwanted content to significant numbers of people." The most important word in that sentence is "unwanted." You have to look at sharing from the eyes of the recipients.
It doesn't matter that you want to share a message. It matters whether the recipients will welcome that message. That means not only whether they would welcome the message overall but whether they would welcome another instance of the message (if you were sharing it repeatedly) and whether they would welcome it in the context of other things you might have shared recently. If the answer is "no" to any of those conditions even for just a few recipients), sharing the post or comment would be spamming -- so don't share it (or at least don't share it at that moment).
Thursday, December 1, 2016
Trump Block: Google Chrome extension Filters out Trump - Makes Internet Great Again! | The Daily Liberator
Originally shared by Government GangStalking and Electronic Harassment
http://www.thedailyliberator.com/trump-block-google-chrome-extension-filters-trump-makes-internet-great/
http://www.thedailyliberator.com/trump-block-google-chrome-extension-filters-trump-makes-internet-great/
Tuesday, November 29, 2016
http://www.truthandaction.org/consumers-beware-apples-encryption-lie/
Originally shared by Government GangStalking and Electronic Harassment
http://www.truthandaction.org/consumers-beware-apples-encryption-lie/
Consumers Beware: Apple’s Encryption Is A Lie
http://www.truthandaction.org/consumers-beware-apples-encryption-lie/
http://www.truthandaction.org/consumers-beware-apples-encryption-lie/
Consumers Beware: Apple’s Encryption Is A Lie
http://www.truthandaction.org/consumers-beware-apples-encryption-lie/
Monday, November 28, 2016
Sunday, November 27, 2016
Saturday, November 26, 2016
Friday, November 25, 2016
OH.. SHIT
OH.. SHIT
THIS WINDOWS 10 IS ONE MEAN SPYING KEYLOGGER...
http://investmentwatchblog.com/microsoft-gives-third-parties-access-to-windows-10-telemetry-data/
THIS WINDOWS 10 IS ONE MEAN SPYING KEYLOGGER...
http://investmentwatchblog.com/microsoft-gives-third-parties-access-to-windows-10-telemetry-data/
Thursday, November 17, 2016
Wednesday, November 16, 2016
Tuesday, November 15, 2016
The German Flying Saucers
Originally shared by Government GangStalking and Electronic Harassment
https://www.gaia.com/video/german-flying-saucers?utm_source=ambassador&utm_medium=evchron&utm_campaign=aff&utm_content=&utm_term=&ch=st
https://www.gaia.com/video/german-flying-saucers?utm_source=ambassador&utm_medium=evchron&utm_campaign=aff&utm_content=&utm_term=&ch=st
Thursday, November 3, 2016
Sunday, October 23, 2016
Tuesday, October 4, 2016
Google+ Web Updates Oct 4

Originally shared by Luke Wroblewski
Google+ Web Updates Oct 4
Following our series of news about Google+ for Work, new G+ management tools, and more over the past few weeks, we're returning to addressing common points of feedback & requests with a few Google+ Web updates:
* Turn animated comments (as seen on all streams) on and off.
* View poll results from the post menu (even if you haven't voted yet)
As always, please keep sending us your ideas/issues using the Send Feedback menu item.
Thanks~
Monday, October 3, 2016
Monday, September 26, 2016
IF YOU WANTED TO KNOW MORE ABOUT THIS "PRISM" THING
Originally shared by Government GangStalking and Electronic Harassment
IF YOU WANTED TO KNOW MORE ABOUT THIS "PRISM" THING
https://nsa.gov1.info/dni/prism.html
IF YOU WANTED TO KNOW MORE ABOUT THIS "PRISM" THING
https://nsa.gov1.info/dni/prism.html
XKeyscore: NSA tool collects 'nearly everything a user does on the internet' | US news | The Guardian
Originally shared by Government GangStalking and Electronic Harassment
https://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data
https://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data
https://thehackernews.com/2016/07/snowden-iphone-hacking.html
Originally shared by Government GangStalking and Electronic Harassment
https://thehackernews.com/2016/07/snowden-iphone-hacking.html
Edward Snowden Designs an iPhone Case to Detect & Block Wireless Snooping
Thursday, July 21, 2016
https://thehackernews.com/2016/07/snowden-iphone-hacking.html
https://thehackernews.com/2016/07/snowden-iphone-hacking.html
Edward Snowden Designs an iPhone Case to Detect & Block Wireless Snooping
Thursday, July 21, 2016
https://thehackernews.com/2016/07/snowden-iphone-hacking.html
10 Best Antivirus Protection your Computer of 2016
Originally shared by Government GangStalking and Electronic Harassment
https://techcus.com/p/B1D7S1_dK/10-best-antivirus-protection-your-computer-of-2016
https://techcus.com/p/B1D7S1_dK/10-best-antivirus-protection-your-computer-of-2016
WHAT A GEM THIS IS
Originally shared by Government GangStalking and Electronic Harassment
WHAT A GEM THIS IS
SURF,..LEARN..ENJOY
SEE AN EXPLANATION OF IT IN THE 2013 VERSION
http://apps.washingtonpost.com/g/page/national/inside-the-2013-us-intelligence-black-budget/420/
https://nsa.gov1.info/dni/nsa-ant-catalog/index.html
WHAT A GEM THIS IS
SURF,..LEARN..ENJOY
SEE AN EXPLANATION OF IT IN THE 2013 VERSION
http://apps.washingtonpost.com/g/page/national/inside-the-2013-us-intelligence-black-budget/420/
https://nsa.gov1.info/dni/nsa-ant-catalog/index.html
A BIT OF HOW “THEY” DO THEIR EVIL SPOOKY SPYING ACTIVITIES https://nsa.gov1.info/dni/petrobras-video.html
Originally shared by Government GangStalking and Electronic Harassment
A BIT OF HOW “THEY” DO THEIR EVIL SPOOKY SPYING ACTIVITIES https://nsa.gov1.info/dni/petrobras-video.html
https://nsa.gov1.info/dni/petrobras-video.html
A BIT OF HOW “THEY” DO THEIR EVIL SPOOKY SPYING ACTIVITIES https://nsa.gov1.info/dni/petrobras-video.html
https://nsa.gov1.info/dni/petrobras-video.html
Sunday, September 25, 2016
Microsoft has filed a patent for a "mediation component" that records everything you type in every application and...
Originally shared by Wayne Radinsky
Microsoft has filed a patent for a "mediation component" that records everything you type in every application and sends it to Bing/Cortana as part of your search query the next time you do a search. "The search engine (e.g., Bing and Cortana) uses contextual rankers to adjust the default ranking of the default suggested queries to produce more relevant suggested queries for the point in time. The operating system, comprising the function of mediation component, tracks all textual data displayed to the user by any application, and then performs clustering to determine the user intent (contextually)."
Keep in mind this is a patent and not a product feature and most patents never see the light of day.
http://hothardware.com/news/microsoft-patents-big-brother-ai-to-monitor-everything-you-do-in-windows
Microsoft has filed a patent for a "mediation component" that records everything you type in every application and sends it to Bing/Cortana as part of your search query the next time you do a search. "The search engine (e.g., Bing and Cortana) uses contextual rankers to adjust the default ranking of the default suggested queries to produce more relevant suggested queries for the point in time. The operating system, comprising the function of mediation component, tracks all textual data displayed to the user by any application, and then performs clustering to determine the user intent (contextually)."
Keep in mind this is a patent and not a product feature and most patents never see the light of day.
http://hothardware.com/news/microsoft-patents-big-brother-ai-to-monitor-everything-you-do-in-windows
Saturday, September 24, 2016
How Carnivore Worked
Originally shared by Government GangStalking and Electronic Harassment
http://computer.howstuffworks.com/carnivore2.htm
http://computer.howstuffworks.com/carnivore2.htm
Thursday, July 21, 2016
Wednesday, July 20, 2016
It only takes $26 to hack voting machine - Technology & science - Security | NBC News
Originally shared by Government GangStalking and Electronic Harassment
http://www.nbcnews.com/id/44706301/ns/technology_and_science-security
http://www.nbcnews.com/id/44706301/ns/technology_and_science-security
Monday, July 18, 2016
IF THE SIMPLE FOLKS CAN GET TO PLAY WITH FREE APPS THAT CAN ACTUALLY READ A PERSON'S MIND, THEN YOU CAN IMAGINE WHAT...
Originally shared by Government GangStalking and Electronic Harassment
IF THE SIMPLE FOLKS CAN GET TO PLAY WITH FREE APPS THAT CAN ACTUALLY READ A PERSON'S MIND, THEN YOU CAN IMAGINE WHAT TYPE OF ANALOGOUS - BUT MORE SOPHISTICATED- MIND READING APPS THE GANG STALKERS CAN PLAY WITH WHILE THEY ARE STALKING US WITH THEIR CELL PHONE WEAPONS.
HERE,..THERE IS MORE ON THIS:
http://www.armindreader.com/
SOMEONE PLEASE TELL ME HOW DO THEY WORK AND IF THEY ARE JUST TOYS FOR THE MASSES, WHILE PROFESSIONALS, SUCH AS GANG STALKERS, GET TO PLAY WITH THE REAL MIND READING KAHUNAS IN A CELL PHONE FORM..
http://www.mobango.com/mind-scanner-free/?cid=1754568&catid=11
IF THE SIMPLE FOLKS CAN GET TO PLAY WITH FREE APPS THAT CAN ACTUALLY READ A PERSON'S MIND, THEN YOU CAN IMAGINE WHAT TYPE OF ANALOGOUS - BUT MORE SOPHISTICATED- MIND READING APPS THE GANG STALKERS CAN PLAY WITH WHILE THEY ARE STALKING US WITH THEIR CELL PHONE WEAPONS.
HERE,..THERE IS MORE ON THIS:
http://www.armindreader.com/
SOMEONE PLEASE TELL ME HOW DO THEY WORK AND IF THEY ARE JUST TOYS FOR THE MASSES, WHILE PROFESSIONALS, SUCH AS GANG STALKERS, GET TO PLAY WITH THE REAL MIND READING KAHUNAS IN A CELL PHONE FORM..
http://www.mobango.com/mind-scanner-free/?cid=1754568&catid=11
Sunday, July 17, 2016
Friday, July 15, 2016
10 Open-Source JavaScript Data Chart Libraries Worth Considering - http://buff.ly/29yfXam

Originally shared by Apiumhub
10 Open-Source JavaScript Data Chart Libraries Worth Considering - http://buff.ly/29yfXam
Wednesday, July 13, 2016
Members of the public will no longer be allowed to access video obtained by law enforcement officers in North...
Originally shared by Infowars - Alex Jones Channel
Members of the public will no longer be allowed to access video obtained by law enforcement officers in North Carolina, under a new bill recently passed into law.
http://www.infowars.com/new-bill-blocks-police-footage-from-public/
Members of the public will no longer be allowed to access video obtained by law enforcement officers in North Carolina, under a new bill recently passed into law.
http://www.infowars.com/new-bill-blocks-police-footage-from-public/
Russia develops hypersonic nuclear space bomber
Originally shared by THE RESISTANCE
Russia develops hypersonic nuclear space bomber
http://www.pravdareport.com/russia/kremlin/13-07-2016/134999-russia_space_bomber-0/
Russia develops hypersonic nuclear space bomber
http://www.pravdareport.com/russia/kremlin/13-07-2016/134999-russia_space_bomber-0/
Understanding the WordPress File and Directory Structure
Originally shared by 34SP.com Ltd
Understanding the WordPress File and Directory Structure
Although it is not necessary to learn code or to understand the file and directory structure of your WordPress website, if you want to attain a higher degree of control over your site or be able to troubleshoot errors, you may want to take the time to start learning some of the basics.
Each WordPress install starts out with the same directory structure and core files. Every plugin or theme you install, every script you add, and every error screen that appears, is possible thanks to the CMS’s backbone.
This article on Elegant Themes reviews the contents of the most important WordPress folders, paying special attention to the core files that power your site. Are you ready to look under the hood? Here you go: http://gplnk.co/29x57lm
Do you need WordPress hosting?
With over 15 years in the hosting business we know precisely what it takes to provide rock solid, lightning fast WordPress websites. Our managed WordPress hosting platform was built from the ground up to offer the very best WordPress hosting at the most competitive price in the UK. Learn more: http://gplnk.co/291hO7I
#wordpress #developers #webdevelopment #cms
http://gplnk.co/29x57lm
Understanding the WordPress File and Directory Structure
Although it is not necessary to learn code or to understand the file and directory structure of your WordPress website, if you want to attain a higher degree of control over your site or be able to troubleshoot errors, you may want to take the time to start learning some of the basics.
Each WordPress install starts out with the same directory structure and core files. Every plugin or theme you install, every script you add, and every error screen that appears, is possible thanks to the CMS’s backbone.
This article on Elegant Themes reviews the contents of the most important WordPress folders, paying special attention to the core files that power your site. Are you ready to look under the hood? Here you go: http://gplnk.co/29x57lm
Do you need WordPress hosting?
With over 15 years in the hosting business we know precisely what it takes to provide rock solid, lightning fast WordPress websites. Our managed WordPress hosting platform was built from the ground up to offer the very best WordPress hosting at the most competitive price in the UK. Learn more: http://gplnk.co/291hO7I
#wordpress #developers #webdevelopment #cms
http://gplnk.co/29x57lm
How to extend Wi-Fi coverage throughout your whole home or office
Originally shared by Danie van der Merwe
How to extend Wi-Fi coverage throughout your whole home or office
Now that Wi-Fi is becoming an integral part of just about every new piece of consumer electronics, and even many appliances, it is more important than ever to have a usable wireless network throughout your home and office — and possibly your yard. Unfortunately, the typical ISP’s simplistic model of providing a single “all-in-one” modem+router+wireless gateway for your site quickly breaks down when faced with the real-world challenges of serving larger, or sprawling, homes or apartments. This is especially true for buildings with lots of wiring in the walls, lath and plaster walls, or metallic heating or air conditioning infrastructure in the floor or ceiling. The good news is that there are several ways to solve this problem, with varying costs and complexities.
An interesting article that does not delve into the depths of how to do each one, but does give a good overview of what the different options are that can be looked at. With broadband speeds, older WiFi repeaters and range extenders are no longer cutting it.
Mesh WiFi seems to be a good choice in terms of ease of setup and functionality (apart from not usually having extra LAN ports if you buy the typical commercial offerings). Two prominent names here are Eero and Luma. Luma does appear to be quite a bit less costly for 3 devices. Another option not named in the article is Open Mesh - they have optionally cheaper devices but these do come with lower hardware specs.
See http://www.extremetech.com/computing/223211-how-to-increase-wi-fi-coverage-throughout-your-whole-home-or-office
http://www.extremetech.com/computing/223211-how-to-increase-wi-fi-coverage-throughout-your-whole-home-or-office
How to extend Wi-Fi coverage throughout your whole home or office
Now that Wi-Fi is becoming an integral part of just about every new piece of consumer electronics, and even many appliances, it is more important than ever to have a usable wireless network throughout your home and office — and possibly your yard. Unfortunately, the typical ISP’s simplistic model of providing a single “all-in-one” modem+router+wireless gateway for your site quickly breaks down when faced with the real-world challenges of serving larger, or sprawling, homes or apartments. This is especially true for buildings with lots of wiring in the walls, lath and plaster walls, or metallic heating or air conditioning infrastructure in the floor or ceiling. The good news is that there are several ways to solve this problem, with varying costs and complexities.
An interesting article that does not delve into the depths of how to do each one, but does give a good overview of what the different options are that can be looked at. With broadband speeds, older WiFi repeaters and range extenders are no longer cutting it.
Mesh WiFi seems to be a good choice in terms of ease of setup and functionality (apart from not usually having extra LAN ports if you buy the typical commercial offerings). Two prominent names here are Eero and Luma. Luma does appear to be quite a bit less costly for 3 devices. Another option not named in the article is Open Mesh - they have optionally cheaper devices but these do come with lower hardware specs.
See http://www.extremetech.com/computing/223211-how-to-increase-wi-fi-coverage-throughout-your-whole-home-or-office
http://www.extremetech.com/computing/223211-how-to-increase-wi-fi-coverage-throughout-your-whole-home-or-office
This "Tesla baby" can produce enough power matching all power generation facilities in Russia when lightning is...
Originally shared by Alexander Light (HumansAreFree)
This "Tesla baby" can produce enough power matching all power generation facilities in Russia when lightning is discharged onto a platform: http://humansarefree.com/2015/09/teslas-legendary-tower-built-and-tested.html
This "Tesla baby" can produce enough power matching all power generation facilities in Russia when lightning is discharged onto a platform: http://humansarefree.com/2015/09/teslas-legendary-tower-built-and-tested.html
We present a new energy harvesting technology that generates electrical energy from a user’s interactions with...
Originally shared by IamChattyCathy
We present a new energy harvesting technology that generates electrical energy from a user’s interactions with paper-like materials. The energy harvesters are flexible, light, and inexpensive, and they utilize a user’s gestures such as tapping, touching, rubbing and sliding to generate energy. The harvested energy is then used to actuate LEDs, e-paper displays and other devices to create interactive applications for books and other printed media.
https://missiongalacticfreedom.wordpress.com/2016/06/
https://youtu.be/4WaUcXSfPTg
We present a new energy harvesting technology that generates electrical energy from a user’s interactions with paper-like materials. The energy harvesters are flexible, light, and inexpensive, and they utilize a user’s gestures such as tapping, touching, rubbing and sliding to generate energy. The harvested energy is then used to actuate LEDs, e-paper displays and other devices to create interactive applications for books and other printed media.
https://missiongalacticfreedom.wordpress.com/2016/06/
https://youtu.be/4WaUcXSfPTg
Nikola Tesla regarded the Earth as one of the plates of a capacitor, the ionosphere forming the other plate.
Originally shared by Alexander Light (HumansAreFree)
Nikola Tesla regarded the Earth as one of the plates of a capacitor, the ionosphere forming the other plate. Recent measurements have shown that the voltage gradient between the two is 400,000 volts.
With this principle, he said he was able, through his invention, to provide free energy to anyone, inexhaustible in quantity, anywhere on earth. That is why he had built a first prototype, the Wardenclyffe Tower, in which was to apply his famous pyramid effect: http://humansarefree.com/2014/04/the-amazing-connections-between-nikola.html
Nikola Tesla regarded the Earth as one of the plates of a capacitor, the ionosphere forming the other plate. Recent measurements have shown that the voltage gradient between the two is 400,000 volts.
With this principle, he said he was able, through his invention, to provide free energy to anyone, inexhaustible in quantity, anywhere on earth. That is why he had built a first prototype, the Wardenclyffe Tower, in which was to apply his famous pyramid effect: http://humansarefree.com/2014/04/the-amazing-connections-between-nikola.html
Tuesday, July 12, 2016
TechWorm » Latest Security News, Hacker News, Technology, Science and much more
Originally shared by Anon TH Hakürsec
http://www.techworm.net/2016
http://www.techworm.net/2016
Nobel Prize winning physicists have proven beyond doubt that the physical world is one large sea of energy that...
Originally shared by Alexander Light (HumansAreFree)
Nobel Prize winning physicists have proven beyond doubt that the physical world is one large sea of energy that flashes into and out of being in milliseconds, over and over again. Nothing is solid. This is the world of Quantum Physics: http://humansarefree.com/2014/03/the-world-of-quantum-physics-everything.html
Nobel Prize winning physicists have proven beyond doubt that the physical world is one large sea of energy that flashes into and out of being in milliseconds, over and over again. Nothing is solid. This is the world of Quantum Physics: http://humansarefree.com/2014/03/the-world-of-quantum-physics-everything.html
Published on Jul 12, 2016
Originally shared by Louie Pigeonmumbler
Published on Jul 12, 2016
--John Johnson, MIT PhD who runs an econometrics consultancy in Washington, D.C and co-author of Everydata: The Misinformation Hidden in the Little Data you Consume Every Day, joins David to discuss how to avoid falling prey to misinformation, including political polls and claims by advertisers
https://www.youtube.com/watch?v=0mG7u2eBvSg&feature=share
Published on Jul 12, 2016
--John Johnson, MIT PhD who runs an econometrics consultancy in Washington, D.C and co-author of Everydata: The Misinformation Hidden in the Little Data you Consume Every Day, joins David to discuss how to avoid falling prey to misinformation, including political polls and claims by advertisers
https://www.youtube.com/watch?v=0mG7u2eBvSg&feature=share
Monday, July 11, 2016
Vivaldi Browser updated for better privacy, more mouse gestures and improved hibernation on Linux
Originally shared by Danie van der Merwe
Vivaldi Browser updated for better privacy, more mouse gestures and improved hibernation on Linux
I've been using Vivaldi Browser Snapshot version full time for the last week and and really liking it. The key improvements for me personally have been the tweakable user interface. The real winner for me is being able to stack tabs as I have some that are related, and I can now just group them in once tab stack.
The only issues I've had are having to enable Flash properly (yes I still needed it to read my magazines on Zinio) and that it does not (yet?) sync any Google bookmarks (but I see a login screen for something like this). Some extensions like Tab Snooze, Pocket, etc do sync to the cloud so I can still happily move between browsers if I need to.
See https://vivaldi.net/en-US/teamblog/129-snapshot-1-3-534-3-better-privacy-more-mouse-gestures-and-improved-hibernation-on-linux
https://vivaldi.net/en-US/teamblog/129-snapshot-1-3-534-3-better-privacy-more-mouse-gestures-and-improved-hibernation-on-linux?utm_content=buffer15e56&utm_medium=social&utm_source=facebook.com&utm_campaign=buffer
Vivaldi Browser updated for better privacy, more mouse gestures and improved hibernation on Linux
I've been using Vivaldi Browser Snapshot version full time for the last week and and really liking it. The key improvements for me personally have been the tweakable user interface. The real winner for me is being able to stack tabs as I have some that are related, and I can now just group them in once tab stack.
The only issues I've had are having to enable Flash properly (yes I still needed it to read my magazines on Zinio) and that it does not (yet?) sync any Google bookmarks (but I see a login screen for something like this). Some extensions like Tab Snooze, Pocket, etc do sync to the cloud so I can still happily move between browsers if I need to.
See https://vivaldi.net/en-US/teamblog/129-snapshot-1-3-534-3-better-privacy-more-mouse-gestures-and-improved-hibernation-on-linux
https://vivaldi.net/en-US/teamblog/129-snapshot-1-3-534-3-better-privacy-more-mouse-gestures-and-improved-hibernation-on-linux?utm_content=buffer15e56&utm_medium=social&utm_source=facebook.com&utm_campaign=buffer
10 things that every new G+ user should know

Originally shared by Alex Garcia
10 things that every new G+ user should know
1) Who to share with.
https://plus.google.com/+AlexGarcia66/posts/Lr9GoEjLYa8
2) Who can comment on your public posts.'
If you are under 18, your default is only people in your circles can comment. Since you haven't added many people yet, most people can't reply to you. To change this, go to plus.google.com/settings
3) My posts are not showing in communities
https://plus.google.com/+JohnSkeats/posts/R9y9VtUPxSh
4) Posts in public communities are public.
Everyone that visit the community can see them.
Even if they are not community members.
They will show up in G+ search results.
5) I can't change my name.
There is a limit of 3 different names within a 90-day period.
You will have to wait.
6) I want to change my customised G+ URL.
Simple answer. You can't.
But there is only one hope.
Use the Send Feedback feature from the account that owns the URL and explain what you want and why. You will rarely be successful and almost never you will get an answer, but all you can do is try.
7) Do not set audience restrictions by country or age, unless you really have a valid reason to do that.
https://plus.google.com/+PeggyKTC/posts/hcsMkNfD7cD
8) Google plus settings
https://plus.google.com/+AlexGarcia66/posts/3YpGGugR3cb
9) None of the above
https://plus.google.com/+googleplus/posts/CyvUdPAtNfP
10) Still need help.
The official help articles
https://support.google.com/plus/?hl=en#topic=6320376
The official help community for G+ (not hangouts or youtube or photos or business or gmail or google account. See item 9)
https://plus.google.com/communities/115758385206378551362
Tuesday, July 5, 2016
Sunday, July 3, 2016
A water-filled upright human is a sizeable antenna.
Originally shared by Alexander Light (HumansAreFree)
A water-filled upright human is a sizeable antenna. And since all moving electrons generate electrical current, all those electromagnetic waves inundating our everyday lives pass into our bodies, where they each generate an electric current.
These induced electric currents change the charge on which our complex bioelectrical body/brain/heart network operates to maintain our health and vitality.
Microwaves at 1/10th British safety guidelines emit frequencies causing the biggest changes in cell calcium levels… as reported in the UK Daily Mail: http://humansarefree.com/2016/04/wireless-chemtrails-and-you.html
A water-filled upright human is a sizeable antenna. And since all moving electrons generate electrical current, all those electromagnetic waves inundating our everyday lives pass into our bodies, where they each generate an electric current.
These induced electric currents change the charge on which our complex bioelectrical body/brain/heart network operates to maintain our health and vitality.
Microwaves at 1/10th British safety guidelines emit frequencies causing the biggest changes in cell calcium levels… as reported in the UK Daily Mail: http://humansarefree.com/2016/04/wireless-chemtrails-and-you.html
Thursday, June 30, 2016
AND HIS NAME IS NOT IN ANY SCHOOL PSYCHICS BOOKS...!!

AND HIS NAME IS NOT IN ANY SCHOOL PSYCHICS BOOKS...!!
Go Figure ...Duhhh
NSA pretended to be Facebook in its effort to infect ‘millions’ of computers
Originally shared by Government GangStalking and Electronic Harassment
http://www.digitaltrends.com/web/nsa-pretended-facebook-spread-malware/
http://www.digitaltrends.com/web/nsa-pretended-facebook-spread-malware/
Military Micro bots Collecting DNA & Blood!
Originally shared by Government GangStalking and Electronic Harassment
https://www.youtube.com/watch?v=dX31hZwWOro
https://www.youtube.com/watch?v=dX31hZwWOro
Wednesday, June 29, 2016
DIY Tesla Coil Gun: The Best Mad Scientists Are Well-Grounded
Originally shared by Alien UFO Sightings
http://alien-ufo-sightings.com/2016/06/diy-tesla-coil-gun-best-mad-scientists-well-grounded/
http://alien-ufo-sightings.com/2016/06/diy-tesla-coil-gun-best-mad-scientists-well-grounded/
Tuesday, June 28, 2016
Microsoft Sued For Forced Windows 10 Upgrade
Originally shared by Jessie Williams
http://yournewswire.com/microsoft-sued-for-forced-windows-10-upgrade/
http://yournewswire.com/microsoft-sued-for-forced-windows-10-upgrade/
Thursday, June 23, 2016
OUCH..!! WTF..!!
OUCH..!! WTF..!!
THIS JUST IN FROM A VIEWER ..
THANKS JON
https://plus.google.com/115275046860947970953/posts
http://www.sciencealert.com/new-app-gives-you-health-advice-based-on-your-genes
THIS JUST IN FROM A VIEWER ..
THANKS JON
https://plus.google.com/115275046860947970953/posts
http://www.sciencealert.com/new-app-gives-you-health-advice-based-on-your-genes
Wednesday, June 22, 2016
Not to worry, for the NWO, a chip will be installed at birth of your children!
Originally shared by Frank Take
Not to worry, for the NWO, a chip will be installed at birth of your children! You will obey your masters or be terminated
http://arstechnica.com/tech-policy/2016/06/smile-youre-in-the-fbi-face-recognition-database/
Not to worry, for the NWO, a chip will be installed at birth of your children! You will obey your masters or be terminated
http://arstechnica.com/tech-policy/2016/06/smile-youre-in-the-fbi-face-recognition-database/
Tor team has been working hard to stop FBI from hacking the Onion browser and track users — The team is now gearing...
Originally shared by Ohne Sorg
Tor team has been working hard to stop FBI from hacking the Onion browser and track users — The team is now gearing up to create a hardened version of the Browser!
https://www.hackread.com/tor-teams-againt-fbi-hacking-exploit/
Tor team has been working hard to stop FBI from hacking the Onion browser and track users — The team is now gearing up to create a hardened version of the Browser!
https://www.hackread.com/tor-teams-againt-fbi-hacking-exploit/
Saturday, June 4, 2016
The BLOODY 'vampyre watch' brought to you by those who watch.... the evil WATCHERS ! ! ! ★★★
Originally shared by Dorothy G. Tyas
The BLOODY 'vampyre watch' brought to you by those who watch.... the evil WATCHERS ! ! ! ★★★
https://youtu.be/Yqu0FRT7PHA
The BLOODY 'vampyre watch' brought to you by those who watch.... the evil WATCHERS ! ! ! ★★★
https://youtu.be/Yqu0FRT7PHA
❤ HURRAH ! ! ! HURRAH ! ! ! HURRAH FOR BEL❤VED HUMANITY ! ! ! ❤
Originally shared by Dorothy G. Tyas
❤ HURRAH ! ! ! HURRAH ! ! ! HURRAH FOR BEL❤VED HUMANITY ! ! ! ❤
https://youtu.be/56j6ySv14rk
❤ HURRAH ! ! ! HURRAH ! ! ! HURRAH FOR BEL❤VED HUMANITY ! ! ! ❤
https://youtu.be/56j6ySv14rk
Wednesday, June 1, 2016
Drake and B O B admit to being Cloned.
Originally shared by Government GangStalking and Electronic Harassment
https://www.youtube.com/watch?v=H5CM1KrEIOE
https://www.youtube.com/watch?v=H5CM1KrEIOE
Monday, May 30, 2016
Sunday, May 29, 2016
#invention #futuristic #technology
Originally shared by Freze HD
#invention #futuristic #technology
https://youtu.be/A_SLGe34cq0?list=PL2ojy_uyDeR1L_kmHZmibHpMcAAvtNijB
#invention #futuristic #technology
https://youtu.be/A_SLGe34cq0?list=PL2ojy_uyDeR1L_kmHZmibHpMcAAvtNijB
Saturday, May 28, 2016
Installing rogue apps on iOS devices via SandJacking Attack http://www.hackinsight.org/news,612.html
Originally shared by Paweł Płocki
Installing rogue apps on iOS devices via SandJacking Attack http://www.hackinsight.org/news,612.html
http://www.hackinsight.org/news,612.html
Installing rogue apps on iOS devices via SandJacking Attack http://www.hackinsight.org/news,612.html
http://www.hackinsight.org/news,612.html
Bad idea but with Microsoft being heavy handed on forcing WIn 10 upgrade, leaving people with little option.
Originally shared by Dave S.
Bad idea but with Microsoft being heavy handed on forcing WIn 10 upgrade, leaving people with little option. Otherwise only knock I have with Win 10 is lack of control of updates (I upgraded to WIn 10 voluntarily from Win 7 and Win 8.1)
http://www.pcworld.com/article/3075729/windows/fearing-forced-windows-10-upgrades-users-are-disabling-critical-updates-at-their-own-risk.html
Bad idea but with Microsoft being heavy handed on forcing WIn 10 upgrade, leaving people with little option. Otherwise only knock I have with Win 10 is lack of control of updates (I upgraded to WIn 10 voluntarily from Win 7 and Win 8.1)
http://www.pcworld.com/article/3075729/windows/fearing-forced-windows-10-upgrades-users-are-disabling-critical-updates-at-their-own-risk.html
Will your computer still be able to run Windows 10?
Originally shared by PCMag
Will your computer still be able to run Windows 10?
http://www.extremetech.com/computing/229101-new-windows-10-update-will-change-hardware-requirements-for-the-first-time-since-2009
Will your computer still be able to run Windows 10?
http://www.extremetech.com/computing/229101-new-windows-10-update-will-change-hardware-requirements-for-the-first-time-since-2009
What a very interesting experiment: Researches randomly deposited 297 USB drives (aka USB stick, flash drive, thumb...

Originally shared by IamChattyCathy
What a very interesting experiment: Researches randomly deposited 297 USB drives (aka USB stick, flash drive, thumb drive) around the University of Illinois Urbana-Champaign campus. They wanted to see just how many, and how soon after dropping them off, they’d be collected by people.
Turns out that 48 percent of the drives were taken and inserted into computers. The report at theregister.co.uk says that in some cases, this was done minutes after the drives were left in the public spots.
Picking up a USB drive off the streets and plugging it into your computer is akin to picking up discarded food off a sidewalk and eating it. You just never know what kind of infection you’re going to get.
And what you might get is a virus crashing your computer or stealing your data. That USB stick could contain malware—either left in public as a prank, or innocently lost or discarded without the original owner knowing it’s infected.
Or…it might have been left in a public spot by a hacker with full intent of gaining control of your computer to collect your personal data and committing fraud, such as opening lines of credit in your name or emptying out your bank account.
The USB sticks for the study contained HTML files with embedded img tags. The tags allowed the researchers to track the USB activity, which is how they new that, for instance, one of them was plugged into a computer only six minutes after it was left to be “found.”
http://us-ads.openx.net/w/1.0/afr?auid=538280559&cb=0ba0b4249a&c.apdid=fiInstance_100920_3_9588698&r0=http://cdn.firstimpression.io/delivery/ck.php?oaparams=2__bannerid=4604__zoneid=100920__cb=0ba0b4249a__oadest=
Only 16 percent of the people who picked up the sticks actually scanned them to check for viruses before plugging them into their computers. And 68 percent simply inserted them without any regards to what they could get transferred into their computers.
Some users trusted that there was no harm.
Some plugged in the drive to seek out the owner.
Some intended to keep the stick.
Conclusion: A cybercriminal could easily take control of a business’s system by leaving a rigged USB drive in the parking lot, let alone get control of a personal computer by leaving the stick in any public place frequented by lots of people.
Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention.
Robert Siciliano personal security and identity theft expert and speaker is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen.
http://beforeitsnews.com/scandals/2016/05/dont-pick-up-that-usb-drive-2436279.html?utm_content=bufferc1928&utm_medium=social&utm_source=plus.google.com&utm_campaign=buffer
DO YOU WANT TO USE BITTORRENT ANONYMOUSLY.?
Originally shared by Government GangStalking and Electronic Harassment
DO YOU WANT TO USE BITTORRENT ANONYMOUSLY.?
TRY ONE OF THE VPN SERVICES ON THIS LIST
WHICH CAN COME IN HANDY IF YOU
WANT TO VISIT BLOCKED/CENSORED WEBSITES
DO LEARN:
HOW TO GET BETTER VPN SPEEDS AND PERFORMANCE
https://greycoder.com/vpn-speed/
AND ALSO IF YOU
WANT TO KEEP HACKERS AWAY WHILE I TRAVEL AND USE WIFI HOTSPOTS.--- HERE YOU CAN ALSO USE a password manager like Lastpass.
KEEP IN MIND THAT
VPN TRAFFIC CAN BE DECRYPTED THROUGH JUNIPER BUG
https://greycoder.com/10795-2/
ALSO DO NOTE ;
1- Privatoria
With prices starting as low as $1.90 per month, Privatoria offers one of the least expensive commercial VPN services for people who want to browse anonymously or circumvent online censorship. Here’s a look at its features, installation process and bandwidth speeds.
https://greycoder.com/review-of-privatorias-vpn-service/
2-THE BEST FREE AND LOW-COST VPN SERVICES FOR 2016
https://greycoder.com/best-free-and-low-cost-vpn-services-for-2016/
3-THE BEST FREE VPN TRIALS OF 2016
by Grey One • July 30, 2014
https://greycoder.com/best-free-vpn-trials/
4-A REVIEW OF NORDVPN FOR 2016
NORDVPN IN A NUTSHELL
NordVPN is an easy-to-use VPN service that provides several advanced features. These include anti-DNS leaking, Tor over VPN, “double encryption” and auto-shutdown of your Internet connection if the VPN connection breaks. The service’s pricing plans are competitive easy to understand. It has excellent installation instructions overall, although they could be better for Linux. Performance is generally good, but it can be slow on certain servers.
https://greycoder.com/nordvpn-review/
5-ExpressVPN has released a client for Linux! Under my tests, it appears to be a reliable application. It runs via the terminal, and allows you to choose switch VPN locations.
https://www.expressvpn.com/blog/expressvpn-app-for-linux/ (ExpressVPN for Linux Is Here and It’s Totally Awesome!
By Brad - April 1, 2016)
https://www.expressvpn.com/
6-PandaPow has released a plug-and-play VPN box for use in China.
https://pandapow.co/wifi/
7-PROXY.SH ANONYMOUS VPN SERVICE REVIEW
https://greycoder.com/proxy-sh-vpn-review/
8-PRIVATE INTERNET ACCESS VPN REVIEW
https://greycoder.com/private-internet-access-vpn-review/
9-IPVANISH LAUNCHES IPHONE APP
https://greycoder.com/ipvanish-launches-iphone-app/
10-THE BEST VPN PROVIDERS THAT OFFER DEDICATED IPS
https://greycoder.com/best-vpn-providers-offering-static-ips/
FINALLY, IF YOU WANT TO USE BITTORRENT ANONYMOUSLY REMEMBER THAT YOU CAN ALSO join Usenet
https://greycoder.com/the-best-usenet-providers/
BUT REMEMBER
HOW TO: PROTECT YOUR PRIVACY ON USENET
https://greycoder.com/how-to-protect-your-privacy-on-usenet/
ALSO SEE LINK BELOW FOR MORE INFO ON USENET
https://plus.google.com/+GovernmentGangStalkingandElectronicHarassment/posts/LpmNdAPBEoS
https://greycoder.com/best-vpn-service/
DO YOU WANT TO USE BITTORRENT ANONYMOUSLY.?
TRY ONE OF THE VPN SERVICES ON THIS LIST
WHICH CAN COME IN HANDY IF YOU
WANT TO VISIT BLOCKED/CENSORED WEBSITES
DO LEARN:
HOW TO GET BETTER VPN SPEEDS AND PERFORMANCE
https://greycoder.com/vpn-speed/
AND ALSO IF YOU
WANT TO KEEP HACKERS AWAY WHILE I TRAVEL AND USE WIFI HOTSPOTS.--- HERE YOU CAN ALSO USE a password manager like Lastpass.
KEEP IN MIND THAT
VPN TRAFFIC CAN BE DECRYPTED THROUGH JUNIPER BUG
https://greycoder.com/10795-2/
ALSO DO NOTE ;
1- Privatoria
With prices starting as low as $1.90 per month, Privatoria offers one of the least expensive commercial VPN services for people who want to browse anonymously or circumvent online censorship. Here’s a look at its features, installation process and bandwidth speeds.
https://greycoder.com/review-of-privatorias-vpn-service/
2-THE BEST FREE AND LOW-COST VPN SERVICES FOR 2016
https://greycoder.com/best-free-and-low-cost-vpn-services-for-2016/
3-THE BEST FREE VPN TRIALS OF 2016
by Grey One • July 30, 2014
https://greycoder.com/best-free-vpn-trials/
4-A REVIEW OF NORDVPN FOR 2016
NORDVPN IN A NUTSHELL
NordVPN is an easy-to-use VPN service that provides several advanced features. These include anti-DNS leaking, Tor over VPN, “double encryption” and auto-shutdown of your Internet connection if the VPN connection breaks. The service’s pricing plans are competitive easy to understand. It has excellent installation instructions overall, although they could be better for Linux. Performance is generally good, but it can be slow on certain servers.
https://greycoder.com/nordvpn-review/
5-ExpressVPN has released a client for Linux! Under my tests, it appears to be a reliable application. It runs via the terminal, and allows you to choose switch VPN locations.
https://www.expressvpn.com/blog/expressvpn-app-for-linux/ (ExpressVPN for Linux Is Here and It’s Totally Awesome!
By Brad - April 1, 2016)
https://www.expressvpn.com/
6-PandaPow has released a plug-and-play VPN box for use in China.
https://pandapow.co/wifi/
7-PROXY.SH ANONYMOUS VPN SERVICE REVIEW
https://greycoder.com/proxy-sh-vpn-review/
8-PRIVATE INTERNET ACCESS VPN REVIEW
https://greycoder.com/private-internet-access-vpn-review/
9-IPVANISH LAUNCHES IPHONE APP
https://greycoder.com/ipvanish-launches-iphone-app/
10-THE BEST VPN PROVIDERS THAT OFFER DEDICATED IPS
https://greycoder.com/best-vpn-providers-offering-static-ips/
FINALLY, IF YOU WANT TO USE BITTORRENT ANONYMOUSLY REMEMBER THAT YOU CAN ALSO join Usenet
https://greycoder.com/the-best-usenet-providers/
BUT REMEMBER
HOW TO: PROTECT YOUR PRIVACY ON USENET
https://greycoder.com/how-to-protect-your-privacy-on-usenet/
ALSO SEE LINK BELOW FOR MORE INFO ON USENET
https://plus.google.com/+GovernmentGangStalkingandElectronicHarassment/posts/LpmNdAPBEoS
https://greycoder.com/best-vpn-service/
INTERESTED IN A PRIVATE ALTERNATIVE INTERNET.
Originally shared by Government GangStalking and Electronic Harassment
INTERESTED IN A PRIVATE ALTERNATIVE INTERNET.
See Usenet. ?
BUT REMEMBER
HOW TO: PROTECT YOUR PRIVACY ON USENET
https://greycoder.com/how-to-protect-your-privacy-on-usenet/
If you are tech savvy, try Freenet or I2P.
Surf their info here , in the posted article
ALSO NOTE THE HELPFUL ARTICLES HERE:
1-THE BEST USENET CLIENT OF 2016
https://greycoder.com/best-usenet-client/
2-THE BEST FREE USENET SERVERS 2016
https://greycoder.com/best-free-usenet-servers/
3-THE BEST FREE USENET TRIALS OF 2016
https://greycoder.com/best-free-usenet-trials/
4-EASYNEWS NOW PROVIDES 1900 DAYS OF USENET
https://greycoder.com/easynews-now-provides-1900-days-usenet/
https://greycoder.com/the-best-usenet-providers/
INTERESTED IN A PRIVATE ALTERNATIVE INTERNET.
See Usenet. ?
BUT REMEMBER
HOW TO: PROTECT YOUR PRIVACY ON USENET
https://greycoder.com/how-to-protect-your-privacy-on-usenet/
If you are tech savvy, try Freenet or I2P.
Surf their info here , in the posted article
ALSO NOTE THE HELPFUL ARTICLES HERE:
1-THE BEST USENET CLIENT OF 2016
https://greycoder.com/best-usenet-client/
2-THE BEST FREE USENET SERVERS 2016
https://greycoder.com/best-free-usenet-servers/
3-THE BEST FREE USENET TRIALS OF 2016
https://greycoder.com/best-free-usenet-trials/
4-EASYNEWS NOW PROVIDES 1900 DAYS OF USENET
https://greycoder.com/easynews-now-provides-1900-days-usenet/
https://greycoder.com/the-best-usenet-providers/
How To: Configure Windows 10 Privacy Settings - GreyCoder
Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/how-to-configure-windows-10-privacy-settings/
https://greycoder.com/how-to-configure-windows-10-privacy-settings/
Freya is a fast and open replacement for Windows and OS X.
Freya is a fast and open replacement for Windows and OS X. It is Ubuntu Linux based. I’ve been using it for about a year now and I’ve found it to be fast and stable operating system.
A company like ThinkPenguin will pre-install Freya on a computer for you. This is the easiest way to switch to Linux.
To complete Freya, I recommend using Elementary Tweaks, and installing Numix Circle Icons.
If you need more privacy in your Operating System I suggest trying Tails or Knoppix.
https://greycoder.com/coming-soon-freya-elementary-os/
A company like ThinkPenguin will pre-install Freya on a computer for you. This is the easiest way to switch to Linux.
To complete Freya, I recommend using Elementary Tweaks, and installing Numix Circle Icons.
If you need more privacy in your Operating System I suggest trying Tails or Knoppix.
https://greycoder.com/coming-soon-freya-elementary-os/
WICKR: SEND SELF-DESTRUCTING, ENCRYPTED MESSAGES
WICKR: SEND SELF-DESTRUCTING, ENCRYPTED MESSAGES
Wickr is a free app for the iPhone that allows you to send self-destructing, private instant messages to your friends. You can send text messages, video and audio messages. The whole transmission process is private — even the Wickr app developers cannot read the message, because they are encrypted before they leave your device.
https://greycoder.com/wickr/
Wickr is a free app for the iPhone that allows you to send self-destructing, private instant messages to your friends. You can send text messages, video and audio messages. The whole transmission process is private — even the Wickr app developers cannot read the message, because they are encrypted before they leave your device.
https://greycoder.com/wickr/
THREE FREE ANTI-KEYLOGGING APPS FOR WINDOWS
THREE FREE ANTI-KEYLOGGING APPS FOR WINDOWS
Keyloggers are one of the most effective ways for hackers to steal private information. Here are some solutions for preventing keyloggers from compromising your Windows system.
Keyloggers come in two forms — those that are software-based and those that are embedded in hardware. The latter can only be installed by someone who has physical access to your computer, but the former could be placed on your system remotely through, for example, a malicious software download.
Once installed, keyloggers record every key stroke you make. Some also take screenshots to track what you click. They can then upload this information to any destination on the Internet.
Keyloggers can be hard to detect, but you can install software designed to thwart them. Most anti-keylogger programs work by intercepting key strokes at the system level and encrypting them before they reach a specific application. That way, if someone is monitoring your key strokes, the information he sees will be an encrypted jumble.
You can pay lots of money for anti-keylogger software, but a number of free solutions also exist, including the following:
Zemana: Designed for easy setup and protects all applications, not just the Web browser (as some other free anti-keyloggers do). The basic software is free but a paid premium version adds anti-malware services.
SpyShelter: Offers tools to prevent webcam and microphone hijacking in addition to comprehensive anti-keylogging.
NextGen AntiKeylogger: Easy installation, although the developers don’t provide a lot of details about how exactly the anti-keylogging feature works.
It goes without saying that the best way to prevent keylogging is to protect yourself from malicious software in the first place so that a keylogging package can’t install itself on your system. But if you want extra protection, a free anti-keylogging program can’t hurt.
https://greycoder.com/10450-2/
Keyloggers are one of the most effective ways for hackers to steal private information. Here are some solutions for preventing keyloggers from compromising your Windows system.
Keyloggers come in two forms — those that are software-based and those that are embedded in hardware. The latter can only be installed by someone who has physical access to your computer, but the former could be placed on your system remotely through, for example, a malicious software download.
Once installed, keyloggers record every key stroke you make. Some also take screenshots to track what you click. They can then upload this information to any destination on the Internet.
Keyloggers can be hard to detect, but you can install software designed to thwart them. Most anti-keylogger programs work by intercepting key strokes at the system level and encrypting them before they reach a specific application. That way, if someone is monitoring your key strokes, the information he sees will be an encrypted jumble.
You can pay lots of money for anti-keylogger software, but a number of free solutions also exist, including the following:
Zemana: Designed for easy setup and protects all applications, not just the Web browser (as some other free anti-keyloggers do). The basic software is free but a paid premium version adds anti-malware services.
SpyShelter: Offers tools to prevent webcam and microphone hijacking in addition to comprehensive anti-keylogging.
NextGen AntiKeylogger: Easy installation, although the developers don’t provide a lot of details about how exactly the anti-keylogging feature works.
It goes without saying that the best way to prevent keylogging is to protect yourself from malicious software in the first place so that a keylogging package can’t install itself on your system. But if you want extra protection, a free anti-keylogging program can’t hurt.
https://greycoder.com/10450-2/
WALLABAG: A FREE AND OPEN SOURCE REPLACEMENT FOR INSTAPAPER
WALLABAG: A FREE AND OPEN SOURCE REPLACEMENT FOR INSTAPAPER
Wallabag is a “a self hostable application for saving web pages”. Basically, it’s a free, secure, and open source alternative to services like Instapaper, Pocket and Readability.
SAVING WEB PAGES BECAME EASIER
https://greycoder.com/wallabag-free-open-source-replacement-instapaper/
Wallabag is a “a self hostable application for saving web pages”. Basically, it’s a free, secure, and open source alternative to services like Instapaper, Pocket and Readability.
SAVING WEB PAGES BECAME EASIER
https://greycoder.com/wallabag-free-open-source-replacement-instapaper/
AlternativeTo provides lists of software that can replace your existing software with better, more open substitutes.
AlternativeTo provides lists of software that can replace your existing software with better, more open substitutes. This well-organized site allows people to vote on the software choices.
https://alternativeto.net/
https://alternativeto.net/
Best Self Hosted Alternatives
Best Self Hosted Alternatives
Selfhosting is the process of locally hosting and managing applications instead of renting from SaaS providers.
https://n0where.net/best-self-hosted-alternatives/
https://n0where.net/best-self-hosted-alternatives/
Selfhosting is the process of locally hosting and managing applications instead of renting from SaaS providers.
https://n0where.net/best-self-hosted-alternatives/
https://n0where.net/best-self-hosted-alternatives/
Bruce Schneier - Wikipedia, the free encyclopedia
The book Data and Goliath (by Bruce Schneier) provides a great overview of the companies and organization tracking you.
https://www.schneier.com/books/data_and_goliath/
Data and Goliath
The Hidden Battles to Collect Your Data and Control Your World
A Book by Bruce Schneier
A New York Times Best Seller
You are under surveillance right now.
Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you’re unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.
The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.
Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He shows us exactly what we can do to reform our government surveillance programs and shake up surveillance-based business models, while also providing tips for you to protect your privacy every day. You’ll never look at your phone, your computer, your credit cards, or even your car in the same way again.
Praise for Data and Goliath
“A thought-provoking, absorbing, and comprehensive guide to our new big data world.”
—Gil Press, Forbes
“Schneier paints a picture of the big-data revolution that is dark, but compelling; one in which the conveniences of our digitized world have devalued privacy.”
—Charles Seife, Nature
“The public conversation about surveillance in the digital age would be a good deal more intelligent if we all read Bruce Schneier first.”
—Malcolm Gladwell, author of David and Goliath
“Schneier exposes the many and surprising ways governments and corporations monitor all of us, providing a must-read User’s Guide to Life in the Data Age. His recommendations for change should be part of a much-needed public debate.”
—Richard A. Clarke, former chief counterterrorism adviser on the National Security Council under Presidents Bill Clinton and George W. Bush, and author of Cyber War
“Schneier did not need the Snowden revelations, as important as they are, to understand the growing threat to personal privacy worldwide from government and corporate surveillance—he’s been raising the alarm for nearly two decades. But this important book does more than detail the threat; it tells the average low-tech citizen what steps he or she can take to limit surveillance and thus fight those who are seeking to strip privacy from all of us.”
—Seymour M. Hersh, Pulitzer Prize–winning journalist
“A pithy, pointed, and highly readable explanation of what we know in the wake of the Snowden revelations, with practical steps that ordinary people can take if they want to do something about the threats to privacy and liberty posed not only by the government but by the Big Data industry.”
—Neal Stephenson, author of Reamde
“A judicious and incisive analysis of one of the most pressing new issues of our time, written by a true expert.”
—Steven Pinker, Johnstone Professor of Psychology, Harvard University, and author of The Better Angels of Our Nature
“As it becomes increasingly clear that surveillance has surpassed anything that Orwell imagined, we need a guide to how and why we’re being snooped and what we can do about it. Bruce Schneier is that guide—step by step he outlines the various ways we are being monitored, and after scaring the pants off us, he tells us how to fight back.”
—Steven Levy, editor-in-chief of Backchannel and author of Crypto and Hackers
“A noted security researcher and author of many books on cryptography and digital security, Schneier's been on this beat a long time, and Data and Goliath is a lucid, sophisticated overview of how corporate and governmental surveillance works, how it doesn't, and what we can do about it. His book is finely constructed, free of cant, and practical in its conclusions—marks of an engineer. As one of a limited number of experts given access to the Edward Snowden documents, he is also in a special position to explain complicated, highly secret surveillance programs to the American public.”
—Jacob Silverman, LA Times
Excerpts
Table of Contents
Introduction
Endnotes
Excerpts from:
Introduction (Scientific American)
Introduction (Gizmodo)
Chapter 2 (Wired)
Chapter 3 (The Christian Science Monitor)
Chapter 5 (The Atlantic)
Chapter 6 (The Blaze)
Chapter 8 (Ars Technica)
Chapter 10 (Science Friday)
Chapter 11 (Digg)
Chapter 15 (Huffington Post)
Chapter 15 (Slate)
Chapter 16 (Motherboard)
Other Editions
Available Now:
German (MVG Verlag)
Upcoming:
Arabic (Forum for Arab and International Relations)
Chinese complex (As If Publishing)
Chinese simplified (Gold Wall Press)
Japanese (Soshisha)
Korean (Minumsa)
Swedish (Daidalos)
Related Essays
The Guardian
Whatever
Related Interviews
Fortinet Blog
Mic
Reviews
Boing Boing | Booklist | The Boston Globe | The Economist | EFF Deeplinks Blog | Federation of American Scientists | Forbes | InfoWorld | Kirkus Reviews | LA Times | Nature | New Scientist | The New York Times—DealBook | Reuters | Slashdot | Times Higher Education | The Wall Street Journal | Washington Post
More Reviews
Audio and Video
Bruce Schneier Presents Data and Goliath
Book Talk at Harvard Book Store
Book Talk at Town Hall Seattle
Book Talk at Google
Book Talk at NYU
Book Roundtable on MPR News
Panel Discussion at Harvard
Interview on Science Friday
Interview on Democracy Now (Part 2)
Interview with Paul Harris
Other
GetAbstract Summary
Dust Jacket of Data and Goliath by Bruce Schneier
up to Books
Photo of Bruce Schneier by Per Ervland.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of Resilient, an IBM Company.
About Bruce Schneier
Bruce Schneier
I've been writing about security issues on my blog since 2004, and in my monthly newsletter since 1998. I write books, articles, and academic papers. Currently, I'm the Chief Technology Officer of Resilient Systems, a fellow at Harvard's Berkman Center, and a board member of EFF.
Featured Essays
It's Time to Break Up the NSA
How the NSA Threatens National Security
Terrorists May Use Google Earth, but Fear is No Reason to Ban It
In Praise of Security Theater
The Eternal Value of Privacy
Terrorists Don't Do Movie Plots
more essays
Latest Book
Data and Goliath
more books
Support Bloggers' Rights! Defend Privacy--Support Epic
Resilient Systems
BlogNewsletterBooksEssaysNewsSpeakingAcademicAbout Me
https://en.wikipedia.org/wiki/Bruce_Schneier
Prism Break provides a well-researched list of software that can help you opt of of surveillance.
Originally shared by Government GangStalking and Electronic Harassment
Prism Break provides a well-researched list of software that can help you opt of of surveillance.
Help make mass surveillance of entire populations uneconomical! We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services.
FOR:
MOBILE
COMPUTERS
NETWORKS
https://prism-break.org/en/
Prism Break provides a well-researched list of software that can help you opt of of surveillance.
Help make mass surveillance of entire populations uneconomical! We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services.
FOR:
MOBILE
COMPUTERS
NETWORKS
https://prism-break.org/en/
The Best Privacy-Friendly Apps & Services For 2016 - GreyCoder
Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/essential-privacy-services/
https://greycoder.com/essential-privacy-services/
How To Make Windows 10 More Private - GreyCoder
Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/how-to-make-windows-10-more-private/
https://greycoder.com/how-to-make-windows-10-more-private/
FBI Used U.S. University to Attack Tor Privacy - GreyCoder
Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/fbi-tor/
https://greycoder.com/fbi-tor/
Mouse Movements Could Identify Tor Users' Real IP Address - GreyCoder
Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/mouse-movements-identify-tor-users-real-ip-address/
https://greycoder.com/mouse-movements-identify-tor-users-real-ip-address/
Two Useful Guides To Software Alternatives - GreyCoder
Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/useful-lists-privacy-friendly-software/
https://greycoder.com/useful-lists-privacy-friendly-software/
Monday, May 23, 2016
How To Use Google Maps & Apple Maps On The Go Without An Internet Connection
Originally shared by Danie van der Merwe
How To Use Google Maps & Apple Maps On The Go Without An Internet Connection
Data plans can be exceptionally expensive and carriers will often bar messaging and call services from being used over them. You know you can’t use your carrier’s data plan to FaceTime mom and will instead have to pay the carrier a different call rate. Your carrier’s data plan will let you browse the internet, Tweet, post to Facebook, or find a place on a map. If you’re using a small data plan and trying to conserve bandwidth, the maps app is one place you can cut back. If you use either Google Maps or Apple Maps, here’s a little trick to using it offline.
This may be obvious to many people, but believe me there are many I still see that think you must be connected to the Internet to use these maps. Newer features now also include voice navigation so that you do not have to keep glancing at the phone. A data connection though will in addition give you real-time traffic routing, but many will be grateful to just have good basic free offline GPS functionality.
See http://www.addictivetips.com/ios/how-to-use-google-maps-apple-maps-on-the-go-without-a-connection/
http://www.addictivetips.com/ios/how-to-use-google-maps-apple-maps-on-the-go-without-a-connection
How To Use Google Maps & Apple Maps On The Go Without An Internet Connection
Data plans can be exceptionally expensive and carriers will often bar messaging and call services from being used over them. You know you can’t use your carrier’s data plan to FaceTime mom and will instead have to pay the carrier a different call rate. Your carrier’s data plan will let you browse the internet, Tweet, post to Facebook, or find a place on a map. If you’re using a small data plan and trying to conserve bandwidth, the maps app is one place you can cut back. If you use either Google Maps or Apple Maps, here’s a little trick to using it offline.
This may be obvious to many people, but believe me there are many I still see that think you must be connected to the Internet to use these maps. Newer features now also include voice navigation so that you do not have to keep glancing at the phone. A data connection though will in addition give you real-time traffic routing, but many will be grateful to just have good basic free offline GPS functionality.
See http://www.addictivetips.com/ios/how-to-use-google-maps-apple-maps-on-the-go-without-a-connection/
http://www.addictivetips.com/ios/how-to-use-google-maps-apple-maps-on-the-go-without-a-connection
Sunday, May 22, 2016
“They’ll be watching and scanning your head at a distance, everything…and picking up your biometrics.”
“They’ll be watching and scanning your head at a distance, everything…and picking up your biometrics.”
Originally shared by Government GangStalking and Electronic Harassment
WTF...!!
https://www.youtube.com/watch?v=JV2yMlMz7ks
Originally shared by Government GangStalking and Electronic Harassment
WTF...!!
https://www.youtube.com/watch?v=JV2yMlMz7ks
Sunday, May 8, 2016
Brain–computer interface - Wikipedia, the free encyclopedia
Originally shared by Government GangStalking and Electronic Harassment
https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface
https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface
The REAL X-Ray spex: New 'terahertz' scanner lets mobile phones see through walls - and even inside the human body
Originally shared by Government GangStalking and Electronic Harassment
http://www.dailymail.co.uk/sciencetech/article-2131932/The-REAL-X-Ray-spex--new-terahertz-scanner-lets-mobile-phones-walls.html
http://www.dailymail.co.uk/sciencetech/article-2131932/The-REAL-X-Ray-spex--new-terahertz-scanner-lets-mobile-phones-walls.html
Wednesday, May 4, 2016
This Surveillance Drone Never Needs to Land
Originally shared by Government GangStalking and Electronic Harassment
https://www.technologyreview.com/s/543196/this-surveillance-drone-never-needs-to-land/
https://www.technologyreview.com/s/543196/this-surveillance-drone-never-needs-to-land/
Friday, April 29, 2016
LOVE 'EM OR HATE 'EM torrent tracking sites are backing the non-sharing of Windows 10. + Operating System Poll
Originally shared by Only Way Is Linux
LOVE 'EM OR HATE 'EM torrent tracking sites are backing the non-sharing of Windows 10. + Operating System Poll
http://www.theinquirer.net/inquirer/news/2423091/torrent-tracking-sites-we-dont-want-any-part-of-windows-10-because-piracy
So far Linux has 14% of the votes so cast your vote :p
http://www.youtube.com/watch?v=DY_FWpr8BX8
LOVE 'EM OR HATE 'EM torrent tracking sites are backing the non-sharing of Windows 10. + Operating System Poll
http://www.theinquirer.net/inquirer/news/2423091/torrent-tracking-sites-we-dont-want-any-part-of-windows-10-because-piracy
So far Linux has 14% of the votes so cast your vote :p
http://www.youtube.com/watch?v=DY_FWpr8BX8
Best Free Monitoring system for Linux
Originally shared by Linux Tutorials - Linux How To Guide
http://lintut.com/best-free-monitoring-system-for-linux/
http://lintut.com/best-free-monitoring-system-for-linux/
This course module is specially designed and compiled for those beginners, who want to make their way into Linux...
Originally shared by Suhas Patil
This course module is specially designed and compiled for those beginners, who want to make their way into Linux learning process and do the best in today’s IT organizations. This courseware is created as per requirements of industrial environment with complete entrance to Linux, which will help you to build a great success in Linux.
#linux #centos #debian #fedora #ubuntu #redhat #sysadmin #tecmint
# Follow Us on Twitter: https://twitter.com/tecmint
http://www.tecmint.com/free-online-linux-learning-guide-for-beginners
This course module is specially designed and compiled for those beginners, who want to make their way into Linux learning process and do the best in today’s IT organizations. This courseware is created as per requirements of industrial environment with complete entrance to Linux, which will help you to build a great success in Linux.
#linux #centos #debian #fedora #ubuntu #redhat #sysadmin #tecmint
# Follow Us on Twitter: https://twitter.com/tecmint
http://www.tecmint.com/free-online-linux-learning-guide-for-beginners
#system76 #system76laptops #linuxlaptops
Originally shared by Eric Noya
#system76 #system76laptops #linuxlaptops
https://system76.com/laptops/oryx
#system76 #system76laptops #linuxlaptops
https://system76.com/laptops/oryx
Tips for troubleshooting with Linux | Opensource.com
Originally shared by Dena Bishop
http://opensource.com/business/15/10/troubleshooting-process-linux-problems
http://opensource.com/business/15/10/troubleshooting-process-linux-problems
Jack Wallen shares how to use Nautilus & the command line to manage file permissions and ownership.
Originally shared by The Linux Foundation
Jack Wallen shares how to use Nautilus & the command line to manage file permissions and ownership.
http://www.linux.com/learn/tutorials/760276-how-to-manage-file-and-folder-permissions-in-linux
Jack Wallen shares how to use Nautilus & the command line to manage file permissions and ownership.
http://www.linux.com/learn/tutorials/760276-how-to-manage-file-and-folder-permissions-in-linux
#windows10 #windows10ismalware #windowsismalware
Originally shared by Eric Noya
#windows10 #windows10ismalware #windowsismalware
http://www.thenewamerican.com/tech/computers/item/22026-windows-10-deletes-users-programs
#windows10 #windows10ismalware #windowsismalware
http://www.thenewamerican.com/tech/computers/item/22026-windows-10-deletes-users-programs
Arch Linux VS Windows 10 speed match! Guess who's the winner...? ;-)
Originally shared by Eric Noya
Arch Linux VS Windows 10 speed match! Guess who's the winner...? ;-)
#linuxvswindows
Arch Linux vs Windows 10 - Non comprehensive perf…: http://youtu.be/KZGv6PcY_-Q
http://youtu.be/KZGv6PcY_-Q
Arch Linux VS Windows 10 speed match! Guess who's the winner...? ;-)
#linuxvswindows
Arch Linux vs Windows 10 - Non comprehensive perf…: http://youtu.be/KZGv6PcY_-Q
http://youtu.be/KZGv6PcY_-Q
https://www.youtube.com/watch?v=wqH9KX9o0vg&feature=share #wifi #wi-fi #lifi #li-fi
Originally shared by Eric Noya
https://www.youtube.com/watch?v=wqH9KX9o0vg&feature=share
#wifi #wi-fi #lifi #li-fi
https://www.youtube.com/watch?v=wqH9KX9o0vg&feature=share
https://www.youtube.com/watch?v=wqH9KX9o0vg&feature=share
#wifi #wi-fi #lifi #li-fi
https://www.youtube.com/watch?v=wqH9KX9o0vg&feature=share
How to run/test Linux on Windows machine without disturbing Windows
Originally shared by Danie van der Merwe
How to run/test Linux on Windows machine without disturbing Windows
Only a few have anticipated the growth of Linux a few years back. Today Linux has become one of the most secure operating systems. Since Linux is open source many technology giants like Google, Facebook, Twitter etc rely on it .
Linux is so popular that even Microsoft has embraced it for its cloud platform. No one has ever expected of this in the past. Today Linux can run on a Windows machine without disturbing it .
Here are some cool ways on how to use Linux on Windows without uninstalling or disturbing your Windows installation.
I first tested out Ubuntu many years back using Oracle's VirtualBox, and from there I moved on to having a dual-boot systems (Windows Vista and Ubuntu) before having only Linux on my computer (currently using Kubuntu long term support version).
Even if Linux is not being used as the main OS on your computer it is still very useful to use on older laptops and computers, and I have re-purposed an old computer using Linux Mint, which now acts as my main media machine connected to my TV (just added a Nvidia card with HDMI outputs). Linux certainly breathes new life into old hardware (and of course it runs more than 95% of the world's supercomputers and major stock exchanges so it does pretty well on the high end too).
http://curiouspost.com/how-to-run-linux-on-windows-machine/
How to run/test Linux on Windows machine without disturbing Windows
Only a few have anticipated the growth of Linux a few years back. Today Linux has become one of the most secure operating systems. Since Linux is open source many technology giants like Google, Facebook, Twitter etc rely on it .
Linux is so popular that even Microsoft has embraced it for its cloud platform. No one has ever expected of this in the past. Today Linux can run on a Windows machine without disturbing it .
Here are some cool ways on how to use Linux on Windows without uninstalling or disturbing your Windows installation.
I first tested out Ubuntu many years back using Oracle's VirtualBox, and from there I moved on to having a dual-boot systems (Windows Vista and Ubuntu) before having only Linux on my computer (currently using Kubuntu long term support version).
Even if Linux is not being used as the main OS on your computer it is still very useful to use on older laptops and computers, and I have re-purposed an old computer using Linux Mint, which now acts as my main media machine connected to my TV (just added a Nvidia card with HDMI outputs). Linux certainly breathes new life into old hardware (and of course it runs more than 95% of the world's supercomputers and major stock exchanges so it does pretty well on the high end too).
http://curiouspost.com/how-to-run-linux-on-windows-machine/
https://www.youtube.com/watch?v=uM5UNy3ebKA
Originally shared by Eric Noya
https://www.youtube.com/watch?v=uM5UNy3ebKA
#internetprivacy #privacyaddons #privacy #browserprivacy #browserprivacyaddons
https://www.youtube.com/watch?v=uM5UNy3ebKA
https://www.youtube.com/watch?v=uM5UNy3ebKA
#internetprivacy #privacyaddons #privacy #browserprivacy #browserprivacyaddons
https://www.youtube.com/watch?v=uM5UNy3ebKA
Linux Brother DCP-J552DW printer driver install
Originally shared by Eric Noya
Linux Brother DCP-J552DW printer driver install
#linuxbrotherdrivers
http://tutorialforlinux.com/2016/02/06/how-to-install-brother-dcp-j552dw-printer-drivers-on-ubuntu-linux-easy-guide/
Linux Brother DCP-J552DW printer driver install
#linuxbrotherdrivers
http://tutorialforlinux.com/2016/02/06/how-to-install-brother-dcp-j552dw-printer-drivers-on-ubuntu-linux-easy-guide/
#windows10privacy
Originally shared by Eric Noya
#windows10privacy
http://www.ghacks.net/2016/02/08/windows-10-phones-home-even-after-privacy-hardening/
#windows10privacy
http://www.ghacks.net/2016/02/08/windows-10-phones-home-even-after-privacy-hardening/
Subscribe to:
Posts (Atom)