Wednesday, December 21, 2016

DID YOU KNOW THAT CASHIERS CAN BE REPLACED WITH ROBOTS ?

Originally shared by Government GangStalking and Electronic Harassment

DID YOU KNOW THAT CASHIERS CAN BE REPLACED WITH ROBOTS ?
http://investmentwatchblog.com/no-more-cashiers-watch-the-new-checkout-robot-that-can-scan-and-bag-all-your-groceries-then-take-your-payment/

Never Believe Any Video… They Are Faking Videos Now – InvestmentWatch


http://investmentwatchblog.com/never-believe-any-video-they-are-faking-videos-now/

ALSO SEE

Originally shared by Government GangStalking and Electronic Harassment

ALSO SEE
https://www.youtube.com/watch?v=6MKlxC41mfU
https://www.youtube.com/watch?v=KTDGFzPAI2Q
https://www.youtube.com/watch?v=dXdCptD6HoM
https://www.youtube.com/watch?v=nOGpFJnLP3A
https://www.youtube.com/watch?v=mxxxcLi2FVw
https://www.youtube.com/watch?v=X8tGVy9LJRE
https://www.youtube.com/watch?v=n8LMyRqBViM
https://www.youtube.com/watch?v=D-3LM0FbDSs
https://www.youtube.com/watch?v=AWNykj-lb-I
https://www.youtube.com/watch?v=X8tGVy9LJRE
https://www.youtube.com/watch?v=uO0Q7SMZvfg
https://www.youtube.com/watch?v=nOGpFJnLP3A
https://www.youtube.com/watch?v=bfs25NijwwA
https://www.youtube.com/watch?v=EC1CFndkdgk
https://www.youtube.com/watch?v=lMWbjQE-Ldo
https://www.youtube.com/watch?v=zpicVWbPatk
https://www.youtube.com/watch?v=7KpnkOUolfw

FOR THOSE WHO ARE FASCINATED BY THE SUBJECT MATTER AS MUCH AS I AM

Originally shared by Government GangStalking and Electronic Harassment

FOR THOSE WHO ARE FASCINATED BY THE SUBJECT MATTER AS MUCH AS  I  AM

I AM A COMPUTER GEEK... I CAN'T HELP MYSELF...


ALSO SEE
https://www.youtube.com/watch?v=HQJMg6FdcvQ
Defeating The Hackers - BBC Documentary

https://www.youtube.com/watch?v=Y47m1cOyKjA
Discovery Channel - The Secret History Of Hacking

https://www.youtube.com/watch?v=GWr5kbHt_2E
Can you hack it? Hacking Documentary

https://www.youtube.com/watch?v=TVgJmAJsOeQ
The Life of Hackers [Full Documentary]

https://www.youtube.com/watch?v=gPz1OG4ih_o
Web Warriors - CBC Hacking Documentary

https://www.youtube.com/watch?v=SVgle2Dh0Fk
How Anonymous Hackers Changed the World [Full Documentary]

https://www.youtube.com/watch?v=gpvcc9C8SbM
Anonymous - The Story of Aaron Swartz Full Documentary

https://www.youtube.com/watch?v=F8uuRSfDqiU
Code 2600 - Computer History, Hacking and Surveillance Documentary

https://www.youtube.com/watch?v=5ZgBvkFrPrU
Hackers: Outlaws and Angels Full Documentary

https://www.youtube.com/watch?v=JexQv7-A2D0
Hacker Documentary Hackers 1995 by Phon E and R F Burns

https://www.youtube.com/watch?v=78hlL_UMb54
We Are Legion - The Story of the Anonymous Hacktivists


https://www.youtube.com/watch?v=6qpudAhYhpc
ALGORITHM: The Hacker Movie
https://www.youtube.com/watch?v=fXcvTYZGp5s

Saturday, December 3, 2016

Understanding Spamming on Google+


Originally shared by John Skeats

Understanding Spamming on Google+

A lot of people find themselves in trouble on Google+ because they have serious misunderstandings about spamming. Let me start with two of the most common misunderstandings and then get to the facts about what spamming is. I'll close with the "secret" to avoid being flagged as a spammer.

Misconception #1: Spamming involves sharing promotional content.
The most common misconception -- and the one that leads many people who have no intention to spam to be flagged as spammers -- is that spamming involves sharing promotional content. Who the content (a post or comment) is shared with, how content is shared, and the overall sharing behavior of the person sharing the content play a much greater role in determining whether content is viewed as spam or not. Any post (even this one) could be spam.

Misconception #2: You can determine what is or is not spam simply by looking at it.
This comes down to the same point as Misconception #1: the fact that spamming is generally determined by how content is shared, who the content is shared with, and the overall behaviors of the person sharing the content. You can sometimes recognize that content is spam based on its context (e.g., an off-topic post shared in a community), but you cannot determine that a post is not spam by looking at it even in context. For example, you cannot tell by looking at this post whether I shared it excessively in a spammer-like manner, which would make it spam. You therefore cannot judge by simply looking at a flagged post whether the Google+ spam filters flagged the post appropriately or not.

Misconception #3: Political and religious posts are treated differently by the spam filters.
People with all political views and from all religions often complain that their posts on those subjects are being flagged because of their political or religious views. That's not true. The reasons for their posts being flagged are the issues discussed in the remainder of this post, all of which are conspicuously apolitical and non-denominational.

What is spamming?
At the highest level, spamming is delivering unwanted content to significant numbers of people. It is generally not about what the content itself is other than to the degree that the content is delivered to people who do or do not want to receive it.

Assuming a post doesn't violate any other rules, it might be perfectly fine when shared with one audience but spam when shared with others. It might even be perfectly fine if shared one way with an audience but spam if shared in different manner. Or a post might be perfectly fine if shared individually with different audiences but become spam if shared with all of them. On top of that, a person's overall sharing behavior could make whatever they might share at that moment unwanted.

Let's assume for the remaining discussion that we are talking about a great post that doesn't violate any of the rules in Google’s User Content and Conduct Policy (http://www.google.com/+/policy/content.html) other than the spamming rule.

Sharing that hypothetical post with specific circles, a collection, or Public would not be spamming unless options I will mention in the next two paragraphs were selected. Sharing the post in a community could be either perfectly acceptable or spamming depending on whether the post complies with the community's rules. (Remember that each community has its own rules in addition to Google's rules.) The community's rules are a consideration because community posts are presented to all members of a community. Members joined the community with the expectation that they would receive only posts through the community that comply with the community's rules. Therefore, any post delivered to the members through the community that violates the rules is implicitly unwanted by the membership -- and therefore spam.

As I said, there are options in classic Google+ that one can choose which can make sharing the same post with the same audience a form of spamming. If you select the option to send emails when sharing a non-community post in classic Google+, that runs a high risk of changing acceptable sharing into spamming. Without that option, your posts will be displayed only to people who follow you. They made the decision to follow you, so that's okay unless there are more general issues (which I'll talk about in a moment). Selecting that option, however, can force emails and notifications to people who might not want to receive them. It's spamming if you trigger unwanted emails or notifications, so using that option can lead you to being flagged for spamming.

A similar problem would occur if you were to add Extended circles, Your circles, or the names of specific circles when sharing with Public in classic Google+. That can also trigger unwanted notifications to anyone in the groups you added to Public -- and therefore be spamming.

Fortunately, both of the possibilities I just mentioned have been eliminated in the new Google+ to avoid the problems I discussed.

The next problem involves the same post being delivered to the same people multiple times. No one (at least virtually no one) wants to see the same content repetitively. The issue with sharing content with multiple audiences each of whom it might have been reasonable to share a post with arises when there is overlap in the audiences. Sharing the same post to multiple collections or communities is an issue because there is a very high probability that the same people follow more than one of a person's collections or are members of the same communities the poster wants to share to. As a result, those people could see one instance of the post for each of the collections or communities the post was shared with. That's just as bad as if you explicitly shared the same post with them multiple times -- and therefore considered to be a form of spamming.

Yet another issue relates to the fact that virtually no one wants to see their Home streams or the streams of the communities they join dominated by posts by a single individual. Therefore, the sheer volume of posts one shares can become a spamming issue. When a person shares too many posts in too short a period of time -- even if they might be shared with what appear to be different audiences, it presents a high probability that people would see an excessive number of posts by that person, which would be perceived as spamming.

Note that while I have spoken thus far about sharing "the same post," all of the above applies to sharing posts that are substantially similar. Making relatively minor changes to posts doesn't prevent them from being perceived as being the same -- and therefore as spam -- by recipients. The same applies when people include similar blocks of text frequently. This is especially true if the blocks of text contain the same or substantially similar links (e.g., links to different posts in the same blog). One common practice that gets people into trouble this way is including a "signature block" in their posts because they can be picked up by the spam filters as substantially similar content.

I have focused primarily on posts thus far, but there are still other things that can lead to a person being viewed as a spammer:
* Sharing the same or substantially comments too frequently -- because the same people are likely to see the repetition.
* Excessive commenting in a community -- again, because no one wants to see a community dominated by one individual.
* Excessive +1ing -- because one's +1s become meaningless when used excessively. It also appears to Google as an attempt to manipulate rankings.

How to avoid being flagged as a spammer
The secret for avoiding being flagged for spamming lies in the statement I made about spamming earlier: "At the highest level, spamming is delivering unwanted content to significant numbers of people." The most important word in that sentence is "unwanted." You have to look at sharing from the eyes of the recipients.

It doesn't matter that you want to share a message. It matters whether the recipients will welcome that message. That means not only whether they would welcome the message overall but whether they would welcome another instance of the message (if you were sharing it repeatedly) and whether they would welcome it in the context of other things you might have shared recently. If the answer is "no" to any of those conditions even for just a few recipients), sharing the post or comment would be spamming -- so don't share it (or at least don't share it at that moment).

Tuesday, October 4, 2016

Google+ Web Updates Oct 4


Originally shared by Luke Wroblewski

Google+ Web Updates Oct 4
Following our series of news about Google+ for Work, new G+ management tools, and more over the past few weeks, we're returning to addressing common points of feedback & requests with a few Google+ Web updates:

* Turn animated comments (as seen on all streams) on and off.
* View poll results from the post menu (even if you haven't voted yet)

As always, please keep sending us your ideas/issues using the Send Feedback menu item.
Thanks~

Monday, September 26, 2016

IF YOU WANTED TO KNOW MORE ABOUT THIS "PRISM" THING

Originally shared by Government GangStalking and Electronic Harassment

IF YOU WANTED TO KNOW MORE ABOUT THIS "PRISM" THING
https://nsa.gov1.info/dni/prism.html

XKeyscore: NSA tool collects 'nearly everything a user does on the internet' | US news | The Guardian

Originally shared by Government GangStalking and Electronic Harassment
https://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data

https://thehackernews.com/2016/07/snowden-iphone-hacking.html

Originally shared by Government GangStalking and Electronic Harassment

https://thehackernews.com/2016/07/snowden-iphone-hacking.html
Edward Snowden Designs an iPhone Case to Detect & Block Wireless Snooping
Thursday, July 21, 2016
https://thehackernews.com/2016/07/snowden-iphone-hacking.html

10 Best Antivirus Protection your Computer of 2016

Originally shared by Government GangStalking and Electronic Harassment
https://techcus.com/p/B1D7S1_dK/10-best-antivirus-protection-your-computer-of-2016

WHAT A GEM THIS IS

Originally shared by Government GangStalking and Electronic Harassment

WHAT A GEM THIS IS

SURF,..LEARN..ENJOY

SEE AN EXPLANATION OF IT IN THE 2013 VERSION
http://apps.washingtonpost.com/g/page/national/inside-the-2013-us-intelligence-black-budget/420/
https://nsa.gov1.info/dni/nsa-ant-catalog/index.html

A BIT OF HOW “THEY” DO THEIR EVIL SPOOKY SPYING ACTIVITIES https://nsa.gov1.info/dni/petrobras-video.html

Originally shared by Government GangStalking and Electronic Harassment

A BIT OF HOW “THEY” DO THEIR EVIL SPOOKY SPYING ACTIVITIES https://nsa.gov1.info/dni/petrobras-video.html
https://nsa.gov1.info/dni/petrobras-video.html

Sunday, September 25, 2016

Microsoft has filed a patent for a "mediation component" that records everything you type in every application and...

Originally shared by Wayne Radinsky

Microsoft has filed a patent for a "mediation component" that records everything you type in every application and sends it to Bing/Cortana as part of your search query the next time you do a search. "The search engine (e.g., Bing and Cortana) uses contextual rankers to adjust the default ranking of the default suggested queries to produce more relevant suggested queries for the point in time. The operating system, comprising the function of mediation component, tracks all textual data displayed to the user by any application, and then performs clustering to determine the user intent (contextually)."

Keep in mind this is a patent and not a product feature and most patents never see the light of day.
http://hothardware.com/news/microsoft-patents-big-brother-ai-to-monitor-everything-you-do-in-windows

Monday, July 18, 2016

Full Documentary - Amazing SECRET NAZI WEAPONS


https://www.youtube.com/watch?v=lWNpB4fTRH4

IF THE SIMPLE FOLKS CAN GET TO PLAY WITH FREE APPS THAT CAN ACTUALLY READ A PERSON'S MIND, THEN YOU CAN IMAGINE WHAT...

Originally shared by Government GangStalking and Electronic Harassment

IF THE SIMPLE FOLKS CAN GET TO PLAY WITH FREE APPS THAT CAN ACTUALLY READ A PERSON'S MIND, THEN YOU CAN IMAGINE WHAT TYPE OF ANALOGOUS - BUT MORE SOPHISTICATED- MIND READING APPS THE GANG STALKERS CAN PLAY WITH WHILE THEY ARE STALKING US WITH THEIR CELL PHONE WEAPONS.

HERE,..THERE IS MORE ON THIS:
http://www.armindreader.com/

SOMEONE PLEASE TELL ME HOW DO THEY WORK AND IF THEY ARE JUST TOYS FOR THE MASSES, WHILE PROFESSIONALS, SUCH AS GANG STALKERS, GET TO PLAY WITH THE REAL MIND READING KAHUNAS IN A CELL PHONE FORM..
http://www.mobango.com/mind-scanner-free/?cid=1754568&catid=11

Wednesday, July 13, 2016

Members of the public will no longer be allowed to access video obtained by law enforcement officers in North...

Originally shared by Infowars - Alex Jones Channel

Members of the public will no longer be allowed to access video obtained by law enforcement officers in North Carolina, under a new bill recently passed into law.
http://www.infowars.com/new-bill-blocks-police-footage-from-public/

Russia develops hypersonic nuclear space bomber

Originally shared by THE RESISTANCE

Russia develops hypersonic nuclear space bomber
http://www.pravdareport.com/russia/kremlin/13-07-2016/134999-russia_space_bomber-0/

Understanding the WordPress File and Directory Structure

Originally shared by 34SP.com Ltd

Understanding the WordPress File and Directory Structure

Although it is not necessary to learn code or to understand the file and directory structure of your WordPress website, if you want to attain a higher degree of control over your site or be able to troubleshoot errors, you may want to take the time to start learning some of the basics.

Each WordPress install starts out with the same directory structure and core files. Every plugin or theme you install, every script you add, and every error screen that appears, is possible thanks to the CMS’s backbone.

This article on Elegant Themes reviews the contents of the most important WordPress folders, paying special attention to the core files that power your site. Are you ready to look under the hood? Here you go: http://gplnk.co/29x57lm

Do you need WordPress hosting?
With over 15 years in the hosting business we know precisely what it takes to provide rock solid, lightning fast WordPress websites. Our managed WordPress hosting platform was built from the ground up to offer the very best WordPress hosting at the most competitive price in the UK. Learn more: http://gplnk.co/291hO7I

#wordpress #developers #webdevelopment #cms  
http://gplnk.co/29x57lm

How to extend Wi-Fi coverage throughout your whole home or office

Originally shared by Danie van der Merwe

How to extend Wi-Fi coverage throughout your whole home or office

Now that Wi-Fi is becoming an integral part of just about every new piece of consumer electronics, and even many appliances, it is more important than ever to have a usable wireless network throughout your home and office — and possibly your yard. Unfortunately, the typical ISP’s simplistic model of providing a single “all-in-one” modem+router+wireless gateway for your site quickly breaks down when faced with the real-world challenges of serving larger, or sprawling, homes or apartments. This is especially true for buildings with lots of wiring in the walls, lath and plaster walls, or metallic heating or air conditioning infrastructure in the floor or ceiling. The good news is that there are several ways to solve this problem, with varying costs and complexities.

An interesting article that does not delve into the depths of how to do each one, but does give a good overview of what the different options are that can be looked at. With broadband speeds, older WiFi repeaters and range extenders are no longer cutting it.

Mesh WiFi seems to be a good choice in terms of ease of setup and functionality (apart from not usually having extra LAN ports if you buy the typical commercial offerings). Two prominent names here are Eero and Luma. Luma does appear to be quite a bit less costly for 3 devices. Another option not named in the article is Open Mesh - they have optionally cheaper devices but these do come with lower hardware specs.

See http://www.extremetech.com/computing/223211-how-to-increase-wi-fi-coverage-throughout-your-whole-home-or-office
http://www.extremetech.com/computing/223211-how-to-increase-wi-fi-coverage-throughout-your-whole-home-or-office

This "Tesla baby" can produce enough power matching all power generation facilities in Russia when lightning is...

Originally shared by Alexander Light (HumansAreFree)

This "Tesla baby" can produce enough power matching all power generation facilities in Russia when lightning is discharged onto a platform: http://humansarefree.com/2015/09/teslas-legendary-tower-built-and-tested.html

We present a new energy harvesting technology that generates electrical energy from a user’s interactions with...

Originally shared by IamChattyCathy

We present a new energy harvesting technology that generates electrical energy from a user’s interactions with paper-like materials. The energy harvesters are flexible, light, and inexpensive, and they utilize a user’s gestures such as tapping, touching, rubbing and sliding to generate energy. The harvested energy is then used to actuate LEDs, e-paper displays and other devices to create interactive applications for books and other printed media.

https://missiongalacticfreedom.wordpress.com/2016/06/
https://youtu.be/4WaUcXSfPTg

Nikola Tesla regarded the Earth as one of the plates of a capacitor, the ionosphere forming the other plate.

Originally shared by Alexander Light (HumansAreFree)

Nikola Tesla regarded the Earth as one of the plates of a capacitor, the ionosphere forming the other plate. Recent measurements have shown that the voltage gradient between the two is 400,000 volts.

With this principle, he said he was able, through his invention, to provide free energy to anyone, inexhaustible in quantity, anywhere on earth. That is why he had built a first prototype, the Wardenclyffe Tower, in which was to apply his famous pyramid effect: http://humansarefree.com/2014/04/the-amazing-connections-between-nikola.html

Tuesday, July 12, 2016

TechWorm » Latest Security News, Hacker News, Technology, Science and much more

Originally shared by Anon TH Hakürsec
http://www.techworm.net/2016

Nobel Prize winning physicists have proven beyond doubt that the physical world is one large sea of energy that...

Originally shared by Alexander Light (HumansAreFree)

Nobel Prize winning physicists have proven beyond doubt that the physical world is one large sea of energy that flashes into and out of being in milliseconds, over and over again. Nothing is solid. This is the world of Quantum Physics: http://humansarefree.com/2014/03/the-world-of-quantum-physics-everything.html

Published on Jul 12, 2016

Originally shared by Louie Pigeonmumbler

Published on Jul 12, 2016
--John Johnson, MIT PhD who runs an econometrics consultancy in Washington, D.C and co-author of Everydata: The Misinformation Hidden in the Little Data you Consume Every Day, joins David to discuss how to avoid falling prey to misinformation, including political polls and claims by advertisers
https://www.youtube.com/watch?v=0mG7u2eBvSg&feature=share

How Nikola Tesla Used ‘Spirituality’ & Philosophy To Learn About Reality, ‘Limitless’ Energy & Science - RiseEarth

Originally shared by Maria Bulsara
http://www.riseearth.com/2016/07/how-nikola-tesla-used-spirituality.html?m=1&utm_source=Viber&utm_medium=Chat&utm_campaign=Private

Monday, July 11, 2016

Guccifer 2.0 Leak Reveals How DNC Rigged Primaries for Clinton

Originally shared by Cliff Baer
http://observer.com/2016/06/guccifer-2-0-leak-reveals-how-dnc-rigged-primaries-for-clinton/

Vivaldi Browser updated for better privacy, more mouse gestures and improved hibernation on Linux

Originally shared by Danie van der Merwe

Vivaldi Browser updated for better privacy, more mouse gestures and improved hibernation on Linux

I've been using Vivaldi Browser Snapshot version full time for the last week and and really liking it. The key improvements for me personally have been the tweakable user interface. The real winner for me is being able to stack tabs as I have some that are related, and I can now just group them in once tab stack.

The only issues I've had are having to enable Flash properly (yes I still needed it to read my magazines on Zinio) and that it does not (yet?) sync any Google bookmarks (but I see a login screen for something like this). Some extensions like Tab Snooze, Pocket, etc do sync to the cloud so I can still happily move between browsers if I need to.

See https://vivaldi.net/en-US/teamblog/129-snapshot-1-3-534-3-better-privacy-more-mouse-gestures-and-improved-hibernation-on-linux
https://vivaldi.net/en-US/teamblog/129-snapshot-1-3-534-3-better-privacy-more-mouse-gestures-and-improved-hibernation-on-linux?utm_content=buffer15e56&utm_medium=social&utm_source=facebook.com&utm_campaign=buffer

10 things that every new G+ user should know


Originally shared by Alex Garcia

10 things that every new G+ user should know
1) Who to share with.
https://plus.google.com/+AlexGarcia66/posts/Lr9GoEjLYa8

2) Who can comment on your public posts.'
If you are under 18, your default is only people in your circles can comment. Since you haven't added many people yet, most people can't reply to you. To change this, go to plus.google.com/settings

3) My posts are not showing in communities
https://plus.google.com/+JohnSkeats/posts/R9y9VtUPxSh

4) Posts in public communities are public.
Everyone that visit the community can see them.
Even if they are not community members.
They will show up in G+ search results.

5) I can't change my name.
There is a limit of 3 different names within a 90-day period.
You will have to wait.

6) I want to change my customised G+ URL.
Simple answer. You can't.
But there is only one hope.
Use the Send Feedback feature from the account that owns the URL and explain what you want and why. You will rarely be successful and almost never you will get an answer, but all you can do is try.

7) Do not set audience restrictions by country or age, unless you really have a valid reason to do that.
https://plus.google.com/+PeggyKTC/posts/hcsMkNfD7cD

8) Google plus settings
https://plus.google.com/+AlexGarcia66/posts/3YpGGugR3cb

9) None of the above
https://plus.google.com/+googleplus/posts/CyvUdPAtNfP

10) Still need help.
The official help articles
https://support.google.com/plus/?hl=en#topic=6320376
The official help community for G+ (not hangouts or youtube or photos or business or gmail or google account. See item 9)
https://plus.google.com/communities/115758385206378551362

check it

Originally shared by SomeOneElse

check it
https://www.youtube.com/watch?v=EopwWqNRdQM&feature=share

More here: https://plus.google.com/collection/052AFB


Originally shared by Brent Sullivan

More here: https://plus.google.com/collection/052AFB

Sunday, July 3, 2016

A water-filled upright human is a sizeable antenna.

Originally shared by Alexander Light (HumansAreFree)

A water-filled upright human is a sizeable antenna. And since all moving electrons generate electrical current, all those electromagnetic waves inundating our everyday lives pass into our bodies, where they each generate an electric current.

These induced electric currents change the charge on which our complex bioelectrical body/brain/heart network operates to maintain our health and vitality.

Microwaves at 1/10th British safety guidelines emit frequencies causing the biggest changes in cell calcium levels… as reported in the UK Daily Mail: http://humansarefree.com/2016/04/wireless-chemtrails-and-you.html

Thursday, June 30, 2016

Title


Title


Originally shared by Government GangStalking and Electronic Harassment

AND HIS NAME IS NOT IN ANY SCHOOL PSYCHICS BOOKS...!!


AND HIS NAME IS NOT IN ANY SCHOOL PSYCHICS BOOKS...!!

Go Figure ...Duhhh

Hackers backdoor the human brain, successfully extract sensitive data | ExtremeTech


http://www.extremetech.com/extreme/134682-hackers-backdoor-the-human-brain-successfully-extract-sensitive-data

NSA pretended to be Facebook in its effort to infect ‘millions’ of computers

Originally shared by Government GangStalking and Electronic Harassment
http://www.digitaltrends.com/web/nsa-pretended-facebook-spread-malware/

Military Micro bots Collecting DNA & Blood!

Originally shared by Government GangStalking and Electronic Harassment
https://www.youtube.com/watch?v=dX31hZwWOro

Japanese Scientists Successfully Transmit Electricity Through The Air


http://www.trueactivist.com/japanese-scientists-successfully-transmit-electricity-through-the-air/

Saturday, June 4, 2016

The BLOODY 'vampyre watch' brought to you by those who watch.... the evil WATCHERS ! ! ! ★★★

Originally shared by Dorothy G. Tyas

The BLOODY 'vampyre watch' brought to you by those who watch.... the evil WATCHERS ! ! ! ★★★
https://youtu.be/Yqu0FRT7PHA

Brazilian builds water-powered motorbike, gets 310 miles out of 1 liter of water

Originally shared by Susan K.
https://www.minds.com/blog/view/478631652361252864

This Desk-Size Turbine Is Capable Of Powering An Entire Town

Originally shared by Susan K.
http://www.trueactivist.com/this-desk-size-turbine-is-capable-of-powering-an-entire-town/?utm_source=fb&utm_medium=fb&utm_campaign=antimedia&_utm_source=1-2-2#.V0HCOhWJmO4.google_plusone_share

❤ HURRAH ! ! ! HURRAH ! ! ! HURRAH FOR BEL❤VED HUMANITY ! ! ! ❤

Originally shared by Dorothy G. Tyas

❤ HURRAH ! ! ! HURRAH ! ! ! HURRAH FOR BEL❤VED HUMANITY ! ! ! ❤
https://youtu.be/56j6ySv14rk

Monday, May 30, 2016

The GPS Hoax With Captain Obvious – What Happened On The Flat Earth This Week?


http://whotfetw.com/blog/?p=11799

US PATENT PROVES THE EARTH IS FLAT ! – What Happened On The Flat Earth This Week?


http://whotfetw.com/blog/?p=237

We May Have An Artiifical Sun In Our Sky (Patents since 1961) – What Happened On The Flat Earth This Week?


http://whotfetw.com/blog/?p=6460

PATENT: Means for simulating certain environmental conditions of outer space US 3010220 A – What Happened On The...


http://whotfetw.com/blog/?p=6457

“Patent US5093800 Global positioning system satellite signal simulator” – What Happened On The Flat Earth This Week?


http://whotfetw.com/blog/?p=9713

Antennasearch.com (Because there are no satellites!) – What Happened On The Flat Earth This Week?


http://whotfetw.com/blog/?p=8598

Uncovering Secrets of Magnetism & Inertia: Conjugate principles of Cosmic Mechanics

Originally shared by Mr Grimv
https://www.youtube.com/watch?v=uIUEPuxwDn8&feature=share

Saturday, May 28, 2016

Installing rogue apps on iOS devices via SandJacking Attack http://www.hackinsight.org/news,612.html

Originally shared by Paweł Płocki

Installing rogue apps on iOS devices via SandJacking Attack http://www.hackinsight.org/news,612.html
http://www.hackinsight.org/news,612.html

Bad idea but with Microsoft being heavy handed on forcing WIn 10 upgrade, leaving people with little option.

Originally shared by Dave S.

Bad  idea but with Microsoft being heavy handed on forcing WIn 10 upgrade, leaving people with little option. Otherwise only knock I have with Win 10 is lack of control of updates (I upgraded to WIn 10 voluntarily from Win 7 and Win 8.1)
http://www.pcworld.com/article/3075729/windows/fearing-forced-windows-10-upgrades-users-are-disabling-critical-updates-at-their-own-risk.html

Will your computer still be able to run Windows 10?

Originally shared by PCMag

Will your computer still be able to run Windows 10?
http://www.extremetech.com/computing/229101-new-windows-10-update-will-change-hardware-requirements-for-the-first-time-since-2009

What a very interesting experiment: Researches randomly deposited 297 USB drives (aka USB stick, flash drive, thumb...


Originally shared by IamChattyCathy

What a very interesting experiment: Researches randomly deposited 297 USB drives (aka USB stick, flash drive, thumb drive) around the University of Illinois Urbana-Champaign campus. They wanted to see just how many, and how soon after dropping them off, they’d be collected by people.

Turns out that 48 percent of the drives were taken and inserted into computers. The report at theregister.co.uk says that in some cases, this was done minutes after the drives were left in the public spots.

Picking up a USB drive off the streets and plugging it into your computer is akin to picking up discarded food off a sidewalk and eating it. You just never know what kind of infection you’re going to get.

And what you might get is a virus crashing your computer or stealing your data. That USB stick could contain malware—either left in public as a prank, or innocently lost or discarded without the original owner knowing it’s infected.

Or…it might have been left in a public spot by a hacker with full intent of gaining control of your computer to collect your personal data and committing fraud, such as opening lines of credit in your name or emptying out your bank account.

The USB sticks for the study contained HTML files with embedded img tags. The tags allowed the researchers to track the USB activity, which is how they new that, for instance, one of them was plugged into a computer only six minutes after it was left to be “found.”

http://us-ads.openx.net/w/1.0/afr?auid=538280559&cb=0ba0b4249a&c.apdid=fiInstance_100920_3_9588698&r0=http://cdn.firstimpression.io/delivery/ck.php?oaparams=2__bannerid=4604__zoneid=100920__cb=0ba0b4249a__oadest=
Only 16 percent of the people who picked up the sticks actually scanned them to check for viruses before plugging them into their computers. And 68 percent simply inserted them without any regards to what they could get transferred into their computers.

Some users trusted that there was no harm.
Some plugged in the drive to seek out the owner.
Some intended to keep the stick.
Conclusion: A cybercriminal could easily take control of a business’s system by leaving a rigged USB drive in the parking lot, let alone get control of a personal computer by leaving the stick in any public place frequented by lots of people.
Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention.

Robert Siciliano personal security and identity theft expert and speaker is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen.

http://beforeitsnews.com/scandals/2016/05/dont-pick-up-that-usb-drive-2436279.html?utm_content=bufferc1928&utm_medium=social&utm_source=plus.google.com&utm_campaign=buffer

DO YOU WANT TO USE BITTORRENT ANONYMOUSLY.?

Originally shared by Government GangStalking and Electronic Harassment

DO YOU WANT TO USE BITTORRENT ANONYMOUSLY.?

TRY ONE OF THE VPN SERVICES ON THIS LIST
WHICH CAN COME IN HANDY IF YOU
WANT TO VISIT BLOCKED/CENSORED WEBSITES

DO LEARN:
HOW TO GET BETTER VPN SPEEDS AND PERFORMANCE
https://greycoder.com/vpn-speed/

AND ALSO IF YOU
WANT TO KEEP HACKERS AWAY WHILE I TRAVEL AND USE WIFI HOTSPOTS.--- HERE YOU CAN ALSO USE a password manager like Lastpass.

KEEP IN MIND THAT
VPN TRAFFIC CAN BE DECRYPTED THROUGH JUNIPER BUG
https://greycoder.com/10795-2/

ALSO DO NOTE ;

1- Privatoria

With prices starting as low as $1.90 per month, Privatoria offers one of the least expensive commercial VPN services for people who want to browse anonymously or circumvent online censorship. Here’s a look at its features, installation process and bandwidth speeds.
https://greycoder.com/review-of-privatorias-vpn-service/


2-THE BEST FREE AND LOW-COST VPN SERVICES FOR 2016
https://greycoder.com/best-free-and-low-cost-vpn-services-for-2016/

3-THE BEST FREE VPN TRIALS OF 2016
by Grey One • July 30, 2014
https://greycoder.com/best-free-vpn-trials/

4-A REVIEW OF NORDVPN FOR 2016
NORDVPN IN A NUTSHELL
NordVPN is an easy-to-use VPN service that provides several advanced features. These include anti-DNS leaking, Tor over VPN, “double encryption” and auto-shutdown of your Internet connection if the VPN connection breaks. The service’s pricing plans are competitive easy to understand. It has excellent installation instructions overall, although they could be better for Linux. Performance is generally good, but it can be slow on certain servers.
https://greycoder.com/nordvpn-review/

5-ExpressVPN has released a client for Linux! Under my tests, it appears to be a reliable application. It runs via the terminal, and allows you to choose switch VPN locations.
https://www.expressvpn.com/blog/expressvpn-app-for-linux/ (ExpressVPN for Linux Is Here and It’s Totally Awesome!
By Brad - April 1, 2016)
https://www.expressvpn.com/

6-PandaPow has released a plug-and-play VPN box for use in China.
https://pandapow.co/wifi/

7-PROXY.SH ANONYMOUS VPN SERVICE REVIEW
https://greycoder.com/proxy-sh-vpn-review/

8-PRIVATE INTERNET ACCESS VPN REVIEW
https://greycoder.com/private-internet-access-vpn-review/

9-IPVANISH LAUNCHES IPHONE APP
https://greycoder.com/ipvanish-launches-iphone-app/

10-THE BEST VPN PROVIDERS THAT OFFER DEDICATED IPS
https://greycoder.com/best-vpn-providers-offering-static-ips/

FINALLY, IF YOU WANT TO USE BITTORRENT ANONYMOUSLY REMEMBER THAT YOU CAN ALSO join Usenet
https://greycoder.com/the-best-usenet-providers/

BUT REMEMBER
HOW TO: PROTECT YOUR PRIVACY ON USENET
https://greycoder.com/how-to-protect-your-privacy-on-usenet/

ALSO SEE LINK BELOW FOR MORE INFO ON USENET
https://plus.google.com/+GovernmentGangStalkingandElectronicHarassment/posts/LpmNdAPBEoS
https://greycoder.com/best-vpn-service/

INTERESTED IN A PRIVATE ALTERNATIVE INTERNET.

Originally shared by Government GangStalking and Electronic Harassment

INTERESTED IN A PRIVATE ALTERNATIVE INTERNET.
See Usenet. ?

BUT REMEMBER
HOW TO: PROTECT YOUR PRIVACY ON USENET
https://greycoder.com/how-to-protect-your-privacy-on-usenet/

If you are tech savvy, try Freenet or I2P.
Surf their info here , in the posted article

ALSO NOTE THE HELPFUL ARTICLES HERE:

1-THE BEST USENET CLIENT OF 2016
https://greycoder.com/best-usenet-client/

2-THE BEST FREE USENET SERVERS 2016
https://greycoder.com/best-free-usenet-servers/

3-THE BEST FREE USENET TRIALS OF 2016
https://greycoder.com/best-free-usenet-trials/

4-EASYNEWS NOW PROVIDES 1900 DAYS OF USENET
https://greycoder.com/easynews-now-provides-1900-days-usenet/
https://greycoder.com/the-best-usenet-providers/

CounterMail: A Diskless, Encrypted Email Service - GreyCoder


https://greycoder.com/countermail-a-diskless-pgp-encrypted-email-service/

How To: Configure Windows 10 Privacy Settings - GreyCoder

Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/how-to-configure-windows-10-privacy-settings/

Freya is a fast and open replacement for Windows and OS X.

Freya is a fast and open replacement for Windows and OS X. It is Ubuntu Linux based. I’ve been using it for about a year now and I’ve found it to be fast and stable operating system.

A company like ThinkPenguin will pre-install Freya on a computer for you. This is the easiest way to switch to Linux.

To complete Freya, I recommend using Elementary Tweaks, and installing Numix Circle Icons.

If you need more privacy in your Operating System I suggest trying Tails or Knoppix.
https://greycoder.com/coming-soon-freya-elementary-os/

WICKR: SEND SELF-DESTRUCTING, ENCRYPTED MESSAGES

WICKR: SEND SELF-DESTRUCTING, ENCRYPTED MESSAGES

Wickr is a free app for the iPhone that allows you to send self-destructing, private instant messages to your friends. You can send text messages, video and audio messages. The whole transmission process is private — even the Wickr app developers cannot read the message, because they are encrypted before they leave your device.
https://greycoder.com/wickr/

THREE FREE ANTI-KEYLOGGING APPS FOR WINDOWS

THREE FREE ANTI-KEYLOGGING APPS FOR WINDOWS

Keyloggers are one of the most effective ways for hackers to steal private information. Here are some solutions for preventing keyloggers from compromising your Windows system.

Keyloggers come in two forms — those that are software-based and those that are embedded in hardware. The latter can only be installed by someone who has physical access to your computer, but the former could be placed on your system remotely through, for example, a malicious software download.

Once installed, keyloggers record every key stroke you make. Some also take screenshots to track what you click. They can then upload this information to any destination on the Internet.

Keyloggers can be hard to detect, but you can install software designed to thwart them. Most anti-keylogger programs work by intercepting key strokes at the system level and encrypting them before they reach a specific application. That way, if someone is monitoring your key strokes, the information he sees will be an encrypted jumble.

You can pay lots of money for anti-keylogger software, but a number of free solutions also exist, including the following:

Zemana: Designed for easy setup and protects all applications, not just the Web browser (as some other free anti-keyloggers do). The basic software is free but a paid premium version adds anti-malware services.
SpyShelter: Offers tools to prevent webcam and microphone hijacking in addition to comprehensive anti-keylogging.
NextGen AntiKeylogger: Easy installation, although the developers don’t provide a lot of details about how exactly the anti-keylogging feature works.

It goes without saying that the best way to prevent keylogging is to protect yourself from malicious software in the first place so that a keylogging package can’t install itself on your system. But if you want extra protection, a free anti-keylogging program can’t hurt.
https://greycoder.com/10450-2/

WALLABAG: A FREE AND OPEN SOURCE REPLACEMENT FOR INSTAPAPER

WALLABAG: A FREE AND OPEN SOURCE REPLACEMENT FOR INSTAPAPER

Wallabag is a “a self hostable application for saving web pages”. Basically, it’s a free, secure, and open source alternative to services like Instapaper, Pocket and Readability.

SAVING WEB PAGES BECAME EASIER
https://greycoder.com/wallabag-free-open-source-replacement-instapaper/

AlternativeTo provides lists of software that can replace your existing software with better, more open substitutes.

AlternativeTo provides lists of software that can replace your existing software with better, more open substitutes. This well-organized site allows people to vote on the software choices.
https://alternativeto.net/

Open Source Dropbox Alternative: Pydio


https://n0where.net/open-source-dropbox-alternative-pydio/

Best Self Hosted Alternatives

Best Self Hosted Alternatives

Selfhosting is the process of locally hosting and managing applications instead of renting from SaaS providers.

https://n0where.net/best-self-hosted-alternatives/
https://n0where.net/best-self-hosted-alternatives/

Bruce Schneier - Wikipedia, the free encyclopedia


The book Data and Goliath (by Bruce Schneier) provides a great overview of the companies and organization tracking you.
https://www.schneier.com/books/data_and_goliath/

Data and Goliath
The Hidden Battles to Collect Your Data and Control Your World
A Book by Bruce Schneier

A New York Times Best Seller

You are under surveillance right now.

Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you’re unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.

The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.

Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He shows us exactly what we can do to reform our government surveillance programs and shake up surveillance-based business models, while also providing tips for you to protect your privacy every day. You’ll never look at your phone, your computer, your credit cards, or even your car in the same way again.

Praise for Data and Goliath
“A thought-provoking, absorbing, and comprehensive guide to our new big data world.”

—Gil Press, Forbes

“Schneier paints a picture of the big-data revolution that is dark, but compelling; one in which the conveniences of our digitized world have devalued privacy.”

—Charles Seife, Nature

“The public conversation about surveillance in the digital age would be a good deal more intelligent if we all read Bruce Schneier first.”

—Malcolm Gladwell, author of David and Goliath

“Schneier exposes the many and surprising ways governments and corporations monitor all of us, providing a must-read User’s Guide to Life in the Data Age. His recommendations for change should be part of a much-needed public debate.”

—Richard A. Clarke, former chief counterterrorism adviser on the National Security Council under Presidents Bill Clinton and George W. Bush, and author of Cyber War

“Schneier did not need the Snowden revelations, as important as they are, to understand the growing threat to personal privacy worldwide from government and corporate surveillance—he’s been raising the alarm for nearly two decades. But this important book does more than detail the threat; it tells the average low-tech citizen what steps he or she can take to limit surveillance and thus fight those who are seeking to strip privacy from all of us.”

—Seymour M. Hersh, Pulitzer Prize–winning journalist

“A pithy, pointed, and highly readable explanation of what we know in the wake of the Snowden revelations, with practical steps that ordinary people can take if they want to do something about the threats to privacy and liberty posed not only by the government but by the Big Data industry.”

—Neal Stephenson, author of Reamde

“A judicious and incisive analysis of one of the most pressing new issues of our time, written by a true expert.”

—Steven Pinker, Johnstone Professor of Psychology, Harvard University, and author of The Better Angels of Our Nature

“As it becomes increasingly clear that surveillance has surpassed anything that Orwell imagined, we need a guide to how and why we’re being snooped and what we can do about it. Bruce Schneier is that guide—step by step he outlines the various ways we are being monitored, and after scaring the pants off us, he tells us how to fight back.”

—Steven Levy, editor-in-chief of Backchannel and author of Crypto and Hackers

“A noted security researcher and author of many books on cryptography and digital security, Schneier's been on this beat a long time, and Data and Goliath is a lucid, sophisticated overview of how corporate and governmental surveillance works, how it doesn't, and what we can do about it. His book is finely constructed, free of cant, and practical in its conclusions—marks of an engineer. As one of a limited number of experts given access to the Edward Snowden documents, he is also in a special position to explain complicated, highly secret surveillance programs to the American public.”

—Jacob Silverman, LA Times

Excerpts
Table of Contents
Introduction
Endnotes

Excerpts from:
Introduction (Scientific American)
Introduction (Gizmodo)
Chapter 2 (Wired)
Chapter 3 (The Christian Science Monitor)
Chapter 5 (The Atlantic)
Chapter 6 (The Blaze)
Chapter 8 (Ars Technica)
Chapter 10 (Science Friday)
Chapter 11 (Digg)
Chapter 15 (Huffington Post)
Chapter 15 (Slate)
Chapter 16 (Motherboard)

Other Editions
Available Now:
German (MVG Verlag)

Upcoming:
Arabic (Forum for Arab and International Relations)
Chinese complex (As If Publishing)
Chinese simplified (Gold Wall Press)
Japanese (Soshisha)
Korean (Minumsa)
Swedish (Daidalos)

Related Essays
The Guardian
Whatever

Related Interviews
Fortinet Blog
Mic

Reviews
Boing Boing | Booklist | The Boston Globe | The Economist | EFF Deeplinks Blog | Federation of American Scientists | Forbes | InfoWorld | Kirkus Reviews | LA Times | Nature | New Scientist | The New York Times—DealBook | Reuters | Slashdot | Times Higher Education | The Wall Street Journal | Washington Post

More Reviews

Audio and Video
Bruce Schneier Presents Data and Goliath
Book Talk at Harvard Book Store
Book Talk at Town Hall Seattle
Book Talk at Google
Book Talk at NYU
Book Roundtable on MPR News
Panel Discussion at Harvard
Interview on Science Friday
Interview on Democracy Now (Part 2)
Interview with Paul Harris

Other
GetAbstract Summary

Dust Jacket of Data and Goliath by Bruce Schneier

up to Books

Photo of Bruce Schneier by Per Ervland.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of Resilient, an IBM Company.
About Bruce Schneier
Bruce Schneier
I've been writing about security issues on my blog since 2004, and in my monthly newsletter since 1998. I write books, articles, and academic papers. Currently, I'm the Chief Technology Officer of Resilient Systems, a fellow at Harvard's Berkman Center, and a board member of EFF.

Featured Essays
It's Time to Break Up the NSA
How the NSA Threatens National Security
Terrorists May Use Google Earth, but Fear is No Reason to Ban It
In Praise of Security Theater
The Eternal Value of Privacy
Terrorists Don't Do Movie Plots
more essays

Latest Book
Data and Goliath
more books

Support Bloggers' Rights! Defend Privacy--Support Epic
Resilient Systems
BlogNewsletterBooksEssaysNewsSpeakingAcademicAbout Me
https://en.wikipedia.org/wiki/Bruce_Schneier

Prism Break provides a well-researched list of software that can help you opt of of surveillance.

Originally shared by Government GangStalking and Electronic Harassment

Prism Break provides a well-researched list of software that can help you opt of of surveillance.

Help make mass surveillance of entire populations uneconomical! We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services.

FOR:

MOBILE
COMPUTERS
NETWORKS
https://prism-break.org/en/

The Best Privacy-Friendly Apps & Services For 2016 - GreyCoder

Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/essential-privacy-services/

How To Make Windows 10 More Private - GreyCoder

Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/how-to-make-windows-10-more-private/

FBI Used U.S. University to Attack Tor Privacy - GreyCoder

Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/fbi-tor/

Mouse Movements Could Identify Tor Users' Real IP Address - GreyCoder

Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/mouse-movements-identify-tor-users-real-ip-address/

Using Firefox's Reader View To Remove Web Clutter - GreyCoder


https://greycoder.com/using-firefoxs-reader-view-remove-website-clutter/

Two Useful Guides To Software Alternatives - GreyCoder

Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/useful-lists-privacy-friendly-software/

Monday, May 23, 2016

How To Use Google Maps & Apple Maps On The Go Without An Internet Connection

Originally shared by Danie van der Merwe

How To Use Google Maps & Apple Maps On The Go Without An Internet Connection

Data plans can be exceptionally expensive and carriers will often bar messaging and call services from being used over them. You know you can’t use your carrier’s data plan to FaceTime mom and will instead have to pay the carrier a different call rate. Your carrier’s data plan will let you browse the internet, Tweet, post to Facebook, or find a place on a map. If you’re using a small data plan and trying to conserve bandwidth, the maps app is one place you can cut back. If you use either Google Maps or Apple Maps, here’s a little trick to using it offline.

This may be obvious to many people, but believe me there are many I still see that think you must be connected to the Internet to use these maps. Newer features now also include voice navigation so that you do not have to keep glancing at the phone. A data connection though will in addition give you real-time traffic routing, but many will be grateful to just have good basic free offline GPS functionality.

See http://www.addictivetips.com/ios/how-to-use-google-maps-apple-maps-on-the-go-without-a-connection/
http://www.addictivetips.com/ios/how-to-use-google-maps-apple-maps-on-the-go-without-a-connection

https://www.youtube.com/watch?v=Yqu0FRT7PHA

https://www.youtube.com/watch?v=Yqu0FRT7PHA
https://www.youtube.com/watch?v=Yqu0FRT7PHA

Sunday, May 22, 2016

“They’ll be watching and scanning your head at a distance, everything…and picking up your biometrics.”

“They’ll be watching and scanning your head at a distance, everything…and picking up your biometrics.”

Originally shared by Government GangStalking and Electronic Harassment

WTF...!!
https://www.youtube.com/watch?v=JV2yMlMz7ks

Friday, April 29, 2016

LOVE 'EM OR HATE 'EM torrent tracking sites are backing the non-sharing of Windows 10. + Operating System Poll

Originally shared by Only Way Is Linux

LOVE 'EM OR HATE 'EM torrent tracking sites are backing the non-sharing of Windows 10. + Operating System Poll

http://www.theinquirer.net/inquirer/news/2423091/torrent-tracking-sites-we-dont-want-any-part-of-windows-10-because-piracy

So far Linux has 14% of the votes so cast your vote :p
http://www.youtube.com/watch?v=DY_FWpr8BX8

Best Free Monitoring system for Linux

Originally shared by Linux Tutorials - Linux How To Guide
http://lintut.com/best-free-monitoring-system-for-linux/

This course module is specially designed and compiled for those beginners, who want to make their way into Linux...

Originally shared by Suhas Patil

This course module is specially designed and compiled for those beginners, who want to make their way into Linux learning process and do the best in today’s IT organizations. This courseware is created as per requirements of industrial environment with complete entrance to Linux, which will help you to build a great success in Linux.

#linux #centos #debian #fedora #ubuntu #redhat   #sysadmin #tecmint  

# Follow Us on Twitter: https://twitter.com/tecmint
http://www.tecmint.com/free-online-linux-learning-guide-for-beginners

#system76 #system76laptops #linuxlaptops

Originally shared by Eric Noya

#system76 #system76laptops #linuxlaptops
https://system76.com/laptops/oryx

Tips for troubleshooting with Linux | Opensource.com

Originally shared by Dena Bishop
http://opensource.com/business/15/10/troubleshooting-process-linux-problems

Jack Wallen shares how to use Nautilus & the command line to manage file permissions and ownership.

Originally shared by The Linux Foundation

Jack Wallen shares how to use Nautilus & the command line to manage file permissions and ownership.
http://www.linux.com/learn/tutorials/760276-how-to-manage-file-and-folder-permissions-in-linux

#linuxlaptops #linuxcomputers

Originally shared by Eric Noya

#linuxlaptops #linuxcomputers
https://youtu.be/__4WRs4-nwI

#windows10 #windows10ismalware #windowsismalware

Originally shared by Eric Noya

#windows10 #windows10ismalware #windowsismalware
http://www.thenewamerican.com/tech/computers/item/22026-windows-10-deletes-users-programs

Arch Linux VS Windows 10 speed match! Guess who's the winner...? ;-)

Originally shared by Eric Noya

Arch Linux VS Windows 10 speed match! Guess who's the winner...? ;-)
#linuxvswindows
Arch Linux vs Windows 10 - Non comprehensive perf…: http://youtu.be/KZGv6PcY_-Q
http://youtu.be/KZGv6PcY_-Q

https://www.youtube.com/watch?v=wqH9KX9o0vg&feature=share #wifi #wi-fi #lifi #li-fi

Originally shared by Eric Noya

https://www.youtube.com/watch?v=wqH9KX9o0vg&feature=share
#wifi
#wi-fi #lifi #li-fi
https://www.youtube.com/watch?v=wqH9KX9o0vg&feature=share

How to run/test Linux on Windows machine without disturbing Windows

Originally shared by Danie van der Merwe

How to run/test Linux on Windows machine without disturbing Windows

Only a few have anticipated  the growth of Linux a few years back. Today Linux has become one of the most secure operating systems. Since Linux is open source many technology giants like Google, Facebook, Twitter etc rely on it .

Linux is so popular that even Microsoft has embraced it for its cloud platform. No one has ever expected of this in the past. Today Linux can run on a Windows machine without disturbing it .

Here are some cool ways on how to use Linux on Windows without uninstalling or disturbing your Windows installation.

I first  tested out Ubuntu many years back using Oracle's VirtualBox, and from there I moved on to having a dual-boot systems (Windows Vista and Ubuntu) before having only Linux on my computer (currently using Kubuntu long term support version).

Even if Linux is not being used as the main OS on your computer it is still very useful to use on older laptops and computers, and I have re-purposed an old computer using Linux Mint, which now acts as my main media machine connected to my TV (just added a Nvidia card with HDMI outputs). Linux certainly breathes new life into old hardware (and of course it runs more than 95% of the world's supercomputers and major stock exchanges so it does pretty well on the high end too).
http://curiouspost.com/how-to-run-linux-on-windows-machine/

https://www.youtube.com/watch?v=uM5UNy3ebKA

Originally shared by Eric Noya

https://www.youtube.com/watch?v=uM5UNy3ebKA
#internetprivacy #privacyaddons #privacy #browserprivacy #browserprivacyaddons  
https://www.youtube.com/watch?v=uM5UNy3ebKA

Linux Brother DCP-J552DW printer driver install

Originally shared by Eric Noya

Linux Brother DCP-J552DW printer driver install
#linuxbrotherdrivers
http://tutorialforlinux.com/2016/02/06/how-to-install-brother-dcp-j552dw-printer-drivers-on-ubuntu-linux-easy-guide/

#windows10privacy

Originally shared by Eric Noya

#windows10privacy
http://www.ghacks.net/2016/02/08/windows-10-phones-home-even-after-privacy-hardening/