(2017) - '..a deeply systemic debt crisis akin to the aftermath of 1929 .. the stage has now been set..' (no replies)        
'..But after a decade of unprecedented expansion of government debt and central bank Credit, the stage has now been set for a more systemic 1929-like financial dislocation.'

'June 27 – Reuters (William Schomberg, Marc Jones, Jason Lange and Lindsay Dunsmuir): “U.S. Federal Reserve Chair Janet Yellen said on Tuesday that she does not believe that there will be another financial crisis for at least as long as she lives, thanks largely to reforms of the banking system since the 2007-09 crash. ‘Would I say there will never, ever be another financial crisis?’ Yellen said… ‘You know probably that would be going too far but I do think we're much safer and I hope that it will not be in our lifetimes and I don't believe it will be,’ she said.”

While headlines somewhat paraphrased Yellen’s actual comment, “We Will not see Another Crisis in Our Lifetime” is reminiscent of Irving Fisher’s “permanent plateau” just weeks before the great crash of 1929. While on the subject, I never bought into the popular comparison between 2008 and 1929 – and the related notion of 2008 as “the 100-year flood”. The 2008/09 crisis was for the most part a private debt crisis associated with the bursting of a Bubble in mortgage Credit – not dissimilar to previous serial global crises, only larger and somewhat more systemic. It was not, however, a deeply systemic debt crisis akin to the aftermath of 1929, which was characterized by a crisis of confidence in the banking system, the markets and finance more generally, along with a loss of faith in government policy and institutions. But after a decade of unprecedented expansion of government debt and central bank Credit, the stage has now been set for a more systemic 1929-like financial dislocation.

As such, it’s ironic that the Fed has branded the banking system cured and so well capitalized that bankers can now boost dividends, buybacks and, presumably, risk-taking. As conventional central bank thinking goes, a well-capitalized banking system provides a powerful buffer for thwarting the winds of financial crisis. Chair Yellen, apparently, surveys current bank capital levels and extrapolates to systemic stability. Yet the next crisis lurks not with the banks but within the securities and derivatives markets: too much leverage and too much “money” employed in trend-following trading strategies. Too much hedging, speculating and leveraging in derivatives. Market misperceptions and distortions on an epic scale.

Compared to 2008, the leveraged speculating community and the ETF complex are significantly larger and potentially perilous. The derivatives markets are these days acutely more vulnerable to liquidity issues and dislocation. Never have global markets been so dominated by trend-following strategies. It’s a serious issue that asset market performance – stocks, bond, corporate Credit, EM, real estate, etc. – have all become so tightly correlated. There are huge vulnerabilities associated with various markets having become so highly synchronized on a global basis. And in the grand scheme of grossly inflated global securities, asset and derivatives markets, the scope of available bank capital is trivial.

I realize that, at this late stage of the great bull market, such a question sounds hopelessly disconnected. Yet, when markets reverse sharply lower and The Crowd suddenly moves to de-risk, who is left to take the other side of what has become One Gargantuan “Trade”? We’re all familiar with the pat response: “Central banks. They’ll have no choice.” Okay, but I’m more interested in the timing and circumstances.

Central bankers are now signaling their desire to proceed with normalization, along with noting concerns for elevated asset prices. As such, I suspect they will be somewhat more circumspect going forward when it comes to backstopping the markets - than, say, back in 2013 with Bernanke’s “flash crash” or with the China scare of early-2016. Perhaps this might help to explain why the VIX spiked above 15 during Thursday afternoon trading. Even corporate debt markets showed a flash of vulnerability this week.'

- Doug Noland, Weekly Commentary: The Road to Normalization, July 1, 2017


Context (Banking Reform - English/Dutch) '..a truly stable financial and monetary system for the twenty-first century..'

'Unsound Finance gets to the heart of the issue.'

'..Like monetarists, Keynes held no capital theory .. the role time plays..' - Jesús Huerta de Soto

'..Loose financial conditions and record debt issuance..'


'..investors’ fear of missing out is looking increasingly desperate..'

'..a giant passive 'beta' bubble .. This may be the Mother of all beta bubbles..'

'..The same combination prevailed at the 1929, 1972, 1987, 2000, and 2007 market peaks..'


(Banking Reform - Monetary Reform) - '..debt is our biggest security threat..'

          'We have no experience in stopping a nuclear war.' - Sidney Drell (no replies)        
'..My greatest concern is the lack of public awareness about this existential threat, the absence of a vigorous public debate about the nuclear-war plans of Russia and the United States, the silent consent to the roughly fifteen thousand nuclear weapons in the world. These machines have been carefully and ingeniously designed to kill us. Complacency increases the odds that, some day, they will. The “Titanic Effect” is a term used by software designers to explain how things can quietly go wrong in a complex technological system: the safer you assume the system to be, the more dangerous it is becoming.'

'The harsh rhetoric on both sides increases the danger of miscalculations and mistakes, as do other factors. Close encounters between the military aircraft of the United States and Russia have become routine, creating the potential for an unintended conflict. Many of the nuclear-weapon systems on both sides are aging and obsolete. The personnel who operate those systems often suffer from poor morale and poor training. None of their senior officers has firsthand experience making decisions during an actual nuclear crisis. And today’s command-and-control systems must contend with threats that barely existed during the Cold War: malware, spyware, worms, bugs, viruses, corrupted firmware, logic bombs, Trojan horses, and all the other modern tools of cyber warfare. The greatest danger is posed not by any technological innovation but by a dilemma that has haunted nuclear strategy since the first detonation of an atomic bomb: How do you prevent a nuclear attack while preserving the ability to launch one?

..

..the Cuban Missile Crisis, when a series of misperceptions, miscalculations, and command-and-control problems almost started an accidental nuclear war—despite the determination of both John F. Kennedy and Nikita Khrushchev to avoid one. In perhaps the most dangerous incident, the captain of a Soviet submarine mistakenly believed that his vessel was under attack by U.S. warships and ordered the firing of a torpedo armed with a nuclear warhead. His order was blocked by a fellow officer. Had the torpedo been fired, the United States would have retaliated with nuclear weapons. At the height of the crisis, while leaving the White House on a beautiful fall evening, McNamara had a strong feeling of dread—and for good reason: “I feared I might never live to see another Saturday night.”

..

The personnel who command, operate, and maintain the Minuteman III have also become grounds for concern. In 2013, the two-star general in charge of the entire Minuteman force was removed from duty after going on a drunken bender during a visit to Russia, behaving inappropriately with young Russian women, asking repeatedly if he could sing with a Beatles cover band at a Mexican restaurant in Moscow, and insulting his military hosts. The following year, almost a hundred Minuteman launch officers were disciplined for cheating on their proficiency exams. In 2015, three launch officers at Malmstrom Air Force Base, in Montana, were dismissed for using illegal drugs, including ecstasy, cocaine, and amphetamines. That same year, a launch officer at Minot Air Force Base, in North Dakota, was sentenced to twenty-five years in prison for heading a violent street gang, distributing drugs, sexually assaulting a girl under the age of sixteen, and using psilocybin, a powerful hallucinogen. As the job title implies, launch officers are entrusted with the keys for launching intercontinental ballistic missiles.

..

..A recent memoir, “Uncommon Cause,” written by General George Lee Butler, reveals that the Pentagon was not telling the truth. Butler was the head of the U.S. Strategic Command, responsible for all of America’s nuclear weapons, during the Administration of President George H. W. Bush.

According to Butler and Franklin Miller, a former director of strategic-forces policy at the Pentagon, launch-on-warning was an essential part of the Single Integrated Operational Plan (siop), the nation’s nuclear-war plan. Land-based missiles like the Minuteman III were aimed at some of the most important targets in the Soviet Union, including its anti-aircraft sites. If the Minuteman missiles were destroyed before liftoff, the siop would go awry, and American bombers might be shot down before reaching their targets. In order to prevail in a nuclear war, the siop had become dependent on getting Minuteman missiles off the ground immediately. Butler’s immersion in the details of the nuclear command-and-control system left him dismayed. “With the possible exception of the Soviet nuclear war plan, [the siop] was the single most absurd and irresponsible document I had ever reviewed in my life,” Butler concluded. “We escaped the Cold War without a nuclear holocaust by some combination of skill, luck, and divine intervention, and I suspect the latter in greatest proportion.” The siop called for the destruction of twelve thousand targets within the Soviet Union. Moscow would be struck by four hundred nuclear weapons; Kiev, the capital of the Ukraine, by about forty.

After the end of the Cold War, a Russian surprise attack became extremely unlikely. Nevertheless, hundreds of Minuteman III missiles remained on alert. The Cold War strategy endured because, in theory, it deterred a Russian attack on the missiles. McNamara called the policy “insane,” arguing that “there’s no military requirement for it.” George W. Bush, while running for President in 2000, criticized launch-on-warning, citing the “unacceptable risks of accidental or unauthorized launch.” Barack Obama, while running for President in 2008, promised to take Minuteman missiles off alert, warning that policies like launch-on-warning “increase the risk of catastrophic accidents or miscalculation.” Twenty scientists who have won the Nobel Prize, as well as the Union of Concerned Scientists, have expressed strong opposition to retaining a launch-on-warning capability. It has also been opposed by former Secretary of State Henry Kissinger, former Secretary of State George Shultz, and former Senator Sam Nunn. And yet the Minuteman III missiles still sit in their silos today, armed with warheads, ready to go.

William J. Perry, who served as Secretary of Defense during the Clinton Administration, not only opposes keeping Minuteman III missiles on alert but advocates getting rid of them entirely. “These missiles are some of the most dangerous weapons in the world,” Perry wrote in the Times, this September. For many reasons, he thinks the risk of a nuclear catastrophe is greater today than it was during the Cold War. While serving as an Under-Secretary of Defense in 1980, Perry also received a late-night call about an impending Soviet attack, a false alarm that still haunts him. “A catastrophic nuclear war could have started by accident.”

Bruce Blair, a former Minuteman launch officer, heads the anti-nuclear group Global Zero, teaches at Princeton University, and campaigns against a launch-on-warning policy. Blair has described the stresses that the warning of a Russian attack would put on America’s command-and-control system. American early-warning satellites would detect Russian missiles within three minutes of their launch. Officers at norad would confer for an additional three minutes, checking sensors to decide if an attack was actually occurring. The Integrated Tactical Warning/Attack System collects data from at least two independent information sources, relying on different physical principles, such as ground-based radar and satellite-based infrared sensors. If the norad officials thought that the warning was legitimate, the President of the United States would be contacted. He or she would remove the Black Book from a briefcase carried by a military aide. The Black Book describes nuclear retaliatory options, presented in cartoon-like illustrations that can be quickly understood.

..

Although the Air Force publicly dismissed the threat of a cyberattack on the nuclear command-and-control system, the incident raised alarm within the Pentagon about the system’s vulnerability. A malfunction that occurred by accident might also be caused deliberately. Those concerns were reinforced by a Defense Science Board report in January, 2013. It found that the Pentagon’s computer networks had been “built on inherently insecure architectures that are composed of, and increasingly using, foreign parts.” Red teams employed by the board were able to disrupt Pentagon systems with “relative ease,” using tools available on the Internet. “The complexity of modern software and hardware makes it difficult, if not impossible, to develop components without flaws or to detect malicious insertions,” the report concluded.

In a recent paper for the Royal United Services Institute for Defence and Security Studies, Andrew Futter, an associate professor at the University of Leicester, suggested that a nuclear command-and-control system might be hacked to gather intelligence about the system, to shut down the system, to spoof it, mislead it, or cause it to take some sort of action—like launching a missile. And, he wrote, there are a variety of ways it might be done.

..

Strict precautions have been taken to thwart a cyberattack on the U.S. nuclear command-and-control system. Every line of nuclear code has been scrutinized for errors and bugs. The system is “air-gapped,” meaning that its networks are closed: someone can’t just go onto the Internet and tap into a computer at a Minuteman III control center. At least, that’s the theory. Russia, China, and North Korea have sophisticated cyber-warfare programs and techniques. General James Cartwright—the former head of the U.S. Strategic Command who recently pleaded guilty to leaking information about Stuxnet—thinks that it’s reasonable to believe the system has already been penetrated. “You’ve either been hacked, and you’re not admitting it, or you’re being hacked and don’t know it,” Cartwright said last year.

If communications between Minuteman control centers and their missiles are interrupted, the missiles can still be launched by ultra-high-frequency radio signals transmitted by special military aircraft. The ability to launch missiles by radio serves as a backup to the control centers—and also creates an entry point into the network that could be exploited in a cyberattack. The messages sent within the nuclear command-and-control system are highly encrypted. Launch codes are split in two, and no single person is allowed to know both parts. But the complete code is stored in computers—where it could be obtained or corrupted by an insider.

Some of America’s most secret secrets were recently hacked and stolen by a couple of private contractors working inside the N.S.A., Edward Snowden and Harold T. Martin III, both employees of Booz Allen Hamilton. The N.S.A. is responsible for generating and encrypting the nuclear launch codes. And the security of the nuclear command-and-control system is being assured not only by government officials but also by the employees of private firms, including software engineers who work for Boeing, Amazon, and Microsoft.

Lord Des Browne, a former U.K. Minister of Defense, is concerned that even ballistic-missile submarines may be compromised by malware. Browne is now the vice-chairman of the Nuclear Threat Initiative, a nonprofit seeking to reduce the danger posed by weapons of mass destruction, where he heads a task force examining the risk of cyberattacks on nuclear command-and-control systems. Browne thinks that the cyber threat is being cavalierly dismissed by many in power. The Royal Navy’s decision to save money by using Windows for Submarines, a version of Windows XP, as the operating system for its ballistic-missile subs seems especially shortsighted. Windows XP was discontinued six years ago, and Microsoft warned that any computer running it after April, 2014, “should not be considered protected as there will be no security updates.” Each of the U.K. subs has eight missiles carrying a total of forty nuclear weapons. “It is shocking to think that my home computer is probably running a newer version of Windows than the U.K.’s military submarines,” Brown said.In 2013, General C. Robert Kehler, the head of the U.S. Strategic Command, testified before the Senate Armed Services Committee about the risk of cyberattacks on the nuclear command-and-control system. He expressed confidence that the U.S. system was secure. When Senator Bill Nelson asked if somebody could hack into the Russian or Chinese systems and launch a ballistic missile carrying a nuclear warhead, Kehler replied, “Senator, I don’t know . . . I do not know.”

After the debacle of the Cuban Missile Crisis, the Soviet Union became much more reluctant to provoke a nuclear confrontation with the United States. Its politburo was a committee of conservative old men. Russia’s leadership is quite different today. The current mix of nationalism, xenophobia, and vehement anti-Americanism in Moscow is a far cry from the more staid and secular ideology guiding the Soviet Union in the nineteen-eighties. During the past few years, threats about the use of nuclear weapons have become commonplace in Moscow. Dmitry Kiselyov, a popular newscaster and the Kremlin’s leading propagandist, reminded viewers in 2014 that Russia is “the only country in the world capable of turning the U.S.A. into radioactive dust.” The Kremlin has acknowledged the development of a nuclear torpedo that can travel more than six thousand miles underwater before devastating a coastal city. It has also boasted about a fearsome new missile design. Nicknamed “Satan 2” and deployed with up to sixteen nuclear warheads, the missile will be “capable of wiping out parts of the earth the size of Texas or France,” an official news agency claimed.

..

Russia’s greatest strategic vulnerability is the lack of a sophisticated and effective early-warning system. The Soviet Union had almost a dozen satellites in orbit that could detect a large-scale American attack. The system began to deteriorate in 1996, when an early-warning satellite had to be retired. Others soon fell out of orbit, and Russia’s last functional early-warning satellite went out of service two years ago. Until a new network of satellites can be placed in orbit, the country must depend on ground-based radar units. Unlike the United States, Russia no longer has two separate means of validating an attack warning. At best, the radar units can spot warheads only minutes before they land. Pavel Podvig, a senior fellow at the U.N. Institute for Disarmament Research, believes that Russia does not have a launch-on-warning policy—because its early-warning system is so limited.

For the past nine years, I’ve been immersed in the minutiae of nuclear command and control, trying to understand the actual level of risk. Of all the people whom I’ve met in the nuclear realm, Sidney Drell was one of the most brilliant and impressive. Drell died this week, at the age of ninety. A theoretical physicist with expertise in quantum field theory and quantum chromodynamics, he was for many years the deputy director of the Stanford Linear Accelerator and received the National Medal of Science from Obama, in 2013. Drell was one of the founding members of jason—a group of civilian scientists that advises the government on important technological matters—and for fifty-six years possessed a Q clearance, granting him access to the highest level of classified information. Drell participated in top-secret discussions about nuclear strategy for decades, headed a panel that investigated nuclear-weapon safety for the U.S. Congress in 1990, and worked on technical issues for jason until the end of his life. A few months ago, when I asked for his opinion about launch-on-warning, Drell said, “It’s insane, the worst thing I can think of. You can’t have a worse idea.”

Drell was an undergraduate at Princeton University when Hiroshima and Nagasaki were destroyed. Given all the close calls and mistakes in the seventy-one years since then, he considered it a miracle that no other cities have been destroyed by a nuclear weapon—“it is so far beyond my normal optimism.” The prospect of a new cold war—and the return of military strategies that advocate using nuclear weapons on the battlefield—deeply unnerved him. Once the first nuclear weapon detonates, nothing might prevent the conflict from spiralling out of control. “We have no experience in stopping a nuclear war,” he said.

..

Donald Trump and Vladimir Putin confront a stark choice: begin another nuclear-arms race or reduce the threat of nuclear war. Trump now has a unique opportunity to pursue the latter, despite the bluster and posturing on both sides. His admiration for Putin, regardless of its merits, could provide the basis for meaningful discussions about how to minimize nuclear risks. Last year, General James Mattis, the former Marine chosen by Trump to serve as Secretary of Defense, called for a fundamental reappraisal of American nuclear strategy and questioned the need for land-based missiles. During Senate testimony, Mattis suggested that getting rid of such missiles would “reduce the false-alarm danger.” Contrary to expectations, Republican Presidents have proved much more successful than their Democratic counterparts at nuclear disarmament. President George H. W. Bush cut the size of the American arsenal in half, as did his son, President George W. Bush. And President Ronald Reagan came close to negotiating a treaty with the Soviet Union that would have completely abolished nuclear weapons.

Every technology embodies the values of the age in which it was created. When the atomic bomb was being developed in the mid-nineteen-forties, the destruction of cities and the deliberate targeting of civilians was just another military tactic. It was championed as a means to victory. The Geneva Conventions later classified those practices as war crimes—and yet nuclear weapons have no other real use. They threaten and endanger noncombatants for the sake of deterrence. Conventional weapons can now be employed to destroy every kind of military target, and twenty-first-century warfare puts an emphasis on precision strikes, cyberweapons, and minimizing civilian casualties. As a technology, nuclear weapons have become obsolete. What worries me most isn’t the possibility of a cyberattack, a technical glitch, or a misunderstanding starting a nuclear war sometime next week. My greatest concern is the lack of public awareness about this existential threat, the absence of a vigorous public debate about the nuclear-war plans of Russia and the United States, the silent consent to the roughly fifteen thousand nuclear weapons in the world. These machines have been carefully and ingeniously designed to kill us. Complacency increases the odds that, some day, they will. The “Titanic Effect” is a term used by software designers to explain how things can quietly go wrong in a complex technological system: the safer you assume the system to be, the more dangerous it is becoming.'

- Eric Schlosser, World War Three, By Mistake, December 23, 2016


Context

The International Day for the Total Elimination of Nuclear Weapons

          Tools: MassBleed - MassBleed SSL Vulnerability Scanner        

          Tools: Joomlavs - A black box, Ruby powered, Joomla vulnerability scanner         

          Tools: XVWA - Xtreme Vulnerable Web Application         

          Improve your nonprofit’s account security with 2-step verification        

While online accounts allow nonprofits to easily communicate with partners, volunteers and donors across the world, this shared network can also leave your account vulnerable to intruders. As your nonprofit continues to grow its online presence, it’s crucial to keep confidential information (e.g., finances or donor’s information) safe. While passwords have historically been the sole guardian for online account access, research from Google has shown that many passwords and security questions can easily be guessed. That's why we strongly recommend that all nonprofits using GSuite for Nonprofits, or Google products like Gmail, use 2-Step Verification (2SV) as an additional protection on their account(s). 

Account hijacking—a process through which an online account is stolen or hijacked by a hacker—constitutes a serious threat to your nonprofit’s operations. Typically, account hijackings are carried out by phishing attempts or hackers who guess weak passwords. Because of this, it’s especially important for your nonprofit to maintain strong and unique account passwords to keep sensitive data safe.

But 2SV goes beyond just a strong password. It's an effective security feature that combines "something you know" (e.g., a password) and "something you have" (e.g., a text, a prompt, or a Security Key) to protect your accounts. Think of this like withdrawing money from an ATM/cash machine: You need both your PIN and your debit card.

Google Authentication app.png
Our free Google Authenticator app is available for Android and iOS devices, which generates a code for you each time you want to sign in to your account.

Now that you know what 2SV is, head over to our Help Page to start improving your nonprofit’s online security now. (Quick tip: Remember to keep your account settings up to date and configure backup options to use if your phone is ever lost or stolen). Stay safe, nonprofits!  

To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more at no charge. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more and enroll here.


          Four ways to keep your nonprofit safe & secure online        
safety security g4np
For nonprofits, the Internet serves as a powerful vehicle for change — creating a way to access information, connect with users, and drive innovation. But navigating the web can also be a tricky task. Online safety and security has become increasingly pertinent for all digital users, including nonprofits. While it’s relevant to all though, it’s unattended by many. This raises the question: “How do we keep our nonprofit (and the community we serve) safe and secure online?”

Today, we’re partnering with Google’s User Advocacy Group to share four smart tips to keep your nonprofit, your users, and you safe online.

1. Secure your passwords

Many of us “know” that it’s smart to pick a strong password, but out of convenience we also continue to use our favorite pet’s name (e.g. “Clifford”) or other not-so-creative passwords like “password.” Although pets like Clifford are great, they don’t make great passwords. Rather, this weak protection creates vulnerable access to some of your nonprofit’s most sensitive information.

Picking strong passwords that are different for each of your accounts is extremely important -- it’s also good practice to update your passwords regularly.  Check out the following tips: 

  • Use a unique password for each of your accounts. Would you give a burglar a key that accessed your home, car, garage, and more? Using the same password for multiple accounts creates the same type of risk. Ensure you’re protecting your data by using unique passwords for each account.

  • Include numbers, letters and symbols in your password. The longer your password is, the harder it is to guess. Adding numbers, symbols and mixed-case letters makes it harder for someone to gain access to your account.

  • Create password recovery options and keep them up-to-date. If you forget your password or get locked out, you need a way to get back into your account. Many services will send this information to a recovery email address to reset your password, so be sure your recovery email address is up-to-date and accessible. You may also be able to add a phone number to your profile to receive a code to reset your password via text message. Having a mobile phone number on your account is one of the easiest and most reliable ways to help keep your account safe.

2. Take the security checkup


Google’s Security Checkup is a quick, easy way to review the following information about your account (and more)!
  • Recent activity: This is a quick overview of your recent sign-ins to Google. If you see any activity from a location or device you don’t recognize, change your password immediately.

  • Account permissions: These are the apps, websites, and devices connected to your Google account. Take a look and make sure you trust—and actually use—all of them. You might want to remove an old phone, or that dusty app you never use.

  • Check your 2-step verification:  Most people have only one layer of protection with their password. 2-step verification adds an additional layer of security to your account by requiring a phone or security key to access your account information.

3. Understand your privacy settings


If you do your personal and business work on the same computer, you will want to also check your privacy settings through Google’s Privacy Checkup. Privacy Checkup allows you to control what information like photos, videos and reviews are shared to the public or to whomever you choose.
  • Manage your sharing: You can decide what information you want to share such as videos, photos and reviews. Perhaps your nonprofit videos are only shared with your friends, when you want them to be shared with anyone. This is a simple way to check to see who can see what.

  • Personalize your google experience: One additional function of privacy checkup is to see what information you’re sharing with Google. Google uses this information to provide better search results and more relevant information to get you answers quicker and more relevant information to share to your nonprofit community.


Review important information about how Google uses data to make services better for you and your nonprofit.

4. Ensure you're switching between your personal & business accounts


We understand that as a nonprofit, you wear many hats and manage multiple business accounts in addition to personal ones. Google makes it easy toggle between accounts — visit your account settings to quickly determine which data you’re accessing, and rest easy knowing your personal and business information are separate.

  • Guest Mode or Incognito mode: Share Chrome with other people in your organization and ensure everyone has their own settings and bookmarks. You can also utilize Guest mode or Incognito mode to open a private browsing session in Chrome without leaving browser history or cookies behind once you’ve logged out.

  • Using Chrome on an unfamiliar device or machine: If you’re using an unfamiliar device or machine, ensure you’ve properly logged out of your account before heading off to your next meeting.


Online security doesn’t have to be difficult. These simple steps will give you peace of mind and protect your nonprofit’s valuable work. If you have any other online security questions or want to recommend a topic for a future blog, please add a comment below. 

To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more — all at no charge. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more + enroll here.  


          HTTP Verb Tampering Demo/Example/Tutorial         


What is HTTP Verb?

  •  According to Wiki "The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems.  HTTP is the foundation of data communication for the World Wide Web.

  • Verb is nothing but HTTP methods used to indicate the desired action to be performed on the identified resource.


-  List of some basic HTTP Verb or Methods
  • OPTIONS
  • GET
  • HEAD
  • POST 
  • PUT
  • DELETE
  • TRACE
  • CONNECT



What is HTTP Verb Tampering? 

It's a method to bypass a defense technique by tampering the verb. Some secret directories have restricted access by  basic authentication. This directories are protected by the .htaccess file which can be easily exploited. This attack is a result of a Apache  htaccess file misconfiguration .

An administrator, limits the access to the private resource or directory just via POST request method. See the vulnerable code below.















Here AuthUserFile is the directory to the .htpasswd file which contains the username & password in encrypted format.

<LIMIT GET POST>
require valid-user
</LIMIT>


It just limits the POST method & matches the credentials that saved in htpasswd file, if wrong error page shows up.


Here the administrator has limited POST method, but also not blacklisted other methods?. This means any requests via other method would lead the attacker having access to the protected  private resources or directory. Below i have provided a video DEMO of  successful exploitation of an HTTP Verb tampering vulnerability via Live HTTP Headers ( Firefox add-on) on AT&T sub domain (Reported & Fixed). In the next post i will be showing you various ways to fix or apply a patch to this vulnerability .





The novel starts with a jogger running in a California beach town (Moonlight Cove  -- “In the Moonlight, Do Me” indeed) being attacked by a mysterious alien-like creature, and soon the mystery, somewhat in a “Twin Peaks” -like fashion, is examined from the viewpoint of various characters, whose narratives gradually connect.  (Irving Wallace had used this technique for building plots for Cold War spy novels back in the 1960s).  It seems as though people are getting converted into hybrid creatures and that a sociopathic computer scientist Shaddock is involved.



I would have thought that this novel would make a good miniseries on a cable channel,, even today, as the premise has less dependence on political circumstances and even technology than most sci-fi suspense novels.  Koontz sometimes gets into Shaddack’s head, anticipating the psyche of a modern terrorist, deflecting the social issues (like gay rights in one passage) in surprising ways.
I mention the novel because Koontz is often heralded in some circles as the ideal author who writes strictly to sell, and he indeed has a huge career of a long list of novels, divided into various subcategories of suspense.   Literary agents love his approach, because it is so commercial.  So do trade publishers.

One problem with developing suspense novels is that sometimes they become very vulnerable to changes in world politics, which can come suddenly and be largely unexpected by suspense authors, like the fall of the Soviet Union at the end of 1991.  Today it’s not clear who is the biggest threat: North Korea, Iran, ISIS, Russia, China.

I’ve had that problem, and my own approach to fiction has to start with my own narrative first.  I make no apologies, despite the disruptive advice and sales calls from others.


          Time: "Innocent: The Fight Against Wrongful Conviction"         

Time has a Special Edition “Innocent: The Fight Against Wrongful Convictions”, :25 Years of the Innocence Project”, 96 pages, heavily illustrated, many writers.

There are seven chapters, each with several essays.  The first one starts with the wrongful conviction f a man for a brutal robbery and murder of a money order salesman in Cleveland in 1975.
One of the biggest topics is DNA evidence.  But it has been surprisingly difficult to get cases retried with new DNS evidence,  Politically motivated prosecutors or the police entice confessions out of vulnerable defendants, especially from child witnesses in sex cases.

There is some attention to forgiveness and to reparations.



Chapter Six contains an excerpt from “Ghost of the Innocent Man” by Benjamin Rachlin, this excerpt focused on the Center for Actual Innocence in North Carolina.

The book should be interesting to filmmakers Andrew Jenks and Ryan Ferguson (who was himself unjustly convicted of second degree murder in Missouri and got out after 10 years (Andrew Jenks’s film “Dream/Killer”, Movies, Jan. 22, 2016), and the MTV series "Unlocking the Truth".


          Proyecto de Curso de Capacitación y Actualización Sindical        

Introducción

La continua capacitación de los hombres y mujeres que representan a los obreros en las distintas plantas de empaque de la Seccional General Roca, es necesaria para que el accionar de estos representantes sean los adecuados en la defensa de los derechos de sus compañeros ante la patronal. Una de las propuestas que la conducción actual llevaba en su plataforma electoral en las últimas elecciones, era lo referente a la capacitación gremial de los delegados y demás dirigentes del sindicato de la fruta.

La Comisión Directiva de la Seccional General Roca del Sindicato de Obreros Empacadores de Frutas de Río Negro Y Neuquén, están convencidos de que este es un momento propicio para encarar este desafío, con la intención de aportar una formación cualitativa para que la acción de los dirigentes sindicales y delegados de plantas de empaque sea acorde a las necesidades actuales, con la convicción de que sólo a través de delegados capacitados y concientes de su rol, se puede confiar en la construcción de un sindicalismo moderno y responsable.

No nos precede experiencia en esta área y será necesario mucho esfuerzo, colaboración y participación de todos los que tenemos algún grado de responsabilidad en la representación de los trabajadores, esto así porque la defensa de los derechos de los obreros de la fruta a sido y será un compromiso que hemos asumido, y que así lo hicimos porque tenemos vocación de servicio.

Para lograr esta meta, y advirtiendo que la Asociación Civil “Gestar, promoviendo el desarrollo humano” tenía como principal inquietud la formación ciudadana, es que nos hemos unido para consumar el fin propuesto por ambas instituciones: la del Sindicato para mejorar la defensa de los derechos laborales de los trabajadores del sector, la de la Asociación Civil “Gestar” para tener ciudadanos cada vez más consientes de sus derechos y con conocimientos del modo de ejercerlos.

Esperamos lograr, a través de esta mancomunación de esfuerzo e ideales, mejores representantes gremiales y, en el proceso, mejores ciudadanos.

Comisión Directiva Sindicato de la Fruta- Seccional General Roca

Comisión Directiva- Asociación Civil “Gestar, promoviendo el desarrollo humano"

FUNDAMENTOS

En los tiempos que corren se hace cada vez más necesaria la capacitación gremial, pues muchos de los delegados y demás dirigentes actúan en base a sus propias experiencias, la que lleva a un aprendizaje de prueba y error, y cuando se cometen errores en la defensa de los derechos laborales, los únicos perjudicados son los trabajadores que ven vulnerados sus derechos sociales. Con esto no queremos menospreciar la experiencia, pero a esto en necesario sumarle otros conocimientos.

Así, se hace cada vez más importante el acceso al conocimiento, pues este constituye un valor central, una necesidad y un derecho inalienable de los trabajadores. El conocimiento, en la hora actual, tiene un peso decisivo en la discusión con las empresas en la defensa de los intereses de los compañeros trabajadores del empaque.

El conocimiento es una herramienta indispensable, y se constituye en condición para pensar, proponer, defender y concretar estrategias de política sindical, educación no formal y acción social.

En el marco de este proyecto de capacitación, que en principio apunta a lo sindical o gremial, nos proponemos como meta, que sea mucho más amplio y abarcativo, ya sea en cuanto a los temas a desarrollar como también a los destinatarios; pensada para brindar posibilidades de acceso a todos aquellos a quienes la deseen, basándose en la solidaridad, la unidad y el reconocimiento de las experiencias previas de cada uno de los representantes de los obreros del empaque. De esta forma es posible integrar y reconciliar a los trabajadores de la fruta con su Sindicato.

También es necesario que la capacitación reconozca la diversidad y la diferencia de niveles y experiencias que traen los trabajadores, para de esta forma poner en práctica un principio básico de la sociedad: la igualdad de oportunidades.

Con este Curso de Capacitación Gremial buscamos dar respuesta a la necesidad de contar en los lugares de trabajo, con delegados que sepan representar los intereses de sus compañeros mostrando la solvencia necesaria para estar a la altura de la compleja realidad que presentan actualmente las relaciones laborales.

METAS

En esta primera etapa, la meta general es que quienes representan a los trabajadores estén preparados desde todos los aspectos (capacidad para negociar, asesorar, debatir, criticar, proponer, etc.) para realizar la tarea para la que sus propios compañeros lo han elegido.

OBJETIVOS

El objetivo que se propone es:

  • Capacitar a los representantes gremiales de los conocimientos necesarios que les posibiliten transformarse en líderes en sus respectivos lugares de trabajo, así como actualizarlos en la nueva legislación aplicable al sector.
  • Resaltar el conocimiento y la preparación como un elemento central en la tarea de la defensa de los derechos de los trabajadores.
  • Posibilitar el mejoramiento de la negociación contractual, logrando enriquecer y revitalizar el accionar sindical.
  • Acrecentar la credibilidad de los dirigentes del sindicato ante la mirada de los compañeros trabajadores del empaque, lo que posibilitara un mejor posicionamiento ante los empresarios.
  • Resaltar valores tales como compañerismo, solidaridad, respeto a derechos y opiniones de terceros, ética, asociativismo, compromiso, responsabilidad, vocación de servicio.

LUGAR

Sede Gremial del Sindicato de Obreros Empacadores de Frutas de Río Negro y Neuquén de esta Seccional, sito en calle Misiones 1675 de General Roca.

MODO

Se hará a través de seminarios, cursos o talleres, siendo este último el método más propicio para que puedan darse una serie de intercambio de conocimientos y experiencias entre los participantes. Los encuentros se realizaran los días sábados, cuyas fechas tentativas están especificadas en el Programa Curricular, con una duración de 3 1/2 (Tres y media) horas reloj por encuentro, totalizando 42 horas al finalizar el Curso, haciéndose entrega del certificado correspondiente.

BENEFICIARIOS

Los beneficiarios directos de estos encuentros de capacitación serán unas 65 personas entre delegados e integrantes de Comisión Directiva.

BENEFICIARIOS INDIRECTOS

Los trabajadores representados por los asistentes, calculados en más de 2.500 trabajadores.

COSTO DE LA CAPACITACIÓN: El costo del curso de la capacitación será afrontado con recursos de la Seccional General Roca del Sindicato de Obreros Empacadores de Frutas de Rio Negro y Neuquén y por la Asociación civil “Gestar, promoviendo el desarrollo humano”.

PROGRAMA CURRICULAR (con fechas tentativas de cursado)

PRIMER MODULO: INTERPRETACION DE RECIBOS DE SUELDO Y ACUERDOS DE PRODUCTIVIDAD. (01-08-09)

SEGUNDO MODULO: 1ra Parte: CONVENIO COLECTIVO DE TRABAJO: CONCEPTO Y ALCANCES. LEYES APLICABLES. (15-08-09)

2da Parte: CCT 1/76: PARTES INTERVINIENTES, VIGENCIA Y AMBITO DE APLICACIÓN. REINCORPORACION DEL PERSONAL. SUSPENSIÓN FIN TEMPORADA. PAGO SUELDOS E ITEMS QUE LO INTEGRAN. FALLOS. (29-08-09)

3ra Parte: CCT 1/76: NORMAS APLICABLES A POST-TEMPORADA. DERECHOS Y OBLIGACIONES DE LOS OBREROS, DE LAS EMPRESAS Y DE LOS DELEGADOS. FALLOS. DESACTUALIZACION CCT 1/76. (12-09-09)

TERCER MODULO: TECNICA DE NEGOCIACIÓN. (26-09-09)

CUARTO MODULO: NEGOCIACIÓN COLECTIVA O PARITARIA: NOMINACION DE PARITARIOS Y MANDATO DE LOS MISMOS. ALCANCES DEL ACUERDO. CONCILIACION OBLIGATORIA. LAUDO ARBITRAL. (03-10-09)

QUINTO MODULO: MEDIDAS DE ACCION DIRECTA. CLASES Y DIFICULTADES EN CADA CASO. CAPACIDAD DE LIDERAR Y DE NEGOCIAR. (17-10-09)

SEXTO MODULO. SINDICATO DE LA FRUTA: ESTATUTO. ORGANIZACIÓN Y FUNCIONES. FACULTADES Y ATRIBUCIONES DE LAS SECCIONALES. (31-10-09)

SEPTIMO MODULO: EVOLUCION DE LOS DERECHOS DEL TRABAJADOR. CONSTITUCION NACIONAL, PROVINCIAL Y LCT. (14-11-09)

OCTAVO MODULO: ACCIDENTES DE TRABAJO. LEY APLICABLE. OBLIGACIONES DE LA EMPRESA. TRAMITES Y GESTIONES CORRESPONDIENTES. (28-11-09)

NOVENO MODULO: SEGURIDAD SOCIAL: HISTORIA, ALCANCES Y VIGENCIA. ANALISIS DE CADA UNO EN EL MARCO DE LOS OBREROS DE LA FRUTA (TEMPORARIOS). (12-12-09)

CERTIFICADOS: Se extenderán certificados a quienes hayan cumplido con el 70% de asistencia.

EXPOSITORES: Cada uno de los temas será abordado por profesionales y/o personas idóneas en cada una de las temáticas a desarrollar.

FORMULACION, COORDINACION Y ORGANIZACIÓN: Lo realizará la Asociación Civil “Gestar, promoviendo el desarrollo humano”, pues este tipo de capacitación esta contemplado entre los objetivos estatutarios de la mencionada asociación civil, habiendo sido convocada por la gremial para la formulación del proyecto, la coordinación y organización de cada uno de los módulos, como así encargada de contratar a los distintos expositores.

Comisión Directiva Sindicato de la Fruta- Seccional General Roca

Comisión Directiva- Asociación Civil “Gestar, promoviendo el desarrollo humano”


          US company to offer microchip implants to employees        
07/26/2017

Over the past few years, the security industry has begun to embrace many new technologies—robotics, the cloud, biometrics, for example—but one company here in the U.S., Three Square Market, is pushing the boundaries of RFID technology by offering to implant tiny RFID chips—the size of a grain of rice—into its employees’ hands between the thumb and forefinger.

The chip would allow employees to not only buy snacks in the break room but also have their hands function as a mobile key to gain access to the building and other doors, which makes me think of the possible applications/ramifications within security.

Implanting chips in employee’s hands is already being done in Sweden, where an organization named Epicenter is having success with an increasing number of employees there opting to get the implant. Here in the U.S., Three Square Market says it has approximately 50 employees who are interested in getting the implant, and unlike in Sweden, the company is paying for the $300 procedure for its employees. Three Square Market partnered with a Swedish firm, BioHax International, to make the chip and is planning to sell the technology to other companies.

"Eventually, this technology will become standardized, allowing you to use this as your passport, public transit, all purchasing opportunities, etc.," chief executive Todd Westby wrote in a blog post announcing the program, noting that there is even potential for storing medical/health information, and for use as payment at other RFID terminals.

But one has to wonder what security vulnerabilities this could create, especially in protecting the data on that chip from being hacked, stolen and/or compromised, etc. Not to mention, the “creepy” factor here, as mass adoption of microchip implants is dubious, at best.

Maybe some day, like in the year 2112, but in the short term, I do think there is good fodder here for a futuristic sci-fi movie.
 


          It's Spud Time        

The United Nations wants more people to appreciate the potato's potential to fight world hunger

Food for Thought

As 2007 winds down, thoughts naturally turn towards what might lie ahead. Meals rich in high-carb tubers, perhaps? That's what the United Nations would like everyone to contemplate throughout 2008, which it is designating the International Year of the Potato.

Farmers now harvest more than 300 million tons of potatoes (Solanum tuberosum) worldwide. That makes it the fourth biggest food crop, trailing only corn, wheat, and rice.

For 8,000 years, the humble potato has been a staple in the South American Andes, its homeland. Spanish adventurers encountered the New World crop roughly 500 years ago and brought various types back to Europe. Today, potatoes are cultivated not only throughout the Americas, but also from China's uplands to India's subtropical lowlands—even on Ukraine's arid steppes.

A testament to the potato's Western roots, production of this crop in the States and southward leads the world. Fully 40 percent of the 2006 potato harvest came from North America, with Latin American farmers contributing another 16 percent.

However, appreciation for this nutritious starch within developing countries outside of the Americas—especially in Asia—has been growing steadily, with production of the crop in those regions climbing some 5 percent annually. Indeed, 2005 marked the first time in recent history that production of potatoes in the developing world exceeded that in developed nations.

Although most people think of potatoes as a commodity, in fact, more potatoes are processed to make fast foods, snacks, and convenience items than are sold fresh in the market place. Today, China is the leading producer of spuds, followed by the Russian states and India. International trade in potatoes—worth $6 billion annually—has also been growing within developing nations.

You might then ask why, with all of this pre-existing global interest in potatoes, the UN feels compelled to devote a year of workshops, research contests, and other focused attention on this one particular food. And the reason, the UN's Food and Agricultural Organization argues, is that much of the spud's potential to feed the poor remains untapped.

For instance, although Asians eat nearly half of the world's potatoes, per capita consumption even in Asia remains modest—just 25 kilograms per year, or roughly 45 percent of U.S. consumption and just 27 percent of what's typical in Europe.

Even were potatoes to win greater respect for their nutritional attributes and ability to serve as industrial feedstocks, they couldn't necessarily make a big contribution in new regions of the world without significantly more research. The tubers are vulnerable to a host of major diseases—like the one that set off Ireland's 1845 potato famine. Some varieties of potato are especially resistant to particular diseases, but may not grow well in new regions of the world or taste that yummy.

That's where potato scientists come in. They can identify the climate, soil types, day length, and native diseases with which any new potato crop would have to contend. Then they'll cross lines of wild or cultivated spuds to develop ones with traits that will allow them to thrive outside the Americas. The good news, the UN program notes: "The potato has the richest genetic diversity of any cultivated plant." So there's plenty of potential to tailor a new cultivar to meet the needs of farmers in most places on the globe.

But the potato's biggest advantage, according to the International Potato Center, based in Lima, Peru, is that it yields more food, more quickly, on less land, and in harsher climates than any other major crop. Up to 85 percent of the plant is edible, compared to only about 50 percent for cereal grains. Moreover, the Center notes, potatoes "are ideally suited to places where land is limited and labor is abundant—conditions in much of the developing world."

To help get this word out to agricultural agencies in parts of the world not already turned on to spuds, and from them to farmers, the International Potato Center will be sponsoring a March 2008 meeting: Potato Science for the Poor–Challenges for the New Millennium (http://www.cipotato.org/Cuzco_conference/). Those who attend will have the opportunity to explore the possibility of cooperating to fine tune existing potatoes into higher-yielding varieties.

The International Potato Center's gene bank safeguards the largest biodiversity of potatoes—7,500 different varieties, of which 1,950 are not cultivated. Research on spuds, especially studies aimed at fostering food security and the alleviation of poverty, have become a focus for the center.

With all of this talk of potatoes, are you hungry yet? The UN program has so far identified 172,000 web pages containing recipes for using potatoes. Stay tuned, it says: "We will gather the best of them" and share them on the Year of the Potato website.


If you would like to comment on this Food for Thought, please see the blog version.

Citations

International Year of Potato (IYP) Secretariat

Food and Agriculture Organization of the United Nations

Room C-776

Viale delle Terme di Caracalla

00153 Rome

Italy

International Potato Center

Apartado Postal 1558

Lima 12,

Peru
Further Reading

Gorman, J. 2000. Novel sensing system catches the dud spud. Science News 158(Nov. 25):341. Available at [Go to].

C. Graves, Ed. 2001. The Potato, Treasure of the Andes: From Agriculture to Culture. Lima, Peru: International Potato Center (208 pp). Available at [Go to].

Raloff, J. 2005. Food colorings: Pigments make fruits and veggies extra healthful. Science News 167(Jan. 8):27. Available at [Go to].

______. 2004. How carbs can make burgers safer. Science News Online (Dec. 4). Available at [Go to].

______. 2004. Coming soon—Spud lite. Science News Online (June 19). Available at [Go to].

______. 2003. How olives might enhance potatoes—and strawberries. Science News Online (May 24). Available at [Go to].

______. 2002. Acrylamide—From spuds to gingerbread. Science News Online (Dec. 14). Available at [Go to].

______. 1998. Taters for tots provide an edible vaccine. Science News 153(March 7):149. Available at [Go to]

          No Peanuts for Your Peanut        

Youngsters are developing peanut allergies earlier because of exposures in babyhood

Food for Thought

Peanuts are a protein-rich snack food packing plenty of vitamins and trace nutrients. However, these legumes can elicit potentially life-threatening immune reactions within the one in 100 American adults who are allergic to them. Rates of peanut allergy are even higher among children. And the really disturbing news: A new study finds that the age at which this common food allergy first shows up is falling.

Today, peanut allergy typically emerges in early toddlerhood, a team of Duke University researchers reports in the December Pediatrics. "That's almost a year earlier than what we knew, scientifically, a decade ago, "explains A. Wesley Burks, a pediatric allergist who coauthored the new study.

Although children outgrow many allergies, peanut allergy is not typically one of them. Among people who develop immune reactions to this food, 80 percent retain their allergy for life.

The new study began, Burks says, after Duke immunologists noticed that they were encountering younger patients with peanut allergy. To investigate, the researchers pulled entry records and medical charts for all 140 young patients who had come in with the allergy since 1988. Poring over the records confirmed a fall in age at first diagnosis throughout this period—one that proved more dramatic than expected, Burks told Science News Online.

Nationally, the rate of food allergy appears to be increasing, according to a 2006 report of a National Institutes of Health expert panel. The most striking increase, it noted, has been for peanut allergy, which is also the most common food sensitivity. Because some allergies can be avoided by delaying a child's initial introduction to certain foods, in 2000 the American Academy of Pediatrics recommended that parents "consider" keeping peanuts, tree nuts, fish and shellfish out of the diet of kids under age 3.

Burks acknowledges that most parents aren't aware of this recommendation. On the other hand, most peanut allergy shows up in children that had already exhibited allergic reactions to other foods—typically eggs or milk. Many affected children also had skin sensitivities as infants, such as eczema or atopic dermatitis, and a parent or sibling with allergies, although not necessarily to food.

Against that background, you would think parents of the most vulnerable kids would be especially careful about introducing peanuts into the diet. And they might well have been. Indeed, Burks suspects that most initial introductions to peanuts in his young patients were inadvertent. Either a child encountered items that contained unlabeled traces of peanuts—perhaps a jelly bean, certain flavorings used in medicines, or any of several baby lotions (see Unexpected Sources of Peanut Allergy). Or perhaps the kids encountered peanut allergen in the air when others were eating, handling, or cooking foods that contained the legume.

But for now, Burks' team has no firm leads on why peanut allergies are showing up earlier. The Duke group and others will be probing that in the next few years.

Homing in on the problem

Children with peanut allergy in the new study showed the expected history of vulnerability. For instance, four in five had parents or a sib with some form of allergy. Four in five children also had personally experienced atopic dermatitis, two in every three suffered from asthma, and more than half had allergies that triggered runny noses. Moreover, blood tests from two-thirds of the youngsters turned up antibodies highlighting sensitivity to other foods, typically eggs or tree-nuts.

Half of the young patients were born between 1988 and 1999, the rest between 2000 and 2005. The average age of their peanut allergy's onset was significantly different between the two groups—roughly 29 months old for the pre-2000 birth group, versus 15 months for children born since 2000. Within the first group, half of the children developed peanut allergy by 21 months of age; for children born since 2000, half developed their allergy by the time they were 14 months old.

In hopes of teasing out factors that contributed to the trend of earlier allergies, Burks' group is participating in a Food Allergy Research Consortium that has been given $17 million to study food allergies—especially to peanuts. One facet of the 5-year program, which is sponsored by NIAID, is investigating the use of shots to desensitize people with peanut allergy. In addition, some 400 infants with milk and egg allergies will be studied for signs of immunological differences that distinguish those who outgrow their allergies from those who retain them lifelong.

Currently, some 30,000 people a year are hospitalized for food allergy in the United States, and 200 die during an allergic episode. One concern, Burks notes, is that children who develop peanut allergy earlier than in the past might face a lower-than-usual chance of outgrowing their life-threatening affliction—one that requires constant vigilance.

Such an allergy can even crimp one's social life. Consider the poor teenage girl whose lips swelled up after being kissed by her boyfriend (see A Rash of Kisses). Hours earlier, the boy had eaten peanuts, to which the girl was allergic.


If you would like to comment on this Food for Thought, please see the blog version.

Citations

American Academy of Pediatrics

141 Northwest Point Boulevard

Elk Grove Village, IL 60007

Web site: [Go to]

A. Wesley Burks

Division of Pediatric Allergy and Immunology

Duke University Medical Center

DUMC 2644

Durham, NC 27710

National Institutes of Health

National Institute of Allergy and Infectious Diseases

Office of Communications and Government Relations

6610 Rockledge Drive, MSC 6612

Bethesda, MD 20892-6612

Web site: [Go to]
Further Reading

Helmuth, L. 1999. Allergy vaccine may take fear out of nuts. Science News 155(April 3):213. Available at [Go to].

Long, A. 2002. The nuts and bolts of peanut allergy. New England Journal of Medicine 346(April 25):1320-1322. Extract available at [Go to].

Raloff, J. 2003. Unexpected sources of peanut allergy. Science News Online (March 15). Available at [Go to].

______. 2002. A rash of kisses. Science News 162(July 20):40. Available at [Go to].

______. 1998. The mango that thought it was poison ivy. Science News Online (Aug. 8). Available at [Go to].

______. 1997. A whiff, a sniff—then asthma. Science News Online (Feb. 1). Available at [Go to].

______. 1996. Peanut allergy found common and increasing. Science News 150(Sept. 7):150. Available at [Go to].

_____. 1996. Family allergies? Keep nuts away from kids. Science News 149(May 4):279. Available at [Go to].

Seppa, N. 2003. Tough nut is cracked: Antibody treatment stifles peanut reactions. Science News 163(March 15):163. Available at [Go to].

          The Art of Lovin' Trees --- Featuring Joel Tauber        




The Art of Lovin’ Trees-- 
Featuring Artist Joel Tauber
Story dedicated to Joel and Alison
in celebration of their joyous engagement on November 9th,
2008

Written and Researched by Enilde Van Hook
Story Consult and Editing by Luke Van Hook
Painting, www.lukevanhook.com
Photography, www.gingervanhook.com
Writing, www.enildeingelsvanhook.com


 America is having a love affair with trees and California is second to none in leading its appreciation of trees. Digging deep into the roots of this story, I have followed and researched the tree culture specifically in Los Angeles where our love of trees has spawned a unique pop tree culture relating to art. Our popular tree culture today includes but is not limited to tree sculptures, tree paintings, tree photographs, tree videos, tree poetry, tree songs, tree jewelry, tree movies and even tree love affairs. 


Tree Earing created by Joel Tauber for his Sick-Amour Tree in Pasadena, California.
Additional Tree Jewelry created by Joel Tauber to adorn the Sick-Amour Tree includes leaf jewelry, as well as the male earing and the female earing that hang from the tree below.  
Photos of tree jewelry courtesy of  Susanne Vielmetter Gallery 5795 West Washington Blvd., Culver City, California 90232 www.vielmetter.com   infor@vielmetter.com (323-933-2117)


Sick-Amour Tree in the parkinglot of the Pasadena Rose Bowl, protected by barriers installed by Joel Tauber in his quest to save his beloved tree. Tree wearing the earings looks hot!  Photo courtesy of Susanne Vielmetter Gallery.
Leaf sculpture by Joel Tauber
Female tree earing by Joel Tauber.
Male tree earing created by Joel Tauber, photo courtesy of Susanne Vielmetter Gallery, 2008

For the record, our love of trees goes way back to the dawn of time when we were swinging in the trees, however, our love has grown and matured since then. The Greek and Roman heritage of literature and art bestows us with intoxicating stories of their Gods having entanglements with humans. Some of their deities were known as protectors of trees and nature such as Dionysus the Greek god of agriculture, fertility, wine and merriment. He was later renamed Bacchus by the Romans and reported to be the Tree God. Back in the day when artists carved trees into stone and marble relief sculptures to worship in the temples of their mythological gods, people celebrated the sacredness of trees, grapevines and sometimes the unions of gods and mortals. There was Pomona, the goddess of fruit trees who married Vertumnus, the god of fruits and gardens. Digging deep enough, one is sure to find stories of deities mating with trees and spawning children of the harvest for instance.

In modern literary circles there are a number of great imaginative family favorites written about trees, like “The Giving Tree” by Shel Silverstein. Then there’s the infamous story of how Robinson Crusoe lived in a tree-house, and of utmost importance to our American history of trees, we propagate the very memorable legend of ‘Johnny Appleseed’.

In our contemporary times we have a legend in the making too. I have been fortunate to witness the emergence of a new ‘Johnny Appleseed’ and interestingly enough, the story involves a recent romantic love affair between one special tree and a mortal that is well worth pursuing the story. Sometime in the fall of in 2007, I met Joel Tauber. This is the artist who I believe was struck by a mythological bolt of lighting, so to speak, pertaining to one of the Greek or Roman deities’. Joel Tauber is said to have fallen head over heels in love with one particular Sycamore Tree in the parking lot of the Rose Bowl in Pasadena. My chance meeting with this now famous mortal under the influence of an enchanted mystical spell, has led me to research the mysteries intrinsic in the charms of trees. I too have been struck with the frailty of trees, their vulnerabilities, and their enormous strengths and inspiration. This together with my own personal experiences with trees has prompted me to come out of my shell and discuss the subject in all seriousness.

My own personal background is not in trees. I am simply a tree-lover from childhood. For a little over ten years, my professional background was in radio as a disc jockey and on-air personality. I listened to music, reviewed songs and kept tabs on the pop music culture. I worked in the Los Angeles market as well as Santa Barbara, California; Eventually I moved to expand my work experience in neighboring radio markets like Reno, Carson City, Lake Tahoe and Gardnerville/Minden, Nevada. It was through traveling that I saw some of the most beautiful trees along the routes through Northern California and Northern Nevada!
While I drove from one radio market to another over the years, I watched the trees go by at the various speed limits along the highways of my life’s journeys. Thus you will understand when I tell you that often I see art and life, for that matter, through a series of moving images in my head which include a music bed. 
I was eleven years old when in 1970, Joni Mitchell wrote and released a song called ‘Big Yellow Taxi’ whose lyrics surpassed the test of time and is currently in airplay by a glut of new groups. The lyrics began with “…They paved paradise and put up a parking lot. They took all the trees and put them in a tree museum and they charged all the people a dollar and a half just to see ‘em.” One of the barometers I use to gage the influence of any particular song, music or artwork that I come into contact with is if it will surpass the test of time, among other important criteria. This song became one of my favorite songs of all time. The lyrics made so much sense to me.
When I met Joel Tauber, I was introduced to the enormous scope of his Sick-Amour Tree-Baby Project. It was then that I suddenly started hearing Joni Mitchell’s song in my mind again, only this time, as I got in my car, Counting Crows was performing the song. When I started doing more research on the song that I could not get out of my head, I was struck by how many artists had re-recorded the song and barely changed anything about the words. There is Amy Grant, who upgraded the dollar amount from $1.50 to $25 when singing about how much the museums charged people to enter. Additionally there is Green Day, Sarah McLachlan, Charlie Barker, Bob Dylan, Moya Brennan, Ireen Sheer, Donnie Eidt and a host of so many others that have recorded ‘Big Yellow Taxi’ it was simply overwhelming!
I think the importance of the lyrics to this one particular song is that it reveals the fact that people love trees and hate parking lots. The message is that if it weren’t for our trees, we could be living in a frying pan! The impact of this single song is that it reveals what is really going on in people’s minds. There is a reason why so many artists are flocking to re-record the lyrics in their own way.











Not only are trees involved in the music arena, trees as subjects, are very involved in politics as well. Gaylord Nelson, a senator from Wisconsin at the time, took a leading role in developing the celebration of Earth Day on April 22nd 1970 as a way to commemorate our environmental concerns. Arbor Day is presently celebrated as well with the first ceremonial tree planting in Washington D.C. on April 27th in 2001, all evidence that goes to prove the people of our planet do care about what happens to our trees.


Trees stand as a testiment and memorial for Dr. Martin Luther King

Dr. Martin Luther King is memorialized with trees along Expositon Blvd. across from the Los Angeles Coliseum and down the street from the University of Southern California.
Photo by Ginger Van Hook


Online sources on the subject of trees are rich in number. For instance, eighteen years ago, here in Los Angeles, a multi racial group of volunteers planted 400 Canary Island Pine trees along seven miles of road on Martin Luther King Junior Boulevard to commemorate Dr. Martin Luther King’s life. Today, this living homage to Dr. Martin Luther King Jr. continues to thrive and keep the dream alive for his followers. The founder and President of www.treepeople.org is Mr. Andy Lipkis and he keeps tabs on the trees to make sure all 400 trees stay healthy.



Mayor Antonio Villarigosa is the person to thank for the ‘Million Trees Initiative’ he signed into effect in May of 2006 and Los Angeles residents can learn how they too can receive up to 7 free trees to plant on their property. Visit the website at www.milliontreesla.org to learn the details.   Also in Portland, Oregon there is www.friendsoftrees.org and in Bellingham Washington you will find www.geocities.com. There is also the International Society of Arboriculture called ISA and can be accessed by visiting www.isa-arbor.com. You will also find a great deal of valuable advise on the growth and care of trees at www.treesaregood.com and check out Tree Care Industry Association TCIA as well.



Mark Dion created an art piece titled "Library for the Birds of Antwerp" which is also a good example of how art is vitally connected with our tree culture and how it connects Mark Dion to his PBS special where he removed a dead tree from the forest and recreated its living components in a city scape in Washington.  From the "20th Century Artbook Phaidon Press 1996", the caption reads: "Using props from the natural and man-made world, Dion has constructed an installation that explores contemporary attitudes to science and the environment. He has created a fictional and hybridized situation in which the trappings associated with knowledge, learning and classification--such as books and photographs--are juxtaposed with natural elements including birds and wood.   The representation of nature is a fundamental subject in Dion's art, and here he takes on the role of sociologist/anthropologist and blurring the boundaries between authentic and fake, representation and parody. By adopting the persona of a scientist and by satirizing man's obsession with categorization, Dion questions the values of the Western world.  His subject matter is heavily influence by popular culture.  In Dion's world we might witness Mickey Mouse as an explorer, or Clark Kent interviewing Dr. Frankenstein." (Photo and contents are used in this story for purposes of artistic review.)

In the art world, an artist named Mark Dion was featured in a documentary film report that aired in 2007. To view the video one may visit on the Internet by going to www.pbs.org and find Mark Dion as he took the subject of trees and made an art piece that explored what would happen if one were to take a tree after its death, take it out of its familial context of natural forest, and re-create the ecosystem in an environment that would otherwise be a hostile urban setting, needless to say, a cityscape. Just outside of Seattle Washington, he states, a Hemlock fell on February 8th, 1996…and so begins an elaborate experiment that pits optimism against reality." The PBS special is very detailed and you will enjoy the depth of research and work that Mark Dion went to to take a tree out of the forest and recreate the setting in the city.  The difference between the artwork presented by Mark Dion and  the artwork presented by Joel Tauber is in the nature of the life of the tree. Mark Dion works with a dead tree and its living components, and Joel Tauber creates life out of a tree seed and duplicates it all over his community.


Thus I’ve discovered for myself that when I researched the subject of trees, I discovered Joel Tauber wasn’t alone! However, instead of creating an experiment in ecology, Joel Tauber goes further than Mark Dion does with this concept of eco-systems and their frailties. Joel Tauber begins a journey that could eventually repair the eco-systems that man has destroyed. This is where Joel Tauber takes the lead in the art world and becomes not only the realist but the optimistic hope for trees in desecrated forests all over the country.
Joel Tauber’s work as a living project of art in 2008 has resonance and his story is well worth telling again and again. He is certainly not the first, nor the last to get involved in the love of trees, but he is the first in contemporary times to have been associated with a mythological and mystical occurrence of reproducing tree babies out of just hugging one lonely tree.


The last time I saw a man hugging a tree, he was hugging the tree for all the wrong reasons. At the MOCA, Los Angeles’s Museum of Contemporary Art, some years back I was viewing an exhibition that was in town by the Utah born artist now working in Los Angeles, Paul McCarthy. While this work of art depicted a very raw and unsettling sculpture of ‘tree-lovin’ it had nothing whatsoever to do with the love of any tree. The work displayed a timely political statement about our government rather than the love for trees, but bear in mind that the thought involved images from man’s intimate involvement with trees both in the biblical sense and in the sense of man’s raping of the planet. Joel Tauber’s work counteracts the devastation of many years of neglect for our trees with a very basic recipe for the renewal of our commitment to our green-leafed friends. Now, when I see the image of Joel Tauber hugging his Sycamore Tree in Pasadena, I get a whole new perspective for the love for our planet, our trees and our environment as a whole.

"The Garden" by Paul McCarthy from The 20th Century Art Book, 
Phaidon Press Limited, page 280. Photo is used for purposes of artistic review.
The caption in the book reads as follows: " 'The Garden'  is a full-scale tableau of an outdoor, woodland scene, complete with leafy trees, shrubs and rocks.  This tranquil picture of nature is rudely interrupted by the presence of a middle-aged, balding man with his trousers round his ankles, engaged in a wholly unnatural act. From one side of the installation, his actions are not immediately apparent, being partially hidden by the tree trunks and foliage, but the sound of mechanical activity draws the viewer in to discover the shocking sight of a man copulating with a tree.  This robotic figure, with its endlessly repetitive movements, is both comical and crude, and is intended by McCarthy to question notions of acceptable public behavior and sexual morality.  McCarthy is a lecturer at UCLA as well as an artist. His sculptural installations evolved out of his earlier performance work which focused on his own body engaged in extreme and disturbing acts."




To further explain this romantic entanglement between a tree and a mortal, I cite some important historical facts. Back in 2005, Joel Tauber was in the parking lot of the Pasadena Rose Bowl, when he spotted a particularly lonely and neglected Sycamore Tree. There are hundreds of thousands of trees in Pasadena, and a great number of them thrive very well on the grounds of the Rose Bowl, should you ever drive through this luscious community of tree and rose-lovers, you will see. But Joel Tauber focused his attention on one specific lonely tree. He started to note more and more how cars would hit the bark of the tree and scrape it, injuring the tree repeatedly. Joel Tauber became a witness to this tree’s life. Taking compassion and friendship upon this particular tree, Tauber began to film the area of the parking lot where the tree was growing. He got the idea to put up solid barriers to protect it from cars and also carried water in large plastic bags to irrigate the tree. Soon, Tauber found himself as a one-man band, orchestrating a symphony of activities leading to editing mass quantities of tree footage, fighting City Hall, and embarking on a quest to save this tree from infertility using tried and true guerilla tactics that would make tree-huggers stand and salute. To personally view the Sick-Amour project, along with the giant scale tree sculpture installation exhibited at Susanne Vielmetter Gallery in 2007, you may visit www.vielmetter.com.













               Recently, I had the privilege and opportunity to discuss Joel Tauber’s work with Susanne Vielmetter and she was delighted to tell me what a wonderful sense of humor that Tauber exhibits in all of his works of art. Susanne Vielmetter reviewed the Underwater project with me as well as the Flying Project which Tauber presented.
She explained how deep down, she feels Tauber is on a quest for meaning in his work and that he has a keen sense of humor that unifies and makes his ideas successful. She states that he uses the comical and the tragic in the Tree-Baby project to address the issues of urban living in our time and very subtly pokes fun at the problems innate in urban planning. The real irony of a small Sycamore tree dying of thirst in a parking lot of a beautiful park in a paradise-like valley, alongside the 110 Pasadena Freeway where 80% of the territory is plastered with concrete and the water below runs along asphalt channels of the Los Angeles River is not lost on Tauber, she explained. To contrast, Susanne Vielmetter cited that parks in Europe allow for weeds to grow naturally on landscapes that are not covered with concrete. Joel Tauber’s projects were initially presented at the Susanne Vielmetter Gallery located at 5795 Washington Blvd., in Culver City, California. The response Susanne Vielmetter’s Gallery received was incredibly exciting, even though at first, some folks thought Joel Tauber was a nut; he went on to prove just how serious he really is about changing the landscape of our environment, one tree at a time.



Joel Tauber has a large body of video artwork, photographs and developing tree babies, (the children of a mortal and a Charmed Sycamore Tree) and one may also visit www.joeltauber.com.
As I learned more and more about Joel Tauber’s project, I realized how blessed we all are that tree-lovin’ is not a singular act of love or even a fleeting love of art. I realized how connected we all are to our environment and how the idea of having a special friend ‘the tree’, any tree in any state, in any country for that matter is a beautiful connection to have. The connection that Joel Tauber has to his Sycamore Tree is in synch with the love that the country is experiencing during our new millennium. We have all become acutely aware of the fragility of life; we realize now more than ever that we must respect our dependence on our environment and value our trees.

The first thing that struck me about Joel Tauber was that we had the love of trees in common. He seemed a bit shy, unassuming and humble yet I was later to learn the enormous power he wielded for this one frail and neglected tree in the parking lot of the Pasadena Rose Bowl in California. I was truly inspired by the level of involvement and commitment he had demonstrated for his own beloved Sycamore Tree which he had turned into a full-blown art-project including video, photography and sculptured jewelry. (He did it all!) He named this work the Sick-Amour Project mainly because he said he felt this tree was ill from the lack of love and the inability to have tree babies to fulfill its legacy. I had never personally met someone with such an extreme love and dedication to one particular tree. In our local newscasts, I had heard stories of people who became very emotional when a land developer was about to cut down a tree they considered a relic of their community; in which case people got very nasty about the issue and would chain themselves to the trees or surround the location with demonstrators that would shut down the jobsite. That’s when the news crews would come in with their cameras and boom mikes and the news helicopters would hover in circles above the trees trying to capture the ‘event’ that was creating all the uproar. A very recent example of this type of community behavior is written about on the front pages of the Los Angeles Times where Eric Bailey, a Times Staff Writer, wrote an extensive story about the tree-issues pertaining to Scotia, California where activists are protesting the logging of the Great California REDWOODS! Read the Sunday edition of the Los Angeles Times, August 24th, 2008 or visit www.latimes.com online to learn how the tree-sitters are doing today.

But Joel Tauber is a different type of activist. He doesn’t consider himself an activist at all. He merely states, humbly, just for the record, that he loves this one particular Sycamore Tree and it is an outrage to him to see how his new best friend is being suffocated under a six-inch blanket of black tar and asphalt. Better yet, Joel Tauber does something about it. Not with a crew of forty thousand demonstrators, not even with a crew of forty residents. He does this on his own, quietly challenging the laws of the city of Pasadena and humbly takes responsibility for the care and nurturing of his new best friend. I was touched. At once I began to marvel at his potent idea.



The art of loving our trees has grown roots in the higher levels of the art world as well. For instance, if one were to visit the J. Paul Getty Museum both at the Getty Villa which recently re-opened in Malibu and at the Getty Center in Los Angeles, you will find the love of trees has grown branches on all the hillsides surrounding both properties. There are lucky Sycamores and fortunate Pines; there are Pomegranate trees, Apple trees, Pear trees, Jacaranda trees and trees that just look good in a vista overlooking the ocean. Millions of dollars went into the development of artistic gardens which envelope the California landscape against a backdrop of the Pacific Ocean on one edge and the rolling hills of Malibu on the other.






Over in the area of the Miracle Mile, the Los Angeles County Museum of Art is celebrating an enormous renovation of its facilities and you guessed it, there are aisles and isles of gigantic palm trees lining the walkways to the entrance of the museum in concert with a unique and flamboyant architecture that has drawn the attention of the art-world with the generosity of Eli and Edythe Broad of the Broad Foundation. The Broad Contemporary Art Museum is the new wing at the LACMA and is considered the largest space in the country devoted exclusively to contemporary art. With a ‘living art display’ dedicated to the iconic palm trees, not native to California, Robert Irwin has developed a plein-air walkway through ‘Palm Gardens’ as one makes their way to the entrances of the museum.





Lush green trees thrive all over Pasadena, California, home of the Rose Bowl where Joel Tauber fell in love with a Sycamore Tree.  Photo by Ginger Van Hook, 2008




 The Norton Simon Museum in Pasadena, California  is also home to some of the most exquisite antiquities in its museum history which includes sculptures amid a forest like atmosphere. Currently at the Norton Simon Museum, among its many exhibitions, one may enjoy the artwork of Ruth Weisberg, Dean of the Gayle Garner Roski School of Fine Arts at the University of Southern California. Opening on October 17, 2008 the Weisberg exhibition at the Norton Simon runs through March 2, 2009. Additionally a lecture by the artist is planned where Weisberg discusses: Guido Cagnacci and the Resonant Image on Sunday November 16, 2008.  The Norton Simon Museum of Art is located at 411 West Colorado Blvd. in Pasadena, California. Ruth Weisberg was instrumental in selecting the work of Joel Tauber to be permanently planted on the Main University Campus of USC on January 24, 2008 where a tree planting ceremony was held and attended by numerous members of USC faculty, staff, students and guests. The location of the new tree-baby, child of the Sick-Amour Project, currently exists on the Exposition side of the campus between Gate one and the Fischer Gallery, across the street from the Museum of Natural History. 


In Pasadena, where lovers of trees line every street of the city as the landscapes are lush with all types of trees and where these wonderful healthy trees keep cool the throngs of tourists who visit the Rose Bowl every year, is also home to the Norton Simon Museum and the Pasadena Museum of California Art. Both locations are areas where tree-lovin’ may be experienced alongside some of California’s best-known artworks. Visit the NORTON SIMON MUSEUM at www.nortonsimon.org located at 411 West Colorado, Pasadena, California 91105 or visit the PASADENA MUSEUM OF CALIFORNIA ART at www.pmcaonline.com at 490 East Union Street, Pasadena, California.



In San Marino, California, the art of trees, gardens and succulents has found a worthy haven at the Huntington Library and Botanical Gardens spanning an area of 120 acres dedicated to the fine arts founded by Henry E. Huntington in 1928 as the very first public art gallery in Southern California. Along with English portraits and French eighteenth-century furniture, one will delight in tours of the unique garden paradise established for the pure love of the botanical arts.


On the hillside along the 405 Freeway in Los Angeles, one may also enjoy walking along the elegant landscapes of the Skirball Cultural Center and Museum grounds and witness the serenity of the trees as Weeping Willows slope their leaves to the ground, and gentle breezes sway the branches of Sycamores, Oaks and Birch trees. Visit the Skirball Museum online at www.skirball.org, or enjoy a personal walk along the grounds and explore the tributes to culture at 2701 North Sepulveda, Los Angeles 90049.

Trees at the Skirball Museum and Cultural Center thrive and enjoy the mild California climate.


In San Diego, one enjoys walking through a vast museum complex housing 15 unique museums in Balboa Park, not to mention to the collection of rare cactus and enormous Eucalyptus trees (just to name one tree type out of numerous ones) which shade the paths leading from one museum to another.

Each of the locations I have mentioned or described here is where I personally walked through, witnessed, and or photographed sophisticated artistic tree landscapes of the California terrain.

The Roots of my personal anxieties: Why I care.

The impact of my meeting Joel Tauber coincided with an important event that took place for me way before I knew about his Sick-Amour Tree project and was what eventually led me to throw myself into this frenzied study of trees over this summer. Thus I do not necessarily consider myself struck by any of the Greek or Roman gods. I believe my influence came with a special awareness of the frailty of trees with this personal story:

A little over one year ago, on June 30th, 2007 I was walking our dog Sasha, around the block for one of our frequent walks. I rounded the corner to the next block when I was taken aback as I witnessed a set of ‘city’ crewmembers slaughtering what appeared to be a California Oak tree. I had grown quite fond of that particular Oak on my many walks while I was writing my first novel. As a matter of fact, I had used that model of tree to describe a forest of these trees in a chapter in my first fiction novel. I especially love the sculptured texture of the Mighty gnarly Oaks. This tree had been the one to rekindle my relationship with the trees of my imagination. My stomach got queasy when I saw how it was being destroyed. I would have thrown-up, but I got a hold of my emotions and took Sasha home. Not only did I return to the scene of the slaughter, but I brought my camera to document the death and dismemberment of this great oak; I was so distraught that I returned again to the site, without my camera this time, and begged the men to stop for a moment while I sought out the seeds for this tree. To my surprise, the men stopped and helped me search for the seeds.








When I got home, I had no idea what to do with the seeds. I called a couple of nurseries until a gentleman at a nursery in Marina del Rey explained to me that I had to wait until the pods dried up and slit to get at the seeds and plant them. So, I waited until the pods were black and wrinkled. I split them according to the directions I had gotten from this kind anonymous arborist. (He suggested a process much like that which squirrels have for cracking the pods.) I photographed the seeds and compared them with the larger seed of an apricot fruit tree and the seed of a maple tree.






Once properly documented, I planted them in a small brown pot. Two weeks later, the first seed came up. A few days later another seed appeared to take root. On the one-year anniversary of the re-birth day of this Great Knurly Oak tree, July 20th, 2008, I documented how large the great twin oaks had become. The highest little bitty branch was about fourteen inches tall. I estimated this tree had grown a little over an inch every month. A compassionate act of kindness yielded a new life on the impulse of grief. The impulse of grief affected not only me; there is an entire world of tree-lovers mourning the losses of their favorite tree friends in surrounding communities.












What about the subconscious feelings innate in developing a relationship with a tree? For instance, what draws people to want to save a particular tree? 

I can really only speak to my own experience in that my relationship with trees started when I was a child.

          WordPress 4.4.1        
WordPress 4.4.1  Más seguro – Más responsive – Nuevo plugin REST-API! Más seguro La mejora más importante que ha hecho wordpress es en su seguridad, las versiones de WordPress 4.4 y anteriores se ven afectados por una vulnerabilidad de cross-site scripting que podría hacer que la seguridad de un sitio se vea comprometida. Te recomiendo que actualices, […]
          Possible Evidence for Re-regulation of HPA Axis and Brain Reward Systems Over Time in Treatment in Prescription Opioid-Dependent Patients        
imageObjectives: There is growing evidence for a neuroadaptive model underlying vulnerability to relapse in opioid dependence. The purpose of this study was to evaluate clinical measures hypothesized to mirror elements of allostatic dysregulation in patients dependent on prescription opioids at 2 time points after withdrawal, compared with healthy control participants. Methods: Recently withdrawn (n = 7) prescription opioid-dependent patients were compared with the patients in supervised residential care for 2 to 3 months (extended care; n = 7) and healthy controls (n = 7) using drug cue reactivity, affect-modulated startle response tasks, salivary cortisol, and 8 days of sleep actigraphy. Prefrontal cortex was monitored with functional near-infrared spectroscopy during the cue reactivity task. Results: Startle response results indicated reduced hedonic response to natural rewards among patients recently withdrawn from opioids relative to extended care patients. The recently withdrawn patients showed increased activation to pill stimuli in right dorsolateral prefrontal cortex relative to extended care patients. Cortisol levels were elevated among recently withdrawn patients and intermediate for extended care relative to healthy controls. Actigraphy indicated disturbed sleep between recently withdrawn patients and extended care patients; extended care patients were similar to controls. Dorsolateral prefrontal cortex activation to drug and natural reward cues, startle responses to natural reward cues, day-time cortisol levels, time in bed, and total time spent sleeping were all correlated with the number of days since last drug use (ie, time in supervised residential treatment). Conclusions: These results suggest possible re-regulation of dysregulated hypothalamic-pituitary-adrenal axis and brain reward systems in prescription opioid-dependent patients over the drug-free period in residential treatment.
          Tobacco Use Disorder Among Patients With Smoking-related Chronic Medical Disease: Association With Comorbid Substance Use Disorders        
imageIntroduction: Very little is known of the behavioral vulnerabilities of patients diagnosed with smoking-related chronic medical illness who continue to smoke, potentially worsening morbidity and mortality risks. This study explores the association of tobacco use disorder (TUD) among those with smoking-related chronic medical illnesses with other substance use disorders (SUDs) and risk factors. Methods: Among veterans with smoking-related chronic medical illnesses identified from the National Veterans Health Administration administrative records from fiscal year 2012, we compared the characteristics of those with a diagnosis of TUD (International Classification of Diseases, 9th edition code 305.xx; n = 519,918), and those without such a diagnosis (n = 2,691,840). Using multiple logistic regression, we further explored the independent association of factors associated with TUD. Results: SUD prevalence was markedly higher among those with TUD (24.9% vs 5.44%), including alcohol use disorder (20.4% vs 4.3%) and drug use disorder (13.5% vs 2.6%), compared with nonsmokers. On multiple logistic regression analyses, alcohol use disorder (odds ratio [OR] 2.94, 95% confidence interval [CI] 2.90–2.97) and drug use disorder (OR 1.97, 95% CI 1.94–1.99) were independently associated with current TUD diagnosis. Having any single SUD was associated with considerably high odds of having TUD (OR 3.32, 95% CI 3.29–2.36), and having multiple SUDs with even further increased risk (OR 4.09, 95% CI 4.02–4.16). Conclusions: A substantial proportion of people with TUD diagnosis despite concurrent smoking-related medical illnesses are also likely to have other comorbid SUDs, complicating efforts at smoking cessation, and requiring a broader approach than standard nicotine-dependence interventions.
          Facebook accused of targeting vulnerable teens with predatory ads [updated]        

The Australian has obtained confidential internal documents from Facebook that supposedly show how it’s possible for the company to take advantage of teenagers’ insecurities to benefit advertisers. The leaked document was written by two Australian Facebook execs and included how monitoring users’ posts, comments and interactions could help figure out when people felt “defeated”, “overwhelmed”, “stressed”, “anxious”, “stupid”, “nervous”, “silly”, “useless” and a “failure”. Information about users’ mood could therefore be added to the data that Facebook sells advertisers. Currently Facebook provides ad buyers with user’s personal information including relationship status, location, age, and how often and in what manner people use the social…

This story continues at The Next Web

Or just read more coverage about: Facebook
          Estado pode ter roteiro de turismo religioso         
Durante dez dias, milhares de fiéis participam das celebrações ao padroeiro de Siqueira Campos, no Santuário do Senhor Bom Jesus da Cana Verde


O Paraná pode contar com um roteiro de turismo religioso para atrair turistas e peregrinos para locais de grande expressão religiosa no Estado. A informação foi repassada pelo governador Beto Richa, em Siqueira Campo, no último sábado (5), durante sua visita à Festa do Senhor Bom Jesus da Cana Verde. O evento, que está em sua 86ª edição, faz parte do Calendário Oficial do Estado e é uma das festividades religiosas mais tradicionais do Paraná. A festa teve início no dia 28 de julho e se encerrou no domingo (06), dia do padroeiro.

O Estado, segundo o governador, planeja concluir o roteiro até o ano que vem. "O Santuário do Senhor Bom Jesus da Cana Verde será incluído neste roteiro por ser um dos locais que, tradicionalmente, mais recebem romeiros em todo o Estado", explicou.

Durante os dez dias de celebração do dia do padroeiro, o Santuário recebe cerca de 100 mil fiéis, vindos de diversas cidades do Paraná e também de outros estados, principalmente de São Paulo. Além de excursões de ônibus e carro, muitos romeiros vão a pé ou a cavalo até Siqueira Campos em promessa ao padroeiro.

O governador e a secretária da Família e Desenvolvimento Social, Fernanda Richa, participaram da missa celebrada pelo frei Carlos Gonzaga, pároco do santuário, e visitaram a sala dos milagres, local que reúne itens e fotografias deixadas por fiéis que receberam graças do Bom Jesus da Cana Verde.

O prefeito Fabiano Bueno destacou a importância do evento para Siqueira Campos. "É uma das maiores festas religiosas do Paraná. O municípios se preparou em todos os aspectos para receber todos os romeiros e autoridades que prestigiam este evento."

HISTÓRIA
Frei Marcus Miranda, reitor do santuário, conta que a devoção a Bom Jesus da Cana Verde começou ainda no século 19. A imagem do padroeiro, esculpida em cedro vermelho, foi trazida de Minas Gerais ao município vizinho Carlópolis entre os anos 1820 e 1830. "É uma imagem do tempo do barroco. Não temos dados certos, mas acredita-se que ela foi esculpida por Aleijadinho ou um de seus discípulos", disse Frei Marcus.

"A imagem representa o Jesus sofredor, açoitado na casa de Pilatos antes da crucificação. Jesus segura em sua mão uma cana verde, que de acordo com a história, é porque a estátua veio de uma fazenda chamada Cana Verde", detalhou o reitor.

Na década de 1930, a Diocese de Jacarezinho determinou que a imagem fosse levada a Siqueira Campos, que já contava com uma paróquia estabelecida. Foi então que começou o culto ao padroeiro, que hoje reúne milhares de pessoas todos os anos.

LAR DO MENOR
Após a festa, o governador visitou o Lar do Menor Siqueirense, instituição criada em 1985 para desenvolver atividades sociais e educacionais a crianças e adolescentes em situação de vulnerabilidade social.

A entidade é uma das beneficiadas pelo programa Nota Paraná, que distribui parte do ICMS recolhido pelo Estado aos contribuintes e instituições sociais. O Lar do Menor já recebeu R$ 127 mil do programa.

Em evento com a imprensa local Richa destacou alguns investimentos do governo do Estado em Siqueira Campos e outros municípios do Norte Pioneiro, como a revitalização da PR-092, que será duplicada no trecho urbano de Siqueira Campos. O projeto inclui também a construção de um contorno em Wenceslau Braz e a readequação dos trevos de Siqueira Campos.
Reportagem Local/FOLHA DE LONDRINA

          Mulheres Que Fizeram Diferente        
Sei que é super clichê aproveitar o mês da Mulher para falar de Mulheres que fizeram diferente. Observe que eu escrevi "fizeram diferente" e não "a diferença". Porquê?
 
Meu intuito é falar sobre mulheres que fizeram coisas diferentes da maioria, isso não quer dizer que fizeram certo ou errado. Não é uma lista das mulheres mais generosas (claro que no meio da lista tem mulheres extremamente boas) mas as que tiveram CORAGEM de fazer algo diferente ou até reprovável pela sociedade na época. As  escolhidas foram:
 
joana d arc marilyn monroe leila diniz
1. Joana D´Archeroína francesa que aos 13 anos começou a ter visões e receber mensagens ocultas. Orientada por essa paranormalidade Joana cortou o cabelo bem curto, vestiu-se de homem e entrou para o exército francês. Comandou tropas e conquistou o respeito do Rei Carlos VII. Invejada pelas vitórias, sofreu com conspirações e traições, chegou a ser vendida para os ingleses e acusada de praticar feitiçaria. Foi queimada viva em 1431. Precisa falar mais? Santa, bruxa ou louca? Não importa! Ela foi sem sombra de dúvida uma mulher corajosa e determinada.
 
2. Marilyn Monroe - indiscutivelmente foi uma das mulheres mais sexy dos últimos tempos. Apesar da sua triste história de vida, órfã e abusada inúmeras vezes pelos lares que passou. Marilyn reverteu essas tragédias em força para conseguir se destacar no mundo do entretenimento. Sua performance nos palcos seduziu homens e mulheres, mas o sucesso foi fruto da sua personalidade vulnerável, sua contraditória inocência aliada com a sensualidade natural. 

3. Leila Diniz - atriz brasileira de personalidade ousada e inimiga do conservadorismo. Ela foi responsável por quebrar tabus e ser um ícone da liberdade feminina. O que para nós hoje é simples e rotineiro, no final da década de 60 não era. Leila foi corajosa a afirmar em entrevistas coisas da sua vida sexual e ser espontânea ao ir à praia grávida de biquíni.

catarina de siena madre tereza calcuta lady diana
4. Catarina de Siena - mesmo analfabeta, ditou inúmeras obras e cartas solicitando aos papas, líderes e reis da época uma unificação da Igreja e a pacificação dos Estados Papais. Consagrada como Santa Catarina na Igreja Católica, ela cuidou dos enfermos e abandonados quando a peste se alastrou por toda a Europa. Independente de religião, devemos reconhecer pessoas boas e de inigualável coragem.      
 
5. Madre Teresa de Calcutá - ainda nessa linha de mulheres guerreiras e generosas. A Missionária dedicou sua vida aos pobres, solicitou autorização à igreja para dedicação exclusiva aos famintos e necessitado da Índia. Ganhou Nobel da Paz em 1979. E foi outro grande exemplo de coragem e caridade em vida. 

6. Diana, Princesa de Gales - eu não poderia deixar de citar Lady Di. Afinal ela casou-se com um príncipe, foi exemplo de educação e elegância, um ícone da moda e filantropa. Foi extremamente corajosa ao quebrar os protocolos e pedir o divórcio. Admirada por seu trabalho de caridade, virou celebridade mundial. Faleceu em 1997 com seu namorado Dodi Al Fayed em polêmico acidente de carro.


indira gandhi cora coralina chiquinha gonzaga
 
7. Indira Gandhi - primeira mulher a ocupar o cargo de chefe do governo indiano. Foi primeira-ministra da Índia por duas vezes (1966 a 1977) e (1980 a 1984). Para isso teve que dividir o partido e assumir a liderança de um dos lados. Aboliu os privilégios dos príncipes indianos e governou uma ditadura. Vamos falar sério, essa mulher não veio para brincar, teve pulso firme e levou bem à sério seus ideais.  
 
8. Chiquinha Gonzaga - "ô abre alas, que eu quero passar"... pianista, regente e compositora das marchinhas carnavalescas mais famosas do Brasil. Mulher de gênio forte e decidida, dedicou-se a música mesmo contra a vontade de todos. Casou-se três vezes, seu romance mais invejável e duradouro foi com um rapaz 36 anos mais novo que ela. Para viver com ele, Chiquinha chegou a adotá-lo. Juntos ficaram até a morte dela aos 87 anos de idade.  
 
9. Cora Coralina - nasceu em Goiás, doceira por profissão, produziu uma obra poética rica em elementos do dia a dia. Sua poesia atingiu um nível de qualidade literária altíssimo, não visto facilmente por outros artistas do nosso país. Uma mulher simples que viveu parte da sua vida longe dos grandes centros, tinha dom e sabedoria para escrever sobre o cotidiano.

 “Mesmo quando tudo parece desabar, cabe a mim decidir entre rir ou chorar, ir ou ficar, desistir ou lutar; porque descobri, no caminho incerto da vida, que o mais importante é o decidir.”  Cora Coralina
 
mulheres especiais
 
10. Você, minha mãe, sua avó, aquela vizinha... mulheres anônimas que lutam todos os dias para manter a família unida, que ajuda o próximo sem nada em troca, que ama seus filhos e a dos outros também. Mulheres guerreiras, profissionais, do lar, amantes, mães, tias, avós, esposas, amigas... politizadas ou analfabetas. Mulheres ricas ou pobres que acertam e erram, mulheres de verdade, assim como eu e você também merecemos um lugar nesta lista! Tenha coragem de fazer, mesmo que erre. Tenha coragem de viver, mesmo que morra. Seja autêntica e acredite em seus sonhos, só não vale passar por cima de ninguém e nem prejudicar o próximo porque isso não é coragem, é ambição desacerbada!     

          Informe inicial sobre detener morder uñas        
Supongo que tengo que han logrado aumentarlos eficientemente unas 3 veces, generalmente por la cantidad de meses en un momento dado, sin embargo nunca fue sencillo y muchas estrategias que intenté fuente fallido.

 Esta operación puede llevarse a cabo dentro de un lenguaje simbólico, como en deseos, o en la hipnosis extremadamente específicos Londres, basado en lo que establece el inconsciente. Sin embargo, para sin importar lo que la razón principal, continua onychophagists (uñas pinzas cortantes) probablemente será consciente de cuán difícil es interrumpir esta perjudicial práctica.

Actualmente esto aparecieron mis uñas han sido más tiempo, así que me creó llegan a sentirse mucho más bien sobre la observación de los adelantos más. Numerosos pinzas cortantes de uñas no reconocerá una vez toman placer en los hábitos y a fin de que no tienen ninguna manija superior a él.

Usted debe hacer uso de la crema hidratante con frecuencia para que se puedan preservar los poros y la piel muy suave y además evitar las cutículas rasgado. Por ejemplo, como un sustituto de morderse las uñas serás capaz a limarlas.

 Lo verdaderamente se observa con frecuencia en un montón de personas físicas que posean el comportamiento de un clavo muerde una vez que están en la ansiedad o en circunstancias difíciles. No podría ser útil a veces; para mantener a ponerse un guante a pesar del hecho de que las condiciones meteorológicas en cualquier otro caso.

Pinzas cortantes de uñas suelen sensación y observación que de ninguna manera perturbadoras o realizar daño a nadie con su práctica, ¿qué puede ser el querer o la justificación para este tipo de una protesta substancial hacia ellos después de software, que son capaces de ir sobre su típico estilo de vida sin embargo el minuto usted mucho como conjunto los dedos alrededor de su boca obtendrá un sabor impresionante sin duda posiblemente amargo o amargo.

Uñas mordidas ser increíblemente malestar vulnerable, en particular donde los poros y la piel satisface el borde de uñas. La pintura en esmalte de uñas, no funciona, no funcionará para usted personalmente posiblemente.

Pero tengo un método de fórmula mágico en su caso...He detenido mordiendo mis uñas permanentemente y por lo tanto se puede!Realmente, mucha gente no use medicina peligrosa o esmalte de uñas.

Notificar al individuo a proporcionar convenido en recordatorio y nuevamente. Y este tipo de selección de piel o pelo-tirando ocasionalmente podría acompañar clavos penetrantes. Pulse de nuevo las cutículas muy cuidadosamente y mantenerse alejado de picar y enjuague con calor h2o.

 Esto fue simplemente porque gastado mucho tiempo jardinería que solía estar adquiriendo generalmente polvo atrapado firmemente por debajo de mis uñas nuevas.

En un establecido de guantes para proteger las uñas de su asalto del diente. Porque morder uñas es comúnmente una reacción a la ansiedad, creando una reacción distinta puede hacer salir llevando a cabo. Es posible considerar ganchillo Cruz costura y tejido. Sin embargo, sólo una pequeña proporción de las otras personas mayores morder las uñas.

Después de que el niño entiende la razón de ser, es probable que esto le ayudará a detener. Funcionamiento durante diez minutos es suficiente para empezar a disminuir su cantidad de presión y comenzar significativamente mayor emoción!

Clavo morder (onychophagia) es un hombre de área y las mujeres hacen para aliviar la tensión. Cualquier momento que un hombre o una mujer comienza a morder inconscientemente ausente con las uñas, un estilo amargo definitivo vendrá como un recordado para detener a morderse las uñas.

Ahora existe varios uso razonable respecto al producto de belleza caros conocido como esmalte de uñas del dedo. Si no tienes ninguna pista de donde proviene su rutina, entonces el tiempo posterior muerden las uñas, dejar de fumar y pensar por qué le sucede a llevar a cabo, a veces puede ser aburrimiento comunes demasiado.

 Tomar una decisión para vestir en un par de guantes para proteger las uñas en la embestida de su diente respectivo.¿No parece útil de vez en cuando; para mantener un guante a pesar del hecho que el clima se establece en cualquier otro caso que se divierten. Posiblemente trate de manejo claro de este tipo de circunstancias o cuando son inevitables, encontrará más métodos para hacer frente a estas circunstancias.
Sin duda, clavo mordiendo soluciones necesita estar dentro de su muy tenga un futuro previsible.

Preferencias tan amargas que usted simplemente no va a los dedos una vez más dentro de su boca.Morderse las uñas cada entiende cómo resistente es ayudar a mantener mordiendo las uñas, con no amonestó a conseguir por él.

 Es el concepto que 3 en los conductores reconocidos de la raíz de la mala práctica es genético, neurológico, o posiblemente una disfunción conductual y que normalmente existen en las personas que se encuentran ambos en el hábito de la droga, tener TOC, condiciones de la mente, retraso psicológico o privación sensorial este tipo de ceguera o sordera. Más, vas a designar el apagado no cubrirlas!

Por lo tanto permite comenzar a debatir cómo morderse las uñas repercute en su salud en general. A veces, dibujo, garabatos o simplemente disfrutar con una cosa como parte de las Palmas es generalmente una ayuda maravillosa.

View the original article here
          Más se parecen a frenar morder uñas        
Supongo que tengo que han podido desarrollarlas productivamente sobre tres veces, con frecuencia por la cantidad de meses en un momento dado, sin embargo no fue de ninguna manera simple y muchos enfoques intenté falló.

 Esta función puede llevarse a cabo dentro de un lenguaje simbólico, como en objetivos, o en la hipnosis realmente específicos Londres, basado en lo que decide el inconsciente. No obstante, para sin importar lo que la razón principal, onychophagists a largo plazo (uñas pinzas cortantes) probablemente será consciente de cuán duro es realmente interrumpir esta dañando la rutina.

Antes esto parecía mis uñas habían sido más largo, fabricado por lo tanto me siento mucho más beneficioso sobre ver más avances. Un montón de uñas pinzas cortantes no comprenderán una vez toman placer en la conducción y para que no tengan ninguna manija superior a él.

Es necesario utilizar la crema hidratante típicamente como una forma de mantener los poros y la piel muy delicada y además de parada de las cutículas rasgado. Como ejemplo, como una alternativa de morderse las uñas serás capaz a limarlas.

Verdaderamente se observa generalmente en un montón de gente que la práctica de clavo mordiendo después de que estén en la ansiedad o en situación difícil. Bueno no puede demostrar para arriba sin problemas a veces; para ayuda mantener deportivos un guante, aunque el clima necesita o bien.

Pinzas cortantes de uñas típicamente verdaderamente sienten y observación son bajo ninguna circunstancia inquietante o realizar daño a nadie con su práctica, lo que puede ser el querer o la justificación para este tipo de una protesta substancial hacia ellos después de software, es posible ir sobre su estilo de vida común aunque el minuto que usted un gran trata como conjunto los dedos alrededor de su boca obtendrá un estilo sorprendente tanto amargo o amargo.

 Uñas mordidas ser increíblemente dolor vulnerables, específicamente en la que los poros y la piel cumple con el borde de uñas. La pintura en esmalte de uñas, no funciona, no hará personalmente posiblemente.Pero tengo un método de fórmula mágico en su caso...He detenido mordiendo mis uñas permanentemente y así eres capaz!

En realidad, la mayoría de la gente nunca use perjudicial medicina o esmalte de uñas.
Informar al individuo para proporcionar convenido en recordatorio y detrás otra vez. Y este tipo de selección de piel o pelo-tirar podría acompañar a menudo penetrantes clavos.

 Mantenerse alejado de la corte conducir otra vez las cutículas con bastante cautela y enjuague con agua potable de calor. Esto fue simplemente porque invertí una jardinería de mucho tiempo que había ido adquiriendo generalmente suciedad atrapada firmemente por debajo de mis uñas nuevas.

Vestido en un establecido de guantes para defender las uñas de su asalto de su diente. Cómo dejar graves clavo mordiendo considerando morder uñas es comúnmente una reacción a la ansiedad, creando una reacción distinta puede hacer salir sucediendo.

Son capaces de tratar de ganchillo, Cruz coser o tejer. Sólo una pequeña proporción de otro crecido ups sin embargo muerden las uñas. Después de que el niño entiende la explicación, esto puede ayudarle a prevenir.

Trabajo durante diez minutos es suficiente para empezar disminuyendo sus rangos de tensión y comenzar la experiencia significativamente mucho mejor!

Clavo morder (onychophagia) es una cosa individuos hacer para aliviar la ansiedad. Cualquier momento que una persona comienza a morder inconscientemente ausente en las uñas, un sabor amargo definitivo llega a ser un recordado para evitar morderse las uñas.

 Ahora hay numerosos uso práctico hacia la mercancía costosa belleza contemplada como esmalte de uñas del dedo. Si usted no tiene ninguna pista donde su rutina deriva luego otra vez muerden las uñas, dejar de fumar y tomar en consideración por qué puede llevar hacia fuera, a menudo puede ser aburrimiento comunes también.

Determinar en un par de guantes para proteger las uñas en el ataque del diente.No parece ser útil de vez en cuando; para ayuda mantener deportivos un guante, aunque el clima mandatos o bien. Tanto probar manejo claro de este tipo de circunstancias o cuando son inevitables, usted podría descubrir mucho mejores métodos para hacer frente a estos escenarios.

De hecho, debe ser clavo mordiendo tratamientos como parte de su potencial extremadamente oso. Preferencias tan amarga que solo será probablemente no establece sus dedos una vez más dentro de su boca.Morderse las uñas cada entiende cómo resistente es ayudar a mantener mordiendo las uñas, con hacia fuera consiguiendo reprendido por él.

 Es el principio que cerca de tres en la raíz reconocida de los pobres es de comportamiento genético, neurológico, o posiblemente una disfunción conductual y que son con frecuencia actual en las personas que se encuentran posiblemente en hábito de drogas, tener TOC, enfermedades de la mente, retraso psicológico o privación sensorial este tipo de ceguera o sordera. Más, vas a señalar de no disimularlos!

Por tanto permite Inicio apagado para debatir cómo morderse las uñas repercute en su bienestar. A menudo, dibujar, dibujar o simplemente activamente jugando con una cosa en las palmas podría ser una ayuda maravillosa.

View the original article here
          Como dejar de comerse las uñas para siempre        

Casi todo el mundo ha tenido al menos un tenso momento en su vida la mala costumbre de comerse las uñas. Tal vez usted se ha encontrado con las uñas entre los dientes mientras se está sentado a través de una conferencia clase aburrida, anticipando un encuentro que cambia la carrera con su supervisor, o observando ansiosamente el destino de tu película de terror favorita heroína.

Mordiendo las uñas es un hábito que suele comenzar en la infancia. Los estudios muestran un 60% de los niños y el 45% de los adolescentes se muerden las uñas. Morderse las uñas es menos común después de los 18 años, pero puede continuar hasta la edad adulta. Muchos adultos y niños a menudo no saben que están mordiendo las uñas ya que al hacerlo se ha convertido en un hábito.


El problema puede variar desde un hábito ocasional y ligera para un problema actual y más grave.

Como dejar de comerse las uñas y cuales son sus causas?


El estrés y el aburrimiento son los culpables principales de uñas de agarre para la mayoría de la gente. El hábito es a menudo una forma de aliviar la ansiedad o para mantener al menos una parte del cuerpo mientras la mente ocupada carece de interés. La frustración y la soledad son otros desencadenantes emocionales que pueden conducir a morderse las uñas. Algunas investigaciones sugieren que los genes pueden jugar un papel.

Morderse las uñas también puede ser un síntoma de un trastorno psicológico, como el trastorno obsesivo-compulsivo (TOC). Las personas que se lavan las manos varias veces en una fila o comprobar las cerraduras de las puertas delanteras compulsivamente también pueden morder las uñas, como parte del mismo espectro de comportamientos. Muchos niños que son mordedores de uñas también tienen otros trastornos psiquiátricos, como trastorno por déficit de atención con hiperactividad (TDAH), trastorno de oposición desafiante (ODD), trastorno de ansiedad por separación, o mojar la cama.

Regular mordiendo las uñas que causa graves daños a la uña y la piel circundante puede ser considerado una forma de auto-mutilación, similar a los comportamientos de corte y afines.

Problemas con uñas Morder Regular

Morderse las uñas tiene consecuencias tanto físicas como emocionales. Regularmente morderse las uñas y las cutículas puede dejar sus dedos roja y dolorida. El área de la piel alrededor de las uñas pueden sangrar e infectarse. Las bacterias y los virus pasan de los dedos en la cara y la boca pueden hacer vulnerable a la infección.

Morderse las uñas también puede dañar los dientes, dando lugar a mal alineados, los dientes debilitados.

La apariencia de las uñas mordidas hacia abajo también puede ser embarazoso, que sólo puede añadir a la ansiedad y el estrés.

Como dejar de comerse las uñas - Tratamiento de uñas mordidas


Muchos niños crecen con el tiempo de morderse las uñas. Pero para los adolescentes y adultos que todavía luchan con la costumbre, algunas técnicas han demostrado resultados.

Escudo tus uñas con un esmalte con sabor amargo morder uñas. El sabor desagradable te desanime de morder. También puede utilizar un clavo normal transparente o de color de uñas para evitar morderse las uñas. La misma técnica se puede trabajar con su hijo.
Mantenga las uñas cortas. Usted tendrá menos de un clavo a morder.
Cómo manicuras regulares. Si vas a gastar el dinero para mantener las uñas buscando atractivo, será menos probable que los muerda.
Utilice una técnica alternativa para manejar su estrés. Trate de yoga, la meditación, la respiración profunda, o apretar una pelota anti-estrés para que se relaje.
Coloque una banda elástica alrededor de la muñeca y ajústela cada vez que reciba el impulso de morder las uñas.

Si has probado estas técnicas y nada funciona, use guantes o poner vendas autoadhesivas en las puntas de los dedos para que sus uñas no se podrá acceder a morder.
Hable con su médico o profesional de salud mental si morderse las uñas persiste junto con la ansiedad y el estrés. Podría ser una señal de un problema psicológico más grave, incluyendo OCD, que puede tratarse con asesoría psicológica o medicamentos.

Más info: sobre como dejar de comerse las uñas
          Cameron's unbelievable untruth        
David Cameron has been pretty up front about cutting public servants but as pressure mounts regarding his government's failure to tackle tax avoidance, he's starting to deny that they're happening.


When faced with a question during today's PMQs from Labour MP Teresa Pearce about why numbers of HM Revenue and Customs staff were being cut, just when a crackdown had been promised on tax avoidance, Cameron responded by stating that the government had actually presided over an increase in staff levels.


He must have seen different figures to the ones I've seen. In February 2010, just before the coalition came in, the total headcount for HMRC staff was 78,078. Two years later this figure was down to only 70,853. The government are intending to cut a further 10,000 jobs by 2015. Hard to see where his claim of presiding over an increase comes from.


He may of course be referring to the fact that they're reinvesting £900m into the department to deal with tax avoidance and evasion. However, this has to be seen in the wider context of them cutting its budget by £3bn over three years. So in fact, despite their much heralded 'investment', it means they're cutting just over £2bn from the budget of HMRC while claiming to get tough on avoidance. And these cuts are taking the form of sacking 10,000 staff and yet another massive tax office closure programme.


As Graham Black, the President of the Association of Revenue Customs, so rightly put it in his Comment is Free piece: 
"Does it make sense to cut the one part of the government that brings cash in, when we are having to cut back on services to the vulnerable across the board?"


Well clearly it doesn't which is why the PM is so keen to deny that they're doing it. 
          A crucial week for justice        
On Tuesday we'll see if our elected political representatives yet again undo the good work of our unelected representatives as the Legal Aid Bill returns to the Commons for MPs to consider the Lords' amendments.

Peers made changes to the Bill that would mean that the worst of the legal aid cuts in the legislation would be removed. Access to legal aid and the way that it is delivered would be protected for those who have suffered domestic violence, for vulnerable children and for disabled people.

The government will be no doubt keen to use financial privilege as an excuse to overturn these changes like they did recently to reverse changes to their controversial welfare reforms. However, if costs are to be used as an excuse as removing access to free legal advice to hundreds of thousands of people when they need it most, perhaps Ministers should consider the £43 million spent on consultants by the MoJ in the last year and the £12m that's been wasted an an e-Working system that is years behind schedule and has virtually collapsed.

What's really happening to our legal system here of course is that it is becoming increasingly the preserve of those who are able to pay for it. As Heather Brooke pointed out last week, while 140 local courts have been closed and legal aid is cut, £300m has been invested in the Rolls Building (home of the failed e-Working system) which is to handle high-end commercial disputes for a mostly foreign clientele.

It's not just Russian Oligarchs that are benefiting from changes to our justice system. The Association of British Insurers has admitted it will profit from the legal aid cuts. Last year it was revealed that the Justice Minister responsible for driving through these reforms, Jonathan Djanogly will personally profit from the plans as he has a personal stake in the insurance industry. Now that's what I call financial privilege.

Possibly the best hope of amendments - like Baroness Scotland's that ensures victims of domestic violence have access to legal aid and former Paralympian Tanya Grey Thompson's that ensures those who are eligible aren't forced to phone a call centre for advice - surviving the glare of the coalition is the lack of time Parliament has been able to afford to the legislation between the Easter break and the end of this parliamentary session. Who says MPs having long holidays is a bad thing!

If you'd like to contact your MP to ensure we don't lose out on legal aid when we need it most visit the 38 degrees site ahead of Tuesday's vote.
          Wifi Password Hack v2.3.2 Latest        
Wifi Password Hack
Wifi Password Hack v2.3.2 Latest | 4.99 MB

How to hack a Wifi password? This is not a easy task, so after many years we have crated a very interesting program. This program is called Password Hack v5 and Wifi hack wiil be piece a cake.

Tutorial:
Step 1: Just point your mouse to the social buttons bellow!
Step 2: Click and the installation process will begin
Next you must open the program and enter SSID code. The you only need to click “start” and the password will be broken.

How to hack a Wi-Fi network and how to find it’s password?

First, let me tell you what Wi-Fi is! Wi-fi is a recent technology used by gadgets to connect to the Internet without the use of wires. The Wi-Fi Alliance says that Wi-Fi represent “any wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standards”. Because many WLAN use the same standard, WLAN became a synonym for the Wi-Fi word. Interbrand invented Wi-Fi as a play on words with Hi-Fi (high fidelity), and also created the Wi-Fi logo. This certified trademark can be used only by those Wi-Fi adaptors which pass the Wi-Fi Alliance tests and standards. If it has to do with a connected cable, then the Wi-Fi network is much more vulnerable to hackers attacks. Sites which aren’t sertified with SSL and are usually unencrypted are those which will try to steal the Wi-Fi password and any other private datas such as images or account passworrds. Even this intruder will try to take them, it will be harder for them if the router is protected with WPA, WPA2 or WEP encyption security. An extra feature extra from 2007, known as Wi-Fi Shielded Startup (WPS), experienced a serious catch in which let a great hacker to recoupy the actual router. The latest router devices come with the strongest protection ever known and are very hard for hackers to be breaken into. That’s, of course, if you don’t change the password with which is proveded. Ussualy, the routers have generic names and passwords such as the brand or name of the router, or even admin or 1234 as username and password.

The Wi-Fi is used nowdays for devices such as PC, Video Console such as PS 2, Ps 3, Xbox 360, PS portable (except the E-1000 one) and any other console which have 3G or Wi-Fi connection toghether with laptops and smart and non-smart phones. Those devices can access the Wi-Fi by using the sho called hotspots, where free internet is ussually given by restaurants or Internet providers. You need to be within 100 m to receive the signal, and it can only be received outdoors. What you receive indoors is the signal of a neighbour’s router, not a hotspot one. Hotspots can have low signals (10-20 meters) to strong signals, which take a few kilometers.
Any device which has Wi-Fi connectivity can receive Internet signal from this hotspots. The interconected devices are called hang-outs and can be seen each other for distances of over several miles. Outdoor open public Wi-Fi technologies have been used properly with wifi mesh networks with Liverpool, London, and gennerally in the big cities from all the United Kngdom. Wi-Fi is a great way for companies to promote their businessess; it’s very clear that, if there are two restaurants with the same prices and services, but one have also Wi-Fi connectivity, the one with the Wi-Fi will win. And it is not too expensive to provide Wi-Fi, just connect the Internet cable to a router and let it flow. Enthusiasts or perhaps specialists who want to offer products and services or even to enhance company with selected parts at times offer no cost Wi-Fi gain access to. Also there are companies which, in exchage for space used by antena’s on the rooftop of the flat of blocks, gife free internet in that flat. The are radions risks but who cares when you have free Internet, right? I thought so!
If you want to aquire a router, take a brand one, like Belkin or D-link, because the no-name chinese ones are very vulnerable to hacker attacks and can break easely. Don’t risk to lose all your money from the bank accounts or images with your daughter naked posted on the Internet just because you did’t wanted to spend a couple of extra pennies at the right time.

The same can apply to a mobile, battery powerd router, which is included in every cellphone existent. Many phone provider give free traffic for their clients in WAP, 2G, 3G or even 4G connectivity, depending on the country you live. Almost all smartphones have nowdays a easy OS to use such as Android, iOS, and the now dead Symbian OS, which make possible to connect to any Wi-Fi decive and also to interconnect. Internet pucksgive separate services in this sort at the same time, without use of any touch screen phone; these include this MiFi, as well as WiBro branded equipment. Out there are also many devices such as notebooks, ultrabooks and even laptops which use Wi-Fi to find any information the users want.

Now, let’s turn back to the topic of this article. How to hack a Wi-Fi network and how to find it’s password? This is a question many people asked. But now you don;t have to ask yourself anymore. Here is the sollution to all those frustrating days when you were at countrysite, isolated from the rest of the world and you found just a single, slow router. And that was passworded too. Then you and your phone are useless. That’s why our team of developers invented the most powerfull tool on the internet:

Wi-Fi password Hack v5. With a beautifull design, a silverish skin and a blueish font, this is one hack which is very, vet, very easy to use! Even my granddaughter Mary managed to use it in order to play with her virtual friends on the Internet. What do you have to do? First, type the SSID of the router. Ussualy is admin or the model of the router: you can just find it by scanning with the Windows utilities. Next, choose the security type: it could be WEP, WEP 2 or even WSK, it depends on the router. It doesn’t matter what type of security is, every type is hackable. Next, press on Start hacking and the program will handle you the password. Now you have free internet. Congratulations!

Download Link
          I'd pay more tax to see Richard Littlejohn survive on benefits        
I shouldn't read Richard Littlejohn's weekly diatribe of hate but every now and then I get copied into one of his more repugnant observations on life.

This week he chimes into the economic debate with "More tax? we'd all be better off on benefits." He roundly condemns Lib Dem plans to make the rich pay more tax. Well, I'm told Littlejohn earns something in the region of £750,000 a year for his column so it's no wonder he's not keen on the idea. I mean not everyone can be as fair minded and benelovant on the issue as Warren Buffett. However, what I find deplorable is his insistance on having a go at the most vulnerable people in our society to make his point.

His rant about paying more taxes is basically an excuse to have a go at benefit claimants and asylum seekers.

"We’d all be better off on benefits, except there wouldn’t be anyone left to pay for those benefits. Vince Cable favours a ‘mansion tax’ on homes worth more than £2 million. Will that apply to the Somali asylum seeker who has just taken up residence in a £2 million house in West Hampstead."
Of course we would Richard. I'd like to see you survive on £67.50 a week. In fact, I'd pay more tax myself to see it happen. Better still, I'd like to see him experience first-hand what it's really like to be an asylum seeker.

We could put him up in Colnbrook immigration prison where three asylum seekers have died since 2 July or have members of his family detained in Yarl's Wood where one child spend 166 days in detention before her third birthday.

These are the people who really don't have a voice. It's a shame those that speak the loudest like Littlejohn see them as easy fodder for their bigotry. Maybe it's because he knows they can't talk back.

          Webinar: Maximize Omnichannel and Defend Cyber Attacks @incite_social        
The recent ransomware outbreak has left marketers vulnerable and concerned. With the increase in marketing campaigns across a variety of channels, achieving an integrated, seamless experience across multiple touchpoints involves...
          Support the Prison Reform and Redemption Act, H.R. 3356        

On behalf of FreedomWorks activists nationwide, I urge you to contact your representative and encourage him or her to cosponsor the Prison Reform and Redemption Act, H.R. 3356, introduced by Rep. Doug Collins (R-Ga.). This bill would require the Attorney General to develop an offender risk and needs assessment system and incentivizes offenders to lower their risk of recidivism.

On a fiscal level, this bill simply makes sense. Right now, taxpayers are not getting a return on their investment. In 2005, the Bureau of Justice Statistics an office of the Department of Justice tracked over 400,000 offenders in over 30 states after their release from prison. The study found that within three years 67.8 percent reoffended and in five years 76.6 percent reoffended. This failure rate is unacceptable, and Congress must change the direction by utilizing evidenced-based practices to reduce recidivism.

Thankfully, the states – the laboratories of policy innovation – have shown that rehabilitative programming in state prisons reduces recidivism and enhances public safety. In 2007, for example, Texas began the first phase of its justice reinvestment initiative, using a data-driven approach to corrections to reduce recidivism. Crime in the Lone Star State is now at its lowest rate 1968. More than 30 states, including Georgia and South Carolina, have adopted similar justice reinvestment initiatives.

The Prison Reform and Redemption Act would require the Attorney General to develop a post-sentencing risk and needs assessment. All prisoners in the federal prison system will be assigned recidivism reduction programming. The Bureau of Prisons would be responsible for the implementation of the risk and needs assessments for each prisoner and development of recidivism reduction programming.

Each offender will be assessed for risk on an individual level to develop a comprehensive plan based on his or her need and probability of reoffending. Utilizing private public partnerships in this capacity would allow non-profit organizations, educational institutions, and private sector entities to build relationships and community for the most vulnerable citizens in our society. The bill would incentivize prisoners to reduce their risk of recidivism. For every 30 days of successfully completed recidivism reduction programming, prisoners will ten days of time credits. Prisoners can earn an additional five days, for a total of 15 days, after two successful risk assessment periods. Those prisoners who have are considered low or no risk of recidivism can earn an additional five days, for a total of 15, provided that their risk of recidivism doesn’t increase over two risk assessment periods.

Certain categories offenders – including violent offenders, sex offenders, and terrorists – would not be eligible to earn time credits.

The Prison Reform and Redemption Act would allow for great access to visitation and phone privileges, create a pilot program to address the heroin and opioid epidemic, and prohibit the use restraints of pregnant offenders unless the offender poses a serious threat. The bill would require the Bureau of Prisons to collect statistical and demographic information to be provided to Congress on an annual basis.

Congress has fallen behind the states on this important issue. While other policy changes – such as sentencing reforms and reentry reforms – are needed, this bill would bring a key component of state-level success to the federal prison system, offering prisoners an opportunity for restorative justice while enhancing public safety. For these reasons, I urge you to contact your representative and encourage him or her to cosponsor the Prison Reform and Redemption Act, H.R. 3356.

Sincerely,

Adam Brandon, President, FreedomWorks


          MERCADO MOTOCICLÍSTICO 2006-2007        
Nº273 ANECRA Setembro 2008
Literalmente na cauda da Europa, Portugal parece dar sinais de por lá querer continuar no que ao sentido figurado da expressão concerne. O mercado motociclístico, ainda que palidamente a recuperar, não é – de todo – excepção.

O ano de ouro deste sector aconteceu em 1999. Com mais de dezanove mil motos matriculadas, nunca mais a história se repetiu. Hoje, quase uma década depois, os sintomas vaticinam que a façanha não torne a acontecer, pelo menos a breve trecho. Em 2002 e 2003 as quedas ocorreram, inclusivamente, a compassos de dois dígitos percentuais. Em 2006 o ciclo inverteu-se timidamente, com uma recuperação de 2%. Entre outros contributos, essa recuperação também sucedeu por força da entrada de novos concorrentes no mercado, oriundos do eixo China-Coreia, que com os seus produtos finais de baixo custo conseguiram não só penetrar no nosso mercado, mas, inclusive, expandi-lo minimamente. A nível europeu, por comparação no mesmo período, o nosso país manteve-se à margem da tendência verificada. Onde todos os outros aumentaram, nós reduzimos. Portugal, envolto num cinzentismo conjuntural, continua o cenário perfeito para o fracasso dos mais vulneráveis.

CICLOMOTORES
Este segmento reflecte, ainda que aparentemente, uma tendência diametralmente oposta à vigente no mercado em que está inserido. Parece ter crescido para o dobro de um ano para o outro. É certo que a entrada de fabricantes como a Keeway e a Kymco funcionou como dinamizador comercial, por via da introdução de novos modelos com preços de venda e manutenção muito competitivos, o que, em consequência, fez com que os fabricantes tradicionais e conceituados se vissem compelidos a reorganizar o seu portfolio em articulação com o modus operandi das suas estruturas no terreno. Porém, não estaria esta análise enviesada se não fosse o facto de, até meados de 2006, não haver a obrigatoriedade de registo de matrículas na antiga DGV (agora IMTT) para motos de cilindrada inferior a 50cc. Como era prática corrente, as matrículas até então eram emitidas pelas câmaras municipais, passando, desde essa data, a ser emitidas a nível central. Portanto, a análise de 2006 para 2007 é prejudicada em cerca de seis meses, que foram aqueles em que se venderam motos (ainda com os registos camarários) mas que agora não entram nas estatísticas. Já a análise de 2005 para 2006 seria absurda, pois representaria a transição do nada para o tudo…

A Keeway resulta numa aposta ganha. Apresenta taxas de crescimento anuais que só são possíveis porque a marca é nova no mercado. Ou seja, a montante, no seu negócio, tudo estava ainda por fazer. Deste modo, tanto a política de preços como a divulgação e promoção dos seus produtos nos fóruns próprios levaram a que rapidamente atingisse o primeiro lugar das vendas com o popular modelo Uricane 50. Perante os factos, somos levados a concluir que os produtos orientais não só chegaram, como também conquistaram o mercado nacional. Esta é, aliás, uma tendência de fundo noutros sectores da nossa economia global.

MOTOCICLOS
O motociclista português está todos os anos um ano mais velho. Não há “sangue novo” a entrar no sistema. O parque mantém-se estável, e com a falta de incentivos (ou com a criação de novos entraves) o “mundo das motos” já não seduz como seduziu em tempos. Uma tímida recuperação será o comentário mais fiel aos números apurados. Já 2006 havia sido um ano de ligeiras melhorias, porém, ambos, encontram-se muito distantes das mais de dezanove mil unidades matriculadas em 1999, o ano de ouro por excelência.

O modelo campeão de vendas foi a Hornet 600 da Honda, seguido da Yamaha FZ6 e da Suzuki GSXR 1000.

A preferência dos motociclistas lusos recai, maioritariamente, sobre modelos utilitários ou desportivos. As trail, cruisers e scooters constituem nichos num mercado já de si pequeno. Apesar dos circunstancialismos, o segmento das cruisers parece ter ainda bastante potencial. A atenção do público já se manifesta de forma diferente em relação a estas motos. Os motivos poderão ser de vária ordem, desde a crescente afluência destes modelos aos bike shows (o que suscita alguma curiosidade e admiração), à exibição de programas de tv sobre transformação deste género de motos, passando também pela aposta consistente da Harley-Davidson no marketing institucional e de produto.

Outro caso que se vai verificando com relativa frequência é o de motociclistas acidentados em motos desportivas que reequacionam o seu percurso, e optam por permanecer nas “duas rodas” aos comandos de “montadas” menos nervosas. É aí que as trail e as cruiser os poderão atrair.

Por seu turno, para deslocações citadinas, a versatilidade, a economia e a comodidade oferecidas pelas scooters de pequena e média cilindrada, são trunfos de peso para angariar novos adeptos, nesta era em que os custos do quilómetro percorrido e do minuto de estacionamento atingem máximos históricos.

MOTO4 & ATV
No segmento dos quadriciclos, a Yamaha, líder por excelência e tradição, foi pela primeira vez destronada. A Suzuki com o seu LTR 450 apoderou-se do primeiro lugar. A razão, segundo o próprio importador, prende-se com o facto de até 2007 a marca não possuir oferta direccionada a este segmento. Uma vez que ela foi disponibilizada, a liderança impôs-se naturalmente. Tanto mais que o segundo modelo no pódio surge sob a mesma insígnia, tratando-se do LTZ 400. A Yamaha aparece em terceiro lugar com o YFM 300.

DISTRIBUIÇÃO DO PARQUE SEGURADO DE MOTOCICLOS POR DISTRITOS
Todos os distritos, sem excepção, contribuíram para o aumento de quase dez mil unidades face a 2005. Continuamos a constatar uma predominância de motos no litoral, especialmente mais a norte (excepção feita, claro está, para o distrito de Lisboa, que é o maior concentrador do país). Faro, continua a ser a recordista de motos per capita, com apenas 42 habitantes para cada moto. Em termos absolutos, o Porto supera em dobro as motos de Faro, mas como tem mais do quádruplo da população, a relação final dos habitantes com as motos revela-se, em termos relativos, de menor expressão.

EVOLUÇÃO DO MERCADO EUROPEU
O mercado europeu, tal como o português, bateu no fundo em 2002. A diferença é que o primeiro, daí em diante, tem sabido recuperar, ao passo que o segundo não. Países como a França, Itália, Reino Unido e Alemanha, historicamente conhecidos pela sua tradição nas duas rodas, não servirão de ponto de comparação. Já a Grécia, Hungria, Lituânia servem na perfeição para estabelecermos analogias que ilustram bem a nossa falta de estratégia e desapego do sector. Actualmente, com percursos de venda ascendentes, estas economias reclamam para si os benefícios (em sentido lato) que um maior parque motociclístico lhes traz. Neste caso, em termos estritamente económicos, o fomento das vendas traduz-se também – e necessariamente – na defesa do tecido empresarial de serviços de reparação e manutenção, o qual é determinante para a independência e autonomia de muitas famílias que dele retiram o seu sustento, contribuindo para os cofres do Estado, em vez de o sobrecarregarem.

CONCLUSÃO
Com as cartas na mesa, as conclusões afiguram-se claras. A China massifica a sua oferta assente, com predominância, no baixo custo em detrimento dos altos padrões de qualidade ou inovação; o mercado português continua mergulhado numa crise e, tanto a nível político como empresarial, não há quem promova medidas de apoio estratégicas. Este problema, a jusante, agravará ainda mais a debilidade do sector e acentuará a distância que nos separa dos restantes modelos sociais e de gestão europeus, que muitas vezes nos orgulhamos de referir, sobretudo quando nos faltam os verdadeiros argumentos para sustentar a riqueza de uma ideia. Ainda assim, com os juros a aumentar, o desemprego em ascensão, a inflação a subir, a carga fiscal a subtrair uma importante fatia do rendimento de singulares e colectivos que pagam impostos, as taxas e emolumentos em serviços do Estado a sofrerem actualizações substanciais, a especulação dos combustíveis, as portagens onerosas em vias de comunicação com investimentos já amortizados (e com custos de exploração comedidos face ao encaixe de proveitos), as obras públicas de interesse questionável, e os salários a reflectirem perda efectiva de poder de compra, ainda assim, dizia eu, o mercado, nestes dois últimos anos, deu mostras de querer espevitar. Citando o reputado economista Dr. João César das Neves a propósito do atraso de Portugal face aos restantes países europeus: «O que este povo não faria se tivesse uma estratégia certa?».
© Todos os direitos do texto estão reservados para REVISTA ANECRA, uma publicação da ANECRA. Contacto para adquirir edições já publicadas: +351 21 392 90 30.
© General Moto, by Hélder Dias da Silva 2008

          SNAPCHAT WARNING: Children face 'grooming and bullying' with new map feature        
CHILDREN across Oxfordshire have been warned against broadcasting their location on Snapchat amid concerns it could leave them vulnerable to grooming, stalking and bullying.
          Murder By Numbers S01E05 Grave Secrets WEB-DL x264-JIVE        
Season 01, Episode 05 – “Grave Secrets” When a woman is found brutally murdered in her home, all signs point to a local troublemaker. But when more bodies start piling up, police realize they may have a serial killer at large – preying on the town’s most vulnerable citizens. Links: HOMEPAGE – TVGuide Murder.By.Numbers.S01E05.Grave.Secrets.WEB-DL.x264-JIVE MP4 | AAC VBR | […]
          Realms of Arkania Star Trail-CODEX        
Release Description: The united orc tribes attempted to invade the region of Thorwal, but a group of valiant adventurers thwarted their plans during their previous quest. Now the orcs have regrouped and attacked other, more vulnerable areas – Lowangen is occupied and half the Svellt Valley lies in ashes. An elf ambassador summons the party […]
          Mick Jagger: England Lost        


From Friday's Guardian:
England Lost uses a disenchanted, plain-speaking football fan as the narrator for what he said was the “feeling that we are in a difficult moment in our history”. 
It’s a rough, rambling but ready vocal performance, with some blunt one-liners: “I went to see England but England lost / I went round the back but they said piss off.” 
Jagger then sings he’ll “go home and smoke a joint” after a match he didn’t even want to go to, before adding: “I went to find England and it wasn’t there/ I think I lost it down the back of my chair / I think I’m losing my imagination/ I’m tired of talking about immigration / You can’t get in and you can’t get out / I guess that’s what it’s really all about.” 
Jagger said: “It’s obviously got a fair amount of humour because I don’t like anything too on the nose but it’s also got a sense of vulnerability of where we are as a country.” 
If the England Lost music video is anything to go by, it’s clear enough that Jagger – one of the great re-exporters of US folk music to American audiences, whose band made arguably its best album while holed up in France as tax exiles – has misgivings about a Britain turning inward. 
It features Welsh actor Luke Evans as a polite, well dressed gentleman in a cryptic scenario where he is fleeing a menacing array of compatriots who end up dragging him back from the surf as he apparently tries to swim beyond British shores.

          XoftSpySE Review - Does XoftSpySE Work to Remove Spyware From Your Computer?        
If you are now starting have have annoying pop ups appear on your computer screen from nowhere, plus your operating system starting to slow down, then you probably have spyware or adware. You cannot let these problems just get worse because if you are not aware, spyware software will track your viewing habits on the web so as to bring you the relevant adds to display for you. It will also can leave your personnel and private information vulnerable.
          Huge iceberg breaks free from the Antarctica Larsen C ice shelf        

Larsen C is about 1100 feet thick and rests at the edge of West Antarctica, blocking the glaciers that feed into it. An iceberg the size of Delaware has broken free from an Antarctic ice shelf, leaving the rest of the shelf vulnerable to collapse and serving as a harbinger of future sea-level rise that could pose a serious threat to coastal communities such as the Falkland Islands.


          Comment on Microsoft Patches Windows XP and Windows Server 2003 Against Wannacry by As WannaCrypt Recovery Continues, Analysts Back Microsoft's Leader - InfoSecHotSpot        
[…] Brokers released the attack vulnerability that ransom-ware hackers exploited.” In addition, Microsoft also took the very unique step of recently releasing security updates to address the vulnerability for Windows XP and Server 2003, even though they are both years past […]
          Seeing without a State -- Why James Scott matters to foreign aid        


International development is social engineering, yes, but with a social justice lens. Its success hangs on its ability to translate intention into action, the offer of foreign assistance into local appropriation, application and transformation. Redundancy should be its metric of success, yet international development has become a steady career track for young westerners, many plied with advanced degrees in its theories and operational models. None of this--the academic programs, the career tracks--existed twenty years ago.  The simple vocational appeal of 'working oneself out of a job' is long gone.

In the increasing professionalization and careerism of foreign aid (development & disaster relief), what is sacrificed are the years of fieldwork needed to cultivate a hands-on appreciation of destitution itself, the human suffering and loss of potential that ensues, and their causal origins in failed public institutions and cynical leadership. Academic degrees now matter more in development than field experience; the truism that local immersion is the best—many would say only—teacher is no longer followed. In my travels and teachings, I notice among students and young development professionals an unspoken disregard for living at the village level or heart of an urban slum for any period of time. There one is bereft of social media, most modern technology and infrastructure. Life must be experienced purely on local terms. Discomfort with vulnerability and perceived risk may be part of this rejection, but personal security is almost always a question of local networks.

Read the rest of this short analysis over at Medium...







          Comment on Video premiere: Joey Wright’s “Black Hole” by Alec        
This made me feel good. Vulnerable makes for great songwriting.
          La riqueza de los pueblos indígenas: para celebrar y para reflexionar        
En la actualidad, se encuentran entre las poblaciones más vulnerables y perjudicadas del mundo, según la ONUAyer, como cada 9 de agosto se celebró el Día Internacional de los Pueblos Indígenas. La fecha fue instituida por la Asamblea General de las Naciones Unidas, el 23 de diciembre de 1994, en consideración a que el 9 Leer más…
          Talos Security Find Security Bugs in iOS and Mac OS X        

Cisco’s Talon security team are good at their job, so good in fact that they have now revealed not just one but multiple security vulnerabilities that put both iOS devices and Mac OS X devices at risk! The bugs have since been fixed, with each of the five vulnerabilities addressed in the latest versions of the […]

The post Talos Security Find Security Bugs in iOS and Mac OS X appeared first on eTeknix.


          iOS Lock Screen Bypass Vulnerability Fixed By Apple        

Apple has reportedly fixed a security flaw in the iOS operating system that would allow attackers to be able to bypass passcode lock screens on iPhone 6S and 6S Plus that are running version 9.3.1 of iOS. The bypass would have allowed malicious parties to be able to access the address book and photos of […]

The post iOS Lock Screen Bypass Vulnerability Fixed By Apple appeared first on eTeknix.


          Comment on Top 5 Reasons Why You Should Choose Linux Over Windows 10 by penultimateName        
Not so fast. I do agree there is a level of truth to all of the points. However there were vulnerabilities recently discovered that were open for a decade. Software is free but sometimes you get what you pay for. In any case many apps in the windows store is free. Very good chance Windows will continue to be free. For businesses maintenance is not free. There is no magic bullet. Linux has its place as well as Windows. Anyone that claims either one is the perfect solution is smoking the good stuff. I do have extensive experience with Linux at work.
          La pauvreté au Maroc        
MeknescityEn 2014, 1,6 million de Marocains (4,8% de la population) étaient encore en situation de pauvreté absolue et 4,2 millions en situation de vulnérabilité, relève le HCP dans son enquête sur la consommation et les dépenses des ménages. Avec un poids démographique de 40%, le milieu rural concentre 79,4% des pauvres et 64% des personnes vulnérables […]
          Comment on Psychology is the Devil: A Critique of Jay Adams’ Counseling Paradigm by T h e o • p h i l o g u e        
@Paul, (i) I appreciate the time you have taken to reply to my thoughts with your own. Before I respond, a brief summary is in order: <i>After concluding in my book review of Jay Adams’ position as stated in one of his books is both unbiblical and problematic, you asked to choose the source of my authority, and gave me only two options: Science or God. I responded that the question bears an assumption I do not hold, then I explained my reasons for not sharing the assumption of the question. In your response, you argued that I had intentionally avoided your original question, and instead attacked a position that you don’t actually hold. You protested loudly that you love and trust science, do not have a problem with it, admitted it as a source of authority, and most importantly, that you never were or will be asking me to choose between the two authorities of God and science as I made you out to have done. You contrast my “misrepresentation” to your actual view, where God’s authority is “above” science’s and is “ultimate” in comparison, even though both authorities are trustworthy. </i> You call my motives and character into question for the length of my response and it’s hastening to digression from the real issue.</i> In my rejoinder below, I will show that you have failed to take responsibility for your own word choice, and instead shifted the blame on me, making judgments about my moral character and motives (wow… you went way too far here) on the basis that I had intentionally distorted your original question to avoid answering it and hide something shameful. (ii) PLEASE NOTE: The aim of https://theophilogue.com is openly stated to be critical research and open-minded exploration of philosophy and theology rather than the propagation or defense of religious dogmas. It’s the wrong forum for calling the motives and character of strangers into question. You don’t know me. If you did, we would be having this discussion over the phone, because I would’ve deleted your comments and called you at my earliest convenience. If you are sensitive to the purpose of online forums, you would understand that a face to face talk in private would be the best venue for you to offer—unsolicited—judgements about my moral character and motives in love and with gentleness, believing the best about me in principle unless evidence seems to demand otherwise—not when you happen to be stricken with a hunch or “impression.” Your attention and respect for the purpose of this venue is appreciated, and I’ve never blocked comments of a critical nature aimed at me or my writing. Only spam. I don’t run from confrontation, but the type of confrontation I’m willing to face here spelled out in my description of this forum—see my section "Three things you should know about this site" on my home page. ============= <blockquote> I’m really curious to know Bradley, where does your authority come from.., science or God?</blockquote> (A1) It is one thing to ask someone the source of their authority (SOA), it is quite another to ask which of two authorities they see as “ultimate” (WO2U) (A2) It is one thing to ask someone which of two authorities they see as “ultimate” (WO2U) and which of two authorities should be seen as “ultimate” (WO2S) (A2) In the question quoted above from your 1st response, you did not ask WO2U or WO2S, but rather SOA (A3) My response was to SOA (A4) Now in your 2nd response, a rejoinder, depicted your question as follows: <blockquote>…the question isn’t do I trust science, it is what is my ultimate authority and that is the question that you seem to have ignored in your response</blockquote> (A5) I will refer below to the expression and word choice we find in your original question as “OE1” (original expression #1) (A6) I will refer below to the expression and word choice we find in your re-wording of the question as “E2” (original expression #2) (A7) I will refer to your position that I misrepresented question OE1 in my response as “ORP1” (original response problem #1) (A8) I will refer to the intended meaning of your original question as IMOE1 (intended meaning of expression 1) (B) Now that you have the convenience of comparing the difference in wording from the way you asked your question originally, to the way you represented your original question in your 2nd response, I have hope to get more sympathy from you in your next reply (and more humility too honestly) (B1) in the wording of your original question (hereafter OE1), you chose to ask about the source (“from where”) of my authority (B2) in your 2nd response, you re-worded your original question (OE2) as a principle of binary discrimination (“between which two”) (B3) the binary discrimination question concerns which among two possible authorities is my “ultimate” authority (B4) in your 2nd response, you did not take any responsibility for having worded OE1 in a way that mis-communicated your actual meaning or intent (B5) in your 2nd response, you blamed me for failing to correctly interpret OE1 as you intended it (B6) in your 2nd response, you claim you intended OE1 as OE2 (B7) OQ1 is really a different question than OE2 (B8) therefore, the charges you have leveled against me, do not hold (B9) the charge of red herring does not hold (B10) the charge of dishonesty does not hold (B11) the charge of ill intentionality does not hold (B12) the charge of mis-representing your question (as you originally worded it) does not hold (B13) the charge that I am being surreptitious does not hold (B14) the charge of ignoring your question (as originally worded) does not hold (B15) Now although you made many other mistakes in your 2nd response, it was this one that seems to drive your confidence, shape your posturing, provide the foundation for your critiques, and takes up the majority of your attention judging by the amount of space you gave to discussing it. (C) Below I have teased out a number of what I see to be the meaning of some of your words to make it easy for you to read through and clarify if I have properly understood the intention behind the word choices of your expressions: (C1) that in my response, I’ve committed the red herring fallacy: http://preview.tinyurl.com/hs6aoqc (C2) that in my response, I fail to respond to your question as you originally intended it (C3) that in my response, I avoid the principle meaning of your question (C4) that in my response, I got off topic “quickly” (C5) that in my response, I was at some point on topic (C6) that in my response, I have taken extreme measures in ignoring and misrepresenting your question (C7) that in my response, I illustrate what “lengths some people will go” to avoid the principle meaning of a question (C8) that in my response, my motive for going to “great lengths” was “to avoid the principle meaning of a question” (C9) that in my response, I’ve misrepresented your question (C10) that in my response, I’ve ignored your question (C11) that in my response, I was lengthy (C12) that in my response, the speed in which I digressed and the length of my digression gives me an appearance of not holding to biblical inerrancy (C13) that in my response, I “seem” to want to “turn to” biblical inerrancy (C14) that in my response, I “seem” to want to “turn to” divine inspiration (C15) that in my response, the way in which I “seem” to want to “turn to” biblical inerrancy can be described as “authoritative” (C16) that in response, that the way in which I “seem” to want to “turn to” divine inspiration can be described as “authoritative” (C17) that seeming to “turn to” as “authoritative” divine inspiration and biblical inerrancy while not holding to them is dishonest (C18) that seeming to “turn to” as “authoritative” divine inspiration and biblical inerrancy while not holding to them is surreptitious (C19) that in my response, I was dishonest (C20) Before our discussion ever got started, in my first reply to your question, I made an apology *just in case* I had poorly expressed myself and thereby had been the one responsible for any misunderstandings of my own position that provoked your confrontational tone and barrage of questions. You see Paul, we don’t always know what the best word choice for our intentions will be until we see the aims, assumptions, misperceptions, and unshared meanings for those same words that belong to those who end up interpreting them. So re-wordings of one’s understanding are often the result of poor word choice, careless thinking, and hasty writing. But they don’t always result due to a deficiency in one’s capacity for proper word choice, critical thinking, and careful writing. No. Sometimes they are just the bane of language’s existence—reminding us of it’s painful limitations and shortcomings as the creation of finite creatures with imperfect skills. (C21) Upon further examination of the wording of your original question, I conclude that you never gave me sufficient reason to interpret the question as you had actually intended it, but sufficient reason to interpret it the manner I instinctively chose. Therefore, even though you were the one who hasten to judge me, I believe you now owe me an apology. I’m not holding my breath, but I am optimistic about others until they give me a reason not to be or pose an immediate threat to my family’s well being so as to require caution in keeping them safe. (C22) Now that I’ve established whose paying closer attention to whom, and who is being more careful with their word choices, I hope our dialogue does not continue to devolve into the basic meaning of basic words anymore, where poor word choice is blamed on me instead of simply clarified, or the harsh premature judgments of my motives and character. (C23) If you find yourself still opposed to me on this, the only way I would know how to move forward would be take each word of OE1 and OE2, parse each according to normative meanings, and challenge you find shared meanings matching your intentions anywhere in any other source. Or I could simply ask you this: Since it’s one thing to ask another what the source of her authority is, and another still to ask which authority between God and science she chooses to give ultimacy, please provide quotations from your original wording of the question, or any later articulation of it where that articulation is clearly indicated as the same question. Only evidence please. Make your case. ____——____—___—_-SHEEESH!!!!!! (D) Below I have teased out a number of what I see to be the meaning of some of your words to make it easy for you to read through and clarify if I have properly understood the intention behind the word choices of your expressions: (D1) that my argument included falsely depicting you as “shooting down science” which is not what you want to do (D2) that I’ve represented your argument as presenting a “false dichotomy” of choosing either the authority of science or choosing the authority of God (D3) that you never presented the issue as which authority (God or science) to choose between so I misunderstood the word choice in your expressions (D4) that you never intended to force me to choose between the authority of science and the authority of scripture as I had accused you of doing by the word choice found in your expressions (D5) that in what you have said, you do not set God’s authority “against” science (D6) you don’t have a problem with science (D7) you, on the contrary, love science (D8) you do not distrust science (D9) that the “only” issue was the question of which authority (science or God) I view as ultimate (D10) that your position places God’s authority above science (D11) that in placing God’s authority above science, you do not do so in a way that sets them contrary to, or against, one another (D12) Now the above leads me to logically conclude you could never see a scenario where one authority would actually contradict another in such a way as to force anyone committed to one to reject the other. (D13) Yet strangely, this is exactly what you continue to do in the choice of words found in your expressions where you present the question. (D14) I have provided examples below: <blockquote> I am curious to know Bradley, where does your authority come from… science or God? Now the question I am asking you is, do you take as authoritative what science tells us, or what scripture tells us? …science tells us about our origins, both for humanity and for the universe as a whole. Scripture tells a different story than what science does… When I read Genesis I have no qualms in saying that what it says is diametrically opposed to what evolutionary science has to say. </blockquote> (D15) Nowhere is it more clear that you do actually have a problem with science; that you do actually distrust science; that you do actually intend to make me choose between these two authorities in a zero-sum fashion; that the authority of one is contradicting the authority of another; that science is “against” God’s authority. (D16) The clarity of this reaches a peak when state the two are “diametrically opposed.” This statement was ironically followed by one of the rewordings of your question, which goes to prove that the intention of your original question is to have me choose between the two: <blockquote> Science tells us about our origins, both for humanity and for the universe as a whole. Scripture tells a different story than what science does. When I read Genesis I have no qualms in saying that what it says is diametrically opposed to what evolutionary science has to say. Jesus, in the New Testament, speaks of the Genesis account in a literal way, and speaks of Adam and Eve as historical persons who were created from the dust of the earth. Now the question I am asking you is, do you take as authoritative what science tells us, or what scripture tells us? </blockquote> (D17) May I remind you that you told me that you have no mistrust of science? I can assure that I don’t think it is self referentially absurd. <b>Only if you believe that I have some distrust of science can that premise be true, and I assure you that I don’t</b>. (E1) I would suspect there is a problem with your interpretation before I would call science into question. (E2) After all, a text can be “infallible” and “inerrant” in the most supreme way and to the furthest possible extent. The superiority of an authority and the method of exercising that authority are two different things. When it comes to the Bible, Christians believe God exercises his authority primarily through the true meaning of the Bible. But if its interpreters are so beset with human depravity, interpreting with an sinful heart, and prone to mistakes without any last “stronghold” or aspect of human nature to trust in, that I find good reason to not trust in myself or my own abilities, transcendency or supremacy of authority provides no more assurance that I can attain to a proper understanding of the meaning of such an authoritative and inerrant words. In fact, it actually creates a defeater, since whereas science does not and cannot provide prescriptive morality so as to make demands that address human depravity head on, we would have less reason to be prejudiced against it, seeing no threat or demand is necessarily placed on our moral lives. But with Scripture, humans have plenty of reason to be bias and prejudice in their interpretations of it. (E3) So long as it depends on one’s own ability to prevent any influence of the deeply troubling imperfections, depravities, and limitations of my heart and mind on my interpretation of such an inspired, authoritative, and inerrant message, there is no hope such doctrines offer her towards that end. If in fact we did not have to rely on ourselves, because correct interpretation of God’s words depended on God alone and was therefore most certain, we would not only be guaranteed an infallible message, but an infallible interpretation of it. Oh how wonderful such a scenario would be, and how our past in the West would’ve developed so differently, and how many mothers and their small children, for example, would’ve never had to be publicly disgraced and killed on account of heresy, since God’s protection would’ve prevented different interpretations, making human interpretation of God’s intended message and the message itself virtually impossible to distinguish! (E4) Now if my interpretation of an infallible and inerrant message fails to square with what we already know from some other authority that we trust, does it make sense for me to take for granted that my own interpretation is not to blame? Is it most faithful to what I already believe to instead mistrust science? Would we really trust in our own abilities as individual persons knowing we are prone to unpredictable and extensive error in our human interpretation, refusing to even consider favoring another authority we already have good reason to trust, an authority we already consider so trustworthy that in principle it can never be set “against” God’s authority, such as … say … science? I am arguing the more humble (and consistent) thing to do would be call into question one’s own fallible, imperfect, limited, and bias interpretation ability as applied in this case. (E5) I have constructed a rough-draft of an argument in attempts to analyze the components involved in thinking this way, and give you the opportunity to be very specific if you want to challenge any step of the argument: (E6.1) Messages using human words require interpretation to be understood properly (E6.2) The Bible is a message from God using human words (E6.3) Therefore, the Bible requires interpretation to be understood properly (E6.4) Human interpretation of messages communicated with human language has no protection from endless erring (E6.5) The Bible requires human interpretation of messages communicated with human language to be understood properly (E6.6) Therefore, nothing protects humans from endless erring in biblical interpretation (E6.7) Human interpretation cannot be trusted in principle (E6.8) Science can be trusted in principle (E6.9) Therefore, science can be trusted more than the human interpretation of Scripture (E6.10) Human interpretation of passage X in the Bible contradicts science (E6.11) Science should be trusted in principle, but human interpretation should not (E6.12) Therefore, human interpretation of passage X is in err (E7) Now Paul, if you believe (1) through (11) above, I can’t see why you ended up stuck with a war between God and science? If you do not agree with (1) through (11), please point out where it goes wrong—and don’t forget to distinguish between whether you think my conclusions are not following from the premises or whether the premises themselves are unsound, referring to them specifically using the numbers assigned above. (F1) I have also made a rough draft (you can help make it better) of an element of your argument, as best I understand it, below in parallel fashion: (F2.1a) The Bible is more inspired, inerrant, and authoritative than even science, (F3.1b) or transcends the authority of science (F3.2) Human interpretation of passage X in the Bible contradicts science (F3.3) Therefore, with respect to passage X in the Bible, one must choose between God’s authority and that of science (F3.4) Bradley chooses science over human interpretation of passage X (F3.5) Passage X has divine authority (F3.6) Therefore, Bradley’s action betrays God’s authority (F4) There are really unspoken premises needed to complete this argument in order for (6) to be a valid conclusion. You would have to establish, it seems to me, that the ultimacy of authority assigned to Scripture had some ability to make human interpretation more reliable in interpreting it. Or better yet - that when I chose science over human interpretation, I am really choosing human authority over God’s authority. Then I could see how I might be accused by you of failing to give ultimacy of authority it’s proper place in a divine-human hierarchy. (F5) I don’t want to address your example of Genesis, since you and I clearly have a vastly different appreciation for the science of hermeneutics, and the role of science in the art of interpretation—especially where the knowledge of the use of ancient languages, literary influences, known writing genres and their corresponding language practices, and historical and socio-political contexts becomes necessary for a responsible interpretation. Although your arguments sometimes seem to require beliefs about hermeneutics that I do not think are most advantageous to interpretive accuracy, it would seem this would entangle us in the question of interpretation instead of authority. But I don’t want to have that discussion because it’s not necessary at this point. Nevertheless … (G1) I will grant you your wish. (G2) I will answer your question, in spite of what appears to be a confused expression on your part about what you really mean, since you deny that you are forcing me to choose between the authority of science and the authority of God because you trust science’s authority in such a way that such a dilemma should not occur. And yet, I’ll answer your question anyway. For the sake of clarity, however, I want to place your question as close to my answer as possible so you see another irony: <blockquote> Now the question I am asking you is, do you take as authoritative what science tells us, or what scripture tells us? That is a pretty simple question and I would think it would be able to be answered in a fairly simple way. Yes or no would probably suffice. The reasons as to why you answer yes or no would require much further discussion I would suppose, but at least we would then have a starting point. </blockquote> (G3) Yes. (G4) Was that direct enough? I’ve answered your question. The one I was supposedly avoiding—thought I faced it head on. Not only this, but I have even accommodated myself for your convenience to answer your question in the exact fashion you suggested: with a “yes” or a “no.” My guess, however, is that you will still have some sort of hermeneutic of suspicion to apply to all this still, even when I’m bending over backwards to do as you ask, not only in answering your question directly, but using the limited choice of words you suggested for such a “simple” question. I have not only met your challenge, but I have done so in a manner I allowed you to chose, and after you have had the privilege of re-wording your question in attempts to clear up any doubts about its meaning. Are you happy about that? (G5) Can you stop accusing me of not answering your question? I would appreciate it. (H1) Now, irony of ironies. Although I am the one who was put on the stand and judged harshly by you as misrepresenting the word choice found in your expressions, it is actually you who are guilty of this. Below do not understand my argument to be that asking OE1 entails an dubious assumption in such a way that answering it with a “yes” or “no” would entail taking on that assumption. That is my position, but below you will see that you have recklessly misconstrued my position without even offering any reasons for why the wording in my expressions would require the meaning you are assigning to it, much less did you offer sufficient reasons for the same. <blockquote> It seems obvious to me that to you, to question where our ultimate authority lies, means that I must disregard what science has to say altogether! </blockquote> (H2) Here you claim not only that I have argued asking OE1 entails disregarding any truth claims reached on the basis of sciences’ authority, but that such a rendering of my position “seems obvious” (to you anyways). But after investigating again the words I used in expressing my position, I have failed to find any place in my reply where I make this argument or imply it logically. If you are going to advance this kind of careless interpretation, you need to quote me. Where do claim this? I am eager to discover in which place you see me making this argument. It is a stew man if I ever saw one. (H3) Now in my discourse with you, I assumed at the outset the inevitability that both of us ought to be humble enough to consider the possibility that defects exist in our communication and that we will at times choose words that in retrospect have to be clarified when their intended meaning fails to get through to the intended reader. Therefore, I open my own reply as follows: <blockquote> I may not be articulating this perfectly, so I am willing to clarify or restate anything I said if I have not chosen the right way to say it, but… </blockquote> (H4) In contrast to this, you not only blame me for the shortcoming of your own communication, but you go on to misrepresent my position—the very thing you seemed so indignant about when you perceived me to be the one guilty of doing this to you. This makes you guilty here of a kind of hypocrisy, being the aggressor who challenged me with a barrage of questions under suspicion of my impiety in the thread of my post. When I did not answer your question because I argued that doing so would entail sharing the assumption inherent in the words of it’s expression, you not only openly judged my motives and character, you then falsely accused me of being the one misrepresenting arguments when upon scrutiny it was you who were guilty of this. Understanding the intended meaning and analyzing the logic of the meaning of someone who decides to explain why she differs in opinion from yourself requires sufficient mental energy and attention in and of itself. I don’t see need to spend extra time and energy speculating about unspoken motives in the heart of the person who disagrees with you. After all, isn’t there supposed to be only one who can see the heart? (H5) It is a difficult enough task judging the secret, unspoken motives behind the words of persons you love most, persons you are close to you and see every day. With such loved persons you will have the deepest level of familiarity with the way they use language, how to place things they say in the larger context of what things you know about them and their character; you will become accustomed to their mannerisms and quirks. Yet, it is often difficult even with this we love most and care for most, to read properly the secret motives behind their words and actions. Much less, therefore, is it appropriate or wise for you to judge me so extensively, thinking of your hunches about my motives and character as somehow clever in spotting something “bad” in me, slandering me as purposefully avoiding your question because of my hidden motives. (H6) The fact that you would fail to think the best of me (whatever that would mean for you) is violation enough, but to make it part of the structure of your argument or message to me (being all too quick to judge) certainly appears to say more about you than it does about me. It is appropriate to the form of love to assume the best of others until they give you good reason not to assume the best of them. This is especially needed when you don’t see eye to eye with someone else, because everyone knows we be vulnerable to demonizing others with whom we find ourselves in sharp disagreement. I have no control over your imaginative suspicions of me as your interlocutor; I can’t help it if in your imagination you are unable to conceive of my motives as being being good, even if you think my arguments are flawed. It’s neither fair to me nor appropriate to the form of love and respectable, civil engagement in a forum such as this. (H7) I want to make one last argument in as a draw to a close. You used a certain kind of logic in your argument below that I want to borrow for my own argument: (H7.1) If the Scriptures are not divinely inspired (H7.2) then they are certainly not inerrant, (H7.3) and if they are not inerrant, (H7.4) then they certainly cannot be trusted, (H7.5) if they cannot be trusted (H7.6) they would certainly have no authority in what they say or teach. (H8) Below I have construed two arguments that appears to make the logic of own position problematic. (H8.1) If science is not divinely inspired (H8.2) then science is certainly not inerrant, (H8.3) and if science is not inerrant, (H8.4) then science certainly cannot be trusted, (H8.5) if science cannot be trusted (H8.6) science would certainly have no authority in what it says or teaches (H9.1) If human interpretation is not divinely inspired (H9.2) then human interpretation is certainly not inerrant, (H9.3) and if human interpretation is not inerrant, (H9.4) then human interpretation certainly cannot be trusted, (H9.5) if human interpretation cannot be trusted (H9.6) human interpretation would certainly have no authority in what it says or teaches (H9.7) what we understand as “God’s Word” depends on a correct interpretation of God’s Word (H9.8) therefore, the method we use to construe what is “God’s Word” cannot be trusted (H9.9) if “God’s Word” can be trusted in theory, but in practice amounts to human interpretation of it (H9.10) then anything concrete we intend to mean when we say “God’s Word” will amount to a particular human interpretation (H9.11) therefore, practically speaking, “God’s Word” cannot be trusted and has no authority in what it says or teaches (H10) If your own position is not problematic in this way, I have provided the numbering system for you to specify which parts of it to find fault. Be sure distinguish between soundness and validity of argument so it will be clear in what way you plan to make uncertain it’s conclusion—that is, by arguing my conclusion does not follow from the premises, or by arguing that one or more of the premises is unsound. (H11) If I have mistakenly chosen words that are ambiguous I will be glad to restate my meaning and clarify. Making logical blunders is not beyond me, but you’ll need to take advantage of my numbering system above to make a case. The lengths I have gone to in using them are intended for easy reference, which makes communication more efficient and makes it easier for you spot the exact error in my thinking and refer to it shorthand. If my arguments hold, your position is shockingly vulnerable again in a self-referentially absurd way. If nothing human interpretation or science says can be trusted based on your own logic, we have indeed arrived at an unintended absurdity as the byproduct of a misstep somewhere. (H12) Why do you trust human interpretation? Why do you trust science and assign to it authority? This brings me to my last point. <blockquote> …I can assure you that I don’t think it is self referentially absurd. </blockquote> (I) I’m not sure why you would respond to me as though I were misperceiving you in this way. Usually the people who believe an argument is self referentially absurd are not the one’s that are themselves also seeking to advance the absurd argument; as though you actually thought the argument that you were yourself advancing, was at the same time perceived by you to be self referentially absurd. And I’m not really interested in discussing so much which positions we find persuasive personally vs. which one’s we find unpersuasive, but rather on focusing attention on the logical consequences of adapting one view vs. another, and the demand for the totality of our adopted positions to be coherent once properly understood. When one person claims that another person has misunderstood their words, they get the chance to then clarify what their true position actually is on a matter. This is almost always progress. (I1) Unless of course, the person is confused about what position he or she actually holds, or has difficulty in choosing his or her words carefully enough to be sufficiently understood by those they accost with accusations, for whom the words are intended. We can neither hold to claims that themselves are problematic when there appear to be good reasons to believe the one claim is internally incompatible with another we also hold, so that without further tweaking or clarification, they do not appear rationally coherent together. And now I await your thoughts, and hope for a more gracious interaction from you. Bradley
          When Elmo And Big Bird Talk To Refugees        
Elmo and Big Bird have lots of experience teaching children everything from the ABCs to autism. Soon, they could be bringing smiles — and education — to millions of refugee children forced from their homes in Syria, Iraq and other war-torn countries. But first, Sesame Workshop is doing its homework. In partnership with the International Rescue Committee, Sesame producers and early-childhood experts are soliciting guidance and feedback from relief organizations, trauma experts, academics and others who have worked with refugees. They'll also be making research visits to refugee camps in Jordan. According to the IRC, of the 65 million people displaced from their homes worldwide, more than half are children. "And certainly I think it's fair to say there are no more vulnerable people in the world than these refugee families and kids," Jeff Dunn, the CEO of Sesame Workshop, told a small crowd at the nonprofit company's New York headquarters recently. Sesame's goal is to develop new content
          The Rising Tide of Renters – A Vulnerable Population        
Author: Gary Scronce, Director of Preparedness Programs, IEM This article was originally published in the IAEM Bulletin, Vol. 34, No. 6 June 2017.   I’m sure most people do not think of renters as an especially vulnerable population, from an emergency management or any other perspective. However, south Louisiana’s (particularly the New Orleans area’s) recovery […]
          Genesis account of creation and fall: what does the Church teach?        
John Young

The book of Genesis gives a vivid picture of creation. God is like a workman, constructing the universe over a period of six days, then resting on the Sabbath. There is a beautiful garden, trees with strange properties, the first two human beings, an evil serpent, an angel to guard the entrance after the couple have been cast out as punishment for eating forbidden fruit.

Clearly there is a wealth of symbolism in the account but there is also true history. The Pontifical Biblical Commission, in 1909, declared that the first three chapters of Genesis contain true history, basing this answer on the testimony of both the Old and New Testaments, the almost unanimous opinion of the Fathers of the Church, and "the traditional view which - transmitted also by the Jewish people - has always been held by the Church" that these chapters contain the narrative of things that actually happened (see AAS, 1909, 567-569).

Extremes

Two extremes need to be avoided in biblical interpretation, whether in Genesis or elsewhere: taking things too literally or not taking them literally enough. Those who do the former are labelled fundamentalists, but we should recognise that they want to be faithful to the fundamentals of Christianity, whereas those who too easily dismiss the literal sense of a passage will often deny key doctrines - for instance, some even see the Resurrection of Christ as not involving the body that was buried in the tomb.

In conversation with a Baptist student for the ministry, I once interpreted a Bible passage in a non-literal sense, and he suggested that if we do that with this particular text, we will not know where to stop. I can sympathise with his difficulty, for he didn't accept a Church that can guide us infallibly. But given a Magisterium guided by the Holy Spirit, we can stay on the right path.

With that in mind, what things in the Genesis creation accounts must be accepted as having happened, and what is, or may be, only symbolism? First let us look at a number of things in the first category.

Genesis says God created the heavens and the earth. This means that he willed the world to exist and it came into being from nothing. It depended on his infinite will, not on any previously existing matter - for there was none. The Catechism of the Catholic Church (n. 293) quotes the words of Vatican I that God, "from the beginning of time made out of nothing both orders of creation, the spiritual and the corporeal."

That teaching has profound consequences for our spiritual lives because it shows our utter dependence on God. Once things got into existence they didn't become independent of their Creator: each being, including ourselves, depends as utterly on the divine will holding it in existence from moment to moment as creation did in its first instant (see the Catechism of the Catholic Church, n. 301.) A realisation of this lets us see more profoundly the truth of St Paul's words: "What have you that you have not received and if you have received why do you glory as though you had not received?" I Cor 4:7).

It is a fact is that Adam and Eve were real individuals. They are not symbolic figures simply standing for early humanity. Pope Pius XII expressed the constant belief of the Church when he rejected the idea that Adam was not an individual man but only a name given to some group of our ancestors. He declared: "Original sin is the result of sin committed, in actual historical fact, by an individual man named Adam" (Encyclical Humani Generis, n. 37).

It is certain that Satan tempted our first parents to commit the first sin. St John, in the Apocalypse, writes of "that ancient serpent, who is called the Devil and Satan, the deceiver of the whole world" (Rev 12:9). He is the leader of the fallen angels, those purely spiritual beings who rebelled against God and were cast into hell. (For the fallen angels and their tempting of the human race, see the Catechism of the Catholic Church, n. 391ff.)

After Adam and Eve sinned, work became laborious, they suffered and would eventually die. These afflictions flowed from their fall from God's grace. The Catechism recalls: "By the radiance of this grace, all dimensions of man's life were confirmed. As long as he remained in the divine intimacy, man would not have to suffer or die" (n. 376).

But Adam and Eve lost this grace when they sinned. "The harmony in which they had found themselves, thanks to original justice, is now destroyed, the control of the soul's spiritual faculties over the body is shattered" (n. 400).

Bodily death

God had warned our first parents that they would die if they ate the forbidden fruit. We don't know concretely what the sin was (eating fruit from a tree may be mere symbolism), but we do know that physical death was a consequence - people would not have died had Adam and Eve remained faithful to God's command. Vatican II speaks of "bodily death from which man would have been immune had he not sinned" ( Pastoral Constitution on the Church in the Modern World, n. 18).

In a sense death is natural, for the body, from its very nature, is vulnerable to destruction, but God would have given us the preternatural gift of bodily immortality had Adam not sinned. Other preternatural gifts were lost too: we would have had clearer understanding, a stronger will, control over our passions.

Seeing the present state of human nature we may be tempted to think God was unfair to us, for it was Adam, not us, who committed original sin. As the saying goes: Adam ate the apple and we get the stomach ache. But we need to realise that the gifts just mentioned are not owed to human nature since they would have been something over and above the natural.

Most serious of all, sanctifying grace was lost by original sin. It is this grace which, infused into the soul by God, gives us a share in his own divine life. It raises us to a new level of being, making us capable of seeing him face to face in heaven. The essence of original sin in us consists in the privation of that share in the divine life.

Genesis depicts the fall and its consequences in terms of Adam and Eve's attempts to hide from God, their expulsion from the garden, and their struggle to survive in a hostile world.


          Nicholas Seward’s nudes show strength in female form        
Rather than vulnerability or sexuality, the images evoke the inherent strength and nativity of the women’s bodies, part of an exhibit showing at Gallery Espresso through the end of June. A WOMAN crouches in a tree, her pale limbs at once a stark contrast and a compositional complement to the gnarled branches. In another image, a statuesque redhead kneels near a garage, the rust of the door playing on the hue of her hair.…
          (TCPA1BS) Panic Button        
(TCPA1BS) Panic Button

(TCPA1BS) Panic Button

Honeywell evohome security wireless panic button (TCPA1BS) Ideal fro elderly or vulnerable customers who may need to trigger an alarm in case of an emergency. The key fob can be attached to a key chain or belt clip-it can also be worn as a pendant or writband. Water resistant to IP67 One battery CR2032A (in box)  


          Condensulate Extreme        
Condensulate Extreme

Condensulate Extreme

The fit and forget solution to frozen condensate pipes. Condensulate Xtreme offers an innovative passive solution to the issue of freezing condensate for condensing boilers. Key benefits: - Easy to install - Includes adaptors - Fully integrated, insulated and flexible pipe - Not vulnerable to UV degradation, vandalism or vermin when sleeved in waste pipe - An innovative cost effective solution - Aesthetically pleasing  - No electrical or mechanical parts - Sleeved in 40mm waste pipe Does not freeze at -10°   Kit includes: - 3m Condensulate Extreme - 1 x 21.5mm-20mm reducer - 1 x 21.5mm pipe end - 1 x 32mm-21.5mm reducer - 1 x drain guard


          The Way To Reduce Using Water To Your Landscape        


Learning how to properly landscape your yard is really a skill, allowing you turn your own home in the jewel in the neighborhood. Often times they don't know how to accomplish that, though people want their houses to appear great on their block. This article is a good choice for exactly that. Continue along for some advice on becoming great at landscaping.

When building an outdoors kitchen, look for granite for the surfacing. Though granite is generally much more expensive than marble or another options, it is generally more durable and much easier to keep up.

Use native plants when landscaping your yard. Native varieties require less attention as they are living in an environment that is naturally conducive for their growth. This too means they are low-maintenance. You can get details about plants that happen to be indigenous to your area by looking at your best gardening store.

There's a lot more to landscaping then simply planting some grass and trees. You must also add other natural materials including wood, stone and even iron. Use decks, archways and pergolas to generate attractive looks which can be complex, beautiful and visually interesting. These components come in a number of prices despite your budget.

By making a garden that incorporates all seasons, create your yard look beautiful all year. Seek out shrubs and plants that bloom at various times throughout the year. Also, pick trees which have unique foliage as well as evergreens to make your yard bright all year round.

Many people don't think about online shopping regarding landscaping. You will find a larger selection of plants, including some that are not offered by your nearby stores. You will also save the trouble and gas of actually venturing out over a shopping trip.

By buying them with the right times, save on materials. Buy lumber in the winter months or mulch in late season to save lots of funds. Wait a couple of years with regard to their prices to fall before purchasing them, when new plants are brought to the current market.

Include different types of greenery within your landscaping plans for variety and different beauty. This can be factor to protecting the yard from disease or bacteria. They won't be vulnerable to a similar harmful agents when your plants are varied. Houston landscapers To help keep a landscape healthy, choosing numerous types of species is very important.

It might be difficult to find out what sort of flowers is going to do well under a proven shade tree. Ground cover is a far greater choice. Ground covers are really easy to maintain and definately will add interest to your landscape. Consider hosta or sweet woodruff as ground covers for your trees.

If you're thinking of hiring a pro landscaper to your project, ask for a few references. Price is extremely important, just before hiring any landscaper, make certain to take a look with the past work that she or he did.

When you are assembling your own landscape plan, add a quote to the cost. Create the items you understand you need in writing. Then you definitely should discover the best locations to buy the products to acquire high quality items with a great price. Going to a home remodeling store or even a garden supply area can provide a sense of the costs, because they can vary greatly by season and site. Discover where the top deals are and don't forget to ask around for your lowest prices.

Remember the possible impact that some landscaping could have on certain areas of your dwelling. When you are careless, you will probably find that this roots from the plants could interfere with any underground piping you possess. Before finalizing your landscaping design, always consider these sorts of practical problems.

You've learned a little more about landscaping, so just why not get moving today? You'll enjoy the look of your home's outdoor areas along with the feeling of satisfaction you'll feel from creating your new garden. Coming home right after a long day of labor will certainly be a lot better when you drive as much as your renovated landscape. Houston landscapers The outcome you obtain from landscaping worth the investment of your respective time and expense.
          Daftar Skuad Pra Olimpiade 2011 Timnas Indonesia        

Daftar Lengkap Skuad Pra Olimpiade 2011:
1. Kurnia Mega (Arema Indonesia)
2. Arditani Ardiyasa (Persija Jakarta)
3. Muhamad Ridwan (Persita Tangerang)
4. Abdul Hamid Mony (Persiba Balikpapan)
5. Safri Umi (Persiraja Banda Aceh)
6. Diaz Angga Putra (Persib Bandung)
7. Ahmad Farizi (Arema Indonesia)
8. Gunawan Dwi Cahyo (Sriwijaya FC)
9. Rahmat Latif (Sriwijaya FC)
10. Fachrudin (PSS Sleman)
11. Septia Hadi (PSPS Pekanbaru)
12. Okto Maniani (Sriwijaya FC)
13. Dendi Santoso (Arema Indonesia)
14. Egi Melgiansyah (Pelita Jaya)
15. Hendro Siswanto (Persela Lamongan)
16. Ramdani Lestaluhu (Persija Jakarta)
17. Nasution Karubaba (Perseman Manokwari)
18. Engelberth Sani (Pelita Jaya)
19. Johan Yoga (Persib Bandung)
20. Rishadi Fauzi (Persita Tangerang)
21. Aris Alfiansyah (Persela Lamongan)
22. Titus Bonai (Persipura Jayapura)
23. Risky Novriansyah (Persijap Jepara)
24. David Lali (Persipura Jayapura)
25. Yongki Aribowo (Arema Indonesia)
26. Ruben Wuarbanaran (dalam proses WNI & paspor Indonesia) 



SEMOGA INDONESIA MAMPU JUARA DAN MEMBUKTIKAN BAHWA KITA BISA DAN MAMPU MENJADI YANG TERBAIK. GOGOGO GARUDA MUDA

          Comment on Fraud cases across three prefectures involving Apple Pay exploit loophole: Sources by Willam Hugh Murray, CISSP        
As best I can tell the issuer is sending a one time password to the phone of record of their customer. They are being duped into changing that number from that of their customer to that of the perpetrators. We have also seen cases in which telcos have been duped into changing the association between a phone number and a SIM or device. To the extent that we rely upon text to phone for a control, we better be very careful about enrolling and changing those phone numbers. Consumers can help by ensuring that the numbers in their profiles are correct and that they are receiving the traffic intended for them. Note that postal mail and e-mail may be vulnerable to the same kind of attack.
          Returning Starters Part II: The Defensive Lines are the key!        

The defensive line is the lynchpin of every defense.

 

A strong defensive line will force a weaker offense to utilize their tight ends for blocking assignments. A weak defensive line will allow the TE to run his seam routes. When the TE runs free, then the middle linebacker has to chase him, and this opens up the vulnerable heart of the standard 4-3 defensive allignments.

A strong defensive line forces a fullback, or running back to stay in for protection.

A strong defensive line disrupts the rhythm of the quarterback.

A strong defensive line shortens routes.

A strong defensive line limits what a running back can do.

The best part of a GREAT defensive line is that it "protects" its linebackers in much the same way an offensive line protects their QB. When the linebackers run free, then an offense is compromized. The defensive line is the linchpin of any great defense.

THE MOST UNDERRATED ASPECT OF FOOTBALL HANDICAPPING IS DEFENSIVE LINE EVALUATION.

With that being said, let's look at a weak defense:

Arkansas was the worst defense in the SEC. They allowed 42 touchdowns and 4,500 yards. When you compare it to the 14 touchdowns and 3,100 yards allowed by #1 Tennessee the contrast can be stunning. Why was Arkansas so bad?

You can trace it to the defensive line. This unit is highly undersized with Adrian Davis pushing 250 pounds on one end and two tackles in the 280-290 range. There won't be a pressing need for any offensive line to double team on the inside until Petrino's recruits get settled in. Arkansas was outrushed by almost 60 yards per game last season, and the 2009 version of the Hogs looks just as weak as the 2008 unit.

I mentioned a 250 pound strong side defensive end in Arkansas. He's backed up by a "Sam" Linebacker that weighs 237 pounds and an MLB that weighs 222 pounds.

*What are they going to do when LSU runs a 315 pound right tackle and a 233 pound tailback down their throats? Oh, let me see.....last year LSU ran the ball 44 out of 65 times.

*What are they going to do when they face Alabama's 305 pound senior right tackle? Let's see.....Bama only threw the ball 15 times in the 2008 meeting.....They gained an average of 9.4 yards per carry!

I suppose I'll keep this short by saying:

In most cases....when there is a vast inequality between opposing lines, the gameplan will already be in place for you! SEC teams are no different than any other college team. Their coaches will seek the path of least resistance. FIND THE MASSIVE IMBALANCES AND YOUR JOB WILL BE EASIER.

 

Also remember: Totals can be assessed with this imbalance in mind. Alabama scored 49 points in that meeting with Arkansas, but they recieved the benefit of 2 interception returns for touchdowns and two huge rushing touchdowns (82 and 67 yards). The 49 points is misleading. MASSIVE LINE IMBALANCES WILL INDUCE TIME CONSUMING DRIVES! (The life gets sucked out of team totals for weaker defensive teams: less possessions for their offense, and a fresher opposing defense.)

This is one facet of football handicapping that occurs less frequently in the NFL, but it pops up all over the board on Saturdays. One can certainly argue that the run sets up the pass, and therefore totals can still rise, but in college the trend toward increased passing due to run success can be less influential.

*Even Tulsa ran the ball 47 times against Arkansas in 2008.

I hope this helps (I may try to find games where imbalances are pronounced).

Kind Regards

Kevin

 


          A conversation with General Pace        
Last month, I was thrilled to attend a talk hosted by Peter Pace, former Chairman of the U.S Joint Chiefs of Staff at JP Morgan's headquarters in New York City. During a Q&A session that followed the main talk, he fielded some good questions from investment bankers in the audience. The last question he answered was about which threats to American security kept him up at night. 


His response surprised me. 


First he listed things that you would expect, such as the campaigns in Iraq and Afghanistan, political instability in Africa and the Middle East, the rise of China, the craziness of North Korea, the specter of general nuclear proliferation. Then he went back over each of these things and explained why they do not bother him too, too much. 


What really bother him, he said, is the threat of cyber attackThe United States is extremely vulnerable to cyber weapons, he said. He mentioned that large firms like JP Morgan no doubt have the resources to protect themselves a bit from these threats. [Word on the street has it that they do this by hiring people straight out of the CIA and NSA]. But that smaller firms have no such protection, and it is in the best interest of everyone for large corporations and the US government work on security gaps together. 



He said the advent of cyber weapons will have the same impact on relationships between nations as nuclear weapons has. Unlike nuclear weapons, however, thousands of cyber attacks occur each day. He knows what the United States could do to launch a cyber attack and knows what the country cannot defend against. Nation states have generally practiced self-deterrence and do not want a cyber attack launched against them. 
It is not nation states that concern him as much as small terrorist groups. He said that small groups of individuals have the power to launch the sort of actions that only nation states could just a few years ago. 
After the talk, I introduced myself to him as an Iraq veteran, which I hoped would soften him up a bit so I could pepper him with questions. When I asked him what kind of books or articles I could read in order to understand all this better from an insurance perspective, he said that the scene changes so fast that anything more than two years old is out-dated. He told me that updating your reading every two weeks was more like it. This all raised more questions than it answered. What sort of redundancies should web-based businesses develop, so that they can weather any conceivable storm???
I welcome anyone's thoughts on this.

          Dido at the Extremes: Vergil's Tragic Heroine as Victim of and Threat to Rome        
In the scholarship of Vergil’s The Aeneid, Dido is a bit of a divisive character. Scholars are all over the map in their interpretations of this first queen of Carthage, a woman whose intimate relationship with the Trojan hero Aeneas delays, for a full year, his journey to Italy and the inevitable founding of Rome. Some understand Dido as a Vergilian Cleopatra, a vagina détente of sorts that must be fought off in order for Aeneas to successfully fulfill his destiny. Others see her as a representation of Epicureanism, a mode of thought that Aeneas has to reject in favor of the popular Roman ideology of Stoicism. Still others perceive Dido as a tragic figure, a woman who falls deeply in love with a man who genuinely loves her in return and pursues a relationship with him despite both of their knowledge that he is destined for another fate. I argue that Dido is a victim caught in the crossfire of two goddesses: Juno, who has it out for Aeneas and would like for the queen to refuse him help when he lands on the shores of Carthage, and Venus, Aeneas’s mother, who ensures that Dido will aid in Aeneas’s mission by causing her to fall for the Trojan hero. In the end, Dido is collateral damage, sadly—but necessarily—destroyed in order to ensure the success of Aeneas’s imperialistic charge.

There are lots of ways that Vergil demonstrates his sympathy for Dido’s plight and thus paints her as a victim. The author portrays Dido as wise and cautious, but also generous and fair, in her initial dealings with Aeneas and his men: “’Ease your hearts, Trojans, put away your fears. / The threats to my new kingdom here have forced me / To carefully place guards on all the borders. / Who hasn’t heard about Aeneas’s family, / Or Troy—those brave men and the flames of war? / . . . / I’ll send you off secure and well-supplied” (17). Vergil also allows us insight into Dido’s heartbroken and humiliated consciousness when Aeneas prepares to leave Carthage a year later, in over 10 pages of the queen’s cursing herself for her foolishness to believe in Aeneas’s love and her shame in abandoning the memory of her first husband before she finally takes her own life. Most of all, Vergil depicts Dido as an ideal potential wife—at least within the context of first-century Roman culture that valued familial devotion and a patriarchal family structure.

My most persuasive bit of evidence for this claim is that Dido comes to love Aeneas through his child, Ascanius, and is therefore positioned, first and foremost, as a good potential mother. Venus gains access to Dido’s emotions by sending Cupid in the form of Ascanius to a banquet given in Aeneas’s honor soon after he lands in Carthage. Disguised as Aeneas’s son, Cupid crawls into Dido’s lap and easily captures her heart; Dido looks on Ascanius “with hunger in her heart” and is “enchanted” by the little boy (21). As was Venus’s plan all along, “unlucky Dido” then transfers her love for Ascanius to Aeneas himself (22). Had Venus hired one, a modern-day efficiency consultant would certainly have here pointed out that she could have skipped a whole step if only she had only charged Cupid to take the form of Aeneas instead of Ascanius. Or, she could have just given Aeneas a divine glow, as Athena grants to Odysseus before he meets Nausicaa (a scene that is frequently compared to Aeneas’s initial encounter with Dido, not incidentally). Desperate to protect her own child, though, Venus seems to recognize Dido’s maternal instinct as her biggest vulnerability and plans her course of action accordingly. In this way, of course, Dido is an ideal potential Roman matron, devoted to her would-be child as well as his father.

Besides loving Aeneas’s small son, Dido proves her worth as an ideal Roman wife in other ways. First of all, as any proper wife should, she expresses reluctance to abandon the memory of her dead first husband instead of carelessly entering into a relationship with Aeneas right away; as she considers a future with Aeneas, Dido suffers “an unseen flame [that] gnawed at her hour on hour” (71). Once Dido gives in to her passion for Aeneas, though, she centers her world on this would-be second husband, even neglecting her professional duties as a queen to act as a wife to Aeneas. Indeed, it seems that Dido desires for Aeneas to serve as a co-ruler of Carthage, to perhaps take over the projects that she formerly headed up, as she presents him with a visible symbol of Punic royalty, “a purple cloak with think gold stripes” (78) so like her own “purple robe,” “edged with rich embroidery” (74). Dido is clearly willing to allow Aeneas a kingship and to take her traditionally female place as second-in-command.

Portraying Dido as a potentially ideal wife who is victimized by the gods and by fate heightens the tragedy of this story, an epic which details the sacrifices and death required for the founding of an Empire and, indeed, seems in parts to question the overall worth of this venture. In this way, all of the various scholarly perceptions of Dido carry some validity. She is both a tragic figure and representative of a sort of Epicureanism, a self-indulgence unbecoming of and impractical for a man as politically important as Aeneas. And, in some ways, Dido is also a figure of the castrating bitch type, a stand-in for Cleopatra who perhaps nearly caused the downfall of Rome. Although Vergil characterizes Dido as a potentially loving and devoted mother and wife, she is also a sexually attractive and aggressive woman, and, as such, she is also a potential trap, a danger to Aeneas and, by extension, to Rome. Indeed, Aeneas must pry open the vagina détente and abandon Dido’s hold on his heart in order to reach his full potential as a true man of Rome.

Works Cited

Vergil. The Aeneid. Trans. Sarah Ruden. New Haven: Yale UP, 2008.
          Encryption Chip Fights Off Side-Channel Attacks        
Taiwanese hardware designers say that the cloud based services are vulnerable to data leakage threat due to side-channel attacks. The side-channel attacks steal cryptographic keys used by cloud servers leaving the servers under great threat. Researchers at Taiwanese National Chiao Tung University (NCTU) have developed a chip that resists side-channel attacks. According to Chen-Yi Lee, […]
          And The Fight Goes On...        
In my post yesterday, I forgot to thank everyone who has been coming to this blog regardless of the absence of posts in recent months and also those who continue to fight the good fight against cruelty to animals every single day. It never fails to amaze me how humans can simply disregard their lives as unimportant. It also never fails to amaze me how people hide behind anonymity to promote the virtues of the abuse and slaughter of animals. You'd think that they would put their name to their convictions but a comment on an old post on here, Slaughter of Dogs in Serbia, seems to dictate otherwise.

The comment is as follows and has been published to the post:

People are suffering more than dogs all over the world, but that doesn't concern you. It makes me sick how you people care so much about dogs, while people and children are starving. All that you just said is a bullshit. There are so many dogs on the streets of serbia, that it is unbearable. People are feeding them and sitting in cafes along with dogs. Serbia is destroyed by war and can't afford shelters for stray dogs, so what else can they do than kill them. Who needs that many dogs anyway.It is disgusting to see that many dirty stray dogs everywhere you go and stepping in their shit all the time. They are mating on the streets in pacs in a middle of a day, getting mad and dangerous to people and children. Dogs, actually , took over the streets of cities. I really don't care if they are all killed today, if you do, take them home with you and ask your government to take care of them.


First of all, I would like to point out that I fully understand that people suffer every single day from illness, abuse, abandonment and neglect. There are plenty of causes out there that I support in aid of the vulnerable and ill. However, the title of this blog should give the writer of this post an idea of what cause I am supporting here - giving a voice to a creature that often suffers at the hands of humans through no fault of its own. I choose to promote the plight of greyhounds so, no offence intended, if you do not like it then please read another blog.

Everyone is entitled to their own opinion and to throw their weight into the debate as they see fit. However, this comment is a prime example of the ignorance and complete disregard that has led to these problems in the first place. If the governments of countries have let the "problem" get out of hand then that still does not give them the right to relentlessly slaughter dogs. There has to be better solutions than that and I refuse to believe that there are not.

So, in short, to the anonymous poster who offered the above comment - thank you for proving to me that this blog still has a very real role to play in promoting the welfare of dogs everywhere and that there is still ignorance and abuse to fight against.

Please feel free to comment on posts and show your support, disagree, make requests for content, promote your own links and other such things. I can't promise I won't respond but, providing they are not spam, they will be published.
          Stelmach sells out Albertans        
One of the worst guarded secrets in Alberta politics was that the Alberta Teachers' Association (ATA) was planning to orchestrate a province-wide teachers' strike next spring, with the intention of having it coincide with a provincial election.

A strike during a government's most vulnerable time - an election - has been the same strategy successfully employed by other public sector unions in the past.

          Congregación de Hermanas Josefinas de México        

JOVEN… ¿TE GUSTARIA SERVIR A
JESÚS ENTRE LOS MAS NECESITADOS
EN LA CONGREGACION DE HERMANAS JOSEFINAS?

TE INVITAMOS A COMPARTIR ESTA EXPERIENCIA CON NOSOTRAS.
LOS NIÑOS Y JÓVENES COMO TÚ, ENFERMOS Y ANCIANOS TE NECESITAN ¡DECÍDETE!


MISION

Nuestra Misión esta inspirada en el misterio de Nazareth teniendo como modelos a María Santísima y a San José como nuestros padres y Jesús como esposo. Nuestra atención está dirigida a la niñez y la juventud especialmente la más necesitada,

Las hermanas josefinas te invitamos a vivir esta experiencia misionera en todos sectores en especial los más vulnerables de la sociedad en diferentes paises: México, Estados Unidos, Nicaragua, el Salvador, Costa Rica, Venezuela, Puerto Rico, Chile y las misiones en Angola.

          BWW Review: KILL LOCAL at La Jolla Playhouse        

Running a small business can be tough; the larger and more sophisticated entrepreneurs are crowding out the neighborhood finds. Walmart and Target are pushing out Mom and Pop grocers, Amazon is killing local independent bookstores, and those slick impersonal contract killing companies are pushing out the little guys. That's how it feels for Sheila, Abi, and their mother Gloria in this wickedly funny and unpredictable dark comedy KILL LOCAL. You see, they take pride in doing their jobs well as the third generation of this small, family run business that focuses on quality, customer service, and contract killing.

Sheila, played by Amanda Quaid is professional hired gun who knows she has the skills and the talent for her job, but does she still have the drive? Seeing an old friend from high school at a gas station has her contemplating her life, and whether she is still cut out for this life. The trouble is that this is what her talents and her temperament are perfect for, so can she become someone who is cut out for the minivan life?

The play opens with Sheila waiting for a call to come in so she can kill Todd, the guy that is hanging from a rope in a unit of his unfinished and failing condo building (a beautiful set designed by Wilson Chin). Posing as an investor, she convinced him to give her a tour, and now she's just waiting for the green light so she can do the job and then bury him in concrete.

As life, and this job, becomes more complicated for Sheila, her mother Gloria, played by CAndy Buckley, and her sister Abi, played by Xochitl Romero, appear on the scene as they try to get everything sorted. You see they are a family business and they take pride in the services they provide, and as Abi rants to Sheila at one point, "Customer service matters!"

Quaid's Sheila is both cold killer and deeply emotional. She plays both sides very well and her aggravation and her lack of forward motion in this job are relatable to anyone in a job, professional assassin or not. She shines the most when dealing with the ever increasingly frantic and funny Todd, and later in the show when she lets her character's vulnerability shine through.

As Todd, Matthew Amendt is hilariously neurotic and desperate as he uses every trick in the book to try to appeal to Sheila so she won't kill him; he begs, flirts, tries to bribe, and tells tales of a broken home and the redemption his newly discovered sibling is trying to encourage.

CAndy Buckley is a force of nature as the business minded and practical mother who took over this business from her own mother. She is imminently practical in the way of a seasoned veteran of any job; she does it well, she doesn't let it get personal, and she gets paid. Except for when she's ranting at her millennial daughters about playing with their phones, their lack of stamina for what the job require, and their inability to focus. Seriously, there are moments where this is as much a workplace comedy as it is about relationships and morality.

Abi, the younger sister played by Romero, went to Wharton so unlike her sister and mother she "doesn't do concrete"", but she is the brains behind the business paperwork, setting up security, and hacking into things. She is also hilariously on point as a frustrated customer on the receiving end of bad customer service from "Becky at Best Buy" which she says "turns her into a monster" and who can't relate to that?

Carolyn Braver rounds out this cast as the mysterious Ami, a high school student who hangs out at the building for a smoke after high school. But is there more to her story as well? Of course there is

Written by Mat Smart, a grad from the UCSD MFA program the dialogue is quick, funny, and engaging. Directed by Jackson Gay, this play maintains a suspenseful tension while also balancing the humor and the violence.

The play has some blood and gore, and the plastic sheet as a curtain is the first sign this is not your average show. For those that are squeamish or don't appreciate a Coen brothers mix of comedy and violence this may not be for you.

All of the characters in this dark comedy are richly layered, and deeply broken; it just depends on how those pieces fell to become the people they are at the time of this story. This play is dark, violent, and very funny as it explores family ties, revenge, redemption, the difficulty of change.

So you know what they say, to do good in your community you've got to eat local, shop local, watch local, and KILL LOCAL.

Check out this killer show playing at La Jolla Playhouse through August 27th. For show time and ticket information go to www.lajollaplayhouse.org

Photo credit: Jim Carmody/La Jolla Playhouse


          Despidos durante la baja médica        

El Tribunal Superior de Justicia de la Unión Europea (TJUE) interpreta que una incapacidad temporal por accidente laboral puede ser considerada “discapacidad” y, por lo tanto, el despido sin justa causa durante ese período podría ser calificado como nulo.


El TJUE, en su sentencia del pasado 1.12.16 (Asunto C-395/2015), ha vuelto a incidir directamente en la base jurídica sobre la que se mueve nuestro ordenamiento laboral. Esta vez se trata de un caso sobre el despido de un trabajador, estando de baja médica (IT) por un accidente laboral. En la sentencia que comentamos los Magistrados de la UE abren la puerta a que la rescisión del contrato de un empleado en situación de IT de forma “duradera” sea considerada discriminatoria y, por tanto, el despido pueda ser calificado como nulo (readmisión obligatoria.)
 Hasta ahora la jurisprudencia nacional a este respecto permitía que se rescindieran contratos basándose en una enfermedad o incapacidad temporal sin que eso se considerara discriminación y, por tanto, el despido no cabría calificarlo como nulo. Se entendía que esa situación, como no era permanente, no era asimilable a una discapacidad. Esto excluía la discriminación por este motivo y, por tanto, la posibilidad de vulnerarse un derecho fundamental, es decir, no había base para anular el despido. Ahora esta nueva resolución del TJUE modifica la consolidada doctrina jurisprudencial existente en nuestro ordenamiento hasta la fecha.
 El supuesto de hecho que conoció el TJUE, era el siguiente: un ayudante de cocina con contrato eventual prorrogado sufrió una caída en el centro de trabajo y se dislocó el codo izquierdo, teniendo que ser enyesado. Al mes y medio, cuando seguía estando de baja por incapacidad temporal derivada de accidente de trabajo, fue despedido disciplinariamente alegándose que su rendimiento no era el adecuado para el desempeño de las tareas encomendadas.
 El trabajador, que hasta ese preciso momento había estado bien considerado en la empresa, hasta el punto en que se le habían prorrogado sucesivos contratos temporales, presentó demanda solicitando se declarase el despido nulo por discriminatorio o subsidiariamente su improcedencia.
 El Juzgado de lo Social número 33 de Barcelona plantea al TJUE una cuestión prejudicial y se pregunta si el despido de un trabajador en situación de IT derivada de accidente laboral es contrario al Derecho de la Unión en la medida en que puede violar el principio de no discriminación en materia de discapacidad.
 La duda que se le plantea al juzgador nacional en este supuesto concreto deriva de que si bien la lesión parece a simple vista reversible, también es cierto que en la fecha en que se celebró la vista, seis meses después del accidente laboral, el codo del trabajador seguía enyesado, y por tanto su situación era previsiblemente duradera, sin pronóstico médico alguno sobre su eventual restablecimiento.
 En síntesis, el juzgado remitente pretende que se dilucide si el trabajador despedido durante su situación de IT de duración incierta, está comprendido en el concepto de discapacidad en el sentido de la Directiva 2000/78/CE, de 27 de noviembre, relativa al establecimiento de un marco general para la igualdad de trato en el empleo y la ocupación.
El Tribunal de Justicia, atendiendo a la jurisprudencia que se ha ido dictando en la materia, concluye que si un accidente conlleva una limitación de larga duración, ya sea por dolencias físicas o psíquicas, que impida al trabajador participar en su vida profesional en las mismas condiciones que los otros, ésta limitación puede ser considerada discapacidad.
 Por ello, es el juzgador nacional el que con sus pruebas directas, debe determinar si las limitaciones del trabajador tienen el carácter de duraderas, basándose incluso en indicios como puede ser el hecho de que en la fecha del despido la incapacidad no tenga una perspectiva de cura a corto plazo o que pueda prolongarse significativamente antes del restablecimiento pleno. La inseguridad jurídica con tal planteamiento es harto evidente.
Resulta complicado predecir cuál va a ser la postura a partir de ahora de los juzgados y tribunales nacionales acerca de esta cuestión que, sin duda, permanecerá muy presente en el panorama jurídico laboral".

          El Supremo considera discriminatorio no computar la baja maternal a efectos de retribución de incentivos        

El Supremo y el Constitucional señalan que el permiso de maternidad no puede ser tratado como una ausencia laboral porque supone una discriminación de las mujeres.



El Tribunal Supremo y el Tribunal Constitucional han fallado en sendas sentencias contra cualquier discriminación para la mujer por la baja maternal. El fallo del alto tribunal establece que es “discriminatoria y contraria a derecho” la práctica empresarial consistente en computar como ausencias la baja maternal así como la baja por riesgo de embarazo a los efectos de días productivos para tener derecho a las retribuciones de los variados incentivos que abone la empresa a sus trabajadores por el cumplimiento de objetivos. Por su parte, el Constitucional ha amparado a una mujer que no mejoró sus condiciones laborales por estar de baja maternal cuando la empresa abrió esa oportunidad

En ambos casos, las sentencias se basan en el derecho constitucional a la igualdad y en la necesaria protección de la maternidad.

La Sala IV de lo Social del Supremo estima la demanda de conflicto colectivo planteada por CC OO de Andalucía contra la empresa Catsa, referido a sus trabajadoras en los centros de Granada y Málaga, a propósito del sistema de retribuciones variables que tenía establecido, con dos incentivos: el general y el de prima de producción.

Los hechos probados indicaban que las empleadas que “por causa de embarazo y/o maternidad han visto suspendida su actividad laboral por disfrutar de los permisos correspondientes, el primer mes de reincorporación a su puesto de trabajo no perciben cantidad alguna por ninguno de los referidos incentivos, y sólo comienzan a percibir cantidad por incentivos al mes inmediatamente posterior al de su reingreso y en función de los servicios laborales efectivamente prestados a partir de tal reincorporación”.
El Supremo, que revoca la sentencia del Tribunal Superior de Justicia de Andalucía que desestimó en primera instancia la demanda de CC OO, explica que la baja por parto y por riesgo durante el embarazo afectan de modo exclusivo a las mujeres por razón precisamente de su sexo.
La empresa señalaba que ninguno de tales incentivos se devengaba durante el periodo en que no existe actividad laboral, lo que, en consecuencia, motivaba que no los abonase en relación a los periodos de baja por maternidad o por riesgo durante el embarazo, provocando con ello que, tras la reincorporación, las trabajadoras afectadas no percibiesen esa partida salarial hasta el momento de abono de los periodos que, nuevamente, hubiesen comenzado a devengar (en los términos en que está fijado el momento del pago para cada uno de los dos incentivos controvertidos).
Añade que las trabajadoras que pasan a esas situaciones de baja “ven alteradas sus retribuciones en el momento de su reincorporación, pues no perciben incentivos hasta que no vuelven a transcurrir los periodos necesarios para su devengo, computados sólo desde la fecha de dicha reincorporación. Ni siquiera consta que se tenga en cuenta al efecto la situación que quedó fijada en el momento en que iniciaron la baja, de suerte que cabría decir que a dichas trabajadoras se las considera como ausentes hasta la fecha de su reincorporación”.
Tal consecuencia, para el Supremo, “implica una discriminación directa y es contraria al derecho al mantenimiento y preservación de sus condiciones de trabajo y penaliza el ejercicio del derecho a la protección por maternidad, limitando, por tanto, la plenitud del mismo”.
La resolución añade que, en el caso de la baja por maternidad, la apreciación de discriminación podría ser enervada con la afirmación de que también los progenitores varones, bien por adopción o acogimiento, bien por cesión del permiso de maternidad, pueden verse afectados en la misma medida que lo son las trabajadoras mujeres.

Sentencia del Constitucional 

Por su parte, el Tribunal Constitucional que la empresa debió avisar a su empleada de la posibilidad de cambiar de puesto y, al no hacerlo, lesionó su derecho a no ser discriminada por razón de sexo (a, pues la causa de su baja deriva de su condición de mujer. También en este caso, la Sala anula una resolución del Tribunal Superior de Justicia de Andalucía (TSJA)
Según señala el fallo, la recurrente tenía firmado con la empresa un contrato indefinido como limpiadora, con una jornada parcial de 20 horas semanales y con desarrollo de su actividad laboral en un centro de salud. En marzo de 2010, causó baja laboral por embarazo de riesgo, situación a la que siguió la baja por maternidad.

En julio de ese mismo año, la empresa contrató, también con carácter indefinido, a otra persona para que prestara el mismo servicio que la demandante, pero con una jornada laboral de 30 horas semanales y con destino en un nuevo centro de salud. Cuando, concluida la baja, se incorporó
a su puesto de trabajo y se enteró de la nueva contratación, la demandante pidió su traslado al nuevo centro de salud y la ampliación de su jornada laboral de 20 a 30 horas semanales, lo que la empresa le denegó pese a que, al tener su contrato mayor antigüedad, tenía preferencia para ocupar el nuevo destino según el convenio aplicable.
Según la doctrina constitucional, el embarazo es un "factor diferencial" que incide únicamente en las mujeres. Por esta razón, la protección de este "hecho biológico" y de la salud de la mujer debe ser compatible con la conservación de sus derechos profesionales; lo contrario, es decir, "la minusvaloración o el perjuicio causado por el embarazo o la sucesiva maternidad constituyen" supuestos de discriminación por razón de sexo.
Además, añade que "la asignación de consecuencias laborales negativas" al ejercicio de la maternidad puede vulnerar el derecho fundamental a la igualdad. La situación de perjuicio a la trabajadora, según añade la sentencia, viene derivada de su condición de mujer, pues "se debió
en exclusiva al hecho de encontrarse de baja laboral por embarazo de riesgo y ulterior maternidad, única situación en la que solo es posible encontrarse una persona si es mujer".



R.M.

          21D, LLEGÓ LA HORA DE LAS CLÁUSULAS SUELO DE HIPOTECAS        
El Tribunal de Justicia de la Unión Europea (TJUE) ha fallado hoy a favor de los clientes en el caso de las indemnizaciones de las cláusulas suelo de las hipotecas. Las entidades tendrán que devolver todo lo que los clientes han abonado de más durante la vida del préstamo y no solo a partir del 9 de mayo de 2013, como fijó el Tribunal Supremo.
"La jurisprudencia española que limita en el tiempo los efectos de la declaración de nulidad de las cláusulas suelo contenidas en los contratos de préstamo hipotecario en España es incompatible con el Derecho de la Unión. Tal limitación da lugar a una protección de los consumidores incompleta e insuficiente, por lo que no constituye un medio adecuado y eficaz para que cese el uso de las cláusulas abusivas", asegura el TJUE en un comunicado.
"La declaración judicial del carácter abusivo de una cláusula debe tener como consecuencia el restablecimiento de la situación en la que se encontraría el consumidor de no haber existido dicha cláusula", precisa la institución.
Las cláusulas suelo se incluyeron en la mayoría de contratos de préstamo hipotecario variable para poner un tipo de interés mínimo que el cliente debería abonar, independientemente de lo que bajase eventualmente el euribor.
El Tribunal Supremo español declaró abusivas la mayoría de estas cláusulas pero limitó la compensación: la cláusula suelo dejaría de aplicarse a partir del 9 de mayo de 2013, pero no se restituiría lo pagado de más anteriormente.
El TJUE se tenía que pronunciar sobre si esa limitación de la compensación vulnera o no la normativa europea de protección al consumidor. Las cifras concretas de impacto no están claras. El banco de inversión Goldman Sachs sitúa la factura en 3.000 millones de euros, pero un informe del Banco de España, citado por las entidades durante la vista oral del caso, apunta que si la sentencia falla a favor de los clientes, el impacto en el sector sería de entre 5.000 millones y 7.500 millones de euros. La institución no ha hecho público ese informe a pesar de que los abogados de los bancos aseguran haber tenido acceso a él.
La magnitud del golpe irá por barrios. Según Goldman Sachs, BBVA será el banco más afectado, con 1.815 millones de euros. CaixaBank ha cifrado en 750 millones el coste de una sentencia contraria a sus intereses. Los siguientes en la lista, según el banco de inversión estadounidense, son Banco Popular, que ya habría provisionado 350 millones de euros, y Bankia, con 160 millones.
Miguel Roig
21D: llegó la hora de la cláusula suelo
La Justicia europea ha dado esta mañana una buena noticia a los aproximadamente tres millones de españoles que tienen contratadas hipotecas con cláusulas suelo al declarar incompatible con el derecho comunitario la decisión del Tribunal Supremo de limitar los efectos retroactivos de su devolución cuando estas fueron declaradas abusivas y nulas en mayo del 2014. Los bancos van a tener que devolverles todo lo que les han cobrado de más en virtud de estas cláusulas, hasta 7.500 millones de euros en total, de acuerdo con diferentes estimaciones.

Contra este fallo ya no cabe recurso. Las acciones de los bancos españoles más expuestos a las cláusulas suelo -Banco Popular, Sabadell y Caixabank- caían hasta el 11% en Bolsa tras conocerse la sentencia europea.
Las cláusulas impedían a sus titulares beneficiarse de rebajas por debajo de un umbral predeterminado
Las cláusulas suelo estaban incluidas en muchas de las hipotecas a tipo de interés variable firmadas durante los años del boom en España e impedían a sus titulares beneficiarse de posibles rebajas por debajo de un umbral predeterminado. El Tribunal Supremo declaró el pasado 9 de mayo del 2013 que estas cláusulas eran abusivas ya que los consumidores no habían sido informados adecuadamente de sus implicaciones prácticas.
Sin embargo, alegando razones de seguridad jurídica y estabilidad financiera, decidió limitar en el tiempo los efectos de esa declaración, de modo que los bancos sólo tenían que devolver a los clientes las cantidades cobradas de más a los clientes a partir de la fecha en que dictó sentencia.
Carácter abusivo”
No todos los clientes se quedaron conformes. Algunos siguieron luchando en los tribunales para que se les devolviera las cantidades íntegras cobradas desde la firma de los contratos. Un juzgado de Granada y la Audiencia provincial de Alicante decidieron elevar varias preguntas prejudiciales al Tribunal de Justicia de la Unión Europea para aclarar si la sentencia del Supremo es conforme con el derecho comunitario y poder resolver varios casos acumulados. El informe preliminar del abogado general del Tribunal europeo avaló en julio la decisión del Supremo pero la sentencia final ha ido por la dirección contraria.
“El Derecho de la Unión se opone a una jurisprudencia nacional en virtud de la cual los efectos resolutorios vinculados a la nulidad de una cláusula abusiva se limitan a las cantidades indebidamente pagadas con posterioridad al pronunciamiento de la resolución judicial mediante se declara su carácter abusivo”, afirma el fallo judicial dictado esta mañana en Luxemburgo. Lo contrario, alega, no daría una protección eficaz al consumidor, de acuerdo con los previsto por la directiva europea y limitaría el “efecto disuasorio” de declarar nulas unas cláusulas abusivas.
Los bancos deben restituir “las ventajas obtenidas indebidamente”
“La declaración judicial del carácter abusivo de una cláusula debe tener como consecuencia el restablecimiento de la situación en la que se encontraría el consumidor de no haber existido dicha cláusula”. Es decir: el resultado del proceso debe ser que el profesional, en este caso los bancos, restituyan “las ventajas obtenidas indebidamente en detrimento del consumidor”.
La limitación en el tiempo que fijó en su día el Tribunal Supremo español resulta en “una protección incompleta e insuficiente de los consumidores que no constituye un medio adecuado y eficaz para que cese el uso de las cláusulas abusivas, en contra de lo que exige la directiva”, concluyen los jueces españoles.
El Banco de España dio a conocer un informe que estima en 7.500 millones la cantidad a pagar
Durante la vista oral del juicio celebrada en Luxemburgo, el Banco de España dio a conocer un informe que estima en unos 7.500 millones de euros la cantidad afectada por la potencial declaración de retroactividad total de la nulidad de las cláusulas. La directiva sobre protección de los consumidores de 1993 en que se basa la sentencia de hoy es la misma que ha obligado al gobierno español a reformar en varias ocasiones la ley hipotecaria, en particular cláusulas que afectaban a la posibilidad de los particulares de defenderse de las órdenes de desahucio.
En general, los titulares de las hipotecas con cláusulas sólo suelo fueron conscientes de las implicaciones jurídicas y económicas de sus contratos cuando descubrieron que no podían beneficiarse de la fuerte caída de los tipos de interés registrada a partir del 2009. El euríbor ha seguido bajando desde entonces y lleva casi un año en negativo.
Beatriz Navarro

          SUNTEM PE PRIMUL LOC IN EUROPA!!! LA RATA AVORTURILOR... AM UCIS PESTE 20 DE MILIOANE DE SUFLETE        



Chiar daca zilnic suntem bormardati cu stiri mondene, despre cine cu cine a mai fost, chipurile, surprins, cine de cine mai divorteaza, se incearca tot mai mult distragerea atentiei noastre de la problemele de o reala importanta pentru Romania. Una dintre ele, avortul...

Si problema e ca nu avem suficienti „luptatori pentru viata”, nu sta nimeni sa le explice mamelor caror riscuri se supun. Si riscurile fizice sunt minime, traumele psihologice in schimb, raman fara vindecare si dau nastere la adevarate traume si surse de boli pe segment emotional. La final am sa atasez un filmulet pe care as vrea sa va rog sa-l vizualizati si eventual sa-l trimiteti mai departe, e unul cu un puternic impact emotional si va spun inca d epe acum nu este genul clasic de filmulet motivational...

Conform wikispaces.com, cercetările efectuate, începând cu 1993 (anul în care autorităţile au început să fie preocupate de fenomen), arată că, Ã®n intervalul 1990-1992, avortul, în România, a atins cele mai înalte cote din Europa „şi poate din lume”. ReprezentanÅ£ii mass-media, fără să se raporteze la analize credibile detaliate – ceea ce arata ca presa românească la acest capitol este vulnerabilă, uşor de intoxicat şi manipulat –, repetă, pe un ton triumfalist, un slogan de genul: â€žRomânia deÅ£ine recordurile la avort, la nivel mondial”.


Dr Mihai Horga, care a ocupat funcÅ£ia de director al DirecÅ£iei de Asistenţă Familială şi Socială în Ministerul Sănătăţii şi Familiei, în perioada 2000-2003, aexplicat, în lucrarea sa despre avort, intitulată „Contraception and Abortion in Romania, Backround paper for the strategic assessment of policy, programme and research issues related to pregnancy in Romania”, cum e posibilă subraportarea. „Rata totală a avortului este cu 70% mai mare decât rata totală a fertilităţii (2,2 : 1,3)Coeficientul avorturilor provocate la născuÅ£i vii este egal cu 1,6 avorturi la fiecare născut viu, în conformitate cu estimările din sondaje din ultimii trei ani. Aceste estimări sunt de două ori mai mari decât cele înregistrate în statisticile oficiale, fapt care arată grave disfuncÅ£ionalităţi de raportare din sistemul de raportare medical. Lipsa reglementărilor clare privind cerinÅ£ele de raportare ale unităţilor mediale private pot explica această situaÅ£ie. Un sondaj limitat efectuat de către DirecÅ£iile de Sănătatea Publică JudeÅ£ene, în 2001, au arătat că, în anul 2000, existau un număr de aproximativ 80 de mii de avorturi efectuate la cerere, realizate de către clinicile private şi neînregistrate în statisticile medicale. Dat fiind faptul că nu toate judeÅ£ele au raportat avorturile efectuate în sistemul privat şi că raportarea unui număr mai mic de avorturi din clinicile private a fost foarte posibilă, numărul real de avorturi efectuate în sistem privat ar putea fi chiar mai mare.”

Pornind chiar de la datele oferite de Ministerul Sănătăţii, în 1995, se vede că, în perioada 1990-1992, rata avortului provocat a avut o valoare medie foarte ridicată.„Clinicile au fost inundate de femei care solicitau avortul. Ca o consecinţă, rata avortului provocat legal a atins cel mai ridicat nivel din lume – aproape 200 la 1000 de femei între 15-44 de ani, între 1990-1992. Aceasta corespunde unei rate a avortului de aproape 3 avorturi provocate la fiecare născut viu pentru aceeaşi perioadă”. (Fragment din volumul „O viziune asupra vieÅ£ii”, manuscrisul ed. a II, revăzută).
Iar asta se intampla acum 10 ani, de atunci acest fenomen sa nu credeti ca s-a oprit la aceste numere!
 
 Despre cum sta treaba acum, aflam de la parintele Nicolae Tanase (caruia am sa-i aloc un articol separat pe blog, este un om care chiar merita orice pentru toata munca sa de „tatic” pentru 400 de suflete salvate de la conditii de trai inumane, fara acces la educatie sau conditii minime de trai sau de la avort): â€œÃŽn România, înotăm în sânge! Nu până la glezne, nu până la genunchi, nu până la brâu, nu până la gât, ci până peste cap! Pentru că populaÅ£ia existentă în România acum este de 18 milioane. Şi în 20 si ceva de ani, de la moartea lui Ceauşescu încoace,  s-au omorât 18.000.100 de copii! Aceasta este cifra oficială! Este statistica oficială, pentru că există una neoficială, care arată această stare de fapt, şi anume că cifra poate să fie chiar şi dublă!!!”

Unde ajungem in ritmul asta!? Va las pe voi sa raspundeti si sa-mi lasati comentarii, e clar ca ceva trebuie facut si poate n-ar trebui sa stam sa mai tot asteptam de la cei care ne conduc sa faca ceva, ne-au convins ce pot de prea multe ori generatiile de politicieni indiferent de culoarea politica. Poate raspunsul este la noi, in ce putem face si ce putem schimba noi pentru tara asta.

Pentru cele dintre dvs, doamnelor, care inca sunteti nehotarate daca sa mergeti si sa faceti sau nu o intrerupere de sarcina, va spun doar atat, un copil nascut, si dat spre a adoptie are o sansa, una foarte mica, e drept pentru ca sistemul nostru e asa cum e... Dar daca ii refuzati dreptul la viata nu mai are nicio sansa! Si ca sa fiu sincer, habar n-am care sunt sansele Romaniei vorbind pe termen lung. Nu doar femeile sunt responsabile pentru intreruperile de sarcina, si partenerii, tatii poarta aceeasi vina cu atat mai mult cu cat noi nu trecem prin problemele de sorginte psihologica specifice sarcinii. Si va mai lansez o data rugamintea de a viziona filmuletul din subsolul articolului.

Pe aceasta tema, atat de importanta am sa mai revin cu un articol viitor, in care am sa fac o trecere in revista a ONG urilor care lupta impotriva avorturilor, daca stiti sau ati auzit de asemenea grupuri am sa va rog sa mi le indicati si mie, sa avem o lista completa. E bine sa stim  cati „luptatori pentru viata” avem… 

Insa va intreb pe dvs, care e solutia pentru acest dezastru? Ce variante credeti s-ar preta in 2014 societatii romanesti asa cum este ea pentru a diminua macar cu 15-20% numarul avorturilor in urmatorii ani? 

Va multumesc si ma inclin in fata dvs!

Vizionare placuta





The remarks of President Obama, as released by The White House and prepared for delivery: 
Vice President Biden, Mr. Chief Justice, Members of the United States Congress, distinguished guests, and fellow citizens: 
Each time we gather to inaugurate a president, we bear witness to the enduring strength of our Constitution. We affirm the promise of our democracy. We recall that what binds this nation together is not the colors of our skin or the tenets of our faith or the origins of our names. What makes us exceptional — what makes us American — is our allegiance to an idea, articulated in a declaration made more than two centuries ago: 
"We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable rights, that among these are Life, Liberty, and the pursuit of Happiness." 
Today we continue a never-ending journey, to bridge the meaning of those words with the realities of our time. For history tells us that while these truths may be self-evident, they have never been self-executing; that while freedom is a gift from God, it must be secured by His people here on Earth. The patriots of 1776 did not fight to replace the tyranny of a king with the privileges of a few or the rule of a mob. They gave to us a Republic, a government of, and by, and for the people, entrusting each generation to keep safe our founding creed. 
For more than two hundred years, we have. 
Through blood drawn by lash and blood drawn by sword, we learned that no union founded on the principles of liberty and equality could survive half-slave and half-free. We made ourselves anew, and vowed to move forward together. 
Together, we determined that a modern economy requires railroads and highways to speed travel and commerce; schools and colleges to train our workers. 
Together, we discovered that a free market only thrives when there are rules to ensure competition and fair play. 
Together, we resolved that a great nation must care for the vulnerable, and protect its people from life's worst hazards and misfortune. 
Through it all, we have never relinquished our skepticism of central authority, nor have we succumbed to the fiction that all society's ills can be cured through government alone. Our celebration of initiative and enterprise; our insistence on hard work and personal responsibility, are constants in our character. 
But we have always understood that when times change, so must we; that fidelity to our founding principles requires new responses to new challenges; that preserving our individual freedoms ultimately requires collective action. For the American people can no more meet the demands of today's world by acting alone than American soldiers could have met the forces of fascism or communism with muskets and militias. No single person can train all the math and science teachers we'll need to equip our children for the future, or build the roads and networks and research labs that will bring new jobs and businesses to our shores. Now, more than ever, we must do these things together, as one nation, and one people. 
This generation of Americans has been tested by crises that steeled our resolve and proved our resilience. A decade of war is now ending. An economic recovery has begun. America's possibilities are limitless, for we possess all the qualities that this world without boundaries demands: youth and drive; diversity and openness; an endless capacity for risk and a gift for reinvention. My fellow Americans, we are made for this moment, and we will seize it — so long as we seize it together. 
For we, the people, understand that our country cannot succeed when a shrinking few do very well and a growing many barely make it. We believe that America's prosperity must rest upon the broad shoulders of a rising middle class. We know that America thrives when every person can find independence and pride in their work; when the wages of honest labor liberate families from the brink of hardship. We are true to our creed when a little girl born into the bleakest poverty knows that she has the same chance to succeed as anybody else, because she is an American, she is free, and she is equal, not just in the eyes of God but also in our own. 
We understand that outworn programs are inadequate to the needs of our time. We must harness new ideas and technology to remake our government, revamp our tax code, reform our schools, and empower our citizens with the skills they need to work harder, learn more, and reach higher. But while the means will change, our purpose endures: a nation that rewards the effort and determination of every single American. That is what this moment requires. That is what will give real meaning to our creed. 
We, the people, still believe that every citizen deserves a basic measure of security and dignity. We must make the hard choices to reduce the cost of health care and the size of our deficit. But we reject the belief that America must choose between caring for the generation that built this country and investing in the generation that will build its future. For we remember the lessons of our past, when twilight years were spent in poverty, and parents of a child with a disability had nowhere to turn. We do not believe that in this country, freedom is reserved for the lucky, or happiness for the few. We recognize that no matter how responsibly we live our lives, any one of us, at any time, may face a job loss, or a sudden illness, or a home swept away in a terrible storm. The commitments we make to each other — through Medicare, and Medicaid, and Social Security — these things do not sap our initiative; they strengthen us. They do not make us a nation of takers; they free us to take the risks that make this country great.
We, the people, still believe that our obligations as Americans are not just to ourselves, but to all posterity. We will respond to the threat of climate change, knowing that the failure to do so would betray our children and future generations. Some may still deny the overwhelming judgment of science, but none can avoid the devastating impact of raging fires, and crippling drought, and more powerful storms. The path towards sustainable energy sources will be long and sometimes difficult. But America cannot resist this transition; we must lead it. We cannot cede to other nations the technology that will power new jobs and new industries — we must claim its promise. That is how we will maintain our economic vitality and our national treasure — our forests and waterways; our croplands and snowcapped peaks. That is how we will preserve our planet, commanded to our care by God. That's what will lend meaning to the creed our fathers once declared. 
We, the people, still believe that enduring security and lasting peace do not require perpetual war. Our brave men and women in uniform, tempered by the flames of battle, are unmatched in skill and courage. Our citizens, seared by the memory of those we have lost, know too well the price that is paid for liberty. The knowledge of their sacrifice will keep us forever vigilant against those who would do us harm. But we are also heirs to those who won the peace and not just the war, who turned sworn enemies into the surest of friends, and we must carry those lessons into this time as well. 
We will defend our people and uphold our values through strength of arms and rule of law. We will show the courage to try and resolve our differences with other nations peacefully — not because we are naïve about the dangers we face, but because engagement can more durably lift suspicion and fear. America will remain the anchor of strong alliances in every corner of the globe; and we will renew those institutions that extend our capacity to manage crisis abroad, for no one has a greater stake in a peaceful world than its most powerful nation. We will support democracy from Asia to Africa; from the Americas to the Middle East, because our interests and our conscience compel us to act on behalf of those who long for freedom. And we must be a source of hope to the poor, the sick, the marginalized, the victims of prejudice — not out of mere charity, but because peace in our time requires the constant advance of those principles that our common creed describes: tolerance and opportunity; human dignity and justice. 
We, the people, declare today that the most evident of truths — that all of us are created equal — is the star that guides us still; just as it guided our forebears through Seneca Falls, and Selma, and Stonewall; just as it guided all those men and women, sung and unsung, who left footprints along this great Mall, to hear a preacher say that we cannot walk alone; to hear a King proclaim that our individual freedom is inextricably bound to the freedom of every soul on Earth. 
It is now our generation's task to carry on what those pioneers began. For our journey is not complete until our wives, our mothers, and daughters can earn a living equal to their efforts. Our journey is not complete until our gay brothers and sisters are treated like anyone else under the law — for if we are truly created equal, then surely the love we commit to one another must be equal as well. Our journey is not complete until no citizen is forced to wait for hours to exercise the right to vote. Our journey is not complete until we find a better way to welcome the striving, hopeful immigrants who still see America as a land of opportunity; until bright young students and engineers are enlisted in our workforce rather than expelled from our country. Our journey is not complete until all our children, from the streets of Detroit to the hills of Appalachia to the quiet lanes of Newtown, know that they are cared for, and cherished, and always safe from harm. 
That is our generation's task — to make these words, these rights, these values — of Life, and Liberty, and the Pursuit of Happiness — real for every American. Being true to our founding documents does not require us to agree on every contour of life; it does not mean we will all define liberty in exactly the same way, or follow the same precise path to happiness. Progress does not compel us to settle centuries-long debates about the role of government for all time — but it does require us to act in our time. 
For now decisions are upon us, and we cannot afford delay. We cannot mistake absolutism for principle, or substitute spectacle for politics, or treat name-calling as reasoned debate. We must act, knowing that our work will be imperfect. We must act, knowing that today's victories will be only partial, and that it will be up to those who stand here in four years, and forty years, and four hundred years hence to advance the timeless spirit once conferred to us in a spare Philadelphia hall. 
My fellow Americans, the oath I have sworn before you today, like the one recited by others who serve in this Capitol, was an oath to God and country, not party or faction — and we must faithfully execute that pledge during the duration of our service. But the words I spoke today are not so different from the oath that is taken each time a soldier signs up for duty, or an immigrant realizes her dream. My oath is not so different from the pledge we all make to the flag that waves above and that fills our hearts with pride. 
They are the words of citizens, and they represent our greatest hope. 
You and I, as citizens, have the power to set this country's course. 
You and I, as citizens, have the obligation to shape the debates of our time — not only with the votes we cast, but with the voices we lift in defense of our most ancient values and enduring ideals. 
Let each of us now embrace, with solemn duty and awesome joy, what is our lasting birthright. With common effort and common purpose, with passion and dedication, let us answer the call of history, and carry into an uncertain future that precious light of freedom. 
Thank you, God Bless you, and may He forever bless these United States of America.




Enhanced by Zemanta

          Watching Your Spiritual Diet        

Most of us have known people whose bodies have not grown or matured properly. It’s sad to encounter people with cognitive handicaps, brain damage, or other developmental obstacles that have hindered their growth. Many of them remain locked in a child-like state—others tragically don’t progress even that far.

In a similar way, some Christians remain locked in a perpetual state of spiritual infancy. However, unlike those suffering with mental handicaps, Christians struggling with arrested spiritual development have no one to blame but themselves.

All Christians are supposed to be growing in Christlikeness: “For those whom He foreknew, He also predestined to become conformed to the image of His Son” (Romans 8:29). But there is often a disconnect between Romans 8:29 and what we see happening in the church. Some Christians simply don’t grow. Spiritually they remain stunted, never becoming what God has called them to be.

Worse still, if you challenge these believers, they may deny culpability for their stunted growth and indignantly argue that they are growing—albeit at their own pace! Everybody wants to grow; it’s just that some people want to grow with no effort, and that’s where the problem lies.

While I was in college, I wasted my time and experienced little, if any, growth as a Christian. But when I began seminary I tasted God’s Word in a life-transforming way. During those seminary days I learned to study the Bible systematically, and that’s when I began to grow. Ever since that time I have found that my spiritual growth is directly proportionate to the amount of time and effort I put into the study of Scripture. And all of my experiences ministering to other Christians have only reinforced that conviction.

When believers aren’t growing, it’s almost always symptomatic of a failure to be in God’s Word. They may attend church regularly, but what they learn dissipates rapidly once they exit the building. They often complain that they’re not getting much out of church or the Christian life. They are weak and rundown when it comes to facing temptations, trials, problems, and challenges. They lack the vigor to do much of anything for the Lord.

The root cause of their arrested development is spiritual malnourishment—their souls are starved for wholesome spiritual food. The Bible refers to itself as milk, bread, and meat, but spiritually a lot of Christians are trying to survive and thrive on candy, Cokes, and fries. They aren’t growing because their diet is tragically deficient. Ironically, the solution to their problems is in the very thing they refuse to feed upon—God’s Word.

How to Eat Right and Grow Spiritually

There are several excellent biblical passages that talk about spiritual growth. One of the best, and certainly the most basic, is in Peter’s first epistle. Both of his New Testament letters were written to Christians under intense persecution. They had become the scapegoats of a vulnerable Roman empire, and the target of national angst and rage. On virtually every front—theologically, socially, politically—they were under attack. But the thrust of Peter’s message to them is clear: Don’t worry. Put your hope in Christ and learn to live in the light of His kingdom, not your present circumstances.

The Christian believers who read Peter’s letters probably weren’t too concerned about their spiritual growth. They were merely trying to survive. Yet, early in his first letter, Peter tells them that part of the reason they can have hope is because of the living Word of Christ:

For you have been born again not of seed which is perishable but imperishable, that is, through the living and enduring word of God. For, “all flesh is like grass, and all its glory like the flower of grass. The grass withers, and the flower falls off, but the word of the Lord endures forever.” And this is the word which was preached to you. Therefore, putting aside all malice and all deceit and hypocrisy and envy and all slander, like newborn babies, long for the pure milk of the word, so that by it you may grow in respect to salvation, if you have tasted the kindness of the Lord. (1 Peter 1:23–2:3)

Whether believers are recent converts or more mature in the faith, craving the Word of God is always essential to spiritual nourishment and growth (Job 23:12). Jesus affirmed this when He told Satan in the wilderness, “It is written, ‘Man shall not live on bread alone, but on every word that proceeds out of the mouth of God’” (Matthew 4:4).

Postmodern culture churns out an endless supply of distractions from God’s Word. Radio, television, films, the Internet, computer games, books, and magazines—all of which dull our appetites for genuine spiritual food. Christians must not allow themselves to be distracted from the nourishment that only God’s Word can provide.

Likewise, they must not be satisfied with the spiritual status quo. Peter’s exhortation strongly implies the necessity of discontentment with the present condition of spiritual development—that anyone who is growing spiritually must yearn to keep growing. Motivation for genuine spiritual growth flows out of a righteous discontentment, coupled with a sincere desire to be satisfied with nothing but the Word of God.

We’ll talk more about spiritual malnourishment and the dangers of spiritual junk food later in this series. For now, we want to focus on the character and nature of God’s Word as our only life-giving source of spiritual sustenance.

One of the many statements that the Bible makes concerning itself is that it is a “living Word.” In Philippians 2:16, Paul calls it the “word of life.” Hebrews 4:12 says, “The word of God is living and active.” Here in 1 Peter 1:23, it is “the living and enduring word of God.” There are no more significant or more important statements that refer to the Bible than these. It is through this living Word that we are born again and made alive spiritually. And it is through the living Word that we grow up into Christ.

In the days ahead, we’ll take a closer look at the vitality of God’s Word and what it means to feed on its life-giving power.

(Adapted from Why Believe the Bible.)

       

          Friday’s Featured Sermon: “Creation: Believe It or Not, Part 1”        

Have you ever believed in evolution? Maybe you still do. It’s almost impossible to avoid indoctrination by this pseudo-scientific religion. Its tentacles have reached into every realm of education and the media.

Today, evolutionary theory is taught as historical fact. Most children are unlikely to be exposed to any alternative view of our origins in school or secular media. And in western countries outside the United States, skepticism regarding Darwin’s theory is almost non-existent. In fact, the expulsion of academics who deny, or even question, evolution is commonplace in colleges and universities.  

Christians are likewise vulnerable to the dominant and intimidating sway evolution holds over our culture. Many scholars and preachers choose appeasement and compromise over biblical fidelity—trying to accommodate modern theory and ancient truth.

But John MacArthur argues that there is no way to insert billions of years and natural selection into the Bible’s opening chapter. You either believe Genesis 1, or you don’t. In his sermon, “Creation: Believe It or Not, Part 1,” John compares the biblical account of creation with the evolutionary worldview and finds zero compatibility between the two. Whether you’re a theistic evolutionist, progressive creationist, or hold to any other middle position, you are denying the straightforward biblical narrative found in Genesis 1.

While a literal understanding of Genesis is not essential for salvation, John points out that our view of the creation account has massive ramifications for fundamental Christian truths.

It is also important to all of us because understanding origins in the book of Genesis is foundational to the rest of the Bible. If Genesis, chapter 1 and chapter 2 don’t tell us the truth, then why should we believe anything else in the Bible? If it says in the New Testament that the Creator is our Redeemer, but God is not the Creator, then maybe He’s not the Redeemer either. If it tells us in 2 Peter that God Himself will bring about an instantaneous dissolution of the entire universe as we know it, that God in a moment will uncreate everything, then that has tremendous bearing upon His power to create. The same One who with a word can uncreate the universe is capable of creating it as quickly as He desires.

So what we believe about creation, what we believe about Genesis has implications all the way to the end of Scripture, implications with regard to the veracity and truthfulness of Scripture, implications as to the gospel, and implications as to the end of human history, all wrapped up in how we understand origins in the book of Genesis. The matter of origins then is absolutely critical to all human thinking. It becomes critical to how we conduct our lives as human beings.  Without an understanding of origins, without a right understanding of origins, there is no way to comprehend ourselves. There is no way to understand humanity, as to the purpose of our existence, and as to our destiny.  If we cannot believe what Genesis says about origins, we are lost as to our purpose and our destiny. Whether this world and its life as we know it evolved by chance, without a cause, or was created by God, has immense comprehensive implications for all of human life.

We don’t need to be intimidated by the aura of evolutionary theory. It’s just a false religion masquerading as scientific truth. In “Creation: Believe It or Not, Part 1,” John MacArthur shows us that God can be taken at His Word from the very first chapter.

Click here to listen to “Creation: Believe It or Not, Part 1.” 

       

          Whack-a-Hacker        

JUN15154_Security_infographic_062615.jpg.jpegBeing a security professional these days may seem to some like a never ending game of Whack-a-Mole. Once one problem, vulnerability or intrusion is taken care of, it seems inevitable that another problem pops up that needs whacking into submission. 


          What I Told HHS Secretary Tom Price About the 340B Drug Pricing Program (rerun)        
This week, I’m rerunning some popular posts while I'm on vacation. Click here to see the original post and comments from May 2017.

This post is especially timely given President Trump’s draft Executive Order. In Section 4, the Order directs Secretary Price to ensure that the program benefits "the lower income or otherwise vulnerable Americans for which the program was intended." Shortly after the article below was published, I discovered that the 340B program has been growing by more than 30% annually. (See The 340B Program Hits $16.2 Billion in 2016; Now 5% of U.S. Drug Market.) It's time to moderninze the 340B Drug Pricing Program.




Last Friday, I had the privilege of meeting with Secretary of Health and Human Services (HHS) Tom Price. I was invited to meet with Secretary Price for one of his listening sessions with industry experts and stakeholders. I appreciated the opportunity to share my perspectives.

In our meeting, I highlighted four ways that the 340B Drug Pricing Program is raising drug costs. I then offered eight specific recommendations for improving the program by addressing the widespread channel distortions the program has caused.

Read on for the recommendations and a summary of my comments to Dr. Price.

I have no idea if my suggestions will have any impact. Regardless, your friendly neighborhood blogger enjoyed spending time among some Washington insiders.
Read more »
        

          The Impact of the Proposed Republican Reforms to the Affordable Care Act        

The Impact of the Proposed Republican Reforms to the Affordable Care Act Americans have gotten their first glimpse of proposed Republican reforms to the Affordable Care Act (ACA) and the news is not good for those who suffer from addiction and other vulnerable populations. The changes could make it impossible for many who currently have […]

The post The Impact of the Proposed Republican Reforms to the Affordable Care Act appeared first on Cliffside Malibu.


          AAIFF ’17: Absurd Accident        
It’s a distinctly Chinese variant on film noir—the noodle shop noir. This snappy debut, following in the loose tradition of Zhang Yimou’s A Woman, a Gun, and a Noodle Shop and Yong Qing’s Chongqing Hot Pot has all the elements. There is a flirtatious wife, a jealous husband, a jewel heist, and a remote noodle shop inn.  Li Yuhe also pretty much throws in the kitchen sink for his first feature, Absurd Accident (trailer here), which screens during the 2017 Asian American International Film Festival.

Everyone is conning someone in this provincial town. Yang Baiwan thinks his wife Ma Lilian is unfaithful, but he is really getting played by bogus doctor of Chinese medicine, who represents himself as the front man for a Triad assassin named “Mr. Marcus.” After Yang slips her a mickey and leaves to establish his alibi, the doctor arrives instead of Mr. Marcus, to start plundering the joint rather than bumping her off. However, when Ma prematurely comes to, she apparently kills her not-so would-be attacker in the ensuing struggle. Now she and the remorseful Yang have a body to dispose of.

Of course, it gets far more complicated. Two armed robbers, a country copper one night away from retirement, a gold-digger, and a clueless gamer she has mistaken for big game all lurch into the picture. The doctor’s body also keeps popping up where it is least expected and sometimes it is not entirely dead. All in all, it turns into an eight-car pile-up where noir intersects with farce.

Li is a little slow out of the blocks setting-up his characters and circumstances, but when Absurd gets going, it takes us off to the races with a high-performance sports car. One-darned-thing-after-another does not adequately describe the film’s gleeful sense of mischief. It is more like half-a-dozen-things-after-the previous-half-dozen-things.

Ye Gao is amazing covering the waterfront as Ma, ranging from shrewishness to vulnerability and finally resting at utter bewilderment. Yet, somehow Suxi Ren manages to go to further extremes as the man-hunting Miss Gu—she is some serious trouble. There is something about Xixu’s performance that counteracts any empathy we might feel for the sad sack Yang, as all the troubles in the world rain down on his stooped shoulders. That’s a good thing, because it lets us enjoy the show without guilt.

Absurd is wonderfully sly and inventive. Li directs the chaotic traffic like an old pro, while the ensemble keeps the dialogue zinging and all the balls in the air, like veterans of vintage Howard Hawks comedies. Very highly recommended, Absurd Accident will be a heck of a good time for all present when it screens tomorrow (8/3) at the New York Asia Society as part of this year’s AAIFF and it opens theatrically next Friday (8/11) in San Francisco, at the 4-Star Lee Neighborhood Theatre.
          UNICEF: El Poder de invertir en los niños y niñas más pobres        
Un estudio realizado por UNICEF en 51 países, incluidos 5 de América Latina y el Caribe (ALC), reveló que invertir en la salud de los niños más pobres y las comunidades más necesitadas es costo efectivo, genera un mayor impacto y reduce las desigualdades. “La evidencia demuestra que invertir en los niños más vulnerables no […]
           Population connectivity and the effectiveness of marine protected areas to protect vulnerable, exploited and endemic coral reef fishes at an endemic hotspot         
van der Meer, M.H., Berumen, M.L., Hobbs, J.-P.A., and van Herwerden, L. (2015) Population connectivity and the effectiveness of marine protected areas to protect vulnerable, exploited and endemic coral reef fishes at an endemic hotspot. Coral Reefs, 34 (2). pp. 393-402.
           Low genetic diversity and recovery implications of the vulnerable Bankouale´ Palm Livistona carinensis (Arecaceae), from North-eastern Africa and the Southern Arabian Peninsula         
Shapcott, A., Dowe, J.L., and Ford, H. (2009) Low genetic diversity and recovery implications of the vulnerable Bankouale´ Palm Livistona carinensis (Arecaceae), from North-eastern Africa and the Southern Arabian Peninsula. Conservation Genetics, 10 (2). pp. 317-327.
          Liberalism, secular religion, vulnerability        
There is a terrific review of a new book on liberalism over at First Things. The book is by a Polish philosopher named Ryszard Legutko, who was a dissident under the communist government and who believes that communism and liberalism share a similar secular religious framework.

The review, by Adrian Vermeule, is difficult to improve on, so I will limit myself to some commentary on one of the key points raised and then encourage you to go and read the whole thing yourselves.

What I found most interesting was the discussion of some contradictions within liberalism. For instance, liberalism emphasises both a materialist determinism (i.e. everything we do is predetermined by forces of history, genetics etc.) and a belief in the radically autonomous individual, including the idea that individuals, absent certain social conditions, will use this autonomous freedom to choose the good. How can you have a radically self-determining individual if you believe that everything is materially predetermined? One part of liberal philosophy insists that the individual is radically predetermined, the other that he only has dignity if he is radically self-determined.

The most interesting contradiction discussed, and one that is complained about all the time in alt-right discussions on social media, is why liberals seem uninterested in seriously illiberal policies in places like Saudi Arabia but come down heavily on mildly illiberal policies in places like Hungary. I think the answer given by Legutko, as summarised by Vermeule, is very interesting:
Why do Western liberal academics and EU technocrats object so stridently to the mild illiberalism of the Fidesz parliamentary party in Hungary, while saying little or nothing about Saudi Arabia and other monarchical or authoritarian nations, nominal allies of the West, who routinely control, punish, and dominate women, gays, and religious dissenters? Why are the EU technocrats, whose forte is supposed to be competence, so very bumbling, making policy mistake after policy mistake? How is it possible that while the sitting president of the United States squarely opposed same-sex marriage just a few years ago, the liberal intellectuals who supported him passionately also condemn any opposition to same-sex marriage as bigotry, rooted in cultural backwardness? Why was the triumph of same-sex marriage followed so rapidly by the opening of a new regulatory and juridical frontier, the recognition of transgender identity?

Legutko helps us understand these oddities. We have to start by understanding that liberalism has a sacramental character. “The liberal-democratic mind, just as the mind of any true communist, feels an inner compulsion to manifest its pious loyalty to the doctrine. Public life is full of mandatory rituals in which every politician, artist, writer, celebrity, teacher or any public figure is willing to participate, all to prove that their liberal-democratic creed springs spontaneously from the depths of their hearts.” The basic liturgy of liberalism is the Festival of Reason, which in 1793 placed a Goddess of Reason (who may or may not have been a prostitute conscripted for the occasion, in one of the mocking double entendres of Providence) on the holy altar in the Church of Our Lady in Paris. The more the Enlightenment rejects the sacramental, the more compulsively it re-enacts its founding Festival, the dawning of rationality.

Light is defined by contrast, however, so the Festival requires that the children of light spy out and crush the forces of darkness, who appear in ever-changing guises, before the celebration can be renewed. The essential components of the Festival are twofold: the irreversibility of Progress and the victory over the Enemy, the forces of reaction. Taken in combination, these commitments give liberalism its restless and aggressive dynamism, and help to make sense of the anomalies. Fidesz in Hungary is more threatening than the Saudi monarchy, even though the latter is far less liberal, because Fidesz represents a retrogression—a deliberate rejection of liberalism by a nation that was previously a member in good standing of the liberal order. The Hungarians, and for that matter the Poles, are apostates, unlike the benighted Saudis, who are simple heretics. What is absolutely essential is that the clock of Progress should never be turned back. The problem is not just that it might become a precedent and encourage reactionaries on other fronts. The deeper issue is that it would deny the fundamental eschatology of liberalism, in which the movement of History may only go in one direction. It follows that Brexit must be delayed or defeated at all costs, through litigation or the action of an unelected House of Lords if necessary, and that the Trump administration must be cast as a temporary anomaly, brought to power by voters whose minds were clouded by racism and economic pain. (It is therefore impossible to acknowledge that such voters might have legitimate cultural grievances or even philosophical objections to liberalism.)

The puzzle of the EU technocrats, on this account, is no puzzle at all. They are so error-prone, even from a technocratic point of view, at least in part because they are actually engaged in a non-technocratic enterprise that is pervasively ideological, in the same way that Soviet science was ideological. Their prime directive is to protect and expand the domain of liberalism, whether or not that makes for technical efficiency.

Liberalism needs an enemy to maintain its sacramental dynamism. It can never rest in calm waters, basking in the day of victory; it is essential that at any given moment there should be a new battle to be fought. The good liberal should always be able to say, “We have made progress, but there is still much to do.” This is why the triumph of same-sex marriage actually happened too suddenly and too completely. Something else was needed to animate liberalism, and transgenderism has quickly filled the gap, defining new forces of reaction and thus enabling new iterations and celebrations of the Festival. And if endorsement and approval of self-described “gender identity” becomes a widely shared legal and social norm, a new frontier will be opened, and some new issue will move to the top of the public agenda, something that now seems utterly outlandish and is guaranteed to provoke fresh opposition from the cruel forces of reaction—polygamy, perhaps, or mandatory vegetarianism.

If this is true, then it gives liberalism both a strength and a weakness. The strength is that people hold to liberal beliefs like a religion, and therefore as a source of meaning that is difficult to step away from. The weakness is that the force of the religious belief depends on an "eschatology" in which there is always a progress toward an ever more radical application of liberalism in society. Therefore, once liberalism is forced back it is vulnerable to collapse. In other words, if liberalism is seen to be obviously stopped, and some aspect of traditionalism restored, it is likely to trigger a psychological demoralisation amongst liberalism's adherents.

Liberalism needs opposition, it needs a force of reaction to battle against, but it needs to always win.

So we must not be content with being "house traditionalists" who exist merely to play a role within "the liturgy of liberalism." We need to be serious about building to the point that we are obviously regaining ground. At that point, liberals become vulnerable to psychological confusion and demoralisation. There may not be great depths of resistance once they lose a sense of inevitable progress.
          A Origem        

Lançamento: 2010
Sinopse: Dom Cobb (DiCaprio) é um ladrão habilidoso, o melhor de sua geração, que extrai segredos valiosos das profundezas do inconsciente durante o sono com sonhos, quando a mente está mais vulnerável. Sua rara habilidade o tornou peça fundamental no traiçoeiro mundo da espionagem industrial, mas também o tornou um fugitivo internacional e o fez perder tudo o que mais amava.
          Lionhead steps up for Fable III        

I'd just like to say that in my opinion, Fable III is by far the best of the Fable series in terms of storyline and overall combat. However, there were plenty of flaws as well.

First off, not having a start menu sucks, I mean really sucks. Its so counterintuative to video games that it gets me confused everytime I press the start button and I hear John Cleese's voice. This includes going to stores to try and sell your items or buy items, its very frustrating.

Second, the level system could've been done better. I think the concept of the Road to Rule has potential, but having to unlock the ability to use facial expressions, do jobs, and buy and sell property is a bit extreme.

Third, on the concept of facial expressions, what happened to the expression wheel where you could choose what action you wanted to perform. Ive never played patty-cake so much in my life to get people to like me!

Fourth, the combat got way too easy once you used the right combination from spell weaving. All you have to do is use shock and vortex and very very few enemies can even touch you while they are being shocked to death. The only enemies that actualy gave me trouble by the end of the game were the big mercanaries who threw dynamite and fireballs. Even the final battle wasn't difficult with a good ranged weapon.

I think melee was obsolete in this version of the game. Granted this is revolutionary times and in real life people were moving away from melee and towards guns. But melee fighting has been a cornerstone of Fable since the beginning. Making melee the most vulnerable and least effective attack was disheartening.

I've played through Fable III three times now, and no two times have been exactly alike and I absolutely LOVE that. From the development and look of my weapons to the amount of citizens I saved, so many things changed and it was great.

I love the humor tied into the storyline of Fable III, whether it was the cardboard quest, hobbe having a heartattack, or making the final judgement on my brother dressed as a chicken, there were many many times where I laughed out loud at this game. If you need more evidence just think about everything you did for "The Ham Sandwich."

I also liked how they developed your relationship with other people much more than previous Fable games. Especially Elise. However I really wish you could have a romantic tryst with Page.

Overall this game was extremely enjoyable and I am looking to any DLC they send out for it.

I give it a 9.25 / 10 on the game informer scale.


          How Vulnerable Are Your Online Activities?        

Learn simple steps to increase your online security Are you an easy target for online hackers or scammers? By learning some simple steps to secure your phone, increase your online safety and recognize scams, you reduce your risk of becoming the next victim. That’s why it’s a smart move to attend AARP’s Online Safety Workshop. In this live, one-hour online event, you’ll be guided by your workshop host as you learn the latest in online safety. You’ll also learn about …

The post How Vulnerable Are Your Online Activities? appeared first on AARP States.


          CARF Connection - Report suspicions of abuse: Protect young people and the organizations serving them - 2015        
Although this article focuses on sexual abuse of minors, vulnerable populations are not only children and youths. Adults with disabilities and elderly persons can be at high risk for abuse, neglect, or exploitation. Protecting the rights of persons of any age or ability served by CARF-accredited programs is at the heart of the CARF accreditation process.
          Apple iOS 7        

When earlier in September when Apple launched its biggest update to its mobile operating system iOS, there has been mixed reaction initially. But lately it seems like Apple will be having hard time receiving the bug and fixing it, because there are just a lot of them. From small good features to pretty big frustrating problems, the iOS 7 has it all. Well, we'll be looking into deep in iOS 7 - the good and the bad.


Starting from the good features ->

1. Clock icon

Yes, you heard that. A clock working at the top of the scree. Take a look.

2. Text Time-stamps

Also new, if you'll slide texts you can see time-stamps for all of them.

3. The Level

Just open up your compass app and slide your fingers across it, and congratulations because you just unraveled a new feature. So now, say goodbye to those tilted paintings.

4.Night mode for maps

When you are driving late, your bright apple screen can very blinding and cause you many problems. In this, the screen appears dark at certain times to prevent that problem.This is less distracting and easier on the eyes when navigating at night.

5. Closing multiple apps at once.

Yes, you can close multiple apps at once.Here's how: double click the home button to reveal open webpages and platforms.You can then swipe up to three apps at once by using three fingers and dragging them upwards.

6. Block calls

Well, if you are getting annoying calls you have now the liberty to just block them. Visit Settings > Phone > Blocked to add numbers you want to restrict.

7. Apps near me

Now this is an interesting feature. When you visit the Apple app store, you'll se something like "near me" at the bottom. This is region specific apps. It means if you are, suppose, in Manhattan then it will show you those apps which are downloaded most on that region.

OK, now coming to the bad features ->

Well it certainly looks like they'll never ending reporting. But getting familiar with very common drawbacks in iOS 7.

1. Security Glitches

It was the problem at the starting, but now fixed by Apple. iOS 7 security flaw allowed for the circumvention of a device's lockscreen,as reported CNET . From a locked phone or iPad, swiping up to access the alarm clock app and following a couple extra steps brought up the iOS 7 multitasking screen where you could access the camera app or photo gallery. This opened a clear path to Twitter, email and other accounts. Apple replied quickly to this vulnerability by releasing an iOS 7.0.2 update late last week, fixing the bug.

2. Unwanted Logouts

One problem that’s vexed iOS 7 users and developers alike is a glitch that logs users out of some apps, according to The Verge , prompting a sign-in screen each time an app with a unique account is accessed. Popular iOS email app Mailbox was “in crisis mode” shortly after the release of iOS 7, attempting to fix the software conflict as users grew agitated. According to Mailbox, the only solution, though a temporary one, is to disable iOS 7’s new background refresh feature, though this removes the app’s ability to receive updated information while in the background. This issue remains unaddressed.

3. Battery life

It has been reported highly by many users that this update just drains out the juice of your device very quickly. iOS 7 is more like iOS 7% left of battery.As reported by PC Magazine , the difference in power consumption is often hard to quantify, seeing as each user uses his or her phone differently and with unique configurations, though it is worth mentioning that Apple did address a similar battery drain claim with a patch to its iOS 5 software. In the meantime, some sites have compiled best practices lists  to aid users in conserving battery life, suggesting things like turning off background app updates and disabling AirDrop (Apple’s new wireless file sharing service). For example, theHuffington Post's Alexis Kleinman put together this primer on how to save battery life with iOS 7 .

4. Motion Sickness

There is another weird claim that is getting high concern. It makes users sick. As a report from NBC News asserts , iOS 7’s new 3D desktop might be giving iPhoners vertigo-like symptoms.

5. iMESSAGE problems.

A lot of people switching to iOS 7 are reporting the malfunctioning of iMESSAGE, Apple's all-encompassing messaging platform for texting and desktop chatting. According to The Wall Street Journal , Apple has acknowledged the bug and is looking to the resolve the issue as soon as it can. Tech site BGR has reported  that we should expect this fix to come next week by way of Apple's second patch update to iOS 7.

6. Design Flaws

Then there are the visual imperfections. One place to get a glimpse of all the places where iOS 7 is a bit off in design and compatibility with third-party apps is sloppyui.tumblr.com . Though this user-submitted Tumblr is described as being “all about intellectual honesty, not trolling,” it’s full of, well, sloppy design inconsistencies and errors, and seems a little troll-y.

Now, looking at these bugs or say flaws one might say that they are so picky and almost every OS have them in one way or another. But guys, the thing is that its not what you think. These small things make up your best user experience. Apple didn't get the launch it needed with iOS 7 as it was the Apple's largest update to its mobile operating system since iOS was introduced in 2007. Though there are a lot of other changes which took a big leap from iOS 6 to iOS 7. But this time it will take a little more time to adopt those changes.

          The Art of the Ethical Hack: A Q&A with CyberArk’s Head of Red Team Services        

Today’s highly motivated cyber attackers continually hone their skills. After all, their job is to know your network better than you do, exploiting even the smallest vulnerability to carry out a mission. In order to stay a step ahead of advanced maneuvers, it’s critical to adopt an attacker’s mindset. For many organizations, a Red Team […]

The post The Art of the Ethical Hack: A Q&A with CyberArk’s Head of Red Team Services appeared first on CyberArk.


          Top 10 Free Hacking Tools.        
If you start working with computer, you soon develop a interest in 'hacking'. So, what is basically 'hacking'? It's not just entering into another system, its a chain of processes that ultimately results in unauthorized access into one's computer or network. Yeah, it is not true. And you need special set of skills to achieve that. And for that special set skills you need a special set of tools. So now, I'm going to tell u here top 10 soft wares that will definitely help you to achieve what you dream as hacker.

1.Nmap


Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.

2.Wireshark



Wireshark is a network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network.

3.Metasploit Community edition



Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. This helps prioritize remediation and eliminate false positives, providing true security risk intelligence.

4.Nikto2



Nikto is an Open Source (
GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.

5.John The ripper



John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows 
LM hashes, plus lots of other hashes and ciphers in the community-enhanced version.

6.ettercap



Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.

7.NexPose Community edition



The Nexpose Community Edition is a free, single-user vulnerability management solution. Nexpose Community Edition is powered by the same scan engine as Nexpose Enterprise and offers many of the same features.

8.Ncat



Ncat is a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project as a much-improved reimplementation of the venerable Netcat. It uses both TCP and UDP for communication and is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users. Ncat will not only work with IPv4 and IPv6 but provides the user with a virtually limitless number of potential uses.

9.Kismet



Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and (with appropriate hardware) can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet also supports plugins which allow sniffing other media such as DECT.

10.w3af



w3af is a Web Application Attack and Audit Framework. The project’s goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend.

          I am the director of the Bank        
Nobody can get into that bank unless I told so. That bank was invented for those who wanted to do the job to train people all around the world and they did not have money or they could not protect their money they gathered for training. Anybody who has the training money there knows that it is safe and realiable.
---
Alinda volt az a csaj aki a katapultos projektben a top job ot végezte a final report megírásával. Ő annak a dokinak a lánya aki a major crimes-ban és a blacklist azon részében megjelent amikor hagytam hogy megkínozzon a legbrutálisabb fájdalommal ami lézetik...
"You tortured and programmed your own daughter? You are more sicker than I thought."
"Peter I wanted her to survive and have a good life. You trained her! I did the base programming but I left her open for you so you could do the rest."
"But you shit you left her open to be manipulated by the very assholes on the top. You gave them the possibility to controll and use her for their shit. She became a tool in their hand in the process of the final distroyment of this planet."
Amikor megütöttem lerogyott a földre levegőért kapkodott, lebénult szinte teljesen. Kibontottam a kötést a kezemen és a lábamon, de ülve maradtam. A fájdalom a mozgástól még erősebbé vált. Haldokoltunk mind a ketten.
"Am I going to die now?"
"Yes. In about 5 minutes you'll be dead."
"I cannot die peter I have to live. I can give you the relese it is in the red tube."
"I don't beleive you an dI don't care. What you did ruins everything and you pushed this planet over the last point. That programming can fool anybody up to the best levels of understanding, ther will be very few to oversee that kind of programming you invented. And if you did that others will figure it out how is it done. And ther will be nobody to stop that. Therefore my job and my goal cannot be reached ever. This plant is done. I finished."
"No!" nagy nehezen odavonszolta magát az asztalához az iszonyatos fájdalom eltorzította az arcát, majd belém szúrta a tűt. A fájdalom egy pár pillanat múlva megszűnt. Lerogyott a földre és elterült.
"Please help me." hörögte "I can make this right I can help you."
"You say you can heel? Well let us see if you can. Put your hand in your heart and take a deep breath slowly and exhale." Megcsinálta.
"It doesn't work."
"You see you don't have the power to heal. All you know and do is torture and controll. That is what you are about. You cannot heal anything. Now I'll shoe you my real power." Lehajoltam hozzá és a szívére tettem a kezem. "Now you take a deep breath until the pain point and exhale lowly." A fájdalom megszűnt. "About in an hour the rest of the pain will be gone completely. Now you see? I do have the power to heal and I can heal the damege what I cause, also I can heal the demage what you did over decades but there is only one of me and you did more damege what I can heal alone. You fucked up everything and I am the only one who can make this right and the only one who is willing to do that and who does it - but even my efforts are not enough to make everything right and you shit all do even more damege and continue to do so. You see I am more than any of you."
...
Beprogramozta a saját lányát hogy jó fegyver legyen a kezükben, mert azt gondolta hogy úgy jó élete lesz. Idióta fasz. Ő se fogta fel hogy mit csinál és ez hova vezet. Alinda volt az az eset ami nagyon megijesztett. "They are not creative peter they are just highly advaned biocomputers with a very good programming and training." "You trained my daughter." Ezt csinálták. ilyen az andika és sok másik is. Highly advanced biocomputer." A gömzsik. Ezért nem gyakorolják az alapgyakorlatokat ezért módosította a gömzsik mindig az alap meditációt ezér bukott el az a srác is akivel a támadó technika méretét akartam megüzenni emlékeztetővel, és a johanni anyja és sokan mások is. kinyitották őket hogy kiképezhessem őket de az alap boot rendszert ők kontrollálták. Sokat sikerült még így is feltörni. És ezért nem engedték őket hozzám tréningre többé, mert a felépülési program és a teljes kontroll amit kértem tőlük és hogy ezáltal be tudtam juttatni a felépülési programot a fejükbe és a lelkükbe leért a legalsó rétegekig és feltörte az általuk oda beillesztett boot rendszert is. De a doki ki tudta kerülni ezt is. Kinyitotta, hogy ki tudjam képezni és egyben lezárta hogy a legalsó rétegekig le tudjon jutni a felépülés és a józan élet alapértéke és bölcsessége - mert abban nincs pénz és azt a circus tagjai üldözték és üldözik. hogy jó élete legyen... Hogy lehe jó élete ha elpusztítja közben az élőhelyét a földet? Idióta.
---
kb 3 milliméter hosszú 1,5 milliméter széles henger alakú kapszula. Egy fa rögyébe bele lehet tenni. Ekkora.
---
A doki nagyon bizonygatta hogy most megértette hogy az öreg miért adott ekkora hatalmat a kezembe. Leültünk és beszélgettünk egy pár nap múlva részletesen megint. Elmondtam neki ugyanazt amit már annyiszor. Hogy az öregéknek fel kellett jutniuk a legtetejére és ehhez minden eszközt fel kellett használniuk. És hogy az univerzum alkotó és romboló erői intelligens módon úgy rendezték az egészet hogy amikor odaértek a tetejére akkor születtem meg én és át tudtam venni az egészet, meg tudtam érteni az egészet és rájöttem hogy mi a megoldás. Hogy van megoldás, de ezt csak velük együtt tudom megvalósítani egyedül nem. Ezért kaptam meg az összes tudást ami létezik és amit az Öreg elért minden fejlesztéssel és minden titokkal együtt és ezért kellett a végleges és halálos biztosíték egyedül az én kezembe. Mert nélkülem semmi sem fog megvalósulni a megoldásból.
---
A bankból három fiók van egy new yourkban egy svájcban egy asszem indiában. Kis fiók. Azok akik a magánpénzüket tartják ott, mert valamit azért dolgoztak és segítettek nekünk is - azknak az ajtón kell bemenniük. Azután ugyanúgy mint a könyvtáram (bizonyíték tár) egy scenneren keresztül, maszk nélkül, és mindenféle elektronikus és egyéb eszköz nélkül mehetnek csak tovább. A belső szobában van egy számítógép terminál hasnoló a könyvtárihoz. A géphez semmilyen módon nem férhetnek hozzá és a biztonsági rendszer is gondolatolvasó. Van egy pár fotel is gyűléseket is tartanak ott a kiképzők. Csak olyanok mehetnek be a bankba a kiképzők közül is akikkel személyesen találkoztam és adtam nekik egy számlaszámot. Senki más. Ők a labirintuson keresztül mennek be. Jól szigetelt és védett szoba az. hogy egy kicsit lazíthassanak is. Sokszor van aki ott is alszik hogy tudja milyen az, emlékezzen arra hogy milyen amikor nem basztatják a testét és az elméjét a manipulátorok.
"Te Jani én már nem is emlékszem mikor aludtam utoljára ennyire jól és pihentetően. Talán még valamikor gyermekkoromban. Lehetséges az hogy már a késő 50-es években és a 60-as éveke lején is léteztek ezek a támadóeszközök?"
Apu kis gondolkodás után: "Lehetséges."
"De akkor mi is úgy éltük le az életünket hogy folyamatosan manipuláltak bennünket." "Igen ez biztosan így van." mondta apu.
A trénereknek is fontos hogy emlkezzenek és tudják hogy milyen az amikor nem basztatják őket.
...
"Te miért engedted be a bankba ezeket a szarháziat? Kockáztatod a kiképzésre szánt pénzeinket!"
"Nem tudnak semmit se tenni a biztonsági rendszer ellen. Azért engedtem be őket, mert egyrészt mindegyikük csinált ezt azt nekünk is - igaz hogy a másik oldalon háromszor annyi kárt okoznak, de azért fontos dolgokat megoldanak nekünk is. Másrészt minden pénzfelvétel után pénzt kapunk mi is, százalékot általában 20%-ot. Ami nem sok pénz de nekünk nagyon fontos. Ebből a pénzből dolgozik az a csapat amelyik az ott tartott pénz értékét igyekszik megőrizni. Ők a banktól függetlenül gazdasági tevékenységet végeznek egy általam nagyon részletesen és gondosan átgondolt és meghatározott módon és alapelvek mentén. Kockázatot vállalnak és veszélyeket hogy minden pénz megőrizze az értékét ami ott van, de közben nem kockéztatják senkinek a pénzét se amit tréningre szántatok. Erre azért van szükség mert ezek a szarházik képesek globálisan is összefogni hogy kicsinálják ezt az egy bankot. (voltak is kísérletek, egyik ilyen svájci frankos hitel, egy áttételes támadás volt). Msárészt hozzászoktatom ezeket a szarházikat is a biztonsághoz, mert arra a pénzre amit ott tartanak biztosan számíthatnak - hogy az ott lesz. Aki meg amikor elérjük a 2016-17-es határidőt nem tart velünk vagy nem vall színt nyíltan és tovább kétkapuzik, ki lesz baszva onnan. Mehet a circus-beli haverjaihoz, ha ők tudnak biztonságot adni nekik. Azért mert ezek kiemelkedően jók őket kiemelkedően támadják. És ők el fogják veszíteni a pénzeiket. Ezért aki bukik akkor az nagyot fog bukni. Dönteniük kell. Ha akarják azt a biztonságot amit mi tudunk biztosítani, akkor ki kell állniuk nyíltan mellettünk. Ha nem teszik meg akkor mehetnek a picsába."
A bank védelme nem csak passzív hanem aktív is. Bárki bárhol a planétán bármilyen támadást kezd szervezni (pszichológiai- beépülős felforgatós, elektronikai, fizikai- katonai, gazdasági, jogi, hivatali bármilyen) azt mérlegelés nélkül elpusztítjuk. Több millió ember figyel oda aktívan egymástól független csoportokban. Ha egyiket teljesen uralmuk alá tudják vonni, akkor sem férhetnek hozzá a többi pénzéhez és a bank működésmódját sem tudják befolyásolyni. Ráadásul a többi csoport egymást is figyeli és azonnal lépnek is brutálisan és kegyetlenül ha kell. Ez a bank nem azért jött létre hogy pénz harácsoljon és pénzmosó hely legyen. A külsősök és belősök akik a magábpénzeiket tartják ott, azért nem vehetnek fel több pénz háromhavonta mint 50ezer dollárnyi kézpénzt, hogy senki se használja pénzmosóhelyként. Csak személyesen maszk és egyéb alterációk nélkül lehet bejutni és átutalást kieszközölni vagy készpénzt felvenni. Van egy pár alkalmazott akiket szintén szigorúan ellenőriz több csapat és egy ballépésnél likvidál azonnali hatállyal. Az a pénz érinthetetlen a circus és katonái számára. Megyó is amikor először megkeresett, hogy tarthatja e ott a pénzét és elmondtam a feltételeimet elhúzta a száját... "péter én életemben nem húztam fel kétszer ugyanazt a zoknit, életvitelszerűen luxusszállodákban lakom, én nem tudok annyi pénzből megélni..." De ez a limit gyakorlatilag bárkinek elég bármelyik országban meg lehet belőle élni. A százalékokat én szabtam meg mindenkinek személyes megbeszélés alapján. Aki kevesebb pénzzel is beérte háromhavi felvéttel annak kisebb százalékokat szabtam. Van aki 7%-ot fizet minden pénzfelvétnél és a három havi limitje 30ezer dollár (vagy annak megfelelő más pénznem) három hónapra, van aki - mint pl a megyó amikor másodszor megkeresett már durvábban fogott a tollam és 50%-ot fizet minden kp felvétnél. Azért szabtam szigorúan neki, mert ő a világ legravaszabb tolvaja. Több kormányzat kasszáiból tud és képes nyomtalanul eltüntetni ezer meg ezer milliárdokat. persze ez a mtatvány nagyon sokba kerül neki, mert a pénzeltüntető hálózat is leszedi a maga sápját sokszor a pénz 80%-a elkopik mire a saját számláira érnek az összegek és egyre többször onnan is ellopták mások a pénzeit, mert a többi tolvas is egyre jobb.
Szóval azért keresett meg másodszorra. Neki 50%-ot kell fizetnie és 50ezret tud így felvenni. Tehát a limitje 100ezer. Feltöltötte 120 éves koráig és ez a pénz -amíg nem szegi meg a megállapodásunkat - a rendeklezésére áll - vagy amíg mindenki meg nem őrül és hagyják szétkúrni a bankot de akkor meg már mindegy nem lesz semmi szerepe.
Mindenkire vonatkozó feltétel az hogy ha engem megtámadnak személyesen bármiylen formában vagy a bankot akkor a pénzüket kénytelenek átutalni máshová és többé nem élvezhetik az általunk nyújtott biztonságot. Ha még hazudnak is - mint a gömzsik tette hogy elloptam az összes pénzét - akkor közzé teszzük a szokott csatornákon hogy hová utalta át az összes pénzét, milyen számlákra mennyit.
Aki a kiképzők pénzeit veszélyezteti az azonnali hatállyal meghal. Ha kiképző próbál visszaélni és saját pénzmosodályát üzemeltetni a bankon kersztül azt is kiszűrjük. A figyelőrendszer egymást is figyeli biztonsági okokból. minenkinek tudnia kell hogy melyik országban milyen árak vannak a kiképzésekhez szükséges eszközök és anyagok tekintetében. A kiképzőknek mindig két másik kiképző jelenlétében kell meghatározniuk hogy mennyi pénzt vesznek fel. Három kiképző hozzájrárulása kell akiknek mind át kell menniük a skenneren. Face to face. Ezen kívül a biztosítóknak is tudniuk kell hogy ki megy oda. De ezt egyébként is azok akik azt csinálják amit tanítottam és úgy csinálják betartják és ellenőriznek és vigyáznak is egymásra. Nincs titkolnivalónk egymás előtt. Tudjuk hogy ki hol tart épp kiképzést és kinek. Biztosítjuk egymást és ellenőrizzük is egymást. Ebbe beleférnek azok is akik nem követik pontosan a programot, hiszen ők is emeleik a szintet és globálisan előre mozdítják a közös ügyünket még ha szándékosan tartják is lejjebb a szintet. A rendszert nem tudják kijátszani. És idővel lebuknak. Az pedig következményekkel jár. Akit egyszer kizárok (én és csak én tehetem meg azaz még egy midnen emberi hatalomnál nagyobb hatalom és én) a bankból az többé nem teheti be a lábát vagy ha megteszi onnan már nem jön ki élve.
A bankra elvileg ha nyílt színre tudunk lépni - mert mindenki tényleg azt csinálta amit kellett - nem lesz többé szükség vagy nem sokáig. Karbantartás nincs. Úgy lett megépítve hogy idáig kibírja s ha kell karbantartani az kizárólag én tudom megcsinálni. A számítógépét és a biztonsági rendszerét én építettem saját kezemmel saját alkatrészeimmel. Azok akik már most próbálják felderíteni hogy betörjenek megsemmisítsék - rövid határidőn belül meghalnak. Megöljük őket.
Volt egy nő akinek a fiai részt vállaltak a gazdasági oldalon, szintén jó tolvajok voltak. Egyszer jön hozzám hogy eltűnt a számlájukról a kiképzésre szánt pénzük - egy normál bankból. Hogy nyomozam ki ki volt és öljem meg őket. Megtaláltam kiderült hogy a saját fia lopta el a pénzt a haverjaival. Összehoztam őket egy asztalhoz hogy beszéljük már meg... "Akkor most öljem meg? Tényleg ezt akarod?" "De miért loptátok el azt a pénzt azt a többiek kiképzésére szántuk!" "De anyu azt mondtad lopjunk el mindent amit tudunk, honnan tudtam volna hogy az milyen pénz. Nem volt ráírva. Ellopunk mindent amit tudunk." "Na látod... mondom én - ez történik akkor ha nem azt csináljátok amit mondtam. Nem beszéltek és nem beszélitek meg hogy mit csináltok. Ti vagytok azok akik ezt a mocskot tovább viszitek és termelitek. Pontosan ugyanazt csináljátok amit a circus emberei egészen pontosan ugyanazt. Semmi különbség nincs köztük és közöttetek. És ha megnézzük hogy mi az ő indítékuk akkor látnátok hogy ők is ugyanolyan idokkal csinálják ugyanezt - legalábbis erre hivatkoznak pont úgy ahogy ti is, hogy a gyerekeik önamguk és unokáik életét biztosítani tudják. Csak a circus tagjai ügyesebbek mint ti ennyi a különbség köztetek. Semmi más. Ugyanolyan rohadtak vagytok ti is mint ők. És honnan tudod hogy a gyerekid ki másnak a kiképzési pénzét lopták el?" Halgattak mint a sülthal.
Így rohad tovább az egész. A lehető legjobb szándékra építve olykor. Mert nem tartják be azokat a tanácsokat amiket adtam, mert úgy gondolják ők jobban tudják.
---
A gömzsik és én végeztünk. Végleg és abszolút tudatosan tér el attól az iránytól amerre én szeretnék haladni sok mással együtt. Alinda és ő találkoztak a bankban. Alinda felajáblotta hogy ő szivesen vállal önkéntes munkát ott. Van néhány feladat amihez kell pár ember. Pl a készpénz feltöltés, néha kell vizet bevinni - de ritkán. A computer vezérelt telepatikus rendszerhez van hozzáférésem. Azt is én építettem. Mindent hallok amit hallanom kell. "Hát te itt dolgozol?" kérdi a gömzsik amikor ment pénzt felvenni silent módban "Igen." "Mióta?" "Már 6 hónapja." "Csinálj valamit a számítógéppel." "Nem lehet." "Önts rá vizet." "Nem lehet azonnal bejelez a védelmi rendszer ha csak gondolok rá és másodszorral ki is tilt. Már mindent égiggondoltam. Nem tudok semmit se tenni." persze ők jó barátok itt ebben a "magyar" sármedencében kiválóan elpancsikolnak a mocsokban... persze a gömzisk nek havi három millió a nélkülözést jelenti...
 jó mi? Neki 50ezer a limitje három hónapra amiből 20 százalék ugrik ami éi 120ezret jelent dollárban. Ő is feltöltötte 120 éves koráig... persze most már nincs köze a bankhoz ő már mehet a picsába ahova akar átutalta a pénzét más számlákra, mert kényszerítettem erre. Azért mert megtámadott engem és a bankot is megpróbálta. A sorsa kiváló példa lesz arra nézve hogy mi történik az ilyenekkel.
---
Persze aki szarházi annak nins ilyen típusú védelemre szüksége csak a mieinknek. Pl a bayernek is ajánlottam ha kell jöhet ő is, mert csinált pár dolgot nekünk is, de ő azt mondta ő rendben van a normál bankkal is. Nos az ilyenek azért vannak biztonságban mert ők elkötelezték amgukat a szarházi rendszer mellett, mélyen és végleg.
---
Ja a megyó felajánlotta hogy feltölt nekem is egy számlát ott. Visszautasítottam. Azért utasítottam vissza mert ennek így kell lennie. Itt nyíltan kell elérjen az ilyen fajta jóvátétel és elismerés. Ha nem történik meg akkor minden kárba vész és szétrobbantom ezt a szartekét apró darabjaira. éget ér a mocsokrendszer így vagy úgy.
---
A dokinak végül igaza is volt. Amikor elgondolkodott a dolgokon amit mondtam korábban - csak a részletekben hazudtam azoknak akik hazudtak nekem a lényegi probléma megfogalmazásában soha és a megoldásban se soha. Azt mindig elmondtam hinytalanul annak akinek érdemes volt erről beszélni - rádöbbent hogy voltaképpen a legdurvább programozási rendszert dolgozta ki ő maga. És ha ő megtette akkor lesznek mások is akik megteszik és rájönnek erre. Rájöttünk mindketten hogy ennek is így kellett lennie miután végignéztünk és visszapörgettünk néhány eseményt az öreg ideje alatt és amiket én irányítottam már. Ez is egy terület ami megtörténik. "Ezt is a végső pontog kellett fejleszteni még ha te nem is akartad ezt tenni." És el kellett ismernem hogy igaza van. Amit ő kitalált és művelt azt tovább már nem lehetett fejleszteni sehová sem. "De most váalszúthoz értél. Ha nem veszel részt a megoldás kidolgozásában és abban hgy mit tudunk tenni az ilyenekkel és hogan tudjuk gyógyítani és feltörni őket - akkor ez fogja a biztos pusztulást jelenteni a föld történetében." "Így van - ismerte el ő is  de szeretem a lányomat és meg ogod látni hogy segíteni fogok." "na ja... ígéretek... fucken promises all the time... You know what the problem is you know what to do, what I do, keep your fucken promises to yourself I do not belive a word from your mouth."
---
Amikor a megyó adományából - apropó lehet adományokat is küldeni a Bankba van egy általános számla erre a célra, ha valaki akar küldeni oda pénzt megteheti persze a szokásos pozitív trövényeket és nemzetközi megegyezéseket amiknek van spirituális célja és valós biztonsági oka azokat a bank betartja és az a néhány önkéntes az ilyen jellegű megkereséseket rendezi, tehát adunk jogi és a hivatalos szervek felé információt amit a helyi jogi rendszerekben kötelező, kivéve a kiképzők számláit. Azokhoz senkinek semmi köze. Akinek arról tudnia kell az tud is róla, a többi meg nem tudhat róla. A circus ragjai is leszarják az írott törvényket szóval bekaphatják ha ilyesmivel próbálkoznak hamar kivesszük őket az élőkk sorából. De amikor fontos infó kell és valós a probléma hogy valami pénz hogyan került oda és ki küldte együttműködünk, de ez csak akkor aktív ha az érintett kiképző (akinek a számlájára érkezett valami piszkos pénz vagy kérdéses pénz) és még két kiképző tud a helyzetről ami tisztázásra szorul. Őszinte és egyenes megkeresésre válaszolunk a többi kinylhatja a seggünket. Szóval igen. Szarunk mi is a nemzetközi és helyi jogi és egyéb szabályokra - pontosan úgy ahogy a circus tagjai is. És ha ujjat akartk húzni velünk - hát csak tessék. Van erő mögöttünk és ha ti úgy léptek akkor mi is úgy lépünk. Feltéve hogy nem rohadt szét mindenki mindenhol a világon. De akkor mg úgyis teljesen mindegy.
---
Nyilván a bank nem fog örökké működni. sok ezer támadást élt már túl nemzetközit és katonait és elektronikusat meg hackertámadást... de még működik úgy ahogy felállítottam. A jelek szerint.
---
"You only distroy, steal, kill, torture, and control nothing else you have power to do - you do not have the power to heel, or cure or make things right ynd you will see that this is because YOU have to change your own mind to do that. And the only way to do that is if you follow my advice and the recaovery principles what I discribed and you can regonize in nature (unmanipulated).
A jogi projekt során bizonyítottam hogy bármilyen nyelvi eszközökkel leírt bármiylen jó szándékú és pontos megfogalmazást ki lehet forgatni és ellenkező előjelűvé tenni. Ez vonatkozik minden leírásra. A bölcsesség és a belátás mégis mindenki számára elérhető. Aki meg akarja érteni amit leírtam a megoldásról az meg is érti. Aki nem akarja megérteni az meg nem fogja megérteni soha és folyamatosan ellene dolgozik. Ezt én nem tudom irányítnai. A valóságról tett kijelentések soha nem tartalmazzák a valóságot. Az egy sokkal összetettebb dolog. Mégis megérthető, mert mi is részei vagyunk és van kapcsolat közöttünk és a világ többi dolga között.
---
Mindent vissza tudok követni ami fontos a copmuteres telepatikus rendszeren belül és bizonyítani is tudom hogy ki mit csinált. A rögzítési technológia megbízható.
---
Végül is tudtomon kívül részt vettem a doki kísérletében. A legvégsőkig akarta fejleszteni az elmekontroll lehetőségeit és meg is tette. felépített egy olyan alaprendszert - ha úgy tetszik operációs rendszert a biohardware-re ami lehetővé tette hogy az én programozásomat be tudja fogadni de valamilyen szintig ellen is tudjon állni neki azaz felülírható legyen. Teljes kontrollt addott nekem - azaz benne volt az a parancs hogy mindent igyekezzen megérteni amit én magyarázok el neki és igyekezzen úgy megtanulni ahogy elmagyarázom. De közben mégis megmaradjon a kontroll lehetősége, a külső trigger és kódvezérelt irányítás lehetősége. Én nem voltam hajlandó ebben részt venni. Ezért így oldotta meg ravasz módon. Azt tudta hogy kipzek ki embereket és nyitott vagyok bárkit elfogadni kikpépzésre, mert fel tudom törni a legtöbb beprogramozott ellenállást. Ezért úgy írta meg az operációs rendszert - a saját lánya fejében!!! - hogy ne álljon ellen hanem kövesse az iránymutatásomat. Elképesztő volt a dolog. Sokszor egyébként nagyon sokszor rövid és konkrét ismeretek képességek elsajátításában kérte a segítségemet és végül is nem sikerült feltörnöm, de érzékeltem hogy az alindával "valami nem stimmel" és szóltam is a többieknek hogy ne bízzanak benne fokozott óvatosságra intettem őket.
Szóval végül is részt vettem a kísérletében úgy hogy én fejlesztettem különböző készségeket az alindának - pl a kínzási mód miatt kialakult figyelemzavara kezelésére hoztam létre a veisszer alinda karakterét amiben meg tudott tanulni aktívan figyelni... és sok mást is. Egy jól irányítható kémrobot lett belőle. highly advanced biocomputer... nagyon ijesztő... tényleg úgy tűnik mintha érző és önállóan gondolkodni képes szeretni tudó létező lenne - és valahol az is - de mindezt csak akkor teszi ha olyan a vezérlő kódokat ismerő vezérlő...
Brutális és nagyon megtévesztő - de hosszabb időn keresztül fel tudnám törni. Ezért igyázott arra hogy mindig visszavonja mielőtt leérek a bootrendszerig. Ja dehogynem egyszer rá is jöttem hogy ezt valaki azért küldi mindig hozzám és azért hívja pont akkor vissza mielőtt végleg feltörném hogy ez ne történjen meg.
---
S ha meg nem történik meg az aminek meg kell történnie akkor meg nincs semmi szerepe egyébként se a továbbiakban ennek a banknak.
---
"Te Jani lehet hogy ezek a manipulációs eljárások már a késő 50-es korai 60-as években léteztek?"
"Lehetséges."
"Akkor ezeket nem a Péter csinálta."
...
Sok mindent újracsináltam és továbbfejlesztettem a legvégső pontig amíg fejleszteni lehetett. Tehát nem én csináltam ezeket a szarokat - ahogy azt az idősebb nemzedék hazudta a többieknek - hanem ŐK. Ez a ti szarotok (akinek nem igne ne vegye magára) én csak felderítettem továbbfejlesztettem a végső határig és kitaláltam hogyan lehet védekezni ellene vagy mi a megoldás az ezek által okozott problémára.
Közben kidolgoztam a megoldásokat is. pl most ment le egy rész valamelyik helyszínelős sorozatból amiben benne volt a borral (és minden szőlőtermékkel) kapcsolatos kormeghatározásom lényegi eleme. A c-14-nek nevezett radioaktív izotóp mennyiségére alapul ez a kormeghatározás. A nap sugárzása miatt épül bele a szőlőbe, és az atomkísérletek miatt megnőtt a szintje és miután a fosszilis üzemanyagok elterjedtek ugrássszerűen nőtt meg ez az izotóp mennyiségében. A szarházik persze elhazudták és amikor először lement a műsor beletettek egy hatalmas hazugságot hogy ettől csökkent. Most már úgy tűnik valaki kivette ezt az öngyilkos hazugságot a népbutító célzatú ostobasítási kísérletből. Így forgatták fel és fordították ellenkező előjelűvé az ilyen sorozatokba beillesztett emlékeztetőimet és az általam megosztani kívánt fontos tudást.
The Paranoia című filmben megcsináltunk néhány szarházit. Azok is az öreg emberei voltak ők fejlesztették a mindenkit figyelő rendszereket velük csináltuk a telepata rendszret is legalábbis ők csinálták az elsőt. Én persze tovább vittem azt is meg a többi megfigyelő szerkentyűjüket is. A filmben igyekeztek megalázni engem minden lehetséges módon amit fel tudtak használni. A legújabb megfigyelő dolgaikkal jöttek a nyomomban persze azt nem tudták hogy én mindegyikben benne voltam. Rohad nagyképű szarládák voltak mind. Jól meg is szivattam őket. A filmben le is buknak szereztem bizonyítékot arról hogy mit beszélnek. Ez súlyos következményekkel járt a számukra mert az öregnél volt egy szabály: aki a circus tagjai közül lebukott és bizonyíték volt ellene annak meg kellett halnia. Volt egy jelenet amikor a megfigyelő szobában ülnek ők én meg egy másik szobában miközben számtalan módszerrel figyelnek. Annyira felbosszantottak, hogy elkezdtem szétszedni az összes szarukat. Megkerestem őket és darabjaira törtem. Ahogy fogytak a kamerák és mikorfonok meg egyéb eszközök közben folyamatosan idegeltek és folytatták a támadást. Még akkor is folytatták amikor már csak egy kamerájuk volt az okostv-n és még azt is arra használták hogy üzenjenek nekem mekkora császárok ők és milyen erősek. Ez a minta jellemző és ezt a stratégiát követik a végtelenségig és azon is túl- még akkor is amikor már nincs semmijük sem akkor is támadnak és hirdetik nagymellénnyel hogy ők milyen erősek és mindent áthat az ő hatalmuk miközben semmi sincs a kezükben.
Abban a filmben is megjelent a ládonyi. "Mit csinálsz te itt ezekkel a szarházikkal?" "Azt amit te is. Kémkedek." "Én nem kémkedek. Én fejlesztek és megpróbálok változtatni dolgokon."
---
Volt egy külső terminál is a bankban. Azon tároltam a honlapját a banknak. A honlapon nem volt semmi csak a szokásos bankos információk, cím és a nemzetközi azonosítókat is meg lehetett találni rajta. Ezt a honlapot is igyekeztek feltörni és azon kersztül vejutni a bank szerverére. A védelmet úgy terveztem meg hogy baromi nehéz legyen feltörni de ez a szerver és gép csak csali volt. Több funkciója volt. Egyrészt adott egy hamis célpontot a hackereknek akik ártani akartak nekünk, másrészt rögzített minden betörési kísérletet hogy visszakereshető legyen ki hogyan és milyen trükkökkel próbálkozott. Másrészt amior feltörték a bank honlapját mindig volt egy pánikhullám azok között akik nálunk tartották a kiképzésre szánt pénzeiket vagy a magánszámláikat. Egy idő után arra használták a honlap feltörését hogy ezt a pánikhullámot figyeljék vele és felderítsék ki van benne. Az volt a másik célom hogy ez által nyomást engedjek rájuk és aki nem azt csinálja amit kell és nem úgy az pusztuljon el a beengedettek közül. Nem volt a feltörésekkel kapcsolatosan emberveszteségünk sehol mint utóbb kiderült. A szerver nem volt semmilyen módon összekapcsolva a bank valódi gépével. Több különböző trükkel leválasztotam és megvédtem mindenféle betörés ellen. A vezeték csak be volt dugva a falba és ott 5cm után véget ért... :-D Fel is törték egyébként a legravaszabb hackerek. Az egyikük a csaj volt a hubo csoportból az imiéktől aki a girl with dragon tatoo-ban olyan sokat segített nekem. Betörtek és nem találtak semmit sem.Ne mértették hogy hogyan lehetséges ez hogy a bank szervere üres és semmi sincs rajta... :-D hahaha ez jó volt. A gömzsiknek meg ment egy személyes üzenet arra az esetre ha megtörténne az amit egyik víziómban láttam... láttam ugyanis azt a jelenetet amikor ki lesz rúgva a bankból. Egyszer kértem visszajelzést is hogy hogy működi a dolog... valaki azt mondta akkor hogy bár így maradna... Most már eltelt szerintem kb 15 év amióta üzemel... nem tudom volt-e bármilyen fennakadás?
Az utalásokat lehetett időzíteni és a banki szerver - az igazi - mindenféle pénzkövetési módszert felismert és törölt vagy meghamisított amit a beérkező pénzekre tettek digitális formában le a nanokódokig. A számlával rendelkező kiképzőknek - mert gondolkodtunk hogy később lehessen e újakat bevinni, de elvetettük mert komoly biztonsági kockázatot jelentett volna és aput át tudták volna verni (még akkor biztosan) a legravaszabbak ezért kellet mindenkivel személyesen találkoznom és dolgozni együtt valamin hogy le tudjam ellenőrizni őket - szóval a számlás kiépzőknek mindig háromnak kell bemennie és jó előre meg kellett tervezniük a pénzmozgásokat. Lehet időzíteni az átutalásokat és mivel ismerem a nanokódolást is azt is úgy emlékszem be tudtuk állítani hogy milyen útvonalon érkezzen meg a pénz és mikor. az a hármas akik bementek addig nem mehettek megint be együtt amíg körbe nem ért a forgás legközelebb másik kettővel kellett bemenniük. Ezt azért csináltam hogy az egész csapat összeforrjon és ne legyen titkolózás, ismerje meg mindenki a másikat és ismerjék a helyzetet más területeken cseréljenek tapasztalatot és tisztázzák a nézeteltéréseket problémákat. Beszéljenek nyíltan.
Apropó a számítógép terem olyan szigeteléssel rendelkezett amit leszigeteltem szinte mindennel kapcsolatban ami fegyverük és manipulációs technikájuk volt. lehallgatás ellen is aktív és passzív elemekkel... mivel minden létező technikát ismertem tudtam mi ellen kell védekezni és hogyan. A 70-es években született kiképzők közül volt sok olyan akik nem is ismerték soha azt az állapotot amikor nem baszkurálják a testüket valami szarral. Sok ott ismerte meg ezt az állapotot. Apu eredetileg el akarta őket szeparálni hogy ne tudjanak egymásról, nem azért mert nem bízott bennük hanem biztonsági okokból. De úgy véltem hogy mi már nem követhetjük ezt a filozófiát mert az csak újra termelné ugyanazt a szart amit az öregék csináltak. Ismerniük kell egymást és beszélgetniük kell egymással élőszóban. Úgy voltam vele hogy ha ezek elbuknak akkor ennyi volt. Eljutottunk akkor arra a pontra ahonnan dönteni kellett és abból kellett dolgoznunk amit addig össze tudtunk hozni. Féltünk apu is meg én is attól hogy mi lesz ha ezek is megrogynak, de nem volt más választásunk. Dönteni kellett. Lesz ami lesz.
Egy egy kiképző még a magánpénzéből is el tud tartani még leglább 3 másikat helyenként többet is olcsóbb országokban. És a pénzeket is lehet csoportosítani a kiképzők nem magán számláin. Kidolgoztunk egy pár módsezrt amivel igazságosan el lehet osztani a pénzt a célunkat szem előtt tartva - nem mennyiségi alapon gondolkodva!!! Vannak országok ahol drága a cuccok beszerzése és nem lehet odaszállítani a dolgokat máshonnan, oda több pénz kellett. Az elosztásnál mindig a fő cél kell hogy a szem előtt legyen amit el akarunk érni hogy ne legyen területi vita - "hogy ez meg az többet kapott mint mi miért?". Meg kellett tanulniuk globálisan gondolkodni mindegyiknek és mindenkit egyszerre képviselni részrehajlás nélkül. Egy cél, egy közösség.
Egyébként a megyó sok pénzt töltött fel a közös számlánkra is akármilyen szarházi azért igen komoly hozzájárulásai voltak a legtöbb pénzt ő fizette be globálisan. És végül is azokból a kasszákból lopott többnyire ami állami kasszák és tulajdonképpen azt hazudják a kormányhivatalok világszerte hogy az az állampolgárok pénze... szóval mi arra használtuk amire az való.
Egyébként a gömzsik is sok pénzt fizetett be a közös kasszába de ő inkább venni akart magának ezzel katonákat - lekötelezni próbálta a többieket ezzel, hogy védelmet vásárolhasson magának. Ezt külön tisztázni kellett mindenkivel, hogy ki az akit védünk és kit hagyunk sorsára. Ezokat védjük akik ugyanazt a célt tartják szem előtt amit mi: élhető világot teremteni ahol mindenki szabadon élhet és felelősségel gondolkodó embereket. Ehető élelmiszert és tiszta vizet, élőhelyet mindenkinek legyen az ember, állat vagy növény. A természetes határok betartását.
---
Ha megtörténik a legjobb akkor majd később fel kell megint majd mennünk a holdra és most már emlékezhetek is rá... :-D :-D :-D semlegesíteni kell a cuccomat... Hatalmas élmény!!!
---
Ja a mac segített a new york-i bankfiókot összehozni. Ezért lett ott. ("Peti hol voltál? Eltűntél hat hónapr senkinek nem szóltál hova mész senki nem tudta hol vagy?" "Dolgom volt." "Jó de azt hittük ennyi, vége, meghaltál." Akkor építettem a könyvtárat meg a bankokat is. Kemény meló volt. A gömzsik azért csinálta a támadást a mac ellen, mert ő tudta hogy bankfiók épül ott is csak azt nem tudta hol pontosan... egy pár azért azok közül akikben nem voltam biztos mégis megfogta... szerintem nem bánják ők se hogy így döntöttek. Jó nem tudunk akkor látványos jólétet biztosítani de talán ez az ügy megér ennyi áldozatot... ki ki maga tudja
---
A vargaerőspistit én kértem arra hogy folytassa és mozgassa őket amíg csak tudja, hogy kiderüljön ki kicsoda és ki mozgatható ilyen okkult módszerekkel, mert nem elég tudatos a tekintetbn hogy mit csinál, mert nem gyakorolja az alapgyakorlatokat.
---
Egyébként halálom esetén a bank bezár. Amikor felmerült hogy a szutykok akiknek adtam számlát hozzá fognak szokni ehhez a biztonsághoz felmerült az is hogy a többiek is hozzá fognak szokni ehhez. Ez természetes. Ami megbízható abban lehet bízni. Technikailag és fiziailag úgy lett megépítve hogy 2025-ig működni tud karbantartás nélkül. Utána le fog állni magától de a beállított utalások még kimennek újat nem lehet már indítani. Erre felkészítettem minden kiképzőt, egyik feladatuk volt megtanulni és megtanítani a legszegényebbeknek is az összes legravaszabb pénzeltüntetős és lopós trükköt a védelemmel együtt. Erre folyamatosan készülniük kell és kellett az elmúlt 15 év során. Ezután - és már most is egyébként jelen vannak a nyitott terepen is - csak a nyitott terepen fognak tudni megélni, ha pontosan úgy és azt csinálták amit a hosszú távú stratégiában meghatároztam nekik. Így fel tudott nőni egy olyan pénztelen szegény réteg nemzedéke globálisan akiknek nem kellett elkurvulniuk és fasszopó picsanyaló kurvává válniuk ahhoz hogy fejlesztésekhez tudáshoz kiképzéshez jussanak hogy meg tudják védeni magukat és élőhelyüket a földet.
Egyfajta inkubátornak szántam ahol védett anyagi háttérrel fejlődhetnek és nőhetnek anélkül hogy bele kellene menniük abba a mocsokba amit az öregék és a hálózata azért tart fenn hogy eltörje és eltorzítsa a pszichéjüket, megtörje őket, irányítása alá vonja őket.. De nyilvánvalóan ez örökké nem maradhat így és az élet többi területét is ki kell takarítani a szeméttől. Erre megkaptak tőlem minden tudást anyagi biztonságot és szeretetet törődést.
Ahogy fejlődtek folyamatosan ki is kellett menniük a nyílt terepre és miután megszűnik a bank ki is kell menniük. Mindent tudnak ha a kiképzők elmondták nekik. És gondoskodtam arról hogy több forrásból is értesüljenek arról mi a helyzet. E mellett vannak csoportok melyek soha sem élvezték a bank által nyújtott anyagi biztonságot hanem a nyílt terepen éltek és dolgoztak végig. Ez a bank a legszegényebbek számára készült akik nem tudtak az állami és egyéb egyébként tőlük ellopott pénzekhez hozzáférni. De ezt ők mind tudják azaz tudniuk kellene. Aki nem tudja azt átbaszta a kiképzője akinek számlája van. Ezért ők is meg fognak jelenni és már most is jelen vannak a nyílt terepen és tudatosan és célzatosan azoktól fognak lopni akik az állami pénzekből szintén lopnak és saját élvezeteik és kényelmük érdekében teszi kezt.
---
Paranoia: Hahaha So how was that speach about piss and vinegar and you are just a tool in my hand? hahaha I"lll try to remember that... I used you to develop my stuff not you used me... majd szét durrant a feje a méregtől és csak arra figyelt hogy kattan-e a bilincs a kezemen hogy merjen-e támadni. hahaha jó volt látni a fejét amikor rájött hogy az informatikus srác akinek elrendelte a halálát még mindig él sőt ő hackelte meg a cuccait... baromi jó volt nézni a méregtől eltorzult arcát ami még a maszkon keresztül is szinte elvörösödött... biztos hogy izzott alatta... hahaha az Öreg nagyképű és nagypofájú szarládái.
Az a szép sportkocsi egyébként egy elektromos autó amit én építettem. "This is a renegade for a day..." "All electric fast and goes until you push the metal to the metal..."
---
És egyébként pont amiatt hogy most már nincs olyan réteg akiknek ne lenne katonája akivel ki tudja kényszeríteni amit szeretne, tudása arról hogy mi történik, mi a probléma és mi a megoldás - ezért aki azzal jön és azt találja mondani, hogy nem lehet ezen vagy azon változtatni, mert "nem engedik" az maga egy mocskos szarházi és ezt a szart terjeszti mert ebből valami rövidtávú előnye származik. Minden réteg meg tudja védeni az érdekeit ha akarja. Szóval nincs több maszatolás és mellébeszélés. Lehet változtatni. Tudtok változtatni globálisan és most amíg még van értelme.
---
"Ne csináldd mert elmegyünk..." hát húzz a büdös picsába mire vársz? Azt hiszed bármi megváltozik körülöttem ha elmész? Nos így van! Csend lesz és nyugalom. Meg nem lesz olyan szarszag. Még a gondolataitok is szaros.
---
Ha valamelyik megbízható irányító bukik el, akkor alaposan mikroszkóppal kell megvizsgálni mindenkit akit kiképzett és a hálózatba behozott vagy akivel dolgozott és főleg amiket előkészített.
Ja a mac megkért egyszer hogy az iskolabuszokba építsek be titkos rekeszeket amibe beférnek a gyerekek és van kijárat kifelé. A Miller is segített a yew yorki fiók megépítésében az alapoknál. ketten csinálták egyik egyik részét a másik a másikat.
hoggins be akart vinni valami általa fejlesztett új kémcuccot a bankba, mert kíváncsi volt hogy felismeri e a rendszer... egy hajszál méretű kamera volt asszem vagy ilyesmi a hajában. Mondtam neki hogy ne kísérletezzen a bankkal mert azonnal kemény lépések következnek csinálja inkább a könyvárban az ugyanarra a biztonsági rendszerre alapul. Azt mondja: "Neeem azt meg én nem akarom." "Miért nevetek? A bankot tesztelnéd a könyvtárat nem?" Erre a barátnője: "A fél életét ott tölti." "Azt a tudás amit ott összeszedtél olyan jelentőségű és fontos hogy mindent meg akarok tanulni. Mindent elolvasok és megtanulok és utána le is tesztelem leellenőrzöm kísérleti úton." nevettünk. hoggins igazi tudós és imádja a szakmai kihívásokat hatalmas koponya persze a többiek is... És megértette hogy a pénzteleneknek az élete függ ettől a banktól egyenlőre. Vagyis függött. Ha sikerül akkor erre nem lesz szükség egyáltalán a jövőben. "DE figyu - mondja hoggins - van ott egy csomó minden amit sehol se találtam meg semmilyen szakfolyóiratban, tankönyben egyetemi kutatólaborban. Még a titkos hadi adattárokat is feltörtem és betörtem hogy kiderítsem honnan vetted de sehol sem találtam. Azokat honnan szedted?" "Hát volt egy két az öreg tudósai között akiktől sokat tanultam, meg akik által." "De mégis kik azok. Vissza tudsz idézni bárkit is?" "Volt egy aki már a hatvanas években egy szigetelet dobozban lakott otthon meg mindenféle kacatot gyűjtött a lakásában hatalmas gané volt nála és úgy kapcsolta ki meg be a zenelejátszóját hogy volt egy fa pöcök amire egy madzag volt kötve és amikor meghízta az megnyomta a nyomógombot a szalagos magnóján. Ő volt az aki a plazma támadó rendszert először kifejlesztette, de az Öreg úgy megtörte hogy soha se beszélhetett róla. Szegényen él és halt meg. Én se tudtam kihúzni belőle egy szót se a témáról, de amíg ott voltam volt egy pár dolog ami a helyére került. Csak a jelenléte segített hogy összerekjam részben. Azután később rájöttem hogy abban is volt vakvágány, szóval magam kellett kiderítsem hogyan is működik."
"Szóval akkor magadtól is kiderítettél dolgokat?" "Így van. Sok dolog ezek közül mind a magam kutatásai és kísérleteinek a következtetése és igazsága." "Akkor te hatalams tudós vagy..." mondta kicsit gúnyosan hoggins, valaki közbevágott: "Miért ezzel az intelligenciával úgy gondolod hogy péter nem találhatott ki dolgokat saját maga? Ne törődj vele csak féltékenykedi..." legyintett a barátnője.
Nos sok mindent magam kellett hogy kinyomozzak és a legtöbb dolgot nem loptam meg ellestem eltanultam hanem sok lényegi dolgot magam fejlesztettem és találtam ki, láttam meg a valós összefüggéseket. A circus tudósai sokáig próbáltak a létező összes módsze
          Profissional de Inteligência Competitiva        

Em conversa recente com profissionais e alunos de MBAs, sobre conceitos e ferramentas e modelos de Inteligência Competitiva, uma das principais dúvidas dos presentes foi como relacionar Inteligência com um fato inovador, ou seja, com uma tendência de mercado.

Por se tratar de tendência ou um novo padrão comportamental, os dados ainda são fáceis de serem encontrados, os números, ou seja, os estudos quantitativos ainda não se fazem presentes em abundância, restando assim muita opinião, ou “palpites” sobre determinado assunto.

Mas como agir e principalmente analisar as oportunidades e ameaças, para responder à estratégia e a política de preço de um concorrente?

Neste panorama, como age um profissional de Inteligência?

Em Micro tendências (BestSeller,2008), Mark Penn apresenta seu estudo partindo da ideia que as mais poderosas forças da sociedade são as tendências emergentes e contra intuitivas que estão transformando o futuro bem diante de nossos olhos.

Para Penn, micro tendência, é um padrão comportamental de um grupo de forte identidade, que está crescendo e tem desejos e anseios não atendidos pelas instituições que influenciam a vida cotidiana.

Em um mundo onde o poder de escolha nunca foi tão grande e as pessoas estão mais conscientes das opções que fazem, o autor explica como 75 pequenas mudanças de comportamento vem determinando as transformações culturais da atualidade e influenciando o mundo dos negócios, a política e nosso dia-a-dia.


Para Penn, é preciso analisar e interpretar todas essas novas informações para a plena compreensão do que mudou na cultura convencional. E quem pode fazer esta análise e interpretação de todas essas novas informações? Sim, o profissional de Inteligência Competitiva.

Um exemplo de comportamento na categoria “Amor, sexo e relacionamentos” é o padrão “Solteiras demais”. Penn afirma “...no mundo atual, um número cada vez maior de mulheres se encontra fora da instituição do casamento.

Algumas optam deliberadamente por não se casar, enquanto outras preenchem cadastros em sites de relacionamentos, só para ver seus esforços frustrados. Muitas se culpam imaginando o que deu errado.

A verdade é que todos os problemas das mulheres solteiras poderiam ser resolvidos caso houvesse mais homens heterossexuais disponíveis. Atualmente, há homens heterossexuais de menos para todas as mulheres disponíveis, por isso elas, de repente, se viram em meio a dança das cadeiras – em que pelo menos 3% delas ficarão a espera...”

Diante de deste padrão comportamental, o profissional de Inteligência, poderá entre outras análises, mensurar a vantagem competitiva de uma empresa (Clínica Estética para homens), ou como competir com sucesso ao entrar em novos mercados (um hotel para homossexuais), ou como desenvolver uma vantagem competitiva sustentável a longo prazo para uma operadora de celular.

Como já escreveu Stephen H.Miller (Inteligência Competitiva na Prática), cada vez mais, os estrategistas da gestão estão se apoiando em uma prática, não raro mal-entendida, denominada Inteligência Competitiva (IC).

Profissionais de IC coletam, analisam e aplicam, legal e eticamente, informações relativas as capacidades, vulnerabilidades e intenções de seus concorrentes e monitoram acontecimentos do ambiente competitivo geral (como concorrentes antes desconhecidos que surgem no horizonte ou novas tecnologias que podem alterar tudo).

O objetivo? Informações que possam ser utilizadas para colocar a empresa na fronteira competitiva dos avanços.

Em resumo, este é o trabalho de um profissional de Inteligência.


Fonte: Alfredo Passos é professor de MBA na ESPM – Para Artigos.com

          Republican Party In Palm Beach Lauds GOP Anti-Environmental Crusader ... by gimleteye        

Alfie Fanjul (l) and Pepe Fanjul (r), top Palm Beach County Republican donor. The brothers head a billionaire dollar empire carved out of federal subsidies and corporate welfare programs protecting Big Sugar, the primary polluter of Everglades wetlands

The Republican Party of Palm Beach County has invited James O'Keefe to be its keynote speaker at its mid-summer event.

A press release describes O'Keefe as "an award winning journalist". In fact, he is better known as a right-wing activist who infiltrated ACORN and an office of Planned Parenthood and also invites legal action against himself.

In 2010, O'Keefe was convicted of breaking into the offices of Sen. Marie Landrieu:

Conservative filmmaker James O’Keefe was sentenced to three years of probation, 100 hours of community service and a $1,500 fine after he pleaded guilty on Wednesday to misdemeanor charges stemming from his involvement in a break-in at Sen. Mary Landrieu’s (D-La.) office. In January, O’Keefe and three others were arrested by federal authorities at Landrieu’s office on allegations of phone-tampering. Prosecutors initially said they caught four individuals in the process of committing a felony, but the charges were later reduced to misdemeanors."

O'Keefe and the Florida GOP meant to time his visit to Palm Beach County -- where virulent anti-environmentalism is coordinated through the Fanjul & US Sugar Corporation cartel -- with revelations of his incursion into the League Of Conservation Voters; an attack rebuffed yesterday by LCV with the California Attorney General.

The local GOP press release crows, "O’Keefe was ultimately credited with having a significant impact on the 2016 presidential elections for his October Surprise video series."

In "Has James O’Keefe Accidentally Stung Himself Again?", New Yorker writer Jane Mayer -- who chronicled influence peddling of the nation's largest polluters in "Dark Money: The Hidden History of the Billionaires Behind the Rise of the Radical Right" -- writes:
In the latest chapter of his strange career, the League of Conservation Voters, a national environmental-advocacy group, has filed a complaint against three individuals who infiltrated its operations, at least two of whom, the group alleges, “could be associated with” O’Keefe and have past ties to him. The group’s leaders recently began to suspect that they were being scammed, and decided to go to the authorities before O’Keefe or his alleged associates released any material on their own.
The timing of the Florida GOP conspiracy with O'Keefe occurs within context of a massive erosion of environmental rules and regulations by the Trump White House.

It is the identical strategy Florida polluters are planning to blend into the important 2018 political races where Big Sugar's main apologist, Agriculture Secretary Adam Putnam, is poised to be the GOP candidate to replace Gov. Rick Scott.

Scott, who counts on campaign financial support from Big Sugar, will likely aim for the senate seat held by incumbent Democratic Bill Nelson.

Overshadowing Florida's nasty, anti-people and anti-environmental politics is a recent report by federal scientists to the Trump administration calling climate change a greater, current threat to economic and national security than earlier estimates. According to the New York Times:
The average temperature in the United States has risen rapidly and drastically since 1980, and recent decades have been the warmest of the past 1,500 years, according to a sweeping federal climate change report awaiting approval by the Trump administration. The draft report by scientists from 13 federal agencies concludes that Americans are feeling the effects of climate change right now. It directly contradicts claims by President Trump and members of his cabinet who say that the human contribution to climate change is uncertain, and that the ability to predict the effects is limited.
The Trump White House has not released or commented on the report and was hoping, perhaps, that a titillating "explosive" revelation against LCV would help its cause in climate change denial.

Governor Rick Scott has prohibited state agencies and staff from using the words, "climate change", although Florida's economy, real estate and tax base is most vulnerable to its impacts in the nation. Recently, the US Department of Agriculture ordered "climate change" to be similarly deleted from its communications.

In the New Yorker report, Mayer contacted O'Keefe for comment. He responded:
“I don’t comment on investigations real or imagined, or work with mainstream reporters who operate in bad faith,” he told me. In 2016, I wrote an article for this magazine about O’Keefe’s bungled attempt to sting George Soros’s Open Society Foundations, a liberal nonprofit group that O’Keefe had targeted.

O'Keefe, in his role feeding the beast of disinformation through channels like Fox News, Breitbart, Infowars and Rush Limbauch, will dine on lobster tails at the Palm Beach GOP anti-environmental love-fest at the Polo Club of Boca Raton, 5400 Champion Boulevard, Boca Raton at 6:30PM on August 17.

          Waking Up To The Existential Threats Of Climate Change ... by gimleteye        
It took our Miami Herald a long time -- and several publishers -- to come around to putting climate change on the front page and the editorial section, but the Herald finally did. An editorial in this morning's paper, apropos of recent tropical deluge, called the public response to climate change "a long slog". Maybe not so long.

A recent Pew Trust poll found that public concern around the world for climate change was second only to the threat of ISIS. What the report, "Globally, people point to ISIS and climate change as leading security threats", also makes clear is that public views in the United States continue to be slogged by the Fox News effect.

Fox is the FAKE NEWS channel favored by President Trump that routinely bashes environmental and especially climate change concerns, suppressing science and misleading the public with conspiracy theories.

Paradoxically, the themes of the "long slog ahead", conspiracy theories and existential threats of climate change merged in a fascinating, recent podcast by NPR Fresh Air, "Inside The Global Seed Vault, Where The History And Future Of Agriculture Is Stored".



The seed vault, conceived and implemented by Fresh Air guest Carrie Fowler, is built into the side of a Norwegian mountain, seven hundred miles south of the North Pole. It is intended to protect the world's biodiversity from doomsday scenarios like climate change.

Fowler, bemused by Alt-right megaphones who imagine a corporate conspiracy at work, is far more concerned about the impacts of climate change on agriculture. He points to supermarket shelves filled with food and basic staples of our diet that require a low carbon atmosphere to thrive.

If you can't listen to the whole podcast, I urge you to scroll in and listen at minute 33.

... in my family, we really regarded farmers as public servants and people to be esteemed. And so I was always favorably inclined, if you will, towards farmers. And to make the story a bit shorter, I was working on a book many years ago about agriculture and came across the writings of a man named Jack Harlan, who I discovered was probably the most eminent scientist in the field.

And he was talking in very dramatic terms about what it would mean if we lost this genetic diversity in agriculture. And he said that we were facing cataclysmic starvation on a scale we can not imagine. And what he was referring to was that, you know, evolution is always ongoing in the fields. And pests and diseases are constantly mutating and mounting better attacks against our food crops. And the reason that you and I don't have to worry about that too much and the reason that our grocery stores are pretty well stocked is that plant breeders have kept up with these diseases and pests by taking genes, by taking traits from older varieties and crossbreeding it with modern varieties and creating better, newer, more resistant varieties that can cope with environmental stresses and pests and diseases.

But if we lose those traits, if we don't have sense enough to conserve them - and conserving them is very simple and it's very cheap - but if we don't have the sense enough to do that nationally and globally, then we may very well put ourselves in a situation where the trait that we need to give resistance to a particular crop just isn't there anymore. And we have had a number of close calls. And we're having some now even. Again, it's not something that makes the front page of the newspaper, but it's something to be concerned about.

... So when we look at the future and we realize that the hottest years of the past, where we had, by the way, big crop production problems, will in the future be the coldest years. Then we can begin to understand that we're going to really face a lot of trouble. It's projected that by mid-century, half of the cropland of more than than half of the countries in Africa will be in a climate regime that has never before been experienced by agriculture. So we're headed towards climates that are pre-wheat, pre-rice, pre-corn, even pre-agriculture. And I think that, you know, what that's going to do is it's going to put together new assemblages of species where species are already on the move.

So we're going to be growing crops surrounded by new pests and diseases in New climate conditions with different soil microorganisms, different rainfall patterns. And this is going to, I think, create a lot of uncertainty and surprises and heightened risk in agricultural systems and an increased vulnerability among people who are already food insecure. And the take-home message is that our crops don't come pre-adapted to new conditions. They are domesticated crops. Think about that word, domesticated. They've entered the domicile. Their evolution is in our hands.

Here is a point for the Herald editorial board and for others to consider: that we may be dealing with the impact of sea level rise in the future, requiring massive expenditure of tax dollars, at the same time as food insecurity -- as a result of climate change -- creates instant emergencies and civil disorder. As Fowler, and many other observers have noted, climate change has already played a major factor in the wars in Syria, other drought-impacted regions of the Mideast and Africa. Civil disorder driven by climate change is already in our domicile.

We are all living on borrowed time, but as climate change reality emerges, we begin to see the amount we borrowed could break the collective bank.

With global warming, civilization is skating on the edge of bankruptcy. It doesn't seem so, today. Our supermarkets aisles are flush with food and choices, but anxieties are not misplaced: it is the reason climate change has risen to the top of global worries ... just not yet in the wealthiest nation on earth, the United States, where voters continue to be mislead by FAKE NEWS Fox and carefully planned strategies of the world's most powerful polluters, their "think tanks" and false idols.

Time for voters to wake up? Yes. Let's hope the awakening starts in Florida. That would be rough justice.

          An Adult Conversation About Medicare For All ... by gimleteye        
NOTE: What the hell is going on with Republicans in Congress? The GOP is spending itself on health care like waves on a beach; a great surge then slide back out to sea.

GOP leadership believes that its base is motivated by only one idea: overthrow Obamacare. What was a popular net to corral voters turns out to be much less popular, and not at all effective, as a matter of protecting people, jobs, family and income.

It would be far better for sober adults in the GOP majority in Congress to look at the outcomes of health care in the U.S. As Dr. Carol Paris and many others report: the United States lags health care metrics compared to nearly every other industrialized nation. "Compared to ten other wealthy countries, the U.S. ranks dead last for life expectancy, and access to care. We even have the lowest number of hospital beds per capita, a way that health experts measure the capacity of a nation’s health system. It’s as if our system was designed to deny care."

The only metric where U.S. health care exceeds beyond imagination: empowering and enriching intermediaries in the health care supply chain.

I understand that this point grossly simplifies a massively complex process, but if other Western nations can effectively institute a single-payer system, why can't we?

Published on
Friday, July 28, 2017
by Common Dreams
It's Time for the Adults in This Nation To Talk Seriously About Medicare for All
Today, we breathe a quick sigh a relief. But we cannot celebrate a return to the failed status quo.
by Dr. Carol Paris

Ruby Partin, 63, and her adoptive son Timothy Huff, 5, wait for a free clinic to open in the early morning of July 22, 2017 in Wise, Virginia. Hundreds of Appalachia residents waited through the night for the annual Remote Area Medical (RAM), clinic for dental, vision and medical services held at the Wise County Fairgrounds in western Virginia. The county is one of the poorest in the state, with high number of unemployed and underinsured residents. (Photo: John Moore/Getty Images)

Hundreds of people slept overnight in cars, or camped for days in a field. They told stories of yanking out their own teeth with pliers, of reusing insulin syringes until they broke in their arm, of chronic pain so debilitating they could hardly care for their own children. At daybreak, they lined up for several more hours outside a white tent, waiting for their chance to visit a doctor. For many, this was the first health care provider they’ve seen in years.

Is this a place torn by war, famine or natural disaster? No, this charity medical clinic was last weekend in southwest Virginia, in the wealthiest country in the world, where we spend nearly three times as much money on health care as other similar countries.

"It’s as if our system was designed to deny care."

And what do we get for our money? The very definition of health care rationing: 28 million Americans without insurance, and millions more insured, but avoiding treatment because of sky-high deductibles and co-pays. Compared to ten other wealthy countries, the U.S. ranks dead last for life expectancy, and access to care. We even have the lowest number of hospital beds per capita, a way that health experts measure the capacity of a nation’s health system. It’s as if our system was designed to deny care.

America does hit the top of the list in some areas. Compared to other nations, American doctors and patients waste the most hours on billing and insurance claims. We have the highest rate of infant mortality, and the highest percentage of avoidable deaths—patients who die from complications or conditions that could have been avoided with timely care.

Clearly, this system is broken. Like a cracked pipe, money gushes into our health care system but steadily leaks out. Money is siphoned into the advertising budgets of insurance companies and the army of corporate bureaucrats working to deny claims. Even more dollars are soaked up by the pockets of insurance CEOs who have collectively earned $9.8 billion since the Affordable Care Act was passed in 2010. Nearly a third of our health care dollars go to something other than health care.

President Trump recognized voters’ frustration and campaigned on a promise of more coverage, better benefits, and lower costs. We couldn’t agree more with these goals. However, instead of trying to fix our broken system, GOP leaders are acting more like toddlers, mid-tantrum, smashing our health system into smaller and smaller pieces, threatening to push even more Americans—the most vulnerable among us—through the cracks. Last night, a few Senate Republicans stood up and acted like adults, putting an end to this dangerous game.

Today, we breathe a quick sigh of relief. But we cannot celebrate a return to the status quo, a system that rations health care based on income and allows 18,000 Americans to die each year unnecessarily.

Where do we go from here?

Republicans had eight years to come up with a plan that achieves more coverage, better benefits and lower costs. Have our elected leaders simply run out of ideas?

"The good news is that we already have a proven model for health financing that is popular among both patients and physicians."
The good news is that we already have a proven model for health financing that is popular among both patients and physicians. It provides medically-necessary care to the oldest and sickest Americans with a fraction of the overhead of private insurance. It’s called Medicare, and I can tell you as a physician that it has worked pretty darn well for more than 50 years.

Not only do we have a model, we have a bill that would expand Medicare to cover everyone and improve it to include prescriptions, dental, vision, and long-term care. It’s called H.R. 676, the Expanded and Improved Medicare for All Act, a single-payer plan that would provide comprehensive care to everyone living in the U.S. The bill would yield about $500 billion annually in administrative savings while covering the 28 million currently uninsured. Medicare for all is gaining steam with a record 115 co-sponsors, a majority of House Democrats.

Now that Republican senators have finally worn themselves out, Sen. Bernie Sanders plans to file his own single-payer Medicare for all bill. Senators from both parties will be asked to choose a side: Do you support the current system of health care rationing, medical bankruptcies and unnecessary deaths; or a program proven to work both here and in every other developed country?

A majority of Americans now believe that health care is a human right, and that it is our government's responsibility to achieve universal coverage. We’ve tried everything else except Medicare for all. What are we waiting for?

          GOP must help bring the Trump presidency to a peaceful conclusion ... by gimleteye        

On Bill Moyers website, a timeline of the #TrumpRussia trumpocalypse. 

Even if the legal definition of treason has not been reached -- because the U.S. is technically not "at war" with Russia -- the normative values of democracy are crumbling under the most chaotic presidency in U.S. history.

Moreover, the disorganization and vulnerability exposed by Russian hacking of the 2016 election has achieved a core Putin purpose: to massively marginalize the power and influence of the United States.

Trump's ongoing disaster threaten to inflict mortal wounds to our democratic system of checks and balances.

The #GOP must help bring the Trump presidency to a peaceful conclusion.

NOTE: also read: High-Profile Russian Death in DC Was Putin Hit-Job
.

          Seeing Security in a New Light        
The most dangerous threats to your organization are the ones you can’t see or stop. Cybercrime is on the rise—and the healthcare industry is particularly vulnerable because of the value of the data. Devices and data are growing by the second, creating incredible complexity and a dynamic threat landscape. No wonder 76% of IT professionals say […]
          FHA Foreclosures - Stopping Foreclosure is in Your Hands        
A FHA foreclosure is a mortgage with insurance from the Federal Housing Administration which has fallen behind in payments and as such ha forced a foreclosure upon the property held under the mortgage. Therefore you can find FHA foreclosure properties for sale from government agencies and there are more of them available now than ever before. It is believed that there FHA borrowers are more vulnerable to foreclosure when financial problems arise due to the fact that they have less resources than other borrowers.
          Father, Forgive Them        
A new MP3 sermon from Bible Baptist Church is now available on SermonAudio.com with the following details:

Title: Father, Forgive Them
Subtitle: Sayings From The Cross Series
Speaker: Pastor Jeremiah J. Sargent
Broadcaster: Bible Baptist Church
Event: Sunday Service
Date: 8/5/2007
Bible: Luke 23:33-38
Length: 44 min. (16kbps)

Overview: When Christ was hanging from the cross--the most vulnerable and weakest point of His life on Earth--He prayed for His enemies. He prayed for what people needed most- forgiveness. This message points people's eyes to Christ and encourages them to follow Christ's example during trials and hardships in their own life.
          Give Your B2B Marketing Materials a SMOG Test and Find Out if They Read like Newsweek or The IRS Tax Code (Part One)        

Overview

Sometimes, a piece of B2B marketing literature defies conventional wisdom when it comes to measuring its ease of reading. The one we look at this time scored a zero on the Flesch Reading Ease and for me, alarm bells went off. After all, no piece is completely unreadable, right?

Nevertheless, I want to make it clear I'm doing everything humanly possible to give this piece a fair shake.

To eliminate Microsoft Word's implementation of Flesch Reading Ease as a factor, we look at several alternative tools for calculating Flesch Reading Ease. To eliminate the Flesch Reading Ease as an unreliable metric, we use an additional measure called SMOG (Simple Measure of Gobbledygook).

Loosely speaking, SMOG complements Flesch Reading Ease because it measures how difficult it is to read a passage whereas Flesch Reading Ease calculates how easy it is to read. The SMOG level depends on the proportion of words with 3 or more syllables. The higher the SMOG level, the more difficult it is to read the passage. The SMOG level helps equate a passage with other well-known reading materials of similar complexity. This is how references to The IRS Tax Code and Newsweek made it into the title of this post.

So, this edition of Copywriting Tune-ups is Part One and it focuses on my efforts to arrive at a genuine assessment of how easy or difficult it is to read the B2B marketing piece we discuss below. In Part Two, we'll do the usual deconstruction of how the tune-up transforms the piece into a new and improved sales tool.

Those of you only interested in Part Two may find Part One useful because it relies on the tune-up to tell its story. Originally, I hoped to write a self-contained, one-part tune-up emphasizing the value of using bullet points. Along the way, I discovered how the After snippet readings fluctuated wildly depending on whether periods followed the bullets.

In particular, bullet points without periods greatly influences the results we get with both Flesch Reading Ease and SMOG. For this reason, we'll see the Before and After snippets in Part One and Part Two.

For the balance of Part One, we:

  • Set up the makeover
  • Show the Before and After snippets side-by-side with the usual Microsoft Word screenshots of Flesch Reading Ease
  • Explain the methodology and findings I used to eliminate the Flesch Reading Ease metric and the various Flesch Reading Ease calculation tools as factors in the B2B marketing piece's zero score on Flesch Reading Ease

Call Out Your Benefits - Just Don't Lose Them in SMOG

Since converting features to benefits has been a prevalent theme in recent tune-ups, let's review the Challenge and Benefits webpage of an enterprise software company, IQNavigator of Denver . IQNavigator technology helps large organizations manage all of the services they outsource to other companies.

Clearly, IQNavigator has the right idea dedicating a webpage to call-out their benefits. Still, as we've seen with other enterprise software companies, they write in third person voice and use passive sentences. This makes it harder for anyone to read and understand no matter how well-educated.

IQNavigator wisely uses bullet points to enumerate their benefits; however, each bullet makes for long and dense reading.

Copywriting Tune-up

So, the challenge for this tune-up is to:

  • Inject the second person voice
  • Eliminate passive sentences
  • Maintain an appropriate corporate tone
  • Make the benefits easier to understand
  • Convert each lengthy bullet into several shorter ones which are easier to read

Before

After

Fast cost savings, Ongoing investment

Enterprises in diverse industries have found that sustainable cost savings and process improvements can be achieved through implementation of an end-to-end services procurement and optimization solution. IQNavigator's market-leading solution provides several bottom-line benefits:

  • Cost reduction: Reduce costs by 10-35% by implementing best -practices for sourcing services, eliminating manual invoice reconciliation, gaining consistent terms and renegotiating with more accurate spending and performance information, and enforcing approvals for all spending, contract extensions and exceptions.
  • Process efficiencies: Automate the procurement and payment processes to reduce cycle time and cost over 70% while improving the resulting services quality, contract terms, and payment speed and accuracy.
  • Manage compliance risks: Ensure compliance with company policies, supplier contract terms and government regulations through configurable compliance rules and approval requirements, and enforcement of contract terms and rates. Financial compliance is also achieved through spending approval requirements and process controls, auditability, and accurate invoicing and cost allocation.
  • Optimization: Improve the business results achieved through outside services by aligning services spending with business priorities and initiatives, continually improving deliverable quality and value, and linking purchased services to internal key business measures. IQNavigator's distinctive business intelligence capabilities provide visibility and analysis capabilities into spending, supplier performance, and business results.

 

Gain Control over the Service Procurement Life Cycle

 

Join the companies in every sector who have reduced their costs and streamlined their processes with a complete solution to manage the services they procure and the quality of the services performed.

Address this challenge head-on and you can:

  • Lower your costs by 10 - 35%.
  • Adopt the best practices to procure services.
  • Stop reconciling invoices manually.
  • Standardize the terms in your contracts.
  • Renegotiate your contracts using more accurate spending and performance information.
  • Enforce approvals for all your spending, contract extensions, and exceptions.

When you automate your procurement and payment processes, you will:

  • Reduce cycle time and related costs by 70%.
  • Improve the quality of the services performed.
  • Gain better control over contract terms, accuracy, and speed of payment.

Setup compliance rules so you can:

  • Ensure your company complies with its own policies, suppliers' contract terms and government regulations.
  • Meet your financial compliance goals with approval requirements, process controls, audit specifications, and accurate invoicing and cost allocations.

Enjoy better performance from your service providers when you:

  • Match your spending with your business priorities.
  • Link the services you purchase to your key business metrics.
  • Improve the quality and value of the specifications you give to your service providers.

See the relationships among spending, supplier performance, and business results when you apply the unique business intelligence capabilities of IQNavigator.

Ensuring a Balanced Comparison of Before and After

As mentioned above, we need to adjust for bullet points without periods. To ensure a balanced comparison between the Before and After snippets, the After snippet mimics the Before snippet by placing a period at the end of each of its own bullets.

How Bullet Points without Periods affects the After Snippet

Remove all bullet periods and the Flesch Reading Ease result for the After snippet is 22.6. In my opinion, this dramatically understates the ease of reading we feel intuitively when we read it. Place a period at the end of the last bullet in each group and Flesch Reading Ease rises to 27.1 – still too low - based on my experience with previous tune-ups.

Eliminating Different Implementations of Flesch Reading Ease as Unfair to the Before Snippet

Now, let's look at the Before snippet. At first, I thought the Microsoft Word implementation of the Flesch Reading Ease index may be unduly stern with the Before snippet. After all, it defies common sense to say it's completely unreadable.

I calculated the Flesch Reading Ease myself in a spreadsheet and came out with a slightly negative number. In search of a more satisfying sanity check, I downloaded a free Java application called Flesh and came away with these Before and After results:

Before

After




 

Well, Flesch Reading Ease at 0.0 across 3 measuring tools is hard to dismiss.

No doubt, the After snippet grade level looks inflated and its Flesch Ease of Reading, understated. Whether we can accept the grade level figures of Flesh at face value is beyond the scope of this posting.

Eliminating the Flesch Reading Ease Metric as Unfair to the Before Snippet

Still, I felt a nagging sense, Flesch Reading Ease was treating the Before snippet unfairly. Perhaps, something other than Flesch Reading Ease would provide reasonable results. Enter the SMOG Calculator of G. Harry McLaughlin, founder of the SMOG:

Before

After




 

With a SMOG reading of 18.49, the Before snippet verges on the same reading level as The IRS Tax Code. Unfortunately, like Flesh and Word, the lack of periods following bullets leads to a highly skewed reading for the After snippet - a higher SMOG level than the Before snippet! When we add in periods as shown in the After snippet above, the SMOG level falls between Newsweek and Sports Illustrated:

One Last Attempt to Second-guess both Flesch Reading Ease and SMOG

If SMOG equates the Before snippet with the IRS Tax Code, I can accept it, but it still seems unfair to give it a Flesch Reading Ease of zero. Enter Aella Lei's Writing Sample Analyzer .

Like Flesh and Word, Writing Sample Analyzer is vulnerable to bullet points without periods but the most interesting thing about Writing Sample Analyzer is its calculation of Flesch Reading Ease:

Before

After




 

Instead of zero, Writing Sample Analyzer returns 11.05. Why? I don't know yet but once I hear back from Aella Lei, I'll let you know. While a jump from 0.0 to 11.05 is considerable and raises questions about this implementation of Flesch Reading Ease, 11.05 still makes for difficult reading.

Also note, the Fog Scale really is the exact same thing as SMOG. It looks reasonable for the Before snippet. The Before snippet's grade level also falls in-line with expectations. On the other hand, its results for the After snippet are out-of-whack across-the-board due to periods following only the last bullet point in each bullet point group.

When we add periods to each After snippet bullet, Writing Sample Analyzer responds with:

The Flesch Reading Ease looks about right but the Fog and Grade Level seem too high. Even so, comparing the Before and After snippets for Flesch Reading Ease, SMOG, and Grade Level all seem reasonable on a relative basis.

So, this B2B Marketing Piece Really is Hard to Read

All in all, both Flesch Reading Ease and SMOG support one another. In addition, while various tools for calculating Flesch Reading Ease give slightly different results, we can safely assert none of them are skewing the results to the point of denying this B2B Marketing piece a fair shake.

Wrap-up

To be completely even-handed with a B2B marketing piece scoring zero on the Flesch Reading Ease index, we looked at several implementations of the index. This helped eliminate quirks with any given tool as a contributing factor.

To eliminate Flesch Reading Ease itself as an unreliable barometer, we introduced a measure of reading difficulty called SMOG. SMOG gave us the most intuitive sense of how hard this literature is to read because it equates the piece with other well-known publications in the same SMOG range. On this basis, the piece ranks with The Harvard Business Review at the low end and The IRS Tax Code at the high end.

All of the tools used were susceptible to a lack of periods following bullet points because:

  • they rely on periods to determine the number of sentences in a passage and
  • number of sentences is an input to further calculations.

Since the After snippet breaks out the 4 long bullets of the Before snippet into 14 shorter ones, the After snippet figures improved most dramatically when we added periods to every bullet. It's reasonable to do this because the mind processes bullets as if they were separate sentences or ideas.

Also, adding bullets to the end of each bullet makes for a fair comparison since the Before snippet ends each bullet with a period as well.

In Part Two, we will:

  • use composite figures for both the Before and After snippets
  • rely on those figures to gauge the improvements the tune-up demonstrates

Finally, in Part Two, we'll deconstruct the Before and After snippets to address the challenges we set forth for this tune-up.

 

To your marketing success,

Eric Rosen
Strategic Marketing Writer
eric.rosen AT clearcrisp.com
Clear Crisp Communications
Easier to Read Means More Sales and Leads


          July Photo Contest - Winners and Honorable Mention        

July's theme was a tough one.  For many of us, being behind the camera is much more comfortable than being in front of it, and I congratulate you all on taking this risk.  It was particularly beautiful to witness how you all see yourselves, to be able to understand you a little better by looking through your eyes.  Thank you for offering your vulnerability to our community and giving us a peak into your core.


Top Vote Winner (509 Points):



Our "People's Choice Winner" who received the most votes in the photo contest was Adelyn Baber with her entry "She Waits".  Adelyn says that this piece was "inspired by the time apart from my husband who was in Afghanistan." 

Textures used:  Suede

  NOTE: Contestants are allowed to win the "People's Choice" portion of the vote contest only once.


Judge's Choice Winner:

Our judge's choice winner was Krista Vanden Bosch with this entry entitled "Hidden".  Krista comments,
"July Self Portrait - honestly, hardest month yet not because of lack of ideas, but because *I* had to be the model. I made this a personal challenge to not use liquify at all, but use posing and shadows instead. It made it easier to not look at the camera as well. The main idea behind it was to kind of be hidden and blend in with the field, since that is what I like to do myself . I also didn't want it to look like I shot this in my back yard, but have it be a place that could be anywhere in the world."

Textures used:  Extreme


Congratulations, ladies!  Krista and Adelyn will receive:

$50 to Amazon.com
$150 to the JD Textures store


Top 10 Honorable Mentions : 

(Please remember - to be considered for an honorable mention, you MUST add your photo to my FB wall (even if you already entered the contest).





"Rounding Out" by Lesley Morgan
Textures used:  Harper, Encompass, and a light flare


"Time Worth Sparing" by Caitlyn Blake
Textures used: Arisen, Sublime, Stained Canvas, Light Beam 2



"Self Portrait" by Tina Monique Keen
Textures used: Extreme, Murmurs, Sublime


 
"Untitled 2013" by Brianna Ramos
Textures used: Murmurs



"Pensive" by Carrie Kizuka
Textures used: Drifter


"Untitled" by Auburn Wendover
Textures used: Wind, Last Hope, Snow 4



"Here I Am, Turn the Page" by Jill S. Klicman
Textures used: Bramble, Light Leak 14



"Untitled" by Lindsey Gutierrez
Textures used: Force of Nature



Textures used: Dark World, Atlantic, & Sketchbook



"Air Raid" by Marcie Dawn Pagliaro
Textures used: Star Spangled


A million thank you's to those who participated.  This was by far one of my favorite contests I've hosted yet - so much depth and sincerity in these images.  What a lovely bunch you are.
Stay tuned for next month's challenge - "Different World"!


          Jailbreak And Unlock iPhone 4/3Gs 4.3.5 Using The New FastSn0w, Apple's iOS ... - Sportz News        

Click Here - For Jailbreak Video
Apple has just released the new iOS 4.3.5 and customers of the iPhone, iPad and iPod (ipod touch firmware 3.1.3 download) Touch will be happy to know it will fix the security vulnerability with certificate validation, jailbreakers will also be pleased that RedSn0w will jailbreak it, but if you like your jailbreaking do no download iOS 4.3.5.

Lion Feature Support

Jeff is the Mac Observer's Managing Editor, and co-host of the Apple Context Machine podcast. He is the author of "The Designer's Guide to Mac OS X" from Peachpit Press, and writes for several design-related publications. Jeff has presented at events such as Macworld Expo, the RSA Conference, and the Mac Computer Expo. In all his spare time, he also co-hosts the We Have Communicators podcast, and makes guest appearances on several other podcasts, too. Jeff dreams in HD.

iOS 4.3.5 Security Update

which is meant to patch a security vulnerability which could have left your phone open to an attack. If you're not using a jailbroken device you should probably connect your iPhone, iPod (ipod touch firmware 3.1.3 download) touch or iPad to iTunes and install iOS 4.3.5 to tighten security. For Verizon iPhone users, the software update will bring iOS 4.2.10.

iPad 2 Jailbreak

While Apple can claim the recent update was to "protect" users, in reality it will only add additional safety to the most careless of users. After all, a program called "PDF Patcher 2″ was widely available via the Cydia app store and other sources. The PDF Patcher 2 does pretty much the exact same thing as iOS 4.3.4, but does so after the user has jailbroken.

iOS 4.3.4 Jailbreak released

The message from the iPhone Dev Team is that most users should stay on iOS 4.3.3 and not update at all; there's no new functionality to be had, only the security fix (which can be achieved with a third-party app called PDF Patcher 2, available from the Cydia unofficial app store). Meanwhile this new jailbreak won't work on the iPad 2, and is being billed as primarily for the benefit of kernel hackers who want to work on the very latest firmware version.
Click Here - For Jailbreak Video

ipod touch firmware – Google News


          Apple Laptop Batteries Can Be Hacked, Infected With Malware - SecurityNewsDaily        

Jul 25, 2011 | 12:15 PM ET | By Paul Wagenseil, SecurityNewsDaily Managing Editor

apple macbook pro

Apple laptop batteries can be hacked to infect the laptop with malware, or possibly even rigged to explode, a well-known security researcher has found.

All modern laptop batteries have logic chips inside them that communicate with the computer they’re powering. That’s how you’re able to see how much charge is remaining. The chips also carry out regulatory tasks, such as shutting down the charging process when a battery’s at risk of overcharging.

But any logic chip has operating software — “firmware” — and that software can usually be remotely updated.

Charlie Miller, who’s famous for winning the annual Pwn2Own contest four times with his Mac OS X and iOS exploits, discovered that Apple puts the same password on all its laptop batteries in order to efficiently send out battery firmware updates.

Unfortunately, a skilled malicious hacker armed with the password could alter the firmware, Miller says. Altered firmware could be used to store malware or tweaked to damage the computer.

“These batteries just aren’t designed with the idea that people will mess with them,” Miller told Forbes tech blogger Andy Greenberg. “What I’m showing is that it’s possible to use them to do something really bad.”

Miller will be presenting his finding at next week’s Black Hat security conference in Las Vegas. He has already notified Apple of the vulnerability, and is not revealing the password.

Digging into source code

Miller, who formerly was with the National Security Agency and currently works for Denver security firm Accuvant Labs, was intrigued by a 2009 firmware update that Apple had sent out to fix a problem with MacBook batteries.

He analyzed the code for the update, found an administrative password and then noticed it applied to all models of Apple battery. This isn’t unusual — the iPhone, iPad and iPod (ipod touch firmware 3.1.3 download) Touch also share a default, and easily Googled, administrative password.

Miller reverse-engineered the Apple battery firmware (“bricking,” or permanently damaging, seven of the $ 130 batteries in the process) and discovered how to alter it to send false readings to the laptop user, to damage the battery or even to serve as a hidden repository for malware.

“You could put a whole hard drive in, reinstall the software, flash the BIOS and every time it would re-attack and screw you over,” Miller told Greenberg. “There would be no way to eradicate or detect it other than removing the battery.”

The greater problem

Could the firmware be rigged to make the battery explode? Miller found that the Apple batteries had built-in fuses to prevent serious overheating, but there’s no guarantee counterfeit batteries would have such safeguards.

Miller has written a patch — he’s calling it “Caulkgun” — for the Apple battery vulnerability and will release it at Black Hat.

The downside is that Caulkgun will prevent future firmware updates. Nor will it do anything to solve the greater problem, because this vulnerability is not confined to Apple laptop batteries.

Most computer accessories and parts — hard drives, optical drives, graphics cards and network cards, for example — use firmware-upgradable logic chips. Most have enough memory space to house a small piece of malware.

It’s likely that most items in each category from a particular brand use the same administrative password.

For malicious hackers, it’s just a matter of finding out what those passwords are.

best mobile security software

YOU MIGHT ALSO BE INTERESTED IN

ipod touch firmware – Google News


          Do in the past         
Everyone wants to expound themselves as a mastermind. Everyday, new books on leadership come in out on the market. Leaders are seen all over - business, society, and, of course, social relation. Yet, in our philosophy wherever greatness is frequently measured by resonance rather than accomplishment, I brainchild it would be ministrant to fix the factors that tell apart the true leading light from the not respectable "cheerleader."* Cheerleaders are thermometers, spell sincere body are thermostats. Where thermometers gauge the weather, thermostats conversion it. This is the clear illation in my sentiment. While thermometers hold fast their fingers in the coil to see what direction the curl (or gang) is going, the apodeictic captain determines his or her path and follows it. They do that which they suppose is top-quality for each one involved. Often genuine body have to adapt judgment in the past they can be familiar as a chief. They are fain to do this in establish to form a factual deviation.* Cheerleaders are oftentimes victims, time honest leadership are e'er owners. Cheerleaders will often damn anyone or entry other than themselves if thing goes fallacious underneath their control. With apodictic leaders, in the libretto of Harry Truman, "the low-level boodle here." True leaders poorness task for the decisions they make, apologise for their mistakes, and will gawk to part symbol near others when things go asymptomatic.Post ads:how to tell a woman is cheating / wifi software mobile phones download / obtaining cell phone records text messages / modem phone line recorder / okay to cheat on wife / people cheating battlefield 2 / how bad is cheating goodman / cheaters theme song / open real spy monitor / spy.log hibernate / how to record cell phone call android / spy-phones.co.uk / remote monitoring software video / how to record calls on landline / how to spy on a remote computer-freeware / cheating log book hours / listen cell phone microphone* Cheerleaders focussing on themselves, spell leadership concentration on the make happen. There is zilch more than vulnerable than feat between a friend and a microphone, TV camera, or photograph op. Such population are interested in themselves and greatly dinky other. True body are afraid roughly speaking the result in or the task. "Who" gets the gratitude is not well-nigh as far-reaching as the overhang getting done! This is one of the biggest differences linking cheerleaders and true leaders.
          Marketing to Extremists: Waging War in Cyberspace        


04/08/2017 Andrew Byers Social Media

This article was originally published by the Small Wars Journal on 9 July 2017.

Online, the Islamic State is a technologically savvy, sophisticated, and nimble organization that learns from its mistakes and from the actions of the Western intelligence services and NGOs that have sought to counter it. It is no secret that past and current efforts to reach potential terrorists before they can become radicalized and committed to a path of jihad and terrorism have proved inadequate. To use the language of online marketers, countering ISIS’s online activities will require quality content disseminated on a massive scale, with careful product placement. Placing counter-messaging products into platforms and forums that extremists frequent will increase the chances of potential terrorist recruits coming into contact with narratives outside of ISIS’ control.

ISIS’s cyber efforts have paid off; the FBI told Congress in July 2016 that “the message of radicalization spreads faster than we imagined just a few years ago.”[i] The number of foreigners who have been inspired by the Islamic State’s online propaganda to travel to Syria and Iraq (or elsewhere) and participate in the fighting is unclear, but most estimates place the tally at more than 20,000. Others have been set on the path of radicalization by ISIS’s online propaganda and have become “lone wolf” attackers in the United States or in Europe.[ii] Demographically speaking, the people who ISIS is most interested in targeting for recruitment came of age in the twenty-first century as “digital natives”; they have lived their entire lives surrounded by ubiquitous online communications and have embraced it in technologically sophisticated ways.[iii] ISIS knows how to appeal to these potential jihadis. Reaching them with counter-messages will require a sophisticated and multi-faceted approach.

America’s public and private sectors must commit the resources needed to carry out this counter-messaging, though we must understand that such an information war cannot be won in a short period of time, but rather, must be carried out resolutely and patiently, even in the absence of quantitative metrics of success. For example, how will we assess our effectiveness, when one measure of success is how many potential jihadis did not decide to carry out lone wolf attacks or travel to Syria? This is an entirely new and different kind of fight from any we have been engaged previously. Even without quantitative measures of effectiveness fully fleshed out, we can use scale, quality content, and product placement to improve current efforts to shape–and hopefully win–the online propaganda wars to come.

Understanding Our Options

In terms of quality counter-messaging content, the State Department–the lead U.S. agency in this fight—has already acknowledged its past failures in content production. Notably, it has acknowledged that it may not be the voice best-suited to convince Middle Eastern or Muslim recruits to turn away from the path of terrorism. The State Department’s Global Engagement Center has pivoted away from producing content, and instead now supports the efforts of localized “proxies,” thereby supporting other voices that understand the context, culture, and push/pull factors that resonate within Muslim communities.[iv] It is not only government entities involved in this struggle; various NGOs also participate in counter-jihad content creation, drawing upon former extremists, notable academics, and a multitude of languages.[v]

The West’s efforts to date have mostly created a series of reactive, ineffective counter-narratives that potential jihadis dismiss. We advocate for precision messaging; for example, past efforts by State Department entities have mined public social media data to identify individuals who may be susceptible to extremism and then pay for YouTube ads that counter extremist messaging. But we don’t need to mine public data to put counter messaging into the world of potential recruits. The United States must become aggressive and proactive in its anti-Islamic State online activities: it must immediately move to hijack the group’s own narratives and create alternatives.

When it comes to scale, the current efforts by the United States and its allies are merely a drop in the ocean of ISIS’s material. If ISIS posts nearly 100,000 messages each day, as the British House of Commons Defence Committee stated in 2015,[vi] then countering their content will take a significant amount of internet traffic or else we risk being drowned out. This component cannot be ignored or understated. Current counter-messaging efforts are not achieving enough volume to warrant a response by would-be extremists, let alone to spark an actual conversation or debate among extremists. If we have quality content and we know where to put it to reach potential recruits, we still cannot reach enough people without massively increasing the current volume of counter-messaging efforts.

When it comes to proper product placement for the counter-messaging, the best way to decide where and how to reach recruits is by watching ISIS itself. ISIS has had to transition from various platforms throughout its years of recruitment, including Tumblr, Facebook, Twitter, and Telegram. ISIS’s supporters take an active role in finding new platforms, spreading propaganda, and shepherding others along to new sites and procedures. It is not uncommon for followers to post specific instructions on where to post or how to manipulate different platforms’ terms of service to remain undetected or prevent accounts from being shut down. As they communicate best practices to each other, they create a trail for analysts to follow and instructions for counter-messaging units in order to put counter content where recruits will see it, even if this sometimes results in informational “misfires.”

The opportunities afforded by focusing our efforts on these approaches are manifold. If we are able to effectively erode the Islamic State’s ability to use propaganda to inspire self-directed attacks in the West, it would be forced to expend its resources and personnel on directed attacks in the West if it wishes to continue such operations. Sending Islamic State operatives into the West to carry out attacks there is a much more difficult and costly proposition, and one that is vulnerable to the West’s traditional strengths in intelligence and counterterrorism.

A Starting Point

We have compiled a list of some of ISIS’s known recruitment practices, along with specific recommendations for ways that counter-messaging organizations could take advantage of them. This list is not meant to be comprehensive or static, but rather to serve as a starting point that could be executed immediately and without excessive cost or effort.

Keeping Followers as Twitter/Telegram Accounts are Shut Down: As Twitter has improved its process of shutting down Islamic State accounts, its supporters have devised strategies to maintain their network of followers from one account to their next. The most popular method is to simply add a number to their Twitter username and then to increase that number each time they are shut down and begin a new account. Thus, for example, followers of @Muslimah6 could find her on her new account @Muslimah7 after Twitter shut down her account. This method of maintaining followers has been adapted for Telegram as well. The Islamic State’s unofficial news channel “Khilafah News” is left public, meaning that new users can always find it. But this also allows Telegram to shut it down at any time. The administrators of Khilafah News add a number to the end of their channel’s invitation link and increase this number every time the previous channel is shut down by Telegram. It is important to remember that Islamic State recruiters want to be found in order to effectively recruit new members. This nomenclature pattern allows them to do just that. But more importantly, it creates an opportunity for those creating alternative narratives to put their content on a Telegram channel or a Twitter account that they know Islamic State supporters will follow. New iterations of the Khilafah News channel could be created, knowing that once Telegram shuts down the last Khilafah News channel Islamic State supporters would follow the new fake channel, believing it to be authentic Islamic State channels and increasing the likelihood that a recruit would be exposed to counter-messaging.

The Islamic State’s Hashtags: Since it began disseminating propaganda on social media, the Islamic State has embraced the power of hashtags. In 2014 it famously hijacked World Cup hashtags in English and Arabic in order to spread its propaganda and shock social media users who may not have been previously exposed to such messages. The group has also advertised hashtags for supporters to use when tagging and finding new propaganda. Just as the Islamic State hijacks popular hashtags, counter-messaging teams can utilize the group’s own hashtags when posting content on social media. This will put alternative narratives in the same social media conversation as the Islamic State’s propaganda and will increase the chances that a recruit would receive facts about the group. The U.S. government has begun to take tentative steps in this direction, but such efforts could be vastly expanded.

Promotion and Marketing: The Islamic State disseminates small propaganda pieces daily, but its larger propaganda pieces take more time. In order to build hype, the Islamic State typically advertises with multi-lingual “trailers” for large upcoming pieces. Dissemination of the pieces generally occur days later, but there is no set schedule. Upon dissemination, the group posts its videos on YouTube, social media, and various self-publishing sites. Teams that produce content to counter the Islamic State must have videos ready for dissemination at all times. Then as new Islamic State’s trailers begin to appear on social media, the counter-content can be disseminated first under the same name as the propaganda that the Islamic State is advertising and it must be placed on all of the sites that the group uses. Recruits will be checking frequently for the release and the Islamic State will actually be advertising and promoting pieces that could pull recruits away. This would effectively drown out the Islamic State’s content while increasing the likelihood that recruits see alternative narratives.

Take Advantage of Platform Restrictions and Features:Not all of the Islamic State’s content is violent and grotesque; it produces some content that does not show any violent images or videos whatsoever. This allows the content to be played on news programs and for it be posted on YouTube. Knowing that the Islamic State works to keep its content available on major publishing sites, counter-narrative agencies must do the same. If a recruit searches for the name of a popular propaganda video on YouTube or an equivalent site, counter-content should appear with the same name. Video creators can even pay to promote their content so that it tops a search list. A greater understanding for how various platforms choose the order of their search results would help counter content receive just as many hits, if not more, than Islamic State propaganda.

Maintaining YouTube Channels: The Islamic State has a carefully structured propaganda structure. It has central marketing agencies that run video content, radio broadcasts, and written publications. These “federal” programs are represented within each wilayat, or province, as well. Each wilayat produces its own multilingual videos and publications that are often featured in publications from the central agencies. Islamic State supporters have advanced this model even further. There are several known propaganda groups that support the Islamic State but are not run by official Islamic State employees. Supporters make their own content and publish it on YouTube, Twitter, Telegram, and various other social and self-publishing sites. Like the Islamic State’s agencies, they have their own calligraphic logos and follow predictable but evolving patterns. “Al-Haqq” is one such Islamic State-affiliated group that runs its own Telegram channels and YouTube accounts. It would be simple to create a YouTube account called “Al-Haqq,” utilizing the group’s logo and publishing content that appears to be Islamic State videos. In reality, these videos could contain counter-messaging content with the same names as known extremist productions.

In adopting these methods, even potential jihadis who are adept at hiding their identities or degree of radicalization would come into contact with alternative narratives that may cause them to question the narratives ISIS feeds to its supporters.  It is important for analysts who study ISIS’s dissemination of propaganda to remain in constant contact with those working to counter ISIS’s messaging, helping the latter to evolve along with ISIS and other extremist groups. While we are currently scrambling to combat ISIS’s propaganda campaigns in the cyber domain, learning to develop the necessary approaches now will allow us to excel in future cyber wars with other extremist groups. Without a new strategy for winning the information war, the West will always be reactive and on the defensive as it struggles to compete with the Islamic State for the hearts and minds of Muslims around the world. Most importantly, if we can create an adaptive and empowered cyber effort now, we will be better equipped for the terrorist groups that will learn from and advance the work that the Islamic State is doing now. Future jihadi organizations that come after the Islamic State can be expected to be even savvier users of social media and similar communications venues. Unless the West learns to use social media with the same level of sophistication, it will continue to lose the information war and fall further behind.

End Notes

[i] Michael Steinbach, executive assistant director for the FBI’s National Security Branch, testimony before the Committee on Homeland Security and Governmental Affairs Permanent Subcommittee on Investigations, United States Senate, July 6, 2016, https://www.hsgac.senate.gov/subcommittees/investigations/hearings/isis-online-countering-terrorist-radicalization-and-recruitment-on-the-internet_social-media.

[ii] Daniel Byman, “How to Hunt a Lone Wolf: Countering Terrorists Who Act on Their Own,” Foreign Affairs, Vol. 96, No. 2 (March/April 2017): 96-105.

[iii] Marc Prensky,” Digital Natives, Digital Immigrants,” On the Horizon vol. 9, no. 5 (October 2001): 1-6.

[iv] Joby Warrick, “How a U.S. team uses Facebook, guerrilla marketing to peel off potential ISIS recruits,” Washington Post, February 6, 2017,https://www.washingtonpost.com/world/national-security/bait-and-flip-us-team-uses-facebook-guerrilla-marketing-to-peel-off-potential-isis-recruits/2017/02/03/431e19ba-e4e4-11e6-a547-5fb9411d332c_story.html.

[v] Representative NGOs include the Counter Extremism Project, Families Against Terrorism and Extremism, and the Institute for Strategic Dialogue. For examples of their work, see “Counter Extremism Project Unveils Technology to Combat Online Extremism,” Counter Extremism Project, June 17, 2016,https://www.counterextremism.com/press/counter-extremism-project-unveils-technology-combat-online-extremism; “Watch & Share,” FATE, http://www.findfate.org/en/watch-share/; Jonathan Russell, “Helping Families to Safeguard from Extremism,” FATE, http://www.findfate.org/en/helping-families-to-safeguard-from-extremism/; “One to One Online Interventions: A Pilot CVE Methodology,” Institute for Strategic Dialogue, April 2016, http://www.strategicdialogue.org/wp-content/uploads/2016/04/One2One_Web_v9.pdf.

[vi] UK Parliament, “The Situation in Iraq and Syria and the Response to al-Dawla al-Islamiya fi al-Iraq al-Sham (DAESH),” February 5, 2015,https://www.publications.parliament.uk/pa/cm201415/cmselect/cmdfence/690/69008.htm.

About the Authors

Andrew Byers is a visiting assistant professor of history at Duke University who has served as an intelligence and counterterrorism analyst and is a co-founder of the Counter Extremism Network.

Tara Mooney is a counter-violent-extremism analyst and co-founder of Talon Intelligence. She is also a co-founder of the Counter Extremism Network


          Qatar’s ‘independent’ foreign policy will be costly        

Tuesday, August 1, 2017

The crisis in the Gulf Cooperation Council (GCC) has radically upset Doha’s foreign relations

Source: Oxford Analytica

Outlook

The Gulf crisis, which began on June 5 when four Arab states launched a sudden and comprehensive boycott of Qatar, has thrown the country’s regional relations into disarray. In an effort to placate its enemies without losing face, Doha will seek to curb financing of Islamist groups, tinker with Al Jazeera’s editorial guidelines and expel opposition activists from other Gulf states. It will prioritise ties with Washington as the best possible route to resolution.

However, Qatar’s enemies are determined to see a public end to its long-standing ‘independent’ foreign policy. They will likely fail to bring its actions into line with the GCC leaders, but could exact a high economic price.

Impacts

A protracted crisis could force Doha into uncomfortably close reliance on Tehran, deepening Gulf divisions.Qatar’s strategy of depending on US State Department advocacy might fall foul of US domestic political power shifts.Qatar’s enemies may call for regime change, but there are few available options short of unlikely military intervention.Foreign workers, many from South Asia, are the most vulnerable to the economic impact of the Gulf crisis


          Humpback dolphins: Researchers track vulnerable species in Moreton Bay off Brisbane        
A team of researchers is snapping photos in Moreton Bay of one of Australia's little-known mammals, the humpback dolphin, in order to find out more about the animal amid a $1.3 billion harbour development proposal.
          UAB welcomes new director of med school's Division of Infectious Diseases        

The University of Alabama at Birmingham (UAB) School of Medicine's Division of Infectious Diseases has named Jeanne Marrazzo, leading expert in the field of infectious diseases and HIV, its new director.

“I am thrilled to have Dr. Marrazzo join our department to lead the division at a time when it is thriving,” UAB Department of Medicine Chair Seth Landefeld said. “Despite great advances in vaccines and antibiotics, infectious diseases remain major threats to our health — whether it’s the age-old scourge of tuberculosis, a super-virulent staph or a new epidemic like Zika virus. Tackling these diseases and growing our faculty of world leaders will advance health and health care for Alabamians and many, many others.”  

Marrazzo is currently studying the effects of the Nuvaring, a contraceptive vaginal ring for women. In addition, she is studying how the ring interacts with those who have HIV and those who don’t.

As part of her time at UAB, Marrazzo hopes to continue her research, while also looking at new infectious diseases. She plans to build a strong department that collaborates on ideas and projects alike.

“UAB has been a leader in HIV and STD research for decades, with a well-recognized reputation and body of work,” Marrazzo said. “For example, the 1917 Clinic — which provides primary care to people living with HIV and also conducts world-class research — is iconic and a fixture of excellence in providing care to vulnerable populations, which is a critical part of working in the infectious diseases field.”


          Raspberry Pi First Impressions        

It's my Pi!
The long wait is over and I finally have my hands on an actual Raspberry Pi. Initial impressions was that I'm really nervous about getting this protected and supported in a case. It's no more vulnerable to abuse than any other PCB, but a case will give me some peace of mind.
Getting the SD card was easier than I thought it would be, and the instructions at http;//raspberrypi.org/downloads were clear and easy to follow. One caveat, however: they don't explain that the partitions need to be adjusted after you dd (the command for copying the image onto the SD card) the image onto the card. It gives you a filesystem partition of about 1.7 GB and if you have a 4GB card, a bunch of it is going unused if you don't fix it. I used gparted on an Ubuntu computer to move the swap partition to the end of the unallocated space and then grow the filesystem partition to fit. I'm pretty sure it would be a bad idea to change the start point of the filesystem partition, and I didn't. 
It was a little dicey on first boot. I was a little dissapointed because it didn't sync up with my plasma TV via HDMI right away. I got some horizontal lines going across the screen. Information to help me troubleshoot this issue is hard to find, and the search function on the Raspberry Pi forums is, as one element14 user put it, "about as useful as a fish on a bicycle." I punted and switched over to the RCA output and that was no problem. Then I tried HDMI on the presentation projector, and that was fine too. 
Getting the audio to work was a small saga, which I can not now relate because the file containing my notes are on the Raspberry Pi.
I have two more units on order with element14, which I'm happy to see both have delivery dates now. This first one was from England through RS Components. I'll have it a whole month before the first one from Newark element14 gets here. I registered interest with RS in the first hour of the announcement, and at element14 about 9 hours later. Not sure how that 9 hours really accounts for a month's worth of delay. I suspect things are just especially slow at element14. 

This is a repost of my article on WixsonIT. Follow updates there.


          CAN 2012 : a pesar del pitido final, aún queda por ganar el partido contra el hambre en el Sahel        

Se estima que el número de personas que necesita asistencia en la región del Sahel aumenta hasta los 11 millones, por lo que Oxfam advierte de que debe reforzarse la labor humanitaria en las próximas semanas.   

La agencia humanitaria internacional ha elogiado a los futbolistas africanos por unirse al llamamiento a la comunidad internacional para que actúe rápidamente, con el fin de prevenir un empeoramiento de la crisis alimentaria que se avecina la zona.

Con motivo de la Copa Africana de Naciones, estrellas del fútbol de la talla de Moumouni Dagano de Burkina Faso, Demba Ba de Senegal, Seydou Keïta de Malí y Lawali Idrissa de Níger, entre otros,  se han unido a Oxfam para dar más visibilidad a la crisis alimentaria que amenaza la región de África del Oeste, conocida como el Sahel, y, con ello, apoyar la lucha contra el hambre en sus propios países y lograr  salvar vidas y los medios de subsistencia de millones de africanos.   

En un contexto en el que, según  las estimaciones oficiales, el número de personas que necesitará asistencia en los próximos seis meses se acerca a los 11 millones y los recursos necesarios con los que poder dar una respuesta ascienden a 700 millones de euros, Oxfam advierte de que la acción de la comunidad internacional en la región deberá incrementarse.  

Al Hassan Cissé, asesor de Políticas de Seguridad Alimentaria de Oxfam en África del Oeste, ha afirmado: “La potencial dimensión de la crisis que se avecina en el Sahel ya la conocemos, por lo que es ahora el momento de movilizar los recursos para proteger la vida y el sustento de millones de personas y proteger a los niños de la desnutrición. Cada mes de retraso se traducirá en un empeoramiento de la situación para las comunidades más vulnerables y conllevará el aumento del coste de la respuesta. Aunque apreciamos señales alentadoras de algunos donantes aportando ya fondos, se necesita mucha más ayuda si actuamos acorde con la dimensión y la velocidad requeridas  para evitar lo peor”.

La semana pasada la Comisión Europea aumentó su aportación para ayuda humanitaria en la región a 123,5 millones de euros y Alemania anunció un nuevo apoyo de 12 millones de euros, así como  Australia, con  8 millones de euros. Otras promesas de ayuda, también aplaudidas por Oxfam, han sido anunciadas por países como Francia y Reino Unido, con 17 y 8 millones de euros, respectivamente.

Oxfam está proporcionando agua y saneamiento, así como un apoyo esencial para proteger los medios de vida de las comunidades afectadas por la situación en todo el Sahel, incluyendo a los refugiados de Malí en Níger que han huido del conflicto en su país durante la semana pasada.

Cuando la Copa Africana de Naciones ha llegado a su final y la situación en la región amenaza con empeorar, los futbolistas siguen manifestando su apoyo para ganar el partido  contra la hambre. Demba Ba jugador del equipo senegalés, y del equipo de Newcastle United, ha señalado: "Es nuestro deber  comprometernos para garantizar que el hambre no sea una opción en el siglo XXI. Todos nosotros tenemos que actuar con determinación y coraje para defender a nuestros hermanos y hermanas a lo largo y ancho del Sahel”.

La crisis que se avecina en esta zona africana se debe principalmente a las bajas precipitaciones, que provocaron una caída del 25% en la producción de cereales en la última cosecha, así como a la subida del precio de los alimentos, que ha sido de hasta un 90 por ciento si se compara con el promedio de los últimos cinco años.

El Sahel es una región crónicamente vulnerable a las amenazas externas, como la sequía. Ante este contexto, Oxfam demanda inversiones a largo plazo para incrementar la resiliencia de las comunidades para que puedan hacer frente a las malas temporadas, con el fin de prevenir futuras crisis.

Más información

La respuesta de Oxfam ante la crisis alimentaria en el Sahel

Spanish
Pull quotes: 
Cada mes de retraso se traducirá en un empeoramiento de la situación para las comunidades más vulnerables y conllevará el aumento del coste de la respuesta
Quotee's organisation: 
Asesor de Políticas de Seguridad Alimentaria de Oxfam en África del Oeste
Notas a los editores: 

Imágenes : http://www.flickr.com/photos/letstacklehunger/
En caso de utilizar las imágenes, por favor mencionar Oxfam en los créditos.

Web de la campaña de la región del Sahel. 
http://www.letstacklehunger.org 
http://www.taclonslafaim.org

Videos disponibles en inglés:

  • Video Sahel (4 teams): http://bit.ly/zn5vhU
  • Video Etalons Burkina Faso: http://youtu.be/ofnsnjosDEw
  • Video Aigles du Mali: http://bit.ly/zLxkxq
  • Video MENA Niger: http://bit.ly/w2GMnK
  • Video Lions Senegal: http://bit.ly/zEMrhM
  • Video Demba Ba et Armand Traoré http://bit.ly/zBwDnl
Contacto para medios: 

Charles Bambara - Sénégal (Dakar): cbambara@oxfam.org.uk - +221 77 639 4178

Irina Fuhrman - Mauritanie ifuhrmann@intermonoxfam.org - +222 48021965

Ian Bray - Oxford - ibray@oxfam.org.uk +44 (0)7721 461339

Magali Rubino - Paris - mrubino@oxfamfrance.org +33 630466604

Space only: 
Quotee: 
Al Hassan Cissé

          Updated — MocoSpace reveals private e-mail addresses        
Vulnerabilities exist in social networking sites such as MocoSpace that, when exploited, can disclose the private e-mail address of targeted users. These vulnerabilities are caused by the interaction of the site's internal e-mail system, with the external e-mail system that hosts a user's private e-mail account.
          A (temporary) countermeasure for the Verizon Droid pattern lock bypass        
It has been observed that, as long as a Bluetooth device is paired, AND CONNECTED, to the Droid; the pattern lock bypass vulnerability does not occur.
          Exercises to get rid of Cellulite - Simple Exercises That You Can Do to obtain Back Your Beautiful Skin        
Cellulite Exercises
Cellulite are trapped body fat cells that may be removed by cellulite creams readily available for sale, but when you're somebody that dislikes putting creams and creams then you will find special cellulite exercises that can be done to be able to relieve yourself of individuals cottage type cheese bumps onto the skin.

Daily Exercise

You want to do daily exercises and along with detoxing plus some hormonal balancing might help alleviate the unsightly appearance of cellulites within your body. Performing these everyday won't help remove cellulite but offer you an over-all healthy body too.

Do Cardio workout routines

Perfect cellulite workouts are cardio workouts. This could include walking, jogging and swimming or anaerobic exercises centered on firming the upper thighs, sides and bottom because these are where one can usually place cellulite build-ups.

Carrying this out everyday you'll enhance your bloodstream circulation in addition to lymphatic drainage. Exercises for cellulite also aid in detoxing via sweating.

Anaerobic Workout

Another group of exercises is known as anaerobic workout also is essential in getting rid of cellulite because this can help you metabolize excess body fat that accumulates especially around the upper thighs and sides that eventually becomes the dreaded cellulites.

Hormonal Remedies

Regrettably, sometimes exercises might not be enough to totally remove cellulite and hormonal unbalances. Some type of hormonal treatment might be utilized because it is also thought that certain other reason behind cellulite develop is hormonal discrepancy.

These cellulite workouts are really made to burn excess fats and alleviate cellulite formation in addition to convert body fat into muscles which will accelerate metabolic process too. It's also required for women who aren't overweight to concentrate their exercises on parts of the body that's really vulnerable to developing cellulites. Again consistency is essential if you want individuals cellulites to become completely eradicated.
          Symulast Joey Atlas - Cellulite Free Body Devoid of the Unpleasant Dimples        
Symulast Method
Cellulite is a cause of disturb in support of the majority women. After the inception of puberty, the hormones and faulty diet end result in decreased elasticity of the skin. Since a end result of this, skin loses not at home on luster, tending to look lumpy and dimpled in outward show. Hereditary factors drama a sizeable role in this as well. But you be supposed to not lose hope, as the catch can be with no trouble overcome. The e-book- The devotion approaching Cellulite by Joey Atlas, has valuable insights to provide. Since a leading fitness instructor, Joey Atlas recommends Symulast Method Exercises. These exercises can help you overcome the catch. Recurrence of cellulite can plus be prevented by process of these exercises. The alternative does not interest pills and their margin sound effects. These are based on natural methods, and so you can forever prevent the repercussions of margin sound effects. The dealing comes in the form of physically possible exercises. Taking part in as little period as 28 days, you can piece your way to relief and solution.

The complete package in support of women in support of natural ejection of cellulite
It is of imperative meaning with the purpose of you educate manually on cellulite. Once you know all its ins and outs, you will be able to come all its reimbursement. With the package, you will receive-
  1. A chain of videos explaining the exercises and in a row. The chain has all the orders in support of the Symulast Methods and Exercises in PDF format. The format is printable.
  2. The Symulast Personal Schedule, so with the purpose of you are able to personalize the exercises as for each your unique routine. The schedule includes all the needed guidelines.
  3. An informative Cellulite Files Email Newsletter. It proposes to keep you updated.
  4. A protracted Term Cellulite Maintenance and Prevention Schedule. By complying with this schedule, you can free manually from conditions with the purpose of assist the occurrence of cellulite.
Guaranteed results to pull off an desirable and toned body

The in a row in this Package has been constructed in a way with the purpose of can be with no trouble followed. There are 7 reports with the purpose of help overcome all your anxieties. The reports contend on matching of the catch areas of the body through convinced special exercises. You are extra guided to go along a dietary regimen with the purpose of is counterproductive to cellulite. Hence, you are able to deal with the cellulite with no having to garbage money on the pay for of creams and other misleading medications.

Though cellulite affects men as well as women, it is the females with the purpose of are exceedingly vulnerable. Cellulite is essentially formed in convinced areas like stomach, buttocks and thighs. But with the employment and effectuality of exercises, you can keep things under control.

If you are facing troubles due to impulsive loosening of the skin nearby the thighs and buttocks, you are pain from cellulite.You might click Symulast Joey Atlas now to see to it that why with the purpose of is the set of circumstances. Improper diet and hormonal instabilities are the prime reasons in support of this catch; however, you can control a better indication by learning more approaching dieting skills and performance.




          Chief Information Officer        
Exam number: 
#60-206
Exam type: 
Open Competitive (open to the public)
Salary: 
$202,154 Annually
Opening Date: 
August 4, 2017
Closing Date: 
September 6, 2017
Examination date: 
October 14, 2017
Application fee: 
$20.00
RESIDENCE REQUIREMENTS: THERE ARE NO RESIDENCY REQUIREMENTS FOR PARTICIPATION IN THIS EXAMINATION. There is one vacancy at the Erie County Medical Center Corporation.
Examples of Duties: 
Chief Information Officer plans, organizes, and directs the development, implementation and evaluation of computerized Hospital Management Information Systems (HMIS) supporting hospital operations; Ensures security of the electronic data for the enter institution, including electronic medical records of all patients and integrated electronic security (surveillance) for the facility; Oversees security for electronic data and equipment to prevent data breaches, malware and related viruses and vulnerability in systems and medical equipment connected to computerized systems; Develops, promulgates and oversees the execution of the information processing objective of the Medical Center and its departmental entities; Recruits and hires staff responsible for implementing, monitoring and maintaining Medical Center information systems; Advises Medical Center management, administrators and department heads on current trends and directions regarding management information systems and provides leadership in strategic planning, development, acquisition, implementation and operational initiative in all areas of information technologies; Oversees the development and implementation of standards, policies and procedures to assure the effective and efficient design, implementation and operation of information systems supporting the Medical Center and its component departments; Coordinates the development and implementation of standards, policies and procedures to assure the effective and efficient design, implementation and operation of information systems supporting the Medical Center and its component departments; Oversees the purchasing or contracting of all hardware, software and peripheral equipments and develops, negotiates and monitors all contracts for services; Projects information resource requirements of the Medical Center, develops budget and plans to meet assessed needs to include personnel, equipment, implementation and monitoring of this budget with the financial entities of the Medical Center; Meets with managers, administrators and clinical staff within the Medical Center and external to it, to communicate information systems objectives and to develop, implement and carryout policies and plans to achieve the established objectives; Coordinates the implementation of automated systems including but not limited to the acquisition of software, hardware and peripheral equipment and the assignment of technical staff to user departments which most effectively utilize available resources; Coordinates the activities of key managers and staff with the information systems department, reviews the performance of these individuals on a regular basis and establishes policies and procedures to assure that other departmental staff are similarly evaluated.
Qualifications: 
MINIMUM QUALIFICATIONS:  Candidates must meet one of the following requirements on or before the date of the written test:  Graduation from a regionally accredited or New York State registered college or university with a Bachelor’s Degree in Management Information Systems, Business or Public Administration, Computer Science or related management or technical field and eight (8) years of administrative* or supervisory** experience in the electronic data processing field, at least four (4) years of which involved the design and/or development of acute care hospital electronic data processing management information systems.
NOTES 1:Graduation from a regionally accredited or New York State registered college or university with a Master’s Degree in Management Information Systems, Computer Science, Business or Public Administration may be substituted for two (2) years of the required generalized experience above but may not be substituted for the required specialized experience. 2. *Administrative experience is defined as the responsible planning, management and control functions of an organization or organizational unit including the development and/or approval of operating policy and procedures 3. **Supervision – Responsible direction and control of subordinate employees.  This involves the assignment of work, approval of work, training, evaluation and discipline of employees.  The supervisory aspects must be an integral part of the job, not incidental or occasional.  4.   Verifiable part-time and/or volunteer experience will be pro-rated toward meeting full-time experience requirements.   5. Your degree and/or college credit must have been awarded by a regionally accredited college or university or one recognized by the New York State Education Department as following acceptable educational practices.  A grade of "D" or better is necessary for a course to be credited as successfully completed.  If your degree and/or college credit was awarded by an educational institution outside of the United States and its territories, you must provide independent verification of equivalency.  You can write to this Department for a list of acceptable companies providing this service; you must pay the required evaluation fee. Notice to Candidates:  Transcripts will now be accepted by the Department of Personnel ONLY at time of application.   All subsequent transcripts must be submitted at time of interview.
The New York State Department of Civil Service has not prepared a test guide for this examination. However,candidates may find information in the publication "How to take a written test" helpful in preparing for this test. This publication is available on line at: www.cs.ny.gov/testing/localtestguides.cfm  
Subjects of Examination: 
Subjects of examination: A written test designed to evaluate knowledge, skills and /or abilities in the following areas: 1. Administration These questions test for knowledge of the managerial functions involved in directing an organization or an organizational segment. These questions cover such areas as: developing objectives and formulating policies; making decisions based on the context of the administrator's position and authority; forecasting and planning; organizing; developing personnel; coordinating and informing; guiding and leading; testing and evaluating; and budgeting. 2. Data center operations These questions test for knowledge of the principles and practices employed in planning, organizing and controlling the operating activities of a computer center. They cover such areas as: data center methods and procedures; identifying and resolving operational problems; coordinating and maintaining schedules for the utilization of equipment; and monitoring and controlling operating systems, equipment, and the physical environment in the computer center. 3. Principles of networked communications These questions test for basic concepts and terminology of data communications. They cover such subjects as data communications, types of networks, modems, security, protocols, topologies, transmission media, wiring, installation and troubleshooting. The questions are general in scope and are not specific to any vendor or system. 4. Preparing written material These questions test for the ability to present information clearly and accurately, and to organize paragraphs logically and comprehensibly. For some questions, you will be given information in two or three sentences followed by four restatements of the information. You must then choose the best version. For other questions, you will be given paragraphs with their sentences out of order. You must then choose, from four suggestions, the best order for the sentences. 5. Supervision These questions test for knowledge of the principles and practices employed in planning, organizing, and controlling the activities of a work unit toward predetermined objectives. The concepts covered, usually in a situational question format, include such topics as assigning and reviewing work; evaluating performance; maintaining work standards; motivating and developing subordinates; implementing procedural change; increasing efficiency; and dealing with problems of absenteeism, morale, and discipline. 6. Systems analysis and design These questions test for techniques and concepts of computer systems analysis and design. They cover such subjects as feasibility and applications studies, systems development tools and software, the systems life cycle, types of systems (e.g., client/server, Web-based), controls, and systems documentation, testing, and implementation. NOTICE TO CANDIDATES:  Unless otherwise noted, candidates are permitted to use quiet, hand held, solar or battery powered calculators.  Devices with typewriter keyboards, "Spell Checkers", “Personal Digital Assistants", "Address Books", "Language Translators", "Dictionaries", or any similar devices are prohibited.  You may not bring books or other reference materials.

          Infiniteskills – Developing 3D Games with Unity        

It’s never been easier to make 3D games using the Unity game engine, and in this video you’ll learn how. You’ll go from an empty screen to the total build-out of a space combat simulator that lets you fly through space to shoot down the asteroids that threaten your spacecraft and a vulnerable space station. […]

The post Infiniteskills – Developing 3D Games with Unity appeared first on GFXDomain Blog.


          Heroes: Ashma and the Community Health Workers        

Since taking on the role of Associate Director of the Community Health Department just a few months ago, Ashma has taken the program by storm transforming the clinical follow-up program, helping get the WATSI program off the ground so that even our poorest patients can receive life-saving treatments from the tertiary care units in Nepalgunj and Kathmandu, and helping implement the mobile health technology platform that our community health workers now use to report their data. Through the numerous hours we have spent working with Ashma, she has become a close friend and a respected colleague. 

Ashma has also quickly earned the trust of the community members. One Saturday when we accompanied her into a nearby village for the weekly community health meeting, one FCHV told us about a man in her ward who had HIV, TB, and asthma. The FCHV told us that the man’s health status had been deteriorating but he was not willing to go to the hospital because he had formally had a negative experience with clinicians during the course of one of his many visits to different medical centers. After the meeting, we went with Ashma and the FCHV to the man’s house, along the way passing families out in their fields preparing their rice patties in the heat of a Saturday afternoon. There, she spent well over an hour patiently discussing the situation with the family. The wife had literally carried her husband to all of his medical appointments throughout Nepal and India and just could not keep doing that while also raising their several young children. Ashma promised the family that she would personally see to it that the man got treated properly and only then would he agree to come. We then accompanied the man to the hospital where Ashma saw to it that he was received properly by the clinical team. 

However, the story of the heroes of the community health program would not be complete without including the Community Health Worker Leaders and Female Community Health Volunteers. As we have had the chance to get to know the 9 CHWLs when they come to the hospital each week for trainings and to report data and the 92 FCHVs whenever we go out into the community, we have seen the dedication and kindness each woman brings to her position. While each woman has a different story for how she decided to become a CHW, every one of them brings a common desire to help their communities. The FCHVs are selected by their communities and are the true links between the population of Achham and all health services. These strong and wonderful women break down the barriers – geographic, cultural, and social – that the most vulnerable and marginalized Nepalis face in accessing care. 

Ashma, the CHWLs, and the FCHVs are heroes.

          PNC ayuda a los más vulnerables        
none
          LA REPRESIÓN ES UN SÍNTOMA DE MOVIMIENTO        
En estos tiempos que corren, vuelan y no se dejan tomar... aparecen fantasmas (o ilusiones) que posibilitan la evidencia. 

Si la policía nacional, el pasado viernes, actuó de forma represiva contra el CS 13Rosas, después de unas jornadas contra la represión... lo que demuestra es que es evidente la evidencia. Evidente, en cuanto que la sede más vulnerable (por identificación), es el CS 13Rosas; evidente por haber ocurrido después de unas jornadas contra la represión; y evidente, finalmente, por haber reprimido (con cámaras de TV, en concreto de La Sexta, incluidas). 

Alcalá de Henares es una ciudad difícil, tirante, que se resquebraja con facilidad. Tensiones acumuladas, orientaciones realmente sorprendentes y ediles extraños. 

Es una ciudad donde el sustrato es bastante contradictorio pero entrañable... Sin embargo, el devenir de los cuerpos de seguridad DEL estado; más que presentarse como voluntario en el ayudar cotidiano... como si de robótica se tratase decide aceptar el ordena y mando (fundamentalmente como en todos los lugares de la tierra donde existen estos aparatos).

Así, pobres de ellos, las masas enfurecidas terminan por cargar el muerto directo. Ellos son (y se nos aparecen como) la primera referencia, el primer escollo, el primer obstáculo, los matones al que el gángster de turno envía para amordazar, reprimir, detener, infundir miedo... Ellos son la evidencia: La policía será la primera en sufrir la recogida de esas uvas de la ira que Steinbeck ya profetizó a finales de la década de los 30.

Mañana, martes 18 de febrero a las 17:00, hay concentración delante del Ayuntamiento de Alcalá de Henares, coincidiendo con el Pleno Municipal. Podremos ir por la tarde, cuando la mayoría de la vecindad puede, ya que ese cambio fue uno de los primeros cambios relevantes de la nueva era que comenzó... La del miedo que cambia de bando.


          Buffer Overflow Attack Example [Sending Shellcode] | Tutorial | Exploit Research | How To        
Written by Pranshu Bajpai |  | LinkedIn

This is a demonstration of a Buffer Overflow attack to get remote shell of a Windows box.

Vulnerable Program - Server-Memcpy.exe [Resource: SecurityTube]
Vulnerable Function  - memcpy
Tools - msfpayload, Immunity Debugger

Read up on Memory layout and Stack Frames before you begin [see 'Resources' at the bottom of this page]


Buffer Overflow Attack Example and Demonstration

Testing the Vulnerability to discover the possibility of a Buffer Overflow

Get the vulnerable server running on a Windows box and note the IP.




Create an exploit in python on your Linux machine sending input to the remote vulnerable server running on the Windows box.

Send an input of  "A" * 1000 and notice the server crashing on the Windows box after receiving the first 1024 bytes.

Now load the server.exe in the Immunity Debugger and run the executable (F9).

Run the exploit on Linux box again to send an input of "A" * 1000 to crash the server on Windows box.

Notice the state of the registers and stack in the debugger after the server crashes. Notice EBP and EIP overflow and now both contain '41414141' which is hex for "AAAA".

Now we can see that we can overflow the buffer and manipulate the address stored in EIP and EBP.

Caculating the Offset using pattern_create and pattern_offset


To calculate the Offset we need 'pattern_create.rb' and 'pattern_offset.rb' included with the Metasploit Framework Toolkit

Create a Large Pattern (of 1000 bytes) using pattern_create


Copy and Pattern and send this pattern as Input to the Vulnerable server using the Python Exploit

Check the Value of EIP in the debugger [In this case it is 6A413969]



 Search for this value in the pattern by using pattern_offset.rb


Note down the offset value = 268 [So now we understand that these first 268 bytes don't matter to us, they are just used to fill the buffer]

We are interested in the remaining bytes which will include the return address and the payload (shellcode) and optionally NOP sled.

Finding the Return Address

Now we need to find out the return address to be fed to EIP which will point to the Malicious payload (Shellcode) in the stack

We notice that the return address can be 0022FB70

In Little Endian format the return address is \x70\xFB\x22\x00





Creating Payload [ Generating Shellcode for Windows box ]

Now we require the payload (shellcode). It can be generated using msfpayload



About Bad Bytes in the Shellcode or Return Address

(If you're a beginner, this might confuse you. If that's the case, skip this part as it doesn't apply for this particular example.)

Remember to remove any bad bytes if you notice them in the shellcode or return address (bytes like null, carriage return).

We notice that our return address has a byte "\x00" in the end which is a bad byte.

However, in this particular case, since the function is memcpy, the string terminator byte of "\x00" doesn't matter.

But in a function like strcpy this bad byte would terminate the string and we would have to use address of a JUMP ESP as return address.

Constructing Final Exploit Code

In the Python exploit, Send Input = 268 Random bytes (A) + Return Address (\x70\xFB\x22\x00) + Shellcode

Final Exploit Code would send the following input to the Vulnerable Server

----------------------------exploit-excerpt------------------------------

_to_send = "A" * 268

_to_send+= "\x70\xFB\x22\x00"

_to_send+= ("\xfc\xe8\x89\x00\x00\x00\x60\x89\xe5\x31\xd2\x64\x8b\x52\x30"
"\x8b\x52\x0c\x8b\x52\x14\x8b\x72\x28\x0f\xb7\x4a\x26\x31\xff"
"\x31\xc0\xac\x3c\x61\x7c\x02\x2c\x20\xc1\xcf\x0d\x01\xc7\xe2"
"\xf0\x52\x57\x8b\x52\x10\x8b\x42\x3c\x01\xd0\x8b\x40\x78\x85"
"\xc0\x74\x4a\x01\xd0\x50\x8b\x48\x18\x8b\x58\x20\x01\xd3\xe3"
"\x3c\x49\x8b\x34\x8b\x01\xd6\x31\xff\x31\xc0\xac\xc1\xcf\x0d"
"\x01\xc7\x38\xe0\x75\xf4\x03\x7d\xf8\x3b\x7d\x24\x75\xe2\x58"
"\x8b\x58\x24\x01\xd3\x66\x8b\x0c\x4b\x8b\x58\x1c\x01\xd3\x8b"
"\x04\x8b\x01\xd0\x89\x44\x24\x24\x5b\x5b\x61\x59\x5a\x51\xff"
"\xe0\x58\x5f\x5a\x8b\x12\xeb\x86\x5d\x68\x33\x32\x00\x00\x68"
"\x77\x73\x32\x5f\x54\x68\x4c\x77\x26\x07\xff\xd5\xb8\x90\x01"
"\x00\x00\x29\xc4\x54\x50\x68\x29\x80\x6b\x00\xff\xd5\x50\x50"
"\x50\x50\x40\x50\x40\x50\x68\xea\x0f\xdf\xe0\xff\xd5\x89\xc7"
"\x31\xdb\x53\x68\x02\x00\x11\x5c\x89\xe6\x6a\x10\x56\x57\x68"
"\xc2\xdb\x37\x67\xff\xd5\x53\x57\x68\xb7\xe9\x38\xff\xff\xd5"
"\x53\x53\x57\x68\x74\xec\x3b\xe1\xff\xd5\x57\x89\xc7\x68\x75"
"\x6e\x4d\x61\xff\xd5\x68\x63\x6d\x64\x00\x89\xe3\x57\x57\x57"
"\x31\xf6\x6a\x12\x59\x56\xe2\xfd\x66\xc7\x44\x24\x3c\x01\x01"
"\x8d\x44\x24\x10\xc6\x00\x44\x54\x50\x56\x56\x56\x46\x56\x4e"
"\x56\x56\x53\x56\x68\x79\xcc\x3f\x86\xff\xd5\x89\xe0\x4e\x56"
"\x46\xff\x30\x68\x08\x87\x1d\x60\xff\xd5\xbb\xf0\xb5\xa2\x56"
"\x68\xa6\x95\xbd\x9d\xff\xd5\x3c\x06\x7c\x0a\x80\xfb\xe0\x75"
"\x05\xbb\x47\x13\x72\x6f\x6a\x00\x53\xff\xd5")

sock.send(_to_send)

----------------------------exploit-excerpt------------------------------

Exploit Successful, We got a Shell!! 0wn3d!

Send the exploit to vulnerable server (IP: 172.19.19.192, in this case)

This would spawn a shell on the Windows box which would be listening on port 4444

Use netcat to connect to the machine on port 4444




At server side on Windows box, the server is still running and shows that it has received 613 bytes



Do the Math

Random bytes of "A" =           268   bytes
Return Address         =               4   bytes
Payload                    =            341   bytes
_________________________________

Total                       =              613  bytes
_________________________________


Resources:


Smashing The Stack for Fun and Profit - AlephOne  [It's very important to read this]

Exploit Research @ SecurityTube

Exploit Writing Tutorials at Corelan.be





          Gimme Shelter        
Seems that finally – after this long, warm autumn – the cold weather is about to arrive. With this in mind I have been busy bringing vulnerable plants undercover. The brugmansia was still flowering prolifically, but I took a deep breath and cut it back to about 50cm and have now given it a fleece […]
          Un imán busca evitar la radicalización en la prisión        
Cinco por ciento de la población en Suiza profesa la religión musulmana y uno de tres prisioneros sigue los preceptos de Alá. Pero solo pocas cárceles permiten la visita de un amán. Una de ellas, la prisión de Berna. Mustafa Memeti la visita una vez a la semana. Actúa como intermediario entre las autoridades de la institución y los reos musulmanes. Ofrece apoyo espiritual. Aborda temas de religión, vida familiar y otros asuntos personales con los fieles. El imán busca también frenar la radicalización de la que pudieran ser objeto los reos. Las ideologías extremistas pueden florecer tras las rejas, atrayendo a personas vulnerables. La directora de la prisión bernesa, Monika Kummer, describe lo que ella considera señales de alarma entre los presos: “Si alguien se deja crecer la barba, deja de oír música y mirar la televisión, empezamos a observarlo más de cerca”. Memeti, por su parte, indica que en caso de signos de radicalización, intenta hablar con los afectados al respecto:
          Bound And Beautiful        
Bound And Beautiful

Doll-like Catalina writhes happily in string and red lingerie atop a shiny black piano while Paul plays (!) beautiful music for her. Blonde sprite Angella Faith wears innocent pink lingerie as she struggles under a steel frame. She«s completely vulnerable to Paul»s roaming hands, especially after he ballgags her (on camera). Angella«s happy just to roll around alone when she»s mummified from neck to ankles in red and white duct tape. Stunning Eve Ellis rounds out the program. Dressed in black lingerie and six-inch heels, she«s breathtaking in a sexy nylon strap frogtie with a white ballgag, but it»s her final scene will make your sap boil! She's nude except for her heels, and bound cleanly to a bondage nag. Her hair is tied back, pulling her head up high. Paul strokes and squeezes her body and uses a stinging riding crop on her perfect ass. Eve was very happy during this shoot, and her excitement is quite visible!

Format: mp4
Duration: 1:15:47
Video: 618x466, AVC (H.264), 911kbps
Audio: 156kbps

Bound And Beautiful Bound And Beautiful
Bound And Beautiful Bound And Beautiful

Bound And Beautiful
File size: 596.8 MB

Bound And Beautiful

Bound And Beautiful
http://svalka.ws/
          Al ver a las gentes, se compadecía de ellas (Mateo 9,35-10,1.6-8)        


“Lo que han recibido gratis, denlo gratis”

En la vida uno podría plantearse: ¿Qué está abandonado, sin sentido, sin orientación, sin un camino, sin la capacidad de llorar, sin saber pedir, sin voluntad de dar?
Cada día caminamos kilómetros, transportamos nuestros kilos y lo que menos hacemos es darle las gracias a nuestros pies. Cada día hacemos uso de nuestros sentidos y no nos fijamos en lo que produce una lágrima, en lo que permite el movimiento de nuestro cuerpo, en la sangre, etc.
Así como no nos fijamos en lo físico tampoco nos detenemos a ver la interioridad, espiritualidad, el elemento psicológico. Cómo es que todos amamos pero algunos de manera inadecuada y con traumas. Cómo explicar la ira, la impaciencia, el egoísmo. Cómo podemos ser injustos y comer tranquilos, engañar a la persona que amamos y compartir la vida, decir que somos fieles y estamos coqueteando e ilusionando a otras personas. Cómo explicar que el dinero te haga replantear el amor ya sea que falte o sea abundante. Cómo teniéndolo todo para ser felices terminamos siendo  desesperados, complicados, irrespetuosos, soberbios, mentirosos, criticones, habladores, pretenciosos, presumidos y, por tanto, infelices.
Gracias a Dios, no somos sólo eso, también nos llegará el reumatismo, la diabetes, el cáncer, la osteoporosis, taquicardia. No sabemos lo que comemos, somos frutos de nuestras pasiones. No es un pesimismo existencial, sólo quiero expresar que somos vulnerables y cada día es un milagro no sólo fruto de lo muy inteligentes o absolutos que seamos.
En esta situación, todo el paquete insuficiente descrito acaso no sería bueno que Jesús se compadezca. Aunque su compasión es porque las personas están descuidadas, como ovejas sin pastor, sin guía, sin protección, sin palabras de afecto, sin que alguien se preocupe por lo que come o por los síntomas de su vida. Tanta soledad y tanto desamor suele hundir los ánimos y peor si el desamor están enfangado hiere a los corazones más puros.


Siendo así, tenemos que aceptar que no sólo necesitamos de la compasión de Dios, sino también de las otras personas. No sólo de un pastor, sino que nosotros podemos tomar dicha misión a favor de tntas personas enfermas, solas, frustradas, desesperadas. Así pues, la compasión de Dios hace que “ Vayan y proclamen que el Reino de Dios ya está, curen enfermos, resuciten muertos, limpien leprosos, expulsen demonios”.

          Ð”емидовский крест на реке Чусовая        
Уж простите за «Шо, опять, снегоходы?!», но пока зима…
Мороз утром под 30 и почти незаметный на дневном солнце.
Снег, абсолютно никем не взорванный и позволяющий резвиться и отрабатывать различные почти акробатические трюки на снегоходе без каких-либо последствий.
Поляны, склоны и ручьи, урочища исчезнувших деревень на берегу Чусовой и вообще непередаваемые виды этой известной реки и ее окрестностей. И самое главное — хорошая компания снегоходчиков и даже снегоходчиц.




И вот опять в субботу подъем в 5 утра: сборы, погрузка снежков, утренний кофе — едем из Тагила в Сулем — благо снег за ночь хорошо подвалил. Сегодня едем к Демидовскому кресту у Писаного камня.

В Сулеме на рассвете небо почти прояснилось прямо на глазах — все-таки оплата за погоду прошла.




Серега Вирага традиционно с фоторужьем и не в кадре. Впервые за многие годы со мной пассажиром поехала жена — будет притворяться сумкой и просить пощады на крутых виражах, зато мне больше не придется дома объяснять, где и что я делаю по выходным — она все увидит своими глазами и руками. Как-то поехали мы с ней типа в кафе вечером на мотоцикле (ССЫЛКА) — она потом сразу предложила продать ее экипировку.


После непродолжительных сборов полетели.


Сразу на первой же полянке устроили небольшую разминку. Алена молча терпела все тяготы и лишения на пассажирском месте и молилась, а если не молилась, то ей точно следовало бы этим заняться.


На фото ее не видно, но она есть


Затем немного леса и еще немного полянок. И вот Романово — очередная исчезнувшая деревня на Чусовой — никаких следов присутствия человека — только снег, нетронутый никем.


Погнали!!! Алена, держись!




На возвышенности над рекой традиционное фото


Грех на таких просторах было не поваляться — все погнали гонять на разных снежках










Добундочился :) Уронил — купил


Ставили все и вся на пятку — типа вилли.


Здесь есть, где развернуться


Дальше дорога шла вдоль реки, временами перепрыгивая через реку. По реке идти не было никакого желания, хотя следов рыбацких снегоходов там довольно много.

Очередная полянка


На заднем фоне Чусовая.


Дорожки в лесу очень красивые и почти нехоженные — только старые бурановские следы.




И вот перед Усть-Уткой опять полянки.
Текстура… Фактура…




Вова и елки










Паша






Викинг тоже может. Алена все никак упорно не отцеплялась и ловила все прелести веселого катания




Усть-Утка


У памятника покорителям Урала (в народе — Ермаку) на берегу Чусовой устроили небольшой пикник. Серега Вирага прочитал лекцию на тему: Как и что сплавляли по Чусовой — познавательно.


Еще раз перепрыгнули через Чусовую и поехали в сторону Писаного камня. Почти все идут туда по реке, но у нас другой путь — по суше.






Впереди участок леса


После нескольких неправильных попыток встать на чужой старый след все-таки нашли нужное направление и пошли.


Правда пошли почти буквально. Дорога была вдоль склона и на Ямахе Вентуре ТФ было ехать правда сложно, Лена никак не могла справиться с машиной на уклоне, потом пробовали усмирить коня почти все остальные поименно — тоже не сильно успешно — стаскивает вниз.


Разок вставили линейку в снег


И попили чай, воду и колу, пополняя кислотно-солевой, водно-щелочной и какой-то там наверное еще баланс.


Выскочили к Кашке (тоже исчезнувшая деревня) недалеко от Харенок






Со снегом и ландшафтом там полный порядок




Не стали нарушать девственности этих мест. Немного покружились на маленьком пятачке и сделали несколько фото.






Далее Еква. Хотелось пройти все по суше, без выхода на реку, но потеряли много времени на полянках и лесном уклоне — поэтому пару раз сунувшись на старые путики, все-таки приняли решение ехать до Еквы, после которой почти сразу прыгнули с реки снова на скалу.

Впереди открытая вода на стремнинах — не хотелось рисковать.


Спустились опять к реке — здесь давным давно стояла деревня Пермяково. Вирага по путеводителю рассказал, что здесь жили офигенные хитропоповцы: они промышляли тем, что указывали сплавшикам железа неверный обход острова, баржи садились на мель и Пермяковцы за деньги вытаскивали пострадальцев.

И вот отсюда до финиша буквально пара километров по реке, хотя путик по суше мы потом все-таки нашли.

Вот он — Демидовский крест. Почти на закате, но успели.




На заднем плане Писаный камень. На нем виднеется табличка, крест, выбитый в скале, не разглядели.






Раньше этот крест стоял наоборот — этой стороной к скале, но в советское время его уронили, а потом неправильно поставили.
Также на этой стороне видна выбитая надпись, что здесь родился угнетатель рабочего класса — чего только ни придумают комсомольцы.
А на другой стороне хорошо сохранившаяся надпись, что здесь 8 сентября 1724 года родился Никита Акинфиевич Демидов.








Постепенно смеркалось


Устроили пикник с горячим. Мясо, рыба, курица — что будете? В-общем, все по меню


Вирага разогревает заранее заготовленную домашнюю жареную картошку.




Довольно долго обсуждали, как тут раньше жили. Серега много рассказывал исторических фактов (подготовился он хорошо).
Фотографировались с разных ракурсов и разным составом.
Но уже все больше смеркается — гоним обратно.

На обратном пути заметно похолодало. Спустился туман.


Обратно от Еквы погнали по дороге — она сильно занесена снегом — прямо Финляндия.
Не смогли проехать мимо своротки на Омутной Камень (очень живописная и довольно высокая скала на Чусовой), тем более, что почти никто из группы там еще не бывал.
Встретили несколько снегоходчиков с Первоуральска.

На Омутном сделали фото уже в сумерках.


70 метров. Аж замирает все… Удержали Серегу от традиционного лазания по скале.


Не стали там задерживаться. До Усть-Утки долетели по автодороге — прямо как по ратраченной трассе. Дальше до Сулема своим путиком.

Всего расстояние получилось около 100 км. Вернулись обратно примерно в 6-7 вечера.

Погода просто пела. Снег — везде целина. Места просто шикарные. Виды незабываемые. С такими яркими впечатлениями мы тепло попрощались со всеми участниками похода и поехали домой, обсуждая планы на следующие выходные.

Постоянный адрес публикации: bikepost.ru
          Celtics’ Stretch of Futility Gives Wizards Reason to Believe        
Washington’s run helped tie the second-round series, 2-2, and made Boston look vulnerable again.
          Arnold sisters tap, make dreams at Lincoln Center OOD        
Chloe Arnold (left) and Maud Arnold
(photo: Vaughn Dabney)

In the field of tap, dancer-choreographers Chloe Arnold and Maud Arnold stake out territory in a place of contemporary sound and attack, aiming to take the art of tap to folks whose tastes run to music styles like R'n'B, rock, funk, rap and Latin pop. Did you make it to last evening's Lincoln Center Out-of-Doors performance of Where Dreams Are Made in Hearst Plaza, featuring the Arnold sisters and their Apt. 33 troupe? If so, you heard, among other things, Ed Sheeran's "Shape of You," Sean Paul's "So Fine," John Legend's "Ordinary People" and "Glory," Beyoncé's "Run the World," Mark Ronson's "Uptown Funk," Andra Day's "I Rise Up," Eminem's "Not Afraid," Jay Z's "Empire State of Mind" and a trio of Prince bestsellers. You also heard, from one song to the next, the troupe layering on a fairly uniform staccato, hard-heeled, hard-charging tap in their rangy, loose-limbed style. Power tap for the people!



Apt. 33 re-envisions Eminem's "Not Afraid" in Charles Renato's 2016 video, featuring is That Asha.

Where Dreams Are Made seemed overly segmented, each bit limited by the length of its popular song and encouraged to lock itself within a certain forceful register (even if, as in "Ordinary People," the song seemed to call for a more vulnerable approach). The sisters' in-between patter advocated more love and unity and sisterhood/brotherhood and exhortations to affirm ourselves as "amazing." I can appreciate that; the Arnolds absolutely do physical and psychic upbeat like nobody's business. Their entire project is the dance equivalent of an energy drink. But as a fan of tap (and, maybe, because I'm an introvert), I also have a longing for some of the other things tap has always done well--softness, juicy lyricism and fine, adroit detail, soulful reflection and nuance, sound that goes on walkabout, winding us through diverse terrains where new, unprecedented things await discovery. I love, sometimes, to hear "I love you" whispered, not always a shout.

Where Dreams Are Made has concluded, but you will find a world of interesting, free events at Lincoln Center Out of Doors, now through August 13, by clicking here.

Subscribe in a reader

          Invisible made visible: Okpokwasili, Rossi present "Bronx Gothic"        
"Bronx Gothic is about inhabiting the body of a brown girl
in a world that privileges whiteness."

"I am asking you to see the brown body."

"Maybe Bronx Gothic creates visibility for the invisible."

--Okwui Okpokwasili,
from the film Bronx Gothic, directed by Andrew Rossi

Photos courtesy of Grasshopper Film

Now ask yourself: Are you awake?
--Okwui Okpokwasili, Bronx Gothic


Christians have a gospel story about Jesus, aware of his fate, praying in the garden of Gethsemane on the night before his crucifixion. All around him, his disciples--whom he had asked to merely keep watch with him--sleep deeply, leaving him alone with his agony.

I thought of this scene as I watched Okwui Okpokwasili in the documentary Bronx Gothic (2017, 91 min.), a film with superb direction by Andrew Rossi and killer editing by Andrew Coffman of Bryan Sarkinen and Rossi's daring cinematography. Launching its world premiere theatrical engagement on July 12 at Film Forum, the film provides deep insight into the motivation and process that guided Okpokwasili's magnificent solo performance piece of the same name. It delves into her experiences, thoughts and feelings as she takes the show on its final tour and holds discussions with members of her audience.

As the film opens, Okpokwasili is in mid-performance, dressed in the color of congealed blood, tears pooling and dripping from her luminous eyes as the persona she inhabits recalls life-changing incidents from a Bronx childhood. I was reminded of the frequent, insistent sobbing in Kyle Abraham's ensemble dance, Dearest Home, and also how, like disciples at Gethsemane, not every viewer will necessarily have the will to stay awake--available, vulnerable, connected, "woke"--when Black artists ask for empathetic witness.

Both Dearest Home and Bronx Gothic--denying any demand for performance to stay within narrow, acceptable confines--make messy vulnerability and intense pain visible, in particular Black pain. Both works reach into as well as beyond their makers' personal history of being Black in America to suggest characters and narrative that should move anyone of heart and conscience.

Okpokwasili was raised within a large, middle-class Nigerian-immigrant family in the comfortable Parkchester section of the Bronx in the 1980s. (Her charming parents, whom we meet late in the film, make an indelible impression.) Describing her solo as "semi-autobiographical" allows it to partake of her extraordinary imagination and her empathy for the pre-teen girls she observed in her youth. She remembers them, remembers their pleasures and their struggles, channels them and serves them with intensely committed soul and physicality. The film's audience is spared little of how violently this haunted performance has wrenched its performer's psyche and body.

Having seen two iterations of Bronx Gothic live (Danspace Project, 2012 and 2014), I can tell you that the film, generously sampling the live performance, only slightly misses the electrifying force of Okpokwasili live. There's nothing quite like being in a close, tent-like enclosure with her as she quakes head to toe, shares sexual secrets, scrapes her bare feet and smacks her bones against a punishing floor.

"Black flesh has deep meaning in this culture," Okpokwasili remarks at one point as she discusses her intentions for Bronx Gothic. All the vivid imagery--the dark and the light, the glistening sweat, the luxurious undulations and seizure-like trembling--serves to underscore this uncomfortable, complicated truth.

As she thinks about how her performance confronts and nearly overwhelms her audience, the artist is also both overwhelmed and intrigued. Recalling her experiences in the role, she asks an imaginary watcher, "Is my Blackness getting on you? Am I getting on you? Can you take on the pain?"

Not for nothing is the genre-spanning Okpokwasili one of our most respected artists, a Bessie-winner to boot. I hope Rossi's portrait of her will be seen widely. I rank Bronx Gothic up there with Raoul Peck's I Am Not Your Negro as another urgent, earthshaking documentary that must be seen and must be discussed.

Showings at 12:30, 2:30, 4:40, 7:00 and 9:10
Wednesday, July 12 through Tuesday, July 25

Q&As with Okpokwasili and Rossi at the 7pm shows
Wednesday, July 12, Friday, July 14 and Saturday, July 15

For information and tickets, click here.

Film Forum
209 West Houston Street (west of Sixth Avenue), Manhattan
(map/directions)

Subscribe in a reader

          NEW BOOK TOUR SIGN UPS - October THE KITCHEN MISTRESS--Katherine’s Story—The Letter Series—Book 3 by Kathleen Shoop         
NEW BOOK TOUR SIGN UPS - October
THE KITCHEN MISTRESS--Katherine’s Story—The Letter Series—Book 3 by Kathleen Shoop
Can be read as a stand alone read

Note from author - this is a lengthy read x

Review Tour
Tour mid October onwards
SIGN UPS HERE - https://docs.google.com/forms/d/e/1FAIpQLScumL79KSqOuZtFrn2eSNfrIEPT74sCbP6ZjatHL_qu0DB2dQ/viewform 

For every woman who’s had to choose between the secrets that protect her and the people she loves the most…

1892—Des Moines

Katherine Arthur and her family are back and it’s time to collect the money Mrs. Mellet left them in her will. The tidy sum will allow the family peace of mind and a future that’s stable and fulfilling. But when things don’t go exactly as planned, Katherine steps up to do more than her share. Hired as a kitchen mistress, her intuition (with the help of a mysterious recipe book), cooking prowess, and work ethic make her the perfect partner for the enigmatic, wealthy woman next door. Then Aleksey Zurchenko arrives.

Violet Pendergrass is a well-heeled, progressive woman with half a fortune in one hand and a plan for enduring prosperity in the other. Resourceful, shrewd, and tough, Violet doesn’t realize her one and only weakness leaves her vulnerable as she attempts to solidify her independence. She sees unparalleled value in Katherine’s gifts and does her best to keep the girl close, to keep her true work secret from her mother and the world.

Katherine’s loyalties to her mother and Violet grow strained and soon her commitment to both frays even further as her feelings for Aleksey grow. Katherine must decide if pursuing her work with the formidable Violet and protecting her family are more important than following love. Can she do it all? Love, hope, joy, secrets buried in walls and hearts; all are threatened by those who claim to care about the Arthurs. Can Katherine separate what’s right and true from what it takes to survive? Are they even different things?



Our Disclosure Policy
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE

Sharon x
photo 
Sharon Martin
Blogger & Promoter at Beck Valley Books
         




          The Afternoon Sound Alternative 09-07-2016 with Michael Buck        
Playlist:

Paul Kimbiris- Bring Out Your Dead - Dark Side Of Pearl
- voicebreak -
Ages And Ages- Something To Ruin - Something To Ruin
Anthony DAmato- If Youre Gonna Build A Wall - Cold Snap
Los Lobos- Bootleg - Quiero Creedence
Chris Beall- Crossroads - Brand New World
Ccile DooKingu- Pure Entertainment - Anybody Listening Dialogues Pt 2
- voicebreak -
Of Montreal- Chaos Arpeggiating - Innocence Reaches
TOR- Vaults - Blue Book
Crystal Castles- Their Kindness Is Charade - Amnesty I
The Silver Lake Chorus- Timberline - To Emmylou
Future Generations- This Place We Go - Future Generations
Emma Louise- Everything Will Be Fine - Supercry
- voicebreak -
Roger Fisher- Rivers Of Soul - All Told
Danny Green Trio- Porcupine Dreams - Altered Narratives
C Duncan- A Year Or So - EP
Don DiLego- Idiot Heart - Magnificent Ram A
Wages- Stalingrada - Glace
Corey Christiansen- Factory Girl - Factory Girl
- voicebreak -
Quaker City Night Hawks- Beat The Machine - El Astronauta
Goldenchild- There Is A Light That Never Goes Out - Bridges
DJ Shadow- Depth Charge - The Mountain Will Fall
Gang Of Four- I Found That Essence Rare - Entertainment
Thee Oh Sees- Jammed Entrance - A Weird Exits
9bach- Anian - Anian
- voicebreak -
Bjrk- I See Who You Are - Vulnicura Live
Carl Broemel- 4th Of July - 4th Of July
Colourbox- Hot Doggie - Lonely Is An Eyesore
Earth Heart- Burn - Homesick
Deerhoof- Debut - The Magic
Sofi Tukker- Drinkee - Soft Animals EP
Quantic Presents Flowering Inferno- Flowering Theme feat Flowering Inferno - 1000 Watts
- voicebreak -
The Julie Ruin- I Decide - Hit Reset
Phantom Phunk- Hey There - Arboles Ossific
Gringo Star- Going Home - The Sides And In Between
Car Seat Headrest- 1937 State Park - Teens Of Denial
Red Martian- Cowboy And The Vocoder - Retrailing
Matt Script- See You Anymore - See You Anymore
Margaret Glaspy- You Dont Want Me - Emotions And Math


playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/35/playlistDate/2016-09-07
          The Afternoon Sound Alternative 08-23-2016 with EC        
Playlist:

Corinne Bailey Rae- Tell Me - The Heart Speaks In Whispers
Prince Far I- Black Man Land - Black Man Land
Emma Louise- Talk Baby Talk - Supercry
Wye Oak- No Dreaming - Tween
Oran Etkin- Nama - The Same Heart Original Motion Picture Soundtrack
Bjrk- Notget - Vulnicura Live
Ron Whitehead- Never Give Up - I Will Not Bow Down
9bach- Yr Olaf - Anian
Mats Wawa- Planet Of The Grapes - Classics EP
- voicebreak -
Magazine- Under The Floorboards - After The Fact
Devendra Banhart- Heard Somebody Say - Cripple Crow
Sonic Youth- Unknown Theme - Spinhead Sessions
Samaris- Wanted 2 Say - Made In Iceland Vol 8
Greylag- Yours To Shake - Greylag
Renato Braz- Sodade Meu Bem Sodade - Saudade
The Colorblind James Experience- A Different Bob - The Colorblind James Experience
Iggy Pop- Nightclubbing - Nude Rude The Best Of
Black Mountain- Mothers Of The Sun - IV
Joseph Arthur- BigCity Secrets - Big City Secrets
Feronia- Little Bird - To Emmylou
Beth Orton- Wave - Kidsticks
- voicebreak -
Leon Redbone- Diddy Wa Diddie - Double Time
MAYA ANGELOU- On Working White Liberals - BLACK PEARLS
MAYA ANGELOU- Homewreckers Lament - BLACK PEARLS
Caetano Veloso Gilberto Gil- Terra Ao Vivo - Dois Amigos Um Sculo De Msica Multishow Live
David Bowie- Blackstar - Blackstar
Zola Jesus- Hikikomori - Conatus
So Percussion- September - Amid The Noise
- voicebreak -
Vampire Weekend- Cape Cod Kwassa Kwassa - Vampire Weekend
Lint- Jolly Bobbins - Sexyharassment
Compass Mexican Institute Of Sound Toy Selectah- Before The Sunset feat Gael Garcia Bernal Stela Campos Bruno Morais Iara Renno - Compass
Paul McCartney Linda McCartney- Ram On - RAM
The Hot Sardines- When I Get Low I Get High feat Alan Cumming - French Fries Champagne


playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/20/playlistDate/2016-08-23
          Stable core, vulnerable heart        
I went to yoga tonight and we were in lunges, bending into our front knees, figuring out where our stomachs and pelvises were, raising hands over head, pushing shoulders down, opening heart – “Stable core, vulnerable heart.”  Basic, physical advice on holding the pose and not falling over and also the biggest coolest thing I […]
          Honda listed as vulnerable incumbent — but how vulnerable is he?        
San Jose Rep. Mike Honda is back on Roll Call’s “10 Most Vulnerable House Members” list, but he’s likely telling his supporters not to worry. After all, he was on the same list a month before the June 2014 primary and dropped off it in August after thumping fellow Democrat Ro Khanna in that primary. Not
          Are we vulnerable to viruses while on chemo?        

I know our immune systenm is low but I'm not sure it's the same with all chemos? Maybe some are worse than others for that? I'm on Vectibix and when I see my onc she always stresses that I'm sun sensitive and to be careful but hasn't said anything about low immunity issues.

My husband has been battling a stomach bug that he finally was scanned for yesterday and they think it's a virus. He's usually very supportive but he didn't ask the doctor if I need to worry or if we should be extra careful about disinfecting things like taps or doorknobs or anything like that. When I aske dhim if he'd asked he got all snarky and said maybe he should move out until he's better and crap like that so I don't have an answer. I'd asked him to ask the doctor when he got the call but he forgot. I just left a message at the doctor's to ask myself so I'm waiting to hear back. They don't know what the virus is or even if it is for sure.

What would you do in the meantime? I have a few ideas of precautions but there might be something obvious I'm not thinking of. Or are viruses something that's not easily transferred?

Thanks,

Jan 

Discussion boards: 

          Classy Alternative to an Upturned Hanging Basket        
Clever old Crocus always has innovative and attractive products. Regular followers of this blog will know that I recommend upside down hanging baskets to protect vulnerable plants and now Crocus have come up with a stylish alternative. They will be available in green or grey in two sizes and should appear on their website in […]
          The Afternoon Sound Alternative 01-22-2016 with Mark Doyle        
Playlist:

Evelyn Evelyn- A Campaign Of Shock And Awe - Evelyn Evelyn
Midnight Oil- White Skin Black Heart - 20000 Watt RSL Greatest Hits
Sophe Lux- Marie Antoinette Robot 2073 a Rock Opera - Waking The Mystics
SIKORA- Sins Of Our Youth - Eye Kandi EP
- voicebreak -
David Bowie- Blackstar - Blackstar
Pretty Balanced- Concertgoing - Icicle Bicycle
Bones Beeker- In Search Of Signs - Bones Beeker
Warsaw Village Band- Hey You Yokels Son - Nord
Wye Oak- Dogs Eyes - Civilian
- voicebreak -
Dweezil Zappa- Hummin - Via Zammata
Tame Impala- Jeremys Storm - InnerSpeaker Collectors Edition
Nickel Creek- Hayloft - A Dotted Line
Portishead- The Rip - Third
Fifth Veil- Across The Mesa - Lanterns
Iva Bittov Gyan Riley Evan Ziporyn- Farewell - Eviyan Live
The Bird And The Bee- Come As You Were - One Too Many Hearts EP
Wand- Dovetail - 1000 Days
- voicebreak -
The GOASTT- Devil You Know - Midnight Sun
Beth Custer- Ive Heard It Before - Vinculum Symphony Live
Franoiz Breut- La Fille Des Eaux - La Fille Des Eaux Single
Mercedes Peon- Babel - Mercedes PeonSOS
Charlotte Gainsbourg- Greenwich Mean Time - IRM
- voicebreak -
Os Mutantes- Once Upon A Flight - Fool Metal Jack
Pretty Balanced- Euros And Pounds - Icicle Bicycle
Billy Tipton Memorial Sax Quartet- Argonauts - Pollo D Oro
Pretty Balanced- Euros And Pounds - Icicle Bicycle
Ty Segall- The Singer - Manipulator
Bjrk- Mouth Mantra - Vulnicura
- voicebreak -
Chimney Choir- In This Light - Boomtown
Anna Homler Geert Waegeman Pavel Fajt Koen VAN ROY- Rosalie - Corne De Vache
Kate Bush- Get Out Of My House - The Dreaming
- voicebreak -
Stan Ridgway- Talkin Wall Of Voodoo Blues - SNAKEBITE Blacktop Ballads Fugitive Songs
Silent Warhall- Isolation Blues - Hard On
Lay Low- Please Dont Hate Me - Live At Home


playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/65/playlistDate/2016-01-22
          The Afternoon Sound Alternative 10-20-2015 with Barry Roark        
Playlist:

Various Artists- Your Beat Kicks Back Like Death - SC100 Secretly Canadians 100th Release
Various Artists- Soft Evenigs - SC100 Secretly Canadians 100th Release
King Tubby- A Murderous Dub - From The Palace Of Dub
Van Morrison- Sweet Thing - The Essential Van Morrison
- voicebreak -
Tricky- We Dont Die - False Idols
Dengue Fever- Still Waters Run Deep - The Deepest Lake
Alaska In Winter- Staring At The Sun - Dance Party In The Balkans
Dubchek- Puppy Train - Down Memory Gap Lane
Sprechen Sie Deutsch- Police And Thieves - Reno 911 Miami
A Tribe Called Red- Electric Intertrival Feat Smoke Trail Ojibway - Nation II Nation
Modest Mouse- Tiny Cities Made Of Ashes - The Moon Antarctica
They Might Be Giants- Glean - Glean
R- Ravens Rub Mix - Poor Leno
Happy Mondays- Bobs Yer Uncle - Loads
Quitapenas- Guayabo - Quitapenas
Heavyweight Dub Champion- Blessed Is The Seed - Survival Guide For The End Of Time
Delicate Steve Dustin Wong- Flyin High - Wondervisions
Various Artists- King Crimson Three Of A Perfect Pair - Sometimes God Smiles
Bruce Cockburn- Maybe The Poet - Stealing Fire Deluxe Edition
- voicebreak -
Various Artists- - The Complete Death Of Cool Parts 1 2
Dub Spencer Trance Hill- Smoke On The Water Deep Purple - Riding Strange Horses
JJ DOOM- Gmo - Key To The Kuffs
Adrian Younge- Turn Down The Sound feat Loren Oden - Linear Labs Los Angeles
Greensky Bluegrass- Worried About The Weather - If Sorrows Swim
The Wolfgang Press- People Say - Funky Little Demons
- voicebreak -
Fly Ashtray- Barrys Time Machine - Tone Sensations Of The Wondermen
Various Artists- Magnus Buchan feat Community Recordings - Natural Selection Vol 1
- voicebreak -
Trevor Jones- The Glade Pt II - The Last Of The Mohicans Original Motion Picture Soundtrack
Bjrk- Stonemilker - Vulnicura
- voicebreak -
The Domestics- What A Life - The Domestics
Pest- Ogres - All Out Fall Out
A Night Of Serious Drinking- Shades Of Another Color - One After Another
- voicebreak -
Tommi Eckhart- Casino Solid State Remix - Run Lola Run Original Motion Picture Soundtrack


playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/20/playlistDate/2015-10-20
          The Best Use of Hanging Baskets        
Ever since Germaine Greer said that hanging baskets reminded her of heads lining the road to the Forum, I’ve found it hard to like them when used for their intended purpose. But I do find them perfect for discreetly protecting precious or vulnerable plants like these cyclamen. They don’t need to be as decorative as […]
          Free Cyclamen        
Last autumn I dug up a clump of vulnerable cyclamen seedlings and potted them into individual cells. They have spent the winter in semi-shade near the greenhouse and are looking good. I’m planning to let them grow on until next autumn when I will plant them in the woodland garden. One of the best indicators […]
          The Afternoon Sound Alternative 06-24-2015 with Dave Blackwood        
Playlist:

Django Django- Shake Tremble - Born Under Saturn
They Might Be Giants- Underwater Woman - Glean
- voicebreak -
Hot Chip- Huarache Lights - Why Make Sense
Bomba Estreo- Caderas - Amanecer
Sounds From The Ground- Step Into Now - 20 Years Of The Best Sounds From The Ground
Srikalogy- Dronesphere - New Paradigm
Jaga Jazzist- Big City Music - Starfire
Compilation- UFOs - The Best Of Undisputed Truth Smiling Faces
Billy Gibbons Co- Oh Well - Just Tell Me That You Want Me A Tribute To Fleetwood Mac
Willie Nelson Merle Haggard- Its All Going To Pot - Django And Jimmie
Sonny Knight The Lakers- Day Tripper Live - Do It Live
Monophonics- Promises - Sound Of Sinning
James Brown- Aint It Funky Now Pts 1 2 - Soul Pride The Instrumentals 19601969
- voicebreak -
Hiatus Kaiyote- Swamp Thing - Choose Your Weapon
Young Fathers- Still Running - White Men Are Black Men Too
A Tribe Called Red- Bodyslam - Suplex EP
Bonobo- Flashlight - Flashlight Single
Calle 13- Atrevetetete - Calle 13
The Mothers Of Invention- Help Im A Rock - Freak Out
Muddy Waters- I Wanna Just Make Love To You - Electric Mud
Jason Isbell- 24 Frames - Something More Than Free
Minutemen- Bob Dylan Wrote Propaganda Songs - What Makes A Man Start Fires
Matthew E White- Rock Roll Is Cold - Fresh Blood
Stefano Nyerenda- Women Today Take Care Of Business - I Have No Everything Here
Tony Allen- Moving On - Film Of Life Deluxe Edition
The Silver Lake Chorus- Hold Up For - The Silver Lake Chorus
- voicebreak -
Fito Olivares Kumbia Kings- Azcar - AB Quintanilla III Kumbia Kings Presents Greatest Hits Album Versions
The Clash- Clampdown - London Calling
James Kochalka- Hockey Monkey - Monkey Vs Robot
- voicebreak -
Goat- Goatchild - Commune
Bjrk- Black Lake - Vulnicura


playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/35/playlistDate/2015-06-24
          The Afternoon Sound Alternative 06-23-2015 with Wally        
Playlist:

John Frusciante- Murderers - To Record Only Water For Ten Days
Delicate Steve- Sugar Splash - Wondervisions
Department Of Eagles- Forty Dollar Rug - The Cold Nose
Maker- The Love We Have - Maker Vs NowAgain
New Orleans Suspects- Pocketful Of Grits - Ouroboros
Ty Segall- The Singer - Manipulator
Chico Trujillo- Playas Marinas feat Henrique Alvarez - Reina De Todas Las Fiestas
Goat- Goatslaves - Commune
Karl Hector The Malcouns- The Cave - Coomasi
Frank Solivan Dirty Kitchen- The Letter - On The Edge
The Tallest Man On Earth- Timothy - Dark Bird Is Home
Big Gigantic- The Night Is Young feat Cherub - The Night Is Young
Bjrk- Lionsong - Vulnicura
My Morning Jacket- Golden - It Still Moves
Run The Jewels ELP- Get It - Run The Jewels Instrumentals
A A Bondy- The Heart Is Willing - Believers
Tennis- Never Work For Free - Ritual In Repeat
Calexico- Alone Again Or - Convict Pool
Sohail Rana- Badal Aur Bijli - Disco Dildar
The Babysitters- Dancers Dont Go - Split Seams
Shakey Graves- The Perfect Parts - And The War Came
Rapidgrass Quintet- Cottonwood Pass - Crooked Road
Trampled By Turtles- Come Back Home - Wild Animals
The Polish Ambassador- Earth Versus The World - Diplomatic Immunity
The Felice Brothers- No Trouble - Favorite Waitress
Viet Cong- Pointless Experience - Viet Cong
Metronomy- A Thing For Me Breakbot Remix - A Thing For Me EP
Shpongle- Dorset Perception - Tales Of The Inexpressible
Donovan- Hurdy Gurdy Man - Hurdy Gurdy Man
William Onyeabor- Atomic Bomb feat Hot Chip - What
Father John Misty- True Affection - I Love You Honeybear
Lake Street Dive- My Speed - Lake Street Dive
El Puma- Whiter Shade - Casa De Mi Padre Original Motion Picture Soundtrack
Tim Kasher- Aspidistra - While No One Was Looking Toasting 20 Years Of Bloodshot Records
Foxygen- Brooklyn Police Station - And Star Power
Goat- Bondye - Commune
Galactic- Moog Marmalade - We Love Em Tonight Live At Tipitinas
Sierra Hull- What Do You Say - Daybreak
Frank Zappa The Mothers Of Invention- San Berdino - One Size Fits All
Emancipator- Soon It Will Be Cold Enough To Build Fires - Soon It Will Be Cold Enough
Warm Soda- All Grown Up - While No One Was Looking Toasting 20 Years Of Bloodshot Records
Heartless Bastards- Only For You - Arrow
Calexico- Algiers - Algiers


playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/20/playlistDate/2015-06-23
          The Afternoon Sound Alternative 06-01-2015 with Gavin Dahl        
Playlist:

Tour De Force- The Traveler StepArt Remix - Battle Cry Remixed
Rebirth Brass Band- On My Way - Move Your Body
The Budos Band- Shattered Winds - Burnt Offering
The Budos Band- Magus Mountain - Burnt Offering
Dengue Fever- No Sudden Moves - The Deepest Lake
Courtney Barnett- Elevator Operator - Sometimes I Sit And Think And Sometimes I Just Sit
Bob Darin- Me And Mr Hohner - Country Funk Volume II 19671974
Townes Van Zandt- Hunger Child Blues - Country Funk Volume II 19671974
Shakey Graves- Call It Heaven feat Esm Patterson - And The War Came
Scott H Biram- Nam Weed - Nothin But Blood
Hanni El Khatib- Chasin - Moonlight
Yogi Bear- The Missing Elephant - Huckleberry Hound The Great Kelloggs TV Show
Elephant Revival- Drop - Break In The Clouds
Euforquestra- Instant Coffee feat Kyle Hollingsworth - Fire
Ty Segall- Stick Around - Manipulator
The Very Best- Hear Me - Makes A King
Xperience- Evolve Away - All Your Friends Friends
AKA- Where The Free People Go - All Your Friends Friends
Tour De Force- Old Time Love - Battle CryBattle Cry Remixed
Lapalux- We Lost - Lustmore
Prefuse 73- Infrared feat Sam Dew - Rivington No Rio
THEESatisfaction- Planet For Sale - EarthEE
Iame Gold Miz- We Never Look Up - All Your Friends Friends
Ali Shaheed Muhammad Souls Of Mishchief- There Is Only Now feat Snoop Dogg - There Is Only Now Remix feat Snoop Dogg William Hart
Ali Shaheed Muhammad Souls Of Mischief- All You Got Is Your Word Instrumental - There Is Only Now Remix feat Snoop Dogg William Hart
Odesza- Sun Models feat Madelyn Grant - In Return
Odesza- White Lies feat Jenni Potts - In Return
Hard To Find- Robert Koch - Antennae Presents Acid Crunk Vol 2
Slow Magic- Waited 4 U Odesza Remix - Single
Bjrk- Mouth Mantra - Vulnicura
Caribou- Cant Do Without You - Our Love
Doldrums- We Awake - The Air Conditioned Nightmare
Bonobo- Return To Air - Flashlight Single
La Santa Cecilia- Tainted Love - El Valor EP
Antibalas- Dirty Money - Dirty Money Single
Eno Hyde- Dbf - High Life
Bob Marley The Wailers- And I Love Her - Greatest Hits At Studio One
Jim Ford- Rising Sign - Country Funk Volume II 19671974
Courtney Barnett- Kims Caravan - Sometimes I Sit And Think And Sometimes I Just Sit
PJ The Galaxies- One Mint Julep - Rare Surf Vol 1
Compilation- Leap Frog - Verve Jazz Masters 10 Dizzy Gillespie
Cannonball Adderley- Ill Remember April - Cannonball Enroute
Paul Oscher- Cannonball Rock - The Best Of Paul Oscher Vol 1


playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/5/playlistDate/2015-06-01
          The Afternoon Sound Alternative 03-27-2015 with Nat        
Playlist:

- voicebreak -
- voicebreak -
- voicebreak -
Laibach- Final Countdown - Nato
Portishead- Machine Gun - Third
Talking Heads- Listening Wind - Remain In Light Remastered
Brian Eno David Byrne- Regiment - My Life In The Bush Of Ghosts
Atomic Ape- Passenger - Swarm
Tom Waits- Starving In The Belly Of The Whale - Blood Money
Man Man- Zebra - The Man With A Blue Turban With A Face
Ben Gallagher- Beleaguered - Heart Shaped Rocks
Sparklehorse- Weird Sisters - Vivadixiesubmarinetransmissionplot
Paleo- A View Of The Sky - A View Of The Sky
Ian Cooke- Vasoon - The Fall I Fell
Deerhoof- Oh Bummer - La Isla Bonita
Various Artists- Gang Of Four Naturals Not In It - Marie Antoinette
Television- See No Evil - Marquee Moon
Bostich Fussible- Into Your Heaven - Motel Baja
Amsterdam Klezmer Band- Op Je Hoede feat Lilian Vieira - Blitzmash
Lisandro Meza Y Su Combo Gigante- Juventud Flaca Y Loca - The Afrosound Of Colombia Vol 2
La Sucursal De La Cumbia- Rtmo Popular - Cumbia A Domicilio
Goran Bregovic- Cajesukarije Cocek - Ederlezi
Balkan Beat Box- Cha Cha - Balkan Beat Box
Burning Spear- Jordan River - Marcus Garvey Garveys Ghost
The Gladiators- Looks Are Deceiving - Trenchtown MixUp
Midnite- Banking In The Pig - Ras Mek Peace
The Viceroys- Ya Ho - The Viceroys Inna De Yard
Willie Williams- Master Plan - The Legendary Studio One Records
Prince The Revolution- Erotic City - The Hits The BSides
Compilation- Its A New Day Pts 1 2 - In The Jungle Groove
Sly The Family Stone- I Want To Take You Higher - Stand Bonus Version
JeanClaude Vannier- LOurs Parasseux - ElectroRapide
Moondog- Minisym 1 - Moondog
Black Moth Super Rainbow- Psychic Love Damage - Cobra Juicy
Ten And Tracer- Dodecahedron Leads The Way - Youll Be A Hero Soon Speaker
Bjrk- Black Lake - Vulnicura


playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/65/playlistDate/2015-03-27
          The Afternoon Sound Alternative 02-27-2015 with Nat        
Playlist:

- voicebreak -
- voicebreak -
- voicebreak -
Black Sabbath- Sweet Leaf - Master Of Reality
Halden Wofford And The HiBeams- Pretty Boy Floyd - Rocky Mountain Honky Tonk
International Submarine Band- Truck Driving Man - Truckers Kickers Cowboy Angels The Blissed Out Birth Of Country Rock Volume 1 19661968
The Byrds- One Hundred Years From Now - Sweetheart Of The Rodeo
Buffalo Springfield- Pay The Price - Buffalo Springfield
The Dillards- Nobody Knows - Truckers Kickers Cowboy Angels The Blissed Out Birth Of Country Rock Volume 1 19661968
Creedence Clearwater Revival- Fortunate Son - Willy And The Poor Boys 40th Anniversary Edition Remastered
Songs Ohia- Farewell Transmission - Magnolia Electric Co 10th Anniversary Deluxe Edition
Lisandro Meza- Cumbia Negra - Realeza De La Cumbia Sonidera
Los Corraleros De Majagual- Si No Me Quieres No Me Engaes - Que Rico Sabor Colombiano
Chancha Via Circuito- Bosques Va Temperley feat Kumbha Kethu - Rodante
Senor Coconut Y Su Conjunto- Autobahn - El Baile Aleman
Davie Allan The Arrows- The Chase - The Wild Angels Original Motion Picture Soundtrack
Ronee Blakley- Tapedeck In His Tractor - Nashville The Original Motion Picture Soundtrack
Pere Ubu- Caligaris Mirror - Dub Housing
Davie Allan The Arrows- Theme From The Wild Angels - The Wild Angels Soundtrack
Talking Heads- Road To Nowhere - Little Creatures Remastered
- voicebreak -
- voicebreak -
Rabbit Rumba- Nuestro Ayer - Soul Jazz Records Presents Gipsy Rhumba The Original Rhythm Of Gipsy Rhumba In Spain 19651974
A Hawk And A Hacksaw- Foni Tu Argile - Dlivrance
Besh O Drom- Makedn - Gy
Mariana Sadovska- Kupala - Just Not Forever
Bjrk- Atom Dance - Vulnicura
Equulei- Polemic Verses - Fifteen Hours Twenty Eight Minutes
Arovane- Cleiy - Ve Palor
Aphex Twin- CIRCLONT6A 14198 syrobonkus Mix - Syro
Aphex Twin- Diskhat1 - Computer Controlled Acoustic Instruments Pt2 EP
Aldo Ciccolini- Trois Gymnopdies 1888 I Lent Et Douloureux - Essential Satie
Geinoh Yamashirogumi- Primordial Germination - Ecophony Rinne
Messer Chups- Mess Surf - Cocktail Dracula
Malory- Beauty - Not Here Not Now Remastered Bonus Tracks
Oneohtrix Point Never- Meet Your Creator - Commissions I Single


playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/65/playlistDate/2015-02-27
          The Afternoon Sound Alternative 02-13-2015 with Nat        
Playlist:

- voicebreak -
- voicebreak -
- voicebreak -
- voicebreak -
Ian Cooke- Music - The Fall I Fell
Ark Life- Let Your Heart Break - The Dream Of You Me
Paper Bird- Blood Bones - Rooms
Dovekins- Golden Pennies - Assemble The Aviary
Spirits Of The Red City- Halfway Poem - Jula
Porlolo- Cannonball - Everything Barely Single
- voicebreak -
Clouds Mountains- Little Bear - Slumber
Tunng- Surprise Me 44 - This Is Tunng Mothers Daughter And Other Tales
Mm- Green Grass Of Tunnel - Finally We Are No One
Bjrk- Lionsong - Vulnicura
Mahogany- Optimism - The Dream Of A Modern Day
My Bloody Valentine- I Only Said - Loveless
Blonde Redhead- Dr Strangeluv - 23
Tujiko Noriko- Tokyo Tower - From Tokyo To Naiagara
Massive Attack- Teardrop - Mezzanine
King Tubby- Freak Out Skank The Upsetters - In Fine Style
Twilight Circus Dub Sound System- Lowell And Nine Dub Plate - Dub Plate Selection
Rhythm Sound- Dem Never Know Sleeparchive Remix - See Mi Yah Remixes
Tiken Jah Fakoly- Le Prix Du Paradis - Dernier Appel Canada Version
Igorrr- Tendon - Baroquecore Ep


playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/65/playlistDate/2015-02-13
          The Jobs Most Vulnerable to Automation        

Any parent or teenager not thinking very hard about this list is putting themselves at a severe disadvantage. And a lot of the jobs will surprise you. Being a waiter at a restaurant is remarkably resilient because the robots required to move around quickly, juggle lots of food, make quick adjustments, read peoples’ temperaments, attitudes, etc., and adjust...

__

I do a weekly show called Unsupervised Learning, where I curate the most interesting stories in infosec, technology, and humans, and talk about why they matter. You can subscribe here.


          Unsupervised Learning: No. 74        

This week’s topics: Shadow Brokers, fingerprinting Netflix traffic, Magneto vuln, Juniper advisories, Amazon speaker tech, Facebook’s 100Gbit optical switches, Google Hire, Minecraft currency, a solar-powered water harvester, OWASP Top 10 draft comments, remote SSH, EC2 and NAT firewalls, deep learning is a black box, discovered links, and more… This is Episode No. 74 of Unsupervised Learning—a weekly show...

__

I do a weekly show called Unsupervised Learning, where I curate the most interesting stories in infosec, technology, and humans, and talk about why they matter. You can subscribe here.


          What is the role of a permanent indwelling urethral catheter in the treatment of BPH?        

The post What is the role of a permanent indwelling urethral catheter in the treatment of BPH? appeared first on Health tips.

Some sufferers with prostatic obstruction and a vulnerable bladder will be unable to void, despite what kind of surgical intervention is employed. A few of these sufferers select to be managed with an indwelling...


          Sex Trafficking and the Refugee Crisis: Exploiting the Vulnerable        
Caroline O’Leary is an intern in the Ce

          31 DE MARZO -         
DÍA NACIONAL DEL AGUA Sabemos que el agua es imprescindible para el ser humano y todos los seres vivos, sin ella es imposible la vida. Con el objetivo de estimular en todos los argentinos la conciencia en el uso de los recursos hídricos, se estableció que el 31 de marzo se celebre el Día Nacional del Agua, por Resolución Ministerial N° 1630 del año 1970. El agua es un recurso renovable, limitado, frágil y vulnerable. Si bien abunda en el planeta, solo el 3% es dulce, apta para el consumo humano. La escasa reserva de agua en el mundo, sometida a una presión sin precedentes, a causa del crecimiento demográfico, la evolución del estilo de vida y los progresos de la industrialización, representa una preocupación alarmante por el agotamiento de las capas freáticas, desecamiento de lagos y ríos, contaminación y desertificación crecientes.

          Elf Draws on Pictures        
The Elf used a white board marker and drew on my kids pictures.  They got a kick out of it, but then thought it was okay to do it themselves.  






          Man United vs Man City tactical preview: Why aggression could help Jose pummel Pep        
Jose Mourinho is not known for building fervent pressing machines like Jurgen Klopp, Mauricio Pochettino or Pep Guardiola are. The Portuguese tends to prefer compact sides who wait for opponents inside their own half and come armed with a gameplan based on transitions that catch defences off guard. This reactive tendency has seenManchester United cede the initiative to their rivals; across their first two league games, against Bournemouth and Southampton, they averaged less than 50% possession. But against Manchester City on Saturday, recent trends suggest Mourinho would be wise to adopt a more aggressive approach in the opening stages in a bid to take an early lead. Flying out the blocks The indications come from certain high-stakes games involving various Guardiola sides. While the Catalan is a master at conceiving strategies tailored to each opponent, his basic principles never change: press high, move the ball quickly, play it out from defence. The discarding of Joe Hart underlines the importance Guardiola places upon building from the back, as do the expensive acquisitions of John Stones (£47.5m) and Claudio Bravo (£15m). The most common consequence of such a strategy is that Guardiola’s men regularly overwhelm the opposition with their intensity, movement and precision, as they did in the first half against West Ham. But there have been times when teams press them high in the opening stages, taking advanting of the fact that Guardiola's passing game hasn't had chance to settle into a rhythm. At its best, this approach leads to an early opening goal, allowing teams to sit back and counter-attack while protecting their 1-0 lead. The 20-second goal There have been some notable examples. One was the 2009 Champions League Final, in which Sir Alex Ferguson told his players to close down all options whenever Victor Valdes had the ball. Within eight seconds, they'd forced the Barcelona goalkeeper into passing it over the touchline. Still inside 90 seconds, Cristiano Ronaldo's free-kick was nearly converted by Park Ji-sung on the rebound. After nine minutes, United led 5-0 on shots. Only then did Samuel Eto’o score. “We had been lucky to survive the opening minutes,” Guardiola later said. In December 2011, Mourinho followed suit with his own team. In a crucial Clásico at the Santiago Bernabeu, Real Madrid pressed Barça high up the pitch, closing down all options; Valdes duly played a short pass which was intercepted outside the box, leading Karim Benzema to score after just 20 seconds. Guardiola later made clever changes to win it 3-1, but the initial pressing strategy had paid off. Another instance came last April, when Atletico Madrid faced Bayern Munich at home in the Champions League semi-finals. Diego Simeone launched intensive pressure in the first 15 minutes, with a rocking Vicente Calderon roaring every challenge. Bayern seemed stunned and, on 11 minutes, Saul Niguez slalomed past three players to score. Atletico then dropped deeper and sealed a 1-0 win. A City under construction Judging by the two most recent examples, it could work in United's favour that the first Manchester derby of the season takes place at Old Trafford; both Madrid and Atletico scored their early goals when inspired by a feisty home crowd, and the Red Devils will surely kick off the derby backed by a cauldron of noise. Yet an even bigger advantage is the opposition itself. The three aforementioned examples have all been against glittering Guardiola sides who were well-accustomed to his methods. Barça had nearly played a full season under him by the 2009 final, and were even better drilled by late 2011. Bayern had worked with him for nearly three years by the time they visited the Calderon last season. Saul scores against Bayern Furthermore, the players were better. Valdes and Manuel Neuer were among the best goalkeepers on the ball in Europe. Guardiola could also count on slick defenders such as Gerard Pique and Jerome Boateng, playmakers such as Xavi and Thiago Alcantara, and, perhaps most crucially, defensive midfielders like Sergio Busquets and Xabi Alonso, who hardly ever lost the ball no matter how great the pressure. For now, City fall short of such standards. The players are gifted but have only played three league games under Guardiola and will need months to fully master his complex ways, the process of playing out from the back being no exception. Bravo, who might make his debut against United, has never played with his team-mates before. The underlying relationships that united Barça and Bayern will not yet have been forged at City. Neither is Stones at the level of Pique or Boateng, and the full-backs are still learning their new inverted roles. Anchorman Fernandinho, while an excellent all-round midfielder, is no Busquets or Alonso in possession. City are still building under Guardiola and would surely be far more vulnerable when playing out from the back than any of the sides mentioned above. Signs of shakiness Some nervy episodes have already taken place against more modest opposition. City started the season by conceding a free-kick to Sunderland just outside the box after a misplaced Aleksandar Kolarov pass had ruined an attempt to play their way out. On another occasion, Willy Caballero sent the ball straight to Duncan Watmore, who started a dangerous move. The process did not look completely fluent at Stoke either, where Caballero had a pass-completion rate of just 58.3%. Such factors may tempt Mourinho into launching another offensive early on. His players have been impressively organised without the ball in United's first three league games and already seem to grasp the defensive structure. He rightly believed that Madrid could press Barça into errors back in 2011. On Saturday, a repeat of that strategy might well be worth a try. NOW READ THESE The 10 best Manchester derbies ever Quiz! Can you name the lineups from Man United 3-1 Man City (2006/07)? New features every day on FourFourTwo.com