#queue for all of your electronic espionage needs
Explore tagged Tumblr posts
Text
I am in the weeds of querying literary agents again, and I just despair at how demotivating it is. I started querying when agents still wanted postal submissions (this makes me sound ancient; I am not) and I got more responses through post than I do now through email.
Maybe I am just a bad writer.
#queue- for all your electronic espionage needs#amwriting#literary agents#the monumental task of attempting trad publishing
2 notes
¡
View notes
Text
Absolutely to all of this!
I only really started to learn about colonialism and its impacts once I got to university - and thatâs too late for so many people, and only because I did a social sciences degree.
Itâs also a wider problem than just our school curriculums - our museums, public broadcasting and even our public monuments donât mention them either.
Real talk, as a teacher in England I can confirm that the British government does everything and anything to avoid teaching the true extent of colonial history to English kids.Â
You ask a modern English teenager about Northern Ireland and they probably canât tell you about fucking anything currently going on there bar âI think we werenât nice to themâ, and thatâs the country next fucking door so you know they donât know shit about India or the Middle East.
The English government PURPOSEFULLY does not teach English children the real inâs and outâs of the British Empire despite a recent call to âwiden the breadth of our curriculumâ because then where would our football hooligans who defend statues come from?Â
Have a good conversation with any bald headed English bloke wearing an England football shirt with an EDL tattoo and test his knowledge of the Empire he loves so much. 100 quid he knows fuck all beyond âwe civilized those people!â
And this is why no one fucking likes us, because thereâs no active effort to teach our younger generations why we were wrong or how to make things better, but thereâs a clear educational agenda to shield young English children from any extensive criticism of England.
48K notes
¡
View notes
Text
Original Post from Security Affairs Author: Pierluigi Paganini
Cyber security expert Marco Ramilli explains the difficulties for scraping the âTOR networksâ and how to enumerate hidden-services with scrapers.
Scraping the âTOR hidden worldâ is a quite complex topic. First of all you need an exceptional computational power (RAM mostly) for letting multiple runners grab web-pages, extracting new links and re-run the scraping-code against the just extracted links. Plus a queue manager system to manage scrapers conflicts and a database to store scraped data need to be consistent. Second, you need great starting points. In other words you need the .onion addresses where your scrapers start from. You might decide to begin from common and well-known onion links such as The TOR-hidden-wiki or to start from great reddit threads such this one, but seldom those approaches bring you to what I refer as âinteresting linksâ. For this post âinteresting linksâ means specific links that are rare or not very widespread and mostly focused on cyber-attacks and/or cyber-espionage. Another approach needs be used in order to reach better results. One of the most profitable way to search for âinteresting linksâ is to look for .onion addresses in temporal and up-to-date spots such as: temporal pasties, IRC chats, slack or telegram groups, and so on and so forth. In there you might find links that bring you to more rare contents and to less spread information.
Today I want to start from here by showing some simple stats about scraped .onion links in my domestic scraping cluster. From the following graph you might appreciate some statistics of active-and-inactive scraped hidden services. The represented week is actually a great stereotype of what Iâve got in the last whole quarter. What is interesting, at least in my personal point of view, is the percentage of offline (green) onion services versus the percentage of online (yellow) onion services.
This scenario changed dramatically in the past few months. While during Q1 (2019) most of the scraped websites were absolutely up-and-running on Q2 (2019) I see, most of the scraped hidden services, dismissed and/or closed even if they persists in the communication channels (IRC chat, Pasties, Telegram, etc.).
I think there are dual factors that so much affected last quarter in spotting active hidden service. (1) Old content revamping. For example bots pushing âinteresting linksâ back online even after months of inactivity. This activity is not new at all, but during the past quarter has been abused too many time respect to previous quarters. (2) Hidden services are changing address much more fast respect to few months ago. In order to make hard to spot malicious actors, they might decide to keep up-and-running their hidden services only for few hours and then change address/location. Is that way to enumerate hidden-services passing away or is it a simple weird time-frame? We will see it during the next âScrapingâ months, stay tuned !
About the author: Marco Ramilli, Founder of Yoroi
I am a computer security scientist with an intensive hacking background. I do have a MD in computer engineering and a PhD on computer security from University of Bologna. During my PhD program I worked for US Government (@ National Institute of Standards and Technology, Security Division) where I did intensive researches in Malware evasion techniques and penetration testing of electronic voting systems.
I do have experience on security testing since I have been performing penetration testing on several US electronic voting systems. Iâve also been encharged of testing uVote voting system from the Italian Minister of homeland security. I met Palantir Technologies where I was introduced to the Intelligence Ecosystem. I decided to amplify my cybersecurity experiences by diving into SCADA security issues with some of the biggest industrial aglomerates in Italy. I finally decided to found Yoroi: an innovative Managed Cyber Security Service Provider developing some of the most amazing cybersecuritydefencecenter Iâve ever experienced! Now I technically lead Yoroi defending our customers strongly believing in: Defence Belongs To Humans.
This analysis and many other studies and tools are available on Marco Ramilliâs blog:
https://marcoramilli.com/2019/07/18/scraping-the-tor-for-rare-contents/
window._mNHandle = window._mNHandle || {}; window._mNHandle.queue = window._mNHandle.queue || []; medianet_versionId = "3121199";
try { window._mNHandle.queue.push(function () { window._mNDetails.loadTag("762221962", "300x250", "762221962"); }); } catch (error) {}
Pierluigi Paganini
(SecurityAffairs â Tor network, DarkWeb)
The post Scraping the TOR for rare contents appeared first on Security Affairs.
#gallery-0-5 { margin: auto; } #gallery-0-5 .gallery-item { float: left; margin-top: 10px; text-align: center; width: 33%; } #gallery-0-5 img { border: 2px solid #cfcfcf; } #gallery-0-5 .gallery-caption { margin-left: 0; } /* see gallery_shortcode() in wp-includes/media.php */
Go to Source Author: Pierluigi Paganini Scraping the TOR for rare contents Original Post from Security Affairs Author: Pierluigi Paganini Cyber security expert Marco Ramilli explains the difficulties for scraping the âTOR networksâ and how toâŚ
0 notes
Text
014%
The warehouse that Mars Company was based in was quite a distance away. David took a taxi cab to pick up Kat, and then pretty much had the driver go back the entire way and then some. When they arrived, David was down close to 50��. After paying the driver the pair had decided to scout the area. There was almost nothing around, the warehouse itself sat in a small valley created by the soft rises of hills all around it. There was a dirt road leading to a loading area that was locked up tight. Despite looking dilapidated and abandoned the numerous tire tracks in the dirt around the building showed that it was being regularly used.
âThink anyoneâs home?â Kat asked.
âAs soon as I unlock my latent psychic powers, Iâll let you know,â David replied, a hint of irritation in his voice.
âAre you in a bad mood?â
âNot at all. I love being covered in dirt.â
Just before theyâd arrived, so they could approach the warehouse undetected Kat had pushed David into a ditch and kicked a thick cloud of dirt on him. She hadnât done anything similar to herself, stating simply that since her clothes and skin were already stained by a layer of mud, dirt and unidentifiable stains it would be unnecessary.
After a couple of seconds Kat asked, â⌠Was that sarcasm?â
âYes, it was!â David snapped at her.
âItâs just hard to tell. You donât emote enough. Itâs like usual you is thisâŚâ she pulled a serious, glum face. ââŚand grumpy you is this,â her face twitched but there was no noticeable difference between the two expressions.
His temper running thin David was about to retort when he noticed Katâs expression. She was trying to appear jokey like normal but deep in her eyes was not quite fear⌠maybe it was apprehension. As usual the nuances of human expressions was foreign to him but he knew enough to realise that the girl was not herself.
He looked back at the warehouse. If their information was right, somewhere in there were the members of Katâs band of waifs. As the man called Angel had attempted to point out, the chances of them all being alive at this point was slim. For all they knew this might just be a home for mercenaries and the kids were somewhere else entirely. The boy surmised that this uncertainty may be the cause for his companionâs odd mood.
â⌠Listen⌠Kat⌠I think we should talk about what we could-â David began saying trying his best to be tactful.
He was cut off though by the girl beside him though. âDonât say another word. If you do Iâll break your legs and leave you here to rot.â
He gulped. While he doubted she would actually do it there was still a little voice warning him that she might. After all she had almost suffocated him.
âFineâŚâ he eventually said.
âYeah. Fine.â
They stared silently at the warehouse for a while, David unsure of the protocol for moving a conversation along after what basically amounted to a death threat and Kat lost in her own musings. Eventually though he found the silence to be as suffocating as her arm on his throat so he asked meekly, âWhat now?â
âWe break in,â Kat replied.
âAh, right⌠How?â
ââŚâ
Remembering the last time theyâd had this conversation when sneaking into his Grandfatherâs lab David warned her, âI donât think walking through the front door and pretending to be a couple will work this time.â
âShut up. Iâm thinking.â He obeyed immediately.
This espionage stuff wasnât his forte. Now that he thought of it, why had he come? He wasnât athletic. He couldnât fight. He wasnât good at thinking on his feet. All he was good at was learning and analysing. Basically, wasnât David being here a huge waste of time? Then again he did have something he wanted to investigate, something he couldnât leave up to the girl beside him. Perhaps that selfish reason wasnât enough for him to stay but that wouldnât stop him. Not where daddy dearest was involvedâŚ
âAlright. I have an idea!â Kat declared suddenly. âWe will sneak down and go in through the front door.â
He let out an exasperated sigh. â⌠I think this just the couple plan again? Or, what? Weâre going to be door to warehouse door salesmen this time.â
âWeâll sneak in.â
âAnd they will shoot us or capture us or maybe both. On second thoughts I think this is even worse than the couple plan. At least it didnât end with our brain matter splattered across a warehouse wall.â
âIt will work. They wonât be expecting people to just walk in through the front door,â Kat nodded sagely.
âWhatever happened to sneaking?â David let out another sigh. A common saying was that when you sighed you chased away your happiness. If so David had probably chased his off the planet by now. âJust a reminder, if they do expect people to âjust walk in through the front doorâ weâll be dead in a second.â
Kat froze. After further thought she replied, âWell do you have a better idea?â
It was Davidâs turn to freeze. He didnât have a better idea. In fact he had no idea. Even if he tried to formulate an idea now it probably would make about as much sense as going in through the front door. Picturing his inevitable death, he agreed by saying, âObjection retracted.â
They waited for a little more and then on Katâs queue they stood up and ran down the hill. While she was quick and lithe keeping close to the ground like a predator, David couldnât have been called stealthy, bumbling forwards with all the grace of drugged giraffe.
When they reached the door Kat began examining it while David knelt down trying to get air into his lungs. He hadnât run more than twenty metres but that had been enough to make him short of breath. âI really⌠need to⌠exercise moreâŚâ
âIâll say. What part of that was supposed to be stealthy?â Kat muttered as she pulled a pair of bobby pins out of her coat and began picking the doorâs lock. After a few seconds, she cursed. âDamn it! What the hell!?â
âWhatâs the problem?â David asked.
She pointed at the lock on the door. Rather than the traditional pin tumbler lock, it was a combination electronic and pin tumbler lock. There was a digital display with room to input four numbers, below that a keypad and finally at the bottom the keyway. Unlike the rest of the building this lock was shiny and new.
âMaking it one or the other would be too bloody easy wouldnât it,â she spat. She stepped back from the door a bit. Then she spun on her heel and kicked out, delivering a solid blow to the door.
David figuratively leapt out of his skin. âAre you out of your mind!â he hissed. âWhat happened to stealthy?â Kat wasnât listening to him though, she walked off grumbling and swearing. He called out after her, âHey, where are you going?â
âTo find another entrance!â she shouted back.
Holding in the sigh trying to escape him, David turned back to face the door. From the way she was acting, clearly just picking the pin tumbler lock wasnât going to get the job done. Theyâd need to crack the keycode to get in. Something was off thoughâŚ
Confirming that the digital display was off, David reached forward and gave the keypad a poke. However nothing happened. âHmmâŚâ He shut his eyes. According to his grandfather the only problems that didnât have a solution were ones designed to trick people. Assuming this lock wasnât a trick then there had to be a way to open it. âIf you canât solve a problem think about it in reverse. Look at your facts. Collect assumptions. Analyse then theorise. Thatâs the trick to solving any problem,â he said quoting his grandfather. Â
âProblem: Keeping people out of a facility,â David thought, his brain running into high gear.
âFacts: Combination electronic and tumbler lock. Tumbler lock will not turn. Keypad unresponsive.â
âAssumptions: Electronic look is working as intended. Electronic and tumbler lock linked in some manner. Kat can actually pick locks.â
âPossibility: Scans fingerprints?â
âViability... improbable. There is no sign some kind of scanner.â
âPossibility: The digital display lights up when the correct code has been entered.â
âViability⌠implausible. Ease of use poor.â
âPossibility: Electronic lock is not receiving power.â
âViability⌠high. Problem: How is the lock supplied power?â
â⌠The key.â
â⌠Most likely answer.â
âThereforeâŚâ
âWhat are you doing?â asked Kat. David leapt to attention. Heâd been focusing so much he hadnât noticed her approaching.
Clearing his throat, he said, âI, uh⌠Think I know how the lock works. Basically, unlocking the door is a three-step process. Step 1: You insert the key. This completes a circuit supplying power to the electronic lock. Step 2: Without removing the key, enter the correct code. This will deactivate some kind of mechanism preventing the key from being turned. Step 3: Turn the key, unlocking the door and entering.â
Kat nodded, listening to his explanation. When he finished she asked, âSo? Whatâs the code?â
âIâm still figuring that out. Give me a minuteâŚâ
He turned back to the lock and focused on the keypad. This electronic lock was laid out like mobile phone number pad with 1 in the top left corner, 9 at the bottom right and below 9 in a row all its own, the number 0. As heâd noted before the digital screen only had room for four digits.
Locks like these were essentially a math problem. You have four slots, each slot must be filled with a number and in total you have ten numbers, it was possible for numbers to be repeated. If each space can be filled with one of ten numbers, then there were 10x10x10x10 or 10,000 possible combination of numbers. Since there was only one correct answer your odds of getting the combination right is 1/10000.
One solution to the problem would be to brute force it, entering every possible combination until he hit the right answer. If he was unlucky though the last combination, he tried would be the correct one meaning heâd have to enter all 10,000 combinations. That would clearly take too long. So, he had to narrow down his choices.
The easiest way to do that would be wear. The oils in a personâs finger would polish buttons when they were pressed, the more the button was pressed or the earlier it was in the combination the shinier the button would be. Due to the lock being new it was hard to tell unless you were looking closely but the 2 was the slightest bit shinier then the rest of the buttons. The code probably started with 2. That was about all he could discern examining the lock. At least heâd narrowed down his choices considerably, from 10,000 to 1,000.
Next, people usually used easily remembered numbers for their passwords. He had to hope his father had set the code on the lock and not anyone else. What were the easiest four digit numbers to remember? PIN codes, post codes and dates, a memorable or important one.
âImportant datesâŚâ David muttered. Fortunately, there were not many important dates his father may have used as a code that began with 2. In fact he could only think of three.
He grit his teeth as he started to get a headache. He wasnât thinking that hard was he or was this just his chronic headache choosing now to flare up? He hadnât thought to bring his headache tablets with him today so he had to push through it.
Three dates. Which was the most likely? Two of them he was sure he could write off; they were the day he was born and the day his mother died.
He flinched at the sudden lance of pain that went through him. This headache was one of the worst heâd hadâŚ
âHe wouldnât use those,â David said. To his father both those days were probably the last thing he wanted to think about it. That left only one more option.
âI have the code,â he declared. âWe can unlock it now.â
âIâm doubtful but fine, letâs give it a whirl. Taking out her pins again she set to work on the lock. When the digital display lit up David leaned over her and entered 2-4-0-9 on the keypad. The digital display flashed green and Kat turned the lock and opened the door.
Pushing down the pain he moved to enter the final date, the day his mother was born. 2-4-0-9.
Kat stood up dusted herself off. Then, overflowing with pride she said, âWow, Iâm a genius. I knew there was a reason I brought you along.â
âJust get in would you,â David growled. By this point he knew better then to take her seriously. Kat shrugged and cautiously pushed the door open, slipping through it when she could just fit through. David followed close behind her.
Inside was a long empty corridor, it wasnât just long though but also wide. The nearly 190cm tall boy estimated it would take him six steps to get from one side of the corridor to the other. The floor was a solid concrete slab while the roof, also concrete was domed joining seamlessly with the walls, he felt like he was standing in a concrete half-cylinder. Along the walls every couple of paces were metal beams, acting as buttresses. Apart from that though the corridor was empty.
Kat had already gone ahead, she was standing near the end of the corridor. She appeared to be peeking furtively around a corner. Although from Davidâs perspective it just looked like she was pressed up against the wall admiring the other end of the half-cylinder. As David was about to call out and ask her what she saw, she hurried back a terrified look on her face.
âNo questions. Wrap this around yourself and then hide,â she ordered throwing her coat at him.
âWhy? Whatâs-â Â David started to say but Kat snapped at him.
âShut up and get in that corner!â she pointed at the darkest spot in the corridor, the corner beside the door that just entered through.
Before he could attempt to ask her anything else Kat ran over to one of the buttresses and began climbing it. When she was hanging from the ceiling she pulled herself over and lay flat in the lip of the metal beam. If someone was walking down the corridor towards the exist as long as they didnât look back sheâd be invisible.
Realising with a start what was going on David ran to the corner Kat had indicated. Curling up and making himself as small as possible he wrapped the coat around himself, hoping it would work as camouflage. His heart was thudding in his ears and he thought his breathing was loud. When he heard the sound of people talking both those noises disappeared.
Whoever was coming, they were wearing heavy boots, the thudding as their soles hit the floor replacing the sound of Davidâs frozen heart. There appeared to be two people talking but they werenât speaking English. In fact they were speaking different languages. The two speakers were male but despite hearing two voices speaking and two sets of footsteps only one of the people talking was actually there. The one there was talking in French which David knew pretty well. The other, which appeared to be emanating from some kind of walkie talkie spoke in German. David only knew bits and pieces of German but he could tell that the two people speaking different languages understood each other.
The two voices got closer and pushing down the fear that he would hear shouts of alarm or feel a hand coming down on his shoulder, he listened intently to the conversation. He translated what he could and made educated guesses to the bits he couldnât understand. Before he knew it the voices were coming from right beside him.
Then the door was opened, light from outside spilled in but hidden behind the now open doorway it didnât illuminate David. The two people went outside and the door swung shut.
David remained frozen for a while but when he heard the soft thump of Kat dropping to the ground he let out the breath he hadnât realised heâd been holding and his heart began beating again. He stood up and turned to Kat. Without her bulky coat on she looked a lot slimmer. He could see her small chest rising and falling, the exertion of climbing the buttress had left her short of breath.
David took off her coat and handed it to her. Whipping it back on she smiled. Not a friendly smile but the feral smile of a cat that had found its prey. âWell weâre in the right place. I recognised one of them, he was the guy I kicked in the nuts back when they tried to take me.â He decided to ignore the note of satisfaction in her voice as she remembered that event. âMan, though, I canât tell if we were lucky or unlucky. If weâd been out there even one more minute those guys would have run right into us.â
âIt wasnât luck, they wouldnât have come,â David corrected her absentmindedly still busy translating what heâd heard in his head.
âHuh?â
âBy the sounds of it there was some kind of device on the door that alerts a control room whenever the door is opened. Since the door opened those to came to investigate who had entered.â
Coming back to himself David noticed Kat staring at him in shock, âYou understood that?â
David gave a noncommittal grunt. âI understood the French pretty well but the German was a lot of guesswork.â
âWhat did they say?â Kat demanded.
David closed his eyes and replayed the conversation in his head before translating, âThe one who was actually here was saying⌠That he couldnât see anyone. Then⌠the one on the radio, the one speaking German said⌠It might have been break out not a break in. The French one questioned if it was possible for the guineas to break out, but he said that they⌠what did they call themselves⌠Right, Charlie Team. They said they would go outside and look for any signs of the runaway. Then the German guy said, heâd send another group to check if⌠the rats were still in their cages?â
A hopeful light glimmered in Katâs eyes. âYou donât meanâŚâ
David nodded, âI think your family might be here.â
0 notes
Photo
I miss home. Never thought I would, but I do.



Haunted Meayll Hill Stone Circle, Isle of Man
Meayll Hill (Mull Hill) is not a true stone circle, but a unique group of Neolithic chambered tombs built around 3500 BC. These tombs are characteristic for Neolithic farmers in the British Isles, but the arrangement of 12 of them in ring formation is very unusual and no one knows why they were arranged this way. A group of stone foundations of Neolithic huts can be found nearby to the east with an ancient pathway running between the two sites.
According to local lore, some visitors have had unpleasant paranormal experiences at Meayll Hill, including the feeling of sudden disorientation. Others have seen unexplained moving lights and heard strange sounds, like the cadence of invisible horses trotting or galloping by. One tale says that a phantom army of horsemen has been seen riding along the circle.
The site is located just outside the village of Cregneash at the southern end of the Isle of Man, in the Irish Sea between England and Ireland.
Click here to aerial video of Meayll Hill.
1K notes
¡
View notes
Text
How to protect you pc from spammers, spam web pages.
New Post has been published on https://workreveal.biz/how-to-protect-you-pc-from-spammers-spam-web-pages/
How to protect you pc from spammers, spam web pages.
Preserve a âsmoothâ deal with.
While emailing to unknown events; posting to newsgroups, emailing lists, chat rooms and different public areas on the internet; or publishing a Web page that mentions your address, it is nice to try this from a âaspectâ account, a few pseudonymous or simply exchange address, and to apply your essential or desired deal with only on small, participants-best lists and with regarded, trusted people. Addresses which are posted (at the same time as a part of message headers) in public spaces can be without problems discovered through spammers (on-line junk e mailers), spam web pages and brought to their listing of targets. If your public âthrow awayâ deal with receives spammed enough to end up disturbing, you could without a doubt kill it off, and begin a brand new one. Your buddies, boss, and so forth., will still understand your âactualâ cope with. you may use a free (advertising and marketing-supported) provider company like Yahoo Mail or Hotelectronic mail for such âsideâ accounts. itâs miles fine to use a ârealâ net carrier provider in your fundamental account, and to study their privateness guidelines and phrases of service, as some âfreee mailâ offerings may additionally have poor privateness track facts. you may discover it works pleasant to use an package that allows mulitiple consumer IDs and addresses (a.okay.A. âpersonalitiesâ, âaliasesâ) so that you do no longer need to switch between more than one packages to manange and use multiple cope with
(although you may have to use an internet browser in preference to an application to read your electronic mail On your âthrow awayâ money owed â many freee mail vendors do not allow POP or IMAP connections). In case you are ârequiredâ to present an cope with to use a domain (however will not be required to check your e-mail for a few kind of get right of entry to code they send you), you may use â[email protected]â (example.Com is a non-existent site, Installation by the internet requirements for use as an instance with a view to by no means by chance coincide with every personâs actual cope with, which is always a hazard In case you just make up one off the top of your head.)
4) Do not reveal personal info to strangers or simply-met âpalsâ.
 The speed of internet communication is regularly
mirrored
in fast on-line acquaintanceships and friendships. but itâs miles essential to realize that you Do not in reality recognize who these humans are or what they may be like in real lifestyles. 1000 miles away, you Do not have pals-of-friends or other references approximately this man or woman. Be Also wary of face-to-face meetings. In case you and your new e-friend want to fulfill in character, do it in a public region. Bringing a pal alongside also can be a good concept. One neednât be paranoid, however one have to not be an easy mark, both. some non-public facts you may wish to withhold till you recognize a person an awful lot higher might encompass your Complete name, vicinity of employment, cellphone quantity, and avenue cope with (amongst greater obvious things like credit card numbers, and many others.) Needless to mention, such data should no longer be placed on private home pages. (If you have a piece home web page, it may additionally properly have paintings touch information on it, but you neednât screen this page to everyone you meet in a talk room.)
web
For this and other reasons, many humans hold non-public home pages, a work-associated one, and an âoff responsibilityâ version. inside the commercial quarter, too, beware âfast-met buddiesâ. A commonplace
âsocial engineeringâ
form of business espionage is to befriend a person online just long enough to get them to reveal insider information.
five) understand You may be monitored at paintings, Keep away from sending enormously personal to emailing lists, and Preserve touchy files in your home pc.
In Most US states and many if not Most international locations, personnel have little if any privateness safety from tracking by employers. Whilst discussing touchy matters inor other on line media, be certain
with whom youâre communicating
. If you replied to a emailing listing post, check the headers â is your reply going to the person you observed it is, or to the whole list? Also be aware that an increasing number of employers are monitoring and recording employee Internet usage, as well as This will compromise domestic banking passwords and other sensitive information. Hold private facts and personal internet usage
non-public
, at domestic.
See this CNN/IDG article on âsnoopwareâ (which might not be constrained for your workplaceâŚ):
http://www.Cnn.Com/2001/TECH/ptech/eleven/07/snoopware.Idg/
6) watch out sites that provide some type of praise or prize in trade for your
contact facts or other personal details
.
Thereâs a very high chance that they may be gathering this facts for direct marketing functions. In many cases your call and address are well worth a whole lot greater to them due to the fact they are able to sell it to different entrepreneurs (who can do the equal in turnâŚ) than what youâre (supposedly) getting from them. Be particularly cautious of sweepstakes and contests. You in all likelihood may not win, however the marketer sure will In case you deliver them your facts.
7) Do now not respond to spammers, for any purpose.
 spam
âelectronic mailemailâ, or unsolicited bulk , is something youâre in all likelihood already acquainted with (and uninterested in). If you get a spammed advertisment, surely Do not take the sender up on whatever provide theyâre making, however Additionally Donât bother replying with âcast offâ within the challenge line, or whatever (possibly bogus) unsubscribe instructions youâve been given). This really confirms that your deal with is being read by using a actual character, and you may find yourself on dozens more spammersâ lists right away. In case you open the message, watch your outgoing e-mail queue to make certain that a âreturn receiptâ message turned into not generated to be despatched Back to the spammer robotically. (it is pleasant to queue your email and ship manually, rather than send straight away, so you can see whatâs approximately to exit earlier than it is genuinely despatched. You should Also turn off your emailerâs automated honoring of return receipt requests, if any.) When you have a terrific internet service provider, you may be able to forward copies of spam to the device administrators who can course a complaint to the ISP of the spammer (or In case you realize a lot about e-mail headers and DNS gear, you may probable contact those ISPs yourself to bitch about the spammer.) In case you are getting spammed a lot, there are a ramification of filters and anti-unsolicited eemail services available, such as:
junk eemail Hater ( http://www.Cix.Co.united kingdom/~internet-services/electronic mail/spam_hater.Htm ) for Windows users;
TAG ( http://alcor.Concordia.Ca/topics/e-mail/car/proce-mail/spam ) for experienced Unix customers;
SpamBouncer ( http://www.Spambouncer.Org ) for experienced Unix customers (works nicely with TAG);
BrightMail ( http://www.Brighte-mail.Com/ ) for ISPs;
SpamCop ( http://spamcop.net/ ) for all of us;
greater statistics on fighting junk eemail is to be had at:
Elsopâs Anti-unsolicited eemail web page ( http://www.Elsop.Com/wrc/nospam.Htm );
MaximumDownforceâs information-n-links web page( http://www.Maximumdownforce.Com/hotlinks.Html );
Whewâs Anti-e mail Campaign ( http://www.Whew.Com/Spammers/ ).
Many of those are tough to use for novices, and a few require Unix information. Others are services that address ISPs best, no longer quit customers.
8) Take heed to Web security.
by no means put up a credit card quantity or other quite sensitive non-public records with out first making sure your connection is comfortable (encrypted). In Netscape, look for an closed lock (Windows) or unbroken key (Mac) icon at the backside of the browser window. In internet Explorer, search for a closed lock icon at the lowest (Home windows) or near the top (Mac) of the browser window. In any browser, take a look at the URL (Internet cope with) line â a cozy connection will start âhttps://â intead of âhttp://â. If you are at web page that asks for such information however shows âhttp://â strive adding the âsâ yourself and hitting input to reload the page (for Netscape or IE; in Another browser, use whatever technique is required by using your browser to reload the page at the new URL). If you get an mistakes message that the page or web page does not exist, this likely manner that the company is so clueless â and careless together with your statistics and your money â that they Do not actually have Net security. Take your enterprise some place else.
webpage
 Your browser itself gives away records about you, If your IP cope with may be tied for your identification (that is Most commonly authentic of DSL and broadband customers, in preference to modem customers, whoâre a dwindling minority). For a demo of how lots element is routinely given out approximately your gadget via your browser, see: http://privateness.net/analyze/ . Also be in search of âspywareâ â software that may be protected with applications you install (video games, utilities, anything), the reason of which is to silently undercover agent in your on line behavior and other information and report it Returned to the employer whose product you are the use of. One MS Home windows solution for disabling spyware is the Advert-aware program (shareware, from http://www.Lavasoft.De/ ), which could get rid of adware from your laptop; it is primarily based on a big collaboratively maintained database of statistics about adware. Linux and Mac merchandise of this type are likely to appear quickly.
Java, Javascript and ActiveX can also be used for adware purposes. guide for those scripting languages can be disabled To your browserâs configuration alternatives (a.ok.A. Alternatives, settings, or houses). itâs far most secure to surf with them turned off, and best turn them on While a site you agree with and want to use requires them. In case you do not know In case your browser supports these languages or do not know if they are grew to become on you can use BrowserSpy to discover (along side lots of other information about your Net browsing software program): http://gemal.Dk/browserspy/
0 notes
Text
I am re-watching Donât Look Up and I think Randall got off way too lightly for how much of a dick he was. This is not my only takeaway, but w/ever, no one on Tumblr wants to hear about the ~trenches~ of counter-mis and disinformation during Covid and the Russian invasion of Ukraine.
2 notes
¡
View notes
Text
2022 Reading
Following the unmitigated, entirely unanticipated but also completely predictable 102 books I read in 2021, after aiming to read 30, I have set my sights somewhat higher this year. I'm aiming for 80.
Also, as a classic Zillenial, I'm probably going to have to job hunt again this year (already started once!) and many of these will likely reflect jobs I'm applying for in some way.
I will, however, never read a corporate leadership/communications book.
1. Why We Fight: Essays on Fascism, Resistance, and Surviving the Apocalypse - Shane Burley
2. Europe at Midnight - Dave Hutchinson
3. The Shadow Master - Craig Cormick
4. Flowers for Algernon -
5. The Starless Sea - Erin Morgenstern
6. The Grace Year - Kim Liggett
7. An Easy Death - Charlaine Harris
8. Goldenhand - Garth Nix
9. A Gathering of Shadows - V. E. Schwab
10. The Sailor Who Fell from Grace with the Sea - Yukio Mishima
11. Angry White People: Coming Face-to-Face with the British Far Right - Hsiao-Hung Pai
12. Antifa: The Anti-Fascist Handbook - Mark Bray
13. North Korea: State of Paranoia: A Modern History - Paul French
14. Black Flags: The Rise of ISIS - Joby Warrick
15. My Year of Rest and Relaxation- Otessa Moshfegh
16. Purple Hibiscus - Chimamanda Ngozi Adichie
17. A Conjuring of Light - V. E. Schwab
18. Guards, Guards - Terry Pratchett
19. Me and White Supremacy: Combat Racism, Change the World, and Become a Good Ancestor - Leyla Saad
20. Blood of Elves - Andrzej Sapkowski
21. The Man in the High Castle - Phillip K. Dick
22. Snow Crash - Neal Stephenson
23. Right Across the World: The Global Networking of the Far-Right and the Left Response - John Feffer
#books#queue- for all your electronic espionage needs#v e schwab#the witcher#booklr#bookworld#yeah so guess what i want to work in like a totally normal and not at all psychologically damaged person
2 notes
¡
View notes
Photo
I wish we were taught about these things at achool... there was one of these like fifteen minutes walk fro my house.






A fulacht fiadh is a type of archaeological site. While not specific to Ireland, exactly, the name is decidedly Irish Gaelic. They are essentially simple hot water systems common to the Bronze Age, though some examples from the Neolithic age exist.
These systems are generally made up of 3 main elements: a mound of stones, a fire hearth to heat the stones, and a trough filled with water. It worked quite simply: the stones would be heated in the hearth, then moved into the trough filled with water, and the heat from the stones would heat the water. It was convection heating before humans even had a word for it.
While the purpose of this system is pretty obvious, it seems archaeologists are hung up on why our ancestors needed to use hot water, which strikes me as a bit of a silly problem to latch onto. That said theories vary. Some say it was only used as a primitive meat cooking kitchen, others say it was strictly for bathing, and others still say it was for washing and dyeing clothes. Admittedly part of the complication is that there arenât always buildings nearby or close to the fulacht fiadh, so it does beg the question why someone would have hot water located so far away from where they might conceivably need it.
320 notes
¡
View notes
Text
Iâm watching the girlboss cinderella and I have never been more glad that I pirated a film lmao
8 notes
¡
View notes
Text

Iâve been missing the coast and the countryside so much during lockdown. It was so nice to get back away from the buildings and the concrete. This is a small village in North Devon called Coombe Martin.
0 notes
Text
Some updates!
I am indeed on the job hunt once again, as the British government has decided it no longer requires the skills I possess.
It is June and I am just a few books off my target. This bodes poorly for my bookshelves, bank account and space in my flat, but well for my brain!
so:
24. Wanderers - Chuck Wendig
25. The Left Hand of Darkness - Ursula K. Le Guin
26. Sovietistan: Travels in Turkmenistan, Kazakhstan, Tajikistan, Kyrgyzstan and Uzbekistan - Erica Fatland
27. Alpha City: How London Was Captured by the Super-Rich - Rowland Atkinson
28. Everybody Lies: What the Internet can tell us about who we really are - Seth Stephens-Davidowitz
29. We Wish To Inform You That Tomorrow We Will Be Killed With Our Families - Philip Gourevitch
30. October: The Story of the Russian Revolution - China Mieville
31. Seven Mercies - Laura Lam & Elizabeth May
32. Guns, Germs and Steel: A Short History of Everybody for the Last 13,000 Years - Jared Diamond
33. Fake Accounts - Lauren Oyler
34. The Left-Handed Booksellers of London - Garth Nix
35. Before the Coffee Gets Cold - Toshikazu Kawaguchi
36. Putin's People: How the KGB Took Back Russia and then Took On The West - Catherine Belton
37. Time of Contempt - Andrzej Sapkowski
38. Notes from an Apocalypse: A Personal Journey from the End of the World and Back - Mark O'Connell
39. A Crown for Cold Silver - Alex Marshall
40. The Ministry of Nostalgia - Owen Hatherly
41. Empire of Pain: The Secret History of the Sackler Dynasty - Patrick Radden Keefe
42. Burning Questions: Essays and Occasional Pieces, 2004 - 2021 - Margaret Atwood
43. How to Do Nothing: Resisting the Attention Economy - Jenny Odell
44. If We Were Villains - M.L. Rio
45. The Devil's Long Tail - David Stephens
46. Redshirts - John Scalzi
47. The Road - Cormac McCarthy
48. Parasite - Mira Grant
49. Jade City - Fonda Lee
50. Jade War - Fonda Lee
51. The Politics of Bitcoin: Software as Right-Wing Extremism - David Golumbia
52. Conspiracies Uncovered: Discover the World's Biggest Secrets - Lee Mellor
53. Stuff They Don't Want You To Know - David Southwell
54. The Lost Empire of Atlantis: History's Greatest Mystery Revealed - Gavin Menzies
55. Station Eleven - Emily St. John Mantel
56. The Ruin of Kings - Jenn Lyons
57. A Fire Upon the Deep - Vernon Vinge
58. Ancillary Justice - Ann Leckie
59. American War - Omar El Akkad
60. The Republic of False Truths - Alaa Al Aswany
61. Red Sands: Dispatches and Recipes from Unsung Cities and Open Steppes - Caroline Eden
62. They: A Sequence of Unease - Kay Dick
63. The Bleeding Edge: Why Technology Turns Toxic in an Unequal World - Bob Hughes
64. Skyward - Brandon Sanderson
65. Starsight - Brandon Sanderson
66. Serve the People! - Yan Lianke
67. Platform Socialism: How to Reclaim our Digital Future from Big Tech - James Muldoon
68. The Radetzky March - Joseph Roth
69. Three Daughters of Eve - Elif Shafak
70. Conspiracy Theories - Igloo Books
71. A Deepness in the Sky - Vernon Vinge
72. Parable of the Talents - Octavia E. Butler
73. Gideon the Ninth - Tamsyn Muir
74. The Court of Broken Knives - Anna Smith Spark
75. Halting States - Charles Stross
76. Steal As Much As You Can - Nathalie Olah
77. Betting the House: The Inside Story of the 2017 Election - time Ross and Tom McTague
2022 Reading
Following the unmitigated, entirely unanticipated but also completely predictable 102 books I read in 2021, after aiming to read 30, I have set my sights somewhat higher this year. I'm aiming for 80.
Also, as a classic Zillenial, I'm probably going to have to job hunt again this year (already started once!) and many of these will likely reflect jobs I'm applying for in some way.
I will, however, never read a corporate leadership/communications book.
1. Why We Fight: Essays on Fascism, Resistance, and Surviving the Apocalypse - Shane Burley
2. Europe at Midnight - Dave Hutchinson
3. The Shadow Master - Craig Cormick
4. Flowers for Algernon -
5. The Starless Sea - Erin Morgenstern
6. The Grace Year - Kim Liggett
7. An Easy Death - Charlaine Harris
8. Goldenhand - Garth Nix
9. A Gathering of Shadows - V. E. Schwab
10. The Sailor Who Fell from Grace with the Sea - Yukio Mishima
11. Angry White People: Coming Face-to-Face with the British Far Right - Hsiao-Hung Pai
12. Antifa: The Anti-Fascist Handbook - Mark Bray
13. North Korea: State of Paranoia: A Modern History - Paul French
14. Black Flags: The Rise of ISIS - Joby Warrick
15. My Year of Rest and Relaxation- Otessa Moshfegh
16. Purple Hibiscus - Chimamanda Ngozi Adichie
17. A Conjuring of Light - V. E. Schwab
18. Guards, Guards - Terry Pratchett
19. Me and White Supremacy: Combat Racism, Change the World, and Become a Good Ancestor - Leyla Saad
20. Blood of Elves - Andrzej Sapkowski
21. The Man in the High Castle - Phillip K. Dick
22. Snow Crash - Neal Stephenson
23. Right Across the World: The Global Networking of the Far-Right and the Left Response - John Feffer
#2022 reading#booklr#books#queue - for all your electronic espionage needs#sci-fi#fantasy#british politics#non-fiction#reading#seriously though my new bookshelf has nearly 5m of book space in length and it might not be long enough
2 notes
¡
View notes