Root your Android 4.4 KitKat

How to Root your Android 4.4 KitKat device using TowelRoot Step 1: Head over to TowelRoot.com and click on the lambda icon to download the TowelRoot app. Step 2: Install the TowelRoot app on your phone and open it. Tap on “ Make it Ra1n” and wait for a few seconds for the app to root … Continue reading “Root your Android 4.4 KitKat”

How to Root your Android 4.4 KitKat device using TowelRoot

Step 1: Head over to TowelRoot.com and click on the lambda icon to download the TowelRoot app.
Step 2: Install the TowelRoot app on your phone and open it. Tap on “ Make it Ra1n” and wait for a few seconds for the app to root your phone.

installing-towelroot

Amazon Prime Air

https://en.wikipedia.org/wiki/Amazon_Prime_Air http://www.amazon.com/b?node=8037720011 Amazon Prime Air is a conceptual drone-based delivery system currently in development by Amazon.com. On December 1, 2013, Amazon.com CEO Jeff Bezos revealed plans for Amazon Prime Air in an interview on 60 Minutes. Amazon Prime Air will use multirotor Miniature Unmanned Air Vehicle (Miniature UAV, otherwise known as drone) technology to autonomously … Continue reading “Amazon Prime Air”

https://en.wikipedia.org/wiki/Amazon_Prime_Air

http://www.amazon.com/b?node=8037720011

Amazon Prime Air is a conceptual drone-based delivery system currently in development by Amazon.com.

On December 1, 2013, Amazon.com CEO Jeff Bezos revealed plans for Amazon Prime Air in an interview on 60 Minutes. Amazon Prime Air will use multirotor Miniature Unmanned Air Vehicle (Miniature UAV, otherwise known as drone) technology to autonomously fly individual packages to customers’ doorsteps within 30 minutes of ordering.[1]To qualify for 30 minute delivery, the order must be less than five pounds (2.26 kg), must be small enough to fit in the cargo box that the craft will carry, and must have a delivery location within a ten-mile radius of a participating Amazon order fulfillment center.[1] 86% of packages sold by Amazon fit the weight qualification of the program.

Regulations

Presently, the biggest hurdle facing Amazon Prime Air is that commercial use of UAV technology is not yet legal in the United States.[2] In the FAA Modernization and Reform Act of 2012, Congress issued the Federal Aviation Administration a deadline of September 30, 2015 to accomplish a “safe integration of civil unmanned aircraft systems into the national airspace system.”[3]

In March 2015 the US Federal Aviation Administration (FAA) granted Amazon permission to begin US testing of a prototype. The company responded by claiming that the vehicle cleared for use was obsolete. In April 2015, the agency allowed the company to begin testing its current models. In the interim, the company had begun testing at a secret Canadian site 2,000 ft (610 m) from the US border.[4]

The agency mandated that Amazon’s drones fly no higher than 400 ft (122 m), no faster than 100 mph (161 km/h), and remain within the pilot’s line of sight. These rules are consistent with a proposed set of FAA guidelines. Ultimately, Amazon hopes to operate in a slice of airspace above 200 ft (61 m) and beneath 500 ft (152 m), with 500 ft being where general aviation begins. It plans to fly drones weighing a maximum of 55 lb (25 kg) within a 10 mi (16 km) radius of its warehouses, at speeds of up to 50 mph (80.5 km/h) with packages weighing up to 5 lb (2.26 kg) in tow.[5]

Public concerns

Public concerns regarding this technology include public safety, privacy, and package security issues.[2] Amazon states that “Safety will be our top priority, and our vehicles will be built with multiple redundancies and designed to commercial aviation standards.”[6] However, while privacy and security remain concerns, the FAA’s recently proposed rules for small UAS operations and certifications only provides provisions on its technical and functional aspects.[7]

The fact that the drone’s navigational airspace exists below 500 feet is a big step toward safety management.[8]

Privacy

Concerns over the constant connection of the drones to the internet raises concerns over personal privacy. The primary purpose of drone internet connection will be to manage flight controls and communication between drones.[9] However, the extent of Amazon’s data collection from the drones is unclear.[10] Some proposed data inputs include automated object detection, GPS surveillance, gigapixel cameras, and enhanced image resolution.[11] Because of this, Amazon’s operating center will collect unknown amounts of information, both intentionally and unintentionally, throughout the delivery process. Neither Amazon or the FAA has formed a clear policy on the management of this data.

The Common Vulnerability Scoring System (CVSS)

The Common Vulnerability Scoring System (CVSS) is a free and open industry standard for assessing the severity of computer system security vulnerabilities. CVSS attempts to assign severity scores to vulnerabilities, allowing responders to prioritize responses and resources according to threat. Scores are calculated based on a formula that depends on severalmetrics that approximate ease of exploit … Continue reading The Common Vulnerability Scoring System (CVSS)

The Common Vulnerability Scoring System (CVSS) is a free and open industry standard for assessing the severity of computer system security vulnerabilities. CVSS attempts to assign severity scores to vulnerabilities, allowing responders to prioritize responses and resources according to threat. Scores are calculated based on a formula that depends on severalmetrics that approximate ease of exploit and the impact of exploit. Scores range from 0 to 10, with 10 being the most severe. While many utilize only the CVSS Base score for determining severity, Temporal and Environmental scores also exist, to factor in availability of mitigations and how widespread vulnerable systems are within an organization, respectively.

The current version of CVSS is CVSSv3.0, released in June 2015

Tor

Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router,[7] however the correct spelling is “Tor”, capitalizing only the first letter.[8] Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays[9] to conceal a user’s … Continue reading Tor

Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router,[7] however the correct spelling is “Tor”, capitalizing only the first letter.[8] Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays[9] to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes “visits to Web sites, online posts, instant messages, and other communication forms”.[10] Tor’s use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

Onion routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of anonion. Tor encrypts the data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays. Each relay decrypts a layer of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing, or even knowing, the source IP address. Because the routing of the communication is partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination.

An adversary might try to de-anonymize the user by some means. One way this may be achieved is by exploiting vulnerable software on the user’s computer.[11] The NSA has a technique that targets outdated Firefox browsers codenamed EgotisticalGiraffe,[12] and targets Tor users in general for close monitoring under its XKeyscore program.[13] Attacks against Tor are an active area of academic research,[14][15] which is welcomed by the Tor Project itself.[16]

cheap oil

Links: 1) http://www.xe.com/currencyconverter/c… 2) http://www.oil-price.net/ 3) http://beforeitsnews.com/opinion-cons… 4) Thumbnail imaage – Alberta Oil Sands – by Howl Arts Collective https://commons.wikimedia.org/wiki/Fi… 5) Music – Youtube Audio Library “Ambient Ambulance” https://www.youtube.com/audiolibrary/…




Links:
1) http://www.xe.com/currencyconverter/c…
2) http://www.oil-price.net/
3) http://beforeitsnews.com/opinion-cons…
4) Thumbnail imaage – Alberta Oil Sands – by Howl Arts Collective
https://commons.wikimedia.org/wiki/Fi…
5) Music – Youtube Audio Library
“Ambient Ambulance”
https://www.youtube.com/audiolibrary/…


Computer emergency response teams (CERT)

Computer emergency response teams (CERT) are expert groups that handle computer security incidents. Alternative names for such groups include computer emergency readiness team and computer security incident response team (CSIRT). The name “Computer Emergency Response Team” was first used by the CERT Coordination Center (CERT-CC) at Carnegie Mellon University (CMU). The abbreviation CERT of the … Continue reading Computer emergency response teams (CERT)

Computer emergency response teams (CERT) are expert groups that handle computer security incidents. Alternative names for such groups include computer emergency readiness team and computer security incident response team (CSIRT).

The name “Computer Emergency Response Team” was first used by the CERT Coordination Center (CERT-CC) at Carnegie Mellon University (CMU). The abbreviation CERT of the historic name was picked up by other teams around the world. Some teams took on the more specific name of CSIRT to point out the task of handling computer security incidents instead of other tech support work, and because CMU was threatening to take legal action against individuals or organisations who referred to any other team than CERT-CC as a CERT. After the turn of the century, CMU relaxed its position, and the terms CERT and CSIRT are now used interchangeably.

The history of CERTs is linked to the existence of malware, especially computer worms and viruses. Whenever a new technology arrives, its misuse is not long in following. The first worm in the IBM VNET was covered up. Shortly after, a worm hit the Internet on 3 November 1988, when the so-called Morris Worm paralysed a good percentage of it. This led to the formation of the first computer emergency response team at Carnegie Mellon University under U.S. Government contract. With the massive growth in the use of information and communications technologies over the subsequent years, the now-generic term ‘CERT’/’CSIRT’ refers to an essential part of most large organisations’ structures. In many organisations the CERT evolves into a information security operations center.

The Roman Army

Published on Dec 26, 2013 I created this video with the YouTube Video Editor (http://www.youtube.com/editor) Much of the success of the Roman army can be attributed to the command structure also. Though after the Marius Reforms the army was much … Continue reading

Published on Dec 26, 2013

I created this video with the YouTube Video Editor (http://www.youtube.com/editor)
Much of the success of the Roman army can be attributed to the command structure also. Though after the Marius Reforms the army was much more organized and therefore more effective, the early Roman Republic army was still organized legibly, not into hordes. The Hastati and Principes were divided into ten groups of 120 men called maniples, and the Triarii into ten maniples of sixty men. There were ten maniples of Hastati and Principes in each legion, totaling 2400 men. The remaining force was made up of 1200 Velites. Each maniple had two centurions, in which the most experienced held the command of the maniple. A legate was in command of the whole legion consisting of 4200 men.

Another part of the army’s tactics was to build a camp at the end of every day’s march. The afternoon saw the rapid construction of an army camp, and the night was reserved for rest from the day’s march and labor. The camp served multiple purposes. First and foremost it served as a nightly defense against surprise attacks and as a base to retreat to just in case a defeat should ever happen.

The construction of camps also gave the soldiers and officers a place to rest peacefully. Much of the Roman army’s success depended on coolness of temper. A Roman soldier was kept from nervous strain as long as possible, so as to perform well under the intense stress of battle. The existence of a camp contributed greatly to this. It also exemplified the tenacity of the Romans. If defeated in battle, they would not have to retreat far, and they would fight again the next day, if not the same day.

Also, instead of being pushed back far back into their own lands, the camp served as a fortified stronghold, which could be used to fend off the left over attackers from the previous battle until reinforcements could arrive.

John Hilde is a collector of ancient armor and weapons as well as modern day collectibles. Get more information regarding roman armor

Published on Jan 28, 2014
Riot police in South Korea fend off rioters with ageless techniques.


North Korean nuclear bomb

Published on Jan 13, 2016 China might be the only thing standing between the rest of the world and a North Korean nuclear bomb. Bad news for the rest of the world. The Hermit Kingdom allegedly detonated a hydrogen bomb. … Continue reading


Published on Jan 13, 2016
China might be the only thing standing between the rest of the world and a North Korean nuclear bomb. Bad news for the rest of the world. The Hermit Kingdom allegedly detonated a hydrogen bomb. But is anyone really believing Kim Jong-Un?

Peak prosperity

by Chris Martenson, Gail Tverberg, originally published by Peak Prosperity Actuary Gail Tverberg explains the tight correlation between the rates of GDP growth and growth in energy supply. For decades, energy has been becoming more costly to obtain, and instead … Continue reading

Actuary Gail Tverberg explains the tight correlation between the rates of GDP growth and growth in energy supply. For decades, energy has been becoming more costly to obtain, and instead of accepting lower GDP growth, we have been using debt to fund further energy exploration and extraction.

That strategy has diminishing returns, Tverberg warns. And we are close to the moment of reckoning:

The more we look at it the more we see that the rate of growth and energy supply is very closely correlated with the rate of GDP growth. And I know on some of my recent posts I’ve included a chart that goes back to 1820 that shows the same correlation. You have to have an increasing supply of energy in order to get GDP growth. The GDP growth tends to be a little higher than the energy growth. That’s especially the same when we made the change in the mid 70’s, when we had the big first oil crisis and we realized that Japan had already started making small cars, and so we could make smaller cars, too, and save quite a bit of oil very quickly. And we realized then that we didn’t have to burn oil to create electricity; there were a lot of other alternative approaches, including nuclear. So we pulled those off line, and where home heating had been done by oil it was easy to transfer that to other types of energy. So we had a number of different things we could do very quickly back then — and I think people got the idea that because we could pick the low-hanging fruit, then somehow or other we could do the same thing again. But we’re not getting that same kind of effect any more.

I think the thing that people don’t realize is how closely the growth in debt is tied to the growth in the economy.