Jump to content
Facebook Twitter Youtube

Halcyon.

Banned
  • Posts

    840
  • Joined

  • Last visited

  • Days Won

    5
  • Country

    Albania

Everything posted by Halcyon.

  1. Introduction Many Spyware, Hijackers, and Dialers are installed in Internet Explorer through a Microsoft program called ActiveX. These activex programs are downloaded when you go to certain web sites and then they are run on your computer. These programs can do a variety of things such as provide legitimate services likes games or file viewers, but they can also be used to install Hijackers and Spyware on to your computer without your permission. SpywareBlaster, a program created by Javacool, is used to secure Internet Explorer so that it is harder for these ActiveX programs to run on your computer, as well as disabling the ability of certain known offending ActiveX programs from running at all. This program also has the ability to stop certain cookies from being added to your computer when running Internet Explorer and Mozilla Firefox. This tutorial will explain how to use SpywareBlaster to provide the best protection for your browser. It is mostly geared towards the users of Internet Explorer but users of Firefox will also gain from this program as well. How to use SpywareBlaster to secure your browser Step 1: Download and install SpywareBlaster. Download SpywareBlaster from Javacool's sit at this link SpywareBlaster Download Link. When you download it, save the file to a location on your hard drive that you will be able to find later. When it is download you will want to navigate to the folder where you saved it and double-click on it to install the program. Follow the prompts and choose the default locations when installing the program. When the program is done installing it will place an icon on your desktop. Double click on the SpywareBlaster icon and you will be presented with a brief tutorial. On the first page of this tutorial, you will see some of the features that SpywareBlaster consists of. At this point you should click on the Next button to proceed to the second page of the tutorial as shown in Figure 1 below. If you want to purchase the software, then you should select Automatic Updating. If you do not plan on purchasing the software, then you should select the option for Manual Updating and press the Next button. At the next screen, simply press the Finish button to get to the main screen as shown in Figure 2 below. The protection screen is where you will do most of the work in securing your browser from running malicious programs. Lets take a moment to go through each of the key components of the Protection section: Internet Explorer, Restricted Sites, and Mozilla/Firefox - These sections, designated by the green box in Figure 2, are the core functions of SpywareBlaster. You will use these sections to tell your browser what ActiveX programs should not be allowed to run, what cookies should not be allowed to be installed, and what sites are known to be malicious and should have more restrictions when you are visiting them. Internet Explorer is configured insecurely - If you see this alert, designated by the blue arrow in Figure 2, it means that SpywareBlaster has detected that the Internet Explorer security settings are not strong enough and that they should be changed to make your browser more secure. We will go into more detail on how to fix this further into the this tutorial. Step 2: Updating SpywareBlaster Your next step should be to update SpywareBlaster. This will make sure SpywareBlaster has the latest definitions e so that it can protect your browser more efficiently. You should update SpywareBlaster regularly, as much as every few days, in order to provide the best protection. When you click on the Updates button you will be presented with a screen similar to Figure 3 below You should click on the button labeled Check for Updates designated by the green arrow in Figure 3. Once you click on this button, SpywareBlaster will check for new updates that may be available. Once it connects, if SpywareBlaster finds new updates, it will download them, install them, and alert you that the program has been updated. Otherwise it will tell you that SpywareBlaster is up to date and that there is nothing to download. Step 3: Protecting your browser You should now click on the Protection Status button to go back to the main status screen as seen in Figure 2. If you see an alert stating that Internet Explorer is configured insecurely you should click on the link labeled Click here to learn more and fix it. This will bring you to a screen similar to Figure 4 below. If you do not see this alert, you should be happy as your browser has the correct options set and you can skip to Step 4. It is highly recommended that you choose to fix the settings that it presents to you. This will provide you with a much more secure browser that will not be as susceptible to malicious ActiveX programs. To do this, click on the button designated by the green arrow labeled Set Recommended Values. Once you click on the button, you will be brought back to Protection Status screen, except now you will no longer have the alert. Step 4. Internet Explorer Protection You should now click on the link labeled Click here to enable protection... next to the Internet Explorer label in the status screen. This will bring you to a screen similar to Figure 5 below. This screen will allow you to make settings to Internet Explorer that will stop it from running known malicious ActiveX programs as well as cookies that are known as being related to Spyware. If you put a check mark in the checkbox labeled ActiveX Protection, designated by the red arrow, your browser will no longer be able to run ActiveX programs specified in the Block List which is designated by the green arrow. This will automatically protect you from all the known malicious ActiveX programs in the list. It is advised that you allow SpywareBlaster to protect you, so you should put a checkmark in this box. If you want to remove protection from certain items, you can uncheck that particular item and click on the Remove Protection for Unchecked Items button. Advanced Tip: This is done by adding the CLSID, which is the number between the curly brackets { 000..etc } under the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility. You then make a dword value called "Compatibility Flags " and make it the hexadecimal value of 400. This is called the killbit and will stop the program from being able to run on your computer. If you put a check mark in the checkbox labeled Cookie Protection , designated by the blue arrow in Figure 5, SpywareBlaster will stop your browser from accepting certain cookies specified in the Block List designated by the green arrow in Figure 5. By putting a checkmark in this box, SpywareBlaster will automatically block all attempts for these types of cookies to be placed in your browser. It is advised that you allow SpywareBlaster to protect you by putting a checkmark in this box. If you want to remove protection from certain items, you can uncheck that particular item and click on the Remove Protection for Unchecked Items button. Advanced Tip: SpywareBlaster blocks the cookies by placing the entries in the settings for your Internet Explorer via the registry in the key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History. The cookie domain is added as a subkey and a dword value called Default is added with a hexadecimal value of 5 for always block or 1 for always allow. Step 5. Internet Explorer Restricted Sites You should now click on the option labeled Restricted Sites in the left-hand navigation menu. This should bring you to a screen similar to Figure 6 below. This screen will allow SpywareBlaster to restrict your browser from running Java, ActiveX, and other downloads from known malicious sites. By placing a checkmark in the checkbox labeled Restricted Sites Protection, SpywareBlaster will add all the domains listed in the Block List, designated by the blue arrow in Figure 6, into the Restricted Sites section of the Security tab in your Internet Explorer Internet Options section. It is advised that you let SpywareBlaster add these sites to your Restricted Sites list by putting a checkmark in the box. Once again, if you would like to remove one or more of the sites from your Restricted Sites, you can uncheck that particular site and click on the Remove Protection for Unchecked Items button. Advanced Tip: SpywareBlaster adds sites to the restricted zones by adding the domain as a subkey under the registry key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains. A dword is then added to that domain named * and given a hex value of 4 to specify that it is part of the Restricted Sites Zone. Step 6. Mozilla/Firefox Protection (Only if you use this type of browser) If you use a Mozilla or Firefox browser then you should read this section, otherwise you can skip it. To protect Firefox you should click on the option labeled Mozilla Firefox in the left-hand navigation menu. This will bring you to the screen show in Figure 7 below. This screen allows you to block cookies from the sites in SpywareBlaster's database. To protect Firefox, put a checkmark in the box labeled Cookie Protection, designated by the red arrow in Figure 7 above. Once you place the checkmark, SpywareBlaster will automatically add the Block List, designated by the blue arrow, to Mozilla Firefox so that it will automatically block these cookies. It is recommended that you let SpywareBlaster protect you for maximum security. Once again, if you would like to remove one or more of the sites, you can uncheck that particular site and click on the Remove Protection for Unchecked Items button. Advanced Tip: SpywareBlaster protects Firefox by adding the domain to the cookperm.txt file for Mozilla based browsers. This file is located in the same directory that your prefs.js is located. Domains are added in the form: domain.com permission By adding a domain to this list and giving it a permission of 1F, the cookie will be blocked from that domain. Using the other tools built into SpywareBlaster In this part of the tutorial I will discuss other tools that SpywareBlaster has built into the program. I will go into detail about each of the different tools below. System Snapshot SpywareBlaster has the ability to take a snapshot, or backup, of certain settings in your browser and your registry. These settings will be saved in a database that is stored in your SpywareBlaster directory. If in the [CENSORED]ure you make a mistake, or things start acting strange, you can restore your configuration from this backup. The first step is to click on the System Snapshot button on the left. If this is your first time using it, you will want to create a snapshot of your system. You should select the radio button that is labeled Create new System Snapshot and press the Go button. Give the snap shot a name that you will remember and make sure the Append date + time to the end of the snapshot name checkbox is checked. When this is done, press the Create Snapshot button to continue. SpywareBlaster will then save the settings on your computer into a database. When it is done you can press the Finish button. In the [CENSORED]ure, if you want to restore this backup you can choose the System Snapshot section and then select the radio button for Restore System to Saved Snapshot Point and press the Go button. You should click once on a snapshot to select it and then press the Next button. If there were any changes from your current settings compared to the ones saved in the snapshot, it will notify you and give you the option to restore them. Otherwise it will tell you there was no difference in your current settings to the ones in the snapshot. Tools Section The tools sections contains 5 different tools that you can use on your computer. For most people the only tool I recommend is the Hosts Safe tool. The other tools can cause other Spyware removal tools to view it as a modification made by a Hijacker and should be only used by advanced users. IE Browser Pages: This tool allows you to change various Browser Pages such as your default Blank Page, or the default search page. Unless you know what you are doing it is recommended that you leave this alone. Misc IE Settings: This allows you to disable the Internet Tools control panel in your Windows Control Panel. I would leave this unchecked unless you have a good reason. The other option lets you change the text next to the web pages title in your browser windows and is just for cosmetics. Hosts Safe: This tool is one that I recommend that most users use at least once. This will back up your HOSTS file, which is commonly used by Hijackers, to an encrypted file that can be restored from at a later date. Please use this tool at least once so that you have an available backup. Flash Killer: This will disable Flash files from being run within your browser. Unless you will never need to use Flash, I would suggest you not use this option as many legitimate sites use flash. Custom Blocking: This allows you to add custom ActiveX CLSID's that you want to block from running on your computer. This tool should only be used by an advanced user. Conclusion As you can see SpywareBlaster is a very powerful tool in the protection against Spyware and Hijackers. Though this tool will not remove Hijackers/Spyware from your system, it will prevent you from getting infected in the [CENSORED]ure. Therefore, it is highly recommended that you use this tool to its fullest potential and to constantly update it so that you can have protection from the latest threats that may have arisen.
  2. When Microsoft launched Windows 10, the company emphasized the new operating system was the foundation for a brand-new Windows ecosystem. Going forward, Windows users could look forward to unprecedented compatibility between smartphones, tablets, PCs, and even the Xbox One. The Windows-as-a-service model meant that no one would be left behind on an ancient operating system. The Windows Store is vital to bringing this vision to reality, but developer feedback is anything but positive. Digital Trends recently interviewed several long-time Windows developers, including Scott Peterson of Liquid Daffodil. Peterson has been writing applications for Windows since the company launched Windows 2.0, and he makes a living developing custom Windows software for oil and gas companies. Digital Trends describes him as a “steadfast evangelist.” What Peterson and other developers like Gaurav Kalra of Next Matters see, however, doesn’t have them singing praises to the heavens. While the Windows 10 install base is theoretically much larger than the Windows Phone ecosystem — Nokia and Microsoft have shipped an estimated 110 million Windows Phone devices since 2011, while Microsoft reports over 200 million devices using Windows 10 in the past eight months — the vast majority of their revenue is being driven by mobile devices. According to Kalra, their NextGenReader application has been downloaded more than 300,000 times since it debuted on the Windows Phone store, but just 90,000 of those downloads were to a PC running Windows 8, 8.1, or Windows 10. Both developers are committed to the Windows platform, but neither believes they can honestly recommend it as a practical, money-making enterprise. Are desktop paradigms killing the Windows Store? When Microsoft announced that Windows 8 would feature an App Store, and that this represented the [CENSORED]ure of the company’s software design and distribution plans, user reaction wasn’t very positive. Gabe Newell and Valve built Steam OS as a defensive measure, designed to prevent Microsoft from requiring all PC games to be sold through their own store front, cutting Steam off at the knees. Others expressed concern about how the strict sandboxing requirements would impact application functionality. It soon became clear that these fears were unfounded. The Windows Store launched alongside Windows 8 and quickly became known as a place where good apps went to die alongside shovelware and scams. A year after launch, it was still common to see third-party programs masquerading as official clients for major Web services and social media hubs. Microsoft has slowly dealt with some of these issues, but desktop and laptop users still don’t use the Windows Store much, if at all. The original Windows 8.0 store: Now with extra Indian apps in an American market The criticisms levied at the Windows Store are genuine, but they may not be the root cause. It’s at least possible that what’s holding the Windows Store back is the users themselves. If you own a smartphone or tablet, the only official way to install new software is through Google Play, iOS, or Amazon. But desktop and laptop users have decades of experience in finding their own software, usually through various online repositories. Here’s a simple example: If you watch movies or television shows on your PC, chances are you play them back with either VLC or an application like Media Player Classic. If you’re a gamer, you use Steam. If you use instant messenger services, there’s already a suite of applications that can handle them. In the early days of the iPhone — at least after Apple unveiled the App Store in 2008, a year after launch — Apple showcased the phone by running the tagline “There’s an app for that.” In a way, that’s the PC’s problem: There’s already an app for that, and if you’ve been using the desktop for 10-20 years, you probably know which ones you like and which you don’t. Microsoft has tried to offer compelling applications built around its new UI, but these applications are often handicapped by intrinsic limitations that their desktop brethren don’t share. Adobe Photoshop’s mobile version can’t use plug-ins, because Microsoft’s API doesn’t allow them for security reasons. Even applications as simple as photo viewers or video players expect all content to reside in a single privileged directory. The problem is, that’s not how most PC users maintain content libraries, especially over a 5-10 year period. I still think better curation and presentation could solve this problem long-term — Steam’s gradual transformation from an online service everyone loathed to a cherished online gaming hub is proof that people really can change their opinions of a thing long-term. Before it can change people’s perceptions, however, Microsoft needs content worth featuring and then a way to feature it that doesn’t make users feel like they’re being groped at a dive bar by a 300lb used-car salesman. It’s worth noting that Microsoft isn’t the only company with this problem. Apple’s OS X App Store has lagged far behind its online cousin, with fewer features and limits on OS X – iOS compatibility. Many of the problems MacWorld details within the OS X App Store are also issues with the Windows Store. The difference between the two, of course, is that Apple’s massive mobile infrastructure dwarfs any minor problems it might be having with the desktop App Store. Microsoft, on the other hand, is trying to bootstrap its mobile business by relying on its desktop strength. Things could start to turn around this year as Windows 10 matures, but it’s going to be a long, slow climb.
  3. And so IBM Watson's massive marketing push continues: this time with the launch of a $5m (£3.4m) prize in an artificial intelligence competition that will run until 2020. Contenders – or perhaps their 'bots – will have to battle it out at a mainstage event at IBM's annual conference before the winner pockets their prize at the annual TED talk-fest. With the snappy name of "The IBM Watson™ AI XPrize: A Cognitive Computing Competition, Presented by TED" the $5m marketing scheme was announced at TED2016, in Vancouver. The challenge is open to any team around the world that can "develop and demonstrate how humans can collaborate with powerful cognitive technologies to tackle some of the world’s grand challenges." While the main prize of $4.5m will be delivered during the TED conference in 2020, the three teams that make it to that stage will have featured at IBM's annual conference "World of Watson" before then, competing head-to-head for interim prizes and the opportunity to advance to next year's competition. The interim prizes will add up to $500,000, and it is hoped that hundreds of teams will participate at IBM's developer conference. The ideas will be evaluated by a panel of "expert judges for technical validity", though apparently the TED and XPRIZE communities will select the winner "based on the audacity of their mission and the awe-inspiring nature of the teams’ TED Talks in 2020." The complete rules for the competition and its entry guidelines will be made available on 15 May.
  4. On October 5, 2015 representatives of 12 Asian and American countries have signed Partnership Trans - Pacific (TPP, the Trans-Pacific Partnership English). It is about the wider regional agreement of free trade ever reached, it has to do with the economy worth almost 30 thousand billion annual GDP, 40 percent of that world and one third of international trade. The agreement was signed after more than 5 years of negotiations, but has yet to be ratified by individual countries (USA, Canada, Japponi, Australia, Brune, Chile, Malaysia, Mexico, New Zealand, Peru, Singapore and Vietnam). In fact, it is anticipated by the end of 2016 completion of the deal "twin" with TTP-in, that the TTIP's (Partenaritetit Transatlantic Trade and Investment, in English Transatlantic Trade and Investment Partnership). The latter will need to create an economic zone informe between the European Union and the United States ...
  5. The Yamaha YZF-R6 is an impossible thing. That’s a lie, of course. The tuning-fork company’s been selling the same basic bike since 2008. And each of the big-four Japanese bike companies builds what’s known in the industry as a “supersport”—a machine with a fairing that sticks your ass up in the air like a presenting baboon and places your hands roughly at axle height. But I had not ridden a GSX-R 600, a Ninja 636, or a CBR 600R. Nor had anybody been foolish enough to offer me a seat on one. Until Nick Ienatsch showed up at Thermal. MotoAmerica had invited a group of journalists down for a press orientation day at the private racetrack just north of the benighted Salton Sea. As part of the day’s proceedings, Ienatsch and his Yamaha Champions Riding School compatriots showed up to offer some abridged lessons on grip and body position. I was by far the slowest person on the track on the entry-level R3. I fared a bit better on the FZ-09, by dint of the big triple’s broad powerband, but I was still the back marker of my session. Finally, Ienatsch and my pal Chris goaded me into getting on the R6. “Just leave it in fourth,” Chris advised. “It’ll do the whole track in fourth.” I left the line, upshifted thrice, and around the track I went. At one point, I looked down at the dash. I was only using 7000 RPM. There was, like, a whole ’nother tachometer’s worth of digits left! I got to the short track’s longest straight and whacked the throttle, assuring myself that if everybody else was braking from eight-hundred miles per hour, I could do the same. Somewhere around 11K, the little Yamaha turned into an unholy, time-eating, space-exhaling shrike. I’m not sure I exhaled until I hit the braking zone, at which point the sticky Dunlops and the Yamaha’s dual front disc brakes conspired to haul me down to a reasonable cornering speed. I went around the bend mostly upright, kinda-sorta leaning toward the inside of the bike. Some dude on a Ninja 250 built for track duty went flying around me with his knee down. I pulled into the pits. Nick asked if I’d like to come out to New Jersey Motorsports Park for the full two-day Yamaha Champions Experience. I accepted. On my 550-mile ride home from Thermal, I put to use the two things I’d found helpful during the sessions. I started pointing my toe into the corner, which rather inexplicably made me much more comfortable at speed in the bends, and began moving my head out over the inside grip. Those two little adjustments improved my confidence so much, I couldn’t wait to see what the full course would bring me. It turns out that I was only scratching the surface. One of Nick’s mantras is, “Be like Lorenzo!” As in Jorge Lorenzo, the 2015 MotoGP champion. Over the past few years, a new riding style has evolved at the highest level of racing, based on maximizing the amount of body weight on the inside of the bike in the corner. Ienatsch rationalizes it simply: “If that’s what the best guys in the world are doing, that’s what we should be doing.” The basic thrust of the posture is roughly the inverse of what I learned at American Supercamp. Instead of wedging the edge of the seat between your glutes during cornering, you should be as far off the thing to the inside as humanly possible. Your outside arm should actually touch the top of the gas tank. Obviously, this is much easier on a bike with low, clip-on bars than something like the Guzzi V7, with its traditional, upright bars. Instead of nestling the jewels up against the front of the seat, as I did during flat-track school, proper road-race form demands being back away from the tank. And finally, the rider’s head should be as far off to the inside as possible. Figure your head in a helmet weighs somewhere between 10 and 15 pounds, and it’s the highest point on the bike/rider combo. It’s a critically-useful piece of ballast. Now, bear in mind that despite the fact that you’re hunched over, making it oh-so-tempting to rest the weight of your head and chest on the grips, the same light grip mandatory in other motorcycling disciplines is still very much of import here. Which means your core does the work of supporting the upper half of your frame. Well, and at 130 mph, the wind does a pretty good job of it, too. A cone set up at each of the turn-in, apex, and exit points is standard operating procedure at many a school or track event. That still, however, leaves plenty of room for bad lines. Yamaha Champions takes the idea a step further, placing a pair of cones about a sportbike’s wheelbase apart at the apex’s curbing. The idea is to have the bike parallel to the cones at the apex. String the entry and exit cones together when the bike’s pointed correctly at the apex, and you’ve taken the perfect line through the corner. Nailing apexes, then, becomes the raison d’être of lapping during the sessions, rather than lap times. The math is pretty simple: Hold the right line around the track and your times will eventually drop as you learn the surface and gain confidence. On the other hand, if you head out chasing wanton, bloody speed, speed has a tendency to bite back with wanton and potentially bloody results. So much of riding a streetbike comes down to managing the front contact patch. Brake and the size of the patch increases, due to forward weight transfer. Accelerate and it shrinks. Get over on the side of the tire and you’ve got both linear and lateral forces acting on it. Modern tires are astoundingly capable, but they can only do so much. One of the most vivid demonstrations of the limits of adhesion involved Ienatsch taking a tire and jamming it at a steep angle into the ground. Predictably, the tire bounced, skipped, lost grip, and slid out. Next, he set the tire on the ground at the same angle, gradually adding pressure. Suddenly, the thing was bearing a whole lot of weight. Abrupt motions rob the tire of its true capability. But by preloading the brake and adding pressure smoothly, you keep the fork from bottoming out while progressively loading the contact patch. And on a sportbike with serious calipers and sticky rubber, you can do that pretty quickly, making what’s actually a graceful act appear brutish and forceful. Some might say that sort of finesse is less critical on today’s ABS-equipped bikes, but by grabbing a quick and nasty handful, you still run the risk of bottoming the fork—reducing the bike’s compliance while messing with the extreme end of the machine’s steering geometry. Releasing the brake smoothly is just as important, to avoid jerky fork-rebound moments. In the MSF course, the instructors frown on braking while leaned over. If you find yourself in a situation where you need to scrub speed in a bend, you’re to stand the bike up and brake in a straight line. By adopting a GP-oriented body position while riding, the bike’s closer to upright at real-world speeds, allowing you quite a lot of braking latitude while still continuing around the corner. This doesn’t just work on sportbikes. Since YCRS, I’ve used the technique on standards, cruisers, and touring bikes, including an 800-plus-pound Honda Gold Wing. At the end of the first day, the instructors offered to film us turning laps, followed by a critique of our skills in front of the class. Normally, this evaluation is a mandatory part of the course, but the track was wet, and the bikes riding on Dunlop Q3s, sort of the motorcycle equivalent of the barely-legal Michelin Pilot Sport Cups on a GT3 RS. The Dunlops are gummy as Haribo hell in the absence of moisture, but don’t fare especially well in the rain. Mercifully, the clouds seemed to be starting to run dry. The instructors asked for a show of volunteer hands. Mine was the first one in the air. I don’t know why. It wasn’t bravery. Nor was it stupidity. I just felt comfortable in my ability to get around the track without crashing, even if said lap turned out to be dead slow. I took a flying lap, then an instructor took off, following me as I crossed the start/finish line. Before I hit the first corner, the skies opened up. I backed off a little, tried to keep my focus on the apexes, and kept the bike as upright as I could, getting as far off the side of the R6 as my limited skills and rattletrap knees would allow. Six months prior, I couldn’t manage a 5-mph left turn in the rain, and here I was lapping New Jersey’s Lightning course on the back of a tweaking ferret during a storm with sudden torrential aspirations. And you know what? I did all right. My body position on the bike was decent, although at one point I drifted fairly wide of an apex. Ienatsch admonished that if I continued on that sort of line, I was headed for a crash. Not wanting to break myself or pay the repair bill on a tumbled bike, I vowed to myself that I’d hew more religiously to the cones. On the second day, we moved to NJMP’s Thunderbolt course, a faster, more technical track. I hopped on the back of a big FZ-1 ridden by 1993 World Superbike champion Scott Russell. Russell threw the beast around the course, pulling wheelies, nailing apexes, and altogether making the barely bottled violence look wholly effortless. And with two of us on the bike, he couldn’t even hang off. Meanwhile, I was just mustering up the guts to open up the 600 on Thunderbolt’s front straightaway. Instructor Mark Schellinger led me around, signaling when it was safe to open the taps on the zillion-RPM zonker and when it was time to shut the thing down and go for the brakes. At the end of the second day, the coaches gave us a problem to ride around. For example, sometimes students are forced to ride with only one foot. Our issue? We had to act as if we were glued to the center of the seat. I’d gone into YCRS hoping not to be the slowest guy in the class. And I wasn’t. But I was very near the bottom of the pile. Suddenly, however, I was passing guys who were much, much faster than I was when they could hang off. Not being able to move off the seat was unfamiliar to them; they weren’t quite sure how they related to their motorcycles without being able to do it. For me, moving my head and upper torso from side to side and pointing my toes into the corner had become second nature. Moving my ass out from side to side was still a habit I was trying to acquire. As a result, for a little bit, I forgot about trying to acquire it and just rode, using everything else I’d learned to get around the course. The final session consisted of free lapping on a variety of Yamaha products. I had a fantastic time throwing around the middleweight-standard FZ-07, an upright, parallel-twin thing which could stand as the motorcycle deal of the decade if one can stomach the insectazoid styling. I got on the R3, which I’d timidly ushered around Thermal just a couple of months prior. I spent the whole time right up against the rev limiter, giggling the whole way around. At the very end of the day, Nick wanted me to go for one last lap on the R6. But my bike had already been taken back to the garage. “Why don’t you just use that one. It’s got a GP shift, though, so it’s a reverse pattern.” “Man, I’m worried about forgetting and going the wrong way with my foot.” “Oh, you’ll be fine. Just remember, press down to go up the gears, just like it’s an accelerator.” Sometimes, “one last session” is a recipe for disaster. That day, happily, it wasn’t. I took off down the straight, tapping down on the shifter, wondering why every bike wasn’t set up like this. But having to keep my mind on the gearbox and my left foot allowed my muscles to do what I’d spent the weekend training them to do. The course, which had been an “Argh! This section! Ack! That section” proposition a few hours before, simply flowed. I was so elated at my performance, I forgot to pull into the pits, waved sheepishly at Nick and Mark as I blew past, and went for one last turn around the course, crotch back, ass out, visible triangle of light between the bike, my thigh, and my calf as I shepherded the little Yamaha through corners, a supersport supernaut, if only by my own meager standards. Year of the Goose, Part 3: The Graceless Art of Crashing in the Rain Year of the Goose, Part 4: Dirty Shenanigans at American Supercamp Three Motorbikes of Verona: Ducati Displays Tweaked Scramblers If Supercamp had been great training for the moment that grip disappears, Yamaha Champions gave me the tools to make sure it doesn’t get to that point. It’s a huge confidence booster and a helluva a lot of fun, to boot. In short, the Yamaha Champions curriculum is beneficial to any streetbike rider, racing aspirations or no. Fundamentally, YCRS teaches skills that, while useful for building speed on the track, can be legitimate lifesavers on the street. The $1995 price tag may seem steep, but an ambulance ride can quickly add up to more than that. And two days on a racetrack is a lot more enjoyable. For 2016, Yamaha Champions has added a number of half- and one-day, bring-your-own-bike programs (school bikes can be rented in some cases) focused on either street or track riding, at prices ranging from $160 to $495. I’d wholeheartedly recommend that you buy the most time you can afford. What I learned: Everything, and some things I’m still learning. Nick Ienatsch pretty much lives in my head when I’m on a motorcycle, and as time’s gone on and I’ve gained more experience, his instructions continue to resonate. Not to put too fine a point on it, but Yamaha Champions turned me into a real rider, not just some guy on a motorbike. The school didn’t just develop me as a motorcyclist, it gave me the skills to continually improve. Don’t do what I did: For once, there’s not really a don’t here. Just go take the course. Previously: Dirty Shenanigans at American Supercamp Next: Scouting the Great Northwest. Year of the Goose is West Coast editor Davey G. Johnson’s dive into the two-wheeled world. Spending a year on a Moto Guzzi V7 Stone, he’s exploring life with a bike as a new rider, talking motorcycles and culture with figures large and small, and ultimately figuring out how riding can help you be faster in a car.
  6. Nearly five billion people, that is about half the world’s po[CENSORED]tion, are poised to become myopic or short-sighted by the end of 2050, indicates a study. Also called nearsightedness, myopia is a vision condition in which people can see clearly the objects that are close to eyes but objects far away appear to be blurred to the sight. With up to one billion people at an increased risk of blindness, myopia is all set to become the leading cause of permanent blindness globally. Further, with the findings suggesting that the US will have 260 million myopes by 2050, up from the 90 million in 2000, and Canada will see 66 million high myopes by 2050, up from the 11 million in 2000, the vision loss from high myopia is expected to increase seven-fold from 2000 to 2050. The rapid increase in the prevalence of myopia globally is attributed to “environmental factors, lifestyle changes resulting from a combination of decreased time outdoors and increased near work activities, among other factors”, said the researchers. Parents need to ensure that the children’s eyes are regularly checked, improve time outdoors and moderate time on near based activities, including electronic devices. Also, comprehensive eye care services is needed to check the rapid increase in high myopes, along with the development of treatments to control the progression of myopia and prevent people from becoming highly myopic, the researchers suggested in the study published in the journal Ophthalmology revealed. “We also need to ensure our children receive a regular eye examination from an optometrist or ophthalmologist, preferably each year, so that preventative strategies can be employed if they are at risk,” said Kovin Naidoo, a professor at the University of New South Wales in Australia.
  7. Hello Respect model next time And about your problem try to reinstall photoshop Good luck
  8. When you are logged into Windows 8, Windows will display your full name next to your account picture on the Start Screen. Normally you can use the User Accounts control panel to change the full name that is displayed for an account in Windows. If you are using a Microsoft Account in Windows 8, though, you will no longer be able to change your full name in Windows as it synchronizes it with the settings for your account on live.com. In order to change the name that is displayed for a Microsoft Account in Windows 8, you will instead need to logon to live.com and modify your name there. For example, if I had created a Microsoft Account but misspelled my name as Lawrence Abras, my account would look like this in Windows 8. To change my account name so that it is using the correct spelling, you would need to do this at the account maintenance page of Live.com by going to this address: https://account.live.com Once you are at the above web page, enter your login information and you will be at the account summary page for your Microsoft account as shown below. Click on the Edit name link and change your name to the correct spelling. When you are finished making the changes click on the Save button. You can now close the site and web browser. Now reboot Windows 8 and login to the account whose name we just changed. Once you login, Windows should synchronize your name with the changes you just made and display it on the Start Screen. If you find that your name is not being updated to the new display name, please be patient as it may take some time for Windows to synchronize the changes.
  9. A new Israeli app launched by a company with investors including Will.I.Am and Nicki Minaj has been accused of encouraging teen bullying and Internet trolls. The Blindspot app allows users to send anonymous messages, photos and videos to their contacts without the receiver being able to trace it. It has shot towards the top of the charts in Israel but caused controversy—with politicians and campaigners calling for it to be banned as it could feed online bullying. A committee of the Israeli parliament on Monday criticised the app, which the company says has had over half a million downloads since it was launched in late December. The brother of the country's most famous model, Bar Rafaeli, is one of the figures involved in Blindspot, which is due to be launched in the United States and Europe in the coming months. The launch of Blindspot, owned by an Israeli firm, has been accompanied by the largest campaign for a new app in the country's recent history, said Moran Bar, CEO of the Israeli blog Geektime. Adverts showing a yellow smiley face with one eye covered by an eye patch adorn billboards across Tel Aviv and on major highways. The app is a key part of the Shellanoo Group, which is funded in part by investments from global celebrities, including music stars Will.I.Am and Nicki Minaj, as well as Russian billionaire and owner of Chelsea football club Roman Abramovich. he app works like other social networking channels such as Whatsapp, with users able to chat, send pictures and videos. But the identity of the sender remains anonymous. 'A lot of sexual harassment' Adam Shafir, a reporter on an Israeli technology television show, said there had already been cases of bullying. He pointed to similar anonymous apps such as Secret, which was eventually closed down after a campaign against it. "You have a lot of sexual harassment—guys send girls remarks about their bodies, about the things they would like to do to them," he said. "And then there are specific threats, people saying things like 'I will kill you'." The company say there are sufficient checks and balances, with users able to block people and flag threats. Messages deemed serious enough are passed onto police. But Israeli parliament member Merav Ben Ari said she was concerned that young people would be bullied and could even commit suicide. "If you are going to say something nice, you wouldn't send it anonymously," she said. A survey late last year found that around one in five teenagers has experienced bullying online, with a fifth of those considering suicide. In Israel last summer, a civil servant committed suicide after a post on Facebook accusing him of racism went virala claim he denied. 'It's the [CENSORED]ure' Shafir highlighted the case of a couple who were travelling in Europe when they received a message on Blindspot. "The wife got messages saying her husband is cheating on her," he said. "The man denies he is cheating, but this can destroy marriages." David Strauss, a spokesman for Blindspot's parent company, admitted they had received around 300 emails from the irate husband. "But we are just the platform," he said. On Monday, the technology committee in Israel's parliament met to discuss the app. Ben Ari said that "during the two hours we didn't hear even one thing that was good about this app". But Strauss said that anonymity online was "simply an evolution, whether people like it or not". "Maybe this MP didn't like when people started to use CDs, maybe she really liked cassettes," he said. Explore further: Busted: 5 Myths about Facebook's messenger app
  10. A significant percentage of the world’s supercomputing horsepower is in the United States, often in facilities owned or operated in partnership with the US government, as the TOP500 list highlights twice per year. The Department of Energy wants to make some of that computing power available to conventional companies to improve energy efficiency and reduce waste, and it’s announced its first round of partners. A second wave of proposals will be considered starting next month. The government has agreed to sign cooperative research and development agreements (CRADA) in which it will provide $300,000 in funding for each initiative, while the companies in question contribute at least $60,000 in funding (or an equivalent contribution). The program is known as HPC4Mfg, and while the exact terms of each agreement were not disclosed, here are some of the winning proposals: The Agenda 2020 Technology Alliance will work with Lawrence Livermore National Labs and Lawrence Berkeley National Labs to find methods of increasing the amount of solid paper content that enters the drying section of the process from 45-55% up to 65%. Currently, the US pulp and paper industry collectively the third-largest manufacturing use of energy in the country; the industry hopes to cut the amount of energy it uses to dry pulp by 20%. The steel industry (the fourth largest energy consuming industry in the US) wants to reduce the amount of coke (fuel) it uses by roughly 30%. This could reduce costs by up to $894 million per year. GlobalFoundries will collaborate with Lawrence Berkeley on a project called “Computation Design and Optimization of Ultra-Low Power Device Architectures.” GE will also partner with Oak Ridge and Lawrence Livermore to design more efficient aircraft engines and hopefully improve durability and lifespan as well. That particular project is called the “Massively Parallel Multi-Physics Multi-Scale Large Eddy Simulations of a Fully Integrated Aircraft Engine Combustor and High Pressure Vane.” More details on additional projects can be found on the Lawrence Livermore National Laboratory pages. Beyond Moore’s law Earlier this week, we ran a story on the myths of Moore’s law and the kinds of scaling to expect in [CENSORED]ure devices as conventional transistor scaling comes to an end. These kinds of collaborative projects represent a different type of scaling than what we typically consider at ExtremeTech, but one that may become more important in the years ahead. As supercomputers push towards exascale levels of computing, there’s a real opportunity to apply that power to considering complex models and problems that were previously too difficult or expensive to model. The companies partnering with the DoE are all significant players in their respective fields, but that doesn’t mean they’re familiar with the HPC industry. Building processors used in supercomputers, it turns out, isn’t the same thing as knowing how to use supercomputers to optimize processors. In the old days, when computing performance roughly doubled every 18-24 months, there was little incentive to squeeze every last ounce of performance out of any given server, workstation, or desktop. Now, that kind of optimization is one way we’ll increase performance in the [CENSORED]ure — and the government’s research laboratories are going to play a critical role in extending the benefits of HPC modeling to companies that can benefit from them, but can’t afford the substantial cost of purchasing, programming, and maintaining a computer large enough to make the TOP500. If these first 20 programs pay dividends, we’ll hopefully see similar pilot programs in other areas. Considering the modest up-front costs, the benefits would pay for themselves in short order.
  11. As Apple AAPL -1.92% makes iPhones increasingly secure, the FBI has found it more difficult to get at data within suspects’ iOS devices. Hence the All Writs Act 1789 order that landed earlier this week asking Apple to write a special version of iOS that could be installed on the iPhone of San Bernardino shooter Syed Farook. That unique operating system would allow the FBI to make unlimited guesses at his passcode, without any of the purposeful delays and data wiping normal users get as security measures. But Apple CEO Tim Cook bit back, claiming the creation of such a hacking tool would threaten the security of all iPhone owners. It is, as Edward Snowden said, one of the most important privacy and security cases currently being fought between government and the technology industry. Such is the level of security on iPhones, the government has been compelled to take legal steps to co-opt Apple. Indeed, the security is seemingly so tight, federal agencies will likely have to explore other avenues if Apple wins its appeal, whether that’s through hacking in or by biological means, using fingerprint copies or the real fingerprint from a suspect’s corpse. The latter might just be the key to [CENSORED]ure investigations. Hacking into iPhones is expensive and hard Before we get morbid, it’s important to note there are other, admittedly more challenging and costly ways the FBI can try to access iPhone data without having to co-opt Apple or rely on fingerprints. Former NSA staffer and now head of research at Synack, Patrick Wardle, told me the FBI could research its own attacks on iPhones. They would need to develop a low-level exploit that can be triggered without the device being unlocked, and they would have to bypass Apple’s checks on firmware updates, namely the check for a valid signature on downloads from the Cupertino company. Wardle suggested law enforcement could exploit a USB driver, as there are some communications between the phone and computer that occur even when the phone is locked. This would all require zero-day vulnerabilties – previously unknown, unpatched weaknesses in the operating system. As with jailbreaking, these would have to be “chained”, where an attack abuses a number of vulnerabilities in a row to take control of the device. Cheaper and easier to force Apple to cooperate But, said Wardle, it’s easy to see why the FBI wants to get Apple to play ball: it’d be far more reliable to have the manufacturer provide the police with a capability. The government is, like any good hacker, looking for the easiest and quickest way into a device. It’s also much cheaper to force Apple to collaborate. Italian outfit Hacking Team sold its mobile spy kit to federal police for $775,000; that didn’t include anything that would get close to exploiting an iPhone prior to it being unlocked. A jailbreak like the one described above sells for around $1 million; again, that’s with the device unlocked and with some user interaction. So the cost of contracting out the work the government wants Apple to do would be well over $1 million. All this extra work and cost is why the government is using a 225-year-old statute to order the firm to do it for free. A man walks outside the Apple store on the Fifth Avenue in New York on February 17, 2016.Apple’s challenge of a court order to unlock an iPhone used by one of the San Bernardino killers opens up a new front in the long-running battle between technology companies and the government over encryption. / AFP / KENA BETANCUR (Photo credit should read KENA BETANCUR/AFP/Getty Images) And despite suggestions Apple can’t facilitate this on iPhones, security experts say it can, even on the latest hardware. “Apple can provide a signed custom firmware image that can allow the FBI to bruteforce the PIN without having to worry about the phone wiping after 10 failed attempts,” Wardle noted, pointing towards an excellent blog at Trail of Bits. That blog initially suggested newer iPhones than the iPhone 5C used by Farook would not be susceptible to the same kinds of “brute force” techniques the government wants to try. That was because later devices have what’s known as a “Secure Enclave”. The SE acts as a separate security mechanism that works on all devices with TouchID (i.e. not the 5C, but anything above and including the iPhone 5S). Trail of Bits has a great explanation of what the enclave does: “When you enter a passcode on your iOS device, this passcode is ‘tangled’ with a key embedded in the SE to unlock the phone. Think of this like the 2-key system used to launch a nuclear weapon: the passcode alone gets you nowhere. Therefore, you must cooperate with the SE to break the encryption. The SE keeps its own counter of incorrect passcode attempts and gets slower and slower at responding with each failed attempt, all the way up to 1 hour between requests.” The Enclave would slow the FBI’s brute force attacks, which would be carried out with the aid of a powerful processor, to such a degree that it wouldn’t be worth the cops’ time. Just nine attempts would result in a delay of an hour. If the San Bernardino shooter had a long, complex passcode using letters and numbers, it would take an extraordinarily long time. By Apple’s estimates, even on devices without SE, it would take more than five and half years to try all combinations of a six-character alphanumeric passcode with lowercase letters and numbers. It was thought that if one attempted to rewrite the firmware for SE, it would wipe all existing keys stored within it and effectively make the device inaccessible to anyone. That would have meant any special version of iOS created by Apple for the FBI would not have helped on later models protected by SE. But, according to the updated Trail of Bits post, Apple can modify the secure enclave with a firmware upgrade (the assumption is that Apple would also use a firmware upgrade if it had to include the brute force bypass). “Apple can update the SE firmware, it does not require the phone passcode, and it does not wipe user data on update. Apple can disable the passcode delay and disable auto erase with a firmware update to the SE. After all, Apple has updated the SE with increased delays between passcode attempts and no phones were wiped,” the blog read. Apple should therefore be able to provide the same hacker tool for all phones. Using the finger of a cadaver But, whether or not newer iPhones do offer more security from brute force attempts, they are less secure from government hacks in one crucial way: Apple’s TouchID fingerprint authentications can be bypassed with copies of people’s fingers. Researchers have repeatedly proven this is possible on the iPhone 6 and the 5S, using methods involving high-res images, glue and glycerol. Apple TouchID hack -- Lookout security A researcher from security firm Lookout was able to create a fake fingerprint using all manner of materials. It let him hack into an iPhone 5S and iPhone 6, bypassing Apple’s TouchID. Of course, in the case of the San Bernardino shooter, the iPhone 5C did not have TouchID. But for [CENSORED]ure cases, where TouchID is in use, the federal police could take advantage of that prior research. Not only could they use the fingerprints of a living suspect, or create fake fingers using print marks, they’d have more chance of being able to legally use the print of a cadaver. “Fingerprint evidence – unlike a password – is physical evidence that can be compelled with a court order, overriding the objections of an accused or the next of kin of an accused,” said Andrea Matwyshyn, Northeastern University professor of law and a visiting research collaborator at the Center for Information Technology Policy at Princeton University. “Additionally, fingerprint data is frequently available through other government sources such as immigration registration databases or other government databases. Forensic examiners may also be able to lift fingerprints from the body of a phone itself for purposes of unlocking a device protected with a biometric password.” Lifting fingerprints is exactly what whitehat hackers did when creating their own fake fingers to bypass TouchID. Marina Medvin, owner of Medvin Law, told me that though 4th Amendment privacy protections could cause an issue for a living person, ”once you are dead, you don’t have legal standing to assert a 4th Amendment privacy violation”. “Stated more simply: Your privacy wasn’t violated, because you are dead. And you can’t stand before the court to assert such a concept, because you are dead. And your family can’t assert it on your behalf because the 4th Amendment cannot be invoked on behalf of someone else; it’s a personal privacy protection,” Medvin added. The FBI would have to move fast to unlock the device, however. Any iPhone that hasn’t been opened with a fingerprint within 48 hours requires a passcode be entered. But as Medvin noted, it would be hard for anyone to contest a search of someone’s device when they’re deceased, so police could act swiftly without fear of a legal challenge. If the FBI loses, it’ll have to use novel techniques like this to crack open Apple devices. Or it could benefit from employing better technical staff, says Matwyshyn. “Providing law enforcement with the resources needed to build up in-house expertise will result in more efficient and cost-effective investigations,” she added. If Apple loses, however, and is forced to comply with the government’s request, any folk concerned about government snooping on their iPhones will want to disable TouchID and opt for as strong a passcode as possible. UPDATE: As Snowden noted, it’s worth pointing out that the FBI claimed in a court filing that it could not determine any other way into the iPhone 5C in question without Apple’s help. See the screenshot below, which contains a claim from FBI computer forensics expert Christopher Pluhar that he was unable to determine how else to get into the device.
  12. Most of us are in a constant struggle to lose that extra flab around our belly. Hours of exercise go into sculpting the perfect hourglass shape and a flat stomach; but how many of us are successful? Interestingly, according to many nutritionists, the answer to all this struggle lies in our very own kitchen — everyday ingredients when consumed regularly can help cut down those extra tires, resulting in a mid-riff you'd be proud of. Here are 10 of the ingredients that will help melt the fat immediately. Lemon juice: Lemons are an integral part of Indian cuisine, which makes it readily available in most kitchens. This secret ingredient works wonders in cutting through the layers of stubborn belly fat. Begin your day with a glass of water mixed with lemon juice (about half a lemon would do, or three-fourths) and half a teaspoon of honey. Apple cider vinegar: A great ingredient to add some zing to your food, apple cider vinegar also attacks that extra flab in your belly. Drinking it before meals can help in weight loss. Apples are a great source of pectin, which makes you feel full and satisfied, thus, cutting down extra eating. Beans: Did you know those boring green beans can do wonders to help reduce body fat? Not only that, they help build muscle and since they're a rich source of fibre, they also improve the digestion process. Like apples, green beans also have a high level of pectin that help you feel full for a longer time. Doesn't sound so boring now, does it? Tomatoes: It doesn't matter if you pronounce it to-may-to or to-mah-to, as long as you have them in your diet. Tomatoes have a compound called 9-oxo-octadecadienoic, or 9-oxo-ODA, which helps in the circulation of lipids in the blood resulting in reduction of abdominal fat. Tomato helps control dyslipidemia, a condition that is responsible for fat accumulation in the abdomen. Ginger tea: Simply adding ginger to your cup of tea can make a world of a difference to your belly fat. Ginger increases the overall body temperature, which helps burn fat more effectively. Garlic: Garlic is a thermogenic food, just like ginger, which makes it an excellent ingredient to incorporate in your diet if you're trying to lose weight, and especially tackle that stubborn belly fat. According to studies, garlic hinders the accumulation of fat in the body. Mint: Mint has a twofold impact — it cuts down the fat by removing extra bile from your gall bladder. This is important because bile helps your body in processing and storing fat. Mint is also a good source of antioxidants that help improve your body's metabolic rate, thus, help you lose fat ] Aloe vera juice: Aloe vera juice is known to be very effective in reducing abdominal fat. It's also a laxative, which additionally helps in weight loss. Opt for the fibrous version of the juice. Watermelon: It has 91 per cent water — that should be self-explanatory. Eating a couple of pieces of watermelon before your meal helps in filling up your stomach, without adding a substantial amount of calories. It also helps combat water retenition. Cucumbers: Love your salads? You'll love them even more now. Cucumbers, like watermelon, have a high water content and 100g of cucumber just adds about 45 calories to your body. They're also incredibly refreshing, making them a great snack as well. See that paunch disappearing within weeks while munching on fresh cucumbers.
  13. Protecting the privacy of law-abiding citizens from the government is a pillar of Ted Cruz's Republican presidential candidacy, but his campaign is testing the limits of siphoning personal data from supporters. His "Cruz Crew" mobile app is designed to gather detailed information from its users' phones—tracking their physical movements and mining the names and contact information for friends who might want nothing to do with his campaign. That information and more is then fed into a vast database containing details about nearly every adult in the United States to build psychological profiles that target individual voters with uncanny accuracy. Cruz's sophisticated analytics operation was heralded as key to his victory in Iowa earlier this month—the first proof, his campaign said, that the system has the potential to power him to the nomination. After finishing a distant third in New Hampshire, Cruz is looking to boost the turnout of likely supporters in South Carolina and in Southern states with primaries on March 1, where voters are more evangelical and conservative. The son of mathematicians and data processing programmers, Cruz is keenly and personally interested in the work. "Analytics gives the campaign a roadmap for everything we do," said Chris Wilson, data and digital director. "He has an acute understanding of our work and continually pushes me on it." Data-mining to help candidates win elections has been increasing among both Republicans and Democrats. Mobile apps by other presidential campaigns also collect some information about users. But The Associated Press found the Cruz campaign's app—downloaded to more than 61,000 devices so far—goes furthest to glean personal data. The Cruz app prompts supporters to register using their Facebook logins, giving the campaign access to personal information such as name, age range, gender, location and photograph, plus lists of friends and relatives. Those without a Facebook account must either provide an email address or phone number to use the app. By contrast, the app offered by GOP candidate Ben Carson's campaign asks supporters to surrender the same information as Cruz from their Facebook accounts, but also gives an option to use it without providing any personal information. Carson's app separately asks users to let the campaign track their movements and asks them to voluntarily supply their birthdate and gender—including options for "male," ''female" and "other." Ohio Gov. John Kasich's campaign app doesn't request personal information from supporters, but it repeatedly nags users to let the campaign track their movements until they answer yes. Democratic Sen. Bernie Sanders' app, "Field the Bern," requires supporters to sign in using their Facebook account or an email address, and it also repeatedly asks to let the campaign track their movements until they answer yes. The other 2016 presidential contenders, including Donald Trump and Hillary Clinton, appear not to have officially sanctioned campaign apps in Apple and Android stores. The Cruz app separately urges users to let it download their phone contacts, giving the campaign a trove of phone numbers and personal email addresses. The campaign says that by using its app, "You hereby give your express consent to access your contact list," but Wilson said the campaign will not do this to anyone who declines to allow it when the app requests permission. Cruz's app also transmits to the campaign each user's physical location whenever the app is active, unless a user declines to allow it. The campaign said it does this "so that we can connect you to other Cruz Crew users based on your particular geographic location." The campaign tells users it can share all the personal information it collects with its consultants or other organizations, groups, causes, campaigns or political organizations with similar viewpoints or goals. It also shares the material with analytics companies. Cruz's campaign combines the information with data from a group called Cambridge Analytica, which has been involved in his efforts since fall 2014. A Cambridge investor, Robert Mercer, has given more money than anyone else to outside groups supporting Cruz. Sanders' campaign said it shares personal information from supporters with its consultants and vendors but not analytics companies. Cambridge has a massive 10 terabyte database—enough to fill more than 2,100 DVDs—that contains as many as 5,000 biographical details about the 240 million Americans of voting age. Cambridge considers its methodology highly secretive, but it may include such details as household income, employment status, credit history, party affiliation, church membership and spending habits. Cambridge uses powerful computers and proprietary algorithms to predict Americans' personality traits. The Cruz campaign paid Cambridge $3.8 million in 2015, accounting for more than 8 percent of all its spending. Two outside groups supporting Cruz, including one directly funded by $11 million from Mercer, paid the firm $682,000 since December. Cambridge has five employees at Cruz headquarters in Houston and 70 others split between New York City and the Washington suburbs. The power of Cruz's data-driven systems was on display in Iowa. The GOP candidates held similar positions on issues such as abortion and gun control. Cambridge helped differentiate Cruz by identifying automated red light cameras as an issue of importance to Iowa residents upset with government intrusion. Potential voters living near the red light cameras were sent direct messages saying Cruz was against their use. "Everything in this campaign is data-driven. I've never seen anything like it," said Jerry Sickles, a paid field representative in Hooksett, New Hampshire, who uses the Cruz Crew app. "We just know exactly who our voters are, and we will make sure they get out to vote." Cruz, the junior senator from Texas, has been outspoken about protecting Americans' personal information from the government, including the National Security Agency. "Instead of a government that seizes your emails and your cellphones, imagine a federal government that protected the privacy rights of every American," he said when announcing his campaign. Cruz campaign officials say it's different for the government versus a campaign to collect data. Sickle said Cruz is building on the use of big data pioneered by the successful Democratic campaigns of Barack Obama in 2008 and 2012. "It's not like we're giving it to the NSA," Sickle said. A campaign spokeswoman, Alice Stewart, added: "Why wouldn't we want to use every tool available to us to win?" The scope of Cruz's system is formidable. Cambridge's database combines government and commercial data sets such as voter rolls and lists of people who liked certain Facebook posts, along with consumer data from grocery chains and other clients that can provide a voter's preferred brand of toothpaste or whether he clips coupons. In Iowa, where identifying evangelical voters was key to Cruz's victory strategy, Cambridge's employees scoured the Internet for such useful information as church membership rolls. Cambridge CEO Alexander Nix said the company categorizes every American into one of five basic personality types derived from academic research and up to 50,000 questionnaires conducted each month. "We've quantified the personalities of every adult American," Nix said. "We can reach out and target those different clusters with messages about the things they care about most, but that have been nuanced to resonate with their personality type." For example, a Cruz campaign worker about to knock on the door of a house would access information about the household's members through the Cruz Crew app, receiving prepared scripts about what issues each person was likely to care about, modified to appeal to their personality. Even within issues such as the right to bear arms, Nix said personality types will tailor the message. For voters who care about traditions or family, a message may resonate about guaranteeing the ability of a grandfather teaching shooting lessons. For someone identified as introverted, a better pitch might describe keeping guns for protection against crime. Cambridge and the Cruz campaign stressed that anyone providing personal information through the app does so voluntarily. Data uses are outlined in legal disclosures available on the campaign's website. Cambridge said it operates behind firewalls on its computer servers to secure its data and follows all applicable U.S. laws. Cambridge runs its operations out of the U.S.; they would be illegal in Europe under stricter privacy laws there. In the hours before the Iowa vote, the campaign pushed urgent messages through its app to users who had Iowa contacts listed in their phones. The app displayed pre-written text messages the supporters were encouraged to forward to their Iowa acquaintances, urging them to caucus for Cruz. The chief technologist at the privacy advocacy group Center for Democracy and Technology, Joe Hall, said politicians are unlikely to strengthen privacy protections as their campaigns become more and more reliant on mining personal data to squeeze out votes. "This is a form of political-voter surveillance," Hall said. "If people understood that this amount of fine-grained, sensitive data was being used by political campaigns, they would likely feel betrayed."
  14. Researchers at the University of Southampton’s Optoelectronics Research Center have developed a new form of data storage that could potentially survive for billions of years. The research consists of nanostructured glass that can record digital data in five dimensions using femtosecond laser writing. The crystal storage contains 360TB per disc and is stable at up to 1,000 degrees celsius. You record data using an ultra-fast laser that produces short and intense pulses of light — on the order of one quadrillionth of a second each — and it writes the file in fused quartz, in three layers of nanostructured dots separated by five micrometers. Reading the data back requires pulsing the laser again, and recording the polarization of the waves with an optical microscope and polarizer. The five dimensions consist of the size and orientation in addition to the three-dimensional position of the nanostructures. The group coined the storage the “Superman memory crystal” after the crystals found in the Superman films. “It is thrilling to think that we have created the technology to preserve documents and information and store it in space for [CENSORED]ure generations,” professor Peter Kazansky, from the Optoelectronics Research Center, said in a statement. “This technology can secure the last evidence of our civilization: all we’ve learnt will not be forgotten.” The group says the crystals have a virtually unlimited lifetime at room temperature, or 13.8 billion year lifespan at 190 degrees Celsius (hey, that’s the age of the Universe). In 2013, the researchers first stored a 300K text file in five dimensions using the same technology. So far, the group has encoded major documents from human history like the Universal Declaration of Human Rights (UDHR), Newton’s Opticks, the Magna Carta, and the Kings James Bible as digital copies that could theoretically survive humans on our planet. There’s no word yet on the speed of data storage or the cost of the materials or lasers necessary to create these crystals; we imagine they’re not something you’re going to be able to order from Newegg next week. Nonetheless, the group plans to present the research at the International Society for Optical Engineering Conference in San Francisco this week. It says the storage could be useful for national archives, museums, libraries, and other organizations with tremendous amounts of data to store. Back in August, a team of scientists presented a way to use genetic material — DNA — to store virtually unlimited amounts of data for 2,000 years or more. DNA storage is known to be extremely slow, even with modern, high-throughput sequencing. But like the Superman memory crystals described above, we’re talking about massive archival data storage, not booting into Fallout 4 more quickly.
  15. We all put our best foot forward when we start out in a relationship – looking our best, saying the right things and being our polite self. But somewhere along the way, the more we get into a comfort zone with our partners we tend to drop our guards in our interactions. Without even realising it, we stop being polite, stop minding our manners and even stop something as basic as “basic courtesies” to one another. Take the case of Ashu and Ronit. During their courtship period, Ashu never got to see Ronit’s angry side, since they never really faced any such situation then. But after they got married and small fights ensued, Ashu was shocked to see Ronit’s rude side. “I had no idea he could be so abusive. When he is angry, nothing can calm him down and he goes into this barrage of expletives, which leaves me feeling really hurt and disgusted. Agreed we stay together all the time, but it should not be a no-holds-barred venting out. He apologises sincerely after that for his behaviour but I somehow can’t come to terms with all the abuses he hurled at me when angry,” she says. Experts say that while most couples feel that it’s fine to say whatever one wants just because you are in a relationship, the fact is that words once spoken cannot be taken back. The damage done is sometimes irreparable. This is what happened with Kunal and Meghna. When they got married, they both loved to socialise a lot. But Kunal realised that when they were in public, Meghna loved being in the limelight and would often put Kunal down without even realising it. “She would butt in while I was still speaking – oh you don’t know anything; or you have no idea or sometimes – you shut up…I felt really belittled and resentful. We always ended up fighting when we came back home. Sometime she would apologise and sometimes she would accuse me of overreacting. But what I couldn’t deal with was the lack of basic decency that I expected her to adopt towards me,” says Kunal. Counsellors say that lack of politeness towards each other is one of the most common reasons for trouble between partners. And, though, people are aware that rudeness or impolite behaviour will negatively impact the relationship, many people refuse to take it seriously, which, counsellors say, is the beginning of the end of the relationship. That’s because the moment one feels that the partner does not respect him/her enough to be civilised towards one another, there is nothing much left to base the relationship on. Read all the Two to Tango columns here Experts strongly suggest that couples must regularly step back and review how one behaves with the partner – in speech and behaviour, before it’s too late. They also say that if you have stopped treating your partner with the same courtesies and decencies that you started out with, then you both need to review your communication skills. Make sure that you are not so comfortable with each other that you forget that the other needs to be treated decently, politely and with as much respect as you, they add. Once both partners have that awareness, the relationship will get a sound and “decent” foundation.

WHO WE ARE?

CsBlackDevil Community [www.csblackdevil.com], a virtual world from May 1, 2012, which continues to grow in the gaming world. CSBD has over 70k members in continuous expansion, coming from different parts of the world.

 

 

Important Links