0 The Greater Good Movie Trailer
THE GREATER GOOD looks behind the fear, hype and politics that have polarized the vaccine debate in America today. The film re-frames the emotionally charged issue and offers, for the first time, the opportunity for a rational and scientific discussion on how to create a safer and more effective vaccine program.
IF this at the very least makes you makes you aware that there are dangers involved.....it's a good start.
0 Is someone hiding the fountain of youth??!!
0 Iran sends Navy fleet to Gulf of Aden
The Iranian Navy has dispatched its thirteen fleet of warships to the piracy-ridden waters of the Gulf of Aden in a bid to guard Iranian merchant containers and oil tankers.
"The thirteen fleet of warships, comprised of Tonb and Delvar vessels is tasked with boosting security for Iranian merchant containers and oil tankers in the Gulf of Aden and north of the Indian Ocean for a period of 60 days," IRNA quoted Commander of Iran's First Naval Zone Fariborz Qaderpanah as saying on Thursday.
The Iranian military commander also hailed the successful passage of the 12th fleet of warships through the Suez Canal and to the Mediterranean Sea in late January --the first ever journey following Iran's 1979 Islamic Revolution .
"Over the course of the last two years, the Iranian fleet of warships has successfully managed to display its powerful presence in turmoil-stricken Gulf of Aden, and foil any attempt to impair transportation routes along the country's sea border" Qaderpanah added.
The Iranian Navy has so far dispatched a number of military warships to the Gulf of Aden to guard Iranian and foreign vessels sailing in international waters.
The Iranian Navy has been conducting anti-piracy patrols in the Gulf of Aden since November 2008, when Somali raiders hijacked the Iranian-chartered cargo ship MV Delight off the coast of Yemen.
The Gulf of Aden -- which links the Indian Ocean with the Suez Canal and the Mediterranean Sea -- is an important energy corridor, particularly because the Persian Gulf oil is shipped to the West through the Suez Canal.
According to US Department of Energy estimates, the water way is the quickest transit point for ships laden with some 3.3 million barrels of crude -- almost 4% of daily global demand.
I am really starting to believe something really strange is/has been going on in the Gulf of Aden for quite a while....
Please Please give the information below some serious thought before you dismiss it...
truth really is sometimes stranger than fiction.
Stargate in the Gulf of Aden
There is a new subject that has come to light on the internet. That a real Stargate has been found, and it's seven miles underground in the Gulf of Aden in an underground military base. It's also said that it's recently been activated.The Gulf of Aden as you may know has been in the news quite a bit lately. This is where Somalia Pirates have been hanging out, also known as "Pirate Ally". In response to all of these Pirates the UN Council voted to enable countries to send warship to the area. So Nato, England, Russia, China, India, Germany, Saudi Arabia, Iran, Switzerland, United States and others have all sent warships to the area. Even the US Mercenary force Blackwater who has their own warship, was sent there as well.
OK, so long time enemy's sharing the same waters, all over Pirates with a few rocket launchers in fishing boats?? Something doesn't fit.
CLICK HERE FOR MORE
0 Bahrain police killing people by drive by shootings
Police killer brutality. They are massacring protesters . This happened today Sitra 16th March
Thankyou to a Bahrani Citizen for this video.
0 ZIONISTS WON'T LET YOU SEE THIS ON YOUR TV
here is the truth behind the middle east conflict.
ask yourself: Why aren't Americans shown these honest facts on any of the over 1,700 major media outlets?
and WHAT OTHER INFO IS BEING WITHELD?
Rachel Corrie: 'a true hero' was killed by the state of Israel, and by its brutal regime that practises not only 'mass punishment' but also 'ethnic cleansing'. The same regime that has displaced over 4 million Palestinians, and killed many thousands. The same regime that has denied the right to self-determination to the Palestinian people.
A regime that systematically destroys the lives of innocents every single DAY.
0 Japan Earthquake: before and after
Click pic to view the photos and move the sliders to
view before and after versions
Aerial photos taken over Japan have revealed the scale of devastation across dozens of suburbs and tens of thousands of homes and businesses. Hover over each satellite photo to view the devastation caused by the earthquake and tsunami.
0 Battle: Los Angeles with Michelle Rodriguez
Michelle Rodriguez brings the Battle: Los Angeles to Attack of the Show where she sits down with Kevin Pereira to talk about fighting aliens, her theories on the apocalypse and more, well worth a watch.....
0 Japanese volcano erupts
A volcano in southwestern Japan erupted Sunday after nearly two weeks of relative silence, sending ash and rocks up to four kilometres (two and a half miles) into the air, a local official says.
Smoke rises from Shinmoedake peak, a mountain in the Kirishima volcanic range between Kagoshima and Miyazaki prefectures. |
The 1,421-metre (4,689-feet) Shinmoedake volcano in the Kirishima range saw its first major eruption for 52 years in January. There had not been any major activity at the site since March 1.
Authorities have maintained a volcano warning at a level of three out of five, restricting access to the entire mountain.
In April last year, the eruption of the Eyjafjoell volcano in Iceland dispersed a vast cloud of ash, triggering a huge shutdown of airspace that affected more than 100,000 flights and eight million passengers.
1 Could hackers crash your car’s computer — and your car, too?
Could modern cars operating with the help of internal computers be vulnerable to hackers?
Could someone tamper with your software-controlled brakes or stop the engine from afar?
The familiar problem for personal computers is being studied in automobiles as internal computer networks become as critical to vehicles as tires and engines, and as auto companies push to bring the Internet to motorists.
Two researchers demonstrated the ability last year to hack into the internal networks that operate a car’s brakes and engines. While there is no evidence that anyone has hacked into auto computer systems to compromise safety or steal vehicles, industry groups are studying the issue in hopes of getting ahead of future cyber-attacks.
“When people first started connecting their PCs to the Internet, there wasn’t any threat and then over time it manifests,” said Stefan Savage, a University of California, San Diego, computer science professor who conducted the research. “The automotive industry, I think, has the benefit of the experience of what we went through.”
As vehicles are increasingly computerized, researchers and industry officials consider it inevitable that cars will face the same vulnerabilities as PCs. Internal computer networks monitor and control everything from brakes, engines and transmissions to air bags and keyless entry functions. Wireless connections, meanwhile, are becoming more common in reporting a vehicle’s position or providing information about the car’s functions. Some auto companies are creating applications to allow users to control some features in their car with their smart phones.
In a paper presented at a computer security conference last year, Savage and Yoshi Kohno, a computer science professor at the University of Washington, described how research teams were able to “bypass rudimentary network security protections within the car” and “adversarially control a wide range of automotive functions and completely ignore driver input — including disabling the brakes, selectively braking individual wheels on demand, stopping the engine and so on.” The research team also showed how an attack could embed malicious code in a vehicle and then erase any evidence of its presence after a crash.
In a new study, they found ways to compromise security remotely, through wireless interfaces like Bluetooth, mechanics’ tools and even audio files. In one example, a modified song in a digital audio format could compromise the car’s CD player and infect other systems in the vehicle. They were also able to “obtain complete control” over the car by placing a call to the vehicle’s cell phone number and playing an audio signal that compromised the vehicle.
Other reviews have raised similar red flags.
Research teams at Rutgers University and the University of South Carolina showed vulnerabilities of in-car wireless networks that operate tire pressure monitoring systems that tell motorists if their tire needs more air. From a distance of 40 meters (131 feet), they bypassed security to tap into information identifying the tire and tire pressure of cars driving down the road.
The auto industry has taken notice. Jack Pokrzywa, who manages ground vehicle standards for the Society of Automotive Engineers International, said the industry formed a panel to investigate the issue during the past month and hopes to develop common standards and ways to address hacking within the next year. “The industry is certainly concerned about this,” Pokrzywa said.
“Things can be done, if there is a mindset to do this, and with all the electronic devices and the software running them, it’s kind of inevitable that someone will find a way,” Pokrzywa said. “These systems are not built with firewalls upon firewalls.”
The United States Council for Automotive Research, a group funded by Detroit’s auto companies, is also forming a task force to study the issue, said spokeswoman Susan Bairley.
Researchers say they do not want to be alarmist and note that in many cases it required coordinated efforts to bypass the security systems. Kohno said their research was the result of two years of work and “the risk of this happening in the real world is extremely low.” But Kohno and others said the industry was wise in trying to build in more protections to avoid the hacking scenarios common with personal computers.
“I hope it’s more of a warning for the engineering groups that certain systems are vulnerable,” said Ivan Seskar, associate director for information technology at the Wireless Information Network Laboratory at Rutgers University.
The familiar problem for personal computers is being studied in automobiles as internal computer networks become as critical to vehicles as tires and engines, and as auto companies push to bring the Internet to motorists.
Two researchers demonstrated the ability last year to hack into the internal networks that operate a car’s brakes and engines. While there is no evidence that anyone has hacked into auto computer systems to compromise safety or steal vehicles, industry groups are studying the issue in hopes of getting ahead of future cyber-attacks.
“When people first started connecting their PCs to the Internet, there wasn’t any threat and then over time it manifests,” said Stefan Savage, a University of California, San Diego, computer science professor who conducted the research. “The automotive industry, I think, has the benefit of the experience of what we went through.”
As vehicles are increasingly computerized, researchers and industry officials consider it inevitable that cars will face the same vulnerabilities as PCs. Internal computer networks monitor and control everything from brakes, engines and transmissions to air bags and keyless entry functions. Wireless connections, meanwhile, are becoming more common in reporting a vehicle’s position or providing information about the car’s functions. Some auto companies are creating applications to allow users to control some features in their car with their smart phones.
In a paper presented at a computer security conference last year, Savage and Yoshi Kohno, a computer science professor at the University of Washington, described how research teams were able to “bypass rudimentary network security protections within the car” and “adversarially control a wide range of automotive functions and completely ignore driver input — including disabling the brakes, selectively braking individual wheels on demand, stopping the engine and so on.” The research team also showed how an attack could embed malicious code in a vehicle and then erase any evidence of its presence after a crash.
In a new study, they found ways to compromise security remotely, through wireless interfaces like Bluetooth, mechanics’ tools and even audio files. In one example, a modified song in a digital audio format could compromise the car’s CD player and infect other systems in the vehicle. They were also able to “obtain complete control” over the car by placing a call to the vehicle’s cell phone number and playing an audio signal that compromised the vehicle.
Other reviews have raised similar red flags.
Research teams at Rutgers University and the University of South Carolina showed vulnerabilities of in-car wireless networks that operate tire pressure monitoring systems that tell motorists if their tire needs more air. From a distance of 40 meters (131 feet), they bypassed security to tap into information identifying the tire and tire pressure of cars driving down the road.
The auto industry has taken notice. Jack Pokrzywa, who manages ground vehicle standards for the Society of Automotive Engineers International, said the industry formed a panel to investigate the issue during the past month and hopes to develop common standards and ways to address hacking within the next year. “The industry is certainly concerned about this,” Pokrzywa said.
“Things can be done, if there is a mindset to do this, and with all the electronic devices and the software running them, it’s kind of inevitable that someone will find a way,” Pokrzywa said. “These systems are not built with firewalls upon firewalls.”
The United States Council for Automotive Research, a group funded by Detroit’s auto companies, is also forming a task force to study the issue, said spokeswoman Susan Bairley.
Researchers say they do not want to be alarmist and note that in many cases it required coordinated efforts to bypass the security systems. Kohno said their research was the result of two years of work and “the risk of this happening in the real world is extremely low.” But Kohno and others said the industry was wise in trying to build in more protections to avoid the hacking scenarios common with personal computers.
“I hope it’s more of a warning for the engineering groups that certain systems are vulnerable,” said Ivan Seskar, associate director for information technology at the Wireless Information Network Laboratory at Rutgers University.
0 Money From Nothing
The Economics Of Banking & Legal Tender
Esoteric Complexities Which Typically Render
Most Individuals Dazed & Confused
Clueless About This System We Use
On A Daily Basis -Throughout Our Lives
An Idea We've Been Sold And Continue To Buy
Promises Of Debt Pass Through Our Hands
Everyday We Undertake What We Don't Understand
Subscribe to:
Posts (Atom)