Problem:
Nokia 5800, any firmware =< v40
Shortcuts bar does not show on Homescreen - it seems like just disappeared. Shortcut buttons seems to be invisible/transparent - can be clicked, but nothing happens. Dialer and Contacts buttons are visible, but nothing happens when clicked.
Solution:
Phone must be hacked If it’s not hacked - hard reset is the only solution…
- Start ROMpatcher+
- turn on Open4All_RP+
- use X-plore [file manager]
- Go to: c:\private\10202BE9\persists\
- delete file 10275102.cre
- restart phone
Uz tri odlicna postojeca besplatna online anti-virus scannera (Jotti, VirusTotal, VirScan), pojavio se i komercijalni online virus analyzer - virtest.com. Jest da nekome analiza vrijedi tih novaca, ali ja ne spadam u skupinu onih koji bi bili spremni dati neke pare za analizu smeca za koje sumnjam da bi moglo napraviti sranje na masini.
Odlican tool, online sanbox environemnt i analyzer, posebno pogodan za s neta skinute stvari, kad postoji bojazan da bi se pokretanjem mogao startati kakav dropper… Ne samo da analizira ponasanje softwarea, vec ga provlaci kroz antivirus scannere. Doduse, za report treba pricekati ponesto minuta, ali kazu da je sustav skalabilan…
ThreatExpert is an advanced automated threat analysis system designed to analyze and report the behavior of computer viruses, worms, trojans, adware, spyware, and other security-related risks in a fully automated mode.
In only a few minutes ThreatExpert can process a sample and generate a highly detailed threat report with the level of technical detail that matches or exceeds antivirus industry standards such as those normally found in online virus encyclopedias.
ThreatExpert takes a threat file, places it in a self-contained simulated virtual environment, deliberately executes the threat in this environment and then monitors its behavior. A combination of file, Windows Registry and memory snapshots are recorded, in addition to a series of specific ‘hooks’ that intercept communication routes typically exploited by threat infections. These hooks ‘deceive’ the threat into communicating across a simulated network, whereas the threat’s communication actions are actually being recorded in detail by ThreatExpert. Using this invaluable recorded data, a detailed report is generated, consisting of file and Windows Registry changes, memory dump analyses, and other important system activities caused by the threat.
Vidim, twitteromanija polako pocela uzimati maha u HR. Iako sam servis postoji vec podosta vremena (toliko da se se pojavilo milijardu kopija, look-a-likea, servisa inspirianih Twitterom [citaj: doradjenih kopija]) kod nas je ted odnedavno poceo pustati korijenje. Kasnjenje viralnog network effecta je kao i u slucaju s Facebookom- preko godinu dana, ali znatno manje nego je to bio slucaj s blog-hypeom [vjerojatno zato jer je blog tada bio potpuno nov koncept, dok funkcionalnost Twittera vec postoji u mnogim postojecim servisima, prije svega vrlo popularnom Facebooku].
Kako bilo, ne predvidjam da ce twitteromanija zivjeti dulje od blogomanije. Jos jedan prolazni hype na kojem ce profitirati valjda samo autori servisa i kojekakvi “analiticari” i lezilebovici koji sebe vole nazivati komentatorima web trendova [citaj: uglavnom oni koji hypeove i stvaraju (ili misle da to cine bas oni) - sto zbog nedostatka/nepoznavanja stvarnih tema, sto zbog nepoznavanja elementarnih trzisnih zakona i potrebe za postojanjem realnih poslovnih modela]. I ova kriza je dobro dosla kao purgativ takvim servisima… nazalost, tu je pao i jedan nebruseni dijamant: Google Notebook, ali to je jedna druga prica…
No, nakon sto se i ovaj “servis” istrese, valjda cemo biti sve blize informacijskom idelu koji rjesava stvarne probleme i to na ucinkovit i jednostavan nacin, a dalje od stvari koje se rade samo zato “jer se to moze napraviti".
Vrlo, vrlo zgodan i inovativan nacin prezentiranja.
PPT su vam premonotoni? Prezentacije u stilu Lawrenca Lessiga ste vec prozvakali i radite ih lijevom rukom, dubeci na glavi u mrklom mraku?
Na red dolazi Prezi - inovativan “slide” koncept za prezentacije…
Iskoristite dok je jos svjeze
http://prezi.com/showcase/
Iako ni ovo online izdanje nije za baciti, vise mi djeluje kao proof-of-concept, a ne alat u koji biste se apsolutno pouzdali kad je u pitanju nesto (vazno) poput prezentacija. Cini mi se da bi se od ovoga mogao razviti odlican offline presentation tool u stolu Powerpointa.
USB autorun je ovih dana glavni vektor za spol… ovaj, racunalno prenosive bolesti Najrizicnija skupina - naravno - studentice i studenti! Il’ si medjusobno kopiraju, il’ nose svoje stickove po kojekakvim kopi-prcvarnicama s najpromiskuitetnijim racunalima u ovoj dimenziji. Vecina tih racunala nema ni osnovnu zastitu zvanu - iskljucen USB autorun. To onda znaci samo jedno, a to su dvije stvari - USB stickovi, virusi, epidemija!
Evo par savjeta kako iskljuciti jedan od najbeskorisnijih i najdebilnijih Win featurea - autoplay/autorun, vjerojatno izvorno skovan na Macu [samo na tom racunalu se takve pizdarije mogu nazvati i hvaliti kao feature].
Difficulty: Easy
Time Required: 2 minutes
Here’s How:
The easiest and most effective means to truly disable autorun can be done via this simple autorun registry hack:
Save the file as something.reg. (You have to be sure to change the “Save File as Type” to “All Files” before saving, or Windows will try to save it as a .txt even if you typed in .reg.
Locate the file you just saved and double-click the file to run it. You will receive a prompt asking if you want to add the data to the registry. Click yes to allow the modification.
The above method nulls any request for autorun.inf and works on XP Home or Pro, as well as Windows Vista. Credit for this tip goes to Nick Brown.
If you opt to disable autorun using any other method, you will first need to install an autorun patch from Microsoft that allegedly resolves issues that cause autorun to run even after it’s been disabled (using methods other than the above recommended method).
XP Pro users who have installed the appropriate Microsoft patch for your system and wish to disable autorun using a method other than described above, follow steps 3 through 8 only. XP Home users begin at step 9.
Windows XP Pro users: Click Start and then click Run. Type gpedit.msc and click OK. The Group Policy window will open. In the left pane, double-click Administrative Templates
In the right pane, double-click System, scroll down the list and double-click Turn Off Autoplay
In the Turn Off Autoplay Properties window, select Enabled. From the dropdown next to Turn Off Autoplay on, select All drives and then click OK. Exit Group Policy by selecting File, then choosing Exit from the menu.
XP Home users will need to make the changes by editing the registry directly. To begin, click Start and then click Run
Type regedit and click OK. The Registry Editor window will open.
In the left pane, navigate to:
HKEY_CURRENT_USER
Software
Microsoft
Windows
CurrentVersion
Policies
Explorer.
With Explorer highlighted, in the right-pane right click the value NoDriveTypeAutoRun and select Modify from the drop down menu. The base value will be set to Hexadecimal. If not, select Hexadecimal.
Type 95 and click OK.
Note that this will stop Autorun on removable/USB drives, but still allow it on CD ROM drives. If you want to disable autorun on both, substitute b5 for the 95. (Thanks to Ian L. of Manitoba for the tip).
Exit Registry Editor by selecting File, then choosing Exit from the menu.
You will now need to reboot your computer for the changes to take effect.
Jasno, ovaj site na kojem ste sada “can’t do any harm” [osim mozda izazvati epilepticki napad ili zelju za gledanjem u bolje dizajnirani blog (koji to ni nije, ali to je jedna druga prica…;-))], ali upravo poruka iz naslova je bila prikeljena za ovaj, ali i sve ostale Google search rezultate danas, od 16:10 do 16:30 31.01.2009. - u cijelom svijetu! Yep… Zbog pada Stopbadware.org - sustava koji Googleu providea relevantne informacije o “badware” (zlocudnim) siteovima - svi Google rezultati su oznaceni kao “badware".
Ovom greskom su bili pogodjeni SVI Google rezultati pretrazivanja, neovisno o tome je li se radilo o Google.com ili lokaliziranoj verziji trazilice.
Bas me zanima kada ce Google napisati sluzbeno objasnjenje i kako ce ono zvucati…
Prvo Google ubije Google Notebook (i neke druge, ne toliko bitne/popularne servise) i zestoko uzdrama povjerenje mnogih u cloud computing, a sada se pojavi ovakva trivijalna (po nastanku) greska koja se vjerojatno mogla zaobici s nekoliko linija koda.
Sam Google je ovaj ispad fantasticno dokumentirao [zivjeti Google alati!] ovaj dogadjaj [ovo je Google Trends za 2009 01 31]:
Update!
Stiglo objasnjenje iz Google-a… hehe, kao sto rekoh - par linija koda!
Cim o tome pise najsocnija (al’ ‘ladna) geek-riba Marissa - znaci da je jebeno vruce u Mountain Viewu…
What happened? Very simply, human error. Google flags search results with the message “This site may harm your computer” if the site is known to install malicious software in the background or otherwise surreptitiously. We do this to protect our users against visiting sites that could harm their computers. We work with a non-profit called StopBadware.org to get our list of URLs. StopBadware carefully researches each consumer complaint to decide fairly whether that URL belongs on the list. Since each case needs to be individually researched, this list is maintained by humans, not algorithms.
We periodically receive updates to that list and received one such update to release on the site this morning. Unfortunately (and here’s the human error), the URL of ‘/’ was mistakenly checked in as a value to the file and ‘/’ expands to all URLs. Fortunately, our on-call site reliability team found the problem quickly and reverted the file. Since we push these updates in a staggered and rolling fashion, the errors began appearing between 6:27 a.m. and 6:40 a.m. and began disappearing between 7:10 and 7:25 a.m., so the duration of the problem for any particular user was approximately 40 minutes.
Posted by Marissa Mayer, VP, Search Products & User Experience
Uz nekoliko postojecih i u Hrvatskoj najkoristenijih: BWM CARNet, SpeedTest.net, DSLreports, pojavio se novi igrac na nebu za mjerenje brzine i troubleshootinga Internet veze -> www.measurementlab.net… Osim standardnih testova brzine, nudi i razne alate za trobleshooting veze… very nice…
Svaki komadic opreme, makar se radilo o celicnoj kugli na dnu mora, kosta N puta skuplje ako ima prefiks “foto". Tako npr. foto-maramice (koje ni po cemu nisu bolje od npr. vlaznih maramica za brisanje naocala, sto se u DM-u mogu naci za 10kn/40kom), foto-gumice za brisanje objektiva, foto-komadi plastike (lens hoods) , foto-vagine i sl. kostaju iracionalno puno novaca. Proizvodjaci foto opreme znaju da su fotografi uvijek znali utopiti svoje radove za masne pare… Tako obican flash extension cord od metar kabela i dva konektora kosta 300-400kn.
Zanimljiva forica za ustediti ponesto novaca na skupim foto-(ne vidim po cemu su posebniji od drugih)-kabelima. Ta-raaaa…
Doduse, pare se moraju pljunuti za konektore, ali bar se kabel moze razvuci do panja… drugi potencijalni minus je naglasavanje onog U u UTP, ali dok netko ne predje s teorije i ne potvrdi da to stvara probleme iz prve ruke - kontat cu da su ovo super DIY dumine…
ZZEE PHPExe compiles PHP, HTML, Javascript and other web files into Windows GUI exes. You can rapidly develop Windows GUI applications by employing the familiar PHP web paradigm. You can use the same code for online and Windows applications with little or no modification.
http://www.zzee.com/phpexe/
Vezani blogovi:
No related posts
Was this article helful to you? If so, please click on the (+) [plus] sign below! It's Croatian digg ;-) Tnx!
Nakon nekog vremena koristenja, YouTube filmici u Firefoxu se znaju smrzavati nakon prvih par odgledanih sekundi, bez obzira koristio se native Mozilla rendering engine, ili onaj IE-tab. Dakle, problem ocito nije u rendering enginu, nego negdje u ljusturi… kako god, problem je dosadan kao ush i random se javlja kod svih kombinacija Flash playera v 9.0.115.0 (na nizim verzijama se problem ne javlja) i Firefoxa (od verzije 2, do 3.04b - za koju kazu da rjesava problem).
Firefox: 2, 3 < 3.0b4
Flash: 9.0.115.0
Flash have admitted there is a bug which causes this and reverting to a previous version will fix it, while the bug will be resolved in the next flash update.
1. Browse to C:\Documents and Settings\ u s e r n a m e \Application Data\Macromedia\Flash Player\#SharedObjects\GVP00001
2. Delete all the files and folders in this folder
3. Browse to C:\Documents and Settings\ … \Application Data\Macromedia\Flash Player \ macromedia.com \ support \ flashplayer \ sys
4. Delete all the files and folders in the directory
5. Restart Firefox
Once you have your rough draft laid out in CSS, and you need to start adding style, Rounded Cornr can save you a lot of time. Rounded Cornr quickly and easily creates images and CSS code for different box styles in an easy to use interface. It also offers an option to code it using only one image for all four corners, saving a minimal amount of bandwidth.
Amazon S3 down vec nekoliko sati. EU S3, US S3 serveri, Amazon Elastic Compute Cloud (API). Buduci da su mi do sada sluzili samo kao redundantna-podrska u kriticnim peak-situacijama, ovaj outage sam lako zaobisao jednostavnim uklanjanjem redirecta. Ja sam sitna riba i servis mi ne ovisi o S3. Ali, ali… postoje mnogo vece ribe, postoje ribe koje su poslusale Bezosova nagovaranja da svoje servise TEMELJE na pouzdanoj, sigurnoj, scalable, blah-blah tehnologiji. Njih je ovaj outage kostao ne samo zivaca, vec sasvim konkretnih i opipljivih megabucksa!
Amazon S3 je vec bio down par sati u veljaci 2008. Znatno kraci pad i s manjim opsegom nego ovaj.
Prije kojih godinu dana bio sam pogodjen iGoogleovom greskom koja je rezultirala visednevnom nemogucnoscu koristenja servisa odredjenom broju korisnika. Opet me nije previse pogodilo, jer sam onaj najvazniji gadget (GoogleReader) pratio na njegovim izvornim stranicama. Ali opet se postavlja pitanje - sto ako jednog dana rikne Gmail, a bas tih dana mi dodju vrlo vazni mailovi? Sto ako jednog dana rikne Google tutto-completo (nemojte se smijati, ni dot-com-boom nitko nije predvidio) i svi njegovi servisi?!
No, bit ce zanimljivo pratiti kakve ce ovo imati posljedice po SaaS filozofiju i smjer u kojem su se razmisljanja o buducoj infrastrukturi Interneta pocele odvijati… Dobro je sto se ovo dogodilo u trenutku kada cloud-computing ("oblacno racunarstvo"(?)) nije toliko rasirilo i cini samo manji dio online infrastrukture.
Nisu ovdje u igri samo Google i Amazon, koji jos i imaju snage za amortizaciju i sigurno trostruke disaster recovery scenarije. Ovo je pitanje koje se vise tice svih onih koji ce se u ovoj “oblacnoj” atmosferi tek pojaviti, nudeci “sigurne” i “skalabilne” usluge, trzisno se nadmecuci s vise-za-manje (para). Ovo se tice svih onih koji ce takve udice progutati i mozda jednog dana skupa sa svojim domadarom nestati s lica zemlje - kao da nikada nisu ni postojali.
Za CDN (Content Distributed Network) se jos i mogu napraviti redundantna rjesenja, ali sto hostanim aplikacijama, iznajmljenim procesorskim snagama, bazama?!
Predvidjam da ce se u buducnosti sve vise poceti govoriti o CDN failover scenarijima. Predvidjam i standarde za migraciju, replikaciju i redundancy management medju CDN-ovima.
Svidja vam se neka mjuza na necijoj MySpace stranici, ali ne postoji opcija za download pjesmice? Umjesto tuge, jada, cemera i kuknjave predlazem jedan od ova dva nacina…
1. Posjetite: http://file2hd.com/
- upisete URL stranice i pri dnu imate spremne MP3ice za download i to u 96kbps i original_bitrate verzijama
2. Pronadjite na torrentima programcic MySpace mp3 Gopher. Ili klinite na link ispod [ova verzija radi na dan 2008 07 20]: http://www.torrentz.com/f2d3b81d414c16e05368f567f6857f262e07de5e
Lik je patentirao napravu koja projicira fotku iz fotoaparata (s filma) na objekte u koje se usmjeri “fotic". Ali, nije dumina u tome, nego u cinjenici da se slika projicira u trenutku kad okine flashe s tudjeg fotoaparata. Foto-uzurpator!
Npr. lik fotka ribu na ulici, a foto-uzurpator se nalazi u blizini i usmjeri svoju napravu (fulgurator) prema ribi. Lik okine fotku (s flashom) i u tom trenutku se na ribu iz fulguratora projicira golo tijelo npr. Lare Flynn Boyle… ili necije jetrve…
http://www.juliusvonbismarck.com/fulgurator/
Julius von Bismarck’s ‘Image Fulgurator’ projects stealth images into the photographs of strangers, while keeping those images invisible to human eyes. Depending on whom you ask, it’s either a clever hack or an obnoxious intrusion. Naturally, we had to find out more.
Yesterday, von Bismarck’s device made its premature debut on the internet. Today we met him in his hometown, Berlin, to talk about the device, the thinking behind it and the inevitable deluge of e-mails from viral marketers wanting use it to smash their way further into our brains.
But first, about that name: According to von Bismarck, ‘Image Fulgurator’ comes from the Latin for ‘lightning’ (fulgur) and means ‘Flash Thrower’.
First, let us make clear that von Bismarck has applied for a patent for the Fulgurator. He stressed this point. Of course, anyone with the requisite skills can make one of their own, but Julius wants to keep some degree of control over commercial use.
To see why, consider how it works. The device is a modified camera – in this case, an old manual Minolta SLR. A flashgun fires through the camera in reverse, from the back. The flash picks up the image of a slide inside and projects it out through the lens and onto any surface.
The trick is in the triggering. The Fulgurator lies in wait until an unsuspecting photographer takes a picture using a flash. When the device’s sensor sees this flash, it fires its own unit, throwing up an image which is captured by the hapless photographer’s camera while remaining unseen by the naked eye.
Now, imagine for a moment that an ad agency gets hold of this. You couldn’t take a photograph of a tourist attraction ever again without worrying that some marketing crap would be pushed into your camera. As Julius told me, "I see it as a piece of media art. It could be a dangerous attack on media. [But] if people do shit with it, I feel bad."
This is the reason for the patent, and although he doesn’t have an army of lawyers behind him, Julius seems to be on top of the legal side of things. He’s also moving fast. This Fulgurator is the first prototype, and the most primitive. "It works, but it’s not practical," he says. "In a few years time, huge companies will use it for shit," but by then, Julius will be at the next stage. He already has more working models (which I wasn’t allowed to see) which are refinements of this one.
At its simplest, the Fulgurator is a very easy hack. A hole has been cut in the back of the camera and a piece of clear, roughened acrylic put in its place. A rear tube allows the flashgun to slide in. Everything else remains intact. The slides themselves are just rolls of processed film (the pictures are snapped from Julius’ computer monitor) returned to their canisters and then loaded up as if a normal film. Any image on the reel can be selected by turning the rewind crank. When you hold the Fulgurator up, you can see the subject on the acrylic screen and line it with the image on the slide. You can also focus, to ensure the final projection ends up sharp.
But the magic happens inside the flash sensor on the top. Ordinary slave flashes (which fire whenever they detect another flash going off) aren’t reliable enough, so von Bismarck built his own circuitry. The original was based on the Arduino platform but has evolved into a custom-made circuit. The knobs were for tweaking the settings on the prototype, stuff which is all now taken care of by software.
Julius had ripped the guts out of the box for a newer version, so we couldn’t see it in action, but we know what it does. Modern digicams flash for all kinds of reasons, such as red-eye reduction and focus assistance. What Julius’ circuit does is to ignore all of these false strobes and fire only when the photo itself is taken. This is the secret sauce of the Fulgurator.
Clearly, this is a prankster’s dream. But Julius thinks it has a serious side, too, which is why it looks like a gun. "It’s important that people know it’s not just a funny idea," he told me, "it can also do negative stuff."
It seems that the "negative stuff" consists mainly of pissing people off, like the aforementioned marketing uses. We’re looking forward to seeing what the next gen hardware can do, though. Take a look at this picture:
The message is ‘Fulgurated’ onto a black laptop bag. Turning black to white is powerful stuff, but it’s not just slogans that can be fired. Although Julius frames his nerdery in an artistic context (he’s studying a German Diploma called "Digital Class" at UDK, Berlin’s art school) he clearly has a soft spot for tomfoolery. In the image below, you see an image of a naked body which can be projected onto a clothed person.
The possibilities are endless, but Julius is just getting started. When I suggested that he put his own URL on the images, so victims could later check to see just what had happened to their pictures, he seemed surprised (later I learned that he does plan to include it later, to promote his own work). In fact, the whole thing has happened a little too quickly.
Yesterday’s ‘leak’ onto the internet was intended as a place holder for an entry into Ars Electronica’s Cyber Arts exhibition in September. Instead, it catapulted him into internet fame and he has already received high-priced offers for his work. If he manages to keep on top of things, this little hack could make him some big money.
Odlican primjer .htaccess-a koji bi trebao odbiti dobar dio napada se moze naci ovdje: My Webapplication Firewall Tutorial. Najbolja preporuka za ovaj vid zastite lezi u cinjenici da je pravila sastavila osoba kojoj je domena securitya web aplikacija dobro poznata.
ovakav ili slican .htaccess + ModSecurity + dobro definirana pravila na HW/SW firewallu (block all, allow only necessary na ogranicenim IP rangeovima) i server bi mogao biti poprilicno siguran…
Youtube has slowly started to create better quality versions of many videos, adding links that say, “Watch this video in higher quality.” See this High Quality example and compare it to Youtube’s Normal Quality.
Comparison of Normal Youtube vs Youtube High Quality
-
Normal Youtube
High Quality Youtube
Screen Res.
320 x 240
480 x 360
Bitrate
≅ 200 kbps
≅ 900 kbps
Audio
22KHz 64 kbps Mono ABR
44.1KHz 96 kbps Mono CBR
Frame Rate
30
30
Video Codec
Flash Sorenson
Flash Sorenson
Audio Codec
Mp3
Mp3
Getting iPod compatible mp4s!
Adding &fmt=6 to the end of any youtube video’s url will give you Youtube’s new high quality setting. Changing the number from 6 to something else yields different formats though it’s not obvious which numbers work. Format 18 generates an mp4 using h264 with AAC stereo, which is compatible with video iPods. This is way better than using a service like vixy.net, which transcodes the crappy quality youtube vid into an mp4. Using fmt=18, you get a video transcoded from the original clip the user uploaded. The bitrate is lower on the mp4 version, but since the resolution is smaller it compensates. The h.264 codec has better looking videos at lower bitrates anyway. We finally see stereo on youtube with the mp4 version! It has a widescreen 16/9 aspect ratio rather than 4/3.
Correction:
Previously I thought the mp4 screen resolution was 480 x 270, but it’s also 480x360. It could be that both formats have the possibility to be 480x270 if their aspect ratio is close to 16/9 width/height. The mp4 version may add an additional small audio gain and a small sharpening effect.
Video downloaders like keepvid still work. Enter the url, click download, now grab the link and add &fmt=6 or &fmt=18 (for mp4) to the end. The good people at lifehacker created an easy to use firefox extension that will put a download link under each vid. You can also get the download url if you follow my wireshark tutorial but the process is pretty tedious.
You can do it manually too, but it’s annoying. Go to any video on youtube, right click then click view source. Click ctrl+F, which will open a searchbox and type &t=. Next copy the value after the t= but before any “&” characters. Grab that and the video_id and your set. The vid id is the v=something part of the url. Just copy the variables into the url below.
www.youtube.com/get_video?video_id=&t=&fmt=18
Example Vid URL: http://www.youtube.com/watch?v=pVYp2sgA9M0 Output: right click - save as
You may want to pass it to a download manager like wget. If you load it in the browser it will display a bunch of gibberish while it loads the entire video’s ASCII representation into your browser.
Howto Get Videos to Play HQ by Default
This option has not been implemented on many accounts but the howto is already present in the youtube help pages. You need a youtube account to be able to do this.
Go to your Account page.
Under “Manage My Videos” click the “HQ Video Playback Setting” link.
Select the playback setting that makes sense for you.
Click the “Save” button.
Criteria for a Video to Become HQ
The exact settings aren’t know yet for the video to become high quality. We could assume that the exact minimum settings are the same as encoded format listed above, however youtube has changed their “best format to upload high quality” help page to set the video resolution to 640 x 480. Maybe high quality will support different formats and aspect ratios in the future. It’s best to upload as high quality as possible. The new multi video uploader makes it easy on a unreliable connection. Even if your upload times out or you get disconnected it will restart the uploading process exactly where it left off.
Embed High Quality Youtube Clips
Update
This code works fine to embed the mp4 version. The magic query string var is “&ap=%2526fmt%3D18″ specifying format 18. Just replace (VIDEO EMBED URL) with the video ID. Note that there’s a huge disadvantage in that there is no seeking. The fmt=6 embed version is less reliable.
Currently there is no official way to embed the High Quality videos on your website / myspace / blogs. It’s possible, but a big hassle, and it’s impossible to turn off autoplay. Here’s an example you can embed if you want to see it for yourself.
It only works with youtube’s in-site player, player2.swf, rather than the player youtube has for embeds. The problem is youtube’s in-site player does not have a variable to turn autoplay on or off and if you try embedding it to your site flash issues a warning that the script is trying to contact a remote server (youtube.com). Player2.swf seems to have an internal “ap” variable hidden in the actionscript but it seems to just break the vid no matter what options I set. The key flashvar for high quality is “fmt_map=6/0/7/0/0″ and “fmt_map=18/512000/9/0/115″ for mp4s. When enabled, the flv file comes from cache.googlevideo.com/videoplayback?itag=6, without the fmt_map var it comes from cache.googlevideo.com/get_video, with normal quality.
To embed a high quality video you need to go to the video’s page on youtube, view source, and grab the flashvar data. The most important vars are video_id, t, and sk. Just use the above embed code as a template and replace those values. As for the rest: L defines how long the video is in seconds, hl is the home language, plid tries to find any associated playlists, playnext plays the next item on the playlist if there is one.
Making your youtube videos High Quality
Youtube will be automatically creating high quality versions of many videos for those that meet the guidelines. The video quality is bad on youtube, partly because youtube encodes to such a small screen resolution with a low bitrate, but mainly because people post really low quality videos.
The crappy resolution youtube is actually what got it so popular. Google video had originally allowed 640 x 480 with a great bitrate, but they failed miserably to compete against youtube (so they later bought em out). It made online video making / viewing possible even on crappy connections. Take the time to resize your vid and sharpen it a bit before uploading. A little noise reduction and color correction can’t hurt either. Use virtualdub and avisynth. They’re free. Use xvid or x264 and lame acm for the audio. Divx is fine if you can get the pro version. See doom9 for tons of guides on video creation / editing / improvement.
Youtube High Quality Hack
There is also a hack using total video converter where if you make an flv with certain settings you can upload a video of super high quality and have youtube keep the screen resolution and bitrate.
Youtube High Quality Hack Settings Howto
Select what you want to encode into an flv in total video converter with these settings.
Sample Rate: 44100 Hz audio bit rate: 320.000 kbit/s Audio codec: mp3 Custom video bit rate: any Resolution: any
Cons
It messes up the time on the video. A 30 second video can read as 9 minutes. The way it tells how long the video is seems very random but it constantly says the video is much longer than it really is. Having the resolution or bitrate too high causes it to not stream well and get stuck.
It wasn’t really my intent to go back and revisit all these security post lists. That’s just how it seems to have turned out. That’s OK. Software gets developed and updated. Lists grow. New and better versions get released….
To summarize: “…a rootkit is executable code that attempts to evade detection of running processes, files or system data. There are many ways it can do this, but the end result is that they are very hard to find and can make an infected system look clean and safe even to traditional anti-virus and anti-malware software.” More here: Wikipedia : Rootkit
At the time of my original post, there were just a handful of anti-rootkit tools available to the public. I just offered five.
Now most all major anti-virus/security software vendors have issued anti-rootkit solutions, though some are still in a beta release form.
The Threat
How seriously concerned should the average user be? Well…if you are practicing “safe-surfing” by staying away from “risky” websites, keeping your operating system patched, scanning all files downloaded and sent in email with an up-to-date anti-virus program, you should be mostly ok. I say mostly because it is still possible for a system to become compromised with a rootkit, even if you are playing by the rules.
Certain individuals would like nothing else than to get a home-broadband user’s system infected with a rootkit. Not so much to steal your personal information–though that’s always a potential target–but to install trojan services that would allow them to leverage the system for attacks on other larger systems, spam-mail-bot rental services, or even hosting of their hidden/illegal files on the system. Any of these events could seriously make a home or corporate user’s system a great big pile of steaming cow-dung for the user and those impacted by those services. Bummer!
SANS-ISC recent reported that Europe has been pounded lately by emails which include variants of a virus/trojan loader file: European Storm Video E-Mail. While bad, it doesn’t sound too serious…but!
heiseSecurity in Germany expands the story with more details, much more disconcerting: “Storm worm” sloshes through the internet. What the trojan seems to be doing is download additional files from the internet, and “…according to GDATA, one action it takes is to install the rootkit Win32.agent.dh.” Depending on the anti-virus company, different names may be used.
Rootkit writers aren’t happy about the attention. Just this week, they have worked to get the GMER anti-rootkit mirrors shut down under a massive DDOS attack. As soon as new mirrors for the files went up, they also were attacked. More information: GMER Anti Rootkit & People Power, and Martijnc’s blog post: DDoS attack
The battle for pc security rages on.
The Response
There are a number of ways to look for a rootkit on your system.
The first is to download and run several of these rootkit detection tools on your live system. These rootkit detection tools are specially programmed to check for hidden files and masked running or injected processes. It’s a cat and mouse game, and some tools and methods are more effective than others. Just as hard as the security programmers work to prevent and detect these rootkits, the developers on the other side are working to make them more difficult to be detected.
A second technique is to download and run several of these rootkit detection tools onto a USB drive. Then using a bootable “LiveCD” like BartPE or Linux, run the appropriate rootkit detection tools on the “dead” system’s drive(s). This may be a much more effective approach. Since the infected system isn’t being booted, the drives just contain “static” data files that shouldn’t be executed. They could be, but that’s the point…to not run or launch any files on the potentially compromised system. That way they can be detected and removed while “dormant". Using a Linux “LiveCD” to scan a Windows system disk is even more safe as the likelihood of cross-contamination is almost non-existent.
If a rootkit is found you have two options: 1) Use one of the detection/removal tools to–hopefully!–remove it. Or, 2) recover your critical data files to another drive/media location, then do a full wipe of the infected system, and reinstall it fresh.
Speaking as a half-way competent computer geek, I personally would feel more comfortable going with option two, because otherwise I would always have a shadow of doubt of the system’s integrity. Nor would I have have the patience to pick through a manual removal process if the tools failed to remove it.
Rootkit Detector Tool List
InformationWeek posted an excellent article recently titled Review: Six Rootkit Detectors Protect Your System. I was familiar with some of them, and had come across a few more on my own that didn’t make the author’s cut. But that got me observing the increase in the number to tools now at our disposal. With some more careful searching, I’ve ended up collecting quite a list. Almost all are offered as freeware or trialware.
I have only used a handful of these tools and only keep a few with me on my USB system administrator’s stick. So far, I haven’t found a rootkit on my systems (here or at work) so I can’t speak of their effectiveness in removal. Also, because of the nature of how these tools work and where they look, it is quite possible that removal of a real rootkit or a listed file in error (that wasn’t actually malicious) can cause your Windows system to fail, not boot, or BSOD to the point you will be recovering files off the dead OS drive and then reinstalling your system.
You’ve been warned!.
F-Secure BlackLight - Restrictive wizard interface, but easy to use for the uninitiated.
IceSword 1.20 - Developed in China but nicely translated into English. Busy interface but updated often. Has some advanced tools like the ability to “reboot and monitor” during the boot process.
RKDetector 2.0 - Two tools in one; 1) scans for hidden files on drives, 2) scans for hidden processes and hooks. Takes a bit of work to run the scans, and can’t do a global system scan with both.
Trend Micro RootkitBuster 1.6 - Runs scans in five system areas and exports a nice log file. You can then opt to remove the detected items.
RootkitRevealer 1.71 - From the Sysinternal’s team. Easy to use, but does often turn up documented false-positives. Just identifies suspicious processes…you are on your own to delete them with other methods and applications. Better for system checking and monitoring, rather than protection and removal in-of-itself.
Rootkit Unhooker 3.0A - Russian software team project. Does a self-test to make sure it hasn’t been compromised; that’s a good feature. Provides lots of details and the ability to do focused scans or a global element scan. Also provides multiple methods to address/remove the located processes and files.
McAfee Rootkit Detective Beta - “McAfee Rootkit Detective Beta is a program designed and developed by McAfee Avert Labs to proactively detect and clean rootkits that are running on the system.” Nice interface.
Sophos Anti-Rootkit - “Sophos Anti-Rootkit provides an extra layer of detection, by safely and reliably detecting and removing any rootkit that might already have secreted itself onto your system.” Note: Registration required for download from the vendor’s site. The utility itself is free.
Gmer - The tool that’s got everyone in a fuss! Scans for hidden processes, services, files, registry keys, drivers, and hooks. Also allows some system function monitoring. Highly regarded by the antirootkit professionals. More screenshots (while the site is up).
Advanced Rootkit Detector for Windows (rkdetector) - This command-line based scanner was one of the very first rootkit detectors I became familiar with. I don’t think it has been updated since it’s original release (back in 2004). The website is in Spanish, but the application worked just fine for me. I can’t say it now can handle the newest rootkit methods of attacks, but just for posterity I’m offering it here.
More follow as discovered on Antirootkit.com’s incredible website. They’ve done a bang-up job of finding and detailing all these. Please check out their site for more information as well as some screenshots, reviews and evaluation ratings. These guys (and gals?) are doing great work and deserve full credit for locating these wide selections of tools.
Note: Some products here are beta products and may not be available or will work past a certain date. Others are trialware/crippleware. In these cases I have chosen to still include them so you can keep an eye on possible future development or releases.
Archon Scanner - More of a process, injection, hooking scanner. But has other specialties as well. - current version was beta and has expired…developer’s promise new one sometime.
AVG AntiRootkit - Beta product. Doesn’t seem to be offered anywhere but from Antirootkit.com.
DarkSpy - Chinese developed tool. Supports process, kernel mode, file, registry scan (disabled in test version) and hidden port detection. Screenshot via Antirootkit.com.
Helios - Alpha level program right now. Behavior-based, not signature based detection. Interesting interface and approach. Worth looking at, but remember it is alpha/beta level… Developers offer videos as well of their tool in action.
HiddenFinder - trialware - Shows hidden processes and drivers on a system and then allows for killing of the desired process.
HookExplorer - Tiny little application. Displays import address table (IAT) hijacks and “detour style hooks.” Lots of information in the tiny display!
OS X Rootkit Hunter - Mac OS X 10.4 product. I don’t support Apple systems, but there you are. Screenshot page by developer. (I didn’t think Mac’s got sick like this!)
Panda Anti-Rootkit - beta software. Looks at hidden drivers, processes, modules, files, registry items, hooks. Not a lot of user options…scan, clean, and view results.
RootKitShark - trialware - Command-line scanner. Unmasks located files and prevents from boot-execution. Then can be manually removed by user or using other security tools.
WinShark - trialware - GUI based version that incorporates RootKitShark (above) among other features. Allows process and user monitoring of systems. (Intrusion Detection System). Detection enabled in trial version, but rootkit elimination feature only in the fully-licensed version.
RootKit Uncover - beta - Appears to be a hidden process and file scanner. See Antirootkit.com’s page for overview. Bitdefender doesn’t have any information on their site for it.
SEEM - Multi-purpose system reporting tool that has an interesting interface. Includes a rootkit scanner as part of it’s features. Website (translated from French) has quite a bit of good information on rootkits and as they apply to their program. Download page (kinda hard to find in French). Get the English version unless you know French.
System Virginity Verifier - Tool developed by Joanna Rutkowska to validate system integrity by checking important Windows System components targeted by hidden malware. She also provides links to some related PowerPoint presentations.
Unhackme - trialware - limited to 10 runs until license purchased and entered - In standard, “Roaming” and “Professional” editions. University of Minnesota’s Safe Computing page documents rootkit removal tutorial with Unhackme.
InvisibleThings.org - Website of security guru and brilliant mind Joanna Rutkowska. Presented “Blue Pill” concept. Lots of neat tools and detailed rootkit related information on her website.
Episode #9 of Security Now - Rootkit discussion between Leo Laporte and Steve Gibson. Good foundational information.
Citizendium: This wiki focuses on credibility, using both the general public and credentialed experts. It works just like Wikipedia, but better.
AmericanFactFinder: This database from the US Census Bureau is a great source for information on housing, economics, geography and population.
The Linguist List: The Linguist List is home to a peer-reviewed database of language and language-family information.
Intute: Created by a network of UK universities and partners, this database is full of evaluations from subject specialists.
Classic Encyclopedia: This online encyclopedia is based on the 1911 11th edition of the Encyclopedia Brittannica. Although quite old, it offers an in-depth look on more than 40,000 items, and it’s widely considered to be the best encyclopedias ever written.
Virtual Reference Shelf: This Library of Congress site offers a number of high quality selected web resources.
MedBioWorld: Get professional medical and biotechnology information from this resource for journals, reference tools, databases, and more.
Library Spot: Check out this site for libraries online, a reading room, reference desk, and more.
FactCheck.org: FactCheck.org researches politics and delivers the truth on candidates and more.
iTools: Use iTools’ research tools to find facts and theories on just about any subject.
Browse Topics: Maintained by professional librarians, this site links to Federal websites that offer facts.
WWW Virtual Library: Created by Tim Berners-Lee, who also created HTML and the Web, this library uses experts to compile high quality information.
Open Site: Open Site uses volunteer editors to offer a fair, impartial Internet encyclopedia.
CredoReference: CredoReference aggregates content from some of the best publishers in reference, offering more than 3 million reference entries.
Internet Public Library: In the Internet Public Library, you’ll find references for nearly every subject out there.
Infoplease: Infoplease offers an entire suite of reference materials, including an atlas, dictionary, encyclopedia, and almanacs.
STAT-USA/Internet: This service of the US Department of Commerce offers information on business, economics, trade, and more.
Mathematica: Mathematica, the Wolfram Library Archive, offers research and information on math, science, and more.
Refdesk: Refdesk calls itself the single best resource for facts, and it delivers. Visit this online reference desk to find facts in their tools, facts-at-a-glance, or facts search desk.
AskOxford: This reference tool from Oxford University Press offers facts and tips on the English language and more.
The Old Farmer’s Almanac: Whether you’re searching for weather, food, gardening, or beyond, you’ll find what you need in this online almanac.
eXtension: The information you’ll find on eXtension is objective, research-based, and credible.
FindLaw: This listing of legal resources makes it easy to find cases, codes, references, and much more.
CIA Factbook: The CIA Factbook offers information on world countries and more.
Iako nije bas po mojim mjerilima (koliko vidim, nema fine tuninga filtera za portove, sourceve i destinatione paketa), cini se kao idealan security addon nekom antivirusu na kompu leg(ic)e koji zna nazvati u 8 navecer, moleci da mu/joj se preinstaliraju Windowsi jer su mu/joj “spori i sve se vuce", a Pero 1337 Hax0r (susjed leg(ic)e) je telepatski dijagnosticirao “zarazu trojanom i virusima” kojeg je “vjerojatno negdje pokupio/la".
Em Windowse i sebi reinstaliram jednom u 5 godina (draze mi je ljudima objasniti da postoji slipstreamani ETH0 release), em nikada nisam volio drugima uvaljivati bloatirane verzije kojekakvih all-in-one Internet securitya, zbog kojih bi im sljedecih tjedan dana morao objasnjavati sto sve trebaju ukljuciti/iskljuciti da bi mogli normalno surfati. Stoga radje urucim CD/DVD s potrebnim softwarom, popijem kavu i objasnim kako treba klikati na “next, next, next".
Kao sto znamo, RapidShare nema vlastite trazilice za hostane fileke… ali, zato postoje razni servisi… Evo neki od njih… zasigurno nemaju svi sve indeksirano, ali moze se stosta pronaci…
Kad smo vec kod fontova, postoji jedan mali, mali nifty tool za on demand loadanje fontova koji nam u tom trenutku trebaju, bez restartanja racunala, instalacija, deinstalacija i ostalog nepotrebnog navlacenja tipografske kozice. Dakle, nije bloated gomila sranja s 5 milijardi funkacija koje nikom ne trebaju… vec programcic koji loada fontove on demand. Fontovi mogu biti poslozeni u direktorijima i on to konta kao kategorije/grupe. Phucking tocno ono sto svakom covjeku treba! Tocka kraj. Zakon!
FontLoader… firma koja ga je napravila ga je discontinuala, ali… pametni ljudi cuvaju dobre programcice…
Have you ever seen a landscape or cityscape that looked hyper-realistic, or even fantastical – a shot with amazing detail in the shadows, midtones, and highlights all at the same time?
It may have been perfect shooting conditions in the field, with a graduated neutral density filter or some other filter stacking combo, or maybe it was painstakingly crafted in Photoshop with tons of dodging and burning and layer masking.
Or it may have been a High-Dynamic Range Image (HDR), such as the lead image for this story. Often explained as “seeing more like the human eye,” HDR imaging combines several shots of a given scene to overcome the exposure range limitations of traditional single-shot photography – and the final results have much more detail from shadows to highlights, and everywhere in between.
Uglavnom, procesljavajuci malo informacije na Netu, dodjoh do zakljucka…
General Purpose Settings - up to 6 minutes
A simple way to ensure that the quality is there is to export to MPEG-4 with:
* H.264 video at 2000Kbits/sec (2Mbits/sec or 250KBytes/sec)
* 320x240 video size (deinterlaced or simply use one field)
* Mono audio with AAC at 64 Kbit/sec (or 128 Kbit/sec for stereo)
* Recommended Sample Rate and
* Best Encoding Quality.
* In the Video Options Main Profile should be checked on and Best Quality (Multi-pass) is advised for best quality.
Blip.tv je zaista odlican… jedina mana pred YT-om je daleko manji community, a u nekim situacijama to zna biti presudno (u korist YT-a). Ako vam treba samo kvalitetan hosting video uradaka i ne oslanjate se na slucajne konzumente iz redova community-a, onda Blip.tv sigurno pobjeduje. Hrpa korisnih alata, statistika, daaaleko bolja kvaliteta videa (cak i u Flash formatu), vise formati, direktni downloadi, vise metoda uploada (cak i FTP), instant approval, automatski syndication po kojekakvim servisima… gotovi RSS i Miro kanali… i jos hrpa toga… mljac, mljac…
Evo i jedan clanak iz PCworlda, na tom tragu…
http://www.pcworld.com/article/id,136089/article.html
- Other / System tools :
Manage processes, Opened files, Windows Handles, Events for processes/events/files changes, bandwidth tester (based on iperf), manage windows devices, VBS script editor, WMI browser, Create maps with Graphviz, manage ACL’s.
You may know about the MySQL Cluster, which is a complex architecture to achieve high availability and performance. One of the advantages of MySQL Cluster is that each node is a peer to the others, whereas in a normal replicating system you have a master and many slaves, and applications must be careful to write only to the master.
The main disadvantages of MySQL Cluster are (as of MySQL 5.0):
* The database is in memory only, thus requiring more resources than a normal MySQL database. (MySQL 5.1 introduces table spaces, with the capability of storing nonindexed data on disk.)
* Some normal features are not available, such as full-text searches, referential integrity, and transaction isolation levels higher than READ COMMITTED.
There are some cases where the MySQL Cluster is the perfect solution, but for the vast majority, replication is still the best choice.
Replication, too, has its problems, though:
* There is a fastidious distinction between master and slaves. Your applications must be replication-aware, so that they will write on the master and read from the slaves. It would be so nice to have a replication array where you could use all the nodes in the same way, and every node could be at the same time master and slave.
* There is the fail-over problem. When the master fails, it’s true that you have the slaves ready to replace it, but the process of detecting the failure and acting upon it requires the administrator’s intervention.
Fixing these two misfeatures is exactly the purpose of this article. Using features introduced in MySQL 5.0 and 5.1, it is possible to build a replication system where all nodes act as master and slave at the same time, with a built-in fail-over mechanism.
VICE magazine (wiki), hmmm… fenomen na kojeg tek nedavno nabasah… shame on me…
Vice is a free glossy magazine founded in Montreal, Quebec, Canada and currently based in New York City that covers contemporary independent arts and youth culture. The magazine’s readership comprises young postcollegiate bohemians, often labelled “hipsters.” Known for its controversial content, it often strikes a sardonic and ironic pose on debauchery, sex, drugs, violence, and social issues involving race and economic class.
Javascript includanje dijela stranice, ili kompletne stranice… zanimljiv koncept, moze pomoci kod cacheiranja, ali me zanima koliko je to i je li brze od PHP-ovog includea i koliko to stvara overheada na HTTP requeste…
Men vs. Women Some subtle (and some not so subtle) differences
Handwriting:
Men: To their credit, men do not decorate their penmanship. They just chicken-scratch.
Women: Women use scented, colored stationery and they dot the “i” with circles or hearts. Women use ridiculously large loops in the “b” and “g". It is a pain to read a note from a woman. Even when she’s dumping you, she will put a smiley face at the end of the note.
Groceries:
Women: A woman makes a list of things she needs, then goes out to the store and buys those things.
Men: A man waits till the only items left in his fridge are half a lime and a beer. Then he goes grocery shopping. He buys everything that looks good. By the time a man reaches the checkout counter, his cart is packed tighter than the Clampett’s car on Beverly Hillbillies. Of course, this will not stop him from going to the express lane.
Relationships:
Women: When a relationship ends, a woman will cry and pour her heart out to her girlfriends, and she will write a poem titled “All Men Are Idiots". Then she will get on with her life.
Men: A man has a little more trouble letting go. Six months after the break-up, at 3:00 a.m. on a Saturday night, he will call and say, “I just wanted to let you know you ruined my life, and I’ll never forgive you, and I hate you, and you’re a total floozy. But I want you to know that there’s always a chance for us.” This is known as the “I Hate You / I Love You” drunken phone call, that 99% of all men have made at least once. There are community colleges that offer courses to help men get over this need.
Sex:
Women: They prefer 30-40 minutes of foreplay.
Men: They prefer 30-40 seconds of foreplay. Men consider driving back to her place part of the foreplay.
Maturity:
Women: They mature much faster than men. Most 17-year old females can function as adults.
Men: Most 17-year old males are still trading baseball cards and giving each other wedgies after gym class. This is why high school romances rarely work out.
Magazines:
Men: Men’s magazines often feature pictures of naked women. Men are turned on at the sight of a naked woman’s body.
Women: Women’s magazines also feature pictures of naked women. This is because the female body is a beautiful work of art, while the male body is lumpy and hairy and should not be seen by the light of day. Most naked men elicit laughter from women.
Bathrooms:
Men: A man has six items in his bathroom – a toothbrush, shaving cream, razor, a bar of Dial soap, and a towel from the Holiday Inn.
Women: The average number of items in the typical woman’s bathroom is 437. A man cannot identify most of these items.
Shoes:
Women: When preparing for work, a woman will put on a wool suit, then slip on Reebok sneakers. She will carry her dress shoes in a plastic bag from Saks. When a woman gets to work, she will put on her dress shoes. Five minutes later, she will kick them off because her feet are under the desk.
Men: A man will wear the same pair of shoes all day. Let’s not talk about how many days he’ll wear the same socks.
Cats:
Women: Women love cats.
Men: Men say they love cats, but when women aren’t looking, men kick cats.
Children:
Women: A woman knows all about her children. She knows about dentist appointments and soccer games and romances and best friends and favorite foods and secret fears and hopes and dreams.
Men: A man is vaguely aware of some short people living in the house.
Dressing Up:
Women: A woman will dress up to: go shopping, water the plants, empty the garbage, answer the phone, read a book, get the mail.
Men: A man will dress up for: weddings, funerals.
Laundry:
Women: Women do laundry every couple of days.
Men: A man will wear every article of clothing he owns, including his surgical pants (the ones that were hip about eight years ago) before he will do his laundry. When he is finally out of clothes, he will wear a dirty sweatshirt inside out, rent a U-Haul and take his mountain of clothes to the Laundromat. Men always expect to meet beautiful women at the Laundromat. This is a myth perpetuated by reruns of old episodes of “Love American Style.”
Eating Out:
Men: When the check comes, each man will each throw in $20 bills, even though it’s only for $22.50. None of them will have anything smaller, and none will actually admit they want change back.
Women: When the girls get their check, out come the pocket calculators.
Mirrors:
Men: Men are vain and will check themselves out in a mirror.
Women: They are ridiculous; they will check out their reflections in any shiny surface: mirrors, spoons, store windows, bald guys’ heads.
Menopause:
Women: When a woman reaches menopause, she goes through a variety of complicated emotional, psychological, and biological changes. The nature and degree of these changes varies with the individual.
Men: Menopause in a man provokes a uniform reaction - he buys aviator glasses, a snazzy French cap and leather driving gloves, and goes shopping for a Porsche.
The Phone:
Men: Men see the telephone as a communication tool. They use the telephone to send short messages to other people.
Women: A woman can visit her girlfriend for two weeks, and upon returning home, she will call the same friend and they will talk for three hours.
Richard Gere:
Women: Women like Richard Gere because he is sexy in a dangerous way.
Men: Men hate Richard Gere because he reminds them of that slick guy who works at the health club and dates only married women.
Madonna:
Same as above, but reversed. Same reason.
Toys:
Women: Little girls love to play with toys. Then when they reach the age of 11 or 12, they lose interest.
Men: Men never grow out of their toy obsession. As they get older, their toys simply become more expensive, silly and impractical. Examples of men’s toys: little miniature TVs. Car phones. Complicated juicers and blenders. Graphic equalizers. Small robots that serve cocktails on command. Video games. Anything that blinks, beeps, and requires at least 6 “D” batteries to operate.
Cameras:
Men: Men take photography very seriously. They’ll shell out $4000 for state of the art equipment, and build dark rooms and take photography classes.
Women: Women purchase Kodak Instamatics. Of course, women always end up taking better pictures.
Locker Rooms:
Men: In the locker room men talk about three things: money, football, and women. They exaggerate about money, they don’t know football nearly as well as they think they do, and they fabricate stories about women.
Women: They talk about one thing in the locker room - sex. And not in abstract terms, either. They are extremely graphic and technical, and they never lie.
Movies:
Women: Every actress in the history of movies has had to do a nude scene. This is because every movie in the history of movies has been produced by a man.
Men: The only actor who has ever appeared nude in the movies is Richard Gere. This is another reason why men hate him.
Jewelry:
Women: Women look nice when they wear jewelry.
Men: A man can get away with wearing one ring and that’s it. Any more than that and he will look like a lounge singer named Vic.
Conversation:
Men: Men need a good disagreement to get talking. For instance, “Wow, great movie.” or “What are you, nuts? No REAL cop would have an Uzi that size.”
Women: Women, not having this problem, try to initiate conversations with men by saying something agreeable: “That garden by the roadside looks lovely.” “Mm hmm.” Pause. “That was a good restaurant last night, wasn’t it?” “Yeah.” Pause. And so on.
Leg Warmers:
Women: Leg warmers are sexy. A woman, even if she’s walking the dog or doing the dishes, is allowed to wear leg warmers. She can wear them any time she wants.
Men: A man can only wear leg warmers if he is auditioning for the “Gimme the Ball” number in “A Chorus Line.”
Friends:
Women: Women on a girls’ night out talk the whole time.
Men: Men on a boy’s night out say about twenty words all night, most of which are “Pass the Doritos” or “got any more beer?”
Restrooms:
Women: Women use restrooms as social lounges. Women who’ve never met will leave a restroom giggling together like old friends. Women also go to the restroom in packs, at least two women at a time excuse themselves to use the restroom.
Men: Men use restrooms for purely biological reasons. Men in a restrooms will never speak a word to each other. And never in the history of the world has a man excused himself from a restaurant table by saying, “Hey, Tom, I was just about to take a leak. Do you want to join me?”
Simpatican file hosting servis se moze naci na adresi Wikifortio.com. Do 100MB po fileu, nema dosadnih reklama i ogranicenja za download + par zgodnih featurea.
The SceneThe scene aka the warez scene is the pretty unknown worldwide network where people trade pirated goods, like dvd’s, movies, games, applications etc. Warez refers primarily to copyrighted material traded in violation of its copyright license. It does not refer to commercial for-profit software counterfeiting. First warez is released by releasegroups, groups which are specialized in publishing warez. They copy a dvd or break the security of game, and will make it available for other people, as a so-called release. When these releasegroups finish a release it will be uploaded to sites. These sites are very fast private ftp-servers, and the first stadium in the distribution of a release. Eventually, at the end of the distribution, the releases are available for everyone on p2p-software. About The Scene… nastavak
sIFR is meant to replace short passages of plain browser text with text rendered in your typeface of choice, regardless of whether or not your users have that font installed on their systems. It accomplishes this by using a combination of javascript, CSS, and Flash. Here is the entire process:
1. A normal (X)HTML page is loaded into the browser.
2. A javascript function is run which first checks that Flash is installed and then looks for whatever tags, ids, or classes you designate.
3. If Flash isn’t installed (or obviously if javascript is turned off), the (X)HTML page displays as normal and nothing further occurs. If Flash is installed, javascript traverses through the source of your page measuring each element you’ve designated as something you’d like “sIFRed".
4. Once measured, the script creates Flash movies of the same dimensions and overlays them on top of the original elements, pumping the original browser text in as a Flash variable.
5. Actionscript inside of each Flash file then draws that text in your chosen typeface at a 6 point size and scales it up until it fits snugly inside the Flash movie.
This all happens in a split-second, so all of the checking, replacing, and scaling is not visible to the user. It is not uncommon to notice a very short delay as the Flash loads, but to the user, none of the internals of this process are exposed.
The picture I’m about to paint is of the ideal, I’m not implying that every perl programmer or 15 year kid who plays WoW all day possesses all these qualities.
1. You’re probably very smart.
2. It’s hip to be geek. Everyone is familiar with the stereotype of thick glasses, a pocket protector, an obsession with star trek, and social skills akin to a sack of potatoes. Times have changed: geeks are often fashionable, hip individuals who are very aligned with the trends of their own generation
3. You geek out on more than just your computer. Ever seen the movie collection of a film geek? Ever had an automotive geek work on your car? Ever seen the body of a fitness geek? The tenacity of someone like us, when applied to hobbies outside computers and the like, can yield impressive results.
4. Geek humor is the best humor. This is perhaps a biased opinion, but I’ve never laughed as hard as I have while reading some of the random, funny things that came out of geek culture.
5. You listen to good music. Geeks have access to tools that allow us to hear music that extends well beyond top 40 radio. Want the entire discography of Aphex Twin by tomorrow afternoon? Ask a geek. Not only do they listen to good music, they can find just about anything you’re looking for in a heartbeat.
6. You make good money. If there’s one stereotype about geeks that usually rings true, it’s that they rarely have trouble earning a decent income.
7. You fix stuff. Everyone loves a handyman, especially one that can fix one of the most frustrating devices ever conceived: a personal computer.
8. You’ve got your own stuff going on. You’ll never meet a geek who runs out of things to do, they’ve got lots of hobbies and interests and are more than happy to dive head first into one of those when they’ve got some spare time. In other words: they won’t rely on you to give them a life.
9. You’re very articulate. Compulsively reading a few hundred RSS feeds a day yields a vocabulary that could put most college English majors to shame.
10. You’re passionate. When a geek becomes interested in something, they tend to immerse themselves in it entirely. They’ll strip a new gadget down to nuts and bolts and re-build it with an xhtml compliant grappling gun. This intense passion can extend to many areas of a geek’s life, not just computers and hobbies.
10 Reasons Why “Tech Speak” Is The Best Language To Learn.
By Andrew Gonsalves “Halx” www.tfproject.org
While knowing how to speak Spanish will secure you a customer service job in Los Angeles, knowing how to speak French will make you sound sexier, and knowing how to speak Japanese will make all of your hentai games more interesting, if you know “Tech Speak,” you’re already 10 times more versatile than all those other bilingual show-offs. By Tech Speak, I don’t mean to imply that there is some secret code that you haven’t heard of before, and I certainly am not referring to any glossary of buzzwords that make you look more of a blow hard for reciting them. Tech Speak is simply the language of technology; the understanding of where the world is going and the tidbits of knowledge needed to stay adrift.
Computer programming is a job that’s heavily dependent on temporary knowledge capital. It’s temporary because the powers that be keep changing the languages and tools that programmers need to do their jobs. In nearly all other professions, knowledge capital increases as you grow older because you keep learning more about your field. But in computer programming, the old knowledge becomes completely obsolete and useless. No one cares if you know how to program in COBOL for example. It’s completely useless knowledge.
This project aims to create an archive of user contributed clip art that can be freely used. All graphics submitted to the project should be placed into the Public Domain according to the statement by the Creative Commons.
Eh, covjek je odlicno secirao problem… ovakav clanak moze napisati samo netko tko ima podosta iskustva u IT biznisu i netko tko je radio u vise razlicitih (po tipu i opsegu) okruzenja…
Just to be clear, IT in this context means being in an IT department, not being in the IT industry.
I’ve spent a combined five years in IT departments of two companies — one a large company another a small company. In each case, the experience lacked job satisfaction and only marginally advanced my career. If you find yourself faced with a job opportunity in an IT department, consider the following to be likely experiences:
You will be frustrated because technology is not the core business. And unfortunately for you, this means that you aren’t likely to be the rockstar of your company. You are an enabler of minimal importance in a cost center.
You will deal with technology that is likely to be obsolete or on the verge of obsolescence. In IT, it is not important to those you serve what the technology is, rather its whether the solution provides the desired value.
You will integrate with old technologies or products that have challenging integration scenarios. As you are the tail on the dog, no one will ask you your opinion for the products that are most likely to integrate well with your technology stack. Rather, you will be brought in after such products have been selected.
You may find that the talent around you is watered down. The trend is to cut costs which inevitably leads to outsourcing. In my experience, outsourcing provides less talented, less instinctive colleagues. These will be your teammates.
You may find that cost cuts means there is little investment in the “factory” that you work in. Hardware and software that could make your life easier are not accessible due to budget challenges. Therefore, the factory eventually resembles an old car plant with declining efficiency.
Your managers may care only about your utilization and your costs. Innovation is secondary to these factors, so you may have trouble championing new ideas.
You may find in bigger companies that consensus-building consumes most of your time. Be ready for double-digit emails per day with people copying you on details that are irrelevant to your job.
You may find that the company has organically grown in layers causing you to fight through multiple layers just to get simple tasks done. As such, simple tasks are hard tasks and hard tasks are impossible. If you think that something as simple as opening a firewall port can’t take weeks, think again.
You may find that since the company has cut costs to the bone that you end up wearing more hats than you feel qualified to wear. You will be best prepared to succeed if you can write your own requirements, write code, write markup, develop your own styles, be your own DBA, be your own system administrator, and do your own testing. You will most likely have to build your own infrastructure enablements because those would be too costly to be purchased for you.
You may never understand the business decisions made by those who ultimately create your projects. You may question whether they know how to scorecard, perform cost-benefit analysis, or whether they even know their business. But in the end, you will have no choice but to work on their projects.
You may find that your natural curiosity for new technologies or business strategies is not appreciated or valued. Old school managers may even make fun of you for having your nose in a book reading about those “new-fangled” technologies. Be prepared to have uninspired leadership.
You may find that your colleagues eventually have become zombies. They show up every day and walk the halls, but they seem to be in an unproductive, unchanging funk. And worse, you may recognize yourself making the same transformation.
On Scott Adams’ Dilbert website, there used to be a section where readers could submit their own stories of workplace foibles. One guy wrote in to talk about how he and four of his buddies managed to take at least one day a week off each. They worked for a big company and it was easy to get lost. Besides, they covered for each other.
If it was your day off, you were the “out guy” and you didn’t have to do anything but enjoy the day. But if not, you had a work to do.
The four guys who were working each had a task. One guy would go by the office of the “out guy” two or three times a day and post a note reading “be back in 15.” Another would fill a coffee cup halfway and leave it steaming on his desk. Someone would change the programs on his computer around. The fourth would shuffle papers and what-not around his desk.
The point was, anyone who came by would just assume they’d missed the “out guy” and check back later. The guy on the website claimed they’d pulled this off for years. These guys understood one important fact: It’s more important to look busy than be busy.
Clanak o odlicnom radu koji govori o tome da i non-buying useri imaju svoju vrijednost… zapravo, njihova vrijednost moze biti i veca od buying usera… zanimljivo…
What’s the value of a customer who doesn’t buy anything? If you’re running a hot dog stand, the answer is probably “zero.” But if you’re running a two-sided market - a market, like eBay or Monster.com or AdWords or YouTube or Digg or even Second Life, that needs to attract both buyers and sellers (or content generators and content consumers) - the answer may be “a lot.” EBay, for instance, earns most of its money from its sellers, who pay the company a fee whenever they sell something through the auction site. The buyers don’t have to pay when they make their purchases. But while eBay receives no direct revenue from the buyers, the buyers nevertheless represent a crucial set of customers for the company - without buyers, there’d be no sellers and hence no business.
Nastatvak: Customer value and the network effect
There are 10 types of people in the world: those who understand binary, and those who don’t.
I’m not anti-social; I’m just not user friendly
Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the Universe trying to produce bigger and better idiots. So far, the Universe is winning.
I would love to change the world, but they won’t give me the source code
ASP & ASP.Net
CGI & Perl
PHP
Jsp
Database
WebPage
Design
Server
Office
System
Network
Game
Magazine
Exam
Comic
Other
Development
Communication
Society
Business
MultiMedia
CVS, more commonly known as computer eyestrain, is due to over- or misuse of computer monitors, bad lighting and other environmental and ergonomic factors.
Stubborn, persistent, and regular physical discomfort due to one or more of these symptoms cuts your productivity sharply over time.
The National Institute for Occupational Safety and Health (NIOSH) has found that 75% of computer users surveyed “reported occasional aching or burning eyes at work,” while another “39% reported blurred vision.”
Aerogel is a low-density solid-state material derived from gel in which the liquid component of the gel has been replaced with gas. The result is an extremely low density solid with several remarkable properties, most notably its effectiveness as an insulator. It is nicknamed frozen smoke, solid smoke or blue smoke due to its semi-transparent nature and the way light scatters in the material; however, it feels like extruded polystyrene to the touch.
Osim u upotrebi kao odlicni toplinski i zvucni izolatori, moci ce posluziti i kao odlicna skladista energije…
Aerogels are solid substances similar to gels but where the internal liquid is replaced with air. Aerogels rank among the world’s lowest density solids. They are very porous and light, and have remarkably high internal surface area. Their microstructure and physical properties can be manipulated at the nanometer scale by selection of raw material and modification of manufacturing conditions. Aerogel products can be engineered to exhibit desired thermal, acoustic, mechanical and/or chemical properties. Aerogel materials can be produced as monoliths, thin-films, powders, or micro-spheres to respond to given application requirements.
The extremely high electrochemical surface area of ACI’s ENERGel™ carbon aerogel enables very high rates of charge and discharge. Capacitances of more than 104 F/g and energy densities of more than 325 kJ/kg have been demonstrated with carbon aerogels ultracapacitors. Additionally, power densities of up to 20 kW/kg have been achieved. This is orders of magnitude higher than what conventional capacitors offer. ACI believes that its ENERGel™ carbon aerogel is a superior option for applications such as specialized electrodes.
Slika i tekst najbolje opisuju svojstva toplinske izolacije silikatnog aerogela… “…silica aerogel can protect the human hand from the heat of a blowtorch at point blank range….“
2006 was rich on creative, beautiful and unusual design concepts. We’ve seen a lot of whitespace, many examples of readable and usable text-design, badges, stars, rounded corners, shapes, gradients, mirror and 3D-effects - just name it. Let’s take a close look at some of the most beautiful designs we’ve seen in 2006. Some gorgeous designs are missing? Let us know - comment on this article!
Clanak o tome kako izabrati dobar free web hosting… hm, zar nije to izumrlo?
Free Web Page Hosts with No Banner Ads?
Looking for free web site hosting with no annoying pop-ups, pop-unders, buttons, banners, headers or footers? And as well as this, you’d like 99.8 percent up-time, fast servers, access to the cgi-bin for scripts, FP extensions, PHP and MySQL databases and FTP access?
We went out searching for the best “no ads” totally free site hosting space deals around. The results: disappointing, they are very few and far between. Many have come and gone, or as in the case of Bizland, quite suddenly withdrawn their free service and demanded that all their customers begin paying. We took a look at the promotional information for over 300 free web hosting companies, but then also looked at customer reviews. There was usually a major difference in opinions.
There is still a plethora of free web hosts around, but most require that you carry their advertising or offer you a limited time for the free service, usually a year. On the up side of this, many of these companies do supply quality hosting with many services in exchange for having their banners served up on your pages. We did find that many of the non-banner supported free options were hosted on very slow servers. In a number of cases, the server failed to respond at all! continue ->
We’ll be brief: Hemingway once wrote a story in just six words ("For sale: baby shoes, never worn.") and is said to have called it his best work. So we asked sci-fi, fantasy, and horror writers from the realms of books, TV, movies, and games to take a shot themselves.
Dozens of our favorite auteurs put their words to paper, and five master graphic designers took them to the drawing board. Sure, Arthur C. Clarke refused to trim his ("God said, ‘Cancel Program GENESIS.’ The universe ceased to exist."), but the rest are concise masterpieces.
Many of the developers I know have been programming since they were in junior high. Whether it was building text-based games on an Apple IIe or creating a high school football roster app in Visual Basic, it’s something they did for the challenge, for the love of learning new things and, oh yes, for the ladies. Ladies love a man who can speak BASIC to his Apple.
Code
College graduates face a sad reality when they leave the protective womb of a university and have to get their first real job. Many of my friends found jobs paying around $25k out of school, and were amazed that the starting engineering and computer science salaries were nearly double that. But the majority of the engineers in my class didn’t become engineers for the money; we did it because it touched on a deep inner yearning to tinker and impress their friends. And did I mention the ladies?
Money is a motivating factor for most of us, but assuming comparable pay, what is it that makes some companies attract and retain developers while others churn through them like toilet paper?
Abstract:
The traditional view in economics is that individuals respond to incentives, but absent strong incentives to the contrary selfishness prevails. Moreover, this “greed is good” approach is deemed “rational” behavior. Nevertheless, in daily interactions and in numerous laboratory studies, a high degree of cooperative behavior prevails - even among strangers. A possible explanation for the substantial amount of “irrational” behavior observed in markets (and elsewhere) is that humans are a highly social species and to an extent value what other humans think of them. This behavior can be termed trustworthiness - cooperating when someone places trust in us. I also present the cross-country evidence for environments that produce high or low trust. A number of recent experiments from my lab have demonstrated that the neuroactive hormone oxytocin facilitates trust between strangers, and appears to induce trustworthiness. In rodents, oxytocin has been associated with maternal bonding, pro-social behaviors, and in some species long-term pair bonds, but prior to the work reviewed here, the behavioral effects of oxytocin in humans had not been studied. This chapter discusses the neurobiology of positive social behaviors and how these are facilitated by oxytocin. My experiments show that positive social signals cause oxytocin to be released by the brain, producing an unconscious attachment to a stranger. I also discuss recent research that manipulates oxytocin levels, and functional brain imaging research on trust.
Vezani blogovi:
No related posts
Was this article helful to you? If so, please click on the (+) [plus] sign below! It's Croatian digg ;-) Tnx!
Should you use CSS or (horror of horrors) tables? And what do you do when images are ‘blocked’?
HTML email - you either love it or you hate it. Some love the simplicity of text-only emails, while others praise the flexibility and good looks of HTML. But it doesn’t really matter whether you love it or hate it because sooner or later a client will ask you to design one of those ‘pretty looking email thingies’ for their own customers, and then what do you do?
* Blentwell is an ongoing document of the evolution of blended music.
* A daily link log of all of the hot mixes and beats found online.
* Blentwell’s Links is based on the online linking system Scuttle which in turn is loosely based on the del.icio.us online linking system.
There are two link sections:
1.) Blentwell Links - excellent mix links editorialized by the mysterious Mr. Blentwell.
2.) The People’s Link - get in touch with the mix link zeitgeist through the posting power of the People.
Projax stands for Prototype and Ajax.Projax is a set of Open Source PHP Classes which help you build more interactive Web Application / websites with minimal effort.Projax help you build better applications by providing easy to use API which siplifies tasks involving Ajax , Effects , DOM etc. At its core Projax is a RoR javascript helpers port for PHP. For Ajax and DOM Projax uses Prototype on client side , and for Effects like drag and drop etc it uses Script.aculo.us.
First broadcast television. Then cable television. Now, you can kill your television. Revision3 aims to prove that on-demand, distributed online content is better, faster, more effective, and better targeted to what YOU want to watch.
Tonight, September 26th, Revision3 launches their brand new website with all-new shows, all-new faces, and a few surprises that are sure to turn some heads! And all the familiar Revision3 faces are back with some new episodes, too! You might even find something new from the show that started it all! So raise your drinking glass of malt liquor and share a toast with Revision3 as we push IPTV to the next level.
Godwin’s Law (also Godwin’s Rule of Nazi Analogies) is a mainstay of Internet culture, an adage formulated by Mike Godwin in 1990. It is particularly concerned with logical fallacies such as reductio ad Hitlerum, wherein an idea is unduly dismissed or rejected on ground of it being associated with persons generally considered “evil".
The law states:
Godwin’s Law As an online discussion grows longer, the probability of a comparison involving Nazis or Hitler approaches one.
Godwin’s Law does not dispute whether, in a particular instance, a reference or comparison to Hitler or the Nazis might be apt. It is precisely because such a reference or comparison may sometimes be appropriate, Godwin argues in his book, Cyber Rights: Defending Free Speech in the Digital Age, that hyperbolic overuse of the Hitler/Nazi comparison should be avoided, as it robs the valid comparisons of their impact.
Vezani blogovi:
No related posts
Was this article helful to you? If so, please click on the (+) [plus] sign below! It's Croatian digg ;-) Tnx!
Mozak se moze percipirati kao obicna nakupina neupotrebljivih neurona. Takvim ga smatram uvijek kad skontam da sam napisao/napravio/rekao nesto sto, zapravo, nisam i vice versa. A, mislio sam da sam vec spomenuo jedan od najboljih (meni i emotivno najdrazih) dokumentaraca koje sam gledao u zadnjih hmmmm…sto godina. Speechless… dokumentarac opisuje jedan dio mog zivota, vrijeme mog odrastanja i sazrijevanja, vrijeme pionira e-komunikacije, srcane ljubavi prema tehnologiji gdje je vecina s jednakom strascu voljela tu istu tehnologiju… mozda ne na jednak nacin (sto i nije lose), mozda ne iz istog kuta, ali s jednakom srcanoscu… eh… Evo i par slika kako su izgledali BBSovi. Ako netko ima jos kakvih screenshotova, neka salje na mail cacan-at-webart-dot-hr. Sorry, komentari ne rade jerbo mi se ne da cistiti spam.
Osim samog filma, na raspolaganju je (ili ce biti) i kompletna arhiva svih interviewa (oko pola terabajta )
Lista interviewa i extra-footagea (skupa s linkovima za skidanje) se moze naci na archive.org
Uglavnom… ovo je film koji ce tesko biti shvatljiv onima koji nisu dozivjeli BBS eru, a svi BBSeri ce se raspekmeziti od dragosti k’o male pickice… Garantirano…
Ne, ne radi se o softu koji uvredu za uho pretvara u slusnu glazbu, nego o liku koji na svom blogu objavljuje relativno nepoznate (non-mainstream) glazbene uratke od kojih neki kod mene izmame zanimanje i smijesak na lice.
Naletih na njega sasvim slucajno. Kako to vec biva, pocelo je jer mi je u foobaru zasvirala London in the rain od Variety Lab-a, pa se sjetio da bih mogao skinuti i ostalo od njih. U search boxu mog omiljenog mp3 providera - eMulePlus-u potrazio sve arhive od Variety-a, a tu onda iskocile i kompilacije gdje se spominje Nicole Graham (il’ je njen site u banani, il’ je meni mozak). Onda se sjetih da riba ima opako dobar glas u Indigo Blues. Ok, ona je vokal Llorce i trazeci njegovu sluzbenu stranicu naletio na site tog tipa sto preporuca dobru mjuzu.
Aurgasm brings to you an eclectic menagerie of aural pleasures. I scout out music you’ve never heard and deliver only the finest. Expect music curiously different, yet simply enjoyable.
Today is the first ever OneWebDay; “the one day a year when we all – everyone around the physical globe – can celebrate the Web and what it means to us as individuals, organizations, and communities”. OneWebDay was started by Susan Crawford who’s also one of our Board Directors at ICANN and an all round good egg. The idea is to celebrate all the good things about the web, and the Internet more broadly, and do things that either make it better or remind ourselves how great it already is. Fun things, chatty things, useful things, things like teaching people to blog, getting grannies online and building community spaces.
TRYNT began as a single web service, the TRYNT Term Extraction Web Service. The TRYNT Term Extraction Web Service was inspired by the Content Analysis Web Services: Term Extraction from Yahoo. After using the Yahoo web service for a number of months I was curious if I could create a similar animal.
Where there are more then a few web services that attempt to “extract tags” there seemed to be only one offering for contextual term extraction. We consider the TRYNT Term Extraction Web Service the second entry in the contextual term extraction space.
APIs
Please select an API/Web Service from the list below. API/Web Services are listed in alphabetical order.
TRYNT Contextual Term Extraction Web Service Extract contextually relevant words/phrases from a larger body of content. The list of words and phrases returned will be in context to your supplied query at the time of your query.
TRYNT JavaScript Compression Web Service Compress and obfuscate virtually any valid JavaScript code. Compression improves loading times and reduces bandwidth while obfuscation protects your JavaScript from reverse engineering.
TRYNT PHP Compression Web Service Compress and obfuscate virtually any valid PHP code. Reduce bandwidth expenses and make your code harder to reverse engineer.
TRYNT Ping Web Service Ping up to 18 different major pinging services using the TRYNT Meta Ping Web Service.
Part of Jaimie Sirovich’s adventure in SEO, Google
This is a compilation of stuff Matt Cutts has said historically, minus some of the more recent stuff here, here, and here. I decided I’d dig backwards and document some of the older stuff. I dated it accordingly. Here it is: 1. http://www.mattcutts.com/blog/dashes-vs-underscores/ Matt recommends using dashes over underscores to delimit words in urls. 2005. Google does not algorithmically penalize for dashes in the url despite the fact that some have raised it as a possible heuristic for spam detection. I think WordPress pretty much precludes this anyway. 2005.
2. http://www.mattcutts.com/blog/seo-mistakes-sneaky-javascript/ Google takes action on individual instances of spam when they find it, but they focus on creating better algorithmic solutions. He states that he would not recommend using sneaky JavaScript redirects because your sites may get nailed in the near future. 2005.
3. http://www.mattcutts.com/blog/whats-an-update/ Google updates their index data — including backlinks and PageRank all the time. However, they export and publish new backlinks and PageRank data approximately every three months. New backlinks and PageRank are meaningless — it is not an update. The information is likely already factored in for awhile before you see it. 2005.
4. http://www.mattcutts.com/blog/seo-mistakes-nearly-hidden-text/ Hiding text using similar colors and background colors can actually be worse than using the same colors. Using “#EEEEEE” instead of solid white on a solid white background can look worse — as if you’re trying to hide it. I suspect this is a heuristic for detecting hidden text. 2005.
15. http://www.mattcutts.com/blog/text-link-follow-up/ Google’s is against selling/buying links, and Matt indicates they are good at spotting them — both algorithmically and manually. Sites that sell links can lose their trust in search engines. 2006.
18. http://www.mattcutts.com/blog/seo-advice-url-canonicalization/ Canonicalization is the process of picking the best url when there are several choices, and it usually refers to home pages — www.example.com vs. example.com vs. www.example.com/index.html. Since all these urls are different, a web server could return completely different content for all the urls above. When Google “canonicalizes” a url, it tries to pick the best one and elimintes the others. To help Google, link to resources on a site consistently, and use 301 redirects to enforce it. 2006.
20. http://www.mattcutts.com/blog/seo-advice-url-canonicalization/ Search engines can perform canonicalization for things like keeping or removing trailing slashes, upper vs. lower case, or removing session IDs from bulletin board or other software. 2006.
Following these tips will probably help you rank better, so long as you actually trust Matt Cutts. I’d assert it’s wise to approach some of his advice with skepticism, since I’m sure Google gives him guidelines as to what he can actually say, but following the advice above won’t get you into any trouble.
Kad god se nadjem u situaciji da moram pisati podosta teksta na engleskom, zna mi se dogoditi da imam osjecaj da za napisanu rijec postoji prikladniji izraz… sinonimi znaju biti pain in the ass, pogotovo kad znate da postoji, za tu situaciju (bolje)odgovarajuci sinonim, ali ga se u tom trenutku ne mozete sjetiti…
TheSage’s English Dictionary and Thesaurus is a professional software package that integrates a complete dictionary and a multifaceted thesaurus of the English language into a single and powerful language reference system.
TheScribe integrates a WordProcessor and a WordList Manager into a real-time Profiler Engine, providing language educators and researchers with a specialized environment tuned for the careful creation of lexically-sensitive educational and experimental materials.
At PC World, we spend most of our time talking about products that make your life easier or your work more productive. But it’s the lousy ones that linger in our memory long after their shrinkwrap has shriveled, and that make tech editors cry out, “What have I done to deserve this?”
Still, even the worst products deserve recognition (or deprecation). So as we put together our list of World Class winners for 2006, we decided also to spotlight the 25 worst tech products that have been released since PC World began publishing nearly a quarter-century ago.
Features:
Intelligent image pre-loading.
Intuitive image navigation
Lightweight (12k).
Customizable interface - Set text color, frame color and width, navigation position.
Resizable interface - Interface scales to fit browser window.
Cross platform - Windows/Macintosh/Linux (requires Flash 6 or higher).
Flash 6 detection. Users without Flash 6 are redirected to an upgrade page.
International font support.
Keyboard Navigation (left and right cursor keys)
Free!
Vec 10tak dana pokusavam uhvatiti dovoljno vremena u komadu za procitati clanke koji mi se cine zanimljivima…
Prvi je clanak Time-a o osnivacima Google-a, koji je u tih tjedan dana mog cekanja na citanje presao u Premium pizdariju i sada se mora platiti da bi se doslo do sadrzaja… Kad pusis, onda pusis do balcaka…
Od clanka su ostali samo dugmici i foto-esej.
Usput, ako ste citajuci pseudonovinarske uratke hrvatskih nazovi novinara zaboravili sto je to novinarstvo i kvalitetni tekstovi, svakako zavirite u tekstove WIREDovih novinara, preporucam Regine Lynn i Clivea Thompsona.
Tema predavanja je zanimljiva, ali nije ona razlog zasto ovo pisem, nego Dickov presentation skill. Na kraju prezentacije, Dick gives creditLawrencu Lessigu za presentation skillse.
Citah malo Wiredov clanak o (nekim) najgorim sw bugovima, pa si sve nesto kontam jesu gori ti bugovi za koje nisam ni znao da postoje (svjetlosnim godinama udaljeni od mene) ili oni “mali sitni buci-buci” bugovi koji se mogu zavuci u moj code i zbog cega bi “trpila proizvodnja” - citaj: ovisila moja egzistencija…;-) all in all, sve se svodi na onaj stari kokoshji test egoizma o biranju izmedju smrti bliznje osobe ili par tisuca ljudi na drugom kraju svijeta.
Hm… sto je pomoglo u toj silnoj desenzibilizaciji?! TV? Moguce…
Last month automaker Toyota announced a recall of 160,000 of its Prius hybrid vehicles following reports of vehicle warning lights illuminating for no reason, and cars’ gasoline engines stalling unexpectedly. But unlike the large-scale auto recalls of years past, the root of the Prius issue wasn’t a hardware problem – it was a programming error in the smart car’s embedded code. The Prius had a software bug.
Naravno, na Wikipedii se moze naci objasnjenje zasto sam stavio link na tu, ni po cemu posebnu, stranicu…
http://en.wikipedia.org/wiki/Mahir
Na link sam opet naletio citajuci stranicu koja je pobudila kamion nostalgicnih impulsa (ocito sam u tom moodu ovih dana )… uh… iako se neke stvari iz ove Top100 liste ne poklapaju s mojom Top100 listom, stavit cu link na nju samo zato sto sam naletio na Mahirov link i link Webmonkeya, jedne od stranica koja me je naucila mnogim stvarima… eh…
Jos i danas mi se mijesaju sjeta i grcevi u stomaku kad se sjetim profesora iz latinskog (ave Grnja!)… huh, savrseno obrisana ploca (ponovno otkrivanje zelene boje), nova kreda i kemijska koja radi, uvijek otvoren njemu najblizi prozor, savrseno cist i uredan razred. Odmor jos traje (tek je poceo), a svi u razredu sjede na svojim mjestima listajuci rjecnik i “Orbis romanus” bez ijedne skrabotine. Dlanovi su mi plavi i ledeni. Savrsena tisina. Samo oni kurcevitiji imaju muda biti na hodniku za vrijeme tog odmora. Huh… e, to su bila vremena… samo da je bilo vise para i da se vise tucalo…
Kako god, danas sam trazio cuvenu Arhimedovu izreku prije nego ga je rimski vojnik zatucao kundak… dobro, ajd, probo kopljem , pa sam pronasao par siteova koji su u meni probudili nostalgiju i sjetu za nekim prijasnjim vremenima…
U zadnje vrijeme imam dosta problema s bolovima u ocima (pola caffetina pomogne, ali to nije rjesenje problema), svakodnevne glavobolje, ili pritisak na rubu glavobolje i sl. Sve to uzrokuje napetost, razdrazljivost, depresiju, osjecaj umora… Najgore od svega je sto jos uvijek nisam otkrio sto je uzrok tim bolovima.
Sumnjam da umor ociju (spavam oko 5 sati dnevno), pojacan losim monitorom na poslu (IBM E74, 85Hz na 1024x768 - ja ga zovem i “odvratna reflektirajuca kugla") i relativno losim doma. Ako netko zna kako se rijesiti te proklete boli, i kako otkriti uzrok - vodim ga na veceru… ma sta jednu veceru - 20 vecera ako treba… Bijah kod oftalmologa, imam neku sitnu dioptriju, ali naocale ne rjesavaju problem. Dijagnosticirala mi je kronicni umor ocnog misica (osjecam nelagodu i bol kada ocima gledam u kutove vidnog polja), ali nikakav savjet/preparat za njegovo lijecenje, osim savjeta da se naspavam. Sumnjam na CVS (vidi dolje), zapravo siguran sam da imam CVS. I to gori oblik, jer imam sranja cim se probudim. Zapravo, prati me dobar dio navedenih simptoma.
Mozda pomogne i informacija da sam ovisnik o kofeinu. Fizicki. Ako ne popijem kavu do 10 ujutro, automatski imam glavobolju. Tako da i danima kada se vise naspavam (vikendom, kad znam spavati do 11-12) budim se s glavoboljom i sranjem. Dosta mi je toga, hocu se probuditi bez pritiska i bolova oko/iza ociju… aaaaaaaaaaaaa….
Mozda ovi linkovi nekom pomognu… nadam se da meni hoce…
A default Windows system comes with different network services, enabled by
default. Usually, it is wise to disable most of them and even all of them,
if the system does not offer network services to other systems.
In this document, we give a possible methodology to complete this task.
Technical details are described in a separate document entitled
_Windows network services internals_ and available at
http://www.hsc.fr/ressources/articles/win_net_srv/ .
Captology is the study of computers as persuasive technologies. This includes the design, research, and analysis of interactive computing products created for the purpose of changing people’s attitudes or behaviors.
Koliko puta vam se dogodilo da ste pogledali film ili procitali knjigu i toliko vam se svidjelo da ste pozeljeli procitati jos jednu takvu, vrlo slicnu?! Nemam pojma koliko se vama puta to dogodilo, ali znam da sam ja nakon nekih filmova jurio na net i trazio slicne… zapravo, naletio sam jos prije na taj site, ali mozak nije upamtio… eh…
Eh, da sam onda znao za gnod.net - odlican kontekstualni pretrazivac za knjige, filmove i glazbu…
Upisete naziv knjige, autora, glazbenika, filma - i pretrazivac vam vrati slicna djela… zakon dumina…
Gnod is my experiment in the field of artificial intelligence. Its a self-adapting system, living on this server and ‘talking’ to everyone who comes along. Gnods intention is to learn about the outer world and to learn ‘understanding’ its visitors. This enables gnod to share all its wisdom with you in an intuitive and efficient way. You might call it a search-engine to find things you don’t know about.
PRADO stands for PHP Rapid Application Development Object-oriented. It is an event-driven and component-based framework for PHP 5. The very original inspiration of PRADO came from Apache Tapestry. During the design and implementation, I borrowed many ideas from Borland Delphi and Microsoft ASP.NET. The first version of PRADO came out in June 2004 and was written in PHP 4. Driven by the Zend PHP 5 coding contest, I rewrote PRADO in PHP 5, which proved to be a wise move, thanks to the new object model provided by PHP 5. PRADO won the grand prize in the Zend contest, earning high votes both from the public and from the judges’ panel. Thank you for all the support! – Qiang
Elite, kasnije Frontier - jedna je od najlegendarnijih igara ikad. Kome se ona svidjela nikada iz njegova srca izaci mogla nije. I danas ju smatram jednom od najboljih igara. Da nisam jedini zaljubljeni geek, govori cinjenica da se i nakon prestanka razvoja igre nije izgubila ljubav prema tom konceptu igre. Dokaz tome je i Oolite (FAQ) (Oolite Forum), projekt razvoja Elite-like igrice pod Creativecommons licencom. Za sada postoji MacOS i Linux verzija, ali se radi i na Win32 portu. Nisam ju igrao (a zbog generalnog nedostatka vremena vjerojatno nikada ni necu), ali po slikama izgleda dobro. Koncept Elite, ali graficki ljepse.
Igricu bih zasigurno igrao da imam vremena, kao u vrijeme kad sam sate i dane gubio skacuci po galaksiji u svojoj Cobri MkII , prevozeci putnike i teret. Ahhhhh. Zasto dan ne traje minimalno 48 sati?! 24 kao i do sada, a onda jos 24, ali gdje je svima ostalima vrijeme smrznuto?!
S5 is a slide show format based entirely on XHTML, CSS, and JavaScript. With one file, you can run a complete slide show and have a printer-friendly version as well. The markup used for the slides is very simple, highly semantic, and completely accessible. Anyone with even a smidgen of familiarity with HTML or XHTML can look at the markup and figure out how to adapt it to their particular needs. Anyone familiar with CSS can create their own slide show theme. It’s totally simple, and it’s totally standards-driven.
MultiEx Commander makes it possible to extract files from and import into hundreds of game resource archives. Most games use large files in which they save all necessary files. This usually includes sounds, music, graphics, scripts and code. With MultiEx Commander you can open them using an easy to use interface. The number of supported formats is ever increasing!
Game Extractor is an advanced archive tool developed primarily to open and manipulate game archives. Game archives are typically proprietary formats developed by the gaming companies, and they often change between different games. Game Extractor, with the assistance of plugins, has the ability to read and manipulate many of these game archives that were previously unreadable, including archives from different gaming platforms such as PC, XBox, and Playstation.
Game Extractor was built to allow users to work with archives in the simplest manner possible, while still including many advanced features that are not found in other archive readers. One great advantage of the program is that it will work on all computers regardless of the operating system. This means that Windows, Linux, and Mac O/S users will all be able to use the program and share files between the systems with full support.
Dok nase skolstvo muku muci pitanjem treba li djeci ukinuti tablicu mnozenja, trebaju li osnovnoskolci uciti stehiometriju, trebaju li biti pametniji od ostalih u EU, dotle mali Japanci razvijaju sve ovo…
Paznja! Moguca depresivna stanja u citatatelja nakon spoznaje u kakvoj prcvi, vukojebini i gnojnom ciru od drzave zivi.
Nekada je u ovoj drzavi skolstvo na razini iznad vecine ostalih zemalja u EU. Danas imamo situaciju gdje je strancima prodano sve sto vrijedi, a buduci da nam mozgove nisu mogli izvaditi, nasli su saveznike u RH vladama i dogovorili sustavno oglupljivanje nacije.
Steta to nema ovako necega za Motorolu v547… smrtz…
FMA is a free1 powerful phone editing tool allowing users to easily manage all of the personal data stored in their phones, via a number of different connections methods. FMA allows easy management of Phonebook (both SIM and Phone memory), SMS, Profiles, and Files stored on the phone. FMA can also allow you to pickup and dial calls directly from your PC.
FMA is a SMS Manager, Mobile Phone Monitor, Remote Control Agent, Phonebook Manager, Organizer, Fun and much more; whatever you want it to be, it is whatever a mobile phone should have (Currently based on Sony Ericsson T610 features set).
Evo par linkova vezanih uz jedan odlican koncept. Samo da godisnji traju nesto dulje i da covjek u zivotu ima vise vremena, uh… Proof of concept Let me stay for a day
PriadoBlender is a tool to let you distribute your PHP scripts as an executable EXEs. It is similar to the PHPCompiler that was available for a couple of months a year or 2 ago. PriadoBlender isn’t a true compiler in the computer science sense of the term. True compilers take the high-level code and turn it into machine/assembly code. Instead, PriadoBlender takes your PHP code and the PHP interpretor itself and blends them into standalone, PHP executable goodness.
The Imagining the Internet Predictions Database examines the potential future of the Internet while simultaneously providing a peek back into its history. We invite you to navigate through three useful resource areas that: illuminate the views of stakeholders - The Experts Survey; give an historic overview - The 1990 to 1995 Predictions; and allow your participation - Share Your Vision Today.
Internet Explorer Restrictions (All Windows)These settings and restrictions allow you to selectively control a range of features available in Microsoft Internet Explorer 5 and 6.
Restrict ActiveX Applets in Internet Explorer (All Windows)
This tweak allows you to stop specific ActiveX controls from running in Internet Explorer. When the “kill bit” is set the specified ActiveX control will never be called or shown by Internet Explorer.
Restrict Web Sites from Installing Software (All Windows)
These restrictions allow you to block unwanted web sites from downloading software onto your system. This can be useful in disabling the installation of some common “cursor” programs.
ENTJ
decisive, fearless, planner, thrill seeker, engaged, social, self centered, comfortable around others, image conscious, likes to be center of attention, adventurous, outgoing, manipulative, emotionally stable, leader, ambitious, hard working, dominant, prepared, hates to be bored, confident, opinionated, analytical, prepares for worst case scenarios, organized, orderly, clean, driven, resourceful, finishes most things they start, achieving, risk taker, desires fame/acclaim, image focused, narcissistic, arrogant, perfectionist, driven, academic, scientific, critical, avoids giving in to others, does not like to compromise, skeptical
favored careers:
marketing specialist, government employee, lawyer, developer, political scientist, bounty hunter, international relations specialist, software designer, systems analyst, business manager, entertainment lawyer, foreign service officer, strategist, project manager, advertising executive, cia agent, marketing manager, geneticist, private investigator, administrator, business analyst, politician, management consultant, producer, financial advisor, entrepreneur, genetics researcher, cardiologist, professor, fbi agent
disfavored careers:
singer, bookstore owner, job in the performing arts, poet, photographer, english professor, chef, health care worker, child psychologist, massage therapist, video editor
Enneagram Tests
The Enneagram is a nine factor personality system that is sort of a historical mutt, many different influences. The nine factors are - orderliness, helpfulness, image focus, hypersensitivity, detachment, caution, adventurousness, strength, and calmness.
Jung Tests
These tests are based on the work of Carl Jung, David Kiersey, Isabel Myers and Katherine Briggs. They are similar in underlying theory to the Myers-Briggs Type Indicator (MBTI) and the Kiersey Temperment Sorter. They measure four bipolar factors, Introversion/Extroversion, Thinking/Feeling, Intuition/Sensing, and Judging/Percieving.
Percentile Tests
These tests show you how your answers on statements or descriptive words/phrases compare to other people who have answered in the past, a useful/interesting test to see how you compare to others on different issues.
Big Five Tests
The Big Five is the most proven personality test in the academic research community presently. It is composed of 5 factors - open-mindedness, conscientiousness, agreeableness, emotional stability, and extroversion (the factor names vary a little among authors).
Right-Left Brain Tests (Brain Laterization)
These tests measure your right and left brain functions, indicating strengths and possible weaknesses, and whether you are more dominant in one hemisphere.
Other Personality Tests
Personality Disorder Test - this test is based on the 10 DSM-IV personality disorders.
Eysenck Personality Test - based on the personality theory of pioneering theorist Hans Eysenck, 3 factors - extraversion, neuroticism, and psychoticism.
Cattell 16 Factor Test - based on the work of Raymond Cattell, another personality research pioneer.
Compatibility Tests
*The multi-user tests require two or more people to respond to receive results (an option to email the test is available). The single user tests are self reporting (you can provide the answers for yourself and the person you are trying to assess compatibility with).
Multi-user Enneagram Test
Single-user Enneagram Test
Single-user Jung test
Single-user Big Five Test
Personality Tools
Word Association Test - this test displays a series of words for you to answer positive, negative, or neutral to and then displays your responses and response times.
Ask The Oracle is a decision making tool.
Query the Universal Mind allows you to type in an interest (author, band, book, movie, etc) and then searches a database of over 20,000 users to find interests which correlate with it.
Search Minds allows you to take a personality test and see what users from a large database match most closely to your personality type.
Non-Serious Tests
The Famous Leader test and Classic Movie test are based on a large randomized custom personality question database and contain results which are meant to be relevant and amusing.
Evo jedan odlican link na kojem oje objasnjenjo na koju duminu Google moze dati tako dobre rezultate. Ok, pored toga sto iza sebe ima farmu servera, posebno pisan OS koji to sve povezuje, petbajtne baze podataka (valjda, ovo samo nagadjam ) on ima i PageRank - kljucni dio u citavoj Google paradigmi.
What is PageRank?
PageRank is a numeric value that represents how important a page is on the web. Google figures that when one page links to another page, it is effectively casting a vote for the other page. The more votes that are cast for a page, the more important the page must be. Also, the importance of the page that is casting the vote determines how important the vote itself is. Google calculates a page’s importance from the votes cast for it. How important each vote is is taken into account when a page’s PageRank is calculated.
PageRank is Google’s way of deciding a page’s importance. It matters because it is one of the factors that determines a page’s ranking in the search results. It isn’t the only factor that Google uses to rank pages, but it is an important one.
Dakle, VNC-alike, odnosno RAdmin-alike aplikacija ali ovaj put komp-mobitel. Dakle, upravljate svojim kompom preko mobitela (mora biti stalno spojen na Net)… ovo je jedan jako lijepi proof of concept, vjerujem da ce se poceti pojavljivati sve veci broj ovakvih ili slicnih aplikacija… jos kad bi gradjevinari po defaultu razvlacili UTP po novim gajbama… heh…
The Remote Desktop for Mobiles is a software designed for GSM mobile phones which support GPRS services and can be executing a Java (J2ME) applications. This software provides access to desktop of remote Windows-based computer from mobile phones and allowing to control the mouse and keyboard of remote computer.
Remote Desktop for Mobiles it is easy-to-use, reliable and secure remote control software which will allow you to work on the remote home or office computer from your mobile phone.
You will see the screen of the remote computer on your mobile phone and also you can operate mouse and keyboard of the remote computer.
Additional features of Remote Desktop for Mobiles allow you to execute any console commands on the remote computer and receive result to mobile phone. In addition has a set of commands for getting a system information and perform management of system.
The Remote Desktop for Mobiles software will consist of two part:
The Server which should be installed on the remote computer.
The Client which should be installed on mobile phone.
Server
The Server provides connection of the Client for control of a remote computer, sending a desktop screenshot to the Client and operate to the mouse and keyboard by commands from the Client.
The Server uses a TCP/IP connection to the Internet for receiving the Client connections.
There are no special system requirements to a hardware platform. The Server will works on any PC with minimal requirements to hardware resources. The Server will works under Microsoft Windows 98 / NT 4.0 / 2000 / XP / 2003.
Client
The Client is running on mobile phone and showing a desktop of the remote computer. Also, the Client transfer a mouse and keyboard control directly to the Server.
The Client has an “Address book” for saving addresses of controlled computers, executed commands history for reuse a commands, and many other useful features.
The Client is applying on mobiles with supporting Java (J2ME) Mobile Information Device Profile (MIDP) 1.0 (MIDP 2.0 is more acceptable) and should have not less than 2 Mb of memory. The recommended screen size not less than 132x170 at 65536 colors. The mobile phone should be supporting connection to GPRS network. The operator of mobile network to which your mobile phone are registered should to give GPRS service.
Zanimljive teorije, na granici teorije zavjere i poprilicno moguceg… ovisi kako tko zeli gledati… Svakako preporucam izucavanja ovog sitea i kompletne problematike… pogotovo onima s viskom vremena.. .:)
O toj zanimljivoj sacici utjecajnih ljudi sam citao jos prije, ali sam s vremenom zagubio link. Znao sam se tu i tamo (u pokojim rasprava) pozvati na postojanje ove skupine Napokon link stavljam ovdje, i nadam se da mi sada site nece netragom nestati Ako ovoj stranici naglo opadne Google Pagerank, mozete biti sigurni da je ovaj post razlog tome! -)
What are Bilderberg Conferences all about?
TG 08Feb00 - The Bilderberg Secretariat proclaims the conferences to be ‘…private in order to encourage frank and open discussion’. Frank and open discussion is a good thing in any forum but when those doing the discussing are some of the very most powerful financiers and media tycoons in the world it begs the question: If what they discuss is for the good of ordinary people why not publicise it! Isn’t it a perverted use of the word ‘open’ when no-one can find out what they’re saying?
Is Bilderberg a secret conspiracy?
When such rich and powerful people meet up in secret, with military intelligence managing their security, with hardly a whisper escaping of what goes on inside, people are right to be suspicious. But the true power of Bilderberg comes from the fact that participants are in a bubble, sealed off from reality and the devastating implications on the ground of the black-science economic solutions on the table.
No, it’s not a ‘conspiracy’. The world’s leading financiers and foreign policy strategists don’t get together at Bilderberg to draw up their ’secret plans for the future’. It’s subtler than that. These meetings create an artificial ‘consensus’ in an attempt to spellbind visiting politicians and and other men of influence. Blair has fallen for this hook, line and sinker. It’s about reinforcing - often to the very people who are on the edge of condemning Globalisation - the illusion that Globalisation is ‘good’, ‘popular’ and that it’s inevitable.
Bilderberg is an extremely influential lobbying group. That’s not to say though that the organisers don’t have a hidden agenda, they do, namely accumulation of wealth and power into their own hands whilst explaining to the participants that globalisation is for the good of all. It is also a very good forum for ‘interviewing’ potential future political figures such as Clinton (1991) and Blair (1993). [see above for more on this]
The ideology put forward at the Bilderberg conferences is that what’s good for banking and big business is good for the mere mortals of the world. Silently banished are the critical voices, those that might point out that debt is spiralling out of control, that wealth is being sucked away from ordinary people and into the hands of the faceless corporate institutions, that millions are dying as a direct result of the global heavyweight Rockefeller/Rothschild economic strategies.
When looking at one of the (partially reliable) participant lists it should be remembered that quite a number of participants are invited in an attempt to get them on-board the globalisation project. These are carefully selected people of influence, who have been openly critical of globalisation. Examples are Jonathan Porritt (Bilderberg 1999) and Will Hutton (Bilderberg 1997) but there are many others. Most of these kinds of participants are happy to speak about the conference afterwards, and may even be refreshingly critical.
The Bilderberg organisers are accepted by those ‘in the know’ as the prophets of Capitalism. Will Hutton, deputy Editor of The Observer newspaper in London and left-leaning Economist, described private clubs of the elite as masterminded by ‘The High Priests of Globalisation’. The ecclesiastical allusion is not accidental. The Bilderberg high-priests are a force against good, out to wipe morality from the earth. For the organisers Bilderberg Conferences are an annual ideological assault by the world’s most power-hungry people. Not content with owning unimaginable amounts of money and property they want to use that wealth to acquire even more power for themselves. Power is the most dangerous and addictive drugs known to man. Will the craving be satisfied when a handful of men own and control everything on earth?
And just like the Nazi party in the 1930’s the global Capitalist Elite are rising in power by peaceful means. There are some very uncomfortable and unexplained connections between Bilderberg and the Nazis through the Conference’s founder Prince Bernhard.
These crown princes of capital use violence at the sharp end - the destruction of dissent - the repossession of homes men and women have worked a lifetime for - needless deaths from starvation and geopolitical machinations - this violence is notable by its absence from the annual meetings.
One can’t help but wonder, when the Bilderberg organisers, Rothschild, Rockefeller, Kissinger and the rest have completed their project of enclosing all global goods and services into their own hands, enclosing too the media to stop people freely discussing what they are up to. What then?? What happens when the men who would be gods turn out to be the global devils?
Who is behind Bilderberg?
Bilderberg is run by a Steering Group - if you’re wondering who’s responsible for so much of the capital-friendly and dissent-crushing law-making, poverty and general misery in the world this may be the place to look. Up-to-date lists are available from the Bilderberg Secretariat. This is the closest approximation to a shadow transatlantic government. And this is another hidden agenda at Bilderberg.
There may be other groups pulling the strings behind even the Steering Group possibly even high degree occult groups such as The Masons or Illuminati! [eg.] - but that is ‘conspiracy theory’, Bilderberg is not.
There must certainly be some sociopathic minds behind Bilderberg since they go to so much trouble to promote policies that lead to exploitation, inequality and despair. These individuals seem oddly switched off from the suffering they are clearly causing. Surely only pernicious people would want to control the ideology of the world’s mainstream press, and undermine natural political discourse. Public opinion and democratic institutions are a threat when you want to own the world.
The perverse objective of the Bilderberg Steering Group is to dress totalitarian ideology up to appear rational and push it out, unattributable, for mass consumption under Chatham House rules. Meanwhile, outside the Bilder-bubble, ‘god-is-money’ globalisation is the new religion. The greedy are given a pat on the back as they plunder both the earth and do their best to destroy the human spirit.
The classic shooter, miniaturized
Coded in only 5K of Javascript
How much is 5K? “A relative thimbleful of Web coding” writes the New York Times. Many modern computer games consume hundreds of megabytes, a relative dumpsterful of coding.
Wolfenstein 5K was written for the 5K contest, which challenges entrants to create a web page in under 5120 bytes. According to its creators, “The idea behind the contest is that the rigid constraints of designing for the web are what force us to get truly creative.”