Friday, October 16, 2009

Windows 7 Home Premium for $29.99!


Going to college? Well if you are I have some good news! You are eligible to purchase Windows 7 Home Premium for $29.99, thats pretty awesome. Here is the link http://www.win741.com/, by the way the offer is only valid until January 3, 2010 at 12:00 am CST.
Read rest of entry

Saturday, October 10, 2009

Windows 7 Professional Screenshot

Read rest of entry

Sunday, July 26, 2009

UPDATE: Plug-pulling ISP changes policy

Internet service provider (ISP) Karoo, based in Hull, has changed its policy of suspending the service of users suspected of copyright violations.

The about face was made following a BBC story outlining the firm's practice.

Karoo issued a statement on Friday, saying that it has been "exceeding the expectations of copyright owners".

The firm will now adopt a "three strikes" rule, in which suspected file-sharers will receive three written warnings before action is taken.

"We have always taken a firm line on the alleged abuse of our internet connections," said Nick Thompson, director of consumer and publishing services, in the statement.

"However, we continually review our policies and procedures to reflect own customers' changing needs and evolving use of the internet.

"It is evident that we have been exceeding the expectations of copyright owners, the media and internet users. So, we have changed our policy to move in more line with the industry standard approach."

'Totally unfair'

Karoo - the only ISP in the area, which has no BT lines - long held a policy of suspending service of suspected file-sharers. In order to get their service restored, customers had to sign a document promising not to repeat the offence.

The firm's approach is more aligned with many other ISPs' approaches to suspected file sharers, mirroring the "three strikes" rule that the music industry itself has called for.
Andrea Robinson, a Karoo customer from Willerby, told the BBC that a day after her service was cut off, she received a letter from the firm claiming that she had been using the peer-to-peer file-sharing service BitTorrent to download the film Terminator Salvation.

On calling Karoo, she was told to visit the company's offices to resolve the issue.

"They gave me a form to sign to get reconnected," she told the BBC. "The form basically said 'if I admit my guilt you'll reconnect me'. So I didn't sign it and walked out."

Jim Killock, executive director of the digital rights activists The Open Rights Group, told the BBC that it is "totally unfair" to disconnect people without notice.

"In fact, disconnection is something that should only even possibly be considered as a result of court action," he said.

While she said that her service had still not been restored, Mrs Robinson called Karoo's policy change "a step in the right direction".

"I'm still a bit upset about it, but it's an improvement that they've done that - rather than just zero chance for any negotiation or to put your case across," she told BBC News.

Editors Note: Dont tread on torrents!
Read rest of entry

Saturday, July 25, 2009

ISP Pulls Plug On File Sharing Customers

Internet service provider (ISP) Karoo, based in Hull, has changed its policy of suspending the service of users suspected of copyright violations.

The about face was made following a BBC story outlining the firm's practice.

Karoo issued a statement on Friday, saying that it has been "exceeding the expectations of copyright owners".

The firm will now adopt a "three strikes" rule, in which suspected file-sharers will receive three written warnings before action is taken.

"We have always taken a firm line on the alleged abuse of our internet connections," said Nick Thompson, director of consumer and publishing services, in the statement.

"However, we continually review our policies and procedures to reflect own customers' changing needs and evolving use of the internet.

"It is evident that we have been exceeding the expectations of copyright owners, the media and internet users. So, we have changed our policy to move in more line with the industry standard approach."

'Totally unfair'

Karoo - the only ISP in the area, which has no BT lines - long held a policy of suspending service of suspected file-sharers. In order to get their service restored, customers had to sign a document promising not to repeat the offence.

The firm's approach is more aligned with many other ISPs' approaches to suspected file sharers, mirroring the "three strikes" rule that the music industry itself has called for.

Andrea Robinson, a Karoo customer from Willerby, told the BBC that a day after her service was cut off, she received a letter from the firm claiming that she had been using the peer-to-peer file-sharing service BitTorrent to download the film Terminator Salvation.
BBC
Read Entire Article
Read rest of entry

History Channel Documentary Validates Chemtrails and Weather Warfare

Read rest of entry

Wednesday, July 15, 2009

Upcoming Military Robot Could Feed on Dead Bodies

It could be a combination of 19th-century mechanics, 21st-century technology — and a 20th-century horror movie.

A Maryland company under contract to the Pentagon is working on a steam-powered robot that would fuel itself by gobbling up whatever organic material it can find — grass, wood, old furniture, even dead bodies.

Robotic Technology Inc.'s Energetically Autonomous Tactical Robot — that's right, "EATR" — "can find, ingest, and extract energy from biomass in the environment (and other organically-based energy sources), as well as use conventional and alternative fuels (such as gasoline, heavy fuel, kerosene, diesel, propane, coal, cooking oil, and solar) when suitable," reads the company's Web site.

That "biomass" and "other organically-based energy sources" wouldn't necessarily be limited to plant material — animal and human corpses contain plenty of energy, and they'd be plentiful in a war zone.

EATR will be powered by the Waste Heat Engine developed by Cyclone Power Technology of Pompano Beach, Fla., which uses an "external combustion chamber" burning up fuel to heat up water in a closed loop, generating electricity.

The advantages to the military are that the robot would be extremely flexible in fuel sources and could roam on its own for months, even years, without having to be refueled or serviced.

Upon the EATR platform, the Pentagon could build all sorts of things — a transport, an ambulance, a communications center, even a mobile gunship.

In press materials, Robotic Technology presents EATR as an essentially benign artificial creature that fills its belly through "foraging," despite the obvious military purpose.

Fox News
EATR at the Robotic Technology Web site
Overview of the project in PDF format.
Read rest of entry

Military Develops ‘Cybug’ Spies


Miniature robots could be good spies, but researchers now are experimenting with insect cyborgs or "cybugs" that could work even better.

Scientists can already control the flight of real moths using implanted devices.

The military and spy world no doubt would love tiny, live camera-wielding versions of Predator drones that could fly undetected into places where no human could ever go to snoop on the enemy. Developing such robots has proven a challenge so far, with one major hurdle being inventing an energy source for the droids that is both low weight and high power. Still, evidence that such machines are possible is ample in nature in the form of insects, which convert biological energy into flight.

It makes sense to pattern robots after insects - after all, they must be doing something right, seeing as they are the most successful animals on the planet, comprising roughly 75 percent of all animal species known to humanity. Indeed, scientists have patterned robots after insects and other animals for decades - to mimic cockroach wall-crawling, for instance, or the grasshopper's leap.

Mechanical metamorphosis

Instead of attempting to create sophisticated robots that imitate the complexity in the insect form that required millions of years of evolution to achieve, scientists now essentially want to hijack bugs for use as robots.

Originally researchers sought to control insects by gluing machinery onto their backs, but such links were not always reliable. To overcome this hurdle, the Hybrid Insect Micro-Electro-Mechanical Systems (HI-MEMS) program is sponsoring research into surgically implanting microchips straight into insects as they grow, intertwining their nerves and muscles with circuitry that can then steer the critters. As expensive as these devices might be to manufacture and embed in the bugs, they could still prove cheaper than building miniature robots from scratch.

As these cyborgs heal from their surgery while they naturally metamorphose from one developmental stage to the next - for instance, from caterpillar to butterfly - the result would yield a more reliable connection between the devices and the insects, the thinking goes. The fact that insects are immobile during some of these stages - for instance, when they are metamorphosing in cocoons - means they can be manipulated far more easily than if they were actively wriggling, meaning that devices could be implanted with assembly-line routine, significantly lowering costs.

Charles Q. Choi
LiveScience
Read Entire Article
Read rest of entry

Tuesday, July 14, 2009

100% free antivirus download links



Avast!
avast! is the multi-award winning antivirus product line from ALWIL Software, which has been ICSA Labs certified and regularly receives the Virus Bulletin 100% award, for detection of 100% of in-the-wild viruses, and SC Awards 2006 for best antivirus in both the US and European categories as well as Best anti-malware solution category in Europe. avast! is specifically engineered to need low system requirements and automatically and incrementally updates both the program and virus definitions, keeping bandwidth usage to a minimum while always being up-to-date.
download

AVG
Though not as well-known as some competitors, this antivirus program offers rock-solid protection. AVG Anti-Virus provides all the necessities, including a tool for scanning your hard drive and e-mail, as well as a real-time shield to prevent infections. You'll find a full-blown scheduling utility for automating tasks and checking for new definitions as often as you'd like. Other perks found in this Pro version include technical support and the ability to run on multiple operating systems. Should a virus create serious system problems, AVG creates a rescue disk to scan your computer in MS-DOS mode. The program doesn't tax your system when scanning or when running in the background, and it always proved effective in our tests. The interface can't be described as beautiful, yet it is mostly simple to navigate.
Though the free version of this program will suffice for average folks, those who demand more control should certainly consider AVG Anti-Virus.
Download

Avira Personal Edition
Avira AntiVir Personal - FREE Antivirus is a reliable free antivirus solution, that constantly and rapidly scans your computer for malicious programs such as viruses, Trojans, backdoor programs, hoaxes, worms, dialers etc. Monitors every action executed by the user or the operating system and reacts promptly when a malicious program is detected.
Avira AntiVir Personal is a comprehensive, easy to use antivirus program, designed to offer reliable free of charge virus protection to home-users, for personal use only, and is not for business or commercial use. Available for Windows or UNIX.
Download

Clam
ClamWin is a Free Antivirus program for Microsoft Windows 98/Me/2000/XP/2003 and Vista.
ClamWin Free Antivirus comes with an easy installer and open source code. You may download and use it absolutely free of charge. It features:
High detection rates for viruses and spyware;
Scanning Scheduler;
Automatic downloads of regularly updated Virus Database.
Standalone virus scanner and right-click menu integration to Microsoft Windows Explorer;
Addin to Microsoft Outlook to remove virus-infected attachments automatically.
Download
Read rest of entry

Monday, July 13, 2009

VIPRE Antivirus + Antispyware, fast and light

Real time anti virus protection can cause your computer to slow down specially if you are also running real time spyware protection, but VIPRE delivers when others cant. As its vicious logo suggest Sunbelt Software's VIPRE antivirus + antispyware destroys viruses,trojans,and worms with no remorse. VIPRE antivirus + antispyware does not just stop there it also has advance protection like root-kit detection + removal, key logger protection, and blocks malicious application activities. Like i said what separates VIPRE from the rest is its speed and low system resource use.





THE POSITIVE: Fast/lightweight and FREE 15-DAY TRIAL.
THE BAD: VIPRE does not yet include firewall protection.
THE PRICE: 1 Year Subscription only $29.95 (1 license), (2 license's) 1 Year Subscription only $39.96, Unlimited Home Site License 1 year ONLY $49.95.
Antivirus Software

disclosure: post has been sponsored
Read rest of entry

I opened up a zazzle store, yay!

I decided to open up a zazzle store so check it out! Oh i am almost done with the free anti virus tutorial. I already have the idea for my third tutorial :]

Rebel Resistance Store

create & buy custom products at Zazzle
Read rest of entry

Sunday, July 12, 2009

The next hacking frontier: Your brain?

Hackers who commandeer your computer are bad enough. Now scientists worry that someday, they'll try to take over your brain.
the past year, researchers have developed technology that makes it possible to use thoughts to operate a computer, maneuver a wheelchair or even use Twitter -- all without lifting a finger. But as neural devices become more complicated, and go wireless, some scientists say the risks of "brain hacking" should be taken seriously.

"Neural devices are innovating at an extremely rapid rate and hold tremendous promise for the future," said computer security expert Tadayoshi Kohno of the University of Washington.

"But if we don't start paying attention to security, we're worried that we might find ourselves in five or 10 years saying we've made a big mistake."

Hackers tap into personal computers all the time. But what would happen if they focused their nefarious energy on neural devices, such as the deep-brain stimulators used to treat Parkinson's and depression, or electrode systems for controlling prosthetic limbs?

According to Kohno and his colleagues, who published their concerns July 1 in Neurosurgical Focus, most devices carry few security risks. But as neural engineering becomes more complex and more widespread, the potential for security breaches will mushroom.
"It's very hard to design complex systems that don't have bugs," Kohno said. "As these medical devices start to become more and more complicated, it gets easier and easier for people to overlook a bug that could become a very serious risk. It might border on science fiction today, but so did going to the moon 50 years ago."

Some might question why anyone would want to hack into someone else's brain, but the researchers say there's a precedent for using computers to cause neurological harm. In November 2007 and March 2008, malicious programmers vandalized epilepsy support Web sites by putting up flashing animations, which caused seizures in some photo-sensitive patients.

"It happened on two separate occasions," said computer science graduate student Tamara Denning, a co-author on the paper. "It's evidence that people will be malicious and try to compromise peoples' health using computers, especially if neural devices become more widespread."
In some cases, patients might even want to hack into their own neural device. Unlike devices to control prosthetic limbs, which still use wires, many deep brain stimulators already rely on wireless signals. Hacking into these devices could enable patients to "self-prescribe" elevated moods or pain relief by increasing the activity of the brain's reward centers.

Despite the risks, Kohno said, most new devices aren't created with security in mind. Neural engineers carefully consider the safety and reliability of new equipment, and neuroethicists focus on whether a new device fits ethical guidelines. But until now, few groups have considered how neural devices might be hijacked to perform unintended actions. This is the first time an academic paper has addressed the topic of "neurosecurity," a term the group coined to describe their field.

Wired
Read Entire Article
Read rest of entry

Friday, July 10, 2009

News Blog

This blog was supposed to be dedicated to tech news and tutorials so i decided to open up a new blog dedicated to just current events. I have named it The Rebel Journal (I might change it to Rebel Intel or Rebel Intel Journal) you should check it out http://rebelintelligence.blogspot.com/. I just wrote a blurb titled "The Sick Red Machine" it is about psychotic behavior that the Chinese government practices with their people for PROFIT. I will post up a new tutorial pretty soon so please keep a look out for that :]
Read rest of entry

Sunday, July 5, 2009

Surveillance is AWESOME!

CCTV
How did we go from using closed-circuit cameras to monitor launches of V2 rockets to watching society 24/7? There are about 30 million surveillance cameras in the United States watching you 24/7 and generating 4 billion hours of footage a week. The government and law enforcement (probably corporate America too) are the biggest users of this technology and claim they use it to reduce crime, but i have not seen any survey or study of this. These eyes in the sky do not prevent crime they just watch it happen and will eventually monitor the law abiding citizen's behavior. I can just image the future with these flying cameras passing by our home's window or was that book i read? Also what about those red light cameras, i hate them so much, what are they supposed to prevent some kind accident or make not want to beat the yellow light (lol i am just jk)? It is just a money scam just like those stupid toll roads its other way to remind you that you are not free.


Radio Frequency Identification Chips

You might think they you don't own any RFID chips, but you actually do. These chips are used in supermarkets and stores to keep track of their stock, but they can also be used to monitor what kind of products you like. These chips are really small and are about the same size as a grain of rice and can be inserted into clothing,food,and pretty much everything you buy. The RFID is not turned off after you leave the store it is still sending out a signal after the purchase.

Your Phone Company
Throw away your alligator clips because in the 21st century there is no need for that barbaric tools for surveillance. I think everybody already knows that telecom companies were granted immunity and help the government spy on your mobile and lan line phone calls. Communications can also be blocked and that just opens the door for disinformation and lovely propaganda.

Your Boss works for Big Brother
Do you have email at work? If you use it for your personal communications then your boss knows about your dirty little secret. With the help of software and actual people your emails are scanned and stored to if your wasting "precious" work time. Of course that not only means emails thought it also means that your web surfing behavior is monitored and your boss know who you talk to on twitter,facebook,and my space.

Advertisements Love You

Have you ever wondered why those advertisements just for some reason match up with you so well? Well if you did not know there is technology that scans your browsing history and keywords from those websites to create and advertisement just for you, awww. The companies that do this say the whole process anonymous and none or your. If you want to know how to protect your self from this visit my spy ware blog posting.

I know where you are!
I have already stated that the telecom companies are spying on your conversations and now they also make it easier to find your location. Most modern mobile phones have a GPS chip inside them since it has become popular to have navigation software on your phone. I remember when i gave a speech in one of my classes address about 3 1/2 ago and stated that GPS technology will become so integrated into our daily lives that a search engine like google could be used to know where your boyfriend,girlfriend, or a loved one is located. I saw a person laugh and shake their head in a manner that seem to suggest that he was disagreeing. Who is laughing now?

Where Are Your Friends and Family? Check Google Maps
The new software to be released Wednesday will enable people with mobile phones and other wireless devices to automatically share their whereabouts with family and friends.The feature, dubbed "Latitude," expands upon a tool introduced in 2007 to allow mobile phone users to check their own location on a Google map with the press of a button."This adds a social flavor to Google maps and makes it more fun," said Steve Lee, a Google product manager.It could also raise privacy concerns, but Google is doing its best to avoid a backlash by requiring each user to manually turn on the tracking software and making it easy to turn off or limit access to the service. Google also is promising not to retain any information about its users' movements. Only the last location picked up by the tracking service will be stored on Google's computers, Lee said. The software plots a user's location — marked by a personal picture on Google's map — by relying on cell phone towers, global positioning systems or a Wi-Fi connection to deduce their location. The system can follow people's travels in the United States and 26 other countries.
read entire article

Recommended Video:


sources:
Big brother is watching: The technologies that keep track of you
Surveillance Society: New High-Tech Cameras Are Watching You
MYSTERY CLOTHING COMPANY PLANS ITEM-LEVEL RFID ROLLOUT

Data Rebel
Read rest of entry

Saturday, July 4, 2009

North Korea Fourth of July Anniversary

There have been many reports of the 4th of July North Korean missile threat, here are some of the articles:

Japan warns that North Korea may fire missile at U.S on Independence Day
North Korea may launch a long-range ballistic missile towards Hawaii on American Independence Day, according to Japanese intelligence officials.The missile, believed to be a Taepodong-2 with a range of up to 4,000 miles, would be launched in early July from the Dongchang-ni site on the north-western coast of the secretive country.
mailonline

Is North Korea Prepping Forth of July Fireworks?
North Korea fired off a pair of short-range missiles today — Reuters is now reporting a third — and speculation now centers on whether Pyongyang is planning a more dramatic test of a long-range missile that could, in theory, reach Hawaii.Three years ago, North Korea ratcheted up tensions in the region with a series of missile tests, including the launch of a long-range Taepodong-2 ballistic missile. That Taepodong-2 launch was a failure: The missile cracked up less than a minute after launch, but the North Koreans continued to pursue intercontinental ballistic missile technology.
wired.com

US 'ready' for N. Korean missile
U.S. missile defenses are prepared to try to knock down the last stage of a Taepodong-2 missile that North Korea is expected soon to launch if sensors detect the weapon threatens U.S. territory, the commander of the U.S. Northern Command told The Washington Times."The nation has a very, very credible ballistic-missile defense capability. Our ground-based interceptors in Alaska and California, I'm very comfortable, give me a capability that if we really are threatened by a long-range ICBM that I've got high confidence that I could interdict that flight before it caused huge damage to any U.S. territory," said Air Force Gen. Victor E. "Gene" Renuart, Northcom commander.
the washington times

Obama: US "Fully Prepared" For North Korea Missile Launch
President Barack Obama said the United States is "prepared for any contingencies" involving North Korea _ including the regime's reported threat to launch a long-range missile toward Hawaii. Japanese media have reported the North Koreans appear to be preparing for a long-range test near July 4. Defense Secretary Robert Gates has ordered additional protections for Hawaii in case a missile is launched over the Pacific Ocean."This administration _ and our military is fully prepared for any contingencies," Obama said Friday during an interview with CBS News' Harry Smith, to be broadcast Monday on "The Early Show.""I don't want to speculate on hypotheticals," Obama said. "But I want ... to give assurances to the American people that the t's are crossed and the i's are dotted in terms of what might happen."
The Huffington Post

Everyone seems to forget though that they are marking the 15 year anniversary of Kim Il-sung's "Eternal Leader" death by testing a Taepodong-2 missile either between July 4th and July 8th. On top of that a month ago North Korea put out a international directive under international law that they are going to test the Taepodong-2 missile. It is not the first time they test fire a Taepodon-2 missile, remember in 2006 the it exploded 40 seconds after it was launched. The Washington Times is stating the the U.S is ready like it is being aimed directly to Hawaii. Ready to shoot down the missile? Look at the big picture, if this missile is brought down what would happen? You know that answer to that question. So i think the media are acting like provocateurs to this whole missile situation because this is the same media that tells you polar bears cant swim. This is just a big diversion! It is important to do your own research and not just depend on the mainstream media to tell you the truth.

North Korea May Be Preparing Another Rocket Launch
While some reports have speculated that North Korea may launch a missile attack on Hawaii, according to David Wright, co-director of the Union of Concerned Scientists Global Security Program, such an attack seems highly unlikely.

The failure of its April launch to place a satellite in orbit suggests that North Korea might intend another satellite launch using the same kind of launch vehicle, the Unha-2.

Analysis based on information from the April test has led to better understanding of North Korea's rocket capability, Wright said. That analysis shows that the Unha launcher represents a significant advance over North Korea's previous launchers. It would have the capability to reach the continental United States with a payload of 1 ton or more if North Korea modified it for use as a ballistic missile.

However, the Unha launcher appears to be constructed from components that were probably not manufactured in North Korea, he added. It is likely that these critical rocket components were acquired from other countries, and in particular from Russia. If this is true, it could mean that North Korea's missile capability could be significantly constrained if it can be denied further access to such components.
Union of Concerned Scientist

No, I am not on N.Korea side! I just like to state the facts.

Read rest of entry

Thursday, July 2, 2009

North Korea test fires missiles


North Korea has test-fired two short-range missiles off its east coast, a spokesman for South Korea's defence ministry has said.

The spokesman said the surface-to-ship missiles were launched from a base near the port of Wonsan at about 0900 GMT.

Pyongyang had warned shipping to stay out of waters off its east coast.

The UN tightened sanctions against North Korea after it launched several missiles and carried out an underground nuclear test in May.

"One [missile] was fired at 1720 (0820 GMT) and the other at 1800 from Sinsang-ni" near the east coast port city of Wonsan, South Korean defence ministry spokesman Won Tae-jae said.

South Korean media had reported that a missile launch was imminent. Previous North Korean warnings to shipping to avoid its coastal waters have been preludes to test launches.

The latest missile launches came hours after North and South Korean officials ended talks at the joint Kaesong industrial zone in North Korea without progress being made.

South Korean officials said they had rejected a Northern demand, made in earlier meetings, to pay higher wages and increased rent in the factory zone, located just across the border in the North.

source

Is this another cuba missile crisis senario?

Read rest of entry

Monday, June 29, 2009

Honduran President Ousted in Coup

The rich and military elite have done it again and followed the same step by step process of the attempted cout de ta of Venezuelan in the year 2000. The Honduran president, Manuel Zelaya, was ousted by the army on Sunday after pressing ahead with plans for a referendum that opponents said could lay the groundwork for his eventual re-election, in the first military coup in Central America since the end of the cold war. source

The army entered the presidential palace, disarmed the presidential guard, and put President Zelaya on a one way plane to Costa Rica; at least they did not kill him. Later that day the Honduran congress voted Zelaya out of his presidency and appointed Roberto Micheletti as president, but Zelaya says that he his the democratically elected president of Honduras.
President Obama has stated that he does not agree with kicking out Mr.Zelaya, but the problem is that leaders of the Honduran military coup were trained in the United States. Fort Benning, Georgia has been known to produce graduates that are experts at torture, death squads, and other unique and wonderful ways of destroying human lives.

According to the watchdog group School of Americas Watch, Gen. Vasquez trained at the
Western Hemisphere Institute for Security Cooperation at least twice — in 1976 and 1984 — when it was still called School of Americas. The Georgia-based U.S. military school is infamous for training over 60,000 Latin American soldiers, including infamous dictators, “death squad” leaders and others charged with torture and other human rights abuses. SOA Watch’s annual protest to shut down the Fort Benning training site draws thousands.

According to SOA Watch, the U.S. Army school has a particularly checkered record in Honduras, with over 50 graduates who have been intimately involved in human rights abuses. In 1975, SOA Graduate General Juan Melgar Castro became the military dictator of Honduras. From 1980-1982 the dictatorial Honduran regime was headed by yet another SOA graduate, Policarpo Paz Garcia, who intensified repression and murder by Battalion 3-16, one of the most feared death squads in all of Latin America (founded by Honduran SOA graduates with the help of Argentine SOA graduates).

General Vasquez isn’t the only leader in the Honduras coup linked to the U.S. training facility. As Kristin Bricker points out:

The head of the Air Force, Gen. Luis Javier Prince Suazo, studied in the School of the Americas in 1996. The Air Force has been a central protagonist in the Honduran crisis. When the military refused to distribute the ballot boxes for the opinion poll, the ballot boxes were stored on an Air Force base until citizens accompanied by Zelaya rescued them. Zelaya reports that after soldiers kidnapped him, they took him to an Air Force base, where he was put on a plane and sent to Costa Rica.

source

The worst part and the part that alarms me is the President Hugo Chavez (Venesuela), President Daniel Ortega (Nicaragua), President Evo Morales (Bolivia), and many others have said that they do not recognize "President" Roberto Micheletti. On top of that
Chávez said he would do everything necessary to reverse the coup against his close ally. He said he would respond militarily if his envoy to Honduras was attacked or kidnapped. Chaves stated that "I have put the armed forces of Venezuela on alert," he said on state television. If a new government was sworn in it would be defeated, Chávez said. "We will bring them down, we will bring them down, I tell you".
source

The military in Honduras is doing all it can to keep the coup going by cutting of the electricity for most of the day in Tegucigalpa,seizing television and radio stations taking them off air, and only rich Hondurans with access to the Internet and cable television were able to follow the day’s events. All while military tanks and military planes flew overhead. Oh yeah and the classic trade mark of tyranny of a 9pm curfew was placed nationwide. source

Good news though the citizens of Honduras are not spineless because they blocked the street to stop the army from arriving at the presidential palace while they threw rocks and yelled "Traitors! Traitors!".

If that was not enough the Venezuelan, Cuban, and Nicaraguan Ambassadors to Honduras were also kidnapped.

Military personnel kidnapped the ambassadors of Venezuela, Cuba, and Nicaragua in Honduras, along with the Honduran Foreign Relations Minister Patricia Rodas, according to Venezuela’s ambassador to the Organization of American States (OAS), Roy Chaderton.

Chaderton made the announcement just before noon today during an emergency meeting of the OAS in Washington that was convened to respond to the military coup d’etat underway in the Honduras.

“Excuse the interruption, it is an urgent matter. I have just received information in this moment that the ambassadors of Nicaragua, Cuba, Venezuela,and Foreign Relations Minister Patricia Rodas have been kidnapped by a group of hooded military agents,” said Chaderton.
source

All i can say is that the globalist are hard at work....
Read rest of entry

Sunday, June 28, 2009

China to Count Abortions as Carbon off-set Credits. EU and UN Approve Applaud

China to count Abortions as Carbon off-set Credits. EU and UN Approve Applaud Chris Horner Author of RED HOT LIES : How Global Warming Alarmists Use Threats, Fraud, and Deception to Keep You Misinformed. on Glen Beck

As some of you may know the U.N has awarded china for many of its policies, one child policy for example. Even the U.S is backing China up by given aid under the climate change deal:
U.S. Special Envoy for Climate Change Todd Stern said that there was “no question” that China would receive both financial and technological assistance from the United States as part of upcoming climate change talks to be conducted in Copenhagen, Denmark.

“This is a developing country issue, which includes China,” Stern told reporters on Friday. “I think there is no question that a Copenhagen agreement is going to have to include mechanisms to provide the financial flows and technological assistance to developing countries.”

read entire article

It is all about the global green revolution. Do you really think that the "green revolution" is a grassroots project? China is the experimental lab/scientific project/blueprint of the new world order for the world. Hey! this is the country that allows companies to use skin harvested from corpses of executed convicts to develop beauty products that are later sent to Europe for all the beautiful tools to use.
Source: London Guardian

Oh and that's not all! Here are more sources of the total disrespect for human life!
mainstream sources

Forget the traditional bullet in the head because China is a pioneer and wants you to got out in style in a stylish mobile van of death.
Makers of the death vans say the vehicles and injections are a civilized alternative to the firing squad, ending the life of the condemned more quickly, clinically and safely. The switch from gunshots to injections is a sign that China "promotes human rights now," says Kang Zhongwen, who designed the Jinguan Automobile death van in which "Devil" Zhang took his final ride.For years, foreign human rights groups have accused China of arbitrary executions and cruelty in its use of capital punishment. The exact number of convicts put to death is a state secret. Amnesty International estimates there were at least 1,770 executions in China in 2005 — vs. 60 in the United States, but the group says on its website that the toll could be as high as 8,000 prisoners.
USA Today
It isn't all bad though because you get awarded with money if you commit to the one child policy, but if you don't or if your baby is not approved of you will forced to an abortion.

Several health workers have been arrested in Shandong Province in the east of China after the authorities admitted that local officials had been forcing women to have abortions or undergo sterilisations.

Sources in Linyi City and its surrounding counties claimed that up to 120,000 women had been coerced into submitting to the procedures and that some of them were in the ninth month of their pregnancies.

The arrests follow the detention on 6 September of a local activist, Chen Guangcheng. Mr Chen had claimed that women with two children were being forced to undergo sterilisations, while women pregnant with their third child were required to have abortions.

Human rights groups have long insisted that China used compulsory abortions and sterilisations as a way of enforcing its one-child policy, which restricts couples to just one child and was introduced in 1979 as a means of controlling the growth of its population.
read entire article

Yes! it is a revolution but NOT in your benefit.
Read rest of entry

Saturday, June 27, 2009

Keyword Jackson: Google thought Michael Jackson traffic was attack


Its a MJ Bomb...

Tom Krazit
CNet News

Google has confirmed that the surge of Michael Jackson-related searches on Google News Thursday was first interpreted as an attack on its service.

Google News was inaccessible for some people Thursday afternoon right as rumors of Jackson’s death began to circulate, replaced by an error message reading “We’re sorry, but your query looks similar to automated requests from a computer virus or spyware application. To protect our users, we can’t process your request right now.”

Of course, those queries were quite legitimate, as millions around the world searched for accurate information regarding Jackson following reports that he had suffered cardiac arrest. The spike in queries began at about 2:45 p.m. PDT Thursday, and Google thought the traffic was an attack for about 25 minutes before realizing what was going on.

Google also noted that it saw a huge spike in mobile searches. Yahoo’s data backed up Google’s; it set a record for unique visitors in a single day with 16.4 million visitors, and its lead story on Jackson’s death was the most highly-visited story in its history.

Source Site
Read rest of entry

Friday, June 26, 2009

Cop Who Brutally Beat Female Bartender Receives Probation

WGN Radio 720

blogger note: How is this sadistic cop still allowed to be in the police force? You know why because that what the federalized police force wants! How is this going to stop him from doing this again?

A Chicago police officer was sentenced to two years probation Tuesday for pummeling a woman who was tending bar, even though prosecutors produced a previously unseen video showing him beating someone else at the bar hours earlier.Anthony Abbate — who declined to say anything to the judge before he was sentenced — could have gotten up to five years for beating Karolina Obrycka in February of 2007. The attack was captured by the bar’s security camera and the video was shown around the world.Judge John Fleming said he decided against jail time, explaining he did not believe the crime was serious enough and that throwing Abbate in prison would not be a deterrent to others.
continue reading at source site: wgnradio.com
Read rest of entry

Thursday, June 25, 2009

Freedom Downtime

FREEDOM DOWNTIME
is the story of computer hacker Kevin Mitnick, imprisoned without bail for nearly five years. The film tries to uncover the reasons why the authorities are so scared of Mitnick as well as define what exactly he did. As word of a new Hollywood movie portraying Mitnick as a terrorist becomes known, hackers begin to turn to activism to get their message out. Through interviews with relatives, friends, lawyers, and experts in the computer and civil liberties arena, a picture of a great injustice becomes apparent. A cross country journey uncovers some realities of the hacker culture as well as the sobering reality that so many technically adept young people seem destined for prison.

Winner of the Audience Award for Documentaries at the New York International Independent Film and Video Festival, 2002

I love this documentary because it shows the real hacker mentality unlike the one that the mainstream media shows you; basically a criminal behind a computer. Beside teaching the meaning of hacking it also shows the broken justice system that currently still exist in America. When the man catches you smoking weed you pay a heavy price by being locked up in Federal Prison with violent criminals even though you did that was harming anyone and this also happens to hackers. Young adults/kids are thrown in jail to rot and some will fall to the criminal ways after they get out. Well just watch the documentary and you will see what i am talking about, oh and visit 2600.com and buy a copy of their DVD to support them. (If you have seen those prison documentaries we can agree that it is a scary place!)
Read rest of entry

Thursday, June 18, 2009

How to remove adware, spyware, dailers, keyloggers, trogens, and protect your usage tracks...


Adware
Also known as advertising-supported software is software that hi jacks your computer to play and display or even download advertisements to your computer once the software is installed on your hard drive.

Adware Examples
123 Messenger, 180SearchAssistant, 888bar, Adssite Toolbar, AOL Instant Messenger, Antivirus 200 Family, Bearshare, Bonzi Buddy, BlockChecker, Burn4Free, ClipGenie, Comet Cursor, Crazy Girls,Cydoor, Daemon Tools - (Software comes bundled with the "Daemon Tools WhenUSave Toolbar" but can be unchecked during installation), Direct Revenue, DivX, DollarRevenue, Ebates MoneyMaker, ErrorSafe, Evernote, Ezula, FaceGame.exe, FlashGet, Gamespy, Gamevance, Gator, Gool.exe, and soooo many more >_>

Spyware
spyware installs itself on your computer with out your consent and mainly monitors your web browsing behavior. It changes your computers settings, slows down your internet connection, change the homepage, and installs additional software. To put in simple terms it invades your privacy!

Dialers
Dialers are necessary to connect to the internet (at least for non-broadband connections), but some dialers are designed to connect to premium-rate numbers. The providers of such dialers often search for security holes that may be present in the operating system installed on the user's computer and use them to change the computer to dial up through their number, pocketing the additional money for themselves. Alternatively, some dialers inform the user what it is that they are doing, with the promise of special content, accessible only via the special number. Examples of this content include software for download, (usually illegal) MP3s, 'underground' hacking materials such as viruses,and in the case of at least one website, pornography.

The cost of setting up such a service is relatively low, amounting to a few thousand dollars for telecommunications equipment, whereupon the unscrupulous operator will typically take 90% of the cost of a premium rate call, with very few overheads of their own.

Users with DSLs (or similar broadband connections) are usually not affected. A dialer can be downloaded and installed, but dialing in is not possible as there are no regular phone numbers in the DSL network and users will not typically have their dial-up modem, if any, connected to a phone line. However, if an ISDN adapter or additional analog modem is installed, the dialer might still be able to get a connection.

Malicious dialers can be identified by the following characteristics:

  • A download popup opens when opening a website.
  • On the website there is only a small hint, if any, about the price.
  • The download starts even if the cancel button has been clicked.
  • The dialer installs as default connection without any notice.
  • The dialer creates unwanted connections by itself and without user interaction.
  • The dialer does not show any notice about the price (only few do) before dialing in.
  • The high price of the connection is not being shown while connected
  • The dialer cannot be uninstalled, or only with serious effort.
Keyloggers
A hardwardware or software based method of loggin the keys that are pressed on a keyboard for the purpose of monitoring.

Trojans
Is malware that helps gain unauthorized access to the victims computer system. Additionally, they require interaction with a hacker to fulfil their purpose. The hacker need not be the individual responsible for distributing the Trojan horse. It is possible for hackers to scan computers on a network using a port scanner in the hope of finding one with a Trojan horse. The term Trojan Horse comes from a story in Greek mythology.

Usage Tracks
Usage tracks are your fingerprints in your system. Whenever you visit a page with your browser, or just open any file, that information is stored deep inside windows. In most cases that is very useful – if you want to open that file again, you can select it from a list instead of typing the whole filename or browsing the whole directory structure again. But in some cases you may want to hide your activity, because spyware and internet attackers may use that information.

If you like this post, buy me a RootBeer at $1 to quench my thirst!

Official Spybot S&D Site
Read rest of entry
Blog Widget by LinkWithin
 

Twitter Updates

    The Daily Technique Copyright © 2009 Gadget Blog is Designed by Ipietoon Blogger Templates Sponsored by Online Business Journal