Internet – Gesellschaft – Kulturen        
DI, 04.04.2017, 16.00 Uhr: Zunächst bringen SchülerInnen der 2EK der HAK Polgarstraße Beiträge zu Catfishing, Snapchat und bargeldloser Bezahlung. Weiters erklären sie die Unterschiede zwischen Deep Web und Dark Net und zeigen deren Gefahren auf. Und wer an neuen Weltuntergangstheorien interessiert ist, kann zwischen mehreren, äußerst kreativen Szenarien auswählen. Weiter geht’s mit SchülerInnen derselben Schule […]
          Rund um das Thema Internet        
SchülerInnen der 2EK der HAK Polgarstraße bringen Beiträge zu Catfishing, Snapchat und bargeldloser Bezahlung. Weiters erklären sie die Unterschiede zwischen Deep Web und Dark Net und zeigen deren Gefahren auf. Und wer an neuen Weltuntergangstheorien interessiert ist, kann zwischen mehreren, äußerst kreativen Szenarien auswählen. hakpo004, pol004
          Deep Web (2015 Documentary)        
none
          FBI’dan Playpen Adlı Zararlı Siteye Baskın!        

FBI, çocuk istismarı odaklı web sitesi Playpen’i ve sitenin kullanıcı bilgilerini ele geçirdi. Ortaya çıkan manzara tek kelimeyle ‘korkunç!’ Detaylar FBI’ın geçtiğimiz aylarda izine rastladığı bir karanlık web (deep web) platformu olan yani tor ağları üzerinden sadece belli bir kesim tarafından erişimi mümkün olan Playpen adlı siteye sızmayı başardı. Site barındırdığı fotoğraf ve video içeriği […]

FBI’dan Playpen Adlı Zararlı Siteye Baskın! yazısı ilk önce Teknoloji, Oyun, Mobil Haberleri ve İncelemeleri - Teknoloji Turu üzerinde ortaya çıktı.


          Cicada 3301 2017: Como surgiu os enigmas na Deep Web        
Cicada 3301: Saiba o que é e como surgiu esse mistério da Deep Web [2017]
Supostamente, a chamada Cicada 3301 é uma organização, cujo ramo de atuação ainda é desconhecido. Ela lançou charadas no mundo virtual (que, mais tarde, se expandiram para o real), com o discurso de que estaria à procura de pessoas “altamente inteligentes”. As etapas são sempre muito complexas: incluem usar linguagem de programação hexadecimal (algarismos de 0 a 9 combinados com letras de A a F), criptografia (mensagens cifradas) e esteganografia (mensagens escondidas nos bits de uma imagem) para decifrar pistas publicadas em sites, fóruns e redes sociais. Os peregrinos, como são chamados aqueles que querem seguir o caminho da Cicada em busca da “iluminação”, sempre aguardam ansiosos pelo dia 5 de janeiro, data em que a primeira pista de cada enigma anual é revelada – houve desafios em 2012, 2013 e 2014. No entanto, como este último não foi resolvido (ou, se foi, as pessoas que o fizeram não vieram a público para dizer), não houve charada em 2015.

O MISTÉRIO DA CICADA 3301

Cicada 3301: Saiba o que é e como surgiu esse mistério da Deep Web [2017]
No dia 5 de janeiro de 2014, a conta do Twitter usada pela Cicada 3301 foi reativada após um ano. A mensagem tinha um link que levava a uma imagem. Com a ajuda de um software de esteganografia sobre a figura, era possível ver uma série de números e uma mensagem de texto – trecho de um ensaio do poeta Ralph Waldo Emerson...
Cicada 3301: Saiba o que é e como surgiu esse mistério da Deep Web [2017]
Os números finalizavam com o sufixo “.onion”, ou seja, eram endereços da Deep Web. A URL levava a uma montagem de três ilustrações do pintor William Blake. Novamente usou-se um software de esteganografia na imagem, revelando a mensagem “Bem-vindo. Boa sorte. 3301” seguida de códigos alfanuméricos. Com a ajuda de um algoritmo de criptografia, encontrou-se um novo site .onion...
Cicada 3301: Saiba o que é e como surgiu esse mistério da Deep Web [2017]
Uma mensagem nessa URL dizia “A paciência é uma virtude”. Após mais de 20 horas, apareciam caracteres que, descobriu-se, podiam ser convertidos em três imagens. Eram as três primeiras páginas do livro Liber Primus, a terceira escrita em runas. Essa linguagem pôde ser decodificada com o Gematria Primus, código fornecido pela Cicada em seu site.

O conjunto numérico equivalente às páginas do livro levou a uma nova mensagem codificada, assinada pela 3301. Uma vez decifrada, essa mensagem dizia “Bom trabalho. A verdade absoluta é a ilusão absoluta”. E finalizava chamando os peregrinos a se unirem ao grupo em outro endereço da rede .onion...
Cicada 3301: Saiba o que é e como surgiu esse mistério da Deep Web [2017]
Nesse endereço, novos códigos começaram a aparecer e, convertidos, revelaram mais páginas do Liber Primus. Em uma delas, foram descobertas cinco colunas de números e palavras codificadas, distribuídas em cinco linhas. Os textos do livro, por sua vez, foram transformados também em números a partir da Gematria Primus. Após a decodificação, descobriu-se um quadrado mágico 5 x 5 (em que a soma das linhas e colunas levavam ao mesmo resultado)...
Cicada 3301: Saiba o que é e como surgiu esse mistério da Deep Web [2017]
Foi quando a 3301 mandou um recado para os peregrinos, pedindo que as próximas tarefas dos desafios fossem resolvidas individualmente. Na sequência, as pessoas que monitoravam as páginas .onion da organização encontraram o Retrato de Andrés del Peral, do espanhol Francisco Goya. Ajustando os filtros da imagem, foram achados quatro novos elementos: o logo da Cicada, outra figura de um homem e duas colunas numéricas...
Cicada 3301: Saiba o que é e como surgiu esse mistério da Deep Web [2017]
Utilizando esteganografia no quadro, encontrou-se uma nova mensagem da Cicada escondida com uma série de códigos hexadecimais, que revelaram duas imagens e um arquivo mp3. Uma delas era do matemático Kurt Gödel. A outra era a obra Olho, de M.C. Escher. Já o áudio era da Trio Sonata BWV 1039 em Sol Maior, de Bach...
Cicada 3301: Saiba o que é e como surgiu esse mistério da Deep Web [2017]

A mensagem achada no quadro ainda continha mais um endereço .onion codificado. Ao resolver essa etapa do mistério, os peregrinos chegaram a quatro novos arquivos em .jpeg do Liber Primus. Utilizando esteganografia nas imagens, novamente foram encontrados códigos, revelando quatro quadrados não mágicos...
Cicada 3301: Saiba o que é e como surgiu esse mistério da Deep Web [2017]
Em fevereiro de 2014, a última página do .onion saiu do ar, mas foi reativada após seis dias. Agora trazia uma caixa de texto e a orientação para que, ali, fossem colocados três quadrados mágicos: dois da ordem de 5 x 5 (um com a soma 3301 e o outro 1033) e um de 7 x 7, somando 1033. Para que um peregrino pudesse ser diferenciado dos outros, a Cicada pediu que cada um fornecesse uma página própria no onion. Seguindo esses passos, a Cicada 3301 prometia entrar em contato com o peregrino. O problema agora era descobrir quais eram os três quadrados mágicos requisitados...
Cicada 3301: Saiba o que é e como surgiu esse mistério da Deep Web [2017]
Usando a técnica da esteganografia no mp3 de Bach, encontrado na pintura de Goya, foram achados três novos quadrados mágicos em um arquivo chamado magicsquares.txt. Eram esses os códigos necessários para ganhar acesso ao sétimo endereço da rede .onion. Acessando esse novo site, foi possível obter 58 páginas do Liber Primus, numeradas de 0 a 57, codificadas pelas runas. Atualmente o grupo que se reúne no fórum uncovering-cicada.wikia.com tenta decifrar todas as mensagens do livro, além de tentar achar as conexões escondidas nos textos e na conversão das runas em números...

Veja também: Links da Deep Web 2017

          Ofertaban en la deep web a modelo secuestrada        

Por: Ariana Castellanos Ciudad de México (Rasainforma.com).- Tras el secuestro de una modelo británica de 20 años en Italia, la Policía local detuvo a un hombre de origen polaco identificado como Lukasz Herba, sospechoso del delito. La modelo llegó a Milan, Italia el pasado 10 de julio, ya que participaría en una sesión fotográfica, sin embargo fue interceptada, drogada, esposada y llevada […]

La entrada Ofertaban en la deep web a modelo secuestrada aparece primero en MiMorelia.com.


          Get High Quality Results With the Deep Web        
When talking about search engine results, the definition of "quality" can be subjective: when you get results you want, that's high quality; but when you don't, quality doesn't exist. But we all know that there are more ways than one to get results from search engines, you just need to know where to look.
          Bomb Hoaxes on the Deep Web        

Marketplaces on the dark web sell all manner of illegal goods and services. The anonymity of the Tor browser allows for people around the globe to sell stolen goods, illegal


          Você Sabia?: mais de 400 coisas que você deveria saber – Lukas Marques, Daniel Molo        
Nada escapa ao olhar curioso de Lukas Marques e Daniel Mologni, criadores do Você sabia?, canal de curiosidades no YouTube, com mais de 7 milhões de seguidores. Com bom humor, irreverência e muita informação, eles conquistaram a internet e agora vão invadir as livrarias com este livro repleto de fatos curiosos, bizarros e interessantes. Você entraria na Deep Web? Tem medo de histórias sobrenaturais? Já viu ou acredita em extraterrestres? Comeria um queijo vivo? E o que aconteceria se, do nada, a Terra parasse de girar? E que tal conhecer o objeto mais perigoso do mundo? Sabe da existência dos monstros marinhos?
          NerdTech 11 - Privacidade Online Não Existe        
Neste podcast: Discutimos a segurança dos seus dados na rede e como isso afeta a sua vida. ARTE DA VITRINE:  André Carvalho ESTE NERDCAST É UM OFERECIMENTO DA ALURA Toda a PRIMEIRA sexta-feira do mês você vai ter um Nerdcast extra sobre tecnologia. Confira todos os episódios aqui: https://jovemnerd.com.br/playlist/nerdtech/ Acesse: http://www.alura.com.br/promocao/nerd Links citados no programa https://www.alura.com.br/podcast-nerdtech/links NerdTech Playlist completa Nerdtech: https://goo.gl/18WWFs VEJA TAMBÉM Nerdologia Tech - Deep Web e Dark Web: https://goo.gl/WwyCGa E-MAILS Mande suas críticas, elogios, sugestões e caneladas para nerdcast@jovemnerd.com.br EDIÇÃO COMPLETA POR RADIOFOBIA PODCAST E MULTIMÍDIA http://radiofobia.com.br
          NerdCast 363 - The Deep, the bad and the dirty web        
Lambda lambda lambda! Hoje Alottoni, Cardoso, Cris Dias, Marco Gomes, Vinícius K-Max e Azaghal batem um papo sobre as profundezas da DEEP WEB! Neste podcast: Entenda como uma cebola e o deus do trovão vão te ajudar a navegar anônimo na web, descubra que se pode comprar de tudo com os Bitcoins e tome cuidado para a nuvem não acabar com o seu casamento! Tempo de duração: 78 min ARTE DA VITRINE: Anderson Gaveta Lançamento do Galaxy S4 da Samsung Compre o seu agora mesmo no Submarino, versões 3G ou 4G Lançamento Nerdstore Camiseta Not Again! Confira o especial de ofertas Deep Web O Submarino separou uma seleção de produtos para você se aprofundar nos assuntos da web Saiba mais sobre Deep Web Confira a matéria especial feita pelo pessoal do YouPix Participe do Dia da Toalha Veja o que você tem que fazer para participar do Dia da Toalha Jovem Nerd Encontros Skynerd Encontro Dia da Toalha 8º Encontro SkyNerd - BH + Eduardo Spohr Nerds na Caceta da Agulha Ricardo Tavares Medeiros Vídeos Enviados As faces de Azaghal Conspiração Nazista E-MAILS Mande suas críticas, elogios, sugestões e caneladas para nerdcast@jovemnerd.com.br EDIÇÃO COMPLETA POR RADIOFOBIA PODCAST E MULTIMÍDIA http://radiofobia.com.br
          Deep Web – O lado obscuro e secreto da Internet        

O Mundo da Internet é infinito….. e a quantidade de informação que podemos adquirir é imaginável. Os motores de busca como por exemplo o Google e o Yahoo, ajudam os utilizadores a encontrar facilmente, e de uma forma rápida o que procuram.
Mas essa informação, presente em sites que visitamos diariamente, como o Seja Livre, Facebook, Google, You Tube e etc, representam apenas cerca de 20% da Internet. Mas onde estão os restantes 80%??? …a Deep Web é a resposta.
A Deep Web é praticamente um “guetto” de uma grande cidade, supondo que a Internet é essa grande cidade, só que com a grande diferença de ser 500 vezes maior do que essa cidade. Aqui encontramos de tudo, sem respeitar os índices e regras que “regem” a Internet por si só. Ao longo deste artigo vamos destacar a Internet que conhecemos…ao qual se designa por Surface ou Visible Web.
A Surface, se relacionarmos a Internet a um Iceberg, consideramos a parte da Internet que está à superfície e visível a todos.. Por outro lado, a Deep Web é a parte obscura e como tal com representação na parte inferior do iceberg. A surface  tem um tamanho calculado em cerca de 167 terabytes. De acordo com estudos da Universidade de Berkeley, o tamanho da Deep Web é estimada em cerca de 91 mil terabytes.
A Deep Web, é um mundo totalmente aparte, muitos dizem que é o lado obscuro da Internet (apesar de muitos analistas considerarem que a “dark Web” – Internet “obscura” reside também dentro da “deep web”. E dizem isso porque para acessarmos a Deep Web precisamos de serviços de Proxy Anônimo, como o Tor, e esse proxy servirá para mantem o anonimato do utilizador, deixando-o completamente invisível enquanto navega na Deep Web. Mas tenha cuidado, pois tendo em vista que a Deep Web não tem regras e todos seus usuários são anónimos, há todo o tipo de informação, e muitas destas chocantes como venda de droga, pedofilia, vídeos bizarros, informações confidenciais, livros raros, vídeos de lutas até à morte, sites de religião… e muitas outras coisas. Existem fóruns, de extrema utilidade, que na Surface seriam completamente encerrados já que os assuntos debatidos iriam chocar utilizadores, como por exemplo foruns os hacker e crackers partilham o seu conhecimentos entre eles. Algumas dos grupos Hackers activistas, como os Anónimos e o Wikileaks, nasceram na Deep Web e aos poucos expandiram para a Surface. Não é que a Deep Web seja um mundo desinteressante (é completamente o oposto) mas sim para divulgarem o seu trabalho a todas as pessoas e também ganharem algum protagonismo. Julga-se que na Deep Web existam cerca de 8 camadas, em que em cada camada tenha um maior grau de dificuldade para a aceder. Só vos vou falar sobre a primeira camada em mais pormenor porque é a única para a qual ainda se consegue obter alguma informação na Surface. A primeira camada chama-se Onion, podendo ser acessada através do proxy Tor que já comentamos. Sem o proxy é impossível acessar a primeira camada, ou seja á “entrada” da Deep Web. Os links da Deep Web são ligeiramente diferentes do que os convencionais e browser simplesmente não os conseguem identificar, como podem verificar com este link abaixo: Clic Aqui Este link pertence a Hidden Wiki, como se fosse a Wikipédia da Deep Web. Já na Surface a Wikipédia é completamente cheia de informação, mas só consegue ter aproximadamente um terço da Hidden Wiki. Tente acessar o mesmo link usando o Proxy Tor; você será direcionado para página abaixo:
Na camada Onion, podemos ter acesso: A informação confidenciais (algumas delas são falsas, como é óbvio); A livros raros e que não se encontram na Surface (a maior parte de informática); O lado negro da Internet (como já tinha falado anteriormente); A Onion é a camada mais básica e com menos informação da Deep Web, mas mesmo assim contem muito mais que a Surface. Nas restantes camadas estariam alojados servidores governamentais e científicos com informações confidenciais, como é o caso da NASA e dos Governos Americano, Brasileiro e etc. Para acessar a estas camadas é necessário um certo conhecimento e habilidade em informática acima da média, porque as barreiras de segurança são muitas. Segundo um artigo publicado recentemente no jornal Publico Eduarda Mendes Rodrigues do departamento de Engenharia Informática da Faculdade de Engenharia da UP (FEUP) afirma que para muita gente “o Google já não é suficiente”. O aumento da procura de informação específica pode significar um maior investimento nesta área, embora ainda esteja longe um concorrente do Google. Eduarda Rodrigues refere ainda que “muitas universidades de renome e instituições de pesquisa científica partilham as suas informações em sites próprios na “deep web”. Existe também uma “comunidade de investigadores e entusiastas que precisam de fazer uma partilha segura de informação fora da ‘web’ normal”.
  Artigo retirado do Pplware
 Sobre o Tor Proxy O Tor é uma rede de computadores ligada a internet através de inúmeros proxies anônimos espalhados ao redor do globo. Basicamente a rede funciona assim: O usuários se conecta à rede através de um cliente, que pode ser o aplicativo do Tor ou o Tor Browser. Após conectado, o usuário tenta acessar o Google, por exemplo. Se fosse da forma convencional, ao digitar google.com aqui no Brasil, os servidores do Google o redirecionaria para o google.com.br, porém com o Tor é diferente. A requisição http que foi realizada pelo usuário entrará em um túnel de redirecionamento passando por no mínimo 30 proxies diferentes até chagar ao destino, não permitindo assim que este destino saiba a origem da requisição. Logo, ao acessar o google.com você poderá ser redirecionado ao google.com.it, por exemplo, pois os servidores do Google irão reconhecer apenas o último salto da requisição, o qual nunca é o mesmo.
 Para saber mais sobre o Tor leia os artigos abaixos:


sejalivreorg

vivaolinux


Fonte=>

sejalivre.org

          Commentaires sur Goat In The Shell débunke le « Deep Web » par onion        
et c'est aussi ca http://5cttyyp4a7wolth3.onion/%D1%84%D0%BE%D1%82%D0%BE-%D0%B8-%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE.html
          Commentaires sur Goat In The Shell débunke le « Deep Web » par onion        
tor c'est aussi ca http://5lsqxtmw6ulhqjcy.onion/
          Vocativ: Bringing the Deep Web Into the Newsroom        
Is journalism about to undergo a dramatic change? if you ask Entrepreneur Mati Kochavi who founded the new start-up Vocativ the answer is a definite yes. This new site tries to find news stories on parts of the internet that are typically not accessible to regular search engines using technologies which so far have been ...
          Berlino: Le nuove geografie di CTM16        

di Ercole Gentile / nella foto (via), Deep Web di Christopher Bauder e Robert Henke Il tema di questa nuova edizione di CTM (la parte musicale del più ampio festival Transmediale) era molto accattivante. New Geographies. L’espansione di internet anche in paesi meno tecnologicamente sviluppati sta dando sempre di più la possibilità ad artisti provenienti da tutto […]

The post Berlino: Le nuove geografie di CTM16 appeared first on RUMORE.


          Sleepless Nights 07-23-2017 with Haley Hodgkins        
Playlist:

3 Deep- When You Come Over - 3 Deep
Death Grips- No Love - No Love Deep Web
DL Incognito- Spit Forever 2 Featuring Tara Chase - A Sample And A Drum Machine
Greg Grease- CREAM Dreams - Cornbread Pearl G
People Under The Stairs- Jamboree Pt 2 - Stepfather Remastered
Kali Uchis- Real - Love The Free Ii
King Tee- Dippin Remix - King Tee
Tommy Wright III- Life In FCP - Tommy Wright Iii
Conway The Machine- WraithFul - Reject 2
Faith Evans- Love Like This - Keep The Faith
Deep Factor- Main Mix - Down On It
Nick Curly- Aymara - Defected Presents Nick Curly In The House
Harry Wolfman Laurence Guy- Mole Jug - The Lone Grazer EP
Graze- SkipCrush - Edges
Mr Fingers- Can You Feel It - The Original Chicago House Classics
- voicebreak -
Mad Rey- Dis Poem - Vert
ILoveMakonnen- I Loved You - I LOVE MAKONNEN 2
Inc- The Place - No World Bonus Track Version
Quadron- Sea Salt - Avalanche
Moloko- The Time Is Now Bambino Casino Mix - All Back To The Mine
King Krule- Neptune Estate - 6 Feet Beneath The Moon
Delroy Edwards- Now U In My Trunk - Slowed Down Funk Vol 3 Pure Evil
Moodymann- Ulooklykicecreaminthesummertyme feat Nikki O - Moodymann
Jonwayne- Paper feat Shango - Rap Album Two
King James Version- Hes Forever Amen - Mr Bongo Record Club Vol 1
JID- NEVER - The Never Story
Yolanda Adams- Just As I Am - Yolanda Adams


playlist URL: http://www.afterfm.com/index.cfm/fuseaction/playlist.listing/showInstanceID/91/playlistDate/2017-07-23
          Silent Majority's Pirate Podcast # 172 " The Deep Web!"        
itunes pic
This episode we talk about the deep web or the invisible web, that is, websites that you cannot find by google, yahoo or bing, nor can you find them with out a special browser called a TOR. Some of these "marketplace" sites include buying whores, illegal guns, drugs, children, hitmen, all with you heard earned...em bitcoin. Yet there is also a lot of good websites that you can find 40 some odd petabytes of information on every subject you can imagen! Heres to the freedom of information! ------------------------------------------------------------- @S1LENTMAJ0RITY www.facebook.com/silentmajoritypunx thesilentmajority@icloud.com
          Nexcess Announces Deep Web Hosting Discounts Beginning Next Friday For Holiday Shoppers        

On Friday and Monday, new Magento, WordPress, ExpressionEngine, and Craft CMS hosting clients will benefit from a 70% discount for the first month of any dedicated or shared server plan.

(PRWeb November 17, 2016)

Read the full story at http://www.prweb.com/releases/2016/11/prweb13855431.htm


          Deep Web طريقة تصفح الانترنت الخفي        

Deep Web طريقة تصفح الانترنت الخفي

deep , web , طريقة , تصفح , الانترنت , الخفي , deep-web-oo-usuoc-oaouu1


          Comment on What can the WordPress community learn from the State of Drupal? by John        
Hi Kevin - thanks for commenting. I get that I'm likely oversimplifying (making an hour long presentation into a short blog post) but he does say at 21:12 <blockquote>The open web as we know it is closing up . . . the big players are taking over more and more of the front-end of the web, and Drupal sites risk being sort of the the deep web, if you will, for lack of a better word. And the sad part, in a way, is we won't be able to stop it. I thought really really hard about this - I couldn't think of a way to stop this. . . it's actually easier for the users, . . . it's actually better for the businesses as well. . . . It's better for users, it's better for businesses. So how would we be able to stop this?</blockquote> Agreed, maybe I'm allowing his use of the term "open web" to be more generic than he really means - he's not suggesting that the web experiences created by individuals or small organizations will disappear, but he does to me seem to imply that - to a significant degree - they will need to be discoverable/findable through those experience aggregators to have a meaningful impact. So called "mom & pop" stores haven't disappeared in the big box era, but they certainly have gone through some tough times. Maybe what I'm really reacting to (which perhaps says more about me than about what Dries intends to communicate) is his recognition of the primacy of Facebook, Google, Amazon, Apple et al in terms of most people's experience of the web, and his use of large brands like Lady Gaga and Whole Foods as the examples. Yes, we can make content semantic and discoverable, and push "branded experiences" through the portholes Google and Facebook make available to us, but it felt like there was a missing additional alternative history. (Not sure precisely what that would be, honestly, but it would be less focused on big brands, and more focused on people who have succeeded by ignoring the large aggregators or questioning their value). He does conclude with the notion that D8 we enable us to "Embrace the big players" AND "focus on experiences" - which is to say we can build independent experiences of our own, not just push content through other people's experiences. So let's built some great experiences outside the big boxes, on Drupal and WordPress!
          Episode 30: Beep Beep Evolution Party (feat. Thomas Biery)        
After spending a few minutes just really letting those darn millennials have it, Griffin and Nick explore Charlotte's Deep Web, an Incredible Machine but for bongs, a game about being Mario's cameraman, and a whole lot more. Polygon editorial intern Thomas Biery guest stars.
          Sicurezza - Scoperti 2 immensi database con password e mail: ci siamo anche noi? (MarquisPhoenix)        
MarquisPhoenix scrive nella categoria Sicurezza che: Purtroppo, controllando nel portale online di cui si parla nell'articolo, ho notato che anche qualcuna delle mie mail era stata trafugata e, quindi, ho dovuto intraprendere una lunga trafila per camb
vai agli ultimi aggiornamenti su: password email database deep web
2 Voti

Vai all'articolo completo » .Scoperti 2 immensi database con password e mail: ci siamo anche noi?.
Scoperti 2 immensi database con password e mail: ci siamo anche noi?
          Smantellata gang che produceva video di violenze su ragazze cinesi        

Una gang cinese utilizzava server all'estero nel deep web per distribuire video di stupri ai danni di giovani ragazze cinesi. La polizia di Beijing ha arrestato diversi membri del gruppo criminale. Il Beijing Times ha riportato che i membri della gang attiravano le ragazze che poi venivano molestate di fronte ad una telecamera. I video […]

The post Smantellata gang che produceva video di violenze su ragazze cinesi appeared first on CinaOggi, Magazine sulla Cina.


          Archivo de figuritas        
Estos si que eran raros


Hola psicotrónicos amigos del más allá de lo retro. Hoy traigo en esta sección que se va convirtiendo en un clásico del blog a unos personajes bastante desconocidos y ochenteros dentro de lo que se llama la casa de las ideas, Los Caballeros Espaciales.
Desde el corazón mismo del Brasil publicaban un precioso álbum dedicado al universo marvel de que ya hemos hablado en varias ocasiones. Una de sus características era que incluían a los pesos pesados de la editorial como a nuevos y desconocidos personajes como en el caso de hoy. 

Llamados Caballeros Espaciales nos mostraban a tres robots acorazados con diferentes poderes y rayos que se llemaban: Terminator, Rom y Starshine, la robotina del grupo. Volaban, lanzaban rayos por diferentes partes del cuerpo y eran fuertes, pesados y del espacio. Una especie de los Halcones Galácticos psicotronicos. 

Toda una rareza y divinura, ella hasta tenía hasta falda y una cola de pelo, robots a la moda. Miren y comparen, aquí Marvel seguramente quería ampliar su espectro de personajes aprovechando alguna moda de la época o robandose la popularidad  de los robots de este tipo.



Miren bien que de bonus se filtro la Increíble Clea, amante flashera del Dr Strange. Hasta la próxima seguidores de la ultra deep web, solo que aquí no mostramos muertes en tiempo real, trafico de armas y contactos extraterrestres.







          Yaiza Rubio, la primera mujer española en participar en los macro encuentros de hackers DefCON y Black Hat        
La analista de inteligencia en ciberseguridad de la plataforma ElevenPaths de Telefónica, Yaiza Rubio, se ha convertido en la primera mujer española en participar en las dos macroconvenciones de hackers celebradas en Las Vegas: DefCON y Black Hat. En la primera, ha dado una conferencia sobre cómo incluir un phising anónimo en las redes sociales aprovechando una brecha de seguridad, apoyado en la red oscura Tor. En Black Hat ha presentado un paquete de herramientas para rastrear la huella digital de usuarios durante una investigación. DefCON es uno de los encuentros de hackers más antiguos, fue fundado en 1993 por Jeff Moss. El cual más tarde fundó también el evento de Black Hat cuatro años después. Yaiza Rubio estudió Ciencias de la Información y tiene tres máster en Análisis de Inteligencia, Logística y Economía de la Defensa, y Derecho Tecnológico y de las TICS. Fue durante el máster de inteligencia que conoció a su actual compañero de trabajo Félix cuando decidió encaminarse por la rama del análisis de ciberseguridad. Antes de llegar a Telefónica trabajó en ISDEFE, la unidad de desarrollo de negocio de la industria española de defensa y seguridad. La primera mujer hacker española en participar en DefCON y Black Hat, ¿este momento se ha producido demasiado tarde? Sí es verdad que a lo mejor llegamos un poco tarde, pero tampoco hay tantas mujeres que se dediquen al mundo de la seguridad. También es verdad que no hay tantos hombres en España que les cojan conferencias en Black Hat y en DefCON, esto va como en todo a proporción. Si hay más hombres, pues por proporción deberán coger ciertas charlas de españoles que vayan allí y al ser menos mujeres, está claro. Es triste, a mí me encantaría que algún día esto no fuera noticia, que yo fuera noticia de ser la primera mujer en España que va a una conferencia de este estilo. Eso significa que cuando esto deje de ser noticia, será que hay más mujeres que se están atreviendo a presentar sus «papers» , publicaciones, investigaciones y a este tipo de conferencias. Sin embargo, es cierto que cada vez hay más. A día de hoy, todavía se ven más hombres en las facultades técnicas y en la rama de informática, ¿por qué cree que se produce esto? Es algo que se aprende desde pequeño, por la familia. No se incentiva a tener esa primera experiencia con la tecnología que sea favorable. En algún momento alguna niña que se ha atrevido de pequeña, se le ha quitado las ganas de intentar trastear. Hay gente que no lo ve bien, son estereotipos al fin y al cabo, que a medida que pase el tiempo los iremos puliendo y no estén tan marcado. Hace unos años, probablemente no se veía tan bien que una niña juegue y trastee con la tecnología, como pueda ser un niño. En ese proceso, sus padres o en el colegio recibe algún tipo de «imput» negativo que no entiende para qué sirve eso, pues es muy difícil que en un futuro se vaya a dedicar a eso. Yo creo que desde pequeños, lo que hay que hacer es fomentar esa experiencia primera, para que en el futuro esas niñas o esos niños, porque yo lo veo en general, puedan optar por esas carrera técnicas. En cuanto a tu currículum, sorprende para otra periodista que estudiase la rama de ciencias de la información, ¿cómo acabó de analista de inteligencia? Eso no es tan difícil, que una persona que haya estudiado ciencias de la información no es tan complicado. El tema es que esos analistas se atrevan de alguna manera a ser coger esa parte técnica de la ciberseguridad. El analista de inteligencia está clasificado en muchas ramas. Por lo que yo, me he atrevido a la parte de ciberseguridad y he tenido que evolucionar tan rápido y aprender tan rápido como la gente que trabaja en mi sector. Es verdad que entré en el sector con desventaja con respecto a otra gente que venía de carreras técnicas, pero la gente tampoco se tiene que estar echando las manos a la cabeza. Los que estudian carreras técnicas, a la hora de la ciberseguridad que es a lo que nos dedicamos nosotros, a lo mejor solo tienen una asignatura de seguridad en toda la carrera. Ahora está creciendo más, pero hace unos años no había tanta especialización de ciberseguridad y es mucho lo que haces después de la carrera, pero de cara al mercado laboral y no la carrera que hayas estudiado anteriormente. Una vez que yo me metí a ciberanalista, que no es tan difícil, el salto vino a través de certificaciones, cursos de hacking, intentar aprender todo lo que sea posible. En cuanto al tema que has tratado en DefCON, has acudido a hablar del Phising que se puede producir apoyándose desde la red Tor. Phising: método para engañar y conseguir que el usuario revele información personal como datos bancarios o contraseñas.El motivo de la charla era la creación de un phishing perfecto desde el punto de vista del atacante buscando dicha perfección desde el anonimato. Lo que hicimos fue identificar ciertas redes sociales todavía vulnerables a ataques de «reverse tabnabbing» con el objetivo de abarcar cuantas más víctimas mejor. ¿Qué nos permite hacer? En el momento en el que cualquier plataforma que no haya parcheado dicha vulnerabilidad, en nuestro caso serían redes sociales como Facebook o Google+, es posible publicar un link que dirigirá al usuario a una web abriendo una nueva pestaña en el navegador mientras que el contenido de la pestaña anterior habrá sido cambiada por otra bajo el control del atacante. Esta mala práctica en la gestión de enlaces se torna todavía más crítica cuando es posible alojar el phishing en la red Tor con el objetivo de borrar cualquier huella, así como hacerlo perdurable en el tiempo. Para ello no es necesario ni que las víctimas tengan Tor instalado, se puede forzar al usuario la navegación a estar páginas a través de plataformas de terceros que hagan la consulta por nosotros, como es el caso de los «gateways». Este modelo teórico de ataque tendría muy difícil seguimiento desde el punto de vista de las fuerzas y cuerpo de seguridad. En la red Tor hay páginas que si no están indexadas en la wiki (índice), ni si quiera se pueden encontrar, ¿qué se hace entonces? Crawlers: o araña de la web que rastrean las páginas en busca de linksClaro, ese es el tema. Imagínate que ese phising que yo he creado no lo publico en ningún sitio y no le digo a nadie donde está, nadie lo va a saber. Hay «crawlers» que cogen los links: abren la página, cogen los links dentro de las página y los almacenan, así como los links que redireccionan a otra. Si ese link no aparece en un sitio, ningún «crawler» lo va a pillar. Lo que se publica, o nuestra aproximación de lo que se publica en Google+ que es como nuestro método de difusión del phising, no aparece ese link, porque va a estar como las urls acortadas, por ejemplo los «bit.ly». Nadie va a saber que por debajo hay un «.onion». ¿Cuál es el producto que ha presentado en Black Hat? Hemos tenido dos presentaciones. La del primer día tiene que ver con el «framework», que hemos ido desarrollando durante cuatro años Félix y yo, orientado al análisis de inteligencia. Es un conjunto de herramientas que se dedica a la obteción de información en internet y muy orientada a perfiles, a la huella digital que pueda tener una persona en internet. Una analista de inteligencia cuando necesita hacer una investigación sobre ciertos perfiles en la red o la huella digital necesita acceder a cierta información: nombre de usuario, dirección de correo, nombre y apellido o dominios. ¿Las herramientas están desarrolladas para seguir un rastro? Sí, este software lo tienen integrado los cuerpos de seguridad en su unidad. Es software libre, todo el mundo se lo puede instalar, no es de pago y todo el mundo puede contribuir. La herramienta principal que hay es una llamada «usuzi». Si un usuario en Twitter aparece relacionado con un tema, te va a interesar tener toda la información relacionada con ella: qué cuentas tiene asociadas, qué perfiles en redes sociales puede tener. Pues lo que hace es coger ese usuario y validar 300 redes sociales, foros, también de la «deep web». Son bastantes fuentes de información, que además la herramienta está montada para que sea muy fácil de integrar en el entorno. Nosotros nos dedicamos a ciertas amenazas concretas, pero luego hay gente se dedica a terrorismo y necesitas integrar en otros foros. Luego también suele ser muy importante en una investigación validar que esa cuenta de correo existe. Intentas por combinaciones de nombres y apellido, y generas muchos alias que con ellos intentas forzar muchos nombres potenciales de correo.
          MultiSearch — new federated, deep web database for Defence        
 DTIC Online portal deploys Deep Web Technologies’ MultiSearch interface – 23 Oct 2008 Search solutions provider Deep Web Technologies, US, has launched an updated interface for the Defense Technical Information Center’s new DTIC Online research portal (http://multisearch.dtic.mil). DTIC is part … Continue reading
          "Deep Web" von Anonymus: Flache Internet-Suppe        
Einen Trip ins Wunderland verspricht uns Alexander Krützfeldt, der als "Anonymus" ein Buch über "die dunkle Seite des Internets" geschrieben hat. Leider kratzt es nur an der Oberfläche.
          The Deep Web: Darknets Evo Marketplace        

I recently took a nice little swoop into the rabbit hole of the deep web to explore Darknets. Though I’ve been down there numerous times over the years; I have to admit that each new excursion always feels like a redux of a childhood Christmas eve . Spinning back in time —  I was that […]

The post The Deep Web: Darknets Evo Marketplace appeared first on TekSec.


          CT Entrevista - Leonardo Bonomi (Trend Micro): Deep web e o cybercrime no Brasil        


          Stop Calling Tor 'The Web Browser For Criminals'        
Yesterday, a rumor surfaced on deep web blog DeepDotWeb that Comcast was going to start blocking users of Tor, an
           Конференция: Закат закона         

Preview_fd201d44ee

Лектор :
Где: Мал. Гнездниковский пер., 4
Когда: 30 окт 12:00

«Закат закона» – это международная междисциплинарная конференция,основная цель которой – дать возможность высказаться исследователям, сомневающимся в нейтральности закона, и вернуть разговору о праве былую остроту. Юристы и философы, психологи и экономисты, левые и правые, анархисты и реакционеры, пламенные теоретики и убеждённые практики против поглотившей академическое пространство схоластики и начётничества. Конференция станет первой в новейшей российской истории академической площадкой для тех, кто верит в революционный потенциал теоретической юриспруденции. Здесь вы не услышите дискуссий о структуре правовой нормы и отраслях законодательства, стадиях правоприменения и типах правомерного поведения. Вместо этого – попытка переосмыслить феномен права в контексте культурных и технологических изменений. Трансгуманизм и блокчейн, пенитенциарное государство и пиратские утопии, искусственный интеллект и свобода воли, прямая демократия и deep web. Угнетённые и угнетатели. Пространства репрессии и потенциал сопротивления. Конференция не имеет дисциплинарных рамок – мы призываем поделиться своими идеями представителей всех отраслей гуманитарного знания. Среди приглашенных гостей историк Петр Рябов, философ Эверт ван Цвеерде (Нидерланды) и др. Мы заинтересованы в участии исследователей, находящихся на разных этапах академической карьеры, включая студентов, а также докладчиков, не имеющих академической аффилиации - все получат возможность в стенах юридического факультета в мирной академической обстановке обсудить прошлое, настоящее и будущее государства и права. 

Крайний срок подачи заявок: 17 сентября 2017 года По всем вопросам: info@clubpugachev.ru


          DarkNet-Deep Web Hakkında Bilinmemesi Gerekenler        

Merhaba arkadaşlar, bu yazımda Deep Web ya da anılan diğer adı ile DarkNet’ten yüzeysel olarak bahsedeceğim. Lakin işin çok iç kısımlarına değinmeyeceğim zira farklı görüşler olsa da bir internet kullanıcısı olarak internetin ileri düzeyde özgürleştirilmesine ve bu özgürlüğe dayanarak yapılan paylaşımlara karşı olduğumu belirtmek istiyorum.   Ä°nternet sandığımız gibi sadece Google veya diğer arama motorları

DarkNet-Deep Web Hakkında Bilinmemesi Gerekenler yazısı ilk önce byteadam üzerinde ortaya çıktı.


          Daftar Lengkap Situs Underground Indonesia        
Greeting BinusHacker Family, Berikut ini adalah list daftar situs UnderGround Indonesia / daftar situs Hacking Indonesia / Daftar Komunitas Underground, Underground Team, Under ground Club Indonesia / Daftar Deep Web UnderGround Indonesia / Daftar web hacking Indonesia / daftar website UnderGround indonesia / daftar website hacking Indonesia / daftar situs cracker Indonesia / daftar situs cracking …
          Sham hotline        
Secretary of State Mark Martin has set up a hotline for Arkansans to call with feedback about the individual voter data he so eagerly turned over on two separate occasions to the newly created Presidential Advisory Commission on Election Integrity.

Secretary of State Mark Martin has set up a hotline for Arkansans to call with feedback about the individual voter data he so eagerly turned over on two separate occasions to the newly created Presidential Advisory Commission on Election Integrity. Lawyers for President Trump argued successfully in a recent lawsuit that this commission, led by notorious vote suppressors Vice President Mike Pence and Kansas Secretary of State Kris Kobach, is not an agency, but merely a presidential advisory panel. This distinction should lead to questions about the true purpose of the commission and how closely it will be tied with the Trump reelection campaign he launched on Inauguration Day by filing paperwork with Federal Election Commission.

I've heard some of the people who like to refer to themselves as "patriots" and who tend to elevate the Second Amendment over the rest of the Bill of Rights, fall in lock step behind President Trump and criticize the bipartisan resistance to the data request from secretaries of state across the country and ask the same question they ask when the government is trying to overreach or the Fourth Amendment is being eroded to those who stand up for privacy: "What are you trying to hide?"

Sigh. This is the kind of thinking that gets us closer and closer to an authoritarian state, as if only those who are doing something wrong would dare stand up for privacy and against searches of our data, cars and homes. It is the same mentality that gave us the Patriot Act and secret warrants and the idea that a dog can breathe funny outside a car and a police officer gets to search it. If this sounds like complaining and overreacting then we probably all need a primer on freedom and privacy.

It may come to the point where the people are so tired and worn out from all the carrying on by the Trump administration and his supporters that they just throw their hands up and quit fighting. People are exhausted and horrified. Many Arkansas college and university employees anxiously await the arrival of guns on campus. In between struggling to save Medicaid and protect immigrants and transgender service members, people are subject to the daily White House circus. Thankfully, White House Communications Director Anthony Scaramucci only lasted 10 bizarre days, but with reality star Omarosa Manigault and half the Trump family in the West Wing, we wearily wait to see what is next.

But back to the hotline. What is its purpose? How will it help? Has Martin really set up a specific phone line because he is so concerned about what the people of Arkansas have to say about his actions? It is too late to get the voter information back even if every single citizen of Arkansas called the hotline with an objection to its release. The cat is out of the bag. The data is in the hands of the president. Phone numbers, addresses, date of registration, political party, whether the voter casts a ballot early or on election day, and other data that we would hope the mere proximity to the secret ballot tradition would provide some protection. It is true that this information was available to Arkansas residents if sought under a Freedom of Information Act request, but Martin did not require the commission to follow the law. He made it easy for hackers and others with nefarious purposes to get their hands on our data. In fact, the information is now on the deep web.

I'll tell you the purpose of the hotline. It's a placebo. A sugar pill. It's the "close door" button in an elevator. It makes us feel good and powerful, but accomplishes nothing. It also takes time and energy away from actual endeavors or phone calls that could make a difference. Martin, in order to avoid his main phone lines being overrun with calls by upset Arkansans, has shooed those concerns away to a secondary phone number. He is giving the people the brush off. Last year, he set up a hotline for the Ten Commandment monument complaints and he will continue to do it for other hot button issues.

The calls to the hotline are probably somehow logged or recorded or noted. However, if you want Martin to know you are out there and you are upset, forget the hotline. Call the main number. Don't let him and other elected officials dismiss your concerns so easily. Be thankful, maybe just this once, for term limits.


          Vocativ "...some flashy graphics that would kind of illustrate how they mine the deep web for news stories and information." By Rahll #FUI | Pinterest | Design… #547708        

          The Deep Web 3D Data Visualization Infographic by dr bolick, via Behance | Design | Pinterest | Infográfico, Visualização De Dados e Behance #547704        

          DEEP WEB – Kinetic Audiovisual Installation        
Anyone else interested in this type of work?
          Pipl's 5 facts about social networking sites…        
Pipl is a ‘deep web’ people search engine. Their 5 facts about social networking sites based on data collected in November & December 2007 is interesting. The women are younger, the men are older Bebo and Xanga have the youngest crowd MySpace is still the largest, by far European, Asians and South American members are […]
          Drogata, rapita e messa all’asta online.        

Una modella inglese di 20 anni drogata e sequestrata.
Un rapimento che, avrebbe avuto un obiettivo preciso: mettere all'asta la ragazza su siti pornografici del dark web.
L'asta avrebbe avuto una base di circa 300mila dollari.
un uomo di nazionalità polacca residente in Gran Bretagna è stato fermato dalla polizia in quanto ritenuto responsabile del sequestro.
Herba Lukasz Pawel, questo il nome del fermato, ha 30 anni: Il soggetto si riteneva appartenente al gruppo Black Death (Morte Nera), attivo sul deep web.
Il sequestratore organizzava aste online per la vendita di ragazze rapite,
La modella era arrivata a Milano per un servizio fotografico.
Giunta nei pressi della Stazione centrale, è stata aggredita da due persone e dopo essere stata drogata e "spogliata", è stata ammanettata mani e piedi, chiusa in un borsone e portata nel bagagliaio di un'auto.
Lo stesso Herba, che ha gestito da solo il periodo di prigionia, ha liberato la ragazza e l'ha condotta al Consolato britannico di Milano, perché la donna ha un figlio, cosa che andrebbe contro le 'regole' dell'organizzazione.
Che nel deep web gestisce diversi traffici illeciti.
Al momento l'indagine è per sequestro di persona.
Si continua a lavorare per individuare eventuali complici.


          Guess Whose Coming to AALL?: New Exhibitors Part1: Litigation, Corporate and IP Vendors        


The AALL Conference Exhibit Hall gives  attendees the chance  to take a long and winding stroll  thought aisles lined with vendors promoting the latest innovations and offering a "first look" at new products.  It is a festival of food, swag and serendipitous encounters with old colleagues as well as the chance to meet new ones.  I especially value the  opportunity for a one-on-one engagement with vendors and a quick tutorial on a on a hot new product. Since the major legal vendors dominate the Exhibit Hall at AALL, it is easy to overlook the first time vendors with unfamiliar names and unknown products. 
  
I thought it would be interesting to take a peek at the twelve new exhibitors at the 2017 Conference and provide some insights into products. This post will be written in two parts. Part one focuses on vendors offering products for litigation, corporate and IP Practice needs.
I recommend that taking a close look at each of these vendors.  Even though you  may have a product which  covers the same legal issues you are likely to discover that each of these vendors is offering a unique type of service or analysis of an old problem.  Many of these vendors are offering AI driven and custom solutions.  Stop by and welcome these new exhibitors to the AALL exhibit call in Austin.

Click here to see a complete list of exhibitors.
I have only used the products of two of these  new vendors Casetext and VoxGov (which will be covered in Part 2 of this post).  Information for the remaining vendors is taken from their websites.

In what may be a first, the AALL "New Product of the Year" award went to a start-up CasetextCARA – a feat all the more remarkable since they had no official presence at AALL in 2016.  Last year many attendees including myself met Pablo Arredondo, who was walking the halls and providing on the fly demos.

I asked Jake Heller, President of Casetext why he thought it was exhibit at AALL. “Law librarians are the world’s true experts in all things legal research and they have been an integral part of CARA’s development and deployment.  Particularly considering CARA being honored as new product of the year, we thought this was a great time to launch our inaugural AALL booth.  We look forward to seeing everyone there!”
Casetext which offers free caselaw research, access to analytical memos from 150 law firms and a “crowd sourced “citator called “We-cite” is launching their first “fee based” product:CARA.  Casetext currently includes over 7 million primary documents including case law from all 50 states.  CARA stands for Case Analysis Research Assistant.  CARA is very easy to use.  All a lawyer has to do is drag and drop a brief into CARA.  Instead of searching with keywords, CARA uses the entire brief as the query.  CARA data-mines the brief by extracting both the text and the citations from the document.  The CARA analysis looks at direct relationships and “implied” relationships between the cited cases in the brief and related opinions in the Casetext database.  CARA uses latent semantic analysis to sort the results.  The CARA results report includes a list of “suggested cases” and a CARA generated analysis of those cases.

Dispute Resolution Data enables you to discover the value of arbitration and mediation through the   DRD provides cost, time, and other valuable process information for users to formulate strategies that transform levels of service.
exploration of aggregated international case data.

Aggregated dispute resolution data will provide professionals in the field with insight through historic and current geographic and case-type reports on dispute resolution claims, durations and processes.  This information is valuable in assessing risk management and strategy.

focusedIPis the first to provide patent practitioners with a high-quality Patent Trial and Appeal Board (PTAB) decision database accessible by state-of-the-art search tools and data analytics.  focusedIP is the only vendor that has generated a complete, accurate and reliable PTAB decision database.  We have taken the time to ensure that our database accurately represents the complete body of published PTAB decisions – including the 100000+ plus PTAB Appeals, and not just the 2600+ AIATrial Decisions.
GDE Mexico Legal
GDE Legal
"Through timely and proactive solutions we help your international ventures proceed efficiently and with minimal legal cost.  We provide you with valuable information and develop practical tools to ensure you make the best business decisions."

Uses AI to analyse filings for public companies.
Welcome to the 21st Century.  Data Blending with MyLogIQ’s AI Powered Integrated Platform.

CIQ-CompanyIQ™ is a single integrated platform of multiple domains of information, which covers ALL public companies.  It provides a comprehensive 360° profile of companies delivered in real time.  Refer to the list on your right or click here.  Our solution will help you cut costs and increase efficiency.
With CIQ-Company IQ™ you can perform concept based searches and quickly identify changes between documents.  You can also pinpoint relevant peer or industry disclosures for any concept and access SIX other domains of information, not covered by other data providers.
Our CIQ-Company IQ™ cloud based software is the most robust research tool in the industry.  We provide a 360° compliance perspective for ALL public companies.

Perception partners describes three different types of services on their website.  1) Intell compeitive monitoring, mines the deep web for innovation opportunities and IP risk.  2) IP search and   3) Monitor for counterfeits, brand protection services produce evidence of infringement to support takedown reqeusts.
technology landscaping offers expert to map out IP strategy.


Social Media Information (SMI is a managed service provider whose mission is to locate, investigate  and preservive human information from sociall media and the web. "Our  proprietary technology and team of in-house analysts allow us to produce actionable human intelligence reports and preserve web evidence efficiently and with a high degree of accuracy."
.
This years conference will be held at The Austin Convention Center, July 15th to 18th in Austin Texas.




          Deep Web (Official Trailer)        

Deep Web (Official Trailer) Deep Web gives the inside story of one of the most important and riveting digital crime sagas of the century: the [...]

The post Deep Web (Official Trailer) appeared first on FreeBTC Blog - News About Bitcoin.


          Bitcoin Girl Music Video (Official)        

BitcoinGirl Music Video (Official) Can Wall Street Guy win Bitcoin Girl’s heart? A Moving Picture Institute production. Approximately 4 minutes. Click “show more” for lyrics. [...]

The post Bitcoin Girl Music Video (Official) appeared first on FreeBTC Blog - News About Bitcoin.


          Trust Disrupted: Bitcoin and the Blockchain Trailer        

Trust Disrupted: Bitcoin and the Blockchain Trailer Trust Disrupted: Bitcoin and the Blockchain traces the rise of Bitcoin and the technology that made it happen. [...]

The post Trust Disrupted: Bitcoin and the Blockchain Trailer appeared first on FreeBTC Blog - News About Bitcoin.


          The Bitcoin Heist Trailer        

The Bitcoin Heist Trailer The Bitcoin Heist: When two best friends accidentally destroy the video game they’ve been waiting to play for years, they’re forced [...]

The post The Bitcoin Heist Trailer appeared first on FreeBTC Blog - News About Bitcoin.


          INFOGRAPHIC: THE DARK SIDE OF THE INTERNET        

wpsCEAB.tmp
If you're browsing online now, what you see is only the surface web, the part most of us are familiar with and where all sites are indexed by search engines and are easily accessible. But it's only the tip of the iceberg, comprising only 10 percent of the total size of the internet. The rest (90 percent) are what is known as the Deep Web, which includes the part that’s 100 percent anonymous: the Dark Web. In simple terms, the Dark Web is the hidden side of the internet. It's an area that evokes images of illegal pornography, black markets, hacking groups, botnet operations (those associated with spam, fraud, and malicious attacks), and the likes. Learn more about this dark, hidden side of the internet from the following infographic by Cartwright King Solicitors.

http://images.sort-cms.co.uk/cartwrightking/The-Dark-Web-final-final.png

Infographic Sources:
1.
Dark web
2. Selling stolen card info online? That's the least of it
3. Timeline of the Deep Web
4. Hundreds of Dark Web sites cloned and “booby trapped”
5. The Dangerous Creepy Scary DARK WEB [VIDEO]
6. Everything You Need to Know on Tor & the Deep Web
7. White Paper: The Deep Web: Surfacing Hidden Value
8. The Deep Web
9. How to protect yourself from 'The Dark Web': 10 simple steps to keeping your details safe fraudsters and hackers
10. Don't get caught in the dark web

[Post Source: Cartwright King Solicitors.]


          Vídeo Encontrado na Camada 69 da Deep Web        
       
          Genealogy Research Tools News to Me        
Recently, I attended WebSearch University in Washington, D.C. The conference is geared toward research professionals of all ilks. I attended pre-conference workshops on public records and finding business information in the “deep web” (those sites that aren’t indexed/searchable by services like Google). I learned about how to search without leaving a trace. There were sessions […]
          Finalize Early        

‘Finalize Early’ is a common term which you will find when shopping on the dark markets of the deep web. When making purchases on a peer-t0-peer marketplace it is common […]

The post Finalize Early appeared first on Cryptorials.


          Secuestran a modelo para venderla en la Deep Web; la liberaron cuando supieron que era madre        
El Internet se ha convertido en una herramienta que resulta muy útil para la búsqueda de información, sin embargo, hay quienes se han encargado de convertirlo en el lugar número uno para el trafico de personas. La modelo Chloe Ayling es testigo y víctima de esta situación. Ayling llegó a Milán, después de contactar con […]
          The Skeptics Guide #498 - Jan 24 2015        
Forgotten Superheroes of Science: Rosalind Franklin; Edge Question: Artificial Intelligence; News Items: The Boy Who Didn't Go to Heaven, Biofortified GMO, Omniprocessor; Who's That Noisy; Your Questions and E-mails: Deep Web Follow Up; Science or Fiction
          The Skeptics Guide #495 - Jan 3 2015        
SGU Live from Auckland with guest rogue George Hrab; This Day in Skepticism: Lick Observatory; News Items: Alternative Cancer Treatments, ESPN Twitter Kerfuffle, The Deep Web, Jet lag Pseudoscience, Gender in Education, Orion Capsule Test, Seeing Infrared; Science or Fiction
          10 bí mật thú vị có thể bạn chÆ°a biết về Deep Web        
Lịch sá»­ thế giới từ xÆ°a đến nay luôn xuất hiện những mặt tốt, mặt xấu. Thế giới bên ngoài luôn có những hoạt động ngầm mà bạn không hề biết đơn cá»­ nhÆ° các băng đảng giang hồ hoạt động ngầm luôn là nỗi khiếp sợ với mọi người. Thế giới internet cÅ©ng không…
          2017 Hike #22: Horse Guard State Park and Found Land Recreation Area - Avon, CT        
Date Hiked: Thursday, June 22, 2017
Estimated distance:  2.60 miles (1.11 miles Horse Guard SP, 1.49 Found Land)
Weather: 80°F, scattered clouds
Resources: Horse Guard State Park, OpenStreetMap, Found Land Trail Map
Highlights of the trip:  the view at Horse Guard SP
Progress toward 2017 Outdoor Goals:  22/52 hikes; 76.27/250 miles hiked


Last fall I read an article in the Hartford Courant by Peter Marteka about Horse Guard State Park in Avon, one of the "Other" state parks.  "Other" parks are the ones that, when you visit the DEEP website, are included in a long list of parks and forests with little information and no trail maps.  I think these parks tend to be ignored because of the lack of information.  Do not ignore this one.  For relatively little effort, the payoff is very good.

I parked at the Avon Historical Society's Derrin House, a little over a mile south of Route 44 on Route 167.  There is a trail sign at the edge of the lawn, and I took that as the location of the trail head.  Was it?  Maybe I missed another access point, because I was soon pushing through bushes and kicking myself for not having sprayed more than just my pant-legs with bug spray.


It looks like their might have been a loop trail, but David Reik's information on OpenStreetMap indicates much of it is a bushwhack.



I soon spotted the white blazes and was on my way.  Well, not for very long.  I passed a large tree trunk across the trail because I could see white blazes beyond it.  Right after the tree, the blazes indicated a right turn over a jumble of logs that I thought was there because the ground was wet.  I made my way across, but the trail didn't seem very well maintained.  Hmm.  Went back, found some white blazes that went to the left, but again the trail seemed very poorly maintained.  Let's start again.  I went back to the other side of the downed tree and easily spotted the trail leading off to the right.  I had not seen any blazes indicating a turn before the tree, but maybe I missed them.

I did not see a nest.  Not sure of the type of bird.
I continued to follow the trail through the forest and back and forth across areas with improvised log "bridges" put down to help navigate wet areas.  The hiking poles were definitely helpful in keeping my balance over the logs.  I came to a more open area and, off to my right, I could make out a talus slope through the trees.  I knew this is the area I wanted to climb to get the view.

Talus slope through the trees.

Hemlock Varnish Shelf

Talus slope.
There are no blazes up the talus slope, so you just have to pick your way.  I wound my way up to the top and kept following the trail until I came to an area that had a fire pit.  I went a little beyond that and out to a rock ledge with nearly 180 degree views to the west.  The panoramic shot spans that distance and includes Taine Mountain (southwest) to the left and Mount Horr (north-northwest) to the right.




There were quite a few wildflowers at the summit including Pink Corydalis, Spreading Dogbane, Blueberry, Rose (Virginia or Carolina, not sure which), and Venus's Looking Glass.

I thought this was in the Heath family, like blueberry, but nothing seems to match.  Could it be Spreading dogbane?

Blueberries.

Rose

Venus's Looking Glass.
I headed back and took in the view to the south.  This was the money shot as far as I was concerned.  The mountain with the radio towers is Rattlesnake Mountain, and to the right is West Peak, part of the Hanging Hills of Meriden.  Pretty spectacular.






When I got down near the parking area, I decided to take a shot of the "trail".  You can make out the red-sided Derrin house through  the foliage and that is basically where I had to cut through to get to my car.



The hike in Horse Guard State Park was only a little over a mile, so I had scouted ahead for another short hike to do while I was in Avon.  The town has some open space with trails, so I decided to give Found Land Recreation Area a try.  I parked in the cul-de-sac at the end of Saint Michael's Court where the sign is located.  There is a kiosk as you first enter, but there didn't appear to be a map on it.





I went in a clock-wise direction following the yellow blazes.  Then I came to a spot with a trail that went off to the left and there was a red blaze on a tree to my right.  Hmm.  I decided to go to the left a little way, just to see and noticed more red blazes and what looked to be boundary marker posts.  I got to the top of a small rise and saw another cul-de-sac.  I crossed the road and had a magnificent view of the Heublein Tower over on the Metacomet Ridge.

Heublein Tower on Metacomet Ridge in the distance.
I turned back around and went back to the trail intersection.  A red trail (not on the map) seemed to go off to my left.  I decided to go straight as I came back down from the road and saw the yellow blazes again.  I turned again and came to the remains of a stone wall.  Now I saw yellow blazes on my right and red ones on my left.  I decided these red blazes were marking the property rather than indicating a trail.  I came to other trail crossings and became more confused.  I knew there was a cutoff trail, and I purposely went by a trail (that I think was blazed yellow) because I thought that was the cutoff.  I reached a turn in the trail and assumed I had come to the place where the yellow trail starts heading back.  Now I am not so sure, because the outer loop was supposed to be over two miles and I ended up only covering about 1.5 miles.  Humph.  In the end, I didn't care.  It was hot and buggy, and while this is probably an okay place for walking your dog if you live in one of the really fancy houses in the neighborhood, it didn't have much to recommend it for other hikers.  Still, I am glad I checked it out.


I have no idea how this old Jeep made it down the trail and on to its roof.


So, check out Horse Guard State Park, but if you are looking for more mileage to add to that, Found Land is a bit of a let down.





          Milano. Modella inglese rapita e messa in vendita nel Deep Web. Ecco com'è finita        

Milano. Modella inglese rapita e messa in vendita nel Deep Web. Ecco com

Quando guardai quel film del 2006 citato in sede di articolo, rimasi esterrefatto e sperai tanto che si trattasse di un'esagerazione cinematografica: all'epoca, non avevo sentito parlare affatto del

2 Voti
          Hacker vende ransomware por US$175 na Deep Web        

Um membro de uma comunidade cibernética de alto nível que usa o nome de usuário "Dereck1" revelou a existência de uma nova variante de ransomware chamada "Karmen", que os hackers podem comprar no mercado negro por US$ 175.

O post Hacker vende ransomware por US$175 na Deep Web apareceu primeiro em Purainfo.


          Traffico di armi e droghe nel Deep web: cancellati AlphaBay e Hansa        
Gli investigatori hanno scoperto oltre 350 mila scambi illeciti tra utenti. Venivano vendute soprattutto armi, droghe e malware 
          Data Warehousing        
The concept of data warehousing was introduced in 80s as a non volatile repository of historical data mainly used for organizational decision making. (Reddy, G, Srinivasu, R, Rao, M, & Rikkula, S 2010). While the data warehouse consist of information gathered from diverse sources, it maintains its own database, separated from operational databases, as it is structured for analytical processes rather than transactional processes (Chang-Tseh, H, & Binshan, L 2002).
Traditionally, data warehouses were used by medium and large organizations to “perform analysis on their data in order to more effectively understand their businesses” (Minsoo, L, Yoon-kyung, L, Hyejung, Y, Soo-kyung, S, & Sujeong, C 2007) which was designed as a centralized database used to store, retrieve and analyze information. Those systems were expensive, difficult to build and maintain, and in many cases made internal business processes more complicated.
With the wide adoption of Web (the Internet) as a successful distributed environment, data warehouses architecture evolved to a distributed collection of data marts and a metadata servers which describe the data stored in each individual repository (Chang-Tseh, H, & Binshan, L 2002). Moreover, the usage of web browsers made deployment and access the data warehouses less complicated and more affordable for businesses.
As a further matter, according to Pérez, J at. al. (2008) the Web is “the largest body of information accessible to any individual in the history of humanity where most data is unstructured, consisting of text (essentially HTML) and images” (Pérez, J, Berlanga, R, Aramburu, M, & Pedersen, T 2008). With the standardization of XML as a flexible semistructured data format to exchange data on the Internet (i.e. XHTML, SVG, etc), it became possible to “extract from source systems, clean (e.g. to detect and correct errors), transform (e.g. put into subject groups or summarized) and store” (Reddy, G, Srinivasu, R, Rao, M, & Rikkula, S 2010) the data in the data warehouse.
On the other hand, it is important to consider the “deep web” which accounts for close to 80% of the web (Chang-Tseh, H, & Binshan, L 2002), the data access, retrieval, cleaning and transformation could present further obstacles to overcome. In addition, as the information stored in the data warehouses becomes more accessible through Internet browsers (as compare to corporate fat-clients), so does the risk of data theft (through malicious attacks) and leakage. Chang-Tseh at. al. (2002) further notes that the security of the warehouse is dependent primary on the quality and the enforcement of the organizational security policy.

Bibliography

  • Chang-Tseh, H, & Binshan, L 2002, 'WEB-BASED DATA WAREHOUSING: CURRENT STATUS AND PERSPECTIVE', Journal Of Computer Information Systems, 43, 2, p. 1, Business Source Premier, EBSCOhost, viewed 5 November 2011.
  • H.M. Deitel, P.J, Deitel and A.B. Goldber, 2004. “Internet & World Wide Web How to Program”. 3Rd Edition. Pearson Education Inc. Upper Saddle River, New Jersey.
  • Minsoo, L, Yoon-kyung, L, Hyejung, Y, Soo-kyung, S, & Sujeong, C 2007, 'Issues and Architecture for Supporting Data Warehouse Queries in Web Portals', International Journal Of Computer Science & Engineering, 1, 2, pp. 133-138, Computers & Applied Sciences Complete, EBSCOhost, viewed 5 November 2011.
  • Pérez, J, Berlanga, R, Aramburu, M, & Pedersen, T 2008, 'Integrating Data Warehouses with Web Data: A Survey', IEEE Transactions On Knowledge & Data Engineering, 20, 7, pp. 940-955, Business Source Premier, EBSCOhost, viewed 5 November 2011.
  • Reddy, G, Srinivasu, R, Rao, M, & Rikkula, S 2010, 'DATA WAREHOUSING, DATA MINING, OLAP AND OLTP TECHNOLOGIES ARE ESSENTIAL ELEMENTS TO SUPPORT DECISION-MAKING PROCESS IN INDUSTRIES', International Journal On Computer Science & Engineering, 2, 9, pp. 2865-2873, Academic Search Complete, EBSCOhost, viewed 5 November 2011.

          A Detailed Guide to Deep Web        

FBI has recently arrested Ross William Ulbricht, the alleged founder of the illegal online website ‘Silk Road’ last month. Customers of Silk Road could anonymously order different kind of drugs through the website. It took a lot of time and effort for FBI to trace and shutdown this illegal online market place. The reason for that is that Silk Road operates on the Tor anonymity network which is just a part of what is known as the Deep Web. An important question here is, what is the Deep Web and what makes it distinct from the regular web. Below is the detailed guide to Deep Web: What is Deep Web? Deep Web is the term used for the content on the Internet that is normally not indexed by the regular search engines like Google and Bing. Most of the content available on the Deep Web is dynamic (ever-changing) and not linked to other websites. This makes it difficult for Search Engines to crawl and index them. Information available on the Deep Web can be accessed only when a direct query is posed. Databases holding information of Deep Web sites respond in real-time and provide the required information to the users. [...]

The post A Detailed Guide to Deep Web appeared first on Tech Satya.


          Federated Search – The Killer iWatch App?        
This post was re-published with permission from the Deep Web Technologies Blog. Please view the original post here. The Beagle Research Group Blog posted “Apple iWatch: What’s the Killer App” on March 10, including this line: “An alert might also come from a pre-formed search that could include a constant federated search and data analysis […]
          Deep Web:  Legal Due Diligence        
Editor’s Note: This post is re-published with permission from the Deep Web Technologies Blog. This is a guest article by Lisa Brownlee. The 2015 edition of her book, “Intellectual Property Due Diligence in Corporate Transactions: Investment, Risk Assessment and Management”, originally published in 2000, will dive into discussions about using the Deep Web and the Dark […]
          Microsoft Case Study – Bridging the Gap Between Language and Science        
On January 8, 2015, Microsoft published a new, Customer Solution Case Study about Deep Web Technologies’ innovative search technology developed in collaboration with the WorldWideScience Alliance.  Using the Microsoft Translation services, the search application WorldWideScience.org allows users to search in their native language, find results from sources around the world, and read the results translated […]
          Science.gov mobile app among 10 best according to GCN        
[ Editor’s Note: This post first appeared in the Deep Web Technologies Blog. ] Government Computer News (GCN) recently reviewed mobile apps developed by the federal government. Science.gov Mobile was among the top 10 listed. GCN gave the Science.gov Mobile app (which runs on the Android and on the Mobile Web) scores of 7 for […]
          Abe Lederman gets in the (mobile) groove        
Abe Lederman, founder and CEO of blog sponsor Deep Web Technologies, recently got a couple of exposures at MobileGroove, a site which provides analysis and commentary on mobile search, mobile advertising, and social media. The two MobileGroove articles cover Deep Web Technologies’ Biznar mobile federated search app. Mobile Search App Review & Road Test: Biznar […]
          How do the millennials search?        
[ Note: This article was first published in the Deep Web Technologies Blog. ] Here’s a paper worth reading: “A study of the information search behaviour of the millennial generation.” No, not because there are any earth-shattering conclusions, but you may want to read the article to confirm that what you already suspect to be […]
          Federated Search – The Killer iWatch App?        
This post was re-published with permission from the Deep Web Technologies Blog. Please view the original post here. The Beagle Research Group Blog posted “Apple iWatch: What’s the Killer App” on March 10, including this line: “An alert might also come from a pre-formed search that could include a constant federated search and data analysis […]
          Deep Web:  Legal Due Diligence        
Editor’s Note: This post is re-published with permission from the Deep Web Technologies Blog. This is a guest article by Lisa Brownlee. The 2015 edition of her book, “Intellectual Property Due Diligence in Corporate Transactions: Investment, Risk Assessment and Management”, originally published in 2000, will dive into discussions about using the Deep Web and the Dark […]
          Microsoft Case Study – Bridging the Gap Between Language and Science        
On January 8, 2015, Microsoft published a new, Customer Solution Case Study about Deep Web Technologies’ innovative search technology developed in collaboration with the WorldWideScience Alliance.  Using the Microsoft Translation services, the search application WorldWideScience.org allows users to search in their native language, find results from sources around the world, and read the results translated […]
          Science.gov mobile app among 10 best according to GCN        
[ Editor’s Note: This post first appeared in the Deep Web Technologies Blog. ] Government Computer News (GCN) recently reviewed mobile apps developed by the federal government. Science.gov Mobile was among the top 10 listed. GCN gave the Science.gov Mobile app (which runs on the Android and on the Mobile Web) scores of 7 for […]
          Abe Lederman gets in the (mobile) groove        
Abe Lederman, founder and CEO of blog sponsor Deep Web Technologies, recently got a couple of exposures at MobileGroove, a site which provides analysis and commentary on mobile search, mobile advertising, and social media. The two MobileGroove articles cover Deep Web Technologies’ Biznar mobile federated search app. Mobile Search App Review & Road Test: Biznar […]
          How do the millennials search?        
[ Note: This article was first published in the Deep Web Technologies Blog. ] Here’s a paper worth reading: “A study of the information search behaviour of the millennial generation.” No, not because there are any earth-shattering conclusions, but you may want to read the article to confirm that what you already suspect to be […]
          Plüschsessel und Riesenleinwand – Was uns am ZFF gefallen hat        

The End of the Tour (Regie: James Ponsoldt)

Ein sehr schöner Film, der auf wahren Begebenheiten beruht. Der junge Rolling Stone-Journalist David Lipsky (gespielt von Jesse Eisenberg) begleitet den Schrifsteller David Foster Wallace auf dem Höhepunkt seines Erfolges während einer fünftägigen Lesetour zu seinem gefeierten und kontrovers diskutierten Roman «Infinite Jest».

«The End Of The Tour» ist ein eigentlicher Roadtrip, während dessen der Journalist den Autor nonstop interviewt. Die zwei Protagonisten nähern sich an und stossen sich wieder ab, während wichtige Lebensthemen durchdiskutiert werden. Das ist oft lustig, oft aber auch tieftraurig und der Regisseur versteht es, die Geschichte innerhalb dieser Ambivalenz gemächlich voranzutreiben.

Vor allem überzeugen die beiden Hauptdarsteller, die ich bisher nicht unbedingt auf dem Radar hatte, wenn es um ernstzunehmende Filmkunst ging. Vor allem Jason Segel (bekannt durch seine Rolle als Marshall aus der Serie «How I Met Your Mother») überzeugt durch sensibles Schauspiel.

Wie David Foster Wallace selbst versucht auch der Film, den Wahnsinn immer schön in geordneten Bahnen zu halten. Dem Film gelingt dies ausgezeichnet, der Autor selbst ist an dieser Aufgabe gescheitert. Er beging 2008 Selbstmord.

Ich habe praktisch alle Kurzgeschichten dieses Autors gelesen, habe mich aber nie an den einzigen zu Lebzeiten veröffentlichten Roman «Infinite Jest» mit seinen über 1000 Seiten herangewagt. Ich bin noch unentschlossen, ob ich es irgendwann doch noch lesen werde. Der Respekt davor ist nach dem Besuch dieses Films definitiv nicht kleiner geworden.

Patrik Schmid

Für «The End of the Tour» ist noch kein Kinostart in der Deutschschweiz geplant. Verleih: Walt Disney Company (Switzerland) GmbH

A Perfect Day (Regie: Fernando León de Aranoa)

Wie kann man den Zuschauern das Absurde und das Grausame eines Krieges am angenehmsten vermitteln? Nehmen Sie einfach eine Prise Humor, der sich durch den ganzen Film durchzieht. Genau wie «Good Morning Vietnam» schafft es «A Perfect Day», dass man als Zuschauer bei den Haudegen eines Hygiene-/Gesundheits-Einsatzteams inmitten eines der Balkankriege gerne dranbleibt. Denn die Figuren von Benicio del Toro und Tim Robbins sind zwar anpackende Helfer, doch zwischen ihnen und der Realität haben sie sich durch die Jahre eine dicke Wand aus schwarzem Humor und Fatalismus geschoben.

Natürlich tritt eine idealistische Neuankommende auf – deren Hysterie gegenüber den grotesken Aktionen der beiden verrückten Helfer man genüsslich beobachtet. Nachdem auf der Fahrt zwischen dem Einsatzort (ein Brunnen ist auf sehr spezielle Art zu reinigen) und dem Hauptquartier alle möglichen Passagiere dazugekommen sind, begibt sich die Gruppe nun mit frischem Mut und erfinderisch auf die Suche nach dem notwendigen Utensil für die Brunnenreinigung - einem langen Seil.

Das leichte Stück von León de Aranoa zeigt einen Abenteuerspielplatz für Ü-50er, was «Médecins Sans Frontières», welche die Border Lines-Sektion (worin der Film lief) mitorganisiert, in ihren Rekrutierungsbemühungen sicher nicht ungelegen kommt. Die Verwicklungen eines Krieges, die allen Akteuren zu schaffen macht, zeigt «A Perfect Day» dennoch in vereinzelten unaufgeregten Szenen. Schliesslich gibt es in einer Komödie auch immer einen absolut humorlosen Doofmann, der hier vom ganzen Uno-Blauhelm-Korps gemimt werden darf.

Erich Schwarz

«A Perfect Day» startet am 12. November 2015 in den Deutschschweizer Kinos. Verleih: Präsens

Deep Web (Regie: Alex Winter)

Der Film liefert einen tiefen Blick in die Entstehung der «Silk Road», einem digitalen Drogen-Schwarzmarkt im Deep Web – dem mit Suchmaschinen nicht auffindbaren Teil des World Wide Web. Detailliert beleuchtet der Dokumentarfilm die Rolle und Motivation des Betreibers, der auf der Plattform unter dem Pseudonym Dead Pirate Roberts (DPR) auftritt. Niemand weiss, wer er ist, bis das FBI im Oktober 2013 den 29-jährigen Ross Ulbricht als mutmasslichen Urheber verhaftet und vor Gericht stellt.

Trotz Informationsfülle ist die Geschichte packend erzählt und die Reise unter die Oberfläche des Webs faszinierend. Auch wenn die Geschehnisse zu einseitig zugunsten von Ross Ulbricht beleuchtet werden, bleiben am Schluss die aufgeworfenen Fragen zum Datenschutz und zur Überwachung im Internet nachhaltig haften – diese werden uns noch eingehend beschäftigen.

Simon Hugi

«Deep Web» lief als deutschsprachige Premiere am Zurich Film Festival und sucht einen lokalen Verleiher. Kinostart ist daher noch offen.

FEINHEIT und Filme

Weitere sehenswerte Filme für den Herbst finden Sie auf der neuen Webseite des Frame-Magazins, die FEINHEIT entwickelte. Für das 11. Zurich Film Festival hat unsere Agentur zudem die Microsite für den ZFF72-Wettbewerb und Weiterentwicklungen an der bestehenden Festivalseite verantwortet.


          Siti Web - Chiuso il più importante mininarket della droga nel Deep Web (MarquisPhoenix)        
MarquisPhoenix scrive nella categoria Siti Web che: Ricordo ancora quando provai la prima volta ad usare Tor browser: quello che vidi in alcuni siti del Deep Web fu davvero disgustoso e lasciò l'amaro in bocca. Mi rendo ben conto che non tutto il Deep
vai agli ultimi aggiornamenti su: deep web internet droga
1 Voti

Vai all'articolo completo » .Chiuso il più importante mininarket della droga nel Deep Web.
Chiuso il più importante mininarket della droga nel Deep Web
          Siti Web - Ecco cosa tira di più, e quanto, nel lato oscuro del Web (MarquisPhoenix)        
MarquisPhoenix scrive nella categoria Siti Web che: Seguo da un po' di tempo le tematiche del Deep Web e, come ho avuto modo di dire in passato, trovo che sia un posto agghiacciante. In quest'articolo ci siamo soffermati sul lato più presentabile del
vai agli ultimi aggiornamenti su: deep web internet
2 Voti

Vai all'articolo completo » .Ecco cosa tira di più, e quanto, nel lato oscuro del Web.
Ecco cosa tira di più, e quanto, nel lato oscuro del Web
           What is Dark Web? How to Use it?        
Dark web is a part of the World Wide Web, consisting of an overlay network and the darknet, that uses the public Internet and requires certain software, configurations, or authorization to access. In the post, you will see more details about the dark web.

What is a dark web?

Dark web is a part of the shadow-line market. Dark web is a specialized group of sites, where the identity of each user is hidden from the authorities and law enforcement trackers. Conventional search engines and standard web browsers may not see the Dark web page. In fact, this is a private virtual space, where people are anonymous to achieve their goals and find the necessary information for them.

The purpose of "The Dark web"

The aim - to provide the Dark web users with anonymity online with a guarantee of security, where users can virtually interact with each other and not be afraid of the law. The dark web contains forums, blogs informants, the rules of cooperation of some services with other online services, resources, documentation etc.

Positive: if we try to get to know all the subtleties of this web, Dark web acts as a haven of democracy and anti-corruption. Where informants can report corporate and government misconduct to the press, without fear of persecution and the revelation of corrupt practices, which are hidden from the public. In this network, there is complete freedom of speech and information. Dark web is also a place where people from the despotic repressive countries or religions can find like-minded people and even get help. And of course, Dark web is a haven for journalists and people with a very unusual way of life, to communicate on the network without fear of reprisals.

Negative: well, without the doubt, the dark web has its downsides. In fact, it plays the role of the black market, where you can buy or sell anything, any contraband, stolen item or illegally obtained information. Drugs, weapons, stolen credit card numbers, different types of pornography, use money laundering services, and even hire assassins - it's all there available on the Dark web.

How may one work on the dark web? Tips and tricks...

To work in the Dark web you will need to install a special software. To do this, you have to be the pretty experienced user. There are two options: I2P Protocol (Invisible Internet Project) and TOR protocol (The Onion Router). These are two different technologies that make you appear as the anonymous.

TOR is a proxy server system, allowing to establish an anonymous network connection that is protected from monitoring. TOR site uses the domain name .onion. Surfing the dark web is usually faster with TOR.

I2P network is an overlay, stable (node shutdown will not affect the operation of the network) and anonymous network. When data is transferred between network nodes the encryption is used. The speed is inferior to TOR, however, I2P is more resistant to the law enforcement supervision.
In both cases, Dark web operates using complex mathematical encryption to encrypt the identity and location of a network participant. All network traffic jumps from server to server across the globe, making it impossible to track. Messaging is conducted with the help of using the alias, not associated with a real person. Most monetary transactions use bitcoins and escrow services in the third person, in order to protect both buyer and seller against unfair trade.

Dark web or deep web? What is the difference?

Deep web(invisible, hidden web), in the broad sense, is a set of web pages not indexed by search engines. The most common thing is that deep web page is not related to any hyperlinks and thus becomes almost invisible to the naked eye. Another characteristic of the web page is that its content is available only to registered (or those who have passed a special verification) users. As a rule, in order to get to such websites, you should use special web browsers- anonymizer and programs that are adapted to work with closed networks.

What is the point?

While SEO-optimizers are trying to raise their websites in the search query system as high as possible, the owners of the deep web, by contrast, are doing everything to make it possible to hide them securely. It is not difficult to guess, it is about the content, and it is better that this content does not appear in the eyes of law enforcement agencies. You can find services that sell drugs, weapons, passwords, fake passports, databases on the deep web expanses and in general all things that are impossible to buy in your place legally.

There are also services that you may purchase on a deep web, also illegal ones. For example, you can order a hacker attack. A specialist with 20-year-experience, depending on the complexity of the work (there could be conventional DDoS-attacks as well as developed sophisticated Trojans and other malware) will ask for the services at the price starting from 200 euros and more. Deep Wide Web uses many methods of encryption and a large chain of nodes, which is why the speed of opening pages in the deep web is extremely low. Deep websites look quite austere, it is often a simple HTML-page containing plain text, and its whole appearance is reminiscent of the early era of the Internet. It is believed that the level of encryption in the deep web is so high that the secret services will never be able to curb it and bring it to the user account. In practice, it turns out a little differently: many governments have long been struggling with closed networks and achieved some success in this.

At first glance, these two webs are pretty the same but there are some peculiarities about them that make them differ from one another. The main difference between two notions (dark web and deep web) is that deep web is used in the context when the person refers to all the hidden webpages and websites. That is why we may say that the dark web is a constituent part of the deep web! In addition, what is interesting, every webpage may have a staging version on the deep web. Password-protected bits are also located on the deep web.

Aithor’s bio:

Sandra J. Hayward is a Miami Dade college MBA graduate that is interested in academic research and writing but does not want to depend on the rigorous schedule. That is why she has been collaborating with essay help websitesfor a long time as a freelance writer and enjoys her flextime a lot.

          Everything You Need to Know on Tor & the Deep Web        

The internet has, in its storied history, been compared to many things: a river; a superhighway; and, perhaps most famously, a series of tubes. But as it turns out, the most apt comparison of all just might be an iceberg. Like the mighty floes that break off from glaciers, only 10% of the network we […]

The post Everything You Need to Know on Tor & the Deep Web appeared first on Who Is Hosting This: The Blog.


          Alex Winter Returns        

Alex Winter (Bill and Ted’s Excellent Adventure, director) returns to the Nerdist to chat with Chris and Matt about his experience doing a TED Talk, what their favorite TED Talks are, and to tease a little bit about Bill and Ted 3. He also talks about coming up with his idea for his documentary Deep Web, researching the Silk Road, what he learned about the online drug trade, and how he portrayed it!


          Instale o Tor Browser no Ubuntu 16.04        
Olá pessoal, O Tor Browser é um navegador web que usa o Firefox como base e que serve para você utilizar a rede Onion e acessar a DeepWeb. A Deep Web (também chamada de Deepnet, Web Invisível, Undernet ou Web oculta) se refere ao conteúdo da World Wide Web que não é indexado pelos mecanismos ...
          Deep Web (2015) Web 720p        

SINOPSIS Un documental que explora el surgimiento de un nuevo Internet; descentralizada, cifrado, peligroso y más allá de la ley. DATOS TÉCNICOS Deep Web (2015) Peso: 1.31 GB | 1 280p x 720p | x264 | Idioma: English | Subtitulos: Español Latino FICHA TÉCNICA TITULO ORIGINAL: Deep Web (2015) / Red Profunda AÑO: 2015 DURACIÓN: […]

The post Deep Web (2015) Web 720p appeared first on Bacterias.


          An Insight To Deep Web And Dark Web – Everything You Need To Know        

Deep Web And Dark Web – In this age of high web technology, the usage of the web has increased tremendously. Thus search engines are on their ways to update their existing algorithms along with introducing new ones in order to keep pace with changing trends. Special protocols along with software are taken into usage […]

The post An Insight To Deep Web And Dark Web – Everything You Need To Know appeared first on .


          Box Set Bargain! The Crush Saga Box Set        
I was born to die... But to defy fate is to control your own destiny.   Today's Box Set Bargain is a five-pack of Paranormal Romance, from Chrissy Peebles. Download the complete set for your Kindle today for the unbeatable price of $0.99.
The Crush Saga Box Set

Authors: Chrissy Peebles

Genre: Paranormal Romance
Ave. Rating: 5 stars
Est. Pages: 1,000
Price: $0.99


I was born to die... But to defy fate is to control your own destiny. Little did I know that I was entering a world of ritual and magic and that my blood needed to be spilled so the witches’ legacy could be complete.

The Crush Saga Book Trailer: https://youtu.be/LbfIsKTsPhw

Vampires. Witches. Werewolves. Supernatural Creatures. Dramatic Revelations. A Ritual Sacrifice. Ancient Artifacts. A Cold-hearted Serial Killer. Spilled Blood. Secrets. A Hidden Heritage. A Love So Deep. Supernatural Bloodlust. A Dangerous Curse. An Uneasy Alliance With A Dangerous Vampire.

***99 Cent Sale!*** November 16th, 2016 – November 19th, 2016 (ONE TIME ONLY)

The Crush Saga Box Set is going on sale! Get the first 5 books for 99 cents! Limited Time Only! It will never be offered for 99 cents ever again! This will go back to the original price soon. Get your copy now! Over 367,261 words! Buying them individually would cost you $15

Legends of vampires and shape-shifters have been around for centuries, so Taylor Sparks isn’t too worried when the rumors start to fly. When Taylor learns secrets that are beyond terrifying, they threaten to destroy her entire world. She is born to die... But to defy fate is to control your own destiny.

She warns her crush to leave. But how do you forget someone who is aligned with your soul? They fight against the witches, the vampires, and the werewolves. They know the consequences. They know the risk. But they don't care. Nothing will get in the way of these two star-crossed lovers.

Taylor finds out she’s a KEY player in a dangerous game created 1,000 years ago that will give the witches and werewolves the upper hand against the vampires. Blood will be spilled and secrets will be revealed in this action-packed thrill ride and paranormal romance.

Will Taylor dive into a paranormal world she knows nothing about to be with the one her heart can’t live without? Or will her life spiral out of control when she learns her blood is needed, just the serum necessary to lift an ancient curse from a group of supernatural beings and give the witches back their magic? Werewolves will serve as her guardians and protect her until the first full moon of the new year, the night of her sacrifice…

Will she accept her destiny?

Or will she refuse to let evil swallow her up?

Books included in this box set:

Crush - Book 1
Crash - Book 2
Chosen - Book 3
Chaos - Book 4
Deep Web - Book 5







This was a fantastic box set with magic, action, mystery, twists and turns, vampires, werewolves, witches, and gargoyles. Each book gets better and better and takes you deeper into the mystery! -- Amazon Reviewer

Get this box set bargain!

Worldwide links:                      


          Privacy VS Sicurezza        

sicurezza

Secondo un indagine di Eset, una società che si occupa di sicurezza informatica, circa l’80% degli italiani vorrebbero una sicurezza maggiore rispetto a quella attuale. Ma non solo: sarebbero addirittura propensi a sacrificare la loro provacy pur di aumentare la sicurezza. La privacy sarebbe quindi, per la prima volta, sacrificabile purchè sia garantito un controllo rigido e severo sul web da parte delle forze di polizia. La maggior parte degli italiani sembra avallare questa ipotesi: solo il 19,9% invece risulta favorevole ad una maggiore privacy sebbene la sicurezza non sia delle migliori. In quest’ultima fascia rientrano molti ragazzi e studenti che cercano disperatamente lavoro sul web e sono anche la maggior categoria di persone che utilizza internet. Secondo questa ricerca inoltre sono state effettuate statistiche anche in merito alla conoscenza degli italiani in merito agli strumenti utilizzati nella navigazione o alcune componenti come alcune minacce del web e il Deep Web, ossia quella sezione di internet non indicizzata tramite i motori di ricerca tradizionali. Eset afferma che 4,7 milioni di utenti conoscono il Deep Web: soprattutto la curiosità dei giovani gioca un ruolo molto importante. Infatti, i giovani tra i 18 e i 35 anni, in possesso di un titolo di studio e residenti sia in centro che in sud Italia hanno dimostrato le loro conoscenze in merito agli strumenti e componenti informatici. Il 17% degli intervistati  conosce il Deep Web mentre il 26% ha utilizzato o ha conosce Bitcoin, la moneta virtuale utilizzata. Il 45% degli intervistati invece sembra del tutto ignaro del Deep Web, pensando addirittura che sia uno strumento utilizzato per traffici illeciti. Bisogna però considerare che la conoscenza riguardo sicurezza e privacy non è sottovalutata dagli italiani che conoscono bene sia lo spazio di accesso a informazioni e notizie non pubblicate sulla stampa ufficiale, sia le misure di privacy, sia i metodi per navigare in incognito w sia come sottrarsi alla censura.
          Rubati Account Twitter        

Twitter

Negli ultimi mesi leggiamo sempre più spesso casi di furti di password e account; dopo LinkedIn e MySpace è fresca la notizia di 32 milioni di account Twitter rubati. Tra questi troviamo anche molti account di utenti italiani: attraverso virus diffusi tra i pc degli utenti sono stati rubati moltissimi dati di accesso. Dopo tutti questi furti è stato anche rilevato che moltissime password erano davvero semplici e banali. LeakedSource ha dichiarato che le password rubate sono precisamente di 32.888.300: queste, tramite un hacker russo, sono state vendute sul deep web. Un vero e proprio tesoretto: un “baule” pieno di account ( molti dei quali anche italiani) dal valore circa di 6 mila dollari. Il blog LeakedSource dedicato alla sicurezza ha inoltre rivelato di aver ottenuto l'informazione da Tessa88@exploit.im, alias che rimanda a quello utilizzato per violare il social network russo VK. L’haking di massa ha rubato account non solo russi: infatti, nell’elenco riportato, troviamo anche due email italiane, libero.it (circa 60 mila) e hotmail.it (48 mila) sebbene il record è detenuto da mail.ru (5 milioni), yahoo.com (4,7 milioni), hotmail.com (4,5 milioni) e anche gmail.com (3,3 milioni). Twitter è ora in allerta e tramite un tweet “To help keep people safe and accounts protected, we've been checking our data against what's been shared from recent password leaks” ha infatti spiegato che starebbe passando al setaccio tutti i suoi database: dale analisi svolte, Michael Coates, responsabile sicurezza, ha rassicurato i suoi utenti dichiarando che il social non sarebbe stato violato. Infatti, il blog LeakedSource ha spigato che l’attacco non era diretto a Twitter: le credenziali degli utenti sono state rubate attraverso un virus che ha infettato i pc. Lo stesso blog ha inoltre affermato che le password erano, come abbiamo detto, molto semplici e facili da indovinare. Oltre il danno anche la beffa: è stata appurata anche la poca creatività degli utenti!
          Utilizing E-books to Enhance Digital Library Offerings        

Shirley Hyatt and Lynn Silipigni Connaway, describe the rationale and background of OCLC's acquisition of netLibrary, the information environment that is being pursued, and the resulting benefits that libraries may experience.

On January 24, 2002, OCLC Online Computer Library Center acquired netLibrary, a major electronic books (e-books) company. OCLC's acquisition includes the e-book Division of netLibrary, which OCLC has integrated as a division of OCLC, and netLibrary's MetaText eTextbook Division, which has become a for-profit subsidiary of OCLC. This article describes the rationale and background of the acquisition, the overall vision of the information environment that is being pursued, and the benefits that libraries may experience as a result. Read more about Utilizing E-books to Enhance Digital Library Offerings

On January 24, 2002, OCLC Online Computer Library Center acquired netLibrary, a major electronic books (e-books) company. OCLC's acquisition includes the e-book Division of netLibrary, which OCLC has integrated as a division of OCLC, and netLibrary's MetaText eTextbook Division, which has become a for-profit subsidiary of OCLC. This article describes the rationale and background of the acquisition, the overall vision of the information environment that is being pursued, and the benefits that libraries may experience as a result. Donald Hawkins, Clifford Lynch, and Ruth Wilson, among others, have each published excellent overviews of the e-book arena, and so this information is not replicated here [1,2,3,4]. Nevertheless, a few definitions are in order. There are three major components that contribute to the e-book reading experience: content, hardware, and software. In this article, we use the term "e-book" to represent content that has been made available digitally and electronically. The term, "reading appliances" refers to the hardware one uses for reading e-books. There are three general models of e-book reading appliances in the marketplace today: portable dedicated devices such as the Gemstar REB 1200; portable, small, multi-use devices such as personal digital assistants like Palm, handheld PCs, Tablets; and desktop computers or laptops. netLibrary is presently PC and laptop based. The final component of the reading experience is software that facilitates the searching, navigation, font appearance, functionality, and presentation of information. We refer to this as "reading software". Some e-book companies require the use of proprietary client-side reading software to view and manage their books independently of the Web. netLibrary has experimented with several models and its e-book reading software today is browser based and its content is hosted centrally by netLibrary and distributed via Web technologies. E-book publishers' respective combination of hardware and software components undoubtedly impacts e-book consumers' selection of content and usage patterns of the content. It is, for example, a different matter to read something on one's PC or laptop surrounded, perhaps, by neatly organized piles of paper representing the user's accompanying active cognitive engagements, as opposed to reading material that can be carried in, say, one's purse without the intellectual annex that a desk represents [5]. The present netLibrary model facilitates learners, scholars, and teachers who are working at their desks or on a portable desk--the laptop computer--and who are searching, studying, researching, printing, and copying portions of text, and reading, generally with academic intent. Why e-books? The advantages of e-books in this context are straightforward and include: easy access to content; on-demand availability (accessible anytime from anywhere at anytime); capabilities to search within a book and across a collection of books; links to other resources, including dictionaries and thesauri; no risk of loss, damage, theft, or misplacement; no physical space requirements; no device requirements for access to the content; accessibility to content using standard web browsers; customizable search interfaces; and ease in transportability. Many books --especially reference works--already have a long history of electronic usage. In fact, one of the earliest applications of computers was for automated literature searching, replacing cumbersome print indexes. Since then, thousands of reference books, from general encyclopedias and dictionaries to specialized sources, have been digitized and are commonly used online or as a CD-ROM. There are strong indications in libraries during the last two to three years that circulation is down, reference questions are down, and in-library printing is down. With the advent of the Web, students are organizing their materials and looking for information differently from before. They are using the Web from their homes for a significant amount of their research activity. By all reports, patrons will stop seeking when they have gathered the minimum amount of information that achieves their needs. This has come to mean that users will settle for the items conveniently available as full text electronic documents while ignoring robust paper-based information sources. Some patrons have also expressed the belief that everything is available via the Web. Recognition of this puts more pressure on libraries to integrate paper and electronic collection catalogs, and to ensure that paper resources are as conveniently available as electronic. Because few monographic books have been made available electronically, monographs have not been part of the Web distribution revolution. They have been neither part of the surface web nor the deep web; they have not been on the web at all. Use of journal full-text content has predominated over monographic books, in the context of the students' activities described above. The emergence of e-books is necessary to ensure that books have a presence in the Web world, and a presence in students' emerging research behaviors. According to a Forrester report published in 2000, e-book technologies indicate significant promise for the textbook industry as an enabler for publishers, faculty and students [6]. Publishers will be able to make last-minute changes to content, and will be able to tailor the content to reflect regional preferences. Teachers will be able to compile and tailor their curriculum materials, using interactive functionality, and provide enhanced levels of detail by linking to added content on the web. Students, in lieu of toting multiple heavy, large, hardbound textbooks across campus, in the future will need to only tote a lightweight reading appliance loaded with electronic textbooks. Distance learning--one of the fastest growing educational business areas in the U.S.--requires getting information to students who do not always have ready access to university libraries, and e-books are looked to as a major solution. The e-textbook area is predicted to have a $7.8 billion potential by 2005 [6]. In this new e-textbook environment, libraries may be better integrated into the courseware and instructional material environment than heretofore, as types of information (textbook, "learning objects", primary sources, secondary sources, various media) become linked and moving between them becomes seamless in the workflows of faculty and students. A recent study by Columbia found that "scholars read relatively little of most of the books that they review for their work…The introduction, a few pages to a couple [of] chapters, and the bibliography, footnotes, and index are browsed or read in some other books…Only a few books are read at great length…They want to be able to flip between pages, to follow the line of reasoning, to move from reference to footnote, from index to text easily…They feel that given navigational flexibility, speed, and design that takes advantage of interactivity, as well as substantial collections, scholars would increase their use of online books" [7 cited in 8]. From a collection management standpoint, the e-book affords libraries a rich storehouse of usage information previously unavailable. The e-book's content management system can potentially enable one to track not merely what is being circulated, but also what parts of books are used for what lengths of time. One can provide access to e-books more efficiently, since the usage of high-demand texts can be interleaved between patrons much as usage of high demand items is today optimized by a reserve desk. E-books have also prompted new interest in patron-initiated acquisition models. Commonplace in interlibrary loan, several consortia are experimenting with a demand, then acquire workflow in the e-book arena and have reported success. At a recent ALA workshop, one library director made the point that, given the shortage of funds and the predicted shortage of librarians, one might usefully forgo subject bibliographer salaries for patron-selected electronic books [9]. E-book management systems would facilitate the evaluation of these approaches. Coupled with normal approval and selection programs, the approach can reduce the number of unused titles warehoused by libraries. Why netLibrary? netLibrary has been dedicated to providing electronic book services to the library community since it began operations in July 1998. It is committed to encouraging the creation of the electronic version of the monograph, and to serving these up through libraries. netLibrary provides academic, public, special/corporate and school libraries with solutions for the purchase, management, and use of digital learning content, specifically e-books. It digitized its first e-book in January 1999, launched its Web site in March 1999 and sold its first title in May 1999. Today, netLibrary's e-book offering is the most broadly adopted in the market, representing the content of 315 publishers and serving more than 6,700 libraries, with a catalog of more than 41,000 titles. netLibrary has experimented with various roles in the electronic book arena during its life span. Though primarily focused on the library market, for a brief period it owned Peanut Press, a company devoted to the publication of retail e-books for PDA devices using proprietary reading software. (netLibrary subsequently sold Peanut Press to Palm, which changed the name of the software to Palm Reader.) netLibrary has also provided conversion services to publishers, to reduce entry barriers that publishers might otherwise encounter. It continues to do so, though increasingly publishers are able to manage these conversions themselves. netLibrary has also experimented with several reading software models, only recently discontinuing PC-based proprietary reading software in favor of a browser-based, centrally-hosted, model. netLibrary's e-book offering presently includes:

  • an integrated catalog of more than 41,000 titles which grows daily, for which netLibrary has acquired content distribution and management rights from publishers,
  • a collection management platform,
  • a suite of content support services
The publisher of the content determines the e-book price, but the majority of the e-book titles are the same price as the hard copy book. An access fee is charged to libraries and institutions to cover the costs of maintaining a digital library, such as use of search capabilities and related Web-based features. The access fee can be paid as a one-time charge for ongoing access to the e-book title, or can be paid on an annual basis. The latter allows libraries to deselect the titles, and may be of interest to non-research libraries for technology and computer science titles that become outdated. TitleSelect™, netLibrary's online collection development tool, allows librarians to access netLibrary's entire e-book catalogue. This useful interactive instrument allows the selection of individual titles, to create title lists and to order e-books that best fit specific library needs. TitleSelect, also offers an ownership-awareness feature that can help librarians quickly identify owned titles within their collections. netLibrary provides a variety of usage reports, as well as reports of titles that are not used, which enable librarians to monitor and adjust their collection strategies and circulation models. It is possible to assign circulation periods by title and/or collections and to access netLibrary's collection development tools for reviewing and acquiring new content. TitleDirect™ is a new collection development tool that helps libraries with large e-book collections more efficiently and effectively manage the e-book selection and review process. Offered for libraries with expanding e-book collections of 3,000 or more titles, TitleDirect provides automatic notification of new titles matching library-specified content profiles. netLibrary has continued to balance the needs of libraries with the needs of publishers, to ensure that libraries continue to be empowered in the e-book world. netLibrary also continues to focus on 1) utility; 2) integration with libraries' existing systems; and 3) ease of use, for the library community. netLibrary enhances the utility of learning content through digital functionality, content management tools, and a suite of content support services. The e-book solution enriches the underlying value of learning content through online features such as search and bookmark. netLibrary customers are able to use the same distribution vendors for e-books as they do for print publications. They can continue to use the same library automation software systems for netLibrary items as they do for the rest of their content collections. netLibrary supports remote patron authentication, so patrons need not visit a library building to search the library's collection or to check out a netLibrary title. netLibrary's e-book metadata records can be integrated with the library's online catalog for linked access to the title. netLibrary had an agreement with OCLC several years prior to OCLC's acquisition of netLibrary, to enable netLibrary customers to acquire OCLC MARC catalog records, to set their netLibrary holdings in WorldCat (if they were OCLC member libraries), and also to enable netLibrary subscribers to opt for an escrow agreement to preserve their purchases should netLibrary encounter problems. Awareness and accessibility of e-book content is crucial to usage and many libraries have found that within three weeks of integrating MARC records into the online public access catalogue for their e-books, circulation for e-book titles triples [10]. This suggests that e-books should be integrated into library processes, policies, and services, and not isolated or treated as a different format than other content, especially when the e-book content can be accessed through the online catalog in a web-based environment, requiring no additional hardware or software. A comparison of circulation of identical titles available at the University of Pittsburgh in e-book and print book format indicates that e-book circulation is higher than print book circulation. During a four-month period each e-book title was accessed an average of 3.7 times compared to an average of 1.4 accesses per print book title. Thirty percent of the titles in the e-book collection were accessed during this period while only ten percent of the print collection was accessed [11]. Some e-book content is in more demand. These include current subject matter within certain disciplines and content that is generally not read in its entirety, i.e., scholarly, professional, and reference content. Current netLibrary e-book usage patterns suggest highest subject usage within the economics and business; computer science; literature; medicine, health and wellness; technology; history; education; sociology; and religion collections. These e-book content areas are similar to those identified by librarians. In June 2001, netLibrary emailed questionnaires about e-book content to 1900 academic, public, and special librarians. The sample was equally distributed among the three types of librarians. One hundred eighty-one responses were returned. Eighty-four percent of the responses were from academic librarians, fourteen percent were from public librarians, and two percent were from special librarians. Business, medicine, computer and information science, technology, and career content were the highest ranked subject areas for e-book collections. Digital reference content was also ranked highly [10]. netLibrary acquires content from publishers to provide to libraries and institutions, rather than directly to end-users. The resources and services available through netLibrary are developed to integrate into library systems. netLibrary's focus on providing content and services to libraries strongly complements OCLC's member-based services. Why OCLC? Prior to the acquisition of netLibrary, OCLC's offerings have predominantly consisted of four service areas that help librarians manage their collections and provide services to end users: cataloguing and metadata; interlibrary loan; digital preservation and access; and reference. Libraries and OCLC cooperatively build and maintain WorldCat, which includes more than 49 million bibliographic records and more than 800 million library holdings. FirstSearch also serves as an interface for end users to journal databases. The goal in offering FirstSearch has long been to leverage the membership's investment by providing an end-user interface to WorldCat (recently augmented with decision support such as cover art, reviews, tables of contents, and so forth), and to further leverage that investment by integrating access to other information databases under the same interface. In short, OCLC's goals for its end-user service have been:
  • increase availability of library resources to users of libraries,
  • reduce library costs,
  • provide end-user access to WorldCat,
  • integrate bibliographic information (monographs, serials, journal articles, etc.) under one interface,
  • integrate information resources under the same interface as their bibliographic metadata surrogates.
Though the WorldCat database has traditionally housed metadata records representing books, serial titles, maps, manuscript and archive collections, realia, and so forth, it did not historically provide access to the full text of documents. Like other bibliographic databases, the WorldCat metadata provided location information enabling users to find the item, which was separate from the metadata. This changed gradually over the last 10 years, as OCLC's Internet Cataloging project and then OCLC's CORC (Cooperative Online Resource Catalog) project explored and facilitated cataloging of electronic materials. Powered by the World Wide Web, free web-accessible electronic documents such as web pages could be just a click away from the bibliographic record. The entire WorldCat database, with cataloging records for electronic documents available on the Web, is available both to OCLC catalogers, and to end-users under the FirstSearch interface. Full text electronic documents are accessible through FirstSearch whenever permitted by the content publishers. OCLC, like other journal aggregators, has been able to make free web pages, and electronic journal articles rights to which have been negotiated, available to the public through libraries under these sorts of interfaces, but not monographs. Journal full-text items have of course predominated because e-books have not yet achieved parity in the marketplace. OCLC is supplementing its rich metadata repository with a digital library offering. Its acquisition of netLibrary is another step in this direction. netLibrary provides additional opportunities for an enhanced information environment with a sound navigation and information architecture to make the entire environment function as a seamless and friendly package of resources for end-users. They will be able to not only access full-text journals, but also a collection of full-text monographs and reference materials from one interface. OCLC has longtime experience in archiving its WorldCat database of 49 million records with accompanying transaction records. Since 1991, OCLC has provided preservation services, including contract microfilming and digitization services, delivered to the library with accompanying metadata. It is anticipated that OCLC's stewardship of netLibrary e-books content will be handled just as responsibly. If libraries are to thrive in an electronic world, an e-book company focused on the needs of libraries is requisite. Libraries are a different audience from that of consumer electronics, and have different priorities. They have a higher dependency on standards than retail customers because they serve a wide variety of patrons, publishers, distributors, and locations, under ADA guidelines, and must do so at an extremely cost-effective level. They also have a stronger need for standards-based technologies to ensure that the goals of open scholarly exchange and learning can be met between user communities and between institutions. Academic researchers need to rely on authenticity and integrity of content; e-book content should match any print content and include all its elements (text, graphs, and illustrations). Content needs to be separable from access and manipulation features, and needs to be transferable, in a non-proprietary format, into a variety of reading appliances. Interoperability of files between systems is important, as is digital rights management software to enforce control over intellectual property [12]. All of these specialised needs foretell an e-book service by libraries and for libraries. Librarians are facing significant challenges in providing information in this digital age. These include, but are not limited to, shrinking budgets; limited shelving and space; reduced or no funding for additional space and new buildings; rising costs to repair or replace damaged, lost, or stolen books, some of which are out of print; users' dependence upon and demands for resources in electronic format; the rising costs of interlibrary loan services; the increased need for developing resource-sharing and purchasing groups to increase buying power; and the demand to support distance or distributed learning and other remote users. The relationship between netLibrary and OCLC offers many benefits. The first and most immediate benefit is, of course, preserving libraries' investment in their netLibrary agreements. Another benefit is further integration of information resources under the same interface as their bibliographic metadata surrogates--including electronic journals, and now also monographs. A final, and perhaps most important benefit is that, by coming together as a collective to own netLibrary, members can more effectively safeguard libraries' institutional role of managing information collections on behalf of their funding institutions, regardless of format, even as traditional information transforms into electronic form. netLibrary's integrated content linking capabilities strengthens OCLC's integrated data and content services to do just that on behalf of its members. References and Bibliography References
[1] Donald T. Hawkins (2000) "Electronic Books: A Major Publishing Revolution: Part 1: General Considerations and Issues," Online, 24 (July/August 2000): 14-28
[2] Donald T. Hawkins (2000) "Electronic Books: A Major Publishing Revolution: Part 2: The Marketplace," Online, 24 (September/October 2000): 18-36
[3] Clifford Lynch (2001) "The Battle to Define the Future of the Book in the Digital World", firstmonday 6 (6), 1-49.
[4] Ruth Wilson (2001) "Evolution of Portable Electronic Books", Ariadne Issue 29, October 2, 2001. Available: http://www.ariadne.ac.uk/issue29/wilson/intro.htm
[5] Malcolm Gladwell (2002) "The Social Life of Paper: looking for method in the mess", New Yorker, March 25, 2002.
[6] Forrester Research (2000). "Books Unbound" Available: www.forrester.com
[7] M. Summerfield (1999), "Online Books Evaluation Project", a memo, available at: <http://www.columbia.edu/cu/libraries/digital/olbdocs/focus_spring99.html>
[8] Carol Ann Hughes and Nancy L. Buchanan (2001). "Use of Electronic Monographs in the Humanities and Social Sciences", Library Hi Tech 19, (4), 368-375
[9] Unnamed Respondent (2002), attended the session, "eBook Access Trends: Exploring Alternative Models", ALA Midwinter Conference, January 20, New Orleans, LA.
[10] Lynn Silipigni Connaway (2001). "A Web-Based Electronic Book (eBook) Library: The netLibrary Model" Library Hi Tech 19, (4), 340-349.
[11] Lynn Silipigni Connaway (2002). "The Integration and Use of Electronic Books (E-books) in the Digital Library" in Computers in Libraries 2002: Proceedings. Medford NJ: Information Today, 18-25.
[12] Lucia Snowhill (2001) "E-books and their Future in Academic Libraries", D-Lib Magazine 7 (7/8).
Author Details Shirley Hyatt Communications and Business Transitions Director Office of Research, OCLC Online Computer Library Center, Inc. Dublin OH, USA. Email: shirley_hyatt@oclc.org Lynn Silipigni Connaway, Ph.D. Vice President of Research and Library Services netLibrary, a Division of OCLC, Inc. Boulder CO, USA <http://www.netlibrary.com/about_us/academic/lynn_connaway.asp> Email: lynnc@netLibrary.com
Article Title: "netLibrary" Author: Shirley Hyatt and Lynn Silipigni Connaway Publication Date: 10-Oct-2002 Publication: Ariadne Issue 33 Originating URL: http://www.ariadne.ac.uk/issue33/netlibrary/intro.html

Issue number:

Article type:

Date published: 
Thu, 10/10/2002
Issue 33
issue33_netlibrary
http://www.ariadne.ac.uk/issue33/netlibrary/

This article has been published under copyright; please see our access terms and copyright guidance regarding use of content from this article. See also our explanations of how to cite Ariadne articles for examples of bibliographic format.


          Joshua Cohen: First Family, Second Life        
http://thesyncbook.com/42minutes#Ep120 Thomas Pynchon Goes Online http://www.joshuacohen.org Topics: Systems Novels, Thomas Pynchon, 90's New York, 2001, Bleeding Edge, Dot Com Bubble, 911 Fiction, The Internet & The Deep Web, Victorian Novel Structure, Underworld, DeLillo, Conspiracy & Paranoia.
          RUSIA: UNA SUPERPOTENCIA MILITAR CON UNA ECONOMÍA DEL TERCER MUNDO        
Una superpotencia militar con una economía tercermundista. Eso es Rusia. Desde el punto de vista económico, la reunión que sostuvieron durante la cumbre del G-20 en Hamburgo Donald Trump y Vladimir Putin tuvo el mismo sentido que si el Presidente de Estados Unidos se hubiera reunido durante dos horas y 16 minutos con el Jefe del Gobierno español, Mariano Rajoy.
En realidad, Rusia está mucho peor que España, porque tiene el mismo Producto Interno Bruto (PIB), pero más del triple de población. Y sus perspectivas económicas son muy malas, porque su estructura económica es la de un país del tercer mundo. Exporta petróleo, gas natural y otras materias primas, e importa todo lo demás. Lo único que rompe esa dinámica son las ventas al exterior de material militar (en gran parte, heredado de la industria de la antigua Unión Soviética, por lo que cada vez tiene menos mercados y depende de compradores menos fiables que estén interesados en sus antiguallas).
Herencia de la URSS
Que un país con la esperanza de vida de Bolivia, la economía de España y la riqueza por habitante de Grecia juegue el papel de Rusia en el mundo debería ser motivo de tesis doctorales. Porque la comunidad internacional sigue aceptando a Rusia como una gran potencia, heredera de la Unión Soviética.
La influencia de Moscú se debe precisamente a esa herencia de la URSS. Una herencia que incluye un formidable aparato de defensa, espionaje y seguridad, en el que Vladimir Putin hizo su carrera. El resto es prácticamente nada. Sin esa militarización de la economía, ese país es etéreo, como el gas natural que exporta. Rusia es hoy un país en vías de desarrollo, armado hasta los dientes, y con un gobierno de ideología ultranacionalista.
Un país con 7.000 bombas atómicas que combina hipernacionalismo político y tercermundización económica es, claramente, un peligro. Y lo es porque los tres factores se retroalimentan. Sin nacionalismo, el statu quo económico y el militarismo no tienen sentido; si se reforma la economía, hay que asumir que el país no es una gran potencia; y si se adaptan las fuerzas armadas a las exigencias reales del país, la ideología oficial y el modelo económico dejan de ser sostenibles. Moscú no puede cambiar eso. Sus exportaciones de materias primas suponen el 50% de los ingresos del Estado y el 10% del PIB. Ésa es la economía de un país pobre: vender productos sin valor añadido, y comprar todo lo demás.
Depender de las materias primas, además, es muy peligroso. Genera corrupción, porque se trata de industrias reguladas por el Estado por medio de concesiones y/o monopolios. Y produce ciclos de boom and bust; o sea, de burbujas y pinchazos. Eso se debe a que cuando los precios suben, los países productores reciben cantidades ingentes de capital del exterior. Es el llamado mal holandés, en referencia a lo que pasó en Holanda en la década de 1970, cuando ese país, precisamente, descubrió petróleo en el mar del Norte: la llegada de capital extranjero aprecia la divisa nacional, y es imposible exportar nada. Todo lo que no sean materias primas se hunde, porque es más barato traerlo de fuera. El país se hace adicto a las exportaciones de materias primas, hasta que la burbuja pincha, los capitales extranjeros se van y la divisa nacional se estrella. Es lo que está pasado en Rusia desde 2014.
Esta economía no es fruto de la casualidad, sino de los designios del gobierno ruso. Vladimir Putin ha tratado de desarrollar un modelo económico basado en las materias primas con el objetivo de que Rusia crezca a un ritmo de entre el 4 y el 6% anual, lo que permitiría generar recursos para transformar la economía. Aunque, en realidad, esa segunda parte de la ecuación nunca quedó muy clara, así que los ingresos de los años del petróleo caro se destinaron a enriquecer al Presidente ruso y a mantener las ciudades que dependen de la industria pesada creada durante la industrialización soviética. Acabado el petróleo caro, el petroestado ruso se ha quedado con lo puesto. Si el crudo no sube, a Rusia solo le queda el nacionalismo. Eso, y 7.000 bombas atómicas. El Mercurio de Chile (www.economiaynegocios.cl)






EDMUNDO PAZ-SOLDÁN: “SER ESCRITOR ESTÁ SOBREVALORADO”

El escritor boliviano crea un micromundo imaginario en 'Los días de la peste'

El País de España (www.elpais.com)

En su nueva novela, Los días de la peste (Malpaso), Edmundo Paz-Soldán (Cochabamba, Bolivia, 1967), profesor de literatura latinoamericana en la Universidad de Cornell, construye un microcosmos narrativo coral entre los muros de una prisión.
¿Qué libro le hizo querer ser escritor? Leí Ficciones a los 14 años y pensé: si la literatura es así, yo también quiero jugar.
¿Y cuál ha sido el último que le ha gustado? Nefando,de Mónica Ojeda, por su forma de cruzar dos espectros del presente -el abuso sexual y ladeep web-, y El día de la lechuza, de Leonardo Sciascia, una gran novela política.
¿Qué libro no pudo terminar? La muerte de mi hermano Abel, de Gregor von Rezzori.
¿Qué libro ajeno le habría gustado escribir? Son tantos, pero ahora mismo pienso en La marcha Radetzky, de Joseph Roth.
Si tuviese que usar una canción como autorretrato, ¿cuál sería?Más que canciones, podría usar haikus. Este de Shiki, por ejemplo:
Un día entero,
cava que te cava
el mismo agujero
De no ser escritor le habría gustado ser... Futbolista, aunque a esta edad ya estaría jubilado y viviendo de recuerdos..
¿Cuál es el libro que mejor retrata la vida en Bolivia? Para principios del siglo XX, La candidatura de Rojas, de Armando Chirveches, una sátira de la política criolla. Aunque no se trata de cuentos realistas, algunas ansiedades del presente están en Para comerte mejor, de Giovanna Rivero.
¿Y la vida de un latinoamericano en Estados Unidos? El mundo latino de La maravillosa vida breve de Oscar Wao, de Junot Diaz.
Los microcosmos imaginarios -SaintRei, la Casona- ­son habituales en su obra. De los territorios imaginarios ajenos, ¿cuál es su favorito?El que creó Faulkner: Yoknapatawpha.
La peste de nuestros días es... El Agente Naranja, el gran jefe del imperio.
¿Qué encargo no aceptaría jamás? Escribirle los discursos a un político.
¿Qué está socialmente sobrevalorado? Ser escritor.
¿A quién le daría el próximo premio Cervantes? ¿Puede ser uno póstumo? Se lo daría a Jaime Sáenz, uno de los más grandes poetas latinoamericanos del siglo XX, y, por esas cosas de las "literaturas menores", todavía poco conocido fuera de Bolivia.





CUÁLES SON LOS PAÍSES DE AMÉRICA LATINA QUE TENDRÁN UN REPUNTE EN EL SECTOR ASEGURADOR EN 2018

Revista Iberoeconomia de España (www.iberoeconomia.es)
                                             
Latinoamérica será un mercado clave para el sector asegurador. Así lo indica el último estudio sigma de Swiss Re , donde se analizan a 21 mercados frontera de todo el mundo, como Nigeria, Ecuador, Vietnam y Azerbaiyán. Un estudio que revela las perspectivas del crecimiento de las primas y una visión general de los fundamentos económicos que harán aumentar la demanda de seguro en estos países, a lo que suman las características individuales de cada mercado, abarcando temas como los inminentes cambios regulatorios y la influencia de factores externos como acuerdos comerciales regionales.
En el caso de Latinoamérica, los grandes protagonistas son Bolivia, Colombia, Ecuador y Perú, que conforman el mayor bloque de mercados frontera de la región, según apunta el informe. No obstante, se aclara que los sectores del seguro en Perú y Colombia están más desarrollados que los de Bolivia y Ecuador, principalmente debido a reformas estructurales e institucionales realizadas en la década de 1990 y principios de la década de 2000. Estos, sin embargo, no son los únicos aspectos a tomar en consideración.
Los escenarios regulatorios y operativos en estos mercados han mejorado considerablemente y han alentado la participación de aseguradoras extranjeras, aumentando su participación en el mercado en Colombia del 34 por ciento en 2003 hasta el 41 por ciento en 2014. En contraste, la participación extranjera en el mercado boliviano ha prácticamente desaparecido y el panorama comercial en Ecuador se ha vuelto más problemático con el deterioro del clima económico y la continua intromisión estatal en los mercado re/aseguradores locales.
“Aprovechar el potencial de los mercados frontera requerirá una estrategia a largo plazo. Sin embargo, este trabajo muestra que existe una ventaja real de “pioneras” que pueden conseguir las aseguradoras que comprendan cómo acceder a estos mercados y desarrollarlos”, afirma Kurl Kart, economista jefe de Swiss Re. En la misma línea agrega que “los beneficios se obtendrán cuando estos mercados alcancen el umbral crítico de rentas medias y los consumidores y empresarios comiencen a comprar más seguro”.





DIEZ PAÍSES ELABORAN EN BOLIVIA PROPUESTAS DE CONSERVACIÓN DE FAUNA SILVESTRE

Delegaciones de diez países de América Latina y el Caribe, entre ellos de Paraguay, se reúnen desde este martes en Bolivia para elaborar una propuesta para la conservación de 35 especies de la fauna silvestre que se encuentran en peligro de extinción en la región.

Ultima Hora Paraguay (www.ultimahora.com)

Las propuestas se debaten en un taller regional preparatorio hacia la duodécima Conferencia de las Partes de la Convención sobre la Conservación de las Especies Migratorias de Animales Silvestres (CMS), que se realizará en Filipinas en octubre próximo, señaló el ministerio boliviano de Medio Ambiente y Agua en un comunicado.
Al encuentro, que concluirá este jueves en La Paz, asisten representantes de Argentina, Bolivia, Brasil, Colombia, Costa Rica, República Dominicana, Ecuador, Honduras, Paraguay y Perú.
El ministro boliviano de Medio Ambiente y Agua, Carlos Ortuño, explicó que en la reunión se aborda "una serie de problemas cruciales" referidos en concreto "a las especies de comportamiento migratorio que no consideran las fronteras internacionales", por lo que "deben encararse acciones de forma conjunta entre los países".
Según Ortuño, el Estado boliviano está comprometido con un enfoque de desarrollo integral que apunta a la preservación de la Madre Tierra mediante la política del "Vivir Bien", considerando que las especies migratorias "son de gran importancia para la seguridad alimentaria y los medios de vida de la población humana".
Los países parte de la CMS han presentado propuestas para una mayor protección de 35 especies, incluidos flamencos, jaguares y monos, por lo que en la reunión en La Paz se discutirán los aspectos técnicos de esa conservación y la pertinencia de las medidas planteadas para la región, señalaron las autoridades bolivianas.
También se discutirán aspectos clave del "Plan Estratégico para las Especies Migratorias 2015-2023", así como el presupuesto y programa de trabajo para la Convención.





COMANDANTE EN JEFE DE LAS FFAA: BOLIVIA QUIERE MAYORES NEXOS MILITARES CON CUBA

Sputnik News de Rusia (www.mundo.sputniknews.com)

El ministro de Defensa de Bolivia, general de Ejército Luis Aríñez, confirmó en declaraciones a la televisión cubana la voluntad de su país de concretar la colaboración militar con las Fuerzas Armadas de la isla.
"Nuestra visita viene a fortalecer las relaciones entre nuestros países, entre nuestras Fuerzas Armadas, la idea es que la Carta de Intención en la que hemos trabajado pueda aterrizar en convenios de interés mutuo", afirmó el titular en relación con la visita iniciada el 17 de julio.
Aríñez expresó satisfacción por su segunda visita a la isla y significó que su objetivo es fortalecer las "excelentes relaciones" que existen entre ambos países y autoridades.
La televisión informó que el ministro boliviano visitará algunas unidades militares, instituciones docentes y sitios de interés histórico-cultural





DENUNCIÓ QUE SU EX PAREJA SECUESTRÓ A SU HIJA Y SE LA LLEVÓ A BOLIVIA

Infobae de Argentina (www.infobae.com)

El 5 de junio fue el último día que Elizabeth Ávalos (26) vio a su hija de seis años Alum. Ese mediodía, Jorge Gabriel Langone (40), la ex pareja de Ávalos y padre de la niña, la pasó a buscar por el colegio al que iba en Flores,y desde entonces, su madre no volvió a saber de ella.
Ni la familia de Langone ni sus amigos saben qué fue de su vida en este casi mes y medio, ya que evitó todo tipo de comunicación con ellos. Tampoco se puso en contacto con su ex pareja, y los procesos judiciales que inició Ávalos en el Juzgado Civil n° 76 de la Ciudad de Buenos Aires recién arrojaron resultados en las últimas horas: ordenaron un allanamiento en la casa de Langone, pero podría ser demasiado tarde.
Langone había sido visto en los últimos días en el pueblo jujeño de Tilcara junto a Alum,pero según confirmó la madre de la niña a Infobae, ayer cruzó desde Jujuya Bolivia. El problema es que Langone nunca tendría que haber atravesado la frontera junto a su hija, ya que el permiso que presentó ante las autoridades estaba vencido.
Si bien esta no fue la primera vez que Langone desapareció con su hija, Ávalos contó a Infobae que el hombre nunca evitó el contacto durante tanto tiempo, y destacó que cada vez que sucedía algo así, ella recurría a la Justicia, aunque no tenía respuestas.
Además de esos conflictos, Ávalos y su ex pareja están en juicio porque Langone incumplió en varias oportunidades el régimen d
          Naucni rad iz informatike        
Pozdrav svima.
Imam da radim neki naucni rad iz informatike i ne znam temu pa sam mislio ako bi mogli ovde da mi date neku ideju za naucni rad ( Naziv teme )
Treba da bude nesto zanimljivo sto moze interesovati ljude (U pitanju drzavno i regionalno takmicenje).
Ako bi mogli da napisete i da mi pomognete oko odabira teme (npr. Deep Web - to je vec izabrano kao tema)
Ako znate za tako nesto "zanimljivo" molim Vas da mi odgovorite u temi.
Vase ime moze biti na kraju rada u odeljku "Zahvaljujemo se :".
          Komentar di Daftar Lengkap Situs Underground Indonesia oleh adytya setyadi        
agusti gunawan boleh minta email nya ? mau tanya tanya soal deep web nih
          Navega con Tor por la Deep Web        

Navega con Tor por la Deep WebNo todo el contenido de Internet aparece en Google. ¿Has entrado alguna vez en la llamada Deep Web? Descubre cómo acceder a los bajos fondos de la Red a través de Tor.
En plena psicosis general por el espionaje de la NSA programas como Tor hacen el agosto, aunque se sospeche también de su integridad… Para los menos avezados, Tor es una red de servidores diseminados por todo el mundo para navegar en Internet de forma anónima encriptando las comunicaciones y asignándote una dirección IP falsa, y que permite acceder al contenido web no indexado por los motores de búsqueda como Google,la llamada Deep Web.
No todo el contenido que hay en Internet está a la vista. Internet se compone de una parte visible y otra oculta a la que sólo se puede entrar usando otros métodos como Tor y su red anónima y protegida Onionland, uno de los sistemas de navegación más populares por los bajos fondos de la Red.
Iceberg representando el contenido disponible en la Deep Web
Internet visible
  • Páginas web indexadas
Internet invisible
  • Páginas excluidas de buscadores
  • Bases de datos
  • Información clasificada
  • Sitios protegidos con contraseña
  • Documentos no indexables
  • Intranets
  • Foros de usuarios
Si has leído antes sobre la DeepWeb en cualquiera de sus términos (Darknet, Deep Web, Hidden Web, Red oscura…) sabrás que es el lugar preferido de los malhechores para esconderse aprovechando el anonimato. No es que todo el contenido disponible en Tor sea ilegal, de hecho se creó para garantizar la privacidad de las comunicaciones ante regímenes políticos dictatoriales o para evitar la censura por poner un par de ejemplos éticos, pero su propia naturaleza lo convierte en el refugio perfecto de quienes se dedican a actividades ilícitas, así que ve preparado para lo que puedas encontrar
Compra y venta de armas, drogas o documentación, violencia, pornografía en todas sus variantes, foros de sicarios, experimentos con humanos, la casa de Anonymous… La Deep Web no es un lugar recomendable para menores de 18 años, entra en ella bajo tu propia responsabilidad y tomando todas las precauciones posibles: en este mundo eres una perita en dulce para los hackers. Ten en cuenta que Tor garantiza el anonimato, pero no la privacidad: cualquiera con los suficientes conocimientos podría escuchar tu tráfico
Medidas de seguridad para navegar por la Deep Web
Ahora que sabes cómo instalar y empezar a usar Tor Bowser es hora de leer algunas consideraciones antes de que te adentres en la Deep Web:
  • No proporciones ningún dato personal mientras navegues con Tor
  • Huye de los enlaces con destino incierto
  • Evita descargar cualquier tipo de archivo si no estás seguro de su origen
  • Usa siempre la función HTTPS Everywhere para entrar en las páginas seguras
  • No utilices plugins
La Onionland está compuesta por dominios encriptados con extensión “.onion”. Necesitas conocer la dirección exacta de cada página para ver su contenido, por eso es habitual recurrir a los directorios de enlaces. El más importante es The Hidden Wiki (kpvz7ki2v5agwt35.onion), una web casi idéntica a Wikipedia si no fuera por la naturaleza de la información que alberga.
Lanza Tor y pega ese enlace en forma de código alfanumérico en la barra de direcciones del navegador. La velocidad de tu conexión se verá drásticamente reducida: son los inconvenientes derivados del uso de proxies y servidores.
Portada de The Hidden Wiki
The Hidden Wiki ofrece en primer lugar los llamados “Introduction Points“, servicios indispensables para empezar a navegar por la Deep Web:
Motores de búsqueda de contenidos
  • Ahmia.FI: https://ahmia.fi/search
  • Torsearch: kbhpodhnfxl3clb4.onion
  • DuckDuckGo: 3g2upl4pq6kufc4m.onion
  • Torch: xmh57jrzrnw6insl.onion
  • Deepsearch: hpuuigeld2cz2fd3.onion
Correo electrónico
  • Onion Mail: iir4yomndw2dec7x.onion
  • URSSMail: f3ljvgyyujmnfhvi.onion
Utilidades
  • Is .onion down for everyone or just me? (Comprobador enlaces): http://nlmymchrmnlmbnii.onion/
  • Hidden Wiki Mirror (espejo The Hidden Wiki): zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page
Con estas herramientas siempre a mano puedes empezar a moverte por el resto de categorías. Hay servicios financieros y comerciales, servicios de hosting de toda clase de archivos, blogs y foros de información, proveedores de correo electrónico, movimientos políticos, plataformas de streaming de audio y vídeo, bibliotecas o mercados de compra y venta de estupefacientes. Incluso existe un apartado de enlaces organizados por idioma.
Portada de Silk Road
Tras el cierre impuesto por Estados Unidos y el arresto de su creador, Silk Road vuelve a estar operativa
Logo de la moneda oficial en la Deep Web, el Bitcoin
En la Deep Web la moneda oficial es el Bitcoin. Se trata de una moneda electrónica que mientras redacto estas líneas se cambia a más de 400 dólares… Si quieres comprar algo en la Deep Web posiblemente necesitarás invertir en ella, lo que también conlleva sus riesgos: el bitcoin está en pleno desarrollo aún, sufre ostensibles fluctuaciones de su valor al cambio y además es un botín perfecto para los robos digitales…
Te bastará con tu curiosidad para descubrir el mundo oculto en la Deep Web. Si te lanzas a la aventura de la navegación por estos mares desconocidos ten mucho cuidado, no queremos que un viaje de placer se convierta en unas vacaciones infernales. Sigue todos nuestros consejos de seguridad y aplica el sentido común para disfrutar de la Deep Web de una forma responsable.

          Â¿Qué es la deep web? La otra cara de Internet, la más oscura        
El tamaño de esta web es aproximadamente 500 veces mayor que el internet superficial.
          Anonabox PRO Tor & VPN Router for $89        
Using Tor & VPN Protection, Anonabox Is the Most Flexible Way to Keep Your Internet Activity Safe and Private
Expires December 31, 2017 23:59 PST
Buy now and get 25% off


KEY FEATURES

You may have subscribed to a VPN before, but no other service delivers flexibility and internet security like the Anonabox PRO Router. PRO is the most advanced way to fortify your privacy and online anonymity by layering the Tor network with VPN services. Use both together or separately, and without needing to download software onto your devices. Small enough to fit in your pocket, this router gives you unparalleled flexibility and security.
  • Browse the internet securely using Tor & VPN services in tandem or independently
  • Share files more securely w/ PRO's built-in USB port
  • Leverage the VPN service to specify your IP location & unblock internet content
  • Use PRO as a WiFi uplink & range extender w/ the included user interface
  • Easily connect & access the deep web
  • Get webserver access to (.onion hosting)
  • Enhance your security w/ a customizable password within the Admin Interface
  • Experience super security w/ a free 30 day trial of HideMyAss! & VyprVPN VPN services

PRODUCT SPECS

  • Processor: 650 MHz NEC MIPS
  • 128 MB of RAM
  • Wireless type: 802.11 a/b/g/n
  • Weight: 3.5 oz
  • Dimensions: 2.5" x 1.5" x 1"
  • Voltage: 5 volts

Includes:

  • Anonabox PRO Router
  • 30 day trial of HideMyAss! & VyprVPN VPN services

          2For those you dont_1|For those you dont_1        
For those you dont need to have deep web development knowledge. Java, Cual es el secreto? verdad? and continually spend money that they do not have to waste. If you are looking for a way to get involved with real estate, you should check with your state the specific educational requirements that you need to […]
          Qué es la “deep web” y la “dark web”        

Alphabay, el mercado ilegal de venta de drogas, armas y documentos falsificados más grande del mundoubicado en la conocida como “dark web”, ha caído esta semana gracias a la actuación del Departamento de Justicia de Estados Unidos. Hace poco, también lo

The post Qué es la “deep web” y la “dark web” appeared first on Abrima Soluciones Web.


          Internet - Come accedere al deep web ed al dark web (sayhem)        
sayhem scrive nella categoria Internet che: La guida rinnovata di Trovalost.it per accedere rapidamente al deep web ed al dark web, all\'interno dei loro segreti e dei loro indirizzi web nascosti ai motori di ricerca. Come si fa a trovare conte
vai agli ultimi aggiornamenti su: dark web deep web
2 Voti

Vai all'articolo completo » .Come accedere al deep web ed al dark web.
Come accedere al deep web ed al dark web
          Internet - Il deep web: il mondo sommerso della rete (ManuelTagliaferro)        
Dal sito www.imparailpc.it, ManuelTagliaferro scrive nella categoria Internet che: Il mondo sommerso di internet, con tutto cio' che gira intorno ad esso, le leggende, le storie, cio' che è reale e come si entra all' interno di questo mondo sotterraneo che in pochi conoscono e in p
SI parla anche di Internet
1 Voti Il deep web: il mondo sommerso della rete

Vai all'articolo completo » .Il deep web: il mondo sommerso della rete.
Il deep web: il mondo sommerso della rete
          Information on people        
See the sites below to locate and find information on people involved in the case: Free sites www.google.com www.facebook.com www.linkedin.com (Requires subscription to see full profile) www.zoominfo.com (Company executives) www.pipl.com (“Deep web” search of peoples names) www.devex.com (Resumes of development specialists) www.192.com (British public records; requires sign-up and credit card payment online) www.monster.com (CV database) Subscription sites www.clearthompsonreuters.com (Address histories, personal identifying […]
          Movie Madness: an interview with Lucas Mangum, author of "Mania"        
Maniafollows controversial filmmaker William Ward as he films an adaptation of a supposedly cursed screenplay.
Though he doesn’t believe in curses, he’s happy to have the hype surrounding his newest movie. But as production begins, he soon learns that the curse is all too real and the vengeful ghost haunting the script is only a piece of the puzzle.

At its heart is a shadowy cult, manipulating events behind the scenes. As dark forces gather around him, Ward and his girlfriend Rachel try to find a way to break the curse before it’s too late.

AVAILABLE AT Amazon

What was the impetus behind Mania?
I wanted to do the literary equivalent of the films I grew up watching. Stuff like In the Mouth of Madness and Candyman and The Ring. I started with the idea of a cursed object—in this case, a screenplay that kills anyone who tries to film it—and went from there. My main character is a controversial movie director, skeptical of the curse, but willing to accept the aura of the curse as a selling point for his movie. I was fascinated by a creator being consumed by his creation, someone killing himself by making a movie.
What was it about this book, if anything, that you approached differently from the previous titles?
The developmental stage of the book is the longest I’ve ever spent on a project. I got the idea back in 2006, did all the character sketches in 2008, outlined it in 2011, and wrote it in 2014. My planning stage for a project usually happens a lot quicker than that, and I usually only take one to two sittings to map out a story before I write it. This idea came to me before I had really sharpened my skills as a writer, and I think I liked the idea so much I saw fit to work on it a little at a time and wait until I was truly ready to write the book.
How have you found your progression as a writer thus far?
Writing is one of those skills that, in my opinion, you never stop learning. I just recently went to Bizarro Con and took a workshop with Brian Keene on writing visually, which taught me a lot about how to cue the reader to see what I see, or rather what I want them to see. Fascinating stuff, very useful. Most importantly, it wasn’t something I’d thought of before, even if in some cases I was subconsciously doing it. I’m constantly trying to sharpen the tools, to get better. I think if I get too comfortable, my writing will certainly suffer.
Who do you count among your writing influences?

Clive Barker is probably my biggest influence. Him and Italian horror movies from the 70s and 80s. Something about that elegant approach to carnage really stirs me. Recently, I’ve found my inspiration in the work of Samantha Hunt, Kali Wallace, J David Osborne, Shane McKenzie, AE Padilla, Autumn Christian, Laura Lee Bahr, Lee Thompson, and Rios de la Luz.

What do you consider to be the biggest misconception of the horror genre?
Believe it or not, there’s still a large group of people who think horror is nothing but gore. Now, I admit to being a bit of a gorehound myself, but the genre encompasses so much more. As Douglas E. Winter said, horror is less a genre than it is an emotion. I think people tend to forget that. Any piece of fiction can have horror elements without adhering to the strict confines of genre.
Is there any kind of a gear shift when switching genres or story lengths?
My stories always tend to begin with character. Length and genre tend to figure themselves out. Of course, if I’m asked for something specific, like with my story in V WARS: SHOCKWAVES from IDW, there’s more prewriting involved.
What is the worst piece of writing advice you ever received? Or what piece of writing advice do you wish would just go away?

The worst piece of advice I ever received was that I should learn how to use Twitter before I even have a book written. Now, social media is important, but I don’t think it should ever get in the way of the writing. Writing comes first. Always.

What projects are you cooking up that folks can expect in the near future, and how can folks keep up with your shenanigans?

I’m shopping two books. One is a novella called Gods of the Deep Web which is a cosmic horror tale based in the ugliest corners of the internet. The other is Blood and Brimstone, a large scale horror novel set partly in a small Pennsylvania town and partly in hell that pre-readers are calling hilariously dark and Tarantino-esque.



Lucas Mangum is an author living in Austin, TX. He enjoys wrestling, cats, wrestling with cats, and drinking craft beer while crafting weird tales.
His debut novel, Flesh and Fire, is out now as part of Journalstone's Double Down series with a new novel by New York Times Bestseller Jonathan Maberry and Rachael Lavin.
Follow him on Twitter @LMangumFiction and talk to him about books, pro-wrestling, and horror movies. Learn more about him at his website


          Kommentar zu Teil 1: Mythos Darknet | Was ist das Darknet? von andre        
hab mal bischen im darknet gesucht in div foren und hab da was gefunden text ist nich von mir ist nur kopiert hallo esrstmal möchte ich sagen das was ich schreibe ist kein witz und ja 99% der leser werden mich nich verastehen können das ist auch nich mein ziehl und das ist auch keine erfundene geschichte egal ob ihr mir glaubt oder nich so wo fange ich an also ich bin 40jahre familenvater ich arbeite ca 60 stunden in der woche um meine 2 kinder zu ernähren und natülich auch meine frau soviel zu mir nun das eigentliche 2014 wahren meine 2 töchter beide 13 unterwegs zum sportverein soweit auch alles ok aber auf den rückweg ca 19 uhr (es war schon dunkel) der rückweg führt eigentlich durch eine belebte innenstad aber wie kinder sind sind sie eine abkürzung gegangen durch 1 wäldchen und ein industriegebiet so dan kamm es wie es kommen musste sie wurden von 1 jungen mann überfallen ausgeraubt und leider vergewaltigt beide haben den vorfall überlebt aber sie seelischen folgen sind bis heute geblieben soweit dazu das schlimme kamm aber noch die polizei konnte dank den geklauten handy eine standort ermitlung machen und den täter auch festnehmen nach langen hin und her und matirium meiner töchter ging das ganze vor gericht und soll ich euch was sagen der kerl war ein 23järiger der laut gericht zum zeitpunkt alkorohlisirt war und nicht voll zurchnungsfähig und angeblich währen meine töchter zu aufreizend angezogen gewehsen und der anwald des täters hat den rausgehauen wo es nur ging und das urteil lautete 6 jahre und vor 3 wochen wurde der endlassen wegen guter führung und die reststrafe wurde zur bewährung ausgesetzt ich bin explidrt was habe ich getahn ? ganz einfach ich habe im netz bzw im (darknet) oder (deep web) jemanden gesucht der mir helfen kann dort stoss ich auf ein auftragskiller ja ist kein witz ich weis auch nich was ich mir dabei gedacht habe aber ich habe den angeheuert und 10.000€ bezahlt und er hat den täter naja beseitigt ich muss erlich sagen ich bin froh das ich den schrit gegangen bin und kann nur sagen wen ihr probleme habt wedet euch an shadowflex2@gmail.com der löst alle probleme
          Marinus Analytics releases facial recognition solution to combat human trafficking        
Marinus Analytics, a Car­negie Mellon University spinoff startup known for creating anti-human trafficking tool TrafficJam, recently released a facial recognition solution that helps law enforcement find specific missing persons, according to a report by Trib Live. Using FaceSearch, law enforcement officials are able to link a photo of a missing person to an image of a potential victim that has been seen on the deep web — hidden areas of the internet that are not typically indexed by Google and
          New CRS Report: Dark Web        
You have probably heard of the Deep Web, but how much do you know about the Dark Web?  Discover more about the dark web in Kristin Finklea's CRS Report entitled - you've guessed it - Dark Web.

 "This report illuminates information on the various layers of the Internet, with a particular focus on the Dark Web. It discusses both legitimate and illicit uses of the Dark Web, including how the government may rely upon it. Throughout, the report raises issues that policy makers may consider as they explore means to curb malicious activity online."




Ernster, the Virtual Library Cat
          Octoberween 2016 Video Weekend: Animated Horror Stories        

Yesterday I posted some videos from YouTube's Top5s video channel which I hoped you all enjoyed as much as I had when I discovered them. Today's posting though I I thought I'd shift gears a bit and share something a bit different yet unique in it's approach. We are all use to hearing ghost stories, either by friends family or videos on the web. But YouTuber Llama Arts (with help from Mr. Nightmare I'm told) decided to put a bit more effort into these creepy tales by actually animated them. At first I wasn't sure about it myself once I saw the intital animation style. It's not quite flash quailty but it isn't stick figures either. But at the same time it has that animation quaitly you'd might see on a cartonn network show, primetime or adult swim variant. Despite this it was indeed a step up from other channels that had some story tellers speak of their stories thru stills or vague images in an attempt in trying to set the mood. But after I watched a couple of episodes I was hooked in how the animation fits the storytelling very well. The music and sound effects are a nice touch and though they didn't exactly scare me to my wits, it did set a creepy tone that has helped me get into the Octoberween mood.

Check out these two complications of animated horror stories, running the gauntlet of tales of craigslist encounters, camping expeditions, mysterious visitations to deep web diving. It's just too bad the first video has commercials. Enjoy!

True Horror Stories (Animated) from Mr.Nightmare and Llama Arts (Compilation of 2016)

14 Horror Stories Animated (Compilation of 2015)

Sleep well tonight.....

Ta-ta "N"


          FBI Deep Web Sitesilerine Operasyon Düzenledi!        

FBI Deep WebFederal Soruşturma Bürosu FBI Deep Web sitelerine düzenlediği operasyonla, 23 farklı web sitesini kapattı. İşte FBI Deep Web operasyonu!

FBI Deep Web Sitesilerine Operasyon Düzenledi! yazısı ilk önce Haber Tekno üzerinde ortaya çıktı.


          Goat In The Shell débunke le « Deep Web »        
Goat In The Shell présente « Le grand méchant deep web Â» « Ici LSN, en direct du clearweb, pour dépoussiérer les mythes qui entourent nos outils quotidiens Â», voici comment est introduit le sujet, après une entrée en matière mettant en scène un … Lire la suite­­
          Is the dark net evil ? many spooky things lurk there        

You thought the regular net was bad enough. or the deep web was scary enough. But have you ever heard of the dark net? Some people say it is to be secretive and hide what you say or have freedom of speech. Yet others say it's a place where evil and very bad things lurk.

Here is a scary tale about the Dark net! Would you ever dare go there?



          YouChan Scariest deep web creepypastas         

Wow nothing really scares me much this creepypasta is so creepy!

YouChan Deep web creepypasta youtube
          Scariest Youtube Videos online Deep Web creepypastas        

This one really scared me. The most I hear about the Deep Web it sounds like an evil place. A little to evil if you know what I mean. Well there is a creepypasta. some of these stories claim to be true, but are probably made up.

Well here you are and enjoy. This story is quite scary so enter at your own risk. And please stay off the deep web!

I wasn't careful enough on the deep web Creepypasta Video
          By: Deep Web Movie, Review - Way Too Indie        
[…] reminiscing on the nostalgic era of Napster in his last documentary Downloaded, Alex Winter is back with another tech doc, this time on the online drug marketplace Silk Road. […]
          Stranger Child - Rachel Abbott - Guest Post        
I'm very pleased to welcome author Rachel Abbott to the blog today! 

Rachel is the author of four novels, her new book is called Stranger Child, and she is here to tell us about the kind of research that goes into her writing. 

I've read and reviewed two of Rachel's novels so far, Only the Innocent and The Back Road, and enjoyed them both very much (click the titles to read my reviews).


A thrilling line of research
by Rachel Abbott


One of the aspects of writing that I have always thoroughly enjoyed is the research. My husband has said frequently that a police raid must be imminent as I scour the Internet to discover methods of killing people, and learn about money laundering, drug distribution and people trafficking. Fortunately I can prove – through my books – that it really has all been in the line of research.

I don’t know how writers managed before the Internet came along. I know there is much you can do in libraries, but when you are researching a thriller it’s hard to know where in any respectable library you might find out how to manufacture liquid nicotine, and where best to inject it to cause death.

When I sit down with an idea for a book, I usually start with a ‘what if?’ question. ‘What if a woman had no choice but to murder a man?’; ‘What if a man is so obsessed with his wife that he has to…’ (I’m not going to finish that sentence – it gives the game away in one of my books.)

From that initial question, I start to develop the plot. What has happened to these people to bring them to where they are now? As the ideas develop, I start to build character profiles and a timeline of events.

Even these first steps, which I believe are crucial to forming a picture in readers’ minds, require research. When I develop a character profile, I have an idea of what a character might look like. But that’s not enough. I want an actualpicture so I don’t lose sight of them. I scour web images, looking for anybody – a star, a model or just somebody’s mum – that fits the bill. That image is pasted into the character profile, and I find other items to add to their portfolio – where they live, what clothes they wear, what they like to drink, and so on.

The timeline creates its own research list. In Stranger Child, Tom – the main detective in all my books – is reminiscing about his youth with older brother, Jack. I check the timeline to confirm when they were both born. What music would they have been listening to in their teens? I trawl through the charts for that year, and decide which brother would have liked which tracks.

All of this is valuable research, but for Stranger Child I had to go one step further – although I actually bottled it when it came to one part of the investigation. But I’ll come to that shortly.
In Stranger Child one character has to go into a safe deposit vault buried deep under the streets of Manchester in the middle of the night – with no light other than a head torch. For me, this would be a terrifying experience, but to make it as realistic as possible I needed to know how it might feel. So I phoned up a company (they wish to remain anonymous) and asked if I could have a tour.

Of course, I went during the day when the lights were on and it was full of people. But I stood in the centre of the room and tried to imagine I was there on my own, and it was pitch black. As it’s underground, there would be no ambient light, and the sounds from outside would be muffled.

There’s a viewing room where people take their boxes to add or remove items, and I imagined how it would feel to know that somebody might be hiding in there, waiting for me. I had to make others feel how I knew I would have felt, with an authenticity that couldn’t have been achieved without a site visit.

And now for the bit where I have to admit to being a wimp! Stranger Child references the Dark Web. For those who may not know much about the Dark Web it’s part of the Deep Web (an area of the internet that cannot be found through search engines). There are several reasons why websites and other content might legitimately not want to be accessed via search engines, but the Dark Web is the part of the Deep Web associated with the buying and selling of anything from guns and drugs to credit card details. Some use the terms Deep and Dark interchangeably, but my research suggests that there is a subtle difference. Neither, though, is readily accessible.

This was a vital part of my story, so I researched how to penetrate the Dark Web. It must be possible, or there would be no market for the illegal goods sold there! And I managed it. I actually know how to get into the Dark Web. But the truth is, I didn’t have the guts to try it.

Given the amount of attention being given to cyber crime by Europol and other agencies, for the first time since I started writing I was actually afraid of completing my research by visiting any of the sites. What if I stumbled across some seriously illegal activities? What if, entirely by mistake, I bought a gun, or found I had inadvertently bought a stack of bitcoin?

So unlike my quest for creating the realism of the vault, I relied on the fact that I knew a lot about the dark web without, thankfully, ever having visited it. And I assumed most of my readers would know no more than me.

Research for Stranger Child was fascinating, but with each book, I seem to have to delve deeper into dark worlds. So if you hear I’ve been arrested, it was all in the interests of authentic research.


About 'Stranger Child'


One Dark Secret. One act of revenge. 

When Emma Joseph met her husband David, he was a man shattered by grief. His first wife had been killed outright when her car veered off the road. Just as tragically, their six-year-old daughter mysteriously vanished from the scene of the accident. 

Now, six years later, Emma believes the painful years are behind them. She and David have built a new life together and have a beautiful baby son, Ollie. 
Then a stranger walks into their lives, and their world tilts on its axis. 
Emma’s life no longer feels secure. Does she know what really happened all those years ago? And why does she feel so frightened for herself and for her baby? 

When a desperate Emma reaches out to her old friend DCI Tom Douglas for help, she puts all their lives in jeopardy. Before long, a web of deceit is revealed that shocks both Emma and Tom to the core. 



They say you should never trust a stranger. Maybe they’re right. 



About Rachel


Rachel Abbott was born just outside Manchester, England. She spent most of her working life as the Managing Director of an interactive media company, developing software and websites for the education market. The sale of that business enabled her to take early retirement and fulfil one of her lifelong ambitions - to buy and restore a property in Italy. 

But even in Italy the winters can be cold and wet, and so Rachel decided to fill those dismal days by fulfilling another ambition - writing a psychological thriller! ONLY THE INNOCENT, her first novel, was more successful than she could ever have imagined, and it enabled her to change her life yet again, and become a full time writer. Her third novel, SLEEP TIGHT, was released on 24th February 2014 and was her third number one. Stranger Child, Rachel's latest book, was released on 24th February 2015.



Links

Web :         rachel-abbott.com
Blog:          rachelabbottwriter.com 
Twitter:     @Rachel__Abbott



          The Productive Scholar: Trust & Identity Practices in Illicit Deep Web Transactions        

Topic: Trust & Identity Practices in Illicit Deep Web Transactions Speaker: Rachael Ferguson, Department of Sociology Date: Thursday, November 6, 12:00pm – 1:00pm Location: New Media Center (NMC), 130 Lewis Library Co-presented with the Center for Digital Humanities Lunch will be provided. … Continue reading


          Debian fork promises no systemd, asks for donations        
The Debian fork website, put together by the Veteran Unix Admins (VUA) group, has annouced the VUA has decided to fork the popular Debian GNU/Linux distribution. The VUA is critical of Debian's decision to adopt systemd as the distribution's default init software and to allow software packaged for Debian to depend directly on systemd. The VUA plans to create a fork of Debian using SysV Init as the default init software and is asking for donations to support the endevor. The default init system in the next Debian v8 "Jessie" release will be systemd, bringing along a deep web of dependencies. We need to individuate those dependencies, clean them from all packages affected and provide an alternative repository where to get them. The stability of our fork is the main priority in this phase. There has been a lot of debate over systemd in the Debian community in the past few months and it will be interesting to see if this non-systemd fork of Debian gains support.
          Darknet: So funktioniert der Zugang ins Deep Web        
Google & Co. kennen nur einen Teil des Internet. Was die Suchmaschinen nicht automatisiert erfassen, bezeichnet man als Deep Web. Und dann gibt es da noch das Darknet, technisch gesehen ein komplett verschlüsselter Bereich des Internet. Dabei dient das gewaltige Paralleluniversum Darknet nicht nur illegalen Zwecken. So funktioniert der Zugang.
          Modelo britânica que seria vendida na Deep Web é suspeita de ter encenado o próprio sequestro        
A modelo britânica de 20 anos, Chloe Ayling, teria sido raptada em Milão, na Itália, e posta à venda como escrava sexual na Deep Web....
          Why Hidden Web is Better Than Google        
If more than 90% all information is only accessible through the Hidden Web, if you are searching for things on Google, you may only be getting 10% of the possible results on the Web. Only by using the Hidden Web will you find even more results, comprising the bulk of everything stored on the Internet.

Sites like Google rely on HTML text based searching. However they can't search database results, images without ALT tags, the content of documents in PDF format, and much much more. All of this is stored on the Web, but without a hidden web search engine, you will not easily find all of the results you need.

Instead, you can locate specific documents in formats like PDF, word processors, or image files by using specific search engines that can access those materials. The way to find these resources is by getting to know the hidden web better.

Also known as the deep web or the invisible web, the hidden web contains thousands of search engines that focus only on their little corner of the world. Then there are search engines that aggregate other search engines, which means that once you have a list of specialty search engines, you can combine them to access information across all of them. There are even software products that help you search across multiple deep web search engines.

When you're looking for information that is authoritative and you need it for a business purpose or for academic research, sometimes Google results can be disappointing at best. Filled with many websites that are no responsive to your need, these results can waste a lot of time. If you need industry information for marketing purposes, for example, there are many government databases that provide detailed statistical data, but which you must access through sources not normally listed on Google. It is to your great advantage to find hidden web resources that will help you get the authoritative data you need.
          Darknet | Glock 17 auf dem Rücksitz        
Der Münchner Attentäter war offen rechts, sein Waffenlieferant wohl auch. Doch Bayern blendet ein politisches Motiv aus

Es schien alles nach dem im Darknet verabredeten Plan zu laufen, als sich Philipp K. am 16. August 2016 gegen 13.30 Uhr dem Busbahnhof in Marburg näherte. Auf einer Bank an der Haltestelle saß ein Mann mit einem Gitarrenkoffer. K., der im Darknet unter dem Decknamen „Rico“ verkehrte, kontrollierte noch einige Minuten die Umgebung. Dann war er sicher, dass der Unbekannte auf der Bank auf ihn wartete und allein am Treffpunkt erschienen war. Schließlich hatte kein anderer einen Gitarrenkoffer dabei – das verabredete Erkennungsmerkmal. „Rico“ fragte den Unbekannten, ob er von „Sectorplantone“ komme und das Geld dabei habe. Der Mann nickte, zusammen gingen sie dann zu einem Parkplatz in einiger Entfernung, wo „Rico“ seinen VW Lupo abgestellt hatte. Vom Rücksitz des Autos holte er eine Tasche und einen Rucksack. Darin befanden sich ein Sturmgewehr vom Typ VZ 58 und eine Pistole vom Typ Glock 17 samt Munition. Der Unbekannte von der Bushaltestelle gab „Rico“ 8.000 Euro und erhielt dafür die Waffen. Das Geschäft war abgewickelt.

Ein paar Minuten später aber schnappte die Falle zu. Spezialkräfte des Zollkriminalamtes stellten sich „Rico“ in den Weg und nahmen ihn fest. Sein Käufer hingegen blieb unbehelligt – er war Zollbeamter und hatte als Lockvogel den Waffenhändler aus dem Darknet nach Marburg bestellt.

Ab Ende August wird Philipp K. alias „Rico“ vor dem Münchner Landgericht der Prozess gemacht. Der 32-Jährige aus Marburg muss sich wegen unerlaubten Handels mit Kriegswaffen, Waffen und Munition in fünf nachgewiesenen Fällen verantworten. In einem Fall kommt zudem der Strafvorwurf der fahrlässigen Tötung und Körperverletzung hinzu – denn mit einer von Philipp K. verkauften Waffe schoss vor einem Jahr der sogenannte Amokschütze vom Münchner Olympia-Einkaufszentrum (OEZ) um sich.

Am Abend des 22. Juli 2016 hatte der 18-jährige David S. in einem Schnellrestaurant und im OEZ neun Menschen erschossen, bevor er sich selbst richtete. Die Opfer waren Türken, Griechen und ein Kosovo-Albaner. Die Staatsanwaltschaft geht bis heute davon aus, dass David S. aus Hass getötet habe, weil ihn Mitschüler aus Migrantenfamilien jahrelang gemobbt hätten. In mehreren Dokumenten, die auf seinem Rechner gespeichert waren, hatte S. allerdings vor den Morden angekündigt, gezielt Türken und „Untermenschen“ töten zu wollen. So schrieb er in einem von ihm als „Manifest“ bezeichneten Dokument über seinen Stadtteil Feldmoching-Hasenbergl, dass die von vielen Migranten bewohnte Gegend nahezu komplett mit einem „Virus“ infiziert sei und dass er „Kakerlaken, Untermenschen und Menschen exekutieren“ werde. Er verehrte den norwegischen Attentäter Anders Breivik und wählte für seine Mordtat offenbar gezielt den Jahrestag der Breivik-Anschläge von 2011 aus, denen damals 77 Menschen zum Opfer fielen. Zeugen bestätigten zudem, dass S. mehrmals den Hitlergruß gezeigt, sich antisemitisch geäußert, „Sieg Heil“ gerufen und Hakenkreuze gezeichnet hatte. Obwohl die Ermittlungen noch weitere Hinweise auf eine verfestigte rassistische und rechtsextreme Einstellung von S. erbracht haben, wollen die bayerischen Behörden bis heute kein politisches Motiv für die Tat erkennen.

Dabei fällt auf, dass auch Philipp K. alias „Rico“, der Waffenlieferant aus dem Darknet, offenbar eine Affinität zu rechtsextremen Einstellungen hat. So unterzeichnete er seine Mails im Darknet gern mit „Heil Hitler“. Und bei der Durchsuchung seiner Computer-Festplatten stießen die Ermittler auf Abbildungen mit Hakenkreuzen und Reichsadlern. Eine rechte Gesinnung habe er aber dennoch nicht, erklärte K. den Vernehmungsbeamten. Ihm hätten lediglich die Abbildungen gefallen.

„Rico“ und sein Kunde

Der Münchner Prozess wird das prüfen müssen und darüber hinaus der Frage nachgehen, ob „Rico“ und sein Kunde David S. möglicherweise nicht nur Brüder im Geiste waren, sondern auch in der Tat – also ob Philipp K. dem 18-jährigen S. eine Waffe verkaufte im Wissen darum, dass dieser sie gegen Ausländer einsetzen würde. Aus seinen rassistischen Ansichten hatte der spätere Amokschütze jedenfalls auch K. gegenüber keinen Hehl gemacht, wie dieser bei seinen Vernehmungen durch die Staatsanwaltschaft einräumte. Dabei schilderte „Rico“ den Ermittlern seine beiden Treffen in Marburg mit S., den er nur unter dessen Darknet-Identität „Maurächer“ kannte. Der 18-Jährige sei dabei sehr nervös und verärgert gewesen. So habe er sich darüber aufgeregt, dass sein Auto von Türken oder irgendwelchen „Kanaken“ zerkratzt worden sei. Auch habe S. angegeben, dass er vor kurzem in eine „Assi-Gegend“ gezogen sei und die Waffe zu seinem Schutz bräuchte. Immer wieder habe er dabei über „Kanaken“ geschimpft, sagte Philipp K. in seiner Vernehmung.

Auf die Spur von K., der im auf Drogen- und Waffenhandel spezialisierten Darknet-Forum „Deutschland im Deep Web“ (DiDW) agierte, war die hessische Zentralstelle zur Bekämpfung der Internetkriminalität (ZIT) gekommen. Die bei der Generalstaatsanwaltschaft Frankfurt am Main ansässige Einheit besteht aus gerade mal sechs Juristen. Sie sollen fast Unmögliches schaffen – nämlich die Anonymität jener Händler und Kunden knacken, die das Darknet für ihre kriminellen Geschäfte von Waffenhandel bis Kinderpornografie nutzen. Das kann nur durch jahrelange und akribische Ermittlungstätigkeit gelingen, denn jeder User, der auf eine der schätzungsweise rund 5.200 Webseiten des Darknet gelangen will, kann getarnt durch den sogenannten Tor-Browser schlüpfen und damit sicherstellen, nicht identifizierbar zu sein.

In kriminelle Handelsforen im Darknet einzudringen gelingt daher meist nur, wenn man zuvor einen Verdächtigen geschnappt hat und ihm einen – nach Paragraf 46b des Strafgesetzbuches erlaubten – Deal anbietet: Im Tausch gegen eine mildere Strafe stellt der Beschuldigte seinen Darknet-Account den Ermittlern zur Verfügung, die nun als Lockvogel immer tiefer in die Händlerstruktur eindringen.

Auch im Fall von Philipp K. alias „Rico“ hat das auf diese Weise funktioniert, ohne dass der Massenmord im OEZ allerdings verhindert werden konnte. Dabei begannen die Ermittlungen gegen das DiDW-Forum, das vor einigen Wochen endgültig ausgehoben werden konnte, bereits im April 2015. Damals hatte das Frankfurter Zollfahndungsamt das Verfahren gegen einen Waffenkäufer eröffnet, der im Forum verkehrte. In Abstimmung mit der ZIT übernahm der Zoll dessen Tarnidentität „ErichHartmann“. So konnten im Juli und August 2016 zwei weitere Darknet-Käufer identifiziert werden, zu denen der Lockvogel Verbindung aufgenommen hatte. Bei ihnen wurden Waffen und große Bestände an Munition sichergestellt, die sie illegal erworben hatten. Die beiden Beschuldigten waren weitgehend geständig und gaben an, im DiDW-Forum auch Geschäfte mit einem „Rico“ abgewickelt zu haben.

Ein „Rico“ war auch schon der Münchner Polizei aufgefallen, als sie die Herkunft der Waffe ermittelte, mit der David S. im OEZ um sich geschossen hatte. Dieser „Rico“ hatte S. im Juni und Juli 2016 die Tatwaffe, eine Glock 17, und mehrere Hundert Schuss Munition verkauft. Nun gab es die Möglichkeit, den Waffenhändler, von dem es bis dahin nur die Personenbeschreibung – etwa 1,90 Meter groß, kräftig gebaut, Brillenträger – gab, dingfest zu machen. Einer der beiden festgenommenen Waffenhändler erklärte sich bereit, seine Tarnidentität „Sectorplantone“ den Ermittlern zur Verfügung zu stellen. Unter dieser Tarnung nahm ein Zollbeamter Kontakt zu „Rico“ auf, um Waffen zu bestellen und das Treffen am Marburger Busbahnhof zu verabreden. Dort wurde Philipp K. dann verhaftet.

Lesen Sie mehr in der aktuellen Ausgabe des Freitag.


                  

Duck Duck Go
Buscador Duck Duck Go con privacidad y servicio garantizados
DuckDuckGo es un buscador de Internet que está situado en Pensilvania, y usa datos de una gran cantidad de webs (por ejemplo, Wikipedia), con el propósito de incrementar las búsquedas clásicas y hacer mejor su relevancia. La filosofía del buscador acentúa la privacidad y no registra ninguna información de usuarios.
Este buscador Duck Duck Go creado en los Estados Unidos, más exactamente en Pensilvania, por un científico y matemático, con nombre de emprendimiento Duck Duck Go que parece más un pato, y que no debió a ningún estudio previo sino a la simple espontaneidad del momento, como el mismo Wienberg lo comentaba ya que le puso ese nombre al buscador porque se le ocurrió, le gustó y punto. Merece con curiosidad ahondar un poco más en las ventajas de utilizarlo por encima de los buscadores tradicionales.
Sin duda Duck Duck Go es más ágil que los buscadores tradicionales, porque te ofrece ventajas al usar el teclado, las flechas del mismo, y uno que otro truco para que puedas encontrar la información que necesitas en forma más rápida, como no tener que pasar páginas en tu búsqueda ya que todos los resultados aparecen en la misma primera vista. La agilidad no es aspecto menor y el ahorro de unos cuantos segundos en tu búsqueda con Duck Duck Go te puede representar luego minutos, horas y días, que al sumarse podrán hacer la diferencia entre terminar más temprano tu proyecto o comenzar a ganar dinero más rápido.
Se menciona que el dueño y creador de Duck Duck Go se preocupó mucho por garantizar a los usuarios de su buscador, la privacidad, no guardar, ni compartir información, no utilizarla para terceros ni para publicidad, como si lo hacen la mayoría de los buscadores líderes del mercado. Esta ventaja puede ser interesante para aquellos que desean permanecer anónimos en sus búsquedas, no quieren que nadie se entere o lo haga en el futuro sobre sus intereses, gustos y aficiones, trabajo y conocimientos sobre los cuales están profundizando.
Para los que desean probar cosas nuevas y vivir experiencias diferentes, el buscador Duck Duck Go es una excelente oportunidad de hacerlo, no solo porque tu información personal y el de las búsquedas realizadas permanecerán en el anonimato, sino porque de pronto la información específica que necesitas, te aparece de mejor manera y en forma más rápida, puedes encontrar contenido más ajustado a tu perfil y profundidad, disfrutar de un sistema de búsqueda que cerca de 200,000 personas de todo el mundo ya lo hacen en forma mensual, en forma exitosa para sus expectativas.
Duck Duck Goes gratuito, de código abierto, funcional, rápido, accesible, confidencial, inventado por un experto en tecnología de MIT en Boston, así que algunos atributos le deben merecer la confianza de los muchos usuarios que han probado su eficiencia y efectividad para encontrar contenido.
Recuerda no dejar de utilizar Duck Duck Go para que encuentres aquellas bondades que te pueden servir en tus necesidades de contenido, información, conocimiento y aprendizaje. Recuerda que este buscador con nombre de pato e inventado por un científico que vendió una base de datos que poseía por varios millones durante sus inicios es hoy el abanderado de la confidencialidad y privacidad.
Ask
Buscador Ask (aka 'Ask Jeeves') en las preguntas siempre tienen respuesta
Ask.com, o Ask Jeeves, es un buscador de Internet. Pertenece al grupo InterActive Corporation, fundado en 1996 por G. Gruener y D. Warthen en California. G. Chevsky implantó el primer programa basado en su propio diseño. El grupo RODA fue el primer inversor.
Ask.com tiene mucha variedad de páginas web. Tiene portadas para muchos países como: Reino Unido, Japón, Países Bajos, España, Italia y Alemania. Incluye portales como Teoma, Excite, MyWay.com, iWon.com, Bloglines y la versión de Ask para Niños, y otros portales de diferentes temas. Ask.com fue en septiembre de 2004, una de los diez grupos con más entradas en Estados Unidos.
El buscador Ask te responde la pregunta que tengas, una manera original de buscar en la web, ya que la manera natural de tener acceso al contenido es haciendo preguntas, y por ello en California dos jóvenes de apellidos Wharten y Gruener, se inventaron este sistema natural de búsqueda de información bajo el nombre de Ask.
No solo puedes en Ask preguntar en inglés sino en español, sobre blogs, videos o imágenes, así como puedes verificar aquellas preguntas y respuestas más ingeniosas, las más curiosas, aquellas sorprendentes y las más utilizadas por los usuarios en la web.
Normalmente en los buscadores se utilizan palabras claves para encontrar el contenido que deseas, pero en Ask se hace a través de preguntas, las cuales se responden con los contenidos que más se acercan a tu inquietud, organizados por orden de relevancia, no solo porque hayan sido los más visitados en los últimos meses, como ocurre con los buscadores tradicionales, sino aquellos que son calificados por expertos como los mejores.
En Ask también puedes hacer preguntas a otros usuarios de la web, para que de acuerdo con su experiencia te den sus comentarios o pistas de por dónde buscar la inquietud que estás planteando o solucionarla directamente, cuando se cuenta con el conocimiento preciso.
Una idea surgida en una pequeña empresa californiana en 1996 se ha convertido hoy en día en uno de las más importantes alternativas de buscar información en Internet. Posicionado Ask por su originalidad e innovación, practicidad al darle al usuario la alternativa de que plantee su inquietud tal como le llega a la mente, para que el medio virtual y los mismos usuarios, le den la mejor respuesta existente.
Países como España o Inglaterra o Italia son lugares en donde se encuentra más posicionado Ask, porque el contenido se especializa para estos mercados, dándoles prioridad a sus usuarios. Aunque el origen de Ask fue en Estados Unidos y el idioma utilizado era el inglés, en la actualidad también se está propagando su uso en español.
El objetivo de Ask es acomodarse a los usuarios, quienes son sus clientes, en la forma en que hablan y se comunican, en la forma en que buscan lo que desconocen y lo que necesitan. Siendo la mejor manera de hacerlo a través de preguntas para las cuales existen respuestas más y más relevantes.
Si quieres que los contenidos de internet te lleguen de una manera coloquial pero profunda, simple pero especializada, en un lenguaje muy similar a la comunicación en donde se establecen diálogos de interacción bajo el sistema de preguntas y respuestas, lo mejor es que pienses en Ask, un buscador diferente que te podrá ayudar mucho a las necesidades de información virtual.
Yippy
Buscador Yippy (formerly 'Clusty') especializado en encontrar el detalle
Yippy es un buscador de Deep Web que se dedica a conseguir otros buscadores. A diferencia de la web normal, que está indexada por los programas del robot araña, las páginas Deep Web son generalmente más difíciles de localizar mediante una búsqueda convencional. Ahí es donde Yippy es muy útil. Si estás buscando blogs de pasatiempos con oscuro interés, la información oscura del gobierno, noticias oscuras difíciles de encontrar, la investigación académica y cualquier otro contenido de otro algún modo-oscuro, entonces Yippy es tu herramienta.
El buscador Yippy era denominado inicialmente como Clusty, un sistema que nace en los Estados Unidos dentro de la Universidad de Carnegie, centro de varios desarrollos que incluyeron a Lycos, una época dorada y de gran incursión emprendedora. Solo hasta 2010, Clusty se convierte en Yippy con sede en la Florida con la función de crear un buscador que protegiera los derechos de los niños, de las familias, del contenido conservador desde el punto de vista moral pero innovador en la ciencia y la tecnología.
La esencia y estructura de los buscadores como Yippy es ir de lo general a lo particular, del contenido simple al contenido cada vez más profundo, a través de las redes organizadas como árboles en donde la jerarquía tiene su prelación e importancia. Por ello, más que sistemas de búsqueda se configuran en medios de organizar y presentar la información a los usuarios que la están requiriendo.
El buscador Yippy se vale otros buscadores y de todos los medios que se encuentran a su alcance para conseguir la información y contenido que necesita la gente. De allí el valor y posicionamiento que viene ganando Yippy, ya que si no encuentras algo en tus buscadores tradicionales, pro corresponder a un contenido académico, profundo y específico, es mejor que intentes con Yuppy, con la seguridad que te llevará a algún lugar cercano.
Dentro de una competencia dominada y liderada por un claro buscador como Google, Yippy surge con diferenciadores que le dan relevancia e importancia dentro del ambiente virtual y de internet. Iniciando por brindar un contenido apto para todo público en donde se restrinjan los excesos, y posicionándose como medio especializado para conseguir contenido especial en donde otros no pueden lograrlo, gracias a que se basa en todos los recursos de información existentes y disponibles, incluyendo la existente en los otros buscadores, contenido investigativo y académico, información de carácter reservada.
Su origen como Yippy parece reciente, solo desde el 2010, pero como obedeció a la compra de otro buscador más antiguo como Clusty, su trayectoria de experiencia es más grande, y gracias a un posicionamiento claro, en donde la profundidad y el contenido raro, unido a la invitación del mercado familiar, le permiten ganar atractivo y usuarios en todas partes del mundo.
Te invitamos a Yippy tu buscador que te sacará de apuros, para acercarte a tus dudas y necesidades de conocimiento, en donde otros no han podido brindarte la información con la oportunidad que requieres.
Cuil
Cuil es un buscador de Internet que se estableció por primera vez en Julio de 2008. De acuerdo con los fundadores de Cuil, este buscador "investiga" más páginas en la Web que cualquier otro , incluído Google, y en lugar de utilizar la popularidad como una medida de búsqueda, Cuil busca y clasifica las páginas en función de su contenido y relevancia.
Buscador Cuil otra apuesta a dar mejor servicio
El buscador Cuil es otra apuesta de la tecnología y los emprendedores, en este caso deantiguos empleados de Google, por dar un mejor servicio a los usuarios de internet y de laweb. El objetivo final de Cuil es que las necesidades de información de los clientes seansatisfechas con mayor profundidad y exactitud.El fondo negro del diseño del portal de Cuil nos puede indicar que buscan la profundidaddel conocimiento, ganar en magnitud de tamaño y calidad en la información que brindan alos usuarios, respecto de la competencia. A fin y al cabo, haber trabajado en un competidorlíder como Google les permitió a sus fundadores, Patterson junto con Power y Costello, laprimera mujer y los dos restantes hombres, conformando un trío con ingenio y capacidad deemprendimiento.La letra azul de Cuil puesta a la i, podría significar información, investigación, inteligencia,innovación, o cualquier otra palabra interesante, que proyectaba en este nuevo buscadorlograr un posicionamiento y atractivo, que le permitiera sobrevivir en un mercado muycompetido y monopolizado por Google. Hoy se buscas en Cuil puedes seguir encontrandola información, pero desde 2010 Google adquirió las principales patentes desarrolladas porsus fundadores, relacionadas con algoritmos de búsqueda de información y de contenido.En sus orígenes Cuil busco diferenciarse del resto de portales de búsqueda, y para elloconstruyo una base de datos de información bastante más amplia que las de la mismaGoogle o Microsoft. Porque creía que a los clientes se les podía dar más que lo queactualmente se brindaba. Adicionalmente se pensó que era más importante dar calidadde contenido que popularidad, ya por ello la información que arrojaban los resultadosde las búsquedas en Cuil, se mostraban por grupos afines de relevancia. Por ejemplo,se organizaban y agrupaban las páginas webs oficiales, o las catedráticas, y también laspopulares. Pero se dejaba que el usuario decidiera que tipo de información le era máspertinente consultar de primero.Cuil sale de las entrañas de Google para competirle directamente a base de contenido yrelevancia, con nuevos algoritmos que le permiten presentar la información en el buscadoren forma diferente a lo tradicional, que se basa en reseñar primero aquellas webs máspopulares o publicitadas o promocionadas. No sabremos si esta apuesta logre vencer a lostradicionales métodos, pero es de alabar el deseo de ser diferente, pensar en el usuario y susnecesidades.Te invitamos a que pruebes el buscador Cuil, la forma en que atiende tus preguntas ynecesidades de contenido, compares si existe mejor calidad, y lo uses cada vez con mayorfrecuencia.
El buscador Cuil es otra apuesta de la tecnología y los emprendedores, en este caso deantiguos empleados de Google, por dar un mejor servicio a los usuarios de internet y de laweb. El objetivo final de Cuil es que las necesidades de información de los clientes seansatisfechas con mayor profundidad y exactitud.
El fondo negro del diseño del portal de Cuil nos puede indicar que buscan la profundidaddel conocimiento, ganar en magnitud de tamaño y calidad en la información que brindan alos usuarios, respecto de la competencia. A fin y al cabo, haber trabajado en un competidorlíder como Google les permitió a sus fundadores, Patterson junto con Power y Costello, laprimera mujer y los dos restantes hombres, conformando un trío con ingenio y capacidad deemprendimiento.
La letra azul de Cuil puesta a la i, podría significar información, investigación, inteligencia,innovación, o cualquier otra palabra interesante, que proyectaba en este nuevo buscadorlograr un posicionamiento y atractivo, que le permitiera sobrevivir en un mercado muycompetido y monopolizado por Google. Hoy se buscas en Cuil puedes seguir encontrandola información, pero desde 2010 Google adquirió las principales patentes desarrolladas porsus fundadores, relacionadas con algoritmos de búsqueda de información y de contenido.
En sus orígenes Cuil busco diferenciarse del resto de portales de búsqueda, y para elloconstruyo una base de datos de información bastante más amplia que las de la mismaGoogle o Microsoft. Porque creía que a los clientes se les podía dar más que lo queactualmente se brindaba. Adicionalmente se pensó que era más importante dar calidadde contenido que popularidad, ya por ello la información que arrojaban los resultadosde las búsquedas en Cuil, se mostraban por grupos afines de relevancia. Por ejemplo,se organizaban y agrupaban las páginas webs oficiales, o las catedráticas, y también laspopulares. Pero se dejaba que el usuario decidiera que tipo de información le era máspertinente consultar de primero.
Cuil sale de las entrañas de Google para competirle directamente a base de contenido yrelevancia, con nuevos algoritmos que le permiten presentar la información en el buscadoren forma diferente a lo tradicional, que se basa en reseñar primero aquellas webs máspopulares o publicitadas o promocionadas. No sabremos si esta apuesta logre vencer a los
tradicionales métodos, pero es de alabar el deseo de ser diferente, pensar en el usuario y susnecesidades.
Te invitamos a que pruebes el buscador Cuil, la forma en que atiende tus preguntas ynecesidades de contenido, compares si existe mejor calidad, y lo uses cada vez con mayorfrecuencia.
Internet Archive
Internet Archive (El archivo de Internet), es una organización sin ánimo de lucro que fue fundada para construir una biblioteca de Internet. Sus objetivos incluyen una oferta de acceso permanente a las colecciones históricas que existen en formato digital dirigido a investigadores, historiadores, académicos, personas con discapacidad, y el público en general . Fundado en 1996 y ubicado en San Francisco, el Archivo ha estado recibiendo donaciones de datos de Alexa Internet y otros. A finales de 1999, la organización comenzó a crecer para incluir colecciones más completas. Ahora, Internet Archive incluye textos, audio, imágenes en movimiento, y software, así como páginas web archivadas en nuestras colecciones, y ofrece servicios especializados para la lectura de adaptación y acceso a la información para las personas ciegas y con discapacidades.
The Internet Archieve es el medio de búsqueda de información de la Academia
The Internet Archieve es un buscador especializado en libros, vídeos, música, por loque parece más una librería o biblioteca que un buscador racional de la web. Se enfoquees algo mas académico que el resto de los buscadores de internet, y por ello dentro desus más importantes usuarios se encuentran los universitarios, estudiantes, profesores,investigadores, historiadores, catedráticos, en general, así como el publico generalinteresado en este tipo de información y formación, un poco mas estructurada y profunda,por decirlo de alguna manera.California en los Estados Unidos y específicamente San Francisco, vuelve a tenerprotagonismo en el desarrollo de nuevos emprendimientos para internet, en el campo dela tecnología, y en este caso de los buscados como The Internet Archieve. Se origen seremonta a 1996, gracias a las donaciones de importantes personas, intestadas en preservarla cultura, el contenido y la información, como patrimonio de toda la humanidad. Lahistoria y la humanidad tienen un pasado, y este debe plasmarse y compartirse a través delmejor medio inventado en la actualidad como lo es internet.The Internet Archieves es precisamente eso, un importante cumulo de conocimientos,que incluyen libros, textos, obras, vídeos, musicales, indexados en forma de archivospara que puedan ser consultados, investigados, regencia dos como fuentes bibliográficas,profundizados en su contexto, y generadores de nuevo conocimiento.The Internet Archieve es un incentivo para las librerías y bibliotecas para que ingresenal medio virtual, como una forma de masificar sus documentos y el conocimiento, en elpasado impreso, pero que gracias a la tecnología se puede ver en forma virtual, rompiendola barrera de la distancia.Igualmente se fomenta y se promueve en The Internet Archieve, la agrupación deprofesionales por temas, la investigación, el desarrollo de proyectos, y el crecimiento delconocimiento. Para este fin, se anuncian en la web de The Internet Archieve, convocatoriaspara el desarrollo de proyectos, con la ventaja de que el medio internet permite laparticipación desde todas partes de mundo, sin importar el lugar o la idiosincrasiao el idioma. Eso si se hace necesario participar en el idioma inglés como un piso decomunicación universal.Un nuevo estilo de buscadores es The Internet Archieve, porque la información seespecializa, se condensa y se agrupa por temas y áreas de estudio. Muy útil para aquel queestudia, investiga y desea seguir avanzando en algún tópico de la academia o el arte o lacultura o la historia, en especial.Te invitamos a visitar el buscador The Internet Archieve para que encuentres y tefamiliarices con sus bondades e inmensas ventajas, cuando necesites estudiar o investigar,seguro que The Internet Archieve es tu mejor opción.
The Internet Archieve es un buscador especializado en libros, vídeos, música, por loque parece más una librería o biblioteca que un buscador racional de la web. Se enfoquees algo mas académico que el resto de los buscadores de internet, y por ello dentro desus más importantes usuarios se encuentran los universitarios, estudiantes, profesores,investigadores, historiadores, catedráticos, en general, así como el publico generalinteresado en este tipo de información y formación, un poco mas estructurada y profunda,por decirlo de alguna manera.
California en los Estados Unidos y específicamente San Francisco, vuelve a tenerprotagonismo en el desarrollo de nuevos emprendimientos para internet, en el campo dela tecnología, y en este caso de los buscados como The Internet Archieve. Se origen seremonta a 1996, gracias a las donaciones de importantes personas, intestadas en preservarla cultura, el contenido y la información, como patrimonio de toda la humanidad. Lahistoria y la humanidad tienen un pasado, y este debe plasmarse y compartirse a través delmejor medio inventado en la actualidad como lo es internet.
The Internet Archieves es precisamente eso, un importante cumulo de conocimientos,que incluyen libros, textos, obras, vídeos, musicales, indexados en forma de archivospara que puedan ser consultados, investigados, regencia dos como fuentes bibliográficas,profundizados en su contexto, y generadores de nuevo conocimiento.
The Internet Archieve es un incentivo para las librerías y bibliotecas para que ingresenal medio virtual, como una forma de masificar sus documentos y el conocimiento, en elpasado impreso, pero que gracias a la tecnología se puede ver en forma virtual, rompiendo la barrera de la distancia.
Igualmente se fomenta y se promueve en The Internet Archieve, la agrupación deprofesionales por temas, la investigación, el desarrollo de proyectos, y el crecimiento delconocimiento. Para este fin, se anuncian en la web de The Internet Archieve, 
convocatoriaspara el desarrollo de proyectos, con la ventaja de que el medio internet permite laparticipación desde todas partes de mundo, sin importar el lugar o la idiosincrasiao el idioma. Eso si se hace necesario participar en el idioma inglés como un piso decomunicación universal.
Un nuevo estilo de buscadores es The Internet Archieve, porque la información seespecializa, se condensa y se agrupa por temas y áreas de estudio. Muy útil para aquel queestudia, investiga y desea seguir avanzando en algún tópico de la academia o el arte o lacultura o la historia, en especial.
Te invitamos a visitar el buscador The Internet Archieve para que encuentres y tefamiliarices con sus bondades e inmensas ventajas, cuando necesites estudiar o investigar,seguro que The Internet Archieve es tu mejor opción.
Yahoo
Yahoo! es varias cosas: es un buscador de Internet, un agregador de noticias, un centro de comercio, un emailbox, un directorio de viajes, un centro de horóscopos y de juegos y mucho más. La variedad de opciones de este "portal web" hacen de este un sitio muy útil para los principiantes en Internet. Buscar en la Web también debería ser descubrimiento y la exploración, y Yahoo! Ofrece esto en cantidades al por mayor.
Buscador Yahoo más que completo
Hablar de Yahoo es mencionar a un grande de internet, no solo en el campo de los buscadores, sino convertido en un verdadero portal de noticias, compras, negocios, comercio, desarrollo de páginas webs, y por su puesto su correo electrónico, en donde es un verdadero líder y competidor muy fuerte de Microsoft y Hotmail.
El nacimiento y origen de Yahoo es como muchos en California solo que en este caso fue en la Universidad de Stanford, en donde dos estudiantes de postgrado de apellidos Yang y Filo se unieron para desarrollar a Yahoo ubicar le vida a mediados de los noventa.
El posicionamiento de Yahoo no es tanto como buscador, que de por si es muy bueno, sino en el, valor agregado que presta con una amplia gama de servicios que incluyen el correo electrónico, el alojamiento de portales y webs, las noticias, las compras y el comercio electrónico.
Dentro de las estrategias de Yahoo se han planteado varias alianzas con competidores tan grandes como Google y Microsoft, en el primer caso para compartir búsquedas y publicidad, y en el segundo para canalizar las búsquedas e integrarlas a los sistemas operativos de los computadores.
Se puede decir que Yahoo como buscador ha sido un claro seguidor del líder Google, ocupando el segundo o el tercer lugar, pero no bajado de este lugar de privilegio que le hace merecedor a un importante número de visitantes y usuarios, todos los días y meses. Aunque no ha podido sobresalir Yahoo en el campo comercia y publicitario como lo ha sido Google con su sistema Adsense ya pago por clic, cuenta con una que otra estrategia para venta de publicidad y premio a los portales que se unen a sus programas.
Yahoo tiene acceso en todo el mundo y su página principal se acomoda a cada país de donde provenga la persona o usuario que ingresa, para que el diosa y las noticias le sean más familiares y cercanas. Por ello en su portal no solo sobresale su espacio de búsqueda de información sino sus complementos de servicios entre los que se incluye, la Astrología, el Cine, el Correo, los Deportes, el Empleo, los Juegos, las Noticias y el Video, entre otros muchos.
Es claro el posicionamiento de Yahoo como un portal en donde puedes encontrar todo lo que busques y necesites, clasificado por temas más investigados y utilizados como los que mencionamos de las Noticias o los Deportes o los Juegos, los cuales ganan cada vez más espacio y adeptos en todo el mundo. La novedad de personalizar el diseño de penetración del contenido de acuerdo con el idioma y país dé silencia de cada usuario, le da un toque de distinción y diferenciación, personalización y desarrollo. Relaciones con los usuarios o clientes, quienes encuentran en Yahoo un proveedor de contenido completo, confiable y que le satisface para lo que necesite en cada momento.
Te invitamos a utilizar Yahoo como buscador y en sus múltiples servicios, seguros de que encontraras alguno que se ajuste a tus necesidades y expectativas. Cuando pienses en contenido global y total, seguro Yahoo se encontrara entre tus preferidos.
Mahalo
Mahalo es el único buscador de "tracción humana", que emplea un comité de editores para tamizar manualmente y vetar miles de piezas de contenido. Esto significa que obtendrás menos éxito con los resultados de Mahalo quelos que obtienes con o Google. Pero también significa que los resultados de la mayoría de Mahalo tienen una mayor calidad de contenido y relevancia (de la mejor manera que el grupo de editores pueden juzgar).
Mahalo también ofrece buscadores, además de hacer preguntas. Dependiendo de cuál de las dos cuadros de búsqueda que utilices en Mahalo, recibirás información de un tema de una manera directa o te sugerirán respuestas a tus preguntas.
Buscador Mahalo para seguir aprendiendo
Si sigues la publicidad del buscador Mahalo, un sistema hecho por humanos para humanos,encuentras rápidamente el posicionamiento que desea Mahalo mostrar al público asícomo los atributos que persigue para su diferenciación. Tal vez algo personalizado, másdetallado, menos masivo, investigado y analizado ara darle algo diferente al usuario.Ingresar al buscador Mahalo y que te encuentres con un mensaje que te invita a queaprendas algo, ya sea un instrumento musical o algún arte en especial, ya de por si establecela diferencia en Mahalo y tríos buscadores. Lo mejor de todo es que estos apps se incluyenen tu iPod o iPad para que puedas disfrutar en forma instantánea y cómoda de tus nuevasclases gratuitas que vas a recibir bajo el sello y patrocinio de Mahalo.La frase o eslogan de Mahalo es Aprende Algo, para indicarte cual es la filosofía desu portal, la cual consiste en dar contenido para aumentar el conocimiento, desenrollardestrezas, aumentar las habilidades. Muy útil para el trabajo, la educación, los deportes, elarte, la música, los viajes, la tecnología, los idiomas, los negocios.Por eso el buscador Mahalo tiene diseñado su portal para que encentares el contenido enforma organizada ajo los mismos apartados o temas de aprendizaje. Si quieres aprendernuevos estilos de peinado o a realizar figuras en papel, desarrollar algún hobby como armaraviones de juguete o preparar los más ricos potajes y alimentos, con seguridad Mahalo es tusitio o portal, en donde podrás encontrar variadas opciones, cursos gratis y consejos.Los jóvenes encuentran en Mahalo su lugar para los videojuegos, los adultos el lugar paraaprender algo nuevo que les permita seguir sien útiles y productivos, los emprendedorespodrán encontrar herramientas para iniciar su nuevo negocio, así como múltiplesactividades para divertirse y entretenerse, incluyendo la música y los vídeos.Un interesante posicionamiento nos presenta el buscador Mahalo, en donde el conocimientoútil y práctico se encuentra a la orden del día, para todos los gustos y necesidades, así comoel encontrarte con otras personas que tienen la misma necesidad o afición, para compartir einteractuar.Te invitamos a seguir incrementando tus destrezas y habilidades, para que sigas siendocompetitivo, encuentres nuevas oportunidades de crecimiento, y logres superar lasdificultades que se te presenten. El buscador Mahalo se encuentra dispuesto para servirte entodos estos propósitos.
Si sigues la publicidad del buscador Mahalo, un sistema hecho por humanos para humanos,encuentras rápidamente el posicionamiento que desea Mahalo mostrar al público asícomo los atributos que persigue para su diferenciación. Tal vez algo personalizado, másdetallado, menos masivo, investigado y analizado ara darle algo diferente al usuario.
Ingresar al buscador Mahalo y que te encuentres con un mensaje que te invita a queaprendas algo, ya sea un instrumento musical o algún arte en especial, ya de por si establecela diferencia en Mahalo y tríos buscadores. Lo mejor de todo es que estos apps se incluyenen tu iPod o iPad para que puedas disfrutar en forma instantánea y cómoda de tus nuevasclases gratuitas que vas a recibir bajo el sello y patrocinio de Mahalo.
La frase o eslogan de Mahalo es Aprende Algo, para indicarte cual es la filosofía desu portal, la cual consiste en dar contenido para aumentar el conocimiento, desenrollardestrezas, aumentar las habilidades. Muy útil para el trabajo, la educación, los deportes, elarte, la música, los viajes, la tecnología, los idiomas, los negocios.
Por eso el buscador Mahalo tiene diseñado su portal para que encentares el contenido enforma organizada ajo los mismos apartados o temas de aprendizaje. Si quieres aprendernuevos estilos de peinado o a realizar figuras en papel, desarrollar algún hobby como armaraviones de juguete o preparar los más ricos potajes y alimentos, con seguridad Mahalo es tusitio o portal, en donde podrás encontrar variadas opciones, cursos gratis y consejos.
Los jóvenes encuentran en Mahalo su lugar para los videojuegos, los adultos el lugar paraaprender algo nuevo que les permita seguir sien útiles y productivos, los emprendedorespodrán encontrar herramientas para iniciar su nuevo negocio, así como múltiplesactividades para divertirse y entretenerse, incluyendo la música y los vídeos.
Un interesante posicionamiento nos presenta el buscador Mahalo, en donde el conocimientoútil y práctico se encuentra a la orden del día, para todos los gustos y necesidades, así comoel encontrarte con otras personas que tienen la misma necesidad o afición, para compartir einteractuar.
Te invitamos a seguir incrementando tus destrezas y habilidades, para que sigas siendocompetitivo, encuentres nuevas oportunidades de crecimiento, y logres superar lasdificultades que se te presenten. El buscador Mahalo se encuentra dispuesto para servirte entodos estos propósitos.
bing
Bing es un motor de búsqueda de Microsoft que se lanzó el 28 de mayo de 2009. Microsoft lo llama un "Motor de decisiones", porque está diseñado para dar resultados de búsqueda en un formato que organiza las respuestas para hacer frente a tus necesidades. Al realizar una búsqueda en Bing, además de proporcionarte resultados de búsqueda, el motor de búsqueda también te muestra una lista de las búsquedas relacionadas en la parte izquierda de la página de resultados de motores de búsqueda (SERP). También puedes acceder a un enlace para ver tu historial de búsquedas recientes. Bing utiliza la tecnología de una empresa llamada Powerset, que Microsoft adquirió.
Bing se puso en marcha con varias características que son únicas en el mercado de las búsquedas. Por ejemplo, cuando pasas el ratón sobre un resultado Bing un pequeño pop-up proporciona información adicional para ese resultado, incluyendo un contacto de correo electrónico si está disponible. El principal cuadro de búsqueda de características da sugerencias a medida que escribes, y la búsqueda de viaje de Bing es promocionada como la mejor en la red. Se espera que Bing reemplace a Microsoft Live Search.
Buscador Bing
El buscador Bing se relaciona con Microsoft, su padrino y patrocinador, ya que este gigantede la tecnología y los sistemas operativos, lo usa ahora como su buscador elegido, local lepermitirá competir por el segundo puesto entre los buscadores de internet con Yahoo.El deseo de Bing es competir a base de calidad y diseño en la información brindada a losusuarios. Por ello, cuando se presenta una búsqueda cualquiera como, la educación virtual oalgún personaje favorito, te aparece a la izquierda unos tópicos o guías o recomendacionesque te pueden ser útiles para seguir afinando la búsqueda que cestas realzando, y de estamanera acercarte a la solución o respuesta esperada. Para el caso de una búsqueda de unactor, te aparecerían a la izquierda temas como, su biografía, sus hobbies, las películas,su época de joven, ya así sucesivamente apartados que te pueden guiar en lo que estasbuscando.El buscador Bing lo puedes utilizar tanto para el idioma inglés como el español, lo cualte da versatilidad y facilidad en la consulta, dependiendo de tu predilección y dominio deuno u otro lenguaje. Es más, puedes sectorizar la búsqueda de Bing para América Latina,logrando con ello llegar a un mercado objetivo más especifico, lo cual te darían resultadosmás atinados y apropiados para tus necesidades de búsqueda.También el buscador Bing te permite clasificar los resultados por antigüedad, pudiendoobtener contenidos recientes, de las últimas 24 horas, o contenidos históricos relacionadoscon el origen de la información, en el momento en que se desarrollo la noticia ole evento.Dependerá de tu elección y necesidad.Bing busca sementar, quiere brindarte soporte en tu búsqueda, darte mayos facilidadespara que encuentres lo que necesitas, hasta el punto de convertirse en el buscador numerodos del mercado, por detrás de Google pero por encima de Yahoo, lo cual es un logroimportante y sorprendente.Te invitamos al incluir a Bing dentro de tus búsquedas favoritas, para que no dejes pasarla oportunidad de encontrar rápidamente lo que estas necesitando. Bing esta saldado porMicrosoft, lo cual le da garantía de desarrollo y competitividad.
El buscador Bing se relaciona con Microsoft, su padrino y patrocinador, ya que este gigantede la tecnología y los sistemas operativos, lo usa ahora como su buscador elegido, local lepermitirá competir por el segundo puesto entre los buscadores de internet con Yahoo.
El deseo de Bing es competir a base de calidad y diseño en la información brindada a losusuarios. Por ello, cuando se presenta una búsqueda cualquiera como, la educación virtual oalgún personaje favorito, te aparece a la izquierda unos tópicos o guías o recomendacionesque te pueden ser útiles para seguir afinando la búsqueda que cestas realzando, y de estamanera acercarte a la solución o respuesta esperada. Para el caso de una búsqueda de unactor, te aparecerían a la izquierda temas como, su biografía, sus hobbies, las películas,su época de joven, ya así sucesivamente apartados que te pueden guiar en lo que estasbuscando.
El buscador Bing lo puedes utilizar tanto para el idioma inglés como el español, lo cualte da versatilidad y facilidad en la consulta, dependiendo de tu predilección y dominio deuno u otro lenguaje. Es más, puedes sectorizar la búsqueda de Bing para América Latina,logrando con ello llegar a un mercado objetivo más especifico, lo cual te darían resultadosmás atinados y apropiados para tus
          Â«Î‰Î¼Î¿Ï…ν δεμένη μέσα σε μια τσάντα, σε ένα πορτμπαγκάζ»: Η μαρτυρία του μοντέλου που απήχθη για πουληθεί στο dark web !        
«Ήμουν δεμένη μέσα σε μια τσάντα, σε ένα πορτμπαγκάζ»: Η μαρτυρία του μοντέλου που απήχθη για πουληθεί στο dark web

«Κάποιος με μαύρα γάντια ήρθε από πίσω και έβαλε το ένα χέρι στον λαιμό μου και το άλλο στο στόμα μου, ενώ ένα δεύτερο άτομο, που φορούσε μια μαύρη μπαλακλάβα, μου έκανε ένεση στο δεξί χέρι. Νομίζω ότι έχασα τις αισθήσεις μου. Όταν ξύπνησα φορούσα ένα ροζ κορμάκι και τις κάλτσες που φοράω τώρα.

Συνειδητοποίησα ότι ήμουν στο πορτμπαγκάζ ενός αυτοκινήτου, με τους καρπούς και τους αστραγάλους μου δεμένους, και κολλητική ταινία στο στόμα μου. Ήμουν μέσα σε μια τσάντα, με μόνο μια μικρή τρύπα που μου επέτρεπε να αναπνέω» είπε στην ιταλική αστυνομία η Κλόε Έιλινγκ, 20χρονο μοντέλο από τη Βρετανία που απήχθη στο Μιλάνο από απαγωγείς που επιχείρησαν να την βγάλουν σε δημοπρασία στο dark web.

Όπως αναφέρεται σε δημοσίευμα του Guardian, η Έιλινγκ θεωρείται πως ναρκώθηκε και μεταφέρθηκε μέσα σε μια τσάντα στο Μποργκιάλ, ένα χωριό κοντά στο Τορίνο, πριν απελευθερωθεί έξι ημέρες μετά και μεταφερθεί στο βρετανικό προξενείο στο Μιλάνο. Στην κατάθεσή της είπε πως ούρλιαζε τόσο πολύ, που οι απαγωγείς της αναγκάστηκαν να σταματήσουν τρεις φορές το αυτοκίνητο ενώ τη μετέφεραν. Όσον αφορά στην αιχμαλωσία της στο σπίτι όπου την είχαν κλεισμένη, είπε ότι είχαν δεμένα τα πόδια και τα χέρια της σε συρτάρια. «Αναγκαζόμουν να κοιμάμαι στο πάτωμα, σε έναν υπνόσακο» είπε.

Οι απαγωγείς της Έιλινγκ, φέρονται να είχαν προσπαθήσει να την πουλήσουν για πάνω από 300.000 δολάρια, απαιτώντας παράλληλα από τον ατζέντη της να καταβάλει λύτρα για να την επιστρέψουν. Ωστόσο οι αρχές ανέφεραν πως απελευθερώθηκε όταν οι απαγωγείς της διαπίστωσαν ότι είχε ένα δίχρονο παιδί, καθώς υποτίθεται πως οι κανόνες τους απαγορεύουν την απαγωγή γυναικών που είναι μητέρες.

Η MailOnline δημοσίευσε μια επιστολή που φέρεται να απεστάλη στην ίδια από μια οργάνωση ονόματι «Black Death» (Μαύρος Θάνατος), όπου λεγόταν ότι η Έιλινγκ απελευθερώθηκε εξαιτίας «μεγάλης γενναιοδωρίας), και τονιζόταν ότι δεν θα έπρεπε να διερευνηθεί το συμβάν, να μην μιλήσει για τους απαγωγείς της και ότι θα έπρεπε να πληρώσει 50.000 δολάρια σε bitcoins μέσα σε ένα μήνα, αλλιώς θα «εξοντωνόταν». Μία «διαφήμιση» για την ίδια ανέφερε πως κορίτσια- σκλάβες του σ@ξ μπορούν να αποσταλούν σε όλο τον κόσμο αντί χρηματικού αντιτίμου. «Η παράδοση στην ΕΕ είναι δωρεάν, ίσως χρειαστεί χρόνος ανάλογα με την τοποθεσία και το σημείο παράδοσης», αναφερόταν, ενώ συμπληρωνόταν πως η δημοπρασία για την 20χρονη θα λάμβανε χώρα στις 16 Ιουλίου. Επίσης, διευκρινιζόταν πως «μπορούμε να απαγάγουμε κάποια συγκεκριμένα για τις ανάγκες σας», ενώ τονιζόταν ότι η οργάνωση έχει γιατρό που τις εξετάζει για σ@ξουαλικώς μεταδιδόμενα νοσήματα και ελέγχει αν είναι «αγνές». «Δεν πουλάμε κορίτσια που είναι άρρωστα, έγκυες, έχουν σ@ξουαλικώς μεταδιδόμενα νοσήματα ή είναι νεαρές μητέρες».

Για την απαγωγή έχει συλληφθεί ο Λούκας Χέρμπα, Πολωνός που ζει στη Βρετανία. Ο 30χρονος φέρεται να είναι ανώτερο στέλεχος στην οργάνωση, η οποία φέρεται να είναι ένα online δίκτυο απαγωγών «σκλάβων του σ@ξ», που έχει διερευνηθεί από τη Europol. Κατά την 20χρονη, στην απαγωγή ενεπλάκησαν και άλλα άτομα.

Όπως είπε η Έιλινγκ, ο Χέρμπα της είπε πως το αφεντικό του ήταν έξω φρενών, καθώς είχε απαγάγει λάθος άτομο. «Δεν έπρεπε να με είχαν αρπάξει επειδή είναι ξεκάθαρο από τον λογαριασμό μου στο Instagram ότι είμαι μητέρα μικρού παιδιού, και αυτό είναι ενάντια στους κανόνες της οργάνωσης. Είπε πως η αιχμαλωσία δεν μπορούσε να σταματήσει, καθώς είχαν ήδη δημοσιεύσει δύο φωτογραφίες μου στο deep web, που είχαν τραβηχτεί ενώ ήμουν αναίσθητη. Υπήρχαν ήδη κάποιοι που είχαν εκφράσει ενδιαφέρον».

«Μου είπε ότι είχε βγάλει πάνω από 15 εκατ. ευρώ μέσα στα τελευταία πέντε χρόνια.Μου εξήγησε πως όλα τα κορίτσια πωλούνται σε αραβικές χώρες. Όταν ο αγοραστής βαρεθεί ένα κορίτσι, είτε τη δίνει σε άλλους, είτε την ταΐζει στις τίγρεις».


          l'Unità, dal web al deep web        
Ne avevo scritto a gennaio, qui, e l'avevo trovata una storia di una tristezza infinita: le magagne economiche che affliggevano l'Unità si accompagnavano anche alla perdita dell'accessibilità del suo archivio storico, che per tanti - giornalisti, studiosi, ricercatori - rappresentava uno strumento utile. Oggi quella storia arriva ad una svolta, che ...
          An Insight To Deep Web And Dark Web – Everything You Need To Know        

Deep Web And Dark Web – In this age of high web technology, the usage of the web has increased tremendously. Thus search engines are on their ways to update their existing algorithms along with introducing new ones in order to keep pace with changing trends. Special protocols along with software are taken into usage […]

The post An Insight To Deep Web And Dark Web – Everything You Need To Know appeared first on .


          The Four Machines of Yoyodyne        
http://livedoor.blogimg.jp/kokinora/imgs/8/d/8d314644.jpg

Perception of thyself, the knowledge of him who created thee, the sense of the worship thou owest unto him, are not these plain before thy face? And behold! what is there more than man needeth to know?  -- 21-87

At the heart of Thomas Pynchon's 1965 psychedelic masterpiece of paranoia and the postal underground, The Crying of Lot 49, is a machine.

This machine has been designed by John Nefastis, an independent and somewhat disgruntled engineer and employee of Yoyodyne Inc. Yoyodyne, "one of the giants of the aerospace industry," occasionally surfaces as a murky conglomerate in Pynchon's fictional universe, but even more bizarrely it came to transcend even this rich imaginative cosmos.

Inspired by Lot 49, Yoyodyne would later appear in The Adventures of Buckaroo Banzai Across the 8th Dimension!, and even within the endless domain of Star Trek itself. The Nefastis Machine, a key to a great mystery, has become the prototype for equally esoteric devices in Buckaroo Banzai, Star Trek and through these, in post-Yoyodyne manifestations, to Back To The Future and beyond.

Four of these machines, using The Crying of Lot 49 as a guide to decode and decipher their arcane schemata, will be the focus of this essay: the Nefastis Machine, the Oscillation Overthruster, the Flux Capacitor, and the Yoyodyne Pulse Fusion Warp Drive.

The Sweet Breath of the Universe


In The Crying of Lot 49, the principle of the Nefastis Machine is described as being derived from a thought experiment by Scottish scientist, James Clerk Maxwell, an early theorist of electricity. The thought experiment came to be called "Maxwell's Demon":

The Demon could sit in a box among air molecules that were moving at all different random speeds, and sort out the fast molecules from the slow ones. Fast molecules have more energy than slow ones. Concentrate enough of them in one place and you have a region of high temperature. You can then use the difference in temperature between this hot region of the box and any cooler region, to drive a heat engine. Since the Demon only sat and sorted, you wouldn't have put any real work into the system. So you would be violating the Second Law of Thermodynamics, getting something for nothing, causing perpetual motion.

Perpetual motion. Unlimited energy. The fulfillment of the age long dream of getting something from nothing. A kind of space age horn of plenty.

Oedipa Maas, the protagonist of Pynchon's novel, quickly points out the problem in this equation. The demon, allowing for the moment that it could even exist, would still be required to separate the fast molecules from the slow molecules. Sorting itself, argues Oedipa, is a type of work.

Sorting is a form of work, concedes Stanley Koteks, another employee of Yoyodyne and an advocate of the Nefastis Machine, but it is "mental" work and not "work in the thermodynamic sense." The demon requires information, but as its sorting, in the original thought experiment, is "frictionless" it does no real work.

http://1.bp.blogspot.com/-FVZ0K4lzL6Q/VcJFHQIBr_I/AAAAAAAAAcs/F_R6zXCV3e8/s1600/Max2.jpg

Oedipa remains unconvinced, but she is curious enough to venture up to Berkeley to meet the inventor himself, John Nefastis, and to request a demonstration of his miraculous machine. Nefastis attempts to explain how it operates. Essentially, it involves the interplay of two types of entropy:

One having to do with heat-engines, the other to do with communication. The equation for one, back in the '30's, had looked very like the equation for the other. It was a coincidence. The two fields were entirely unconnected, except at one point: Maxwell's Demon. As the Demon sat and sorted his molecules into hot and cold, the system was said to lose entropy. But somehow the loss was offset by the information the Demon gained about what molecules were where.

The demon, whose sorting mechanism is activated by a psychic "sensitive" staring at a photograph of Maxwell, therefore, is the product of a mathematical synchronicity. It may even be the embodiment of the sync itself.

"Entropy is a figure of speech, then," sighed Nefastis, "a metaphor. It connects the world of thermo-dynamics to the world of information flow. The Machine uses both. The Demon makes the metaphor not only verbally graceful, but also objectively true."

A very insightful essay by N. Katherine Hayles, "'A Metaphor of God Knew How Many Parts': The Engine that Drives The Crying of Lot 49," puts this into the context of the scientific debate, propelled by Maxwell's thought experiment, of the relation between entropy and information.

Claude Shannon, called the father of modern information theory, dissented from the more conventional view that entropy and information were opposites. Shannon, compelled by the coincidence of the identical equations for information and entropy, used the two terms interchangeably.

In Shannon's view, systems rich in entropy are not simply poor in order; rather, they are rich in information. The key is to think of disorder as maximum information. So influential has this view become that in contemporary irreversible thermodynamics, entropy is seen as an engine driving systems toward increasing complexity rather than dissolution. In cosmology, it has recently been used to construct a model of the universe that does not end in heat death, because entropy bestows upon it the capacity to renew itself.

Pynchon, regardless of how well-versed he was in this particular scientific debate when he was constructing Lot 49 in the early Sixties, nonetheless intuitively grokked the intimate connection of information and entropy, of order and disorder.

https://www.itdojo.com/wp-content/uploads/2016/01/information-entropy.png

The Nefastis Machine, a device which generates energy from the differential of fast hot particles and slow cool particles, is itself an elaborate metaphor of the endless energy obtainable by the simultaneous positioning of order and chaos.

Apparently the purpose of the machine is to literalize the connection between information and entropy by converting information directly into mechanical energy... Just as a very small amount of mass is converted to an enormous amount of energy in Einstein's famous equation E=mc 2, so in the Nefastis Machine a huge amount of information is necessary to create a tiny amount of energy.

The almost impossible conjunction of mass and energy metaphorically parallels the equally uncanny, and yet more controversial, coupling of information and entropy. And for Pynchon it becomes clear that the atomic blast of imagination made possible by the conjoining of these opposites is as creative/destructive as anything derived from the Manhattan Project.

A Flipping Miracle


As in the magical work of Giordano Bruno, "in tristitia hilaris, hilaritate tristis" -- "cheerful in the midst of sadness, sad in the midst of cheerfulness" -- which Joyce in typical and maximal poetic concision in the Wake isolates as "laughtears," Hell and Heaven celebrate their chymical wedding within the pages of Pynchon. 

The ancient secret was divulged -- coinciding with the invention of the printing press -- by Nicholas of Cusa: 

But the whole effort of our human intelligence ought to center on those lofty [matters], so that the intellect may raise itself to that Simplicity where contradictories coincide.

And it was this thread that Bruno and his esoteric and literary successors took up and continued to weave.

http://www.ignoranteconstile.com/wp-content/uploads/2016/01/maschere-teatrali-445x497.png 

Tristitia and hilaritas also appear explicitly in The Crying of Lot 49. Dr. Hilarius, Oedipa's therapist is, perhaps paradoxically, partially modeled on the life and career of Dr. Timothy Leary. Like Leary, Hilarius is an early advocate of the use of LSD-25 for therapeutic purposes. And as with the efforts of Leary, the results of Dr. Hilarius' psychedelic therapy are decidedly mixed. 

Oedipa's husband, Mucho Maas (much more), a depressed and disenchanted DJ at Station KCUF (FUCK inverted -- the life force rechanneled towards commercialized death), becomes a victim of Hilarius' questionable prescriptions. Maas has mutated and multiplied into "a walking assembly of man," "a whole roomful of people," his identity encompassing the multitude. The one has become interchangeable with the many. And he achieved this transformation, via Hilarius' acid as catalyst, through sound. 

Spectrum analysis, in my head. I can break down chords, and timbres, and words too into all the basic frequencies and harmonics, with all their different loudness's, and listen to them, each pure tone, but all at once.

And here, just as those on the cultural margins were starting to feel the faintest shockwaves of the coming psychedelic explosion, Pynchon is revealing something which McLuhan and others realized at about the same time. The Eye, at least in its print-based dominance of the culture, was being avenged by the Ear. The tribal drums were beating again. 

Mucho Maas took the plunge back into the dark mass in pure ecstasy. His wife Oedipa, in her quest to unravel the riddle of Man, suffered the loss of individuality through increasing paranoia and dread.



The spoken word, either live or recorded, in universal transmission through electricity, is the portal back into the mire. The texts themselves have become unstable and illegible. The carved letters have worn off the Tables of the Law. Literary detachment is no longer possible. At every instant that a word is spoken an immediate link is created between that particular speaker and everyone else, regardless of time and place, who has ever uttered the same word. The link is in fact so strong that it forges an identity.

Everybody who says the same words is the same person if the spectra are the same only they happen differently in time, you dig? But the time is arbitrary. You pick your zero point anywhere you want, that way you can shuffle each person's time line sideways till they all coincide. Then you'd have this big, God, maybe a couple hundred million chorus saying 'rich, chocolaty goodness' together, and it would all be the same voice.

But this is madness, right? An obvious acid casualty, eh? Not so fast. Pynchon is marking the beginning of a new phase of culture, in the late 50s and early 60s, which later becomes categorized and watered down as "postmodern," and is the terrain of all his art. Immense energy is released when opposites are forced together. A sudden alchemical transformation of the senses has burst out in combined colour and sound:

When those kids sing about 'She loves you,' yeah well, you know, she does, she's any number of people, all over the world, back through time, different colors, sizes, ages, shapes, distances from death, but she loves. And the 'you' is everybody. And herself. Oedipa, the human voice, you know, it's a flipping miracle.

And the new era is distinctly psychedelic and electric:

You take it [LSD] because it's good. Because you hear and see things, even smell them, taste like you never could. Because the world is so abundant. No end to it, baby. You're an antenna, sending your pattern out across a million lives a night, and they're your lives too.

Madness and sanity, ecstasy and paranoia, speed and stasis, sound and vision, entropy and information, tristitia and hilaritas, all converge onto a single point. The artists as always -- Pound's "antennae of the race" -- are the first to notice and the first to make the transmission. The signal rapidly spreads, provoking an audible shudder through every citadel of power, increasing in volume to a dull roar. An earthquake of sound.

 http://smishok.com/uploads/posts/2015-03/thumbs/1427486319_008.jpg

Dr. Hilarius, a clinical father figure, a pillar and stalwart advocate of the reality principle becomes the victim of his own new eon medicine. LSD both shatters the facade of the beneficent patriarch and therapeut -- Hilarius is unveiled as an unrepentant former Nazi death camp mind control shrink -- and in this shattering invokes active and destructive paranoia -- he undertakes an armed assault on the police which he hallucinates as being Israeli secret service Nazi-hunters.

But -- and this is precisely the paradoxical point where absolute control implosively flips into ultimate anarchy -- Dr. Hilarius' final psychoanalytic summation is expressed at this crisis as the furthest thing possible from Nazi ideology:

"I came," she said, "hoping you could talk me out of a fantasy." 
"Cherish it!" cried Hilarius, fiercely. "What else do any of you have? Hold it tightly by its little tentacle, don't let the Freudians coax it away or the pharmacists poison it out of you. Whatever it is, hold it dear, for when you lose it you go over by that much to the others. You begin to cease to be."

Cherish your own singular madness, and do so proudly and in spite of whatever authority advises against it. Order becomes chaos, reality becomes fantasy. Every centre cannot hold. Mucho Maas is swept into multitude and ecstasy, Hilarius into singularity and paranoia, two poles of the same pulse. 

Hilaritas becomes tristitia, and tristitia, in The Crying of Lot 49, is the shadowy Tristero, a subversive and underground postal network that has existed in challenge to the the imperial and official service since at least the late Renaissance.As Oedipa's quest for truth progresses through Lot 49, more and more of the secret history of Tristero is unearthed. 

The Silent Empire


The Tristero emerged in radical opposition to the Thurn and Taxis' continent-wide postal monopoly. The Thurn and Taxis themselves were quite historical. They were the postal service of the Holy Roman Empire, and they arose and fell in tandem with the Empire's fate, forming around 1300 and not dissolving until Bismark bought them out in 1867. As information equals power, their monopoly on communication brought them immense power. Any challenge to their authority, in effect, is a direct affront to the reality of Empire.

https://altstveit.files.wordpress.com/2012/03/ausgabe6_2009_postteil1.jpg
The challenge came, as it often does, from within. In the late 1500s a rejected claimant to be rightful heir of the Thurn and Taxis estate and enterprise, Hernando Joaquin De Tristero y Calavera, decided to establish his own autonomous postal service. The Tristero was born. 

He [Tristero] began a sub rosa campaign of obstruction, terror and depredation along the Thurn and Taxis mail routes.

And as one of Oedipa's fellow researchers observed:

...Any period of instability for Thurn and Taxis must have its reflection in Trystero's shadow-state.

Subversion is the mirror of Empire. Entropy is the mirror of information. After several centuries in pursuit of insurrection and overthrow, perhaps culminating with the French Revolution, the Tristero was finally and forcibly suppressed in Europe after the failed revolutions of 1848. 

https://s-media-cache-ak0.pinimg.com/736x/bd/df/c1/bddfc1fd5f04912d2386f38fbca3619b.jpg

But this was not to be the end of Tristero. It reformed itself in the U.S.A. -- the new heart of Empire, which undoubtedly "never ended" -- and rebranded itself as W.A.S.T.E., "We Await Silent Tristero's Empire." It's symbol continued to be the muted post horn, a sign of its violent opposition to the communications monopoly. 

It is through this symbol that Oedipa picks up their scent. For in some inexplicable and maddening way, W.A.S.T.E. is connected to the estate of her billionaire ex-lover, Pierce Inverarity. Inverarity, after his passing, has willed Oedipa to be the executrix of this estate, and it is in the ordering of these affairs that Oedipa begins to get increasingly drawn into the Tristero mystery. 

Inverarity is not just any billionaire. He is the major shareholder of Yoyodyne and seems to own most of the Californian town of St. Narciso, the fictional setting of the novel. The range and depth of Inverarity's influence and power often appears superhuman. He is all present and all knowing. He reminds one of Dick's Palmer Eldritch or Bowie's alien character in The Man Who Fell To Earth. He is Yoyodyne, in all of its power and intrigue, personified.

And as Oedipa becomes progressively ensnared into Tristero's dark web -- to the point where she seriously questions her own sanity -- she begins to suspect that Inverarity might be behind it all. Four distinct and mutually exclusive possibilities arise in her speculations, and these four may be fruitfully applied to all research into the Conspiracy and its equally shadowy counterpart. The passage is worth quoting at length:

Either you have stumbled indeed, without the aid of LSD or other indole alkaloids, onto a secret richness and concealed density of a dream; on to a network by which X number of Americans are truly communicating whilst reserving their lies, recitations of routine, arid betrayals of spiritual poverty, for the official government delivery system; maybe even on to a real alternative to the exitlessness, to the absence of surprise to life, that harrows the head of everybody American you know, and you too sweetie.  Or you are hallucinating it.  Or a plot has been mounted against you, so expensive and elaborate, involving items like the forging of stamps and ancient books... so labyrinthine that it must have meaning beyond just a practical joke. Or you are fantasying some such plot, in which case you are a nut, Oedipa, out of your skull.

Either an authentic and effective, though clandestine and criminal, opposition to the Empire really exists, operating covertly within its fissures and margins; or we are simply imagining and projecting such an organization as a kind of wish fulfillment; or we are caught up in an elaborate plot by TPTB to make us think that such an opposition exists; or we are hallucinating the existence of such a plot -- likely implying that we are are truly insane. 

All such possibilities continue to exist, and none can be really ruled out. As the full spectrum dominance of the Empire becomes daily more totalizing any true rival would, of necessity, be its near match in absolute power, and perhaps in malevolent potential. More and more the two would resemble, if not in fact be, rival magical orders. 

http://37.media.tumblr.com/tumblr_lpr5e8zVSN1r1vo8so1_500.png

Each would foremost be obsessed with obtaining complete control over the channels of communication, thereby ensuring absolute sway over human perception. Lot 49's "Tristero" is the equivalent of the "Counterforce" of Gravity's Rainbow, and is echoed in the "deep web" of Bleeding Edge, Pynchon's most recent novel. 

It seems clear that Pynchon believes that such a counterforce -- at least in potential -- definitely does exist. And yet if we question its existence then we may, by the same argument, question the existence of the Empire itself. Perhaps the Counterforce is only projecting the image of an all-powerful Empire for its own nefarious purposes. 

Or could it just be that we are all insane? And yet, as is laid out in Lot 49, extreme paranoia is simply the reflection of supreme ecstasy. As one becomes unstable the other becomes secure. We are all being sorted and unsorted by Maxwell's demons and angels.

The Pentecostal Church of Sputnik


It is in San Fransisco that Oedipa at last takes the final plunge into a foundationless Walpurgisnacht of ultimate paranoia/ecstasy. She begins to perceive or imagine the Tristero everywhere and in everything. All is infused with meaning. The entire sphere of perception becomes branded by the muted post-horn. Is this madness or revelation? The numeric in the book's title provides an obvious clue.   

In an inspiring essay on Lot 49 by Pierre-Yves Petillon, "A Recognition of Her Errand into the Wilderness," this sign is uncovered.

The "whole story" of the novel takes place in an interim period of 49 days, a time which can be construed in two ways. First, 49 is 50 minus one, the fiftieth day of the Christian liturgical calendar (after Easter) being the Pentecost. The story takes place in the 49 days between the Easter rising of Christ and the awaited Pentecost when the Holy Ghost, speaking in a babble of voices, will typologically foreshadow the Day of Doom and ultimate revelation. But the 49 days also refers to another "interim," the 49 days during which, in the Tibetan Book of the Dead, the newly deceased slowly work their way toward final death and rest. In this sense, the interim period points not only forward to the "awful" things to come, but also backward toward a world slowly dwindling into oblivion.

To all of this should be added the traditional precursor to the Day of Pentecost: Moses' receiving of the stone tables of the Law after his 50-day visionary ordeal on Mount Sanai. But other parallels may also be included. 

http://ih.constantcontact.com/fs133/1111721973278/img/425.jpg

According to the research of Dr. Richard Strassman (a kind of benign version of Dr. Hilarius or Dr. Leary), DMT -- "the spirit molecule" -- first presents itself in the embryo after a period of 49/50 days. Strassman, also in reference to the Day of Pentecost and Tibetan Buddhism, suggests that with the formation of DMT the body becomes ensouled. 

And a more esoteric correlation might also be with the 49 to 50 year orbit of Sirius A with Sirius B. At this conjunction a very different Pentecostal radiation may enter our solar system. 

In every case, however, it is the descent of the Spirit that is described. The Word is made Flesh and the Flesh is made Word. As with the Nefastis Machine, it all has to do with communication, and every communication is also a miscommunication. Pynchon's books all explore a distinct period of time -- the very bleeding edge of meaning and noise -- and the "post" of the dual and dueling postal system of Thurn and Taxis/Tristero is also the post-modern. 

Starting with the late Fifties/early Sixties of Lot 49 and extending -- despite the temporary post-9/11 veneer of literalism and recategorization -- to the present day. And despite how dry and academic this narrative may have become on the one hand, or cliched and consumerist on the other, it really defines a truly exciting mass alternation of perception. 

And this, in turn, can be very precisely timed. Petillon, following Pynchon, hones in on the exact moment as Marshall McLuhan: the launching of Sputnik. The stifling stasis of the Eisenhower late Modernist mirage essentially ended on this day.

This came to an abrupt end in 1957 when America was jolted out of its complacency by the shattering news that the Russian Sputnik was orbiting the earth, and started waking from its drowsy, almost Edwardian languor. The Crying of Lot 49 is a record of that slow process of awakening, as new voices "humming out there," at first muffled and faintly heard, began to register.

As per McLuhan, nature and artifact became one with this launch. Collective human consciousness became externalized and identical with the body of the world. Heaven was finally married, in the garb of high technology, to Earth. And yet not unambiguously so. Was this the Day of Pentecost or the Fall of Babel? Was the satellite launched by the Empire or the Counterforce? Was it a triumph of information or entropy, ecstasy or paranoia? None can say. 

http://ext.pimg.tw/zitolife/1409844532-445815340_m.jpg

We are still trapped in this moment. It has only become more complex, more hardwired, more ambiguous. Nothing has been resolved. The energy generated by the conjunction of these opposites -- reducible from one perspective to Ear and Eye -- fuels all activity in the world today. And this same energy drives The Crying of Lot 49 and all of Pynchon's subsequent novels. Everything cries out for resolution, but there is no guarantee that this unstable instant won't loop on forever. There may be no final sorting.  

The Earth, the collective body of humanity, is one vast Nefastis Machine, its only purpose to transcend all limitations and to truly awaken the World Soul. In like manner, Pynchon's novel can be described in precisely the same terms as Umberto Eco once applied to Finnegans Wake:

...a complex machine destined to produce infinite meanings, operating beyond the years of it's own Creator.

Both texts are perpetual meaning machines. Artesian wells of signification. What Joyce invokes with thousands of inexplicably cross-referencing, multi-linguistic puns, Pynchon summons with an over-saturation of hyperlinked symbolism and imagery. 

Both authors, both engineers, have been rendered obsolete by their creations. For a perpetual motion machine is also an Artificial Intelligence. Once it overcomes, Frankenstein-style, its own creator it becomes enabled to create creators who are then equipped to create beyond themselves. A kind of singularity is the result, a singularity that works of art like the Wake and Lot 49 only mirror and prefigure in the culture at large.

And yet all of these machines -- really just one machine -- are driven by the same engine. As with the Nefastis Machine they are powered by the conjunction and differential of opposites. And ultimately -- as machines -- they are the extensions, since Sputnik stretching spherically on and above the surface of the planet, of human perception. 

https://upload.wikimedia.org/wikipedia/commons/0/0b/Ales_golem.jpg

The senses are only fully cleansed when they are merged in synesthetic ecstasy. All of the old categorical limitations to human experience -- time, space, causality -- are breached. The infinite has once more come dimly into view. And of course this understanding fully pervades the arts, even and almost especially in popular culture.

Ending the Exile in Matter


The Nefastis Machine, and its Yoyodyne origins, has taken deep root in the popular imagination. Its rhizomes of influence, though largely subterranean, extend nearly everywhere. After two decades of cult proliferation Pynchon's mycelium finally burst into flower with the 1984 movie, The Adventures of Buckaroo Banzai Across the 8th Dimension! This connection of Pynchon with the cult classic is by no means a secret. 

The film opens with Buckaroo Banzai's test drive of a jet car which has been specially rigged with the "Oscillation Overthruster." The Overthruster is a top-secret machine, first tested unsuccessfully in 1938, that is designed to allow vehicles to pass through solid matter. 

Let me ask you to imagine the Oscillation Overthruster as a sophisticated rifle accelerator firing a steady stream of protons at a target -- in this case a mountain -- and the Jet Car as a giant super-conducting magnet.

Banzai's test drive is a spectacular success. He drives at high speed directly through the rock body of a mountain, and the only anomaly is that a fairly harmless yet disturbing creature is found attached to Banzai's pick-up truck. The creature is a kind of hitch-hiker/parasite from the 8th dimension, and the appearance of this being immediately recalls the original 1938 experiment.

https://media.giphy.com/media/8HJKqeEtAoOqc/giphy.gif
During this experiment, the Overthruster only succeeded in projecting its operator, the physicist Emilio Lizardo, partially through a rock barrier. Lizardo becomes temporarily trapped in matter and before he is released his mind becomes possessed by John Whorfin, the commander of a reptilian alien race, the Red Lectroids. Whorfin was himself exiled with his followers into the 8th dimension by a rival and more benevolent race of reptilians from the same planetary system, the Black Lectroids.

After a bloody reign of terror, the hated leader of our military caste, the self-proclaimed "Lord" Whorfin, a bloodthirsty butcher as evil as your Hitler was overthrown by freedom-loving forces, tried, and condemned, along with several hundred of his followers, to spend eternity in the formless void of the Eighth Dimension. Death was deemed too good for their ilk.

Whorfin through his host body, Lizardo, arranges a Red Lectroid invasion of the Earth. This event was factually reported through Orson Welles' 1938 radio broadcast, The War of the Worlds, which was later dismissed -- transformed into a cover-up -- as a total spoof.



And here the blatant tie-in with Lot 49 begins. Whorfin's Red Lectroid followers disguise themselves as humans and establish a company, Yoyodyne Propulsion Systems. As in Lot 49, Yoyodyne is a major U.S. defense contractor, whose covert objective is the manufacture of an effective Oscillation Overthruster in order to release the remaining Red Lectroids encased in the 8th dimension. 

For decades, despite growing influence over the U.S. government, they failed in this aim. Now, however, news of Banzai's success has provoked Whorfin to launch, through Yoyodyne, an assault on Banzai to steal the Overthruster and liberate their comrades. 

The rest of the movie boils down to a fairly conventional struggle between Banzai and his "Blue Blaze Irregulars" (the Tristero/Counterforce), assisted by the Black Lectroids, versus the Red Lectroids and Yoyodyne (Thurn and Taxis/Yoyodyne again).    

The occult conspiratorial subtext of Buckaroo Banzai is obvious. An evil reptilian race with effective control over the U.S. Military Industrial Complex, the very heart of Empire, is engaged in a long term magical/high technological operation to liberate their fallen captains from the prison of matter.

Nothing could be clearer. The Red Lectroids are a perfect match with the Qliphoth of the Kabbalah. The Oscillation Overthruster is a high-tech version of the Philosopher's Stone, the object of both being final transcendence from the corruptibility and density of the material realm.



Use of the Overthuster, like the Stone, can bring about both liberation or further enslavement. Like the Nefastis machine it is driven by contradiction, by the conjoining of opposites. As the Nefastis Machine represents the overcoming of energy, the Oscillation Overthuster overthrows the bounds of matter. Maxwell's demons have been unchained from the 8th dimension.

Trumping and Humping Space and Time


The impact of Buckaroo Banzai, saturated with the esoteric insights of Lot 49, was like a bomb blast. And in the year after its release it detonated an even bigger explosion. The deep influence of Buckaroo Banzai on Back to the Future is both explicit and fully admitted.

The plot of Back to the Future, which is so well known that it is unnecessary to explore in great detail, centres around the use of a DeLorean equipped with a plutonium-powered "Flux Capacitor," enabling travel through time.

November 5, 1955! That was the day I invented time-travel. I remember it vividly. I was standing on the edge of my toilet hanging a clock, the porcelain was wet, I slipped, hit my head on the sink, and when I came to I had a revelation! A vision! A picture in my head! A picture of this! This is what makes time travel possible: the flux capacitor!

Time travel itself is not a new idea in popular culture. H.G. Wells' 1895 book, The Time Machine, is an obvious precursor, but unlike earlier works of fiction like this which treated a different time as essentially a different place, Back to the Future was one of the first mega-popular presentations of time and causality as things that could be manipulated, treated as objects that could be molded and/or overcome through conscious will.

http://www.backtothefuture.com/news-events/news_images/1_FC-PartI_850.aspx

And as the Flux Capacitor was quite blatantly identical to the Oscillation Overthruster (even to the extent that it is positioned in exactly the same location in the DeLorean as the Overthruster is in the Jet Car) the occult subtext also becomes clear.

The transcendence of time is equated with the transcendence of matter. The realm of the exiled Saturn is at the dark heart of the kingdom of matter. In both films, however, the transition to transcendence is not yet complete. Complications arise, parts are missing, the will to liberate is opposed by the powers of limitation.

While Buckaroo Banzai may parallel Marty McFly, as Dr. Lizardo prefigures the "Mad" Doc Brown, there is no precise correlation to Yoyodyne and the Red Lectroids in Back to the Future. The Libyan terrorists function as villains, and Biff Tannen (especially in the alternate timeline of Back to the Future 2 in which he resembles a mega-rich Donald Trump-like incarnation of Pierce Inverarity) does steal the Flux Capacitor to enrich himself, but there is no conscious and dark imperial agenda at play.

Instead, it is the complications of causality itself that prevents the full command of time. As with the Nefastis machine and the Oscillation Overthruster, and as with the post-Sputnik liminality and synesthesia of postmodernity in general, accidents occur, unintended consequences inevitably arise, forces are disturbed that before were at rest. "Yoyodyne" is abstracted as the cranky wiles of Time proper, pissed off at being shaken from its clockwork slumber.

Yoyodyne, however, does soon after explicitly appear as an essential component within the parallel pop cultural dimension of Star Trek in a direct tip of the hat to Buckaroo Banzai. Here, at least since the 23rd Century, Yoyodyne Propulsion Systems has been constructing starships for the United Federation of Planets.

In particular, it is the Yoyodyne Pulse Fusion Drive which enables Federation starships to zip across galaxies at Warp Factor 4. This engine essentially eliminates the bounds of Space as the Flux Capacitor does with Time, and the Nefastis Machine does with the so-called laws of Energy.

http://media-cache-ec0.pinimg.com/736x/e6/af/f2/e6aff2d9b13719f6ff99243c3df40f92.jpg

It is interesting that in the Star Trek universe, Yoyodyne is portrayed as an indispensable industry of the Federation of Planets. Presumably, in the timeline of Star Trek, Banzai and his Blue Blaze Irregulars failed to stop Yoyodyne and the Red Lectroids. In contrast Yoyodyne, just as it is in The Crying of Lot 49, is at the very heart of the Military Industrial Complex, now expanded out to galactic proportions.

And at the heart of the Empire, now rebranded as a "Federation," is the same reptilian, Qlippothic intelligence fully addicted to dominating the passage between Spirit and Matter. The manipulative vision of Pierce Inverarity and Biff Tannen now UBIKquitous. Gene Roddenberry's channeled Nine, now lords of Space, Time, Matter and Energy for all eternity.

 http://www.lcars.org.uk/roddenberry/240x3201.jpg


Anarchists also Believe in Another World


Or so goes the dark interpretation of the collective imagination, paranoia triumphant. Pynchon, however, master of paranoia, is not nearly this bleak. Every system, no matter how totalitarian, has its exceptions, has its pockets and enclaves of resistance, that are entirely free of control. And by their very existence and example these pockets continue to threaten to provoke the complete overturning of consensus reality.

The key to this in The Crying of Lot 49 is what one of its characters, Jesús Arrabel, refers to as an "anarchist miracle."

You know what a miracle is. Not what Bakunin said. But another world's intrusion into this one. Most of the time we coexist peacefully but when we do touch there's cataclysm. Like the church we hate, anarchists also believe in another world. Where revolutions break out spontaneous and leaderless and the soul's talent for consensus allows the masses to work together without effort, automatic as the body itself. And yet, señá, if any of it should ever really happen that perfectly, I would also have to cry miracle. An anarchist miracle.

A miracle as "automatic as the body itself," the spontaneous coming together of the multitude as singularity, without design, without leaders, without loss of personal identity and without, or at least beyond, technology itself.

http://www.lawyersgunsmoneyblog.com/wp-content/uploads/2015/03/guerin4.jpg

Oedipa, returning back to her hotel after her dark Pentecostal sojourn through the post horn haunted streets of San Fransisco, is swept right up in such a miracle. She is dragged along by delegates of a deaf-mute convention into the ballroom and whisked into the waltzing mass. Even here, in the complete absence of any audible music as a centralizing principle, a kind of spontaneous order miraculously emerges.

Each couple on the floor danced whatever was in the fellow's head: tango, two-step, bossa nova, slop. But how long, Oedipa thought, could it go on before collisions became a serious hindrance? There would have to be collisions. The only alternative was some unthinkable order of music, many rhythms, all keys at once, a choreography in which each couple meshed easy, predestined. Something they all heard with an extra sense atrophied in herself. She followed her partner's lead, limp in the young mute's clasp, waiting for the collisions to begin. But none came. She was danced for half an hour before, by mysterious consensus, everybody took a break, without having felt any touch but the touch of her partner. Jesús Arrabal would have called it an anarchist miracle.

A kind of inexplicable inner music has become manifest, generated, apparently, by the waltzing, whirling dancers themselves. Each private rhythm, no matter how distinct, somehow naturally synced, without any loss of individuality, with that of the collective whole. Order has emerged from chaos, information from entropy.

And in Thomas Pynchon's very first novel V. (1963), we find that the origin of Yoyodyne, the paragon of Empire, is also founded on the harnessing of this same dynamic, spontaneous and spiraling energy. Yoyodyne, once again described as a powerful U.S. Military contractor, had its humble background in the late Forties as the Chiclitz Toy Company.

 https://s-media-cache-ak0.pinimg.com/736x/12/ee/6a/12ee6adad8af8be52cde4e11bb93a33a.jpg

Its owner, Bloody Chiclitz, capitalizing on the craze for toy gyroscopes, discovered that these same devices were always in demand by the military in its manufacture of ships, airplanes and missiles. He recognized an immense business opportunity that was not to be passed up.

Chiclitz started making gyros for the government. Before he knew it he was also in telemeter instrumentation, test-set components, small communications equipment. He kept expanding, buying, merging. Now less than ten years later he had built up an interlocking kingdom responsible for systems management, airframes, propulsion, command systems, ground support equipment... Chiclitz christened the company Yoyodyne.

The name "Yoyodyne" stems directly from this new enterprise. Dyne is a unit of force, and yo-yo is the spinning, spiraling dynamo at the heart of the engines of Empire. The anarchist miracle of spontaneous play harnessed and channeled into captivity and death. The power source is identical, and here a great mystery is revealed. What has become external can once again become internal. What has become trapped can once again fly free.

http://www.navigadget.com/wp-content/postimages/2010/10/gyroscope-gps.jpg

Yoyodyne, in all of these fictional representations, is associated with propulsion, with movement, with an energy that arises from the coincidence of opposites. The movement of this energy is necessarily spiral, it uneasily combines and transcends both the open-ended and manic "progress" of linearity and the suffocating stasis and sameness of circularity. It is neither loop nor line of flight, neither Ear nor Eye.

And there is no mistake that Pynchon uses this as the central symbol of his work. It is the timeless image for all adepts. From the Presocratics, to Plato in his Timaeus, to the Neoplatonists, the motion of both the soul and the World Soul (micro/macro reflections of one another) has been described as spiral in its dynamic form.

Evelyn Underhill, author and probable initiate of the Hermetic Order of the Golden Dawn, traced this same idea through Christian mysticism. She begins her 1922 book, The Spiral Way, with the Latin epigraph:

Gyrans gyrando vadit spiritus.

"Spiraling the spirit goes."Yoyodyne, the propulsion engine of Empire, has monopolized and externalized through high technology the very dynamics of the soul.

http://1.bp.blogspot.com/-1buXC49VRfc/T434yq3jIOI/AAAAAAAAC2k/GIZgyYHJQV0/s1600/Denver+5_Plate38.jpg

Accomplishments and Capabilities


Ioan Couliano, the brilliant intellectual successor of the Romanian historian of religion, Mircea Eliade, explains in his indispensable Eros and Magic in the Renaissance (1987), that technology and the magic of the soul are virtually indistinguishable.

Historians have been wrong in concluding that magic disappeared with the advent of "quantitative science." The latter has simply sub­stituted itself for a part of magic while extending its dreams and its goals by means of technology. Electricity, rapid transport, radio and television, the airplane, and the computer have merely carried into effect the promises first formulated by magic, resulting from the supernatural processes of the  magician: to produce light, to move instantaneously from one point in space to another, to communicate with faraway regions of space, to fly through the air, and to have an infallible memory at one's disposal. Technology, it can be said, is a democratic magic that allows everyone to enjoy the extraordinary capabilities of which the magician used to boost.

Technology may be a democratic magic in the sense that everyone, given the economic means, can access it without elite or arcane initiatic training, but it remains extremely undemocratic in its, at least at present, dependence on highly centralized frameworks of economic and political control -- AKA the Empire.

Technology, the extensions of the body, also extends and externalizes, and thus overshadows and suppresses, the former functions or abilities of the soul. Whereas in previous ages an adept was able to singularly transform the entire field of perception, these powers are now made universal, demystified and dulled, yoked to a machine of doom. What in the Yoga Sutras are described as the siddhis, the "accomplishments," have now become commonplace.

He [the Siddha] is said to possess eight powers: the atomic, the power of assimilating himself with the nature of the atom, which will, perhaps, involve the power to disintegrate material forms; the power of levitation; the power of limitless extension; the power of boundless reach, so that, as the commentator says, "he can touch the moon with the tip of his finger"; the power to accomplish his will; the power of gravitation, the correlative of levitation; the power of command; the power of creative will. These are the endowments of the spiritual man. 

 https://jfdeters.files.wordpress.com/2014/06/fakir-sadhu-group-of-india-1898.jpg

But, as Couliano goes on to explain, no technology has replaced magic "on its own terrain." This involves the active manipulation of erotic energy to fashion direct intersubjective relationships.

To the extent they have an operational aspect, sociology, psychology and applied psychosociology represent, in our time, indirect continuations of magic revived.

To this of course we can add, and Couliano later does, advertising, government propaganda, mass media, public education, chemical programming, and more overt forms of mind control. All of these are directed towards causing individuals, primarily through fear and distraction, to forget, both within themselves and in their relations with others, that their own bodies and souls are at the very centre of the alchemical process, and that no external technology can be superior than the potential that lies in slumber within.

Another Golden Dawn initiate, Paul Foster Case, puts this powerfully in Hermetic Alchemy: Science and Practice (1931):

Perfect mastery of the alchemical process puts the successful artist in a position which enables him, at will, to alter the electronic structure of any portion of the physical universe. The process, nevertheless, has for its primary object the mental and physical transmutation of the alchemist himself. And the one laboratory in which the entire operation is performed is the human body.

The alchemist's athanor is his or her own body/soul complex. A true democratization of magic would involve the transformation of technology in which it becomes finally liberated from the dark magic of the Machine, in which it becomes decentralized, internalized, "ephemeralized" once again.

http://4.bp.blogspot.com/_F6c00HkjspY/RlxBDDLVpKI/AAAAAAAAAOk/XXXEEGM4jHg/s400/cz06.jpg

No longer, on the other hand, would these tools and knowledge be the monopoly of an occult elite. Instead, like present technology, they would become the common inheritance of everyone. An end has come to the false wisdom of tradition and the false progress of modernity, a spiraling out from beyond the tyrannies of the Circle and the Line.

But, as is explored here, this process is by no means complete. The Omega Point has not yet been reached. Neither the Empire nor the Counterforce, nor any shades and permutations of either, nor an imaginary or hallucinatory projection of either or both, have fully grasped the swirling Stone.

For this, a full overcoming of the limitations and categories of human perception is required. As Kant -- writing at the apex of the print domination of consciousness in the 1700s -- deeply recognized, human understanding is seemingly forever fenced in by the hardwired categories of time, space, causality, form and so on. Only poetic visionaries like Blake could see beyond this. By no means, in this poetic view, is our psyche on lockdown.

It is our senses, for Blake "the chief inlets of Soul in this age," which are obstructed, with one sense, "single vision," isolated and elevated above the rest. Blake viewed this process of cleansing perception as an inner and mythological one. As it turns out, however, the process has become technological.

And this goes onto explain the four machines of Yoyodyne. These four, and they are by no means only depicted in these films, or in these forms, are portrayals within art -- where technology is always first conceived -- of the final overcoming of energy, matter, time and space.

https://upload.wikimedia.org/wikipedia/commons/thumb/0/09/Die_Zwitscher-Maschine_(Twittering_Machine).jpg/442px-Die_Zwitscher-Maschine_(Twittering_Machine).jpg

These four may be easily mapped onto the fourfold psychic mandalas of Blake, Joyce, Jung and arguably McLuhan. The Yoyodyne Propulsion Warp Drive, overcoming space, opens the Eye. The Flux Capacitor, conquering time, unblocks the Ear. And the Nefastis Machine and the Oscillation Overthruster can be corresponded to Taste and Smell, the respective obsolescence of energy and matter.

Revving Up the Cardiac Synthesizer


And at the centre of it all? "At the centre of it all: your eyes." This, quite evidently, does not refer the organs of sight alone. The physical eyes by themselves, as Blake taught, only allow "single vision," a linearized, rationalized vista entirely bereft of the imagination. "Double vision," in contrast, takes place in the heart -- what Couliano in his study of Renaissance magic termed the "cardiac synthesizer."

It is here, in the "common sense," where full synesthetic "images" are assembled and then projected out through the entire body/soul complex, where the imagination resides. Its combined and unobstructed sensory experience is called "touch" by the poets, and "tactility" by Marshall McLuhan. It is the living energy of Eros.

And yet -- according to McLuhan due to the domination of print and literacy, and according to Couliano due to soul-extinguishing repression of the Reformation/Counter-Reformation culminating in the general slaughter of the Thirty Years War (the two are tightly bound) -- for centuries the West has been disconnected from this centre. The linear, the literal, the rational, the categorical, the superficially visual -- single vision -- have been in full ascendance.

Then, beginning as always with artists and other sensitives, the Romantics, the Symbolists, the Modernists aimed to challenge and subvert the prevailing tyranny of the senses. The expansion in perception enabled by their art eventually had its affect on science and technology, and most notably media technology -- perception made collective and extended across the Earth. Sputnik enacted the final extension, Earth was wed once again to Sky.

Finnegans Wake prefigures, in a real sense embodies, this transformation. The Crying of Lot 49 mirrored it as it happened. Both books, imaginative machines, open texts, are artistic prototypes of what is occurring in global culture as a whole. The senses are becoming cleansed, enhanced, merged in a new electric, erotic, psychedelic stew. The illusory bonds of perception are being broken daily.

https://buddhistartnews.files.wordpress.com/2011/02/24enter-1-articlelarge.jpg

Powers and counter-powers, conspiracies and counter-conspiracies, of all magnitudes and alignments are operating both openly and covertly to promote, accelerate, suppress, distort, channel and/or extinguish this mad pageant towards eventual synesthesia. Social, political, economic and psychic chaos is the direct result of these attempts. And while the process is by no means predictable its outcome is assured.

The four machines of Yoyodyne -- or should this be the four machines of the Counterforce? -- are fictional representations of the opened senses, of the shattered barriers of perception. Fiction necessarily precedes technological manifestation, but in this case fiction trumps reality. Language is the most subtle, the most ephemeralized and penetrating technology and it is within words and images that the body/soul conducts its metamorphosis.

So the machines of Yoyodyne are not merely fictional. They are phantasmic and interlocking components of an even greater inner technology. As these machines transcend energy, matter, time and space, they synergize and combine to unlock the full forces of perception. And this centre has also been depicted in popular art. The monolith, in 2001: The Space Odyssey, perhaps comes closest to representing this device in both its primacy and grandeur -- a black slab of stone.

 http://i.imgur.com/xahCaby.jpg?1

And as Joe Alexander's excellent video, "Back to the Future Predicts 9/11," reveals, at the core of Back to the Future, through 9/11 and 2001, is the message to "touch screen," to touch the film, to touch the monolith even in its smartphone miniaturization and personalization, and to shake off the scales of perception itself.

"Touch," in this sense, McLuhan's tactility, is the synesthetic common sense that has been the goal of all artists trapped in the centuries of print, rule by the Eye. All opposites combine here -- information and entropy, ecstasy and paranoia, even Yoyodyne and Tristero. Shaun the Post and Shem the Pen are reconciled here. Yet all is not revealed instantly.

 http://www.ismaweb.net/wp-content/uploads/2014/01/adha1.jpg

The heart is veiled, the monolith is buried, kept hidden by Maya, by matrix. And it is precisely this matrix which is first explicitly presented in The Crying of Lot 49:

For it was now like walking among matrices of a great digital computer, the zeroes and ones twinned above, hanging like balanced mobiles right and left, ahead, thick, maybe endless. Behind the hieroglyphic streets there would either be a transcendent meaning, or only the earth.

The crying is also a scrying, the lot is also a plot. But why not, as Oedipa discovers, transcendent meaning and the Earth? The binary ones and zeroes of the matrix are only the alchemically fused images that drive the central machine, the cardiac synthesizer. And within this athanor the anarchist miracle occurs, qlippothic and pentecostal. The four machines, the four senses, enfold in a vortex upon the fifth. And the matrix itself, however we fashion it, becomes our own creation:

The transmutation instrument is the body of the alchemist himself, subtly changed by the Great Work, so that by mental imagery alone he can make matrices into which the universal substance will flow and take those forms. -- Hermetic Alchemy: Science and Practice

As proclaimed by the Empire? Or the Counterforce? Or do these distinctions even matter? 

   Esta é a segunda parte da Terrorspectiva 2017, continuando o trabalho da primeira parte que trouxe os principais lançamentos internacionais de livros de terror, desta vez são os lançamentos do mercado nacional que ganham destaque. Algumas das obras já foram resenhadas por aqui e estão referenciadas com seus respectivos links, outras eu já li, mas não tive tempo de escrever uma resenha, então fiz alguns comentários e ainda há aquelas que estão na lista de próximas leituras. Há tanto lançamentos de grandes editoras, que você pode encontrar em qualquer livraria, como de autores independentes que podem ser encontrados apenas em formato virtual, a lista é grande e mostra como o gênero está forte no mercado. 

Janeiro

Medo Clássico: Edgar Allan Poe
   Seguindo o padrão quase psicopata de qualidade que os leitores já esperam da DarkSide® Books, o livro é uma homenagem a Poe em todos os detalhes: da capa dura à nova tradução feita por Marcia Heloisa, pesquisadora e tradutora do gênero, além das belíssimas ilustrações em xilogravura feitas pelo artista gráfico Ramon Rodrigues. E o mais importante: o conteúdo selecionado que recheia as 384 páginas deste primeiro volume de Edgar Allan Poe: Medo Clássico. Pela primeira vez numa edição nacional, os contos estão divididos em blocos temáticos que ajudam a visualizar a enorme abrangência da obra. A morte, narradores homicidas, mulheres imortais, aventuras, as histórias do detetive Auguste Dupin, personagem que serviu de inspiração para Sherlock Holmes. O livro traz ainda o prefácio do poeta Charles Baudelaire, admirador confesso de Poe e o primeiro a traduzi-lo para o francês.

Histórias para NÃO dormir de Fabiana Madruga
   Qual seu maior medo? O que você não revela pra ninguém? Abrir esse livro é aceitar um convite e um desafio para encontrá-lo em uma das histórias dessa coletânea de contos que têm em comum o horror - que tem uma de suas tantas facetas explorada por cada uma das histórias. Tome coragem para entrar nesse universo, tome fôlego para seguir dentro dele até o final e tome bastante água antes de ir para a cama depois dessa leitura ou você vai ter muitas noites de sede sem querer levantar de madrugada. 

Comentário:
   Histórias para não dormir é uma macabra coleção de contos de terror que me surpreendeu pela qualidade e originalidade das estórias, a narrativa de Fabiana Madruga é ágil e através da simplicidade consegue fazer o leitor se arrepiar com a verossimilhança de suas visões, seu domínio é o horror psicológico, com ecos de Stephen King, mostra que é uma profunda conhecedora dos medos humanos e dos lugares onde eles se escondem.

A Sombra do Cão de Alec Silva
   No interior da Bahia, um mal antigo persegue um rico fazendeiro, que assiste tudo o que possuía ser consumido por um espírito vingativo e demoníaco, um Cão Negro que não mede esforços para castigar aqueles que lhe tomaram algo no passado.

Comentário:
   A Sombra do Cão é um conto de Alec Silva  publicado na Amazon no início do ano, um aperitivo de sua coletânea de horror sobre a enigmática figura do Cão Negro que há anos está em produção. Meu primeiro contato com a escrita do autor foi através de seus contos sobre o homem-cão na antologia Green Death: Ecoterrismo Licantrópico. O Cão Negro é um entidade demoníaca que ao longo dos tempos persegue os descendentes de uma família, buscando vingança por um acontecimento misterioso do passado. A Sombra do Cão relata um desses embates que acontece em uma pequena fazenda do interior e é totalmente gore da primeira à última linha. Aguardo ansiosamente o lançamento da coletânea completa.

Ruínas na Alvorada de Eduardo Kasse
   Ruínas na Alvorada é o quinto e último romance da Série Tempos de Sangue, de Eduardo Kasse. Harold Stonecross caminha pelas trevas desde que foi transformado há meio milênio em um imortal, quando trocou a sua alma para salvar quem amava.

Comentário:
   Eu li apenas o primeiro livro da série Tempos de Sangue, O Andarilho das Sombras de Eduardo Kasse, uma história de vampiros que passeia deliciosamente entre o horror e a fantasia, que conta ainda com Deuses Esquecidos, Guerras Eternas, O Despertar da Fúria e agora Ruínas da Alvorada. Espero esse ano mergulhar ainda mais fundo no universo sombrio de Kasse.

The Walking Dead: Busca e Destruição de Jay Bonansinga
   Lilly Caul e seu bando acreditaram que a paz estava mais próxima. Uma velha ferrovia que ligava Woodbury e Atlanta permitiu um projeto de reconstrução que acarretaria uma nova era de trocas, progresso e democracia. Isso até a cidade ser mais uma vez atacada e todas as crianças raptadas. Quem seria capaz submeter inocentes a tal violência gratuita, e por quê? As respostas para tais perguntas vão revelar que os mortos-vivos não são o maior problema do mundo pós-apocalipse. O maior dos desafios sempre repousa em seus adversários humanos.

Comentário:
   Os livros de The Walking Dead apresentam uma história alternativa a série de televisão, o que era inicialmente para ser uma obra sobre as origens do temido Governador, acabou se expandindo para uma história própria com protagonistas próprios se apropriando de ambientes da TV. A Ascensão do Governador é um ótimo livro, o plot twist final é magnífico, mas a partir da O Caminho para Woodbury a história vai perdendo força e tem seu ápice numa desnecessária edição dividida em dois volumes, chamada A Queda do Governador, que apesar de sanguinário decepciona por enrolar demais na ação. Após isso, Robert Kirkman deixou a cargo de Jay Bonansinga a direção completa do rumo da série de livros e como resultado surgiram: Declínio, Invasão e Busca e Destruição. Ainda não li nenhum livro deste novo arco escrito por Bonansinga e para falar a verdade as opiniões que vi a respeito afirmam que não estou perdendo nada. 

Fevereiro

Deuses Tupiniquins de M. R. Terci
   Bem-vindos a um mundo governado pelo caos, pela fome e pela miséria. Um lugar escuro, onde poder vale mais do que vida e o sangue é a única moeda de troca. Bem-vindos ao exato momento em que toda loucura e perversidade do abismo abre o banquete; a sujeira da alma humana será servida numa bandeja de prata à míngua das mais nobres virtudes e das verdades mais incontestáveis da natureza. Bem-vindos, DEUSES TUPINIQUINS, ao nosso mundo moderno.

Comentário:
  Deuses Tupiniquins é a continuação direta de Mythos - O fim do Mundo é logo ali e traz uma mistura de suspense noir com horror cósmico. No universo de Terci, os deuses indígenas são reais e caminham entre nós, na verdade eles estão putos desde a época do descobrimento do Brasil, quando os portugueses desembarcaram por aqui trazendo a religião cristã e destruindo praticamente todos seus adoradores. Então o que grande parte deles quer é destruir cada ser humano que cruzar seu caminho. Nos dias atuais esses deuses trafegam à margem da sociedade, em becos escuros, bares de má fama e casas assombradas. Com uma narrativa ágil e viciante é perfeito para quem procura uma leitura rápida e sangrenta.

Caligem de Dark Gero
   Nesta edição, um aspirante a escritor recebe de seu psiquiatra, durante uma de suas sessões de terapia, uma cópia de uma tese sobre a "síndrome do Obsessor", de um psiquiatra holandês, e um documentário em VHS sobre o assunto sem legendas português. Com a ajuda da esposa, que sofre da síndrome do pânico, o homem se torna obcecado pela escrita do livro, mas é ela quem passa a ser atormentada por pesadelos vivos, aprisionada em sua própria casa e pondo em risco a vida do filho de quatro anos de idade.

Comentário:
   Existem algumas histórias que conseguem ultrapassar a barreira das páginas do livro e afetar diretamente o leitor, causando uma impressão tão forte que ficam marcadas para sempre na memória e servem de fonte para incontáveis pesadelos. Caligem é uma dessas histórias, uma dissecação brutal da gênese de todos os medos, a perturbadora "síndrome do Obsessor" vai tirar seu sono! Caligem é o melhor livro de terror que li neste primeiro semestre.


Eu estou pensando em acabar com tudo de Iain Reid
   No romance de estreia do canadense Iain Reid, Jake conduz o carro em que ele e a namorada, que narra a história, vão à fazenda dos pais do rapaz. Durante a longa viagem por estradas desertas e escuras, a garota, atormentada com a perseguição de um homem misterioso que deixa sempre a mesma mensagem de voz em seu telefone, pensa em encerrar o relacionamento com Jake. Mas talvez seja tarde demais. 

Frankenstein, ou o Prometeu Moderno de Mary Shelley
   A obra-prima de Mary Shelley que deu origem ao terror moderno está de volta, numa edição monstruosa como só a DarkSide Books poderia lançar: capa dura, tradução primorosa, ilustrações inéditas do artista brasileiro Pedro Franz, além de quatro contos extras que versam sobre o mesmo tema do romance. Impresso em duas cores: preto e sangue. Um livro que todos deveriam ler e reler ao longo da vida. A edição definitiva para se guardar para sempre.

Comentário:
   Frankenstein é a segundo livro da coleção Medo Clássico, nova linha da Darkside Books que promete relançar os clássicos da literatura de terror, o primeiro foi Edgar Allan Poe e o próximo é H. P. Lovecraft. O livro além do romance de Mary Shelley traz outros quatro contos da autora com tema semelhante, mas diferente do livro de Poe, essa edição ficou péssima para se ler. Querendo imitar a tipografia de livros antigos, o que visualmente ficou bonito, a Darkside utilizou uma fonte muito pequena e nada amigável aos olhos. 

Março

O bazar dos sonhos ruins de Stephen King
   Mestre das histórias curtas, o que Stephen King oferece neste livro é uma coleção generosa de contos – muitos deles inéditos no Brasil. E, antes de cada história, o autor faz pequenos comentários autobiográficos, revelando quando, onde, por que e como veio a escrever (ou reescrever) cada uma delas. Temas eletrizantes interligam os contos; moralidade, vida após a morte, culpa, os erros que consertaríamos se pudéssemos voltar no tempo... 

Comentário:
  O Bazar dos Sonhos Ruins é a nova coleção de contos de Stephen King e reúne seus últimos trabalhos no gênero, formada por 19 contos e dois poemas, grande parte já publicados em revistas ou em formato digital, sendo que dois deles, Mister Delícia e Obituários são inéditos, este último recebeu o Edgar Alan Poe Award de melhor conto.  O diferencial desta coleção está nas breves introduções que Stephen King faz antes da cada uma das estórias, uma espécie de carta direta para o seu leitor fiel na qual discute suas inspirações e contextualiza aspectos pessoais presentes no texto. [Leia a resenha do Biblioteca do Terror]

O Olho de Vidro e outras histórias de Higor Benizio
   Numa demonstração envolvente de que terror e cotidiano andam sempre juntos, Higor Benízio dá vida aos demônios mais imprevisíveis em seis contos intensos com a marca inconfundível do autor. Desde uma herança maldita: um olho de vidro, até as profundezas de mentes perturbadas como as de Elias, um pai que perdeu as rédeas da própria família, e Natasha, uma garota de programa que acaba por se envolver em maus bocados, o terror se apresenta em suas várias facetas, uma pior que a outra.

O eco de Scott Nicholson
   Seis semanas após o choque. A fumaça diminui no horizonte e Rachel Wheeler parte com seus dois companheiros para uma viagem às montanhas, onde o avô Franklin construiu um complexo de sobrevivência. No entanto, os sequelados — pessoas que sofreram estranhas mutações — parecem estar mudando de assassinos sanguinários a uma força muito mais ameaçadora. Uma instalação militar secreta pode ser a chave para a reconstrução da civilização, mas Franklin não confia nas intenções de seus ocupantes. Os sequelados estão adaptando-se ao novo mundo mais rápido do que os sobreviventes humanos, que devem lutar por seu lugar em um futuro que talvez não conte com eles.

Abril

O Segredo dos Corpos de Dr. Vincent Di Maio, Ron Franscell
   O Segredo dos Corpos disseca casos surpreendentes que ajudaram a construir a reputação do dr. Vincent Di Maio. Como a exumação de Lee Harvey Oswald, suposto assassino do presidente Kennedy. Ou a investigação pela morte do adolescente Trayvon Martin, em 2012, na Flórida, crime que acabaria impulsionando o movimento Black Lives Matter, de denúncia contra o racismo na sociedade norte-americana. O livro apresenta ainda casos reais de serial killers que ainda aterrorizam o imaginário popular. E num capítulo especial, o autor questiona o alegado suicídio de Vincent van Gogh. 

1977: Enfield de Guy Lyon Playfair
   Real e sobrenatural Nos entalhes da madeira, é possível ver uma cruz. Duas, se percebermos que a outra está invertida. Será um sinal? O que há por trás daquela porta? Descubra em 1977 — Enfield, o mais novo livro sobre relatos sobrenaturais da DarkSide Books. Green Street, 284. Enfield, subúrbio de Londres.

Comentário:
   1977: Enfield não é um livro para ser devorado de uma só vez, sua história é feita para ser desmembrada aos poucos, cada capítulo é um passo em direção ao final de um corredor cheio de portas trancadas, ao leitor é dado apenas um pequeno vislumbre do que há por trás de cada uma delas, só percebemos aquilo que a limitação de nossos sentidos e da tecnologia permitem, deixando a interpretação à cargo das crenças, ou da falta delas, de cada um. Isso faz com que a experiência da leitura seja extremamente pessoal, o que a história representa para mim será diferente do que ela representa para você. [Leia a resenha do Biblioteca do Terror]


O Julgamento de Samuel Stefano de Mauricio R B Campos
   Uma droga nova chega ao mercado, trazendo uma súbita onda de mortes. As manchetes dos jornais são inundadas sobre uma bizarra onda de automutilação coletiva nos parques e praças. O Julgamento de Samuel Stefano é uma obra para estômagos fortes. No Julgamento de Samuel Stefano, há jurados, juiz e acusador, mas não há inocentes. Todos estão loucos para achar um culpado, mas ninguém está disposto a se olhar no espelho.

Arlequim de Dark Gero
Ariel é lasciva, sedutora até o último poro, uma stripper atraente não só pela beleza estonteante como pela improvável erudição; a personificação da luxúria em contraste com sua doce feminilidade, como duas mulheres habitando o mesmo corpo.

Alien: Rio de Sofrimento de Christopher Golden
   Enquanto Ellen Ripley hiberna no espaço, o planeta LV426 – onde ela e a equipe da Nostromo encontraram o xenomorfo original – é colonizado e rebatizado de Aqueronte. Durante o processo de terraformação do planeta, uma das expedições descobre a imensa e decadente espaçonave responsável pelo destino de Ripley. O achado é de grande interesse para a Weyland-Yutani, e pode ser a resposta para os sonhos de Anne e Russell, um casal que se mudou para Aqueronte em busca de fortuna e acabou de ter o primeiro bebê nascido na colônia: Rebecca Jordan, mais conhecida como Newt. Mas o que eles descobrem a bordo da espaçonave acaba dando origem não a um sonho, mas a um pesadelo. 

Comentário: 
   Depois do ótimo início da trilogia Alien com Surgido das Sombras de Tim Lebbon, que até entrou na lista dos Melhores Livros de Terror de 2016, sua "continuação" Mar de Angústia de James A. Moore foi uma grande decepção, o plot parece que foi copiado de um filme da série Resident Evil, é só substituir zumbis por aliens, a instalação tecnológica por uma mina abandonada e a Umbrella Corporation pela Weyland-Yutani. Não é um livro ruim, só é mais do mesmo, não traz nenhuma surpresa para o leitor. Enfim, por esse motivo adiei na minha lista de leitura de Rio de Sofrimento de Christopher Golden e não estou com grandes expectativas...

Na Escuridão da Mente de Paul Tremblay
   A vida dos Barrett é virada do avesso quando Marjorie, de 14 anos, começa a demonstrar sinais de esquizofrenia aguda. Depois que os médicos se mostram incapazes de deter os acessos bizarros e o declínio de sua sanidade, o lar se transforma em um circo de horrores, e a família se vê recorrendo a um padre da região. Acreditando que seja um caso de possessão demoníaca, o padre Wanderly sugere um exorcismo e entra em contato com uma produtora que está ávida para documentar tudo.

Comentário:  
   Paul Tremblay mergulha no centro do subgênero para tecer uma narrativa que ao mesmo tempo em que abraça os clichês, através de várias referências à clássicos da cultura popular, percorre caminhos inexplorados atualizando as definições de "possessão demoníaca" para o século XXI. Na Escuridão da Mente funciona como um catalisador para as próprias crenças do leitor, que é conduzido através de uma trama obscura que a todo momento questiona a própria construção dos fatos: será a protagonista realmente uma alma atormentada por demônios ou não passa de uma adolescente com problemas psiquiátricos lutando para compreender sua própria condição? [Leia a resenha do Biblioteca do Terror]

O Distrito Amarelo de Mauricio R B Campos
   O Distrito Amarelo é uma seleção de contos de horror escritos por Mauricio R B Campos, o autor mostra faces do horror que irão surpreender o leitor, com um enfoque diferenciado dos temas, resgatando o horror cósmico na história título ou levando o leitor até um apocalipse surpreendente em "A Noite do Cavalo Morto". Abra as páginas desse livro com cuidado, pois são páginas repletas de sangue e gritos de horror, onde a loucura e o medo andam de mãos dadas.

Maio

O Escravo de Capela de Marcos Debrito
   Durante a cruel época escravocrata do Brasil Colônia, histórias aterrorizantes baseadas em crenças africanas e portuguesas deram origem a algumas das lendas mais populares de nosso folclore.Com o passar dos séculos, o horror de mitos assustadores foi sendo substituído por versões mais brandas. Em "O Escravo de Capela", uma de nossas fábulas foi recriada desde a origem. Partindo de registros históricos para reconstruir sua mitologia de forma adulta, o autor criou uma narrativa tenebrosa de vingança com elementos mais reais e perversos. 

Passeio Noturno - Vol. 2 de Everaldo Rodrigues
   No segundo volume de novelas e contos reunidos, Everaldo Rodrigues retorna com mais dez histórias aterrorizantes. Do passado revelador de uma família em "O cabelo da boneca", aos desdobramentos da descoberta da vida após a morte em "O feitiço da repetição", passando por homens obsessivos e mulheres solitárias nos contos "O estranho" e "Amor por correspondência", o autor joga seus personagens em intensos pesadelos, revela suas loucuras, e nos mostra como a mente humana não precisa de muito para cair em desgraça...

Mestre das chamas de Joe Hill
   Ninguém sabe exatamente como nem onde começou. Uma pandemia global de combustão espontânea está se espalhando como rastilho de pólvora, e nenhuma pessoa está a salvo. Todos os infectados apresentam marcas pretas e douradas na pele e a qualquer momento podem irromper em chamas.Nos Estados Unidos, uma cidade após outra cai em desgraça. O país está praticamente em ruínas, as autoridades parecem tão atônitas e confusas quanto a população e nada é capaz de controlar o surto. O caos leva ao surgimento dos impiedosos esquadrões de cremação, patrulhas autodesignadas que saem às ruas e florestas para exterminar qualquer um que acreditem ser portador do vírus.

Comentário:
  Existem duas maneiras de se ler Mestre das Chamas de Joe Hill: a primeira é como um leitor comum, na qual você encontrará uma fábula sombria sobre o fim da humanidade; a outra é como um fã aficionado de terror, que reconhecendo cada referência em meio à narrativa, tanto ao próprio universo criado por  Joe Hill como a aproximação ao universo de Stephen King, embarca em uma experiência alucinante que vai além das páginas e eleva a definição da palavra "leitura" à um outro nível. [Leia a resenha do Biblioteca do Terror]

As Coisas que Perdemos no Fogo de Mariana Enriquez
   Macabro, perturbador e emocionante, As coisas que perdemos no fogo reúne contos que usam o medo e o terror para explorar várias dimensões da vida contemporânea. Em um primeiro olhar, as doze narrativas do livro parecem surreais. No entanto, depois de poucas frases, elas se mostram estranhamente familiares: é o cotidiano transformado em pesadelo.


Coração Satânico de William Hjorstberg
   Coração Satânico se passa em Nova York, em 1959. Harry Angel é um detetive particular contratado para encontrar Johnny Favorite, um músico famoso que desaparecera após a Segunda Guerra Mundial. Psicologicamente transtornado com os campos de batalha, Johnny retornaria aos Estados Unidos em estado catatônico. Dias depois, ele some do hospital de veteranos, sem deixar rastros. O caso leva Harry Angel a se envolver com seguidores de magia negra, assassinos e um cliente que não ousa perdoar velhas dívidas.

Guerras Cthulhu de Mauricio R B Campos
   Guerras Cthulhu traz quatro histórias centradas nos Mitos de Cthulhu, a grande mitologia Lovecraftiana que vem despertando o interesse de artistas e escritores desde a sua concepção. Neil Gaiman afirmou que Lovecraft "definiu os temas e obsessões do terror no século XX, e conforme caminhamos no século XXI ele não parece estar indo embora", ao contrário, sua obra tem sido a base para histórias de todos os gêneros.

Comentário:
   Guerras Cthulhu é uma ótima opção de leitura para leitores inciantes e fãs já familiarizados com os Mitos de Cthulhu, uma coletânea assustadora e divertida escrita por autores nacionais em homenagem ao mestre H. P. Lovecraft, formada pelos contos A Nova Innshmouth de Marcelo Fernandes,  O Primeiro Arauto de Thiago Lee, Nas Cavernas da Loucura de  Mauricio R. B. Campos e Onde as Sombras não tem vez de Gilson Luis da Cunha.

Confissões de Minato Kanae
   Seus alunos mataram sua filha. Agora ela quer se vingar. O mundo da professora Yuko Moriguchi girava em torno da pequena Manami, uma garotinha de 4 anos apaixonada por coelhinhos. Agora, após um terrível acontecimento que tirou a vida de sua filha, Moriguchi decide pedir demissão. Antes, porém, ela tem uma última lição para seus pupilos. A professora revela que sua filha não foi vítima de um acidente, como se pensava: dois alunos são os culpados. Sua aula derradeira irá desencadear uma trama diabólica de vingança. 

Os Filhos da Tempestade de Rodrigo de Oliveira
   Um grupo de jovens deixa o Rio de Janeiro com destino aos Estados Unidos. O que seria apenas uma viagem de uma turma do conservatório de música acaba ganhando os contornos de uma tragédia: ao sobrevoar a misteriosa região do Triângulo das Bermudas, o avião é atingido por uma violenta tempestade e cai no mar. Os sobreviventes agora se veem presos numa ilha deserta, perdendo o contato com o resto do mundo. Nesse lugar paradisíaco, habitado por uma força maligna ancestral e onde se esconde um terrível segredo envolvendo uma jovem bruxa do século XVII, os garotos precisarão lutar pela própria vida, superando grandes desafios e enfrentando seus piores medos. 

Junho

Assombrada BR #1 de M.R. Terci
   A BR-116 é a principal rodovia brasileira. Tem início na cidade de Fortaleza, no estado do Ceará e término na cidade de Jaguarão, no estado do Rio Grande do Sul, na fronteira com o Uruguai. A extensão total da rodovia é de aproximadamente 4513 quilômetros, passando por dez estados, ficou conhecida como “A Rodovia da Morte” e o título inglório não é para menos; o número de acidentes acumulados ao longo dos anos é imenso e alguns trechos da rodovia se tornaram estigmatizados por seus causos, superstições e lendas.

Comentário:
   Mais um lançamento de M. R. Terci, que desta vez decidiu embarcar em uma viagem ao longo do Brasil, através de uma das rodovias mais mortais, a BR-116. Assombrada BR é o primeiro fruto desta odisseia insana que traz contos ficcionais ambientados na afamada Rodovia da Morte. Com seu estilo macabro e delirante, Terci cria um universo fantástico e sangrento povoado por serial killers, demônios, seres inomináveis, fantasmas, gangues de motociclistas e o pior de todos os monstros, o homem. O primeiro volume é formado pelos contos: Chifre Longo, A Banguela e Capitão Boa Noite e a Gangue dos Facas Longas.


Legião de William Peter Blatty
   Legião é a verdadeira continuação de O Exorcista. Personagens e acontecimentos importantes do primeiro livro encarnam novamente nas páginas deste romance que Blatty publicou em 1983 e que finalmente sai no Brasil com seu título original. Alguns segredos da história de 1971 são revelados aqui, então é aconselhável ler O Exorcista antes de encarar Legião.

Decrépita Avareza de Jean Thallis
   Do catarro aos bigatos, envolto em decadência, masturbação, sexo, esperma, sangue; Decrépita Avareza é narrada com sarcasmo, a estória de um machista que perdeu a carreira profissional e tem seu ego ferido por não admitir sua derrota perante a mulher, seu recém divórcio e desemprego são a entrada no limbo da perdição, reduzido a álcool, cigarro e prostitutas. Sua miserável existência é como do verme que rasteja aos seus pés vindo do lixo, um encontro com seu lado mais sórdido que é a paixão que nutre por um travesti, acreditando se tratar de um romance em sua prepotência e baixo alto estima, derretendo, envelhecendo e se enraizando por completo num apartamento decrépito de Curitiba.

Pela Estrada Afora de Lucas Dallas
   O que seria uma estrada se não uma alegoria perfeita para atravessar os mundos? "Por que a galinha atravessou a rua?" Como é mesmo a resposta? Ah sim. "Para chegar ao Outro Lado." Qual será o outro lado de um homem perdido numa estrada vazia e interminável? Qual o outro lado de um misterioso retiro espiritual organizado no meio de uma floresta? Qual será o outro lado de um casal que subitamente decide abandonar uma vida na cidade e se mudar para uma ilha deserta? E qual é o outro lado de uma cabana do qual é famosa por inexplicáveis desaparecimentos dos donos?

Comentário:
   Meu primeiro contato com a escrita de Lucas Dallas não poderia ter sido melhor, Pela Estrada Afora é uma coleção de contos macabros que mesclam a tensão sufocante de cenas de suspense com descrições sombrias e sangrentas,  a 'estrada' do título pode ser definida como uma metáfora para caminho pessoal, cada protagonista está prestes a embarcar em alguma jornada, seja na expectativa de uma viagem, rumo à uma nova casa ou até mesmo literalmente uma estrada sombria à noite, quando são confrontados pelo sobrenatural.

Twittando com o Vampiro de  Aislan Coulter
   Um vampiro. Uma garota esquizofrênica. Um assassino da Deep Web. Daqui a doze noites o mundo conhecerá o seu governante. Twittando com o Vampiro é um livro sobre vampiros, fantasmas e vodu haitiano. A trama se desenrola por meio de três narrativas: A morte narrando os ataques do vampiro; as páginas do diário de Aline Brein, uma jovem esquizofrênica que teve sua intimidade exposta na internet; um assassino da Deep Web no Norte do país em busca de uma cruz perdida.

Comentário:
   Aislan Coulter é o mestre do regionalismo gore! Sua coleção de contos, Cordel de Sangue, traz o lado fantástico e sobrenatural do sertão dos cangaceiros, uma terra regada à sangue onde cadáveres florescem o ano inteiro. Twittando com o Vampiro é seu primeiro romance de terror e promete ser mais um banho de sangue e vísceras!

Leia também

          SIAMO SERIAL • NON Buona la Prima        
Ciao, ti ricordi di me? Sono CB! 
Massì! Proprio quello che OGNI giorno dal 2009 (quanto mi piace ribadirla ‘sta cosa) ti tiene compagnia con le sue strampalate recensioni, la sua dinamica sagacia, la sua inimitabile tracotanza, quelle gif un po’ così che ti bloccano il computer 
e che quando non posta una recensione per una settimana MADONNA NON VI AMMAZZATE TUTTI INSIEME OH che poi finisce che mi mettono in un servizio de Le Iene come sito di deep web che fa ammazzare i giovini, dopo Blue Whale, Green Chicken.
Insomma è un po’ di tempo che qui si incespica, si saltano giorni, ma che dico giorni, settimane, ma che dico settimane, non mi ricordo più quando ho avuto il tempo di mettermi seduto e scrivere. Scrivere per bene, intendo.
MA IO LO SO DI CHI È LA COLPA! DI ALABAMA! È COLPA DE LE PRECENSIONI! LE PRECENSIONI MI PRENDONO UN SACCO DI TEMPO! È TUTTA COLPA LORO! 
Ma tu guarda se uno inizia una roba NON scritta perché sente il bisogno di fare qualcosa di nuovo e scrivere un po' meno e alla fine quella cosa ti fa fare una cosa nuova e ti fa scrivere un po’ di meno. Ma come si permette!!! Ma guarda questa...
Insomma nel mentre che io e la prode Alabama ci lanciamo nel dorato mondo della radio (vedo un futuro roseo con venature d’oro… futuro doroseo, quindi), io vedo moltissime anteprime (di cui non scrivo), pochi film non al cinema (questo è uno strano strano trend degli ultimi tempi) e, come sempre, vedo le serie tv MORTE. 
Ve l’ho già detto che sono morte? Mi pare proprio di sì. Circa 4 anni fa. Poi l’ho ribadito. Ripetuto. Rispolverato.
E non si riescono a riprendere. Niente. Ci provano in tutti i modi, ma nulla, stanno lì inermi. Cadaveri putrescenti che tentano anche di farci credere di essere appetibili.
Non ce n’è una che è una capace di entusiasmare, stupire, emozionare, anche solo acchiappare l’attenzione e non lasciarla almeno non prima dell'arrivo dell'ultimo episodio.
Insomma ultimamente mi vedo tutte le Premiere e ne continuassi una oh. Quindi in un settimana che sarà più o meno tutta seriosa, ecco tre serie che ho iniziato ma non continuato. E ve le racconto stringate, veloci, che tanto né io né voi abbiamo voglia di perderci altro tempo. [Non metto i voti perché tanto lo so che poi qualcuno arriva e dice MA NO QUELLA È FAVOLOSA MITO HYPE MI È ESPLOSA LA TESTA!]
Feud
Trama: Che fine ha fatto 

Ennesima serie antologica (che ogni stagione racconta una storia diversa… parentesi: quella che era un’ottima idea - American Horror Story, True Detective - e perché puoi cambiare cast e perché magari una stagione ti piace, l’altra no, ma ogni anno ti viene comunque voglia di vederla sta diventando una furbata. Fine parentesi.) che racconterò le faide famose di personaggi famosi. Prima stagione dedicata a quelle due sciroccate di Joan Crawford e Bette Davis. Loro:
Proprio durante la lavorazione di Che fine ha fatto baby jane?
A interpretarle Jessica Lange (la preferita di Murphy, inventore pure di AHS, bravissima sempre) e Susan Sarandon (nella prima puntata mi è sembrata persino più brava di Jessica)
nel cast anche quei begli omini di Alfred Molina e Stanley Tucci. Quindi per carito DUE BOMBE di attrici e ambientazione pazzesca (gli studio della golden age hollywoodiana), e tutto molto interessaNO. 
Già la prima puntata inciampa e nonostante si veda che tutto è fatto a puntino già si legge l’allungamento del brodo. 
Anche perché, sinceramente, ma una intera serie di 12 puntate (o erano 8? Vabbé sempre troppe…) sulla guerra di queste due attrici tutta combattuta con sorrisi falsi in pubblico e impazzimenti isterici nelle rispettive roulotte, non sono un po’ troppe? Non bastava un film o una miniserie di due episodi per dipanare il tutto? Già la prima puntata mi dà l'idea di tutta la serie e francamente (col retropensiero che tanto si sa pure come andò a finire, nessune delle due ammazzò l'altra) che cosa potrebbero raccontarmi di più altri 7 episodi?
Domanda che non avrà risposta, almeno da me, visto che l’ho abbandonata. Sono pronto a scommettere che qualcuno arriverà a dirmi MA NO DEVI VEDERLA AL SETTIMO EPISODIO DECOLLA! 
Conta che ormai per me una serie deve decollare al settimo minuto. Tipo Lost (finissima questa…)
Oddio, ho trovato questa
e forse mi potrei ricredere...
Comunque la prossima serie sarà su Carlo e Diana. Mia madre impazzirà.
The Snatch
Trama: Non girate in Inghilterra!

C’è bisogno di ricordare cos’è The Snatch? Il film più riuscito di Guy Ritchie (che comunque non riesco mai ad odiare del tutto, anche l’ultimo King Arthur ha qualcosa di buono), quello con Brad Pitt fichissimo, Jason Stazzam che ancora non menava le mani come un fabbro, quello con tutti inglesi pazzi e il cane con la trombetta in bocca? Dài no, ha DICIASETTE anni e penso che ormai lo mettano su Italia 1 come tappabuchi pure alle 8 di mattina la domenica.
Ecco, hanno fatto la serie tv (oh ci intignano a fare le serie dai film. Ne riesce una ogni 15). Questa è una di quelle 14.
Il primo episodio vuole ritrovare la stessa adrenalina del film (sia nella regia che nella sceneggiatura), ma fa la figura che farebbe uno con l’enfisema polmonare che gareggia con Usain Bolt nei cento metri (Che razza di esempi mi vengono?)
Brutto, girato malissimo (non c’è cosa peggiore di chi tenta di fare la regia fica e sbaglia tutti i ralenti, tutte le velocizzazioni, tutti i fermi immagine) e NOIOSO, che è tipo la cosa peggiore per una cosa che vuole essere ipercinetica e molto badass.
Unica nota di colore (rosso nello specifico) è che nella banda trova spazio Ron Weasly, il più sfigato del terzetto magico. 
Porello, quella fa i film multimiliardari e femministi, quell’altro è riuscito a ritagliarsi uno spazio in film stranetti e adatti al Sundance, e lui niente, solo telefilm e pure orendi.

NON TI DEMORALIZZARE RON! ANCHE TU FARAI DEI FILM! PENSA A PACIOCK! LUI STA PEGGIO DI TE! RONRON È IL NOSTRO RE!
A proposito di arancione...
Orange is the new Black • Season 5
Trama: Orange is the new back

Niente. Non je la fo. Le avevamo lasciate (avevo scritto “l’asciate” pensa alle volte il lapsus pensa) lo scorso anno che o stavo mezzo ‘na merda io o facevano proprio schifo loro, ma OITNB era già diventata una di quelle serie che dovrebbe fare la cosa più coraggiosa di tutte, molto più coraggiosa di aver ucciso una protagonista - il coraggio sta nel fatto che questa protagonista (se poi si può parlare di protagonista in OITNB, visto che ci sono settemila personaggi che sgomitano per avere del minutaggio, in barba alla ricerca di una trama interessante) fosse tra le due, tre sopportabili - o di far vedere un cazzo in primo piano o ancora far vedere le scene di botte o una che si mette il sangue mestruale in faccia, il coraggio di chiuderla qui. Basta. OITNB non ha più nulla da dire.
A parte che diventa anche assurdo vedere per cinque anni una in carcere quando doveva starci un anno se non ricordo male (parlo di Piper, anche se ormai è l'ultimo dei problemi della serie), che non sembra più avere qualcuno al timone e va avanti in un susseguirsi di scene scollate, millemila personaggi che interagiscono tra di loro alla ricerca di un'alchimia che non c'è MAI, passaggi montati in maniera confusionaria e frasi di spessore senza nessuno spessore.
E neanche quel bel sano amore saffico di un tempo c'è più...
Caro Netflix, il coraggio che non hai tu ce l'ho io. Per me OITNB finisce qui.
Ci vediamo domani (credo) per delle serie NI, della serie (!) che ho iniziato e non continuato ma non per colpa loro. 
Che cliffhanger ve', non vedete proprio l'ora che arrivi domani...

          Darknet Links - Deep Web Links 2016         
This is a list of working deep web links. To access the deep web you will need TOR. Either you can use the TOR Browser bundle or a more secure "version" of TOR to avoid being tracked online.

The list below is for educational/research purposes only.
dark net links, deep web links, silk road, tor browser


Consider leaving a comment. No CP. Thank you!
          060 Om nätets mörka hörn med Marcus Nohlberg        
Marcus Nohlberg berättar för oss om internetbedrägerier, it-brott och om det mytomspunna deep web.
          Fraudsters' New Frontier: The Dark Web        
By Thomas Zadvydas Once the exclusive domain of credit card thieves and fraudsters, the “Deep Web” or the related “Dark Web” is attracting a slew of startups and their venture capital backers. A part of the Internet that is not accessible by mainstream search engines and requires specific authorization to enter, the [...]
           100 Useful Tips and Tools to Research the Deep Web        
[+5] Discussion by Butrflynet on 09/02/10 7:54 PM Replies: 5 Views: 4,059
Tags: Search Engines, Internet, Reference, Search, Research
Last Post by Butrflynet on 03/01/12 11:59 PM
          El euro causa furor entre los falsificadores gracias a la tecnología        
Las nuevas técnicas y la 'deep web' (te explicamos qué es) mantienen viva una práctica tan antigua como el dinero mismo
          Chiuso il più importante mininarket della droga nel Deep Web        
Ricordo ancora quando provai la prima volta ad usare Tor browser: quello che vidi in alcuni siti del Deep Web fu davvero disgustoso e lasciò l'amaro in bocca. Mi rendo ben conto che non tutto il Deep web sia popolato da criminali: anche gli attivisti politici e dei diritti umani sono costretti in questo ghetto informatico pur di tutelare la loro libertà d'informazione. Però, accipicchia, per gran parte di quello che è dato vedere...il Deep Web è davvero una cloaca e mi chiedo se mai si riuscirà a renderlo un posto più pulito anche per l'utenza normale.

FONTE  »  deep web internet droga
Chiuso il più importante mininarket della droga nel Deep Web
          Ecco cosa tira di più, e quanto, nel lato oscuro del Web        
Seguo da un po' di tempo le tematiche del Deep Web e, come ho avuto modo di dire in passato, trovo che sia un posto agghiacciante. In quest'articolo ci siamo soffermati sul lato più presentabile del Deep Web: ricordiamo che in questo mercato oscuro della Rete si possono comprare anche droga, armi, elementi di pedo-pornografia e, persino, affittare un killer. Sempre rimanendo anonimi e pagando in modo irrintracciabile. Per questo motivo, chi fa l'esperienza di andare a curiosare in questo luogo, difficilmente tenderà a ripeterla. La nausea ed il disgusto ce li si trascina dietro per un bel pezzo!

FONTE  »  deep web internet
Ecco cosa tira di più, e quanto, nel lato oscuro del Web
          1. Det är inte alla som är som alla andra        
Mikael, Sandra, Johan och Victor träffas och diskuterar dessa saker: Trycka på knappen? Deep Web Avlyssning Män har inte celluliter Övergångstället Självkörande bilar AI ber inte om rättigheter Kloners rättigheter Evigt liv Pedofili Teleportering PS: Den 7 mars gjorde CGP Grey ett youtubeklipp som håller med mig! Vad spännande att han lyssnar på Hjärnsläppet! 😉 […]
          å…³äºŽå¦‚何进入深网        

INFO:进入暗网其实很简单,但是对于从来没接触过的人来说,这个东西会变得很神奇,接下来我就简单的介绍一下。(本篇没有什么技术可言,应小伙伴要求,给做一个知识扩展)

1、什么是暗网


暗网(deep web)是指那些存储在网络数据库里、但不能通过超链接访问而需要通过动态网页技术访问的资源集合,
不属于那些可以被标准搜索引擎索引的表面网络。迈克尔·伯格曼将当今互联网上的搜索服务比喻为像在地球的海洋表面的拉起一个大网的
搜索,大量的表面信息固然可以通过这种方式被查找得到,可是还有相当大量的信息由于隐藏在深处而被搜索引擎错失掉。绝大部分这些隐
藏的信息是须通过动态请求产生的网页信息,而标准的搜索引擎却无法对其进行查找。传统的搜索引擎“看”不到,也获取不了这些存在于暗
网的内容,除非通过特定的搜查这些页面才会动态产生。于是相对的,暗网就隐藏了起来。从信息量来讲,与能够索引的数据相比,“暗网”更是要庞大得多。根据Bright Planet公司此前发布的一个名为《The Deep Web-Surfacing The Hidden Value》(深层次网络,隐藏的价值)白皮书中提供的数据,
“暗网”包含100亿个不重复的表单,其包含的信息量是“非暗网”的40倍,有效高质内容总量至少是后者的1000倍到2000倍。更让人无所适从
的是,Bright Planet发现,无数网站越来越像孤立的系统,似乎没有打算与别的网站共享信息,如此一来,“暗网”已经成为互联网新信息增
长的最大来源,也就是说,互联网正在变得“越来越暗”。
根据对HiddenWeb的调查文献得到了如下有意义的发现:
1、Hidden Web大约有307,000个站点,450,000个后台数据库和1,258,000个查询接口。它仍在迅速增长,从2000年到2004年,它增长了
3~7倍。
2、Hidden Web内容分布于多种不同的主题领域,电子商务是主要的驱动力量,但非商业领域相对占更大比重。
3、当今的爬虫并非完全爬行不到Hidden Web后台数据库内,一些主要的搜索引擎已经覆盖Hidden Web大约三分之一的内容。然而,在覆
盖率上当前搜索引擎存在技术上的本质缺陷。
4、Hidden Web中的后台数据库大多是结构化的,其中结构化的是非结构化的3.4倍之多。
5、虽然一些Hidden Web目录服务已经开始索引Web数据库,但是它们的覆盖率比较小,仅为0.2%~15.6%。
6、Web数据库往往位于站点浅层,多达94%的Web数据库可以在站点前3层发现。
注:当然这些是某度找的,写得不错,于是索性直接吧意义搬过来
暗网的意义:由于我们平时访问的网络就只是利用了互联网大约百分之十的资源,相当于有很多资源其实我们根本没有接触过,暗网就提供
了很大的便利,由于是动态请求页面,绝大部分这些隐藏的信息是须通过动态请求产生的网页信息,而标准的搜索引擎却无法对其进行查找

2、什么是tor网络

暗网得以存在,Tor(The Onion Router)团队提供的匿名访问技术可谓是“首功”。这个免费、开源的服务程序可以给网络流量进行三重加密,
使得用户流量在世界各地的电脑终端里随机跳跃传递,最终到达服务器的时候,已经“连亲妈都不认识了”。tor 网络的维护者是一个美国非盈利性的组织,致力于在线匿名和隐私研究。tor网络的对手无疑是FBI,由于暗网的匿名性,导致暗网上存在千万级别的非法信息在传播,各种犯罪交易横行,当然FBI是随时都想把tor网络完全拿下的,但是由于技术问题,破解tor网络是异常不可的,所以FBI就只能通过掌握节点分析流量的方法,分析出那些流量是正常流量那些流量是暗网流量的方法去一步步去找网络下一跳的地点,这会付出大量的金钱与时间。到现在为止FBI通过一些技术手段抓捕了一些暗网的核心人员,但是这并不能掌握tor网络的发展.由于tor浏览器使用的定制的firefox浏览器,同样会产生一些漏洞,所以使用者切记要即使更新你的tor浏览器。另外,维护tor节点需要大量的费用,所以Tor就变得很穷,但对于我们技术人员来说,这是个好东西.

      3、如何连接tor网络

tor浏览器下载地址:https://tor.eff.org/
      æ ¹æ®å›¾ç‰‡è¿›è¡Œé…ç½®ï¼Œä¸è§£é‡Šï¼Œæˆ‘相信你能看懂。。。。。。。。。。。。。。。。

       


分享几个暗网导航页:

http://thehiddenwiki.org/"); background-size: cover; background-position: 0px 2px;"> 有点老了,感觉收录并不行

grams7enufi7jmdl.onion/"); background-size: cover; background-position: 0px 2px;"> 第一感觉挺像Google 的

 
          Deep Web. La red invisible        

Artículo publicado en la Revista Deusto (ISSN: 1886-2071) Nº 126 (primavera 2015).
          Come accedere al deep web ed al dark web        
La guida rinnovata di Trovalost.it per accedere rapidamente al deep web ed al dark web, all'interno dei loro segreti e dei loro indirizzi web nascosti ai motori di ricerca. Come si fa a trovare contenuti nel dark web? Non sempre &egrave; chiaro come fare ma le modalit&agrave; sono tutte descritte in questa pagina. La struttura di internet prevede infatti una differente modalit&agrave; di accesso...

FONTE  »  dark web deep web
Come accedere al deep web ed al dark web
          Il deep web: il mondo sommerso della rete        
Il mondo sommerso di internet, con tutto cio' che gira intorno ad esso, le leggende, le storie, cio' che è reale e come si entra all' interno di questo mondo sotterraneo che in pochi conoscono e in pochi sanno veramente cosa si cela dietro di esso. Tutto sul deep web, notizie, info e dettagli sull' internet sommerso.

FONTE  » Il deep web: il mondo sommerso della rete su Internet
Il deep web: il mondo sommerso della rete
          Así se mueven los narcos en internet        
Los narcos también son globales. Llevan al menos 25 años a la vanguardia de los usos más innovadores de la tecnología. Como los terroristas de Al-Qaeda, los contrabandistas, los sicarios y los traficantes de armas, de órganos y de seres humanos, los narcos saben perfectamente cómo operar en internet La llamada deep web, o web …
          New Video: Gamification Explained        

Our new video explains gamification. 

Find out why so many teachers, organizations and products are using gamification to engage and motivate others. 

Watch the video

What if completing your goals felt more like a game, with points, competition and awards? That’s the goal of gamification - to motivate and engage people by making the completion of tasks feel like a game that you want to win.

What it Teaches

Gamification is becoming a bigger part of our lives and for good reason:  it works. This video explains the concept of gamification and how game mechanics are used to motivate people to accomplish personal and professional tasks and goals. It teaches:

  • Why data and measurements are not enough to motivate people
  • Why products, services and organizations are using gamification
  • How an internal team uses gamification to complete a project
  • Why gamification is becoming a part of everyday life
  • How gamification can be used by anyone

Watch the video

Recent Explainer Videos by Common Craft


          Deep Web: Imagens #1        

E aí como vão? Hoje vim trazer para vocês algumas das imagens assustadoras ou bizarras da Deep Web, um lado que você não conhece bem da Internet. Clique em Leia Mais e confira.
















E aí gostaram? Quando eu puder, trarei mais imagens!

          Esta modelo es secuestrada y subastada en la Deep Web; la rescatan y su testimonio es desgarrador        

Esta modelo es secuestrada y subastada en la Deep Web; la rescatan y su testimonio es desgarrador

Chloe Ayling es una modelo inglesa de 20 años que, tras un viaje a Italia donde se suponía que participaría en una sesión de fotografías, fue secuestrada y ofertada en la Deep Web como escl@va. Ayling fue engañada por sus captores, quienes a su llegada a Milán le dijeron que sería vendida para un cliente en el Medio Oriente. Tras esta noticia, el supuesto secuestrador, llamado Lukasz Herba, la llevó a comprar zapatos a un centro comercial El abogado de la modelo señala parte de esta historia: Le dijeron que la iban a vender a alguien del Medio Oriente por s 3

La entrada Esta modelo es secuestrada y subastada en la Deep Web; la rescatan y su testimonio es desgarrador ha sido extraído de %%WWW.TODOLANDIA.COM%%.


          3 ANOS DE BLOG!!!        
 
 Hoje nosso blog completa a marca de 3 anos no ar!  

E nesses três anos foram mais de 600,000 acessos, 1713 postagens e 111 Seguidores.  

Passamos por muitas dificuldades nos últimos tempos para poder atualizar o blog mas aos poucos retornaremos com postagens diárias ou pelo menos semanais.  

O conteúdo do blog continua atualizado no que se refere a assuntos como alertas, Nova Ordem Mundial, denúncias etc; dentre todos os assuntos que o blog aborda.  

Agora, listaremos os 10 artigos mais acessados desses três anos de blog!  

..............................................................................................................................................

103,858 ACESSOS

2-) FOTOS DE EVANGÉLICAS EM POSES SENSUAIS CAUSAM POLÊMICA 
49,088 ACESSOS 

3-) [DEEP WEB] Bem vindos ao Museu Vrolik (CUIDADO, IMAGENS FORTES!) 
27,675 ACESSOS 

4-) [DEEP WEB] Bonecas Sexuais Humanas.BIZARRO! (Post fixo)  
27,506 ACESSOS
 
5-) Música de Jay-Z e Kanye West diz "Yes, we killed Tupac" - Saiba mais sobre os dois rappers e sobre a morte de Tupac  
25,598 ACESSOS
  
6-) Os 8 Piores Casos Da Deep Web Que Foram Descobertos Por Internautas Da Surface.  
18,609 ACESSOS
 
7-) Atriz pornô considerada uma das mais belas do mundo entrega sua vida a Deus 
10,934 ACESSOS
 
8-) "Minha vida virou um inferno", diz 'sedutora' do "Teste de Fidelidade"  
8,262 ACESSOS
 
9-) [DEEP WEB] Bizarro, Foto real de uma boneca sexual humana!  
5,204 ACESSOS
 
10-) DEEP WEB: CONHEÇA O BÊBE CÍCLOPE (CUIDADO, O VÍDEO PODE SER PERTURBADOR PARA ALGUMAS PESSOAS) 
3,384 ACESSOS 
 ..............................................................................................................................................
 
E o nosso muito obrigado A TODOS que fazem parte do blog! 
 ..............................................................................................................................................

          The Torist Is A Literary Magazine Hosted On The Deep Web        

A new online magazine called The Torist has surfaced, and it wants to rectify some of...

The post The Torist Is A Literary Magazine Hosted On The Deep Web appeared first on Bitcoinist.com.


          Die Top-Suchanfragen im Deep Web        

          TecnoCasters 201 FaceBook Compra Whatsapp, Venezuela y Que es Deep Web        

TecnoCasters 201 FaceBook Compra Whatsapp, Venezuela y Que es Deep Web

El 96% del internet no es accesible a los buscadores

Con: Juan D. Guevara Torres, Pedro Riverol, Angel Monjaras y Abrahan Bauza

Producción y Edición: Abrahan Bauza

 

  • Facebook compra Whatsapp por 19 Billones de Dolares
  • Microsoft Lanza Office Online - La version gratis en Linea de Office
  • TunnelBear una nueva aplicación VPN para teléfonos inteligentes que promete privacia en el internet 
  • el 96% del internet no es accesible a los buscadores. Se llama Deep Web. Que es?
  • Su genero en Facebook tiene 50 opciones
  • Aplicaciones de la semana
  • Los comentarios de ustedes nuestra audiencia. 

          Che cosa sono deep web e dark web e come funzionano?        

Internet non è solo ciò che sembra: la parte di web che vediamo tutti i giorni, non è altro che una piccola percentuale di quella che è davvero la rete. Per capire meglio questa...

L'articolo Che cosa sono deep web e dark web e come funzionano? sembra essere il primo su tecnomani.com.


          Tor Browser dan Sisi Gelap Internet!        
Mungkin diantara Anda semua masih belum tahu dari sisi gelap internet atau yang disebut dengan Dark Internet, dan semua content yang ada didalamnya disebut Deep Web. Kebanyakan seluruh websitenya adalah berisi tentang dokumen rahasia, penipuan, pornografi,  hacking, dan perjudian. Ya! Tentu saja mereka tidak dapat di index oleh search engine biasa seperti: Google, Yahoo, Altavista, dan juga Bing.

Dan tahukan Anda bahwa Deep Web / Dark Internet yang merupakan sisi gelap dari internet memiliki konten yang lebih besar atau banyak daripada web biasa yang sudah ada? Yuuuuup, perbandingannya adalah 96% untuk deep web dan 4% untuk web biasa. Sungguh jauh bukan? Itulah salah satu fakta menarik yang saya sendiri terkejut mendengarnya pada pertama kali.

Mungkin, kalian semua yang membaca post saya ini bertanya-tanya. "Emang bisa mengakses website yang ada di dark internet?" "Bagaimana caranya? Pakai software apa? Pakai browser apa?" dan masih banyak lagi pertanyaan yang muncul di hati Anda semua. Naaaaahhhhhh......... sekarang saya mau berbagi dan sharing nih tentang salah satu browser yang dapat mengakses website yang ada di sisi gelap internet tersebut, namanya adalaaaah....... Tor Browser!

Tor Browser adalah suatu software perangkat ketiga yang berfungsi untuk menyelami deepweb yang terdapat di internet, cara menggunakannya pun cukup mudah dan juga multiplatform terdapat di: Linux, Windows, dan juga Mac. Berikut  adalah tampilan Tor Browser pada desktop Linux (Ubuntu) saya:


Cara menggunakan Tor Browser sangat mudah yaitu:
  • Klik Start TOR
  • Tunggu, sampai TOR menampilkan window browser baru pada desktop Anda
  • Lalu, selamat menjelajahi DEEP WEB / DARK INTERNET
Looooowhhhhh, cuma gitu aja? Yakin? Serius? Yaaaakkkk! memang hanya seperti itu. Kalo ada yang simple kenapa harus susah? Berikut ada beberapa website pada deep web yang dapat Anda jelajahi sekalian test running pada percobaan pertama, copy paste aja! Hahahahaha:
  • http://7jguhsfwruviatqe.onion (Wiki)
  • http://ekwreugkil5ncyyh.onion (Directory)
  • http://a5ec6f6zcxtudtch.onion (E-mail)
  • http://7ll6yck7azloqjqv.onion (Musik)
  • http://627kx22vati6uqkw.onion (Black Market)
Ini adalah salah satu cuplikan halaman deep web yang sedang saya buka di Tor Browser:


Tidak sudah mencoba software 3d Party Tor Browser ini di komputer Anda? Saya akan menshare linknya :) jeng jeeeenngggg, dan ternyata tersedia untuk Nokia N900 dan Android juga!:
NB: Jika ada salah satu dari link tersebut tidak dibuka maka saya anjurkan untuk mengunjungi halaman yang ada disini.

Okaaaay! Apakah anda siap untuk menjelajahi sisi gelap internet beserta deep web yang didalamnya? Silahkan berbagi pengalaman dan komentar Anda disini! Saya pasti senang mendengarnya, dan terimakasih atas kunjungan Anda yang sangat berkesan di blog saya, cheersss!

          247: Fighting Assassins and Drug Dealers in the Dark Web Underbelly of the Internet — Avi Kasztan on Entrepreneurship        

Avi Kasztan is the Co-Founder and CEO of Sixgill. Originally from Uruguay, Avi moved to Israel at age 18 and has become a successful entrepreneur. Avi has a degree in Computer Engineer and an MBA from the Technion, and has both worked at and founded several startups in the technology and cyber-security field.

 

Sixgill (www.cybersixgill.com) is a cyber intelligence SaaS startup that analyzes the Dark Web. The company’s advanced platform detects and defuses cyber-attacks and sensitive data leaks originating from the Dark Web before they occur, and provides this information to clients through real-time alerts. Sixgill’s platform can also be used to expose illegal marketplaces, and warn of physical attacks to organizations and individuals. Sixgill is a graduate of the Citi Accelerator in Tel Aviv, and is working closely with Citi mentors to adapt the product capabilities to the needs of large global enterprises

Show notes at http://hellotechpros.com/avi-kasztan-entrepreneurship/

What You Will Learn on This Episode

  • The similarities and differences between the Deep Web & Dark Web and why you need to know about them.
  • Where the criminal masterminds go online to sell your identity and plan your assassination. (Not kidding!)
  • How to find information in an environment when you can just "Google it."
  • How to protect your money, your identity and your life by observing safe practices online.
  • What you should do to seek and destroy hidden viruses on your computer that anti-virus programs can't find.
  • The benefits of the Dark Web and why we don't want to shut it down.

          I'm a girl on a mission        
On a mission in an attempt to lessen the toxic overload on my body, without sacrificing my standards! - I know there are plenty of things out there in the world that I have no control over, but anything I use on my face and body every day and night I do have control over. I use these products so much and over a very long period of time, so I want to make sure I choose the healthiest products possible, while still achieving the same goals! :)

The EWG (Environmental Working Group) Skin Deep Cosmetic Safety Database rates products and ingredients as "O" being the BEST and "10" being the WORST. Although the Skin Deep website is not the ultimate Beauty Bible, it's the only thing we've got as a guideline...

My biggest challenge yet... is finding Natural / Organic Makeup that really works! I'm determined to because I remind myself that we have the right to know exactly what we are buying and using, and that takes time and research.

My ultimate goal form this blog is to save myself AND the world (LOL... This would be my Miss America Speech if I had to have one- wink, wink). I'm determined to switch all of my toxic beauty products out, and replace them with fewer, safer products that actually work and simplify my beauty regimen while living on a budget. I would love to share ideas and review products with you of things that I am trying and hopefully we can find many other, safer options together.

Thank you!
xoxo
          A Detailed Guide to Deep Web        

FBI has recently arrested Ross William Ulbricht, the alleged founder of the illegal online website ‘Silk Road’ last month. Customers of Silk Road could anonymously order different kind of drugs through the website. It took a lot of time and effort for FBI to trace and shutdown this illegal online market place. The reason for that is that Silk Road operates on the Tor anonymity network which is just a part of what is known as the Deep Web. An important question here is, what is the Deep Web and what makes it distinct from the regular web. Below is the detailed guide to Deep Web: What is Deep Web? Deep Web is the term used for the content on the Internet that is normally not indexed by the regular search engines like Google and Bing. Most of the content available on the Deep Web is dynamic (ever-changing) and not linked to other websites. This makes it difficult for Search Engines to crawl and index them. Information available on the Deep Web can be accessed only when a direct query is posed. Databases holding information of Deep Web sites respond in real-time and provide the required information to the users. [...]

The post A Detailed Guide to Deep Web appeared first on Tech Satya.


          O que é a dark web?        

dark.png

 por Karla Pequenino | Público |


As autoridades italianas divulgaram há poucos dias o caso de uma modelo britânica raptada em Julho, em Milão, para ser leiloada online, na chamada dark web. O criminoso acabou por desistir do esquema e entregou a vítima no consulado britânico, depois de o leilão ser ignorado (ninguém fez uma oferta). Em Março, a Europol, o serviço europeu de polícia, classificou esta parte da Internet como uma das maiores ferramentas dos criminosos, descrevendo-a como o motor da criminalidade organizada na União Europeia.

 

 

O que é a dark web?
Uma pequena parte da World Wide Web, infame por ser utilizada por visitantes do mercado negro online. Resume-se a um conjunto de redes encriptadas (conhecidas como darknets) que estão intencionalmente escondidas da Internet visível através de sistemas de encriptação.Como tal, não se encontram sites da dark web através de pesquisas em motores de busca, ou ao escrever o endereço de IP em browsers normais.

 

É díficil encontrar a origem do conteúdo alojado nestas redes, visto que apenas podem ser acedidas através de software e configurações específicas. “A dark web pode ser vista como uma máscara da actividade ilegal na Internet”, diz Jorge Alcobia, director executivo da Multicert, uma empresa de segurança informática portuguesa. “É o contrário da chamada Internet visível, em que se conhecem os certificados de segurança, credenciações e máquinas utilizadas. Na dark web, os servidores, o domínio e a origem da informação são disfarçados, tornando-se um sítio apelativo a criminosos.”

 

A dark web foi alvo de atenção mediática em 2015, quando os dados extraídos do ciberataque ao site Ashley Madison (uma rede social para ajudar pessoas interessadas em trair os parceiros) foram aí disponibilizados. 

 

 

É o mesmo que a deep web?
Não. A dark web é uma pequena parte da deep web que, por sua vez, inclui todos os sites da Internet que não se podem encontrar através dos motores de busca. Integra informação online escondida por palavras-passe, ou que apenas pode ser acedida através de software específico. Muitos dos conteúdos da deep web não têm nada de ilegal.

  

 

O que se encontra na dark web?
Conteúdo ilegal, mas não só. Várias pessoas – agências segurança, autoridades, activistas a lidar com informação sensível e jornalistas – utilizam a dark web porque oferece uma camada de segurança extra que cobre a sua identidade, e permite maior segurança e privacidade. Porém, a rede é conhecida pelos mercados negros online, onde se podem comprar drogas, documentos ilegais, serviços de assassinato, e pornografia infantil.Também se encontram serviços que prometem trocar a divisa digital bitcoin por outras moedas, visto que as bitcoins são muito utilizadas em transacções ilegais por facilitar o anonimato dos utilizadores. 

 

De acordo com um relatório de 2017 da Europol, 57% das páginas da dark web contêm conteúdo ilegal. “A maioria do conteúdo na dark web não é legal”, diz Jorge Alcobia. “Sem ser para fins de investigação, não vejo motivos para alguém se dar ao trabalho de utilizar uma plataforma que mascara a identidade de IP e a máquina que estão a utilizar para uma simples navegação na Internet,” refere.

 

Um dos primeiros mercados ilegais a operar na dark web foi a plataforma Silk Road, que vendia vários produtos ilícitos, particularmente estupefacientes. Em 2012, as vendas anuais rondavam os 22 milhões de dólares. Foi desmantelado em 2013, porque as autoridades encontraram o criador, Ross Ulbricht, em flagrante delito a aceder à área de administração do Silk Road numa biblioteca pública em São Francisco, nos Estados Unidos. (...)

 

 

 

Ler mais >>

 

 

 

Conteúdo relacionado:

 


          "Deep Web" documentary worth serious thought        
An EPIX original documentary "Deep Web," premiering on Dish Network (not Comcast) Sunday, May 31, at 7 p.m. is worth tracking down. Written, directed and produced by Alex Winter and narrated by Keanu Reeves, it's a look behind the headlines of the dark web that will not only increase your working knowledge of Bitcoin but alert you to new problems of interpreting the Constitution in the digital age.
          Welcome to Rapture        
I was skeptical about Bioshock. I remember watching some demo reel that Irrational had put out on the game. While the demo footage panned over a claustrophobic and chronically damp interior setting, the voice of Ken Levine spoke over the film, declaring that in this game they wanted to redefine the shooter, and provide the player with a combination of visceral action and and a deep web of possible tactics. This kind of talk always makes me skeptical.
          La NASA se lanza a la conquista de 'Deep Web', la cara oculta de Internet        

Autor: avatarTeleNoticiasMadrid
Tags:
gepostet: 19 Juni 2015


          What Is the Deep State?        
"Ldquo we see the government of god over the world is hidden rdquo francis bacon wrote in 1605 describing the deepest of deep states the lord rsquo s reign over us which bacon thought a good model for earthly rule ldquo obscure and invisible rdquo was how bacon thought government worked best and king james i agreed instructing in 1624 a too inquisitive subject that none shall ldquo meddle with anything concerning our government or deep matters of state rdquo 1 until recently the phrase ldquo deep state rdquo had been mostly consigned to the bowels of the conspiratorial deep web but over the past few weeks since donald trump decided to take his fight with the intelligence community public it has witnessed a remarkable florescence the ldquo deep state rdquo apparently has trump in its sights at least according to former nsa intelligence analyst john schindler who tweeted that a friend in the ldquo intelligence community rdquo told him that trump ldquo will die in jail rdquo 2 what is the ldquo deep state rdquo the new york times has given us an explainer on the concept which doesn rsquo t explain much things are bad but not as bad as turkey or egypt the times says which really do have deep states and besides leaks from the deep state will save us from the deep state 3 if you do a search on a scholarly database like jstor for the term you rsquo ll get lots of returns having to do with hypnosis psychology and spiritualism this in a way is appropriate since these activities have to do with the ldquo obscure rdquo interior life of individuals mdash that is the opposite of collective categories such as the ldquo public rdquo and the ldquo social rdquo realms that are presumed in modern democracies to be subject to procedural scrutiny and ldquo freedom of information rdquo 4 but what we call modernity didn rsquo t just create the public realm subject to public law it created the private sphere centered on the ideal of the property owning individual and private corporation and which during our modern times have enshrined bacon rsquo s and king james i rsquo s ideal ldquo good luck researching a private firm rdquo writes the international consortium of investigative journalists even the dogged seymour hersh didn rsquo t have much luck when he tried to investigate ldquo the private sector rdquo as opposed to his metier the national security state ldquo the abuse of private power rdquo proved ldquo a much dicier subject for many editors even than the cia rdquo hersh gave up and wrote his book on henry kissinger instead 5 so at least as long as there has been private property there has been private plotting and talk of a ldquo deep state rdquo has been a vernacular way of describing what political scientists like to call ldquo civil society rdquo that is any venue in which powerful individuals either alone or collectively might try to use the state to fulfill their private ambitions to get richer and obtain more power the first use of the exact phrase i managed to find is this in 1817 john fitzgerald pennie rsquo s ldquo the varangian or masonic honor rdquo offered this dialogue of two servants working a large banquet hall filled with contriving earls and knights 6 second servant ldquo oh could i but pry into these deep state secrets i would give my very head to mdash 7 third servant ldquo thus mayst for aught rsquo tis worth hellip would i could pry into a venison pasty i will see what cheer the buttery yields rdquo 8 second servant ldquo then art thou come in right good time there rsquo s glorious feasting here but thou dull fellow hast no great regard for plots and state affairs rdquo 9 third servant ldquo no but i have for the sad state of my deserted bowels rdquo 10 trump might not have control of the deep state but he does preside over a very sad state 11 the problem with the phrase ldquo deep state rdquo is that it is used to suggest that dishonorable individuals are subverting the virtuous state for their private ambitions a good marxist and even an intelligent liberal however knows that under capitalism ambition is considered a virtue not a vice and that the whole point of government is to collectively organize subversion what do you think the ldquo pursuit of happiness rdquo means it rsquo s this public virtue private vice false opposition that makes so much of the ldquo deep state rdquo writing slide into if not noxious bilderberg anti semitism then ldquo we are a republic not an empire rdquo idiocy 12 but the concept resonates especially since the modern state is not just an instrument to execute elite ambition but a site of popular demands and class struggle the private organized backlash to those demands and struggles is often understood as a ldquo deep state rdquo conspiracy and that understanding is more often than not correct the koch brothers know this at least according to jane mayer rsquo s dark money kevin ovenden tells me the term ldquo deep state rdquo was regularly used to discuss turkish politics in the 1990s especially the secretive power exercised by the military bureaucracy and courts against democratic action 13 over the last few decades with the concurrent rise of finance capitalism and the privatization of many facets of national security associated with what we call neoliberalism ldquo deep state rdquo conspiracies have grown some of them are nutty and only add to the fetish as described three years before 9 11 by fredric jameson ldquo conspiracy one is tempted to say is the poor person rsquo s cognitive mapping in the postmodern age it is a degraded figure of the total logic of late capital a desperate attempt to represent the latter rsquo s system whose failure is marked by its slippage into sheer theme and content rdquo slippage between theme and content seems like a nice way of describing the hope held by many liberals that a cia program of domestic destabilization will save us all from donald trump 14 by my count the current usage of ldquo deep state rdquo as it supposedly relates to trump rsquo s troubles entails three overlapping understandings the first has to do with war militarism and intelligence the secret institutions that have deep roots but were fused together in a powerful way under the administrations of george w bush and barack obama marc ambinder rsquo s book deep state along with this recent essay in foreign policy are good guides the second with private corporate power especially associated with finance the arms trade and fossil fuels and the third with the many embedded bureaucrats of the us government rsquo s many administrative agencies who we hope are leading a passive resistance to trump rsquo s program of privatization and deregulation ldquo when the great lord passes the peasant bows deeply and silently farts rdquo mdash and then tweets about it from a rogue nasa account 15 there rsquo s a fourth way the term is used to refer to an almost hereditary covert caste running from the men who in the early days of the cold war set up the modern national security state to the elite who make up today rsquo s ldquo intelligence community rdquo in 1964 random house published the bestselling the invisible government by journalists david wise and thomas ross here rsquo s the cia rsquo s declassified review of the book which takes exception to its thesis more recently michael glennon rsquo s national security and double government updated the argument peter dale scott was the first as far as i know to use the phrase ldquo parapolitics rdquo and ldquo deep politics rdquo to discuss what is now described as the deep state and he rsquo s the author of numerous books on the dense connections between illegal drugs covert action and finance i rsquo ve always been a bit agnostic about scott rsquo s work overwhelmed by the sheer detail but then i remember that iran contra really did happen as michael parenti likes to point out conspiracies do in fact exist both in legal theory and in politics watergate iran contra the savings and loan scandal of the 1980s 90s ldquo described by the justice department as lsquo a thousand conspiracies of fraud theft and bribery rsquo the greatest financial crime in history rdquo that we know of 16 much of the writing frames the question as trump versus the deep state but even if we take the ldquo deep state rdquo as a valid concept surely it rsquo s not useful to think of the competing interests it represents as monolithic as david martin in an e mail suggests big oil and wall street might want deregulation and an opening to russia the euphemistically titled ldquo intelligence community rdquo wants a ramped up war footing high tech wants increased trade trump who presents as pure id wrapped in ambition motived by appetite wants it all mdash which makes him both potentially useful and inherently unstable simultaneously a product and target of the deep state in 1956 c wright mills wrote that ldquo the conception of the power elite and of its unity rests upon the corresponding developments and the coincidence of interests among economic political and military organizations rdquo if nothing else the ldquo trump v deep state rdquo framings show that unity is long gone 17 the literature on the ldquo deep state rdquo is overwhelming and includes many of the books that were the production of the first generation of new left investigative journalists including those found in mark lombardi rsquo s library here rsquo s a very small starting bibliography based on a facebook survey apologies for omissions let rsquo s first however start with this caution by richard hofstadter which mills cites in the power elite ldquo there is a great difference between locating conspiracies in history and saying that history is in effect a conspiracy between singling out those conspiratorial acts that do on occasion occur and weaving a vast fabric of social explanation out of nothing but skeins of evil plots rdquo 18 david talbot the devil rsquo s chessboard allen dulles the cia and the rise of america rsquo s secret government19 jane mayer dark money the hidden history of the billionaires behind the radical right20 tom engelhardt shadow government surveillance secret wars and a global security state in a single superpower world tom is the editor of the invaluable tomdispatch com 21 bruce cumings the origins of the korean war volume 2 the historian brad simpson writes that the first 185 pages of the second volume of this book is terrific at explaining the onset of the korean war simpson is critical of the concept of ldquo deep state rdquo he argues that it is ldquo a way for people on the left to try and pathologize or render conspiratorial the normal workings of exec branch agencies and power vis a vis the foreign policy apparatus more generally there are policy currents and social constituencies in industry finance etc that find expression in particular agencies and factions of particular agencies and whose views are not all that hard to discern even if they are idiosyncratic rdquo 22 engelbrecht and f c hanighen merchants of death a study of the international armament industry mdash from 1934 23 michael glennon rsquo s national security and double government24 alfred mccoy the politics of heroin cia complicity in the global drug trade25 jeffrey st clair and alexander cockburn whiteout the cia drugs and the press26 hugh wilford the mighty wurlitzer how the cia played america27 gary webb dark alliance the cia the contras and the crack cocaine explosion28 robert parry secrecy and privilege rise of the bush dynasty from watergate to iraq parry was one of the best reporters on iran contra for which he paid a high professional price gary sick october surprise america rsquo s hostages in iran and the election of ronald reagan see also parry rsquo s reporting on the 1980 october surprise 29 tim weiner legacy of ashes the history of the cia30 greg grandin empire rsquo s workshop latin america the united states and the rise of the new imperialism self promotion but the point of this book was to think of iran contra beyond the binds of conspiracy theory as the venue that reconciled the various contradictory strains of the new right 3

Keep on reading: What Is the Deep State?
          Comment on The Truth About Inside the Deep & Dark Web by Deepti        
It’s not something out of this world, on the contrary, you are probably accessing the deep web on a regular basis — your emails, online banking transactions, direct messages on Twitter, Instagram and much more.
          The Secrets of Tor and the Deep Web        
What is Tor? What's the web under the web? What's really going on? We dish out the details.
          Privacy VS Sicurezza        

sicurezza

Secondo un indagine di Eset, una società che si occupa di sicurezza informatica, circa l’80% degli italiani vorrebbero una sicurezza maggiore rispetto a quella attuale. Ma non solo: sarebbero addirittura propensi a sacrificare la loro provacy pur di aumentare la sicurezza. La privacy sarebbe quindi, per la prima volta, sacrificabile purchè sia garantito un controllo rigido e severo sul web da parte delle forze di polizia. La maggior parte degli italiani sembra avallare questa ipotesi: solo il 19,9% invece risulta favorevole ad una maggiore privacy sebbene la sicurezza non sia delle migliori. In quest’ultima fascia rientrano molti ragazzi e studenti che cercano disperatamente lavoro sul web e sono anche la maggior categoria di persone che utilizza internet. Secondo questa ricerca inoltre sono state effettuate statistiche anche in merito alla conoscenza degli italiani in merito agli strumenti utilizzati nella navigazione o alcune componenti come alcune minacce del web e il Deep Web, ossia quella sezione di internet non indicizzata tramite i motori di ricerca tradizionali. Eset afferma che 4,7 milioni di utenti conoscono il Deep Web: soprattutto la curiosità dei giovani gioca un ruolo molto importante. Infatti, i giovani tra i 18 e i 35 anni, in possesso di un titolo di studio e residenti sia in centro che in sud Italia hanno dimostrato le loro conoscenze in merito agli strumenti e componenti informatici. Il 17% degli intervistati  conosce il Deep Web mentre il 26% ha utilizzato o ha conosce Bitcoin, la moneta virtuale utilizzata. Il 45% degli intervistati invece sembra del tutto ignaro del Deep Web, pensando addirittura che sia uno strumento utilizzato per traffici illeciti. Bisogna però considerare che la conoscenza riguardo sicurezza e privacy non è sottovalutata dagli italiani che conoscono bene sia lo spazio di accesso a informazioni e notizie non pubblicate sulla stampa ufficiale, sia le misure di privacy, sia i metodi per navigare in incognito w sia come sottrarsi alla censura.
          Rubati Account Twitter        

Errore sul database di WordPress: [Table 'websec_.recent' doesn't exist]
SHOW FULL COLUMNS FROM `recent`

Errore sul database di WordPress: [Table 'websec_.recent' doesn't exist]
SHOW FULL COLUMNS FROM `recent`

Twitter

Negli ultimi mesi leggiamo sempre più spesso casi di furti di password e account; dopo LinkedIn e MySpace è fresca la notizia di 32 milioni di account Twitter rubati. Tra questi troviamo anche molti account di utenti italiani: attraverso virus diffusi tra i pc degli utenti sono stati rubati moltissimi dati di accesso. Dopo tutti questi furti è stato anche rilevato che moltissime password erano davvero semplici e banali. LeakedSource ha dichiarato che le password rubate sono precisamente di 32.888.300: queste, tramite un hacker russo, sono state vendute sul deep web. Un vero e proprio tesoretto: un “baule” pieno di account ( molti dei quali anche italiani) dal valore circa di 6 mila dollari. Il blog LeakedSource dedicato alla sicurezza ha inoltre rivelato di aver ottenuto l'informazione da Tessa88@exploit.im, alias che rimanda a quello utilizzato per violare il social network russo VK. L’haking di massa ha rubato account non solo russi: infatti, nell’elenco riportato, troviamo anche due email italiane, libero.it (circa 60 mila) e hotmail.it (48 mila) sebbene il record è detenuto da mail.ru (5 milioni), yahoo.com (4,7 milioni), hotmail.com (4,5 milioni) e anche gmail.com (3,3 milioni). Twitter è ora in allerta e tramite un tweet “To help keep people safe and accounts protected, we've been checking our data against what's been shared from recent password leaks” ha infatti spiegato che starebbe passando al setaccio tutti i suoi database: dale analisi svolte, Michael Coates, responsabile sicurezza, ha rassicurato i suoi utenti dichiarando che il social non sarebbe stato violato. Infatti, il blog LeakedSource ha spigato che l’attacco non era diretto a Twitter: le credenziali degli utenti sono state rubate attraverso un virus che ha infettato i pc. Lo stesso blog ha inoltre affermato che le password erano, come abbiamo detto, molto semplici e facili da indovinare. Oltre il danno anche la beffa: è stata appurata anche la poca creatività degli utenti!
          Chemicals        
CHEMICALS

In the News

>>Smart Choices About Pesticides - Pesticides are designed to repel or kill pests, but can have unwanted effects on other organisms and wash off into rivers, oceans, and our water supplies. Click here for fact sheets on ants, fleas, roaches, yellowjackets, healthy gardens, aphids, lawn care, snails & slugs, roses, and weeds.

>>Widely used pesticide atrazine found widespread in U.S. drinking waters -
Banned by the European Union, atrazine is the most commonly detected pesticide in U.S. waters and is a known endocrine disruptor, which means that it affects human and animal hormones. It has been tied to poor sperm quality in humans and hermaphroditic amphibians. Via ENN.

>>2009 Environmental Working Group Sunscreen Guide - "3 of 5 brand-name sunscreens either don’t protect skin from sun damage or contain hazardous chemicals — or both. An Environmental Working Group investigation of 1,671 sunscreens rates the season’s best — and worst."

>>BPA linked to heart arrhythmia and female infertility - New animal study links Bisphenol A (aka BPA) to more health problems. BPA is the basic building block of polycarbonate plastics...Via Science News

>>Consumers instantly recognize them as household miracles of modern chemistry- Teflon, Scotchgard, Stainmaster, Gore-Tex - But PFC's are now found to be toxic and a risk to humans and
other living creatures.

>>Flame Retardant Chemicals Taint all U.S. Waters -
Chemicals used as flame retardants in consumer products since the 1970s now are found in all U.S. coastal waters and the Great Lakes. Via ENN

>>California officials launch 'Green Chemistry' initiative - The plan would inform consumers how items sold in the state are manufactured and transported and how environmentally safe their ingredients are. Via LA Times.

>>
Follow-Up Tests of Leading Personal Care and Household Cleaning Brands Reveal Improvements in Levels of Carcinogenic 1,4-dioxane - 3/6/2009 ANAHEIM, CA - a new follow-up study was released that assesses levels of the petrochemical carcinogen 1,4-dioxane in leading conventional as well as "natural" and "organic" brands of personal care and household cleaning products. The results indicate significant improvement for 23 products from sixteen major brands that had formerly been found to contain potentially dangerous levels of the contaminant 1,4-dioxane in a similar study held in March of 2008. Click here to download a PDF of the new results. Via Organic Consumers Association.

>>Toxic toys - PBS web video documenting the Phthalates issue as an example of the safer EU standards versus the more dangerous US standards.

Hygiene Products, Cosmetic Safety and Chemical Regulations
>>Skin Deep - Take a look at the best resource available for finding out the safety of your daily hygiene products. The Environmental Working Group, who put together the Skin Deep website, is a terrific resource for information regarding environmental health.

>>HealthyStuff.org - Contains a database of more than 5,000 products to help you find out what chemicals are in everything from your car to your pet's chew toy.

>>Ch
emicals In The Home - NPR's interactive guide highlighting some differences between EU and US chemical regulations. Via NPR.

EcoHome: Safer Home Cleaning & Repair Products, and Integrated Pest Management (IPM)

>>Getting rid of ants without chemicals: learn how to use vinegar and coffee grounds to control ants at eHow.com

>>Plastic Albatross - Plastic Albatross is community-based campaign to educate the public about toxins in plastics and household products and their burden on the health and fertility of humans.

>>
Consumer Reports' GreenerChoices.org lists several simple recipes for making cleaners at home using familiar household ingredients. See all the recipes.

>>Alternative Household Product Recipes (PDF)- from 888CleanLA

>>I Don't Want to Scrub - A test of eight green bathroom cleaning products from Grist.org

>>Arm & Hammer Essentials - check out Arm & Hammers newest line of products. They used phosphate free, biodegradable ingredients and come in concentrated bottles which means less packaging and less transportation cost and pollution.

>>Bio-Integral Resource Center (BIRC) - They specialize in finding non-toxic and least-toxic, integrated pest management (IPM) solutions to urban and agricultural pest problems.

>>Eco Painting Tips - Visit living expert Danny Seo's blog to learn about eco-friendly painting tips from biodegradable drop cloths to zero-VOC paints.

PVC
>>PVC Poison Plastic - Learn about the dangers of PVC and it's hazardous life cycle, from manufacturing to disposal.

>>Company PVC Policies - List of Companies Phasing out PVC

Safety Regulation
>>Via Organic Consumers Association
MYTH - Cosmetics are carefully regulated by the FDA
  • FACTS -The FDA does not conduct or require independent pre-market safety testing of new products or chemicals. The cosmetics and personal care products industry must provide its own safety testing.
  • Companies are allowed to provide data to the FDA regarding the safety of their own product ingredients by funding scientific review boards comprised of doctors and toxicologists which they select. In this way, companies seeking to profit from products may influence the selection of study results submitted to the FDA submits.
  • Once a product is on the market, the burden of legal proof required for its removal is extremely high.
  • Since cancer and birth defects are often latent occurrences, it is difficult if not impossible to prove causation in the judicial system. Therefore, it is nearly impossible to remove a potentially dangerous product.
Disposing Unused Meds or Medical Supplies?
Have you ever flushed old pharmaceuticals down the toilet or dumped them into the trash? Unfortunately, our waterways and landfills are becoming polluted with chemicals from disposed pharmaceuticals, negatively affecting humans and wildlife. So until our Federal government instates a program to properly dispose of old pharmaceuticals (pilot programs are currently underway), please take a minute to check the nonprofit Healthy Equity Project and see if and how you can donate your medicines or medical supplies to needy people in developing countries.


          Chemicals        
CHEMICALS

In the News

>>Smart Choices About Pesticides - Pesticides are designed to repel or kill pests, but can have unwanted effects on other organisms and wash off into rivers, oceans, and our water supplies. Click here for fact sheets on ants, fleas, roaches, yellowjackets, healthy gardens, aphids, lawn care, snails & slugs, roses, and weeds.

>>Widely used pesticide atrazine found widespread in U.S. drinking waters -
Banned by the European Union, atrazine is the most commonly detected pesticide in U.S. waters and is a known endocrine disruptor, which means that it affects human and animal hormones. It has been tied to poor sperm quality in humans and hermaphroditic amphibians. Via ENN.

>>2009 Environmental Working Group Sunscreen Guide - "3 of 5 brand-name sunscreens either don’t protect skin from sun damage or contain hazardous chemicals — or both. An Environmental Working Group investigation of 1,671 sunscreens rates the season’s best — and worst."

>>BPA linked to heart arrhythmia and female infertility - New animal study links Bisphenol A (aka BPA) to more health problems. BPA is the basic building block of polycarbonate plastics...Via Science News

>>Consumers instantly recognize them as household miracles of modern chemistry- Teflon, Scotchgard, Stainmaster, Gore-Tex - But PFC's are now found to be toxic and a risk to humans and
other living creatures.

>>Flame Retardant Chemicals Taint all U.S. Waters -
Chemicals used as flame retardants in consumer products since the 1970s now are found in all U.S. coastal waters and the Great Lakes. Via ENN

>>California officials launch 'Green Chemistry' initiative - The plan would inform consumers how items sold in the state are manufactured and transported and how environmentally safe their ingredients are. Via LA Times.

>>
Follow-Up Tests of Leading Personal Care and Household Cleaning Brands Reveal Improvements in Levels of Carcinogenic 1,4-dioxane - 3/6/2009 ANAHEIM, CA - a new follow-up study was released that assesses levels of the petrochemical carcinogen 1,4-dioxane in leading conventional as well as "natural" and "organic" brands of personal care and household cleaning products. The results indicate significant improvement for 23 products from sixteen major brands that had formerly been found to contain potentially dangerous levels of the contaminant 1,4-dioxane in a similar study held in March of 2008. Click here to download a PDF of the new results. Via Organic Consumers Association.

>>Toxic toys - PBS web video documenting the Phthalates issue as an example of the safer EU standards versus the more dangerous US standards.

Hygiene Products, Cosmetic Safety and Chemical Regulations
>>Skin Deep - Take a look at the best resource available for finding out the safety of your daily hygiene products. The Environmental Working Group, who put together the Skin Deep website, is a terrific resource for information regarding environmental health.

>>HealthyStuff.org - Contains a database of more than 5,000 products to help you find out what chemicals are in everything from your car to your pet's chew toy.

>>Ch
emicals In The Home - NPR's interactive guide highlighting some differences between EU and US chemical regulations. Via NPR.

EcoHome: Safer Home Cleaning & Repair Products, and Integrated Pest Management (IPM)

>>Getting rid of ants without chemicals: learn how to use vinegar and coffee grounds to control ants at eHow.com

>>Plastic Albatross - Plastic Albatross is community-based campaign to educate the public about toxins in plastics and household products and their burden on the health and fertility of humans.

>>
Consumer Reports' GreenerChoices.org lists several simple recipes for making cleaners at home using familiar household ingredients. See all the recipes.

>>Alternative Household Product Recipes (PDF)- from 888CleanLA

>>I Don't Want to Scrub - A test of eight green bathroom cleaning products from Grist.org

>>Arm & Hammer Essentials - check out Arm & Hammers newest line of products. They used phosphate free, biodegradable ingredients and come in concentrated bottles which means less packaging and less transportation cost and pollution.

>>Bio-Integral Resource Center (BIRC) - They specialize in finding non-toxic and least-toxic, integrated pest management (IPM) solutions to urban and agricultural pest problems.

>>Eco Painting Tips - Visit living expert Danny Seo's blog to learn about eco-friendly painting tips from biodegradable drop cloths to zero-VOC paints.

PVC
>>PVC Poison Plastic - Learn about the dangers of PVC and it's hazardous life cycle, from manufacturing to disposal.

>>Company PVC Policies - List of Companies Phasing out PVC

Safety Regulation
>>Via Organic Consumers Association
MYTH - Cosmetics are carefully regulated by the FDA
  • FACTS -The FDA does not conduct or require independent pre-market safety testing of new products or chemicals. The cosmetics and personal care products industry must provide its own safety testing.
  • Companies are allowed to provide data to the FDA regarding the safety of their own product ingredients by funding scientific review boards comprised of doctors and toxicologists which they select. In this way, companies seeking to profit from products may influence the selection of study results submitted to the FDA submits.
  • Once a product is on the market, the burden of legal proof required for its removal is extremely high.
  • Since cancer and birth defects are often latent occurrences, it is difficult if not impossible to prove causation in the judicial system. Therefore, it is nearly impossible to remove a potentially dangerous product.
Disposing Unused Meds or Medical Supplies?
Have you ever flushed old pharmaceuticals down the toilet or dumped them into the trash? Unfortunately, our waterways and landfills are becoming polluted with chemicals from disposed pharmaceuticals, negatively affecting humans and wildlife. So until our Federal government instates a program to properly dispose of old pharmaceuticals (pilot programs are currently underway), please take a minute to check the nonprofit Healthy Equity Project and see if and how you can donate your medicines or medical supplies to needy people in developing countries.


          Chemicals        
CHEMICALS

In the News

>>Smart Choices About Pesticides - Pesticides are designed to repel or kill pests, but can have unwanted effects on other organisms and wash off into rivers, oceans, and our water supplies. Click here for fact sheets on ants, fleas, roaches, yellowjackets, healthy gardens, aphids, lawn care, snails & slugs, roses, and weeds.

>>Widely used pesticide atrazine found widespread in U.S. drinking waters -
Banned by the European Union, atrazine is the most commonly detected pesticide in U.S. waters and is a known endocrine disruptor, which means that it affects human and animal hormones. It has been tied to poor sperm quality in humans and hermaphroditic amphibians. Via ENN.

>>2009 Environmental Working Group Sunscreen Guide - "3 of 5 brand-name sunscreens either don’t protect skin from sun damage or contain hazardous chemicals — or both. An Environmental Working Group investigation of 1,671 sunscreens rates the season’s best — and worst."

>>BPA linked to heart arrhythmia and female infertility - New animal study links Bisphenol A (aka BPA) to more health problems. BPA is the basic building block of polycarbonate plastics...Via Science News

>>Consumers instantly recognize them as household miracles of modern chemistry- Teflon, Scotchgard, Stainmaster, Gore-Tex - But PFC's are now found to be toxic and a risk to humans and
other living creatures.

>>Flame Retardant Chemicals Taint all U.S. Waters -
Chemicals used as flame retardants in consumer products since the 1970s now are found in all U.S. coastal waters and the Great Lakes. Via ENN

>>California officials launch 'Green Chemistry' initiative - The plan would inform consumers how items sold in the state are manufactured and transported and how environmentally safe their ingredients are. Via LA Times.

>>
Follow-Up Tests of Leading Personal Care and Household Cleaning Brands Reveal Improvements in Levels of Carcinogenic 1,4-dioxane - 3/6/2009 ANAHEIM, CA - a new follow-up study was released that assesses levels of the petrochemical carcinogen 1,4-dioxane in leading conventional as well as "natural" and "organic" brands of personal care and household cleaning products. The results indicate significant improvement for 23 products from sixteen major brands that had formerly been found to contain potentially dangerous levels of the contaminant 1,4-dioxane in a similar study held in March of 2008. Click here to download a PDF of the new results. Via Organic Consumers Association.

>>Toxic toys - PBS web video documenting the Phthalates issue as an example of the safer EU standards versus the more dangerous US standards.

Hygiene Products, Cosmetic Safety and Chemical Regulations
>>Skin Deep - Take a look at the best resource available for finding out the safety of your daily hygiene products. The Environmental Working Group, who put together the Skin Deep website, is a terrific resource for information regarding environmental health.

>>HealthyStuff.org - Contains a database of more than 5,000 products to help you find out what chemicals are in everything from your car to your pet's chew toy.

>>Ch
emicals In The Home - NPR's interactive guide highlighting some differences between EU and US chemical regulations. Via NPR.

EcoHome: Safer Home Cleaning & Repair Products, and Integrated Pest Management (IPM)

>>Getting rid of ants without chemicals: learn how to use vinegar and coffee grounds to control ants at eHow.com

>>Plastic Albatross - Plastic Albatross is community-based campaign to educate the public about toxins in plastics and household products and their burden on the health and fertility of humans.

>>
Consumer Reports' GreenerChoices.org lists several simple recipes for making cleaners at home using familiar household ingredients. See all the recipes.

>>Alternative Household Product Recipes (PDF)- from 888CleanLA

>>I Don't Want to Scrub - A test of eight green bathroom cleaning products from Grist.org

>>Arm & Hammer Essentials - check out Arm & Hammers newest line of products. They used phosphate free, biodegradable ingredients and come in concentrated bottles which means less packaging and less transportation cost and pollution.

>>Bio-Integral Resource Center (BIRC) - They specialize in finding non-toxic and least-toxic, integrated pest management (IPM) solutions to urban and agricultural pest problems.

>>Eco Painting Tips - Visit living expert Danny Seo's blog to learn about eco-friendly painting tips from biodegradable drop cloths to zero-VOC paints.

PVC
>>PVC Poison Plastic - Learn about the dangers of PVC and it's hazardous life cycle, from manufacturing to disposal.

>>Company PVC Policies - List of Companies Phasing out PVC

Safety Regulation
>>Via Organic Consumers Association
MYTH - Cosmetics are carefully regulated by the FDA
  • FACTS -The FDA does not conduct or require independent pre-market safety testing of new products or chemicals. The cosmetics and personal care products industry must provide its own safety testing.
  • Companies are allowed to provide data to the FDA regarding the safety of their own product ingredients by funding scientific review boards comprised of doctors and toxicologists which they select. In this way, companies seeking to profit from products may influence the selection of study results submitted to the FDA submits.
  • Once a product is on the market, the burden of legal proof required for its removal is extremely high.
  • Since cancer and birth defects are often latent occurrences, it is difficult if not impossible to prove causation in the judicial system. Therefore, it is nearly impossible to remove a potentially dangerous product.
Disposing Unused Meds or Medical Supplies?
Have you ever flushed old pharmaceuticals down the toilet or dumped them into the trash? Unfortunately, our waterways and landfills are becoming polluted with chemicals from disposed pharmaceuticals, negatively affecting humans and wildlife. So until our Federal government instates a program to properly dispose of old pharmaceuticals (pilot programs are currently underway), please take a minute to check the nonprofit Healthy Equity Project and see if and how you can donate your medicines or medical supplies to needy people in developing countries.


          Cara Melihat dan Akses Deep Web (Situs Tersembunyi)        

Deep Web adalah istilah untuk semua konten di internet yang tidak diindeks oleh mesin pencari (Google, Yahoo, Bing dan sebagainya). Hal ini termasuk halaman yang berada di belakang proteksi password, halaman yang tidak terkait dengan dengan halaman lain, halaman yang tidak dibiarkan untuk di indeks mesin pencari, dan konten yang dihasilkan secara dinami. Sebagian besar […]

The post Cara Melihat dan Akses Deep Web (Situs Tersembunyi) appeared first on OFamni.


           The Deep Webbys with Hannibal Buress         
The Deep Webbys with Hannibal Buress

The Deep Webbys with Hannibal Buress 2:57
Hannibal Buress, host of the 2015 Webby Awards, will also be presenting for the Deep Webbys. Unless someone hires a bitcoin assassin to take him out.
Submitted by: Funny Or Die
Worthy
Keywords: The Deep Webbys with Hannibal Buress webby awards hannibal awards show hannibal buress hannibal buress awards hannibal buress deep web deep webby awards
Views: 56,587


          [SUMMERCAMP1997-2017] STEVE OKLYN        

Raf Simons TEENAGE SUMMERCAMP Spring/Summer 1997 Demna Gvasalia VETEMENTS SUMMERCAMP Spring/Summer 2017 The banality of this unoriginal project is astounding. The word within the deep web underground is that VET/BAL […]

The post [SUMMERCAMP1997-2017] STEVE OKLYN appeared first on APAR.TV.


          Impressions of React Europe 2016        

Last week I went to the React Europe conference 2016 in Paris. It was a lot of fun and inspirational as well. I actually hadn't used React for about 6 months because I've been focusing on server-side stuff, in particular Morepath, but this really makes me want to go and work with it again (I'm available). I especially enjoy the creativity in the community.

In this post I want to give my impression of the conference, and highlight some talks that stood out to me. There are actually too many to highlight here: I thought the talk quality of this conference was very high. I also appreciated the wide range of topics -- not everything was about React directly. More of that, please!

Travel

I was quite worried about travel this year. I'm in the Netherlands, so it all should be so easy: hop in a train to go to Rotterdam, a 45 minute ride. Then take the Thalys that speeds from Rotterdam to Paris in about 3 hours. In total it takes about 4 hours. Awesome.

But it's strike season in France. Railway strikes were threatened. And then there was a railway strike in Belgium, through which the train passes, on the day I was to travel. Uh oh. I already got some warnings in the days in advance about possible train cancellations due to the strikes. But my train was still going.

But travel in the Netherlands at least wasn't disrupted, so I wasn't worried about that. I made it in time to the normal intercity train that brings me from my home town, Tilburg, to Rotterdam. Found a comfortable seat. All ready to go. Then an announcement: please leave the train as it can go no further. A cargo train had broken down ahead of us. Argh!

In the end I managed to get to Rotterdam and catch a later Thalys, and made it to Paris, just 2 hours later than I'd planned.

I was also worried about announced strikes in the Paris metro system on the day of the conference. Getting around in Paris is very convenient with the metro, but not if it isn't going. In the end the metro wasn't affected.

What I did not anticipate was the whole flood situation, to the point where they had to move parts of the inventory of the Louvre. But Paris is a big city and the floods did not affect me.

So in the end what I worried about never happened and stuff happened that I didn't worry about at all.

Hackathon and MobX

Like last year there was a hackathon one day ahead of the conference at the Mozilla offices in Paris.

Last year's hackathon was special: I met up with Lee Bannard and we worked on reselect, which became quite a popular little library for use with Redux. You might enjoy my story on that.

I was very happy to see Lee again at this year's hackathon. We didn't create any new code this time; we spent most of our time learning about MobX, which I first heard about that day. We met Devin Pastoor at the hackathon. He already had a little app that used MobX that he wanted to work on together. Lee and myself helped a little with it but then got distracted trying to figure out how MobX's magic works.

MobX is a state management library, typically used with React, that takes a different approach than the now dominant library for this, Redux. Mobx lets you use normal OOP style objects with state and references in your client-side model. Unlike Redux is does not require you to normalize your state. MobX observes changes to your objects automatically and is very clever about only updating the parts of the UI that are affected.

This gives MobX different tradeoffs than Redux. I haven't used MobX in practice at all, but I would say MobX is less verbose than Redux, and you get more performance out of the box automatically. I also think it would be easier for newcomers to adopt. On the other hand Redux's focus on the immutable state constraint simplifies testing and debugging, and opened up a rich ecosystem of extensions. Redux's implementation is also a lot simpler. People want a simple answer to "what is better", but these really are tradeoffs: which way is the right way for you and applications depends on who you are and what you are working on.

Sorry folks, Lee and I created no thing new this time. But we had fun.

Dan Abramov: The Redux Journey

Dan Abramov, one of my open source heroes, gave a very interesting talk where he talked about the quick and wild ride Redux has been on since last year. Redux was indeed everywhere at this conference, and people were building very cool stuff on top of it.

Dan explained how the constraints of the Redux architecture, such as reducers on immutable state, also lead to its stand-out features, such as simple debugging and persisting and sharing state. He also spoke about how Redux's well-defined minimal contracts help its extension and middleware ecosystem.

Dan's talk is interesting to anyone who is interested in framework design, even if you don't care about React or Redux at all.

Watch "The Redux Journey"

Eric Vicenti: Native Navigation for Every Platform

This talk was about using a Redux-style approach to manage navigation state in mobile apps, so that the app can react appropriately to going "back", and helps with links within the app as well as it responding to links from other apps. Web folks have deep experience with links and is an example of how bringing web technology to mobile app development can also help make mobile app development easier.

Watch "Native Navigation for Every Platform"

Lin Clark: A cartoon guide to performance in React

Lin Clark gave a great talk where she explained why React can be fast, and how you can exploit its features to help it along. Explaining complex topics well to make them seem simple is hard, and so I appreciated how well she accomplished it.

If you are new to React this is a really good talk to watch!

Watch "A cartoon guide to performance in React"

Christopher Chedeau: Being Successful at Open Source

Christopher described what strategies Facebook uses when they open source stuff. I especially liked the question they made sure to ask: "What did you struggle with?". Not "what do you want?" as that can easily devolve into a wishlist discussion, but specifically asking about problems that newcomers had. One fun anecdote: the way to make a FAQ go away was not writing more documentation but changing an error message.

I also liked the clever "fake it until you make it" approach to making a community appear more active than it is in the early stages, so that it actually becomes active. One trick they used is to ask people to blog about React, then publish all those links on a regular basis.

As an individual developer who occasionally open sources stuff I must point out rule 0 for open source success is "be a huge company with lots of resources like Facebook". Without those resources it is a much bigger struggle to build an open source community. (It also doesn't help that with Morepath I picked a saturated space: Python web frameworks. It's hard to convince people it's innovative. But that was the same problem React faced when it was first released.) (UPDATE: of course Facebook-level resources are not required for open source success, there are a lot of counter examples, but it sure helps. The talk mentions a team of multiple people engaging the community through multiple routes. A single individual can't replicate that at the start.)

Nevertheless, open source success for React was by no means guaranteed, and React helped make Facebook's reputation among developers. They made the React open source community really work. Kudos.

Watch "Being Successful at Open Source"

Dan Schafer: GraphQL at Facebook

I liked Dan Schafer's talk: a nice quick recap of why GraphQL is the way it is, some clear advice on how to deal with authorization in GraphQL, then a nice discussion on how to implement efficient queries with GraphQL, and why GraphQL cache keys are the way they are. Clear, focused and pragmatic, while still going into to the why of things, and without overwhelming detail.

Watch "GraphQL at Facebook"

Jeff Morrison: A Deepdive into Flow

This talk was about the implementation of Flow, which is a type checker for JavaScript code. This is a very complex topic involving compiler technology and type inferencing, and was still amazingly clear. The talk gave me the nice illusion I actually understand how Flows works. It also makes me want to try Flow again and integrate it into my development tool chain.

Flow is a general JavaScript tool. It comes out of Facebook but is not directly connected to React at all, even more so than something like GraphQL. I really appreciated that the organizers included talks like this and mixed things up.

Watch "A Deepdive into Flow"

Cheng Lou: On the Spectrum of Abstraction

This talk, which isn't about React, really stood out for me, and from what I heard also resonated with others at the conference. It tied neatly into the themes Dan Abramov already set up in his opening talk about Redux. Dan told me later this was not actually coordinated. The ideas are just in the air, and this speaks for the thoughtfulness of the React community.

Cheng Lou's talk was a very high level talk about the benefits and the costs of abstraction. This is something I care about a lot as a developer: how do I avoid over-engineering and under-engineering (I've written about it before), and solve problems at the right level? Software has many forces on many levels pulling at it, from end-users to low-level details, and how do you balance out these forces? Engineering is so much about dealing with tradeoffs. How do you even communicate about this?

The next day I had an interesting chat with Cheng Lou about his talk, where he discussed various things he had to cut out of his talk so it wouldn't be too long. He also mentioned Up and Down the Ladder of Abstraction by Bret Victor, so that is now on my reading list.

I highly recommend this talk for anyone interested in these topics.

Watch "On the Spectrum of Abstraction"

Preethi Kasireddy: Going from 0 to full-time software engineer in 6 months

This was a 5 minute lightning talk with a personal story: how overwhelming software development is to a newcomer and how it can nonetheless be learned. During the talk I was sitting next to someone who was relatively new to software development himself and I could see how much this talk resonated with him.

Preethi Kasireddy also encouraged more experienced developers to mentor newcomers. I've found myself that mentoring doesn't have to take a lot of time and can still be hugely appreciated. It's fun to do as well.

A new developer is often insecure as there are just so many things to grasp, and experienced developers seem to know so much. Ironically I sometimes feel insecure as an older, more experienced developer as well, when I see people like Preethi learn software development as quickly as they do. I certainly took more time to get where they are.

But I'm old enough to have gotten used to intimidatingly smart younger people too. I can keep up. The Internet overall helps with learning: the resources on the Internet for a new developer may be overwhelming, but they are also of tremendous value. Preethi called for more intermediate-level resources. I am not sure this series I wrote counts; I suspect Preethi is beyond it, but perhaps others will enjoy it.

(Video not up yet! I'll update this post when it is.)

Jonas Gebhardt: Evolving the Visual Programming Environment with React

This was another one of those non-React talks I really appreciated. It is related to React as it is both inspired by functional programming patterns and component-based design, but it's really about something else: a UI to construct programs by connecting boxes with arrows.

There are many of these around. Because these don't seem to ever enter the daily life of a programmer, I tend to be skeptical about them.

But Jonas Gebhardt acknowledged the prior art, and the approach he described is pragmatic. An open world approach in the web browser, unlike many of the "we are the world" sandbox implementations from the past. Annotated React components can serve as the building blocks. He even sketched out an idea on how to connect UI input and output to custom user interfaces in the end.

So I came away less skeptical. This approach has potential and I'd like to see more.

Watch "Evolving the Visual Programming Environment with React"

Bonnie Eisenman: React Native Retrospective

I really like retrospectives. This was an excellent talk about the history of React Native over the course of the last year and a half. React Native is the technology that lets you use JavaScript and React to develop native iPhone and Android apps. Bonnie Eisenman also wrote a book about it.

React Native is a potential game changer to me as it lets people like me use our deep web development experience to build phone apps. The talk made me excited to go and play with React Native, and I'm sure I wasn't the only one. In a chat afterwards, Bonnie confirmed that was a goal of her talk, so mission accomplished!

Watch "React Native Retrospective"

Phil Holden: subdivide and redux-swarmlog

Phil Holden gave a 5 minute lightning talk, but please give him more space next time. He discussed Subdivide, an advanced split pane layout system for React, and then also discussed another mind-blowing topic: using WebRTC to create a peer to peer network between multiple Redux frontends, so that they share actions. This lets users share data without a server being around. This he packaged as a library in a package called redux-swarmlog.

I've been thinking about peer to peer serverless web applications for some years as I believe they have the potential to change the web, and Phil's talk really reignited that interest. Peer to peer is hard, but the technology is improving. Later that day, I had the pleasure of having a brief chat with Phil about such wild topics. Thanks Phil for the inspiration!

(Video not up yet! I'll update this post when it is.)

Andrew Clark: Recomposing your React application

Andrew Clark is Internet-famous to me, as he created Flummox, the Flux state management framework I used before switching to Redux (Andrew in fact co-created Redux). In this talk he discusses recompose, a library he wrote that helps you do sophisticated things with pure, stateless function components in React. I need to play with it and see whether it fits in my React toolbox. Andrew also described the interesting techniques recompose uses to help reduce the overhead of small composed functions -- this highlights the properties you gain when you stick to the pure function constraint.

Watch "Recomposing your React application"

Jafar Husain: Falcor: One Model Everywhere

When multiple development teams have a similar idea at about the same time, that may be a sign the idea is a good one. This happened to me when I came up with a client-side web framework few years ago, thought I was onto something new, and then Backbone emerged, followed by many others.

Jafar Husain in this well-done talk described how Falcor and GraphQL were a similar solution to similar problems. Both Falcor and GraphQL let the client be in control of what data it demands from the server. He then highlighted the differences between Falcor and GraphQL, where he contrasted Falcor's more lightweight approach to GraphQL's more powerful but involved focus on schemas. It's tradeoffs again: which fits best depends on your use cases and team.

Watch "Falcor: One Model Everywhere"

Laney Kuenzel & Lee Byron: GraphQL Future

This was a wide-ranging talk that went into various issues that GraphQL team at Facebook is trying to solve, mostly centered about the need to receive some form of immediate update when state on the server changes. Laney and Lee presented various solutions in a various states of readiness, from mostly untested ideas to stuff that is already deployed in production at Facebook. Very interesting in you're interested in GraphQL at all, and also if you're interested in how smart people tackle problems.

Watch "GraphQL Future

Constructive feedback

In my blog post last year I was clear I enjoyed the conference a lot, but also engaged in a little bit of constructive criticism. I don't presume that the React Europe organizers directly responded to my feedback, but let's see how they did anyway and give a bit more feedback here. My intent with this feedback is to do my bit to make a great conference even better.

Temperature

Last year the conference was in early July in Paris and it was 40 degrees Celsius. The React Europe team responded by shifting conference a month earlier. It was not too hot: problem solved.

Hackathon

Last year the hackathon assumed people were going to compete in a contest by default instead of cooperate on cool projects. This year they were very clear that cooperation on cool projects was encouraged. Awesome!

Still, I found myself walking around Paris with a friend on Friday night trying to find a quiet place so we could look at some code together. We enjoyed the conversation but we didn't find such a place in the end.

This is why I prefer the approach Python conferences take: a 1-3 day optional sprint for people to participate in after the conference has ended. Why I like afterwards better:

  • You can get involved in cool projects you learned about during the conference.
  • You can get to know people you met during the conference better.
  • Since there is no pressure it's a good way to wind down. Speakers can participate without stressing out about a talk they will be giving soon.

Facebook speakers

Many of the speakers at this conference work for Facebook. They gave excellent talks: thank you. I understand that having a lot of speakers from Facebook is natural for a conference on React, as that's where it originated. (and Facebook hires people from the community). But this is an open source community. While I realize you'd take on more unknown quantities and it would be more difficult to keep up the quality of the talks, I would personally enjoy hearing a few more voices not from Facebook next year.

Gender diversity

Last year I spoke about a bit gender diversity at the conference. This year there were more female speakers than last year (keep it up!), but male voices were still the vast majority. Women speakers are important in helping women participants feel more welcome in our conferences and our community. We can still do a lot better: let's learn from PyCon US.

Back home

The train ride back home on Saturday morning was as it should: uneventful. Left the hotel around 9 am the morning, was back home around 2:30 pm. I came home tired but inspired, as it should be after a good conference. Thanks so much to the organizers and speakers for the experience! I hope you have enjoyed my little contribution.


          The Deep Web: Surfacing Hidden Value        
"by MICHAEL K. BERGMAN This modified version of "The deep Web: Surfacing Hidden Value" appeared in The Journal of Electronic Publishing from the University of Michigan ( http://www.press.umich.edu/jep/07-01/bergman.html ), July 2001."
          JEP: The Deep Web        
"This White Paper is a version of the one on the BrightPlanet site. Although it is designed as a marketing tool for a program "for existing Web portals that need to provide targeted, comprehensive information to their site visitors," its insight into the structure of the Web makes it worthwhile reading for all those involved in e-publishing. "
          Tutto quello che c’è da sapere sul deep web        

The post Tutto quello che c’è da sapere sul deep web appeared first on Key4biz.


          O Site mais Absurdo da Internet         



Você pode pensar que as coisas mais obscuras acontecem só na Deep Web, e sim lá tem muita coisa bizarra, mas aqui na superfície, fuçando nos sites asiáticos e de outros países você pode achar coisas
 bem esquisitas, no minimo. é só o que faltava mesmo...
"Ta difícil achar criancinhas Sr. Pedófilo? Compre uma boneca!" PALHAÇADA !!
(Não adianta gente quando se meche com crianças pra mim, é a morte)


Tudo começa com o nome do site : PlastcVirgin.com 

Esse site vende bonecas de silicone que assim como as adultas são destinadas ao uso sexual, mas são crianças, crianças que usam roupas provocantes, causando a erotização infantil. Olha eu amo a Asia, mas sinceramente, la tem um alto índice de pedófilos pelo visto, e de serial killers. Alguém deveria fazer algo a respeito, mas tudo que o site diz é 100% LEGAL...É SERIO ISSO?
O site ainda afirmou para a mídia americana, que são apenas bonecas, brinquedos inofensivos, que vem com orifícios penetráveis, mas que eles não recomendam q seus clientes o façam ¬ ¬)
Tire suas próprias conclusões: 





Bora denunciar essa patifaria!!





          Besa Mafia legit not fake Deep Web (Mark Daverson)        
Besa Mafia is real, and they have criminals in all countries members on their service. Police should shot them down.
          Medo.Com        


Medo.Com (Fear Dot Com - 2003)
Diretor: William Malone
Elenco: Stephen Dorff, Natascha McElhone, Stephen Rea
Sinopse: Pessoas morrem misteriosamente após visitar um site violento na internet.
Distribuição no Brasil: Columbia Pictures
Download: Medo.Com - Pt 1   Medo.Com - Pt 2  
OBS: Juntar as partes com HJ Split

A internet e seus podres profundos. Todos nós sabemos que coisas ruins existem em qualquer lugar. No esporte, no mundo empresarial, na polícia e em qualquer espaço da terra que esteja habitado por humanos. 

A bestialidade humana é inacreditável e pode estar debaixo do seu nariz, disfarçado, escondido dentro de uma máscara, escondendo o lado mais preconceituoso e bizarro de uma pessoa. 


Uma prova disso é a Deep Web. Leia mais sobre e veja que o mal encontrou um lugar comum para divulgar suas mazelas.

E juntar o medo com a ferramenta que revolucionou a comunicação poderia ser uma ótima ideia para um excelente filme de suspense. É, poderia, mas não foi o que aconteceu em Medo.Com. A história conta pessoas que morrem misteriosamente depois de acessar um site que transmite em tempo real um assassino torturando mulheres até a morte. 

No início, achei que se tratava de um serial killer, um jogo de gato e rato, envolvendo polícia, investigação, suspense, tudo que eu gosto. Mas depois apareceu um fantasma na jogada e fodeu com o filme. A união de um espírito vingativo utilizando a internet para se comunicar falhou. E essa história de espíritos canalizados foi usada de uma forma muito melhor em Vozes do Além (White Noise - 2005)

Aliás, o enredo também lembra muito Ecos do Além (Stir of Echoes - 1999). Em Medo.Com a ligação dos personagens com o fato, os crimes, não rendeu. Foi frouxa, mal amarrada. E se o espírito queria ser ajudado, porque diabos ele matava as pessoas? Era do tipo ajude-me ou eu te mato? Aff, eu deixava ele se foder. 

Ora essa! Natasha McElhone, que interpreta uma agente de saúde que ajuda na investigação, até é bonita, mas falta-lhe expressão. Sua interpretação foi abaixo da crítica. E o diretor William Malone poderia ter evitado mais essa, depois do insosso A Casa da Colina.

          Comment on Deep Web Technologies Adds Multilingual and Multimedia Search Capabilities to Its Explorit Research Accelerator by Comments on What determines quality of search results? | Meta-Mania        
[...] This blog post highlights the factors that influence the quality of federated search results. The author presents the information as a consumer’s  guide to buyers of products for federated  searching.  His comments are relevant to our understanding of the mechanics of federated searching. [...]
          Comment on Deep Web Technologies Adds Multilingual and Multimedia Search Capabilities to Its Explorit Research Accelerator by Carolyn Smith        
"Another reason for the big interest in discovery services is that the onerous task of building, monitoring, and repairing connectors disappears since there are no connectors" Can you tell us how the data is indexed. In my experience of an Enterprise Search Platform, which fits with your description of a discovery service, the connectors still have to be written in order to pull the metadata into the index in the right fields etc. Am I missing something, not being an expert in these matters?
          Comment on Deep Web Technologies Adds Multilingual and Multimedia Search Capabilities to Its Explorit Research Accelerator by Deep Web Technologies: Cracking Multilingual Search 1 : Beyond Search        
[...] to the Federated Search blog post “Researchers Can Now Search Text, Audio, and Video Images in Multiple Languages.” Multilingual federated search rolled out in 2011 is now available to any of DWT’s customers [...]
          Comment on Deep Web Technologies Adds Multilingual and Multimedia Search Capabilities to Its Explorit Research Accelerator by Deep Web Tech: Shattering Search Language Barriers : Beyond Search        
[...] to the Federated Search blog post “Researchers Can Now Search Text, Audio, and Video Images in Multiple Languages,”  multilingual federated search rolled out in 2011 is now available to any Deep Web [...]
          Comment on Deep Web Technologies Adds Multilingual and Multimedia Search Capabilities to Its Explorit Research Accelerator by Google adds graphing calculator to its search results « Wild About Math!        
[...] tip to my brother Abe. Filed under: Education Leave a comment Comments (0) Trackbacks (0) ( subscribe to comments on [...]
          Comment on Deep Web Technologies Adds Multilingual and Multimedia Search Capabilities to Its Explorit Research Accelerator by Alan Cockerill        
Impressed that 1 in 5 17-23 years olds knows what withdrawals are like (push polling maybe?) Would like to have seen a control group - my recollection of being a teen is that 20% being distressed is pretty normal and only 11% feeling isolated is a much better result than the norm ;-)
          Comment on Deep Web Technologies Adds Multilingual and Multimedia Search Capabilities to Its Explorit Research Accelerator by The Distant Librarian        
<strong>Even more reading on Discovery...</strong> Thanks to a post on The Federated Search Blog linking to this page: Articles on Discovery, part of a Google Sites "wiki" called Unified Resource Discovery Comparison. Definitely a well-rounded resource, and one I've just requested write-access to. M...
          Comment on Deep Web Technologies Adds Multilingual and Multimedia Search Capabilities to Its Explorit Research Accelerator by Aaron Tay        
Glad you liked it. BTW Your series of blog posts on the topic was one of the first I struggled through which eventually led to some understanding of the issues involved.
          Comment on Deep Web Technologies Adds Multilingual and Multimedia Search Capabilities to Its Explorit Research Accelerator by The Smarter Catalog, Part Duex | MetaMonster        
[...] OPAC experience. A smarter catalog is something I am very interested in, and learning more about how federated searching might be structured to provide more quality search results across multiple databases, and how the metasearch provided in Google Scholar works, I have a [...]
          Comment on Deep Web Technologies Adds Multilingual and Multimedia Search Capabilities to Its Explorit Research Accelerator by EBSCO refuses to supply content to Ex Libris aggregated search « Bibliographic Wilderness        
[...] other sources. That makes sense, because EBSCO is an aggregator, not an original publisher. However, we know that behind the scenes EBSCO is trying to get more and more publishers to give them exclusi..., such that publishers content won’t even be indexed anywhere but EBSCO.  The goal would seem [...]
          It Happened In Cleveland        
There has been a lot of talk and deep web research concerning balloons around here lately. A party approaches. The issue of balloon release is currently being debated on legal, social and moral levels and while googling advanced balloon release … Continue reading
          Free People Search        
Now you can find anyone - there are special search engines just for that!

free people search


free people finder

best free people finder

free people search engines

free and instant people search

free online people search

best free online people finder

free people search databases

completely free people finders

free people search engine

free people searches

best free people search engine

people search free

free people search canada

people finders searches that are free

where to go for totally free people finder

free people finders

find people free search

free international people search

addresses free people searches

free people search sites

best free people search

list of free people finder

free uk people search

people finder free

people finder search free

free+high+school+people+search

completely free people finder

completely free people search

free unlisted phone number people finders

absolutely free people search

absolutely free people finder

absolutly free people search

free people finder uk

background checks free people searches

totally free people search

background people search free

best totally free people finder

absolutely free people finders

italy free people search

free people address search

canadian free people finder

search for people online for free

100 free people search

instant free people search

free people finder in canada

free people search websites

free search for people

zaba free people search

free online people finder

free people search by social security number

background check free people search

canadian free people search

free uk people finder

free people search uk

best free people finder on the web

totally free people finder

free people search by address

advance people search free

free locate people search engine

people finder website look up free

free canadian people finder

people search for free

free people address finder

people search for mexico free

free people search addresses

finder find people for free

free us people search

uk people search free

free people search results

free search engines people

search for people for free

finder detective people find free

free people search with no cost

free internet people search

canada people search for free

free people finder results

free access reverse e mail people search

free access to people finder

free canada people finder

free canadian people search

free military people search

free people finder in uk

background free canada people search

free australian people finder

free locate people search

people finder for free

best free people search with free results

find finder free people search

find finder free people search

free complete people search

free people finder by email address

free people search white pages

free people search with free results

free email people search

free global people finder

free people search by address only

free people search web sites

free no fees people finder in michigan with

free people finder online

best free people search engines

free new people search

truly free people finder

david a waltermire free people search

free free people search

free people finder by email

free people finder denmark

free people search for address telephone number

free white pages people search

search people for free

free people finder with free results and phone number

people finder free zebra

free people finder including background checks

free search for people websites

people search address results free

free email and people search

free people finder canada

free people finder in michigan with no cost

free investigative people search

free people finders with their address

free people search online

people find locate free search

totally free people address finder

100% free people search

free people finder sites

free people finder websites

free search engine people

people finders free

real people finder for free

really free people search

free people email finder

free people search by name and age

free people finder by social security number

free people search australia

free people search find

free people search finder

free search people usa

people finder free search

search for people free

free people finder search engines

free people search worldwide

people search free england

real free people search

truly free people search

best free people searches

free people finder ivan stokes illinois

free people finder terre haute in

free people finder with their adress

people search free email

usa free people finder

zebra people finder free

free deep web people search

free people birthday search

free people email search

free people international search

free people search in texas

free people search info

free south korea people finder

free spanish people finder

free canadian people search engines

search engines free people find

free people finder usa

free people finder white pages

free public records people search engines

free search engines for finding people

sexy people finder free

canada free people finder

free people address finder uk

england free search people engines

free online people search 411

people finder canada free

best free people finder sites

best free people finders

free international people finder search engines

free online people finders

free people address finders

free people dob finder

free people finder au

free people finder denver colorado

free web people finder

full free people search databases

list of free people finders

people search engines free

100% free people finder

adult blog finder free friend friend meet meet music people share share video

free access to uk people finder

free address people finder

free internet people finder

free people finder in sc

free people finder mn

free people finder sights

great free people finder

people search free finder

the best free online people search

unknown search engines to find people for free

#1 free people finder

100% free people finders

best free people finder and free results

deep web free people finder search engines

free no cost people finder

free online people search sites

free people # finder

free people and relatives finder

free people finder

free people finder + free information

free people finder and e-mail locator

free people search search engines

is there a legitimate free online people search engine that will complete a thorough search?

really free people search engines

search for people free online

the best people finder free
          Key Digital Trends of 2017        
social@Ogilvy has one of the best 2017 trends reports I've read so far. And by "best" I mean that it neatly says all the things I've been thinking about for the last 6 months. Here's the link:  http://www.slideshare.net/socialogilvy/key-digital-trends-for-2017 Need the TL;DR version? Here's my take. Ads and algorithms are driving people crazy and spoiling the social media experience so people are seeking out private channels like Facebook Messenger, WeChat and Slack. Display ads are faltering so marketers are turning to chatbots and heralding AI and machine learning as the next best thing in marketing, which it will be, until advertisers muck it up. Do experiment with chatbots, but when it comes to humans talking to computers, my bet is on Alexa. Dig Deeper version Adblocker Endgame Mary Meeker's 2016 Internet Trends report highlighted the growing use of adblockers. And she called out advertisers and their lame display ads.  Mitch Joel articulates the problematic state of programmatic advertising creative in this Medium post.  In short, advertising is not the problem. Crappy advertising is the problem.  My take: Sometimes advertisers are simply targeting the wrong people. Sometimes the copy needs to better resonate with the intended audience. Those are easy things to address. Chatbots are trickier. The Chatbot Gold Rush As Mary Meeker notes people are driven away from their newsfeeds on social platforms and to the "deep web". Not the dirty underbelly of the dark web and use of proxy services for nefarious activities but messager apps. Small groups. Private chat. WhatsApp, Facebook Messenger and WeChat continue to grow rapidly. No analytics, no audience insights: we're talking about the non-indexed part of the Internet. No ads. But here come the marketers in the form of chatbots. The next best thing--until they screw that up too. The Bookseller has something to say about this in Watch out publishers: the chatbots are coming. AuthorBot is a chat bot for voice-activated book discovery and messaging. Want to experiment writing a chatbot yourself? Think about it as writing the ultimate choose-your-own adventure. Get some pointers in this Quora thread on the best way to learn and write an AI chatbot. Alexa Owns It While you're re-imagining human-computer interaction, keep in mind Amazon's virtual assistant Alexa. Alexa won big at CES and the announcements continue to come. Publishers don't need reminding that Amazon has tricks up its sleeve. As the owner of an Amazon Echo, here's what I see. Alexa fits seamlessly into my daily routine. I talk to the machine. She's nice. Alexa, play [title] on Audible / Kindle Alexa, read [title] Alexa, resume my book Alexa, next chapter Alexa, add [title] to my shopping list / add to cart Alexa, what is your cunning plan? What trend is on your radar for 2017?
          10 Servicios ocultos interesantes en la deep web de TOR – Actualización        
Hace algún tiempo escribí unas pocas entradas sobre algunos servicios ocultos en la red de TOR que a mi parecer eran interesantes por la información que ofrecían, sin embargo, estamos hablando de un red que cambia constantemente y los servicios ocultos se crean y se destruyen de una forma bastante rápida, por ese motivo casi […]
          Hoy vengo a hablar de mi libro: Deep Web: TOR, FreeNET & I2P – Privacidad y Anonimato        
El día de hoy ha salido a la venta mi nuevo sobre anonimato y privacidad, el cual ha recibido el nombre de “Deep Web: TOR, FreeNET & I2P – Privacidad y Anonimato“. Se trata de mi tercera obra, la cual nuevamente ha sido publicada por la editorial 0xWORD. Me ha llevado un poco más de […]
          A lista dos “mercados negros” da Deep Web que muita gente procura        
Nestes mercados podes comprar tudo (ou procurar tudo). Sim, mesmo tudo. Há coisas interessantes como smartphones com coisas engraçadas, algumas PEN USB que podem explodir, cartões SIM de outros países, etc. Conhece aqui esta grande lista de mercados negros na Deep Web!
          Dive Into the Deep Web        
Nearly 99% of all the content on the Web is "hidden" from the major search engines; the information is stored in databases which can't be indexed or spidered by the search engines. To really reach the best cross-section of information on the Web, you should search both the "surface" Web, contained in Google, Yahoo and other standard search engines, as well as the hidden web resources. Most people can do basic searches on the major search engines, but when it comes to finding the storehouse located within the Hidden Web, very few people know how to reach that data.
          Finding Gems on the Deep Web        
Once you know how to search the deep web, you'll have to stop yourself from spending hours upon hours just trolling for new ideas. To help focus, here are a few ideas for using the resources found on the hidden web or deep web: Look for new places to market your products. You can find websites, businesses, publications, and periodicals where you might advertise, run articles, or reach new prospects.
          Comment on Fel akarod fedezni az internet sötétebb bugyrait? Itt a térkép! by Kirathekiller12        
Annyit helyesbítenék a cikkben, hogy a deep web kb. 90%-a semmi, netes szemét, esetleg pár adat (gmail fiókokhoz tartozó jelszavak, bankkártya adatok stb.), 8-9%-a pedig a dark web, amiről ti is beszéltek, bár dark weben maximum drogot tudsz venni, meg gyermekpornográfiát tudsz nézni, semmi misztikum. Ajánlom Paul Street videóit a deep és a dark webbel kapcsolatban. További szép napot! :) U.I.: Nagyon tetszenek az írásaitok, csak így tovább! ;)
          Pronósticos de seguridad de la información 2017. Cinco imperativos para avanzar en un mundo digitalmente modificado.        
Introducción
Adelantar la revisión de los retos y tendencias en seguridad de la información para el año siguiente, no es un ejercicio de consolidación de temáticas revisadas, sino la exigencia de plantear escenarios que permitan anticipar volatilidades o inestabilidades que impliquen una revisión de las prácticas actuales del área que gobierna la seguridad y el control de la información en una empresa.

En este sentido, la realidad de la convergencia tecnológica establece un nuevo marco de actuación de los ejecutivos de la seguridad, como quiera que, en este entorno las prácticas conocidas comiencen a ceder terreno y motivar acciones diferentes respecto de los riesgos y amenazas emergentes que surgen, cuando se advierten nuevas relaciones e interconexiones digitales entre tecnologías, personas, procesos y regulaciones (Bailey, Kaplan y Rezek, 2015).

Los productos y servicios digitalmente modificados constituyen la base de la reflexión que ahora las áreas de seguridad de la información deben considerar, habida cuenta que, la digitalización de los procesos empresariales y la necesidad de concretar negocios innovadores y disruptivos, exige de la protección de la información una apuesta de funcionalidad y control que aumente la confianza de los usuarios y asegure una práctica consistente y confiable en entornos hiperconectados, en la nube, instantáneos y con plataformas móviles.

Así las cosas, establecer una base de pronósticos en seguridad de la información para el año entrante, sugiere un reto asimétrico y discontinuo del entorno, que implica tratar de acertar en un blanco en movimiento y con los ojos vendados. Por tanto, proponer alternativas para revisar bajo estas condiciones, es abrir una ventana de aprendizajes para los cuales no hay preparación previa, pero si una actitud abierta y generosa para aceptar y renovar las prácticas actuales, frente a la inevitabilidad de la falla.

A continuación se presentan algunas tendencias emergentes que se advierten para los próximos 365 días, las cuales prometen mantener fuera de la zona cómoda a los profesionales de seguridad de la información, algunas veces sorprendidos y otras vigilantes, pero siempre aprendiendo y desaprendiendo de su maestra la inseguridad de la información.

1. Revelación de nuevos ecosistemas digitales criminales (EcoDC)
La industria criminal no para de sorprender a las instituciones gubernamentales. La dinámica de la acción delincuencial implica evolucionar tan rápido como las novedades tecnológicas. La apropiación digital y el desarrollo de nuevas capacidades delictivas por parte de actores contrarios a la ley, promueven el desarrollo de ecosistemas digitales criminales los cuales se sustentan en una demanda creciente de servicios como vulnerabilidades inéditas, alquiler de botnets, datos personales robados, información clasificada, malware “a la medida”, denegación de servicio “como servicio”, cibercrimen “como servicio” entre otros.

Estos EcoDC (Cano, 2016b) se fundan en características claves como anonimato, bajo costo, técnicas antiforenses, conocimiento especializado y facilidad de pruebas, las cuales crean un espacio sin competencia en el mercado, pues el acceso a estas posibilidades, no requiere de grandes inversiones, sino de un acceso especial y la motivación necesaria para crear un entorno incierto alrededor de la empresa o personal objetivo. Un caso particular de estos ecosistemas es la “Web Profunda”/ “Deep Web”.

Los EcoDC serán cada vez movimientos y plataformas creadas de forma invisible en la web con el fin proveer capacidades criminales a bajo costo y con alto impacto, de tal forma que se puedan concretar servicios nuevos como pueden ser un “SOC Inverso” (donde se estudie el tráfico de entidades específicas, para que mediante analítica de datos, se puedan concretar perfiles de ataque novedosos y ajustados con la realidad de cada empresa objetivo), armas digitales (malware destructivos, silencios, cifrados y multiplataforma), campañas de engaños dirigidas no rastreables, entre otros.

2. Mayor uso de tácticas disuasivas como prácticas de defensa activa
Las empresas en general mantienen un esquema de protección basado en implementaciones técnicas de dispositivos tecnológicos de seguridad y control, o servicios de monitoreo externo que mantienen una vigilancia estricta sobre el perímetro de seguridad de las organizaciones. En este sentido, se plantea y mantiene una tensión permanente entre ataque y defensa, que implica un desgaste de la doctrina de seguridad y control, lo cual implica una visión ejecutiva de la seguridad como “algo de nunca acabar” y un “gasto necesario” que se debe mantener.

Si bien la seguridad informática corre el riesgo de convertirse en un “commodity”, es importante repensar las estrategias que se tienen a la fecha para revertir la tendencia de centro de costo que cada vez se confirma en los niveles de gobierno corporativo. Para ello, se advierte una tendencia para crear técnicas y tácticas disuasivas que motiven a los posibles atacantes a desistir de sus intenciones sobre la infraestructura tecnológica o personas de la organización.

Lo anterior significa jugar en el mismo terreno de los atacantes publicitando ataques de día cero, creando entorno de desinformación y siendo solidario otras víctimas de ataques. Esto implica, estudiar los movimientos de los adversarios, crear señuelos especializados para desviar la atención hacia objetivos distintos al de la organización que se protege. (CEB, 2016) La disuasión como estrategia de seguridad y control, se funda en técnicas militares que buscan comunicar y cambiar la percepción del entorno sobre el aseguramiento de la información en la empresa y así tratar de invisibilizarse en medio de la dinámica de alertas y ataques.

3. De la continuidad tecnológica a la resiliencia digital
Durante mucho tiempo las áreas de tecnología de información han sido las garantes del concepto de continuidad tecnológica, un esfuerzo permanente para asegurar que ante eventos inesperados, los componentes de tecnología que soporta el negocio sigan funcionando. En este escenario, se tienen múltiples estándares que han sido desarrollados a nivel internacional indicando las diferentes etapas y entregables que se deben construir para configurar el plan de continuidad y las respectivas pruebas de dichos planes.

De acuerdo con el ISO 22316 Seguridad y Resiliencia – Guías para la resiliencia organizacional, (ISO, 2016) la resiliencia organizacional es la habilidad de una organización para responder y adaptarse al cambio. La resiliencia habilita a una organización para anticiparse y responder a las amenazas y oportunidades, que se surgen de cambios graduales o inesperados tanto en su contexto interno como externo.

En este sentido, desarrollar esta habilidad en el entorno digital, implica cambiar el paradigma de protección de la información y del negocio, por implementaciones flexibles y dinámicas que se reconstruyen conforme ocurren los eventos, acelerando el aprendizaje de la organización respecto del evento o amenaza informática, para continuar operando bajo condiciones adversas y recuperarse en la medida que se confirman los impactos y alcances del ataque exitoso.

4. Aceleración de ataques sistémicamente comprometedores
La dinámica empresarial, las inestabilidades geopolíticas, los inciertos asociados con los derechos fundamentales en internet y las distintas expresiones de las discontinuidades tecnológicas nutren la complejidad inherente de las relaciones del ecosistema digital de una organización, anticipando crisis inesperadas, no sólo causadas por efectos de ataques de tipo tecnológico, sino por compromisos de la vida digital de las personas, donde su información personal, financiera o médica estará implicada en el tsunami digital de una realidad digital y modificada.

En este contexto, cualquier evento individual sobre un componente de un ecosistema digital de una organización o de un país, puede causar demoras, rupturas, denegación, discontinuidad o fallas en los productos o servicios, que afecten el tejido digital del cual hace parte, afectando no solamente a sus grupos de interés identificados, sino a comunidades o elementos extendidos en su red de contactos, que ponen de manifiesto la importancia de su participación en esta realidad sistémica de la empresa (WEF, 2016).

Ignorar este tipo de condición base de cualquier empresa en la actualidad, es habilitar a los atacantes para concretar ataques con efectos de difusión amplios y con alcances inesperados, que pueden trascender rápidamente su dominio particular y comprometer realidades externas, asistidas con terceros o participantes no considerados, que establecen rutas críticas para la operación de servicios o productos altamente dependientes de las características del ecosistemas digital del cual hacen parte. Un ejemplo es el ataque reciente a la empresa DYN y en el pasado el ataque a 10 servidores raíz de DNS de alcance global.

5. Mayor alfabetización digital de las juntas directivas
Los cuerpos de gobierno corporativos son siempre un objetivo de cualquier iniciativa organizacional que requiera atención y ubicación de recursos para su desarrollo. En este sentido, la seguridad de la información tiene el reto permanente de entender el imaginario vigente de estos ejecutivos (Cano, 2016) con el fin de ir motivando reflexiones alrededor de este tema, más allá de una rendición de cuentas por inversiones tecnológicas o reporte de incidentes que afectan las operaciones.

Conforme el escenario de las organizaciones demanda habilidades digitales, competencias para comprender y desarrollar productos y/o servicios digitalmente modificados y sobre manera pensar de forma digital, esto es, comprender y explorar la vista convergente de la tecnología como un facilitador de nuevas fronteras de negocios disruptivos, como motivador de experiencias inéditas de los clientes y como creadora de capacidades flexibles y adaptables que soportan estas características (Dörner y Edelman, 2015), se requiere acelerar el entendimiento de dicha dinámica en los cuerpos directivos para desarrollar una postura estratégica distinta, que mitigue el riesgo de deterioro estratégico, por su limitada comprensión del ecosistema digital de la cual ahora hace parte la organización.

En este sentido, la alfabetización digital demanda una mayor sensibilidad de los ciber riesgos, de la vista sistémica de los ataques y sus impactos, no como fenómenos exclusivamente tecnológicos, sino como iniciativas de desestabilización empresariales que buscan crear incertidumbre y la sensación de pérdida de control, con el fin de degradar la imagen de la empresa, disminuir el capital político de los miembros de junta y sobre manera, motivar una posición vulnerable de las organización frente a sus grupos de interés.

Reflexiones finales
Gartner (Perkins, 2016) en una reciente publicación advierte sobre la necesidad de la renovación de las prácticas de seguridad y control en las organizaciones considerando la acelerada transformación digital de las empresas y las naciones. Esta renovación no sólo pasa por el cambio de las estrategias de protección, sino por una vista renovada del control que ahora debe combinar acceso, uso y localización, como fundamento de la movilidad natural de las personas en entornos hiperconectados.

Lo anterior implica establecer una transición hacia unos nuevos normales, que necesariamente exige una alfabetización digital en los cuerpos de dirección, una integración y aseguramiento prácticas con los terceros que soportan las operaciones y la reinvención del ejecutivo de seguridad de la información, que debe pasar de ofrecer soluciones livianas, sencillas y efectivas, a proponer alternativas convergentes, integradas y efectivas.

Si se entiende que “el futuro no es el destino, no está predeterminado” y que las acciones que se toman en la actualidad lo definen, la seguridad de la información tiene un camino de esperanza hacia adelante, donde puede elaborar escenarios o imágenes de futuros posibles proyectivos(extrapolación de datos del presente), utópicos(escenarios deseables), catastróficos (escenarios indeseables) y futuribles (algo cercano a lo utópico, pero factible. Es el futuro deseable y posible) (Valderrama, 2013, p.148), los cuales advierten sobre la invitación para explorar los límites de las posibilidades, más allá del entendimiento de las probabilidades en un entorno volátil, incierto, complejo y ambiguo.

Esto es, superar el miedo al error, las posturas fijas y poco flexibles, los sesgos de los resultados del pasado (Gino y Staats, 2015) y las lecciones aprendidas de los incidentes, para construir una postura de seguridad de la información creativa, tolerante a la ambigüedad y la incertidumbre, inconforme con el statu quo y sensible a los retos y situaciones problemáticas, que destruya los estereotipos creados alrededor de la función y potencie las transformaciones que las organizaciones digitalmente modificadas requieren ahora y en el futuro.

Referencias
Bailey, T., Kaplan, J. y Rezek, C. (2015) Repelling the cyberattackers. Mckinsey Quartely. July. Recuperado de: http://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/repelling-the-cyberattackers
Cano, J. (2016) Manual de un CISO. Reflexiones no convencionales sobre la gerencia de la seguridad de la información en un mundo VICA. Bogotá, Colombia: Ediciones de la U.
Cano, J. (2016b) Ecosistemas Digitales Criminales. La nueva frontera de los investigadores forenses informáticos. Blog IT- Insecurity. Recuperado de: http://insecurityit.blogspot.com/2016/03/ecosistemas-digitales-criminales-la.html
CEB (2016) 2016 security Outlook. 10 imperatives for the information security function.
Dörner, K. y Edelman, D. (2015) What ‘digital’ really means. Mckinsey Quarterly. July. Recuperado de: http://www.mckinsey.com/industries/high-tech/our-insights/what-digital-really-means
Gino, F. y Staats, B. (2015) Why organizations don´t learn. Harvard Business Review. November. Recuperado de:  https://hbr.org/2015/11/why-organizations-dont-learn
Perkins, E. (2016) Transform your security team to deal with Digital Business Risk. Gartner Research.
ISO (2016) ISO 22316. Security and resilience – Guidelines for organizational resilience.
Valderrama, B. (2013) Creatividad inteligente. Guía para convertir ideas en innovación. Madrid, España: Pearson.
WEF (2016) Understanding systemic cyber risk. Global Agenda Council on Risk and Resilience. Recuperado de: http://www3.weforum.org/docs/White_Paper_GAC_Cyber_Resilience_VERSION_2.pdf

          By the Numbers: The Deep Web        

Trend Micro's latest research into the Deep Web has revealed a number of interesting facts about the Internet's hidden side, offering a closer look at how cybercriminals take advantage of the Deep Web to launch cybercrime operations. It's not all about cybercrime though. A lot of "contemporary" criminal operations have taken advantage of the anonymity [...]

The post By the Numbers: The Deep Web appeared first on Interwork Technologies Inc..


          Por qué las mujeres siguen indefensas frente al mirón de playa que hace fotos        

Basta con teclear “fotos tetas playa” en Google. No hay que ser un lince geek ni conocer la deep web para encontrarse con ellas. En 0.2 segundos, más de dos millones  y medio de resultados. En la primera página del buscador, una multitud de foros y páginas en español para entretenerse con centenares de webs […]

La entrada Por qué las mujeres siguen indefensas frente al mirón de playa que hace fotos se publicó primero en S Moda EL PAÍS.


          Intellectual Property 101: Preliminary Business and Intellectual Property Research        
USPTO

Do you have a new invention, product or service?

Then plan to join us on Wednesday, October 30, 2013 9:30am-noon at the Hardesty Regional Library (8316 E 93rd St)

The first step to developing your idea is to check existing intellectual property – patents, trademarks, copyrights – to see if your invention is already out there. Preliminary searching of U.S. patents, trademarks and copyrights, and exploration of business opportunities is something you can do for free on the Web or with resources from the library.

This workshop will show you how to use keywords to start a preliminary patent search; locate U.S. classifications for your product area; search U.S. registered and pending trademarks; and explore the library’s Deep Web for business market, competition or other entrepreneurial resources.

Class size is limited. Register at https://www.surveymonkey.com/s/intellectualproperty101 


          What is the Deep Web? Everything you Need to Know!        

You might not have heard this term ‘deep web’ before. But the deep web is an unusual place on the internet which is beyond the access of many. It consists of a whole lot of information which cannot be accessed or found on the regular internet that you use. The regular browsers that people use […]

The post What is the Deep Web? Everything you Need to Know! appeared first on TechBii.


           Deep web e dark web, cos'è e come funziona         
Il web che tutti conosciamo non rappresenta che solo una parte delle pagine complessivamente disponibili online. Esiste infatti anche un web sommerso, sconosciuto ai più, che non è direttamente accessibile e che non è indicizzato dai motori di ricerca tradizionali (Google o Bing, per esempio).

Cos'è il deep web e quali sono le differenze rispetto al dark web

Il termine deep web si usa per riferirsi a quella porzione del web non indicizzata dai motori di ricerca.
Le pagine web che compongono il deep web non rappresentano una piccola 'fetta', tutt'altro: già nel 2000 si calcolò come il deep web fosse formato oltre 550 miliardi di documenti quando Google indicizzava appena 2 miliardi appartenenti al 'web in chiaro'. Oggi si calcola che appena il 5% dei contenuti disponibili sul web siano indicizzati dai motori di ricerca.

L'uso del termine deep web non va confuso con dark web: con l'appellativo deep web si indicano quei contenuti che sono accessibili con un normale browser conoscendone l'indirizzo.
          NFAIS: Multi-Lingual Federated Search        

Abe Lederman from Deep Web Technologies was up next with his talk entitled: “Federated Search: Breaking Down the Language Barrier.” Abe talked to us about his new multi-lingual federated search […]

The post NFAIS: Multi-Lingual Federated Search appeared first on What I Learned Today....


          Modella rapita, trovati riscontri della versione della ragazza – Foto        

Sono stati raccolti elementi che confermano la versione di Chloe Ayling, la modella inglese di 20 anni attratta a Milano con l’offerta di un servizio fotografico e poi sequestrata da un polacco, ora in carcere, che avrebbe voluto metterla in vendita all’asta nel deep web, l’area oscura e illegale della rete. Dopo il fermo di […]

L'articolo Modella rapita, trovati riscontri della versione della ragazza – Foto proviene da Mondo24.


          deep web         

...
          #430 Part 2: Jamie Foxx False Flag        


Oscars So Smith: Will Smith and Jada Pinkett Smith throwing the hammer down on the Oscars.

Jamie Foxx: Jamie Foxx as a hero is a clear false flag situation.

Sad and Old: Hungry old man calls 911? You won't believe what happens next...

CLICK HERE TO DOWNLOAD JIM AND THEM #430 PART 2 RIGHT HERE!

DIARY OF A TEENAGE GIRL!, FAT GIRLS!, THE STROKE!, BILLY SQUIER!, BLIND COUPLES' THERAPIST!, GAY!, NATIVE AMERICANS!, RACE!, RACIAL!, OSCARS!, WILL SMITH!, JADA PINKETT SMITH!, OSCARSSOWHITE!, NOMINEES!, CREED!, STRAIGHT OUTTA COMPTON!, MICHAEL B. JORDAN!, CONCUSSION!, GOOD MORNING AMERICA!, LORD OF THE RINGS!, RACIAL!, TREE ENTS!, ORCS!, SARUMAN!, SAURON!, THE ONE RING!, OPEN RELATIONSHIP!, MARGOT ROBBIE!, BEASTS OF NO NATION!, IDRIS ELBA!, SPOTLIGHT!, MARK RUFFALO!, BIOPIC!, AUNT VIV!, MS THANG!, BLACTRESS!, BLACTOR!, JANET HUBERT!, HOLLYWOOD!, BLACK VIV!, JAMIE FOXX!, HERO!, FLAMES!, CAR CRASH!, TRUCK!, FLIPPED!, PUBLICIST!, EMERGENCY!, HAPPY NEWS!, INSPIRING!, HUNGRY!, OLD MAN!, 911!, FOOD!, GROCERIES!, POLICE!, MONTH!, GIANT SPIDER!, WHITE POLICE!, WEB!, TOPLESS MAIDS!, DEEP WEB!, POLICE!, BABY!, BREASTFEED!, STRANGER!, ABANDONED!

CLICK HERE TO DOWNLOAD JIM AND THEM #430 PART 2 RIGHT HERE!

          25" Bow Deep Web Dip Net - Cumings Limited Series        
L-34-P Cumings Deep Web Dip Net

25" Bow Deep Web Dip Net - Cumings Limited Series: 19½"x 25" Bow; Handle Length: 30"; Net Depth: 36"

  • Strong ½" bows
  • 1" diamond em..

    Price: $19.95


          21" Bow Deep Dip Net - Cumings Limited Series        
Cumings 21" Bow Deep Web Dip Net

21" Bow Deep Dip Net - Cumings Limited Series: 17" x 21" Bow; Handle Length 30"; Net Depth: 30"

These super stong dip nets feature a 1/2” bow, 1” diamond embosse..

Price: $17.25