background preloader

You better believe it

Facebook Twitter

Interesting/Funny/Controversial. Entheogens. Stimulant. Kava Kava Root. Food. Virtual burglary. Online defamation. Data breach. Unsollicited spam & SMS fined. Permaculture Credit Union. Do it anyway: Improving yourself and dealing with those who don't understand | The Effortless Gent. I recently started reading The Flinch, by Julien Smith. The basic idea is that we humans have this inclination to protect ourselves. This self-preservation, this flinch, is a defense mechanism meant to keep us alive and safe. It’s the flight in “fight or flight”. The problem is that in our modern society, rarely are we humans put in a situation where we need to flinch. Rarely are we ever in THAT much danger, relatively speaking. Yet, we still flinch. That fear of speaking in public? That fear, that’s the flinch.

What does this have to do with personal style? Glad you asked. I get a lot of emails and comments that allude to this issue of insecurity. These comments are clear indicators of the fear in these gents’ minds when it comes to change… and this fear prevents great change from happening. The flinch. In reality though, if you REALLY think about it, what do you have to fear when trying to improve yourself? The first step is pressing on despite any fears you might have. Think about it. Hopper — save links, text, images, and files in moments. Observando:thank you god for showing me this picture xdsuperior problem-solving skills typical of macintosh and its users. picture on VisualizeUs. CamTwist (Mac) - Download. Spokane / coeur d'alene free stuff classifieds - craigslist. How to Hide Secret Documents, Videos or Audio Messages inside JPG Image Files ? A USA Today story says that al-Qaeda were sending out encrypted messages by hiding them inside digital photographs [jpg files] and video files.

Turn out that it is actually very easy to hide (or embed) other file inside a JPEG image. You can place video clips, pdf, mp3, Office documents, zipped files, webpage or any other file format inside a JPEG image. And when a suspecting user [read CIA, FBI] tries to open that jpeg file [with concealed information] in either a photo editing software or as a thumbnail inside Windows Explorer, it would be tough to make out if this camouflaged jpg file is different from any standard jpg image.

Let's say you want to hide a confidential PDF document from the tax investigation officers. Here's the full trick: Step 1: You will need two files - the file you want to hide and one jpg image - it can be of any size or dimensions. Step 2: Copy the above two files to the C: folder and open the command prompt window. Learn to code. Wix Free Website Builder | YourMechanic, The “Uber Of Car Maintenance,” Offers On-Demand, Certified Mechanics At 30-50% Savings.

YourMechanic, a peer-to-peer car repair marketplace that enables mechanics to fix users’ cars at their home or office, launched at TechCrunch Disrupt SF today. It claims it will lower costs 30-50% from shops and dealers, offering an “Uber-like experience” where the mechanic visits you to service your car. YourMechanic offers mechanic profiles, reviews from customers, a fair price calculator “to ensure that you are paying a fair price,” and online repair records.

They will also offer maintenance notifications on smartphone apps and via email, so you don’t forget to change your oil. Your Mechanic says its instant pricing engine, which uses half a billion data points, is an industry first. The company receives a transaction fee by selling parts. “Think about the cab market before Uber came,” co-founder Abhas Art Agrawal tells me. Agrawal says they verify mechanics with background checks, verifying a mechanic’s certification and then interviewing them. A: We don’t compete with Jiffy Lube. 20 Google Search Shortcuts to Hone Your Google-Fu. SCHOPENHAUERS 38 STRATAGEMS, OR 38 WAYS TO WIN AN ARGUMENT. Arthur Schopenhauer (1788-1860), was a brilliant German philosopher. These 38 Stratagems are excerpts from "The Art of Controversy", first translated into English and published in 1896.

Carry your opponent's proposition beyond its natural limits; exaggerate it. The more general your opponent's statement becomes, the more objections you can find against it. The more restricted and narrow his or her propositions remain, the easier they are to defend by him or her. Use different meanings of your opponent's words to refute his or her argument. Ignore your opponent's proposition, which was intended to refer to a particular thing. (abstracted from the book:Numerical Lists You Never Knew or Once Knew and Probably Forget, by: John Boswell and Dan Starer)

Spreecast. Getting Real: Dropping F-Bombs For Pleasure and Profit. This has been coming for a while… I’ve danced around the issue in the past. But a recent brilliant post entitled—The Short Sweet Guide to Being Fucking Awesome—by my friend Julien Smith, the co-author of New York Times bestselling Trust Agents, made me revisit it and explore it on a deeper level. It’s about language, transparency, attention and connection. More specifically, it’s about the word…breath in, breath out…fuck. It’s about the intentional mismatch we create between our online personas and who we really are.

It’s about one of the reasons this is my favorite work of art from’s Hugh MacLeod, but it’s not hanging on my office wall. So, I figured who better to hash this out with than Julien, the guy who got the conversation re-kickstarted in my head. So, without further ado, here’s this week’s Getting Real web show—Featuring Julien Smith Listen to or download the audio mp3/podcast version Click here to jump to the comments… Julien Smith: Yeah. Julien Smith: Yeah. - Publish Content Online. Some chemical structures. Free Software Downloads and Software Reviews. Martin Luther King Jr. Quotes. “Now there is a final reason I think that Jesus says, "Love your enemies. " It is this: that love has within it a redemptive power. And there is a power there that eventually transforms individuals.

Just keep being friendly to that person. Just keep loving them, and they can’t stand it too long. Oh, they react in many ways in the beginning. They react with guilt feelings, and sometimes they’ll hate you a little more at that transition period, but just keep loving them. And by the power of your love they will break down under the load. With Classtivity, You Can Stop Googling for Fitness Classes. You may want your yoga, kickboxing or painting class to challenge you. But you probably don't want finding that class to be a challenge, too. A new site called Classtivity aims to be an easy discovery portal for fitness and creative classes. It allows you to search by location, time and activity. You can book the classes you're interested in without leaving the site.

The idea is, CEO Payal Kadakia admits, a no-brainer — though one that only became viable recently. "Only now are the providers even realizing the value of an online presence," she says. To build Classtivity's database, the company partnered with the operators who provide back-end software to dance studios, gyms and other businesses that provide classes. Classtivity offers a good alternative to multiple Google searchers, which inevitably lead to several Google map searches. "We want people to talk about classes the way they talk about restaurants," Kadakia says. Home | Bohemian Coding. Ten Unusual Ways to Improve Your Appearance of Confidence That Really Work.

I’ve seen it over and over again: the person in the office with self-confidence is the one that gets the plum assignments. The promotions. The raises. The recognition. The others, who sit back quietly, get left behind (and sometimes resent it). For a long time, I was one of the resentful folks. What I’ve learned over time is that the person that appears confident is often not as confident as they appear. They’re not wired differently than you. Over time, I’ve figured out how to make many of those things quite natural for me – and most of the techniques I use are somewhat unusual. 1. What this does is it allows you to keep your nervous tic of staring at the floor or looking away from someone – something that can be very hard for an introvert to break – and redirect it in a bit of an optical illusion. 2.

Stand up as straight as you can, with your back vertical and your arms at your sides, relaxed. Here’s the thing. 3. On the way, we both needed to stop to use the restroom. Good advice. Mahatma Gandhi Quotes. Neurotransmitters and Drugs Chart. Erowid. How to report a computer crime: malware by email. Do you know how to report a computer crime? Or even who you would report it to? We looked at unauthorised email account access in the first of our series of articles on how to report a computer crime. Now we turn our heads to malware by email. We'll look at what offences are committed in different countries when a crime like this happens, how you should report the crime, and what evidence you can preserve. Take this scenario: Andre receives an email with an attachment. What was the offence?

We can break it down like this: The cybercriminal performed an unauthorised act in relation to a computer. The legal bit We've focused on the UK, USA, Canada and Australia, but each country has its own legislation, though the relevant statute often exists to accommodate the same offences in each country. In the UK, most computer crime falls under offences covered by one of three pieces of law: This is what the cybercriminal contravened when he disseminated the malware-filled email. Canada Australia Remediation. What's Your Background? | Background Addict? Here's Your Fix. How to create a Blog, Tools and Tips. The Weekly Review: How One Hour Can Save You A Week’s Worth of Hassle and Headache. Anonymous 101: Introduction to the Lulz | Threat Level. (Editor’s Note: Any decent coverage of Anonymous is going to verge on some NSFW material at points. There will be questionable language and strange imagery.)

Last week the net and the media were ablaze with the news that Anonymous might be taking on the Zeta drug cartel in Mexico, a story that has morphed into a wider drug corruption story, and led to one American law enforcement official in North Carolina being named as a gang conspirator. Also this year, Anons released documents on, or d0xed, several police organizations and one prominent police vendor in retaliation for heavy-handed law enforcement reaction to occupations associated with the Occupy Wall Street movement.

They’ve fought with child pornographers, hacked Sony repeatedly, and even tried to release compromising pictures to blackmail Bay Area Rapid Transit spokesman Linton Johnson into resigning. But what is Anonymous? NYU Professor and Anonymous researcher Biella Coleman compares Anonymous to the trickster god archetype. Color Trends + Palettes. Globalists, Elite and New World Order Explained. The Globalist Report by Andrew Puhanic The Globalist Report, and many other alternative news sources, frequently use terms such as Globalists, New World Order and The Elite. Unfortunately, there is very little understanding in the wider community about who these groups and individuals are, what they stand for and what their purpose is.

Let’s explore and define who these groups are and what they stand for. Globalists The Globalists are a conglomerate of individuals, interest groups and large corporations who actively seek to eliminate all countries to create a global border-less society so that they can centralize, reduce and standardize all economies, production and the processing of natural resources so that they can directly control, manipulate and influence the decisions we make to ensure they maintain their power, control, wealth and historical influence. New World Order The Elite The Illuminati The Illuminati is a group who’s origins stem from way back to the 1700’s and earlier.

The Bureau of Communication - Fill-in-the-blank Correspondence. Decrypting text. Encrypted text is sometimes achieved by replacing one letter by another. To start deciphering the encryption it is useful to get a frequency count of all the letters. The most frequent letter may represent the most common letter in English E followed by T, A, O and I whereas the least frequent are Q, Z and X.

Common percentages in standard English are: and ranked in order: Common pairs are consonants TH and vowels EA. Others are OF, TO, IN, IT, IS, BE, AS, AT, SO, WE, HE, BY, OR, ON, DO, IF, ME, MY, UP. If the results show that E followed by T are the most common letters then the ciphertext may be a transposition cipher rather than a substitution. The box below contains example ciphertext. How to Make a Survival Shotgun. Editor’s note: This is a guest post from Creek Stewart of Willow Haven Outdoor. As a Survival and Preparedness instructor, I take my line of work very seriously–sometimes too seriously. Occasionally, though, I like to take on survival projects that are just downright fun. This article highlights one of those projects.

I’m fortunate in that I’ve been able to turn my passion into my profession–this being the study of Survival and Preparedness. I’ve always enjoyed building survival kits of all shapes and sizes. I enjoy the challenge of fitting lifesaving survival necessities into small compact containers. I’ve built survival kits using film canisters, candy tins, key-rings, boxes, bottles, tubes, bags and everything in-between. Ultimately your survival needs fall into five main categories. WaterFireShelterSignalingFood Every survival kit must include contents that directly or indirectly meet these five basic survival needs. Ammunition First things first: the gun itself. Signal Flares Knife Fire. - StumbleUpon. MineCraft.

Hacks. Word & text monitoring. How Anonymous Picks Targets, Launches Attacks, and Takes Powerful Organizations Down | Threat Level. Image Design: Giles Revell No one but Hector Xavier Monsegur can know why or when he became Sabu, joining the strange and chaotic Internet collective known as Anonymous. But we know the moment he gave Sabu up. On June 7, 2011, federal agents came to his apartment on New York’s Lower East Side and threatened the 28-year-old with an array of charges that could add up to 124 years in prison. So Hector Monsegur, who as Sabu had become a mentor and icon to fellow members of Anonymous, surrendered his online identity to a new, equally faceless and secretive master: the FBI.

For the next eight months, Sabu continued to rage across the Internet as a core member of AntiSec, a blackhat hacking group within Anonymous. He helped to deface government and corporate websites and even helped bring down the private intelligence firm Stratfor—all, apparently, with the FBI’s blessing as it quietly gathered logs on Monsegur’s fellow “anons.” We’re used to that heat we survived the first rounds of the raids. Creative Sites discovered using Google+ Those Dark Hiding Places: The Invisible Web Revealed.