background preloader

Scratchpad

Facebook Twitter

Future news & vision. Psychology. How to Get a Copy of Your FBI. The Freedom of Information Act is a powerful thing. If you've ever wanted to know just what those guvmint bastards have on you, anyway, here's your chance. Just fill in the italics in this form letter with the appropriate information, get your signature notarized, send it off, and you're in business!

This should be free, though if your search returns reams of information, you may be charged 5 cents per page in duplication fees. The law says that your request must be responded to within 10 days, but you can expect something closer to 2 or 3 months for a definitive answer with the current backlog of paperwork. Your Name Today's Date Your Address Line 2 of Your Address Federal Bureau of Investigation Records Resources Division - Attn.: FOIA/PA Office J. This is a request for records under both the Privacy Act and the Freedom of Information Act. My full name is: Your Name. I hereby agree to pay reasonable costs associated with this request up to a maximum of $30. Sincerely,Your Signature. 10 Psychological States You've Never Heard Of — And When You Experienced Them.

Top 10 Unethical Psychological Experiments - Top 10 Lists | Listverse. Humans Psychology is a relatively new science which gained popularity in the early 20th century with Wilhelm Wundt. In the zeal to learn about the human thought process and behavior, many early psychiatrists went too far with their experimentations, leading to stringent ethics codes and standards. Though these are highly unethical experiments, it should be mentioned that they did pave the way to induct our current ethical standards of experiments, and that should be seen as a positive.

There is some crossover on this list with the Top 10 Evil Human Experiments. The Monster Study The Monster Study was a stuttering experiment on 22 orphan children in Davenport, Iowa, in 1939 conducted by Wendell Johnson at the University of Iowa. The Aversion Project 1970s and 1980s Dr. Stanford Prison Experiment This study was not necessarily unethical, but the results were disastrous, and its sheer infamy puts it on this list. Dr. Monkey Drug Trials Landis’ Facial Expressions Experiment Learned Helplessness. 70 Things Every Computer Geek Should Know. | Arrow Webzine - StumbleUpon. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field.

A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. How to become a real computer Geek? Little known to most, there are many benefits to being a computer geek. You may get the answer here: The Meaning of Technical Acronyms 1. 2. If you rolled your eyes here, that is a good thing. 3. 4. 5. 6. 7. Windows 7 Sins — The case against Microsoft and proprietary software - Iceweasel. We Were Hacked! 8 Tips From A Hacking Victim For Minimizing Your Risk :... - StumbleUpon. Think you're safe from a cyberattack just because you're a small biz? Think again. Here's how to prevent a hacking.

July 20, 2011 Computer hacking has become front-page news lately, but many small business owners assume that because they’re small potatoes, have a firewall, and use anti-virus software they’re immune to a cyber attack. They're dangerously wrong. The threat Just last week two websites we operate to showcase our research and publications on telework for consumers and researchers were hacked. With 30-plus years of computer and programming experience, I dropped everything else I was doing and spent several days unraveling what they’d done. It could have been worse. A few years ago a $1 million online business closed, and so did a childcare business run by the owner’s wife, thanks to a series of computer attacks.

The victims The future The solution Here are eight things you can do to help secure your business and mitigate loss if (when?) Tip 2: Fear E-mail attachments. Cellphones Track Your Every Move, and You May Not Even Know. Cyber Tech. Security/hacking related. Hacker.