background preloader

The Anonymous Press

The Anonymous Press

Krebs on Security :::::::Le Blog de Monsieur Jo::::::: Cryptome OccupyArrests | Documenting the Movement, One Arrest at a Time AnonGuerrilla: Geuzen News OccupyNetherla... Ophcrack Anonymous declares ‘cyberwar’ on the IMF The vigilante hacktivists of Anonymous have announced an online attack on the IMF for its treatment of the Greek people. The struggle of the of the Greek people against the IMF has taken a new turn recently, as Anonymous declared its intention to launch a series of Denial of Service (DoS) attacks on the Fund in retaliation for the IMF’s treatment of the Greek people. Ever since the Greek crisis began, the EU and IMF have together forced Greece to accept draconian austerity measures and a fire-sale of state assets to enable it to continue servicing its major debts to large European banks like Kommerzbank and Société Générale, which greedily brought up Greek bonds in the lead-up to the crisis. As a result, wages in Greece have fallen some 20-30 percent, while unemployment has soared to 15 percent. The people of Greece have been taking for the streets for eight consecutive days now, demanding the government stop appeasing international lenders and start listening to its own people.

70 Things Every Computer Geek Should Know. | Arrow Webzine - StumbleUpon The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. How to become a real computer Geek? Little known to most, there are many benefits to being a computer geek. You may get the answer here: The Meaning of Technical Acronyms USB – Universal Serial BusGPU – Graphics Processing UnitCPU – Central Processing UnitATA- AT Attachment (AT Attachment Packet Interface (ATAPI)SATA – Serial ATAHTML – Hyper-text Markup LanguageHTTP – Hypertext Transfer ProtocolFTP – File Transfer ProtocolP2P - peer to peer 1. One of the best list of default passwords. 1A. 2. 3. 4.

Occupy Oakland International :: News :: De Jong welcomes adoption of stricter code of conduct for MEPs December 1st, 2011 • The European Parliament today voted definitively to approve a stricter code of conduct for Members. The code of conduct establishes tighter rules governing relations between lobbyists and Euro-MPs and is a consequence of a bribery scandal which hit the Parliament earlier this year. SP Euro-MP Dennis de Jong was one of the eight authors of the new code of conduct. I’m pleased with the result,’ he says. ‘This is an important step in putting a stop to bribery of Euro-MPs.’ The code of conduct establishes that gifts accepted by MEPs must not exceed €150 in value. The tighter code of conduct was drawn up by eight Euro-MPs who came together under the chairmanship of European Parliament president Jerzy Buzek.

Zone-H.org - Unrestricted information Stratégies de Manipulation Elément primordial du contrôle social, la stratégie de la diversion consiste à détourner l'attention du public des problèmes importants et des mutations décidées par les élites politiques et économiques, grâce à un déluge continuel de distractions et d'informations insignifiantes. La stratégie de la diversion est également indispensable pour empêcher le public de s'intéresser aux connaissances essentielles, dans les domaines de la science, de l'économie, de la psychologie, de la neurobiologie, et de la cybernétique. « Garder l'attention du public distraite, loin des véritables problèmes sociaux, captivée par des sujets sans importance réelle. Garder le public occupé, occupé, occupé, sans aucun temps pour penser; de retour à la ferme avec les autres animaux. » (extrait de "Armes silencieuses pour guerres tranquilles") 3 La stratégie du dégradé Pour faire accepter une mesure inacceptable, il suffit de l'appliquer progressivement, en "dégradé", sur une durée de 10 ans. (cf. Sylvain Timsit

25 Best SSH Commands / Tricks - StumbleUpon OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. SSH is an awesome powerful tool, there are unlimited possibility when it comes to SSH, heres the top Voted SSH commands 1) Copy ssh keys to user@host to enable password-less ssh logins. ssh-copy-id user@host To generate the keys use the command ssh-keygen 2) Start a tunnel from some machine’s port 80 to your local post 2001 ssh -N -L2001:localhost:80 somemachine Now you can acces the website by going to 3) Output your microphone to a remote computer’s speaker dd if=/dev/dsp | ssh -c arcfour -C username@host dd of=/dev/dsp This will output the sound from your microphone port to the ssh target computer’s speaker port.

Occupy Los Angeles | Occupy Wall Street comes to Downtown L.A.! We are the 99%. This is Direct Democracy.

Related: