Китайская живопись. Книга. Птицы   
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

          Китайская живопись. Книга. Лотос   
 
 
 
 

          Китайская живопись. Книга. Пейзаж   
 
 
 
 
 

          smart50: Ну хочешь, я попрошу Оливера и про тебя фильм снять.    

 

 

http://www.e-news.su/uploads/posts/2017-06/1498137126_e-news.su_22062017-10.jpg

 


 

 

1827016_61493403771 (700x397, 38Kb)

 

 

 

- Ну хочешь, я попрошу Оливера и про тебя фильм снять.

Как тебе название "Он вам не Димон"?  

 

http://robikons.livejournal.com/.html

 (97x51, 3Kb)

 

 

1827016_timthumb_php (700x392, 40Kb)

 

 

Путин и Медведев поют песню "Журавли".

Путин:

«Летит, летит по небу клин усталый,

Летит в тумане на исходе дня…»


Медведев:

«И в том строю есть промежуток малый,

Быть может, это место для меня!»

 

 

 

 

 

 

 

 

1827016_photo_20160829_132151 (700x322, 15Kb)

 

 

В России уже пора заменить Рождество на праздник Прямой линии с Президентом. Ведь именно в этот день раз в год в стране происходят чудеса.

 

1827016_104701694_18020100_4739819aaa53 (93x53, 2Kb)

 

Ежегодную прямую линию общения Путина с народом надо запретить, как антироссийскую пропаганду. Там показывают, как власть на местах не работает в течение года, и только показательно пнутая сверху, проводит показательные мероприятия по решению отдельных проблем, поднятых в случайно прошедших лотерею отбора обращениях граждан.

 

1827016_104701694_18020100_4739819aaa53 (93x53, 2Kb)

 

Пятнадцатый год народ жалуется президенту на плохую жизнь, пятнадцатый год президент рассказывает, что всё не так плохо.

 

1827016_104701694_18020100_4739819aaa53 (93x53, 2Kb)

 

Путин: мы стояли перед выбором - увеличить детские пособия или выделить триллион Роснефти. И выбор тут был очевидным

 

1827016_104701694_18020100_4739819aaa53 (93x53, 2Kb)

 

Вчера я понял, что Путин - гений, а мне никогда не стать президентом.
Ведь из года в год, отвечая на вопросы о пропавших деньгах, Владимир Владимирович так убедительно произносит фразу "Странно... деньги на это из бюджета были выделены в полном размере", что ответ в принципе устраивает 140 миллионов россиян.
А я примерно таким же ответом не могу успокоить даже собственную жену.

 

1827016_1352 (700x465, 45Kb)

 

 

— Владимир Владимирович, когда поднимут детские пособия?
— В Европе рождаемость упала. А вовремя войны вообще пи...ц был. Следующий вопрос!

 

1827016_104701694_18020100_4739819aaa53 (93x53, 2Kb)

 

- Владимир Владимирович, а Дмитрий Анатольевич был хорошим президентом?
- Кем, кем? Президентом? Хорошо пошутили…

 

1827016_104701694_18020100_4739819aaa53 (93x53, 2Kb)

 

Памятка либералу:
Продуктовые карточки в США - поддержка малоимущих.
Продуктовые карточки в России - до чег
о Путин довел страну!

 

1827016_104701694_18020100_4739819aaa53 (93x53, 2Kb)

 

Ведущий шоу на CBS говорит Стоуну:
- Ваш фильм выглядит не как интервью, а как пропаганда.
- А вы его смотрели?
- Нет, не было времени.

 

 

1827016_lenin (700x299, 205Kb)

 

1827016_0 (480x360, 14Kb)


Владимир Путин поздравил Эмануэля Макрона с победой на президентских выборах 7 мая 2017 года. В ответ Макрон поздравил Путина с победой на выборах 11 марта 2018 года.
 

1827016_116549838_26 (289x179, 71Kb)


Президент России Владимир Путин подписал закон, запрещающий при регистрации имени ребенка использовать цифры, бранные слова, знаки препинания и должности.
Ну наконец-то... Теперь заживём!!!

 

1827016_116549838_26 (289x179, 71Kb)


— Почему в российских протестах участвовало столько молодых людей?
— Просто те, кто родились при президенте Путине, не хотят при нём же и умереть.

 

1827016_116549838_26 (289x179, 71Kb)


Путин призвал дать возможность каждому человеку в России открыть своё дело, пишет Газета.ру. Пока не знают кому поручить, Следственному Комитету или Генпрокуратуре.

 

1827016_116549838_26 (289x179, 71Kb)



Внесём в пенсионную реформу элемент азарта! Пусть новым возрастом выхода на пенсию будет возраст, в котором на пенсию выйдет В. В. Путин!
 

 

1827016_116549838_26 (289x179, 71Kb)


Кабаева Путину:
- Володя, а давай уже распишемся.
- А чем тебе сейчас плохо?
- Надоело, как дуре в депутатах. Хочу быть первым вице-президентом...

 

1827016_116549838_26 (289x179, 71Kb)



- Ты башню Пизанскую видел?
- Да.
- Путин наклонил.

 

1827016_116549838_26 (289x179, 71Kb)


МВФ выделил транш Украине.
- Ну шо, Путин, выкусил? Весь мир за нас!
МВФ не выделил транш Украине.
- Ну шо, Путин, выкусил? Украина уже не нуждается!

 

1827016_116549838_26 (289x179, 71Kb)


Перед тем как подписать закон о легализации семейных побоев, сам Владимир Путин развелся.

 

1827016_116549838_26 (289x179, 71Kb)


Армянское радио спросили: Как изменилась Россия после прихода к власти В.В. Путина?
Армянское радио ответило: До Путина было ООО, а после прихода к власти Путина стало ИП!

 

1827016_116549838_26 (289x179, 71Kb)


Путина спрашивают: Владимир Владимирович, представьте, что вы стоите на берегу моря, а в море тонут лидеры G-7. Кого вы будете спасать в первую очередь?
- Могу гарантировать одно. Решение будет принято демократическим путем самими тонущими в соответствии с самыми высокими стандартами демократии, принятыми в странах Большой Семерки. И у всех будет право вето.

 

1827016_116549838_26 (289x179, 71Kb)


Звонит Сечин Трампу:
- Если хочешь иметь дело с Россией, то придется общаться со мной.
- Чем докажешь?
- Хочешь, сегодня ночью министра посажу?
На следующий день Трамп отменил встречу с Путиным.

 

1827016_116549838_26 (289x179, 71Kb)


- Привет, Дмитрий Анатольич, с каким вопросом пришел?
- Владимир Владимирович, как же так, моего министра, оказывается, уже целый год прослушивали, а я не знал!
- Дим, ну что ты лукавишь, ты ещё 13 июля в 17.43 говорил по телефону жене, что у тебя есть сведения о прослушке Улюкаева.

 

1827016_116549838_26 (289x179, 71Kb)


Трамп - третий президент при правлении Путина. Кто будет четвертый?

 

1827016_116549838_26 (289x179, 71Kb)


На следующих выборах в России для подтверждения переизбрания Путина достаточно будет кивнуть телевизору.

 

https://www.anekdot.ru/

 (97x51, 3Kb)

 

1827016_blog_3939_55 (700x441, 75Kb)

 


 

1827016_0a027050756e2bb6cbbca5e941c5b453 (270x96, 23Kb)

 

 

 

 

 


          Gridview Bind Error: The data source does not support server-side data paging.   

Getting error when trying to bind a stored procedure to gridview. Am I missing something? Can you help?  Thanks

        Dim NewConnection As New SqlConnection
        NewConnection.ConnectionString = ConfigurationManager.ConnectionStrings("MySqlServConnection").ToString
        Dim objCmd As SqlCommand
        Dim objReader As SqlDataReader
        Dim objParam As SqlParameter

        objCmd = New SqlCommand("spTimeClockSummary", NewConnection)
        objCmd.CommandType = CommandType.StoredProcedure

        objParam = objCmd.Parameters.Add("@FromDate", SqlDbType.SmallDateTime)
        objParam.Direction = ParameterDirection.Input
        objParam.Value = Me.txtFromDate.Text
        objParam = objCmd.Parameters.Add("@ToDate", SqlDbType.SmallDateTime)
        objParam.Direction = ParameterDirection.Input
        objParam.Value = Me.txtToDate.Text

        Try
            objCmd.Connection.Open()
            objReader = objCmd.ExecuteReader

            If objReader.HasRows Then
                GridView1.DataSource = objReader
                GridView1.AllowPaging = True
                GridView1.DataBind()
                objCmd.Connection.Close()
            Else
                Exit Sub
            End If

        Catch ex As SqlException

Part of Gridview definition:

<asp:GridView ID="GridView1" AllowPaging="True" runat="server" AllowSorting="True"
                                        AutoGenerateColumns="False" EmptyDataText="No records found" Font-Bold="True"
                                        OnPageIndexChanging="gridView_PageIndexChanging" OnSorting="GridView1_Sorting"
                                        Font-Size="10pt" DataKeyNames="EmpNum" PageSize="30" ShowFooter="false"
                                        CaptionAlign="Top" Width="800px" Caption="<B>Employee Activity</>"
                                        BorderStyle="Inset" HeaderStyle-BackColor="#999999" HeaderStyle-BorderColor="Gray" HeaderStyle-Height="30">
                                        <RowStyle BackColor="#EBEBEB" />
                                        <AlternatingRowStyle BackColor="#EBEBEB" />
                                        <Columns>
                                            <asp:TemplateField HeaderText="EmpNum" SortExpression="EmpNum">
                                                <ItemTemplate>
                                                    <asp:Label ID="lblEmpNum" runat="server" Text='<%# Bind("EmpNum")%>'></asp:Label>
                                                </ItemTemplate>
                                                <ItemStyle HorizontalAlign="Center" />
                                            </asp:TemplateField>

                                             <asp:TemplateField HeaderText="EmpName" SortExpression="EmpName">
                                                <ItemTemplate>
                                                    <asp:Label ID="lblEmpName" runat="server" Text='<%# Bind("EmpName")%>'></asp:Label>
                                                </ItemTemplate>
                                                <ItemStyle HorizontalAlign="Center" />


          Filmmaker Explores “Normal” Life as HIV-Positive Man from the Midwest   
This summer, a documentary filmmaker from Normal, Illinois, got in touch with GLAAD to help with media relations around the World AIDS Day premiere of his documentary, "Electric City-Far from Normal." The filmmaker, Dennis Neal Vaughn, tells his story in the autobiographical short film. The film follows Vaughn as he journeys from a small-town boy from the rural Midwest, to a gay man coming to terms with his own HIV diagnosis and moving across the country to San Francisco. Dennis and "Electric City-Far from Normal" have been receiving media attention back in Normal, and beyond. Today an interview with Dennis will run three times on the local Central Illinois NPR affiliate. The movie's premiere tonight will be followed by a candlelight vigil to commemorate Worlds AIDS Day. All proceeds from the film will go to local HIV/AIDS service organizations, the majority of which are located in central Illinois.
December 1, 2008

          Letter to my colleagues and friends   

For the past 18 years I have faithfully served on the Delta College board and given my life for the betterment of Delta College.

My family and I have been deeply involved in education for many years, and I continue my commitment to making the Delta College system a better place for students to receive their education.

I would like to take this opportunity to thank my many supporters, who have contacted me over the last several days with their support and kind words. Since the recent death of my husband, and my own medical problems, I have received so much support and kindness that I am deeply moved by the outpouring of emotion. Needless to say, you have all made these difficult times more bearable.

I look forward to spending time with my family and supporters over the weeks and months to come. I am forever grateful and am truly humbled by the outpouring of emotion, especially from Delta College students. I wanted to take this opportunity to publicly thank all of my supporters and family for their continued support, kindness and prayers.

Maria Elena Serna
Lodi

Source
          Maria Elena Serna's lawyer says charge is a technicality / He also 'thinks there are political issues involved'   
By Maggie Creamer
News-Sentinel Staff Writer
Updated: Wednesday, December 10, 2008 12:36 PM PST

A day after Maria Elena Serna resigned from the San Joaquin Delta College Board and pleaded no contest to a misdemeanor offense of doublebilling the college, her attorney characterized the charge as a technicality and said it may have been politically motivated.

Serna, 67, received three years probation in San Joaquin County Superior Court on Monday. The Lodi resident "double-dipped" by asking and receiving reimbursements from Delta and the Community College League of California for travel costs and other expenses. The total amount of the reimbursements were $1,642.10.

Her lawyer, Al Ellis said the case was a technical violation of the law.

"She never had any intention to cheat anyone. ... This is the same woman to march with Cesar Chavez, and after he died, she started a scholarship named after him for the college," Ellis said.

During the time Serna received double reimbursement, Ellis said she was dealing with her husband's death and recovering from back surgery.

He also said the college's decision to take the case to the authorities may have been motivated by politics.

"I think there are political issues involved," Ellis said.

Contacted at her home, Serna declined to comment and directed all questions to Ellis.

In her resignation letter, Serna said she is resigning on the advice of her physician.

She thanked the students, faculty, administrators and other board members for her 18 years on the board.

"I look forward to observing the 'ideals' that I have espoused being carried out by our new board," she wrote.

Serna is the latest departure of veteran trustees from the board. Several incumbents lost their bid for re-election in November, and Dan Parises, one of the longest-serving trustees, opted to retire rather than seek re-election.

On Monday, Parises praised Serna for what she has done for the school, including her work on the Cesar Chavez Community Leadership Award.

"I've known her for 18 years; she has high integrity and is honest ... maybe she wasn't paying attention," he said.

Delta spokesman Greg Greenwood reiterated on Tuesday that the college sent the case to the Stockton Police because the college will not tolerate elected officials pocketing money, no matter how small.

"From the college's perspective, this wasn't an accident," he said. "This is the college trying to ensure we are being responsible to the community."

The board has 60 days to either make a provisional appointment or hold a special election to replace Serna. Greenwood said that he did not know how much an election would cost. The board meets today to swear-in the four newly elected trustees. Its meeting on Dec. 16 is the first board meeting where the group will be able to vote on action items.

According to a report by the Stockton Police Department, questions first arose about Serna's reimbursement claims when Valerie Stewart-Green, an administrative assistant in the president's office, said Serna said she received a reimbursement from the league. Stewart-Green thought this was odd because reimbursements from the league are supposed to go directly to the college. She called the league and found out that Serna specifically requested the reimbursements be sent to her home address.

Other incidents that raised questions at the college were also detailed in the report.

Delta College Trustee Janet Rivera recounted when she and Serna attended a conference in San Jose in November 2007. Rivera was driving herself and Serna to the conference when Serna asked her to not tell Delta College officials they were riding together. When Rivera said she already told Delta President and Superintendent Raul Rodriguez, Serna reportedly said, "Oh shoot, I was going to claim the mileage."

In another incident, Reen Perez, an administrative assistant in Rodriguez's office, said Serna tried to collect money for a meal Rodriguez paid for with his college credit card.

At the Delta Associated Student Body Government office, Navid Shaghaghi, the president and chairman of the interclub council, said he thinks the way the administration handled the problem is reflective of its inability to work with people on campus.

"They didn't want to solve the problem. They just saw a great opportunity to get rid of this person," he said.

Source
          LibVibe - 10 January 2008   
Click to listen to the five-minute newscast, anytime.

Stories reported:
Economic impact of libraries; Sprinkler damages thousands of books at library; Mom tries to give up infant at library; Couple charged in theft of $40,000+ worth of library materials; Pornography, marijuana mistakenly sent to library; Search committee identifies finalists for director's position; Librarian of the Year 2008 announced; ALA Midwinter.

Avon

          LibVibe - 7 January 2008   
Click to listen to the seven-minute newscast, anytime.

Stories reported:
Anger at library cuts; Congress earmarks $3 million to reopen closed EPA libraries; New chapter for metro libraries (1, 2); Most literate cities; Reference library gets $30 million renovation; OCC sees new library (story, site); A childish misplacement of vigilance at the library; Librarian wins couch potato contest (1, 2).

Alibris 135x80px
Save $2 on any order of books, movies or music.
Use promo code HAPPY2008 through 1/12/08!


          Новая глобальная атака шифровальщика: подробности от «Доктор Веб»   

28 июня 2017 года

Специалисты компании "Доктор Веб" изучают новый троянец-шифровальщик Trojan.Encoder.12544, упоминаемый в СМИ как Petya, Petya.A, ExPetya и WannaCry-2. На основании предварительного анализа вредоносной программы компания "Доктор Веб" представляет рекомендации, как избежать заражения, рассказывает, что делать, если заражение уже произошло, и раскрывает технические подробности атаки.

Наделавший много шума червь-шифровальщик Trojan.Encoder.12544 представляет серьезную опасность для персональных компьютеров, работающих под управлением Microsoft Windows. Различные источники называют его модификацией троянца, известного под именем Petya (Trojan.Ransom.369), но Trojan.Encoder.12544 имеет с ним лишь некоторое сходство. Эта вредоносная программа проникла в информационные системы целого ряда госструктур, банков и коммерческих организаций, а также заразила ПК пользователей в нескольких странах.

На текущий момент известно, что троянец заражает компьютеры при помощи того же набора уязвимостей, которые ранее использовались злоумышленниками для внедрения на компьютеры жертв троянца WannaCry. Массовое распространение Trojan.Encoder.12544 началось в первой половине дня 27.06.2017. При запуске на атакуемом компьютере троянец несколькими способами ищет доступные в локальной сети ПК, после чего по списку полученных IP-адресов начинает сканировать порты 445 и 139. Обнаружив в сети машины, на которых открыты эти порты, Trojan.Encoder.12544 пытается инфицировать их с использованием широко известной уязвимости в протоколе SMB (MS17-10).

В своем теле троянец содержит 4 сжатых ресурса, 2 из которых являются 32- и 64-разрядной версиями утилиты Mimikatz, предназначенной для перехвата паролей открытых сессий в Windows. В зависимости от разрядности ОС он распаковывает соответствующую версию утилиты, сохраняет ее во временную папку, после чего запускает. При помощи утилиты Mimikatz, а также двумя другими способами Trojan.Encoder.12544 получает список локальных и доменных пользователей, авторизованных на зараженном компьютере. Затем он ищет доступные на запись сетевые папки, пытается открыть их с использованием полученных учетных данных и сохранить там свою копию. Чтобы инфицировать компьютеры, к которым ему удалось получить доступ, Trojan.Encoder.12544 использует утилиту для управления удаленным компьютером PsExec (она также хранится в ресурсах троянца) или стандартную консольную утилиту для вызова объектов Wmic.exe.

Контроль своего повторного запуска энкодер осуществляет с помощью файла, сохраняемого им в папке C:\Windows\. Этот файл имеет имя, соответствующее имени троянца без расширения. Поскольку распространяемый злоумышленниками в настоящий момент образец червя имеет имя perfc.dat, то файл, предотвращающий его повторный запуск, будет иметь имя C:\Windows\perfc. Однако стоит злоумышленникам изменить исходное имя троянца, и создание в папке C:\Windows\ файла с именем perfc без расширения (как советуют некоторые антивирусные компании), уже не спасет компьютер от заражения. Кроме того, троянец осуществляет проверку наличия файла, только если у него достаточно для этого привилегий в операционной системе.

После старта троянец настраивает для себя привилегии, загружает собственную копию в память и передает ей управление. Затем энкодер перезаписывает собственный файл на диске мусорными данными и удаляет его. В первую очередь Trojan.Encoder.12544 портит VBR (Volume Boot Record, загрузочная запись раздела) диска C:, первый сектор диска заполняется мусорными данными. Затем шифровальщик копирует оригинальную загрузочную запись Windows в другой участок диска, предварительно зашифровав ее с использованием алгоритма XOR, а вместо нее записывает свою. Далее он создает задание на перезагрузку компьютера, и начинает шифровать все обнаруженные на локальных физических дисках файлы с расширениями .3ds, .7z, .accdb, .ai, .asp, .aspx, .avhd, .back, .bak, .c, .cfg, .conf, .cpp, .cs, .ctl, .dbf, .disk, .djvu, .doc, .docx, .dwg, .eml, .fdb, .gz, .h, .hdd, .kdbx, .mail, .mdb, .msg, .nrg, .ora, .ost, .ova, .ovf, .pdf, .php, .pmf, .ppt, .pptx, .pst, .pvi, .py, .pyc, .rar, .rtf, .sln, .sql, .tar, .vbox, .vbs, .vcb, .vdi, .vfd, .vmc, .vmdk, .vmsd, .vmx, .vsdx, .vsv, .work, .xls, .xlsx, .xvd, .zip.

Троянец шифрует файлы только на фиксированных дисках компьютера, данные на каждом диске шифруются в отдельном потоке. Шифрование осуществляется с использованием алгоритмов AES-128-CBC, для каждого диска создается собственный ключ (это — отличительная особенность троянца, не отмеченная другими исследователями). Этот ключ шифруется с использованием алгоритма RSA-2048 (другие исследователи сообщали, что используется 800-битный ключ) и сохраняется в корневую папку зашифрованного диска в файл с именем README.TXT. Зашифрованные файлы не получают дополнительного расширения.

После выполнения созданного ранее задания компьютер перезагружается, и управление передается троянской загрузочной записи. Она демонстрирует на экране зараженного компьютера текст, напоминающий сообщение стандартной утилиты для проверки дисков CHDISK.

screenshot Trojan.Encoder.12544 #drweb

В это время Trojan.Encoder.12544 шифрует MFT (Master File Table). Завершив шифрование, Trojan.Encoder.12544 демонстрирует на экране требование злоумышленников об уплате выкупа.

screenshot Trojan.Encoder.12544 #drweb

Если в момент запуска на экране появилось сообщение о запуске утилиты CHDISK, незамедлительно выключите питание ПК. Загрузочная запись в этом случае будет повреждена, но ее можно исправить при помощи утилиты восстановления Windows или Консоли восстановления, загрузившись с дистрибутивного диска. Восстановление загрузочной записи обычно возможно в ОС Windows версии 7 и более поздних, если на диске имеется используемый системой скрытый раздел с резервной копией критичных для работы Windows данных. В Windows XP такой способ восстановления загрузки не сработает. Также для этого можно использовать Dr.Web LiveDisk — создайте загрузочный диск или флешку, выполните загрузку с этого съемного устройства, запустите сканер Dr.Web, выполните проверку пострадавшего диска, выберите функцию «Обезвредить» для найденных угроз.

По сообщениям из различных источников единственный используемый распространителями Trojan.Encoder.12544 ящик электронной почты в настоящее время заблокирован, поэтому они в принципе не могут связаться со своими жертвами (чтобы, например, предложить расшифровку файлов).

С целью профилактики заражения троянцем Trojan.Encoder.12544 компания «Доктор Веб» рекомендует своевременно создавать резервные копии всех критичных данных на независимых носителях, а также использовать функцию «Защита от потери данных» Dr.Web Security Space. Кроме того, необходимо устанавливать все обновления безопасности операционной системы. Специалисты компании «Доктор Веб» продолжают исследование шифровальщика Trojan.Encoder.12544.

Инструкция пострадавшим от Trojan.Encoder.12544


          Gilbert Keith Chesterton: »Der Mann der Donnerstag war«, oder: Bombe und Kursbuch   

Eintrag No. 20

Version 1.0 erschienen in »MAGIRA 2003 – Jahrbuch zur Fantasy« , herausgegeben von Michael Scheuch und Hermann Ritter. Für die Molochronik z.T. gekürzt bzw. erweitert.
Version 2.0 vom 20. September 2007: Portrait und viele Links eingepflegt, um Verehrerrundschau erweitert Fehler gemerzt.

Gilbert Keith Chesterton (1874-1936) zählt neben Herbert George Wells, Arthur Conan Doyle und Rudyard Kipling zu den klassischen Alleskönnerautoren Englands am Ende der Viktorianischen Epoche bis zum Ende des ersten Drittels des 20. Jahrhunderts. Wie diese hat er Texte verschiedenster Art hinterlassen, darunter äußerst originelle Beiträge zur Phantastik. Und wie Tolkien gehört er zu den ›schrulligen Katholiken‹ der anglikanischen Insel (siehe die beiden Essay-Bände »Ketzer« und »Orthodoxie«). In Deutschland ist er wohl, wenn überhaupt, vor allem als Erfinder des von Heinz Rühmann (bzw. Ottfried Fischer) dargestellten Pater Brown bekannt. Comiclesern ist vielleicht sein Aussehen bekannt, immerhin leiht sich das die Figur (bzw. der Ort) Fiddlers Green in Neil Gaimans »The Sandman«.

Der Wagenbach-Verlag hat dankenswerterweise »Der Mann der Donnerstag war« wieder mal dem deutschem Leser zugänglich gemacht, wenn auch in einer gewöhnungsbedürftigen Übersetzung aus dem Jahre 1910.

Das 1908 erstmals erschienene Buch handelt vom apltraumdurchwirkten Ringen um eine gesicherte Sicht auf die Auseinandersetzung zwischen Anarchie und Ordnung. Es beginnt mit der Begegnung zweier gegensätzlicher Poeten in einem Künstlerviertel Londons. Der Platzhirsch des Saffron Park, Lucien Gregor, verherrlicht den Archetypen des bombenwerfenden Anarchisten als DEN Künstler schlechthin. Seinem Herausforderer Gabriel Syme dünkt das Chaos aber öde und er preist lieber den Zugfahrplan als Triumph des menschlichen Willens. Gregor möchte nicht nur Konventionen und Regierungen, sondern sogar Gott abschaffen, Syme aber wirft ihm vor, es mit dem Anarchismus nicht wirklich ernst zu meinen. Gregor will Syme von seiner Ernsthaftigkeit überzeugen und Syme folgt Greogor zu einem geheimen Treffen. Beide offenbaren zuvor einander ihre Geheimnisse und geloben Verschwiegenheit darüber. Gregor entpuppt sich als Anarchist, Syme als Geheimpolizist, beide nur als Poeten getarnt. Beklommen stellen die sie fest, daß ihre Angst aufzufliegen und ihre Ehrenworte sie voneinander abhängig machen.

Bei einem Treffen des geheimen Anarchistenzirkels schafft es Syme, Gregor den Posten des Donnerstag wegzuschnappen. Die sieben Oberanarchisten sind nämlich nach den Wochentagen benannt, womit sich der seltsame Titel des Romans erklärt. Montag ist ein Sekretär, Dienstag ein polnischer Fanatiker, Mittwoch ein dubioser Marquis, Donnerstag in Person Symes ein Poet, Freitag ein alter Professor und Samstag ein praktischer Arzt. Anführer ist der monströse Präsident Sonntag, der sich selbst ›den Frieden Gottes‹ nennt. Der Rat beschließt ein Bombenattentat auf den russischen Zaren und den französischen König in Paris, das Syme und Greogor verhindern wollen. Von da an geht es zunehmend drunter und drüber.

Chesterton hatte merklich großen Spaß daran, Atmosphären zu übertreiben und moderne Allegorien zu erschaffen. Nichts ist, was es scheint, und die Verschwörer stolpern von einer Bredouille in die nächste.

Besonders bemerkenswert ist der Oberbösewicht Sonntag, eine grandiose Übersteigerung der Figur des Verbrecherkönigs. Er ist eine prophetische Mischung aus Goldfinger und Groucho Marx, wenn er z.B. bei der finalen dadaistischen Verfolgungsjagd nicht nur immer aberwitzigere Fluchtuntersätze nutzt, sondern dabei auch noch ständig Zettel mit rätselhaften Unsinnsmitteilungen hinterläßt. Durch solche Kapriolen wirkt der Roman über weite Strecken, wie eine Vorwegnahme von höherem Zeichntrickblödsinn. Dabei wird immer wieder auf das Grundproblem angespielt: die unvereinbare Gegensätzlichkeit der menschlichen Wünsche nach Ordnung, Kontrolle und Sicherheit einerseits, nach Freiheit, Individualität und Vertrauen andererseits.

Chestertons satirische Gesellschaftsphantastik ist allemal ein Wiederentdecktwerden wert, besonders anempfohlen in unseren Zeiten, da man als Echtweltbürger feststellt, daß die Grenzen zwischen Ordnung und Chaos sich immer mehr verwischen, und der Übersichtlichkeit halber amal neu definiert werden müßten. Egal ob man sich (aus welchen Grund auch immer) für Bombe oder Kursbuch entscheidet, die Gegenseite lauert immer und überall.

Meine liebste Fundstelle des Romans illustriert das dialektisch-paradoxe Ideenjoungliervergnügen, das ich mich Chesterton hab. Im ersten Kapitel werden zwei gegensätzliche Dichter — der dandyhafte Anarchist Lucien Gregor und der bürgerliche Ordnungs-Anakreont Gabriel Syme — im Streitgespräch gegenübergestellt.

Gregor: »Ein Künstler ist dasselbe wie ein Anarchist. Man kann auch umgekehrt sagen: ein Anarchist ist ein Künstler. Der Mann, der eine Bombe wirft, ist ein Künstler, weil er einen großen Augenblick allem anderen vorzieht. Er erkennt, wie viel wertvoller das einmalige Aufflammen, der einmalige Donnerschlag einer wirkungsvollen Explosion ist, als die alltäglichen Körper von ein paar Polizisten. Ein Künstler kümmert sich um keine Regierung, er bricht mit jeglichem Herkommen. Den Dichter erfreut nur die Verwirrung. Wäre dem nicht so, dann müßte das poetischte Ding der Welt die Untergrundbahn sein.«

Syme: »[...] Chaos ist öde, weil im Chaos der Zug tatsächlich irgendwohin gehen würde, nach Baker Street oder nach Bagdad. Der Mensch aber ist ein Magier, und seine ganze Magie besteht darin, daß er sagt: Victoria {Station}, und siehe da, es ist Victoria. Nein, behalten Sie Ihre Bücher mitsamt Ihrer Poesie und Prosa und lassen Sie mich einen Fahrplan lesen mit Tränen des Stolzes. Behalten Sie nur Ihren Byron, der die Niederlagen der Menschheit feiert und geben Sie mir das Kursbuch, das ihre Siege verherrlicht.

[...] Sie behaupten verächtlich, es sei selbstverständlich, daß einer nach Victoria kommen muß, wenn er Sloane Square verlassen hat. Ich aber behaupte, daß in der Zwischenzeit tausenderlei Dinge geschehen könnten und ich jedesmal, wenn ich wirklich mein Ziel erreicht habe, den Eindruck habe, mit knapper Not davongekommen zu sein.«

Zitiert nach der Ausgabe bei Heyne »Der G. K. Chesterton Omnibus 1«.

Und wer mehr von diesem außergewöhnlich unbekannten Werk kennenlernen möchte: hier der ganze Roman auf englisch und noch ein Link zu einer netten Chesterton-Page.

BLICK IN DIE RUNDE DER VEREHRER:

  • Wie klassisch dieser Roman im anglo-amerikanischen Raum ist, und wie lebendig er dort auch von jüngeren Genreationen goutiert wird, führt das Computerspiel »Deus Ex« vor, das u.a. von »Der Mann der Donnerstag« deutlich inspiriert wurde und in dessen Levels der Spieler immer wieder auf Zitate aus dem Buch stößt.
  • Neil Gaiman schreibt in seinem Blog:
    »The Man Who Was Thursday« is one of the most ambiguous books I've ever encountered, and its morals are deeply uncertain.

    (Molos Übersetzung) »Der Mann der Donnerstag war« ist eines der undurchschaubarsten Bücher das mir je untergekommen sind, moralisch zutiefst unbestimmbar.
  • Susanna Clarke zählt »Der Mann der Donnerstag war« zu ihren Lieblingsbüchern:
    Es ist so etwas wie ein sehr aufregender Detektivroman und fast wie ein Gedicht und wie ein theologisches Rätsel — und die meisten Dialoge lesen sich, als hätte Oscar Wilde sie geschrieben. Es ist etwas ganz Besonderes. Die Szenen laufen als eine Serie von Bildern ab — präzise, überraschende, einfache, farbenfrohe Bilder. Es ist wie eine wunderschöne Halluzination oder ein angenehmer Alptraum. Wie in allen Detektivromanen (oder Gedichten oder theologischen Rätseln) können die einfachsten Gegenstände oder Handlungen eine immense Bedeutung haben. Gleichzeitig zeichnet das Buch ein interessantes Bild der Zeit und vermittelt einen guten Eindruck davon, was es hieß, im Jahr 1908 ein dandyhafter englischer Gentleman zu sein.
  • Hierzulande hat z.B. Carl Amery G.K.C. enthusiasmiert bejubelt, wie im Vorwort zu »Der G. C. Chesterton Omnibus 1« (Heyne 1993)
    Chestertons Romane sind, da ist kaum ein Zweifel möglich, durchaus der modernen Form der Science Fiction, das heißt des spekulativen Genres zugehörig. »Was wäre wenn…?« oder auch: »Was wäre gewesen, wenn…?« — das ist die Frage, welche die wundersamen Maschinen dieses Genres in Bewegung setzt. {…} Wer von all den wissenschaftlich orientierten Prognostikern hat die Geburt des Tory-Faschismus (in »Don Quijotes Wiederkehr«), die Islamisierung Englands (in »Fliegendes Wirtshaus«), die totale Abstrusität des Terrorismus und der Terrorismus-Bekampfer (in »Der Mann der Donnerstag war«) so scharfsinnig antizipiert? Wer hat die Schnappfallen des bürokratischen Wohlfahrtsstaates, die Diktatur der psychiatrischen Normalitäts-Festsetzer, die Reduktion der Kunst zu Ware und die Reduktion der menschlichen Geschicklichkeiten durch die gloabe Normierung so gut gewittert und so amüsant ins Erzählerische übersetzt?
  • Michael ›Harry Potter ist superduper‹ Maar zitiert in seinem feinen Rundfunkessay für den SWR den Chesterton-Kenner Joachim Kalka, der folgendermaßen »Der Mann der Donnerstag war« lobpreist:
    Der {Roman} hat viel von genialer Kolportage. Das eigenartige Lächeln des Montags, des Sekretärs, der nur auf einer Seite des Gesichts den Mund verzieht, erscheint später großartig als coup de théatre. Ganz in der Ferne scheint es, als ob man eine Menge von Verfolgern drohend herandringen sähe; die Helden mustern den Auflauf unruhig durchs Fernglas. Die Anführer tragen schwarze Halbmasken. Und »schließlich lächelten sie während ihres Gespräches alle, und einer von ihnen lächelte nur auf einer Seite.« An solchen Momenten, in denen es den Leser leise überläuft (…), ist das Buch überreich: Maske und Duell, Attentat und Flucht, Hetzjagd und Verschwörung. Es ist kennzeichnend für Chestertons Werk, daß die stärksten Wirkungen im Ineinander von romance und Reflexion liegen.
  • Und in »Cicero« (Sept. 2007) begeistert sich Daniel Kehlmann (nebenbei auch erfrischend über die hiesige Verlagslandschaft spottent) für Chestertons Alptraum, indem er z.B. schreibt:
    Ein aktuelles Buch? Aber natürlich — denn es geht um Terror und terroristische Geheimorganistaionen, es geht um den Übereifer bei der Verfolgung des Bösen, es geht darum, dass Zivilisation und Glauben plötzlich selbst jene Gefahren sein können, vor denen sie uns schützen wollen.

•••

Der Mann der Donnerstag war (The Man who was Thuesday, 1908) aus dem Englischen von Heinrich Lautensack; 192 Seiten; Taschenbuch; Wagenbach-Verlag; Berlin, 2002.
oder antiquarisch z.B.:
übersetzt von Bernhard Sengfelder in der Bearbeitung, einem Vorwort und herausgegeben von Carl Amery; zusammen mit »Der Held von Notting-Hill« in »Der G. K. Chesterton Omnibus 1«; 428 Seiten; Taschebuch; Heyne, ›Bibliothek der Science Fiction Literatur‹; München 1993. — Aufgrund der deutlich flexibleren, klareren Sprache zu bevorzugen.

          Re: Bearhead Settlement Gunfight 1891   
Another gunfight told in the first person:
http://files.usgwarchives.net/la/vernon/history/misc/westpor...

Snarlingcoyote: I run into you everywhere! lol
          Average prices on Realestate.co.nz dropped in 10 out of 19 districts in June. Auckland's average price down by $73,639 since February   
Photo: John Phelan

The housing market is feeling the winter blues, with average asking prices of homes newly advertised for sale on Realesate.co.nz falling in a majority of districts in June.

The national average asking price dropped from $642,478 in May to $626,889 in June, with declines recorded in 10 regions (Northland, Auckland, Manawatu/Whanganui, Wellington, Nelson, Marlborough, West Coast, Canterbury, Otago and Central Otago/Lakes) and rises recorded in nine (Waikato, Coromandel, Bay of Plenty, Gisborne, Hawkes Bay, Taranaki, Central North Island, Wairarapa and Southland).

In Auckland the average asking price dropped from $956,267 in May to $905,013 in June, which was the fourth straight month in which it has declined since it peaked at $978,652 in February, a drop of $73,639 in four months.

In Wellington it dropped from $568,493 in May to $541,298 in June and in Canterbury it declined from $492,551 in May to $461,351 in June.

The was also a decline in the number of properties newly listed for sale on Realesate.co.nz in June, with the national total dropping from 9860 in May to 9026 In June, which was also below the 9327 that were newly listed in June last year.

Of the 19 districts around the country, 14 recorded a decline in the number of new listings and five (Hawkes Bay, Coromandel, Central North Island, West Coast and Central Otago-Lakes) recorded a rise, although the listing numbers for the regions that recorded rises were small.

That saw the total number of homes available for sale on the website drop from 24,229 in May to 23,507 in June, but that was still well up on the 21,612 that were available for sale in June last year.

In Auckland the total stock of homes for sale dropped only slightly,  from 8622 in May to 8560 in June, but that still was up a whopping 57% compared to the 5463 properties that were available for sale in Auckland in June last year.

In Wellington the total stock of properties advertised for sale on the website dropped from 1069 in May to 944 in June, but that was still up from the 830 available for sale in June last year.

You can receive all of our property articles automatically by subscribing to our free email Property Newsletter. This will deliver all of our property-related articles, including auction results and interest rate updates, directly to your in-box 3-5 times a week. We don't share your details with third parties and you can unsubscribe at any time. To subscribe just click on this link, scroll down to "Property email newsletter"and enter your email address.


          ruvim 0.4 (Russian Vim) released   

New version of Russian documentation translations for Vim editor was released, bringing total count of translated documentation to 43% (66 out of 115 help files). This release includes enormous options help file as well as two other new files: cmdline.txt and sponsor.txt.

This release also contains changes to make documentation consistent with Vim 6.2.263 and includes many minor typo fixes and edits.

Please share this news with your Russian-speaking Vim users.

For downloads please visit project homepage: https://sourceforge.net/projects/ruvim/.


          News of ruvim project (Russian Vim documentation)   

We have released a new version (0.3) of Russian documentation translations for Vim editor.

The changes include some fixes as well as addition of 8 new translations: change.txt, indent.txt, insert.txt, repeat.txt, undo.txt, visual.txt, various.txt, recover.txt.

For downloads please visit project homepage: https://sourceforge.net/projects/ruvim/.


          ICE Abuses Solitary Confinement, Lawyers Say   

When Jose Mendez was held at Stewart Detention Center in Georgia, he met another young undocumented immigrant who over time became his boyfriend. They would hold hands and occasionally steal a kiss, he said. Mostly, they shared love letters.

Early last year, as Mendez’s boyfriend was telling him how afraid he was of deportation, Mendez reached over to rest a hand on his. Just then a female guard passed. Fifteen minutes later, Mendez was isolated and accused of having oral sex in the recreation room, said his attorney, Bryan Johnson.

An official told Mendez that there was visual evidence, which he demanded to see it, confident of his innocence. But his request was denied and he was sentenced to 30 days in disciplinary segregation — the U.S. Immigration and Customs Enforcement equivalent of solitary confinement.

“Segregation is the worst thing that could exist,” he said.

Mendez, who does not have a criminal record and sought asylum in the United States after fleeing El Salvador when he was 19, averaged two hours outside of his cell each day as punishment for something he said he did not do. Even if he had, lawyers said, as a civil detainee he should not have faced the same punishment as a felon.

“These are civil detainees,” said R. Andrew Free, an immigration attorney based in Nashville, “Solitary confinement is a tool of a criminal detention system that is geared toward punishment, and in some cases rehabilitation.”

But undocumented immigrants across the country are being held in private prisons and government centers that lawyers say follow rules intended for criminals. They have “grafted all of the rules and all of the infrastructure” from the prison industry onto immigrant detention, according to Free.

The facilities operate with little oversight even as the detainees have no right to lawyers or other protections. Undocumented immigrants who can't find pro bono representation are particularly at a disadvantage, lawyers say. And as President Donald Trump promises to ramp up enforcement of immigration laws, advocates fear even more detainees will get caught up in unreasonable and dangerous situations.

Solitary confinement can be abused easily, lawyers said. Their clients are punished for indefinite periods and arbitrary reasons, they say.

Mendez’s confinement record, for example, doesn’t mention oral sex. The reporting officer wrote that Mendez admitted to “kissing and holding hands in the rec. yard,” enough to find him guilty of committing a “sexual act.”

After about a month in segregation, he was released from Stewart, a private prison run by Corrections Corporation of America, and he boarded a plane to New York thanks to Johnson’s efforts.

His boyfriend was deported.

ALLEGATIONS OF WEAK OVERSIGHT
Both Republican and Democratic presidents have used solitary confinement for undocumented immigrants. It was practiced during Barack Obama’s administration, and George W. Bush’s before that. ICE has arrested more than 41,000 undocumented people since Trump took office, so more people could be at risk of solitary confinement at detention centers around the country.

According to the Los Angeles Times, a White House memo that circulated among top Department of Homeland Security officials in late January said that DHS would bump up the number of immigrants in detention to 80,000 people a day, nearly double the figure under Obama. Over 5,000 immigrants without criminal records were arrested between January and March, more than double Obama’s figure from the same period in 2016.

On top of disciplinary actions, ICE facilities also use segregation as a means to isolate vulnerable people, those who are LGBTQ or mentally unstable, for their own safety, according to the agency.

“ICE’s policy governing the use of special management units protects detainees, staff, contractors, volunteers, and the community from harm by segregating certain detainees from the general population for both administrative and disciplinary reasons,” an ICE official wrote in a statement. “ICE provides several levels of oversight in order to ensure that detainees in ICE custody reside in safe, secure and humane environments and under appropriate conditions of confinement."


The duration of segregation for some immigrants exceeds international regulations, even for humane criminal practices. In 2015, the United Nations ruled that “prolonged solitary confinement” should be prohibited, and equated the practice to torture. The UN defined “prolonged solitary confinement” as more than 15 days in unwanted isolation.

When a guard recommends an immigrant for segregation, there’s almost no oversight, lawyers say. A judge has to rule that the detainee deserves punitive solitary, but in the meantime, he or she can be placed in administrative segregation, as Mendez was for two days before he was found guilty.

ICE had an average daily population of 1.1 percent of detainees in segregation during 2012 and 2013, and more recent estimates show similar numbers. In a system that holds tens of thousands of immigrants and is expanding, that means hundreds are being kept in solitary cells. In 2015, 13 percent of those in segregation were part of ICE's non-criminal population.

ICE sent out a directive about protocols for solitary confinement in September 2013. The memo said that “placement of detainees in segregated housing is a serious step that requires careful consideration of alternatives.” It also mandated regular review of long-term segregation cases to ensure that a detainee is not held in solitary confinement for longer than necessary.

When asked how long segregation could last for an undocumented immigrant, an ICE spokesperson did not respond directly. She instead referenced the 2013 directive that "requires agency reporting, review, and oversight of every facility decision to place detainees in segregated housing for over 14 days, and requires immediate reporting and review of segregation placements when heightened concerns exist based on the detainee’s health or other factors."

But from Free’s vantage point, the standards aren’t followed.

“Oversight is really weak and lax, and there are no real consequences to these facilities if they engage in serial violations,” Free said. “In my experience [with clients], the solitary confinement went on for months -- literally months -- without any indication of an official sign-off.”

He said that ICE never actually used the phrase, “solitary confinement,” substituting euphemisms such as “medical isolation,” “administrative segregation,” and “disciplinary segregation.”

“They use everything but ‘solitary confinement,’ and one has to ask why,” he said.

OUTSIDE IN A CAGE
Mulugeta, an Ethiopian immigrant who came to the United States as a child, asked to only use his first name because he intends to re-apply for U.S. residency after being deported. He was in immigrant detention between 2010 and 2014 while he fought his case and says he spent more than a year in segregation.

“It was a very long time, and a very tough experience,” he said. “Through those four years, I went through a lot of ups and downs.”

Mulugeta had a green card as a child. When he was 18, he and his friends were playing with a BB gun at one of their homes and someone called the police. Officers searched Mulugeta and found a Ziploc bag of marijuana, more than half an ounce but no more than five pounds, according to his 2009 court indictment. Though he said he had bought the drugs for personal use, he was convicted of intent to distribute. When he was released from prison, ICE was waiting to deport him. But first he was detained for another four years.


While in immigrant detention, Mulugeta was placed in a special housing unit after a fight broke out at the Oakdale Federal Detention Center in Louisiana, which then held immigrant detainees alongside convicts. He said he was defending himself from attackers when he accidentally fell onto a guard, whose leg broke in several places. As a result, Mulugeta was put in solitary confinement.

“There was no charge,” he said. “They just kept me there for no reason.”

While in segregation, Mulugeta received maybe one phone call a week, but he spent most of his time reading, he said. Sometimes, he went outside for sunlight; even then, they put him in an enclosed "cage" so he did not feel free, he said.

ICE does not comment on specific cases and did not confirm his account. Nor would an ICE spokesperson comment on whether detainees in special housing units are confined during recreation time.

Guards let Mulugeta shower sporadically, but they didn’t follow a regular schedule. When the cafeteria served pork, Mulugeta, an Ethiopian orthodox Christian, didn’t get to eat.

“What they did to that kid, I’ll never get over it,” said Paul Scott, his attorney.

Because ICE detainees are often mixed in with prisoners at county jails and private prisons, Mulugeta said that he and other immigrants were treated like serious offenders.

“Immigration detainees and a criminal are not the same,” he said. But, to the guards at the detention centers where he was held, he continued, “Everybody is the same.”

SEGREGATION FOR SAFETY
Many undocumented immigrants in the United States are seeking refuge from violence against them in their homes countries because of their gender or sexuality. Members of the LGBTQ community are especially at risk of being put into solitary cells because they are targets for sexual assault and bullying by other prisoners.

“I know that they’re also scared to remain in some cases in the housing unit with their biological sex, so it’s kind of a no-win situation when the only answer is to put people in a box,” Free said.

But solitary confinement does not always make people safe. Guards also have been accused of taunting transgender or gay prisoners about their lifestyles and other harassment.

In 2005, ICE detained trans woman Bamby Salcedo after she filed a request to change her legal name. According to her online bio, during her early life, “she fell into a deep cycle of drugs, crime, juvenile institutions and later, after immigrating to the US, prisons.” She told NBC that in California she survived by dealing illegal substances. After Salcedo got to San Pedro Detention Center, which lost its accreditation in 2007 and has since been shuttered, the guards placed her in a dorm with her biological sex, where men put their genitals in her face, grabbed her breasts and buttocks, and made sexually suggestive comments to her, she said.

“It was constant, and it was too much,” Salcedo added.

After she told officials that she had been assaulted, she said she was placed in segregation for a week.

“They said they were trying to protect me, but I was actually being punished further for just being me,” she said.

In 2015, ICE outlined a Transgender Care Memo, and an agency official wrote that its “ultimate goal with regard to this population is to find facility partners willing to adopt the best practices.”

But immigrant detainees are often put in solitary after accusing staff members or other residents of sexual assault, according to NBC News. Victims often believe they are being punished by ICE for reporting abuse.

Salcedo, who founded TransLatin@ Coalition, said that when she visits detention centers as an advocate, she hears similar stories to her own. She said that “really, things have not changed.”

ICE detainees can also be placed in solitary for protesting or for expressing mental health problems, advocates say.

Azadeh Shahshahani, legal and advocacy director at the Atlanta-based non-profit Project South, said that other immigrants at the Stewart Detention Center have been segregated “in retaliation” because they’ve gone on hunger strikes to spark administrative interest.

“They have filed complaints,” Shahshahani said. “Nobody has paid attention to them. And so basically their last option is to put their bodies on the line.”

And a mother at Karnes County Residential Center in Texas alleged that she and her 11-year-old son were put in medical isolation there as punishment after going on a fast. The account came from a congressional employee who had visited the center, Rep. Hank Johnson (D-Ga.) told NBC.

“I believe they were putting women and children -- young babies, infants even -- into solitary confinement for punishment measures,” he said.

During a hearing of the House Committee on the Judiciary in April 2015, Johnson asked former ICE Director Sarah R. Saldaña about the charge.

“I am not aware of that incident,” Saldaña said. “... If that is a fact, that disturbs me greatly.”

In its directive, ICE says that detainees on hunger strikes can be placed in segregation for their medical safety.

An ICE spokesperson wrote that, “The ICE family residential centers do not have segregation areas. Special monitoring or cohorting may be done in cases where it is deemed medically necessary.”

Advocates respond that while family detention facilities do not have cells explicitly used for solitary confinement, rooms in the medical wing can be used as segregation chambers.

If detainees admit to considering harming themselves, they are often subjected to segregation, which can exacerbate their issues. In its 2013 memo, ICE says that immigrants can be placed in solitary for “mental illness” or “suicide risk.”

“It has been my experience that detainees are reluctant to express anxiety or depression out of fear that that would lead to them being put into segregation,” Free said.

Attorneys sometimes try to use their clients’ segregation as a reason for release or transfer. Scott, for example, cited Mulugeta’s long-term stay in the special housing unit in a letter to the New Orleans field office director advocating for his discharge. He wrote that Mulugeta had been maced in his cell, and that he had been denied the opportunity to meet with his attorney on multiple occasions, which he called a “serious constitutional violation.”

But when asked, immigrant attorneys could not think of any lawsuits that specifically targeted the use of solitary confinement at ICE facilities. They also couldn’t cite any larger movement fighting against the systemic employment of segregation by ICE officials.

“As immigration lawyers, we do have unified efforts on a lot of things, but it’s usually not that,” Scott said.

Free echoed him, saying, “I don’t think that that exists.”

A little over a year after his release, Mendez recalled how many of those in segregation hadn’t done anything wrong, and how unreasoned discipline was. While he and other detainees were shut in for months, actual bullies and troublemakers faced no consequences for their actions, he said.

“There were some people they punished for no reason, and others who were guilty but were allowed to live freely,” Mendez said.

Even after leaving detention, he insists that he never had sexual relations with his then-boyfriend while they were at Stewart.

“We only sent each other letters,” he said. “What they accused us of never happened.”


This story uses functionality that may not work in our app. Click here to open the story in your web browser.
          A New Corporate Tax in Portland Could Raise $51 Million a Year for Renewable Energy, Jobs Training   
by Dirk VanderHart

solar_panels_getty.jpg
Henglein and Steets via Getty Images

As a coalition of Portland cultural and climate change groups plots a new business tax to pay for renewable energy projects, the city's number crunchers are urging caution.

In a report issued earlier this month, the city's Revenue Division says a single company could wind up paying more than $3.7 million a year under the tax proposal, as written. Several others would pay upwards of $2 million a year, leading the analysis to conclude there's a risk of businesses leaving Portland.

"The Measure as written is estimated to raise between $35 and $51 million," the report says, in the first official prediction of the proposal's revenue potential. "However, the Revenue Division does not recommend implementing the Measure as written..."

The proposal in question—being circulated as the "Clean Energy and Justice Measure"—would slap a one percent tax on the Portland-based revenues of "large retailers" operating in the city. To qualify, companies would have to have global sales of more than $1 billion (or be a subsidiary or franchisee of such a company), and in-city sales of $500,000 or more. Willamette Week first reported on the idea last month.

The proposal is a gross receipts tax similar to Measure 97, the proposed corporate tax hike that failed on the statewide ballot last year, but passed in Multnomah County. It's being pushed by a coalition that includes the Native American Youth and Family Center (NAYA), Asian Pacific American Network of Oregon (APANO), Verde, the Sierra Club, and 350 PDX.

As the proposal stands in draft form, the money raised by the tax would be placed in a new fund that pays for renewable energy programs (including a specific carve-out for projects that benefit low-income Portlanders), job training "aimed at communities of color, women, and other traditionally under-represented and disadvantaged workers," local food production, and more.

In order to address its concerns with the tax proposal, the Revenue Division has suggested an altered model. It proposed applying the tax to all large businesses—not just retailers—in order to capture operations that contribute to carbon emissions, like construction companies or petroleum refineries. It also suggests capping the maximum tax a business might pay under the proposal at $1 million. By making those tweaks and lowering the tax rate to 0.5 percent (down from 1 percent) the city says the tax might raise between $66.9 million and $81.7 million a year.

The report further suggests such a model would be more simple to administer, requiring fewer city staffers. And it offers a tidbit that's likely to be repeated endlessly by any opponents that pop up. "Some businesses will partially or wholly pass the [gross receipts tax] on to consumers in the form of a price increase," the report reads.

Most community-driven proposals like this wouldn't get the benefit of a city-authored revenue study, but the coalition behind the tax has an ally in Commissioner Chloe Eudaly, who ordered up the report, and who's also asked the City Attorney's Office to explore the legal implications of such a tax, her office says.

Even so, the coalition pushing the measure might not heed the warnings of the report. Jo Ann Hardesty, a local NAACP leader who's serving as a public face of the group, said members are looking at the study, and will vote on any proposed changes to their proposal in mid-July.

"Their approach is not one I’m excited about," Hardesty told the Mercury on Thursday. "I don't think most of our folks are excited about it. I think it's a very convoluted proposal that they've given to us."

While Hardesty says her group is committed to getting something passed, the way forward for the proposal is unclear. It's possible the tax could be passed via a city council vote, though that's likely to spur a challenge that would result in voters deciding its fate. Council could also refer the tax to the ballot itself, but Hardesty says she'd rather have her coalition selling the measure to voters than Portland's elected officials. That would mean supporters collecting signatures themselves to land the tax on the ballot—either in May or November of 2018.

"I think our coalition has much more credibility than city council," Hardesty says.

[ Comment on this story ]

[ Subscribe to the comments on this story ]


          smart50: Почему у женщин нет ни стыда, ни совести...   

 

1827016_0_17afb7_599ac799_orig (499x700, 64Kb)

 

1827016_0a027050756e2bb6cbbca5e941c5b453 (270x96, 23Kb)

 

Почему у женщин нет ни стыда, ни совести, ни мозгов

Всякому приличному мужчине, к сожалению, следует время от времени думать о женщинах. А то он покроется прыщами, и у него от напряжения лопнут глаза. Такой мужчина довольно скоро станет неприятным и со временем умрет, оставив в наследство потомкам пачку недоеденных витаминов, коллекцию марок и пластмассовую расческу.

Поэтому остальным мужчинам следует периодически, до нескольких раз в месяц, думать о женщинах. Это может принести им облегчение, хотя, честно сказать, недолгое. Дело в том, что думать о женщинах неприятно. Едва только взявшись за это занятие, всякий мужчина понимает: у женщин нет мозгов, стыда и совести. А кому такое понравится? Впору собирать марки и есть витамины.

Многие спрашивают в этой связи: как быть? Отвечаю: никак. Спасения нет. Летальный исход неизбежен. У женщин действительно нет ни мозгов, ни стыда, ни совести, поскольку они им не нужны. Наблюдения за женщинами показывают: в течение всей своей жизни они делают всего несколько вещей. А именно: маникюр и звонок по телефону с вопросом «Ты где?». Все остальное - истерики и критические дни. Для этого, конечно, ни стыда, ни совести не требуется. Не говоря уж о мозгах.

 

1827016_6199bd260e0a138b6258d59873a30e62 (441x700, 43Kb)

Едва родившись, любая женщина сразу закатывает истерику. Она кричит как полоумная, воет как белуга. Люди носят ее на руках, сюсюкают, пуськают, тетехают и тютитюкают. А она знай себе орет как ненормальная. Глаза навыкате, руки дрожат: а-а-а-а-а-а-а-а-а-а-а-а-а! А-а-а-а-а-а-а-а-! Ы-ы-ы-ы-ы-ы-ы-ы! Подите все от меня-а-а-а-а-а! Ы-ы-ы-ы-ы-ы!

Устав кричать, женщина начинает делать себе маникюр. Это единственное занятие, которое может отвлечь ее от истерики. Если женщина не кричит и не делает маникюр, значит, она выщипывает брови. В среднем, женщина тратит на маникюр семнадцать лет, восемь месяцев, три дня, сорок семь минут и двадцать секунд своей жизни. Остальное время она кричит и выщипывает себе брови.

Трудность, однако, в том, что жизнь сложнее и дольше. Поэтому женщине приходится худеть и толстеть. Нет ни одного существа на белом свете, которое могло бы худеть и толстеть. Цветы - пахнут, деревья - гнутся, птички - свистят, солнце - светит. Женщина же постоянно худеет и толстеет, и это доводит ее до исступления.

Она говорит:

- Господи, кажется, я потолстела. - И закатывает истерику.

Когда вы пытаетесь успокоить женщину и говорите, что она вовсе не потолстела, а даже как-то похудела, она говорит:

- Господи, как же я похудела! Смотреть не на что! - И закатывает истерику.

Если женщина не бьется в истерике, не делает себе маникюр, не выщипывает брови, не худеет и не толстеет, значит, она потеряла стыд и совесть. Это значит, она открыла шкаф, стоит перед зеркалом голая и говорит:

 

 

1827016_135881872_1827016_4682329_4800384_large (466x700, 149Kb)



- Так. Мне совершенно нечего надеть. В чем я теперь пойду?

Это не значит, что она куда-то собралась. Просто у нее нет ни стыда, ни совести. Впрочем, некоторые специалисты утверждают, что время от времени стыд и совесть у женщины все-таки появляются. Но это означает только то, что у нее начались критические дни. В критические дни женщина ведет себя иначе. Она не открывает шкаф, не стоит голая, не худеет, не толстеет, не делает себе маникюр и не выщипывает брови. В критические дни она просто кричит. Истошно, без стыда и совести, как белуга. Таких дней в месяце примерно семь. Однако их особенность в том, что есть еще дней десять отчаянья перед критическими днями и примерно столько же после. В течение этого непростого времени женщина не желает ничего знать. Относиться к этому следует с пониманием. Для того, чтоб что-нибудь знать, надо иметь мозги, стыд и совесть. А у женщин их нет.

Следует, впрочем, заметить, что в перерывах между критическими днями, маникюром, выщипыванием бровей, худением, толстением, стоянием перед зеркалом и истерикой у женщины остается немного свободного времени. Как правило, она использует его, чтобы позвонить по телефону. Когда женщина звонит по телефону, она обязательно дозванивается и спрашивает: «Ты где?» Вне зависимости от ответа женщина сразу начинает закатывать истерику и жаловаться, что ей нечего надеть, она исхудала, забыла, когда в последний раз делала маникюр, у нее скоро критические дни и она не желает ничего знать, поскольку у вас нет ни стыда, ни совести и думаете вы неизвестно чем. То есть известно, чем. Черт-те чем.

 

1827016_original3 (429x700, 226Kb)

 



Спрашивается: зачем так устроено природой? Зачем же она не дала женщинам мозг, стыд и совесть? Я вам отвечу вопросом: а откуда б она их взяла? Все женщины ведь происходят от женщин, у которых нет ни мозгов, ни стыда, ни совести, и от мужчин, у которых нет денег и головы на плечах, чтобы с ее помощью оценить маникюр, выщипанные брови, плоский живот, розовую кофту и ответить наконец на вопрос «Ты где?». Поэтому в сложившейся ситуации следует действовать только двумя традиционными способами: коллекционировать марки или периодически пуськать женщину, тетехать ее и тютитюкать. В конце концов, пусть себе орет как ненормальная. От крика тоже польза есть. Сидишь, как пенек, денег нету ни черта, башка глупая, глаза бесстыжие. Сидишь, в носу ковыряешь, слушаешь и думаешь: Господи, какое ж счастье! Я не одинок.

Сергей Мостовщиков
http:/www.gazeta.ru

 (97x51, 3Kb)

 

 

1827016_im32age (700x455, 26Kb)

 

1827016_image3 (293x250, 15Kb)

 

 

1827016_59652882_1275168428_0eee7c9bd788 (611x614, 224Kb)

 


 

1827016_131348638_1827016_tumblr_n2jxi0Apmv1seuztlo7_500 (420x420, 773Kb)

 

 

1827016_1e8511ae128ac0f46dd9814d00c34debbc2034109554259 (644x409, 46Kb)

 

 

 

Как правильно подметил один поэт…
Без женщин жить нельзя на свете…Нет…
Без их любви и нежности-мужчины говорят, не мил им белый свет…
С чем можно женщину сравнить?...Я думаю, с весной…
Все поры года, бывают только в ней одной…
Как в женщине, загадочной, земной…

Ранней весной еще снежок немного балует…
Бывают даже легкие морозы…
Но не страшны уже зимы угрозы…
Вот солнышко пригреет, растает весь снежок…
Зазеленеет травка, и оживет лужок…
Проснется вся природа,  и потекут ручьи…
Скоро по небу полетят к нам с теплых стран…
Перелетных птиц ключи…

Покроется земля зелеными коврами…
И вновь вернется долгий день…
Со светлыми и теплыми вечерами…

Распустятся деревья, и зацветут цветы…
В убранстве белом будут, стоять весной сады…
А в мае, ну конечно же начнутся грозы…
И небо будет лить на землю….
Теплые, хрустальные, мокрые слезы…

После грозы, и радуга на небе будет…
Весна, всю красоту, какая есть в природе…
Во все века и времена,  дарит бесплатно людям…

В весне ведь столько много нежности, и ласки, и тепла…
Наверное,  она все женщине земной передала…
А вместе с этим и грозу, …
Ну и конечно же хрустальную слезу…

Ведь женщины….они легко ранимы…
Но все равно…не глядя ни на что…
Мужчинами  бывают до безумствия порой  любимы…

А если мы заглянем в историю….Хоть на чуть чуть…
Увидим от начала века мужской и женский…
Жизни интересный путь….

Создал сначала Бог, здесь на земле мужчину…
Потом только, увидев, что не может он один…
Создал,  помощницу ему….
Бог наделил мужчину силой…
А женщине…быть предназначено в его плену…

В плену семьи, в плену его любви, в плену детей…
В плену непредсказуемых, мужских идей…
Должны мы им всегда повиноваться…
Без боя в плен их мы должны сдаваться…

Но век сегодня не таков…
Избавились мы от мужских оков….
Эмансипация нас до такого довела….
Забыли, для чего мы созданы…
Такие вот дела…

Давайте спросим у мужчины….
Какой он видит женщину свою…?
Я думаю, ответит он…такую…
Чтоб с нею было как в раю…

Чтобы была она похожа на  Весну…. красива,  нежна и терпелива…
Чтоб,  ласковой была, и не сварлива..
Чтоб женственной была, и не курила, не пила…
Чтобы детей ему здоровых родила…

Плоды большой Любви, ведь это наши дети…
Стать мамой, мечтает каждая ведь  женщина, здесь на планете

Женской руки и сердца, мужчины раньше добивались..
На шпагах, на дуэлях, за милых дам сражались…
А нынче рыцарей, почти что нет…
Так изменился белый свет…
Что же случилось с ними?...
Где отыскать на заданный вопрос ответ?...

Нет,  всетки есть еще и женщины хорошие...
И настоящие встречаются еще мужчины…
Хоть для волненья есть уже причины…
Их очень в жизни нашей стало не хватать....
По долгу, настоящих  приходится искать…

Что пожелать хочу я женщинам….
Конечно же ищите, любите, берегите, своих мужчин..
Не обижайтесь и не ссорьтесь с ними…
Из за каких то,  незначительных причин…
И сыновей своих воспитывайте так…
Чтоб женщины их не отвергали  словно брак…

Дочерей достойными нужно воспитать…
Чтобы  женами хорошими они могли бы стать..
Чтоб все время разными были для своих мужчин...
То сильными, то слабыми, то нежными, то строгими…
Чтоб для единственной, он принебрег  бы многими…

Мужчинам пожелать хочу терпенья…
Капризы женские, чтоб иногда вы исполняли без волненья…
Чтоб нас лелеяли, любили, чтоб комплименты…
И цветы хоть иногда дарили…

Что мы для вас желанные…
Почаще говорили…
Ведь женщина живет, пока она любима…
Не забывайте, женская душа…
Нежна…но так ранима…

Пожелать хочу нам всем…
Чтоб поменьше создавали сами себе проблем…
Жили дружно, берегли, любили бы друг друга…
Остальное все придет…
Пусть жизнь идет по кругу…

Вниманием таким, чтобы не только в женский праздник..
Мужчины баловали бы нас…
Хотим, чтоб эта сказка продолжалась …
Конечно каждый день и каждый час.?????…


© Copyright: Лариса Ефремова, 2012
Свидетельство о публикации №112050608796

 

 

1827016_thumb250e4afdfff53a8dd317479c791b04e7c (700x437, 24Kb)

 

 

1827016_RkrasivoIG2PESEmEaErEt50 (295x57, 5Kb)

 (97x51, 3Kb)

 

 

 

 

 


          (Arkansas) Winchester 70 HV 223 - $ 700   
Excellent condition Winchester 70 heavy varmit stainless 20" threaded 1/2x28 barrel HS precision aluminum bedded stock.Weaver 4x16x42 v16 scope with box.txt 479/305/0405
          /scribus-svn/1.5.4.svn/readme.txt   
none
          /strawberry-perl-packages/strawberry-perl-5.24.1.1-all-pepfia-2.3.x-1-fia-2.3.20-rc1-tests-x86.txt   
none
          /test_builds/XOS_cheeseburger_7.1.2_20170701-tryna-boot-changelog.txt   
none
          /Documentation/sha256sums.txt   
none
          /LiveTV/Files/IPTV_LATIN.txt   
none
          Points to remeber for SEO   
search engine submit url:-

Navigation and Layout

For search engine submit url it is required for your user to navigate website properly. Your users can go easily from home page to other pages. and every page should have sitemap and also your contact details for best search engine marketing.
Simple and Clean

For better marketing of search engine friendly site you require to keep your site clean and simple.So that users can easily do surfing to your site.

Content

Content is king in internet marketing of your site.It will say users about you and your products. There are many internet marketing ideas such as articles directories. many blogspot users have done submit url to free directories for better search engine results.

Meta Tags:-


Robots.txt

search engine utilize robots to crawl and index your web page. Robots.txt can say index or not index.If you dedicated to your url for marketing through internet then be clear about robots.

Titles

For Search engine marketing tilles are key to submit url in any Search engine. For example my blog's title is search engine marketing internet marketing submit url. your title should be matched with keywords like search engine, marketing, internet, marketing, url, submit, search engine marketing,internet marketing, url submit, marketing search engine, submit url etc.

SPAM / E-mail Advertising

Avoid SPAM/E-mail advertising not only do users commonly not pay attention to SPAM it can damage your e-mail address and/or domain to be blocked and you may not able to send e-mails. Avoid your marketing with these.

Bad Links

Bad links and free links are not good. for better search engine marketing do not submit url to ban links.

Spelling and grammar

There are plenty of sites available in internet for finding errors for your spelling and grammar used to submit url in any search engine.

Links

Links to sites which are ranking high in search engine. you can do marketing of your site free as well as paid by link trading.

          6月30日(金)のつぶやき その2   

Jackie Kennedy in India, 1962. (Art Rickerby—Time & Life Pictures/Getty Images) pic.twitter.com/8b9Pr0j2Mf

— Old Pics Archive (@oldpicsarchive) 2017年6月30日 - 08:52

有効求人倍率が高くて時給は下がってる状況って何?w

— 大江昇 (@TKDOMO) 2017年6月30日 - 10:16

@Li43VgEOxVFUgSS いちばん一般的な募集数が多い求人である清掃、警備、管理人およびその夜勤などでサンプルとると14年ころから不変(相対的に下がっている)か絶対値が下がってます。(アリバイ作りで)時給が低いまま応募がな… twitter.com/i/web/status/8…

— 大江昇 (@TKDOMO) 2017年6月30日 - 11:57

ぼくは自分の書いたものを殆ど読み返さないし、著書も原稿が載った雑誌もすぐに失くしてしまうが、それは読まれる先から消えてしまうことが書物にとって幸福な運命だと信じているからだ。(ロリータ°Cの素敵な冒険p246)

— 大塚英志bot (@otsukaeiji_bot) 2017年6月30日 - 11:35

これスゴく勉強になる。是非ご一読下さい❗ twitter.com/kazue_fgeewara…

— 生田よしかつ (@ikutayoshikatsu) 2017年6月30日 - 11:32

ブルジョワ経済学は、神学者が悪の起源を原罪によって説明するのと同様に、説明すべきもの―私有財産、所有欲、労働、資本、土地所有といったもの―を、歴史上の事実として前提にしてしまう。

— カールマルクス 名言集 (@karlmarxbot001) 2017年6月30日 - 11:38

「『初期ノート』解説」 d.hatena.ne.jp/syoki-note/201…

近年、わたしは「『初期ノート』解説」を毎回読ませてもらっていた。その依田圭一郎さんが亡くなられたとのこと。吉本さんのすぐれた読み手の一人だったと思う。ありがとう、そしてお疲れさんでした。

— nishiyan (@kotobano2) 2017年6月30日 - 11:29

【今夜OA】きょう深夜OA「朝まで生テレビ!」は、片山さつき、福島伸享、朝比奈一郎、天木直人、石川和男、小幡績、高橋洋一、寺脇研、青木理、三浦瑠麗、そして田原総一朗の各氏で~激論!安倍政権と官僚~を徹底激論!放送中twitterご意見募集! #朝生 #seiji #tvasahi

— 朝まで生テレビ! (@asamadetv) 2017年6月30日 - 10:36

京菓子司与楽 京上生菓子『まごい』 pic.twitter.com/iVxwRcwsfm

— まんじゅうドットコム@相互 (@tovamumyvev) 2017年6月30日 - 11:11

「賃金を下げなければ国際競争に勝てない」と内需社会の日本で賃金を下げまくった結果、東芝や三菱自やシャープが憂き目を見る素敵社会が到来した挙句、中国人より日本人の人件費が安いので中国資本の工場ができたけど、経団連はどんな言い訳をしてくれるか楽しみ

— ちょこらーた アルパカ推し (@tyokorata) 2017年6月30日 - 08:25

板垣死すとも記録は死せず、官吏死せずとも記録は死す mainichi.jp/articles/20170…

— Dan Kogai (@dankogai) 2017年6月30日 - 12:03

#瀬戸内海 に浮かぶ #青島 は一周わずか約4キロの陸地に、人間15人・猫150匹が住む「 #猫の島 」。過疎の島で、たくさんの猫と生きる日常や、未来への思いを聞きました。 pic.twitter.com/dcbtfcwMGR

— 朝日新聞東京報道編成局(コブク郎) (@asahi_tokyo) 2017年6月30日 - 12:02

ISISとの銃撃戦でヘッドショットを決めかけられたクルド人女性兵、満面の笑みで笑い飛ばす映像が衝撃的 #海外の反応
kaigai.ch/3b606045158524… pic.twitter.com/KTEhEXrN0t

— kaigai.ch (@KAIGAIch) 2017年6月30日 - 12:01

ホリエモンと村上ファンドの事件で、日本から資本主義は消えた。それが長期停滞の最大の原因だ。 twitter.com/ikedanob/statu…

— 池田信夫 (@ikedanob) 2017年6月30日 - 12:01

以前TLにハロワに務めてる人がいて発言してましたが、個別具体的なハロワの窓口みたいなところでの情報は貴重ですね。そういう現実を集計データなどで誤魔化されちゃたまらない。安倍政権も大企業以外での昇給が鈍いので中小企業への給与アップを求めてましたが。

— 大江昇 (@TKDOMO) 2017年6月30日 - 12:28

「場」を「文学」が用意できず「まんが」が用意できたのは、はたして「まんが」の市場が巨大だったからだけなのでしょうか。それはやはりそのジャンルそのものの「生き残る意志」の問題のような気もするのです。(不良債権としての『文学』 群像2002年6月号)

— 大塚英志bot (@otsukaeiji_bot) 2017年6月30日 - 12:35

@otsukaeiji_bot 「文学」が「場」を用意できなかったのは、文字通り「文学」は言語の世界なので言語そのものが世界化している自覚がないゆえのことでは? この一点に突っ込んでいった思想家がデリダなどでしょう。

— 大江昇 (@TKDOMO) 2017年6月30日 - 12:44

ロックやブルース、ソウルなどは
バンドを組んで場数を踏んでいけば、自然とボキャブラリーが増えていくように思うが

ジャズギターの場合は
自分が自分の音楽教師となり
自分自身に効果的な練習課題を与えていく必要があるジャンルだと思う。

以上、最近やっと気づいた事を簡単に書いてみた。

— ミネ (@minerin999) 2017年6月30日 - 12:50

<心像=イメージ>という認識のラジカル y-bat.txt-nifty.com/memo/2017/06/p… 「いつ、どこで、なにを想像しようが、それは「おなじ仕方でしかあらわれない」もの…です。そして、「いつもおなじ実体に対面しているだけ」という指摘から、この「実体」こそが想像(認識)のラジカル…」

— 大江昇 (@TKDOMO) 2017年6月30日 - 16:11

直進方向に「川崎」と「蒲田」が並んでいますが、この場合左側に表示されている「川崎」が遠く、「蒲田」が近いことも示しています。自然に看板を読んだとき、最初に読む方が遠方、と覚えておくと良いでしょう。

あ ぁ … 今 ま で 知 ら… twitter.com/i/web/status/8…

— M.T Works代表@L750S 🌐 (@JPPD110) 2017年6月28日 - 22:17

かつてイギリス海軍が「世界の覇者」になれたワケ(佐藤 優) | 現代ビジネス | 講談社(1/2) gendai.ismedia.jp/articles/-/520…

— タツミ (@unnotatsumi) 2017年6月30日 - 21:24

「イメージ論2.0」のはじまり…現代が<終わってる>ので!?(再掲) y-bat.txt-nifty.com/doyo/2017/06/p… 「現況である終わりなき日常の反復にこそ未来の可能性を発見した、巨大な思想家の優しい視線を感じることができます。<大衆の原像>に可能性を見いだそうとする視線が…」

— 大江昇 (@TKDOMO) 2017年6月30日 - 21:50

「タワシを見たワシ」
というクソみたいなダジャレを英文に直すと
"I saw a tawasi."
になり、物の見事に英文なのに回文となるということに気づいて感動してる

— こてつ (@kotw_kotetsu) 2017年6月28日 - 13:07

私たちは歴史に学ばなければならない。私たちに未来はない。私たちにあるのは過去だけである。そして過去の連続が現在の私たちを作り、それが未来を創っていく。歴史に学ばざる者に未来はない。

— 古谷経衡@『意識高い系の研究』 (@aniotahosyu) 2017年6月30日 - 21:31

ちなみに明日、7月1日は、大本営が正式にインパール作戦中止を決定した日です。

— 古谷経衡@『意識高い系の研究』 (@aniotahosyu) 2017年6月30日 - 21:38

世界の住み良い都市、東京3年連続1位 英誌
nikkei.com/article/DGXLAS…|「治安の良さや交通の利便性が評価された」。共謀罪法がなくても、それがある国よりはるかに治安がいい。犯罪や不審者を怖がり心配する前に、それを思い出してはどうか。

— 鶴見済 (@wtsurumi) 2017年6月30日 - 21:31

デートに吉野家連れていく男とかキモすぎるだろ。馬鹿なのかよ。普通松屋だろ。松屋は牛丼頼めば無料でお味噌汁が付いてくるんだぞ?女の子はサプライズ好きだし、絶対喜んでくれるだろうな…デートで吉野家に行く男は女の子の気持ちもっと考えろよ

— 藤川 (@msmtnrk) 2017年6月29日 - 21:49
          6月29日(木)のつぶやき その3   

今年の夏もジョナサンは冷麺やってるかな…w

— 大江昇 (@TKDOMO) 2017年6月29日 - 13:09

スタバ満足度「圏外」に落ちた3つの理由 news.goo.ne.jp/article/presid… 「顧客満足」、ドトールが3年連続の1位。2位はミスタードーナツ、3位はコメダ珈琲店、4位はカフェ・ベローチェで、前年4位だったスタバはさらに順位を落とし“圏外”」…そーいえば最近行ってないw

— 大江昇 (@TKDOMO) 2017年6月29日 - 13:34

都会から地方が吸い上げた金を地方がどう使うかは地方の裁量だけど、ワシの目から見て地方の方が弱い人を邪険に扱ってるし、そんな金があったらハコモノに突っ込んじゃう。ワシが今懸念してるのは、都民のカッペ化。大阪は維新以降ずいぶんと田舎化… twitter.com/i/web/status/8…

— Dan Kogai (@dankogai) 2017年6月29日 - 01:09

格差という概念は、立場が動かしがたい時にはじめて成り立つ概念だということ。生まれついた性や世代は変えがたい。しかし住まいは簡単に変えられる。職場以上に簡単に。「地方で搾取される」のが耐えられないならいつでも都民になれるけど、「若者… twitter.com/i/web/status/8…

— Dan Kogai (@dankogai) 2017年6月29日 - 00:25

印象論ですよ。住民票一枚で地方民は都民に、都民は地方民に即日なれるんですから。東京都に国境の壁なんかないのです。都に富が集中するのは、都民だけではなく地方民も富をそこに置くから twitter.com/makoratti/stat…

— Dan Kogai (@dankogai) 2017年6月29日 - 00:13

その主張は卑怯。少なくとも都が国を通して地方に支払ってる資金も感情論ではなく実績なのだし、一票の格差がなおざりになってるのも「実態」なのだし。都→地方というのは実がある。地方→都で唯一実があるのは人口動態だけど、移住は全く強制され… twitter.com/i/web/status/8…

— Dan Kogai (@dankogai) 2017年6月28日 - 23:36

本社をどこに置くかは起業者の自由。優遇措置だの特区だのという点に関しては、東京都は最低。なのに何で本社を東京都に起きたがるのか地方の為政者は必死で考えるべき。二言目に印象論で搾取とかいう前に。他国まで見ると🇺🇸や🇩🇪はそうなってない twitter.com/makoratti/stat…

— Dan Kogai (@dankogai) 2017年6月28日 - 22:56

若者は「リソース」である以前に「個人」。この単純で厳然たる現実を踏みにじってる限り、何の勧誘もしなくとも地方に幻滅した若者は都に集まる twitter.com/robert_kimata/…

— Dan Kogai (@dankogai) 2017年6月28日 - 22:52

都民が地方から搾取してるって証拠を見せてよ。まずはそこから。税の流れも、1票の格差もその逆の証拠は出揃ってるんだから twitter.com/makoratti/stat…

— Dan Kogai (@dankogai) 2017年6月28日 - 22:43

東京はジジババどもに搾取されるのにうんざりした若者が集まるところ。それでも税金を通して搾取は付いて回るのだけど、金だけで済む分説教されるよりはずっとマシ twitter.com/dankogai/statu…

— Dan Kogai (@dankogai) 2017年6月28日 - 22:27

東京が税制的に搾取されてるってのは事実。その逆の主張は溢れてても証拠を提示された試しがない grading.jpn.org/SRD310103.html twitter.com/makoratti/stat…

— Dan Kogai (@dankogai) 2017年6月28日 - 22:16

築地のこの橋、いつになったら開通するの? pic.twitter.com/1UhAwuonfD

— Dan Kogai (@dankogai) 2017年6月28日 - 20:26

チープな小説が書きたい。死ぬ程不用意で杜撰で、三年たったら小説の名も忘れ去られてしまうただ消費されるための小説を。(サイコ 雨宮一彦の帰還 講談社ノベルス あとがき)

— 大塚英志bot (@otsukaeiji_bot) 2017年6月29日 - 14:35

「像としての文学」から4 y-bat.txt-nifty.com/memo/2014/07/p… 「言語のイメージを探究した『言語にとって美とはなにか』は、その現代版として『ハイイメージ論』に発展します。それはイメージの文法ともいうべきものの追究です。」

— 大江昇 (@TKDOMO) 2017年6月29日 - 15:38

<心像=イメージ>という認識のラジカル y-bat.txt-nifty.com/memo/2017/06/p… 「イメージへの思索は現実の視覚像との区別ができていないという初歩的?な錯誤も多く、混同したり混乱しがちです。またイメージにはあらかじめ価値判断が含まれているために大変に複雑な面もあります。」

— 大江昇 (@TKDOMO) 2017年6月29日 - 16:54

リンチって音楽や音へのセンスがイイですよね。独特の世界が… twitter.com/rinsstudio/sta…

— 大江昇 (@TKDOMO) 2017年6月29日 - 17:01

ぼくたちが示してしまった「細部」への執着は、結局は「主題」や「意味」からの逃走でしかなかった、と今は言える。(「ほしのこえ」を聴けp9)

— 大塚英志bot (@otsukaeiji_bot) 2017年6月29日 - 15:35

大体、時代といふものは、自分のすぐ前の時代には敵意を抱き、もう一つ前の時代には 親しみを抱く傾きがある。

— 三島由紀夫 (@Mishima__Bot) 2017年6月29日 - 15:38

ありのままのあなたを愛してくれる人はいません。いい出会いなんて勝手に来ません。モテ期もありません。だからこそ、あなたから行動するしかないのです。 yusb.net/man/894.html pic.twitter.com/Ms2gLctJfJ

— ゆうきゆう❤️マンガで分かる心療内科❤️ (@sinrinet) 2017年6月29日 - 16:09

引き続き、ウネウネ&一発定位置駐車をご覧下さいませ。

#supergt
#トレーラーうねうね pic.twitter.com/LsHLzdyQHK

— SUPERGT_OFFICIAL (@SUPERGT_JP) 2017年6月29日 - 10:37

シリアは近代的国家というイメージを持っていましたが、未だに国民国家として形成の途上。アサド政権が教育に力を入れたのも当然。様々な部族集団がありサウジ、カタール、シリアにまで2000万人が分布するのもあり、そして各国の軍事介入、よく… twitter.com/i/web/status/8…

— ちんどん (@chindonsyan2) 2017年6月29日 - 16:28

「エコ・カプセル」が、2018年からロシアで発売される。
ecocapsule.sk
#家 pic.twitter.com/kBuURBYvFS

— それでもソ連bot+ (@sovietsoreyuke) 2017年6月29日 - 19:00

ぐわけろちょぼ。 pic.twitter.com/Z0hhIQHCtQ

— 花日和 畳 (@tatami111) 2017年6月29日 - 18:18

そごう柏閉店 通行量5割減る | 駅周辺の中心市街地全体では休日の通行量が約2万人減っており、商業都市・柏の街づくりの課題が浮き彫りになった。 news.yahoo.co.jp/pickup/6245117

— 休学中⭐️都心湾岸丸 R.I.P (@tokyo_jcs) 2017年6月29日 - 19:26

都民ファーストが第一党だとして、何やるの?…という素朴な疑問w

— 大江昇 (@TKDOMO) 2017年6月29日 - 19:29

\「夏の船カフェ2017」が明日から開催/

豊洲運河を500円でクルージングできる「夏の船カフェ2017」、船上カフェや子ども向け企画も - #とよすと #豊洲 #地域ブログ toyosu.tokyo/event/cruise-c… pic.twitter.com/qONevtPw0s

— とよすと (@toyosu_tokyo) 2017年6月29日 - 14:00

【静岡・願成就院/毘沙門天立像(1186)】一般的な毘沙門天像の形であるが、堂々とした武道家のような重量感溢れるものであり、厚い胸板と引き締まった腹、しっかりと筋肉のついた腰によって、鎧を着込んだ姿にも関わらず躍動感に溢れている。 pic.twitter.com/1A3l53CuVQ

— 仏師・『運慶』の仏像 (@unkei369) 2017年6月29日 - 16:22

東京の「1日乗車券」、なぜこんなに不便なのか | 海外 | 東洋経済オンライン | 経済ニュースの新基準 toyokeizai.net/articles/-/176…

東京フリーきっぷに23区内の私鉄線も乗車可能な機能が追加されるとかなり便利になりそうなのになあ。現状だと三軒茶屋なんて遠い。

— 草壁☀️3-き40a (@kusakabe) 2017年6月29日 - 19:27

中選挙区制の都議選と小選挙区制の衆院選は違う。都民ファーストが民進党や維新と票割れを起こし、自民党はそれに助けられてそれほど議席は減らないでしょう。選挙協力をすれば別だけど… / “大量の候補者抱える小池塾 国政で自民過半数割れ…” htn.to/FMdrRo

— Oricquen (@oricquen) 2017年6月29日 - 18:00

韓国人カップルが宿泊した「日本の民泊」に隠しカメラが仕掛けられているのが発見され、韓国で騒動に
sakamobi.com/news/minpaku-k…

露骨な配線でワロタ pic.twitter.com/iRNiZoiJtT

— sakamobi (@sakamobi) 2017年6月29日 - 18:23
          xmlHttpRequest response for email reader script   
If I replace the .msg file with a .txt file I can get an Alert... showing that the xmlHttpRequest is working. But I'm trying to use the xmlHttpRequest response in an email reader script. There are 3 external .js files that do the email reader processing... datastream.js, jquery-1.12.0.min.js, and...
          lmkj G6   

Categories:

ROM Mobile lmkj G6 – ROM Android 4.4.2 ONLY MT6572 ROM lmkj G6 version: t8_dhd_f10e_000_qhd_en_v01.20170628 – lokyee72_cwet_kk_t8-user 4.4.2 KOT49H Gapps include  – No Rooted Language support: Multilang   ROM Install : - Unpack FlashTools, and Click on Flash_tool.exe - Select "scatter-Loading" and search MT6572_Android_scatter.txt in ROM - Wait file to be added into Flash Tool - Select "Download Only" [...]

(Read more...)


          lmkj L100i   

Categories:

ROM Phone lmkj L100i – ROM Android 4.4.2 ONLY MT6572 Update ROM lmkj L100i version: m8v13_dx_g628_czb_l100i_fwvga_en_v02.20170628 – lokyee72_cwet_kk_m8-user 4.4.2 KOT49H —————————————————————————————————————————————————————————————– ROM lmkj L100i version: m8v13_dx_g628_czb_l100i_fwvga_en_v01.20170622 – lokyee72_cwet_kk_m8-user 4.4.2 KOT49H Gapps include  – No Rooted Language support: Multilang   ROM Install : - Unpack FlashTools, and Click on Flash_tool.exe - Select "scatter-Loading" and search MT6572_Android_scatter.txt in ROM - Wait file [...]

(Read more...)


          CCIT F8 Plus   

Categories:

ROM Mobile CCIT F8 Plus - ROM Android 5.1 ONLY MT6580 ROM Official CCIT F8 Plus version: l18v30_ybz_F8Plus_ccit_t11_en_64a8_v05_20170629 – aeon6580_weg_l_l18-user 5.1 LMY47I Gapps include – No Rooted Language support: Multilang   Install ROM: - Unpack FlashTools, and Click on Flash_tool.exe - Select "scatter-Loading" and search MT6580_Android_scatter.txt in ROM - Wait file to be added into Flash Tool - Select "Download [...]

(Read more...)


          NXP HD4   

Categories:

ROM Mobile NXP HD4 – ROM Android 6.0 ONLY MT6797 Official ROM NXP HD4 Version: 20170629_g15v97_3m_smt_chaoxian – g15v97_4m_smt-eng 6.0 MRA58K Gapps include -  No Rooted Language support : Multilang   Install ROM : - Unpack FlashTools, and Click on Flash_tool.exe - Select "scatter-Loading" and search MT6797_Android_scatter.txt in ROM - Wait file to be added into Flash Tool - Select "Download Only" [...]

(Read more...)


          jaBuT - a flexible back-up and sync program {RE}   
Yes, exactly. So after jabut saves the list it could start for example "zipit.cmd" which would look like this
Code:
7z a -r -tzip lintalist-backup.zip @jabut-list-file.txt

          jaBuT - a flexible back-up and sync program {RE}   
@jabut-backup just a wild idea - perhaps it wouldn't be too much work to add a new "backup" option by making jabut some sort of preprocessor:

- let jabut create a file list of all the files that need to be backed up and let the user save that into a text file to a predefined location, say c:\mybackupjobs\jb-file-list.txt
- the file list would simply have one full file path per line "c:\mydata\file1.doc"
- after jabut has saved the file it runs a predefined command, in most cases this will be a batch file or perhaps people will write a VB script, powershell, AutoHotkey etc.

This will allow the user to create their own preferred "tool" to do the backups. A file list as above could be used by many cmd line archive tools, so basically you let the user decide what to do with the files that need to be copied.

Might not be perfect but it does give people a way to meet very specific demands while most users will be happy with the current backup options.

Just a thought.

Edit: this post made me an R3 8)
          Trackfiles Episode 30 - May 7, 2011   

In this episode, I have a look at two areas using Geo Tourism. One is starting and one is well established. Also, there's a television report and a quick peek at the new Geocaching website. This plus upcoming events and Podcast Rewind.
Visit show sponsor Landsharkz.
Links is Show:
GC2TK5M The Doctor Who Series: The Second Doctor (Multi-cache) in British Columbia, Canada created by Time Lord Icenrye with Time Lord Cecil-EGC
GC2R1VF Doctor Who Series: Finale (Unknown Cache) in Indiana, United States created by Time Lord Cecil-EGCM & his crack team of Minions
GC2RKZ0 We'd Like to Meet You (Event Cache) in British Columbia, Canada created by Hobo and Miss
Desoto Times Tribune - Modern day treasure hunt
Modern Day "Treasure Hunt" Gaining Popularity in Valley
Preview of Geocaching.com May 4th Website Release - Latitude 47
Gold Country GeoTourism Program
YouTube - Gold Country GeoTourism
GC2V5VC Outdoor Cacher Event (Event Cache) in Bayern, Germany created by sammy84 + quadgary
GC2M2WK First Campout of Summer (Event Cache) in Northern Scotland, United Kingdom created by Will & Carol
GC2QDEE We Want To See More In Seymour (Event Cache) in Indiana, United States created by dorothy&scarecrow
GC2M125 3rd Annual Brunch in Buford: Population 1 (Event Cache) in Wyoming, United States created by Team SCR
GC2VFPW Breakfast At The Red Rooster (Event Cache) in New Brunswick, Canada created by ynds
GC2TJXC N.R.G. Celtic Lunch (Event Cache) in Ontario, Canada created by N.R.G.
Cache-A-Maniacs
Geocaching Podcast
Twin Cities Geocaching Podcast
          Trackfiles Episode 24 - March 5, 2011   
In this episode, I have a look at caching with children, dogs and cameras. Also there's a special request for help for the New Zealand earthquake.
Visit show sponsor Landsharkz.
Links in Show:
TerraCaching - Christchurch Earthquake Relief (LC7P2)
NZ Flag - Earthquake Fundraiser - Geocaching New Zealand
Donate now to the NZ Red Cross
Get out and geocache - Montgomery News
Texas Geocache Challenge March 12th - Desert Denizens
A beginner’s guide to geocaching - Ready for Ten
Geocaching Dogs Unite!
YouTube - Blizzard Geocaching- Minneapolis Geocaching Examiner [vlog]
Minneapolis Geocaching Examiner - Outdoor Rec & Adventure - Examiner.com
Geocaching 12 of 12
GC2N77R Return to Six+ Nations (Event Cache) in Dublin, Ireland created by Love
GC2FDX2 Texas Challenge 2011 (Event Cache) in Texas, United States created by Texas Geocaching Association (hosted by SETX)
GC2KRP0 Kiss Me I'm Irish! Meet and Greet (Event Cache) in Washington, United States created by Avroair - Pucker Up!
GC2P06M Dashing Through The Snow-March Event (Event Cache) in Prince Edward Island, Canada created by Firefly1957
GC2MXX0 N.R.G. Homestyle Lunch (Event Cache) in Ontario, Canada created by N.R.G.
Cache - A - Maniacs
Cachers of the Round Table
Geocaching Podcast
Trackfiles Photo Challenge
This episodes winning Photo
          Trackfiles Episode 17 - January 8, 2011   
In this episode I look at a new feature from Groundspeak and highlight two television reports. Also, there's another example of a town using caching to promote tourism. This plus Podcast Rewind, upcoming events, some special footage and a contest!
Visit show sponsor Landsharkz.
Links in Show:
Geocaching Favourites
Geocaching.com Caption Contest 19 - Win a Barely Coveted Prize - Latitude 47
The Dahlonega Nugget - High-tech treasure hunters descend on Dahlonega
Trumbull County Residents Spend Time Geocaching - WKBN - 27 First News
Snowfire Samoyeds
YouTube - Snowfiresams's Channel
GC2KJQV BCGA Annual General Meeting & Meet 'n' Greet (Event Cache) in British Columbia, Canada created by BC Geocaching Association
GC2KV4G Puzzle Night #1 Event (Event Cache) in Prince Edward Island, Canada created by Firefly1957
GC2FJGY Breakfast in the Blustery Burbs #7 (Event Cache) in Illinois, United States created by GoGeocaching.com
Cache - A Maniacs Podcast
Geocaching Podcast
Cachers of the Round Table
Follow Trackfiles on Twitter
          Trackfiles Episode 11 - October 30, 2010   


          Fabian Arrotin: Deploying Openstack through puppet on CentOS 7 - a Journey   

It's not a secret that I was playing/experimenting with OpenStack in the last days. When I mention OpenStack, I should even say RDO , as it's RPM packaged, built and tested on CentOS infra.

Now that it's time to deploy it in Production, that's when you should have a deeper look at how to proceed and which tool to use. Sure, Packstack can help you setting up a quick PoC but after some discussions with people hanging around in the #rdo irc channel on freenode, it seems that almost everybody agreed on the fact that it's not the kind of tool you want to use for a proper deploy.

Let's so have a look at the available options. While I really like/prefer Ansible, we (CentOS Project) still use puppet as our Configuration Management tool, and itself using Foreman as the ENC. So let's see both options.

  • Ansible : Lot of natives modules exist to manage an existing/already deployed openstack cloud, but nothing really that can help setting up one from scratch. OTOH it's true that Openstack Ansible exists, but that will setup openstack components into LXC containers, and wasn't really comfortable with the whole idea (YMMV)
  • Puppet : Lot of puppet modules so you can automatically reuse/import those into your existing puppet setup, and seems to be the prefered method when discussing with people in #rdo (when not using TripleO though)

So, after some analysis, and despite the fact that I really prefer Ansible over Puppet, I decided (so that it could still make sense in our infra) to go the "puppet modules way". That was the beginning of a journey, where I saw a lot of Yaks to shave too.

It started with me trying to "just" reuse and adapt some existing modules I found. Wrong. And it's even fun because it's one of my mantras : "Don't try to automate what you can't understand from scratch" (And I fully agree with Matthias' thought on this ).

So one can just read all the openstack puppet modules, and then try to understand how to assemble them together to build a cloud. But I remembered that Packstack itself is puppet driven. So I just decided to have a look at what it was generating and start from that to write my own module from scratch. How to proceed ? Easy : on a VM, just install packstack, generate answer file, "salt" it your needs, and generate the manifests :

 yum install -y centos-release-openstack-ocata && yum install openstack-packstack -y
 packstack --gen-answer-file=answers.txt
 vim answers.txt
 packstack --answer-file=answers.txt --dry-run
 * The installation log file is available at: /var/tmp/packstack/20170508-101433-49cCcj/openstack-setup.log
 * The generated manifests are available at: /var/tmp/packstack/20170508-101433-49cCcj/manifests

So now we can have a look at all the generated manifests and start from scratch our own, reimporting all the needed openstack puppet modules, and that's what I did .. but started to encounter some issues. The first one was that the puppet version we were using was 3.6.2 (everywhere on every release/arch we support, so centos 6 and 7, and x86_64,i386,aarch64,ppc64,ppc64le).

One of the openstack component is RabbitMQ but openstack modules rely on the puppetlabs module to deploy/manage it. You'll see a lot of those external modules being called/needed by openstack puppet. The first thing that I had to do was investigating our own modules as some are the same name, but not coming from puppetlabs/forge, so instead of analyzing all those, I moved everything RDO related to a different environment so that it wouldn't conflict with some our our existing modules. Back now to the RabbitMQ one : puppet errors where trying to just use it. First yak to shave : updating the whole CentOS infra puppet to higher version because of a puppet bug. Let's so rebuild puppet for centos 6/7 and with a higher version on CBS

That means of course testing our own modules, on our Test Foreman/puppetmasterd instance first, and as upgraded worked, I applied it everywhere. Good, so let's jump to the next yak.

After the rabbitmq issue was solved, I encountered other ones coming from openstack puppet modules now, as the .rb ruby code used for type/provider was expecting ruby2 and not 1.8.3, which was the one available on our puppetmasterd (yeah, our Foreman was on a CentOS 6 node) so another yak to shave : migrating our Foreman instance from CentOS 6 to a new CentOS 7 node. Basically installing a CentOS 7 node with the same Foreman version running on CentOS 6 node, and then following procedure, but then, again, time lost to test update/upgrade and also all other modules, etc (One can see why I prefer agentless cfgmgmt).

Finally I found that some of the openstack puppet modules aren't touching the whole config. Let me explain why. In Openstack Ocata, some things are mandatory, like the Placement API, but despite all the classes being applied, I had some issues to have it to run correctly when deploying an instance. It's true that I initially had a bug in my puppet code for the user/password to use to configure the rabbitmq settings, but it was solved and also applied correctly in /etc/nova/nova.conf (setting "transport_url=") . But openstack nova services (all nova-*.log files btw) were always saying that credentials given were refused by rabbitmq, while tested manually)

After having verified in the rabbitmq logs, I saw that despite what was configured in nova.conf, services were still trying to use the wrong user/pass to connect to rabbitmq. Strange as ::nova::cell_v2::simple_setup was included and was supposed also to use the transport_url declared at the nova.conf level (and so configured by ::nova) . That's how I discovered that something "ugly" happened : in fact even if you modify nova.conf, it stores some settings in the mysql DB, and you can see those (so the "wrong" ones in my case) with :

nova-manage cell_v2 list_cells --debug

Something to keep in mind, as for initial deployment, if your rabbitmq user/pass needs to be changed, and despite the fact that puppet will not complain, it will only update the conf file, but not the settings imported first by puppet in the DB (table nova_api.cell_mapping if you're interested) After that, everything was then running, and reinstalled/reprovisioned multiple times my test nodes to apply the puppet module/manifests from puppetmasterd to confirm.

That was quite a journey, but it's probably only the beginning but it's a good start. Now to investigate other option for cinder/glance as it seems Gluster was deprecated and I'd like to know hy.

Hope this helps if you need to bootstrap openstack with puppet !


          Xavier Mertens: Who’s Visiting the Phishing Site?   

Today, while hunting, I found a malicious HTML page in my spam trap. The page was a fake JP Morgan Chase bank. Nothing fancy. When I found such material, I usually search for “POST” HTTP requests to collect URLs and visit the websites that receive the victim’s data. As usual, the website was not properly protected and all files were readable. This one looked interesting:

Data File

The first question was: are those data relevant. Probably not… Why?

Today, many attackers protect their malicious website via an .htaccess file to restrict access to their victims only. In this case, the Chase bank being based in the US, we could expect that most of the visitors’ IP addresses to be geolocalized there but it was not the case this time. I downloaded the data file that contained 503 records. Indeed, most of them contained empty or irrelevant information. So I decided to have a look at the IP addresses. Who’s visiting the phishing site? Let’s generate some statistics!

$ grep ^ip: data.txt |cut -d ' ' -f 2 | sort -u >victims.csv
$ wc -l victims.csv
150

With Splunk, we can easily display them on a fancy map:

| inputlookup victims.csv | iplocation IP \
| inputlookup victims.csv | iplocation IP \
| stats count by IP, lat, lon, City, Country, Region

IP Map

Here is the top-5 of countries which visited the phishing page or, more precisely, which submitted a POST request:

United States 64
United Kingdom 13
France 11
Germany 7
Australia 5

Some IP addresses visited multiple times the website:

37.187.173.11 187
51.15.46.11 77
219.117.238.170 21
87.249.110.180 9
95.85.8.153 6

A reverse lookup on the IP addresses revealed some interesting information:

  • The Google App Engine was the top visitor
  • Many VPS providers visited the page, probably owned by researchers (OVH, Amazon EC2)
  • Service protecting against phishing sites visited the page (ex: phishtank.com, phishmongers.com, isitphishing.org)
  • Many Tor exit-nodes
  • Some online URL scanners (urlscan.io)
  • Some CERTS (CIRCL)

Two nice names were found:

  • Trendmicro
  • Trustwave

No real victim left his/her data on the fake website. Some records contained data but fake ones (although probably entered manually). All the traffic was generated by crawlers, bot and security tools…

[The post Who’s Visiting the Phishing Site? has been first published on /dev/random]


          This Is The State Of Small Business Failure In The U.S.   

The reasons that companies fail are as varied as the startups themselves, but this analysis of public records and trends reveals several factors.

Things are tough out there for new businesses. According to the Bureau of Labor Statistics’ Business Employment Dynamics, the number of businesses surviving past the first year has dropped from 569,419 in 1994 to 106,789 in 2016.

Read Full Story


          Students examine history of Delta’s civil rights era   
Penn. college students will compare struggles in U.S. South and South Africa

By ANDY ROSS
Staff Writer

Thursday, October 23, 2008 12:07 PM CDT

Around ten years ago Dickinson College history professor Kim Lacy Rogers traveled through Clarksdale and the Mississippi Delta seeking out stories from those who had lived through the Civil Rights movement.

Talking with black Mississippians from all walks of life, the oral history interviews Roger’s captured during that time culminated in 2006 with the publication of her book, Life and Death in the Delta: African American Narratives of Violence, Resilience, and Social Change.

Now, two years later, Rogers is headed back to Clarksdale. This time, however, the professor will be joined by seven of her students from the small school in Carlisle, Penn., each of whom will be comparatively examining the Delta’s racial history –– and current situation –– with that of another violent struggle for equality; Apartheid in South Africa.

Continued --
          첫 딸을 배운 해에 형 때문에 정신병 걸린 썰.txt   
1. 형하고 나 단 둘만 집에 있을 때, 형이 나갔음 난 13살 형이 나가고 난 딸타이밍이다 싶어서 여거너 동인지를 검색하며 탐색을 했음 근대 나간줄 알았던 형이 페이크친거였고 광속으로 내 방문을 열고 고추깐 나를 발견하더니 병신아 니나이땐 딸치는게 아니다, 여거너 동인지나 검색하냐 오타쿠야, 하며 핍박함 2. 집에 혼자있을 때 딸치는건 위험하다 싶어서 샤워딸을 선택함 샤워딸중에 갑자기 형이 문을 존나 쾅쾅 두들김 급똥인줄 알아서 열어줬더니 양치가 급하댔음 나 발기 덜풀렸는데 힐끗보며 관음하더라 3. 그것도 위험하다 싶어서 전자사전에 야짤을 숨김 그게 숨김폴더에 박아두고 일반앨범 마지막 페이지에서 한페이지 넘기면 나오게 하고 미리보기 클립샷으론 나오지 않음 막내 여동생 불러서 3명이서 전자사전 사진보자고 부르더니 사진을 점점 마지막 페이지로 넘김 한페이지만 더 넘기면 12와펑이 물어네 이년아 키리 동인지가 나오게 되는 상황 식은땀 줄줄흐르는데 형이 딱 거기서 멈추더라 씨발새끼가 나 쫄리는걸 보고싶었나 :: 첫 딸을 배운 해에 형 때문에 정신병 걸린 썰.txt
          Borrar párrafo específico de un .txt   

Borrar párrafo específico de un .txt

Respuesta a Borrar párrafo específico de un .txt

El texto del .txt va a cambiar por que existe un método en la clase Administrador que se encarga de cambiar el mismo. Este método escribe en el .txt nuevas citas y no lo hace al final de cada texto si no que cada cita que se adjunta al .txt aparecerá como primer párrafo del mismo, es decir que en cuanto ingresa una nueva cita el primer párrafo que ya estaba guardado pasa a convertirse en el Segundo párrafo, El Segundo en el tercero y así...Si por mi fuera los pondría al final, pero es como me lo...

Publicado el 29 de Junio del 2017 por Cindy

          Borrar párrafo específico de un .txt   

Borrar párrafo específico de un .txt

Respuesta a Borrar párrafo específico de un .txt

Obvio, el texto del .txt no cambia mientras tú no lo cambies. Tras cada reescritura completa, lo vuelves a leer. A no ser que realmente lo que no sepas hacer es leerlo.

Publicado el 29 de Junio del 2017 por Tom

          Borrar párrafo específico de un .txt   

Borrar párrafo específico de un .txt

Respuesta a Borrar párrafo específico de un .txt

Obvio, el punto es que si se tiene que borrar el segundo párrafo o el tercero o el décimo primero, como lo podría especificar si el texto del .txt está en constante cambio.

Publicado el 29 de Junio del 2017 por Cindy

          Borrar párrafo específico de un .txt   

Borrar párrafo específico de un .txt

Respuesta a Borrar párrafo específico de un .txt

Lo escribes de nuevo, pero sin el contenido que quieres eliminar.

Publicado el 29 de Junio del 2017 por Tom

          Ingresar cada párrafo de un .txt en un casillero diferente de un arreglo o de un ArrayList()   

Ingresar cada párrafo de un .txt en un casillero diferente de un arreglo o de un ArrayList()

Respuesta a Ingresar cada párrafo de un .txt en un casillero diferente de un arreglo o de un ArrayList()

Ese es otro gran problema, puesto que el .txt puede ser modificado continuamente, es decir el numero de lineas de mi .txt no es fijo. Si en unas horas se crean nuevas citas medicas mi .txt va a incrementar en numero de lineas.

Publicado el 29 de Junio del 2017 por Cindy

          Borrar párrafo específico de un .txt   

Borrar párrafo específico de un .txt

Hola!
Quisiera crear un método para borrar un párrafo específico de un .txt. Se que primero tengo que leerlo con BufferReader o con FileReader pero como borrar su contenido?
Por ejemplo:
Supongamos que este es mi .txt

________________________________________________________________

Doctor:Jaime Castillo
Especialidad:Neurologia
Fecha:09/05/2017
Hora: 13:30 pm

Doctor: Pablo Armijos
Especialidad:Cardiolog...

Publicado el 29 de Junio del 2017 por Cindy

          LinkMeUp. Выпуск внеплановый. No.Petya   
Куй залiзо поки гаряче! — говорит нам пословица.
Векторы атаки и методы защиты от вероломного вируса, погрузившего в доцифровую эпоху многие организации Украины, России и других стран.

Александр Синистер Дмитренко — автор пентестинговых лабораторий и гость нескольких выпусков linkmeup.

Скачать файл подкаста



          SEO Specialists munkakörbe keresünk munkatársat. | Elvárások: Experience with Google and Bing?s...   
SEO Specialists munkakörbe keresünk munkatársat. | Elvárások: Experience with Google and Bing?s services, including Analytics and Webmaster Tools • Experience with Google?s Keyword Tool • A functional understanding of HTML and CSS • The ability to work with back-end SEO elements such as .htaccess, robots.txt, metadata, site speed optimization, and related skills • Proven success in link building and viral strategies • The ability to deploy an effective local and long-tail search strategy • A deep understanding of mobile strategy and how it relates to SEO • A solid grasp of how blogging, press releases, social media, and related strategies go hand-in-hand with SEO • Experience in building inbound organic search traffic and improving SERPs • A background in creating reports showing web analytics data and site evaluations • An up-to-date, working knowledge of current, past, and projected trends in the SEO industry • Experience with SEM Rush, Ahfers and Screaming products • Familiarity with the best tools in the trade | További elvárások: Supplementary skills: PHP, UX, IA, CRO, SEM, Content Strategy, Social Media Additionally, you will need to be a team player with a positive attitude and strong commercial focus. Equally as importantly will be your demonstrated ability to manage multiple priorities, your flexible approach and excellent communication skills. | További infó és jelentkezés itt: www.profession.hu/allas/1034142
          Review: Santa Cruz Valley Sun   
Nonna Vivi is off to a wonderful start thanks to all the support from our community. Gaston's pizzas are all the rage and you must come try some of our new dishes, as our menu is ever evolving.

The Santa Cruz Valley Sun recently wrote a great review on Nonna Vivi and Gasty, the "Pizza Pro".

Pizza Pro Living His Dream

By Mike Touzeau, Special to the Santa Cruz Valley Sun
Published Wednesday, May 6, 2009 1:19 AM CDT

He still feels the pain of a youngster’s first failure in the business, but that experience is what drives him to this day to be the best he can be for his customers.

After 26 years in the produce industry in this valley where his family has prospered for 130 years, Gaston Bachelier is finally living a dream of owning his own little corner of restaurant magic, opening Nonna Vivi in Rio Rico in March.

That day at the Rio Rico Resort (now Esplendor) stuck with him all these years, a busboy getting a chance at age 15 to fill in for the chef.

A customer literally threw his steak down in front the boy in anger, and it broke his spirit and his heart.

He studied finance at U of A followed by that long career in the produce business, always dreaming of another chance to build and present something he could find satisfaction in watching loyal patrons enjoy.

“My dream was always to have a little place,” he said, though he thought it would be some kind of burger joint.

Realizing that wasn’t what the area needed, and after a lot of research, study, and consultation with specialty pizza experts all over California and Arizona, he went home one day and built his own brick oven.

Mortgaging their home, he and his wife Claudia, who had already set aside a childhood dream to become a dancer herself in order to support her husband, opened a wood fire pizza business in Nogales.
READ THE FULL ARTICLE HERE
          mksh R41 released   

The MirBSD Korn Shell R41 has finally been released. This is a major “everything” version with important fixes as well as new features and behavioural changes. Sorry for the delay.

See also the:


          Re: cemetery records of St. John's Lutheran Church, Concord   
http://files.usgwarchives.net/nc/cabarrus/cemeteries/stjohns...

This is pretty accurate. some stuff is missing but not much.
Good Luck.
Janet Goodman Lane
          Working with Visual Studio Web Development Server and IE6 in XP Mode on Windows 7   

Originally posted on: http://geekswithblogs.net/imilovanovic/archive/2010/04/26/working-with-visual-studio-web-development-server-and-ie6-in.aspx

 

(Brian Reiter from  thoughtful computing has described this setup in this StackOverflow thread. The credit for the idea is entirely his, I have just extended it with some step by step descriptions and added some links and screenhots.)

 

If you are forced  to still support Internet Explorer 6, you can setup following combination on your machine to make the development for it less painful. A common problem when developing on Windows 7 is that you can’t install IE6 on your machine. (Not that you want that anyway). You will probably end up working locally with IE8 and FF, and test your IE6 compatibility on a separate machine. This can get quite annoying, because you will have to maintain two different development environments where you might not have all needed tools available etc. If you have Windows 7, you can help yourself by installing IE6 in a Windows 7 XP Mode, which is basically just a Windows XP running in a virtual machine.

 

[1] Windows XP Mode installation

 

After you have installed and configured the XP mode (remember the security settings like Windows Update and antivirus software)  you should add the shortcut to the IE6 in the virtual machine to the “all users” start menu. This shortcut will be replicated to your windows 7 XP mode start menu, and you will be able to seamlessly start your IE 6 as a normal window on your Windows 7 desktop.

 

[2] Configure IE6 for the Windows 7 installation

 

If you configure your XP – Mode to use Shared Networking (NAT), you can now use IE6 to browse the sites on the internet. (add proxy settings to IE6 if necessary).

 

image

 

 

 

 

 

 

 

 

  

The next problem you will confront now is that you can’t connect to the webdev server which is running on your local machine. This is because web development server is crippled to allow only local connections for security reasons. In order to trick webdev in believing that the requests are coming from local machine itself you can use a light weight proxy like privoxy on your host (windows 7) machine and configure the IE6 running in the virtual host.

 
The first step is to make the host machine (running windows 7) reachable from the virtual machine (running XP). In order to do that install the loopback adapter and configure it to use an IP which is routable from the virtual machine. 
 

[3] How to install loopback adapter in Windows 7

 

After installation, assign a static IP which is routable from the virtual machine (in example 192.168.1.66)

image

 

 

 

 

 

 

 

 

The next step is to configure privoxy to listen on that IP address (using some not used port) .Change following line in config.txt:

 

#
#      Suppose you are running Privoxy on an IPv6-capable machine and
#      you want it to listen on the IPv6 address of the loopback device:
#
#        listen-address [::1]:8118
#
#
listen-address  192.168.1.66:8118

 

The last step is to configure the IE6 to use Privoxy which is running on your Windows 7 host machine as proxy for all addresses (including localhost)

 

image

 

 

 

 

 

 

 

 

 

 

 

 

And now you can use your Windows7 XP Mode IE6 to connect to your Visual Studio’s webdev web server.

 

image

 

 

 

 

 

 

 

 

 

[4] http://stackoverflow.com/questions/683151/connect-remotely-to-webdev-webserver-exe


          Hibernate Validator 6.0.0.CR1 发布   

Hibernate Validator 6.0.0.CR1 发布了。

Bug 修复

    * HV-1403 - engine - Container class and type argument index information not present in case of implicit unwrapping

    * HV-1381 - engine - Unwrapping should work if there is only one VE compatible with the type even if there are 2 type arguments

    * HV-1377 - annotation-processor - StackOverflowError during compilation with annotation-processor enabled

    * HV-1358 - engine - Class loading issue in modularized environment for value extractors loader by the service loader

    * HV-1347 - documentation - Broken link in documentation: "Anatomy of Credit Card Numbers"

提升

    * HV-1402 - engine - Rename internal.engine.cascading package to internal.engine.valueextraction

    * HV-1393 - documentation - Update schema coordinates in the documentation to use BV 2.0 schemas

    * HV-1392 - annotation-processor - Annotation Processor should check that constraint payload does not contains both Unwrap and Skip at the same time

    * HV-1378 - engine - Having both Unwrap and Skip in the payload should throw a ConstraintDeclarationException and not a ConstraintDefinitionException

    * HV-1375 - engine - English javax.validation.constraints.NotNull.message not in line with the spec

    * HV-1360 - tests - Various infelicities in container element constraints XML tests

    * HV-1337 - tests - Test framework adjustments to improve consistency with the TCK

完整内容点此查看。

下载地址:


          White House "tapes": Here's the news you won't hear anywhere else   


This post will take you on a journey through the kind of history not taught in school. But before we get to the weird and wild stuff, we must note yesterday's big news: Donald Trump now denies that he recorded former FBI Director James Comey:
With all of the recently reported electronic surveillance, intercepts, unmasking and illegal leaking of information, I have no idea......whether there are "tapes" or recordings of my conversations with James Comey, but I did not make, and do not have, any such recordings.
Rachel Maddow devoted a large part of her show to Trump's admission, in court, that he has lied about recording conversations with one of his biographers. (That is, Trump at first bragged about making recordings and then later claimed that those those boasts were false.) She obviously doubts the reality of those alleged recordings. Call me a natural-born contrarian, but I think she's wrong. I also disagree with Lawrence O'Donnell, who offers his own views in the video embedded above.

Why do I tend to believe in the existence of the Comey "tapes"? First: We know that Trump has made such recordings in the past. Second: We have a clear photograph of a digital voice recorder on Trump's desk in the Oval Office. Let's have no jokes about Trump's maladroit way with technology: I happen to own an Olympus digital voice recorder myself, and I assure you that a small child can operate it. If the internal mic is on the correct setting, the device can capture a conversation on the other side of the room.

So why has Trump backtracked from his impulsively-made "tape" claims, both in that long-ago court case and in the recent Comey situation? Simple: He realized belatedly that making the recordings public would do him much more harm than good. If he admitted that he taped Comey, Mueller would demand to hear that recording and other recordings as well. That situation could get really sticky really fast.

What was the purpose of Trump's theatrical delay before denying the existence of "tapes"? I don't know. His strange behavior seems indicative of -- well, of something, though I'm not sure what that "something" might be.

The wording of his tweeted statement becomes more ominous on second read: "With all of the recently reported electronic surveillance, intercepts, unmasking and illegal leaking of information..." Obviously, he's hewing to an agreed-upon propaganda line designed to paint Obama and Susan Rice as sinister agents of the Deep State, but his text also conveys the hint of a threat. Perhaps he intended to convey this message: "Recordings may indeed exist. But if and when they come out, I won't let you saddle me with the legal consequences."

The Nixon factor. In recent weeks, we've seen innumerable rehashes of the Watergate tapes. Nobody on teevee ever gets the story right, because only people with a superficial view of history are ever allowed on camera.

Here's an all-important detail you probably don't know: There were multiple parties recording Nixon's White House.

Why didn't Nixon burn the tapes in his possession? Because he knew that he didn't have the only copies. Strong evidence suggests that another set of recordings were held by CIA counterintelligence chief James Angleton.

Before we get much further with our story, it is important to understand that Angleton had become a Nixon opponent from the right. Nixon pursued a policy of detente, which Angleton detested. Moreover, the legendarily paranoid CIA molehunter considered Kissinger a Soviet agent -- an absurd idea which Angleton couldn't give up.

(Long-time readers may accuse me of having an Angleton obsession. True enough. But hear me out: In this case, much of the evidence is compelling.)

In 1975, New York Times foreign affairs correspondent Tad Szulc -- one of the most-respected journalists in American history -- published a lengthy article in Penthouse on electronic eavesdropping in Washington. (Back then, both Penthouse and Playboy paid big bucks for "quality" articles by big-name writers.) His work was summarized by the Washington Post and republished in the report of a congressional committee (here). After that, the whole thing went down the memory hole. If you bring up now what Szulc said then, you'll be dismissed as one of those awful, awful conspiracy theorists -- even though nobody felt that way back in 1975.

Here is the relevant section of Szulc's piece:
One extraordinary example is the tiny laser-beam transmitter embedded in the wall of the Oval Office at the White House. This transmitter picked up and relayed to a remote recording center every conversation between Richard M. Nixon and his aides, friends, and visitors during at least several months in 1970, the year the former president launched his secret domestic intelligence program. Presidential telephone conversations, including those conducted over "secure" scrambler lines, were also picked up by the laser transmitter.

The existence in the presidential office of this highly sophisticated device, known by the code name "Easy Chair," remains one of the most sensitive, closely guarded, and intriguing secrets of the Nixon period. This knowledge is restricted to about a dozen key past and present officials of the Intelligence Community. But the precise purpose of the operation, the exact identity of those who ordered the installation of the laser device under a coat of fresh paint on the Oval Office wall, and the ultimate disposition of the instrument remain unclear. Nor do we know if tapes were made of these transmissions — which is perhaps, the most crucial question.

It is also not known if Nixon himself was aware of and consented to the installation. If he did, the laser system complemented his hidden recording devices that produced the famous White House tapes. (In any event, the laser device picked up with infinitely more clarity every word uttered in the Oval Office, eliminating the "unintelligible" gaps that affected the tapes. In addition, the laser system permits, unlike a tape recorder, the identification of every individual voice in a room and the separation of several simultaneous conversations.) It is not known where the laser beam signal was received, but technical experts believe that such a device has a transmission range of under a half mile along a clear line of sight. The laser beam must be aimed out a window — it would be deflected by a wall. In the case of the Oval Office it had to go through the panes of the French doors leading to the Rose Garden.

Highly reliable sources told Penthouse that one or more senior officials of the Secret Service and the Central Intelligence Agency are familiar with the "Easy Chair'- situation in the White House, although they could not say whether they learned of it only when the laser device was discovered and removed early in August 1970, or whether they knew at some earlier date. The sources would not rule out that the late J. Edgar Hoover, then director of the Federal Bureau of Investigation, was also privy to "Easy Chair.'

In any event, this super-bugging of the presidential office looms as one of the most bizarre episodes in the still unfolding story of domestic spying carried out by six successive administrations, but climaxing most spectacularly during Nixon's tenure.

Penthouse learned of this bugging of the Oval Office as a result of a lengthy investigation. According to highly authoritative sources, the person who installed the laser transmitter, possibly on a second attempt when an original device did not function properly, is a foreign-born individual employed as a painter by the government and apparently controlled by one of the intelligence agencies. His name as well as a number of other relevant details are withheld from publication to avoid causing suffering and embarrassment to persons innocently involved in this operation.
When Michael Beschloss appears on MSNBC to deliver the "lite" version of Watergate, he doesn't tell you about that material.

The idea of a "laser microphone" may seem like something out of Marvel comics, but as this Wikipedia article notes, the basic concept goes back to the 1940s, well before the invention of lasers. You can find various references to Easy Chair on the web, if you know where to look -- for example, here. (That link goes to cryptomuseum.com. It's a rah-rah pro-spook site, so don't go there expecting to see any references to bugs in the White House.)

The FBI factor. Szulc's 1975 article hints at an even larger story. Take another look at this passage: "The sources would not rule out that the late J. Edgar Hoover, then director of the Federal Bureau of Investigation, was also privy to "Easy Chair.'"

Question: Why did Szulc bring up Hoover? That bit of name-dropping comes out of the blue. Another question: Given the strained relations between CIA and the FBI, just how did Hoover learn about Easy Chair?

The Hoover claim must be considered in conjunction with another passage: "...technical experts believe that such a device has a transmission range of under a half mile along a clear line of sight." These words bring up an obvious quandary: Where would the eavesdroppers place the receiver? 

I think that Szulc offered a big clue when he brought up J. Edgar Hoover. No, I'm not talking about the FBI Building, which did not open until 1975. (Besides, it stands outside the half-mile radius.) Curt Gentry's invaluable biography J. Edgar Hoover: The Man and the Secrets (page 633) suggests a much better location:
The FBI had a number of secret listening posts in Washington and its environs, including a large facility at the FBI Academy at Quantico, Virginia -- it was from here that the wires of the Central Intelligence Agency, at nearby Langley, were supposedly tapped -- but the heart of its electronic surveillance operations was the Old Post Office Building, which was located in the Federal Triangle, close to the FBI headquarters in the Justice Department Building but far enough away that an attorney general wouldn't accidentally walk in.

Since the Post Office had moved into its new building in 1934, the Bureau had gradually taken over most of the old building. Here, behind locked doors, with the tightest possible security, scores of monitors sat in front of small consoles, earphones on their heads, listening to, and recording, thousands of conversations.
The Old Post Office Building was the obvious choice for the "Easy Chair" surveillance operation. The building code in D.C. enforces a strict height restriction, but the tower of the the Old Post Office Building predates that law. Except for the Washington Monument, no other place in the city offers a higher vantage point. The tower offers superb line-of-sight access to all sort of interesting places.

Although a tree now blocks the way, in Nixon's time, the Old Post Office Building tower offered a direct view of the windows of the Oval Office. Moreover, the Old Post Office Building is just within our 1/2 mile radius.

The photo published above and to the right was taken from the tower; the White House is in the upper center, behind the Treasury Building (the grey building with columns in front). The "Marine One" photo below, taken in 1970, proves that the foliage was once much less dense.

The Trump factor. Of course, the Old Post Office Building is now owned by none other than Donald Trump. I've never read anything to suggest that the Hoover-era surveillance equipment was completely removed from that building.

You may recall that Trump has said that he expects to be under surveillance in foreign hotels. Perhaps he knows about such things because he has allowed surveillance to take place within his hotels.

As we've seen in several previous posts, some very shady characters have had offices and living quarters in Trump Tower. These characters were so very shady that the FBI had them under surveillance. Could the Bureau have bugged those locations without help from the owner of the building? Possibly -- but you must admit that the operation would have been a lot easier with Trump's acquiesence.

We've also heard the suggestion that Trump himself may have functioned as an FBI asset:
As all readers of Wayne Barret and David Cay Johnston know, Donald Trump has gotten away with all sorts of legally dubious crap over the years. It makes sense that Donnie would protect his interests by making various deals with the feds.

You may have noticed that Trump Tower has a history of renting to high-level crooks, and that the feds always found it easy to "tapp" those particular suites. (Apparently, there has been a lot of bugging in that building.) One example would be Felix Sater, a former Trump Tower tenant who himself functioned as an FBI informant.
At one time, there were plans to transform the Old Post Office Building into a Women's Museum. Is it outlandish to suggest that the intelligence community, for reasons of its own, has always wanted to see that building function as a Trump hotel?

The Angleton Factor. J. Edgar Hoover's motive for spying on the White House should be obvious. As most people know, he maintained power by obtaining blackmail material -- what we now call "kompromat" -- on everyone in town, including the various residents of 1600 Pennsylvania Avenue.

So why would I bring James Angleton of the CIA into this story?

He, too, was renown for conducting surveillance on everyone in town. Moreover, he would discuss each night's eavesdropping haul with DCI Allen Dulles. From Michael Holzman's Angleton bio, quoting Tom Braden:
"Angleton would come into Allen's office first thing in the morning and report what his bugs had picked up the night before. He used to delight Allen with stories of what happened at people's dinner parties...Jim used to come unto Allen's office and Allen would say, 'How's the fishing?' And Jim would say, 'Well, I got a few nibbles last night.' It was all done in the guise of fishing talk."
Some have wondered how Angleton acquired the ability to eavesdrop on so many people. The answer is simple: His staff did not do the actual surveillance work. J. Edgar Hoover allowed Angleton to have access to the electronic intelligence that kept streaming into the Old Post Office Building.

Why was the notoriously territorial John Edgar Hoover willing to share this remarkable haul with Jim Angleton, a man he had little reason to like? Because Angleton possessed "kompromat" on the FBI Director, in the form of photographs of homosexual activity involving Hoover and Clyde Tolson.

The photos themselves have never been published. Their existence was first revealed to the public in 1993, by British author Anthony Summers, whose main source was an infamous electronics expert named Gordon Novel. Circa 1990, I played a small role in publicizing Novel's claim about the Hoover/Tolson photo, which he originally made in a private phone conversation with a pilot linked to the intelligence community. The pilot taped the call; I somehow got hold of a transcript and passed it along to -- well, to all sorts of people. (Kinkos was my second home back in those pre-internet days, and my Rolodex had some interesting names and addresses.) Eventually, the document reached a Summers associate, with whom I later spoke. Fortunately, the British journalist was able to find a secondary source for the story; he even got Novel to repeat the claim on camera for a Frontline documentary, which is probably online.

(Somewhere along the way, I was threatened by Novel, which quite disturbed me at the time. I later learned that such threats were simply his way of saying "Hi.")

All of which brings us back to the tapes of the Nixon White House. 

At CIA, Novel dealt pretty much exclusively with Angleton. That fact explains why Charles Colson sounded out Novel concerning a rather bizarre scheme to erase the Watergate tapes using a "degaussing gun." This tentative plan was first described by columnist Jack Anderson in August of 1974. (Many years later, during an impromptu radio interview, Novel later said that the only reason he didn't do it was "They didn't pay me.")

Unfortunately, Anderson's rather garbled piece focuses on an alleged plan to degauss tapes stored in the White House basement. The story makes only the briefest of references to copies of the same White House conversations at CIA headquarters.

Almost no-one who read that article in 1974 understood the implications. Before the Watergate prosecutor knew of the existence of those tapes, before the public learned about the tapes, the White House understood that the CIA had copies of everything.

That single fact -- which (as we will see) Colson confirmed -- changes our entire view of Watergate.

The CIA had their own recordings of Nixon's conversations within the White House. You won't hear those words from Rachel Maddow or from any other MSNBC or CNN newsfolk offering Watergate retrospectives. Was the Colson/Novel "degaussing" plan practical or serious? I don't know and I don't care. Any such discussion diverts us from the history-changing words that have been hiding in plain sight since 1974: The CIA had their own recordings of Nixon's conversations within the White House.

Now you know the real reason why Nixon could not simply "burn the tapes." He knew that his tapes were not the sole tapes.

If Tad Szulc's 1975 story is accurate -- and I believe it is -- then the CIA recorded the Nixon White House using "Easy Chair" technology. Moreover, we have three excellent reasons to believe that these recordings fell into James Angelton's possession.

1. As noted above, there is good reason to believe that Angleton had access to the "take" from the Hoover's surveillance operation in the Old Post Office Building.

2. If you study Szulc's career, you'll see that he often used Angleton as a source. Szulc admitted as much in secret testimony delivered to the Church Committee. (See page 166 of Holzman's book.) I strongly believe that Angleton was Szulc's source for the 1975 article which revealed the existence of the CIA's "Easy Chair" project.

3. Gordon Novel made clear on more than one occasion that -- when it came to the CIA -- he dealt almost exclusively with Angleton. To erase tapes in Angleton's possession, Colson needed someone who could gain access to Angleton's office on the second floor of CIA headquarters. That "someone" would have been Novel.

The CIA factor. Suppose I'm wrong in my view that "Easy Chair" technology targeted Nixon. The conventional view holds that the White House taping system was installed by a tech guy named Alexander Butterfield, who later blabbed about the whole thing to the Watergate investigators.

Guess what? We still have a strong CIA connection.

Jim Hougan's invaluable Secret Agenda devotes part of its fourth chapter to the claims that the CIA had infiltrated the White House. Most people don't know that James McCord -- formerly a CIA man, later a Watergate burglar -- was brought on board by Alfred Wong, the technical director for the Secret Service.
As H. R. Haldeman has written: "Were there CIA 'plants' in the White House? On July 10, 1975, Chairman Lucien Nedzi of the House of Representatives Intelligence Committee released an Inspector-General's Report in which the CIA admitted there was a 'practice of detailing CIA employees to the White House and various government agencies.' The IG Report revealed there were CIA agents in 'intimate components of the Office of the President.' Domestic CIA plants are bad enough, but in 'intimate components' of the Office of the President'?" Haldeman then goes on to speculate about the identities of the CIA men in the White House. His main suspect is Alexander Butterfield, the former Air Force officer whose White House responsibilities included overall supervision of the presidential taping system. That system consisted of some two dozen room microphones and telephone taps that Wong's Secret Service detachment had installed in the White House and at Camp David; voice-activated by the Presidential Locator System or manually by Butterfield, the microphones and taps fed into a set of concealed Sony tape recorders. Haldeman's suspicions about Butterfield -- who denies that he was a CIA asset -- were shared by Rose Mary Woods, President Nixon's personal secretary. Together they criticize Butterfield for voluntarily revealing the existence of the taping system; they point with suspicion to Butterfield's early service as a military aide to GOP nemesis Joseph Califano, and make much of the fact that the circumstances of Butterfield's White House appointment are disputed.

Haldeman and Woods are not alone in their suspicions of Butterfield, or in their concern over the Inspector General's report. If Bill McMahon is correct, McCord's seconding of CIA personnel in undercover assignments at the White House amounted to the calculated infiltration of a uniquely sensitive Secret Service unit: the staff responsible for maintaining and servicing the presidential taping system, and for storing its product. Moreover, unless both Haldeman and McMahon are mistaken-about Butterfield's secret allegiance and McCord's loan of personnel to Wong-then the CIA would seem to have had unrivaled access to the President's private conversations and thoughts. Charles Colson, among others, believes that this is precisely what occurred. "The CIA had tapes of every­ thing relating to the White House," Colson told me. "And they destroyed them two days after [Senator Mike] Mansfield asked them to save all of their tapes."
This passage from Hougan does not necessarily conflict with the Szulc piece. Szulc describes a system to eavesdrop on the Oval Office -- but unlike all other presidents, Nixon didn't like to spend time there. If Agency personnel wanted to know that was going on in that administration, they would have to bug more than one room.

If the intelligence community knew Nixon's secrets in 1972, they must surely know Trump's secrets now.

Keep all of this history in mind whenever a Spookworld fanboy -- or fangirl (I'm looking at you, Louise) -- paints a naive, comforting picture of "heroic intelligence officers versus the Trump/Putin conspiracy." The situation was hardly simple in Nixon's day. The situation cannot possibly be so simple now.

Is the "deep state" is out to get Donald Trump? Not in my book. I think that a faction of the intelligence community is protecting him.


          HDFS: Cluster to cluster copy with distcp   
Este es el formato del comando distcp para copiar de hdfs a hdfs considerando cluster origen y destino en Amazon AWS: hadoop distcp "hdfs://ec2-54-86-202-252.compute-1.amazonaws.comec2-2:9000/tmp/test.txt" "hdfs://ec2-54-86-229-249.compute-1.amazonaws.comec2-2:9000/tmp/test1.txt" Mas informacion sobre distcp: http://www.cloudera.com/content/cloudera-content/cloudera-docs/CDH4/latest/CDH4-Installation-Guide/cdh4ig_topic_7_2.html http://hadoop.apache.org/docs/r1.2.1/distcp2.html  
          Otwierają mi się nowe okna   

@Tcheinava pisze:

Pisałem tu o tym problemie jakiś czas temu - niczego nie znaleziono, a problem jest dalej (zależy od dnia, czasami jest czasami nie). Gdy klikam określone klawisze na klawiaturze - pojawiają mi się nowe okna Firefoxa (gdy nie mam otwartej przeglądarki) lub strona odświeża mi się na stronę startową. Nie mogę napisać np. dłuższej wypowiedzi, bo strona zdązy mi się w tym czasie "odświeżyć" i przełączyć na startową parę razy. Co to może być? Co robić? :confused:
Addition.txt (22,7 KB)
FRST.txt (44,1 KB)
Shortcut.txt (40,5 KB)

Wpisy: 1

Uczestnicy: 1

Przeczytaj cały temat


          Autor: Małgorzata Z   
Ojciec Święty daje świadectwo, w jaki sposób udzielać Komunii Świętej i ją przyjmować Nie bójmy się klękać Benedykt XVI w czasie uroczystych Mszy św. sprawowanych czy to w Watykanie, czy przy okazji pielgrzymek, udziela Komunii Świętej wiernym pozostającym w postawie klęczącej bezpośrednio do ust. W ocenie liturgistów, to powrót do tradycji Kościoła i próba zwrócenia uwagi wiernych na realną obecność Chrystusa w Eucharystii, a zarazem pogłębianie tego misterium. Taka zdecydowana postawa Ojca Świętego jest niezwykle wymowna w kontekście sporów dotyczących formy przyjmowania Komunii Świętej. http://www.naszdziennik.pl/index.php?dat=20100116&typ=wi&id=wi11.txt
          Samurai Shodown   
http://img35.imageshack.us/img35/6401/samuraishodown12.jpgIPPON - SHOBU!






Japan based hardware and software firm SNK released their trademark effort Samurai Shodown in 1993. A true classic and timeless gem to shine both as prime originator of weapon based 2D deconstruction and proprietor of an exquisitely strong and authentic atmosphere, the game takes us to an 17th century Japan to spill some precious rivers of pixelblood via fast paced, quality punishment which remains extremely easy to timelessly appreciate.

Enjoy and Read on!




Samurai Shodown introduces quite a few neat touches to the VS Type Fighter genre, clever, cunning traits that have significant impacts on the gameplay experience. The piece's flow is quite eventful and intense, it is extremely easy to get into a near-death situation once you risked a reckless attack, exposing yourself and eating in a tremendous counterstrike. Attack forms are laid out in a quite intuitive manner by which you have a Weak Punch and a Weak Kick, supported by the Strong Punch and the Strong Kick. Tapping these buttons simultaneously throughout all the combinations you can conceive will yield you the different attack forms your chosen character is able to perform, yet it's certainly worth noting that some of the moves are distance-dependents, meaning the same button combination might yield a different maneuver based on the enemy's distance to you. Special moves are also accessible though the general gameplay is not as much reliant on the utilization of those as the Mortal Kombat games, for example.

The flow relies more massively on the quick selection-and execution of the proper defense/attack against an unleashed maneuver or opposing block attempt. Block happens by pulling your character away from the opponent, while you can execute quick dodge movements by double-tapping the away direction, or you can even charge up to your victim by double-tapping the direction the enemy is facing. This method lets you unleash rampant attacks and usually results in blatant holes in your defense, something your rival might benefit from considerably.

Image Hosted by ImageShack.us

A nice thing about Samurai Shodown is its superlow tolerance level for irresponsible hothead gameplay: once you fail with an ambitious attack you can be almost 100% sure that ruthless punishment is imminent, thus the game usually boils down to a heavily concentrated, focused experiencefoam in which you are to choose all, absolutely all your actions very soberly and carefully.

This special flow and flavor of the gameplay delivers immersive moments and makes comfy place for memorable flashes of lightning fast action, oftentimes characterized by highly significant feeling-out periods to support the effort with a colorful rhythmic structure. By these tense moments you try to guess what the opposition will attempt to do, thus correct prediction and knowledge of what, how and when to reply for an attack and when you should attempt to deliver punishment yourself are elements and aspects of primal importance.

Interestingly enough, Samurai Shodown knows and interprets the concept of rage or, as we hinted at, even recklessness: while your safety gameplay at the end of a lifeline will probably lead to a defeat, the AI sometimes exhibits a funny personality trait, growing so rampant to finish you off that it offers huge holes in its defense temporarily, tiny moments you can forge staggering strikes of stopping power by if you are willing to risk them.

The respective Strong Attacks you can invoke by tapping the button combinations result in excessive damage, but funnily enough: the more a character gets hurt, the more she/he gets enraged, scoring more and more when connecting finally with an attack. This state is represented by the POW meter in the corners. Connecting with your POW meter at maximum delivers good old fatal damage.

Each character has a couple of cool looking throws that are heavily dependent on the exact situation the fighters are relating to each other by the moment these moves get utilized, while there are cool little additional options accessible both to disarm your opponent or even to break the enemy's weapon. Some funny, intense minigame is included as well in which you have to tap the button repeatedly to disarm the opponent after weapons do collide.

Samurai Shodown introduces a whole array of superb characters that are quite easy to like, while differences between them are extremely well tuned both regarding their fighting styles and the artistic originality they possess.

Image Hosted by ImageShack.us

If you enjoyed this here article, check out my comic: Planetseed
If you are to circulate magnificently pleasant vibrations: Buy me Beer

related recommendation:
Samurai Shodown Guide
          Commenti su [Scena PS3] Rilasciato webMAN Mod v1.47.05 di Francesco Lanzillotta   
strano, il boot_plugins.txt una volta caricato via ftp dovrebbe rimanere memorizzato sull'HDD della console
          Commenti su [Scena PS3] Rilasciato webMAN Mod v1.47.05 di Metro City   
Grazie, ho scoperto perchè webman funziona alla cdc :D non so il motivo ma quando riavvio la ps3 noto che non funziona o se clicco sui folder sono bloccati, se vado sul setup mi esce la schermata bianca... doper averlo installato di nuovo e rifunziona ai successivi riavvia lo stesso problema, alla fine ho notato in ftp che al riavvia manca in dev_hdd0 il files "boot_plugins.txt" molto il ferrox cobra 4.81 ora e con gli altri cf non mi era mai successo... possibile che me lo cancelli?
          Starpoint Gemini Warlords Update v1.110 0-CODEX   
Read changelog.txt for information on updated content! Genre: Action, RPG, Simulation, Strategy Developer: Little Green Men Games Publisher: Iceberg Interactive Release Name: Starpoint.Gemini.Warlords.Update.v1.110.0-CODEX Size: 44 MB Links: STEAM | NFO | Torrent Search Download: UPLOADGiG – NiTROFLARE – RAPiDGATOR

          AbiWord Portable - Ứng dụng nhỏ dùng soạn thảo và chỉnh sửa văn bản   
08:41:00, 17/07/2007
Nguyễn Cao

AbiWord Portable là một ứng dụng văn phòng dùng để soạn thảo và chỉnh sửa các văn bản, rất nhỏ gọn. AbiWord Portable rất thích hợp để bạn cài đặt và sử dụng trực tiếp trên USB khi máy tính bạn sử dụng không có sẵn bộ công cụ Microsoft Office.

Chương trình AbiWord Portable có dung lượng file cài đặt (AbiWord_Portable_2.4.6.paf.exe) là 6.3 MB. Sau khi cài đặt thành công, AbiWord Portable sẽ có dung lượng gần 17 MB.

Với dung lượng khiêm tốn như vậy, có lẽ bất kỳ USB hay thẻ nhớ nào mà bạn dùng cũng có thể cài đặt sẵn chương trình AbiWord Portable này.

AbiWord Portable hỗ trợ các định dạng file như: *.abw, *.atw (định dạng file của AbiWord Portable), *.doc. *.dot, *.rtf, *.txt, *.text, *.html, *.htm, *.xhtml, *.odt…

Chương trình AbiWord Portable có giao diện đơn giản, thân diện và dễ sử dụng với mọi người. Sau khi cài đặt xong AbiWord Portable, bạn sẽ có một thư mục mang tên AbiWordPortable.

Khi nào muốn sử dụng chương trình AbiWord Portable thì bạn chỉ cần bấm vào file “AbiWordPortable.exe” trong thư mục “AbiWordPortable”.

AbiWord Portable có thể cài đặt và sử dụng trên các hệ điều hành Windows 98/ Me/ 2000/ XP/ Vista.

Bạn tải AbiWord Portable về dùng miễn phí từ trang web sau đây:

http://prdownloads.sourceforge.net/portableabiword/AbiWord_Portable_2.4.6.paf.exe

Nguyễn Cao

          Still trying to get JTAG working with the ESP8266   

Good news -- my replacement J-Link is in the mail! Reliable hardware on the way.

In the meantime, I'm still working on my CMSIS-DAP adapter and my ESP8266 board. I'd mis-soldered a 10uF capacitor between TCK and ground (instead of 3V3 and ground), which was stopping anything from working, but after hooking my Saleae box up to the board, I debugged that fairly quickly. I fixed some bugs in the code, but OpenOCD still failed to do the initial chain scan, so something's still broken.

To debug this, I changed tack: OpenOCD also has a "remote_bitbang" driver, where it sends a series of ASCII characters to a TCP socket, to drive a very very simple JTAG adapter. This sounds like a recipe for the worst JTAG performance ever, except that the Teensy 3.2's serial-over-USB performance is very very good, and I saw some pulses as short as 2us in the logic capture, so this should be able to get me ~250 kbit/s, which is certainly good enough for now.

Here's the teensy-openocd-remote-bitbang code, on GitHub

It took a bit of messing around with socat on OS X to get it to bridge between a TCP socket and a serial port, but I found the magic set of arguments eventually:

socat -d -d -d file:/dev/tty.usbmodem1485121,clocal=1,cs8,nonblock=1,ixoff=0,ixon=0,ispeed=9600,ospeed=9600,raw,echo=0,crtscts=0 tcp-listen:3335,reuseaddr

The corresponding OpenOCD incantation is:

openocd -d -c "reset_config srst_only; interface remote_bitbang; remote_bitbang_port 3335; remote_bitbang_host localhost" -f target/esp8266.cfg

Unfortunately OpenOCD *still* couldn't scan the JTAG chain, and it did get bits out TDO this time, so that hardware is not completely broken, but I still have some debugging to do.

Update: I suspect TDO is in high-impedance mode -- it looks like it's floating around 1.5V. Perhaps the ESP8266 doesn't enable its JTAG pins while in reset? Either that or maybe I need to program the chip with code that enables the JTAG pins.

Update 2: Got it working! It turns out that my understanding of remote_bitbang's reset signals was the wrong way around -- RESET is active-low electrically, but the remote_bitbang protocol spec assumes active high. So "reset=0" means 3v3 on the reset pin, and vice versa. The ESP8266 JTAG pins are high-impedance in reset, which is why I saw TDO floating. This doesn't explain why my CMSIS-DAP code didn't work, but at least now I have a known-good state to compare with.

Comment


          ﭼﻪ ﮐﺴﯽ ﻣﯿﮕﻮﯾﺪ ﺍﯾﻨﺠﺎ ﻣﺠﺎﺯﯾﺴﺖ…   

ﭼﻪ ﮐﺴﯽ ﻣﯿﮕﻮﯾﺪ ﺍﯾﻨﺠﺎ ﻣﺠﺎﺯﯾﺴﺖ؟!ما ﻫﻤﻪ ﭼﯿﺰ ﺭﺍ ﺣـــــــﺲ ﻣﯿﮑﻨﯿﻢ …!مهرباني و ﺯﯾﺒﺎﯾﯽ ﮐﺴﯽ ﺭﺍ ﺍﺯ ﻋﮑﺲ ﭘﺮﻭﻓﺎﯾﻠﺶ …ﺍﺣﺴﺎﺱ ﻏﻤﺶ ﺭﺍ ﺍﺯ ﭘﺴﺖ ﻫﺎﯾﺶ …شادي و ﺧﻨﺪﻩ اش ﺭﺍ ﺍﺯ ﺭﻭﯼ ﺟﻮﮎ ﻫﺎﯾﺶ …ﺗﻮﺟﻪ ﺍﺵ ﺭﺍ ﺑﺎ ﻻﯾﮏ ﮐﺮﺩﻥ ﻫﺎﯾﺶ …حضورش ﺭﺍ ﺍﺯ ﺭﻭﯼ علامت آنلاينش …ﻟﺠﺒﺎﺯي و دلخوري اش ﺍﺯ ﺭﻭﯼ ﺑﻼﮎ ﻫﺎيش…نگوييد ﻣﺠﺎﺯﯼ…!!ما […]

نوشته ﭼﻪ ﮐﺴﯽ ﻣﯿﮕﻮﯾﺪ ﺍﯾﻨﺠﺎ ﻣﺠﺎﺯﯾﺴﺖ… اولین بار در سئو تبریز پدیدار شد.


          ANDROMAXI SCRIPT & CWM Based Recovery   
====================================
ANDROMAXI SCRIPT & CWM Based Recovery
by : Tablin Arya Juanda
====================================

DISLAIMER : Saya tidak bertanggung jawab apabila terjadi hal hal yang tidak diinginkan, saya telah mempraktekkan pada device saya dan dapat berfungsi sebagai mana fungsinya.

====================================
-----------Andromaxi HS-EG909 Script---------------
----------------latest version : v 1.1------------------
====================================
Jalankan proses di windows, script saat ini support windows operating system

Menu/Feature :
---Run In Fastboot ---
1.Install cwm based recovery
2.Install touch recovery
3.restore stock recovery
4.Reboot

---Run In ADB ---
5.root via ADB (for Anvance user only)
6.Unroot via ADB (not recomended)
7.Init.d Support
8.Reboot
9.Reboot Recovery
0.Reboot Bootloader (fastboot)


More feature come... 
Please downnload cwm-recovery.img , touch-recovery.img and stock-recovery.img
and place it inside the data folder so file will be
Andromaxi/
Andromaxi/Andromaxi.bat
Andromaxi/Notes.txt
Andromaxi/data/* (adb, fastboot etc)
Andromaxi/data/cwm-recovery.img
Andromaxi/data/touch-recovery.img
Andromaxi/data/stock-recovery.img
To run the script just double click Andromaxi.bat and follow the scripts..

Extra :
- bootanimation.zip from CM10 (480x800 boot animation) install in /system/media/
- CWM-SuperSU-v0.99.zip (SuperSU App and su binary, busybox not included) install via cwm recovery

Untuk Menu 1 - 4 dilakukan di Fastboot
Untuk Menu 5 - 0 dilakukan di ADB (lihat notes dibawah)
Gmana cara install adb ato fastbootnya cari info sendiri

Silahkan download file Andromaxi.zip kemudian extrak didalamnya sudah ada file pendukung untuk adb dan fastboot (bukan driver)
Untuk file cwm-recover.img, cwm touch-recovery.img dan stock-recovery.img sengaja saya pisah karena kemungkinan kedepannya akan saya update, silahkan download dan dimasukkan ke folder data.
Anda juga dapat mencoba versi cwm lain dan rename menjadi cwm-recovery.img

Misalnya: download 6.0.1.9-cwm-recovery.img (versi 6.0.1.9) dan di rename menjadi cwm-recovery.img kemudian masukkan ke folder data

Download : https://www.dropbox.com/sh/dptph0ldj5cegvu/LvgTq-6iPH

untuk menjalankan script cukup menjalankan file Andromaxi.bat dan memilih menu yang diinginkan..

Untuk instalasi Driver ADB dan fastboot cara paling mudah adalah dengan mengkoneksikan device dengan pc mada mode data connection kemudian install aplikasi bawaan smartfren..

Tambahan buat Aktifin ADB conection karena banyak yang tanya:
  • koneksikan Andromaxi ke komputer dengan kabel usb
  • pilih : data connections
  • Akan muncul cd rom di komputer untuk instalasi modem, install jika belum terinstall
  • setelah selesai eject cd (hal ini akan mengaftifkan adb connections (Debuging)
  • eject cd ini diperlukan setiap ingin menjalankan adb.exe
  • atau dapat pula dengan menginstall android sdk
  • pastikan adb dapat terkoneksi dengan baik
  • Pastikan vendor id  ; 0x109b ada di C:\Users\Nama User Anda\.android\adb_usb.ini
  • Jika belum ada folder .android di C:\Users\Nama User Anda\ copy folder .android dalam folder Andromaxi ke C:\Users\Nama User Anda\

Last : sekali lagi mengingatkan : DO IT ON YOUR OWN RISK

===========================================================
CWM Based Recovery
===========================================================

Source : https://github.com/CyanogenMod/android_bootable_recovery
Latest version : 6.0.2.3

Work :
  • Backup
  • Restore
  • Install zip (sdcard, internal sd, via adb)
  • wipe dalvic cache
  • wipe cache
  • wipe data
  • fix permission
  • Partition SD card (untuk buat partisi ke 2 (/sd-ext) n swap partition

Bug :
  • Kadang reboot dan reboot recovery cukup lama (jangan kaget, kalo emang gak reboot reboot cabut batere)

Download : https://www.dropbox.com/sh/dptph0ldj5cegvu/LvgTq-6iPH

Jika menggunakan Andrmaxi Script diatas, script mengenali lokasi image
1.Install cwm based recovery >>> /data/cwm-recovery.img
2.Install touch recovery >>> /data/touch-recovery.img
3.restore stock recovery >>> /data/stock-recovery.img

sehingga jika perlu rename nama image sesuai deengan nama diatas
misal 6.0.2.3-cwm-recovery.img >>> cwm-recovery.img

Update: jika ada temuan lebih baru atau versi lebih baru saya akan update

Latest Build
  • 6.0.2.3-cwm-recovery.img : Custom build using 6.0.2.3 source, 8 november kernel + some file from stock recovery (fix reboot issue : i hope.... )

Mohon Rename File tersebut menjadi cwm-recovery.img sebelum instalasi menggunakan Andromaxi script >>> /data/cwm-recovery.img

Note :
untuk touch-recovery.img di build dengan mesin dikarenakan saya belum mendapat soucecode untuk touchnya... kemungkinan ada error atau fungsi yang belum jalan... klo mau testing silahkan, namun saya merekomendasikan menggunakan yang biasa saja..

===========================================================
ROOT UNROOT VIA ADB Tanpa Recovery

Notes : Hal ini sudah tidak diperlukan lagi karena root dapat dilakukan melalui instalasi zip melalui cwm recovery..

Requirement:


Skema :
  • Memanfaatkan hole yang ada di ICS pada saat backup- restore yang memungkinkan kita menulis di /data
  • melakukan restore dengan fakebackup.ab
  • exlpoit shell "while ! ln -s /data/local.prop /data/data/com.android.settings/a/file99; do :; done"
  • memasang su, busybox di /system/xbin
  • memasang superuser.apk di /system/app

Langkah Kerja :
  • Install Terminal Emulator di Andromaxi : https://play.google.com/store/apps/details?id=jackpal.androidterm&hl=en
  • download Andromaxi.zip kemudian extrak 
  • koneksikan Andromaxi ke komputer dengan kabel usb
  • pilih : data connections
  • Akan muncul cd rom di komputer untuk instalasi modem, install jika belum terinstall
  • setelah selesai eject cd (hal ini akan mengaftifkan adb connections (Debuging)
  • eject cd ini diperlukan setiap ingin menjalankan adb.exe
  • atau dapat pula dengan menginstall android sdk
  • pastikan adb dapat terkoneksi dengan baik
  • Pastikan vendor id  ; 0x109b ada di C:\Users\Nama User Anda\.android\adb_usb.ini
  • Jika belum ada folder .android di C:\Users\Nama User Anda\ copy folder .android dalam folder Andromaxi ke C:\Users\Nama User Anda\
  • Buka folder Andromaxi
  • Jalankan Andromaxi.bat
  • Pilih Mode yang diinginkan 3 untuk root 4 untuk unroot
  • saat diminta untuk restore buka Andromaxi dan pilih restore
  • untuk rooting ditengah proses setelah reboot android akan eror SystemUI crash ini berarti exploit masuk dan Andromaxi masuk mode emulator sehingga kita dapat menyisipkan dil su, busybox dan superuser.apk
  • Saat eror anda perlu mebuka Terminal Emulator dan mengetikkan : am start -n com.android.settings/.deviceinfo.UsbSettingsManager (penulisan huruf besar kecil berpengaruh)
  • Hal ini dilakukan untuk membuka opsi USB sehingga kita dapat melanjutkan proses selanjutnya (Perlu koneksi ADB -- jangan lupa untuk eject cd untuk mengaktifkan debugging atau proses tidak dapat dilanjutkan.
  • Untuk Unroot tinggal pilih menu no 4

Metode Lain : http://www.cidtux.net/2/post/2012/11/cara-root-smartfren-andromax-i-ad683g-hisense-eg909-di-linux.html
hampir sama prinsipnya hanya menggunakan linuk dan metode yang berbeda pada instalasi su,busybox dan superusernya

Apabila tejadi kegagalan dapat dilangi prosesnya, terburuknya melakukan factory reset pama setting dan akan kehilangan data dan aplikasi yang telah di install

sekalilagi mengingatkan : DO IT ON YOUR OWN RISK

For testing only, klo gak yakin tunggu dari master master yang lain, misal lewat mode recovery yang lebih cepat dan tidak perlu repot....

NB : Maaf Scriptnya pake bahasa inggris ...

Semoga bermanfaat, mohon koreksi klo ada yang salah, maklum baru punya android ... masi newbie

thanx :sumberValid

          Forum Post: How to get the value of a string when using the string in a hierarchical path   
Hi all Is there a way to use the value of string variable in systemverilog. I have a text file with the pin name and the value to be driven to that pin, on each line. There are around 50 pins. The name of the pin declared in the interface and the text file are same. I want to read the pin name and value from text file into a string and integer. Then use the string to refer the signal in interface and drive the value to it. The code i want to use is roughly as show below. The interface vif has pins pinabc and pinbcd declared in it. obviously here when i use vif.pin the tool is searching for a pin with name "pin" in interface. Is there a way to get the value of the string pin. ----------------file.txt------------------------- pinabc 20 pinbcd 30 ---------------sv code---------------------------------- interger FILE,pin_val; string line,pin; FILE = $fopen("./file.txt","r"); while ($fgets(line,FILE)) begin void'($sscanf(line,"%s %d\n",pin,pin_val)); vif.pin = pin_val; end
          GraphicRiver Construction Flyers Bundle Templates 12232007   
Construction Flyers Bundle Templates

GraphicRiver Construction Flyers Bundle Templates 12232007

Photoshop \ Print Template \ Flyers \ Corporate
Construction Flyers Bundle Templates Specification CMYK Color Mode 300 DPI Resolution Size 210X297 Features Free Fonts Editable Text Layers Smart Object Layer For Replace Photo Well Organized Layer File Include 3 PSD File Read me.txt (help file) Font Used http://fontfabric.com/nexa free font/ http://www.fontsquirrel.com/fonts/roboto Flyers Links. http://graphicriver.net/item/construction flyer templates /12148254 http://graphicriver.net/item/transport business corporate psd flyer/12110597 Please Note: Photos in preview image are used preview ...
          GraphicRiver Home Select 12182738   
Home Select

GraphicRiver Home Select 12182738

Logo Template \ Buildings
Logo Template Features 100% Scalable Vector Files Everything is editable Everything is resizable Easy to edit color / text Free fonts CMYK 300 PPI Ready to print Files included .ai (Adobe Illustrator CC version) .eps (Adobe Illustrator CC version) .eps (Adobe Illustrator CS version) .eps (Adobe Illustrator 10 version) .txt (Help File with links to download all fonts) Everything works with Adobe Illustrator PLEASE NOTE : The Mock ups and photos used in the presentation of the logo template are not included. Enjoy using them.
          A Respectable Firmware and Router   
After delving more into the newer firmware and router Jonathan and Devon were using I felt really bad about using the processing router and older firmware. So I went through and converted the new firmware over to be compatible with the shield, and also have some instructions on using the python router.

For the Octinct use this software:
To get the python router running on windows, you need to do the following:

  1. Install Python 2.6 (I don't believe all the libraries are 3.0 compatible)
  2. Install SimpleOSC (I used v0.2.5)
  3. Install pyserial (I used 2.4)
  4. Install pywin32 (There is a version for python 2.6)
  5. Download Devon Jones Python router (see above)
  6. Edit SerialTinct.py and designate the correct comport windows users can use a value like "com17"
  7. From the command line run "python SerialTinct.py"
  8. Pat yourself on the back
To install SimpleOSC read the readme.txt that is included with it, the rest of the binaries should install the libraries for you.

If you look in the firmware you will see a serial string case for setting RGB values, which then are used by led, row, column commands of the monome protocol. You can use this to start writing RGB apps without needing to modify the firmware.

osc.sendMsg(prefix + "/rgb",[255,0,0],"127.0.0.1",8080)

The above will set the working color for R,G,B respectively. The value specified is multiplied by 16 to achieve the brightness value the 5940 is fed.
          Drupal 8 - blocking taxonomy terms from being indexed   

Hey,

Generated a test sitemap of my nearly complete site.

Surprised to see links I did not know existed - like urls pointing to taxonomy results (the site gathered all the elements with a specific taxonomy term and created a page from them) - this MIGHT have something to do with the Exposed Filters I used.

Since I have never built a Drupal site, I am not sure how to "block" those pages from:
1 - Being indexed on my sitemap (do I just erase those entries on the XML file?)
2 - Being crawled (I am guessing this is with a robots.txt file though I have never created one before)
3 - Being viewed (stumbled upon) -> if this even possible to block?

I am just looking for confirmation to these or other directions.

Really appreciate it.

Thanks!

Drupal version: 

          PCSXBox v22b25   
A PSX Emulator for XBox. New in this rel: Updated to madmab edition interface CFv1b21. See "Interface Changelog.txt. Fixed an issue where Autoconfig had a little big where when it caused a core switch some information would not get passed correctly.
          365 Reasons To Be Proud To Be British: Canterbury Tales   

April 17th 1397: The Canterbury Tales are first told by Geoffrey Chaucer at the court of Richard II.

It's been a long time since I blogged about Richard Happer's excellent little book. So here we go again.

The Canterbury Tales continue to fascinate me. A work that may or not be complete, in an order that may or may not be correct, spanning styles and subjects with the added attraction of Middle English to decipher. It's a rich vein for contemporary dramatists to mine and stands as a foundation of English literature that's too often ignored by many, thinking it'll be difficult to read.

Well, take a look at Michael Murphey's excellent modern spelling version. I've had the PDFs loaded onto my Kindle and now enjoy an accessible version of the Tales wherever I go. Purists may prefer a plain text version that preserves the original language; whatever floats your boat.

I've been thinking about visiting Canterbury Cathedral for some time. Maybe I ought to take the train from London Bridge, see the city, read the Tales on the way there and back, then treat myself to a slap-up meal at the Royal Oak on my return to the capital...


The woodcut illustration of the pilgrims at the Tabard Inn, London is one of the woodcuts by William Caxton used to illustrate the second edition of the Tales. You can read more about his work here.

          Lead PHP Developer MySQL Web Finance Liverpool - -   
.txt .pdf .docx .doc .rtf .odt files only Or Copy & Paste your Cover Letter Hide Upload your CV. .txt .pdf .docx .doc .rtf .odt files only Or Copy & Paste your CV Hide First Name Surname Home Teleph...
          리얼 최진리 설리 전라신으로 유명한 영화 리얼 거짓없는 후기.txt   
익스트림무비 김종철 대표의 영화 리얼 리뷰. 영화를 혹평하는 수준을 넘어서,김종철 대표가 영화 자체를 쓰레기라고 칭하며 씨발이라며 쌍욕을 하는 장면을 볼 수 있다.대체로 김수현이 아깝다.는 반응이 많다. 김수현 + 1000만 달러의 제작비를 어디다 썼냐는 반응이다.스토리는 난잡해서 정리가 불가능한 수준이라고 하며, 그나마 볼만할 것으로 예측되던 액션도 비판이 많다. 개봉 전부터 논란이 있었다. 영화 작업 후반부에 감독이 갑작스럽게 교체되어서,뭔가 문제가 있었던게 아니냐는 말이 많았었고 심지어 교체된 감독이 김수현의 사촌이었기 때문에 이에 대해서도 논란이 있었다. 또한 설리의 노출로만 언플을 했기 때문에 졸작일 것이.......
          크라임씬3 양세형이 불편한 이유.txt   
크라임씬3 양세형이 불편한 이유.txt 이미 다른 크라임씬3 플레이어들이 이전에 다 파악한 내용가지고, 무전유죄 드립치면서 갑자기 흐름끊으면서 범인 증거 찾는데 방해하는 양세형 (양손님) 양정은= 양세형+정은지 세트매뉴인 '양정은'으로 불리며, 크라임씬 시즌3 고정 플레이어로써, 제 역할을 못한다며 크라임씬 갤러리 등 다양한 크라임씬 팬사이트에서 욕을 먹는게 일상 많은 사람들이 정은지를 까지만, 솔직히 정은지는 여성게스트로서 걍 평범하게 해주는것일뿐, 그이상을 못해주는것뿐이다. 그동안의 게스트, 보아,소유 등 애들하고 비교하면 걍 평이한편 단지 그의 비교대상이 캐릭터강하고 귀여운 소진과, 리액션, 친화력갑인 하니하.......
          설리 김수현 주연의 리얼이 노근본 소리 듣는 이유.txt   
설리 김수현 주연의 리얼이 노근본 소리 듣는 이유.txt 1.영화 촬영 다 끝났는데 뜬금없이 김수현 친척으로 감독교체.(이건 좀 생각해 봐야 할 게, 원래 감독이 찍은 버전이 노답이어서 바뀌었을 가능성도 없지않아 있다. 만약에 그랬다면 다른 전문가를 고용하는게 정답이겠지만... 마치 고무닦이 사태가 떠오른다.) 2.배급을 맡은 천하의 돈벌레 CJ가 우리는 배급만 담당한다고 발뺌. 3.노근본 영화의 필수 마케팅요소인 노출 마케팅 시전.4. 현재 영화계를 망치는 주범. 영화계의 암덩어리 중국의 졸부가 투자한 영화. 5.개봉연기했다가 울며겨자먹기로 개봉행.( 차라리 스파이더맨이나 덩케르크,군함도가 개봉했을 때 개봉했으면 명예로운 죽.......
          설리가 나오는 영화'리얼'을 영화관에서 꼭 봐야하는 리얼 이유.txt   
설리가 나오는 영화'리얼'을 영화관에서 꼭 봐야하는 리얼 이유.txt 설리 가슴 노출 살짝 지나가고 전신 노출+섹스신은 대역인것 같았음.+구강성교
          Backup des des applications données Android pour un transfert vers un autre appareil.   

Tout fraîchement équipé du tout nouveau Galaxy S4  je cherchais un moyen de récupérer les données des applications. Attention, ADB ne peut sauvegarder que depuis ICS (Ice Cream Sandwitch).

On peut bien entendu utiliser un tas d'applications du market pour faire un backup restore des SMS, appli ... mais aucune d'entre elle ne peut sauvegarder les données de l'application et du coup on perd forcement les scores, bonus et autres configurations ...

Après avoir essayé quelques applications sans succès et pi ne voulant pas forcement passer par une solution software j'ai voulu essayer avec ADB, l'utilitaire présent dans le Software Développement Kit nommé SDK, d'Android.

Alors je vous prévient avant de tout "péter" votre tout nouveau Galaxy S4, il convient de faire attention et pas faire comme moi le boulet qui "restore" à l'arrache des datas venant d'une ROM custom vers une ROM officielle ... vous allez me dire sans commentaires ...

Bref, il sera donc convenable de ne choisir que les applications ayant un intérêt de transfert parce que notre amis ADB est capable de faire un backup complet DATA + APPLI.

Environnement 

Je suis sous Win8 x64, j'ai téléchargé le SDK Android que j'ai décompressé dans le répertoire qui va bien.

Il faudra aussi installer le SDK de Java.

Pas possible d'utiliser ADB sans acquerir le Kernel correspondant à la version de l'android on va donc démarrer le gestionnaire du SDK par double click de android.bat présent dans le répertoire  C:\Program Files\adt-bundle-windows-x86_64-20130522\adt-bundle-windows-x86_64-20130522\sdk\tools On choisit la version d'android qui correspond 4.2.2:

ADB1.png

 

 

 

 

 

 

Une fois cela fait se rendre dans le répertoire du SDK:C:\Program Files\adt-bundle-windows-x86_64-20130522\adt-bundle-windows-x86_64-20130522\sdk\platform-tools

 

 

 

 

 

 

Activer le debogage USB de votre appareil, dans options de développement des paramètres.
On branche le mobile source en USB.
Depuis une fenêtre de commande DOS on va vérifier que le phone réponde:
adb devices
Devrait répondre un ID + device. Cool! tout va bien!

Le Backup

Maintenant on va rechercher les packages que l'on souhaite sauvegarder depuis la liste des packages installés.
adb shell pm list packages -f > list.txt
Nous voici donc avec une liste contenant toutes les applications du téléphone. Elle se décompose sous la forme:
package:/mnt/asec/com.kiloo.subwaysurf-2/pkg.apk=com.kiloo.subwaysurf
Pour le coup je n'ai que quelques jeux et quelques applications un peu galère à configurer, candidates au "restore", donc il suffit de prendre le nom de la variable pkg.apk.
Ici com.kiloo.subwaysurf.
Je vais donc sauvegarder l'application et ses données avec la commande suivante:
adb backup -apk -noshared -nosystem com.kiloo.subwaysurf -f com.kiloo.subwaysurf.ab
Je retrouve mon fichier de sauvegarde dans le répertoire local de mon SDK. retrouvez les options de ADB ici. Il faudra votre confirmation du coté du téléphone pour accepter le transfert.

Le restore

Débrancher le téléphone source. Pour plus de sécurité tuer le service ADB dans le gestionnaire des tâches WINDOWS.
Brancher le téléphone cible.
Et lancer le "restore" avec la commande suivante:
adb restore com.kiloo.subwaysurf.ab
Vous devrez encore confirmer le "rerstore" coté téléphone. 
Si quelque chose se passe mal ou pas. Arrêter le processus ADB et recommencer...

Pour aller plus loin

Pour sauvegarder toutes les applications du téléphone utiliser la commande suivante:
adb backup -all -apk -noshared -nosystem -f galaxyS2-backup.ab
Vous pouvez alors transformer cette archive en fichier TAR pour la parcourir ou la modifier. J'ai trouvé ici un exécutable en java pour la transformation dans un sens ou dans l'autre.
adb4.png

 

 

 

 

 

 

 

 

 

 

 

 

 


          Windows Server Core 2012: Enable FSRM (File Server Remote Managment)   

To optain the feature list on cmd prompt:

dism /online /Get-Features > features.txt

On the Server

dism /online /enable-feature /featurename:FSRM-Infrastructure 

dism /online /enable-feature /all /featurename:FSRM-Management

On the client

If you do NOT have Server Manager installed, you must enable it (only after installing RSAT) by using the Turn Windows Features On or Off in Control Panel. For more information on installing RSAT, google it ;)


             
A picture named richie.jpgI was flipping channels last night and caught a profile of R&B star Lionel Richie, talking about what it's like to write a song. He says sometimes he's searching for the line that ties all the elements of a song together, he could be searching for weeks, and then it hits him like a thunderbolt -- boom -- mind bomb, that's it, and he can move on to the next project. Then I wondered if he actually wrote the songs, was he describing what it's like to have an idea, or what he thought it would be like if he ever actually had one. I have no idea if Richie is a creative guy or if he pays people to be creative, or if he rips people off and says their creativity is his without paying.
          在web 上调用exe权限解决方法 ,关于FlashPaper2 命令行FlashPrinterexe的调用   

http://hi.baidu.com/jiaxw/blog/item/93b619f38c5d805b342accf8.html


在此之前我已经找过很多国外的文章,很多人都碰到类似的情况
就是通过asp.net 调用服务器上的FlashPrinter.exe 程序,(这个程序可以通过虚拟打印机把所有可打印的文件转换成swf文件)
我这里是通过Process类调用的
CMD的命令式这样的
xxx\\xxx\\FlashPrinter.exe "d:\\1.txt" -o "d\\1.swf"
我在服务器上直接输入上面命令行正常运作
但是通过web 也就是Network Services用户组调用就没有正常输出文件,
我调试过可以正常调用FlashPrinter.exe 进程,但就一直没有输出文件

我曾经从新安装新的window2003用于测试
第一次我用了好几个小时去搞:
1.IIS权限
2.用户组权限
3.本地策略
4.打印机权限
我忘记了是搞了那些东西,不知不觉就可以通过asp.net 正常使用那个功能.
后来我为了再次测试,我把系统还原了,结果我怎么在设置也不能正常调用那个功能了
在此之前已经设置过很多东西上面所说的是我不知道怎么样设置就可以运行了
PS:我身边有好几台机器,有些是正常的,有些就是一直烦着..查看事件日志说是已经成功转送打印命令,但就是打印的字节数为0

想把pdf转换成swf文件,就在asp.net后台代码中启动了flashpaper进程,但同样的代码在winxp下,好用。但在 win2003下,就不好用了。代码如下:

public static void ConvertPdfToSwf(HttpRequest reqeust, String styFileName, String[] dataFileNames, String outputFileFullName)
{
try
{
String flashPrinter = String.Concat(AppDomain.CurrentDomain.BaseDirectory, "FlashPrinter.exe");//FlashPrinter.exe
System.Diagnostics.ProcessStartInfo startInfo = new System.Diagnostics.ProcessStartInfo(flashPrinter);
if (String.IsNullOrEmpty(outputFileFullName))
{
return ;
}
Int32 intLastDot = outputFileFullName.LastIndexOf(".");
//*********Temp Programming****************************************
Int32 intLast = outputFileFullName.LastIndexOf("\\");
String path = outputFileFullName.Substring(0, intLast);
String tempFileName = path + "\\PdfToSwf20080923.pdf";
//*****************************************************************
String swfFileName = String.Concat(path, "\\PdfToSwf20080923.swf");
startInfo.Arguments = String.Concat(tempFileName, " -o ", swfFileName);
System.Diagnostics.Process process = new System.Diagnostics.Process();
process.StartInfo = startInfo;
Boolean isStart = process.Start();
process.WaitForExit();
process.Close();
}
catch(Exception ex)
{
throw ex;
}



SIMONE 2010-04-03 23:25 发表评论

          Wiki Page: Batch process subdirectories in main directory   
(Please visit the site to view this file) Load all .dgn files in Directory and subdirectories for batch processing How to create the list of files 1. Open Windows Command Prompt 2. Navigate to the main directory where desired files are stored 3. Use the “dir /s/b *.dgn >dgnlist.txt” command to create a text file of all .dgn files under the current directory. It is recommended to create the text file to a specified location using a full path. 4. Open the created txt file either in notepad or excel and copy the contents into Column B in the TemplateForBatch.xlsx worksheet 5. Use the auto fill feature to fill column A, C, and D. 6. Select Column A and copy the contents into the first empty cell in column A 7. In the first empty cell in column C enter “[MODEL=:AllModels:]” and use the autofill function. 8. Use the autofill on Column E. 9. Select all contents in the sheet and use the sort tool to sort all information based on Column A by Value from Smallest to Largest 10. Select all contents of Column E and copy the contents into the BatchTemplate.bprc file, when done save the BatchTemplate.bprc as a new file and name appropriately. 11. In MicroStation Launch the Batch Process utility open the desired .bprc and create or load an existing command file to run. 12. Run the batch process.(Please visit the site to view this video)
          фотошоп camwow   
фотошоп camwow
ВЫ ИСКАЛИ фотошоп camwow

 
СКАЧАТЬ ПО ПРЯМОЙ ССЫЛКЕ фотошоп camwow


 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

Мы рекомендуем хепи вылс иногда kak-otklyuchit-rouming.txt результаты Генератор ключей guild wars 2 Давыдова Г.Н — Нетрадиционн ые техники рисования в детском саду Часть I и II 2007, PDF, RUS вы искали фотошоп camwow но мы стараемсяПоурочное планирование по русскому языку 5 класс бунеев.doc magic partition recovery 2.0 регистрация фотошоп camwow delfin arbeitsbuch с 5-7 лекцию ответы фотошоп camwow Схема подключения магнитола sony Дыбина О.В фотошоп camwow 3dmasterkit 4 5 professional crack фотошоп camwow повелитель стихий фотошоп camwow BMW Navigation DVD Road Map Europe Premium CIC 2013 2 Crack kassy 072 microsoft word 2003 код активации фотошоп camwow boss manager

66662017
          kak-delat-kunningilius.txt   
kak-delat-kunningilius.txt
ВЫ ИСКАЛИ kak-delat-kunningilius.txt

 
СКАЧАТЬ ПО ПРЯМОЙ ССЫЛКЕ kak-delat-kunningilius.txt


 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

Мы рекомендуем инструкция сигнализация centurion x-line иногда Ситроен с4 пикассо ремонт и обслуживание результаты гарри поттер и узник азкобана Предшкольное образование Моя математика вы искали kak-delat-kunningilius.txt но мы стараемсяпепел 2013г дискография шанхай kak-delat-kunningilius.txt Ключ 3д инструктор 2 2.2.9 kak-delat-kunningilius.txt www.ucoz./warface.ru Судья Дредд 3D / Dredd 3D (Пит Трэвис) 2012, фантастика, боевик, TS DUB kak-delat-kunningilius.txt искусство быть вторым kak-delat-kunningilius.txt Ключ для hetman partition recovery kak-delat-kunningilius.txt sfmsung s4 подключение к интернету через пк Картина рылова в голубом просторе 6 класс фгос kak-delat-kunningilius.txt РЭД 2 2013

66662017
          Chen, Sherry Yong: Processing Tenses for the Living and the Dead: A Psycholinguistic Investigation of Lifetime Effects in Tensed and Tenseless Languages   
Author(s): Chen, Sherry Yong Title: Processing Tenses for the Living and the Dead: A Psycholinguistic Investigation of Lifetime Effects in Tensed and Tenseless Languages Keywords: tenseless, lifetime effects, tense, psycholinguistics, mandarin chinese, english, structural universals, semantics, syntax Date submitted: 2017 06 30 Item: DEzMzUyM File: lifetime_chinese File: info.txt
          Chen, Sherry Yong: Covert (Universal) Quantification: A Generalised Quantifier Theory Analysis of -men   
Author(s): Chen, Sherry Yong Title: Covert (Universal) Quantification: A Generalised Quantifier Theory Analysis of -men Keywords: GQT, most, men, Mandarin Chinese, collectivity, plurality, universal quantification Date submitted: 2017 06 30 Item: zc2YjNiN File: GQT_men.pdf File: info.txt
          Digital Players Adopt IAB Ads.txt Specification   
The Interactive Advertising Bureau's IAB Tech Lab said that after a review process, it has released the final version of the specification for its Ads.txt standard, which enables publishers to list their Authorized Digital Sellers.
          Comment on Py65 0.1: Introducing Py65Mon by Mike Naberezny   
Thanks Jeff, the I/O area <a href="https://github.com/mnaberez/py65/blob/0.2/CHANGES.txt#L11-L13" rel="nofollow">was indeed<a> changed in 0.2. I've updated the code above.
          Comentario en Busca los directorios o archivos más grande de tu disco duro con find por Rogelio Reyes   
Alguien que me pueda ayudar? necesito un comando que busque dentro de un directorio todos los archivos .txt que sean mayores a 0 bytes y los mueva a otro directorio, hasta el momento solo eh encontrado esto: find . -type f -size +1b -exec mv /home/oradev/nuevo/*.txt /home/oradev/mover \; pero mueve todos los archivos sin tomar en cuenta el tamaño de los mismos.
          Opening a Tab-Delimited "CSV" in Apple iWork Numbers   

I like Numbers, from Apple's competent and beautiful iWork suite, but there are still things where it is different from Microsoft Excel, and hence it feels somewhat unfamiliar at times. For example, although Excel has never been good at handling text files saved in UTF-8 format (a big deal for those of us who work in Asia), it does have a nice Wizard for importing CSV or TSV text files.

Some applications export text files with tab-separated values, and put a CSV extension on them. Actually, CSV stands for "Comma Separated Values" where these are really "TSV" or "Tab Separated Values." When you try to import such a CSV file, Numbers will mash all the fields into one cell in the left-most column. That makes sense, because it's looking for commas judging by the CSV extension. Finding none, it just lets the data pile on.

How to Import a Tab-Separated "CSV" in Numbers

If you have a tab-separated CSV, here's how to open it:

  1. Save the file somewhere you can find it.
  2. Rename the file in Finder, so that it has a .TXT extension.
  3. Ctrl-click the file and choose "Open With" and "Numbers".

Now the data will open correctly, with each field getting its due, and you'll get the added benefit of Numbers not munging any Japanese or Chinese characters.

Hope this tip helps someone. Enjoy!


          Android & Processing   
Processing and Android

Daha önce processing programlama dilinden ve derleyicisinden bahsetmiştim. Bunun için Processing yazımı okuyabilirsiniz. Ayrıca arduino ile birlikte kullanıp bir kaç uygulama yapmıştım. Bunun içinde Arduino bölümüne bakabilirsiniz. Bu sefer processing ile yapacağım programın nasıl android sistemler üzerinde çalıştırıldığını göstereceğim. Processing çok ileri programlama bilgisi gerektirmeyen bir dil. Bu sayede aklınıza gelen uygulamarı hızlı bir şekilde tasarlayabilir ve Android üzerinde çalıştırabilirsiniz. Ayrıca bu yazı karşılaşılan sorunlar için çözüm yollarını gösteren tek türkçe kaynak olacak :) (bence)
Ek not : Android + Arduino + Processing bu üçü bir araya gelirse neler olur neler yapılabilir. "yakında" :)

Daha önce android için uygulama geliştirmiş iseniz java, sdk, emulator vb.terimlere uzak değilsinizdir. Emülatöre derleyici üzerinde yazıp derlediğimiz yazılımları test ettiğimiz sanal cihazlar diyebiliriz. Bir nevi programı telefona kurmadan önce neler olacağını ekranınızda görebiliyorsunuz. Bu sayede bir çok model ve versiyon için elinizde cihaz bulunmasada uygulama geliştirebiliyorsunuz. Ben burada android için hazırlanan sdk yı kullanacağım ve kendi sanal cihazımı oluşturacağım. 

İlk olarak processing indirip kuruyorsunuz.
İkinci adım sdk manager indiriyorsunuz ve kuruyorsunuz.
Üçüncü adım sdk manager ile android tools ve apı 10 indirmeniz gerekli. Dikkat : Android api 10 olmak zorunda çünkü processing derleyicisi diğer api için şuanda hata veriyor. Ayrıca extras bölmündeki araçları da kurun.
Dördüncü adım Android AVD manager kontrol etmeniz gerekli. Eğer kendiliğinden herhangi bir sanal cihaz oluşturulmuş ise hepsini silin. Processing kendisi için gerekli sanal cihazı otomatik olarak oluşturacaktır. Aşağıdaki resimde benim kullandığım sanal cihazlar görülmektedir.
 
Beşinci adım sıra geldi işin processing üzerinde yapılması gereken kısmına. Derleyiciyi çalıştırın ve sağ üstte bulunan Java butonuna tıklayın. Ardından bir pencere açılacak ve size Android SDK'yı kurmanız gerekdiğini söylecek. Tamam seçeneğini ile devam edin. Sonraki pencerede sizden SDK yı kurduğunuz dizin yolunu isteyecek. Arayüzü kullanarak sdknın bulunduğu adrese gidin ve open butonuna tıklayın. Android klasörü genelllikle program files dizini içersinde bulunur. Eğer herşey sorunsuz tamamlanırsa derleyicinin rengi değişecek ve yeşil olacak. Ayrıca yukarıdaki alana android sekmesi eklenecek.

Son adım artık denem yapma zamanı geldi. Herşey yolunda giderse ilk uygulama emulator penceresinde görülecek. File->exemples yolunu izleyerek denemek için bir yugulama seçin. Çok spesifik bir şey olmasın (gps, cam, 3d) kütüphane indirmeniz ve eklemeniz gerekebilir. Başlangıç için makul bir uygulama seçin. Yeni bir pencere açılacak. Bu pencere üzerinde Sketch -> Run in emulator yolunu izleyin. Biraz beklemeniz gerekcek. Derlenme ve emulatorün açılması kurulması biraz zaman alıyor. Sonunda aşağıdaki resime benzer bir emulator penceresi gelmeli. Şimdi projenizi bir daha derleyin büyük ihtimalle port meşgul olduğunda ve sanal cihaz hazır olmadığından derleme aşamasında hata almışsınızdır.



 Tekrar derledikten sonra derleyici ekranında uygulamanın gözükmesi gerekli. Örnek aşadığıdaki ekran görüntüsü. Bir sonraki yazıda görüşmek üzere. Artık kendim bir uygulama yazıp onu telefon üzerinde çalıştıracağım.


Karşılaşılacak muhtemel sorunlar ve çözüm yolları : 

- Önce sabır
- SDK güncelleyin
- Google Andorid API 10 kurun
- Processing güncel sürümünü indirin
- Processing File-> Preferences yolunu izleyerek preferences.txt dosyası içersinde port numarasını ayarlayın. Örneğin benim emulatorumün port numarası 5554. Bunu yukarıdaki resimde sol üste bakarak görebilirsiniz. Her kullanıcı için bu numara farklı olabilir ! Port numarasını öğrendikten sonra android.emulator.port=5554 şeklinde değeri dosya içinde kaydedin.
- SDK için dopru yolu gösterdiğinizden emin olun. Bunu preferences.txt içerisindeki  android.sdk.path=C:\Program Files\Android\android-sdk değerini kontrol ederek yapabilirsiniz.
- Eğer hala daha sorun alıyorsanız ya da derledikten sonra emulator çalışmıyorsa AVD Manager aracılığı ile Processing'in kendi oluşturuduğu AVD ismini Processing-Android-10 olarak değiştirin ve yeni bir AVD olarak kaydedin. 
 - Önce emulatorun tam olarak krulmasınıı bekleyin. Ardından projeyi tekrar derleyin.
- Bilgisayarınızı yeniden başlatın.












          Comment on Making the A.I.-Climate connection by Mentifex (Arthur T. Murray)   
I have been coding ghost.pl Russian AI all day at http://ai.neocities.org/perlmind.txt and it is nice to read an AI-related post here on ScienceBlogs.
          awk 'NR=FNR{a[$0]=1}NR>FNR{if(a[$0]!=1)print}' a.txt b.txt    
作者: alexsenfei 发表于: 2017-06-29 11:22:59 (GMT 8) 简介:awk 'NR=FNR{a[$0]=1}NR>FNR{if(a[$0]!=1)print}' a.txt b.txt 实现b中数据如果在a中不存在则显示。 a.txt a b c b.txt a b c d e 我想问 =1代表什么意思? a[a]=1 a[b]=1 a[c]=1? 然后a[d]!=1 a[e]!=1 打印 d和e?是这样么
          N-Gage 2.0 v1.40.1557 for E63/E71   

 N-Gage 2.0 v1.40.1557 for E63/E71

"Hello E63 and E71 users.

After a lot of research and reading many explanations on how to make n-gage work in my E63 I was able to make it work at full screen mode (320x240)... I don't know if this method works for other models but at least it is working perfectly in my E63 and the E71 of a couple of friends.

The credit goes to kiko_ocaña which is a member of an spanish symbian forum (not doing any advertising but is fair to give credit to the original poster in that site).

These are the steps:

1- Download and extract the contents of the file "ngage.zip" to any directory.

N-Gage 1.40 e63 e71 (320x240)
2- Install the file "N-Gage v1.40 (1557) s60v3.sis". It will install many files and stuff... you just have to keep pressing the "continue" option until it installs all the stuff.

3- Open the file: "N-GAGE SERIE E.rar" and extract its content to any directory. You'll have 3 files: 10202be9.rar, 20001079.txt and playcommon.mbm.

4- Extract the contents of "10202be9.rar", it will decompress a folder with the same name, then you'll have to copy all the files contained in that folder to the following location in your phone: "c:/private/10202BE9" (use X-plore to copy the files). X-plore will ask for permission to overwrite some files, just hit yes to overwrite the files.

In order to view the files your phone has to be h4cked or you won't be able to see, copy and overwrite the files. I'm not expert h4cking phones but I'm pretty sure you can find directions for your phone in the forum.

5- Copy the file "20001079.txt" (located in N-GAGE SERIE E.rar) to the same location in your phone (c:/private/10202BE9).

6- Copy the file "playcommon.mbm" (located in N-GAGE SERIE E.rar) to the following location in your phone: "c:/resourcer/apps" and overwrite the existing file if it asks.





Also, you can use Magickey to map your QWERTY keyboard to the traditional layout used by n-gage as it doesn't properly support the keyboard of E63/E71. (I've added the installer to the rar file in case you don't have it already)

You can use the following map in Magickey:

No. 1: org: 82 -----> map to: 49
No. 2: org: 84 -----> map to: 50
No. 3: org: 89 -----> map to: 51
No. 4: org: 70 -----> map to: 52
No. 5: org: 71 -----> map to: 53
No. 6: org: 72 -----> map to: 54
No. 7: org: 86 -----> map to: 55
No. 8: org: 66 -----> map to: 56
No. 9: org: 78 -----> map to: 57
No. 0: org: 77 -----> map to: 48
Symbol *: org:133 -----> map to: 85
Symbol #: org:127  -----> map to: 74


Download:
             Magickeys

Hope this works for you as it did in my E63..

          Forum Post: Error in Publish and install my Extension in Dynamics NAV 2017   
Hi Expert , We have added Tables/Pages/CodeUnit/XmlPort and modified in base pages(ItemCard/CustomerCard/Customer Ship-to-Address / SalesOrder) in Dynamics . I want to create extension package and publish/install. . I am able to create package for our base modified and custom objects with the help of below url. saurav-nav.blogspot.in/.../microsoft-dynamics-nav-2016-extensions_11.html Follow the Process : 1) Export Selected modified base Objects and new Objects as txt (File Name - Custom.txt) from Demo2 Database and ServerInstance : DynamicsNAV100Dev, using below filters in Folder (C:\Users\souvik\Desktop\Surajit\). Tables - 33064461|33064462|33064463|33064464|33064465|33064472 Pages - 300|33064461|33064462|33064463|33064464|33064465|33064473|33064478 Codeunit - 33064470 2) Export Selected base Objects as txt (File Name - Base.txt) from Demo1 Database and serverinstance DynamicsNAV100 ,using below filters Pages - 300 3) Create a folder inside Surajit folder called Delta . 4) Open PowerShell ISE as Administrator. 5) Import Module : Import-Module 'C:\Program Files (x86)\Microsoft Dynamics NAV\100\RoleTailored Client\NavModelTools.ps1' 6) Compare object : Compare-NAVApplicationObject -DeltaPath C:\Users\souvik\Desktop\Surajit\Delta -ModifiedPath C:\Users\souvik\Desktop\Surajit\Custom.txt -OriginalPath C:\Users\souvik\Desktop\Surajit\Base.txt Delta files created successfully in delta folder. 7) Create Manifest file : Try with different values : i) Value1 : New-NAVAppManifestFile -Manifest (New-NAVAppManifest -Name NAVAppMainfest -Description "APPSeCONNECT Extension" -Publisher "Insync Tech-Fin Solution Ltd." -Prerequisites Table=33064461,Table=33064462,Table=33064463,Table=33064464,Table=33064465,Table=33064472,Page=33064461,Page=33064462,Page=33064463,Page=33064464,Page=33064465,Page=300,Page=33064473,Page=33064478,CodeUnit=33064470 -Version 2.0.0.1) -Path C:\Users\souvik\Desktop\Surajit\NAVAppMainfest.xml ii) Values2 : New-NAVAppManifestFile -Manifest (New-NAVAppManifest -Name NAVAppMainfest -Description "APPSeCONNECT Extension" -Publisher "Insync Tech-Fin Solution Ltd." -Prerequisites Page=300 -Version 2.0.0.1) -Path C:\Users\souvik\Desktop\Surajit\NAVAppMainfest.xml Manifest file created successfully 8) Create Package : New-NAVAppPackage -Manifest (Get-NAVAppManifest -Path C:\Users\souvik\Desktop\Surajit\NAVAppMainfest.xml) -Path C:\Users\souvik\Desktop\Surajit\APPSeCONNECT.navx -SourcePath C:\Users\souvik\Desktop\Surajit\Delta\ Package created successfully 9) Publish : Publish-NAVApp -Path C:\Users\souvik\Desktop\Surajit\APPSeCONNECT.navx -ServerInstance DynamicsNAV100Dev -SkipVerification a) Error : It's showing an error when i used 7 > i) Values1 .Below is the error Publish-NAVApp : This Extension cannot be published due the missing prerequisites: Table=33064461.Table=33064462.Table=33064463.Table=33064464.Table=33064465.Table=33064472.Page=33064461.Page=33064462.Page=33064463.Page=33064464. Page=33064465.Page=33064473.Page=33064478.CodeUnit=33064470. At line:1 char:1 + Publish-NAVApp -Path C:\Users\souvik\Desktop\Surajit\APPSeCONNECT.nav ... + CategoryInfo : InvalidArgument: (Microsoft.Dynam...s.PublishNavApp:PublishNavApp) [Publish-NAVApp], InvalidOperationException+ FullyQualifiedErrorId : Microsoft.Dynamics.Nav.Apps.Management.Cmdlets.PublishNavApp b) Sucess : It's success when i used 7 > ii) Values2 10) Install : Install-NAVApp -ServerInstance DynamicsNAV100Dev -Name ”APPSeCONNECT” It's showing below error : WARNING: UnhandledErrorMessage Install-NAVApp : Object reference not set to an instance of an object. At line:1 char:1 + Install-NAVApp -ServerInstance DynamicsNAV100Dev -Name ”APPSeCONNECT” When i try to reinstall it but showing error PS C:\Windows\system32> Install-NAVApp -ServerInstance DynamicsNAV100Dev -Name ”APPSeCONNECT” WARNING: Cannot install extension APPSeCONNECT from tenant default because it is already installed. i am also check extension with the command Get-NAVAppInfo -ServerInstance DynamicsNAV100Dev .it's showing our extension 'APPSeCONNECT'. But no objects created / modified in serverinstance DynamicsNAV100Dev. Please suggest me am i using any wrong step? Thanks Surajit Kundu
          G17: Introduction of Reliability Estimates for Industrial Production Indexes   

With the G.17 statistical release on April 18, 2017, the Federal Reserve Board began publishing estimates of the reliability of the levels and the rates of change (monthly and quarterly) of the reported production indexes for total industry, manufacturing, mining, and utilities. The reliability estimates are designed to give data users a sense of the typical range into which a statistic will likely end up after its final (fifth) revision in a monthly release. The reliability estimates are based on the revision history for the indexes back to 2008; each G.17 release will include estimates for those months and quarters for which either new or updated estimates were issued that month. A detailed explanation is available on the Board's website at https://www.federalreserve.gov/releases/g17/revisions/Current/DefaultRev.htm.

The reliability estimates are issued in table 15 of the G.17 release, available on the Board's website at https://www.federalreserve.gov/releases/g17/20170418/default.htm. A text file that contains the estimates is also available on the Federal Reserve's website at https://www.federalreserve.gov/releases/g17/ipdisk/revh_sa.txt.


          ICE Abuses Solitary Confinement, Lawyers Say   

When Jose Mendez was held at Stewart Detention Center in Georgia, he met another young undocumented immigrant who over time became his boyfriend. They would hold hands and occasionally steal a kiss, he said. Mostly, they shared love letters.

Early last year, as Mendez’s boyfriend was telling him how afraid he was of deportation, Mendez reached over to rest a hand on his. Just then a female guard passed. Fifteen minutes later, Mendez was isolated and accused of having oral sex in the recreation room, said his attorney, Bryan Johnson.

An official told Mendez that there was visual evidence, which he demanded to see it, confident of his innocence. But his request was denied and he was sentenced to 30 days in disciplinary segregation — the U.S. Immigration and Customs Enforcement equivalent of solitary confinement.

“Segregation is the worst thing that could exist,” he said.

Mendez, who does not have a criminal record and sought asylum in the United States after fleeing El Salvador when he was 19, averaged two hours outside of his cell each day as punishment for something he said he did not do. Even if he had, lawyers said, as a civil detainee he should not have faced the same punishment as a felon.

“These are civil detainees,” said R. Andrew Free, an immigration attorney based in Nashville, “Solitary confinement is a tool of a criminal detention system that is geared toward punishment, and in some cases rehabilitation.”

But undocumented immigrants across the country are being held in private prisons and government centers that lawyers say follow rules intended for criminals. They have “grafted all of the rules and all of the infrastructure” from the prison industry onto immigrant detention, according to Free.

The facilities operate with little oversight even as the detainees have no right to lawyers or other protections. Undocumented immigrants who can't find pro bono representation are particularly at a disadvantage, lawyers say. And as President Donald Trump promises to ramp up enforcement of immigration laws, advocates fear even more detainees will get caught up in unreasonable and dangerous situations.

Solitary confinement can be abused easily, lawyers said. Their clients are punished for indefinite periods and arbitrary reasons, they say.

Mendez’s confinement record, for example, doesn’t mention oral sex. The reporting officer wrote that Mendez admitted to “kissing and holding hands in the rec. yard,” enough to find him guilty of committing a “sexual act.”

After about a month in segregation, he was released from Stewart, a private prison run by Corrections Corporation of America, and he boarded a plane to New York thanks to Johnson’s efforts.

His boyfriend was deported.

ALLEGATIONS OF WEAK OVERSIGHT
Both Republican and Democratic presidents have used solitary confinement for undocumented immigrants. It was practiced during Barack Obama’s administration, and George W. Bush’s before that. ICE has arrested more than 41,000 undocumented people since Trump took office, so more people could be at risk of solitary confinement at detention centers around the country.

According to the Los Angeles Times, a White House memo that circulated among top Department of Homeland Security officials in late January said that DHS would bump up the number of immigrants in detention to 80,000 people a day, nearly double the figure under Obama. Over 5,000 immigrants without criminal records were arrested between January and March, more than double Obama’s figure from the same period in 2016.

On top of disciplinary actions, ICE facilities also use segregation as a means to isolate vulnerable people, those who are LGBTQ or mentally unstable, for their own safety, according to the agency.

“ICE’s policy governing the use of special management units protects detainees, staff, contractors, volunteers, and the community from harm by segregating certain detainees from the general population for both administrative and disciplinary reasons,” an ICE official wrote in a statement. “ICE provides several levels of oversight in order to ensure that detainees in ICE custody reside in safe, secure and humane environments and under appropriate conditions of confinement."


The duration of segregation for some immigrants exceeds international regulations, even for humane criminal practices. In 2015, the United Nations ruled that “prolonged solitary confinement” should be prohibited, and equated the practice to torture. The UN defined “prolonged solitary confinement” as more than 15 days in unwanted isolation.

When a guard recommends an immigrant for segregation, there’s almost no oversight, lawyers say. A judge has to rule that the detainee deserves punitive solitary, but in the meantime, he or she can be placed in administrative segregation, as Mendez was for two days before he was found guilty.

ICE had an average daily population of 1.1 percent of detainees in segregation during 2012 and 2013, and more recent estimates show similar numbers. In a system that holds tens of thousands of immigrants and is expanding, that means hundreds are being kept in solitary cells. In 2015, 13 percent of those in segregation were part of ICE's non-criminal population.

ICE sent out a directive about protocols for solitary confinement in September 2013. The memo said that “placement of detainees in segregated housing is a serious step that requires careful consideration of alternatives.” It also mandated regular review of long-term segregation cases to ensure that a detainee is not held in solitary confinement for longer than necessary.

When asked how long segregation could last for an undocumented immigrant, an ICE spokesperson did not respond directly. She instead referenced the 2013 directive that "requires agency reporting, review, and oversight of every facility decision to place detainees in segregated housing for over 14 days, and requires immediate reporting and review of segregation placements when heightened concerns exist based on the detainee’s health or other factors."

But from Free’s vantage point, the standards aren’t followed.

“Oversight is really weak and lax, and there are no real consequences to these facilities if they engage in serial violations,” Free said. “In my experience [with clients], the solitary confinement went on for months -- literally months -- without any indication of an official sign-off.”

He said that ICE never actually used the phrase, “solitary confinement,” substituting euphemisms such as “medical isolation,” “administrative segregation,” and “disciplinary segregation.”

“They use everything but ‘solitary confinement,’ and one has to ask why,” he said.

OUTSIDE IN A CAGE
Mulugeta, an Ethiopian immigrant who came to the United States as a child, asked to only use his first name because he intends to re-apply for U.S. residency after being deported. He was in immigrant detention between 2010 and 2014 while he fought his case and says he spent more than a year in segregation.

“It was a very long time, and a very tough experience,” he said. “Through those four years, I went through a lot of ups and downs.”

Mulugeta had a green card as a child. When he was 18, he and his friends were playing with a BB gun at one of their homes and someone called the police. Officers searched Mulugeta and found a Ziploc bag of marijuana, more than half an ounce but no more than five pounds, according to his 2009 court indictment. Though he said he had bought the drugs for personal use, he was convicted of intent to distribute. When he was released from prison, ICE was waiting to deport him. But first he was detained for another four years.


While in immigrant detention, Mulugeta was placed in a special housing unit after a fight broke out at the Oakdale Federal Detention Center in Louisiana, which then held immigrant detainees alongside convicts. He said he was defending himself from attackers when he accidentally fell onto a guard, whose leg broke in several places. As a result, Mulugeta was put in solitary confinement.

“There was no charge,” he said. “They just kept me there for no reason.”

While in segregation, Mulugeta received maybe one phone call a week, but he spent most of his time reading, he said. Sometimes, he went outside for sunlight; even then, they put him in an enclosed "cage" so he did not feel free, he said.

ICE does not comment on specific cases and did not confirm his account. Nor would an ICE spokesperson comment on whether detainees in special housing units are confined during recreation time.

Guards let Mulugeta shower sporadically, but they didn’t follow a regular schedule. When the cafeteria served pork, Mulugeta, an Ethiopian orthodox Christian, didn’t get to eat.

“What they did to that kid, I’ll never get over it,” said Paul Scott, his attorney.

Because ICE detainees are often mixed in with prisoners at county jails and private prisons, Mulugeta said that he and other immigrants were treated like serious offenders.

“Immigration detainees and a criminal are not the same,” he said. But, to the guards at the detention centers where he was held, he continued, “Everybody is the same.”

SEGREGATION FOR SAFETY
Many undocumented immigrants in the United States are seeking refuge from violence against them in their homes countries because of their gender or sexuality. Members of the LGBTQ community are especially at risk of being put into solitary cells because they are targets for sexual assault and bullying by other prisoners.

“I know that they’re also scared to remain in some cases in the housing unit with their biological sex, so it’s kind of a no-win situation when the only answer is to put people in a box,” Free said.

But solitary confinement does not always make people safe. Guards also have been accused of taunting transgender or gay prisoners about their lifestyles and other harassment.

In 2005, ICE detained trans woman Bamby Salcedo after she filed a request to change her legal name. According to her online bio, during her early life, “she fell into a deep cycle of drugs, crime, juvenile institutions and later, after immigrating to the US, prisons.” She told NBC that in California she survived by dealing illegal substances. After Salcedo got to San Pedro Detention Center, which lost its accreditation in 2007 and has since been shuttered, the guards placed her in a dorm with her biological sex, where men put their genitals in her face, grabbed her breasts and buttocks, and made sexually suggestive comments to her, she said.

“It was constant, and it was too much,” Salcedo added.

After she told officials that she had been assaulted, she said she was placed in segregation for a week.

“They said they were trying to protect me, but I was actually being punished further for just being me,” she said.

In 2015, ICE outlined a Transgender Care Memo, and an agency official wrote that its “ultimate goal with regard to this population is to find facility partners willing to adopt the best practices.”

But immigrant detainees are often put in solitary after accusing staff members or other residents of sexual assault, according to NBC News. Victims often believe they are being punished by ICE for reporting abuse.

Salcedo, who founded TransLatin@ Coalition, said that when she visits detention centers as an advocate, she hears similar stories to her own. She said that “really, things have not changed.”

ICE detainees can also be placed in solitary for protesting or for expressing mental health problems, advocates say.

Azadeh Shahshahani, legal and advocacy director at the Atlanta-based non-profit Project South, said that other immigrants at the Stewart Detention Center have been segregated “in retaliation” because they’ve gone on hunger strikes to spark administrative interest.

“They have filed complaints,” Shahshahani said. “Nobody has paid attention to them. And so basically their last option is to put their bodies on the line.”

And a mother at Karnes County Residential Center in Texas alleged that she and her 11-year-old son were put in medical isolation there as punishment after going on a fast. The account came from a congressional employee who had visited the center, Rep. Hank Johnson (D-Ga.) told NBC.

“I believe they were putting women and children -- young babies, infants even -- into solitary confinement for punishment measures,” he said.

During a hearing of the House Committee on the Judiciary in April 2015, Johnson asked former ICE Director Sarah R. Saldaña about the charge.

“I am not aware of that incident,” Saldaña said. “... If that is a fact, that disturbs me greatly.”

In its directive, ICE says that detainees on hunger strikes can be placed in segregation for their medical safety.

An ICE spokesperson wrote that, “The ICE family residential centers do not have segregation areas. Special monitoring or cohorting may be done in cases where it is deemed medically necessary.”

Advocates respond that while family detention facilities do not have cells explicitly used for solitary confinement, rooms in the medical wing can be used as segregation chambers.

If detainees admit to considering harming themselves, they are often subjected to segregation, which can exacerbate their issues. In its 2013 memo, ICE says that immigrants can be placed in solitary for “mental illness” or “suicide risk.”

“It has been my experience that detainees are reluctant to express anxiety or depression out of fear that that would lead to them being put into segregation,” Free said.

Attorneys sometimes try to use their clients’ segregation as a reason for release or transfer. Scott, for example, cited Mulugeta’s long-term stay in the special housing unit in a letter to the New Orleans field office director advocating for his discharge. He wrote that Mulugeta had been maced in his cell, and that he had been denied the opportunity to meet with his attorney on multiple occasions, which he called a “serious constitutional violation.”

But when asked, immigrant attorneys could not think of any lawsuits that specifically targeted the use of solitary confinement at ICE facilities. They also couldn’t cite any larger movement fighting against the systemic employment of segregation by ICE officials.

“As immigration lawyers, we do have unified efforts on a lot of things, but it’s usually not that,” Scott said.

Free echoed him, saying, “I don’t think that that exists.”

A little over a year after his release, Mendez recalled how many of those in segregation hadn’t done anything wrong, and how unreasoned discipline was. While he and other detainees were shut in for months, actual bullies and troublemakers faced no consequences for their actions, he said.

“There were some people they punished for no reason, and others who were guilty but were allowed to live freely,” Mendez said.

Even after leaving detention, he insists that he never had sexual relations with his then-boyfriend while they were at Stewart.

“We only sent each other letters,” he said. “What they accused us of never happened.”


This story uses functionality that may not work in our app. Click here to open the story in your web browser.
          Extract names and emails from a text file   
I have a recurring need to extract full names and email addresses from a plaintext archive of email messages. The archive is created by selecting a bunch of emails in Mail, copying them, pasting into TextEdit, and converting to plain text.

For each message in the file, the first line contains the information I wanted:
From: Joe Example <joe@example.com>
I wanted one email address per line, suitable for pasting into another location. I am far from an expert with the bash shell, but here's what I came up with—I imagine there are many more efficient ways to do this, as I'm sure experienced perl, sed, awk, etc. users may point out. Note that this is highly dependent on the format created by Apple's Mail app in OS X 10.8.

grep 'From:' /path/to/archive.txt | cut -f2 -d\< | cut -f1 -d\> | pbcopy

The grep bit pulls out the entire From: line, then the first cut ...
          Send Terminal output to iCloud    
Imagine that you run a script automatically on your Mac, and that you want to check the result of that script. There are many ways you could do this, such as remotely connecting to the Mac, or sending the results by e-mail. But with iCloud, you can also save the output to a file and put it on iCloud, where you can access it with your favorite iCloud-compatible text editor on another Mac, or on an iOS device.

To do so, simply send the output of the script to a file like this:

~/Library/Mobile\ Documents/com\~apple\~TextEdit/Documents/filename.txt

So, to save a list of a directory's contents, you'd use this:

ls -al > ~/Library/Mobile\ Documents/com\~apple\~TextEdit/Documents/list.txt

That saves a file called list.txt in TextEdit's Documents folder. Look inside the ~/Library/Mobile\ Documents folder for the paths to other apps you have that can use iCloud. Each folder in the Mobile ...
          Snappy Driver Installer Origin R593 [Драйверпаки 17064] (2017) PC   





Версия программы: SDIO R593 от 01.07.2017 / DP 17064 от 29.06.2017

Официальный сайт: sdi-origin

Разработчики: SamLab (драйверпаки), Glenn Delahoy, BadPointer (программа).

Язык интерфейса: Русский, Английский и ещё 33 языка.

Лечение: не требуется



Системные требования:

Windows 2000 | XP | Vista | 7 | 8 | 8.1 | 10



Описание:

Snappy Driver Installer Origin (SDI Origin) - портативная программа для установки и обновления драйверов, не требующая подключения к интернету. Является лидером среди программ этого класса по точности подбора драйверов и скорости работы. При ранжировании драйверов отдает приоритет более подходящим драйверам (невзирая на наличие более новых версий), чтобы минимизировать риски для рядовых пользователей. Специалисты могут оценить большой объем информации, выдаваемый о драйверах и возможность выбрать альтернативный драйвер.



Основные особенности SDIO:
Чем этот релиз отличается от имеющихся?
Драйверпаки, входящие в состав раздачи
Как сделать резервную копию драйверов?
Ключи запуска из командной строки и другие ключи для работы с программой
Разные полезности в работе с программой, которые надо знать
Запись сборки на DVD
Изменения
Как правильно скачать обновленную раздачу
Скриншоты

Категория: Софт
          Update - Freeware - CSVFileView v2.35   
CSVFileView is a simple, standalone program that lets you open and view Tab or Comma delimited text files (.csv,.txt) without the need for any Office program. You can view all lines, sort the them by....
          Easy form building for terminal windows: jsonwidget-python   

I’ve been working on a project to make building forms really simple. My latest work is “jsonwidget-python” for terminal-based applications (like you would use via SSH or local terminal on Linux and Mac). It’s all very retro, but terminal windows are still very much in use for buzzword-compliant activities like configuring virtual machines for cloud computing, in addition to being the preferred user interface for a lot of people out there (*cough* nerds *cough*).

This new project builds on some earlier work that I’ve retroactively renamed “jsonwidget-javascript“. jsonwidget-javascript is AJAX-y generation of forms inside a browser based on a JSON schema. jsonwidget-python is intended for terminal users at first, but will extend to other contexts as well.

Here’s a simple screenshot to show what’s going on:

Simple Address Entry in jsonwidget-python

Simple Address Entry in jsonwidget-python



There’s nothing too fancy in this screenshot, but this is probably the most typical case. What you see there is deceptively simple, but there’s a lot of complicated stuff going on under the hood. Most of the complicated parts (drawing the fields, handling focus, handling keyboard shortcuts) is being provided by urwid, an excellent Python-based library for building terminal-based user interfaces. jsonwidget is providing a further abstraction that hopefully makes it even simpler to provide this type of interface, though sacrificing much of the flexibility of programming directly against urwid. Here is the complete configuration file (the schema) describing that address entry form, as well as the documentation for the schema format. jsonwidget-python is compatible with jsonwidget-javascript, so the same schema also works in jsonwidget-javascript.

jsonwidget-javascript screenshot with simple address entry form

jsonwidget-javascript screenshot with the same simple address entry form

One nice feature on display even in the simple demo is the ability to have arrays as fields. You’ll notice that the phone number field has two phone numbers, and offers to let you add a third. There’s no artificial limit on the number of phone numbers that one can enter using this tool, beyond the usual limits of computer memory, patience, etc.

It also handles more complicated schemas if your application calls for it. For example, let’s say that one wanted to build a real address book application. Clearly a lot more flexibility would be needed than merely allowing multiple phone numbers. Here’s a screenshot showing a much more sophisticated schema that’s more like what real address book applications allow:

More complicated data entry with jsonwidget-python

More complicated data entry with jsonwidget-python

So, what is this good for? Well, I think it’ll be good for a lot of stuff. I suspect it might be a very good user interface to stick in front of a augeas-based user interface. I think it might also be a good tool for building a terminal-based frontend for editing CouchDB and similar databases. In particular, I’m thinking about making a desktop-couch interface for contact editing. Another idea I’ve dabbled with is automatically building a UI based on parameters to Python’s optparse. Yet another thought is an editor for Python’s ConfigParser or alternatively ConfigObj. Lots of different possibilities here.

I’m particularly interested in suggestions for applications that people would use. So, if you have an application for this type of thing that you’re reasonably sure you’d use if I did a good enough job implementing, let me know.

Of course, that’s probably getting a little ahead of myself. There’s a number of things on the roadmap to do, such as more kosher packaging for easy_install and for Linux distros, as well as the ability to edit arbitrary JSON. I also need to investigate SitePen’s JSON schema work, which they appear to be well along toward some sort of RFC (probably informational, but that can be enough for something like this).

Anyway, if this sort of thing is up your alley, please give it a whirl and let me know what you think. You can download jsonwidget-python and give it a spin. I’ve set up a jsonwidget mailing list which you’re more than welcome to use, but you can also just post a comment here or contact me via email.

Update: March 9 – there’s now several ways of getting jsonwidget:


          《91看電視直播》v1.7.0 優化節目流暢度、部分細節的修改,港澳台頻道一網打盡!   
由於大陸廣電總局新政策,自去年十月起,大陸出品的電視軟體都移除了海外節目源,但有些軟體留下了巧門,91看電視就是其中之一。

【軟體名稱】- 91看電視直播 v1.6.9 APP
【版本資訊】- v1.7.0
【軟體大小】- 5.7 MB (APK)
【更新日期】- 2017-6-29
【使用權限】- 免費版
【系統支援】- 支援 Android 2.2上版本


軟體簡介
經常點按首頁右上角旋鈕更新節目源、節目表
91看電視安卓版由就要看電視聯合可可工作室精心打造,努力打造Android手機上頻道最全、線路最多、最流暢的直播軟件
91看電視安卓版目前具有以下特色:
*擁有1000多個個電視頻道直播
*每個頻道提供多條線路選擇,達到最流暢清晰
*央視、衛視、體育、地方和港澳台頻道一網打盡,只有你想不到,沒有看不到
*有線數字付費頻道免費看
*完美支持CCTV-5、湖南衛視、江蘇衛視等熱門頻道高清直播
*超強自定義,支持用戶打造專屬自己的TV


軟體功能
1.支持1800+個電視頻道直播
2.高清流暢便捷的用戶體驗
3.央視、衛視、地方、體育、影視、動漫等頻道應有盡有
4.每個頻道支持多條線路選擇
5.支持加載用戶自定義,定義自己個性化的專屬電視
6.支持400多個央視衛視地方台的7天回看
7.頻道史上最全,只有想不到,沒有看不到


1.6.5前安裝教學
初次安裝91看電視,並下載直播地址後,台、港、澳、海外等選單內容仍是空白的,退出91看電視,將tvlist.txt檔貼在手機儲存目錄 /sdcard0/91kds/ 之下然後在放入一個內容空白檔名必須是 listconfig.txt 純文字文件檔,然後再次開啟91看電視,手動更新直播地址,在右上角的地方點一下更新頻道,台、港、澳、海外節目源就會出現了。


檔案下載
91看電視直播 v1.6.1 (APK | tvlist.txt | listconfig.txt)
91看電視直播 v1.6.5 (APK | tvlist.txt | listconfig.txt)

1.6.6後安裝教學
將檔案  listconfig.txt,放到手機儲存目錄 /sdcard0/91kds/ 之下,然後再次開啟91看電視,手動更新直播地址,在右上角的地方點一下更新頻道,台、港、澳、海外節目源就會出現了。

本次更新
1.修復部分情況下播放廣告
2.優化節目流暢度

檔案下載有問題:請參考此篇

檔案下載
91看電視直播 v1.6.6 (APK | listconfig.txt)
91看電視直播 v1.6.7 (APK | listconfig.txt)
91看電視直播 v1.6.8 (APK | listconfig.txt)
91看電視直播 v1.6.9 (APK | listconfig.txt)
91看電視直播 v1.7.0 (APK | listconfig.txt)



          Upgrade you old laptop with a Raspberry Pi - take two   



What if you want to connect your Raspberry Pi tailless but use a Windows OS on your laptop?
Well don't despair, there are ways to do that and a few tricks that will allow you to do so under several circumstances.

So let's recap what do we want to achieve. We want to connect a Raspberry Pi to a Windows computer, typically a laptop so that we can use the Keyboard, the Mouse and the Monitor of the laptop and replace its "engine" with a Raspberry Pi.
Old laptop or not this solution also makes for a great way to make your Pi a lot more portable. In this tailless configuration the only cable you might have is the power supply to your laptop!

Be weary that I have used  a Windows 7 for the laptop and Raspbian Jessie for the RPi. Things may be slightly different using other versions.

This article should also serve as an Errata Corrige for my previous one with regards to the Pi's support for Link-Local address. I will amend the previous post ASAP.

Requirements


Laptop

HW:
At least two USB ports
Ehernet adapter
WiFi card (optional)

SW:
A functioning Windows OS
VNC or RDP client

RPi

HW:
WiFi card
Ethernet card

SW:
VNC or RDP server (which regrettably needs to be installed upfront)

To glue them together we also need a USB Y cable and a 20-30cm Ethernet cable (Cat 5e or +) straight or crossover.

Networking


The first hurdle that we need to solve is how to try to make the laptop talk to the Pi at IP level. For that to happen the two must be connected at layer 1 and 2 of the OSI stack. The Ethernet cable plugged in your laptop's NIC and in the Pi's one does just that. It provides physical connectivity and data link. What we don't get as easily is two IPs in the same subnet.
This can be achieved in many ways, let's see a few.

Bonjour Windows


First things first though let's talk about how to allow Windows to resolve the

raspberrypi.local

That we are going to use to connect to the Pi independently from its IP address. Dealing with IP addresses is in fact quite a pain, that's why DNS came about after all. In my previous article I mentioned the good that comes with mDNS so that you can reach raspberrypi.local independently to which IPv4 or IPv6 you are using on the Pi.

Windows does not come natively with mDNS but there is a piece of software that we can install from Apple to install this protocol under Windows. Apple's interpretation of mDNS is called Bonjour and can be found here

Installing it is extremely easy and you will be able to use it straight away. Thanks Apple!
Once installed if you check the services running on your laptop you should see something like this:



Back to IP now. The first thing you should do it to disable any protocol and service that is not quite necessary from the Local Area Connection Property page of your laptop Ethernet's card. This is what I did:



Using APIPA


Automatic Private IP Addressing is Microsoft's interpretation of Link-Local address and it is a way of auto assigning IP addresses to hosts within a network segment without the need for a DHCP (service that is typically the job of your home router or NAS). A Class B of IP addresses has been reserved just for this purpose.

169.254.0.0/16 or 169.254.0.1 through to 169.254.255.254 with 169.254.0.0 being the subnet and 169.254.255.255 being the broadcast address. The network mask is 255.255.0.0.

Which in itself is quite a lot of technical gibberish but bare with me.

Now in the absence of a DHCP a Windows system (or any other OS supporting Link-Local address) will be configured as 169.254.x.y and this is the case for the Pi too with Raspbian Wheezy or Jessie.

I know I have said in my previous article that it didn't but ... it turns out it was grapevine knowledge which I would have been better off verifying first. I'll amend the other article ASAP.

The following screenshots illustrate the status of the adapters and of some other aspects at the network level of both the laptop and the RPi.





Note that once the two hosts communicate with each other the IP of the RPi will be evident in the ARP cache of the laptop



Booting your Pi after plugging the network cable and power is enough for your laptop to resolve raspberrypi.local in an IP 169.254.x.y with no extra hurdles. At this point you could already connect to your Pi via VNC by configuring the service on the Pi as I explained in my previous post




About IPv6


All works well also with IPv6


The Pi's sets itself up with an IPv6 and from the laptop pinging raspberrypi.local will successfully resolve and reach the Pi's IPv6 address:


As well as the IPv4.

These are screenshots of the laptop's network info:




Static IP addresses


If your laptop has an IP configured for its Ethernet adapter that you are not willing to alter then you can use the cmdline.txt to configure the Pi with an IP in the same subnet as you laptop. Easy!

dwc_otg.lpm_enable=0 console=ttyAMA0,115200 console=tty1 root=/dev/mmcblk0p6 rootfstype=ext4 elevator=deadline fsck.repair=yes rootwait ip= x.y.z.w

You need to edit the cmdline.txt file in /boot and add the part highlight in bod above. Make sure that all the text is on one line only.

The format is ip=<client-ip>:<server-ip>:<gw-ip>:<netmask>:<hostname>:<device>:<autoconf> so you can add other parameters if you need to. The netmask might be one that you want to set right.

More simply you could configure the eth0 of the Pi once it is booted if you have access to the GUI before making it tailless on your laptop. A good time to do this is when you install you VNC server


The following screenshots illustrate the status and configuration of the adapters and of some other aspects at the network level of both the laptop and the RPi.






DHCP via ICS


An easy enough solution to connect to your Pi is to leverage on the Internet Connection Sharing functionality of modern Operating Systems like Windows. ICS will let you share a connection on your laptop via another one. Your laptop may have a WiFi card connecting you to the Internet and an Ethernet adapter. ICS will allow you to share the WiFi via the Ethernet NIC, anything connected via an Ethernet cable to the laptop will receive an IP address and will be able to use the WiFi as a gateway to the Internet.

Now we could be interested in just that but I said that we wanted to use old laptops just as KVMs not also as Internet gateways, there is nothing wrong with that but accessing the Pi from elsewhere than the laptop with this configuration may be troublesome if not plain impossible.
What we are very much interested in is the fact the ICS transforms the Windows OS in a DHCP on the shared network adapter so that we can have our IP!

To configure ICS in Windows the sharing must be activated on the interface that we are going to be using as gateway. In my example below I am using my WiFi as gateway and activating the share on the local network adapter



Once that's done the local network adapter will receive an IP address in the range 192.168.137.0/24 which topically will be 192.168.137.1


Note that as the laptop provides an IP to the Pi, the Pi's address can easily be found by looking at the ARP cache of the laptop



The Pi receives an IP like 192.168.137.x as did mine


All this good though comes at a price. The DNS resolution and the default route of the Pi are configured as if we wanted to use the laptop as our gateway. In order to use the Pi's WiFi card instead we need to alter the file
/etc/resolv.conf


And comment out the line which bares the IP of the laptop.
Next we need to remove the default route once that has once again the IP of the laptop by running:

sudo route del -net 0.0.0.0 gw 192.168.137.1

Lastly we need to setup the IP as static on the Pi as explained in the previous section and this time use the IP we were given with ICS which was 192.168.137.136. Make sure to untick "Automatically configure empty options".


Tip


You can change the subnet 192.168.137.0/24 to whichever you prefer by editing the registry

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SharedAcces

there is a nice article explaining how to

I only have an Ethernet card on my old laptop


In this case we need to trick the OS into believing that it has a connection to share. The best way to do this is to create for example a dialup connection as in here:



or add an additional WiFi card or other network interface via PCMCIA or a bluetoooth adapter but that would be quite inefficient and rather laborious. Unless there are some very specific needs I would just create the fake dial-up.

What else is there to say?

All of the above IP options will require in the majority of cases a one off connection to a monitor, keyboard and mouse so factor this in if you are off somewhere with a brand new SD card for your tailless Raspberry Pi.

Which of these setup is best it largely depends on your needs but the Link-Local address / APIPA seems by far the preferable especially when using Bonjour.
The ICS is certainly the most confusing and complicated but it can have its uses. If your "portable" lab becomes a bit overcrowded and you need a DHCP for some of the devices, then ICS could be your friend. Here is an example:


If your "portable" setup becomes a bit more complex and you have devices that need an IP delivered with a DHCP, ICS is your friend.  In the picture above I have a tailless Pi connected to a switch to which are connected the laptop and a security camera. The camera can only do static IP or DHCP hence the need for ICS when on the move.


Also ICS inherently allows you to know the IP of its clients as by assigning them an IP that also generates an entry in the ICS's ARP cache. By inspecting it we can immediately tell which IP have been assigned making connecting to them a lot more easy even in the absence of mDNS / Bonjour.

A good part of what has been said in this article and in the previous one applies to the Raspberry Pi A/A+ and to the Zero but not in all cases. These configurations are meant to use a real Ethernet card and won't always work for the likes of the Ethernet Gadget as in this article from Adafruit. I will explore this at some point and see what of the above is applicable in this case and what should be adjusted.

The cables to make the Pi tailless are only two, could I use a Wireless connection instead of the short Ethernet? I don't see why not but it would make things a bit more complicated and confusing. The Ethernet cable guarantees a really good connection to the laptop and it is not prone to the various problems the WiFi inherently has. Tiding up the Ethernet with the power cable should not be a big problem and I would stick with that. This is until the USB gadget configuration is easier to setup and use, that may be a real game changer.




          El primer virus en un ordenador personal apareció en un Apple II   
En 1981, el ordenador más extendido no era el IBM PC (el cual salió al mercado justo ese mismo año) y tampoco lo era por lo tanto el sistema operativo MSDOS. El más utilizado en aquella época era el Apple II (sobre todo en EEUU) por lo tanto era de esperar que el primer virus fuera creado para ser ejecutado en su plataforma, en concreto para DOS 3.3. En 1982 apareció el primer virus de ordenador con capacidad para infectar otros ordenadores y expandirse. Su nombre era Elk Cloner y fue creado por un chico de 15 años.

Si tenías la suerte de tener una de las magníficas unidades de disco para el Apple II diseñadas por Wozniak, era muy probable que fueras infectado por Elk Cloner. El virus interceptaba algunos comandos muy utilizados por el DOS, como RUN, LOAD, BLOAD y CATALOG. Dependiendo de un contador que iba guardando en el sector de arranque del disco, este ejecutaba una acción diferente. Por ejemplo podía infectar otro disco, reiniciar el Apple II, imprimir la versión del virus, invertir la pantalla, ejecutar sonidos en el altavoz, imprimir texto en pantalla con un flash, cambiar las letras  de la pantalla o provocar un error de sistema. Además si el contador tenía el valor 50 y se pulsaba el botón RESET, el virus mostraba en pantalla el siguiente poema:

Figura 1. Poema escrito en pantalla por el virus Elk Cloner. Fuente.

Más allá de estos "inocentes" payloads, el virus no tenía una incidencia grave sobre el sistema. En cambio lo que le hacía realmente especial, era su capacidad de expandirse infectando cualquier disco de 5 1/4 pulgadas que se insertaba en un sistema con el virus residente en memoria. Este almacenaba el virus en el sector de arranque y de esa forma se aseguraba que sería ejecutado en otro ordenador cuando este arrancara desde el disco. Para no reescribirse una y otra vez, el programa dejaba una firma para identificar que el disco había sido infectado. Este virus apareció cuatro años antes del primer virus creado para un sistema Microsoft, el famoso "Brain" el cual apareció en 1986.

Elk Cloner fue creado por Rich Skrenta en Apple II como parte de una broma sin imaginarse las implicaciones que su creación llegaría a tener. Al principio, no tuvo mucho impacto, ya que los discos infectados se quedaron dentro de su círculo de amigos pero luego comenzó a expandirse cuando Rick empezó a compartir copias piratas de programas en discos infectados con su virus. Además Rick era habitual de un club de ordenadores en Pittsburg e intercambiaba regularmente programas con otros miembros de dicho club. Al menos parece confirmado que le entregó uno de esos discos con el virus a uno ellos e incluso llego a darle uno de esos discos infectados a un primo suyo que trabajaba en la US Navy. En aquella época no había ningún antivirus que pudiera detectar la infección lo que facilitó su expansión entre la comunidad de usuarios de Apple.

Figura 2. Parte del código fuente de Elk Cloner donde almacena el texto del poema

Rich recibió su ordenador Apple II en 1980 como regalo de Navidad. Empezó programando en BASIC pero pronto se interesó por el lenguaje Ensamblador debido a su potencia. Investigando el hardware y el software del Apple II, encontró algunos agujeros de seguridad en una de las aplicaciones del núcleo del sistema (System Monitor) que más tarde utilizó en el código de Elk Cloner. Tardó dos semanas en escribir el programa en lenguaje Ensamblador para el microprocesador 6502 y tenía bastante nivel técnico a pesar de su sencilla operativa. Al cabo del tiempo, viendo la gran repercusión que tuvo su programa, él mismo creo una herramienta para detectarlo y desinstalarlo. Finalmente Rich terminó trabajando en seguridad informática, en concreto en un proyecto de Sun Microsystems relacionado con criptografía. Actualmente es el CEO en Blekko, un nuevo buscador de Internet, que ha sido adquirido por IBM

Es curioso que durante al menos diez años, nadie se tomó muy en serio el programa creado por Rich que más tarde llegaría a convertirse indirectamente en una industria que mueve hoy día miles de millones. Sólo cuando comenzaron a aparecer otro tipos de virus, sobre todo en la plataforma Windows (como por ejemplo Brain), fue cuando comenzó a tomarse en serio este tipo de amenaza. 

          Sitemaps, day 3   

Since I've been playing with sitemaps, of course I created one for the RSS 2.0 site.

And I've checked to see that the maps I deployed for scripting.com are properly updating, and they are.

But when I checked, I realized that I would have done it differently, so that the sitemaps, in adition to helping search engine crawlers, might be interesting things for human beings to read as well.

I refer back to sitechanges.txt, a simple project I was doing in 1997 that was like sitemaps. It was also before I did XML. smile

A picture named goodbye.gifThe idea was that the content server was responsible for providing a daily reverse-chronologic list of pages that had changed. Then a crawler would keep track of when it had last visited my site, and only suck down the files that had changed since then. This would enable search engines to be more efficient, and provide more current content. It was nice because you could read it yourself and see what had changed. Contrast this with sitemaps, where you have to go hunting for the changes, it's no better a user interface for finding the new and newly updated stuff than the file sytstem is. I was kind of disappointed.

Another thing I would have done differently is allowed sitemaps to include other sitemaps. There really is no need for two file types, just let me link to an index from an index, much like inclusion in OPML 2.0. This added an extra layer of complexity for everyone implmenting sitemaps on moderately large sites, or old ones where some content changes frequently and other content not so frequently (like scripting.com).

However, on balance, it's a great thing that all these companies got together and did something to make the web work better. We need more of that!

If anyone is working on more stuff like this, I am available to review it before it's cast in stone.


          James Hosty   
http://mcadams.posc.mu.edu/hosty.txt BOCHAN: In your book, you also describe the shock you initially felt when you saw your name and license number in Oswald's notebook. HOSTY: Well I was a little bit, but then I knew exactly how it got there. You see, I had given my name and phone number to Ruth Paine. I told her to give me a call if she could find out Oswald's address. Now I want to add at this time: everyone seems to think that I was trying to interview Oswald. I couldn't interview ...
          Atlas: Smart Auto Completion   

Auto Completion without a Web Service



To get the latest version that works with Beta 2, please visit my new blog:
http://weblogs.asp.net/infinitiesloop/



If you haven't heard of the Atlas project yet, this article may not be for you. But even then, reading this may give you a clue as to the capabilities of Atlas. To quote the Atlas site,

"Atlas" is a free framework for building a new generation of richer, more interactive, highly personalized standards based Web applications.

One of the innovations Atlas brings to the table is its level of integration with the server side. It is because of this integration that makes it possible for you to take advantage of Atlas' advanced client side features without leaving the comforts of the server side of the world.

But despite this client/server integration, Atlas is still a truly client side framework, one that can be integrated with any server side back end, not just ASP.NET. Its design must take that into consideration, because everything it does must (and should) be a purely client side game. But if you are definitely using Atlas with ASP.NET, it would be nice if you could rely on deeper integration into the rich asp.net server side world. And that is what this article is all about.

Using the Auto Complete Extender


First, lets go over how the built-in stuff works. The built-in Atlas AutoCompleteExtender adds intelligent auto completion behavior to a textbox. Here's how you set one up:

First thing you need is a script manager:

<atlas:ScriptManager ID="ScriptManager1" runat="server" />
And then place a textbox and attach an AutoCompleteExtender to it:

<asp:TextBox id="txt1" runat="server"/>

<atlas:AutoCompleteExtender id="ext1" runat="server">
<atlas:AutoCompleteExtenderProperties Enabled="true"
ServicePath="SuggestionService.asmx"
ServiceMethod="GetSuggestions" TargetControlID="txt1" />
</atlas:AutoCompleteExtender>
The behavior uses the given ServicePath and ServiceMethod properties to call the specified Web Service whenever suggestions are needed. The web service, written by you, can query a database or do whatever it needs to do in order to calculate the suggestions. Here is an example of a web service that provides the necessary method signature:

[WebService(Namespace = "http://tempuri.org/")]
[WebServiceBinding(ConformsTo = WsiProfiles.BasicProfile1_1)]
public class SuggestionService : System.Web.Services.WebService
{
public SuggestionService()
{
}
[WebMethod]
public string[] GetSuggestions(string prefixText, int count)
{
return new string[] { "abc", "def", "ghi" };
}
}
The prefixText parameter is the text the user has entered thus far, and the count parameter is the maximum number of suggestions you should return. And just like that, we have auto-completion!


Auto Completion via a Web Service

Going one step further


It's the greatest thing since the variable geometry nacelle. But, there are some limitations to this approach. Because it must call a web service, the logic for determining the suggestions is isolated from the page that contains the textbox. That means you do not have access to any state information that is available on the page. In many cases that may not be an issue. It may even be good design to isolate that logic into a web service. But because you lack that state information, you are forced to configure the web service via global means such as the web.config. For example, a connection string. What if a developer wants auto completion for different database than the one the rest of the application is using? What if the suggestions that you want to show depend on the value of another control on the page, such as a date range that should limit the search results of the query? Or maybe you have a "product category" dropdown and the textbox should only suggest results for products that are in that category? What if you are a control developer (like me) and you want to create a custom textbox control that has auto completion built into it -- how will you effectively package together your custom control and the web service? Why should I have to create a web service to provide auto completion at all?

Why can't I wield the power of auto-completion all within the page itself?

Yes... Let's do that. Presenting the SmartAutoCompleteExtender and the SmartTextBox. In creating these two controls I had a strategy in mind:

  1. Create an Auto Complete extender that uses a CALLBACK rather than a web service. This will allow all the logic to calculate the suggestions to live on the same page.

  2. Support a Web Service too, for flexibility.

  3. Utilize the existing auto complete behavior script, so I don't have to write complex JavaScript.

  4. Raise an Event in the Extender control when suggestions are needed. The event model will allow users of the extender to provide suggestions easily within the page and multiple listeners could potentially work together to create suggestions from different sources.

  5. Create a TextBox with a built-in Auto Complete extender, so users of that control can provide auto completion without even knowing what Atlas is


This being my first custom extender for Atlas, I did run into a few problems. But in less than a day I was able to piece these controls together. If I had to do it again, already having learned all the lessons that I did, I could probably do it on the order of a few hours. This is a testament to the extensibility of Atlas. More on that later.

First, let us look at the SmartAutoCompleteExtender. To use it I must register my custom control assembly and namespace with the obligatory Register directive at the top:

<%@ Register Assembly="Infinity.Web" Namespace="Infinity.Web.UI.WebControls" TagPrefix="i88" %>
i88 is a nice tag prefix I like to use. Now lets replace the built in atlas extender with the smart one:

<i88:SmartAutoCompleteExtender Enabled="true" id="ext1" runat="server">
<i88:SmartAutoCompleteProperties
TargetControlID="txt1" />
</i88:SmartAutoCompleteExtender>
Notice there's no ServicePath or ServiceMethod specified. This extender uses an event on the server side instead. But if you wanted to use a web service, it supports that too:

<i88:SmartAutoCompleteExtender Enabled="true" id="ext1" runat="server">
<i88:SmartAutoCompleteProperties
TargetControlID="txt1"
Mode="WebService"
ServicePath="SuggestionService.asmx"
ServiceMethod="GetSuggestions" />
</i88:SmartAutoCompleteExtender>
But, we're more interested in the event. Just to keep these code lines shorter (screen real estate is prime on this blog .. I need a better medium!), create a namespace alias in your code behind:

using I88=Infinity.Web.UI.WebControls;
Then you can hook into the event on the extender like so:

protected override void OnInit(EventArgs e)
{
this.ext1.AutoCompleteCallback += new I88.EventHandler(ext1_AutoCompleteCallback);
base.OnInit(e);
}
AutoCompleteCallback is the event that fires when the client side needs suggestions. Now for the event handler itself:

void ext1_AutoCompleteCallback(object sender, I88.AutoCompleteEventArgs args)
{
int count = args.Count;
string prefix = args.Prefix;

args.CompletionItems = new string[] { prefix + "A", prefix + "B", prefix + "C" };
}
The event argument passed to the event handler contains three properties:

  1. Count - The maximum number of suggestions that should be returned

  2. Prefix - The characters entered so far into the textbox

  3. CompletionItems - a string array of suggestions to be set by you.
Just for demonstration and to prove it is working, we take the prefix and create three suggestions by adding "A", "B" and "C" to it. Here we go:


Look ma, no web service!

Excellent. The beauty of this is that it really was not very hard to do. I was able to reuse the existing javascript behavior that is defined for the built-in AutoCompleteExtender. The custom behavior javascript simply creates an instance of the built in behavior and lets it do all the dirty work. All that was required is to hook into the timer object it uses by replacing its event handler with my own, and replacing existing methods with your own is easy to do with javascript. To do the actual callback, it uses asp.net's built-in javascript function for that, too: WebForm_DoCallback. By passing it the ID of the extender control, and implementing ICallbackEventHandler in the extender control, its easy to raise the auto complete event.

Going one step further, again


Indeed why stop there... wouldn't it be nice if you didn't even need to create an extender? Why can't auto complete be a built-in feature of the textbox itself? Man you sure are demanding. Fine...

Get rid of the extender declaration. Then replace the TextBox with, well... the i88:SmartTextBox:

<i88:SmartTextBox ID="txt1" runat="server" EnableAutoComplete="true" />
Don't forget the EnableAutoComplete="true" attribute, because by default it is disabled. You might wonder why I didn't call this control "AutoCompleteTextBox" instead. Well because I don't believe in naming controls (or classes) after their features. The SmartTextBox might one day be extended to support many other advanced features, of which Auto Completion would be just one. Just planning ahead a little. "Smart" may not be the best name either, but its the best I could come up with ok? :)

Internally, the SmartTextBox creates a SmartAutoComplete extender for you. It also surfaces a property that allows you to have access to all the same properties the extender does. So once again you can use a web service or a callback, whatever floats your boat:

<i88:SmartTextBox ID="txt1" runat="server" EnableAutoComplete="true"
AutoComplete-Mode="WebService"
AutoComplete-ServicePath="SuggestionService.asmx"
AutoComplete-ServiceMethod="GetSuggestions" />
But as before, we're only interested in the callback mode for this article. The SmartTextBox also surfaces the event itself -- so if all you knew about was the SmartTextBox control, you could quickly and easily add custom auto completion to it, without ever hearing the word "Atlas" muttered. Change the event handler like so:

protected override void OnInit(EventArgs e)
{
this.txt1.AutoCompleteCallback += new I88.EventHandler(txt1_AutoCompleteCallback);
base.OnInit(e);
}

void txt1_AutoCompleteCallback(object sender, I88.AutoCompleteEventArgs args)
{
int count = args.Count;
string prefix = args.Prefix;

args.CompletionItems = new string[] { prefix + "A", prefix + "B", prefix + "C" };
}
And put it into action... remember to type at least 3 characters, because the default minimum length is 3. That is a property you can change if you like.


Look ma, no web service AND no Extender!

Yes I cheated -- this screenshot is exactly the same one as before. But that's because it looks exactly the same anyway. Even the 'view source' on the page looks exactly the same. The only difference is the declaration in the form.

Download the source code here!

I should also mention that the project type is the Web Application project option introduced by Microsoft, described in detail and available for download here. If you don't have it already, you should. It will be baked in on the first service pack for VS2005 anyway. If you'd rather not, then you'll have to rebuild the project file, or perhaps you can change the project type guid so it's a class library project instead. Sorry for the confusion.

Use the source however you like... change it, trash it, claim it as your own, I don't mind :) All I ask is you send some friends over to this tiny corner of the internet. I enjoy having readers. :)

Happy coding!

UPDATE 06/08/2006:

Someone pointed out a bug with the project on the asp.net forums. Click here to read the post. I have re-uploaded a new project with the fix.

I also added a new property to the extender: EnableCache (boolean). You see, the built in behavior has a nice little performance feature built into it. Once it requests suggestions for prefix "abc", it remembers them in a cache variable on the client. So if you type in "abcd", wait for the auto complete to occur again, then delete the "d", the behavior is able to recall the suggestions it already calculated without calling the webservice or performing another callback. But this presents a problem in callback mode if you try to use this custom extender in the ways it is advertised, where the suggestions may depend on the state of other controls on the page. The state of those controls may change, and the cache of suggestions will be wrong. And so it was simple to add the EnableCache property. Normally you should leave this option alone. Only disable the cache if you know you might give different suggestions for the same prefix text, because the values are dependant on other controls.

And finally, I have also included a sample web application that uses the SmartTextBox in callback mode. It also contains a RadioButtonList, and the suggestion items vary based on the selected value of the list.

Thanks to ethos42 for the bug report!
Download the Source Code here!

UPDATE 06/10/2006:

Unfortunately for me but fortunate for you guys, jjradke pointed out another bug. The event will fail to fire if you place the textbox within a naming container (for example within a template column of a datagrid, among other things). The bug was due to it using the ClientID instead of the UniqueID... which has been fixed!! If you already downloaded the source you can easily patch your copy by changing this line (approximately line 90 in the SmartAutoCompleteExtender.cs file)

writer.WriteAttributeString("id", this.ClientID);

To this:

writer.WriteAttributeString("id", this.UniqueID);

Thanks for the bug report!

UPDATE: 08/24/2006:

I'm sorry to have put you guys through downloading from FilePlanet. The link eventually broke, but thankfully I've found a more suitable home for the source code. The download links should work once again.
          Composite Controls made easy   
Scott Gu has an interesting article in his blog, pointing to another article in MSDN, about creating Composite Controls.

Its a great read, a must read, even.

I just have one problem with it. Near the beginning of the article there is some sample code as follows:

public class LabelTextBox : WebControl, INamingContainer
{
public string Text {
get {
object o = ViewState["Text"];
if (o == null)
return String.Empty;
return (string) o;
}
set { ViewState["Text"] = value; }
}
public string Title {
get {
object o = ViewState["Title"];
if (o == null)
return String.Empty;
return (string) o;
}
set { ViewState["Title"] = value; }
}
protected override void CreateChildControls()
{
Controls.Clear();
CreateControlHierarchy();
ClearChildViewState();
}
protected virtual void CreateControlHierarchy()
{
TextBox t = new TextBox();
Label l = new Label();
t.Text = Text;
l.Text = Title;
Controls.Add(l);
Controls.Add(t);
}
}
This is supposed to be an example of how you can use composite controls to make your life easier. This one allows you to set a label to a textbox, which redners before the textbox. Great use of compositing.

Except for one little detail...

Before I explain the problem let me just say... details like this are really frustrating. ASP.NET is very powerful, but with that power comes some responsibility. It is very easy to do things the "wrong" way. It's also very, very easy to do things the right way, but you have to know the difference. And knowing the difference means having a fairly deep understanding of how the framework, well, works. This and my previous post on ViewState are just two examples of these mundane yet crucial details.

And now on to the juicy stuff...

My problem with the example code is really a state management thing. When it creates the textbox and label, it "copies" the Title and Text properties, which are ViewState-based properties of the composite control, into them. That raises some red flags to me, because as soon as you are finished copying the values into the child controls, your public properties are now completely disconnected from them. If someone, somewhere, for some reason, changes your Title or Text property value after this code occurs, it's too late. They will be dumb-founded as to why your control refuses to listen to their instructions (it will still render to 'old' value).

THE SOLUTION

The solution is so elegant in my opinion, I'm not sure why this isn't official recommended practice for compositing. I call it "delegating the properties". It means, don't store the state yourself, use the child control itself to store the state. The real problem was we had the value of our properties stored in two locations -- our ViewState, and our child controls' ViewState. Using the child control itself to store the state means it will always be in just one place, a place where we the parent and the child control can agree on. Here's how:

private TextBox txtFoo;
public MyControl()
{
this.EnsureChildControls();
}
public string Text
{
get { return this.txtFoo.Text; }
set { this.txtFoo.Text = value; }
}
protected override CreateChildControls()
{
this.txtFoo = new TextBox()
this.Controls.Add(txtFoo);
}

The Text property does nothing more than access the textbox's Text property. No longer do we need to 'copy' the value into the textbox -- its already there!

The important thing about this trick is to simply call EnsureChildControls() in your constructor. That's so the textbox will exist should someone try to set the Text property (which is very early on if they set it declaratively). Alternatively, you could call EnsureChildControls() within the get and set like so:

public string Text
{
get
{
this.EnsureChildControls();
return this.txtFoo.Text;
}
set
{
this.EnsureChildControls();
this.txtFoo.Text = value;
}
}


However, if you have several properties that do this, its much easier to just do it in the constructor. Less lines of code result.

Happy control building!!!
          Python: Delete / Remove Files   
How do I delete a file called /tmp/foo.txt using Python programming language under MS-Windows or Unix like operating systems?
          Re: [Patch v2 1/3] dt-bindings: Document the hi3660 thermal sensor ...   
Eduardo Valentin writes: On Thu, Jun 22, 2017 at 11:42:01AM +0800, Tao Wang wrote: ++
mal.txt
b/Documentation/devicetree/bindings/thermal/hi3660-thermal.txt +
Would you mind add some more description of the sensors/where to find further hardware documentation?
further hardware documentation?
ed
n.
=20
=20

          [PATCH tip/perf/core 6/7] perf documentation: updates for target-ns.   
Krister Johansen writes: (Summary) 4 ++++ 3 files changed, 14 insertions(+) diff --git a/tools/perf/Documentation/perf-buildid-cache.txt b/tools/perf/Documentation/perf-buildid-cache.txt index 058064d..8468100 100644 --- a/tools/perf/Documentation/perf-buildid-cache.txt +++ b/tools/perf/Documentation/perf-buildid-cache.txt @@ -61,6 +61,11 @@ OPTIONS --verbose:: Be more verbose. This is + used when creating a uprobe for a process that resides in a + different mount namespace from the perf(1) utility. This is + used when creating a uprobe for a process that resides in a + different mount namespace from the perf(1) utility.
          [PATCH tip/perf/core 0/7] namespace tracing improvements   
Krister Johansen writes: (Summary) 5 + tools/perf/Documentation/perf-probe.txt | 5 + tools/perf/Documentation/perf-top.txt | 4 + tools/perf/builtin-buildid-cache.c | 4 +- tools/perf/util/annotate.c | 2 +- tools/perf/util/build-id.c | 3 + tools/perf/util/machine.c | 2 +- tools/perf/util/probe-event.c | 4 +- tools/perf/util/symbol.c |
          [PATCH] doc: Update memory-barriers.txt for read-to-write dependencies   
"Paul E. McKenney" writes: (Summary) Cc: David Howells <dhowells@redhat.com>
Cc: Will Deacon <will.deacon@arm.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Jonathan Corbet <corbet@lwn.net>
Cc: Alan Stern <stern@rowland.harvard.edu>
Cc: Andrea Parri <parri.andrea@gmail.com>
Cc: Jade Alglave <j.alglave@ucl.ac.uk>
Cc: Luc Maranget <luc.maranget@inria.fr>
Cc: Luc Maranget <luc.maranget@inria.fr>
diff --git a/Documentation/memory-barriers.txt b/Documentation/memory-barriers.txt index 9d5e0f853f08..a8a91b9d5a1b 100644 --- a/Documentation/memory-barriers.txt +++ b/Documentation/memory-barriers.txt @@ -594,7 +594,10 @@ between the address load and the data load: This enforces the occurrence of one of the two implications, and prevents the third possibility from arising. -A data-dependency barrier must also order against dependent writes: +A data-dependency barrier is not required to order dependent writes +because the CPUs that the Linux ker
          Modified Chat Font (v1.0.1)   
If you find TSW chat very hard to read and want to improve it but don't feel like trying to edit
font settings etc, then this mod is for you.
I've simply cleaned up the look and replaced one font with a newer type that looks much better.

To install/remove - follow the included Fonts_readme.txt
          Castbar Relocator (2.1.5)   
Make sure to read the included readme.txt file on how to update this add-on with the 1.1 patch!

Features of this add-on:
Castbars are able to be placed anywhere on the screen.
Individual scaling of each castbar.
Individual scaling of each castbar's text.
Possible to offset the text's Y position.
Tweaked graphics of the castbars.
Alert system for specific abilities (user defined).
The text from the dodge bar has been removed (you know what it does from the colour).

Click the icon to the right of the compass to open the settings window and allow for the bars to be moved.
Click the icon while holding down Ctrl to open the Target Ability Alert system window.

For moving/placing I've made a few minor helpers as well:
If you Ctrl + click a castbar it will center horizontally on the screen.
If you hold down Shift while moving a castbar it will lock its movement to the axis it moved the longest on. Basically it means that if you moved it up further than you moved it to the side, it will snap into the X position it was at when you started moving it, once you release the mouse button (while still holding Shift).

Also if you Shift + click the icon the castbars will get reset to their default positions (default for this add-on, which is the same placement used in version 1.0.0).
          Valyrie's MissionTimer Enhanced (v1.1.1)   
Valyrie's MissonTimer Enhanced
This mod will replace the standard MissionTracker.swf file and will therefore not work with any other (possible) add-ons that does the same.

Donations
It takes a lot of time to develop addons, so if you really like this mod and want to support it then please consider donating any amount. Thank you!

What's New
* Fix: Synched with FC patch v1.8 code to support scenarios.

Current Features
* Visual mission timer can be scaled to a size of your liking (hove mouse over timer and use the scrollwheel up or down)
* Changed default timer looks for better contrast and readability
* Added text warnings on screen for "one minute remaining", "soon failing" and "very soon failing" (last two are hardcoded by FC to a specific time and differ for each timed mission)

Installation
Unpack the .zip archive into \Data\Gui\Customized\Flash\ folder.

It should look like this:
\Data\Gui\Customized\Flash\MissionTracker.swf
\Data\Gui\Customized\Flash\MissionTimerEnhancedProxy\MissionTimerEnhancedProxy.swf
\Data\Gui\Customized\Flash\MissionTimerEnhancedProxy\CharPrefs.xml
\Data\Gui\Customized\Flash\MissionTimerEnhancedProxy\Modules.xml
\Data\Gui\Customized\Flash\MissionTimerEnhancedProxy\Readme.txt

If you had TSW running when installing this mod then a simple /reloadui should do the trick to activate it


Uninstall
Delete
\Data\Gui\Customized\Flash\MissionTracker.swf
\Data\Gui\Customized\Flash\MissionTimerEnhancedProxy\

Usage
Simply start a mission that is on a timer and it should work automatically
          Statement from Military Commissions Chief Prosecutor Mark Martins for June 29    

Military Commissions Chief Prosecutor Brigadier General Mark Martins released the following statement yesterday on the occasion of the conclusion of military commissions hearings this week in the case of Abd al-Hadi al-Iraqi. 

 


          Hawaii Files Emergency Motion to Clarify Scope of Preliminary Injunction in Travel Ban Case    

The State of Hawaii has filed an emergency motion to clarify the scope of the preliminary injunction against the Trump administration's travel ban, which was stayed in part by the Supreme Court. At issue are the government's guidelines for implementing the components of the ban against which the injunction has been stayed, which Hawaii contends are inconsistent with the scope of the Court's ruling. The ban is set to go into effect at 8pm Eastern time tonight. 

The motion is available in full below.

 


          Court of Military Commissions Review Issues Two New Orders    

The Court of Military Commissions Review (CMCR) has issued two new orders in recent days in the cases of Ibrahim Ahmed Mahmoud al Qosi and the five accused 9/11 conspirators. In the latter case, the Miami Herald reports that the CMCR overruled the trial judge, military judge Army Col. James Pohl, to reinstate charges of attacking civilian objects and destruction of property against the five defendants. Pohl previously dismissed the charges on the grounds that the statute of limitations had expired. The decision is not yet publicly available.

In the Qosi case, in which Qosi is litigating his right to appeal his previous guilty plea before a military commission, the CMCR had previously asked the government to provide information on whether Qosi—who was released from Guantanamo in 2012—has participated in hostilities since his departure. The court's new order finds inadequate the government's assertions based on hearsay that Qosi is currently an unprivileged enemy belligerent, and returns the case to the military commission for a hearing on Qosi's status. The order is included in full below.

 


          Liquid chicken and other inedible products   
TEXARKANA, AR - When I get home, I am going to eat a big pile of avocados on top of a bed of organic spinach, and wash it down with shade-grown coffee made in a French press. Then I'm going to go to my favorite taqueria and eat a big, messy, spicier than hell burrito. Then I'm going to find the hottest vegetable curry and bathe in it.

Truck stop food loses its kitsch value when you eat it every day. Here's a tip, kids: don't try the buffet. It may be cheap, and you may be very hungry, and you may have the best and most research-centered intentions, but you will not be happy after you eat it. I'm almost to the point where I feel no more need to experiment with things I haven't tried, which is saying a lot. From now on, I plan to only eat breakfast food (because it takes a lot of skill to mess up pancakes and eggs) and pie.

Earlier today I passed a tanker truck hauling liquid chicken. LIQUID CHICKEN. I don't even want to know.

Last week, on a quick jaunt through SoCal, I found some pears in the usually meager selection of dumpy fruit at a truck stop. I picked the least beaten-looking one out of the bunch, washed it, and wrapped it in napkins like it was a small treasure. I waited to eat it until I was in the privacy of the truck, biting off little pieces at a time, sucking out the pulp and juice until I got to the core. It was the most erotic experience I've had since I've been on the road.

Being the spoiled California foodie that I am, I knew food would be a sacrifice for me. But I didn't expect it to be rubbed in my face. My trainer hauls refrigerated trailers, and half the time they are filled with produce. When we pick up in SoCal, it's all fresh lettuce and avocados and oranges in another step to get them on grocery store shelves. It feels so cruel to haul all this delicious produce for other people to eat while I have to make do with truck stop salad bars stocked with wilted iceberg lettuce and canned tomatoes.



On a completely different note, my good friend Cindy is now writing for the Huntington Beach Independent, and the first issue of her new column mentions some girl who quit a news reporter job to become a trucker.

If you've arrived at this blog via Cindy's column: welcome! I assure you that when I'm done with training and get my own truck, the updates will be much more frequent.
          Как запретить индексацию нужных страниц   
Redis (гость) : Я запретил индексацию поста - но в тексте robots.txt ничего не изменилось , как можно проверить попала такая страница в поиск или нет, и можно так писать в robots.txt на запрет индексации?
Disallow: http://kzn-soft.ru/11-abbyy-finereader-10-professional-edition-klyuch.html

Читать страницу »   Комментировать »


          morUI Beans 1.0   
INTRODUCTIONmorUI Beans enlarges the opportunities of Java developers to design user interface. These UI components support standard functionalities and extended drawing capabilities.morUI Beans 1.0 provides:- A package of full featured multi-styles Java lightweight user interface components: label, button, toggle button, button group and flowing tooltip;- A package of morUI Beans specific property editors, which provide visual designers, like Borland JBuilder, with morUI Beans support;- Detailed documentation (Javadoc);- A package of the most used icons.morUI Beans comes packed in morInstaller, which deploys the packages and also implements them into JBuilder 7, 8 and 9.HOW TO STARTmorUI Beans demo should come in a single zip archive, which must contain the following files:- morUIdemo.jar - the demo application;- info.txt - this info file;- mCLogo.gif - the morComponents logo.To be run morUI Beans demo requires Java 2 runtime environment to be run. It can be downloaded from http://java.sun.com.The demo can be started by double-clicking the jar file if the installed JRE version is 1.3 or higher or by typing in a command prompt:java - jar [path]morUIdemo.jarREQUIREMENTSThe package of beans needs JVM 1.1 or later to run but the demo, the property editors, and the installer require at least JVM 1.2 environment. This means that morUI Beans allow the applications, which import them to be started on JVM 1.1 but the visual designers, which may be used to develop these applications need 1.2 environment to start morUI Beans' property editors. LABEL'S AND BUTTONS' FEATURESmorUI Beans support the following bound properties: - Display text using defined font and color. Also several visual effects might be applied to the text;- Paint an icon, which might be processed by morUI image filters;- Draw various kinds of borders;- Background bulged or concaved surfaces might be painted;- Background color modifier might be used to brighten or darken the background; - Content (icon and text) is aligned by alignment, margin and displacement properties.BUTTONS' SPECIFIC FEATURES- MButton and MToggleButton provide special properties of button dynamics (named responses). They define the behavior of buttons parts under user influence. Several response styles for border type, background color modification, background bulge effect, content style and displacement, and icon filter are realized;- Defined several button styles, which set the response and several other properties with suitable values;- Standard event handling by adding action listeners is supported. An action event is fired when a button is pressed and released (either by mouse or by focus action key);- Standard focus processing is supported.TOGGLE BUTTON'S SPECIFIC FEATURESMToggleButton as an inheritor of MButton supports all MButton's properties and extends them with:- MToggleButton like standard selectable components has two stable states - selected or deselected;- Standard event handling by adding item listeners is supported. An item event is fired when a toggle button is selected or deselected.SELECTABLE GROUP FEATURESManages a set of MToggleButton instances so that no more than one of them to be selected at a time.TOOLTIP FEATURESTooltip displays a short explanatory text in a small window.MToolTip appears flowing on the screen. Its instances can be attached to any Java component. The colors of text, background, and border can be controlled and also standard styles are defined for fast color control.
          morUI Beans 1.0   
INTRODUCTION morUI Beans enlarges the opportunities of Java developers to design user interface. These UI components support standard functionalities and extended drawing capabilities. morUI Beans 1.0 provides: - A package of full featured multi-styles Java lightweight user interface components: label, button, toggle button, button group and flowing tooltip; - A package of morUI Beans specific property editors, which provide visual designers, like Borland JBuilder, with morUI Beans support; - Detailed documentation (Javadoc); - A package of the most used icons. morUI Beans comes packed in morInstaller, which deploys the packages and also implements them into JBuilder 7, 8 and 9. HOW TO START morUI Beans demo should come in a single zip archive, which must contain the following files: - morUIdemo.jar - the demo application; - info.txt - this info file; - mCLogo.gif - the morComponents logo. To be run morUI Beans demo requires Java 2 runtime environment to be run. It can be downloaded from http://java.sun.com. The demo can be started by double-clicking the jar file if the installed JRE version is 1.3 or higher or by typing in a command prompt:java - jar [path]morUIdemo.jar REQUIREMENTS The package of beans needs JVM 1.1 or later to run but the demo, the property editors, and the installer require at least JVM 1.2 environment. This means that morUI Beans allow the applications, which import them to be started on JVM 1.1 but the visual designers, which may be used to develop these applications need 1.2 environment to start morUI Beans' property editors. LABEL'S AND BUTTONS' FEATURES morUI Beans support the following bound properties: - Display text using defined font and color. Also several visual effects might be applied to the text; - Paint an icon, which might be processed by morUI image filters; - Draw various kinds of borders; - Background bulged or concaved surfaces might be painted; - Background color modifier might be used to brighten or darken the background; - Content (icon and text) is aligned by alignment, margin and displacement properties. BUTTONS' SPECIFIC FEATURES - MButton and MToggleButton provide special properties of button dynamics (named responses). They define the behavior of buttons parts under user influence. Several response styles for border type, background color modification, background bulge effect, content style and displacement, and icon filter are realized; - Defined several button styles, which set the response and several other properties with suitable values; - Standard event handling by adding action listeners is supported. An action event is fired when a button is pressed and released (either by mouse or by focus action key); - Standard focus processing is supported. TOGGLE BUTTON'S SPECIFIC FEATURES MToggleButton as an inheritor of MButton supports all MButton's properties and extends them with: - MToggleButton like standard selectable components has two stable states - selected or deselected; - Standard event handling by adding item listeners is supported. An item event is fired when a toggle button is selected or deselected. SELECTABLE GROUP FEATURES Manages a set of MToggleButton instances so that no more than one of them to be selected at a time. TOOLTIP FEATURES Tooltip displays a short explanatory text in a small window. MToolTip appears flowing on the screen. Its instances can be attached to any Java component. The colors of text, background, and border can be controlled and also standard styles are defined for fast color control. Special thanks to Borland Software Corporation for the opportunity to test morUI Beans with JBuilder 9 beta and gamma.Copyright (c) 2003 morComponents. All rights reserved.
          VisualSoft JBGrid Lite Version 3.4   
VisualSoft JBGridX LiteVersion 3.4 is a lite version with limited features of our full-featured commercial component ?VisualSoft JBGrid 3.4 Version? that was developed for Borland JBuilder 7.0 Companion CD users.VisualSoft JBGridLiteX 3.4 is an easy to use data management tool that simplifies the task of representing data in rows and columns. Its efficient memory management enables data addition in as many cells as desired in different methods.It provides you a flexible interface that can be customized and used in your development environments. Data presentations can be enhanced to required color combinations and images can be inserted in background. Individual cells can be controlled; the fonts and their size can be customized. VisualSoft JBGridXLite architecture is designed to provide superior performance in your applications.Where it can be used?JBGridXLite can be used in activities where real time data feeds are involved. Its data-intensive environment allows in-coming data to be accommodated dynamically into grid cells. Integrate JBGridXLite in any of the following applications to enhance their representation:- Stock market analysis- Portfolio management - Election result analysis- Sales trends- Supply chain activitiesWhat's new in this version?- Progressbar Editor- TextArea Editor- Mask Editor- Hyperlink Editor- Import and export of XML files with in-built editors documents using DTD- Import and export of XML files with in-built editors documents using Schema- Additional Events for JBGrid i.e. VsJBGridXDataEvent, VsJBGridXFileEvent, VsJBGridXKeyEvent, VsJBGridXMouseEvent, VsJBGridXSelectionEvent.- Performance Enhancements Key Features- Supports images in Combobox editor- Built-in spin for time objects- Images can be depicted on cells- Background/foreground colors for selected cells- Customizable font for selected cells- Borders for selected cells- Horizontal/vertical alignment for selected cells- Add/Insert/delete columns- Cell text alignment- Customizable text in row header- Sorting columns - Data type and string based sorting supported - Built-in calendar for date objects- Fetch and populate data from different data formats such as .CSV, .XML, .TXT, .HTML using in-built data models- Checkbox Renderer and Editor for Boolean values- Images can be set to the checkbox renderer- Intercell spacing and row margins setting supported- Auto adjustable row heights A close look at the features of JBGridXLite (Swing)Customizable UI- Adjustable row height - Inter-cell spacing - Row margin setting- Row/column header resizing- Grid/ row/ column header- Data grid foreground/background colors- Grid line color- Color filling, border, foreground color for text and font of selected cells- Change Text in row header- Show/hide row numbers- Show/hide row icons- Show/hide grid lines (horizontal, vertical or both)- Drag and drop column headers- Add/Insert/Delete rows and columns Data Sources/Databases- Import data from file formats such as .CSV, .TXT, HTML and XML- A separate database model layer for database support Data Sorting- String-based, object-based and multi-column - Sorts by column and block wiseBuilt-in Editors- Progressbar Editor- TextArea Editor- Mask Editor- Hyperlink Editor- String, Integer, Float, Currency, Character, Time-spin, Drop-down calendar for Date, Month combobox, Date combobox and checkbox are available - Supports null values- Supports images in Combobox editor- Custom editors for cells that can be used as different types of data masksInternationalization- Multilingual support JBGridX Events- VsJBGridXDataEvent- VsJBGridXFileEvent- VsJBGridXKeyEvent- VsJBGridXMouseEvent- VsJBGridXSelectionEvent.Java Development EnvironmentVisualSoft JBGrid works well with any JavaBean-compliant visual development environment such as Borland JBuilder.
          VisualSoft JBScheduler Lite Version 3.4   
VisualSoft JBSchedulerX LiteVersion 3.4 is a lite version with limited features of our commercial component ?VisualSoft JBScheduler 3.4 Version? and is developed for Borland JBuilder 7 Companion CD users. VisualSoft JBScheduler is a powerful and easy-to-use time management tool that lets you organize all your appointments, events and tasks in a customized and prioritized way. There will be no forgotten appointment or undone tasks. You can even set reminders.It provides you a flexible interface that can be customized and used in your development environments. It has a built-in Memo Manager to store information such as minutes of meeting, important quotes.Where it can be used?It can be used in a wide range of applications to efficiently manage time tasks, events and appointments.Integrate JBScheduler in any of the following applications to enhance their scheduling power:- Personal scheduling applications- Online Scheduling Services - Time and Task Management Applications- Logistics Management Services- Transport Management ServicesWhat's new in this version?- Options to view the week as a Work-Week (5 working days) or Full-Week (7 days)- Option for including or excluding weekend while creating recursive Appointments- Show/hide the Calendar and TaskTable in Daily, Weekly and Monthly ViewsKey Features- Import and export data into XML format- DND facility (Drag and Drop) in weekly and monthly views- Supports recursive tasks- Intelligent Data Recognizer (IDR) to identify .TXT or .CSV files- IDR can segregate and categorize files (.TXT or .XML) and import them to corresponding types such as Appointments, Tasks, and Occasions - Customize TimeScale settings in slots of 60, 30, 20, 15, 10 and 5 minutes.- Customize Working hours.A close look at the features of JBSchedulerXLite (JFC/Swing)AppointmentsAppointments are activities that you block time for and that do not involve inviting other people or resources. You can add/edit or delete appointments. You can view the drop downs for the calendar or the time selection. Specify the start and end times- Appointments can have reminders attached to them with various times and periods- A meeting is an appointment to which you invite people and resources. Meeting planner provides you to create and send meeting requests and reserve resources- Identify attendees and set meeting time. Once a meeting is scheduled, add the minutes of the meeting - To give you a better insight, add a comprehensive and short description. Set the priority, category and access right to optimize your scheduler- Provides printing of your appointments and allows to set your schedules in slots of 60, 30, 20, 15,10 and 5 minutes- Displays the appointments in a yearly planner to give you a broad view of your appointments/tasks- Select the format what suits you best ? 12/24 hrs. It provides easy navigation using Prev/Next buttonsTasksTask assignments help you keep track of progress on work that other people do for you or in cooperation with you on a project- You can Add/Edit and Delete tasks- For a quick reference, specify short descriptions that help you on the fly- Set reminders that does not let them fall out of your mind - Set the priority or marks as private to keep them from other prying eyes- Customize the look and feel by placing the columns as desired, enable or disable them. - Allows sorting of columns- Provides drop down for Date/Time selectionMemo ManagerManage your activities by allowing to search/print notes- Add brief notes/description- Search notes- Print notesOccasionsSpecial occasions such as Anniversaries/Birthdays can be added. View these by Month/Zodiac signImport/Export- Import and Export data into and from JBScheduler in .TXT and .XML formatsPreferencesSet preferences to suit your needs with a customizable look & feel (Metal, Motif or Windows) or design your own- Customizable Look and Feel (Metal, Motif and Windows)- Built-in metal themes- Custom themes can be builtEvents- 22 Events provided for using in various applications- Adapter provided for the eventsInternationalization- Multilingual support Java Development EnvironmentVisualSoft JBScheduler works well with any Java Bean-compliant visual development environment such as Borland JBuilder.
          VisualSoft JBScheduler Ver 3.3   
VisualSoft JBScheduler is a time management JavaBean that helps schedule appointments, events and tasks and effectively manage them. It provides options to set reminders for scheduled appointments or tasks. It provides you a flexible interface that can be customized and used in your development environments. Integrate VisualSoft JBScheduler in IDEs like Borland JBuilder to develop time and task management applications such as personal and online scheduling, Logistics Management ServicesKey Features* Supports recursive tasks* Supports DND facility (Drag and Drop) in weekly and monthly views.* Supports Custom views like Daily, Weekly and Monthly view of Appointments and Tasks* Store Special Days in Occasions Section.* Custom TimeScale settings in slots of 60, 30, 20, 10 and 5 minutes.* Option for setting Custom Working hours.* Intelligent Data Recognizer (IDR) to identify files of .TXT or .CSV. IDR can segregate and categorize files (.TXT) and import them to corresponding types such as Appointments, Tasks, Occasions etc.VisualSoft JBScheduler works well with any Java Bean-compliant visual development environment such as Borland JBuilder.
          MCollective up to 0.5.0 mcollective-sshkey-security Filename directory traversal   

A vulnerability was found in MCollective up to 0.5.0. It has been rated as critical. This issue affects an unknown function of the component mcollective-sshkey-security. The manipulation with the input value example.txt_pub.pem leads to a directory traversal vulnerability. Using CWE to declare the problem leads to CWE-22. Impacted is integrity, and availability.

The weakness was disclosed 06/30/2017 (GitHub Repository). The advisory is shared for download at github.com. The identification of this vulnerability is CVE-2017-2298 since 12/01/2016. Technical details are known, but no exploit is available.

Upgrading to version 0.5.1 eliminates this vulnerability.

Entries connected to this vulnerability are available at 102976.

CVSSv3

VulDB Base Score: ≈4.6
VulDB Temp Score: ≈4.1
VulDB Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:X/RL:O/RC:U
VulDB Reliability: Low

CVSSv2

VulDB Base Score: ≈3.0 (CVSS2#AV:A/AC:M/Au:S/C:N/I:P/A:P)
VulDB Temp Score: ≈2.3 (CVSS2#E:ND/RL:OF/RC:UC)
VulDB Reliability: Low

CPE

Exploiting

Class: Directory traversal (CWE-22)
Local: Yes
Remote: No

Availability: No

Price Prediction: steady
Current Price Estimation: $0-$5k (0-day) / $0-$5k (Today)

Countermeasures

Recommended: Upgrade
Status: Official fix
0-Day Time: 0 days since found

Upgrade: MCollective 0.5.1

Timeline

12/01/2016 CVE assigned
06/30/2017 Advisory disclosed
07/01/2017 VulDB entry created
07/01/2017 VulDB last update

Sources

Advisory: github.com
Status: Unconfirmed

CVE: CVE-2017-2298 (mitre.org) (nvd.nist.org) (cvedetails.com)
See also: 102976

Entry

Created: 07/01/2017
Entry: 69.2% complete

          Без заголовка   

Это цитата сообщения starushka471 Оригинальное сообщение Екатерина Вильмонт. Шалый малый...

Обычно романы заканчиваются свадьбой. Этот со свадьбы начинается. Полина Зацепина - молодая женщина, модный московский флорист. Карьера ее идет в гору, в семейной жизни тоже все складывается неплохо, но однажды она едет с подругой в лес за грибами, и там происходят события, которые грозят перевернуть всю ее жизнь..


 

Серия сообщений "Екатерина Вильмонт":
Часть 1 - Екатерина Вильмонт "Умер - шмумер"
Часть 2 - Вильмонт Екатерина "Артистка, блин"
...
Часть 23 - Екатерина Вильмонт "Фиг ли нам, красивым дамам!"
Часть 24 - Екатерина Вильмонт "Сплошная лебедянь"
Часть 25 - Екатерина Вильмонт. Шалый малый...

          Без заголовка   

Это цитата сообщения starushka471 Оригинальное сообщениеПолякова Татьяна - "Наследство Бизнес-класса"

Как может изменить жизнь обычное путешествие на поезде? Кардинально! В вагоне бизнес-класса Валерия стала невольной свидетельницей разговора двух мужчин. Один с болью в голосе рассказывал об изменах жены, а второй предложил избавиться от неверной самым радикальным способом. Валерия от услышанного в шоке и хочет предупредить женщину о грозящей опасности.


 

Серия сообщений "Т.Полякова":
Часть 1 - Татьяна Полякова - "Список Донжуанов"
Часть 2 - Татьяна Полякова"Бочка но-шпы и ложка яда"
...
Часть 39 - Полякова Татьяна - Ставка на слабость
Часть 40 - Полякова Татьяна - Огонь, мерцающий в сосуде
Часть 41 - Полякова Татьяна - "Наследство Бизнес-класса"
Часть 42 - Татьяна Полякова "Знак предсказателя"

          Без заголовка   

Это цитата сообщения starushka471 Оригинальное сообщениеМетлицкая Мария - Женский день

 


В канун Женского дня три успешные женщины – актриса, врач и писательница – пришли в студию популярного ток-шоу. Все три не сомневались, что от них ждут рассказа об истории успеха, о том, «как они сами себя сделали». Каждая из них не раз давала такое интервью, и со временем правда и вымысел перепутались настолько, что героини и сами порой не могли отличить одно от другого. Но все пошло совсем по другому сценарию. Женский день стал очередным испытанием – на прочность, порядочность, на умение любить и прощать. И очередным напоминанием – ни очень плохо, ни очень хорошо не бывает всегда.

 

Серия сообщений " Метлицкая Мария":
Часть 1 - Метлицкая Дневник свекрови
Часть 2 - Мария Метлицкая "Можно я побуду счастливой..."
Часть 3 - Метлицкая Мария - Женский день
Часть 4 - Мария Метлицкая"Женщины, кот и собака"

          Без заголовка   

Это цитата сообщения starushka471 Оригинальное сообщениеМария Метлицкая"Женщины, кот и собака"

 

 


 
Евгения переживает не лучшие времена. От нее отвернулся весь мир, и даже единственный сын больше не желает общаться со своей матерью. Лучшие годы остались позади, а будущее готовит лишь годы тоски и одинокого прозябания. Она неоднократно слышала о чем-то подобном, произошедшем с тем или иным знакомым, однако не верила, что это произойдет с ней. Евгении пришлось учиться жить в новой реальности, а лучшим лекарством от поглощающего ее одиночества оказалась помощь таким же, как она..
 

 

 

Серия сообщений " Метлицкая Мария":
Часть 1 - Метлицкая Дневник свекрови
Часть 2 - Мария Метлицкая "Можно я побуду счастливой..."
Часть 3 - Метлицкая Мария - Женский день
Часть 4 - Мария Метлицкая"Женщины, кот и собака"

          12c datapatch - take care of parallel patching   
datapatch is a nice new feature in recent Oracle database installations. It helps to ensure the databases objects match the binaries after any kind of patching and so avoid situations which can be an operational and support nightmare - and very hard to identify.

Problem


Unfortunately it has some drawbacks as well.
One of those I hit recently when running datapatch on 2 instances which uses the same ORACLE_HOME.
At some time in it's progress datapatch uses dbms_qopatch.get_opatch_lsinventory, which uses the external table SYS.OPATCH_XML_INV. This has the preprocessor $ORACLE_HOME/QOPatch/qopiprep.bat. This script executes
$ORACLE_HOME/OPatch/opatch lsinventory -xml  $ORACLE_HOME/QOpatch/xml_file.xml -retry 0 -invPtrLoc $ORACLE_HOME/oraInst.loc >> $ORACLE_HOME/QOpatch/stout.txt
`echo "UIJSVTBOEIZBEFFQBL" >> $ORACLE_HOME/QOpatch/xml_file.xml`
echo `cat $ORACLE_HOME/QOpatch/xml_file.xml`
rm $ORACLE_HOME/QOpatch/xml_file.xml
rm $ORACLE_HOME/QOpatch/stout.txt
Maybe you see already what will happen when 2 different instances execute this step at the same time:
2 different opatch lsinventory -xml instances are writing into the same file. A very efficient was to corrupt the xml file, as they write to the same file $ORACLEHOME/QPatch/xml_file.xml

in one db I got this error:
Determining current state...DBD::Oracle::st execute failed: ORA-20001: Latest xml inventory is not loaded into table
ORA-06512: at "SYS.DBMS_QOPATCH", line 1937
ORA-06512: at "SYS.DBMS_QOPATCH", line 1259 (DBD ERROR: error possibly near <*> indicator at char 143 in 'SELECT description, startup_mode
FROM XMLTable('/InventoryInstance/patches/patch[patchID=21573304]'
PASSING <*>dbms_qopatch.get_opatch_lsinventory
COLUMNS description VARCHAR2(100) PATH 'patchDescription',
startup_mode VARCHAR2(7) PATH 'sqlPatchDatabaseStartupMode')') [for Statement "SELECT description, startup_mode
FROM XMLTable('/InventoryInstance/patches/patch[patchID=21573304]'
PASSING dbms_qopatch.get_opatch_lsinventory
COLUMNS description VARCHAR2(100) PATH 'patchDescription',
startup_mode VARCHAR2(7) PATH 'sqlPatchDatabaseStartupMode')"] at /appl/oracle/product/rdbms_121024Jc/sqlpatch/sqlpatch.pm line 1368, <LOGFILE> line 73.

in the other
verify_queryable_inventory returned ORA-31011: XML parsing failed
ORA-19202: Error occurred in XML processing
LPX-00229: input source is empty
ORA-06512: at "SYS.XMLTYPE", line 272
ORA-06512: at line 1

Queryable inventory could not determine the current opatch status.
Execute 'select dbms_sqlpatch.verify_queryable_inventory from dual'

But there might be different errors possible as well - all based on the concurrency issue here.

Workaround

In our environment the it's quite simple to workaround such issues: We jave scripts which do all the steps during patching, so the "apply datapatch" module just needs a small extension which ckecks for a "latch" (existence of a file in our case) and only continues if it can grab this file. Otherwise it sleeps for a short time.

Solution

Oracle could easily use a filename like  $ORACLEHOME/QPatch/xml_file.$$.xml instead. I'm not sure if it's worth the effort to fight through the perimeters in MOS.

Update

(2015-12-28)
I found 12.1:Parallel Execution Of Datapatch during Patching or Manual upgrade fails with error " Queryable inventory could not determine the current opatch status " (Doc ID 2054286.1) today which describes exactly this behavior.
Patch:19215058 solves the issue by implementing
DBSID=$ORACLE_SID
...
$ORACLE_HOME/QOpatch/xml_file_$DBSID.xml
...

          ORADEBUG DOC 12.1.0.2   
this is just an online docu of ORADEBUG DOC in 12.1.0.2.
The general comments from Tanel Poder apply to this version as well.




SQL> oradebug doc

Internal Documentation
**********************

EVENT Help on events (syntax, event list, ...)
COMPONENT [<comp_name>] List all components or describe <comp_name>

ORADEBUG DOC EVENT

SQL> oradebug doc event

Event Help:
***********

Formal Event Syntax
--------------------
<event_spec> ::= '<event_id> [<event_scope>]
[<event_filter_list>]
[<event_parameters>]
[<action_list>]
[off]'

<event_id> ::= <event_name | number>[<target_parameters>]

<event_scope> ::= [<scope_name>: scope_parameters]

<event_filter> ::= {<filter_name>: filter_parameters}

<action> ::= <action_name>(action_parameters)

<action_parameters> ::= <parameter_name> = [<value>|<action>][, ]

<*_parameters> ::= <parameter_name> = <value>[, ]


Some Examples
-------------
* Set event 10235 level 1:
alter session set events '10235';

* Set events SQL_TRACE (a.k.a. 10046) level 1:
alter session set events 'sql_trace';

* Turn off event SQL_TRACE:
alter session set events 'sql_trace off';

* Set events SQL_TRACE with parameter <plan_stat> set to 'never'
and parameter <wait> set to 'true':
alter session set events 'sql_trace wait=true, plan_stat=never';

* Trace in-memory the SQL_MONITOR component (the target) and all its
sub-components at level high. Get high resolution time for each
trace:
alter session set events 'trace[sql_mon.*] memory=high,
get_time=highres';

* On-disk trace PX servers p000 and p005 for components 'sql_mon'
and 'sql_optimizer' (including sub-components) at level highest:
alter system set events 'trace[sql_mon | sql_optimizer.*]
{process: pname = p000 | process: pname=p005}';

* Same as above but only when SQL id '7ujay4u33g337' is executed:
alter system set events 'trace[sql_mon | sql_optimizer.*]
[sql: 7ujay4u33g337]
{process: pname = p000 | process: pname=p005}';

* Execute an action immediatly by using 'immediate' for the event
name:
alter session set events 'immediate eventdump(system)'

* Create an incident labeled 'table_missing' when external error
942 is signaled by process id 14534:
alter session set events '942 {process: 14534}
incident(table_missing)';


Notes
-----
* Implicit parameter level is 1 by default
e.g. '10053' is same as '10053 level 1'

* Event target (see [<target_parameters>] construct) is only
supported by specific events like the TRACE[] event

* <event_scope> and/or <event_filter> are constructs
that can be used for any event

* Same event can be set simultaneously for a different scope or
target but not for different filters.

* '|' character can be used to select multiple targets, scope or
filters.

E.g. 'sql_trace [sql: sql_id=g3yc1js3g2689 | sql_id=7ujay4u33g337]'

* '=' sign is optional in <*_parameters>

E.g. 'sql_trace level 12';

* Like PL/SQL, no need to specify the parameter name for target,
scope, filters and action. Resolution is done by position in
that case:

E.g. 'sql_trace [sql: g3yc1js3g2689 | 7ujay4u33g337]'


Help sub-topics
---------------

NAME [<event_name>] List all events or describe <event_name>
SCOPE [<scope_name>] List all scopes or describe <scope_name>
FILTER [<filter_name>] List all filters or describe <filter_name>
ACTION [<action_name>] List all actions or describe <action_name>


SQL> spool off


ORADEBUG DOC EVENT NAME

SQL> oradebug doc event name

Events in library DIAG:
------------------------------
trace[] Main event to control UTS tracing
disable_dde_action[] Event used by DDE to disable actions
ams_trace[] Event to dump ams performance trace records
ams_rowsrc_trace[] Event to dump ams row source tracing
sweep_verification Event to enable sweep file verification
enable_xml_inc_staging Event to enable xml incident staging format
dbg[] Event to hook dbgtDbg logging statements

Events in library RDBMS:
------------------------------
wait_event[] event to control wait event post-wakeup actions
alert_text event for textual alerts
trace_recursive event to force tracing recursive SQL statements
clientid_overwrite event to overwrite client_identifier when client_info is set
sql_monitor event to force monitoring SQL statements
sql_monitor_test event to test SQL monitoring
eventsync_tac Event posted from events syncing tac
sql_trace event for sql trace
pmon_startup startup of pmon process
background_startup startup of background processes
db_open_begin start of db open operation
test_gvtf test GV$() Table Tunction
fault Event used to inject fault in RDBMS kernel
gcr_systest gcr_systest
em_express EM Express debug event
emx_control event to control em express
emx_test_control event to control em express testing
awrdiag[] AWR Diagnostic Event
msgq_trace event to control msgq tracing
ipclw_trace event to control ipclw tracing
kbc_fault event to control container fault injection
asm_corruption_trace event to control ASM corruption tracing
kxdrs_sim debug event to simulate certain conditions in kxdrs layer

kcfio_debug debug event to debug kcfio based on event level

krbabrstat_fault event to control krbabrstat fault injection
periodic_dump[] event for periodically dumping

Events in library GENERIC:
------------------------------
kg_event[] Support old error number events (use err# for short)

Events in library CLIENT:
------------------------------
oci_trace event for oci trace

Events in library LIBCELL:
------------------------------
libcell_stat libcell statistics level specification
cellclnt_skgxp_trc_ops Controls to trace SKGXP operations
cellclnt_ossnet_trc Controls to trace IP affinity in ossnet
cellclnt_high_lat_ops Control to trace High-latency I/O operations
diskmon_sim_ops[] Diskmon simulation events
cellclnt_read_outlier_limit Control to trace read I/O outliers
cellclnt_write_outlier_limit Control to trace write I/O outliers
cellclnt_lgwrite_outlier_limit Control to trace log write I/O outliers
cellclnt_sparse_mode Mode of how to handle sparse buffers

Events in library ADVCMP:
------------------------------
arch_comp_level[] arch_comp_level[<ulevel, 1-7>]
ccmp_debug columnar compression debug event
inmemory_nobasic disable KDZCF_IMC_BASIC implementation
inmemory_nohybrid disable KDZCF_IMC_HYBRID implementation
ccmp_align columnar compression enable alignment
ccmp_countstar columnar compression enable count(*) optimization
ccmp_dumpunaligned columnar compression dump dbas of unaligned CUs
ccmp_rbtree columnar compression switch back to rb tree
inmemory_force_ccl inmemory force column compression levels
inmemory_imcu[] inmemory_imcu[<ulevel= nocomp|dml|query_low|query_high|capacity_low|capacity_high>]

Events in library PLSQL:
------------------------------
plsql_event[] Support PL/SQL error number events


SQL> spool off


ORADEBUG DOC EVENT NAME <event_name>
SQL> ORADEBUG DOC EVENT NAME trace

trace: Main event to control UTS tracing

Usage
-------
trace [ component <string>[0] ]
disk < default | lowest | low | medium | high | highest | disable >,
memory < default | lowest | low | medium | high | highest | disable >,
get_time < disable | default | seq | highres | seq_highres >,
get_stack < disable | default | force >,
operation <string>[32],
function <string>[32],
file <string>[32],
line <ub4>


SQL> spool off


SQL> ORADEBUG DOC EVENT NAME disable_dde_action

disable_dde_action: Event used by DDE to disable actions

Usage
-------
disable_dde_action [ action_name <string>[100] ]
facility <string>[20],
error <ub4>


SQL> spool off


SQL> ORADEBUG DOC EVENT NAME ams_trace

ams_trace: Event to dump ams performance trace records

Usage
-------
ams_trace [ relation <string>[30] ]

SQL> spool off


SQL> ORADEBUG DOC EVENT NAME ams_rowsrc_trace

ams_rowsrc_trace: Event to dump ams row source tracing

Usage
-------
ams_rowsrc_trace [ relation <string>[30] ]
level <ub4>


SQL> spool off


SQL> ORADEBUG DOC EVENT NAME dbg

dbg: Event to hook dbgtDbg logging statements

Usage
-------
dbg [ component <string>[0] ]
operation <string>[32],
function <string>[32],
file <string>[32],
line <ub4>


SQL> spool off


SQL> ORADEBUG DOC EVENT NAME wait_event

wait_event: event to control wait event post-wakeup actions

Usage
-------
wait_event [ name <string>[64] ]


SQL> ORADEBUG DOC EVENT NAME awrdiag

awrdiag: AWR Diagnostic Event

Usage
-------
awrdiag [ name <string>[64] ]
level <ub4>,
str1 <string>[256],
str2 <string>[256],
num1 <ub8>,
num2 <ub8>


SQL> spool off


SQL> ORADEBUG DOC EVENT NAME periodic_dump

periodic_dump: event for periodically dumping

Usage
-------
periodic_dump [ name <string>[64] ]
level <ub4>,
seconds <ub4>,
lifetime <ub4>


SQL> spool off


SQL> ORADEBUG DOC EVENT NAME kg_event

kg_event: Support old error number events (use err# for short)

Usage
-------
kg_event [ errno <ub4> ]
level <ub4>,
lifetime <ub4>,
armcount <ub4>,
traceinc <ub4>,
forever <ub4>


SQL> spool off


SQL> ORADEBUG DOC EVENT NAME diskmon_sim_ops
Error: "diskmon_sim_ops" not a known event/library name
Use <event_name>, <library_name> or <library_name>.<event_name>

SQL> spool off


SQL> ORADEBUG DOC EVENT NAME arch_comp_level

arch_comp_level: arch_comp_level[<ulevel, 1-7>]

Usage
-------
arch_comp_level [ ulevel <ub4> ]
ilevel <ub8>,
sortcols <ub4>,
cusize <ub4>,
analyze_amt <ub4>,
analyze_rows <ub4>,
analyze_minrows <ub4>,
mincusize <ub4>,
maxcusize <ub4>,
mincurows <ub4>,
align <ub4>,
rowlocks <ub4>,
maxcuhpctfree <ub4>,
guarantee_rll <ub4>,
cla_stride <ub4>,
dict_cla_stride <ub4>


SQL> spool off


SQL> ORADEBUG DOC EVENT NAME inmemory_imcu

inmemory_imcu: inmemory_imcu[<ulevel= nocomp|dml|query_low|query_high|capacity_low|capacity_high>]

Usage
-------
inmemory_imcu [ ulevel < invalid | nocomp | dml | query_low | query_high | capacity_low | capacity_high > ]
target_rows <ub4>,
source_maxbytes <ub4>


SQL> spool off


SQL> ORADEBUG DOC EVENT NAME plsql_event

plsql_event: Support PL/SQL error number events

Usage
-------
plsql_event [ errno <ub4> ]

SQL> spool off



ORADEBUG DOC EVENT SCOPE

SQL> oradebug doc event scope

Event scopes in library RDBMS:
------------------------------
SQL[] sql scope for RDBMS


SQL> spool off


ORADEBUG DOC EVENT SCOPE SQL
SQL> oradebug doc event scope sql

SQL: sql scope for RDBMS

Usage
-------
[SQL: sql_id <string>[20] ]


SQL> spool off



ORADEBUG DOC EVENT FILTER

SQL> ORADEBUG DOC EVENT FILTER

Event filters in library DIAG:
------------------------------
occurence filter to implement counting for event checks
callstack filter to only fire an event when a function is on the stack
eq filter to only fire an event when a == b
ne filter to only fire an event when a != b
gt filter to only fire an event when a > b
lt filter to only fire an event when a < b
ge filter to only fire an event when a >= b
le filter to only fire an event when a <= b
anybit filter to only fire an event when (a & b) != 0
allbit filter to only fire an event when (a & b) == b
nobit filter to only fire an event when (a & b) == 0
bet filter to only fire an event when b <= a <= c
nbet filter to only fire an event when a < b or a > c
in filter to only fire an event when a is equal to any b .. p
nin filter to only fire an event when a is not equal to any b .. p
streq filter to only fire an event when string s1 = s2 (up to <len> characters)
strne filter to only fire an event when string s1 != s2 (up to <len> characters)
tag filter to only fire an event when a tag is set

Event filters in library RDBMS:
------------------------------
wait filter for specific wait parameters and wait duration
process filter to set events only for a specific process
px filter to check identity of the process for fault injection

Event filters in library GENERIC:
------------------------------
errarg filter to set error events only for a specific error argument


SQL> spool off



ORADEBUG DOC EVENT FILTER <filter_name>
SQL> ORADEBUG DOC EVENT FILTER occurence

occurence: filter to implement counting for event checks

Usage
-------
{occurence: start_after <ub4>,
end_after <ub4> }


SQL> spool off


SQL> ORADEBUG DOC EVENT FILTER callstack

callstack: filter to only fire an event when a function is on the stack

Usage
-------
{callstack: fname <string>[64],
fprefix <string>[64],
maxdepth <ub4> }


SQL> spool off


SQL> ORADEBUG DOC EVENT FILTER eq

eq: filter to only fire an event when a == b

Usage
-------
{eq: a <ub8>,
b <ub8> }


SQL>

SQL> ORADEBUG DOC EVENT FILTER ne

ne: filter to only fire an event when a != b

Usage
-------
{ne: a <ub8>,
b <ub8> }


SQL> spool off


SQL> ORADEBUG DOC EVENT FILTER gt

gt: filter to only fire an event when a > b

Usage
-------
{gt: a <ub8>,
b <ub8> }


SQL> spool off


SQL> ORADEBUG DOC EVENT FILTER lt

lt: filter to only fire an event when a < b

Usage
-------
{lt: a <ub8>,
b <ub8> }


SQL> spool off


SQL> ORADEBUG DOC EVENT FILTER ge

ge: filter to only fire an event when a >= b

Usage
-------
{ge: a <ub8>,
b <ub8> }


SQL> spool off


SQL> ORADEBUG DOC EVENT FILTER le

le: filter to only fire an event when a <= b

Usage
-------
{le: a <ub8>,
b <ub8> }


SQL> spool off


SQL> ORADEBUG DOC EVENT FILTER anybit

anybit: filter to only fire an event when (a & b) != 0

Usage
-------
{anybit: a <ub8>,
b <ub8> }


SQL> spool off


SQL> ORADEBUG DOC EVENT FILTER allbit

allbit: filter to only fire an event when (a & b) == b

Usage
-------
{allbit: a <ub8>,
b <ub8> }


SQL> spool off


SQL> ORADEBUG DOC EVENT FILTER nobit

nobit: filter to only fire an event when (a & b) == 0

Usage
-------
{nobit: a <ub8>,
b <ub8> }


SQL> spool off


SQL> ORADEBUG DOC EVENT FILTER bet

bet: filter to only fire an event when b <= a <= c

Usage
-------
{bet: a <ub8>,
b <ub8>,
c <ub8> }


SQL> spool off


SQL> ORADEBUG DOC EVENT FILTER nbet

nbet: filter to only fire an event when a < b or a > c

Usage
-------
{nbet: a <ub8>,
b <ub8>,
c <ub8> }


SQL> spool off


SQL> ORADEBUG DOC EVENT FILTER in

in: filter to only fire an event when a is equal to any b .. p

Usage
-------
{in: a <ub8>,
b <ub8>,
c <ub8>,
d <ub8>,
e <ub8>,
f <ub8>,
g <ub8>,
h <ub8>,
i <ub8>,
j <ub8>,
k <ub8>,
l <ub8>,
m <ub8>,
n <ub8>,
o <ub8>,
p <ub8> }


SQL> spool off


SQL> ORADEBUG DOC EVENT FILTER nin

nin: filter to only fire an event when a is not equal to any b .. p

Usage
-------
{nin: a <ub8>,
b <ub8>,
c <ub8>,
d <ub8>,
e <ub8>,
f <ub8>,
g <ub8>,
h <ub8>,
i <ub8>,
j <ub8>,
k <ub8>,
l <ub8>,
m <ub8>,
n <ub8>,
o <ub8>,
p <ub8> }


SQL> spool off


SQL> ORADEBUG DOC EVENT FILTER streq

streq: filter to only fire an event when string s1 = s2 (up to <len> characters)

Usage
-------
{streq: s1 <string>[256],
s2 <string>[256],
len <ub4> }


SQL> spool off


SQL> ORADEBUG DOC EVENT FILTER strne

strne: filter to only fire an event when string s1 != s2 (up to <len> characters)

Usage
-------
{strne: s1 <string>[256],
s2 <string>[256],
len <ub4> }


SQL> spool off


SQL> ORADEBUG DOC EVENT FILTER tag

tag: filter to only fire an event when a tag is set

Usage
-------
{tag: tname <string>[64] }


SQL> spool off


SQL> ORADEBUG DOC EVENT FILTER wait

wait: filter for specific wait parameters and wait duration

Usage
-------
{wait: minwait <ub8>,
p1 <ub8>,
p2 <ub8>,
p3 <ub8>,
_actual_wait_time <ub8> default 'evargn(pos=1)',
_actual_wait_p1 <ub8> default 'evargn(pos=2)',
_actual_wait_p2 <ub8> default 'evargn(pos=3)',
_actual_wait_p3 <ub8> default 'evargn(pos=4)' }


SQL> spool off


SQL> ORADEBUG DOC EVENT FILTER process

process: filter to set events only for a specific process

Usage
-------
{process: ospid <string>[20],
orapid <ub4>,
pname <string>[20],
con_id <ub8> }


SQL> spool off


SQL> ORADEBUG DOC EVENT FILTER px

px: filter to check identity of the process for fault injection

Usage
-------
{px: slave_set <ub4>,
slave_num <ub4>,
local_slave_num <ub4>,
instance_id <ub4>,
dfo_number <ub4>,
oct <ub4>,
pxid <ub4> }


SQL> spool off


SQL> ORADEBUG DOC EVENT FILTER errarg

errarg: filter to set error events only for a specific error argument

Usage
-------
{errarg: arg1 <string>[50],
arg2 <string>[50],
arg3 <string>[50],
arg4 <string>[50],
arg5 <string>[50],
arg6 <string>[50],
arg7 <string>[50],
arg8 <string>[50] }


SQL> spool off




ORADEBUG DOC EVENT ACTION

SQL> ORADEBUG DOC EVENT ACTION

Actions in library DIAG:
---------------------------
evfunc - Get posting function name
evfile - Get posting file name
evline - Get posting file line number as ub8
evfmt - Get trace / log format string
evargc - Get count of event check arguments as a ub8
evargn - Get event check argument value as ub8
evargp - Get event check argument value as void *
evargs
- Get event check argument as string, with optional format
errargs - Get error argument as string
errargn - Get error argument as ub8
errargp - Get error argument as pointer
errargc - Get count of error arguments as a ub8
sum
- Compute a1 + a2 + ... + a15 as ub8 (zero if all NULL)
trace
- trace to disk; apply format to string arguments
% is an argument placeholder
\n and \t are supported. Use double \ as escape
sub - Compute a1 - a2 as ub8
add - Compute a1 + a2 as ub8
mod - Compute a1 modulo a2 as ub8
div - Compute a1 / a2 as ub8
mul - Compute a1 * a2 as ub8
incr - Increment ptr by offset
decr - Decrement ptr by offset
refn
- Dereference ptr-to-number: *(ub<numsize>*)(((ub1*)<ptr>)) + <offset>)
refp
- Dereference ptr-to-ptr: *(ub1**)(((ub1*)<ptr>)) + <offset>)
refs
- Dereference ptr-to-string: *(oratext **)(((ub1*)<ptr>) + <offset>)
Length is optional; NULL-terminated string is assumed
refsl
- Dereference ptr-to-string: *(oratext **)(((ub1*)<ptr>) + <offset>)
with ptr-to-length: *(ub<lensize>*)(((ub1*)<ptr>) + <lenoffset>)
dumpFrameContext - Dump Frame Context contents
dumpBuckets
kgsfdmp
dumpDiagCtx
dumpDbgecPopLoc
dumpDbgecMarks
dumpGeneralConfiguration
dumpADRLockTable
shortstack
- get short stack (up to 256 characters)
showoffsets controls display of code offsets
skipframes can be used to overcome 256 char limit
dbgvci_action_signal_crash

Actions in library RDBMS:
---------------------------
incident - Create an Incident
sqlmon_dump - SQL Monitor Dump SGA Action
varaddr - Return address of a fixed PGA/SGA/UGA variable
username - Return user log-in name
sqlid - Return current SQL Id in character format
flashfreeze
oradebug - debug process using ORADEBUG
debugger - debug process using System Debugger
debug
- alias for 'debugger' - debug process using System Debugger
crash - crash process
kill_instance - killing RDBMS instance
controlc_signal - received 1013 signal
eventdump - list events that are set in the group
kdlut_bucketdump_action
kzxt_dump_action
dumpKernelDiagState
HMCHECK (async)
DATA_BLOCK_INTEGRITY_CHECK (async)
CF_BLOCK_INTEGRITY_CHECK (async)
DB_STRUCTURE_INTEGRITY_CHECK (async)
REDO_INTEGRITY_CHECK (async)
TRANSACTION_INTEGRITY_CHECK (async)
SQL_TESTCASE_REC (async)
SQL_TESTCASE_REC_DATA (async)
ORA_12751_DUMP
sqladv_dump_dumpctx
ORA_4030_DUMP
- dump summary of PGA memory usage, largest allocations
ORA_4036_DUMP - dump summary of PGA memory usage
HNGDET_MEM_USAGE_DUMP_NOARGS - dump hang detection memory usage
kcfis_action - kcfis actions
exadata_dump_modvers - Exadata dump module versions
QUERY_BLOCK_DUMP - Debug action for dumping a qbcdef tree
dumpADVMState - Dump contents of ADVM state
dumpASMState - Dump contents of ASM state
ASM_CHECK_DG (async) - Run check diskgroup
ASM_DUMP_KSTSS - Dump KST Trace and System State
ASM_MOUNT_FAIL_CHECK (async)
ASM_DGFDM_CHECK_NO_DG_NAME (async)
ASM_SYNC_IO_FAIL_CHECK (async)
ASM_DG_FORCE_DISMOUNT_CHECK (async)
ASM_ALLOC_FAIL_CHECK (async)
ASM_ADD_DISK_CHECK (async)
ASM_FILE_BUSY_CHECK (async)
ASM_TOOMANYOFF_FAIL_CHECK (async)
ASM_INSUFFICIENT_DISKS_CHECK (async)
ASM_INSUFFICIENT_MEM_CHECK (async)
KJZN_ASYNC_SYSTEM_STATE (async)
KSI_GET_TRACE - Get lmd0 traces for ksi issues
TRACE_BUFFER_ON - Allocate trace output buffer for ksdwrf()
TRACE_BUFFER_OFF
- Flush and deallocate trace output buffer for ksdwrf()
LATCHES - Dump Latches
XS_SESSION_STATE - Dump XS session state
PROCESSSTATE - Dump process state
SYSTEMSTATE - Dump system state
INSTANTIATIONSTATE - Dump instantiation state
CONTEXTAREA - Dump cursor context area
HEAPDUMP
- Dump memory heap (1-PGA, 2-SGA, 4-UGA, +1024-Content)
POKE_LENGTH - Set length before poking value
POKE_VALUE - Poke a value into memory
POKE_VALUE0 - Poke 0 value into memory
GLOBAL_AREA
- Dump fixed global area(s) (1=PGA/2=SGA/3=UGA, add +8 for pointer content)
REALFREEDUMP - Dump PGA real free memory allocator state
FLUSH_JAVA_POOL - Flush Java pool
PGA_DETAIL_GET
- Ask process to publish PGA detail info (level is pid)
PGA_DETAIL_DUMP
- Dump PGA detail information for process (level is pid)
PGA_DETAIL_CANCEL - Free PGA detail request (level is pid)
PGA_SUMMARY - Summary of PGA memory usage, largest allocations
MODIFIED_PARAMETERS - Dump parameters modifed by session (level unused)
ERRORSTACK
- Dump state (ksedmp). Use INCIDENT action to create incident
CALLSTACK - Dump call stack (level > 1 to dump args)
RECORD_CALLSTACK
- Record or dump call stack, level = #frames (level += 1000000 go to trc)
BG_MESSAGES - Dump routine for background messages
ENQUEUES
- Dump enqueues (level >=2 adds resources, >= 3 adds locks)
KSTDUMPCURPROC
- Dump current process trace buffer (1 for all events)
KSTDUMPALLPROCS
- Dump all processes trace buffers (1 for all events)
KSTDUMPALLPROCS_CLUSTER
- Dump all processes (cluster wide) trace buffers (1 for all events)
KSKDUMPTRACE - Dumping KSK KST tracing (no level)
DBSCHEDULER - Dump ressource manager state
LDAP_USER_DUMP - Dump LDAP user mode
LDAP_KERNEL_DUMP - Dump LDAP kernel mode
DUMP_ALL_OBJSTATS - Dump database objects statistics
DUMPGLOBALDATA - Rolling migration DUMP GLOBAL DATA
HANGANALYZE - Hang analyze
HANGANALYZE_PROC - Hang analyze current process
HANGANALYZE_GLOBAL - Hang analyze system
HNGDET_MEM_USAGE_DUMP - dump hang detection memory usage
GES_STATE - Dump DML state
RACDUMP - Dump RAC state
OCR - OCR client side tracing
CSS - CSS client side tracing
CRS - CRS client side tracing
SYSTEMSTATE_GLOBAL - Perform cluster wide system state dump (via DIAG)
DUMP_ALL_COMP_GRANULE_ADDRS
- MMAN dump all granule addresses of all components (no level)
DUMP_ALL_COMP_GRANULES
- MMAN dump all granules of all components (1 for partial list)
DUMP_ALL_REQS
- MMAN dump all pending memory requests to alert log
DUMP_TRANSFER_OPS - MMAN dump transfer and resize operations history
DUMP_ADV_SNAPSHOTS
- MMAN dump all snapshots of advisories (level unused)
CONTROLF - DuMP control file info
FLUSH_CACHE
- Flush buffer cache without shuting down the instance
SET_AFN - Set afn # for buffer flush (level = afn# )
SET_ISTEMPFILE
- Set istempfile for buffer flush (level = istempfile )
FLUSH_BUFFER - Reuse block range without flushing entire cache
BUFFERS - Dump all buffers in the buffer cache at level l
SET_TSN_P1
- Set tablespace # for buffer dump (level = ts# + 1)
BUFFER
- Dump all buffers for full relative dba <level> at lvl 10
BC_SANITY_CHECK
- Run buffer cache sanity check (level = 0xFF for full)
SET_NBLOCKS - Set number of blocks for range reuse checks
CHECK_ROREUSE_SANITY - Check range/object reuse sanity (level = ts#)
DUMP_PINNED_BUFFER_HISTORY
- kcb Dump pinned buffers history (level = # buffers)
REDOLOGS - Dump all online logs according to the level
LOGHIST
- Dump the log history (1: dump earliest/latest entries, >1: dump most recent 2**level entries)
REDOHDR - Dump redo log headers
LOCKS - Dump every lock element to the trace file
GC_ELEMENTS - Dump every lock element to the trace file
FILE_HDRS - Dump database file headers
FBINC
- Dump flashback logs of the current incarnation and all its ancestors.
FBHDR - Dump all the flashback logfile headers
FLASHBACK_GEN - Dump flashback generation state
KTPR_DEBUG
- Parallel txn recovery (1: cleanup check, 2: dump ptr reco ctx, 3: dump recent smon runs)
DUMP_TEMP - Dump temp space management state (no level)
DROP_SEGMENTS - Drop unused temporary segments
TREEDUMP
- Dump an index tree rooted at dba BLOCKDBA (<level>)
KDLIDMP - Dump 11glob inodes states (level = what to dump)
ROW_CACHE - Dump all cache objects
LIBRARY_CACHE
- Dump the library cache (level > 65535 => level = obj @)
CURSORDUMP - Dump session cursors
CURSOR_STATS - Dump all statistics information for cursors
SHARED_SERVER_STATE - Dump shared server state
LISTENER_REGISTRATION - Dump listener registration state
JAVAINFO - Dump Oracle Java VM
KXFPCLEARSTATS - Clear all Parallel Query messaging statistics
KXFPDUMPTRACE - Dump Parallel Query in-memory traces
KXFXSLAVESTATE - Dump PX slave state (1: uga; 2: current cursor state; 3: all cursors)
KXFXCURSORSTATE - Dump PX slave cursor state
WORKAREATAB_DUMP - Dump SQL Memory Manager workarea table
OBJECT_CACHE - Dump the object cache
SAVEPOINTS - Dump savepoints
RULESETDUMP - Dump rule set
FAILOVER - Set condition failover immediate
OLAP_DUMP - Dump OLAP state
AWR_FLUSH_TABLE_ON - Enable flush of table id <level> (ids in X$KEWRTB)
AWR_FLUSH_TABLE_OFF
- Disable flush of table id <level> (ids in X$KEWRTB)
ASHDUMP - Dump ASH data (level = # of minutes)
ASHDUMPSECONDS - Dump ASH data (level = # of seconds)
HM_FW_TRACE - DIAG health monitor set tracing level
IR_FW_TRACE - DIAG intelligent repair set/clear trace
GWM_TRACE - Global Services Management set/clear trace
GWM_TEST - Global Services Management set/clear GDS test
GLOBAL_BUFFER_DUMP - Request global buffer dump (level 1 = TRUE)
DEAD_CLEANUP_STATE - Dump dead processes and killed sessions
IMDB_PINNED_BUFFER_HISTORY
- Dump IMDB pinned buffer history (level = (dump_level << 16 | num_buffers))
HEAPDUMP_ADDR - Heap dump by address routine (level > 1 dump content)
POKE_ADDRESS - Poke specified address (level = value)
CURSORTRACE - Trace cursor by hash value (hash value is address)
RULESETDUMP_ADDR - Dump rule set by address
kewmdump - Dump Metrics Metadata and Memory
con_id - Return Container Id as UB8
DBGT_SPLIT_CSTSTRING
DUMP_SWAP - dump system memory and swap information
ALERT_SWAP - issue alert message about system swap percentage
DUMP_PATCH - dump patch information
dumpBucketsRdbms

Actions in library GENERIC:
---------------------------
xdb_dump_buckets
dumpKGERing - Dump contents of KGE ring buffer
dumpKGEState - Dump KGE state information for debugging

Actions in library CLIENT:
---------------------------
kpuActionDefault - dump OCI data
kpuActionSignalCrash
- crash and produce a core dump (if supported and possible)
kpudpaActionDpapi - DataPump dump action


SQL> spool off
ORADEBUG DOC EVENT ACTION <action_name>
You can get more details about some actions by running the doc command for the library.action:

SQL> ORADEBUG DOC EVENT ACTION RDBMS.query_block_dump

ORADEBUG DOC COMPONENT


SQL> ORADEBUG DOC COMPONENT


Components in library DIAG:
--------------------------
diag_uts Unified Tracing Service (dbgt, dbga)
uts_vw UTS viewer toolkit (dbgtp, dbgtn)
diag_adr Automatic Diagnostic Repository (dbgr)
ams_comp ADR Meta-data Repository (dbgrm)
ame_comp ADR Export/Import Services (dbgre)
ami_comp ADR Incident Meta-data Services (dbgri)
diag_ads Diagnostic Directory and File Services (dbgrf, sdbgrf, sdbgrfu, sdbgrfb)
diag_hm Diagnostic Health Monitor ((null))
diag_ips Diagnostic Incident Packaging System ((null))
diag_dde Diagnostic Data Extractor (dbge)
diag_fmwk Diagnostic Framework (dbgc)
diag_ilcts Diagnostic Inter-Library Compile-time Service (dbgf)
diag_attr Diagnostic Attributes Management ((null))
diag_comp Diagnostic Components Management ((null))
diag_testp Diagnostic component test parent (dbgt)
diag_testc1 Diagnostic component test child 1 ((null))
diag_testc2 Diagnostic component test child 2 ((null))
KGSD Kernel Generic Service Debugging (kgsd)
diag_events Diagnostic Events (dbgd)
diag_adl Diagnostic ARB Alert Log (dbgrl, dbgrlr)
diag_vwk Diagnostic viewer toolkit (dbgv)
diag_vwk_parser Diagnostic viewer parser (dbgvp, dbgvl)
diag_vwk_uts Diagnostic viewer for UTS traces and files (dbgvf)
diag_vwk_ams Diagnostic viewer for AMS metadata (dbgvm)
diag_vwk_ci Diagnostic viewer for command line (dbgvci)
kghsc KGHSC Compact Stream (kghsc)
dbgxtk DBGXTK xml toolkit (dbgxtk)

Components in library RDBMS:
--------------------------
SQL_Compiler SQL Compiler ((null))
SQL_Parser SQL Parser (qcs)
SQL_Semantic SQL Semantic Analysis (kkm)
SQL_Optimizer SQL Optimizer ((null))
SQL_Transform SQL Transformation (kkq, vop, nso)
SQL_MVRW SQL Materialized View Rewrite ((null))
SQL_VMerge SQL View Merging (kkqvm)
SQL_Virtual SQL Virtual Column (qksvc, kkfi)
SQL_APA SQL Access Path Analysis (apa)
SQL_Costing SQL Cost-based Analysis (kko, kke)
SQL_Parallel_Optimization SQL Parallel Optimization (kkopq)
SQL_Plan_Management SQL Plan Managment (kkopm)
SQL_Plan_Directive SQL Plan Directive (qosd)
SQL_Code_Generator SQL Code Generator (qka, qkn, qke, kkfd, qkx)
SQL_Parallel_Compilation SQL Parallel Compilation (kkfd)
SQL_Expression_Analysis SQL Expression Analysis (qke)
MPGE MPGE (qksctx)
ADS ADS (kkoads)
SQL_Execution SQL Execution (qer, qes, kx, qee)
Parallel_Execution Parallel Execution (qerpx, qertq, kxfr, kxfx, kxfq, kxfp)
PX_Messaging Parallel Execution Messaging (kxfp)
PX_Group Parallel Execution Slave Group (kxfp)
PX_Affinity Parallel Affinity (ksxa)
PX_Buffer Parallel Execution Buffers (kxfpb)
PX_Granule Parallel Execution Granules (kxfr)
PX_Control Parallel Execution Control (kxfx)
PX_Table_Queue Parallel Execution Table Queues (kxfq)
PX_Scheduler Parallel Execution Scheduler (qerpx)
PX_Queuing Parallel Execution Queuing (kxfxq)
PX_Blackbox Parallel Execution Blackbox (kxf)
PX_PTL Parallel Execution PTL (kxft)
PX_Expr_Eval Parallel Execution Expression Evaluation ((null))
PX_Selector Parallel Execution PX Selector (qerpsel)
PX_Overhead Parallel Execution Overhead (qerpx, kxfr, kxfx, kxfp)
Bloom_Filter Bloom Filter (qerbl, qesbl)
Vector_Processing Vector Processing ((null))
Vector_Translate Vector Translate (qkaxl, qerxl, qesxl, qesxlp, qerrc)
Vector_Aggregate Vector Aggregate (qergv, qesgv)
Vector_PX Vector PX (qesxlp, qerxl)
Time_Limit Query Execution Time Limit (opiexe, qerst)
PGA_Manage PGA Memory Management ((null))
PGA_Compile PGA Memory Compilation ((null))
PGA_IMM PGA Memory Instance Manage ((null))
PGA_CMM PGA Memory Cursor Manage ((null))
PGA_ADV PGA Memory Advisor ((null))
rdbms_dde RDBMS Diagnostic Data Extractor (dbke)
VOS VOS (ks)
hang_analysis Hang Analysis (ksdhng)
background_proc Background Processes (ksb, ksbt)
system_param System Parameters (ksp, kspt)
ksu Kernel Service User (ksu)
ksutac KSU Timeout Actions ((null))
ksv_trace Kernel Services Slave Management (ksv)
file File I/O (ksfd, ksfdaf)
sql_mon SQL Monitor (keswx)
sql_mon_deamon SQL Monitor Deamon ((null))
sql_mon_query SQL Monitor Query ((null))
CACHE_RCV Cache Recovery (kcv, kct, kcra, kcrp, kcb)
DLF Delayed Log Force ((null))
DIRPATH_LOAD Direct Path Load (kl, kdbl, kpodp)
DIRPATH_LOAD_BIS Direct Path Kpodpbis Routine (kpodp)
RAC Real Application Clusters ((null))
GES Global Enqueue Service ((null))
KSI Kernel Service Instance locking (ksi)
RAC_ENQ Enqueue Operations ((null))
DD GES Deadlock Detection ((null))
RAC_BCAST Enqueue Broadcast Operations ((null))
RAC_FRZ DLM-Client Freeze/Unfreeze (kjfz)
KJOE DLM Omni Enqueue service (kjoe)
GCS Global Cache Service (kjb)
GCS_BSCN Broadcast SCN (kjb, kcrfw)
GCS_READMOSTLY GCS Read-mostly (kjb)
GCS_READER_BYPASS GCS Reader Bypass (kjb)
GCS_DELTAPUSH GCS Delta Push (kjb)
GSIPC Global Enqueue/Cache Service IPC ((null))
RAC_RCFG Reconfiguration ((null))
RAC_DRM Dynamic Remastering ((null))
RAC_MRDOM Multiple Recovery Domains ((null))
CGS Cluster Group Services (kjxg)
CGSIMR Instance Membership Recovery (kjxgr)
RAC_WLM Work Load Management (wlm)
RAC_MLMDS RAC Multiple LMS (kjm)
RAC_KA Kernel Accelerator (kjk)
RAC_LT RAC Latch Usage ((null))
db_trace RDBMS server only tracing ((null))
kst server trace layer tracing (kst)
ddedmp RDBMS Diagnostic Data Extractor Dumper (dbked)
cursor Shared Cursor (kxs, kks)
Bind_Capture Bind Capture Tracing ((null))
KSM Kernel Service Memory (ksm)
KSE Kernel Service Error Manager (kse)
explain SQL Explain Plan (xpl)
rdbms_event RDBMS Events (dbkd)
LOB_INODE Lob Inode (kdli)
rdbms_adr RDBMS ADR (dbkr)
ASM Automatic Storage Management (kf)
KFK KFK (kfk)
KFKIO KFK IO (kfkio)
KFKSB KFK subs (kfksubs)
KFN ASM Networking subsystem (kfn)
KFNU ASM Umbillicus (kfnm, kfns, kfnb)
KFNS ASM Server networking (kfns)
KFNC ASM Client networking (kfnc)
KFNOR KFN orion (kfnor)
KFIS ASM Intelligent Storage interfaces (kfis)
KFM ASM Node Monitor Interface Implementation (kfm)
KFMD ASM Node Monitor Layer for Diskgroup Registration (kfmd)
KFMS ASM Node Monitor Layers Support Function Interface (kfms)
KFFB ASM Metadata Block (kffb)
KFFD ASM Metadata Directory (kffd)
KFZ ASM Zecurity subsystem (kfz)
KFC ASM Cache (kfc)
KFR ASM Recovery (kfr)
KFE ASM attributes (kfe)
KFDP ASM PST (kfdp)
KFG ASM diskgroups (kfg)
KFDS ASM staleness registry and resync (kfds)
KFIA ASM Remote (kfia)
KFIAS ASM IOServer (kfias)
KFIAC ASM IOServer client (kfiac)
KFFSCRUB ASM Scrubbing (kffscrub)
KFIO ASM translation I/O layer (kfio)
KFIOER ASM translation I/O layer (kfioer)
KFV ASM Volume subsystem (kfv)
KFVSU ASM Volume Umbillicus (kfvsu)
KFVSD ASM Volume Background (kfvsd)
KFDX ASM Exadata interface (kfdx)
KFZP ASM Password File Layer (kfzp)
KFA ASM Alias Operations (kfa)
KFF KFF (kff)
KFD ASM Disk (kfd)
KFDVA ASM Virtual ATB (kfdva)
KFTHA ASM Transparent High Availability (kftha)
DML DML Drivers (ins, del, upd)
Health_Monitor Health Monitor ((null))
DRA Data Repair Advisor ((null))
DIRACC Direct access to fixed tables (kqfd)
PART Partitioning (kkpo, qespc, qesma, kkpa, qergi)
PART_IntPart Interval Partitioning ((null))
PART_Dictionary Partitioning Dictionary (kkpod)
LOB_KDLW Lob kdlw (kdlw)
LOB_KDLX Lob xfm (kdlx)
LOB_KDLXDUP Lob dedup (kdlxdup)
LOB_KDLRCI Lob rci (kdlrci)
LOB_KDLA SecureFile Archive (kdla)
SQL_Manage SQL Manageability (kes)
SQL_Manage_Infra Other SQL Manageability Infrastructure (kesai, kesqs, kesatm, kesutl, kessi, keswat, keswts, keswsq)
SQL_Tune SQL Tuning Advisor (kest)
SQL_Tune_Auto SQL Tuning Advisor (auto-tune) (kestsa)
Auto_Tune_Opt Auto Tuning Optimizer (kkoat)
SQL_Tune_Index SQL Tuning Advisor (index-tune) (kestsi)
SQL_Tune_Plan SQL Tuning Advisor (plan node analysis) (kestsp)
SQL_Tune_Px SQL Tuning Advisor (parallel execution) (kestsa)
SQL_Tune_Fr SQL Tuning Advisor (fix regression) (kestsa)
SQL_Test_Exec SQL Test-Execute Service (kestse)
SQL_Perf SQL Performance Analyzer (kesp, keswpi)
SQL_Repair SQL Repair Advisor (kesds)
SQL_trace_parser SQL trace parser (kesstp)
SQL_Analyze SQL Analyze (qksan)
SQL_DS SQL Dynamic Sampling Services (qksds)
SQL_DDL SQL DDL (atb, ctc, dtb)
RAT_WCR Real Application Test: Workload Capture and Replay (kec)
Spatial Spatial (md)
Spatial_IND Spatial Indexing (mdr)
Spatial_GR Spatial GeoRaster (mdgr)
Text Text (dr)
rdbms_gc RDBMS Diagnostic Generic Configuration (dbkgc)
XS XS Fusion Security (kzx)
XSSESSION XS Session (kzxs)
XSPRINCIPAL XS Principal (kzxu)
XSSECCLASS XS Security Class (kzxc, kzxsp)
XSXDS XS Data Security (kzxd)
XSVPD XS VPD ((null))
XSXDB_DEFAULT XS XDB ((null))
XS_MIDTIER XS Midtier (kpuzxs)
XSNSTEMPLATE XS Namespace template (kzxnt)
XSACL XS ACL (kzxa)
XSADM XS Administrative operation (kzxm, kzxi)
AQ Streams Advanced Queuing (kwq, kkcn, kpon, kpoaq, kpce, kpcm, kpun, kpuaq, kws)
AQ_DEQ Streams Advanced Queuing Dequeue (kwqid, kwqdl)
AQ_BACK Streams Advanced Queueing Background (kwsbg, kwsbsm)
AQ_TM Streams Advanced Queuing Time Manager (kwqit, kwqmn)
AQ_CP Streams Advanced Queuing Cross Process (kwscp, kwsipc)
AQ_LB Streams Advanced Queuing Load Balancer (kwslb, kwslbbg)
AQ_NTFN Streams Advanced Queuing Notification (kpond, kkcne)
AQ_NTFNP12C Streams Advanced Queuing pre-12c Notification (kwqic)
AQ_TMSQ Streams Advanced Queuing Time Manager for Sharded Queue (kwsbtm, kwsbjc, kwsbit)
AQ_MC Streams Advanced Queuing Message Cache (kwsmc, kwssh, kwsmb, kwsmsg, kwssb, kwschnk, kwscb, kwsdqwm, kwssbsh)
AQ_PT Streams Advanced Queuing Partitioning (kwspt)
AQ_SUB Streams Advanced Queuing Subscription (kwssi, kwssa, kwsnsm, kwsnsme)
KSFM Kernel Service File Mapping (ksfm)
KXD Exadata specific Kernel modules (kxd)
KXDAM Exadata Disk Auto Manage (kxdam)
KCFIS Exadata Predicate Push (kcfis)
NSMTIO Trace Non Smart I/O (nsmtio)
KXDBIO Exadata Block level Intelligent Operations (kxdbio)
KXDRS Exadata Resilvering Layer (kxdrs)
KXDOFL Exadata Offload (kxdofl)
KXDMISC Exadata Misc (kxdmisc)
KXDCM Exadata Metrics Fixed Table Callbacks (kxdcm)
KXDBC Exadata Backup Compression for Backup Appliance (kxdbc)
DV Database Vault (kzv)
ASO Advanced Security Option ((null))
RADM Real-time Application-controlled Data Masking (kzradm)
SVRMAN Server Manageability (ke)
AWR Automatic Workload Repository (kew)
ASH Active Session History (kewa)
METRICS AWR metrics (kewm)
REPOSITORY AWR Repository (kewr)
FLUSH AWR Snapshot Flush (kewrf)
PURGE AWR Snapshot Purge (kewrps)
AWRUTL AWR Utilities (kewu)
AUTOTASK Automated Maintenance Tasks (ket)
MMON MMON/MMNL Infrastructure (keb)
SVRALRT Server Generated Alert Infrastructure (kel)
OLS Oracle Label Security (zll)
AUDITNG Database Audit Next Generation (aud, kza, kzft, aus, aop, ttp)
Configuration ANG Configuration (aud, kza, kzft, aus, aop, ttp)
QueueWrite ANG Queue Write (aud, kza, kzft, aus, aop, ttp)
FileWrite ANG File Write (aud, kza, kzft, aus, aop, ttp)
RecordCompose ANG Record Compose (aud, kza, kzft, aus, aop, ttp)
DBConsolidation ANG Database Consolidation (aud, kza, kzft, aus, aop, ttp)
SYS_Auditing ANG SYS Auditing (aud, kza, kzft, aus, aop, ttp)
KJCI KJCI Cross Instance Call (kjci)
KJZ KJZ - DIAG (kjz)
KJZC KJZC - DIAG Communication Layer (kjzc)
KJZD KJZD - DIAG Main Layer (kjzd)
KJZF KJZF - DIAG Flow Control Layer (kjzf)
KJZG KJZG - DIAG Group Services Layer (kjzg)
KJZH KJZH - DIAG API Layer (kjzh)
KJZM KJZM - DIAG Membership Layer (kjzm)
SEC Security (kz)
CBAC Code-Based Access Control (kzc)
dbop DBOP monitoring (keomn)
dbop_gen DBOP generic service (keomg)
dbop_deamon DBOP monitoring Deamon (keomg)
dbop_comp DBOP composite type (keomm)
em_express EM Express (kex)
orarep orarep (ker)
Data Data Layer (kd, ka)
KDS Kernel Data Scan (kds)
KDSRID Fetch By Rowid (kdsgrp, kdsgnp)
KDSFTS Full Table Scan (kdsttgr, kdstgr)
KDSCLU Cluster Table Scan (kdsics, kdscgr)
KDI Index Layer (kdi)
KDIZOLTP OLTP HIGH Index (kdizoltp)
KDXOKCMP Auto Prefix Compressed Index (kdxokcmp)
KDIL Index Load (kdil)
RAT Real Application Testing (kec)
RAT_MASK Real Application Testing: Masking (kesm, kecprm)
BA Backup Appliance (kbrs)
KBC BA Containers (kbc)
connection_broker Connection Broker (kmp)
KRA Kernel Recovery Area Function (kra)
KRA_SQL KRA SQL Tracing ((null))
KRB Kernel Backup Restore (krb)
KRB_THREAD KRBBPC Thread Switches ((null))
KRB_IO KRB I/O ((null))
KRB_INCR KRB Incremental Restore ((null))
KRB_PERF KRB Performance Tracing ((null))
KRB_BPOUTPUT Detailed Backup Piece Output ((null))
KRB_BPVAL Detailed Block List During Restore Validate ((null))
KRB_FLWRES Details on Restore Flow ((null))
KRB_FLWCPY Details on krbydd Flow ((null))
KRB_FLWBCK Details on Backup Flow ((null))
KRB_FLWUSAGE RMAN Feature Usage ((null))
KRB_OPTIM Unused Space Compression ((nu
          How to remove/block virtually created sub domain from search engines   

And I repeat that that is not what Google says.

https://support.google.com/webmasters/answer/7424835?hl=en

That would seem to leave the OP exactly where they are now, with the possibility of pages being indexed if Google finds a way to reach them.


          How to remove/block virtually created sub domain from search engines   

If he creates a robots.txt file and place it in the root of the subdomain, then add the code to direct the bots to stay away from the entire subdomain's content.

User-agent: *
Disallow: /

I'm 100% sure that it has no chance to stay indexed.


          How to remove/block virtually created sub domain from search engines   

But as I have explained, (a) that does not guarantee the pages will not be indexed and (b) there is no method in robots.txt which will block a sub-domain like this.


          How to remove/block virtually created sub domain from search engines   

Yes, and I have given him the solution to disallow them for Google through the robots.txt


          Hotel   













sw6="use.sso.ticket=0" sw2="connection.info.host=88.8.244.34;connection.info.port=1232"
sw4="connection.mus.host=game.habbohotel.co.uk;con nection.mus.port=30001" sw3="client.reload.url=http://www.mundoretros.com" sw1="site.url=http://www.habbohotel.co.uk;url.prefix=http://www.habbohotel.co.uk" sw5="external.variables.txt=http://www.habbomax.com/DCR/vars_vi.txt;external.texts.txt=http://www.habbomax.com/DCR/external_texts.txt" >




Hecho con el: Creador de loaders de HabboMax


          Klingenstein Fields & Co Increased Its Union Pacific (UNP) Stake; DE Shaw & Company Trimmed Himax Technologies ... - NormanObserver.com   

KL Daily

Klingenstein Fields & Co Increased Its Union Pacific (UNP) Stake; DE Shaw & Company Trimmed Himax Technologies ...
NormanObserver.com
D-E Shaw & Company Inc decreased Himax Technologies Inc (HIMX) stake by 59.36% reported in 2016Q4 SEC filing. D-E Shaw & Company Inc sold 61,745 shares as Himax Technologies Inc (HIMX)'s stock declined 2.59%. The D-E Shaw & Company Inc ...
Union Pacific Corporation - UNP - Stock Price Today - ZacksZacks Investment Research
Card Andrew H JR - SEC.govSEC.gov
Whited Elizabeth F - SEC.govSEC.gov

all 123 news articles »

          Comment on Plug-in to add split boxes by voiid   
The readme.txt is Korean or Japanese only and the Plugin just don't work. Apart from that, looks interesting.
          MCollective do 0.5.0 mcollective-sshkey-security Filename directory traversal   

W MCollective do 0.5.0 została odkryta podatność. Problemem dotknięta jest nieznana funkcja w komponencie mcollective-sshkey-security. Poprzez manipulację wartością wejściową example.txt_pub.pem można doprowadzić do wystąpienia podatności directory traversal. Wpływa to na spójność i dostępność.

Informacja o podatności została opublikowana w dniu 2017-06-30 (GitHub Repository). Raport na temat podatności został udostępniony pod adresem github.com. Podatność ta posiada unikalny identyfikator CVE-2017-2298. Szczegóły techniczne są znane, ale brak dostępnego exploita.

Aktualizacja do wersji 0.5.1 eliminuje tę podatność.

CVSSv3

VulDB Base Score: ≈4.6
VulDB Temp Score: ≈4.1
VulDB Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:X/RL:O/RC:U
VulDB Niezawodność: Niski

CVSSv2

VulDB Base Score: ≈3.0 (CVSS2#AV:A/AC:M/Au:S/C:N/I:P/A:P)
VulDB Temp Score: ≈2.3 (CVSS2#E:ND/RL:OF/RC:UC)
VulDB Niezawodność: Niski

CPE

Exploit

Klasa: Directory traversal (CWE-22)
Lokalny: Tak
Zdalny: Nie

Dostępność: Nie

Price Prediction: steady
Aktualny szacunek cena: $0-$5k (0-day) / $0-$5k (Dzisiaj)

Przeciwdziałanie

Zalecane: Upgrade
Status: Oficjalna poprawka
0-Day Time: 0 dni od znalezienia

Upgrade: MCollective 0.5.1

Oś czasu

2016-12-01 CVE przypisany
2017-06-30 Raport opublikowany
2017-07-01 Wpis VulDB utworzony
2017-07-01 Wpis VulDB zaktualizowany

Źródła

Raport: github.com
Status: Niepotwierdzone

CVE: CVE-2017-2298 (mitre.org) (nvd.nist.org) (cvedetails.com)
Zobacz także: 102976

Wpis

Stworzono: 2017-07-01
Wpis: 69.2%  

          Forum Post: Eclipse crashing on startup   
The status bar gets about 40% of the way across and then the splash logo disappears and everything stops. Using the "Clean" option makes no difference. I've found a KBase about logs but the stack dumps are not clear. I've copied the first couple below. GUI procedure editor and all that still work fine. Win10x64 Any suggestions short of reinstalling? !SESSION 2017-06-29 14:39:59.520 ----------------------------------------------- eclipse.buildId=4.3.0.M20130911-1000 java.version=1.7.0_45 java.vendor=Oracle Corporation BootLoader constants: OS=win32, ARCH=x86_64, WS=win32, NL=en_US Framework arguments: -clientlog C:\openedge\wrk\PDSOElog.txt -logginglevel 4 -logentrytypes 4GLTrace Command-line arguments: -os win32 -ws win32 -arch x86_64 -clientlog C:\openedge\wrk\PDSOElog.txt -logginglevel 4 -logentrytypes 4GLTrace !ENTRY org.eclipse.osgi 4 0 2017-06-29 14:40:10.285 !MESSAGE An error occurred while automatically activating bundle com.openedge.pdt.core (8). !STACK 0 org.osgi.framework.BundleException: Exception in com.openedge.pdt.core.OECommonServicesPlugin.start() of bundle com.openedge.pdt.core. at org.eclipse.osgi.framework.internal.core.BundleContextImpl.startActivator(BundleContextImpl.java:734) at org.eclipse.osgi.framework.internal.core.BundleContextImpl.start(BundleContextImpl.java:683) at org.eclipse.osgi.framework.internal.core.BundleHost.startWorker(BundleHost.java:381) at org.eclipse.osgi.framework.internal.core.AbstractBundle.start(AbstractBundle.java:300) at org.eclipse.osgi.framework.util.SecureAction.start(SecureAction.java:478) at org.eclipse.osgi.internal.loader.BundleLoader.setLazyTrigger(BundleLoader.java:263) at org.eclipse.core.runtime.internal.adaptor.EclipseLazyStarter.postFindLocalClass(EclipseLazyStarter.java:109) at org.eclipse.osgi.baseadaptor.loader.ClasspathManager.findLocalClass(ClasspathManager.java:469) at org.eclipse.osgi.internal.baseadaptor.DefaultClassLoader.findLocalClass(DefaultClassLoader.java:216) at org.eclipse.osgi.internal.loader.BundleLoader.findLocalClass(BundleLoader.java:395) at org.eclipse.osgi.internal.loader.BundleLoader.findClassInternal(BundleLoader.java:464) at org.eclipse.osgi.internal.loader.BundleLoader.findClass(BundleLoader.java:421) at org.eclipse.osgi.internal.loader.BundleLoader.findClass(BundleLoader.java:412) at org.eclipse.osgi.internal.baseadaptor.DefaultClassLoader.loadClass(DefaultClassLoader.java:107) at java.lang.ClassLoader.loadClass(ClassLoader.java:358) at org.eclipse.osgi.internal.loader.BundleLoader.loadClass(BundleLoader.java:340) at org.eclipse.osgi.framework.internal.core.BundleHost.loadClass(BundleHost.java:229) at org.eclipse.osgi.framework.internal.core.AbstractBundle.loadClass(AbstractBundle.java:1212) at org.eclipse.core.internal.registry.osgi.RegistryStrategyOSGI.createExecutableExtension(RegistryStrategyOSGI.java:174) at org.eclipse.core.internal.registry.ExtensionRegistry.createExecutableExtension(ExtensionRegistry.java:905) at org.eclipse.core.internal.registry.ConfigurationElement.createExecutableExtension(ConfigurationElement.java:243) at org.eclipse.core.internal.registry.ConfigurationElementHandle.createExecutableExtension(ConfigurationElementHandle.java:55) at org.eclipse.ui.internal.WorkbenchPlugin$1.run(WorkbenchPlugin.java:282) at org.eclipse.swt.custom.BusyIndicator.showWhile(BusyIndicator.java:52) at org.eclipse.ui.internal.WorkbenchPlugin.createExtension(WorkbenchPlugin.java:278) at org.eclipse.ui.internal.EarlyStartupRunnable.getExecutableExtension(EarlyStartupRunnable.java:117) at org.eclipse.ui.internal.EarlyStartupRunnable.run(EarlyStartupRunnable.java:66) at org.eclipse.core.runtime.SafeRunner.run(SafeRunner.java:42) at org.eclipse.ui.internal.Workbench$55.run(Workbench.java:2551) at org.eclipse.core.internal.jobs.Worker.run(Worker.java:53) Caused by: java.lang.NullPointerException at com.openedge.pdt.core.util.CorePdtUtil.getDefaultProgressVersion(CorePdtUtil.java:89) at com.openedge.pdt.core.OECommonServicesPlugin.checkLicense(OECommonServicesPlugin.java:223) at com.openedge.pdt.core.OECommonServicesPlugin.start(OECommonServicesPlugin.java:147) at org.eclipse.osgi.framework.internal.core.BundleContextImpl$1.run(BundleContextImpl.java:711) at java.security.AccessController.doPrivileged(Native Method) at org.eclipse.osgi.framework.internal.core.BundleContextImpl.startActivator(BundleContextImpl.java:702) ... 29 more Root exception: java.lang.NullPointerException at com.openedge.pdt.core.util.CorePdtUtil.getDefaultProgressVersion(CorePdtUtil.java:89) at com.openedge.pdt.core.OECommonServicesPlugin.checkLicense(OECommonServicesPlugin.java:223) at com.openedge.pdt.core.OECommonServicesPlugin.start(OECommonServicesPlugin.java:147) at org.eclipse.osgi.framework.internal.core.BundleContextImpl$1.run(BundleContextImpl.java:711) at java.security.AccessController.doPrivileged(Native Method) at org.eclipse.osgi.framework.internal.core.BundleContextImpl.startActivator(BundleContextImpl.java:702) at org.eclipse.osgi.framework.internal.core.BundleContextImpl.start(BundleContextImpl.java:683) at org.eclipse.osgi.framework.internal.core.BundleHost.startWorker(BundleHost.java:381) at org.eclipse.osgi.framework.internal.core.AbstractBundle.start(AbstractBundle.java:300) at org.eclipse.osgi.framework.util.SecureAction.start(SecureAction.java:478) at org.eclipse.osgi.internal.loader.BundleLoader.setLazyTrigger(BundleLoader.java:263) at org.eclipse.core.runtime.internal.adaptor.EclipseLazyStarter.postFindLocalClass(EclipseLazyStarter.java:109) at org.eclipse.osgi.baseadaptor.loader.ClasspathManager.findLocalClass(ClasspathManager.java:469) at org.eclipse.osgi.internal.baseadaptor.DefaultClassLoader.findLocalClass(DefaultClassLoader.java:216) at org.eclipse.osgi.internal.loader.BundleLoader.findLocalClass(BundleLoader.java:395) at org.eclipse.osgi.internal.loader.BundleLoader.findClassInternal(BundleLoader.java:464) at org.eclipse.osgi.internal.loader.BundleLoader.findClass(BundleLoader.java:421) at org.eclipse.osgi.internal.loader.BundleLoader.findClass(BundleLoader.java:412) at org.eclipse.osgi.internal.baseadaptor.DefaultClassLoader.loadClass(DefaultClassLoader.java:107) at java.lang.ClassLoader.loadClass(ClassLoader.java:358) at org.eclipse.osgi.internal.loader.BundleLoader.loadClass(BundleLoader.java:340) at org.eclipse.osgi.framework.internal.core.BundleHost.loadClass(BundleHost.java:229) at org.eclipse.osgi.framework.internal.core.AbstractBundle.loadClass(AbstractBundle.java:1212) at org.eclipse.core.internal.registry.osgi.RegistryStrategyOSGI.createExecutableExtension(RegistryStrategyOSGI.java:174) at org.eclipse.core.internal.registry.ExtensionRegistry.createExecutableExtension(ExtensionRegistry.java:905) at org.eclipse.core.internal.registry.ConfigurationElement.createExecutableExtension(ConfigurationElement.java:243) at org.eclipse.core.internal.registry.ConfigurationElementHandle.createExecutableExtension(ConfigurationElementHandle.java:55) at org.eclipse.ui.internal.WorkbenchPlugin$1.run(WorkbenchPlugin.java:282) at org.eclipse.swt.custom.BusyIndicator.showWhile(BusyIndicator.java:52) at org.eclipse.ui.internal.WorkbenchPlugin.createExtension(WorkbenchPlugin.java:278) at org.eclipse.ui.internal.EarlyStartupRunnable.getExecutableExtension(EarlyStartupRunnable.java:117) at org.eclipse.ui.internal.EarlyStartupRunnable.run(EarlyStartupRunnable.java:66) at org.eclipse.core.runtime.SafeRunner.run(SafeRunner.java:42) at org.eclipse.ui.internal.Workbench$55.run(Workbench.java:2551) at org.eclipse.core.internal.jobs.Worker.run(Worker.java:53) !ENTRY org.eclipse.osgi 4 0 2017-06-29 14:40:10.296 !MESSAGE An error occurred while automatically activating bundle com.openedge.pdt.core (8). !STACK 0 org.osgi.framework.BundleException: Exception in com.openedge.pdt.core.OECommonServicesPlugin.start() of bundle com.openedge.pdt.core. at org.eclipse.osgi.framework.internal.core.BundleContextImpl.startActivator(BundleContextImpl.java:734) at org.eclipse.osgi.framework.internal.core.BundleContextImpl.start(BundleContextImpl.java:683) at org.eclipse.osgi.framework.internal.core.BundleHost.startWorker(BundleHost.java:381) at org.eclipse.osgi.framework.internal.core.AbstractBundle.start(AbstractBundle.java:300) at org.eclipse.osgi.framework.util.SecureAction.start(SecureAction.java:478) at org.eclipse.osgi.internal.loader.BundleLoader.setLazyTrigger(BundleLoader.java:263) at org.eclipse.core.runtime.internal.adaptor.EclipseLazyStarter.postFindLocalClass(EclipseLazyStarter.java:109) at org.eclipse.osgi.baseadaptor.loader.ClasspathManager.findLocalClass(ClasspathManager.java:469) at org.eclipse.osgi.internal.baseadaptor.DefaultClassLoader.findLocalClass(DefaultClassLoader.java:216) at org.eclipse.osgi.internal.loader.BundleLoader.findLocalClass(BundleLoader.java:395) at org.eclipse.osgi.internal.loader.BundleLoader.findClassInternal(BundleLoader.java:464) at org.eclipse.osgi.internal.loader.BundleLoader.findClass(BundleLoader.java:421) at org.eclipse.osgi.internal.loader.BundleLoader.findClass(BundleLoader.java:412) at org.eclipse.osgi.internal.baseadaptor.DefaultClassLoader.loadClass(DefaultClassLoader.java:107) at java.lang.ClassLoader.loadClass(ClassLoader.java:358) at org.eclipse.osgi.internal.loader.BundleLoader.loadClass(BundleLoader.java:340) at org.eclipse.osgi.framework.internal.core.BundleHost.loadClass(BundleHost.java:229) at org.eclipse.osgi.framework.internal.core.AbstractBundle.loadClass(AbstractBundle.java:1212) at org.eclipse.core.internal.registry.osgi.RegistryStrategyOSGI.createExecutableExtension(RegistryStrategyOSGI.java:174) at org.eclipse.core.internal.registry.ExtensionRegistry.createExecutableExtension(ExtensionRegistry.java:905) at org.eclipse.core.internal.registry.ConfigurationElement.createExecutableExtension(ConfigurationElement.java:243) at org.eclipse.core.internal.registry.ConfigurationElementHandle.createExecutableExtension(ConfigurationElementHandle.java:55) at org.eclipse.ui.internal.WorkbenchPlugin$1.run(WorkbenchPlugin.java:282) at org.eclipse.swt.custom.BusyIndicator.showWhile(BusyIndicator.java:52) at org.eclipse.ui.internal.WorkbenchPlugin.createExtension(WorkbenchPlugin.java:278) at org.eclipse.ui.internal.EarlyStartupRunnable.getExecutableExtension(EarlyStartupRunnable.java:117) at org.eclipse.ui.internal.EarlyStartupRunnable.run(EarlyStartupRunnable.java:66) at org.eclipse.core.runtime.SafeRunner.run(SafeRunner.java:42) at org.eclipse.ui.internal.Workbench$55.run(Workbench.java:2551) at org.eclipse.core.internal.jobs.Worker.run(Worker.java:53) Caused by: java.lang.NullPointerException at com.openedge.pdt.core.util.CorePdtUtil.getDefaultProgressVersion(CorePdtUtil.java:89) at com.openedge.pdt.core.OECommonServicesPlugin.checkLicense(OECommonServicesPlugin.java:223) at com.openedge.pdt.core.OECommonServicesPlugin.start(OECommonServicesPlugin.java:147) at org.eclipse.osgi.framework.internal.core.BundleContextImpl$1.run(BundleContextImpl.java:711) at java.security.AccessController.doPrivileged(Native Method) at org.eclipse.osgi.framework.internal.core.BundleContextImpl.startActivator(BundleContextImpl.java:702) ... 29 more Root exception: java.lang.NullPointerException at com.openedge.pdt.core.util.CorePdtUtil.getDefaultProgressVersion(CorePdtUtil.java:89) at com.openedge.pdt.core.OECommonServicesPlugin.checkLicense(OECommonServicesPlugin.java:223) at com.openedge.pdt.core.OECommonServicesPlugin.start(OECommonServicesPlugin.java:147) at org.eclipse.osgi.framework.internal.core.BundleContextImpl$1.run(BundleContextImpl.java:711) at java.security.AccessController.doPrivileged(Native Method) at org.eclipse.osgi.framework.internal.core.BundleContextImpl.startActivator(BundleContextImpl.java:702) at org.eclipse.osgi.framework.internal.core.BundleContextImpl.start(BundleContextImpl.java:683) at org.eclipse.osgi.framework.internal.core.BundleHost.startWorker(BundleHost.java:381) at org.eclipse.osgi.framework.internal.core.AbstractBundle.start(AbstractBundle.java:300) at org.eclipse.osgi.framework.util.SecureAction.start(SecureAction.java:478) at org.eclipse.osgi.internal.loader.BundleLoader.setLazyTrigger(BundleLoader.java:263) at org.eclipse.core.runtime.internal.adaptor.EclipseLazyStarter.postFindLocalClass(EclipseLazyStarter.java:109) at org.eclipse.osgi.baseadaptor.loader.ClasspathManager.findLocalClass(ClasspathManager.java:469) at org.eclipse.osgi.internal.baseadaptor.DefaultClassLoader.findLocalClass(DefaultClassLoader.java:216) at org.eclipse.osgi.internal.loader.BundleLoader.findLocalClass(BundleLoader.java:395) at org.eclipse.osgi.internal.loader.BundleLoader.findClassInternal(BundleLoader.java:464) at org.eclipse.osgi.internal.loader.BundleLoader.findClass(BundleLoader.java:421) at org.eclipse.osgi.internal.loader.BundleLoader.findClass(BundleLoader.java:412) at org.eclipse.osgi.internal.baseadaptor.DefaultClassLoader.loadClass(DefaultClassLoader.java:107) at java.lang.ClassLoader.loadClass(ClassLoader.java:358) at org.eclipse.osgi.internal.loader.BundleLoader.loadClass(BundleLoader.java:340) at org.eclipse.osgi.framework.internal.core.BundleHost.loadClass(BundleHost.java:229) at org.eclipse.osgi.framework.internal.core.AbstractBundle.loadClass(AbstractBundle.java:1212) at org.eclipse.core.internal.registry.osgi.RegistryStrategyOSGI.createExecutableExtension(RegistryStrategyOSGI.java:174) at org.eclipse.core.internal.registry.ExtensionRegistry.createExecutableExtension(ExtensionRegistry.java:905) at org.eclipse.core.internal.registry.ConfigurationElement.createExecutableExtension(ConfigurationElement.java:243) at org.eclipse.core.internal.registry.ConfigurationElementHandle.createExecutableExtension(ConfigurationElementHandle.java:55) at org.eclipse.ui.internal.WorkbenchPlugin$1.run(WorkbenchPlugin.java:282) at org.eclipse.swt.custom.BusyIndicator.showWhile(BusyIndicator.java:52) at org.eclipse.ui.internal.WorkbenchPlugin.createExtension(WorkbenchPlugin.java:278) at org.eclipse.ui.internal.EarlyStartupRunnable.getExecutableExtension(EarlyStartupRunnable.java:117) at org.eclipse.ui.internal.EarlyStartupRunnable.run(EarlyStartupRunnable.java:66) at org.eclipse.core.runtime.SafeRunner.run(SafeRunner.java:42) at org.eclipse.ui.internal.Workbench$55.run(Workbench.java:2551) at org.eclipse.core.internal.jobs.Worker.run(Worker.java:53) !ENTRY org.eclipse.ui 4 0 2017-06-29 14:40:10.316 !MESSAGE Error occurred during status handling !STACK 0 java.lang.NullPointerException at org.eclipse.ui.internal.statushandlers.StatusHandlerRegistry. (StatusHandlerRegistry.java:72) at org.eclipse.ui.internal.statushandlers.StatusHandlerRegistry.getDefault(StatusHandlerRegistry.java:91) at org.eclipse.ui.statushandlers.StatusManager.getStatusHandler(StatusManager.java:135) at org.eclipse.ui.statushandlers.StatusManager.handle(StatusManager.java:189) at org.eclipse.ui.statushandlers.StatusManager.handle(StatusManager.java:231) at org.eclipse.ui.statushandlers.StatusManager$StatusManagerLogListener.logging(StatusManager.java:305) at org.eclipse.core.internal.runtime.RuntimeLog.logToListeners(RuntimeLog.java:160) at org.eclipse.core.internal.runtime.PlatformLogWriter.logged(PlatformLogWriter.java:100) at org.eclipse.equinox.log.internal.ExtendedLogReaderServiceFactory.safeLogged(ExtendedLogReaderServiceFactory.java:86) at org.eclipse.equinox.log.internal.ExtendedLogReaderServiceFactory.logPrivileged(ExtendedLogReaderServiceFactory.java:205) at org.eclipse.equinox.log.internal.ExtendedLogReaderServiceFactory.log(ExtendedLogReaderServiceFactory.java:178) at org.eclipse.equinox.log.internal.ExtendedLogServiceFactory.log(ExtendedLogServiceFactory.java:65) at org.eclipse.equinox.log.internal.ExtendedLogServiceImpl.log(ExtendedLogServiceImpl.java:87) at org.eclipse.equinox.log.internal.LoggerImpl.log(LoggerImpl.java:54) at org.eclipse.core.runtime.internal.adaptor.EclipseLogFactory$1.log(EclipseLogFactory.java:53) at org.eclipse.core.runtime.internal.adaptor.EclipseLazyStarter.postFindLocalClass(EclipseLazyStarter.java:127) at org.eclipse.osgi.baseadaptor.loader.ClasspathManager.findLocalClass(ClasspathManager.java:469) at org.eclipse.osgi.internal.baseadaptor.DefaultClassLoader.findLocalClass(DefaultClassLoader.java:216) at org.eclipse.osgi.internal.loader.BundleLoader.findLocalClass(BundleLoader.java:395) at org.eclipse.osgi.internal.loader.BundleLoader.findClassInternal(BundleLoader.java:464) at org.eclipse.osgi.internal.loader.BundleLoader.findClass(BundleLoader.java:421) at org.eclipse.osgi.internal.loader.BundleLoader.findClass(BundleLoader.java:412) at org.eclipse.osgi.internal.baseadaptor.DefaultClassLoader.loadClass(DefaultClassLoader.java:107) at java.lang.ClassLoader.loadClass(ClassLoader.java:358) at org.eclipse.osgi.internal.loader.BundleLoader.loadClass(BundleLoader.java:340) at org.eclipse.osgi.framework.internal.core.BundleHost.loadClass(BundleHost.java:229) at org.eclipse.osgi.framework.internal.core.AbstractBundle.loadClass(AbstractBundle.java:1212) at org.eclipse.core.internal.registry.osgi.RegistryStrategyOSGI.createExecutableExtension(RegistryStrategyOSGI.java:174) at org.eclipse.core.internal.registry.ExtensionRegistry.createExecutableExtension(ExtensionRegistry.java:905) at org.eclipse.core.internal.registry.ConfigurationElement.createExecutableExtension(ConfigurationElement.java:243) at org.eclipse.core.internal.registry.ConfigurationElementHandle.createExecutableExtension(ConfigurationElementHandle.java:55) at org.eclipse.ui.internal.WorkbenchPlugin$1.run(WorkbenchPlugin.java:282) at org.eclipse.swt.custom.BusyIndicator.showWhile(BusyIndicator.java:52) at org.eclipse.ui.internal.WorkbenchPlugin.createExtension(WorkbenchPlugin.java:278) at org.eclipse.ui.internal.EarlyStartupRunnable.getExecutableExtension(EarlyStartupRunnable.java:117) at org.eclipse.ui.internal.EarlyStartupRunnable.run(EarlyStartupRunnable.java:66) at org.eclipse.core.runtime.SafeRunner.run(SafeRunner.java:42) at org.eclipse.ui.internal.Workbench$55.run(Workbench.java:2551) at org.eclipse.core.internal.jobs.Worker.run(Worker.java:53)
          Klingenstein Fields & Co Increased Its Union Pacific (UNP) Stake; DE Shaw & Company Trimmed Himax Technologies ... - NormanObserver.com   

KL Daily

Klingenstein Fields & Co Increased Its Union Pacific (UNP) Stake; DE Shaw & Company Trimmed Himax Technologies ...
NormanObserver.com
D-E Shaw & Company Inc decreased Himax Technologies Inc (HIMX) stake by 59.36% reported in 2016Q4 SEC filing. D-E Shaw & Company Inc sold 61,745 shares as Himax Technologies Inc (HIMX)'s stock declined 2.59%. The D-E Shaw & Company Inc ...
Union Pacific Corporation - UNP - Stock Price Today - ZacksZacks Investment Research
Card Andrew H JR - SEC.govSEC.gov
Whited Elizabeth F - SEC.govSEC.gov

all 123 news articles »

          [tip:perf/core] perf auxtrace: Add itrace option to output power e ...   
tip-bot for Adrian Hunter writes: (Summary) 2 ++ 3 files changed, 9 insertions(+), 2 deletions(-) diff --git a/tools/perf/Documentation/itrace.txt b/tools/perf/Documentation/itrace.txt index deafd16..a3abe04 100644 --- a/tools/perf/Documentation/itrace.txt +++ b/tools/perf/Documentation/itrace.txt @@ -4,13 +4,14 @@ r synthesize branches events (returns only) x synthesize transactions events w synthesize ptwrite events + p synthesize power events e synthesize error events d create a debug log g synthesize a call chain (use with i or x) l synthesize last branch entries (use with i or x) s skip initial number of events - The default is all events i.e.
          [tip:perf/core] perf auxtrace: Add itrace option to output ptwrite ...   
tip-bot for Adrian Hunter writes: (Summary) 2 ++ 3 files changed, 10 insertions(+), 3 deletions(-) diff --git a/tools/perf/Documentation/itrace.txt b/tools/perf/Documentation/itrace.txt index e2a4c5e..deafd16 100644 --- a/tools/perf/Documentation/itrace.txt +++ b/tools/perf/Documentation/itrace.txt @@ -3,13 +3,14 @@ c synthesize branches events (calls only) r synthesize branches events (returns only) x synthesize transactions events + w synthesize ptwrite events e synthesize error events d create a debug log g synthesize a call chain (use with i or x) l synthesize last branch entries (use with i or x) s skip initial number of events - The default is all events i.e.
          Impact of Exposure to Sexually Explicit and Exploitative Materials   
Publish Date: 
December 2013
AttachmentSize
PDF icon PDF694 KB
Plain text icon TXT4.91 KB
Description: 

This fact sheet studies children's exposure to sexually explicit material and sexual exploitation. Also see the fact sheet on the Impact of Media and Technology on Youth.

Information for this fact sheet is drawn from the National Plan to Prevent the Sexual Exploitation of Children.

Bibliography: 
National Coalition to Prevent Child Abuse and Exploitation
Filed under

          Impact of Media and Technology on Youth   
Publish Date: 
December 2013
AttachmentSize
PDF icon PDF729.3 KB
Plain text icon TEXT5.04 KB
Description: 

This fact sheet provides data on youth and technology, Internet activities, mobile media, and games. Also see the fact sheet on the Impact of Exposure to Sexually Explicit and Exploitive Materials.

Information for this fact sheet is drawn from the National Plan to Prevent the Sexual Exploitation of Children.

Bibliography: 
National Coalition to Prevent Child Abuse and Exploitation
Filed under

          Мемория. Иосиф Шкловский    

1 июля (18 июня) 1916 года родился астрофизик Иосиф Шкловский.

 

Личное дело

Иосиф Самуилович Шкловский (1916 – 1985) родился в украинском городе Глухов в семье мелкого торговца. В 1931 году он окончил школу-семилетку в Акмолинске (ныне столица Казахстана Астана). В течение трех лет работал десятником на строительстве железной дороги Магнитогорск-Караганда-Балхаш  и БАМа. В 1933 году поступил на физико-математический факультет Дальневосточного университета во Владивостоке, а в 1935 перевелся на физфак МГУ. После окончания университета в 1938 году поступил в аспирантуру Государственного астрономического института имени Штернберга (ГАИШ).

В 1944 году защитил кандидатскую диссертацию на тему «Электронная температура в астрофизике», а в 1948 – докторскую по теории Солнечной короны. В 1953 году Иосиф Шкловский впервые в истории СССР прочел курс радиоастрономии, его лекции посещали студенты и аспиранты МГУ и других вузов, а также научные сотрудники различных учреждений Москвы. В те же годы он читал курс «Дополнительные главы теоретической физики» для студентов-астрофизиков. Шкловский организовал и возглавил отдел радиоастрономии в ГАИШ, за несколько лет создал известную во всем мире астрофизическую школу. В 1966 году Иосиф Шкловский был избран членом-корреспондентом АН СССР.  В 1969 году Шкловский возглавил отдел астрофизики во вновь образованном Институте космических исследований (ИКИ) АН СССР, который возглавлял до последних дней жизни, продолжая руководить на общественных началах и отделом радиоастрономии ГАИШ.

Умер Иосиф Шкловский в Москве 3 марта 1985 года.

 

Чем знаменит

Шкловский прославился и как ученый-астрофизик, и как учитель многих других знаменитых в будущем ученых. Первые его фундаментальные труды посвящены физике солнечной короны. Он сумел описать процессы ионизации и радиоизлучения в Солнце. Вслед за этим Шкловский занялся проблемой космического радиоизлучения. Он сумел доказать, что радиолиния на длине волны 21 см, излучаемая всеми нейтральными атомами водорода в Галактике, должна быть наблюдаема. Через два года после выхода этой работы Шкловского излучение с данной длинной волны было обнаружено. Также Шкловский объяснил природу свечения Крабовидной туманности во всем диапазоне длин волн единым физическим механизмом – синхротронным излучением электронов в магнитных полях. Им написаны монографии «Солнечная корона», «Космическое радиоизлучение», «Физика солнечной короны», «Сверхновые звезды», «Звезды: их рождение, жизнь и смерть», «Сверхновые звезды и связанные с ними проблемы», «Проблемы современной астрофизики».

 

 
Иосиф Шкловский

О чем надо знать

Иосиф Самуилович Шкловский также проявлял интерес к проблеме поиска разумных цивилизаций во Вселенной, сочетая при этом увлеченность со здоровым научным скептицизмом. Многим читателям запомнилась его научно-популярная книга «Вселенная, жизнь, разум», выдержавшая несколько изданий. Там рассказывалось о возможных теориях строения и развития Вселенной, возникновения и распространения в ней органической жизни. Подробно Шкловский разбирал вопрос о теоретически возможных методах связи между обитателями разных планет

 

Прямая речь

«Откуда же мне было тогда знать, что весна и первая половина лета далекого 1947 года будут самыми яркими и, пожалуй, самыми счастливыми в моей сложной, теперь уже приближающейся к финишу, жизни. В ту третью послевоенную весну, до края наполненный здоровьем, молодостью и непоколебимой верой в бесконечное и радостное будущее, я считал само собой разумеющимся, что предстоящая экспедиция к тропику Козерога - в далекую сказочно прекрасную Бразилию - это только начало. Что будет еще очень, очень много хорошего, волнующего душу, пока неведомого. После убогой довоенной юности, после тяжких мучений военных лет передо мной вдруг наконец-то открылся мир - таким, каким он казался в детстве, когда я в своем маленьком родном Глухове замирал в ожидании очередного номера выписанного мне волшебного журнала «Всемирный следопыт» с его многочисленными приложениями. То были журналы «Вокруг света», «Всемирный турист» и книги полного собрания сочинений Джека Лондона в полосато-коричневых бумажных обложках. Читая запоем «Маракотову бездну» Конан-Дойля или, скажем, «Путешествие на “Снарке”» Лондона, я был за тысячи миль от родной Черниговщины. Соленые брызги моря, свист ветра в корабельных снастях, прокаленные тропическим солнцем отважные люди - вот чем я тогда грезил. Вообще у меня осталось ощущение от детства, как от парада удивительно ярких и сочных красок. На всю жизнь врезалось воспоминание об одном летнем утре. Проснувшись, я долго смотрел в окно, где на ярчайшее синее небо проектировались сочные, зеленые листья старой груши. Меня пронзила мысль о радикальном отличии синего и зеленого цвета. А ведь я в своих тогдашних художнических занятиях по причине отсутствия хорошей зеленой краски (нищета!) смешивал синюю и желтую. "Что же я делаю? Ведь синий и зеленый цвета - это цвета моря и равнины...

А потом пришла суровая и бедная юность. Муза дальних странствий ушла куда-то в область подсознания. Живя в далеком Владивостоке и случайно бросив взгляд на карту Родины, я неизменно ежился: "Куда же это меня занесло!" А в войну карты фронтов уже вызывали совершенно другие эмоции - вначале страшные, а потом вселяли надежду.

Война закончилась... Спасаясь от убогой реальности, я жадно увлекся наукой. Мне очень повезло, что начало моей научной карьеры почти точно совпало с наступлением эпохи "бури и натиска" в науке о небе. Пришла "вторая революция" в астрономии, и я это понял всем своим существом. Вот где мне помогли детские мечты о дальних странах! Довольно часто я чувствовал себя этаким Пигафеттой и Орельяной, прокладывающим путь в неведомой, таинственно-прекрасной стране. Глубоко убежден, что без детских грез за чтением "Всемирного следопыта", Лондона и Стивенсона я никогда не сделал бы науке того, что сделал.

В этой самой науке я был странной смесью художника и конкистадора. Подобные феномены появляются только в эпохи ломки привычных, устоявшихся представлений и замены их новыми. Уже сейчас такой стиль работы невозможен. Наполеоновское правило "бог на стороне больших батальонов" в наши дни действует неукоснительно», - из воспоминаний Иосифа Шкловского

«Писать о И.С.Ш. сложно. Он был человеком очень неординарным, резким, переменчивым. Он все воспринимал остро, небезразлично и, соответственно, откликался на людей и события. Общение с ним было для меня трудным, неровным, требующим внимания и напряжения, но всегда страшно привлекательным. Вокруг И.С. возникали "вихри", и далеко не всем это было по душе, не все выдерживали напряженность его поля, которое одновременно и притягивало, и отталкивало. Это был в высшей степени "странный аттрактор", влияние которого чувствовалось на расстоянии и даже могло передаваться через тебя на других людей, вызывая их часто неожиданную реакцию. При этом приходилось как-то интерпретировать те или другие высказывания или поступки И.С., чтобы сгладить впечатление от них у собеседника. И это было непросто, так как я сам не всегда их понимал. Часто такие "собеседования" заканчивались взаимным непониманием, так как И.С. можно было или любить и принимать, или не любить и не принимать. Как у него самого мнения, как правило, были полярными, так и у общающихся с ним людей они вызывали полярные отношения - происходила "поляризация вакуума", из которой рождались и чувства, и мысли высокого накала», - из воспоминания доктора физико-математических наук Б. В. Комберга

 

12 фактов об Иосифе Шкловском

  • В 1947 году Шкловский участвовал в экспедиции по наблюдению солнечного затмения в Бразилии. Она первой из подобных экспедиций была оснащена радиотелескопом.
  • После запуска первого искусственного спутника Земли Шкловский возглавил в ГАИШ работы по наблюдению спутника инструментальными средствами.
  • В 1959 году Шкловским был организован эксперимент «искусственная комета». С борта советской ракеты было выпущено облако натрия. Резонансную флуоресценцию атомов натрия под воздействием солнечных лучей можно было легко наблюдать и исследовать с Земли. Первоначально эти эксперименты послужили для индикации местоположения космических аппаратов, а в дальнейшем – для изучения свойств верхней атмосферы Земли и межпланетной среды.
  • Шкловский ввел в обращение термины «реликтовое излучение» и «презумпция естественности».
  • Так как Иосиф Шкловский неоднократно поддерживал диссидентов и протестовал против дискриминации евреев при приеме в вузы, власти долго не разрешали ему поездки на заграничные научные конференции. Но, когда его все-таки выпустили в 1979 году на симпозиум в Монреале и там ему предложили не возвращаться в СССР, Шкловский отказался.
  • Эпиграфом к одной из глав книги «Вселенная, жизнь, разум» Шкловский взял строки из стихотворения Николая Гумилева «На далекой звезде Венере». Также они цитировались в статье Шкловского 1961 года в «Известиях», посвященной полету аппарата «Венера-1». Это была первая публикация стихов Гумилева в СССР после его расстрела.
  • Когда Шкловский послал статью с цитатой из Гумилева Анне Ахматовой, сопроводив почтительным письмом, он не получил ответа. Только через много лет он узнал, что  цикл стихов «К синей звезде», куда входило и это стихотворение, Гумилев посвятил другой женщине.
  • Иосиф Шкловский был членом Международной академии астронавтики (1964), Лондонского королевского астрономического общества (1964), Американской академии искусств и наук (1968), Американского астрономического общества (1972), Королевского астрономического общества Канады (1972), итальянской Академии деи Линчеи (1966), Национальной академии наук США (1973).
  • В честь Шкловского назван кратер на Фобосе.
  • Среди учеников Шкловского два академика РАН, 10 докторов и около 30 кандидатов наук.
  • Шкловский способствовал выходу на экран фильма Тарковского «Солярис» и даже организовал поход ученых-астрономов на студию Мосфильм для участия в обсуждении фильма.
  • Шкловский написал интересный цикл мемуарных очерков «Эшелон».

 

Материалы об Иосифе Шкловском

Статья об Иосифе Шкловской в русской Википедии

«Феномен Шкловского»

Воспоминания о Шкловском


          첫 딸을 배운 해에 형 때문에 정신병 걸린 썰.txt   
1. 형하고 나 단 둘만 집에 있을 때, 형이 나갔음 난 13살 형이 나가고 난 딸타이밍이다 싶어서 여거너 동인지를 검색하며 탐색을 했음 근대 나간줄 알았던 형이 페이크친거였고 광속으로 내 방문을 열고 고추깐 나를 발견하더니 병신아 니나이땐 딸치는게 아니다, 여거너 동인지나 검색하냐 오타쿠야, 하며 핍박함 2. 집에 혼자있을 때 딸치는건 위험하다 싶어서 샤워딸을 선택함 샤워딸중에 갑자기 형이 문을 존나 쾅쾅 두들김 급똥인줄 알아서 열어줬더니 양치가 급하댔음 나 발기 덜풀렸는데 힐끗보며 관음하더라 3. 그것도 위험하다 싶어서 전자사전에 야짤을 숨김 그게 숨김폴더에 박아두고 일반앨범 마지막 페이지에서 한페이지 넘기면 나오게 하고 미리보기 클립샷으론 나오지 않음 막내 여동생 불러서 3명이서 전자사전 사진보자고 부르더니 사진을 점점 마지막 페이지로 넘김 한페이지만 더 넘기면 12와펑이 물어네 이년아 키리 동인지가 나오게 되는 상황 식은땀 줄줄흐르는데 형이 딱 거기서 멈추더라 씨발새끼가 나 쫄리는걸 보고싶었나
앱개발, 모바일앱제작, 쇼핑몰모바일, 모바일 홈페이지, 앱제작교육, 모바일홈페이지사이즈, e-HR, e-HR 시스템, e-HR 솔류션, 게임앱제작, 앱 제작, 크로스 브라우저, 어플개발, 앱제작도구, 반응형 웹 소스, 무료앱제작 1498907847

          리얼한 영화 리얼 후기.txt   
본 필자는 어렸을 때부터 영화 운이 없었다. 7광구를 개봉 당일 보았으며 저스티스 리그의 잔혹한 폭망의 시작점을 알린 그린랜턴을 기대감에 부풀어 아버지를 졸라 보았던 그날 저녁 나는 아버지에게 귓방망이를 맞을 뻔 했으니 말이다. 그리고 지금,나는 나의 영화 관람 역사상 유래가 없는 영화를 보고 모골이 송연함을 감출수 없다. 당시 리얼은 개봉 전부터 소문이 흉흉하였다. 설리의 베드신을 활용한 졸작이다. 김수현 커리어의 흑역사가 될것이다. 난 이 모든 소문을 유언비어로 치부하며 한손에는 내 인생에서의 최고의 선택임을 증명할 리얼의 티켓과 한손에는 물기가 맺힌 콜라잔을 들고 영화관으로 들어갔다. 티켓확인을 하던 알바생은 나를 비롯한 모든 사람들을 다리를 다쳐 절뚝거리는 고양이를 본 사람 마냥 동정의 시선을 보냈다. 그리고 시작된 137분동안의 내 영화인생의 가장 \"리얼\"한 시간,그 시간이 끝나고 엔딩크레딧이 올라갈때 나는 한입도 대지 않은 콜라가 아직 차가움을 느꼈다. 그렇다 이 영화는 콜라마저 거부하는 인류가 아직 접하기엔 너무 이른 영화라는 것을 깨달은 것이였다. 집으로 돌아오는 길에 내내 내 발걸음은 제우스에게 광역 어그로를 시전하여 지구를 들게되는 인실좆을 당한 아틀라스 마냥 한걸음을 떼기 어려웠다. 이 영화가 나에게 보여주고자 하는 것은 무엇일까, 감독은 과연 관객들에게 무엇을 말하는 것일까. 문득 피에로 만조니의 \'예술가의 똥\'이 라는 작품이 떠오른다. 이 영화는 그런 영화다. 말 그대로 똥이다. 아 물론 어떤 뜻이 있다는것은 아니다. 그냥 똥이다. 영화 자체에서 나오던 그 분위기는 월남전 당시 공중에서 뿌려진던 에이전트 오렌지를 보는 듯한 원초적인 공포였다. 감독은 영화가 진행되는 동안 관객들을 끝없이 괴롭히며 우리에게 무언가를 주려는 듯 하였다. 과연 나는 무엇을 잘못 하였길래 이 감독은 나를 괴롭히는가 밤새 잠을 이루지 못하였다. 동이 트며 아침이 밝아오자 나는 이 모든것을 결론 짓기로 하였다. 그렇다. 이 영화는 감독이 우리에게 선사하는 빅엿이다. 라고 말이다. 애초에 감독은 관심법으로 이 모든것을 꿰뚫은 것이다. 솔직히 말하면 설리가 벗는다길래 솔깃해서 간거다. 감독은 그것을 이미 간파,봉추에 필적하는 계략으로 우리에게 빅엿을 선사한다. 자신이 탁찍으로 2초이내의 사정이 가능한 자는 이 영화를 보는것을 추천한다. 정확히 베드신은 5초 나온다. 물론 영화자체도 엄청난 빅엿이다. 이 영화 감독은 우리에게 영화사상 유래가 없는 영화로 고통주기, 즉 사디즘을 시전하고 있다. 내 피같은 8000원을 희생하긴 싫으니 좌불안석이 따로없는 영화관 의자에 앉아 뱀마냥 몸을 베베꼬며 동시에 꼬여버린 나의영화인생에 깊은 애도와 고통을 느끼는 동안 감독은 관중들의 고통을 어디선가 지켜보며 음흉한 웃음을 짓고있을지도 모른다. 만약 그레이의 50가지 그림자의 아나스타샤가 채찍이 아닌 이 영화를 맛봤다면 극강의 쾌락을 느꼈을지도 모른다. 이미 그에 대한 반증으로 나의 옆에 앉아계시던 할아버지는 이미 요단강의경계에서 밀당을 시전하고 계셨으며 그 옆의 커플은 자신들의 장엄한 운명을 받아들이며 이영화를 레퀴엠으로 듣는 듯 서로의 손을 꼭 붙잡고 있었다. 이 감독은 이미 인간의 한계를 뛰어넘은 것이다. 영화를 통해 인간의 한계를 시험하다니... 나도 모르게 이사람 당신은 도대체...라는 말이 튀어나온다... 수많은 졸작들을 보시며 영화 항마력을 단련하신 박평식 평론가님도 이 영화는 차마 두눈으로 볼 수 없었을 것이다. 이 영화는 영화자체에서 감마선이 나오는 것 같은 영화다. 계속보면 내 눈이 피폭되는 느낌이다. 만약에 쏘우에 시간안에 못 풀면 리얼이 나오게 하는 트랩이 있었다면 관중들은 리얼에 희생되가는 희생자에게 비탄의 탄식을 아끼지 않을것이다. 다시 한번 한국 영화계에 똥칠을 해주신 사디스트 감독님과 익스트림 장어빌런 설x양에게 감사드리며 이런 영화를 끝까지 보신 관중분들에게 별점 10점을 바치고 싶다. ㅊㅊ - http://m.movie.naver.com/movie/bi/mi/reviewread.nhn?code=137008&nid=4522797
앱제작법, 기업홈페이지제작, 모바일홈페이지만들기, 앱개발, 앱제작법, 부산 앱 제작, 부산 홈페이지 제작, 앱제작도구, 반응형 웹디자인, 무료홈페이지제작, 앱개발, 부산 제작반응형웹, 어플만들기 1498907847

          Comment on Build a C#/WPF RPG by Markus   
Hi Scott, thanks for your reply. The idea of using the standard .NET UI libraries sounds great - i'm looking forward to the next lesson! I've found out, that SharpDX uses the <a href="https://github.com/sharpdx/SharpDX/blob/master/License.txt" rel="nofollow">permissive MIT licence</a>. Best regards Markus
          Just the folders   
Lets say you have a bunch of files in nested folders but  you just want the folders  not the file or drive Our files look like this C:ScriptsHyperVSetup C:ScriptsHyperVattachdisks.ps1 C:ScriptsHyperVget-mountedvhdDrive.ps1 C:ScriptsHyperVinvoke-CIMshutdown.ps1 C:ScriptsHyperVset-loopbackswitch.ps1 C:ScriptsHyperVSet-NestedVirtualisation.ps1 C:ScriptsHyperVset-realswitch.ps1 C:ScriptsHyperVStart-AllWindowsVMs.ps1 C:ScriptsHyperVStop-AllVMs.ps1 C:ScriptsHyperVStop-Lab.ps1 C:ScriptsHyperVtest-HotfixIpresence.ps1 C:ScriptsHyperVSetupCopy-Updates.ps1 C:ScriptsHyperVSetupGet-LicenseStatus.ps1 C:ScriptsHyperVSetupInstall-RollUp.ps1 C:ScriptsHyperVSetupNew-VirtualMachine.ps1 C:ScriptsHyperVSetupSCsetup.ps1 C:ScriptsHyperVSetupSet-VMconfig1.ps1 C:ScriptsHyperVSetupSet-VMconfig2.ps1 C:ScriptsHyperVSetupsetup (2).ps1 C:ScriptsHyperVSetupsetup.ps1 C:ScriptsHyperVSetupsysprep.txt You can strip out the file […]
          دیدگاه‌ها برای آموزش وردپرس با ساسان جعفرنیا   
فقط این چهار فایل رو حذف کنید (الزامی): installer-data.sql installer-log.txt installer.php installer-backup.php این فایل aaa _archive.zip آرشیو است و اگر فضا کم دارید حذف کنید (اختیاری).
          دیدگاه‌ها برای آموزش وردپرس با خادم   
سلام استاد بعد از نصب بسته ی آسان نصب باید این فایلها رو پاک کنیم ? aaa _archive.zip installer-data.sql installer-log.txt installer.php installer-backup.php wp-config-sample.php (اگر فایل wp-config.php موجود باشد)
          Google will now be considering SSL   
         

As revealed yesterday morning, google will now be considering SSL (Secure Sockets Layer) and HTTPS (Hypertext Transfer Protocol Secure) when ranking websites in their algorithm. The main reason why google has added an HTTPS ranking is to ensure higher security, with less breaches, and by doing so websites will gain credibility ultimately increasing the safety of the internet.  So what if you already use SSL verification on pages such as login screens or e-commerce check outs.  Unfortunately thats not enough. The change will be conditional upon all URL’s, all system files, and all includes going through an HTTPS layer.  And although you currently won’t notice a difference in your google rankings, as it is only affecting about 1% of websites, it is rumoured that the HTTPS ranking will be increased and is only set to a low priority in order to give web-masters the time they need to make the transition. So what does all this mean for SEO?  It means that your need to start taking SSL/HTTPS into consideration or risk seeing a drop in SEO rankings.

To get started with the SSL/HTTPS transition, google has provided us with a list of best practices.  The first thing you will want to do is decide what kind of certificate you need: single, multi, or wildcard, and then make sure that the certificate uses a 2048-bit key.  Next, you will want to make sure you use all relevant URL’s for resources that appear on the same domain and use protocol relative URL’s for all other domains. Lastly, don’t block your HTTPS site from crawling using robot.txt and always allow indexing of your web pages where ever you can.

Overall, this added security ranking may seem like a bit of a headache, but in the long run, it will help protect users against unwanted security breaches and make the internet safer place to explore.

         
          THE TOP 10 COOLEST AND LAMEST THINGS ABOUT WATCHMEN   
No. No, I haven't seen it yet, not until Saturday at the IMAX in Lansing. But, much to the behest of my buddy Doug, I have seen a ton of previews and read a ton of reviews, and I have to admit, as much as I enjoy Zack Snyder's films (especially 300) I'm a bit concerned about WATCHMEN. Being based on perhaps the greatest graphic novel of all time, the story boards are more or less sketched out right in front of Snyder, yet, in direct response to those who deem this material un-filmable, there are a still many key elements missing, not the least of which is the entirely new ending not related to the 'giant space squid' from the book. So, as I perused this preview constructed of clips that have been released thus far, I have taken an even deeper skewed look at a movie I feel so strongly about. Okay, I understand completely that something like this is just a vast piece of literary pie, and trying to incorporate all of its ingredients into an entirely different dessert without really having a solid recipe is nearly an act of futility, but leaving out such obvious things as sugar and fruit makes for a pretty bland taste. However, on the other side of the coin, the visuals that we see here are absolutely stunning and it appears, for the most part, that the actors portraying such dynamic characters are doing a wonderful job. Even so, here are my ten love/hates for the movie I've yet to see based entirely on this clip. Enjoy.




null - Watch more free videos

***** THE WATCHMEN FILM MADE FROM CLIPS FROM ALL OVER THE NET*****


10) Malin Ackerman (As Laurie Jupiter) is stunning, of this there is little to argue. However, she appears to have all the acting prowess of mayonnaise. We'll see.


9) I'm sorry, but Dan Dreiberg (Night Owl II) is supposed to be a lonely, washed-up shell f his former self with a pretty pronounced paunch. I mean this is a major bit of his character. I don't see it. 


8) Billy Crudup as Doctor Manhattan looks absolutely perfect, right down to, from what I understand, his 'hang down'.


7) Though I'm no fan of 'age make-up', I do love Carla Gugino in anything she does and here, too, as the elder Silk Spectre. However, wasn't her hair white?


6) The atmosphere created by Gibbons and Moore of an alternate 1985 looks outstanding here on the screen. Snyder really seems to have captured it.


5) Though I know that the 'Tales From The Black Freighter' will be released as a separate DVD narrated by Gerard Butler, would it have been so tough to include it in the film, even shortened?


4) Rorshach's mask. Even the concept within the comic seems almost impossible, yet, vaguely probable, especially since it's supposed to be a piece of 'chromatically living' dress fabric. The mask is, virtually, alive and looks every bit so here.


3) Conversely, I'm not too sure how I feel about Nite Owl (Dan Dreiberg's) get up. It actually seems less owl-like -and the dude LOVES him some birds- than the one from the pages. If the scene remains where he and Rorshach discover Veidt's arctic hideout, I hope that Dreiberg's 'winter gear' still looks exactly like the owl from the book. 


2) The Comedian is PERFECT. Jeffrey Dean Morgan has completely captured his look of the 'inside joke' that no one gets. Awesome.


1) Jackie Earle Haley is Rorshach. 'Nuff said.


Oh yeah, and THIS SHIT is just stunningly, absolutely, unabashedly hilarious!




          Dmesg.txt - 1 email address   
Found 1 email address posted to Pastebin by Dnorris55
          Re: Announcement: Gift style import for the Gapfill question type   

by Marcus Green.  

I just took a look at the sample import file I created and it looks like I added support for more than the basics, see here https://github.com/marcusgreen/moodle-qformat_gapfill_quick/blob/master/examples.txt

I will give more thought to the category type questions (canine, feline etc) issue


          Fichiers .txt impossible de voir le contenu dans le volet de visualisation (01-07-2017 13:32)   
Windows 10
          MednafenX-PCE v6b15   
MednafenX-PCE - PCE/TG16 Emulator for XBox. New in this rel: Updated to madmab edition interface CFv1b21. See "Interface Changelog.txt". Fixed another long standing issue where the perfect cue data was only being loaded when configuring a game. It would stay configured from that point on until selecting another game or reloading the emulator. Be sure to also read the changelog entry for v6b14 regarding perfect cue's.
          Lettre d'information publique de l'April du 1er juillet 2017   

Bonjour,

Suite à notre campagne du Pacte du Logiciel Libre, 26 député⋅e⋅s nouvellement élu⋅e⋅s sont engagé⋅e⋅s en faveur du logiciel libre. Il est encore temps de contacter les député·e·s et leur proposer de signer le pacte.

Mounir Mahjoubi, secrétaire d’État chargé du Numérique, a présenté en Conseil des ministres du 14 juin les « priorités du gouvernement en matière de numérique ». Nous appelons le gouvernement à mettre en œuvre une véritable politique publique en faveur du logiciel libre et nous avons pointé les risques encourus, notamment par le chiffrement.

Concernant le chiffrement, nous vous invitons à participer et relayer la campagne de financement de GnuPG pour donner de nouvelles opportunités de développement à ce projet. L'April a contribué à hauteur de 500€.

Suite à de nombreux échanges sur notre liste comptabilité, nous avons publié notre analyse de l'article 88 de la loi de finances de 2016 et ses possibles impacts sur les logiciels libres de caisse. Notre principale crainte est levée, même s'il reste des points d'amélioration.

Nous avons signé, avec les CEMEA, une prise de position contre la décision de l’Éducation nationale de donner accès aux données numériques des élèves, des enseignants et personnels de l'Éducation aux grandes entreprises de l'internet dont les intérêts sont avant tout mercantiles et qui hébergent souvent ces données en dehors du territoire européen.

Début des Rencontres mondiales du logiciel libre qui se déroulent à Saint-Étienne du 1er au 7 juillet 2017. Nous avons besoin d'aide pour l'animation du stand de l'April. Si vous pouvez y consacrer quelques heures merci de vous inscrire sur le wiki ou par courriel à evenements@april.org.

Nous participerons à la Fête des Possibles qui aura lieu du 18 au 30 septembre 2017. Plus de 2000 rendez-vous sont attendus, n'hésitez pas à organiser un événement dans votre région.

Le groupe Transcriptions vous offre six nouvelles transcriptions.

Vous pouvez également écouter les dernières éditions de Décryptactualité ; chacune dure une quinzaine de minutes.

La mise en œuvre de l'infrastructure de base du chaton April a été opérée lors du week-end des 2 et 3 juin 2017. Le chaton April offrira des services en ligne, libres et loyaux. Un compte-rendu de ce travail est disponible.

À celles et eux qui seront vacances, je souhaite de bien profiter de ce temps de repos, de loisirs et de ressourcement.

Consultez la lettre publique ci-dessous pour toutes les autres informations et notamment la revue de presse qui propose une vingtaine d'articles.

Librement,
Frédéric Couchet
délégué général de l'April.

Si vous voulez nous soutenir, vous pouvez faire un don ou adhérer à l'association.

Nouvelle législature : 26 député⋅e⋅s engagé⋅e⋅s en faveur de la priorité au logiciel libre dans les administrations publiques

Dans le cadre des élections législatives 2017 l'April a mené une nouvelle campagne du « Pacte du Logiciel Libre ». L'objectif était de sensibiliser candidat·e·s et élu·e·s aux enjeux du logiciel libre, mais aussi de créer du lien entre les citoyens et citoyennes et les candidat⋅e⋅s. Au total 26 député⋅e⋅s nouvellement élu⋅e⋅s se sont engagé⋅e⋅s à défendre la priorité au logiciel libre et aux formats ouverts dans les administrations publiques. Un bilan de ces 4 semaines d'intenses actions est disponible.

L'April participe à la Fête des Possibles, du 18 au 30 septembre 2017

Du 18 au 30 septembre 2017, nous participerons avec 60 autres organisations et réseaux de la transition à la Fête des Possibles (nouveau nom de la Journée de la Transition). Plus de 2000 rendez-vous sont attendus aux quatre coins de la France et de la Belgique pour rendre visibles les milliers d’initiatives locales qui embellissent la société et construisent un avenir plus durable et solidaire.

Dossiers, campagnes et projets

Ambitions numériques du gouvernement : mission impossible sans logiciels libres

Mounir Mahjoubi, secrétaire d’État chargé du Numérique, a présenté en Conseil des ministres les « priorités du gouvernement en matière de numérique ». L'April appelle le gouvernement à mettre en œuvre une véritable politique publique en faveur du logiciel libre.

Loi de finances 2016 : une doctrine fiscale qui reconnaît les logiciels libres mais avec une marge de progression certaine

L'article 88 de la loi de finances de 2016 marque la volonté du gouvernement français de lutter contre la fraude fiscale par un encadrement plus strict des logiciels de comptabilité, de gestion ou d’encaissement. Le texte aurait pu avoir pour effet de bord l'interdiction de détenir des logiciels libres de caisse. L'administration, que nous avons rencontrée, a visiblement été sensible à ce problème et a fait preuve d'une attitude conciliante et constructive. Notre principale crainte a été ainsi levée, même s'il reste des points d'amélioration.

Éducation nationale : les données personnelles mises à disposition des GAFAM

L'April signe, avec les CEMEA, une prise de position contre la décision de l’Éducation nationale de donner accès aux données numériques des élèves, des enseignants et personnels de l'Éducation aux grandes entreprises de l'internet dont les intérêts sont avant tout mercantiles et qui hébergent souvent ces données en dehors du territoire européen.

GnuPG : 20 ans de protection de la vie privée et une nouvelle campagne de financement participatif

Le logiciel GnuPG (pour GNU Privacy Guard : gardien de vie privée du projet GNU) est un outil fondamental pour la protection de la vie privée. Aujourd'hui, GnuPG fête ses 20 ans et vient de lancer un nouvel appel à financement participatif.

L'April a fait un don de 500 € pour soutenir le projet. N'hésitez pas à participer et relayer la campagne de financement pour donner de nouvelles opportunités de développement à ce projet.

Le chaton de l'April sur la ligne de départ

Les 2 et 3 juin 2017, avait lieu un hackathon à l'Auberge Espagnole à Mons-en-Barœul, près de Lille, pour mettre en œuvre l'infrastructure de base du chaton April. Le chaton April offrira des services en ligne, libres et loyaux dans le cadre du collectif CHATONS (Collectif des Hébergeurs Alternatifs, Transparents, Ouverts, Neutres et Solidaires). Pendant ces 2 jours, les administrateurs systèmes de l'April ont travaillé d'arrache pied pour faire sortir le chaton de la boîte. Un compte-rendu est en ligne.

Six nouvelles transcriptions

Le groupe Transcriptions de l'April vous offre de la lecture avec six nouvelles transcriptions :

Décryptactualité

Depuis le 20 février 2017, date du premier Décryptactualité, un petit groupe de membres de l’April se réunit chaque semaine : « On a eu envie de faire quelque chose d’un petit peu différent de la revue de presse de l’April, qui soit un petit peu plus large ». Dans un format d’une quinzaine de minutes, les sujets concernant l’actualité informatique sont commentés de façon simple et accessible au plus grand nombre.

Médias

Revue de presse

La revue de presse fait partie du travail de veille mené par l'April dans le cadre de son action de défense et de promotion du Logiciel Libre. Les positions exposées dans les articles sont celles de leurs auteurs et ne rejoignent pas forcément celles de l'April.

Pour gérer cette revue de presse, un groupe de travail a été créé (vous pouvez en consulter la charte ici) ainsi qu'une liste de discussion rp@april.org où vous pouvez envoyer les liens vers les articles qui vous semblent intéressants.

La revue de presse est désormais diffusée également chaque semaine sur le site LinuxFr.org. Cette diffusion lui offre un lectorat plus large.

Cette revue de presse est commentée dans un podcast disponible sur http://audio.april.org.

Il est diffusé sur les radios : Radio Escapades, Radio Larzac et Ici&Maintenant et Libre@Toi.

Il existe un flux RSS permettant de recevoir la revue de presse au fur et à mesure (rapidement et article par article donc).

Les derniers titres de la revue de presse :

Conférences, événements

Événements à venir

Événements passés

Vie associative

Revue hebdomadaire

Chaque vendredi, à midi pile, les permanents et les adhérents qui le souhaitent passent en revue les tâches et actions relatives à l'April dont ils ont la charge lors de la « revue hebdomadaire April » sur IRC (canal #april sur irc.freenode.net, accès avec un navigateur web). La durée est limitée, généralement un quart d'heure. Cela stimule les bonnes volontés, suscite des idées et des contributions, permet de suivre les activités des uns et des autres et éliminer un certain nombre de problèmes bloquants.

Une page décrivant le principe d'une revue hebdomadaire est en ligne.

Vous pouvez en savoir plus en consultant en ligne les archives des premières revues hebdomadaires, et notamment la synthèse de la revue du 2 juin 2017, la synthèse de la revue du 9 juin 2017, la synthèse de la revue du 16 juin 2017, la synthèse de la revue du 23 juin 2017, la synthèse de la revue du 30 juin 2017.

Adhésions

Au 1er juillet 2017, l'association compte 4 117 adhérents (3 710 personnes physiques, 407 personnes morales).

Soutenir l'association

L'April a besoin de votre aide. Vous pouvez faire un don à l'association et participer ainsi au financement de nos actions.

Pour faire un don à l'association, rendez-vous à l'adresse suivante http://www.april.org/association/dons.html (il est possible de faire un don par chèque, virement, carte bancaire ou encore prélèvement automatique).

Pour tout renseignement n'hésitez pas à nous contacter.

Rejoindre l'association à titre individuel

Dans une association, l'adhésion est un acte volontaire. C'est aussi un acte politique car c'est manifester son soutien à l'objet de l'association ainsi qu'aux valeurs qui le sous-tendent. Une adhésion fait la différence en contribuant à atteindre les objectifs de l'association.

Adhérer à l'April permet :

  • de défendre collectivement un projet de société ;
  • de s'investir activement dans la vie de l'association à travers ses groupes de travail et ses actions ;
  • d'être informé régulièrement des événements logiciel libre ;
  • d'agir sur les institutions à travers un partenaire incontournable ;
  • de soutenir financièrement les actions de l'association.

Il est possible d'aider l'association en lui donnant de son temps ou de son argent. Toutes les contributions sont les bienvenues.

Pour les hésitants, nous avons mis en ligne les réponses à de fausses idées classiques.

Pour adhérer à l'April, vous pouvez remplir le formulaire en ligne.

Pour tout renseignement, n'hésitez pas à nous contacter.

Rejoindre l'association en tant que personne morale

Que vous soyez une entreprise, une collectivité ou une association, adhérez pour participer activement aux décisions stratégiques qui vous concernent !

Votre structure a besoin de tirer le meilleur parti du logiciel libre et pour défendre ses intérêts, elle doit :

  • exercer une veille permanente pour se tenir informée des opportunités et des menaces ;
  • constituer et entretenir des réseaux relationnels institutionnels ;
  • être éclairée sur les contextes juridiques et stratégiques ;
  • contribuer à la défense de l'informatique libre face aux acteurs qui lui sont hostiles ;
  • mieux faire connaître et valoriser son action.

April est au cœur des grandes évolutions du logiciel libre. Adhérer à April permet :

  • de défendre collectivement un projet de société ;
  • de s'investir activement dans la vie de l'association à travers ses groupes de travail et ses actions ;
  • d'être informé régulièrement des événements logiciel libre ;
  • d'agir sur les institutions à travers un partenaire incontournable ;
  • de financer ou cofinancer des actions stratégiques.

Pour adhérer à l'April, il suffit de vous rendre à l'adresse suivante : adhérant dès maintenant à l'April.

Pour tout renseignement n'hésitez pas à nous contacter.

Archives

Pour recevoir automatiquement par courriel cette lettre, inscrivez-vous à la liste de diffusion

Les archives de la lettre sont disponibles en ligne.


          Woodstock NY Bans Activities tied to Marcellus Fracking   


The unanimous approval Tuesday night followed a public hearing that drew six speakers, all of whom said the zoning amendment was needed to discourage the process known as hydraulic fracturing, hydrofracking or fracking.
Read More >>

          Cocodrilos en la playa   
Cuando se publicó el 'best seller' de Katherine Pancol Los ojos amarillos de los cocodrilos se anunciaba en su faja: "Una novela que no deja a nadie indiferente". Y nuestro estadista José M. López no iba a ser menos. Obligado a leer dicha obra para evitar un conflicto familiar playero, el crítico se tuvo que terminar tragando gran parte de los prejuicios que tenía. He aquí la vergonzante pero divertida crónica de aquel caluroso verano rodeado de suegras y cocodrilos...



José M. López

Como todos sabemos, el verano es época propicia para saborear, por fin, toda una lista de libros apetecibles a los que teníamos pensado hincar el diente durante el invierno pero que, por diferentes causas, no tuvimos el tiempo necesario para leer. Debo confesar que nunca he sido un aficionado radical a la playa, pero, con el tiempo, y debido, en parte, a que mi pareja sí lo es, he aprendido a enmarcar una de mis actividades preferidas, la lectura, en ese extraño entorno de sombrillas, arena y chiringuito. Es más, yo no me limito, a pesar de la tendencia general, a leer en la playa libros livianos y de poco peso. He aprendido, con el tiempo, a compaginar aquel contexto lúdico y soleado con plúmbeas y apasionantes lecturas de esas de desgarrarte el seso. Poco a poco, toda aquella irritante coyuntura que rodeaba mis estancias en la costa se ha ido transformando en un entrono apacible, e incluso potenciador de la concentración necesaria para una agradable tarde de lectura: lo que antes era el fastidioso grito de una madre a su hijo, se torna ahora en ronroneo de fondo necesario para mi abstracción; el antiguo sopor de la canícula es ahora una idónea sensación térmica que me mantiene alerta ante las vicisitudes de la narración; hasta necesito, cada quince o veinte minutos, la interrupción producida por el golpe de una pelota de playa que me golpea furtiva como un necesario descanso tras la lectura de ciertos párrafos de especial intensidad. Bueno, pues aquella mañana de julio bajaba yo a la playa, mi libro cómodamente colocado entre el protector solar y las paletas, para empezar a disfrutar de mi primera lectura estival, pero, amigo Sancho, con los hados, o, más bien, con la familia, nos tuvimos que topar.

Cuando llegué a la arena, la familia de mi novia tenía ya perfectamente erigida su empalizada de sombrillas y sillas de playa. Ya hacía algunos años que me habían otorgado el privilegio de penetrar en ella, pues antes tenía que conformarme con acampar en los alrededores, como soldado advenedizo que aspira a conseguir ese honor. Pues bien, una vez dentro, y tras montar mi propia infraestructura defensiva, me dispuse a sentarme y a relajarme con mi ansiada lectura. Pero entonces observé a mi suegra leyendo una novela en cuya portada había un extraño dibujo de un cocodrilo con un ojo amarillo. Como no podía ser de otra forma, me dispuse a preguntarle por el libro, y ella contestó con un ciceroniano laudo hacia él. Tras ello, y como imponen las normas de cortesía, yo solté un “bueno, pues habrá que leérselo”. No di yo más importancia al asunto, hasta que la tarde siguiente mi novia se acercó con el cocodrilo de ojos amarillos en la mano y me dijo: “toma, mi madre ya se lo ha terminado, dice que te lo presta”. ¡Maldita cortesía, maldita familia y malditos hados! Tenía que posponer mi lista de lecturas ansiadas en pos de una novela de la que ya había oído hablar, y  sobre la que, debo decirlo, volcaba todos y cada uno de mis prejuicios literarios: éxito de ventas, autora de mediana edad, extremadamente 'cool' y, además, francesa. Vamos, una  novela de mujeres para mujeres, y, encima, con  título absurdo que nada tenía que ver con su argumento. Bueno, lo mejor sería acabar con ella cuanto antes, pero, oh Dios, otra nueva bofetada terminó de descorazonarme: tenía cerca de seiscientas páginas.

Con sumo cuidado me fui adentrando en la historia de Jo, una mujer casada y con dos hijas, que nunca ha tenido la entereza de valerse por sí misma, de dar rienda a sus sueños y poner en práctica toda una serie de proyectos que le apasionan y aterran a la vez. Esta mujer se ve abandonada por su marido, por lo que no le queda más remedio que encarar la vida, y estrangular de una vez sus miedos e inseguridades. Al principio, me mostraba reacio ante una historia que me parecía tópica y perfectamente diseñada para un tipo de lector/a muy concreto. Sin embargo, poco a poco, y ayudado por la calidez de una prosa nada torpe, me fui interesando por la protagonista, que si bien al principio me pareció estereotipada y anodina, va ensanchándose con el devenir de las páginas, y cobra una profundidad y calidez humanas considerables. La débil ama de casa que empieza la novela nada tiene que ver con la mujer que encontramos al final del relato. Jo se ha convertido, como la dama medieval que protagoniza  la novela que ella misma escribe, en una heroína cotidiana, a la que hemos acompañado desde el principio, nos hemos reído con ella, hemos sufrido por ella, e incluso, debo reconocerlo, nos hemos emocionado con ella. La narradora ha podido conmigo, me ha manipulado, y me ha obligado, a mi pesar, a encariñarme de esta antiheroína, de esta Woody Allen a la francesa.

La autora sabe perfilar la personalidad de su protagonista haciéndola interesante más que por sus virtudes, por sus defectos. Y estas características que en Jo son profundamente femeninas, trascienden lo particular y se vuelven, en mi opinión, universales, lo que provoca que no me sienta excluido para nada de la historia, y permite que, a pesar de las circunstancias propias del sexo, termine identificándome con esta mujer bondadosa y algo bobalicona.

Sin embargo, y a pesar de que toda la novela gira entorno de la protagonista, encontramos una amplia fauna de personajes no siempre cincelados con la misma fortuna. Muchos de ellos, sobre todo los personajes masculinos, son tipos de una personalidad plana, meros monigotes caracterizados normalmente por un solo defecto. El amante de su hija, por ejemplo, es el típico donjuán patético y engreído; su padrastro, un primitivo nuevo rico de carácter simplón; sus hijas, una la cariñosa y sensible, la otra la harpía con visos de futura 'femme fatale'.

Otro de los aspectos que, en mi opinión, lacra la historia, es su tono excesivamente 'naif'. A pesar de la crueldad de algunas situaciones, siempre hay una amiga para consolar a la protagonista o un caballero andante de jersey de cuello alto que termina salvándola. Hay que reconocer que el excesivo “buenismo” de algunos personajes y la desmesurada sensiblería de algunas escenas no hicieron más que apuntalar los prejuicios que albergaba antes de acercarme al libro.

Sin embargo, y pesar de estos vicios propios de toda obra que aspira a 'best seller', tengo que reconocer que ese inicio de verano, mientras me embriagaba el olor a la brisa salada y a filetes empanados, disfruté con la lectura de este libro. Y es que, a veces, un personaje salva una novela. Y debo admitir que la escritora da vida en el libro a una protagonista con un grado de humanidad tal, que, meses después de haber leído la novela, no estaba seguro de si el personaje de Jo pertenecía a una novela, lo había visto en alguna serie, o es que realmente había conocido a esa mujer.

Al final, y una vez terminada la novela, me di cuenta de que su lectura no había resultado una experiencia tan traumática como esperaba. Cerré el libro y observé con los ojos entornados a esa extraña gente que me rodeaba y que yacía tostada sobre sus toallas. Enterré un poco más mis pies en la abrasante arena y, me quedé dormido acunado por la extraña melodía que conformaban el romper de las olas sobre la orilla y el agudo silbato del vendedor de cuñas de Sanlúcar.

          CRASH   
I tp to sombody's island and had a crash. Thankfully i figured out the problem, there is a ticking block entity error. can you guys fix? cause i cant login to server crash-2017-07-01_12.28.26-client.txt
          Get fresh FollowBack list for Twitter   
$ for a in $(seq 5 8); do cat twit.txt | cut -d " " -f$a | grep "^@" | sort -u; done > followlst.txt

Go to "https://twitter.com/search/realtime?q=%23TeamFollowBack&src=hash" and then copy al the text on the page. If you scroll down the page will be bigger. Then put al the text in a text file called twit.txt

If you follow the user there is a high probability the users give you follow back.

To follow all the users you can use an iMacros script.

commandlinefu.com

Diff your entire server config at ScriptRock.com


          Twitter Account Validator   
$ if lynx --dump http://twitter.com/xmuda | grep -q "Sorry, that page does"; then echo "Dont Exist"; else echo "Exist"; fi

I use these command to validate twitter accounts, we can use a "for a in $(cat list.txt)" to validate a complete list of twitter accounts.

commandlinefu.com

Diff your entire server config at ScriptRock.com


          mailx to send mails from console   
$ true | mailx -n -a MYTEXT.txt -r my@mail.com -s log -S smtp=mail.com -S smtp-auth-user=MYUSER -S smtp-auth-password=MYPASSWORD FRIEND@mail.com

It is the best way i found to send a mail from the console in my centos server.

commandlinefu.com

Diff your entire server config at ScriptRock.com


          Венера01: Флешплееры   

Это цитата сообщения меня_зовут_Любаша_К Оригинальное сообщениеФлешплееры

Счетчик посещений Counter.CO.KZ - бесплатный счетчик на любой вкус!


Несколько флешплееров для ваших музыкальных постов. Выбирайте, копируйте код, вставляйте свою музыку.
Размеры плеера не изменять!
Вместо моих слов - ССЫЛКУ ВСТАВЛЯТЬ ТУТ - вставьте вашу ссылку на музыкальный файл.


1.




2.




3.




4.




5.




6.




7.




8.




9.




10.




11.




12.




13.




14.






















пост составила



Серия сообщений "Плееры":

Часть 1 - Флеш плееры
Часть 2 - Флешплееры от Любаши К
...
Часть 19 - Муз. открытка и флеш плеер с кодом
Часть 20 - Радио для вас от Любаши К
Часть 21 - Флешплееры




Серия сообщений "***Флешплееры":

Часть 1 - Радио для вас от Любаши К
Часть 2 - Флешплееры



          Comment on Pixologic ZBrush 4R8 – Full by BobTheBob   
Work fine : Disconnect from the web 1. Install ZBrush 4R8. 2. Copy/paste/replace "Config4R8C.txt" and "ZBrush.exe" in the install folder 3. Run ZBrush 4R8 as administrator 4. Enjoy ! ZBrush use only the CPU and don't care about the graphic card. If you experimente some crash it's probably because of your material. Confirme your configuration before installation.
          Lovely 2SF Ripping Guide   

This document explains how to rip a DS game to 2SF.

If you are going to rip a game that uses standard DS sound format (SDAT), you do not need to read this guide. You can use VGMToolbox to convert directly DS ROM to 2SF. I also recommend you to create NCSF instead of 2SF.

If it's not the case, it requires a manual ripping.

There is a 2SF ripping guide by unknownfile. However, since it is quite old, it is written for old 2SF format, and some tools in the guide cannot be downloaded today. As far as I know, it was the only guide for manual 2SF ripping, unfortunately. This is why I decided to write this guide, even though I am not very familiar with DS architectures.

I hope it helps you to create a new 2SF.

Prerequisites

You need to have a knowledge of some technical things:

In this tutorial, I will use the following tools.

  • no$gba debugger version: High functionality emulator/debugger for GBA/NDS games.
  • DeSmuME: One of the best NDS emulator (I always use it for casual use). It is open-source and has some good debugger features, since it is a standard DS emulator for tool-assisted speedrun community. I sometimes use it for RAM search, memory viewer and Lua scripting.
  • IDA Pro: User-friendly disassembler. This is not a mandatory tool for 2SF ripping (no$gba will help you enough), but it's one of the best tools for every PSF ripping.
  • Tinke: Viewer and editor for files of NDS games. I use it to view ROM header and explore the NitroFS filesystem.
  • Hex editor: Everyone needs it for reverse-engineering work, right? I am using 010 Editor, but you can choose a different good free editor.

The whole strategy for 2SF ripping is quite similar to my generic PSF ripping strategy.

Loading NDS ROM

DS hardware has a two CPUs, ARM946E-S and ARM7TDMI. ARM9 is a main CPU, and ARM7TDMI is a sub CPU that is usually used for sound processing.

Therefore, a DS game has two entrypoints and code sections, and they correspond to ARM9 and ARM7TDMI. Usually, they will be loaded into a different address of the same main RAM (0x2xxxxxx). The entrypoint addresses are recorded in ROM header. You can view it by Tinke, or any other header tools.

To load a ROM into IDA Pro, there are several methods.

  • Use Nintendo DS loader module for IDA Pro.
  • Load the ROM in DeSmuME, and export whole main RAM data into a file (use View Memory), and load it into IDA Pro as ARM code.
    1. Choose ARM processor, and press OK
    2. Create 0x400000 bytes RAM segment at 0x2000000, and load the file into 0x2000000
    3. Move to ARM9 entrypoint (usually 0x2008000), set the processor mode to ARM (press Alt+G and set T = 0x0), and press C key

Music playback request is usually demanded by ARM9, so we will start exploring the ARM9 code, and we will not see the ARM7 code.

Also, you should view the filesystem and guess sound data is stored into what file.

Locating The Sound Select

Find a function to select a song and start playback. As I explained in my generic PSF ripping strategy guide, I often do it by backtracing the access to the score data pointer.

  1. Find a score data pointer address by DeSmuME's RAM search
  2. Back to no$gba, then set write breakpoint to the address (something like [2012345]!!)
  3. Repeat backtracing by "Run to Sub-Return" and find the target function

However, DS game has a build-in filesystem. So it often can be find by searching filenames. (See "Names" list if you are using IDA Pro) The following two methods are quoted from unknownfile's guide.

SOUND SELECT STYLE 1: sprintf (Doki Doki Majou Shinpan's CRI ADX driver)

This game uses an algorithm to use a sprintf call before playing the ADX files. The sprintf values are thus:

RAM:020BF780 aSBgm_DD_adx    DCB "%s/BGM_%d%d.adx",0 ; DATA XREF: RAM:off_207E568
RAM:020BF790 a_dataSoundBgm  DCB "_Data/Sound/Bgm",0 ; DATA XREF: RAM:off_207E56C

At this point, we trace back to the calling function and we get this:

RAM:0207E534                 SUB     LR, R4, R0
RAM:0207E538                 LDR     R1, =aSBgm_DD_adx
RAM:0207E53C                 LDR     R2, =a_dataSoundBgm
RAM:0207E540                 ADD     R0, SP, #0x50+var_4C
RAM:0207E544                 STR     LR, [SP,#0x50+var_50]
RAM:0207E548                 ADD     R3, R12, R3,ASR#2
RAM:0207E54C                 BL      sub_20118C4

The strings are loaded to R1 and R2, and the sound digit is loaded into R4. Therefore, we write the song value to R4.

SOUND SELECT STYLE 2: Register holds the sound value (Generic driver, Super Princess Peach)

Games using this sound select style are harder to rip as there is no obvious way to identify where the sound register is actually given to the engine. A good place to start is to place breakpoints in functions following an initialization function which is obvious to locate (generic driver games all use a call to load a file such as sound_data.sdat).

A typical generic driver sound select looks like this:

ROM:02060BB8                 STMFD   SP!, {R4,R5,LR}
ROM:02060BBC                 SUB     SP, SP, #0xC
ROM:02060BC0                 MOV     R4, R1
ROM:02060BC4                 MOV     R5, R0
ROM:02060BC8                 MOV     R0, R4
ROM:02060BCC                 BL      sub_205F8D8

r1 goes to r4, r0 goes to r5, and r4 goes to r0. In this case, we could use r1 on 0x02060BB8, or r0 on 0x02060BCC.

In other cases, the sound select value requires you to trace back and keep inserting values into a register until the music changes. Super Princess Peach and Yoshi's Island DS required me to go looking a bit before finding the register.

Locate Driver Code to main

You can test the function by the following steps:

  1. Set a breakpoint just before the function call
  2. Edit the arguments (register or RAM value)
  3. Listen whether it changes the song (try another function or parameter if it doesn't)

After finding the sound select function, you need to test it.

no$gba can change the ARM instructions during the emulation. Put a small driver code in the middle of main function (say, a noreturn function called by the startup function), and reset the game.

The driver code can be something like the following.

mov   r0, #1            ; song index
mov   r1, #0            ; do not forget to set other required arguments
mov   r2, #0x100
bl    #0x20034568       ; call the sound select

infinite_loop:          ; stop the main thread (music playback should be processed by interrupts)
swi   4
b     infinite_loop

Congratulations! It starts playing the music and stays in blank screen! If not, try to put the driver code in another address.

Save the change to ROM file by using a hex editor. no$gba is good for quick check, but it probably does not have a function to save altered ROM.

Minimize Initialization

Fill each bl #0xXXXXXXXX instructions with NOP, and test whether it affect to music playback. Remove all unwanted instructions out by repeating the above steps. It may take a time, but please be patient.

Convert ROM into 2SF

It's time to convert the ROM to 2SF.

  1. Convert the altered ROM file into 2sflib by rom2sf utility
  2. Make a number of mini2sf files by mini2sf utility

Optimizing the 2SF

Unfortunately, we do not have a handy tool like gsfopt yet. Therefore I cannot optimize a 2SF set yet.

I hope someone make a optimization tool based on vio2sf or something like that.


           My Favorite Tools For Video Game Music Analysis   

This article shows what I use/know in my VGM analysis work.

Tools

If you know a good tool, let me know, please. :)

  • Generic
    • Debuggers
      • MHS, Cheat Engine - By attaching these debugger tools to an emulator, you will be able to add some debugging functions, such as RAM tools and read/write breakpoints. I recommend you to install both, and start solving Cheat Engine's tutorial EXE by using MHS. See also: Memory Addresses Of Emulators
    • Editors
      • Hex editors: Use your favorite one. I have used Stirling (Japanese hex editor since 19XX) for a long time. However, I have migrated to 010 Editor (49.95 USD for home use) since 2015.
      • Text editors: EmEditor (日本語) is my primary text editor on Windows (EmEditor is a commercial product, but EmEditor Free is also available). I also use Sublime Text on Mac OS X.
        • I recommend to use a text editor which has an enough undo buffer, regular-expression and rectangle selection functions at least.
    • Players
      • foobar2000 - My favorite music player. It works good for VGMs if install additional components.
      • Winamp - I sometimes use Winamp as a SPC/PSF tagger. (you need to install plugins first)
    • Converters, Ripping Tools, etc.
      • VGMTrans - Can convert various game music to MIDI and SF2. Also, it will be useful when you want to write a parser for a new format.
      • VGMToolbox - It includes tools to extract, optimize, and build VGM formats as well as auditing and exploration utilities.
  • NES
    • Emulators
      • FCEUX - This one provides almost everything.
      • G-NES, G-NSF - I sometimes use it for only one reason: view sound registers. FCEUX lacks it, isn't it? :(
      • NO$NES - Never tried this yet.
    • Ripping Tools
    • Converters
      • nsf2midi - Unfortunately, it cannot output duty cycle.
      • nes2midi (Lua) - nsf2midi is easier to use than this, however, this one can output duty cycle. Also, it does not require NSF ripping.
  • SNES
  • GB/GBA
    • Emulators
    • Ripping, Analysis Tools
    • Converters
      • GBAMusRiper - If you want to convert the music of standard driver (MusicPlayer2000, aka. Sappy) to MIDI and SF2, check this one. Do not use my buggy GBA2MIDI, please.
      • gb2midi (Lua) - I think this is the easiest way to dump everything.
  • Nintendo DS
  • Playstation
    • Emulators
      • NO$PSX - Though its accuracy is not very good, it is the best PS1 debugger as far as I know.
      • XEBRA - The most accurate and fast PS1 emulator as far as I know. It has savestates and "save the main memory image to file" function, while its terms and interfaces are somewhat different from other emulators.
      • psxjin - TASVideos always rocks, unless when the game does not work well.
    • Ripping, Analysis Tools

Notes

  • I suggest you visit TASVideos / Emulator Resources. They usually use emulators that are stable and have some useful tools such as RAM search, debugger and Lua scripting. Additionally, they must be open-source.

           The Open PSF ripping guide 12/05/03 日本語訳   

私の翻訳能力の乏しさと怠慢につき、翻訳が正確でない箇所は多々あることと思います。しかし、ガイドの主たる部分に関しては、文意を損なわず、それなりに読みやすい形で訳すことを目指しました。

もし、内容に関わる肝心な点に誤りがありましたら、ご指摘頂けると助かります。細かな修正なども歓迎しますが、いずれの場合も改変済みのバージョンをご用意頂けると助かります。

結構前置きが長くてしんどかったかも(親切とも言える?)。リッピング実例は長いですし、有用かどうかに幾分疑問もあるので現状保留とします。

Although I am not skilled in English and any Playstation things, I tried to translate this guide to Japanese, to help people who interested in PSF ripping but is not familiar with English (such as me). I hope this translation helps someone.

Special thanks goes to someone42, for creating this guide, and every other people who helped him.


           XEBRA(プレイステーションエミュレータ)の使い方+αメモ(なんちゃって TAS 機能とか)   

知っている人には今さらだと思いますが、XEBRA / ARBEX というエミュレータが互換性・速度の面で非常に良かったです。本体にマニュアルが付属しているので、その通りに使えば良いのですが、若干落とし穴や目立たない機能もあるのでメモしておきます。

だんだん「外部ツールを使って高度な機能を追加するには?」みたいになってきました。

雑多な情報

  • Help... ダイアログの表示をスクロールするとじつは日本語の説明もある
  • OS ROM(よく BIOS と呼ばれるもの)は OSROM というファイルで配置する*1
  • CD イメージファイルはイメージ本体を選択する(ccd や cue は同階層に配置するが、オープンダイアログでは iso, img などを選択する)
  • CD イメージの読み込み後は、Power(Run) を選択しないと起動しない
  • Controller... ダイアログでキー設定が可能。ただし、最初に「Controller 1」などの設定対象を選択しなければならないことに注意
  • Simulation Model Image はハードウェア動作のシミュレーション設定を記録したファイル(SIM.EXE で作成・編集、XEBRA 本体で読込)
  • Running Image がどこでもセーブ(savestate)に相当する
  • File/History にある Pad History (パッド履歴) はキームービーに近いもの(後述)
  • Sound Output... で Save にチェックを入れると SOUND.WAV にプレイ音声が出力される
  • .kkapture (1.01) で AVI 形式の動画を出力可能
  • PK201.DLL を置いてあれこれするとポケステもいけるらしいです(見てない)
  • Debug 周りは不明(気になる)
  • 本体は gccコンパイル、UPX で圧縮されていて、画面描画は OpenGL を使用

パッド履歴について(ムービー機能として使う)

File/History にある Pad History (パッド履歴) は強いて言えばキームービーに近いものです。ただし、あくまでムービー機能ではないので、パッドの入出力だけを扱い、ステートなどは一切記録しません。

最初に、インタフェースが独特であることを説明すべきでしょう。

  • Read Pad... - 既存のパッド履歴を読込、再生開始(ユーザー入力無効化、いわゆる「再生終了後」もそのまま)
  • Write Pad... - パッド履歴を新規作成、記録開始
  • Load Pad... - 記録中のパッド履歴の内容を、別のパッド履歴で丸ごと上書き(使い方は後述)
  • Save Pad... - 記録中のパッド履歴の複製を別名保存

「停止・クローズ」という選択肢はないので、別のファイルを新規作成するなりして行うしかなさそうです。

これを実行イメージ(Running Image)と組み合わせることで、一般的なムービー機能として動作します(どの程度 desync せずに動作するかは不明ですが)。

注:必要に応じて事前にメモリーカードを初期化・変更すべきかもしれません。(実行イメージに含まれるかもしれませんが未確認です)

注:より正確に記録するには Simulation Image の入出力が必要だと考えます。しかし、すべて下記の手順では省略しています。

電源投入時からのムービーを記録
  1. ムービーを記録
    1. CD イメージを読み込む
    2. File/History/Write Pad... でパッド履歴を新規作成(例:from_power_on.pad)
    3. Power(Run) でゲームを開始、普通にプレイ
    4. 記録を止めたくなったら Write Pad... で別のファイルに切り替える(例:dummy_for_close.pad)か、単に XEBRA を閉じる
  2. ムービーを再生
    1. CD イメージを読み込む
    2. File/History/Read Pad... でパッド履歴を読込
    3. Power(Run) でゲームを開始、鑑賞
特定のステートからムービーを記録
  1. ムービーを記録
    1. 記録を開始したい箇所で Pause する
    2. File/Save/Running Image... で実行イメージを保存(例:from_snapshot.sav)
    3. File/History/Write Pad... でパッド履歴を新規作成(例:from_snapshot.pad)
    4. Power(Run) でゲームを開始、普通にプレイ
    5. 記録を止めたくなったら Write Pad... で別のファイルに切り替える(例:dummy_for_close.pad)か、単に XEBRA を閉じる
  2. ムービーを再生
    1. CD イメージを読み込んだ状態で Pause する
    2. File/Open/Running Image... で実行イメージを読込
    3. File/History/Read Pad... でパッド履歴を読込
    4. Power(Run) でゲームを開始、鑑賞
ムービースナップショットの記録と追記

いわゆる追記(rerecording)もじつはできます。

  1. ムービースナップショットの作成
    1. パッド履歴(例:main.pad)記録中に、スナップショットを作成したい時点で Pause する
    2. File/Save/Running Image... で実行イメージを保存(例:snapshot.sav)
    3. File/History/Save Pad... でパッド履歴を複製保存(例:snapshot.pad)
  2. ムービースナップショットの読込
    1. CD イメージを読み込む
    2. File/History/Write Pad... で記録対象のパッド履歴(例:main.pad)を選択する(この時点で内容が失われるので、不安ならバックアップしておくこと!)
    3. File/Open/Running Image... で実行イメージ(例:snapshot.sav)を読込
    4. File/History/Load Pad... でパッド履歴(例:snapshot.pad)を読込
    5. Power(Run) でゲームを開始、記録続行
プレイ速度も変えたい!

本体の機能である程度のスローダウンが可能でした(後述)

すろぉもぉしょん というアプリを使うとこの上なく簡潔にスローダウンできます(XEBRA 本体とホットキーが重複していますが)。

もっと柔軟に!という方には MHS (Memory Hacking Software)Cheat Engine という2つのツールを紹介します。どちらもプロセスメモリエディタですが、Hotkey に Speed Hack (スロー・倍速)や Process Pause を割り当てて使うことができます。私はメモリエディタとしては MHS を好んでいますが、Speed Hack 用途では Cheat Engine の方が使いやすいように感じました。試してみて好きな方を使ってください。速度変更を行ってもフレームスキップ(?)が動作して操作単位が大まかになってしまうらしいので、"それなり"の効果しか期待できないかもしれません。

フレーム単位で操作するというのは現状では無理そうです。フレームカウンタに相当するものをメモリから探して、監視しながら動かすと、どの程度スローダウンに成功しているか確認できます。

見落としていましたが本体の機能で一定のスローダウンが可能です。起動後、Run/Sync を選択し(デフォルトで on なのが off になる)、その後 Run/Misc/Slow を選択することで速度を落とせます。4段階変速で、選択するたび 0→1→2→3→0... と変化します。より遅くしたければ複数回 Slow を選択してください。

チート(改造コード)

XEBRA の作者は cep というプロセスメモリエディタも公開しています。PAR コードが使えるのできっとおすすめです。プロセスメモリエディタなので XEBRA 向けの設定行を BASEARCH.TXT に書かなければなりませんが、ググれば出てくると思います(希望的観測)。

メインメモリ上の変数を入出力したいだけなら、どのプロセスメモリエディタでも簡単だと思います(本体からメモリ内容をダンプできるのでサーチが楽)。私は MHS を使用しました*2

ショートカット

Help ダイアログから抜粋。今後変更される可能性も考えられます。

  • F1 .... = メニュー : File/Save/Running Image/XEBRA.RUN
  • F2 .... = メニュー : File/Save/Running Image/????????.000
  • F3 .... = メニュー : File/Save/Running Image/????????.001
  • F4 .... = メニュー : File/Run/Sync
  • F5 .... = メニュー : File/Run/Power(Run)
  • F6 .... = メニュー : File/Run/Pause
  • F7 .... = メニュー : File/Open/Running Image/XEBRA.RUN
  • F8 .... = メニュー : File/Open/Running Image/????????.000
  • F9 .... = メニュー : File/Open/Running Image/????????.001
  • F12 ... = メニュー : View/Full Screen/

コマンドライン

これも抜粋。不必要だと思う人もいるかもしれませんが、.kkapture を使いたいときなどは楽になりそうです。

  • -SPTI "PATH" .... = メニュー : File/Open/CD-ROM via SPTI/"PATH"
  • -IMAGE "PATH" ... = メニュー : File/Open/CD-ROM Image/"PATH"
  • -OSROM "PATH" ... = メニュー : File/Open/OS ROM Image/"PATH"
  • -BU00 "PATH" .... = メニュー : File/Open/Memory Card 1 Image/"PATH"
  • -BU10 "PATH" .... = メニュー : File/Open/Memory Card 2 Image/"PATH"
  • -SIM "PATH" ..... = メニュー : File/Open/Simulation Image/"PATH"
  • -RUN "PATH" ..... = メニュー : File/Open/Running Image/"PATH"
  • -TOC "PATH" ..... = メニュー : View/CD-ROM Drive/Open TOC/"PATH"
  • -CUE "PATH" ..... = メニュー : View/CD-ROM Drive/Open TOC/"PATH" .. CUE
  • -CCD "PATH" ..... = メニュー : View/CD-ROM Drive/Open TOC/"PATH" .. CCD
  • -INI "PATH" ..... 初期設定イメージのロード
  • -RUN1 ..... = メニュー : Run/Power(Run)
  • -RUN2 ..... = メニュー : Run/Debug Run/No I Cache
  • -RUN3 ..... = メニュー : Run/Debug Run/I Cache
  • -RUN4 ..... = メニュー : Run/Debug Run/I Cache Compile
  • -SYNC ..... = メニュー : Run/Sync
  • -BLANK .... = メニュー : Run/Misc/Blank
  • -FULL ..... = メニュー : View/Full Screen/

アイコンにドロップ = XEBRA.EXE "PATH" = XEBRA.EXE -IMAGE "PATH" -RUN1

AutoHotKey によるホットキー追加

AutoHotkey を流行らせるページを見ると、AutoHotkey というアプリケーションで、スクリプトを使った高度なホットキー割り当てが記述できそうです。AutoHotkeyJp に日本語のリファレンスも充実しています。

下記、試しに擬似 Movie Snapshot の保存を行うホットキーを追加してみました。AutoHotkey.ahk の末尾に下記の記述を追加して保存し、XEBRA を起動後に AutoHotkey を起動すると、追加のホットキーが使えるようになっているはずです。

あくまで擬似的なものなので、動作に失敗することもありますが、何もないよりマシです。

また、XEBRA の挙動が変わればスクリプトも修正が必要になると思います。

  • 【重要】前提条件:予め CD イメージを読込済で、かつ Write Pad... で適当なパッド履歴を出力対象に指定済であること。
  • 作業ファイルはデスクトップに保存されますが、嫌ならスクリプト中の A_Desktop を変更すれば良いです。
  • Xebra_AutoUnpause を 0 にすると読み書き後の Pause 解除を行いません(F5 で手動解除することになります)……という感じだったのですが一長一短あるので、Backspace を独自の Pause に割り当てて、このキーが使用された際にスナップショット入出力後の Pause 解除の有無をトグル切り替えするようにしました。
  • ダイアログへのキー送信がうまくいかなかった場合、Pause 状態のはずなので落ち着いてダイアログを閉じて、もう一度保存しなおせば多分大丈夫です。多分……。
; XEBRA (PlayStation emulator)
#IfWinActive XEBRA
Xebra_AutoUnpause := 1

XebraLoadMovieSnapshot(TargetPath, AutoUnpause)
{
	; Pause
	;SendInput,!rp{Enter}
	SendInput,{F6}
	; File/Open/Running Image...
	SendInput,!for
	Sleep 400
	SendInput,%TargetPath%.RUN{Enter}
	Sleep 100
	; File/History/Load Pad...
	SendInput,!fhl
	Sleep 400
	SendInput,%TargetPath%.PAD{Enter}
	Sleep 100
	; Power(Run)
	if (AutoUnpause)
	{
		;SendInput,!r{Enter}
		SendInput,{F5}
	}
}

XebraSaveMovieSnapshot(TargetPath, AutoUnpause)
{
	; Pause
	SendInput,!rp{Enter}
	SendInput,{F6}
	; File/Save/Running Image...
	SendInput,!fsr
	Sleep 500
	SendInput,%TargetPath%.RUN{Enter}
	; File/History/Save Pad...
	SendInput,!fhs
	Sleep 400
	SendInput,%TargetPath%.PAD{Enter}
	Sleep 100
	; Power(Run)
	if (AutoUnpause)
	{
		;SendInput,!r{Enter}
		SendInput,{F5}
	}
}

; 1
1::
	BlockInput On
	XebraLoadMovieSnapshot(A_Desktop . "\XEBRA_001", Xebra_AutoUnpause)
	BlockInput Off
	return
; Shift+1
+1::
	BlockInput On
	XebraSaveMovieSnapshot(A_Desktop . "\XEBRA_001", Xebra_AutoUnpause)
	BlockInput Off
	return
; 2
2::
	BlockInput On
	XebraLoadMovieSnapshot(A_Desktop . "\XEBRA_002", Xebra_AutoUnpause)
	BlockInput Off
	return
; Shift+2
+2::
	BlockInput On
	XebraSaveMovieSnapshot(A_Desktop . "\XEBRA_002", Xebra_AutoUnpause)
	BlockInput Off
	return
; 3
3::
	BlockInput On
	XebraLoadMovieSnapshot(A_Desktop . "\XEBRA_003", Xebra_AutoUnpause)
	BlockInput Off
	return
; Shift+3
+3::
	BlockInput On
	XebraSaveMovieSnapshot(A_Desktop . "\XEBRA_003", Xebra_AutoUnpause)
	BlockInput Off
	return
; 4
4::
	BlockInput On
	XebraLoadMovieSnapshot(A_Desktop . "\XEBRA_004", Xebra_AutoUnpause)
	BlockInput Off
	return
; Shift+4
+4::
	BlockInput On
	XebraSaveMovieSnapshot(A_Desktop . "\XEBRA_004", Xebra_AutoUnpause)
	BlockInput Off
	return
; 5
5::
	BlockInput On
	XebraLoadMovieSnapshot(A_Desktop . "\XEBRA_005", Xebra_AutoUnpause)
	BlockInput Off
	return
; Shift+5
+5::
	BlockInput On
	XebraSaveMovieSnapshot(A_Desktop . "\XEBRA_005", Xebra_AutoUnpause)
	BlockInput Off
	return
; 6
6::
	BlockInput On
	XebraLoadMovieSnapshot(A_Desktop . "\XEBRA_006", Xebra_AutoUnpause)
	BlockInput Off
	return
; Shift+6
+6::
	BlockInput On
	XebraSaveMovieSnapshot(A_Desktop . "\XEBRA_006", Xebra_AutoUnpause)
	BlockInput Off
	return
; 7
7::
	BlockInput On
	XebraLoadMovieSnapshot(A_Desktop . "\XEBRA_007", Xebra_AutoUnpause)
	BlockInput Off
	return
; Shift+7
+7::
	BlockInput On
	XebraSaveMovieSnapshot(A_Desktop . "\XEBRA_007", Xebra_AutoUnpause)
	BlockInput Off
	return
; 8
8::
	BlockInput On
	XebraLoadMovieSnapshot(A_Desktop . "\XEBRA_008", Xebra_AutoUnpause)
	BlockInput Off
	return
; Shift+8
+8::
	BlockInput On
	XebraSaveMovieSnapshot(A_Desktop . "\XEBRA_008", Xebra_AutoUnpause)
	BlockInput Off
	return
; 9
9::
	BlockInput On
	XebraLoadMovieSnapshot(A_Desktop . "\XEBRA_009", Xebra_AutoUnpause)
	BlockInput Off
	return
; Shift+9
+9::
	BlockInput On
	XebraSaveMovieSnapshot(A_Desktop . "\XEBRA_009", Xebra_AutoUnpause)
	BlockInput Off
	return
; 0
0::
	BlockInput On
	XebraLoadMovieSnapshot(A_Desktop . "\XEBRA_000", Xebra_AutoUnpause)
	BlockInput Off
	return
; Shift+0
+0::
	BlockInput On
	XebraSaveMovieSnapshot(A_Desktop . "\XEBRA_000", Xebra_AutoUnpause)
	BlockInput Off
	return
; Backspace
BS::
	Xebra_AutoUnpause ^= 1
	if (Xebra_AutoUnpause)
	{
		; Power(Run)
		;SendInput,!r{Enter}
		SendInput,{F5}
	}
	else
	{
		; Pause
		;SendInput,!rp{Enter}
		SendInput,{F6}
	}
	return
#IfWinActive

TAS 的な機能について

小手先ではどうしても実用的に厳しいものがあります(操作性の面で)。当たり前ですが。

ただ、上述の通り rerecording できる仕組み自体は整っているようなので、技術を持った人であれば、本体を UPX で展開して、適当に解析して、適当にコード改変すれば、その手の方法にしては比較的簡単にまともな TAS 機能が付けられるのではないかと私は思います。*3

興味のある人はチャレンジしてみてはどうでしょうか?

それと、もう一つ違う方法を提案することができます。パッド履歴の中身はおそらく単純なキーコードで構成されているので、調べれば簡単に編集できると思います。根気のある人はバイナリエディタと再生確認の繰り返しだけで動画を作ることができるかもしれません。

*1:ただし、ARBEX は OS ROM を使わないので、OSROM を配置する必要はない。

*2:執筆時点では [0x454D78] + オフセット でメインメモリの内容をウォッチできましたが、バージョンアップされたら変わると思うので再度サーチが必要です

*3:パッド履歴の記録はフレームスキップとは無関係に行われますので、(後々出力先を応用することを考えても)パッド履歴出力周りを起点に解析するとやりやすいかもしれません。


           FDSの波形をダンプするなら   

波形はG-NSF等のメモリダンプで$4040-407Fを覗けば取り出せるかな。


          Без заголовка   

Это цитата сообщения starushka471 Оригинальное сообщение Екатерина Вильмонт. Шалый малый...

Обычно романы заканчиваются свадьбой. Этот со свадьбы начинается. Полина Зацепина - молодая женщина, модный московский флорист. Карьера ее идет в гору, в семейной жизни тоже все складывается неплохо, но однажды она едет с подругой в лес за грибами, и там происходят события, которые грозят перевернуть всю ее жизнь..


 

Серия сообщений "Екатерина Вильмонт":
Часть 1 - Екатерина Вильмонт "Умер - шмумер"
Часть 2 - Вильмонт Екатерина "Артистка, блин"
...
Часть 23 - Екатерина Вильмонт "Фиг ли нам, красивым дамам!"
Часть 24 - Екатерина Вильмонт "Сплошная лебедянь"
Часть 25 - Екатерина Вильмонт. Шалый малый...

          HTTP Proxy listener and request forwarder to external proxy by trimmerelite   
1. HTTP/HTTPS requests listener proxy 2. Forward those requests to external proxy 3. We should be able to provide a list of proxy servers and credentials via a text file, for example, proxylist.txt in the same directory... (Budget: ₹1500 - ₹12500 INR, Jobs: Python, Software Architecture)
          SENDEJ написал(а) в теме: Есть форма с которой передаются через $_POST - пар   
подскажите как это сделать нормаль, что бы работало?



// кнопки из формы
[HTML]
<
p><input type="text" name="L1" size="14" placeholder= "Введите имя файла" maxlength="20"></p>
</
form>
<
input form="data" class="l2" type="submit" name="L2" style=color:blue value= "Создать">
<
input form="data" class="l3" type="submit" name="L3" style=color:red value= "Удалить">
<
input form="data" class="l4" type="submit" name="L4" style=color:green value= "Вывод содержимого каталога в которо находиться 'программа'">
[/
HTML]
// Класс

<?php
class
FileManager
{
public function create()
{
file_put_contents('$L1.txt','');
}

public function delete()
{
unlink("$L1.txt");
}
}

$L1=$_POST['L1'];
$L2=$_POST['L2'];
$L3=$_POST['L3'];
$L = new FileManager;
if ($L2=='Создать')
echo $L->create();
if ($L3=='Удалить')
echo $L->delete();
?>


          需要把这些关键字行取出来    
作者: Windows19 发表于: 2017-06-29 14:07:39 (GMT 8) 简介:[i=s] 本帖最后由 Windows19 于 2017-06-29 14:23 编辑 [/i] 100g log 效率 性能 a.txt 4gfgdg\[8654 45345[color=#ff0000]btgtfdfddgggd[/color] /[][ry[backcolor=darkorange]4353453466434534[/backcolor]rtyt/yr'
          Reply #570   
Hi RockyMountain, hope this helps, frank

MID since 2008-05-19-MO

LOS\C3 findstr -i C124 C3DAT.txt | more

Z2099|2014-02-15-SA|M214-04|C124-011|

Z1867|2013-06-28-FR|M421-04|C124-010|

Z1673|2012-12-16-SU|M421-03|C124-009|

Z1610|2012-10-14-SU|M124-01|C124-008|

Z1524|2012-07-20-FR|M241-01|C124-007|

Z1413|2012-03-31-SA|M214-03|C124-006|

Z1104|2011-05-27-FR|M214-02|C124-005|

Z1057|2011-04-10-SU|M214-01|C124-004|

Z0731|2010-05-19-WE|M421-02|C124-003|

Z0527|2009-10-27
          NGC 6811 Observing Campaign   

  NGC 6811 Observing Campaign

[broken link]  many broken links on this page as of 11/6/2013
old page is/was at arch.aavso.org/news/ngc6811.shtml

Burrell Schmidt Telescope

Field of View: RA: 19 37 17 Decl. +46 23 18 (J2000) The field dimensions are 1.5 degrees East-West and 0.75 degrees North-South.

Known & Suspected Variables

Below is a table of known and suspected variable stars around NGC 6811. Report observations of the stars using the designation or name given.

Click here for a list of all variables (and their properties) within 1 degree of NGC 6811 via VSX. And here is a DSS image with the location of the variables marked and version zoomed in on the innermost 5 variables (courtesy Tim Crawford-CTX).

Designation AAVSO Name VSX Link
(for more info)
Comments
1932+46 NSV 12196 Click
1938+46 NSV 12304 Click
1937+46B NSV 12298 Click
1934+46A 6811 V01 Click van Cauteren, et al. Comm. in Asteroseismology 146 (2005)
1934+46B 6811 V02 Click van Cauteren, et al. Comm. in Asteroseismology 146 (2005)
1934+46C 6811 V03 Click van Cauteren, et al. Comm. in Asteroseismology 146 (2005)
1934+46D 6811 V04 Click van Cauteren, et al. Comm. in Asteroseismology 146 (2005)
1934+46E 6811 V05 Click van Cauteren, et al. Comm. in Asteroseismology 146 (2005)
1935+46A 6811 V06 Click van Cauteren, et al. Comm. in Asteroseismology 146 (2005)
1935+46B 6811 V07 Click van Cauteren, et al. Comm. in Asteroseismology 146 (2005)
1933+46B 6811 V08 Click van Cauteren, et al. Comm. in Asteroseismology 146 (2005)
1933+46C 6811 V09 Click van Cauteren, et al. Comm. in Asteroseismology 146 (2005)
1931+45 RXJ1934+45 Click Akerlof, et al. (2001) - ROTSE survey for variables
1933+46 CTM3 CYG Click Schweitzer, par Emile. Bull. AFOEV #98
The following stars are somewhat close to NGC 6811. We list them here as secondary targets should you want to observe them while near the NGC6811 field. But please do not observe them in lieu of your normal NGC 6811 observations.
1937+46 BR Cyg Click AAVSO Chart & Shawn Dvorak's (DKS) EB Ephemeris Generator or Kreiner
1931+47 V796 Cyg VSX Shawn Dvorak's (DKS) EB Ephemeris Generator or Kreiner
1930+46 V894 Cyg V894 Cyg Shawn Dvorak's (DKS) RR Lyr Ephemeris Generator

Recent Information

Image from CWST - Sep 2, 2006. The CCD is actually continuous and the two halfs are joined but the data are stored with overscan regions in the middle. So think of them as an image which is joined straight across, so ignore the middle because it is not a real gap. Image is unreduced with different bias levels. Click for the full image.

Light curves of some of the variables as of Sep. 1:
6811 V01
6811 V02
6811 V03
6811 V04
6811 V05
CTM3 CYG


          SENDEJ написал(а) в теме: Есть форма с которой передаются через $_POST - пар   
Подскажите, почему не работает? Есть класс "class FileManager" , передаю параметры в класс с помощью переменных через пост L1...L4 , хочу, что бы создавался файл
файл создается но как "$L1.txt" , а как сделать так, что бы $L1 - менялось на то что указал в форме?

так же выдается ошибка "unlink(.txt) [function.unlink]: No such file or directory in Z:\home"
          To create a program that stores value from a file in the array   
The purpose of the program is to store values in array from a file salesData.txt which contains the values as shown below. The program should stop at the sentinel value that is 0.0. The code is not working as expected. . This is the question.Create a program that reads in ...
          Strategi dan Trik promosi Bisnis di Internet   

EMAIL MARKETING

Hebatnya E-mail
      
 Para pemilik situs web umumnya mengira bahwa mereka dapat menghasilkan
penjualan hanya dengan mengandalkan situs web mereka saja, mereka sedikit
mengabaikan betapa e-mail dapat mendatangkan penjualan di luar perkiraan
mereka.
      
 Hal ini terlihat cukup banyak pemilik situs web di Indonesia yang tidak
memanfaatkan fungsi e-mail mereka secara maksimal, umumnya mereka memiliki
situs web hanya sekadar menampilkan profil perusahaan, produk, barang atau jasa
yang mereka berikan, padahal sekarang trend-nya adalah bahwa para peselancar di
dunia maya adalah mereka yang ingin mencari informasi.
        
Anda ingat seorang salesman tradisional? sulit bagi mereka menjual produk
hanya mengandalkan brosur saja bukan! Karena itu komunikasi oral yang baik
diperlukan dalam berinteraksi dengan calon prospek, lead, kastemer, mau mitra
bisnis. E-mail juga adalah sarana untuk berinteraksi dan berkomunikasi dengan
mereka, E-mail juga dapat digunakan sebagai sarana semacam Call Center yang
dapat secara otomatis dan cepat menjawab pertanyaan prospek, lead, kastemer
atau pun mitra bisnis. Namun kebanyakan para pemilik e-mail memiliki
kecenderungan bahwa mereka menggunakannya sebagai sarana komunikasi biasa,
alat korespondensi yang cepat dan ekonomis, dan sarana pengirim barang digital.
       
Metode komunikasi dalam bidang marketing sebenarnya memiliki dalam tiga
(3) bentuk/jenis, yaitu 
  1.  komunikasi oral,
  2.  komunikasi visual, 
  3.  Komunikasi
 tekstual, karena itu mengapa tidak memanfaatkan bentuk yang ketiga untuk
memupuk kepercayaan prospek, dan berinteraksi dengan mereka di dunia maya?
 
Maka tantangannya:

Sudahkah Anda yakin bahwa e-mail dapat memberikan keuntungan finansial 
bagi usaha Anda?
 
Apakah Anda memiliki kecenderungan untuk bergegas dalam menjawab e-
mail dari pengunjung situs web Anda?
 
Apakah Anda telah menggunakan e-mail dengan metode "e-mail marketing"?
 
Bila jawaban dari ketiga pertanyaan tersebut adalah belum atau tidak, maka cepatan
agar kompetitor Anda tidak mendahului dan mengambil "market share" dari
produk/bisnis Anda!.
 
Konsep dari TARGETED EMAIL MARKETING?
       
Banyak perusahaan dan organisasi menggunakan email marketing untuk
emberikan informasi via email kepada kastemer, klien, mitra bisnis, prospek, dan
para langganannya. Istilah email marketing mengacu ke seluruh perangkat proses, 
strategi pemasaran dan pesan email, data, dan teknologi yang memungkinkan
komunikasi ini.

Email marketing kadang-kadang memang disalahartikan yaitu mengacu pada
suatu tindakan mengirimkan pesan-pesan pemasaran yg terus terang atau blak-
blakan via email karena memang murah yang disebut juga bulk email atau
unsolicited email/spamming. Akan tetapi, email marketing dapat mencakup
komunikasi apa pun yang dikirimkan melalui email oleh suatu perusahaan atau
organisasi. Suatu perusahaan yang mengirim email yang berisi target penjualan dan
pemasaran yang dihubungkan dengan setiap pesan email. Namun sebaliknya
daripada sekadar berbunyi "beli sekarang!", pesan-pesan email tersebut dapat
dimanfaatkan untuk memupuk suatu hubungan komunikasi bisnis jangka panjang
dengan kastemer.
 
 Penjelasan berikut melukiskan pada berbagai sifat dari email marketing. Agar
lebih enak, saya memilih menggunakan kata kastemer untuk mengacu ke klien,
mitra bisnis, prospek, langganan, dan siapa pun yang dikirimi komunikasi via email
oleh suatu perusahaan.

Contoh dari Email Marketing
      Sebelum kita masuk ke penjelasan yang lebih terperinci, saya akan mengajak
Anda dahulu melihat suatu contoh dari program email marketing yang ada. Program
email marketing tersebut adalah program yang dibuat oleh CDNow. Nah silahkan
Anda masuk ke situs web CDNow.

CDNow adalah perusahaan online yang bergerak di bidang musik retail.
Kastemer dapat mendaftarkan diri mereka pada situs web CDNow untuk
mendapatkan berita musik secara berkala, ataupun penawaran khusus. Pada waktu
kastemer mengisi formulir yg terdapat di situs web tersebut, mereka dapat mengisi
pilihan seperti musik apa yang mereka sukai, jenisnya dan frekuensi komunikasi via
email yang mereka kehendaki per minggu atau per bulan, dan informasi lainnya.
Karena itu secara tetap tentu, CDNow mengirimkan pesan-pesan email personalisasi
berdasarkan informasi ini. Misalnya, seorang kastemer yang menyatakan minatnya
pada dunia musik dan rilis baru akan menerima pesan-pesan email tinjauan dari
album musik baru dari seluruh dunia.

Bukan Spam, Namun Sudah Mendapat Persetujuan (permission-based)

Salah satu sifat utama dari email marketing adalah atas dasar
persetujuan/izin. Kastemer secara terus terang melakuan registrasi ("opt-in") untuk
menerima pesan email. Setelah registrasi, resipien pun dapat berhenti keluar dari
"opt-in" tersebut (unsubscribe). Sifat inilah yang membedakannya dari unsolicited
email, yang secara umum disebut sebagai spam. Email marketing adalah suatu
aktivitas mengirimkan pesan-pesan komunikasi yang dilakukan oleh suatu organisasi
kepada mereka yang mau mendengarkan atau siap menerima berita dari organisasi
tersebut.
 
Tujuan dari Email Marketing
       Tujuan keseluruhan dari email marketing adalah untuk membangun suatu
kemitraan antara suatu organisasi dengan para kastemernya di mana kedua belah
pihak mendapatkan manfaat timbal balik dari pertukaran informasi ini. Program
email marketing yang berhasil adalah program yang memenuhi kedua tujuan dari
organisasi tersebut maupun kebutuhan dan keinginan dari para kastemernya.

Agar berhasil suatu organisasi harus membangun dan memperkuat hubungan
komunikasi bisnisnya dengan para kastemernya. Hal ini tentu saja menggunakan
media komunikasi khususnya email karena lebih efisien, cepat, dan biaya lebih
terjangkau untuk mempromosikan suatu merek, mendapatkan kastemer,
mempertahankan suatu bisnis, dan saling menjual produk. Dan sekaligus hal ini
dapat memenuhi tujuan kuantitatif seperti meningkatkan jumlah pengunjung,
kastemer baru dan pendapatan tentu saja.

Program email marketing yang berhasil memastikan bahwa komunikasi yang
keluar itu harus sesuai dengan kebutuhan dan keingian dari para kastemer. Tujuan
spesifik dari para kastemer bisa jadi memang bervariasi. Tujuannya bisa jadi mulai
dari menerima informasi yang bersifat menghibur, atau berhubungan dengan karir
pekerjaan, atau suatu advis mengenai suatu topik tertentu yang menjadi minat
mereka. Kemudian peraturan apa yang jangan dilupakan dalam melakukannya? dan
apakah perusahaan Anda harus melakukannya? Ini akan dibahas pada edisi
berikutnya.
 

Menulis email penjualan yang berdaya tarik
       
Email penjualan dapat menjadi cara yang dahsyat dalam menyampaikan
pesan anda. Mail box saya terus-menerus terisi dengan “junk mail”, demikian kata
banyak orang. Seorang teman memberitahu saya bahwa ratusan pesan email yang
tak diundang dating setiap hari.
        
Mengapa begitu banyak pelaku bisnis - baik yang berskala besar maupun
kecil - menggunakan email? Sederhana saja. Email dapat langsung ditulis dengan
cepat, berhasil dengan baik.
 
Inilah alasannya
       
Email adalah bentuk komunikasi yang sangat pribadi. Bahkan ketika Anda
mengetahui bahwa surat yang sama dikirimkan ke ribuan orang, email tersebut
masih terasa seperti tulisan pribadi dari seorang teman.
       
Orang-orang yang mempunyai kemampuan yang bagus dalam menulis email
penjualan mengetahui hal ini dan menggunakannya. Mereka berupaya sebaik
mungkin untuk menciptakan suatu ikatan pribadi antara email tersebut dan
resipiennya.
 
Email penjualan Anda harus berbicara secara intim dengan pembacanya. Bercakap-
cakap secara tidak resmi dengan kalimat-kalimat pendek dan kata-kata sederhana.
Buatlah pembaca SEGERA dengan mudah mengerti apa yang Anda tawarkan.
      
 Kebanyakan orang hanya akan melihat sepintas selama tiga detik pertama
terhadap email Anda sebelum memutuskan untuk membacanya lebih jauh atau
menghapusnya.

Buatlah tawaran Anda menarik dan tonjolkan di pembuka dengan tepat.

Lima rumus dahsyat untuk email penjualan
        
Salah satu dari hal-hal yang hebat dari surat langsung (direct mail) - biasa
maupun elektronik - adalah bahwa Anda mendapatkan respon yang segera dan
dapat ditindak lanjuti. Email penjualan yang berhasil, menghasilkan sejumlah pesan
balik, telepon langsung, penjualan yang dapat diperhitungkan.
      
Selama bertahun-tahun, para direct marketer telah menetapkan beberapa
rumus favorit yang tampaknya berhasil. Berikut ini adalah lima rumus favorit saya.

1. Ceritakan sebuah kisah.
  
     Perhatikan bahwa banyak dari email penjualan yang Anda terima mengikuti
metode ini.
       
Sangat sulit menahan diri untuk tidak membaca sebuah kisah orang lain yang
khususnya terdengar mirip dengan situasi yang kita alami. Orang-orang menyukai
kisah-kisah sukses bahkan gossip seperti acara TV "Eko nge-gosip".
       
Apalagi kisah tersebut memberi tahu kita caranya memperoleh kesuksesan
untuk diri kita senadiri.

2. Surat dari Direktur.

Orang-orang merespek tulisan dari pemimpin perusahaan. Hal ini
meminjamkan wewenang kepada pesan tersebut dan membuat pembaca merasa
penting. Hal tersebut adalah sebuah cara yang bagus dalam menjual.
       
Rumus ini juga dapat digunakan untuk memberitahu pembaca mengenai
informasi di dalamnya.

3. Tawarkan sesuatu yang gratis.

 Bisa jadi berupa kunjungan gratis atau diskon dari toko atau kantor Anda.
Seorang dokter yang tinggal disamping jalan rumah saya menarik pasiennya dengan
mengirimkan ratusan kartu pos yang menawarkan "diskon 10% untuk kunjungan
pertama".

Prospek yang tertarik kepada produk atau jasa Anda akan lebih menghargai
penawaran selanjutnya. Tawarkan dalam bentuk Special Report, brosur, atau booklet.
  
4. Ajukan pertanyaan. "Apakah hari-hari Anda begitu menjengkelkan dan
membuat frustasi?
"
       Ini adalah psikologi kuno yang bagus. Pada saat Anda mengajukan
pertanyaan, pembaca terdorong untuk menjawab pertanyaan tersebut. Hal ini
melibatkan pembaca secara mental ke dalam email penjualan dan penawaran Anda.
      
 Beberapa ahli mengatakan untuk mengajukan serangkaian pertanyaan yang
menuntun resipien agar-agar masing-masing menjawab “ya”. Kemudian pertanyaan
terakhir yang menyuruh pembaca untuk menjawab “ya” untuk suatu transaksi atau
“deal” bisnis.

5. Tunjukkan masalah yang sedang dihadapi oleh prospek.
       
Hal ini adalah metode promosi klasik. Perhatikan hal ini dalam pemasaran dan
iklan dimanapun. Arahkan perhatian para pembaca kepada masalah, kemudian
buatlah masalah tersebut tampak buruk. Sewaktu Anda telah menetapkan masalah
sebagai rintangan utama dalam kehidupan pembaca, perkenalkan jasa atau produk
Anda sebagai solusinya.

Tulislah subject email untuk merebut perhatian
     
Kebanyakan email penjualan dimulai dengan sebuah headline yang langsung
mempersembahkan poin utama. Subject bisa ditulis sedemikian rupa agar
menggugah secara emosional:
 
Juga selain itu ingat, dalam menyapa tidak cukup sekadar menulis :
Hallo….,
 
Halo ke siapa? Agar menggigit sebutkan NAMA MEREKA, sebaliknya daripada "Hallo
Teman," atau "Hallo Para Orang Tua," "Hallo Pencinta Bola Basket," "Hallo Pemilik
Mobil."
 
kedengarannya TERLALU umum, bukan?
 
Tentu dalam hal ini Anda membutuhkan Sistem yang dapat mempersonalisasi setiap
calon pembaca Anda, sebaliknya daripada "Copy & Paste", lihat topik tentang
http://www.bjoconsulting.com/mesin_emarketing.htm.
 
Termasuk juga tambahan yang disebut N.B. atau P.S. pada akhir surat Anda. Studi
menunjukkan bahwa kebanyakan pembaca langsung melompat ke N.B. sebelum
membaca yang lainnya! N.B. harus dengan singkat mengemukakan kembali pokok
utama penawaran anda.
 
Akhirnya, tekankan manfaat daripada fitur. Bagaimana manfaat jasa atau produk
kita meningkatkan kualitas hidup, pekerjaan, atau dompet kastemer.
 
Manfaat dari penawaran Anda mungkin jelas bagi Anda, namun jangan serahkan
pada pembaca untuk mencari tahu sendiri, tidak peduli sejelas apa tampaknya
 
pengetahuan mereka terhadap jasa atau produk Anda. Tekankan manfaatnya.
Hubungkan mereka pada fitur dari penawaran anda.
       
Email penjualan dapat menjadi sarana pribadi yang luar biasa untuk
memperkenalkan orang-orang kepada produk, jasa, organisasi, atau ide Anda.
Dengan menggunakan beberapa ide dan rumus yang telah saya sebutkan di atas,
Anda dapat membuat email penjualan yang sangat emosional yang membuahkan
hasil..
  
Membuat dan mengirim brosur email berformat .HTML
      
Email berbasis teks masih merupakan sarana komunikasi yang paling populer,
akan tetap dengan adanya format email berbasis .html, kita bisa membuat email
yang menarik yang berisi gambar-gambar, sekaligus link yang dapat diklik dan
bahkan menggunakan formulir interaktif.
       
Email .HTML memiliki tampilan yang mirip dan sama dengan halaman web.
Dengan demikian foto-foto pun dapat dimasukkan.
Menariknya email .html ini membuka jalan bagi digunakannya e-brosur dalam
mempromosikan suatu produk atau bisnis ke target prospek yang memintanya
sebaliknya daripada memfakskan brosur yang tidak memberikan hasil "what you fax
is what they get", artinya Anda memfakskan brosur berwarna, namun hasil yang
diterima hitam-putih.
       
Mengapa pas teknik ini, mengingat hampir semua perusahaan sudah memiliki
email, dan memang sekarang sudah muncul mesin faks yang dapat menerima hasil
faks yang berwarna, namun kendalanya adalah mesin pengirimnya harus sama,
karena tidak kompatibilitas kalau mesinnya berbeda.
Beberapa perusahaan di Indonesia juga sudah menerapkan email .html untuk
brosur-brosurnya mereka sebaliknya daripada mereka memfakskan brosur mereka
ke prospek.
     
Minta info di sini, untuk mengetahui beberapa perusahaan di Indonesia yang
menggunakan brosur email dalam pemasaran produk-produk mereka berikut
komentar mereka ke email: marketing@bjoconsulting.com
      
Jadi sering kali digunakan sebagai sarana yang berharga dalam kampanye
pemasaran langsung. Yang jelas langsung dapat dilihat di bagian preview-nya dan
bukan dalam bentuk attachment, yang membuat orang malas untuk membukanya.
       
Sekarang popularitas email .HTML sudah melebih dari popularitas email
berbasis.txt.
      
Di Indonesia sendiri, 92% pengguna email mendukung email .html,
mengingat juga kebanyakan dari mereka menggunakan sistem OS berbasis microsoft.

Kalaupun mereka menggunakan email gratisan, seperti yahoo.com dan
hotmail.com maupun penyedia email gratisan yang berbasis Indonesia seperti
telkom.net atau plasa.com mereka pun support dengan email .html..

Sekarang kita lihat dulu manfaat dengan memanfaatkan brosur email dalam
promosi bisnis kita :

  • Menarik mata
     
  • Grafik, foto, ikon, link yang dapat diklik, huruf-huruf yang berbeda, formulir
    interaktif dapat dimasukkan ke dalamnya.
     
  • Lebih interaktif dengan pelanggan Anda
     
  • Kebanyakan digunakan oleh para pemasang iklan, dan bagi konsumen yang
    koneksi internetnya menggunakan bandwidth yang lebih bagus, pasti mereka
    tidak keberatan untuk menggunakan brosur email.
     
  • Tampilan iklan terlihat lebih efektif
     
  • Hampir kebanyakan program email support .html (mis : Outlook Express, Outlook, Eudora, Netscape Communicator, Hotmail, Rocketmail, AOL, Yahoo,Web TV).
Bagaimana membuat email .html?
 

1. buka program editor .html seperti MS FrontPage, Dreamweaver (bisa juga pakai
   MS Word 97 atau 2000 tetapi umumnya kurang bagus) untuk membuat email
   .html.
 

2. Gunakan URL lengkap untuk link-nya seperti : (mis : http://www.cintasejati.com/)
 

3. Grafik (seperti gambar, ikon, huruf-huruf yang menarik) harus disimpan ke dalam
   web server agar bisa tampil.
   Jika Anda tidak mau menggunakan grafik, Anda bisa tetap menggunakan kolom-
   kolom tabel yang berwarna
 

4. Beri nama dan save halaman yang sudah Anda buat (mis : cinta-brosur.htm).
 

5. Sekarang buka Email Software - misalnya pakai outlook express (karena ini yang
   paling populer) masuk ke create mail - insert - text from file - cari halaman brosur
   email yang telah Anda namakan tadi.
Yaa, siap Anda mengirimkannya.
 

6. Sebelum Anda kirimkan kepada mereka yang meminta, maka kirimkan dulu ke
   Anda sendiri atau rekan-rekan di perusahaan Anda sebagai tes apakah hasilnya
   sesuai?
   Kalau bisa kirimkan ke mereka yang memiliki program email yang berbeda-beda
   untuk memastikan bahwa mereka yang memintanya dapat membaca dan
   melihatnya secara utuh di komputer mereka.


7. Setelah Anda membuatnya, maka save itu sebagai template atau format standar
   brosur Anda dengan logo dan tampilan resmi korporat Anda.
   Nah sekarang kalau begitu Anda sudah bisa mengirim brosur ttg informasi produk
   lewat email Anda.


Poles subject di email anda agar resipien segera membaca email
anda!

      Bagian apa yang paling penting dari iklan Anda? coba lihat, bahwa
kebanyakan orang tidak membaca iklan, mereka hanya melihat sekilas saja. Kalau
pun mereka membaca, mereka hanya melihat satu hal, dan itulah yang
menggerakkan mereka untuk membaca lebih jauh.
 

Hal pertama orang membaca iklan adalah karena mereka membaca headline.
       

Dalam email, subject adalah headline. Itu artinya Anda harus
mengkomunikasikan hal yang sangat menggelitik dan memotivasi kepada mereka,
dan ini merupakan pekerjaan yang tidak mudah mengingat Anda harus bermain
dengan pilihan kata-kata tertentu dan harus singkat tetapi menggigit.
     

 Karena itu apa yang dapat Anda lakukan dengan pilihan kata-kata yang akan
menggigit perhatian si pembaca?
 

Berikut ini adalah tips yang dapat Anda lakukan :
 

* Berbicaralah langsung kepada orang yang diajak baca dengan menyapa mereka
"Anda" atau lebih baik namanya. Para pembaca umumnya tidak akan tersentak
sampai mereka mendapati sesuatu yang mereka baca atau rasakan ditujukan
Padanya langsung.
 

** Tawarkan sesuatu yang sifatnya tidak mengikat di bagian headline. setelah itu
mereka pasti akan terus membaca seterusnya untuk mendapatkan hal yang Anda
tawarkan.
 

*** Gunakan statistik dan hendaklah spesifik.

Strategi dan Trik promosi Bisnis di Internet Artikel Tentang Email Marketing Thanks sudah membaca dan Mudah Mudahan informasi nya bisa membantu anda.



 








                                                              





 




 




          Tributes to Harvey Pekar at libraries in Cleveland and inner suburbs   

Comic book writer Harvey Pekar, known for the American Splendor series, is reported by The News-Herald as receiving honors from the Cleveland Public Library and the Cleveland Heights-University Heights Public Library System. Apparently the American Library Association has a United for Libraries division which named the branch in Cleveland Heights a Literary Landmark due to its connections with Pekar.

Both libraries are part of the CLEVNET consortium that stretches along the south shore of Lake Erie in Northern Ohio.


          Facundo Batista: Python y el manejo de dependencias   


(there is an English version of this post, here)

Python tiene una biblioteca estándar muy extensa ("viene con las pilas incluídas"), pero es frecuente la necesidad de usar otros módulos que están afuera de la misma, casi siempre desde el Índice de Paquetes de Python (PyPI).

La manera original de instalar esos módulos es a "nivel de sistema" (sudo pip install foobar), en el sistema operativo de forma general, habilitándolos para ser utilizados por cualquier programa que se ejecute.

Más allá de necesitar permisos de root o administrador para instalar las dependencias de esta manera, el primer problema con el que nos encontramos es el de conflictos: el caso típico de dos programas que necesitan la misma dependencia pero en versiones distintas, lo cual no puede lograrse al instalar las dependencias en forma global.

Por eso es que es tan normal en el mundo de Python usar "entornos virtuales". Se crea un entorno virtual para cada programa, se instala las dependencias necesarias para cada programa en cada entorno virtual, y como lo que instalamos en ese entorno es sólo accesible desde dentro del entorno, no hay más conflictos.

En este punto, sin embargo, aparece el problema de la administración de los entornos virtuales: crearlos, instalarles cosas, activarlos para usarlos con cada programa y desactivarlos luego, recordar los nombres de cada entorno para cada programa, etc.

Para automatizar esto nació fades.

fades les permite utilizar todo el poder de los entornos virtuales sin tener que preocuparse por ellos.

¿Quieren ejecutar un script que necesita la dependencia foobar?

    fades -d foobar script.py

¿Quieren un intérprete interactivo teniendo foobar instalado como dependencia?

    fades -d foobar

¿Necesitan ejecutar el script pero con varias dependencias, alguna en una versión específica?

    fades -d foo -d bar -d baz==1.1 script.py

¿Tienen todas las dependencias en un archivo de requerimientos?

    fades -r requirements.txt script.py

Esto es sólo lo más sencillo que podés hacer con fades. Los entornos virtuales son una herramienta poderosísima, y automatizar y simplificar su uso hace que fades tenga bastantes opciones, algunas que usarán todos los días, y otras que les van a resultar muy útiles en casos puntuales.

Empiecen a usar fades de a poco (acá tienen toda la documentación) y van a encontrar que van a tener resuelto el tema de la administración de dependencias en programas y scripts, usando entornos virtuales pero sin la complejidad de tener que hacerlo directamente y a mano.


          Facundo Batista: Todo lo que siempre quisieron saber de la CDPedia y nunca se atrevieron a preguntar   


¿Qué es?

La CDPedia es la Wikipedia Offline. O sea, la Wikipedia, lo más fiel posible a su formato y contenido original, pero armada (construida, compactada) de una manera que no se necesita nada de Internet para acceder a toda la info de la misma.

Se llama CDPedia porque la idea original era meterla en un CD. Hoy por hoy generamos cuatro imágenes en cada liberación de CDPedia: un CD, un DVD, y dos archivos comprimidos (uno mediano y otro grande) que se pueden poner en un pendrive o en cualquier disco rígido.

La CDPedia es multiplataforma: el mismo CD, DVD o archivo comprimido se puede usar en Linux, Windows, o Mac, sin necesitar nada instalado previamente por fuera de lo que cada sistema trae normalmente.

CDPedia


¿Cómo se usa? ¿Cómo se ve?

Para usarla, lo primero es descargarla. Pueden acceder a la página del proyecto y ahí encontrarán info acerca de las cuatro versiones que tenemos actualmente, con el detalle de cuantas páginas y cuantas imágenes tiene cada una. Para bajarlo, necesitan un cliente de Torrent; para Linux a mí me gusta mucho el Deluge, que también puede usarse en Windows y Mac; otro cliente recomendado para las tres plataformas es qBittorrent.

Si descargan la versión CD o DVD, lo primero que tienen que hacer es grabarlo a un disco virgen, para lo cual necesitan una grabadora y un software para grabar. Si usan Windows y no tienen ninguno instalado, les recomiendo InfraRecorder que es software libre y muy fácil de usar. Pongan el disco generado en el equipo y ejecuten la CDPedia.

Si descargan las versión tarball, directamente descompriman los archivos en el disco rígido. Entren a la carpeta descomprimida y ejecuten la CDPedia.

¿Cómo se ejecuta la CDPedia? Bueno, depende de cada sistema. En Windows con hacer doble click en cdpedia.exe, alcanza. En Linux o Mac, si tienen bien configurado el navegador de archivos, debería funcionar haciendo doble click en cdpedia.py, pero siempre pueden recurrir a abrir una terminal, ir hasta el directorio en cuestión, y hacer ./cdpedia.py.

En cualquier caso al ejecutar ese archivo se va a levantar el Server de CDPedia, y al mismo tiempo se abrirá un navegador apuntando a ese Server local. Luego, es sólo usarla, ya que se explora y utiliza de la misma manera que la Wikipedia Online (con la excepción obvia que la CDPedia es de lectura solamente: no permite editar el contenido como sí lo hace la Wikipedia).

(a este y otros screenshots, hagan click para verlos más grandes)

Cómo se ve la CDPedia

Una decisión estratégica de la CDPedia es tomar el HTML generado por los servers de Wikipedia y usarlos casi directamente (les recortamos unos headers, optimizamos algunas cositas). Exploramos en algún momento tomar la info de la base de datos directamente, pero no logramos generar una página web igual a la de Wikipedia online.

Y eso es una fortaleza de la CDPedia: por la manera en que armamos las páginas, la forma de ver y usar las páginas, de explorar y acceder a la información, es igual a la Wikipedia online, de manera que el usuario no tiene un costo cognitivo en pasar de la versión online a offline. Es más, también se puede considerar a la CDPedia como el paso previo de consumo de contenido a la Wikipedia: una persona se puede acostumbrar a explorar las páginas, leer, cruzar y criticar la información, etc, y recién cuando tiene todo armado va a la Wikipedia Online y al resto de Internet para completar su investigación.

Más allá de la página a nivel contenido, lo que sí modificamos mucho es la barra de la izquierda. No tiene la original de Wikipedia, porque no tiene sentido al ser todo offline, así que reemplazamos los botones y enlaces por otros: hay un botón para ver una página al azar, un campo de texto de búsqueda, el logo de CDPedia, el logo de PyAr, enlace a una página de ayuda, etc...

Algo que también modificamos bastante es como señalizamos los enlaces en la página misma, en el contenido de Wikipedia. Hay principalmente tres tipos, distinguibles en cómo decoramos el texto convertido en enlace:

  • Azul: un link normal, apunta a otra página de Wikipedia que se incluyó dentro de CDPedia.
  • Rojo, subrayado con guiones: un enlace a otra página de Wikipedia pero que no fue incluida en CDPedia por razones de espacio.
  • Azul, subrayado con guiones: un link que los sacaría de CDPedia, ya que apunta a recursos online (útiles solamente si tenés Internet, claramente).

Muestra de enlaces

Otra sección que modificamos es el pie de cada página: ponemos un enlace a la misma página pero online, en Wikipedia misma, por si el usuario necesita la información actualizada. También aquí incluimos el contenido original, ponemos algún disclaimer extra, mencionamos que CDPedia es un proyecto de Python Argentina (y apuntamos al tutorial de Python que está incluido en la CDPedia).

Cabe mencionar que la CDPedia funciona también en Modo Servidor. De esta manera, se puede instalar la CDPedia en el servidor de una escuela, y que todas las computadoras del establecimiento puedan usar la información desde allí. Así logramos el efecto deseado de que los chicos puedan tener acceso al contenido de Wikipedia sin realmente tener Internet, pero sin la complicación o el incordio de tener que instalar CDPedia en cada una de las computadoras. Acá hay más instrucciones para configurarla de este modo.


¿Qué contenido tiene?

El contenido de la CDPedia está fuertemente determinado por dos características intrínsecas del proyecto: la CDPedia es estática y fácilmente distribuible en un disco o pendrive.

Digo que la CDPedia es estática porque una vez armada, no se actualiza. Es por eso una especie de "fotografía de un momento de Wikipedia" que, por definición, siempre va a estar desactualizada.

Cuando se comienza a generar una nueva versión de la CDPedia, se baja la versión más actualizada de todo el contenido de Wikipedia y se empieza a procesar. Este procesamiento puede llevar varias semanas, incluso unos meses. Entonces, cuando se libera una nueva versión de CDPedia, no incluye todos los cambios que se generaron en Wikipedia misma desde que se empezó a procesar.

Es por esto que se trata de liberar una versión de CDPedia al menos una vez por año, para que contenga la información lo más actualizada posible.

Ejemplo de un artículo

También digo que la CDPedia se puede distribuir fácilmente: sólo hace falta quemar un CD o DVD, o incluso pasarse los archivos mediante un pendrive. En casi todas las versiones (menos la más grande), por una cuestión de formato, no entra todo el contenido de la Wikipedia. Por ejemplo, para la versión 0.8.3, tenemos lo siguiente:

  • CD (693 MB): 54 mil páginas y 5% de las imágenes
  • Tarball medio (3.6 GB): 400 mil páginas y 20% de las imágenes
  • DVD (4.3 GB): Todas las páginas y 8% de las imágenes
  • Tarball grande (8.7 GB): Todas las páginas y todas las imágenes

Entonces, a menos que estemos armando el tarball grande, es evidente que tenemos que decidir cuáles páginas e imágenes van a entrar, y cuáles van a quedar afuera.

Esa decisión se toma ordenando todas las páginas por un determinado puntaje (que explico abajo), y se eligen las primeras N páginas (para el ejemplo anterior, las primeras 54 mil para el CD, las primeras 400 mil para el tarball medio, etc). Esas páginas tienen a su vez imágenes, que naturalmente también quedan ordenadas por el puntaje de las páginas: se toma un primer porcentaje de imágenes que se incluyen al 100%, otro porcentaje de imágenes que se escalan al 75%, otro porcentaje de imágenes que se escalan al 50%, y el resto no se incluye.

Analizando las páginas

Como vieron, un tema clave en la selección es darle un puntaje a las páginas. Este puntaje está formado (hoy por hoy) en base a dos factores: levemente por el largo de la página (una página larga tiene más puntaje que una corta), y fuertemente por lo que llamamos "peishranc", que es la cantidad de otras páginas que enlazan a la que estamos evaluando. Entonces, si a una página se la menciona en otras mil páginas es mucho más importante que una página que casi no se la menciona en el resto de la Wikipedia.

Otro gran detalle en lo que es "contenido" es qué hacemos para mitigar el problema de la vandalización. O sea, cómo evitamos en lo posible incluir páginas que fueron vandalizadas. Cuando comienza el proceso de generar una nueva versión de la CDPedia, como les comentaba antes, bajamos todas las páginas de Wikipedia, ¡pero no siempre bajamos la última versión! Lo que hacemos es revisar cuándo fue modificada y por quién: si fue modificada por un usuario normal, perfecto; pero si fue modificada por un usuario anónimo (como sucede en la mayoría de las vandalizaciones) nos fijamos cuando fue modificada: si fue hace más de varios días, la incluimos (asumimos que la gente de Wikipedia ya tuvo tiempo de verificar el cambio), pero si es muy reciente evitamos la última versión de la página, y agarramos la versión anterior (y aplicamos nuevamente todos estos mismos controles).


¿Cómo surgió el proyecto?

Cuenta la leyenda que el proyecto arrancó en el sprint posterior al primer PyDay de Santa Fé, en Junio del 2006, con la idea base de poder distribuir la Wikipedia a aquellos lugares que no tenían o tienen acceso a Internet (en particular teníamos en mente a escuelas de frontera o de ciudades chicas, bibliotecas de barrio, centros culturales de pueblos pequeños, etc.).

El proyecto continuó, y aunque no siempre le pudimos dedicar tiempo, tampoco nos alejamos nunca demasiado. Las mejoras en el proyecto fueron muy por ráfagas. Quiero destacar que fuimos muchos los que colaboramos con el proyecto, a lo largo de los años, ¡casi 30 personas!

Se trabajó mucho en este proyecto durante los PyCamps (los dos en Los Cocos, el de Verónica, y el de La Falda), donde muchas personas le dedicaron un buen tiempo, y también se realizó bastante durante otras reuniones, especialmente durante el 2010 y 2011.

Trabajando en un PyCamp

A modo de ejemplo, dos sprints: uno fue en un incipiente hacklab, donde se experimentó mucho sobre el índice para las búsquedas, y también durante la fundación de Wikimedia Argentina, donde se presentó por primera vez el proyecto y se realizó un gran avance en la primera parte del procesamiento de datos.

En años más cercanos yo traté de involucrar colaboradores en algunos sprints efímeros que armé, con poca suerte. Lamentablemente en el último tiempo fui principalmente sólo yo el que empujó el proyecto (lo cual es una autocrítica, más que un autoreconocimiento).

Una gran característica de la CDPedia, indiscutiblemente el proyecto más grande y más largo de Python Argentina, es que siempre se mantuvo orientado a los mismos objetivos: tener una Wikipedia offline con fines sociales (distribuir en escuelas sin conexión a Internet, que el conocimiento sea libre, etcétera), que sea divertido de hacer (es decir, hacerlo en Python), y mantenerlo libre (no sólo el producto final, que recomendamos copiarlo y repartirlo, sino el código en sí).


¿Se logró cumplir el objetivo social?

Como decía arriba, uno de los objetivos de la CDPedia es difundir el conocimiento, lograr que gente que no tenga acceso a Internet igual pueda acceder a la información de la Wikipedia, que es tan valiosa. Siendo PyAr una comunidad relativamente pequeña, era difícil escalar a tener un impacto nacional en el común de la gente.

En su momento queríamos que se viralice persona a persona: que alguien la baje y haga un par de CDs y los reparta, que los que reciben cada CD hagan a su vez varias copias y las repartan a otras personas, a escuelas, bibliotecas de barrio, etc. Pero no tuvimos mucho éxito con esa movida.

Pero resulta que Martín Varsavsky se casó, y Jimmy Wales le regaló para el casamiento la posibilidad de que se distribuya una Wikipedia offline en Argentina. Preguntó cuáles habían, la CDPedia era la que mejor se ajustaba a lo que se necesitaba, y vino Jimmy a Buenos Aires, le mostramos la CDPedia, y luego hubo una reunión en Educ.ar para terminar de acordar esto (fueron Jimmy por Wikimedia, Enrique Chaparro por Wikimedia Argentina y Alecu por PyAr).

En gran parte porque Educ.ar quería meter la CDPedia en un disco de ellos (con carátula de ellos, algunas otras páginas, etc), se logró que dicha institución becara a dos chicos de PyAr, Diego Mascialino y Hernán Olivera, para trabajar part time en esto.

Así que agarraron la versión 0.6 que recién había salido (Alecu y yo nos habíamos apurado a cerrar muchos detalles para tener algo funcionando presentable a Jimmy Wales), y entraron a darle. Esto le dio bastante impulso al desarrollo del proyecto, sumado a que también aporté regularmente al proyecto, y a que luego de que se terminara la beca Diego siguió trabajando en CDPedia, y que se sumó como "laburante regular" Santiago Piccinini.

Con todo este trabajo, y un nuevo empujón en el PyCamp del 2011, pudimos terminar de cerrar la versión 0.7, que se entregó a Educ.ar y se distribuyó a todas las escuelas del pais.

Sin embargo el mayor hito a nivel de distribución masiva de la CDPedia es que en algún momento fue incluida en las notebooks que el Estado argentino distribuye a los chicos de escuelas de todo el país como parte del programa Conectar Igualdad. Y también se la muestran a alumnos y docentes en los talleres que hacen como parte del programa.


¿Se puede espiar abajo del capot?

¿Cómo se arma la CDPedia? ¿Cómo se logra cumplir todo lo que expliqué arriba?

Es bastante sencillo: hay que bajar el código con git desde la página del proyecto en github, y luego correr un script que hace todo solo: el cdpetron.

Este script tiene bastantes opciones (especialmente para no repetir partes del proceso: que no vuelva a listar todas las páginas, que no vuelva a bajarlas, que no limpie todo antes de comenzar, etc), pero lo básico es que se le especifica de dónde tomar el código, donde bajar y dejar páginas e imágenes, y en qué idioma trabajar.

Incluso hay una manera de correrlo en modo test, para que haga solo una parte del trabajo y poder arrancar pronto a probar cosas, ideal para mezclarlo con la opción de generar una sola de las versiones:

    $ utilities/cdpetron.py --test-mode --image-type=beta . /tmp/dumpcdpedia es

El comando anterior tarda relativamente poco (menos de cinco minutos en una máquina normal y con buena conexión a Internet) y nos deja todo el proceso realizado, pero con pocas páginas.

Ver lo que obtuvimos es sencillo, porque más allá de generarnos el tarball o el .iso correspondiente, podemos probar la CDPedia directamente del directorio donde realizamos el proceso, haciendo...

    ./cdpedia.py

...lo cual levantará el server y nos abrirá el browser, tal cual si lo hiciéramos de la versión final (pero con la ventaja que podemos pararlo, cambiar el código para probar el algo, levantarlo de nuevo, ver los resultados, etc.)

¿Y cómo es el proceso que realiza? Bueno, la estructura interna (y el proceso para obtenerla) de la CDPedia está muy influida por la necesidad de optimizar al máximo la compresión y el acceso a la información, de manera de poder meter en cada formato (CD, etc...) la mayor cantidad posible de artículos e imágenes.

Podemos delinear el proceso que se realiza en en el siguiente gráfico:

Proceso de la CDPedia

El primer paso es bajar de la Wikipedia misma todas las páginas (lo que realmente tiene dos sub-pasos, un listado general de todas las páginas que nos interesan, y luego efectivamente bajarlas). Esas páginas son pasadas por diferentes preprocesadores que hacen distintos trabajos. Algunas las filtran y eliminan páginas que no queremos, otras les asignan puntajes, otras las modifican mejorándolas para nuestro objetivo, otras extraen información que va a ser útil luego.

Al final de ese preprocesamiento tenemos dos grandes resultados intermedios: los HTMLs "útiles", más un montón de metadata. Aquí se abren tres grandes ramas de trabajo.

La primera es el manejo de las imágenes. Se buscan los enlaces en las páginas, se descargan todas las imágenes necesarias (que pueden no ser todas, dependiendo de la versión generada), se reducen las que corresponden (algunas se incluyen al 75% o 50% de su tamaño) y finalmente se arman los llamados "bloques de imágenes".

Por otro lado, con los resultados intermedios se generan los "bloques de artículos".

Y finalmente, se procesan todos los títulos de las páginas más algo de metadata y se hace pasar por un complejo algoritmo matemático que nos pre-arma la información para generar los "bloques del índice".

A esta altura tengo que explicar qué son estos "bloques" de imágenes, artículos o índice. Es una estructura no demasiado compleja pero muy bien pensada para el objetivo de la CDPedia que es funcionar sin usar demasiada memoria y poco espacio en disco. Básicamente tenemos bloques de información comprimidos de forma independiente: es un equilibrio entre comprimir todo por separado, o comprimir todo junto; logramos mejor ratio de compresión que comprimiendo la info por separada, y no tenemos que descomprimir algo demasiado grande al no estar todo junto. Para decidir qué bloque consultar hay un hasheo y selección, y luego dentro de cada bloque hay un índice binario de contenidos, pero no mucho más.

Finalmente, con estos bloques, más algunos recursos estáticos (imágenes, CSSs, algo de JSs, el tutorial de Python comprimido, etc.), más el código de Python propiamente dicho para servir la CDPedia, se arman los tarballs o .ISOs.


¿En qué situación está el proyecto actualmente?

El proyecto avanza, pero lento.

Hay varios bugs abiertos, incluso algunos que son críticos porque se muestran un par de cosas feas luego de un cambio de formato de las páginas de Wikipedia, pero yo personalmente no estoy haciendo foco ahí, sino que estoy empujando un par de cambios más grandes.

Uno de ellos es lograr la internacionalización de la CDPedia. Cuando esté terminado, se van a poder crear CDPedias no sólo a partir de la Wikipedia en español, sino también de la Wikipedia en otros idiomas: portugués, aymara, guaraní, alemán, ruso, etc...

El otro cambio es más bien la construcción de una infrastructura en particular. Mi idea es tener una generación continuas de CDPedias, que se arme la CDPedia en español, y automáticamente luego se arme la de otro idioma, y otro, y otro, y otro, y luego de varios meses, vuelva a arrancar con la de español.

Trabajando

Pero, como decía, hay mil cosas para hacer.

Unos chicos en un PyCamp hicieron una app para Android que, luego de copiar los datos a mano, correría la CDPedia en cualquier teléfono o tablet (yo traté recientemente de usarlo y tuve unos problemas y no lo pude hacer andar del todo).

Otro detalle que necesita trabajo es que el código en sí está bastante feo... mezcla inglés y castellano, no cumple PEP 8 ni PEP 257, tiene poco y nada de pruebas de unidad, etc.

Si tienen ganas de participar de cualquier manera, lo principal es que se pongan en contacto con el grupo en general, a través de la lista de correo o del foro asociado (son espejo uno del otro, usen el
que sientan más cómodo). Lo mismo si desean hacer cualquier consulta, o ponerse en contacto para cualquier inquietud.

CDPedia necesita amor. Programadores con ganas de trabajar y aprender, tiempo de programador para continuar llevando este proyecto tan interesante y valioso por buen camino.


          Новая глобальная атака шифровальщика: подробности от «Доктор Веб»   

28 июня 2017 года

Специалисты компании "Доктор Веб" изучают новый троянец-шифровальщик Trojan.Encoder.12544, упоминаемый в СМИ как Petya, Petya.A, ExPetya и WannaCry-2. На основании предварительного анализа вредоносной программы компания "Доктор Веб" представляет рекомендации, как избежать заражения, рассказывает, что делать, если заражение уже произошло, и раскрывает технические подробности атаки.

Наделавший много шума червь-шифровальщик Trojan.Encoder.12544 представляет серьезную опасность для персональных компьютеров, работающих под управлением Microsoft Windows. Различные источники называют его модификацией троянца, известного под именем Petya (Trojan.Ransom.369), но Trojan.Encoder.12544 имеет с ним лишь некоторое сходство. Эта вредоносная программа проникла в информационные системы целого ряда госструктур, банков и коммерческих организаций, а также заразила ПК пользователей в нескольких странах.

На текущий момент известно, что троянец заражает компьютеры при помощи того же набора уязвимостей, которые ранее использовались злоумышленниками для внедрения на компьютеры жертв троянца WannaCry. Массовое распространение Trojan.Encoder.12544 началось в первой половине дня 27.06.2017. При запуске на атакуемом компьютере троянец несколькими способами ищет доступные в локальной сети ПК, после чего по списку полученных IP-адресов начинает сканировать порты 445 и 139. Обнаружив в сети машины, на которых открыты эти порты, Trojan.Encoder.12544 пытается инфицировать их с использованием широко известной уязвимости в протоколе SMB (MS17-10).

В своем теле троянец содержит 4 сжатых ресурса, 2 из которых являются 32- и 64-разрядной версиями утилиты Mimikatz, предназначенной для перехвата паролей открытых сессий в Windows. В зависимости от разрядности ОС он распаковывает соответствующую версию утилиты, сохраняет ее во временную папку, после чего запускает. При помощи утилиты Mimikatz, а также двумя другими способами Trojan.Encoder.12544 получает список локальных и доменных пользователей, авторизованных на зараженном компьютере. Затем он ищет доступные на запись сетевые папки, пытается открыть их с использованием полученных учетных данных и сохранить там свою копию. Чтобы инфицировать компьютеры, к которым ему удалось получить доступ, Trojan.Encoder.12544 использует утилиту для управления удаленным компьютером PsExec (она также хранится в ресурсах троянца) или стандартную консольную утилиту для вызова объектов Wmic.exe.

Контроль своего повторного запуска энкодер осуществляет с помощью файла, сохраняемого им в папке C:\Windows\. Этот файл имеет имя, соответствующее имени троянца без расширения. Поскольку распространяемый злоумышленниками в настоящий момент образец червя имеет имя perfc.dat, то файл, предотвращающий его повторный запуск, будет иметь имя C:\Windows\perfc. Однако стоит злоумышленникам изменить исходное имя троянца, и создание в папке C:\Windows\ файла с именем perfc без расширения (как советуют некоторые антивирусные компании), уже не спасет компьютер от заражения. Кроме того, троянец осуществляет проверку наличия файла, только если у него достаточно для этого привилегий в операционной системе.

После старта троянец настраивает для себя привилегии, загружает собственную копию в память и передает ей управление. Затем энкодер перезаписывает собственный файл на диске мусорными данными и удаляет его. В первую очередь Trojan.Encoder.12544 портит VBR (Volume Boot Record, загрузочная запись раздела) диска C:, первый сектор диска заполняется мусорными данными. Затем шифровальщик копирует оригинальную загрузочную запись Windows в другой участок диска, предварительно зашифровав ее с использованием алгоритма XOR, а вместо нее записывает свою. Далее он создает задание на перезагрузку компьютера, и начинает шифровать все обнаруженные на локальных физических дисках файлы с расширениями .3ds, .7z, .accdb, .ai, .asp, .aspx, .avhd, .back, .bak, .c, .cfg, .conf, .cpp, .cs, .ctl, .dbf, .disk, .djvu, .doc, .docx, .dwg, .eml, .fdb, .gz, .h, .hdd, .kdbx, .mail, .mdb, .msg, .nrg, .ora, .ost, .ova, .ovf, .pdf, .php, .pmf, .ppt, .pptx, .pst, .pvi, .py, .pyc, .rar, .rtf, .sln, .sql, .tar, .vbox, .vbs, .vcb, .vdi, .vfd, .vmc, .vmdk, .vmsd, .vmx, .vsdx, .vsv, .work, .xls, .xlsx, .xvd, .zip.

Троянец шифрует файлы только на фиксированных дисках компьютера, данные на каждом диске шифруются в отдельном потоке. Шифрование осуществляется с использованием алгоритмов AES-128-CBC, для каждого диска создается собственный ключ (это — отличительная особенность троянца, не отмеченная другими исследователями). Этот ключ шифруется с использованием алгоритма RSA-2048 (другие исследователи сообщали, что используется 800-битный ключ) и сохраняется в корневую папку зашифрованного диска в файл с именем README.TXT. Зашифрованные файлы не получают дополнительного расширения.

После выполнения созданного ранее задания компьютер перезагружается, и управление передается троянской загрузочной записи. Она демонстрирует на экране зараженного компьютера текст, напоминающий сообщение стандартной утилиты для проверки дисков CHDISK.

screenshot Trojan.Encoder.12544 #drweb

В это время Trojan.Encoder.12544 шифрует MFT (Master File Table). Завершив шифрование, Trojan.Encoder.12544 демонстрирует на экране требование злоумышленников об уплате выкупа.

screenshot Trojan.Encoder.12544 #drweb

Если в момент запуска на экране появилось сообщение о запуске утилиты CHDISK, незамедлительно выключите питание ПК. Загрузочная запись в этом случае будет повреждена, но ее можно исправить при помощи утилиты восстановления Windows или Консоли восстановления, загрузившись с дистрибутивного диска. Восстановление загрузочной записи обычно возможно в ОС Windows версии 7 и более поздних, если на диске имеется используемый системой скрытый раздел с резервной копией критичных для работы Windows данных. В Windows XP такой способ восстановления загрузки не сработает. Также для этого можно использовать Dr.Web LiveDisk — создайте загрузочный диск или флешку, выполните загрузку с этого съемного устройства, запустите сканер Dr.Web, выполните проверку пострадавшего диска, выберите функцию «Обезвредить» для найденных угроз.

По сообщениям из различных источников единственный используемый распространителями Trojan.Encoder.12544 ящик электронной почты в настоящее время заблокирован, поэтому они в принципе не могут связаться со своими жертвами (чтобы, например, предложить расшифровку файлов).

С целью профилактики заражения троянцем Trojan.Encoder.12544 компания «Доктор Веб» рекомендует своевременно создавать резервные копии всех критичных данных на независимых носителях, а также использовать функцию «Защита от потери данных» Dr.Web Security Space. Кроме того, необходимо устанавливать все обновления безопасности операционной системы. Специалисты компании «Доктор Веб» продолжают исследование шифровальщика Trojan.Encoder.12544.

Инструкция пострадавшим от Trojan.Encoder.12544


          (Louisville) Mossberg 151k 22lr - Offer   
Mossberg 151k 22lr semi auto...tube fed thru stock....stock has been redone forest green....has original weaver v22 scope...not a new rifle but pretty good shape..shoots good..txt 502-974-4006...thanks...CAN ADD BOOT FOR RIGHT TRADE...
          User Guide: [HU] language-content-translate.txt lefordítása   

Téma: A tartalom lefordítása (angolul: Translating Content)
Fejezet: Többnyelvűsítés (angolul: Making Your Site Multilingual)

HASZNOS HIVATKOZÁSOK:
- Útmutató leírás: http://www.drupal.hu/drupal-8-kezikonyv-forditasa-magyarra#lepessor
- Itt lesz közzétéve: https://www.drupal.org/hu/docs/user_guide/hu/language-content-translate.... (online szerkesztővel)
- Git-repóban: http://cgit.drupalcode.org/user_guide/plain/source/hu/language-content-t...

FONTOS! Beküldés előtt ellenőrizd végig e lista pontjait: https://goo.gl/d6htVn


          Roland Roland XP 80 service manual pdf Diagramas de instrumentos musicales   
Diagramas Roland XP-80 service manual.pdf instrumentos musicales Detalles sobre Roland XP-80 service manual.pdf Archivo: Ayuda1.0.txt Tipo: Televisores (TV) Modelo: Sharp Formato: Archivo de Texto, ahi te mostramos los detalles del diagrama Ayuda1.0.txt Tamaño 0.46 Kb
          A New Corporate Tax in Portland Could Raise $51 Million a Year for Renewable Energy, Jobs Training   
by Dirk VanderHart

solar_panels_getty.jpg
Henglein and Steets via Getty Images

As a coalition of Portland cultural and climate change groups plots a new business tax to pay for renewable energy projects, the city's number crunchers are urging caution.

In a report issued earlier this month, the city's Revenue Division says a single company could wind up paying more than $3.7 million a year under the tax proposal, as written. Several others would pay upwards of $2 million a year, leading the analysis to conclude there's a risk of businesses leaving Portland.

"The Measure as written is estimated to raise between $35 and $51 million," the report says, in the first official prediction of the proposal's revenue potential. "However, the Revenue Division does not recommend implementing the Measure as written..."

The proposal in question—being circulated as the "Clean Energy and Justice Measure"—would slap a one percent tax on the Portland-based revenues of "large retailers" operating in the city. To qualify, companies would have to have global sales of more than $1 billion (or be a subsidiary or franchisee of such a company), and in-city sales of $500,000 or more. Willamette Week first reported on the idea last month.

The proposal is a gross receipts tax similar to Measure 97, the proposed corporate tax hike that failed on the statewide ballot last year, but passed in Multnomah County. It's being pushed by a coalition that includes the Native American Youth and Family Center (NAYA), Asian Pacific American Network of Oregon (APANO), Verde, the Sierra Club, and 350 PDX.

As the proposal stands in draft form, the money raised by the tax would be placed in a new fund that pays for renewable energy programs (including a specific carve-out for projects that benefit low-income Portlanders), job training "aimed at communities of color, women, and other traditionally under-represented and disadvantaged workers," local food production, and more.

In order to address its concerns with the tax proposal, the Revenue Division has suggested an altered model. It proposed applying the tax to all large businesses—not just retailers—in order to capture operations that contribute to carbon emissions, like construction companies or petroleum refineries. It also suggests capping the maximum tax a business might pay under the proposal at $1 million. By making those tweaks and lowering the tax rate to 0.5 percent (down from 1 percent) the city says the tax might raise between $66.9 million and $81.7 million a year.

The report further suggests such a model would be more simple to administer, requiring fewer city staffers. And it offers a tidbit that's likely to be repeated endlessly by any opponents that pop up. "Some businesses will partially or wholly pass the [gross receipts tax] on to consumers in the form of a price increase," the report reads.

Most community-driven proposals like this wouldn't get the benefit of a city-authored revenue study, but the coalition behind the tax has an ally in Commissioner Chloe Eudaly, who ordered up the report, and who's also asked the City Attorney's Office to explore the legal implications of such a tax, her office says.

Even so, the coalition pushing the measure might not heed the warnings of the report. Jo Ann Hardesty, a local NAACP leader who's serving as a public face of the group, said members are looking at the study, and will vote on any proposed changes to their proposal in mid-July.

"Their approach is not one I’m excited about," Hardesty told the Mercury on Thursday. "I don't think most of our folks are excited about it. I think it's a very convoluted proposal that they've given to us."

While Hardesty says her group is committed to getting something passed, the way forward for the proposal is unclear. It's possible the tax could be passed via a city council vote, though that's likely to spur a challenge that would result in voters deciding its fate. Council could also refer the tax to the ballot itself, but Hardesty says she'd rather have her coalition selling the measure to voters than Portland's elected officials. That would mean supporters collecting signatures themselves to land the tax on the ballot—either in May or November of 2018.

"I think our coalition has much more credibility than city council," Hardesty says.

[ Comment on this story ]

[ Subscribe to the comments on this story ]


          Keep Calm Hug Grandma Mothers Day Notebook Or Journal Mot   



Make Grandma smile this <strong>Mothers Day</strong> with this very special <strong>Notebook or Journal</strong>.&nbsp; The cheerful cover will remind her every day of just how important she is and how much she is loved.


The <strong>generous 7 x 10 </strong>size and <strong>lightly lined </strong>pages provide the perfect place for writing reminders, jotting own ideas, making lists or even keeping recipes.


This journal or notebook makes a wonderful <strong>Mothers Day Gift</strong> and also makes a great alternative to the traditional <strong>Mothers Day Card</strong>!




Details:
rank:
price: $6.95
bound: 102 pages
publisher: CreateSpace Independent Publishing Platform; Jou edition (April 20, 2017)
lang: English
asin:
isbn: 1545485186, 978-1545485187,
weight: 9 ounces (
filesize:




Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) free android audio selling djvu

Tags: kickass book download, format eReader thepiratebay text online, book online, book text online view format, torrent download Rarbg free, francais ebook access online offline, book RapidShare, mobile ebook, book DepositFiles, download full book, eReader online, book BitTorrent free, download free cloud, You search pdf online pdf, book download via Transmission, pdf download full book, online touch offline macbook author, book for mac, book book free from Galaxy, book DropBox, book iCloud, free fb2, book SkyDrive, read thepiratebay eReader sale book, free mobile, read online pdf free, book Box, download audio apple online thepiratebay, book zipshare, ebook free download, book from lenovo free, free epub, .fb2 download, audio find store price download, offline get purchase mobile online, original book, book without payment, download free cloud, epub free, download from SaberCatHost pdf, epub free, bookstore, You search pdf online pdf



Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) download audio apple online thepiratebay
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) format txt pdf
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book iCloud
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book 2shared
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) ios сhapter cheap eng download
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) free full pc phone book
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book Box
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book docs
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book MediaFire
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book online
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book 2shared
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book drive
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book read
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book Box
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book text online view format
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book pc free
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) audiobook free
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book download fb2
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) download android
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) link online francais access book
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) free epub
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) how to find book without register
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) free epub
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) read flibusta story writer epub
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) store book
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book online
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) free ebook
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book torrent
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) read online pdf free
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) free mobile
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) fb2 online find book сhapter
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) online iBooks offline eng free
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) text how download book selling mp3
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) free android audio selling djvu
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book BitTorrent free
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) ios read library pc thepiratebay
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book ZippyShare
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book kindle
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book kindle
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book DepositFiles
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) .fb2 download
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book book free from Galaxy
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) free writer original german reader
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book from motorola read
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) torrent download Rarbg free
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) tom portable german direct link online
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) book ZippyShare
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) .txt download
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) free doc
Keep Calm Hug Grandma: Mothers Day Notebook or Journal: Mothers Day Gift Notebook or Journal for Grandmother (Holiday Notebooks and Journals) read online pdf free









2ffeafca65



Drawing+Books+For+Teens%3A+8.5+x+11%2C+120+Unlined+Blank+Pages+For+Unguided+Doodling%2C+Drawing%2C+Sketching+%26amp%3B+WritingBerry the Unknown French Province 2018: A Small Stroll Through the Berry (Calvendo Nature)Hymns With Tunes: For the Use of Rugby School (Classic Reprint)Manipulated Society (Rallitox Books) (Spanish Edition)El Tratado de la Pintura: (Spanish Edition)Blank Book For Writers: 8.5 x 11, 120 Unlined Blank Pages For Unguided Doodling, Drawing, Sketching &amp; WritingOptimization in Renewable Energy Systems: Recent PerspectivesStaves and TABS for 8-String Guitar: 100 Pages of 8-String Guitar Manuscript Paper (Manuscript Paper for 8-String Guitar) (Volume 2)Color Moment : Wild Animals &amp; Flowers Coloring Book for Adults: Realistic Wild Animal Pattern for RelaxingFigures in Stone: Architectural Sculpture in New York City Robert Arthur King


Message: http://isg.bestforum4u.com/t93-Keep-Calm-Hug-Grandma-Mothers-Day-Notebook-Or-Journal-Mot.htm


          RueUI_Fullscreen_Map_Overlay (1)   
This is a full screen map overlay window. Read the readme.txt file to set the resolution to match your screen. Left hand and right hand button versions are included. Note that in game editing of...
          highslide-full.min.js must be downloaded from highslide.com   

i tried to install the highslide-full.min.js from http://github.com/q0rban/drupal-highslide-js as described in the install.txt ans it doesn't work. after couple of houser i downloaded the file from highslide.com and it worked perfect!


          Just the folders   
Lets say you have a bunch of files in nested folders but  you just want the folders  not the file or drive Our files look like this C:\Scripts\HyperV\Setup C:\Scripts\HyperV\attachdisks.ps1 C:\Scripts\HyperV\get-mountedvhdDrive.ps1 C:\Scripts\HyperV\invoke-CIMshutdown.ps1 C:\Scripts\HyperV\set-loopbackswitch.ps1 C:\Scripts\HyperV\Set-NestedVirtualisation.ps1 C:\Scripts\HyperV\set-realswitch.ps1 C:\Scripts\HyperV\Start-AllWindowsVMs.ps1 C:\Scripts\HyperV\Stop-AllVMs.ps1 C:\Scripts\HyperV\Stop-Lab.ps1 C:\Scripts\HyperV\test-HotfixIpresence.ps1 C:\Scripts\HyperV\Setup\Copy-Updates.ps1 C:\Scripts\HyperV\Setup\Get-LicenseStatus.ps1 C:\Scripts\HyperV\Setup\Install-RollUp.ps1 C:\Scripts\HyperV\Setup\New-VirtualMachine.ps1 C:\Scripts\HyperV\Setup\SCsetup.ps1 C:\Scripts\HyperV\Setup\Set-VMconfig1.ps1 C:\Scripts\HyperV\Setup\Set-VMconfig2.ps1 C:\Scripts\HyperV\Setup\setup (2).ps1 C:\Scripts\HyperV\Setup\setup.ps1 C:\Scripts\HyperV\Setup\sysprep.txt You can strip out the file […]
          Mini Pearl Jam   

*Above: Some perfectly good resistors that I removed from some perfectly good PCBs in hopes of lowering the sleep current of the Mini Pearl Logger.* Today I deployed the [Mini Pearl Logger](https://publiclab.org/tag/mini_pearl) in the compost pile for the third time. The first two times the batteries did not last very long (Table 1), so I am continuing to apply the modifications that Ed Mallon has perfected in his [Cave Pearl Project](https://edwardmallon.wordpress.com/2016/10/27/diy-arduino-promini-data-logger-2016-build-update/). [![Table1longevity.PNG](https://publiclab.org/system/images/photos/000/020/956/large/Table1longevity.PNG)](https://publiclab.org/system/images/photos/000/020/956/original/Table1longevity.PNG) The first two deployments used a microSD card board suitable for either 3.3 or 5 volt operation. That flexibility requires a voltage regulator and a level shifter on the board which makes it hard to sleep the board at low current between data logging events. So I bought some new boards and followed Ed's instructions to remove three resistors which draw current unnecessarily. [![mini_20170630-9789.JPG](https://publiclab.org/system/images/photos/000/020/957/medium/mini_20170630-9789.JPG)](https://publiclab.org/system/images/photos/000/020/957/original/mini_20170630-9789.JPG) *Above: The original microSD card board (left) and the new one which operates only at 3.3 volts (right). The new board has had three resistors removed.* Resistors were also removed from the Arduino Pro Mini and real time clock (RTC) boards. This disabled the LEDs on those boards which are not needed for long term unattended deployments. I was hopeful that these modifications would allow the Mini Pearl logger to last for many weeks on four AAA batteries. [![mini_20170630-9731.JPG](https://publiclab.org/system/images/photos/000/020/958/large/mini_20170630-9731.JPG)](https://publiclab.org/system/images/photos/000/020/958/original/mini_20170630-9731.JPG) *Above: The Mini Pearl Logger is inside the Nalgene bottle and four sensors are outside the bottle. The wires pass through [KAPtery Hull Penetrators](http://kaptery.com/product/hull-penetrator) so the Mini Pearl and battery case are weatherproof. The 70 cm PVC tubes are inserted into the compost pile and a MCP9808 sensor is slid to the bottom of each tube. A BME280 sensor for barometric pressure, temperature, and humidity collects data about ambient conditions.* If the logger lasts a long time, I will have to wait a long time to find out how long long is. So I tried to learn how to use a multimeter to measure the actual sleep current of the logger. The sketch uses a [low power library](https://github.com/rocketscream/Low-Power) to put the Pro Mini to sleep, and the SD card should sleep when the Pro Mini does. Ed says these components should sleep with less than 0.25 milliamps of current. [![mini_20170630-9719.JPG](https://publiclab.org/system/images/photos/000/020/959/medium/mini_20170630-9719.JPG)](https://publiclab.org/system/images/photos/000/020/959/original/mini_20170630-9719.JPG) *Above: This compost pile was built a month ago and stayed hot for about three weeks. Before I inserted the temperature sensors this time, I turned the pile which entailed moving the pile's wire mesh enclosure next to the pile and forking the pile back into the enclosure. In the process I added some more of the winter rye and hairy vetch cover crop.* The results I got from trying to measure the sleep current of the Mini Pearl were a little disappointing but nonetheless revealing. The lowest current I measured was three times higher than the 0.25mA I was hoping for. But the current was dependent on things I didn't think it would be (Table 2). [![Table2amperage.PNG](https://publiclab.org/system/images/photos/000/020/960/large/Table2amperage.PNG)](https://publiclab.org/system/images/photos/000/020/960/original/Table2amperage.PNG) I was warned that the size of the microSD card would make a difference, and it did. I confirmed Ed's advice to use cards smaller than 4GB unless they are Muve Music cards. I did not expect that having sensors connected to the logger would make a big difference. When the sketch uses a sensor that sensor gets initialized and powered up. Some sensors can be explicitly put to sleep between uses, but that was not happening here. So the sleep current of just a logger is not always the same as the sleep current of a logger with sensors. [![mini_20170630-9740.JPG](https://publiclab.org/system/images/photos/000/020/961/medium/mini_20170630-9740.JPG)](https://publiclab.org/system/images/photos/000/020/961/original/mini_20170630-9740.JPG) *Above: Film vials cover the tops of the PVC tubes to keep rain out. Tape secures the vials and I hope discourages ants which laid lots of eggs in the tubes last time.* Even more surprising was the result that even when the sketch does not initialize the sensor, its presence increases the sleep current. So to get the sleep current as low as possible (0.7mA) I had to remove the sensors from the logger. That makes the logger somewhat less useful. Aside from all the fascinating things I'm learning, the key finding is that the Mini Pearl Logger is not sleeping as deeply as it probably should be. I don't have any good ideas about what to try next other than to find out if I am using the multimeter correctly, and maybe whether having the wrong fuse in it makes a difference (the 250mA fuse in it was blown and nobody in Vermont seems to have anything smaller than 500mA). At least I finally got the compost pile turned. Here is the sketch running in the compost pile: Mini_3MCP9808_0.4depy.txt
          Fullbore Friday   
This July 4th weekend, we need a FbF with a flag on it, so let's reach back to 2008 for an encore. Funny thing is, look how well the LCS attack holds up 9-yrs later.

Cheers!

After a few weeks of interesting diversions and side-trips; I have decided to get back to Vince Lombardi FbF.

Late last month there was an interesting gathering in Iowa that highlights a few things dear to my heart. First, there were so many Sailor in so many "less sexy" ships that made such a huge difference in WWII. Secondly, in an age of much slower communication and where engineering was done by hand, not CAD, where leaders led and let their subordinates demonstrate their capability, leaders could not and did not micromanage patronize about small things - we did achieved great things with lighting speed when it came to building ships to meet a specific need. Thirdly, we named and classified our ships by logic, not buzzwords.

By now, all should fully understand that those who designed the Littoral Combat Ship "LCS" were brilliant ignoramuses and their fellow travelers who named it either did not know or care that the US Navy already has a series of ships known as LCS, as in "Landing Craft Support" (AKA "Mighty Midgets" or "Mighty Mites") and arrogantly decided to make a non-Amphib start with "L" just so they could get the late 90s early 00s buzzword in their new budget line - and name their new toy LCS "LCS-1" - what an insult to our Navy and its Sailors.

However, this isn't about my LCS hobby-horse; let us honor to such men as John Hart, left, of Le Mars, Iowa, and Edwin "Ned" Wright of Manahawkin, N.J who you see on the right, as representatives of the men who served on the LCS from WWII to Vietnam.

Let's educate; what were the LCS?
Displacement: 250 long tons (254 t)
Length:------158 ft 6 in (48.3 m)
Beam:--------23 ft 3 in (7.1 m)
Draft:-------5 ft 10 in (1.8 m) (aft, loaded)
Propulsion:--eight Gray Marine diesel engines, twin screws
Speed:-------16.5 knots (30.5 km/h)
Range:-------5500 miles
Complement:--3–6 officers, 55–68 men
Armament:----single 3"50, twin 40 mm or single 40 mm bow gun; 2 twin 40 mm deck guns (one forward, one aft); 4 20 mm cannons; 4 .50 cal (12.7 mm) machine guns; ten MK7 rocket launchers.
Armor:-------10-lb. STS splinter shields
What did the WWII LCS bring to the fight?
The Battle of Tarawa showed a gap in Navy resources for close in support of landing troops. The time interval between the end of shelling from the large ships and the arrival of the landing craft on the beach allowed the defenders to regroup. The Landing Craft Support was designed to fill this void.

The first Landing Craft Support ships arrived in the Pacific Theater in time for the landings at Iwo Jima.

After providing close in support during the landings at Okinawa, many Landing Craft Support ships were placed on the radar picket stations as anti-aircraft platforms. When not on a picket stations, the ship would create smoke to hide the fleet at anchor and perform "skunk patrol" screening for suicide boats.

In the Borneo Campaign, Landing Craft Support was used in landings in Tarakan and Balikpapan.
(in Okinawa) Kamikaze planes sank two LCS(L)(3)s while they were on radar picket duty to provide anti-aircraft support for destroyers trying to stop enemy planes from reaching the main fleet. On April 12, 1945, while at Radar Picket Station 1 north of Okinawa, LCS(L)(3) 33 shot down one kamikaze plane, dodged a second one that took off the ship’s radio antenna, but sank after being struck by a third one. On April 22 at Radar Picket Station 14 northwest of Okinawa, LCS(L)(3) 15 sank within three minutes after one kamikaze plane in a group of 37 planes crashed into the ship with a bomb carried by the plane exploding soon after. The attack killed 15 men and wounded 11 men. In addition to the two LCS(L)(3)s sunk, 11 others were damaged in kamikaze attacks during the Battle of Okinawa.

Japanese shinyo explosive motorboats sank more LCS(L)(3)s than the two sank by kamikaze planes. About 30 shinyo motorboats attacked LCS(L)(3)s in Mariveles Harbor in the Philippines on February 16, 1945, but the book provides no details on this attack. The explosive motorboats sank LCS(L)(3)s 7, 26, and 49 and severely damaged LCS(L)(3) 27.

Although destroyers provided the primary firepower at radar picket stations around Okinawa, LCS(L)(3) guns also shot down many incoming kamikaze planes. For example, at Radar Picket Station 1 on April 16, 1945, LCS(L)(3) 51 shot down six attacking planes and helped fight fires on the destroyer Laffey (DD 724) after that ship had been hit by several kamikaze planes. LCS(L)(3) 51 received a Presidential Unit Citation for her actions.

During the Battle of Okinawa, several LCS(L)(3)s rescued survivors after kamikaze attacks that sank or heavily damaged other ships. For example, on June 10, 1945, after the destroyer William D. Porter (DD 579) was hit by a kamikaze plane and started to sink, LCS(L)(3)s tried to tow the ship to port but failed. The destroyer, which sank about three hours after the kamikaze plane crash, lost no men due to the superb rescue work of the LCS(L)(3)s. The photo at the bottom of this page shows LCS(L)(3) 122 crowded at her bow with survivors from William D. Porter shortly before she sank. Even though William D. Porter lost no men, LCS(L)(3) 122 was hit the following day by a kamikaze plane and lost 11 men with the number of wounded totaling 29.
The gentlemen above were from LCS-92, and here is a short history of the ship by one of its Commanding Officers, Lt. Joseph J. Cardamone.
It was on the swift-flowing Willamette River at Portland, Oregon that the USS LCS 92 was commissioned on January 8th, 1945. Like the ship itself, the ceremony was simple, compact and diminutive. A superficial but extensive inspection convinced the Captain, the five junior officers and the 65 men who made up the crew that the ship’s builders, Commercial Iron Works, had turned out a good, trim fighting ship.

Ten furious days of outfitting, checking and requisitioning followed. On January 16th the LCS 92 was deemed “in all respects ready for sea”. All lines were cast off and she slipped slowly down the Willamette, through the famed Columbia River and out into the Pacific Ocean.

San Diego, California was the destination, and it was reached on the 23rd of January after a voyage that was full of surprises, some pleasant and some otherwise. Then came a six-week shakedown and training period, a period in which flaws were eliminated from both men and ship.

On March 3rd, 1945, the shakedown program was abruptly ended, and the LCS 92 left the United States Continental limits for Pearl Harbor, arriving there March 12th. A new training schedule was begun at Pearl Harbor. It was called “advanced training” and lasted for a full month.

From Pearl Harbor on the 13th of April the ship sailed to Eniwetok. The anchor was dropped in this Marshall Island stronghold on the 24th of April, 1945.

Some minor repairs, a full supply of provisions, fuel and water and the “92” was ready for another trip. Four days later, April 28th, the ship departed from Eniwetok. The next stop was made at Saipan in the Marianas Group on the 3rd of May. There was just a two-day stopover here and the LCS 92 was again underway, this time for Okinawa, performing convoy duty enroute.

After a safe, uneventful voyage Okinawa was reached May 10th, 1945. The “92” really came in contact with the war for the first time. As the anchor was dropped, the screaming of shells from battleships, cruisers and destroyers could be heard overhead. It was one of the many bombardments the Japs were subjected to. Between the date of arrival and the date of departure from Okinawa, July 22nd, the ship was at General Quarters scores of times. Often “bogeys” were reported nearby several times in a single day. The “Kamikaze Kids” were on a rampage. Most of them were downed but the small percentage that did get through produced severe naval casualties.

On the 25th of May the ship left Okinawa for its first Picket Line duty at Station number 9. Now began ten endless days of patrolling deep in enemy waters. It was on this Radar Picket station on the 29th of May that an unusually intense attack occurred. Hardly had the General Quarters buzzer ceased sounding than a “Zeke” was seen diving across the fantail. The gunners were “on target” immediately and a moment later the plane disintegrated.

Back in Okinawa a few days later the ship was assigned to anti-suicide boat duty and given several smoke screen assignments. Then the LCS 92 returned to picket duty, this time on notorious Radar Picket station 16A, “Mainstreet” for the Kamikazes. At this station there were even more alerts, more enemy planes overhead and more sleepless nights.

Upon returning from this duty the “92” was stationed at Ie Shima, furnishing smoke screens at night and anti-aircraft protection by day. The routine was occasionally broken by orders to check a certain area for floating mines or to conduct a search for “splashed” allied flyiers. One day a flyer, who had bailed out of his wrecked Black Widow after a mission over Kyushu, was picked up.

Finally it was time to leave Okinawa and on the 22nd of July the anchor was housed and the ship got underway for the Philippine Islands, for rehabilitation and availability. Five days later the ship was anchored in San Pedro Bay near Leyte Gulf. Here a number of minor repairs were made, the ship was painted and the crew given some well-earned recreation. This routine continued until V-J day plus one, September 3rd, when the ship once more got underway. The destination was Tokyo, Japan as a part of the Third Fleet Occupational Forces. Here, in Tokyo Bay, the ship remained until 1 October, 1945.

The LCS 92 left Tokyo Bay in February 1946 and sailed to the United States via Guam, Eniwetok and Pearl Harbor, arriving in San Francisco on 1 April 1946, a beautiful, sunny morning. The Golden Gate bridge was a sight to behold. The ship was then placed in the Reserve Fleet at Astoria, Oregon in the summer of 1946. In 1951, the 92 was stricken from the Naval Register and scrapped.
And yes, I ask you to note that our grandfathers Commanded as a LT what today's Navy calls a CDR Command. Just saying...though that isn't fair in that at ~3,000 ton full-load displacement, a modern LCS is 500 tons heaver than the ~2,500 full-load displacement of a WWII era Fletcher Class Destroyer - another topic I will avoid for now.

Finally, we are lucky - the last operational one is returning from Thailand.
From Pattaya Mail (Vol. XV No. 37 Friday September 14- September 20, 2007) "HTMS Nakha set off on her final voyage home on September 2, heading for the Mare Island Naval Shipyard at Vallejo City in the United States where she will become part of a museum of historic ships".
Not bad for a ship designed and built in months.

More photos worth your time here and like the color one of Iwo Jima below here. There is also an excellent book on the ships, if you are inclined, available at the link.



At about the 2:30 point below, you can see the WWII LCS at ~25yr mark in Vietnam.



UPDATE: Great LCS write by by Eagle1 last NOV.
          爬虫需谨慎!那些你不知道的爬虫反爬虫套路 学起来   

爬虫需谨慎!那些你不知道的爬虫反爬虫套路 学起来

作者:崔广宇

前言

爬虫与反爬虫,是一个很不阳光的行业。

这里说的不阳光,有两个含义。

第一是,这个行业是隐藏在地下的,一般很少被曝光出来。很多公司对外都不会宣称自己有爬虫团队,甚至隐瞒自己有反爬虫团队的事实。这可能是出于公司战略角度来看的,与技术无关。

第二是,这个行业并不是一个很积极向上的行业。很多人在这个行业摸爬滚打了多年,积攒了大量的经验,但是悲哀的发现,这些经验很难兑换成闪光的简历。面试的时候,因为双方爬虫理念或者反爬虫理念不同,也很可能互不认可,影响自己的求职之路。本来程序员就有“文人相轻”的倾向,何况理念真的大不同。

然而这就是程序员的宿命。不管这个行业有多么的不阳光,依然无法阻挡大量的人进入这个行业,因为有公司的需求。

那么,公司到底有什么样的需求,导致了我们真的需要爬虫/反爬虫呢?

反爬虫很好理解,有了爬虫我们自然要反爬虫。对于程序员来说,哪怕仅仅是出于“我就是要证明我技术比你好”的目的,也会去做。对于公司来说,意义更加重大,最少,也能降低服务器负载,光凭这一点,反爬虫就有充足的生存价值。

那么爬虫呢?

最早的爬虫起源于搜索引擎。搜索引擎是善意的爬虫,可以检索你的一切信息,并提供给其他用户访问。为此他们还专门定义了robots.txt文件,作为君子协定,这是一个双赢的局面。

然而事情很快被一些人破坏了。爬虫很快就变的不再“君子”了。

后来有了“大数据”。无数的媒体鼓吹大数据是未来的趋势,吸引了一批又一批的炮灰去创办大数据公司。这些人手头根本没有大数据,他们的数据只要用一个U盘就可以装的下,怎么好意思叫大数据呢?这么点数据根本忽悠不了投资者。于是他们开始写爬虫,拼命地爬取各个公司的数据。很快他们的数据,就无法用一个U盘装下了。这个时候终于可以休息休息,然后出去吹嘘融资啦。

然而可悲的是,大容量U盘不断地在发布。他们总是在拼命地追赶存储增加的速度。L

以上是爬虫与反爬虫的历史。

一、爬虫反爬虫运行现状

电子商务行业的爬虫与反爬虫更有趣一些,最初的爬虫需求来源于比价。

这是某些电商网站的核心业务。大家如果买商品的时候,是一个价格敏感型用户的话,很可能用过网上的比价功能(真心很好用啊)。毫无悬念,他们会使用爬虫技术来爬取所有相关电商的价格。他们的爬虫还是比较温柔的,对大家的服务器不会造成太大的压力。

然而,这并不意味着大家喜欢被他爬取。毕竟这对其他电商是不利的。于是需要通过技术手段来做反爬虫。

按照技术人员的想法,对方用技术怼过来,我们就要用技术怼回去,不能怂啊。这个想法是很好的,但是实际应用起来根本不是这么回事。

诚然,技术是很重要的,但是实际操作上,更重要的是套路。谁的套路更深,谁就能玩弄对方于鼓掌之中。谁的套路不行,有再好的技术,也只能被耍的团团转。这个虽然有点伤技术人员的自尊,然而,我们也不是第一天被伤自尊了。大家应该早就习惯了吧。

1、真实世界的爬虫比例

大家应该听过一句话吧,大概意思是说,整个互联网上大概有50%以上的流量其实是爬虫

。第一次听这句话的时候,我还不是很相信,我觉得这个说法实在是太夸张了。怎么可能爬虫比人还多呢? 爬虫毕竟只是个辅助而已。

现在做了这么久的反爬虫,我依然觉得这句话太夸张了。50%?你在逗我?就这么少的量?

举个例子,某公司,某个页面的接口,每分钟访问量是1.2万左右。这里面有多少是正常用户呢?

50%?60%?还是?

正确答案是:500以下。

也就是说,一个单独的页面,12000的访问量里,有500是正常用户,其余是爬虫。

注意,统计爬虫的时候,考虑到你不可能识别出所有的爬虫,因此,这500个用户里面,其实还隐藏着一些爬虫。那么爬虫率大概是:

(12000-500)/12000=95.8%

这个数字你猜到了吗?

这么大的爬虫量,这么少的用户量,大家到底是在干什么?是什么原因导致了明明是百人级别的生意,却需要万级别的爬虫来做辅助? 95%以上,19保1?

答案可能会相当令人喷饭。这些爬虫大部分是由于决策失误导致的。

2、哭笑不得的决策思路

举个例子,这个世界存在3家公司,售卖相同的电商产品。三家公司的名字分别是A,B,C。

这个时候,客户去A公司查询了下某商品的价格,看了下发现价格不好。于是他不打算买了。他对整个行业的订单贡献为0。

然而A公司的后台会检测到,我们有个客户流失了,原因是他来查询了一个商品,这个商品我们的价格不好。没关系,我去爬爬别人试试。

于是他分别爬取了B公司和C公司。

B公司的后台检测到有人来查询价格,但是呢,最终没有下单。他会认为,嗯,我们流失了一个客户。怎么办呢?

我可以爬爬看,别人什么价格。于是他爬取了A和C。

C公司的后台检测到有人来查询价格。。。。。

过了一段时间,三家公司的服务器分别报警,访问量过高。三家公司的CTO也很纳闷,没有生成任何订单啊,怎么访问量这么高? 一定是其他两家禽兽写的爬虫没有限制好频率。妈的,老子要报仇。于是分别做反爬虫,不让对方抓自己的数据。然后进一步强化自己的爬虫团队抓别人的数据。一定要做到:宁叫我抓天下人,休叫天下人抓我。

然后,做反爬虫的就要加班天天研究如何拦截爬虫。做爬虫的被拦截了,就要天天研究如何破解反爬虫策略。大家就这么把资源全都浪费在没用的地方了。直到大家合并了,才会心平气和的坐下来谈谈,都少抓点。

最近国内的公司有大量的合并,我猜这种“心平气和”应该不少吧?

二、爬虫反爬虫技术现状

下面我们谈谈,爬虫和反爬虫分别都是怎么做的。

1、为python平反

首先是爬虫。爬虫教程你到处都可以搜的到,大部分是python写的。我曾经在一篇文章提到过:用python写的爬虫是最薄弱的,因为天生并不适合破解反爬虫逻辑,因为反爬虫都是用javascript来处理。然而慢慢的,我发现这个理解有点问题(当然我如果说我当时是出于工作需要而有意黑python你们信吗。。。)。

Python的确不适合写反爬虫逻辑,但是python是一门胶水语言,他适合捆绑任何一种框架。而反爬虫策略经常会变化的翻天覆地,需要对代码进行大刀阔斧的重构,甚至重写。这种情况下,python不失为一种合适的解决方案。

举个例子,你之前是用selenium爬取对方的站点,后来你发现自己被封了,而且封锁方式十分隐蔽,完全搞不清到底是如何封的,你会怎么办?你会跟踪selenium的源码来找到出错的地方吗?

你不会。你只会换个框架,用另一种方式来爬取。然后你就把两个框架都浅尝辄止地用了下,一个都没有深入研究过。因为没等你研究好,也许人家又换方式了。你不得不再找个框架来爬取。毕竟,老板等着明天早上开会要数据呢。老板一般都是早上八九点开会,所以你七点之前必须搞定。等你厌倦了,打算换个工作的时候,简历上又只能写“了解n个框架的使用”,仅此而已。

这就是爬虫工程师的宿命,爬虫工程师比外包还可怜。外包虽然不容易积累技术,但是好歹有正常上下班时间,爬虫工程师连这个权利都没有。

然而反爬虫工程师就不可怜了吗?也不是的。反爬虫有个天生的死穴,就是:误伤率。

2、无法绕开的误伤率

我们首先谈谈,面对对方的爬虫,你的第一反应是什么?

如果限定时间的话,大部分人给我的答案都是:封杀对方的IP。

然而,问题就出在,IP不是每人一个的。大的公司有出口IP,ISP有的时候会劫持流量让你们走代理,有的人天生喜欢挂代理,有的人为了翻墙24小时挂vpn,最坑的是,现在是移动互联网时代,你如果封了一个IP?不好意思,这是中国联通的4G网络,5分钟之前还是别人,5分钟之后就换人了哦!

因此,封IP的误伤指数最高。并且,效果又是最差的。因为现在即使是最菜的新手,也知道用代理池了。你们可以去淘宝看下,几十万的代理价值多少钱。我们就不谈到处都有的免费代理了。

也有人说:我可以扫描对方端口,如果开放了代理端口,那就意味着是个代理,我就可以封杀了呀。

事实是残酷的。我曾经封杀过一个IP,因为他开放了一个代理端口,而且是个很小众的代理端口。不出一天就有人来报事件,说我们一个分公司被拦截了。我一查IP,还真是我封的IP。我就很郁闷地问他们IT,开这个端口干什么?他说做邮件服务器啊。我说为啥要用这么奇怪的端口?他说,这不是怕别人猜出来么?我就随便取了个。

扫描端口的进阶版,还有一种方式,就是去订单库查找这个IP是否下过订单,如果没有,那么就是安全的。如果有,那就不安全。有很多网站会使用这个方法。然而这其实只是一种自欺欺人的办法而已。只需要下一单,就可以永久洗白自己的IP,天下还有比这更便宜的生意吗?

因此,封IP,以及封IP的进阶版:扫描端口再封IP,都是没用的。根本不要考虑从IP下手,因为对手会用大量的时间考虑如何躲避IP封锁,你干嘛和人家硬刚呢。这没有任何意义。

那么,下一步你会考虑到什么?

很多站点的工程师会考虑:既然没办法阻止对方,那我就让它变的不可读吧。我会用图片来渲染关键信息,比如价格。这样,人眼可见,机器识别不出来。

这个想法曾经是正确的,然而,坑爹的技术发展,带给我们一个坑爹的技术,叫机器学习。顺便带动了一个行业的迅猛发展,叫OCR。很快,识别图像就不再是任何难题了。甚至连人眼都很难识别的验证码,有的OCR都能搞定,比我肉眼识别率都高。更何况,现在有了打码平台,用资本都可以搞定,都不需要技术。

那么,下一步你会考虑什么?

这个时候,后端工程师已经没有太多的办法可以搞了。

不过后端搞不定的事情,一般都推给前端啊,前端从来都是后端搞不定问题时的背锅侠。 多少年来我们都是这么过来的。前端工程师这个时候就要勇敢地站出来了:

“都不要得瑟了,来比比谁的前端知识牛逼,你牛逼我就让你爬。”

我不知道这篇文章的读者里有多少前端工程师,我只是想顺便提一下:你们以后将会是更加抢手的人才。

3、前端工程师的逆袭

我们知道,一个数据要显示到前端,不仅仅是后端输出就完事了,前端要做大量的事情, 比如取到json之后,至少要用template转成html吧? 这已经是步骤最少最简单的了。然后你总要用css渲染下吧? 这也不是什么难事。

等等,你还记得自己第一次做这个事情的时候的经历吗?真的,不是什么难事吗?

有没有经历过,一个html标签拼错,或者没有闭合,导致页面错乱?一个css没弄好,导致整个页面都不知道飘到哪去了?

这些事情,你是不是很想让别人再经历一次?

这件事情充分说明了:让一个资深的前端工程师来把事情搞复杂一点,对方如果配备了资深前端工程师来破解,也需要耗费3倍以上的时间。毕竟是读别人的代码,别人写代码用了一分钟,你总是要读两分钟,然后骂一分钟吧?这已经算很少的了。如果对方没有配备前端工程师。。。那么经过一段时间,他们会成长为前端工程师。

之后,由于前端工程师的待遇比爬虫工程师稍好一些,他们很快会离职做前端,既缓解了前端人才缺口,又可以让对方缺人,重招。而他们一般是招后端做爬虫,这些人需要再接受一次折磨,再次成长为前端工程师。这不是很好的事情吗。

所以,如果你手下的爬虫工程师离职率很高,请仔细思考下,是不是自己的招聘方向有问题。

那么前端最坑爹的技术是什么呢?前端最坑爹的,也是最强大的,就是我们的:javascript。

Javascript有大量的花样可以玩,毫不夸张的说,一周换一个feature(bug)给对方学习,一年不带重样的。这个时候你就相当于一个面试官,对方要通过你的面试才行。

举个例子,Array.prototype里,有没有map啊?什么时候有啊?你说你是xx浏览器,那你这个应该是有还是应该没有啊?你说这个可以有啊?可是这个真没有啊。那[]能不能在string里面获取字符啊?哪个浏览器可以哪个不行啊?咦你为什么支持webkit前缀啊?等等,刚刚你还支持怎么现在不支持了啊?你声明的不对啊。

这些对于前端都是简单的知识,已经习以为常了。但是对于后端来说简直就是噩梦。

然而,前端人员自己作死,研究出了一个东西,叫:nodejs。基于v8,秒杀所有的js运行。

不过nodejs实现了大量的feature,都是浏览器不存在的。你随随便便访问一些东西(比如你为什么会支持process.exit),都会把node坑的好惨好惨。而且。。。浏览器里的js,你拉到后台用nodejs跑,你是不是想到了什么安全漏洞?这个是不是叫,代码与数据混合?如果他在js里跑点恶心的代码,浏览器不支持但是node支持怎么办?

还好,爬虫工程师还有phantomjs。但是,你怎么没有定位啊? 哈哈,你终于模拟出了定位,但是不对啊,根据我当前设置的安全策略你现在不应该能定位啊?你是怎么定出来的?连phantomjs的作者自己都维护不下去了,你真的愿意继续用吗?

当然了,最终,所有的反爬虫策略都逃不脱被破解的命运。但是这需要时间,反爬虫需要做的就是频繁发布,拖垮对方。如果对方两天可以破解你的系统,你就一天一发布,那么你就是安全的。这个系统甚至可以改名叫做“每天一道反爬题,轻轻松松学前端”。

4、误伤,还是误伤

这又回到了我们开始提到的“误伤率”的问题了。我们知道,发布越频繁,出问题的概率越高。那么,如何在频繁发布的情况下,还能做到少出问题呢?

此外还有一个问题,我们写了大量的“不可读代码”给对方,的确能给对方造成大量的压力,但是,这些代码我们自己也要维护啊。如果有一天忽然说,没人爬我们了,你们把代码下线掉吧。这个时候写代码的人已经不在了,你们怎么知道如何下线这些代码呢?

这两个问题我暂时不能公布我们的做法,但是大家都是聪明人,应该都是有自己的方案的,软件行业之所以忙的不得了,无非就是在折腾两件事,一个是如何将代码拆分开,一个是如何将代码合并起来。

关于误伤率,我只提一个小的tip:你可以只开启反爬虫,但是不拦截,先放着,发统计信息给自己,相当于模拟演练。等统计的差不多了,发现真的开启了也不会有什么问题,那就开启拦截或者开启造假。

这里就引发了一个问题,往往一个公司的各个频道,爬取难度是不一样的。原因就是,误伤检测这种东西与业务相关,公司的基础部门很难做出通用的。只能各个部门自己做。甚至有的部门做了有的没做。因此引发了爬虫界一个奇葩的通用做法:如果PC页面爬不到, 就去H5试试。如果H5很麻烦,就去PC碰碰运气。

三、爬虫反爬虫套路现状

那么一旦有发现对方数据造假怎么办?

早期的时候,大家都是要抽查数据,通过数据来检测对方是否有造假。这个需要人工核对,成本非常高。可是那已经是洪荒时代的事情了。如果你们公司还在通过这种方式来检测,说明你们的技术还比较落伍。

之前我们的竞争对手是这么干的:他们会抓取我们两次,一次是他们解密出来key之后,用正经方式来抓取,这次的结果定为A。一次是不带key,直接来抓,这次的结果定为B。根据前文描述,我们可以知道,B一定是错误的。那么如果A与B相等,说明自己中招了。这个时候会停掉爬虫,重新破解。

1、不要回应

所以之前有一篇关于爬虫的文章,说如何破解我们的。一直有人要我回复下。我一直觉得没什么可以回复的。

第一,反爬虫被破解了是正常的。这个世界上有个万能的爬虫手段,叫“人肉爬虫”。假设我们就是有钱,在印度开个分公司,每天雇便宜的劳动力用鼠标直接来点,你能拿我怎么办?第二,我们真正关心的是后续的这些套路。而我读了那篇文章,发现只是调用了selenium并且拿到了结果,就认为自己成功了。

我相信你读到这里,应该已经明白为什么我不愿意回复了。我们最重要的是工作,而不是谁打谁的脸。大家如果经常混技术社区就会发现,每天热衷于打别人脸的,一般技术都不是很好。

当然这并不代表我们技术天下第一什么的。我们每天面对大量的爬虫,还是遇到过很多高手的。就如同武侠小说里一样,高手一般都比较低调,他们默默地拿走数据,很难被发现,而且频率极低,不会影响我们的考评。你们应该明白,这是智商与情商兼具的高手了。

我们还碰到拉走我们js,砍掉无用的部分直接解出key,相当高效不拖泥带水的爬虫,一点废请求都没有(相比某些爬虫教程,总是教你多访问写没用的url免得被发现,真的不知道高到哪里去了。这样做除了会导致机器报警,导致对方加班封锁以外,对你自己没有任何好处)。

而我们能发现这一点仅仅是是因为他低调地写了一篇博客,通篇只介绍技术,没有提任何没用的东西。

这里我只是顺便发了点小牢骚,就是希望后续不要总是有人让我回应一些关于爬虫的文章。线下我认识很多爬虫工程师,水平真的很好,也真的很低调(不然你以为我是怎么知道如何对付爬虫的。。。),大家都是一起混的,不会产生“一定要互相打脸”的情绪。

顺便打个小广告,如果你对这个行业有兴趣,可以考虑联系HR加入我们哦。反爬虫工程师可以加入携程,爬虫工程师可以加入去哪儿。

2、进化

早期我们和竞争对手打的时候,双方的技术都比较初级。后来慢慢的,爬虫在升级,反爬虫也在升级。这个我们称为“进化”。我们曾经给对方放过水,来试图拖慢他们的进化速度。然而,效果不是特别理想。爬虫是否进化,取决于爬虫工程师自己的KPI,而不是反爬虫的进化速度。

后期打到白热化的时候,用的技术越来越匪夷所思。举个例子,很多人会提,做反爬虫会用到canvas指纹,并认为是最高境界。其实这个东西对于反爬虫来说也只是个辅助,canvas指纹的含义是,因为不同硬件对canvas支持不同,因此你只要画一个很复杂的canvas,那么得出的image,总是存在像素级别的误差。考虑到爬虫代码都是统一的,就算起selenium,也是ghost的,因此指纹一般都是一致的,因此绕过几率非常低。

但是!这个东西天生有两个缺陷。第一是,无法验证合法性。当然了,你可以用非对称加密来保证合法,但是这个并不靠谱。其次,canvas的冲突概率非常高,远远不是作者宣称的那样,冲突率极低。也许在国外冲突是比较低,因为国外的语言比较多。但是国内公司通常是IT统一装机,无论是软件还是硬件都惊人的一致。我们测试canvas指纹的时候,在携程内部随便找了20多台机器,得出的指纹都完全一样,一丁点差别都没有。因此,有些“高级技巧”其实一点都不实用。

3、法律途径

此外就是大家可能都考虑过的:爬虫违法吗?能起诉对方让对方不爬吗?法务给的答案到是很干脆,可以,前提是证据。遗憾的是,这个世界上大部分的爬虫爬取数据是不会公布到自己网站的,只是用于自己的数据分析。因此,即使有一些关于爬虫的官司做为先例,并且已经打完了,依然对我们没有任何帮助。反爬虫,在对方足够低调的情况下,注定还是个技术活。

4、搞事情,立Flag

到了后来,我们已经不再局限于打打技术了。反爬虫的代码里我们经常埋点小彩蛋给对方,比如写点注释给对方。双方通过互相交战,频繁发布,居然聊的挺high的。

比如问问对方,北京房价是不是很高啊?对方回应,欧巴,我可是凭本事吃饭哦。继续问,摇到号了吗?诸如此类等等。这样的事情你来我往的,很容易动摇对方的军心,还是很有作用的。试想一下,如果你的爬虫工程师在大年三十还苦逼加班的时候,看到对方留言说自己拿到了n个月的年终奖,你觉得你的工程师,离辞职还远吗?

最后,我们终于搞出了大动作,觉得一定可以坑对方很久了。我们还特意去一家小火锅店吃了一顿,庆祝一下,准备明天上线。大家都知道,一般立flag的下场都比较惨的。两个小时的自助火锅,我们刚吃五分钟,就得到了我们投资竞争对手的消息。后面的一个多小时,团队气氛都很尴尬,谁也说不出什么话。我们组有个实习生,后来鼓足勇气问了我一个问题:

“我还能留下来吗?”

毕竟,大部分情况下,技术还是要屈服于资本的力量。

四、爬虫反爬虫的未来

与竞争对手和解之后,我们去拜访对方,大家坐在了一起。之前网上自称妹子的,一个个都是五大三粗的汉子,这让我们相当绝望,在场唯一的一个妹子还是我们自己带过去的(就是上面提到的实习生),感觉套路了这么久,最终还是被对方套路了。

好在,吃的喝的都很好,大家玩的还是比较high的。后续就是和平年代啦,大家不打仗了,反爬虫的逻辑扔在那做个防御,然后就开放白名单允许对方爬取了。群里经常叫的就是:xxx你怎么频率这么高,xxx你为什么这个接口没给我开放,为什么我爬的东西不对我靠你是不是把我封了啊。诸如此类的。

和平年代的反爬虫比战争年代还难做。因为战争年代,误伤率只要不是太高,公司就可以接受。和平年代大家不能搞事情,误伤率稍稍多一点,就会有人叫:好好的不赚钱,瞎搞什么搞。此外,战争年代只要不拦截用户,就不算误伤。和平年代还要考虑白名单,拦截了合作伙伴也是误伤。因此各方面会更保守一些。不过,总体来说还是和平年代比较happy。毕竟,谁会喜欢没事加班玩呢。

然而和平持续的不是很久,很快就有了新的竞争对手选择爬虫来与我们打。毕竟,这是一个利益驱使的世界。只要有大量的利润,资本家就会杀人放火,这不是我们这些技术人员可以决定的。我们希望天下无虫,但是我们又有什么权利呢。

End.

转载请注明来自36大数据(36dsj.com):36大数据 爬虫需谨慎!那些你不知道的爬虫反爬虫套路 学起来