Jump to content

dicksi

Active Members
  • Posts

    712
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by dicksi

  1. This Car Runs For 100 Years Without Refuelling – The Thorium Car If your car was powered by thorium, you would never need to refuel it. The vehicle would burn out long before the chemical did. The thorium would last so long, in fact, it would probably outlive you. That’s why a company called Laser Power Systems has created a concept for a thorium-powered car engine. The element is radioactive, and the team uses bits of it to build a laserbeam that heats water, produces steam, and powers an energy-producing turbine. Thorium is one of the most dense materials on the planet. A small sample of it packs 20 million times more energy than a similarly-sized sample of coal, making it an ideal energy source. The thing is, Dr. Charles Stevens, the CEO of Laser Power Systems, told Mashable that thorium engines won’t be in cars anytime soon. “Cars are not our primary interest,” Stevens said. ”The automakers don’t want to buy them.” He said too much of the automobile industry is focused on making money off of gas engines, and it will take at least a couple decades for thorium technology to be used enough in other industries that vehicle manufacturers will begin to consider revamping the way they think about engines. building this to power the rest of the world,” Stevens said. He believes a thorium turbine about the size of an air conditioning unit could more provide cheap power for whole restaurants, hotels, office buildings, even small towns in areas of the world without electricity. At some point, thorium could power individual homes. Stevens understands that people may be wary of Thorium because it is radioactive — but any such worry would be unfounded. “The radiation that we develop off of one of these things can be shielded by a single sheet off of aluminum foil,” Stevens said. ”You will get more radiation from one of those dental X-rays than this.” This Car Runs For 100 Years Without Refuelling – The Thorium Car | The Mind Unleashed
  2. cu ce ne diferim de "ciori" daca ii uram,jignim si ii omaram in bataie(ceea ce fac si ei f bine)?a ca nu furam ..dar si la faza asta romanul fura ca in codru ar trebui sa fim mai evoluati ca vestul salbatic,pana mea facem parte din uniunea europena and shit
  3. ^daca ai prea multe antecedente ar trebui aplicat,sa nu uitam ca e vorba aici de un baiat de 16 ani totusi
  4. Beaten to a pulp, dumped in a supermarket cart and left for dead on the side of the road. That was the fate of 16-year-old Darius. The teenager was in a medically induced coma on Wednesday in a Paris hospital, where doctors said it was not certain he would pull through after suffering multiple skull fractures. Imagini nerecomandate minorilor/celor slabi de inima, etc. http://revolution-news.com/wp-content/uploads/2014/06/10418329_809970295682305_2207484340865307223_n.jpg http://revolution-news.com/wp-content/uploads/2014/06/10430914_809970465682288_5995039499514121327_n.jpg The attackers claimed he had broken into an apartment. IOL News reports: Officials (said) the group had come looking for the youth earlier that day at the abandoned house opposite the housing project, where he was living with his family. They took him away and locked him a basement where he was accused of breaking into an apartment, and then was beaten, they said. The Guardian adds: A police source suggested there were four kidnappers, but a Romanian garage owner opposite the Roma camp said his wife had warned him a group of a dozen hooded youngsters were causing trouble, according to Le Monde. A few hours later, Darius’s mother received a call made from her son’s mobile telephone allegedly demanding a €15,000 (£12,000) ransom for his safe return…. Out comes the sympathetic French President Francois Hollande who called the attack “an offense against the founding principles of our country.” Of course, Holland failed to mention the outrageous, racist policies his government has directed against the Roma, and the propaganda of fear and hate it has spewed forth. Roma Youth Lynched in France p.s. mi s-a furat si mie telefonul(2400 lei) acum cativa ani de 2 tigani si cu toate astea nu as putea sa le fac asa ceva
  5. dicksi

    Olteni

    "cacat nespecial ,mancat de viermi end" ...
  6. dicksi

    Olteni

    toti sunt viteji in fata tastaturii dar in experienta propriei morti te agati ca un las... ura din subconstientul de a nu intelege relatiile interpersonale
  7. dicksi

    Olteni

    orice mizerie umana promovata la tv pt audienta ... mda sa nu uit "mandru" sa fiu roman
  8. The U.S. government plans to auction about 30,000 bitcoin, the electronic currency, valued at about $17.4 million, on June 27 the U.S. Marshals Service said. The bitcoin were seized during an FBI raid in October on the Internet marketplace Silk Road, known as a hub for transactions involving illegal drugs and criminal activities. The bitcoins came from six wallets affiliated with the Silk Road, the online marketplace for mostly illicit goods that was shut down in October 2013. Ulbricht, who is being held without bail, is scheduled for trial in November.Ulbricht, who allegedly went by the online handle “Dread Pirate Roberts,” is fighting in court to reclaim part of a much larger batch of 144,342 seized coins, worth as much as $86.6 million. Required Registration Items: A manually signed pdf copy of the Bidder Registration Form A copy of a Government-issued photo ID for the Bidder (or Control Person(s) of Bidder) $200,000 USD deposit sent by wire transfer originating from a bank located within the United States (please provide receipt of transfer) USMS Asset Forfeiture Sale What is interesting about the move from US Marshal is that by doing a legal auction of bitcoins, they do legalize the use and trading of Bitcoin. Not in a formal way, but why would the US Marshal sell bitcoins if other authorities in the US would prohibit the use of Bitcoin? US Marshal do not auction of drugs or guns, but they auction of bitcoins. This could be a pointer of where the authorities in the US are heading when it comes to Bitcoin legalization (regulation). Or, the different departments could all be non-communicating, meaning that the US Marshal move has not been influenced by any other party. If this is the case, there is no way to tell what other institutions might do regarding Bitcoin. It can go both ways.
  9. intreaba mai degraba aici RDI - Satelit SISTEME DE RECEPTIE
  10. americanii cred in reincarnare wtf?!,cum pl cal sa condamni atati ani pe cineva pt o frauda informatica,se mai plang de financial crisis cand au prea mult % din populatie in inchisori,si dupa se intreaba lumea de ce au nevoie de razboaie si trebuie sa fure din resursele altor tari,fuckin' murica rezolva-ti sistemul judiciar first
  11. cum spunea profu meu de fizica dupa vodka luata in pauza, c'est la viul vietii
  12. indienii au descoperit-o primii, din 2013 LATEST[HOT] How to duplicate PayPal Money 2005 http://www.paypalsucks.com/forums/showthread.php?fid=3&tid=9479
  13. cand dai putere unei idei prinde contur in tine si deja incepe sa te domine,deci manipulare prosteasca,stapanii pulii
  14. U.S. Leads Multi-National Action Against “Gameover Zeus” Botnet and “Cryptolocker” Ransomware, Charges Botnet Administrator Gameover Zeus Administrator Charged A federal grand jury in Pittsburgh unsealed a 14-count indictment against Evgeniy Mikhailovich Bogachev, 30, of Anapa, Russian Federation, charging him with conspiracy, computer hacking, wire fraud, bank fraud and money laundering in connection with his alleged role as an administrator of the Gameover Zeus botnet. Bogachev was also charged by criminal complaint in Omaha with conspiracy to commit bank fraud related to his alleged involvement in the operation of a prior variant of Zeus malware known as “Jabber Zeus.” In a separate civil injunction application filed by the United States in federal court in Pittsburgh, Bogachev is identified as a leader of a tightly knit gang of cyber criminals based in Russia and Ukraine that is responsible for the development and operation of both the Gameover Zeus and Cryptolocker schemes. An investigation led in Washington, D.C., identified the Gameover Zeus network as a common distribution mechanism for Cryptolocker. Unsolicited emails containing an infected file purporting to be a voicemail or shipping confirmation are also widely used to distribute Cryptolocker. When opened, those attachments infect victims’ computers. Bogachev is alleged in the civil filing to be an administrator of both Gameover Zeus and Cryptolocker. The injunction filing further alleges that Bogachev is linked to the well-known online nicknames “Slavik” and “Pollingsoon,” among others. The criminal complaint filed in Omaha alleges that Bogachev also used “Lucky12345,” a well-known online moniker previously the subject of criminal charges in September 2012 that were unsealed in Omaha on April 11, 2014. Disruption of Gameover Zeus Botnet Gameover Zeus, also known as “Peer-to-Peer Zeus,” is an extremely sophisticated type of malware designed to steal banking and other credentials from the computers it infects. Unknown to their rightful owners, the infected computers also secretly become part of a global network of compromised computers known as a “botnet,” a powerful online tool that cyber criminals can use for numerous criminal purposes besides stealing confidential information from the infected machines themselves. Gameover Zeus, which first emerged around September 2011, is the latest version of Zeus malware that began appearing at least as early as 2007. Gameover Zeus’s decentralized, peer-to-peer structure differentiates it from earlier Zeus variants. Security researchers estimate that between 500,000 and 1 million computers worldwide are infected with Gameover Zeus, and that approximately 25 percent of the infected computers are located in the United States. The principal purpose of the botnet is to capture banking credentials from infected computers. Those credentials are then used to initiate or re-direct wire transfers to accounts overseas that are controlled by cyber criminals. The FBI estimates that Gameover Zeus is responsible for more than $100 million in losses. The Gameover Zeus botnet operates silently on victim computers by directing those computers to reach out to receive commands from other computers in the botnet and to funnel stolen banking credentials back to the criminals who control the botnet. For this reason, in addition to the criminal charges announced today, the United States obtained civil and criminal court orders in federal court in Pittsburgh authorizing measures to redirect the automated requests by victim computers for additional instructions away from the criminal operators to substitute servers established pursuant to court order. The order authorizes the FBI to obtain the Internet Protocol addresses of the victim computers reaching out to the substitute servers and to provide that information to US-CERT to distribute to other countries’ CERTS and private industry to assist victims in removing the Gameover Zeus malware from their computers. At no point during the operation did the FBI or law enforcement access the content of any of the victims' computers or electronic communications. Besides the United States, law enforcement from the Australian Federal Police; the National Police of the Netherlands National High Tech Crime Unit; European Cybercrime Centre (EC3); Germany’s Bundeskriminalamt; France’s Police Judiciare; Italy’s Polizia Postale e delle Comunicazioni; Japan’s National Police Agency; Luxembourg’s Police Grand Ducale; New Zealand Police; the Royal Canadian Mounted Police; Ukraine’s Ministry of Internal Affairs – Division for Combating Cyber Crime; and the United Kingdom’s National Crime Agency participated in the operation. The Defense Criminal Investigative Service of the U.S. Department of Defense also participated in the investigation. Invaluable technical assistance was provided by Dell SecureWorks and CrowdStrike. Numerous other companies also provided assistance, including facilitating efforts by victims to remediate the damage to their computers inflicted by Gameover Zeus. These companies include Microsoft Corporation, Abuse.ch, Afilias, F-Secure, Level 3 Communications, McAfee, Neustar, Shadowserver, Anubis Networks and Symantec . The DHS National Cybersecurity and Communications Integration Center (NCCIC), which houses the US-CERT, plays a key role in triaging and collaboratively responding to the threat by providing technical assistance to information system operators, disseminating timely mitigation strategies to known victims, and sharing actionable information to the broader community to help prevent further infections. Disruption of Cryptolocker In addition to the disruption operation against Gameover Zeus, the Justice Department led a separate multi-national action to disrupt the malware known as Cryptolocker (sometimes written as “CryptoLocker”), which began appearing about September 2013 and is also a highly sophisticated malware that uses cryptographic key pairs to encrypt the computer files of its victims. Victims are forced to pay hundreds of dollars and often as much as $700 or more to receive the key necessary to unlock their files. If the victim does not pay the ransom, it is impossible to recover their files. Security researchers estimate that, as of April 2014, Cryptolocker had infected more than 234,000 computers, with approximately half of those in the United States. One estimate indicates that more than $27 million in ransom payments were made in just the first two months since Cryptolocker emerged. The law enforcement actions against Cryptolocker are the result of an ongoing criminal investigation by the FBI’s Washington Field Office, in coordination with law enforcement counterparts from Canada, Germany, Luxembourg, the Netherlands, United Kingdom and Ukraine. USDOJ: U.S. Leads Multi-National Action Against “Gameover Zeus” Botnet and “Cryptolocker” Ransomware, Charges Botnet Administrator USDOJ: OPA: Documents and Resources from the June 2, 2014 Announcement in U.S. v Evgeniy Mikhailovich Bogachev et al and Disruption of Gameover Zeus and Cryptolocker
  15. cel mai plauzibil: "The iSec initial audit report was very critical of the TC code quality, and implied that it looks like the work of a single coder. There was no update for 2 years. The build process requires a 20 year old MS compiler, manually extracted from an exe installer. Imagine yourself as the lead/solo developer working on TC. No one pays you for this, governments hate you, much of the crypto community is throwing rocks at you while your user community spends half of its time joining in with clueless paranoia and the other half whining about feature gaps (e.g. GPT boot disks.) You have to eat, so you have a real paying job. You’re not so young any more (doing the TC crap for a decade) and maybe the real job now includes responsibilities that crowd out side work. Or maybe you’ve got a family you love more than the whiny paranoids you encounter via TC. And now iSec is telling you your code is sloppy and unreadable, and that you should take on a buttload of mind-numbing work to pretty it up so they will have an easier time figuring out where some scotch-fueled coding session in 2005 ( or maybe something you inherited from a past developer) resulted in a gaping exploitable hole that everyone will end up calling a NSA backdoor. Maybe you just toss it in. Why not? Anyone with a maintained OS has an integrated alternative and as imperfect as they may be, they are better than TC for most users. Maintaining TC isn’t really doing much good for many people and the audit just pushed a giant steaming pile of the least interesting sort of maintenance into top priority. Seems like a fine time to drop it and be your kids’ soccer coach.":)
  16. Police Locker land on Android Devices
  17. dicksi

    Fun stuff

  18. sunt unele lucruri care nici placebo nu le pot explica
  19. ^chill bro:D normal ca am citit, iti stergi toti prietenii si faci setarile de sus
  20. How to Stop All Friend Requests on Facebook: 6 Steps - wikiHow
  21. "Invite friends to give and get $5 of bitcoin" deci trebuie sa va inregistrati cu referal ca sa primiti ,referalul meu : https://coinbase.com/?r=537645d65ebcb41e0000009d&utm_campaign=user-referral&src=referral-link
  22. Brian Dye, VP of Information Security at Symantec has acknowledged that the antivirus software is dead. He said that the antivirus doesn't make money anymore and Symantec is now exploring other ways to handle the cyber security problem. Symantec is known globally for the commercial antivirus software 'Norton Antivirus' that pretty much graced all the home and business computers in the late 90s. However the antivirus software began losing its sheen because of its poor efficiency in preventing the malware from making it to critical business machines. The hackers have always been a step ahead in the race. Mr. Dye now thinks that instead of controlling the entry of the hackers into the systems, the focus of the security industry would be on minimizing the damage. For example, Juniper Networks, one of the leading corporations working in the area of networking asks its customers to put fake data on their machines, so that even if hacked; the intruders will have data that is useless. Another company named Shape Security Inc., based out of Silicon Valley, assumes that the hackers will find out a way to steal sensitive data like debit/credit card numbers and is working on making it tad difficult for the hackers to use the stolen cards to make purchases Antivirus software is dead, says Symantec's VP of Information Security | CrazyEngineers
  23. Home | Aptoide - Android Apps Store (optional cu http://www.paraisoft.es/apks/aptoiderepos.apk ) https://play.google.com/store/apps/details?id=com.forshared
×
×
  • Create New...