Cyborg | Designer-Babies | Futurism | Futurist | Immortality | Longevity | Nanotechnology | Post-Human | Singularity | Transhuman

Jitsi: A Multi-Protocol, Cross Platform Compatible Chat …

 Jitsi  Comments Off on Jitsi: A Multi-Protocol, Cross Platform Compatible Chat …
Jul 242015
 

Whether you are using Mac, Windows or Linux, I am sure you have your own favorite chat client that you use on a daily basis. For some of you, you might even have a audio/video call client that you use to make free call to your friends. Wouldnt it be great if you have these two applications combined into one and it works regardless which OS you are using? Jitsi is the one for you. Jitsi is a java-based desktop client that supports multiple chat and audio/video call protocols. You can use it to connect to the various instant messaging service like MSN, Facebook, Google Talk, Yahoo, ICQ, and also make audio/video call with SIP and XMPP. It doesnt support Skype though, but other than that, this seems to be the most complete app I have ever come across.

The installation is pretty simple. Since it is java-based, it will work on every OS that has java enabled. It does come with an installer package for each OS, so you dont need to run the jar file manually in the terminal. Head over to the Download page and download the version for your system. For Linux Debian/Ubuntu users, you can head over to its deb download page and download the version for your system.

On the first run, it will prompt you to setup your accounts by entering your username and password to the various IM and XMPP/SIP accounts.

Once you have set it up, it will run like any other SIP/XMPP/IM client.

On Windows and Mac, it integrates quite well with the system theme, but on my Ubuntu machine, the java GUI sucks. In addition, this application will cause an invisible JavaEmbeddedFrame window to appear in the menu bar and cant be removed until you quit the app. This doesnt affect the functionalities of Jitsi, but still, it can be rather annoying.

For the chat, there is one feature that I like best: the ability to encrypt your chat session. During a chat, you can click the padlock button to encrypt the conversation. However, this works only when both parties are using Jitsi, else it wont work.

To make a audio/video call, you can easily click the Phone or Video icon below your friends name. You can also click the Screen Sharing icon to share your screen, though I cant get it to work, perhaps due to my firewall configuration.

Go here to see the original:
Jitsi: A Multi-Protocol, Cross Platform Compatible Chat …

Jitsi Alternatives and Similar Software – AlternativeTo.net

 Jitsi  Comments Off on Jitsi Alternatives and Similar Software – AlternativeTo.net
Jul 242015
 

Jitsi (previously SIP Communicator) is an audio/video and chat communicator with full end-to-end encryption that supports protocols such as SIP, XMPP/Jabber, ICQ/AIM, Windows Live, Yahoo!, GTalk/Hangouts extensions, as well as OTR, ZRTP, etc. It can handle every firewall, and has many other useful features.

Jitsi is completely Open Source / Free Software, and is freely available under the terms of the GNU Lesser General Public License. More Info

Link:
Jitsi Alternatives and Similar Software – AlternativeTo.net

Download Tor Browser Bundle v4.5.2 (freeware) – AfterDawn …

 Tor Browser  Comments Off on Download Tor Browser Bundle v4.5.2 (freeware) – AfterDawn …
Jul 242015
 

The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.

The Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser called Aurora, and is self-contained.

Only web pages visited through the included Firefox browser will be sent via Tor. Other web browsers such as Internet Explorer are not affected. Make sure that it says “Tor Enabled” in the bottom right corner before using it. To reduce the risk of confusion, don’t run Firefox while using the Tor Browser Bundle, and close existing Firefox windows before starting.

The rest is here:
Download Tor Browser Bundle v4.5.2 (freeware) – AfterDawn …

Freedom Takes Another Blow From Apple, Microsoft

 Freedom  Comments Off on Freedom Takes Another Blow From Apple, Microsoft
Mar 242015
 

Both are reducing OS choices for PC owners, pushing PCs further towards becoming disposable appliances.

Call it another blow against OS freedom, part of the slow creep towards turning PCs into consumer appliances. Call it the choice of security over liberty, one our society has made so many times since 2001. Call it annoying. But in the wake of both Apple and Microsoft cracking down on what OSes can be installed on their PCs, I’d like to call it unnecessary.

This weekend, two irritating stories came out about OS vendors potentially locking popular alternatives out of their platforms. Apple, which happens to make gorgeous Windows-compatible laptops, said its new round of PCs won’t support Windows 7. And Microsoft is giving PC manufacturers the option to lock down their hardware and prevent Linux installationsor for that matter any experimental OS.

Security clearly has something to do with these arguments. As ExtremeTech explains, Microsoft’s move is designed to protect PCs from particularly sneaky malware. And Apple is just following Microsoft’s guidelines on Windows 7, as Microsoft signalled in January that it would like to start dialing back support for Windows 7 in general.

But still, I don’t like the precedent. If you build your own desktop PC, none of this will affect you, as motherboard manufacturers will almost certainly leave the security switch that lets you install alternative OSes intact. But more and more people are turning to laptops as their primary machines, and it’s very difficult to build your own (adequate) laptop. Having the potential freedom to install other OSes doesn’t make a computer more difficult to use in its default mode, and having a security switch which can be disabled by knowledgable users doesn’t make a PC, by default, less secure.

Operating system freedom has always been a big difference between desktop and mobile platforms, too. Mobile OS vendors typically forbid end-users from installing any other OS on their hardware. Without built-in restrictions, it’s completely possible to do this. Microsoft last year showed off how the same hardware can run Android and Windows Phone, and we’ve seen both HTC and Alcatel devices offered with different OS options on the same hardware. The CEO of ZTE USA has told me twice how he’d love to sell multi-OS devices. But if there’s one thing Google, Apple, and Microsoft agree upon, it’s that end-users shouldn’t have the freedom to try out alternatives.

And if you have a problem with my wanting to run both Mac OS and the superior Windows 7 versions of both Microsoft Excel and utilities like FastStone Image Viewer, then you need to check your fanboy/girlism.

It’s About Planned Obsolescence Locking out competing OSes and “old” OSes is all part of the decade-long shift towards making computing devices less upgradeable, to advance planned obsolescence and force you to buy new machines more often. One of the things about Linux is that it runs really well on older, lower-power machines which might otherwise be sent to the recycle bin. I’m considering installing Linux on a dying old laptop I have around, to use it as a Web terminal.

Yes, you’ll be able to run Windows 7 in a virtual machine such as Parallels on a Mac. But Apple’s decision to withdraw Boot Camp support just highlights the total consumer failure of Windows 8. (I just checked, and thank goodness, I was never on the Windows 8 bandwagon.) Windows 7 was awesome. I’m still running it on two machines. We all want to pretend Windows 8 never happened. Would it have hurt Apple so much to support the version of Windows that people actually like, until Windows 10 comes out?

The answer for the truly geeky among us is, of course, to build your own desktop. But that’s becoming a smaller and smaller group of people, and it leaves out the growing crowd who want mobile, portable or handheld computing experiences. For themfor us, because I’m of course one of those peoplewe’re seeing our freedoms sadly, and slowly, erode.

More here:
Freedom Takes Another Blow From Apple, Microsoft

Ex-NSA Researcher Finds Sneaky Way Past Apple Mac's Gatekeeper

 NSA  Comments Off on Ex-NSA Researcher Finds Sneaky Way Past Apple Mac's Gatekeeper
Mar 182015
 

Want to know something odd? Its 2015 and all the top anti-virus products for Mac OS X use insecure lines to transmit their software to Apple Apple machines. Download files, known as .dmg files,for products including Kaspersky, Symantec Symantec, Avast, Avira, Intego, BitDefender, Trend Micro, ESET and F-Secure are all sentover unencrypted HTTP lines, rather than the more secure HTTPS. There is method in their madness, as they trust Apples Gatekeepersecurity technology to recognise the digital signatures they sign their software with that should guarantee the authenticity of the download.

But a former NSA and NASA staffer Patrick Wardle, who now heads up research at security start-up Synack, believes he has found a new way to abuse such insecure downloads and bypass protections in Apple Macs without getting caught. Normally, anyone who intercepts a download to turn it nasty wont get away with it, as Mac Gatekeeperwill see that the vendors original signature has been altered or taken away entirely, and the software tampered with, meaning its no longer trusted.

Yetthe Gatekeeper software doesnt check all components of Mac OS X download files, according to Wardle. He believes he can sneak a malicious version of whats known as a dylib file into legitimate downloads done over HTTP to infect Macs and start stealing data.These dylibs (short for dynamic libraries) are designed to be re-used by different applications; they might be used for actions such as compressing a file or using native graphics capabilities of the operating system. Theyre supposed to make apps work more efficiently.

If an attacker can hijack the dylib processes used by Mac apps, however, they can carry out nasty attacks and send user data to their own servers, the researcher explained. Such an attack would not be trivial, Wardle admits. First, the attacker would have to get on the same network as a target, either by breaching it or simply logging on to the same public Wi-Fi. They would also have to injecta legitimate yet vulnerable application into the downloadand shuffle around the content of the .dmg so thatthe injected legitimate softwareis shown to the user. The latter is not so tricky:the attacker can set the name and icon of thisvulnerable app so nothing looks suspicious, said Wardle.

Finding vulnerable apps shouldnt be too hard either.Wardle created a scanner that looked for applications that would use his naughty dylibs. He found around 150 on his own machine, including hugely popular software likeMicrosoftWord and Excel,Apples own iCloud Photos and Dropbox. The list also includedApples developer tool XCODE and email encryption key management software GPG Keychain, both of which he abused in his proof of concept attacks. According to a recent article in The Intercept, Snowden files showed researchers were demonstrating how amodified version of XCODEcould be used to siphon off targets passwords and other data. Wardle said it was 100 per cent coincidence that his former employer had also targeted XCODE.

Wardled noted that apps from Apples Mac App Store are not vulnerable.

Apps vulnerable to dylib attacks slide from Patrick Wardle

Despite the barriers to successful exploitation, his techniques have provided him with a novel way to bypass Gatekeepers draconian detection mechanism (its also not too dissimilar from DLL attacks of yore on Windows).It is, he added, a cunning way to bypass Mac OS X Gatekeeper protections and allow hackers to go back to their old tricks.

When the injected legitimateapplication is launched the unsigned malicious dylib is loaded or executed(even if the user sets his machine to accept only all apps from the Mac App Store) before theapps main code. At this point the dylib can do anything. I see it a)kicking off the legitimate application that the user was downloading sonothing seems amiss, and b) installing the implant component which will then complete the rest of the attack, persistently infecting the userscomputer. He noted theattack should also work on downloaded .zip filesthat contain applications.

Mac OS X dylib hijacking attacks slide from Patrick Wardle

See original here:
Ex-NSA Researcher Finds Sneaky Way Past Apple Mac's Gatekeeper

Shootout at Copenhagen cafe free speech event

 Free Speech  Comments Off on Shootout at Copenhagen cafe free speech event
Mar 102015
 

By Jan M. Olsen And Karl Ritter Associated Press

COPENHAGEN, Denmark (AP) A shooting at a free speech event featuring an artist who had caricatured the Prophet Muhammad and a second shooting hours later outside a synagogue left two dead and five police officers wounded in Copenhagen, stirring fears that another terror spree was underway in a European capital a month after 17 people were killed in Paris attacks.

Police couldn’t say whether the shootings at a cultural center Saturday afternoon and in front of the synagogue early Sunday were connected, but didn’t rule it out. In both shootings, the gunman got away.

“We are looking for two perpetrators,” police spokesman Allan Wadsworth-Hansen told reporters.

In this photo dated Saturday Feb. 14, 2015, issued by Copenhagen Police believed to show the suspect in a shooting at a freedom of speech event in Copenhagen, in a photo taken from a street camera near to where the getaway car was later found dumped. In what is seen as a likely terror attack against a free speech event organized by an artist who had caricatured the Prophet Muhammad, the police believe there was only one shooter in the attack on a Copenhagen cafe that left one person dead and three police officers wounded. (AP Photo /Copenhagen Police) DENMARK OUT – NO SALES (Copenhagen Police/AP)

Two hours later, police announced they had shot and killed a man who shot at them near a train station and were investigating whether he could be linked to the two shootings. The police statement posted online says the shooting occurred after they had put an address near the train station under observation. The statement said no police officers were wounded.

The first shooting happened shortly before 4 p.m. Saturday. Danish police said the gunman used an automatic weapon to shoot through the windows of the Krudttoenden cultural center during a panel discussion on freedom of expression following the Paris attacks. A 55-year-old man attending the event was killed, while three police officers were wounded. Two belonged to the Danish security service PET, which said the circumstances surrounding the shooting “indicate that we are talking about a terror attack.”

The gunman then fled in a carjacked Volkswagen Polo that was found later a few kilometers (miles) away, police said.

Lars Vilks, a Swedish artist who has faced numerous death threats for caricaturing the Prophet Muhammad, was one of the main speakers at the event, titled “Art, blasphemy and freedom of expression.” He was whisked away by his bodyguards unharmed as the shooting began.

Vilks, 68, later told The Associated Press he believed he was the intended target of the shooting.

Go here to read the rest:
Shootout at Copenhagen cafe free speech event

Anonymer im internet mit Tor Browser Windows – Video

 Tor Browser  Comments Off on Anonymer im internet mit Tor Browser Windows – Video
Mar 062015
 



Anonymer im internet mit Tor Browser Windows
Wie man mit dem Tor Browser Anonymer im Internet surfen kann zeige ich hier unter Windows.

By: superlinuxpc

Read more here:
Anonymer im internet mit Tor Browser Windows – Video

Tor Browser Bundle 4 0 4 Latest Version Is Available To Download/Update – Video

 Tor Browser  Comments Off on Tor Browser Bundle 4 0 4 Latest Version Is Available To Download/Update – Video
Mar 062015
 



Tor Browser Bundle 4 0 4 Latest Version Is Available To Download/Update
Tor Browser Bundle 4.0.4 Free Download For Windows , Mac OS X and Linux http://www.drfreeware.net/2013/09/tor-browser-bundle-2325-13-free.html tor browser bu…

By: DR Freeware

Read the original post:
Tor Browser Bundle 4 0 4 Latest Version Is Available To Download/Update – Video

Britons can now buy Dell computers with Bitcoin

 Bitcoin  Comments Off on Britons can now buy Dell computers with Bitcoin
Feb 232015
 

Through the expansion of Bitcoin were enabling new levels of convenience for our customers, making it easier for them to do business with Dell.”

Coinbase is one of the largest payments processors helping large organisations to adopt Bitcoin.

In an interview with the Telegraph co-founder Brian Armstrong said that Europe was lagging behind the US in terms of adoption, but that he was determined to push it forwards.

I remember back in 2002 my mum said I would never put my credit card details on the internet. Now she does shopping online all the time. What is considered normal or secure changes very quickly,” he said.

To me its the most exciting thing in the world to be working on right now. Bitcoin is like a giant wave, were just a little surfer riding it. Maybe it makes sense for there to be an internet currency, and have that be the reserve currency of the world.

Fred Ehrsam, co-founder at Coinbase, said of the news: Were really pleased to partner with Dell once again, this time bringing its customers in the UK and Canada the option to pay with Bitcoin.

Dell saw that many of its customers wanted to pay with the currency and responded by quickly working with us to give them that option. It is now the largest merchant to accept Bitcoin internationally, paving the way for retailers around the world to follow suit.

Its another big step towards expanding Bitcoin acceptance worldwide and something were excited to be a part of.

Late last year technology giant Microsoft announced that it would also start accepting Bitcoin, albeit in a more limited way than Dell.

Customers can use the currency to add credit to their Microsoft account, but not to pay for goods directly. Once you add money to your Microsoft account you can use it to buy apps, games and other digital content from the Windows, Windows Phone, Xbox Games, Xbox Music and Xbox Video stores.

Visit link:
Britons can now buy Dell computers with Bitcoin

TACT medley’s A.K.A. Feeling Of Freedom – Video

 Freedom  Comments Off on TACT medley’s A.K.A. Feeling Of Freedom – Video
Feb 232015
 



TACT medley's A.K.A. Feeling Of Freedom
Musiques : Riton – Bang Your Head Worakls – TBA Archives videos de 2009 2013 du Team TACT compos d'Alex, Enzo, Jim, Paul et Youri. Montage ralis avec Windows Movie Maker 1.0 par …

By: Paul Nol

Link:
TACT medley’s A.K.A. Feeling Of Freedom – Video

Home Windows Liberty TX | (281) 940-3557 – Video

 Liberty  Comments Off on Home Windows Liberty TX | (281) 940-3557 – Video
Feb 192015
 



Home Windows Liberty TX | (281) 940-3557
Home Windows Liberty TX | (281) 940-3557 http://zenwindows.com/locations/replacement-windows-houston-tx/ Make a huge difference on the look of your home with Zen Windows Houston's amazing.

By: Zen Windows Houston

Read more here:
Home Windows Liberty TX | (281) 940-3557 – Video

2011 Jeep Liberty Larry H. Miller Chevrolet of Murray Murray, UT 84107 – Video

 Liberty  Comments Off on 2011 Jeep Liberty Larry H. Miller Chevrolet of Murray Murray, UT 84107 – Video
Feb 162015
 



2011 Jeep Liberty Larry H. Miller Chevrolet of Murray Murray, UT 84107
Jeep Liberty Imagine driving this White Jeep Liberty SUV 4X4, equipped with a 6 Cylinder engine and an automatic transmission. Enjoy this great SUV with features like Windows, Rear Defogger,…

By: LHMChevroletMurray

See the original post here:
2011 Jeep Liberty Larry H. Miller Chevrolet of Murray Murray, UT 84107 – Video

Shooting at free speech event in Copenhagen leaves 1 dead

 Free Speech  Comments Off on Shooting at free speech event in Copenhagen leaves 1 dead
Feb 142015
 

Jan M. Olsen, The Associated Press Published Saturday, February 14, 2015 11:08AM EST Last Updated Saturday, February 14, 2015 3:52PM EST

COPENHAGEN, Denmark — At least one gunman opened fire Saturday on a Copenhagen cafe, killing one man in what authorities called a likely terror attack during a free speech event organized by an artist who had caricatured the Prophet Muhammad.

The shooting, which also wounded three police officers, came a month after extremists killed 12 people at a satirical newspaper in Paris that had also sparked Muslim outrage with its depictions of Muhammad.

Swedish artist Lars Vilks, who has been repeatedly threatened after depicting Muhammad as a dog in 2007, organized and attended Saturday’s event but was not hit by gunfire, police said.

“I saw a masked man running past,” said Helle Merete Brix, one of the event’s organizers. “I clearly consider this as an attack on Lars Vilks.”

She and Vilks were quickly ushered away by the security detail that accompanies the artist whenever he is in Denmark.

There was no immediate claim of responsibility for the shooting, which took place shortly before 4 p.m. (1500 GMT, 10 a.m. EST). Denmark’s security service, PET, said the circumstances surrounding the shooting “indicate that we are talking about a terror attack.”

Danish police said the gunman used an automatic weapon to shoot through the windows of the Krudttoenden cafe, which TV footage showed were riddled with bullet holes. The gunman then fled in a carjacked Volkswagen Polo that was found later a few kilometres (miles) away, police said.

“I heard someone firing with an automatic weapons and someone shouting. Police returned the fire and I hid behind the bar. I felt surreal, like in a movie,” Niels Ivar Larsen, one of the speakers at the event, told the TV2 channel.

Police initially said there were two gunmen but later said they believed there was only one shooter, and described him as 25-30 years old with an athletic build, and carrying a black automatic weapon. They released a blurred photograph of the suspect wearing dark clothes and a scarf covering part of his face.

View original post here:
Shooting at free speech event in Copenhagen leaves 1 dead

Cosmology and Culture – University of California, Santa Cruz

 Misc  Comments Off on Cosmology and Culture – University of California, Santa Cruz
Feb 112015
 

Joel R. Primack Professor of Physics, University of California, Santa Cruz

There is no way to describe scientifically the origin of the universe without treading upon territory held for millennia to be sacred. Beliefs about the origin of the universe are at the root of our consciousness as human beings. This is a place where science, willingly or unwillingly, encounters concerns traditionally associated with a spiritual dimension.

For thousands of years people have wondered, speculated, and argued about the origin of the universe without actually knowing anything about it. In the closing years of the twentieth century, we’re learning enough to begin to peer across the gulf that separates our universe from its source at the beginning of-or perhaps before-the Big Bang. A story is emerging in modern cosmology that will, if it follows the pattern of earlier shifts in cosmology, change our culture in ways no one can yet predict. It is important to start now to speculate on the possible meanings for our time of this emerging cosmological story. Rather than assuming that science and spirit are separate jurisdictions, I assume that reality is one, and that truth grows and evolves with the universe of which it speaks.

Why is this important? In a speech given in July 1994, on the state of the world and its prospects, the Czech poet-president Vaclav Havel said that the planet is in transition. As vastly different cultures collide, all consistent value systems are collapsing. We cannot foresee the results. Science, which has been the bedrock of industrial civilization for so long, he said, “fails to connect with the most intrinsic nature of reality and with natural human experience. It is now more a source of disintegration and doubt than a source of integration and meaning…. We may know immeasurably more about the universe than our ancestors did, and yet it increasingly seems they knew something more essential about it than we do, something that escapes us…. Paradoxically, inspiration for the renewal of this lost integrity can once again be found in science…a science producing ideas that in a certain sense allow it to transcend its own limits…. Transcendence is the only real alternative to extinction.” [1]

Modern cosmology is now undergoing a foundation-building revolution as it seeks a verifiable description of the nature and origin of the universe. This revolution may require that we transcend previous notions of space, time, and even reality. This seems to me the kind of science Havel is hoping for-a science whose metaphors may illuminate not only the subject matter of its own field but possibly also problems of humanity and the earth from a cosmic perspective.

Every religion is a metaphor system, and like scientific theories, every religious myth is limited. Perhaps progress in religion can occur as it does in science: without invalidating a theory, a greater myth may encompass it respectfully, the way General Relativity encompasses Newtonian Mechanics. In the next few decades, powerful ideas of modern cosmology could inspire a spiritual renaissance, but they could also be totally ignored by almost everyone as irrelevant and elitist. In the worst of circumstances, they could be abusively interpreted and turned into a tool of exploitation-as some would contend that the medieval hierarchical cosmology was interpreted as a justification for a hierarchical organization of society in which the vast majority of people were oppressed. How well our cosmology is interpreted in language meaningful to ordinary people will determine how well its elemental stories are understood, which may in turn affect how positive the consequences for society turn out to be. There is a moral responsibility involved in tampering with the underpinnings of reality.

Anthropologists tell us that in virtually all traditional cultures, a cosmology is what gives its members their fundamental sense of where they come from, who they are, and what their personal role in life’s larger picture might be. Cosmology is whatever picture of the universe a culture agrees on. Together with the picture-upholding the picture-is a story that is understood to explain the sacred relationship between the way the world is and the way human beings should behave. Other cultures’ stories may not have been correct by modern scientific standards, but they were valid by their own standards, and they had the power to ground people’s codes of behavior and their sense of identity within a larger picture. This sense of identity may be part of what Havel feels has been lost.

If you ask a modern audience of people fascinated by cosmology but untrained in it to close their eyes and visualize the universe, some will report seeing endless space with stars scattered unimaginably far apart, others will see great spiral galaxies, and others will see an exotic scene such as the rising of an ember-red moon over an unknown planet. They do not realize that these are merely snapshots on a given scale of the universe-no more representative of the universe as a whole than is a single molecule of DNA or a moonrise over your own backyard. The strange fact is that in modern Western culture people have only the foggiest idea how to picture the universe, and certainly no consensus on it.

The lack of social consensus on cosmology in the modern world has caused many people to close off their thinking to large issues and long time scales, so that small matters dominate their consciousness. Of course, modern people do know much more about many things than members of isolated, traditional cultures, but we are not so different in our basic needs from people millennia ago. We have to get our sense of context somewhere. It is worth looking at earlier cosmologies and the cultures in which they held sway in order to understand how deep and in fact inextricable the connection is.

In Biblical times when people looked up at a clear, blue sky, they saw a transparent dome that covered the entire flat earth [2]. It was an awesome object, created by God himself on the second day to hold back the endless quantities of blue water clearly visible above it. There was water above and water beyond the horizon; doubtless there was also water below. God had divided the waters “above” from the waters “below” by constructing this immense dome that held open the space for dry land. In ancient Egypt the dome had been the goddess Nut, who arched her back over the earth so that only her hands and feet touched the ground. She was the night sky, and the sun, the god Ra, was born from her every morning [3]. In the Hebrew Bible the dome is called “raqi’a,” meaning a firm substance, and rendered in the King James translation as “the firmament”-a concept that cannot be understood independently of the flat earth cosmology in which it made sense. The firmament in Biblical times was understood to be firm only by the will of God. If God were angered, as everyone believed had actually happened in the time of Noah, “the windows of heaven” and “the fountains of the deep” could burst open once again and those lovely blue waters would destroy the earth. God was said to have promised not to do it a second time and to have sealed this covenant with the rainbow, but who could predict the behavior of God? A watery Sword of Damocles hung over every creature on the flat earth, and God held the threads.

See the original post here:
Cosmology and Culture – University of California, Santa Cruz

Jitsi Wikipdia

 Jitsi  Comments Off on Jitsi Wikipdia
Feb 072015
 

Un article de Wikipdia, l’encyclopdie libre.

Jitsi (anciennement SIP Communicator) est une application dveloppe en Java cre l’origine au sein d’un des laboratoires de l’universit de Strasbourg, qui permet ses utilisateurs d’tablir des conversations audio et vido sur Internet via le protocole SIP (Session Initiation Protocol). Elle intgre galement des fonctions de messagerie instantane en prenant en charge quelques-uns des rseaux les plus populaires: SIP/SIMPLE, Jabber (XMPP), AIM/ICQ, MSN (Windows Live Messenger), Yahoo!, Facebook Chat, Google Talk . Une version portable est aussi disponible[1].

Le 11 mars 2011 SIP Communicator change de nom et devient Jitsi[2].

Dans sa version 1.0 sortie le 3 avril 2012, Jitsi s’excute sur les systmes Solaris, Windows, Mac OS X, FreeBSD et la plupart des distributions GNU/Linux.

La version 2.0 est sortie le 6 mars 2013[3], la 2.4 est sortie le 6 janvier 2014.

Une partie des dveloppeurs de Jitsi[4] travaillent pour la socit Blue Jimp qui fournit du support professionnel autour de Jitsi[5].

Jitsi veut se positionner comme le Skype du libre[6].

En effet, il propose presque tous les services[7] que propose Skype:

Le logiciel est cod majoritairement en java l’aide du framework OSGi[12]. Certaines parties sont toutefois propres chaque systme notamment pour capturer les images venant de la camra. Il utilise les protocoles SRTP et ZRTP et peut utiliser le DNSSEC. Le logiciel utilise un systme extensible via des plugins[13]. Il peut utiliser plusieurs codecs audios (SILK, G.722, Speex et Opus) et vidos diffrents (H.264, H.263 ou VP8).

Sur les autres projets Wikimedia:

Go here to see the original:
Jitsi Wikipdia

Breaking Windows and Burning Protesters – Video

 Misc  Comments Off on Breaking Windows and Burning Protesters – Video
Feb 032015
 



Breaking Windows and Burning Protesters
They exercised their first amendment rights, I exercised my right to burnnnnnn. Thanks for Watching! Leave a like, if you like, and subscribe for more :)

By: Aquagirl771

See the original post here:
Breaking Windows and Burning Protesters – Video

Vancouver SEO Company – SEO Services Vancouver – February Newsletter 2015 – Video

 SEO  Comments Off on Vancouver SEO Company – SEO Services Vancouver – February Newsletter 2015 – Video
Jan 312015
 



Vancouver SEO Company – SEO Services Vancouver – February Newsletter 2015
Vancouver SEO Company – SEO Services Vancouver – February Newsletter 2015 Welcome to the February Newsletter for Vancouver SEO Company. Broken Windows Vancouver SEO Company has a …

By: Vancouver SEO Company

Visit link:
Vancouver SEO Company – SEO Services Vancouver – February Newsletter 2015 – Video

Tor Browser Full Version Download For Android

 Tor Browser  Comments Off on Tor Browser Full Version Download For Android
Jan 292015
 

Tor Browser is a secure application that allows you to surf anonymously. Navigation and data exchange over a network is made via encrypted connections between computers. For electronic mail, an encrypted channel is used to ensure that any possible interception by third parties. Since it is portable, Tor Browser requires no installation and can run on a USB key.Tor Browser Bundle for Mac is a package that installs and manages the Tor project software on your Mac. Tor allows you to hide your identity and prevent IP address-tracking back to your device. The Tor Browser Bundle for Mac comprises a number of files, but its easy enough to install.Tor Browser Full Version Free download For Windows Xp.

Tor uses a set of servers around the world, most maintained by individuals, that reroute your URL request through two, three, or more different servers in an attempt to make your path from your Mac to the destination URL difficult to track back. Each hop in the Tor network hides your IP address a bit more, and after three hops it is very difficult for the destination device to know where the connection originated from. This effectively hides your IP address. Of course, the problem is the more hops, the longer it takes for traffic to route between the end URL and your machine, so Tor is a slower way of accessing the Internet. The Tor Browser Bundle for Mac is from the Tor project and includes files saying how to set up and use Tor. Theres a set of videos on the Tor project Web site to help you get everything working properly, regardless of the browser you ultimately use.

Tor Browser Tutorial

Click here For Tor Browser Full Version Free download

Here is the original post:
Tor Browser Full Version Download For Android




Pierre Teilhard De Chardin | Designer Children | Prometheism | Euvolution | Transhumanism