Posts tagged 2012

$350 Budget Friendly Notebook For 2012 – Asus X401A-RGN4 – RBL4 – RPK4

15

How to upgrade the RAM and Hard Drive: http://youtu.be/xC3cdk1Rxbo UPDATE: Battery Life – Not the best. About 3-4 hours. This is for web browsing, watching y…
Video Rating: 4 / 5


120%+ SUPER BATTERY LIFE! Buy Durable Laptop Batteries at LaptopBatteryLife.com

HP ENVY 14-3010NR User Review – best laptop of 2012 – 2013

0

You can get HP ENVY 14-3010NR with the best price over here: amzn.to User reviews: – This is by far the most beautiful sleekbook on the market, and for the price…. Amazing! i7 processor, solid state drive, chrome details, beats audio, this is hands down the sweetest system! I saw a friend’s mac air, and I was not impressed, the speed was lacking and the finish and design was not as sweet as this system. If you want performance and style and a great price, you cannot go wrong with this purchase. Five STARS! There is a need for silicone cases and stylish covers on the market for my sweet system! HINT HINT! – The best laptop I ever had! It has everything I need: it’s powerful (with i7 and HD4000), has amazing sound quality, very stylish and sturdy body, great keyboard, amazing 14″ screen covered with glass, great battery life, average weight and good package (case and nice set up of the software)! I switched from MacBook Air and have no any regrets, MacBook Air wins only in weight and trackpad quallity, all the rest is better on Spectre 14! Strongly recommended if you need Win-based machine, mid-sized and very stylish =) For more reviews and item descprition click HERE: amzn.to This video is not mine. I get it from HP. youtu.be
Video Rating: 0 / 5


120%+ SUPER BATTERY LIFE! Buy Durable Laptop Batteries at LaptopBatteryLife.com

OutRun Feature in June 2012 Car and Driver Magazine

0

OutRun Feature in June 2012 Car and Driver Magazine
Computer Batteries

Image by G A R N E T
PHOTO: ROBERT KERIAN
ARTICLE: JOHN PEARLEY HUFFMAN

www.caranddriver.com/features/game-boy-how-a-sega-outrun-…

Toe in to a new car’s throttle, and you’re asking a computer to send air and fuel into the engine. Computers ­mediate braking and steering and almost always decide when the ­transmission should shift gears. Cars are evolving into video games.

So, why not make a video game into a car? Specifically, give a vintage-1986 Sega OutRun arcade game some wheels and a motor and let the gamer drive the concoction through physical space. Think of OutRun as Gran Turismo’s great-grandfather, fulfilling the preteen dream of ripping through various landscapes in an exotic car. Today, its roofless, eight-bit Ferrari Testarossa looks stone-ax primitive; in 1986, it was high-tech rad.

Sega eventually ported OutRun to home gaming systems, but it first appeared as an arcade game. Canadian-born academic Dr. ­Garnet Hertz, 38, saw one of ?the old arcade versions in 2006. “That’s crazy, how large the cabinet is,” he recalls thinking. “It’s like a fake car.” ?Two years later, he bought an OutRun arcade unit via an internet group for 0, then paid 0 to ship its 800 pounds to Irvine, California, where he started tinkering.

CHASSIS: After experimenting with an ancient three-wheeled golf cart, Hertz secured support from UC Irvine’s Center for Computer Games & Virtual Worlds and bought a 2007 E-Z-Go powered by a 4.4-hp electric motor. Using parts from the frames of the golf cart and game cabinet, Hertz and his eight-student team built a custom chassis, moved the cart’s steering to suit the game’s center-drive position, and relocated two of the four 12-volt batteries from the back of the cart to the front. Their budget for the build? A thick 0,000.

WITH ITS HEAVY CABINET, the OutRun cart isn’t fast—top speed is just 13 mph. But it is disconcerting to drive, what with limited peripheral vision and the knowledge that, while those blocky, eight-bit graphics scroll down the screen, you’re actually moving.

THE ELECTRONICS AND THE SOFTWARE required the most exhaustive development. Two high-def digital cameras mounted atop the cart feed images to a flat-screen display (it replaces OutRun’s original monitor) and to an Apple MacBook Pro, which uses its video feed to detect real-world topographical features. The computer then determines where to place the horizon (in the game’s primitive 3-D perspective, players constantly chase the road’s vanishing point in the distance) and how to depict the road. The gamer/driver sees the road ahead of him on-screen, rendered in OutRun graphics with the real world above the game’s horizon. Original game music pumps through speakers located in the headrest.

OutRun Feature in June 2012 Car and Driver Magazine
Computer Batteries

Image by G A R N E T
PHOTO: ROBERT KERIAN
ARTICLE: JOHN PEARLEY HUFFMAN

www.caranddriver.com/features/game-boy-how-a-sega-outrun-…

Toe in to a new car’s throttle, and you’re asking a computer to send air and fuel into the engine. Computers ­mediate braking and steering and almost always decide when the ­transmission should shift gears. Cars are evolving into video games.

So, why not make a video game into a car? Specifically, give a vintage-1986 Sega OutRun arcade game some wheels and a motor and let the gamer drive the concoction through physical space. Think of OutRun as Gran Turismo’s great-grandfather, fulfilling the preteen dream of ripping through various landscapes in an exotic car. Today, its roofless, eight-bit Ferrari Testarossa looks stone-ax primitive; in 1986, it was high-tech rad.

Sega eventually ported OutRun to home gaming systems, but it first appeared as an arcade game. Canadian-born academic Dr. ­Garnet Hertz, 38, saw one of ?the old arcade versions in 2006. “That’s crazy, how large the cabinet is,” he recalls thinking. “It’s like a fake car.” ?Two years later, he bought an OutRun arcade unit via an internet group for 0, then paid 0 to ship its 800 pounds to Irvine, California, where he started tinkering.

CHASSIS: After experimenting with an ancient three-wheeled golf cart, Hertz secured support from UC Irvine’s Center for Computer Games & Virtual Worlds and bought a 2007 E-Z-Go powered by a 4.4-hp electric motor. Using parts from the frames of the golf cart and game cabinet, Hertz and his eight-student team built a custom chassis, moved the cart’s steering to suit the game’s center-drive position, and relocated two of the four 12-volt batteries from the back of the cart to the front. Their budget for the build? A thick 0,000.

WITH ITS HEAVY CABINET, the OutRun cart isn’t fast—top speed is just 13 mph. But it is disconcerting to drive, what with limited peripheral vision and the knowledge that, while those blocky, eight-bit graphics scroll down the screen, you’re actually moving.

THE ELECTRONICS AND THE SOFTWARE required the most exhaustive development. Two high-def digital cameras mounted atop the cart feed images to a flat-screen display (it replaces OutRun’s original monitor) and to an Apple MacBook Pro, which uses its video feed to detect real-world topographical features. The computer then determines where to place the horizon (in the game’s primitive 3-D perspective, players constantly chase the road’s vanishing point in the distance) and how to depict the road. The gamer/driver sees the road ahead of him on-screen, rendered in OutRun graphics with the real world above the game’s horizon. Original game music pumps through speakers located in the headrest.

OutRun Feature in June 2012 Car and Driver Magazine
Computer Batteries

Image by G A R N E T
PHOTO: ROBERT KERIAN
ARTICLE: JOHN PEARLEY HUFFMAN

www.caranddriver.com/features/game-boy-how-a-sega-outrun-…

Toe in to a new car’s throttle, and you’re asking a computer to send air and fuel into the engine. Computers ­mediate braking and steering and almost always decide when the ­transmission should shift gears. Cars are evolving into video games.

So, why not make a video game into a car? Specifically, give a vintage-1986 Sega OutRun arcade game some wheels and a motor and let the gamer drive the concoction through physical space. Think of OutRun as Gran Turismo’s great-grandfather, fulfilling the preteen dream of ripping through various landscapes in an exotic car. Today, its roofless, eight-bit Ferrari Testarossa looks stone-ax primitive; in 1986, it was high-tech rad.

Sega eventually ported OutRun to home gaming systems, but it first appeared as an arcade game. Canadian-born academic Dr. ­Garnet Hertz, 38, saw one of ?the old arcade versions in 2006. “That’s crazy, how large the cabinet is,” he recalls thinking. “It’s like a fake car.” ?Two years later, he bought an OutRun arcade unit via an internet group for 0, then paid 0 to ship its 800 pounds to Irvine, California, where he started tinkering.

CHASSIS: After experimenting with an ancient three-wheeled golf cart, Hertz secured support from UC Irvine’s Center for Computer Games & Virtual Worlds and bought a 2007 E-Z-Go powered by a 4.4-hp electric motor. Using parts from the frames of the golf cart and game cabinet, Hertz and his eight-student team built a custom chassis, moved the cart’s steering to suit the game’s center-drive position, and relocated two of the four 12-volt batteries from the back of the cart to the front. Their budget for the build? A thick 0,000.

WITH ITS HEAVY CABINET, the OutRun cart isn’t fast—top speed is just 13 mph. But it is disconcerting to drive, what with limited peripheral vision and the knowledge that, while those blocky, eight-bit graphics scroll down the screen, you’re actually moving.

THE ELECTRONICS AND THE SOFTWARE required the most exhaustive development. Two high-def digital cameras mounted atop the cart feed images to a flat-screen display (it replaces OutRun’s original monitor) and to an Apple MacBook Pro, which uses its video feed to detect real-world topographical features. The computer then determines where to place the horizon (in the game’s primitive 3-D perspective, players constantly chase the road’s vanishing point in the distance) and how to depict the road. The gamer/driver sees the road ahead of him on-screen, rendered in OutRun graphics with the real world above the game’s horizon. Original game music pumps through speakers located in the headrest.


120%+ SUPER BATTERY LIFE! Buy a Durable Laptop Battery at LaptopBatteryLife.com

Wakulla County Court House …item 3.. WCSO: Attempted Murder Arrest Made Following Disturbance (Jul 23, 2012) …item 4.. Wakulla County Sheriff’s Office Reports Child Porn Fine Scam (September 25, 2012) ..

0

Wakulla County Court House …item 3.. WCSO: Attempted Murder Arrest Made Following Disturbance (Jul 23, 2012) …item 4.. Wakulla County Sheriff’s Office Reports Child Porn Fine Scam (September 25, 2012) ..
Computer Battery

Image by marsmet552
This pop-up indicated that it was the F.B.I. and the user (victim) had been viewing child pornography on their computer. The pop-up further stated that a fine of 0 could be paid and the computer could be unfrozen.
.

……..***** All images are copyrighted by their respective authors ……..
.

… message header for item 3)…. WCTV News … WCSO

A 40-year-old Crawfordville man faces four charges including attempted murder in connection with a physical disturbance reported at midnight Monday, July 23, according to Sheriff Donnie Crum.
.

… message header for item 1)…. WCTV News … WCSO

"I don’t have a crystal ball to tell you what’s going to happen in court, but he’s potentially looking at spending the rest of his life in prison," says Morrison
.
……………………………………………………………………………………………………………………………………………………………………….
.
…..item 1)… WCTV News … www.wctv.tv … Updated: 7:55 AM Mar 9, 2012

WCSO: Weapons Seized During Search Warrant
A 39-year-old Crawfordville man faces weapons and drug charges in connection with the execution of a search warrant by Wakulla County Sheriff’s Office detectives.

Posted: 11:37 AM Mar 8, 2012
Reporter: WCSO Release; Mike Springer
Email Address: Michael.Springer@wctv.tv

WCSO: Weapons Seized During Search Warrant

www.wctv.tv/home/headlines/WCSO_Weapons_Seized_During_Sea…

UPDATE: – March 8, 2012 -By Mike Springer

Deputies say they found an assortment of guns inside Todd Mitchell’s home along with drugs. And having those weapons violates Mitchell’s probation.

"He’s got a pretty good stockpile going here, he’s got a pretty good history," says Lt. C.L. Morrison of the Wakullla County Sheriff’s Office.

Neighbors on Emmett-Whaley Road describe Todd Mitchell as a handy-man who did odd jobs and mostly kept to himself.Mitchell, a convicted felon, was arrested at his Crawfordville home after neighbors reported hearing gun shots.

"When the detectives did a background check, they learned that homeowner, Todd Mitchell, was a convicted felon. They also looked at his history and also learned he was on felony probation," says Morrison.

Deputies say Mitchell was put on probation last year for DUI and making threats against a public official. A warrant was secured and detectives searched his home.

"Ten fire arms recovered, A homemade silencer was fashioned on one of the firearms. Marijuana and drug paraphernalia," says Morrison.

As a convicted felon, deputies say Mitchell cannot legally own a firearm. Deputies say he gave no motive for owning the guns. He now faces a slew of charges including ones for weapons and drugs.

"I don’t have a crystal ball to tell you what’s going to happen in court, but he’s potentially looking at spending the rest of his life in prison," says Morrison.

Mitchell is currently being in the Wakulla County Jail without bond

——————————————————————
Crawfordville, Florida – March 8, 2012 -

A 39-year-old Crawfordville man faces weapons and drug charges in connection with the execution of a search warrant by Wakulla County Sheriff’s Office detectives on Wednesday, March 7, according to Sheriff Donnie Crum.

Todd James Mitchell was arrested for possession of a weapon by a convicted felon; violation of probation; knowingly driving while license suspended or revoked; possession of less than 20 grams of marijuana; and possession of narcotics equipment.

WCSO detectives received intelligence that Mitchell possessed at least two firearms despite being a convicted felon. Deputies determined that Mitchell was on supervised probation and his probation officer scheduled a search of his home.

Detectives provided security for the probation officer at the home and observed Mitchell leaving the residence in a van. Detectives recognized Mitchell and knew he did not possess a valid driver license and he was detained. During the arrest for driving without a valid license, a loaded .38 caliber revolver was observed in the vehicle in plain view.

Later, a search warrant was obtained from the court to determine if Mitchell had any more weapons at his home and spent shell casings, marijuana and several guns were observed. The search included Mitchell’s home, out buildings, camper trailer and the vehicle and a second firearm, a .22 caliber rifle, was located in the van. In addition, eight more firearms were recovered along with a camouflage bag and miscellaneous ammunition. Less than 20 grams of marijuana and drug paraphernalia were discovered in the camper trailer.

Mitchell was transported to the Wakulla County Jail without incident. Detective Lorne Whaley, Detective Josh Langston, Detective Nick Boutwell, Lt. C.L. Morrison, Lt. Bruce Ashley, Sgt. Ronald Mitchell, Detective Rob Giddens and Deputy Nick Gray investigated.

Latest Comments

Posted by: Not A Good Ol Boy on Mar 9, 2012 at 06:50 PM

whatever ‘Good ol boy’, your name sys it all. Your times coming to an end. No more of the same. I’ve seen those yards too and your statement is completely false. Maurice Langston is simply David Harvey reincarnated. Good luck in 242 days. Not that I’m counting. GO CHARLIE !!!
Posted by: Anonymous on Mar 9, 2012 at 03:48 PM

I agree! Please relay that message to the current President, in regards to the former President.
Posted by: Good ol boy on Mar 9, 2012 at 01:31 PM

Yeah, look at all the trash in the yards where you see Creel signs. The majority of the Creel signs I see are in yards that fall in the county ordinace for clean up!!!

Click here to post or read all 35 comments.
.
.
……………………………………………………………………………………………………………………………………………………………………..
.
…..item 2)…. 1948 Ad .. Burns & Company … Pioneer Meat Packers of Canada .. Burns Spork .. Burns Camp Fire Sausage .. Burns Speef …

Variety in every Meal … Burns Meat Products

Try Burns other Famous Canned Meats – they’re delicious
.
……………………………..

img code photo … Burns & Company

farm3.staticflickr.com/2569/3997655671_8ee12bc5be.jpg

………………………………
.
.
……………………………………………………………………………………………………………………………………………………………………….
.
…..item 3)…. WCTV News … www.wctv.tv/home/headlines … Coverage You Can Count On !

Posted: Mon 11:57 AM, Jul 23, 2012 … Reporter: WCSO Release
Updated: Mon 11:59 AM, Jul 23, 201

WCSO: Attempted Murder Arrest Made Following Disturbance

www.wctv.tv/home/headlines/WCSO-Attempted-Murder-Arrest-M…

Crawfordville, Florida – July 23, 2012 -

A 40-year-old Crawfordville man faces four charges including attempted murder in connection with a physical disturbance reported at midnight Monday, July 23, according to Sheriff Donnie Crum.

Bryan Frederick Braswell was arrested for attempted murder, aggravated battery, false imprisonment and sexual assault after a 51-year-old female victim reported being beaten by the suspect.
.
……………………………………..

img code photo … Bryan Frederick Braswell, 40 …

media.graytvinc.com/images/299*249/BRYAN+FREDERICK+BRASWE…

……………………………………..
.

Investigators were called to the home of the victim south of Crawfordville and discovered her on the front porch of her residence in severe pain. Deputy Nick Gray, Sgt. Ronald Mitchell and Deputy Scott Powell arrived at the home and tended to the victim along with Wakulla EMS.

Deputy Powell stationed himself behind the home and discovered evidence that the suspect was hiding in a wooded area behind the home. Braswell was detained without incident.

During the investigation phase, the victim reported that she came to the residence to pick up some of her belongings. Once arriving at the residence, Braswell threw belongings at the victim striking her in the face. The victim was also punched and kicked by the suspect before being dragged into the home by her hair.

Once inside the home the suspect sat on top of her and placed his hands around her neck and threatened to kill her. The victim attempted to call 911 when the suspect grabbed the phone and attempted to sexually force it inside the victim.

After briefly escaping the suspect, the victim was grabbed by the hair again and thrown to the floor. The suspect eventually let the victim go and she called law enforcement to the scene. After originally declining medical attention, the victim was transported to the hospital by Wakulla EMS.

Tallahassee Police Department officials are also investigating an altercation that occurred the previous day in a pharmacy in their jurisdiction which involved the suspect and victim. Braswell slapped a phone out of the victim’s hand at the store and store employees called 911. Braswell fled the scene when he realized law enforcement had been contacted.

Braswell remains in the Wakulla County Jail awaiting his first appearance.
.
.
……………………………………………………………………………………………………………………………………………………………………..
.
…..item 4)…. WCTV News … www.wctv.tv … Posted: Tue 3:08 PM, Sep 25, 2012 …

Reporter: Wakulla Sheriff’s Office Email
Updated: Tue 3:11 PM, Sep 25, 2012

Wakulla County Sheriff’s Office Reports Child Porn Fine Scam

www.wctv.tv/home/headlines/Wakulla-Cou-171211741.html

Wakulla County, FL – September 25, 2012

The Wakulla County Sheriff’s Office Financial Crimes Unit has received two calls for service recently involving a scam utilizing computers and the Internet. The two potential victims both stated they were using the Internet and received a “pop-up,” said Sheriff Donnie Crum.

This pop-up indicated that it was the F.B.I. and the user (victim) had been viewing child pornography on their computer. The pop-up further stated that a fine of 0 could be paid and the computer could be unfrozen.
.
………………………..

img code photo … Keyboard

media.graytvinc.com/images/300*202/computer-01.jpg

………………………..
.

The site requests the user purchase a “Money Pack” or “Green Dot” card to make the payment of the fine. If citizens receive any information from a potential victim about this scam, please tell them that this is a scam and not to send any money. It is also recommended that the computer have a full virus/malware/spyware scan completed and to have a virus/malware/spyware protector installed.

The WCSO Financial Crimes Unit has been in contact with the Green Dot company’s fraud department and they are aware of the situation. The F.B.I. is also aware of the situation and is taking appropriate action.

The Florida Department of Law Enforcement was contacted and stated this is a well-known and documented scam that has been used before and has now resurfaced. If anyone becomes a victim of this scam, contact, WCSO Detective Matt Helms at 745-7190.

Next Story >

Comments are posted from viewers like you and do not always reflect the views of this station.
There was a problem loading Disqus. For more information, please visit status.disqus.com.
.
.
………………………………………………………………………………………………………………………………………………………………………
.
.

The elk in the woods
Computer Battery

Image by boyan_d
An attractive place that I’ve never been able to have a drink at. Full, reserved, or my computer’s battery was empty ‘and no mains plug)… I’ll try again today.

update:
I managed to get a table — for an hour, they are all reserved at 7 o’clock !


120%+ SUPER BATTERY LIFE! Buy a Durable Laptop Battery at LaptopBatteryLife.com

The Sportsmanship of Cyber-warfare …item 2.. Gauss, a new “cyber-espionage toolkit” (August 9, 2012 11:08 AM PDT) …item 3.. New U.S. intelligence report raises urgency over Iran’s nuclear program (Aug.09, 2012)

1

The Sportsmanship of Cyber-warfare …item 2.. Gauss, a new “cyber-espionage toolkit” (August 9, 2012 11:08 AM PDT) …item 3.. New U.S. intelligence report raises urgency over Iran’s nuclear program (Aug.09, 2012)
Computer Battery

Image by marsmet545
So far, Gauss has swiped data from the Bank of Beirut, EBLF, BlomBank, ByblosBank, FransaBank and Credit Libanais. Citibank and PayPal users are also targeted.

Why Gauss? The malware’s main module was named after German mathematician Johann Carl Friedrich Gauss. Other components are also named after well-known mathematicians.
.

……..*****All images are copyrighted by their respective authors ……..
.

When it comes to protecting a nation, cries of “that’s unfair” or “un-sporting” should be relegated to the “whatever” bucket.

Any nation’s military, counter-intelligence organization, or other agency tasked with protecting its citizens would be catastrophically failing in their obligations if they’re not already actively pursuing new tools and tactics for the cyber-realm.

Granted, just like the military use of aircraft in WW1 opened a Pandora’s box of armed conflict that changed the world forever, ever since the first byte’s traversed the first network we’ve been building towards the state we’re in.

– Gunter Ollmann, VP Research
.
……………………………………………………………………………………………………………………………………………………………………..
.
…..item 1)…. DAMBALLA … blog.damballa.com … THE DAY BEFORE ZERO …

An Ongoing Conversation About Advanced Threats …

Posts Tagged ‘cyberwar’

The Sportsmanship of Cyber-warfare
Wednesday, June 27th, 2012

blog.damballa.com/?tag=cyberwar

As a bit of a history buff I can’t avoid a slight tingling of déjà vu every time I read some new story commenting upon the ethics, morality and legality of cyber-warfare/cyber-espionage/cyberwar/cyber-attack/cyber-whatever. All this rhetoric about Stuxnet, Flame, and other nation-state cyber-attack tools, combined with the parade of newly acknowledged cyber-warfare capabilities and units within the armed services of countries around the globe, brings to the fore so many parallels
.
………………………….

img code photo … The Sportsmanship of Cyber-warfare

blog.damballa.com/wp-content/uploads/2012/06/062712_1930_…

………………………….
.

with the discussions about the (then) new-fangled use of flying-machines within the military in the run-up to WWI.

Call me a cynic if you will, but when the parallels in history are so evident, we’d be crazy to ignore them.

The media light that has been cast upon the (successful) deployment of cyber-weapons recently has many people in a tail-spin – reflecting incredulity and disbelief that such weapons exist, let alone have already been employed by military forces. Now, as people begin to understand that such tools and tactics have been fielded by nation-states for many years prior to these most recent public exposures, reactions run from calls for regulation through to global moratoriums on their use. Roll the clock back 100 years and you’ll have encountered pretty much the same reaction to the unsporting use of flying-machines as weapons of war.

That said, military minds have always sought new technologies to gain the upper-hand on and off the battlefield. Take for example Captain Bertram Dickenson’s statement to the 1911 Technical Sub-Committee for Imperial Defence (TSID) who were charged with considering the role of aeroplanes in future military operations:

“In case of a European war, between two countries, both sides would be equipped with large corps of aeroplanes, each trying to obtain information on the other… the efforts which each would exert in order to hinder or prevent the enemy from obtaining information… would lead to the inevitable result of a war in the air, for the supremacy of the air, by armed aeroplanes against each other. This fight for the supremacy of the air in future wars will be of the greatest importance…”

A century later, substitute “cyber-warriors” for aeroplanes and “Internet” for air, and you’d be hard-pressed to tell the difference from what you’re seeing in the news today.

Just as the prospect of a bomb falling from the hands of an aviator hanging out the cockpit of a zeppelin or biplane fundamentally changed the design of walled fortifications and led to the development of anti-aircraft weaponry, new approaches to securing the cyber-frontier are needed and underway. Then, as now, it wasn’t until civilians were alerted to (or encountered first-hand) the reality of the new machines of war, did an appreciation of these fundamental changes become apparent.

But there are a number of other parallels to WWI (and the birth of aerial warfare) and where cyber-warfare is today that I think are interesting too.

Take for example how the aviators of the day thought of themselves as being different and completely apart from the other war-fighters around them. The camaraderie of the pilots who, after spending their day trying to shoot-down their counterparts, were only too happy to have breakfast, and exchange stories over a few stiff drinks with the downed pilots of the other side is legendary. I’m not sure if it was mutual respect, or a sharing of a common heritage that others around them couldn’t understand, but the net result was that that first-breed of military aviator found more in common with their counterparts than with their own side.
.
…………………………..

img code photo … WW1 Aviators

blog.damballa.com/wp-content/uploads/2012/06/062712_1930_…

…………………………..
.

Today, I think you’ll likely encounter the equivalent social scene as introverted computer geeks who, by way of day-job, develop the tools that target and infiltrate foreign installations for their country, yet attend the same security conferences and reveal their latest evasion tactic or privilege escalation technique over a cold beer with one-another. Whether it’s because the skill-sets are so specialized, or that the path each cyber-warrior had to take in order to acquire those skills was so influential upon their world outlook, many of the people I’ve encountered that I would identify as being capable of truly conducting warfare within the cyber-realm share more in common with their counterparts than they do with those tasking them.

When it comes to protecting a nation, cries of “that’s unfair” or “un-sporting” should be relegated to the “whatever” bucket. Any nation’s military, counter-intelligence organization, or other agency tasked with protecting its citizens would be catastrophically failing in their obligations if they’re not already actively pursuing new tools and tactics for the cyber-realm. Granted, just like the military use of aircraft in WW1 opened a Pandora’s box of armed conflict that changed the world forever, ever since the first byte’s traversed the first network we’ve been building towards the state we’re in.

The fact that a small handful of clandestine, weaponized cyber-arms have materialized within the public realm doesn’t necessarily represent a newly opened Pandora’s box – instead it reflects merely one of the evils from a box that was opened at the time the Internet was born.

– Gunter Ollmann, VP Research

Tags: cyberwar, Flame, stuxnet
Posted in Industry Commentary, Threat Research | No Comments »

.
.
.

Chinese Hackers and Cyber Realpolitik
Friday, December 16th, 2011

For many people the comments made by Michael Hayden, Former Director of the Central Intelligence Agency, at this week’s Black Hat Technical Security Conference in Abu Dhabi may have been unsettling as he commented upon the state of Chinese cyber espionage.

I appreciate the candor of his observations and the distinction he made between state-level motivations. In particular, his comment “We steal secrets, you bet. But we steal secrets that are essential for American security and safety. We don’t steal secrets for American commerce, for American profit. There are many other countries in the world that do not so self limit.”

Perhaps I grew up reading too many spy stories or watched one-too-many James Bond movies, but I’ve always considered one of the functions of government is to run clandestine operations and uncover threats to their citizens and their economic wellbeing. The fact that Cyber is a significant and fruitful espionage vector shouldn’t really be surprising. Granted, it’s not as visual as digging a 1476 foot long tunnel under Soviet Berlin during the Cold War (see The Berlin Tunnel Operation GOLD (U.S.) Operation STOPWATCH (U.K.)) or as explosive as the French infiltration and eventual destruction of the Greenpeace Rainbow Warrior in New Zealand, but in today’s electronic society cyber espionage is a necessary tool.

Personally, I think you’d struggle to find a country or government anywhere around the world that hasn’t invested resources in building out their cyber espionage capabilities in recent years. It’s a tool of modern statecraft and policing.

While the media tends to focus upon the term “cyber warfare” and its many faceted security and safety ramifications, I think that we often fail to divorce a governments need (or even expectation) to conduct espionage and what would logically be covered by the articles (and declaration) of war. Granted it all gets a bit fuzzy – just look at the history of the “Cold War”. Perhaps a more appropriate name for the current situation and tensions would be “Cyber Realpolitik“.

China is often depicted as the bogeyman – rightly or wrongly – when it comes to cyber espionage. We increasingly find ourselves drawn into a debate of whether attacks which are instigated or traced back to the country are state-sponsored, state-endorsed, socially acceptable, or merely the patriotic duty of appropriately skilled citizens. The fact of the matter though is that there’s a disproportionate volume of cyber-attacks and infiltration attempts coming from China, targeting North American and European commercial institutions. You may argue that this is an artifact of China’s population but, if that was the case, wouldn’t India feature more highly then? India is more populous and arguably has a better developed education system in the field of information technology and software development – and yet they are rarely seen on the totem pole of threat instigators.

Michael Hayden alludes that China (and other countries) is not opposed to using cyber espionage for commercial advancement and profit, and based upon past observations, I would tend to agree with that conclusion. That said though, I don’t think that any country is immune to the temptation. Given the hoopla of the recent U.S. congressional insider trading fiasco and French presidential corruption, I’m not sure that “self limit” approaches work in all cases.

Cyber Realpolitik is the world we find ourselves living in and cyber espionage is arguably the latest tool in a government’s clandestine toolkit. We could consume a lot of time debating the ethics and outcomes of modern espionage campaigns but, at the end of the day, it’s a facet of international politics and governmental needs that have existed for millennium. For those commercial entities being subjected to the cyber campaigns directed at them by foreign governments, I don’t believe this threat will be going away anytime in the foreseeable future. Perhaps the noise surrounding the attacks may disappear, but that may just reflect an increase in stealthiness.

– Gunter Ollmann, VP Research.

Tags: APT, China, CIA, cyber espionage, cyberwar, malware
Posted in Industry Commentary, Threat Research | No Comments »
.
.
.
.
…………………………………………………………………………………………………………………………………………………………………….
.
…..item 2)…. CNET News … news.cnet.com … CNET News Security & Privacy

With Gauss tool, cyberspying moves beyond Stuxnet, Flame

Kaspersky Lab finds Gauss, a spying malware that collects financial information and resembles Flame. Components are named after famous mathematicians.

by Larry Dignan … August 9, 2012 11:08 AM PDT

news.cnet.com/8301-1009_3-57490216-83/with-gauss-tool-cyb…

Gauss, a new "cyber-espionage toolkit," has emerged in the Middle East and is capable of stealing sensitive data such as browser passwords, online banking accounts, cookies, and system configurations, according to Kaspersky Lab. Gauss appears to have come from the same nation-state factories that produced Stuxnet.

According to Kaspersky, Gauss has unique characteristics relative to other malware. Kaspersky said it found Gauss following the discovery of Flame. The International Telecommunications Union has started an effort to identify emerging cyberthreats and mitigate them before they spread.

In a nutshell, Gauss launched around September 2011 and was discovered in June. Gauss, which resembles Flame, had its command and control infrastructure shut down in July, but the malware is dormant waiting for servers to become active. Kaspersky noted in an FAQ:

There is enough evidence that this is closely related to Flame and Stuxnet, which are nation-state sponsored attacks. We have evidence that Gauss was created by the same "factory" (or factories) that produced Stuxnet, Duqu and Flame.
.
………………………………

img code photo … The Relationship of Stuxnet, Duqu, Flame and Gauss

cdn-static.zdnet.com/i/story/70/00/002405/kaspersky5.png

………………………………
.

Among Gauss’ key features:

…Gauss collects data on machines and sends it to attackers. This data includes network interface information, computer drive details and BIOS characteristics.

…The malware can infect USB thumb drives using the vulnerabilities found in Stuxnet and Flame.

…Gauss can disinfect drives under certain circumstances and then uses removable media to store collected data in a hidden file.

…The malware also installs a special font called Palida Narrow.

Since May 2012, Gauss has infected more than 2,500 machines, mostly in the U.S. Kaspersky said that the total number of Gauss victims is likely to be in the "tens of thousands." That number is lower than Stuxnet, but higher than Flame and Duqu attacks.
.
……………………….

img code photo … Incidents

cdn-static.zdnet.com/i/story/70/00/002405/kaspersky2.png

……………………….
.

So far, Gauss has swiped data from the Bank of Beirut, EBLF, BlomBank, ByblosBank, FransaBank and Credit Libanais. Citibank and PayPal users are also targeted.

Why Gauss? The malware’s main module was named after German mathematician Johann Carl Friedrich Gauss. Other components are also named after well-known mathematicians.

A few key slides from Kaspersky’s Gauss report:
.
……………………………

img code photo … Unique users

cdn-static.zdnet.com/i/story/70/00/002405/kaspersky1.png

……………………………
.

This story was first published as "Meet Gauss: The latest cyber-espionage tool" on ZDNet’s Between the Lines.

Topics:Cybercrime, Security, Vulnerabilities and attacks Tags:cyber-espionage, Kaspersky Lab, Gauss, malware
.
.
………………………………………………………………………………………………………………………………………………………………………
.
…..item 3)…. HAARETZ … www.haaretz.com/news … HomeNewsDiplomacy & Defense

Barak: New U.S. intelligence report raises urgency over Iran’s nuclear program

Defense Minister Ehud Barak confirms Haaretz’s report that Obama recently received an NIE report which shares Israel’s view on Iran’s progress toward nuclear capability; Israel, U.S. positions on Iran now closer, says Barak.
.
………………………

img code photo … Iron Dome battery site in Ashkelon

www.haaretz.com/polopoly_fs/1.455275.1344511493!/image/33…

U.S. Secretary of Defense Leon Panetta and Defense Minister Ehud Barak hold a joint news conference at an Iron Dome battery site in Ashkelon August 1, 2012.

Photo by Reuters

………………………
.

By Barak Ravid | Aug.09, 2012 | 1:03 PM |

www.haaretz.com/news/diplomacy-defense/barak-new-u-s-inte…

Defense Minister Ehud Barak confirmed on Thursday Haaretz’s report that President Barack Obama recently received a new National Intelligence Estimate report on the Iranian nuclear program, which shares Israel’s view that Iran has made significant progress toward military nuclear capability, and said that the report has raised the urgency of the issue.

Speaking on Israel Radio on Thursday morning, Barak said that there is a U.S. intelligence report "being passed around senior offices," and that, as far as Israel knows, this report has brought the U.S. position over Iran closer to the Israeli position, and made the issue more urgent.

For months there has been a basic agreement (between the U.S. and Israel) over what the Iranians are planning to do, and a deep understanding of what is stopping them, the defense minister said in the interview.

Barak also said that Israel will have to make a decision over Iran’s nuclear program. "All the options are still on the table, and when we say this, we mean it," he said.

"There is still no decision, we understand the gravity of the situation, we understand that we do not have all the time in the world to decide. We are facing tough decisions…we will listen to all assessments and comments, and when we have to make decisions, we will make them, and the decision will of course come from the government," he said.

Haaretz reported on Thursday that the National Intelligence Estimate report on Iran was supposed to have been submitted to Obama a few weeks ago, but it was revised to include new and alarming intelligence information about military components of Iran’s nuclear program. Haaretz has learned that the report’s conclusions are quite similar to those drawn by Israel’s intelligence community.

The NIE report contends that Iran has made surprising, notable progress in the research and development of key components of its military nuclear program.

The NIE reports are the most important assessments compiled by the U.S. intelligence community and are submitted to the president and other top governmental officials. This NIE report was compiled by an inter-departmental team headed by director of National Intelligence James Clapper. Its contents articulate the views of American intelligence agencies.
.
.
……………………………………………………………………………………………………………………………………………………………………..
.
.

Head-Mounted Computer
Computer Battery

Image by Chris Pirillo
See the "Head-Mounted Computer" video

This video was filmed by Charbax at ARMdevices.net from the Mobile World Congress 2010 in Barcelona. Imagine walking around with a head-mounted 15" display to view informations available to you at all times. This system features a pretty cool six-axis position tracker from Hillcrest Labs that allows you to operate a cursor with nearly pixel-for-pixel accuracy by just moving around your head when for example panning around a large image or a map. There is a highly targetted microphone that understands voice-commands where you can for example zoom in on maps or images, you can exit back to the programs menu, launch specific applications and open specific files. Here are the specs of this Second Generation Kopin Golden-i Motorola-branded Head-mounted Computer system: Processor — TI OMAP3530 clocked at 600MHz Display — Kopin SVGA (800 x 600) liquid crystal micro display (LCD) Networking: Bluetooth 2.0 WiFi — "Will be offered soon" User interface — Includes speech recog
nition and motion sensing Other I/O — 1 x USB Expansion — microSD slot Power — 1200 mAh battery provides more than eight hours of operation Weight — 3 oz (85g) Operating system — Windows CE Would you like to cover conferences, trade shows, and events in exchange for promotion in our YouTube channel and social media networks? Email chris@pirillo.com to facilitate the process!This video was originally shared on blip.tv by l0ckergn0me with a Creative Commons Attribution 2.0 license.


120%+ SUPER BATTERY LIFE! Learn about Laptop Battery Life at LaptopBatteryLife.com

HP Pavilion dv6t-7000 2012 Ivy Bridge Tour and First Thoughts

25

www.laptopreviews.com A quick video overview of the HP Pavilion dv6t Quad Edition 2012 update with Intel’s Ivy Bridge. If you’re interested in the dv7t-7000 Quad Edition please see my video review of that here: www.youtube.com


120%+ SUPER BATTERY LIFE! Learn about Laptop Battery Life at LaptopBatteryLife.com

Hitler Didi – Watch Full Episode 243 of 16th October 2012

4

In the October 16 episode of Hitler Didi, Zara feels awkward when Munna burps after eating his meal. While playing, Indu and Seher accidently break a toy. The toy is the same toy wherein a goon had hid a chip inside it. Indu and Seher are left confused when they find the chip. They immediately inform Ishaan about it. Later, Indu informs Zara that she found a chip inside the toy which she brought from Mumbai. Zara realises that the terrorist are after Indu as she had the chip with her. While loading the chip, the power fails. Zara gets apprehensive when she realises that the laptop would switch off as it had very little battery life. In the midst of darkness, a certain person robs the chip. He plays the chip on his laptop and informs his aide that on Dasheera night they would have multiple bomb blasts all around Delhi including Chandni Chowk. Later, Zara gets apprehensive when she realises that the chip is missing. Meanwhile, an imposter who is addressing himself as Vanraj Mishra from Banaras arrives in Sharma Niwas. The imposter gets apprehensive when Zara tries to enquire with him about his whereabouts. Watch latest “Hitler Didi” Episodes on www.zeetv.com
Video Rating: 5 / 5


120%+ SUPER BATTERY LIFE! Buy Cheap Laptop Batteries at LaptopBatteryLife.com

FYI .. Elementary school teacher, 39, jailed for FORTY years for her affair with boy of 14 — Coweta County, Georgia (17th February 2012) …

0

FYI .. Elementary school teacher, 39, jailed for FORTY years for her affair with boy of 14 — Coweta County, Georgia (17th February 2012) …
Computer Battery

Image by marsmet526
‘We believe that children deserve to be protected. This woman groomed and enticed a young boy she knew from birth to engage in these sexual acts. I crafted the sentence to take these things into account’

Assistant DA Kevin McMurry

…….***** All images are copyrighted by their respective authors ……..
.
……………………………………………………………………………………………………………………………………………………………………….
.
…..item 1)…. Mail Online … www.dailymail.co.uk/news … Elementary school teacher, 39, jailed for FORTY years for her affair with boy of 14

…Affair revealed when victim’s parents discovered explicit messages on his computer
…Assistant DA said they wanted to send a message out that this will not be tolerated

By PAUL THOMPSON and RACHEL QUIGLEY
Last updated at 5:25 PM on 17th February 2012

www.dailymail.co.uk/news/article-2102620/Elementary-schoo…

An elementary school teacher has been jailed for 40 years for having sex with a 14-year-old student.

Shannon Alicia Schmieder, 39, was told she will have to serve 20 years – by far the toughest sentence ever handed out by a U.S. court to an educator accused of underage sex.
.
………………………………….

img code photo … Shannon Alicia Schmieder

i.dailymail.co.uk/i/pix/2012/02/17/article-2102620-11C8AB…

Shannon Alicia Schmieder was 38 when she was arrested for having an affair with a boy of 14. She has been sentenced to 40 years

………………………………….
.

Legal experts said the jail term was the same for manslaughter and other serious crimes.

The 39-year-old knew the boy since he was born and was at one stage like a mother-figure to him, according to his family.

His mother said: ‘She was a close family friend. We had gone to the same church together for 10 years.
Our children were friends. Our families were friends. We did everything together. It’s impossible to describe how we felt to find out this was going on.’

The victim’s parents noticed a change in the relationship between their then 13-year-old son and Schmieder, saying she was acting more like a friend than a parental figure.

It was when they opened the boys Facebook page they realized something was wrong.

The mother said: ‘Never in a million years did I think I would find what I thought was evidence of inappropriate behavior between them. But there it was.’

The sentence was handed out after the mother of his young victim spoke of her ‘heartache and betrayal’ after discovering her son was involved with Schmieder.

In an emotional impact statement to the court, the mother spoke of the loss of innocence of her son and how she is struggling to come to terms with what happened to him.

The mother said: ‘As a mother of five boys, there are some things I’ve thought I would never have to worry about. April of last year our world was turned upside down.

‘We were told by investigators that our 14-year-old was a victim of child molestation. This was horrifying and unbelievable. I prayed that this was not true.

More…

…Teacher’s ‘four-month affair with her student, 17, revealed when they were caught having sex in a school bathroom’
…Girl, 15, finds out parents are swingers when she turns on TV and sees mother in cage and father as Batman in sex show

‘The more evidence that came out the truth became real, and I began to deal with grief, denial, guilt and so many other emotions.

‘During this time I still was trying to maintain being a wife and mother. How could I have missed this… what mother can’t protect her child? I trusted so much and believed that this friend was a gift from God.

‘Words can’t begin to explain the heartache we’ve experienced this past year and the betrayal we’ve endured. Messages that were recovered showed me more and more evidence and it became a living nightmare. I couldn’t bear the thought of my boy trusting someone that had clearly manipulated him.’

‘We believe that children deserve to be protected. This woman groomed and enticed a young boy she knew from birth to engage in these sexual acts. I crafted the sentence to take these things into account’
Assistant DA Kevin McMurry

Coweta Superior Court Judge Jack Kirby imposed the sentence on the recommendation of the DA’s office.

Coweta Judicial Circuit Senior Assistant District Kevin McMurry said of the harsh penalty: ‘The state of Georgia has very strict sentences against child molestation. When I was negotiating this sentence, I treated her like I would a male perpetrator.

‘We believe that children deserve to be protected. This woman groomed and enticed a young boy she knew from birth to engage in these sexual acts. I crafted the sentence to take these things into account.

‘We want to send a message that this will not be tolerated. I actually reduced the charge from aggravated child molestation – which carries a maximum sentence of 25 years – to child molestation – with a maximum of 20 years – but wanted to ensure she would still receive a harsh sentence which recognized the life-long impact and damage done to this child.

‘Children are important and they deserve to be protected. She abused her position and the trust bestowed on her from the family and she had to be punished for this.’
.
……………………………………….

img code photo … Shannon Alicia Schmieder, 39

i.dailymail.co.uk/i/pix/2012/02/17/article-2102620-11C8D9…

Sexual predator: Schmieder knew the boy most of his life and was like a mother figure to him, according to the victim’s mother, before the teaching assistant started preying on him

FACEBOOK

……………………………………….
.
……………………………………….

img code photo … Shannon Alicia Schmieder, 39

i.dailymail.co.uk/i/pix/2012/02/17/article-2102620-11C8D9…

Sexual predator: Schmieder knew the boy most of his life and was like a mother figure to him, according to the victim’s mother, before the teaching assistant started preying on him

FACEBOOK

……………………………………….
.

The victim’s mother said her son had trust issues as a result of the affair.

She said: ‘We’ve all been in counseling for several months and we’ve been made aware of so many others that are victims of child molestation and sexual abuse.

‘We were forced to realize that role models of our community like preachers, teachers, scout leaders, coaches, and even mothers that you love and trust, and have known for years, and you would believe would never hurt your child could be a sex offender. This is physically and emotionally hard to accept.’

In a final address to the judge Jack Kirby before he imposed the sentence, she added: ‘We are continuing to hurt. We will struggle in fully trusting again and we will never understand the betrayal… and still today the dishonesty.’

Schmieder worked as a teacher’s assistant at Jefferson Parkway Elementary school in Coweta County, Georgia.

‘We are continuing to hurt. We will struggle in fully trusting again and we will never understand the betrayal… and still today the dishonesty’

Victim’s mother

She pleaded guilty to two charges of child molestation following her arrest last April.

The parents of her victim, who was not a pupil at her school, found out about the affair when the discovered a series of explicit messages on his computer.

After alerting police a forensic examination of the boy’s home computer revealed Schmieder was involved in a sexual relationship.

She was arrested and charged following an interview with detectives.

Schmieder’s case – though unique because of its harsh sentence – is by no means a rare incident.

There have been countless reports of female teachers in schools across America abusing their relationship with male students and engaging in sexual relations with them.

Leading child psychologist, Dr Michael Oberschneider, who sees both teenagers who have been sexually abused and the adults who sexually abuse, said having sex with older women, especially women in a position of power is a badge of honour for some boys and their peers.

‘There is a certain mystique around the older woman in our society,’ he added. ‘If it was a man (who is abusing) in our society we are harsher, but when it’s a woman we kind of wonder about it.

‘It’s still a horrible thing, but I think there is also a little bit of unconscious permission in society. It seems to be not quite as bad when an older woman does something with a younger boy.’

Dr Oberschneider is not connected with the Schmieder case.
.
.
SEX WITH MY STUDENTS: THE TEACHERS WHO HAVE BEEN ARRESTED, CHARGED OR JAILED
.
.

—Elizabeth Colleen Wallis, 34, was sentenced in March to four months in the Yuba County Jail for having sex with a former underage special needs student now 17.

Wallis a teacher’s assistant at Yuba Gardens Intermediate School in Olivehurst, California, came to the attention of police when they were notified of the alleged inappropriate relationship by a concerned family member of Wallis.

The boy’s mother had indicated that her son was in love with Wallis.
.
.

—Kimme Woolf, was a 29-year-old math teacher at Perrin High School in Perrin, Texas, when she was arrested for allegedly committing sexual assault on a male student, 16, and having an improper relationship with another, 18, last November.

Woolf is alleged to have slept with both boys after they repeatedly asked for sex. She is also thought to have performed oral sex on both.
.
.

—Felecia Killings, 27, an English teacher at Rodriguez High School in Fairfield, California was arrested in November on allegations of having sex with a 16-year-old student.

Police believe the alleged relations took place at Killings’ home.
.
.

—Sara Leann Dwiggins, 24, a math teacher at South Creek Middle School in Williamston, North Carolina, was arrested on allegations of having sex with a 14-year-old former student. She has been charged with two counts of statutory rape and two counts of sex offence with a student.
.
.

—Gina Watring, 40, was jailed for five years last September after admitting having sex with a boy, 10, at the primary school in Durham, North Carolina. The mother-of-two had faced up to 70 years after being charged with dozens of offences.
.
.

SEX WITH MY STUDENTS: THE TEACHERS WHO HAVE BEEN ARRESTED, CHARGED OR JAILED
.
.

—Marcie Lynn Rousseau, 34, had sex with a 16-year-old student at least 100 times.

The Michigan English teacher was sent to prison last December to serve a minimum of four years having pleaded guilty to all the charges.

But her defence lawyer said of the student: ‘He took part in this also … He courted her, bought her lunch, brought her flowers.’
.
.

—Jennifer Riojas, 27, a science teacher in Fort Worth, Texas, was pregnant when arrested for sexual assault in November after allegedly having sex with a 16-year-old student.

The pupil told police they met in motels and even had sex when he was in a hospital bed recovering from a football injury.
.
.

—Megan Baumann, 28, is currently serving three years in prison after pleading guilty to various sex charges involving three male students.

The social sciences teacher had sex with one and sent him naked pictures of herself by text. The former

Tennessee teacher sent texts of her breasts and pubic region to another while she fondled the third while he was clothed.
.
.

—Carlie Rose Attebury, 31, a former California marching band teacher, denied having sex with a 15-year-old student but admits having sex with two former students when they were 18. Attebury said that she hugged the 15-year-old boy as she did any ‘band kid’. She was sentenced to 16 months in prison in March.
.
.

SEX WITH MY STUDENTS: THE TEACHERS WHO HAVE BEEN ARRESTED, CHARGED OR JAILED
.
.

—Nicole Chapman, 28, was this month jailed for 10 to 12 months earlier this month for having sex with a 19-year-old special needs student in North Carolina.

Bizarrely the teenager’s mother approved of the relationship between her son and the ex North Shelby teacher and told local TV: ‘I ain’t no victim. If it is love, man, it’s love. Nobody can stop this.’
.
.

—Marie L Fisher, 21, was last month charged with having a sexual relationship with a 15-year-old boy after sending him explicit text messages.

Fisher, who worked in the Special Education Department at Reeds High School in Sparks, Nevada, is alleged to have sent him a photo of her ‘half naked breast’ and later slept with him.
.
.

—Bethyl Shepherd, 34, who worked in the same department as Fisher, was arrested last month after officials found out about an alleged threesome with two 17-year-old students.

Shepherd, who had taught at the school for 10 years, claimed one of the teens forced her to have sex while the other watched.
.
.

—Barbara Anderson, 37, a teacher at a Washington State school, was arrested in March after allegedly having sex with a 17-year-old student.

The pupil in question told his uncle he was ‘getting laid by a teacher,’ according to court documents. She sent almost 800 text messages to the boy between January 15 and February 21, including more than 100 texts in one 24-hour period.
.
.

SEX WITH MY STUDENTS: THE TEACHERS WHO HAVE BEEN ARRESTED, CHARGED OR JAILED
.
.

—Jamie Waite, 35, a swimming instructor at a school in Utah, was arrested in March for allegedly having sexual relations with a 17-year-old student.

Police in Utah arrested the teacher after a tip off from friends of the student who claimed the pair were having a relationship.
.
.

—Deborah J Cox, 58, of Naperville became involved with the boy while he was at Neuqua Valley High School, police said.

The teacher’s aide, had been the boy’s personal academic tutor for several years, before she was arrested in March for having an alleged sexual relationship with him.
.
.

—Carrie Shafer, 38, a biology teacher, was caught in March by police partially naked in a car with one of her students.

An arrest report revealed the married mother-of-two, from Kentucky, was in a compromising position with a 17-year-old student from her school in Louisville. Police said the windows of the car were ‘steamed up’ and both occupants were partially clothed.
.
.

—Gail Gagne, 29, a weight room supervisor at Cretin-Derham Hall High School, Minnesota, was sentenced to two years probation in February after having sex with a then 16-year-old student – both at her home in Bloomington and at a nearby hotel.
.
.
SEX WITH MY STUDENTS: THE TEACHERS WHO HAVE BEEN ARRESTED, CHARGED OR JAILED
.
.

—Chanda Frank, 34, a physical education coach at Haywood High in Brownsville, was charged with sexual battery in February, after allegedly fondling a 14-year-old female student on her softball team.

It happened at least twice between the dates of August 2010 and February 2011, according to court documents.
.
.

—Stacy Schuler, 32, of Mason, Ohio, was charged with committing sex acts with students from her high school football team in February.

She faces 19 felony counts of sexual battery involving five male students, three misdemeanor charges of serving alcohol to underage youths and more than 96 years in prison if convicted.
.
.

—Ashley Blumenshine, 27, a PE and dance teacher was arrested in January behind a department store in Plainfield, Illinois, after police caught her in a car with a 16-year-old boy student.

Police believe they had had sex shortly before the officers arrived and say the relationship may have gone on for more than a month.
.
.

—Courtney Bowles, 31, a teacher who advised colleagues on how to avoid affairs with students, was caught having sex with a teenager in her car.

Bowles was found by a police officer lying naked on top of the boy, who was also naked, from her school in Colorado. A partly consumed bottle of vodka was also found in the car with the couple.
.
………………………………………………………………………………………………………………………………………………………………………
.
.

DSCN6149
Computer Battery

Image by kentkb
Wow! this is an old WW2 (the war to end all wars) field telephone!
A real Museum piece, Signal Corps U.S.Army ?
Generator crank operates the telephone to get it started and also charges the lead acid battery , and a line is strung though the battle lines to connect the system, not a job I would want!
I wish to listen to it and hear it tell me stories …. Imagine.
Very Cool.

This photo is licensed under a Creative Commons license. If you use this photo, please list the photo credit as "Kent K. Barnes / kentkb" and link the credit to
www.kentkb.com.
Thank You….

Glamor Shot
Computer Battery

Image by Andrew Oliver
Team Turkey. Build India+. March 14, 2007. Custom Sig Kadet.

Don installed the new landing gear and and took a couple glamor shots outside to show her off in all her beauty :)


120%+ SUPER BATTERY LIFE! Learn about Laptop Battery Life at LaptopBatteryLife.com

Apple Macbook Pro 2012 Unboxing and Review i7 Quad Core Processor [Mac OS X Lion] (Model 2011)

23

Apple Macbook Pro 15.4″ Mac OS X Lion Review [i7 Quad Core Processor] Apple Macbook Pro 15″ i7 Quad Core Processor Review 2012 [Mac OS X Lion] Apple Macbook Pro 15″ [i7 Quad Core Processor] Review 2012 [Mac OS X Lion] Apples latest 15.4-inch thin-and-light notebook features strong graphics performance, a stunning display, and 7 hours of battery life. Facebook www.facebook.com Macbook Pro 15″ Unboxing 2012 (Mac OS X Lion) MacBook Pro is machined from a single piece of aluminum, an engineering breakthrough that replaced many parts with just one. It’s called the unibody. And the first time you pick up a MacBook Pro you’ll notice the difference it makes. The entire enclosure is thinner and lighter than other notebooks. It looks polished and refined. And it feels strong and durable — perfect for life inside (and outside) your briefcase or backpack. 15-inch: 2.2 GHz 2.2GHz quad-core Intel Core i7 4GB 1333MHz 750GB 5400-rpm1 Intel HD Graphics 3000 AMD Radeon HD 6750M with 1GB GDDR5 Built-in battery (7 hours) Up to 2x faster processors and 2x faster graphics Introducing Thunderbolt. The fastest, most versatile I/O ever in a notebook The new FaceTime HD camera Multi-Touch trackpad. Be more hands-on A long-lasting battery. Charge less It’s very well connected Ports with possibility Burn DVDs superfast “MacBook Pro Unboxing” “Mac OS X Lion” “Macbook Pro 15″ “Macbook Unboxing” “Macbook Pro First look” “Apple Macbook” “2011 Macbook pro” “Macbook 15.4″ “Macbook Pro 2012 review


120%+ SUPER BATTERY LIFE! Buy Durable Laptop Batteries at LaptopBatteryLife.com

How to speed up your Computer with TuneUp Utilities 2012 [Review]

25

Website: www.musicarta.co.uk YouTube channel www.youtube.com Facebook: www.facebook.com Twitter: www.twitter.com Google Buzz: www.google.com Digg: digg.com This video shows you how to speed up your computer using a program called TuneUp Utilities 2012. In this way, I also review the program having used TuneUp software for years. “Exceptional performance, maximum battery life, a clutter-free PC, and smart energy efficiency — that’s exactly what you get with our all-new TuneUp Utilities™ 2012. Boasting over 30 optimisation tools, we guarantee it will revitalise your PC and make it as good as new!” TuneUp Utilities 2012 Free Trial: www.tune-up.com TuneUp Utilities 2012 Purchase:www.tune-up.com Ifyou have a question about this video, after reading all of this description, please leave a comment and I will try and get back to you. If you would like to request a computer related tutorial for me to make and upload, please leave a comment on my channel, send me a message via YouTube, contact me through my website or send an email to support@musicarta.co.uk and I will see what I can do. In the unlikely event that anything goes wrong with your computer when following the steps in my video, then it is in no way my fault and I am not responsible. I am, however, prepared to help you as best I can. If you do have a problem, feel free to get in touch. All the programs featured in this video are not owned or copyrighted by myself and due credit goes to their authors/creators.


120%+ SUPER BATTERY LIFE! Buy Cheap Laptop Batteries at LaptopBatteryLife.com

Go to Top