View allAll Photos Tagged encryption

Google right now included a new section to its Transparency Report that focuses on the use of encryption on Google’s possess web-sites and throughout the internet.

The firm suggests around 75 % of requests to its possess servers are now utilizing encrypted connections (while targeted t...

First 1000 businesses who contacts honestechs.com will receive a business mobile app and the development fee will be waived. Contact us today.

‪#‎electronics‬ ‪#‎technology‬ ‪#‎tech‬ ‪#‎electronic‬ ‪#‎device‬ ‪#‎gadget‬ ‪#‎gadgets‬ ‪#‎instatech‬ ‪#‎instagood‬ ‪#‎geek‬ ‪#‎techie‬ ‪#‎nerd‬ ‪#‎techy‬ ‪#‎photooftheday‬ ‪#‎computers‬ ‪#‎laptops‬ ‪#‎hack‬ ‪#‎screen‬

 

honestechs.com/2016/03/16/google-launches-https-transpare...

Chapter 1: Dani s’ Introduction to Harappan Ciphers

Ahmad Hasan Dani , Nazeer Ahmad Chaudhry , Sony

 

Section 1.1: Sample Draft

Section2.2:Pre-Historical Perspective

Section2.3:Pre- Harappan Culture.

Section2.4:Harappan Culture

Section2.5:Harappan Civilization

Section2.6: Confirmation of Conclusions

Section2.7:Terminal Symbols

Section2.8: Bibliography

Summary | Full Text: PDF (Size: 3924K)

Chapter1: Dani s’ Introduction to Harappan Ciphers

Dr. Prof. Ahmad Hasan Dani , Nazeer Ahmad Chaudhry( Researcher) , Sony

 

Interview with Dani

Dani (1-9) had confirmed most of our conclusions after a detailed interview(10). Nazeer Ahmad Chaudhry( Researcher) and author extends thanks to Farah Dani and all others including Sony(11) . Dani gave detailed account of his life and research work that is on the record hence it is not being repeated. He also gave account of his meeting with Parpola regarding his decipherment (12). We were lost in the ruins of Mohenjodaro available at Mark(13-14) and Omar (1984) IVC sites. Sony is giving the narrative .

The horse hoax was being debated at internet and Author asked the comment from Dani. He said smiling that we are actually Vani from Central Asia and Brahmans hence we support them then he became serious and said that there is no government support and we have limited number of scholars doing this work at their own hence we might complement them , however an agreement is historical evidence.

 

South Asia is a land of many different cultures and traditions with thousands of sites. The prehistoric scripts , motifs and symbols found during Kot Diji Culture (Khan(1965) are quite different from matured Harappan Scripts 1900-1300 B.C . We are interested in the symbols, signs , pictorials and motifs , logos like 1, 2, and 3 or 33 , some symbols, signs and pictorials used in other civilizations imported from other civilizations during 1500-1300 B.C. period for this decryption.

Harappan Scripts

 

Table-1 shows a mixture of roughly over 26 symbols with many variants but we are mostly interested for terminal symbols over 11 starting from right to left like Arabicc alphabets. Dani narrated his meeting with Asko Parpola about his effort of decipherment He , B.B. Lal , Russian Professors and many others had rejected this decipherment. One of the questions frequently asked about the Indus script whether it represents any systematic writing of any language at all is not relevant to our decryption. Dani an eminent Pakistani archaeologist , historian and linguistic is expert on 35 languages and dialects. He is authority on Central Asia , South Asia and Harappan Civilization. He is particularly known for archaeological work on Pre-Harappan Culture. We have no disagreement with even with those who agree that the writings of the Harappan Civilization are not a haphazard arrangement of signs and are at variance with one another. Our purpose in this decryption is to carry out frequency analysis of the script of Matured Harappan Civilization in the last stage 1500-1300 B.C. in order to bring out the statistical structure of the cipher-texts.

Many of sites remain hidden under the ruins of Mohenjodaro , Harappa and other sites. It seems to be the culture of another mythology with tradtions of burial , sacrifices and the motif of bull is found that is not a pictorial . The major diety seems to be horned buffalo and buffelo horned yougi . Mehrgarh 7000 B.C site in Gedrosia pertains to the seventh and third millennium B.C. It covers Neolithlic 6500- 4500 B.C. and Chalcolithic4500- 2600 B.C era. We have tablets , tools , figurines of women with heavy jewelry and ceramics of very fine quality . The motif of fish , scorpian , goat and many others including the mythology are different in matured Harappa civilization Some of the scripts , symbols and signs pertaining to Harappan culture 2600-1900 B.C. are different from previous Kot Diji .

We compliment efforts in decipherment of Indus scripts as written language . Anything before 1900 B.C. including the sign-board from Dholavira consisting of 10 large signs, each sign approximately 37cm by 27cm, embedded in semi-precious stones on a wooden board and an innovate addition of many seals and tablets and even horses is wonderful contribution. Our scope in decryption is limited to Matured Harappan Ciphers in 1500-1300 B.C. those were found from upper layers .

Tablets

    

The tablet shown above has five symbols. The 1st two from right the inverted boa or jar with logo2 on top and lance below is one symbol. , The 4th boa with logo3 inside is third symbol. Vertical 4 line written in bottom line is 4th symbol at number 5 and last 6th position symbol of comb is 5th symbol called the terminal symbol. We have special problem with this terminal symbol and comb inside the bangle or encircled comb in frequency analysis. We require an ethno-archaeological model for frequency analysis of these symbols. Tablets is a standard form of issuing orders like present day deeds , written orders and other transactions sent as encrypted messages or cipher-texts. It had been common practice in all ancient civilizations to issue the orders as tablets . The amulets and tablets also served as identity documents and trade deals. The direction of the writing of scripts on the amulets , artifices and tablets is from right to left like Arabic ,Persian and Urdu and the local languages Punjabi and Pothwari languages spoken in the oldest culture Samma the Sowan Valley 0.5 million years old culture of stone age . We are not saying that Dravidian in IVC or Naga tribe in Snake Valley Taxila adopted the writing system from the creatures of stone age .

 

Let us consider a sample of ten tablets in Table -2 . The frequency count of boa left and diamond the right symbol in tablet-1, The left symbol bearer in tablet-2 , the right symbol harrow or saw in tablet -5, the left symbol leveling tool (KRAH) , left symbol comb in bangle in tablet-8 or comb are terminal symbols. We can not carry out any frequency analysis for such a limited data but we would count the symbols using statistical methods and use an ethno-archaeological model to regenerate more data .

Seals

 

The direction of the writing on the seals is from right to left like English language in s1 Table-3 . Stamping the seal gives the writing from left to right as shown above in the tablet discussed above and in table-2. The seal ‘s2’ above when stamped gives the seal impression as ‘t2’.The seals being used in present day environments for signatures is different from the use of Indus seals that pertains to the level of security in modern concept . The amulet as identity document was given to the officials but messengers or speedy system of communication in IVC were given tablets or it may be tablet as stamped seal impression. Let assume a trained bird or racing camel or buffalo or trained tiger or trained crocodile or rhenocerous for swamps and rivers as communication systems. They may be insecure for special purposes as like any of the modern system in cryptology.

 

The use of impression of a seal as tablet may be compared with a book code as example of a more secure algorithm . The priest on both ends had same seals like the sender and the receiver of the modern code each having a copy of the same book. During encoding, each word in the plaintext is replaced with a code group that indicates where that same word appears in the book. Different occurrences of the same word in the plaintext may be represented by different code groups in the encoded message. With this method, the key is the book itself. Although a person who intercepts a message may guess that a book code is being used, the messages cannot be decoded unless the interceptor can determine what edition of what book is being used. In IVC system special staff priest trained at Priest College Mohenjodaro were present in other states and foreign countries with set of tablets and seals. The orders as seal impression tablet could give the actual tablets to be issued to specific staff to execute the orders.

The security , public policy and prevention of fraud in modern concept as given by Camp (15-21) has to be linked with ancient methods in an ethno-archaeological model. Giving Tablet as actual secret message through any of the communication channels in use during 1500-1300 B.C. was equally insecure like the modern cipher systems that involve transmitting or storing the key with each message. If an unauthorized person can recognize the key, then the next step is to recognize, guess at, or figure out the algorithm. Even without the key, the code breaker can guess the algorithm, and then, by trying all the possible keys in succession, can conceivably recover the plaintext. For example, in Caesar's alphabetical cryptosystem being discussed in next chapters , the cryptanalyst could simply try each of the 25 possible values of the key. The security of transmissions can therefore be increased by increasing the number of possible keys and by increasing the amount of time it takes to try each key. If the same key is used for multiple messages, the cryptanalyst only has to figure out one key; but by varying the key from one message to another, the cipher clerk has used a different procedure for encoding each one. The use of seal impressions as tablets in IVC ciphers is like using a complicated algorithm that may have a very large number of possible keys. The decryption in modern system if the basic algorithm is known or guessed is made difficult due to the time and effort required to try all possible keys that may take years for finding the plaintext.

 

IVC cipher remain as unbreakable system during the century like the most secure encryption method known was the one-time pad. The pad is a long list of different randomly chosen keys. Two and only two identical copies of the list of keys exist . The one for the person enciphering the message like the priest issuing the seal impression as tablet and another for whoever is deciphering it like the priest at the other end who knew the message coded as tablet. In OTP, a key is discarded and never used again after being used for one message but in IVC the same seal can be used again because the ciphers are only taught to specific priests and not the users. In OTP the next message will use the next key on the list. If the algorithm is even moderately complicated and the keys are long enough, cryptanalysis is practically impossible. In IVC ciphers the seal impression as tablet may be same but the tablets issued at other end might be different .

Terminal Symbols

 

The 1st symbol on the right side of seals and the leftmost symbol on the left the last one are called the terminal symbols We have selected after frequency analysis not given here about 11 terminal symbols shown in line-1 of table-3 appearing as 1st symbol on the right side of the seals.

We may call them as boa the 1st on right , diamond or coin , bearer , comb in bangle or encircled comb , comb , lance or spear , harrow or saw , wheel , level tool ( KRAHA) and riding stripe ( RUKAB).

 

We assumes the senate of priests holding important duties as VPs assisted by AVPs the headmen of tribes and supervisors from technical workforce from respective fields at execution level. . Dani confirms our conclusions for terminal symbols Mahadevan s’ analysis (1982:316) confirms the concept of priest for our ‘boa’ an his ‘jar’ symbol1 but with Sanskrit equivalent.

We do not require any confirmation in mathematical solution of cryptanalysis. The experts in frequency analysis have empirical solutions accepted by all cryptologists and cryptanalysts. The boa Symbol is confirmed as English letter E according to empirical solutions in cryptanalysis. The priest ruler in our analysis is confirmed by Dani our Sanskrit expert and he said that it had nothing to do with Sanskrit. Mahadevan s’ analysis ( 1982:316) confirms the concept of priest but with Sanskrit equivalent

 The symbol 2 has largest frequency occurrence after boa symbol and it is termed as symbol of coin or diamond.

Dani confirms coin or diamond symbol 3 an priest VP with financial duties with no Sanskrit equivalent. Mahadevan s’ analysis ( 1982:316) also confirms symbol 3 as officer with priest duties but with Sanskrit equivalent.

The ciphers, crypto systems , and codes in cryptology or Harappan ciphers 1500-1300 B.C. being considered for our cryptanalysis are just like a mule. Every one agrees that a mule cannot generate a daughter. The mule might be forced to adopt a daughter as unique case after brutal attack for training as we call it brutal attack in cryptanalysis for code breaking The concept of spoken language equivalent like Sanskrit or others may be valid for earlier scripts and we have no objection to such adopted daughters.

  

Bull Pictorials

   

The seal on the left becomes tablet in the right side but inscription may be different for seal impression hence above is only an example just to show the direction of terminal symbols. We have large variety of bulls like Zebu or bhahmi bull , short horned bull , humped bull and humpless bull beside the unicorns. Many of the animal systems are used as nick names as a fun in our area of the oldest culture of stone age like bull and Ass for girls .I have retrieved old English Teacher books serial 190-191 from my childhood library that had very interesting (22) history.

Nixon mentioned in his book The Leaders

 

Boa Motif

  

Animal Motifs

  

Conclusions

Long interview with Dani reflecting the confirmation of conclusions by Dani, B.B. Lal, Russian Professors, Tosi, Durani Mughal, Mark and other scholars is not being discussed. We are mentioning some of the conclusions also confirmed or partially confirmed by Asko Parpola and I. Mahadevan through their published work.

The direction of writing on amulets, tablets, and seal impressions is from right to left like Arabic, Persian and Urdu and reversed on the seals like English. Conclusion is agreed by all scholars

Indus ciphers and codes represent system like logo-syllabic writing. This doesn’t constitute a closed system of single-valued graphemes as the syllabic and alphabetic scripts, which could be cracked as wholes. The conclusion is confirmed by Asko Parpola, Dani , Mark and other scholars

The individual symbols may be interpreted one by one, and some of the ciphers may remain eternal mysteries. The conclusion is confirmed by Asko Parpola, Dani, Mark and other scholars.

The Indus Ciphers were essentially similar to the other pictographic ciphers evolved by priests in China , Egypt and others .Many scholars like Dani , Fairservis , Mark and others confirm the conclusion

The Indus Ciphers are like a mule unable to adopt any of ancient language as daughter hence decipherment based on languages was rejected by scholars like Dani, B.B. Lal, and Russian Profs. and many others

The spoken language of the Indus people was Dravidian confirmed by Asko Parpola, Dani, Mark and other scholars. Our cryptanalysis shows that it not found in Script ciphers. This was the system like Liner A codes but no Linear B codes were required.

Harappan professed different religion in Kot Diji culture era that may be genetically related to the religions of both the ancient West Asia and the later India. The mythology of matured Harappan Civilization is different from any other mythology and mythology in ancient India.

 The terminal symbols appearing at the left of the writing on amulets, tablets and seal impression are most important in frequency analysis. The right symbol on the seals is the terminal symbol on seal impressions.

 

Let me complement Possehl , Tosi (1993), Walter, Fairservis, Shaffer ,), B.B.Lal, Durani(1981), Jacobson, Terome(1986), Kenoyer (1985), Ratnagar(1991) and many others who contributed to Indus Valley research. Iravatham Mahadevan seems to be greater scholar when he sys that he could n't decipher the scripts inpite of his over 40 yeras research work. Ahmad Hassan Dani , B.B. Lal and Russian professors are the greates who disagreed to excellent research work by Asko Parpola. Being student of topsecret science Cryptology since childhood , I was associated with code and ciphers. After long discussion with Dani about above researchers and scholars and his work with some of them , we came to the claim of decipherment by Jha N and Rajaram (2000) that I thought the broken seal by Mackay showing rear portion of bull being called hoof of a horse. Dani said smiling , " We am actually Vani from Central Asia hence I would like to apprecite the work by Brahamans ". Then added that government funding is very limited and any effort like the effort of Jha N and Rajaram has to be appreciated but we mightn't agree with decipherment if it is not correct. Then he narrated all the conversation with Parapola and finally he disagreed.

Dried Up River Hakra

Let us run an ethno-archaeological model on the Scripts during 1500-1300B.C. period. We have no comments on any of the efforts of deciphering efforts of IVC scripts as spoken language. IVC existed from Kot D.G era before 2600 B.C. , Harappa 2600-1900 B.C. and matured Harappa 1900-1300 B.C . The direction of shifting from Harappa to Mohenjodaro, and Lothal during 1500-1300 B.C. is assumed . Gedrosia and Kalibangan might have been left due to Aryans but Dholavera, the sites in Cholistan ( Mughal (1997) and Kot D.G. vanished earlier due to heavy floods and climatic changes and the final drying up of the Hakra /Kangra/ Sarasvati in 1900 B.C.

IVC script is found on amulets, tablets and seals. Some of symbols, signs, numerals , pictorials and motif seem to be universal or imported from other civilizations of China , Egypt and in cuneiform texts from Mesopotamia as well as in the ancient Iran. Scholars had been trying to link the scripts to any of the pre-historic languages like Indo-European They provide a reliable basis for this decipherment. The main conclusion is as follows: the Proto-Indian language is the Proto-Indo-Aryan () one. The direction of the writing is right to left like Arabic on amulets and tablets and it may be reversed for seal impressions. Signs depicted on seals and tablets have basically the left-right orientation. It is well to bear in mind that the direction of the reading of a record depends on the context, too. In this work all the texts are transformed so that they have a common direction from left to right. This report contains a number of quasi-bilingual sources that can be the base of the decipherment (Rjabchikov 2006a; 2006b) (1).

Bibliography

1.Paul B. Janeczka, Top Secret: A handbook of Codes , Ciphers and Secret Writing, Publishers Candlewick, 2006, 144 pages

2.Abraham Sinkov Elementary Cryptanalysis: Mathematical Approach, 1998, Publishers: The Mathematical Association of America,

3.Martin Gardner, Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills), 96 pages ,publishers: Dover Publications (October 1, 1984)

 

4.Paul B. Janeczka, Top Secret: A handbook of Codes , Ciphers and Secret Writing, Publishers Candlewick, 2006, 144 pages

5.Abraham Sinkov Elementary Cryptanalysis: Mathematical Approach, 232 pages. Publishers: The Mathematical Association of America; 2nd edition (August 1998)

6.Martin Gardner, Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills), 96 pages ,publishers: Dover Publications (October 1, 1984)

7.Bard Gregory, Algebraic Cryptanalysis , 2009, 392pages, Publishers Springer US

8.Christopher Swenson, Modern Cryptanalysis: Techniques for Advance Code Breaking, Publishers John Wiley & Sons , 2008, 264 pages

9.Simon Singh , The Code Book , The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Publishers: Anchor; Reprint edition (August 29, 2000), 432 pages

10.Jannik Dewny, Cryptanalysis of RSA & its Variants, CRC Press, Taylor & Francis Group,2009

11.Mark Stamp, Richard M. Low , Stamp(ed) , Applied Cryptanalysis: Breaking Ciphers in the Real World, Published Online: 3 Jan 2007

12.Helen F. Gaines, Cryptanalysis , 1989, Dover Publication, 237 pages

13.Friedrich L. Bauer, Decrypted Secrets: Methods and Maxims of Cryptology. publisher: Springer- Verlag Telis; 2nd Rev&Ex edition (February 2000) ,language :English, Hardcover: 470 pages

14.Gaines, Helen Fouche, Cryptanalysis a Study of Ciphers and their Solutions, 1939, 237 pages.

15.Foster , Caxon, Cryptanalysis for Microcomputers, 1982, 333 pages

16.Devours, Cipher A. (Editor) / Kahn, David (Editor) / Kruh, Louis (Editor) / Millen, Greg (Editor) / Winkle, Brian J. (Editor). Cryptology: Machines, History and Methods, 1989 , 520 pages

17.Friedman, William F., Military Cryptanalysis Part I, 1935. 149 pages. Cryptanalysis of Number Theoretic Ciphers

Wag staff Jr., Samuel S. / Attalla, Mikhail J. (Editor), 2003. 318 pages

18.Friedman, William F., Military Cryptanalysis Part II: With Added Problems & Computer Programs 1937.

19.Friedman, William F., Military Cryptanalysis Part III: Simpler Varieties of Periodic Substitution Systems, 1939. 119 pages ,

20.Friedman, William F., Military Cryptanalysis Part IV: Transposition and Fractionating Systems, 1941. 189 pages

21.Ryan, Peter / Schneider, Steve, Modeling and Analysis of Security Protocols

2000. 352 pages.

22.Gaines, Helen Fouche, Cryptanalysis: A Study of Ciphers and their Solution

1939. 237 pages.

23.Devours, Cipher A. (Editor) / Kahn, David (Editor) / Kruh, Louis (Editor) / Millen, Greg (Editor) / Winkle, Brian J. (Editor). Cryptology: Yesterday, Today, and Tomorrow, 1987, 519 pages

24.Pickover, Clifford, Cryptorunes, 2000. 96 pages

25.Poe, Edgar Allan, Gold-Bug and Other Tales, 1991. 121 pages.

26.Johnson, Neil F. / Duric, Zoran / Jajodia, Sushil G., Information Hiding: Stenography and Watermarking - Attacks and Countermeasures (Advances in Information Security, Volume 1) 2001. 160 pages.

27.Pfleeger, Charles P. / Pfleeger, Shari Lawrence, Security in Computing. 1997, 2nd edition. 569 pages.

28.Devours, Cipher A. (Editor) / Kahn, David (Editor) / Kruh, Louis (Editor) / Millen, Greg (Editor) / Winkle, Brian J. (Editor), Selections from Crypto logia: History, People, and Technology, 1998. 552 pages

29.Yardley, Herbert O., Yardley-grams, 1932 (Currently out of print). 190 pages

30.Wagstaff Jr., Samuel S. / Atallah, Mikhail J. (Editor), Cryptanalysis of Number Theoretic Ciphers, 2003. 318 pages.

31.L. Jean Camp, “Code, Coding and Coded Perspectives”, Journal of Information, Communication and Ethics in Society Vol. 1, Jan. 2003, pp. 49-59. (Previously published in the abstract-refereed conference “Code, Coding, and Coded Perspectives”, Association of Internet Researchers, Lawrence, Kansas, and September 2000.).

32.L. Jean Camp & Serena Syme,” The Governance of Code: Open Land vs. UCITA Land” ACM SIGCAS Computers and Society, September 2002, Vol. 32, No. 3.

33.Serena Syme & L. Jean Camp, The Governance of Code, Code as Governance , Ethicomp: The social and Ethical Impacts of Information and Communications Technologies, Technical University of Gdansk, Gdansk, Poland, 18-20 June 2001, Vol. 1, pp. 86-101.

34.L. Jean Camp & Serena Syme, “A Coherent Intellectual Property Model of Code as Speech, Embedded Product or Service, Journal of Information Law and Technology, Vol. 2, 2001.

35.L. Jean Camp & B. Anderson, Expansion of Telecommunication Infrastructure in Emerging Nations: The Case of Bangladesh, Telecommunications Policy Research Conference, Alexandria, VA. 25-26 Sept. 1999.

36.L. Jean Camp, “The World in 2010: Many New Entrants”, info: the journal of policy, regulation and strategy for telecommunications, information and media, Vol. 2 No. 2, April 2000, 167-186.

L. Jean Camp & Charles Vincent, Looking to the Internet for Models of Governance , Ethics and Information Technology, 2004, Vol. 6, No. 3, pp. 161-174.

L. Jean Camp, “Community Considered”, democracy.com? Governance in a Networked, World Hollis Publishing (Hollis, NH) 1999.

37.L. Jean Camp, Democratic Implication of Internet Protocols , : Ethical, Social and Political Dimensions of Information Technology, February 28 - March 1, 1998; Princeton University, Department of Computer Science, Princeton NJ.

38.L. Jean Camp, “The Shape of the Network”, Governance in a Globalizing World, ed. J. Donahue, Brookings Press (Washington, DC) summer 2001.

39.L. Jean Camp, “Principles for Design of Digital Rights Management Systems” IEEE Internet Computing Vol. 6, No. 3 pp. 59-65, May 2003.

40.L. Jean Camp & Stephen Lewis, “The Economics of Information Security” Springer-Verlag 2004.

41.L. Jean Camp, “Identity Theft: Causes, Consequences, Possible Cures.” Springer-Verlag 2007.

Farzeneh Asgapour, Debin Liu and L. Jean Camp, “Computer Security Mental Models of Experts and non-Experts”, Usable Security 07, (Tobago) 16 February 2007.

42.L. Jean Camp, “Privacy: from abstraction to applications”, Computers & Society, Sept. 1994, Vol. 24, No. 3, 8-15.

43.L. Jean Camp & Marvin Sirbu, “Critical issues in Internet commerce”, IEEE Communications, May, 1997

44.Marshall, John 1931. Moenjodaro and the Indus Civilization. 3 Vols. London.

45.Ahmad Hasan Dani, New Light on Central Asia, Sang-e-Meel Publication,1996

46.Ihsan H. Nadiem, Moenjodaro , The Heritage of Mankind, Sang-e-Meel Publication,2002

47.Asko Parpola, Deciphering the Indus Script, Cambridge, Cambridge University Press, 1994

48.Mohammed Rafique Mughal ,Ancient Cholistan Art and Architecture, Ferozsons Ltd., Lahore, 1997

49.Asko Parpola ,Deciphering the Indus Script: methods and select interpretations, Occasional Papers Series, Center for South Asia, University of Wisconsin-Madison, 1997

50.Gregory Possehl , The Indus Age: The Writing System , U. of Pennsylvania Press, 1996,

51.Richard Meadow , Harappa Excavations 1986-1990: A Multidisciplinary Approach to Third Millennium Urbanism, Prehistory Press, 1991,

52.Raymond and Bridget All chin, The Rise of Civilization in India and Pakistan,

Cambridge Univ. Press, 1982

53.Gregory Possehl, Harappa Civilization, Science Pub., 1993

54.Naida Kirkpatrick, The Indus Valley Understanding People in the Past,

Heinemann Library, April 2002

55.Iravatham Mahadevan, Terminal Ideograms in the Indus Script, in Gergeory L. Possehl, Harappan Civilization: A Contemporary Perspective, Oxford & IBH Publishing Co., 1982

56.Gregory Possehl ,The Indus Civilization A Contemporary Perspective,

Altamira Press, January

57.Ardeleanu-Jansen, Alexandra 1983. Stone sculptures from Moenjodaro. Interim Reports, Vol. I. ISMEO- Aachen University Mission. Aachen.pp.139-157.

58.Joshi J.P. & Asko Parpola 1987. Corpus of Indus Seals and Inscriptions (=CISI). Vol. I: Collections in India. Helsinki.

59.Knorozov Y.V. et al 1981. Proto-Indica 1979. Moscow.

60.Lal B.B. 1960. From Megalithic to the Harappa: tracing back the graffiti on pottery. Ancient India, 16, pp. 4-24.

61.Mahadevan I. 1977. The Indus Script: Texts, Concordance and Tables (=ISTCT). Archaeological Survey of India. New Delhi.1998.

  

Evolution of Ethno-Archaeological Model

1.Nazeer Ahmad Chaudhry, Integration of TCP/IP Protocol Suites with Cryptographic Security approved Ph. D. Electrical & Electronics Engg.) In Total Technology thesis at University of Bradford U.K.

2.Nazeer Ahmad , Secure MIS book draft sent to Artic House Norwood

3.Nazeer Ahmad, Secure MIS in Business Communication, B.M.A. Preston University Research Paper in MIS subject.

4.Nazeer Ahmad ,Protection of Radio Tele-printing Circuits, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1987,pp 25-29

5.Nazeer A. Chaudhry ,Protection of Speech and Data Communication Circuits , The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1988,pp 52-56

6.Nazeer Ahmad ,Neo-Communication Security Environments, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1990,pp 25-29

7.Nazeer Ahmad Chaudhry ,Communication Systems , MS Thesis MUET Jamshoro 1990-1992,

8.N. A. Chaudhry , Protection of Electronics & Electrical Equipment, The Hilal Magazine , ISPR Publication , volume 22 , 22-29 December 1994

9.N. A. Chaudhry , Tele-computers and Security Beyond Year 2000, The Hilal Magazine , ISPR Publication , January 1995

10.N. A. Chaudhry , Tele-computers and Security Beyond Year 2000, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1994

11.N. A. Chaudhry , Tactical Nuclear Operations : Indian Option for 21st Century, Pakistan Defence Review, Volume 6, 1994, pp 80-92

12.N. A. Chaudhry , Integrated National Defence , Pakistan Army Green Book, 1991, pp343-346

13.N. A. Chaudhry , Safety Equipment for Nuclear Operations , T.S.O. Research Paper , E.M.E. College NUST Campus Rawalpindi, 1985

14.Nazeer Ahmad. Chaudhry , Pre- Evolution History Corps of Signals 1847-1947, SRC Publishers Hyderabad, 1992

15.Nazeer Ahmad. Chaudhry, Design and Development of Secrecy Electronics Communication System, M. Phil. ( Electronics Engg. ) thesis at MUET Jamshoro, 1993-1995

16.Nazeer Ahmad. Chaudhry , Electronics Warfare Doctrine Under Hostile Environments , Pakistan Army Green Book, 1991, pp 287-290

17.N. A. Chaudhry , Cryptographic and Computer Security , The Hilal Magazine , ISPR Publication , volume 24 , 19 January 1995

18.N. A. Chaudhry ,Evolution of Codes and Ciphers , The Hilal Magazine , ISPR Publication , 8 February 1995

19.N. A. Chaudhry , Cryptographic Security Systems , The Hilal Magazine , ISPR Publication , volume 20 , 15 December 1994

20.N. A. Chaudhry , Protection of Electronics & Electrical Equipment, The Hilal Magazine , ISPR Publication , volume 22 , 22-29 December 1994

21.N. A. Chaudhry , Axiomatic Educational Strategy for 21st Century , Research Paper presented at IEEEP Lahore ,1995 and published in local press

22.Nazeer Ahmad , Quality Education , Pakistan Observer Daily, 18 November 1998

23.Nazir Ahmad Chaudhry, Education System & National Development , The Jung Daily, 6 February 1995

24.Nazir Ahmad Chaudhry , A Short History Of Lahore & Its Monuments, 2000, Sang-e-Meel Publisher Lahore

25.Nazeer Ahmad, Legal Settlement of Kashmir Problem , Pakistan Army Journal , U.N. and Kashmir Issue , Pakistan Observer Daily, 15 November 1994

26.Nazeer Chaudhry , Islamic Requirements of Justice System, , Daily Markaz, 22 February1998 Islamabad

27.Nazeer Chaudhry , Islamic System of Saudi Arabia , Daily Markaz, 8 September 1998 Islamabad

28.Nazeer Ahmad , Face Reading : Integration of Forecasting and Prediction Technologies for Solution of Problems , Bazem –i- Alm –o-Fun Islamabad 2000

29.Nazeer Ahmad , Solution to National Problems , Daily Markaz, 21 September,1998

30.Nazeer Chaudhry, How to Reduce Budget Deficit , Daily Markaz, 3 April,1999, 4 April,1999, 11 April,1999, Islamabad

31.Nazeer Ahmad , Solution to Public Problems , The Exclusive Weekly, Islamabad, 26 September 1996

32.Nazeer Chaudhry, Budget and Unemployment , Asas Daily , 20 June 1999

33.Nazeer Ahmad , Time to Shake Hands With India , The Exclusive Weekly, Islamabad, 16 July 1991

34.Nazeer Ahmad , Face Reading : Integration of Forecasting and Prediction Technologies for Solution of Problems , Defense Digest Monthly, October 1992, pp 53-87

35.Nazeer Ahmad, Constitution of Pakistan and Peoples’ rights , 2004

36.Nazeer Ahmad , We can’t Progress Without Science Education, Pakistan Observer Daily, 2 November 1994

37.Nazeer Chaudhry, South Asian Economy and Kashmir , Al Akhbar Daily, 16 October 1999

38.Nazir Ahmad Chaudhry, Peace, Security &Development, Daily Markaz, 17 Agust,1998, Islamabad

39.Nazir Ahmad Chaudhry, Harappa : the cradle of our civilization , Sang-e-Meel Publication,2002

40.N. A. Chaudhry , Modern Technology Impacts of Defence , Pakistan Army Journal , 1994, pp62-74

41.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, June 1999

42.Nazir Ahmad Chaudhry, Multan :glimpses, Sang-e-Meel Publication,2002

43.N.A. Chaudhry , Tourism Development in Pakistan , Friday News Weekly, 6 July 1999

44.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, September 1999

45.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, June 1999

46.Nazir Ahmad Chaudhry, Basanat :a cultural festival of Lahore , Sang-e-Meel Publication,2001

47.Nazir Ahmad , Academic libraries in a developing society ,1984, Sang-e-Meel Publication

48.Nazeer Ahmad , 21st Century Challenges for Our Engineers, Pakistan Observer Daily, 11 December 1994

49.Nazir Ahmad , University library practices in developing countries ,1984, Sang-e-Meel Publication

50.Nazeer Ahmad , New Trends in Energy Generation, Pakistan Observer Daily, 2 November 1994

51.Nazir Ahmad, Oriental presses in the world ,1985, Sang-e-Meel Publication

52.Nazir Ahmad Chaudhry, Eastern Science of Medicine, Pakistan Observer Daily, 18 March 1995

53.N.A. Chaudhry, Kala Bagh Dam , Niwa –i- Waqat Daily, 14 July 1998

54.Nazir Ahmad Chaudhry , Ghulam Rasul Chaudhry , Irrigated Agriculture in Pakistan , Sang-e-Meel Publication,1988

55.Nazeer Chaudhry, Pakistan –US Relations, Markaz Daily 22 July 1998, Islamabad

56.Nazeer Chaudhry, Pakistan –US Relations, Markaz Daily 28 July 1998, Islamabad

57.Nazir Ahmad Chaudhry, Anarkali, archives and tomb of Sahib Jamal : a study in perspective , Sang-e-Meel Publication,2002,

58.Nazir Ahmad Chaudhry, Ground Water Resources in Pakistan, Sang-e-Meel Publication, 1974.Nazeer Chaudhry, Expected Attack on Atomic Instillations Pakistan , Osaf Daily 5June 1998, Islamabad

59.Nazeer Chaudhry, Regional Cooperation and Pakistani Forces, Markaz Daily 30 June 1999, Islamabad

60.Nazeer Chaudhry, Circulation of Money Al Akhbar Daily 17 February 2003, Islamabad

61.Nazeer Chaudhry, Solution of Unemployment Problem , Daily Subha, , 17 April 2004, Islamabad

62.Nazeer Chaudhry, Inflation, Unemployment and Terrorism, Daily Subha, , 9 August 2004, Islamabad

63.Nazeer Chaudhry, Social and Economic Welfare of Society , Daily Ehsas , 6 April 1999, Islamabad

64.Nazeer A. Chaudhry, Strategic Dimension of Pakistan, Submitted to Pakistan Defence Review, 2005

65.Nazeer A. Chaudhry, Solution to Kashmir Problem, Submitted to Pakistan Defence Review

66.Nazeer Chaudhry, How to End Terrorism, Daily Markaz , 8 November 1998 , Islamabad

From: N.A. Chaudhry : My thanks to A. Times for registration . Decrypted Secrets of Harappan Civilization 19oo-1300 B.C. can be used for peace and security in Asia and end of terrorism.Global trade through IVC ( Indus Valley Civilization) worth $7.5 billions and trading of largest oil & gas reserves worth over $ 15 Trillions from central Asia is being blocked because , presnt Asians are not so civlized as compared with the Senate of tragers of Harappan States : Harappa , Mohenjodaro, Dholavera , Lothal and Gedrosia . Dani said during very long interview with me for approval of conclusions on 1st cryptanalysis model on IVC script. ,"South Asia was termed as golden sparrow and every one got the job at his door step . Grains and water was protected and we find best model of social security and protection of human rights.Many scholars tried the kicking mule ( IVC scripts ) to accept the daughter ( any of ancient language like Dravidian , Brahvi, and many others ) or at least to adopt it. Many scholars including Dani, B. B. Lal , Russian Professors , Steve Farmer and Michael from Harvard University , Fairservis and others who confirm our conclusions that we might stop forcing the mule to accept the given daughter. Sunskrit literature evolved in Ganga valley even ignores events like attack by Alender in Indus Valley but the literature evolved in1300-1000 B.C. era according to new dating was made to mention the dried up river Hakrra/ Kangra or Srawati( Mughal -1997) in 1990B.C. as flowing big river. After extensive travelling and research work and spending in 5 years including 7 day journey on helicopter , I conclude that this was excessive floods over 18 recorded by Mark & Possehl and change of coarse by indus that shifted Harappa culture to 2600-1900 B.C. to matured Harappan civilzation. Kot Diji culture (Khan -1965) 3500-2600B.C. was quite diffent culture with differnt mythology motifs and symbols having burials sacrfices and divine god like others. Matured Harappan civilization is different adopting global cult of sun god and King Priest was not a divine god. We are not including methimatical cryptanalysis and we ware not diagreeing to anything.. Dravidian the sopken language was not required to be in written form. Do we have any of local languages in written scripts. The answer on record is no . The oldest culture of stone age is Suma ( Sownan Valley ) 0.5 -2.5 million yera old along with bone of Peking man 0.5 m , Iwaja in Japan , a city under the sea at Indian Gujrat coast , oldest city near dead sea in Jordan and Mehrgarh in Gedrosia of 8000 B.C. We had history as sing subject in oldest culture of the world till 1960s and we have elders using counting system of 20s till 1970s in Suma. According to the research by General Kungham Aryan had left Suma ( the salt range & Kashmir in 1426 B.C. and it was being ruled by Anavas tribe. Aran started arriving around 2500 B.C. in small grups as cattle grazers but they had evolved sunskrit before 1900 B.C. seening a big flowing river Hakra. Dani, Mughal and others call it a seperate river but we call it previous alignment of Indus. The concept of roads and rivers is different for people like us actually moving the troops and their suppies. Let us consider my claim that global trading route and attacking route in South Asia before Grand Trunk road was rougly 10 km wide on both sides of G.T. road. Any one who disagree is posted as logistic commader. I ask him to move the treasure of Alender 7 tons of god and silver. Eva our VP on control desk give him published data that this treasure required 26000 mules and 5000 camels. One unit is 33 men and you require over dozen units for many purposes . Two camel load is required for one man. Muhammad of Ghazni attack for Somnat had 30000 troops and 2 camels were required for one soldier for water and rations. We requre the grazing grounds for cattle, local labour , water replenshment and replacement for sick animals . We require a herd of cattles for ration. It may requre few months to get the convoy moved after prepration of many months.

The terms Block Cipher and Stream Cipher are borrowed from modern cryptanalysis (1). The methods and maxims of cryptology were reviewed to find the decrypted secrets of Let us take a very simple example of a message to be encrypted 46 words and 252 characters with spaces and 204 without spaces.

 

“His Excellency The King Priest of Harappa State as Chairman of Senate for Global Trading Coordinator in South Asia is pleased to order the new seal and signatures to be taken as final orders for all priests to be enforced from 1 January 1900 B.C. “

 

Let me complement Marshal (1931) , Wheeler (1956), Mackay , Magan, Ghosh, Wolley , Ghosh, Roy (1953), Possel , Tosi (1993), Walter, Fairservis, Sfaffer , Vats(1940), B.B.Lal, Durani(1981), Jacobson, Terome(1986), Kenoyer (1985), Khan F.A.(1965), Ratnagar(1991) and many others who contributed to Indus Valley research. Iravatham Mahadevan seems to be greater scholar when he sys that he could n't decipher the scripts inpite of his over 40 yeras research work. Ahmad Hassan Dani , B.B. Lal and Russian professors are the greates who disagreed to excellent research work by Asko Parpola. Being student of topsecret science Cryptology since childhood , I was associated with code and ciphers. After long discussion with Dani about above researchers and scholars and his work with some of them , we came to the claim of decipherment by Jha N and Rajaram (2000) that I thought the broken seal by Mackay showing rear portion of bull being called hoof of a horse. Dani said smiling , " We am actually Vani from Central Asia hence I would like to apprecite the work by Brahamans ". Then added that government funding is very limited and any effort like the effort of Jha N and Rajaram has to be appreciated but we mightn't agree with decipherment if it is not correct. Then he narrated all the conversation with Parapola and finally he disagreed

   

A Boeing E-3 Sentry "AWACS" (Airborne Warning and Control System) aircraft assigned to Tinker Air Force Base, Okla., tests new hot weather equipment Aug. 19, 2019, at Luke AFB, Ariz. The rotating radar dome, 30 feet in diameter, is held above the fuselage by two struts. The radar subsystem permits surveillance of more than 250 miles from the Earth’s surface up into the stratosphere, over land or water to identify and track friendly and enemy low-flying aircraft.

  

From Wikipedia, the free encyclopedia

 

The Boeing E-3 Sentry, commonly known as AWACS, is an American airborne early warning and control (AEW&C) aircraft developed by Boeing. Derived from the Boeing 707, it provides all-weather surveillance, command, control, and communications, and is used by the United States Air Force, NATO, Royal Air Force, French Air Force, and Royal Saudi Air Force. The E-3 is distinguished by the distinctive rotating radar dome (ROTODOME) above the fuselage. Production ended in 1992 after 68 aircraft had been built.

 

In the mid-1960s, the US Air Force (USAF) was seeking an aircraft to replace its piston-engined Lockheed EC-121 Warning Star, which had been in service for over a decade. After issuing preliminary development contracts to three companies, the USAF picked Boeing to construct two airframes to test Westinghouse Electric and Hughes's competing radars. Both radars used pulse-Doppler technology, with Westinghouse's design emerging as the contract winner. Testing on the first production E-3 began in October 1975.

 

The first USAF E-3 was delivered in March 1977, and during the next seven years, a total of 34 aircraft were manufactured. NATO, as a single identity, also had 18 aircraft manufactured, basing them in Germany. The E-3 was also sold to the United Kingdom (seven) and France (four) and Saudi Arabia (five, plus eight E-3-derived tanker aircraft). In 1991, when the last aircraft had been delivered, E-3s participated in Operation Desert Storm, playing a crucial role of directing coalition aircraft against the enemy. Throughout the aircraft's service life, numerous upgrades were performed to enhance its capabilities. In 1996, Westinghouse Electric's Defense & Electronic Systems division was acquired by Northrop Corporation, before being renamed Northrop Grumman Mission Systems, which currently supports the E-3's radar.

  

Development

 

Background

 

In 1963, the USAF asked for proposals for an Airborne Warning and Control System (AWACS) to replace its EC-121 Warning Stars, which had served in the airborne early warning role for over a decade. The new aircraft would take advantage of improvements in radar technology and in computer aided radar data analysis and data reduction. These developments allowed airborne radars to "look down", detect the movement of low-flying aircraft (see Look-down/shoot-down), and discriminate, even over land, target aircraft's movements—previously this had been impossible, due to the inability to discriminate an aircraft's track from ground clutter. Contracts were issued to Boeing, Douglas, and Lockheed, the latter being eliminated in July 1966. In 1967, a parallel program was put into place to develop the radar, with Westinghouse Electric and Hughes Aircraft being asked to compete in producing the radar system. In 1968, it was referred to as Overland Radar Technology (ORT) during development tests on the modified EC-121Q. The Westinghouse radar antenna was going to be used by whichever company won the radar competition, since Westinghouse had pioneered in the design of high-power RF phase-shifters, which are used to both focus the RF into a pencil beam, and scan electronically for altitude determination.

 

Boeing initially proposed a purpose-built aircraft, but tests indicated it would not outperform the already-operational 707, so the latter was chosen instead. To increase endurance, this design was to be powered by eight General Electric TF34s. It would carry its radar in a rotating dome mounted at the top of a forward-swept tail, above the fuselage. Boeing was selected ahead of McDonnell Douglas's DC-8-based proposal in July 1970. Initial orders were placed for two aircraft, designated EC-137D as test beds to evaluate the two competing radars. As the test-beds did not need the same 14-hour endurance demanded of the production aircraft, the EC-137s retained the Pratt & Whitney JT3D commercial engines, and a later reduction in endurance requirement led to retaining the normal engines in production.

 

The first EC-137 made its maiden flight on 9 February 1972, with the fly-off between the two radars taking place during March–July that year.[5] Favorable test results led to the selection of Westinghouse's radar for the production aircraft. Hughes's radar was initially thought to be a certain winner, simply because much of its design was also going into the new F-15 Eagles radar program. The Westinghouse radar used a pipelined fast Fourier transform (FFT) to digitally resolve 128 Doppler frequencies, while Hughes's radars used analog filters based on the design for the F-15 fighter. Westinghouse's engineering team won this competition by using a programmable 18-bit computer whose software could be modified before each mission. This computer was the AN/AYK-8 design from the B-57G program, and designated AYK-8-EP1 for its much expanded memory. This radar also multiplexed a beyond-the-horizon (BTH) pulse mode that could complement the pulse-Doppler radar mode. This proved to be beneficial especially when the BTH mode is used to detect ships at sea when the radar beam is directed below the horizon.

 

Full-scale development

 

Approval was given on 26 January 1973 for full-scale development of the AWACS system. To allow further development of the aircraft's systems, orders were placed for three preproduction aircraft, the first of which performed its maiden flight in February 1975. To save costs, the endurance requirements were relaxed, allowing the new aircraft to retain the four JT3D (U.S. military designation TF33) engines. IBM and Hazeltine were selected to develop the mission computer and display system. The IBM computer was designated 4PI, and the software was written in JOVIAL. A Semi-Automatic Ground Environment (SAGE) or back-up interceptor control (BUIC) operator would immediately be at home with the track displays and tabular displays, but differences in symbology would create compatibility problems in tactical ground radar systems in Iceland, mainland Europe, and South Korea over Link-11 (TADIL-A).

  

Modifications to the Boeing 707 for the E-3 Sentry included a rotating radar dome (rotodome), uprated hydraulics from 241 to 345 bar (3500 - 5000 PSI) to drive the rotodome, single-point ground refueling, air refueling, and a bail-out tunnel or chute. The original design had two (one forward, and one aft), but the aft bail-out chute was deleted to cut mounting costs. Engineering, test and evaluation began on the first E-3 Sentry in October 1975. Between 1977 and 1992, a total of 68 E-3s were built.

  

Future status

 

Because the Boeing 707 is no longer in production, the E-3 mission package has been fitted into the Boeing E-767 for the Japan Air Self Defense Forces. The E-10 MC2A was intended to replace USAF E-3s—along with the RC-135 and the E-8, but the E-10 program was canceled by the Department of Defense. The USAF is now performing a series of incremental improvements, mainly to avionics, to bring the E-3 up to current standards of performance. Boeing is flight-testing its Block 40/45 E-3s. This modified E-3 contains upgrades of the mission crew and air battle management sections, as well as significantly upgraded electronic equipment.

 

Another program that the Air Force is considering is the "Avionics Modernization Program" (AMP). AMP would equip the E-3s with glass cockpits. The Air Force also wants modified E-3s with jet engines that are more reliable than the original ones, and also with at least 19% higher fuel efficiencies. New turbofan engines would give these E-3s longer ranges, longer time-on-station, and a shorter critical runway length. If the modification is carried out, the E-3s could take off with full fuel loads using runways only 10,000 ft (3,000 m) long, and also at higher ambient temperatures and lower barometric pressures, such as from bases in mountainous areas. The E-8 Joint STARS briefly fitted a test aircraft with the new Pratt & Whitney JT8D-219 turbofans, stated as having one-half the cost of the competing engine, the CFM56, the Air Force is again studying the possibility of replacing the E-3's original turbofan engines with more-efficient ones.

 

NATO intends to extend the operational status of its AWACS until 2035. To comply, fourteen AWACS aircraft will be significantly modified in the Final Lifetime Extension Program (FLEP). Most FLEP modifications will be implemented in the communications and operational systems area e.g. expansion of data capacity, expansion of bandwidth for satellite communications, new encryption equipment, new have quick radios, upgraded mission computing hard- and software and new operator consoles. The supporting groundsystems (mission training center and mission planning and evaluation system) will also be upgraded to the latest configuration. NATO Airborne Early Warning & Control Program Management Agency (NAPMA) is the preparing and executing authority for the FLEP which will be implemented from 2019–2026. To minimize impact on the operational capacity the NAEW&C force commander will be informed in advance. FLEP will be combined with the standard planned higher echelon technical maintenance.

 

Star Trek, First Contact (Paramount, 1996).

youtu.be/wxyZQR2d6yw Trailer

 

youtu.be/GTQzusrfCxc?t=3s

Star Trek - 'Beyond First Contact' The Borg - Making The Movie.

 

Starring Patrick Stewart, Jonathan Frakes, Brent Spiner, LeVar Burton, Michael Dorn, Gates McFadden, Marina Sirtis, Alfre Woodard, James Cromwell, Alice Krige, Neal McDonough, Robert Picardo, and Dwight Schultz. Directed by Jonathan Frakes.

 

Captain Jean-Luc Picard awakens from a nightmare about his Borg assimilation experience to an incoming message from Admiral Hayes. Hayes informs Picard that Deep Space Five reported that a colony has been destroyed. Completing the Admiral's sentence, Picard realizes who destroyed the colony — the Borg.

 

Picard calls a meeting and informs his senior officers that their ship has been instructed to patrol the Neutral Zone. Their orders are to protect the area from any possible Romulan uprising during a Borg attack. Despite protests from his officers, Picard remains faithful to his orders and the U.S.S. Enterprise NCC 1701-E begins to patrol the area. Later, Picard regretfully tells Riker that it is his own fault they are stuck in the Neutral Zone. Starfleet believes Picard to be too emotionally involved with the Borg because of his previous assimilation to tactically complete a mission against them.

 

The men return to the bridge to learn that Starfleet has engaged in combat with the Borg. Intercepting messages between the starships, the crew learns that the Federation is losing. Picard, with his Borg experience, knows he can help the fleet. He informs his staff that he will make a decision directly in opposition to Starfleet commands. With no objections from his crew, Captain Picard gives the order and the starship Enterprise sets a course for Earth and the attacking Borg cube.

 

A massive battle ensues and it appears that the Federation will lose the fight. Despite serious structural damage to the Borg cube, their strength does not weaken. Even the U.S.S. Defiant, commanded by Worf, does not appear to be able to turn the tides of the battle. As the starship Defiant is about to ram the Borg ship on a suicide run, the U.S.S. Enterprise beams aboard its crew, including Worf. Picard, having an inside perspective of the Borg and their vessel, focuses the firepower of the fleet on coordinates he knows to be critical. Just as the main ship is destroyed, a spherical escape pod flies out. The sphere creates a temporal vortex, catching the starship Enterprise in its wake. Immune to the paradoxes created by the time travel, the starship's crew learns that Earth at the present time appears to be inhabited entirely by the Borg. The commanding officers realize that the Borg have gone into the past and assimilated Earth, so they follow them back in time to repair the damage the Borg have done.

 

On Earth, over three centuries earlier, a somber Lily Sloane accompanies a stumbling, drunk Zefram Cochrane out of a bar after a night of revelry. Then, Lily notices a fast moving light. She hardly has time to ask what the object is, when the Borg vessel attacks. Back aboard the Enterprise, Picard demands that Data tell him the exact date and location the Borg ship is attacking. The location: central Montana. The date: April 4, 2063 — the day before First Contact. Realizing that the Borg have come to prevent first contact between alien life forms and humans, the crew knows they must stop the Borg and facilitate this exchange. They destroy the Borg sphere, and Dr. Crusher, Captain Picard, Commander Data, Commander Riker, Counselor Troi and other U.S.S. Enterprise crew transport down to Earth to survey the damage.

 

At the Borg attack site in Montana, the crew finds destruction and chaos. They split into groups to search for Cochrane. Data and Picard hunt for Cochrane's warp ship, the Phoenix. There they encounter a very angry and confused Lily, who believes Data and Picard to be members of a coalition that broke the cease-fire after World War III. She shoots at them in a rage, but impervious to bullets, Data approaches Lily. Overcome by fear and radiation, she falls to the ground. Dr. Crusher diagnoses Lily with radiation sickness caused by the damaged Phoenix, and inoculates the entire crew. Against Picard's better judgment, Crusher takes Lily to sickbay. Geordi is called to help repair the warp vessel and Picard becomes intrigued by its historical significance. In this vessel began the future as the world would know it, and the past as Picard remembers it. He reaches out to touch the ship. Data, curious about the human need for tactile reinforcement, attempts to create the same feelings he observes in Picard, but is unsuccessful in duplicating this aspect of humanity.

 

Aboard the ship, two crewmembers are sent to examine unexplained maintenance problems, and both disappear. Picard is called to the ship and discovers that the survivors from the Borg sphere have transported onto the ship and are taking over Deck 16. While Picard arranges teams to fight them, the Borg manipulate the climate of the deck to suit their needs and begin to spread throughout the ship. When the Borg attack sickbay, Crusher, her staff, and Lily escape through a Jeffries tube, thanks to a distraction by the ship's Emergency Medical Hologram. While Crusher leads the group down the passageway, Lily steals away in a different direction.

 

On Earth, Riker finds Troi and Cochrane drunk in a bar. Troi justifies that the only way she could get Cochrane to talk to her was by shooting Tequila with him. Denying her drunken state, Troi offers her professional opinion on Cochrane. She explains, "He's nuts."

 

Picard and his team are tracking the Borg through the starship. As Crusher and her staff find Worf's team, Picard's team encounters the Borg, who have begun to assimilate U.S.S. Enterprise crewmembers. Worf's team engages the Borg in combat, but the enemies adapt to the crew's weapons too quickly to make any difference. The teams are ordered to regroup on Deck 15, but Data is captured. Picard cannot save him, so he quickly crawls into a Jeffries tube to escape. Face to face with Picard, Lily steals his phaser and demands an explanation and escape route. Picard agrees.

 

Geordi shows Cochrane the starship Enterprise through a large telescope on Earth and tries to convince him to launch his vessel the next morning. Geordi glorifies Cochrane by explaining that his ship will make first contact with alien life forms. Humanity will be saved if Cochrane launches his ship. Still drunk, Cochrane agrees.

 

Aboard the ship, the Borg Queen introduces herself to a bound Data, claiming that she is the Collective. Reactivating Data's emotion chip, the Borg begin to graph organic, human skin onto the android's arm. As Data is overcome by this new human sensation of touch, something he never thought possible, the Borg continue their work.

 

Lily and Picard wander through the service deck as the captain attempts to explain what has happened between Lily's time and his own. She begins to calm down until they suddenly run into a Borg-infested area. Quickly escaping in the Holodeck, Picard activates a Dixon Hill program. At a dance, he and Lily try to blend in without being noticed by the Borg. Following the Holodeck's story, Picard searches for Nicky the Nose and takes his machine gun. Killing the Borg with the gun, Picard retrieves the memory chip that contains all of the information the Borg has received. Lily then notices that the two dead Borg were once crewmembers of the U.S.S. Enterprise.

 

Back on Earth, Cochrane keeps hearing what an amazing historical figure he is and begins to question whether or not he wants to go through with the launch. He doubts his own nobility and flees the launch site. Geordi and Riker attempt to catch up with Cochrane in the woods and are forced to stun him with a phaser to return him to the Phoenix.

 

Lily and Picard join the rest of the surviving crew and discover that the Borg are outside of the ship. The retrieved memory chip reveals that they are reconfiguring the main deflector in order to contact the Borg of this century, calling them to Earth to assimilate the planet. Picard, Worf and Lieutenant Hawk put on space suits and venture onto the surface of the starship to stop the Borg.

 

Aware of Data's desire to become human, the Borg Queen offers him the chance to be entirely covered in human flesh and join the Borg, in an attempt to get the encryption codes from Data so she can obtain total control over the U.S.S. Enterprise. Outside the Enterprise, Hawk, Worf and Picard attempt to unlock the deflector dish. Attacked by a Borg, Worf's suit begins to depressurize. Two Borg are killed and Hawk is attacked. As the dish is released, a now-assimilated Hawk attempts to kill Picard. Worf saves the captain, but Hawk is killed. Picard and Worf then destroy the free-floating deflector dish.

 

On Earth, Cochrane explains to Riker that his only motivation for inventing warp travel was money. He never expected to save mankind, become a hero, or be instrumental in the founding of a new civilization. He simply wanted to retire in peace.

 

An argument ensues aboard the Enterprise as the majority of the senior officers believe that they should evacuate the ship, destroying it and the Borg. Picard won't give up, and insists they stay. Challenged by Worf, Picard orders him off the Bridge. Lily follows Picard into his ready room and demands that he explain his obsession with fighting the Borg. Picard declares he won't sacrifice the starship, and swears to finally make the Borg pay for all they've done. Lily quietly and calmly compares Picard to Captain Ahab, forever fighting his white whale — the Borg. Realizing that this fight could only destroy himself and his crew, Picard decides to evacuate the ship. Worf, Picard and Crusher activate the ship's self-destruct sequence. The countdown begins, and the crew leaves in escape pods. Picard surveys his ship and prepares to leave when he hears Data calling him.

 

Meanwhile , the earth-bound crew and Cochrane begin takeoff. Cochrane, Geordi and Riker take off in the Phoenix, and with music blaring, the three men launch successfully into orbit.

 

On the ship, Lily and Picard say good-bye and the captain goes to save Data. Entering Engineering, Picard confronts the Borg Queen, whom he knows from his experience with the Borg. The queen reminds Picard that it was not enough that he was assimilated, but that he needed to give himself freely to the Borg — she wished him to stand by her side as an equal to further the power of the Collective. Picard offers himself in exchange for Data, but the android does not comply. He refuses to leave, and at the queen's command, disarms the self-destruct sequence. He quickly enters the encryption codes, offering full control of the Enterprise to the Borg.

 

As Cochrane's ship nears warp, Data arms the U.S.S Enterprise's weapons and aims them at the defenseless Phoenix. At the Borg Queen's order, Data fires, but the missiles fail to hit the Phoenix. His deception of the Borg complete, Data smashes a conduit, releasing a gas that floods engineering, killing all organic material. As the Borg are destroyed, Picard climbs to safety and the Borg Queen falls into the deadly gas. With the Borg threat gone, Cochrane safely completes humanity's first warp flight.

 

Celebrating the flight back on Earth that night, Cochrane and the Enterprise crew see an alien ship land nearby. The doors open, and Zefram Cochrane makes Earth's first contact with an alien race — the Vulcans. Picard and his crew beam out, having witnessed this historic event, and the U.S.S Enterprise NCC 1701-E returns to the 24th century.

 

The loss of communications during a nuclear war was a very real threat and United States’ National Command Authority needed to be able to maintain communications with the triad of strategic nuclear weapon delivery systems during such an event. Their solution was a series of survivable airborne communication links whose primary mission was to relay signals from a command plane to the strategic forces. The system, named TACAMO (“Take Charge and Move Out”), uses verification, modulations, and encryption techniques across virtually every radio frequency from very-low frequency (VLF) up through super-high frequency (SHF)

 

In this image, an EC-130G (a modified C-130E) of the Fleet Air Reconnaissance Squadron 4 (VQ-4 “Shadows”) at Naval Air Station (NAS) Patuxent River, Maryland, performs tests over along the Barrier Islands on east coast of the United States. It is designed as an Airborne Battlefield Command and Control Center (ABCCC) for the United States Air Force and Navy. The Navy’s TACAMO variant was fitted with VLF transmitters to provide communications with ballistic missile submarines.

psyconnecthing.com

 

Web, Design,Dizajn,Internet,Prezentacije,Izrada,Povoljno,Jeftino,Sajta,Sajtova,Vizit,Kartice,Business,Card,PHP,MySQL,HTML,XHTML,HTML5,CSS,JS,Turtorials,Graphic,Photoshop,PSD,Priprema,Stampanje,Stampa,Color,Development,Programiranje,Excample,Download,Best,Facebook,Aplikacije Resenja,Tekst,Obrada,Slike,Reci,Dela,Ruka,Majstora,Mehanicki,Twitter,MySpace,Drustvo,Znanje,Ucenje,Napredovanje,Musrerije,Kupci,Posao,Zarada,Prihodi,Povecanje,Novac,Ulaganje,Kes,Lova,Pribor,Graficki,Grafika,Reklame,Reklama,Oglas,Psy,Connect,Hing,SEO,Optimizacija, Design Arts, Internet, Making Money, News, Webmaster, Technology, Computer, Business, Education, Business & Economy, Marketing and Advertising, Publishing Industries, News and Media, Business Cards, Flyers, For Sale, Building and Construction, Video Editing, Webmastering, Article Directories, Communications and Networking, Computers and Technology Weblogs, Contests, Countries, Cultures, and Groups, Design and Development, Design Services, Beauty, Finance, Electronics, Domain Names, Graphics, Information Technology, Macintosh, Multimedia, Operating Systems, Programming and Development, Script Services, Search Engine Optimization, Security and Encryption, Service Providers (ISP), Databases, eCommerce, Email, Tools, Web Browsers, Telecommunications, Tools & Resources, Internet and Web Skills, Web Directories, URL Services, Directory Templates, Directory Blogs, Directories of Directories, Shopping, Web Hosting, Link Building, FAQs, Forums, Domain Name Registration, Deep Web, HTML, HTTP, Magazines, JavaScript, Organizations, Searching the Web, Servers, Site Development, Site Announcement and Promotion, Statistics and Demographics, XML, Portals, Academic Competitions, Business to Business, Education Weblogs, Special Education, Genres, Movies, Music, Booksellers, Travel, Europe, Africa, Asia, Australia, Canada, Hong Kong, Ireland, New Zealand, North America, South America, United Kingdom, English Language Usage, Maps, Standards, Computer Science, Energy, Ecology, Engineering, Computer Games, Crafts, Electronics and Electrical Components, Publications, Internet Access, Wallpapers, People, Work, Women, Social Sciences, Men, Language and Linguistics, Society

Bletchley Park

 

Lady Grey 400 iso 35mm

Pentax Espio 928

No Crop, No Filter, No Post Production.

 

Alan Turing, was a very important British mathematician and logician who helped to decode the encryption of German Enigma machines during the Second World War. And on this day of June 5th 2024, on the Eve of remembering the importance of D-Day June 6th 1944 in Europe, 80 years ago. I wish to remember and honor Alan, and his absolutely crucial work along with his colleagues at Bletchley Park, Codebreaking in WWII.

 

Considered the father of Modern Computer Science. Alan's genius along with his colleagues, was estimated to have saved the lives of thousands of people and helped to shortened World War II by 2-4 years.

 

This Hero who fought to end fascism in Europe, ended up facing it on his very own doorstep in Britain in 1952. When he was arrested and prosecuted for being homosexual. In 1954, heartbreakingly, this incredible person with this genius brain would take his own life due to no longer being able to take the sheer evil and cruelty he encountered by forced chemical castration.

 

I will forever be disgusted by what the Government of 1950s Britain did to this man, and hundreds-thousands just like him for simply just being his true authentic self. Wanting to live in peace, as he SO deserved. Like everyone does.

 

R.I.P Alan, and Thank you, for the freedoms I enjoy today, that I really wish you'd of had too.

Star Trek, First Contact (Paramount, 1996).

youtu.be/wxyZQR2d6yw Trailer

 

youtu.be/GTQzusrfCxc?t=3s

Star Trek - 'Beyond First Contact' The Borg - Making The Movie.

 

Starring Patrick Stewart, Jonathan Frakes, Brent Spiner, LeVar Burton, Michael Dorn, Gates McFadden, Marina Sirtis, Alfre Woodard, James Cromwell, Alice Krige, Neal McDonough, Robert Picardo, and Dwight Schultz. Directed by Jonathan Frakes.

 

Captain Jean-Luc Picard awakens from a nightmare about his Borg assimilation experience to an incoming message from Admiral Hayes. Hayes informs Picard that Deep Space Five reported that a colony has been destroyed. Completing the Admiral's sentence, Picard realizes who destroyed the colony — the Borg.

 

Picard calls a meeting and informs his senior officers that their ship has been instructed to patrol the Neutral Zone. Their orders are to protect the area from any possible Romulan uprising during a Borg attack. Despite protests from his officers, Picard remains faithful to his orders and the U.S.S. Enterprise NCC 1701-E begins to patrol the area. Later, Picard regretfully tells Riker that it is his own fault they are stuck in the Neutral Zone. Starfleet believes Picard to be too emotionally involved with the Borg because of his previous assimilation to tactically complete a mission against them.

 

The men return to the bridge to learn that Starfleet has engaged in combat with the Borg. Intercepting messages between the starships, the crew learns that the Federation is losing. Picard, with his Borg experience, knows he can help the fleet. He informs his staff that he will make a decision directly in opposition to Starfleet commands. With no objections from his crew, Captain Picard gives the order and the starship Enterprise sets a course for Earth and the attacking Borg cube.

 

A massive battle ensues and it appears that the Federation will lose the fight. Despite serious structural damage to the Borg cube, their strength does not weaken. Even the U.S.S. Defiant, commanded by Worf, does not appear to be able to turn the tides of the battle. As the starship Defiant is about to ram the Borg ship on a suicide run, the U.S.S. Enterprise beams aboard its crew, including Worf. Picard, having an inside perspective of the Borg and their vessel, focuses the firepower of the fleet on coordinates he knows to be critical. Just as the main ship is destroyed, a spherical escape pod flies out. The sphere creates a temporal vortex, catching the starship Enterprise in its wake. Immune to the paradoxes created by the time travel, the starship's crew learns that Earth at the present time appears to be inhabited entirely by the Borg. The commanding officers realize that the Borg have gone into the past and assimilated Earth, so they follow them back in time to repair the damage the Borg have done.

 

On Earth, over three centuries earlier, a somber Lily Sloane accompanies a stumbling, drunk Zefram Cochrane out of a bar after a night of revelry. Then, Lily notices a fast moving light. She hardly has time to ask what the object is, when the Borg vessel attacks. Back aboard the Enterprise, Picard demands that Data tell him the exact date and location the Borg ship is attacking. The location: central Montana. The date: April 4, 2063 — the day before First Contact. Realizing that the Borg have come to prevent first contact between alien life forms and humans, the crew knows they must stop the Borg and facilitate this exchange. They destroy the Borg sphere, and Dr. Crusher, Captain Picard, Commander Data, Commander Riker, Counselor Troi and other U.S.S. Enterprise crew transport down to Earth to survey the damage.

 

At the Borg attack site in Montana, the crew finds destruction and chaos. They split into groups to search for Cochrane. Data and Picard hunt for Cochrane's warp ship, the Phoenix. There they encounter a very angry and confused Lily, who believes Data and Picard to be members of a coalition that broke the cease-fire after World War III. She shoots at them in a rage, but impervious to bullets, Data approaches Lily. Overcome by fear and radiation, she falls to the ground. Dr. Crusher diagnoses Lily with radiation sickness caused by the damaged Phoenix, and inoculates the entire crew. Against Picard's better judgment, Crusher takes Lily to sickbay. Geordi is called to help repair the warp vessel and Picard becomes intrigued by its historical significance. In this vessel began the future as the world would know it, and the past as Picard remembers it. He reaches out to touch the ship. Data, curious about the human need for tactile reinforcement, attempts to create the same feelings he observes in Picard, but is unsuccessful in duplicating this aspect of humanity.

 

Aboard the ship, two crewmembers are sent to examine unexplained maintenance problems, and both disappear. Picard is called to the ship and discovers that the survivors from the Borg sphere have transported onto the ship and are taking over Deck 16. While Picard arranges teams to fight them, the Borg manipulate the climate of the deck to suit their needs and begin to spread throughout the ship. When the Borg attack sickbay, Crusher, her staff, and Lily escape through a Jeffries tube, thanks to a distraction by the ship's Emergency Medical Hologram. While Crusher leads the group down the passageway, Lily steals away in a different direction.

 

On Earth, Riker finds Troi and Cochrane drunk in a bar. Troi justifies that the only way she could get Cochrane to talk to her was by shooting Tequila with him. Denying her drunken state, Troi offers her professional opinion on Cochrane. She explains, "He's nuts."

 

Picard and his team are tracking the Borg through the starship. As Crusher and her staff find Worf's team, Picard's team encounters the Borg, who have begun to assimilate U.S.S. Enterprise crewmembers. Worf's team engages the Borg in combat, but the enemies adapt to the crew's weapons too quickly to make any difference. The teams are ordered to regroup on Deck 15, but Data is captured. Picard cannot save him, so he quickly crawls into a Jeffries tube to escape. Face to face with Picard, Lily steals his phaser and demands an explanation and escape route. Picard agrees.

 

Geordi shows Cochrane the starship Enterprise through a large telescope on Earth and tries to convince him to launch his vessel the next morning. Geordi glorifies Cochrane by explaining that his ship will make first contact with alien life forms. Humanity will be saved if Cochrane launches his ship. Still drunk, Cochrane agrees.

 

Aboard the ship, the Borg Queen introduces herself to a bound Data, claiming that she is the Collective. Reactivating Data's emotion chip, the Borg begin to graph organic, human skin onto the android's arm. As Data is overcome by this new human sensation of touch, something he never thought possible, the Borg continue their work.

 

Lily and Picard wander through the service deck as the captain attempts to explain what has happened between Lily's time and his own. She begins to calm down until they suddenly run into a Borg-infested area. Quickly escaping in the Holodeck, Picard activates a Dixon Hill program. At a dance, he and Lily try to blend in without being noticed by the Borg. Following the Holodeck's story, Picard searches for Nicky the Nose and takes his machine gun. Killing the Borg with the gun, Picard retrieves the memory chip that contains all of the information the Borg has received. Lily then notices that the two dead Borg were once crewmembers of the U.S.S. Enterprise.

 

Back on Earth, Cochrane keeps hearing what an amazing historical figure he is and begins to question whether or not he wants to go through with the launch. He doubts his own nobility and flees the launch site. Geordi and Riker attempt to catch up with Cochrane in the woods and are forced to stun him with a phaser to return him to the Phoenix.

 

Lily and Picard join the rest of the surviving crew and discover that the Borg are outside of the ship. The retrieved memory chip reveals that they are reconfiguring the main deflector in order to contact the Borg of this century, calling them to Earth to assimilate the planet. Picard, Worf and Lieutenant Hawk put on space suits and venture onto the surface of the starship to stop the Borg.

 

Aware of Data's desire to become human, the Borg Queen offers him the chance to be entirely covered in human flesh and join the Borg, in an attempt to get the encryption codes from Data so she can obtain total control over the U.S.S. Enterprise. Outside the Enterprise, Hawk, Worf and Picard attempt to unlock the deflector dish. Attacked by a Borg, Worf's suit begins to depressurize. Two Borg are killed and Hawk is attacked. As the dish is released, a now-assimilated Hawk attempts to kill Picard. Worf saves the captain, but Hawk is killed. Picard and Worf then destroy the free-floating deflector dish.

 

On Earth, Cochrane explains to Riker that his only motivation for inventing warp travel was money. He never expected to save mankind, become a hero, or be instrumental in the founding of a new civilization. He simply wanted to retire in peace.

 

An argument ensues aboard the Enterprise as the majority of the senior officers believe that they should evacuate the ship, destroying it and the Borg. Picard won't give up, and insists they stay. Challenged by Worf, Picard orders him off the Bridge. Lily follows Picard into his ready room and demands that he explain his obsession with fighting the Borg. Picard declares he won't sacrifice the starship, and swears to finally make the Borg pay for all they've done. Lily quietly and calmly compares Picard to Captain Ahab, forever fighting his white whale — the Borg. Realizing that this fight could only destroy himself and his crew, Picard decides to evacuate the ship. Worf, Picard and Crusher activate the ship's self-destruct sequence. The countdown begins, and the crew leaves in escape pods. Picard surveys his ship and prepares to leave when he hears Data calling him.

 

Meanwhile , the earth-bound crew and Cochrane begin takeoff. Cochrane, Geordi and Riker take off in the Phoenix, and with music blaring, the three men launch successfully into orbit.

 

On the ship, Lily and Picard say good-bye and the captain goes to save Data. Entering Engineering, Picard confronts the Borg Queen, whom he knows from his experience with the Borg. The queen reminds Picard that it was not enough that he was assimilated, but that he needed to give himself freely to the Borg — she wished him to stand by her side as an equal to further the power of the Collective. Picard offers himself in exchange for Data, but the android does not comply. He refuses to leave, and at the queen's command, disarms the self-destruct sequence. He quickly enters the encryption codes, offering full control of the Enterprise to the Borg.

 

As Cochrane's ship nears warp, Data arms the U.S.S Enterprise's weapons and aims them at the defenseless Phoenix. At the Borg Queen's order, Data fires, but the missiles fail to hit the Phoenix. His deception of the Borg complete, Data smashes a conduit, releasing a gas that floods engineering, killing all organic material. As the Borg are destroyed, Picard climbs to safety and the Borg Queen falls into the deadly gas. With the Borg threat gone, Cochrane safely completes humanity's first warp flight.

 

Celebrating the flight back on Earth that night, Cochrane and the Enterprise crew see an alien ship land nearby. The doors open, and Zefram Cochrane makes Earth's first contact with an alien race — the Vulcans. Picard and his crew beam out, having witnessed this historic event, and the U.S.S Enterprise NCC 1701-E returns to the 24th century.

 

Star Trek, First Contact (Paramount, 1996).

youtu.be/wxyZQR2d6yw Trailer

 

youtu.be/GTQzusrfCxc?t=3s

Star Trek - 'Beyond First Contact' The Borg - Making The Movie.

 

Starring Patrick Stewart, Jonathan Frakes, Brent Spiner, LeVar Burton, Michael Dorn, Gates McFadden, Marina Sirtis, Alfre Woodard, James Cromwell, Alice Krige, Neal McDonough, Robert Picardo, and Dwight Schultz. Directed by Jonathan Frakes.

 

Captain Jean-Luc Picard awakens from a nightmare about his Borg assimilation experience to an incoming message from Admiral Hayes. Hayes informs Picard that Deep Space Five reported that a colony has been destroyed. Completing the Admiral's sentence, Picard realizes who destroyed the colony — the Borg.

 

Picard calls a meeting and informs his senior officers that their ship has been instructed to patrol the Neutral Zone. Their orders are to protect the area from any possible Romulan uprising during a Borg attack. Despite protests from his officers, Picard remains faithful to his orders and the U.S.S. Enterprise NCC 1701-E begins to patrol the area. Later, Picard regretfully tells Riker that it is his own fault they are stuck in the Neutral Zone. Starfleet believes Picard to be too emotionally involved with the Borg because of his previous assimilation to tactically complete a mission against them.

 

The men return to the bridge to learn that Starfleet has engaged in combat with the Borg. Intercepting messages between the starships, the crew learns that the Federation is losing. Picard, with his Borg experience, knows he can help the fleet. He informs his staff that he will make a decision directly in opposition to Starfleet commands. With no objections from his crew, Captain Picard gives the order and the starship Enterprise sets a course for Earth and the attacking Borg cube.

 

A massive battle ensues and it appears that the Federation will lose the fight. Despite serious structural damage to the Borg cube, their strength does not weaken. Even the U.S.S. Defiant, commanded by Worf, does not appear to be able to turn the tides of the battle. As the starship Defiant is about to ram the Borg ship on a suicide run, the U.S.S. Enterprise beams aboard its crew, including Worf. Picard, having an inside perspective of the Borg and their vessel, focuses the firepower of the fleet on coordinates he knows to be critical. Just as the main ship is destroyed, a spherical escape pod flies out. The sphere creates a temporal vortex, catching the starship Enterprise in its wake. Immune to the paradoxes created by the time travel, the starship's crew learns that Earth at the present time appears to be inhabited entirely by the Borg. The commanding officers realize that the Borg have gone into the past and assimilated Earth, so they follow them back in time to repair the damage the Borg have done.

 

On Earth, over three centuries earlier, a somber Lily Sloane accompanies a stumbling, drunk Zefram Cochrane out of a bar after a night of revelry. Then, Lily notices a fast moving light. She hardly has time to ask what the object is, when the Borg vessel attacks. Back aboard the Enterprise, Picard demands that Data tell him the exact date and location the Borg ship is attacking. The location: central Montana. The date: April 4, 2063 — the day before First Contact. Realizing that the Borg have come to prevent first contact between alien life forms and humans, the crew knows they must stop the Borg and facilitate this exchange. They destroy the Borg sphere, and Dr. Crusher, Captain Picard, Commander Data, Commander Riker, Counselor Troi and other U.S.S. Enterprise crew transport down to Earth to survey the damage.

 

At the Borg attack site in Montana, the crew finds destruction and chaos. They split into groups to search for Cochrane. Data and Picard hunt for Cochrane's warp ship, the Phoenix. There they encounter a very angry and confused Lily, who believes Data and Picard to be members of a coalition that broke the cease-fire after World War III. She shoots at them in a rage, but impervious to bullets, Data approaches Lily. Overcome by fear and radiation, she falls to the ground. Dr. Crusher diagnoses Lily with radiation sickness caused by the damaged Phoenix, and inoculates the entire crew. Against Picard's better judgment, Crusher takes Lily to sickbay. Geordi is called to help repair the warp vessel and Picard becomes intrigued by its historical significance. In this vessel began the future as the world would know it, and the past as Picard remembers it. He reaches out to touch the ship. Data, curious about the human need for tactile reinforcement, attempts to create the same feelings he observes in Picard, but is unsuccessful in duplicating this aspect of humanity.

 

Aboard the ship, two crewmembers are sent to examine unexplained maintenance problems, and both disappear. Picard is called to the ship and discovers that the survivors from the Borg sphere have transported onto the ship and are taking over Deck 16. While Picard arranges teams to fight them, the Borg manipulate the climate of the deck to suit their needs and begin to spread throughout the ship. When the Borg attack sickbay, Crusher, her staff, and Lily escape through a Jeffries tube, thanks to a distraction by the ship's Emergency Medical Hologram. While Crusher leads the group down the passageway, Lily steals away in a different direction.

 

On Earth, Riker finds Troi and Cochrane drunk in a bar. Troi justifies that the only way she could get Cochrane to talk to her was by shooting Tequila with him. Denying her drunken state, Troi offers her professional opinion on Cochrane. She explains, "He's nuts."

 

Picard and his team are tracking the Borg through the starship. As Crusher and her staff find Worf's team, Picard's team encounters the Borg, who have begun to assimilate U.S.S. Enterprise crewmembers. Worf's team engages the Borg in combat, but the enemies adapt to the crew's weapons too quickly to make any difference. The teams are ordered to regroup on Deck 15, but Data is captured. Picard cannot save him, so he quickly crawls into a Jeffries tube to escape. Face to face with Picard, Lily steals his phaser and demands an explanation and escape route. Picard agrees.

 

Geordi shows Cochrane the starship Enterprise through a large telescope on Earth and tries to convince him to launch his vessel the next morning. Geordi glorifies Cochrane by explaining that his ship will make first contact with alien life forms. Humanity will be saved if Cochrane launches his ship. Still drunk, Cochrane agrees.

 

Aboard the ship, the Borg Queen introduces herself to a bound Data, claiming that she is the Collective. Reactivating Data's emotion chip, the Borg begin to graph organic, human skin onto the android's arm. As Data is overcome by this new human sensation of touch, something he never thought possible, the Borg continue their work.

 

Lily and Picard wander through the service deck as the captain attempts to explain what has happened between Lily's time and his own. She begins to calm down until they suddenly run into a Borg-infested area. Quickly escaping in the Holodeck, Picard activates a Dixon Hill program. At a dance, he and Lily try to blend in without being noticed by the Borg. Following the Holodeck's story, Picard searches for Nicky the Nose and takes his machine gun. Killing the Borg with the gun, Picard retrieves the memory chip that contains all of the information the Borg has received. Lily then notices that the two dead Borg were once crewmembers of the U.S.S. Enterprise.

 

Back on Earth, Cochrane keeps hearing what an amazing historical figure he is and begins to question whether or not he wants to go through with the launch. He doubts his own nobility and flees the launch site. Geordi and Riker attempt to catch up with Cochrane in the woods and are forced to stun him with a phaser to return him to the Phoenix.

 

Lily and Picard join the rest of the surviving crew and discover that the Borg are outside of the ship. The retrieved memory chip reveals that they are reconfiguring the main deflector in order to contact the Borg of this century, calling them to Earth to assimilate the planet. Picard, Worf and Lieutenant Hawk put on space suits and venture onto the surface of the starship to stop the Borg.

 

Aware of Data's desire to become human, the Borg Queen offers him the chance to be entirely covered in human flesh and join the Borg, in an attempt to get the encryption codes from Data so she can obtain total control over the U.S.S. Enterprise. Outside the Enterprise, Hawk, Worf and Picard attempt to unlock the deflector dish. Attacked by a Borg, Worf's suit begins to depressurize. Two Borg are killed and Hawk is attacked. As the dish is released, a now-assimilated Hawk attempts to kill Picard. Worf saves the captain, but Hawk is killed. Picard and Worf then destroy the free-floating deflector dish.

 

On Earth, Cochrane explains to Riker that his only motivation for inventing warp travel was money. He never expected to save mankind, become a hero, or be instrumental in the founding of a new civilization. He simply wanted to retire in peace.

 

An argument ensues aboard the Enterprise as the majority of the senior officers believe that they should evacuate the ship, destroying it and the Borg. Picard won't give up, and insists they stay. Challenged by Worf, Picard orders him off the Bridge. Lily follows Picard into his ready room and demands that he explain his obsession with fighting the Borg. Picard declares he won't sacrifice the starship, and swears to finally make the Borg pay for all they've done. Lily quietly and calmly compares Picard to Captain Ahab, forever fighting his white whale — the Borg. Realizing that this fight could only destroy himself and his crew, Picard decides to evacuate the ship. Worf, Picard and Crusher activate the ship's self-destruct sequence. The countdown begins, and the crew leaves in escape pods. Picard surveys his ship and prepares to leave when he hears Data calling him.

 

Meanwhile , the earth-bound crew and Cochrane begin takeoff. Cochrane, Geordi and Riker take off in the Phoenix, and with music blaring, the three men launch successfully into orbit.

 

On the ship, Lily and Picard say good-bye and the captain goes to save Data. Entering Engineering, Picard confronts the Borg Queen, whom he knows from his experience with the Borg. The queen reminds Picard that it was not enough that he was assimilated, but that he needed to give himself freely to the Borg — she wished him to stand by her side as an equal to further the power of the Collective. Picard offers himself in exchange for Data, but the android does not comply. He refuses to leave, and at the queen's command, disarms the self-destruct sequence. He quickly enters the encryption codes, offering full control of the Enterprise to the Borg.

 

As Cochrane's ship nears warp, Data arms the U.S.S Enterprise's weapons and aims them at the defenseless Phoenix. At the Borg Queen's order, Data fires, but the missiles fail to hit the Phoenix. His deception of the Borg complete, Data smashes a conduit, releasing a gas that floods engineering, killing all organic material. As the Borg are destroyed, Picard climbs to safety and the Borg Queen falls into the deadly gas. With the Borg threat gone, Cochrane safely completes humanity's first warp flight.

 

Celebrating the flight back on Earth that night, Cochrane and the Enterprise crew see an alien ship land nearby. The doors open, and Zefram Cochrane makes Earth's first contact with an alien race — the Vulcans. Picard and his crew beam out, having witnessed this historic event, and the U.S.S Enterprise NCC 1701-E returns to the 24th century.

 

The Enigma machine was a cipher machine used to encrypt and decrypt secret messages.

The Enigma was used commercially from the early 1920s on, and was also adopted by the military and governmental services of a number of nations—most famously by Nazi Germany before and during World War II.

 

enigmaco.de/enigma/enigma.html

ISO 27001 ISMS Training Videos By Luv Johar

 

Security policy, Organization of information security, Asset management, Human resources security, Physical and environmental security, Communications and operations management, Access control, Information systems acquisition, development and maintenance, Information security incident management, Business continuity management, Regulatory compliance, Lead Auditors, Information Security Professionals, CTO, CISO, Ransomeware, Ransomeware virus, ransomeware attack, what is ransomeware, mac ransomeware, windows ransomeware, anti ransomeware, computer virus, encryption, malware, virus, infection agent, bitcoin, security, wannacry ransomeware, wanna cry, virus wannacry, wannacry patch, cyber attack, wannacry attack, wanna cry attack, ransomware meaning, ransomeware attacks, ransomeware prevention, ransomeware removal, ransomeware awareness, ransomeware antivirus, isms security, isms audit, isms implementation, isms 27001, isms scope, isms training, isms video, isms risk, isms policy, isms iso 27001, isms awareness training, Isms certification, ISMS audit, isms meaning, isms full form, isms policy, isms stands for, isms 27001, isms awareness, isms security, isms auditor, isms awareness trainings, isms audit reports, isms benefits, isms controls, isms checklist, isms clauses, isms trainings, isms course, isms documentation, isms documents list, isms define, isms explained, isms 27001 controls, isms 27001 manuals, isms 27001 audits, isms standards, isms 27001 standards, isms bestpractices, isms audit checklist, isms governance framework,Iso 27001 lead auditor training videos, iso 27001 tutorials, iso 27001 controls, iso 27001 implementation, iso 27001 risk assessment, iso 27001 lead implementer, iso 27001 lead auditor, iso 27001 lead implementer training, iso 27001 training, iso 27001 audit, iso 27001, iso 27001 awareness presentation, iso 27001 auditing checklist, iso 27001 bcm, iso 27001 business continuity, iso 27001 basics, iso 27001 certification, iso 27001 cbt nuggets, iso 27001 cryptography, iso 27001 certification guide, iso 27001, case study, iso 27001 context of the organization, iso 27001 documentation templates, iso 27001 exam, iso 27001 exam explained, iso 27001 free training, iso 27001 for beginners, iso 27001 foundation, iso 27001 framework, iso 27001 introduction, iso 27001 implementation steps, information security courses, information security interview questions, information security policy, information security management system, information security certifications, information security management, information security awareness, information security audit, information security awareness, information security audit checklist, an information security governance framework, an information security policy, an information security threat is, an information security management system, become a information security analyst, a career in information security, what is a information security, what is a information security officer, information security book, information security basics, information security blogs, information security breaches, information security best practices, information security consultant, information security concepts, information security certification in india, information security cia, c.i.a. information security, information security definition, information security domains, information security education and awareness, information security framework, information security forum, information security fundamentals, information security for beginners, information security for dummies, information security governance, information security goals, information security group, information security governance and risk management, information security guidelines, information security glossary, information security goals and objectives, information security handbook, information security interview questions and answers, information security incident, information security is characterized as the preservation of, information security is a matter of building and maintaining, information security incident management, information security importance, information security keywords, information security kpi, information security key points, information security key risk indicators, information security kpi metrics, information security kpi examples, information security key risk indicators examples, information security key performance indicators, information security lifecycle, information security objectives, principles of information security, definition of information security, importance of information security,

From far left to right: Jeff Ratner, Senior Policy Counsel, Apple, Eugene Liderman, Director, Mobile Security Strategy, Google, Kate Tummarello, Policy Manager, Engine, Navroop Mitter, CEO, Armor Text , Tom Gannon, Vice President, Public Policy, Mastercard, and Moderator: Jack Gillum, Senior Reporter, Pro Publica

Star Trek, First Contact (Paramount, 1996).

youtu.be/wxyZQR2d6yw Trailer

 

youtu.be/GTQzusrfCxc?t=3s

Star Trek - 'Beyond First Contact' The Borg - Making The Movie.

 

Starring Patrick Stewart, Jonathan Frakes, Brent Spiner, LeVar Burton, Michael Dorn, Gates McFadden, Marina Sirtis, Alfre Woodard, James Cromwell, Alice Krige, Neal McDonough, Robert Picardo, and Dwight Schultz. Directed by Jonathan Frakes.

 

Captain Jean-Luc Picard awakens from a nightmare about his Borg assimilation experience to an incoming message from Admiral Hayes. Hayes informs Picard that Deep Space Five reported that a colony has been destroyed. Completing the Admiral's sentence, Picard realizes who destroyed the colony — the Borg.

 

Picard calls a meeting and informs his senior officers that their ship has been instructed to patrol the Neutral Zone. Their orders are to protect the area from any possible Romulan uprising during a Borg attack. Despite protests from his officers, Picard remains faithful to his orders and the U.S.S. Enterprise NCC 1701-E begins to patrol the area. Later, Picard regretfully tells Riker that it is his own fault they are stuck in the Neutral Zone. Starfleet believes Picard to be too emotionally involved with the Borg because of his previous assimilation to tactically complete a mission against them.

 

The men return to the bridge to learn that Starfleet has engaged in combat with the Borg. Intercepting messages between the starships, the crew learns that the Federation is losing. Picard, with his Borg experience, knows he can help the fleet. He informs his staff that he will make a decision directly in opposition to Starfleet commands. With no objections from his crew, Captain Picard gives the order and the starship Enterprise sets a course for Earth and the attacking Borg cube.

 

A massive battle ensues and it appears that the Federation will lose the fight. Despite serious structural damage to the Borg cube, their strength does not weaken. Even the U.S.S. Defiant, commanded by Worf, does not appear to be able to turn the tides of the battle. As the starship Defiant is about to ram the Borg ship on a suicide run, the U.S.S. Enterprise beams aboard its crew, including Worf. Picard, having an inside perspective of the Borg and their vessel, focuses the firepower of the fleet on coordinates he knows to be critical. Just as the main ship is destroyed, a spherical escape pod flies out. The sphere creates a temporal vortex, catching the starship Enterprise in its wake. Immune to the paradoxes created by the time travel, the starship's crew learns that Earth at the present time appears to be inhabited entirely by the Borg. The commanding officers realize that the Borg have gone into the past and assimilated Earth, so they follow them back in time to repair the damage the Borg have done.

 

On Earth, over three centuries earlier, a somber Lily Sloane accompanies a stumbling, drunk Zefram Cochrane out of a bar after a night of revelry. Then, Lily notices a fast moving light. She hardly has time to ask what the object is, when the Borg vessel attacks. Back aboard the Enterprise, Picard demands that Data tell him the exact date and location the Borg ship is attacking. The location: central Montana. The date: April 4, 2063 — the day before First Contact. Realizing that the Borg have come to prevent first contact between alien life forms and humans, the crew knows they must stop the Borg and facilitate this exchange. They destroy the Borg sphere, and Dr. Crusher, Captain Picard, Commander Data, Commander Riker, Counselor Troi and other U.S.S. Enterprise crew transport down to Earth to survey the damage.

 

At the Borg attack site in Montana, the crew finds destruction and chaos. They split into groups to search for Cochrane. Data and Picard hunt for Cochrane's warp ship, the Phoenix. There they encounter a very angry and confused Lily, who believes Data and Picard to be members of a coalition that broke the cease-fire after World War III. She shoots at them in a rage, but impervious to bullets, Data approaches Lily. Overcome by fear and radiation, she falls to the ground. Dr. Crusher diagnoses Lily with radiation sickness caused by the damaged Phoenix, and inoculates the entire crew. Against Picard's better judgment, Crusher takes Lily to sickbay. Geordi is called to help repair the warp vessel and Picard becomes intrigued by its historical significance. In this vessel began the future as the world would know it, and the past as Picard remembers it. He reaches out to touch the ship. Data, curious about the human need for tactile reinforcement, attempts to create the same feelings he observes in Picard, but is unsuccessful in duplicating this aspect of humanity.

 

Aboard the ship, two crewmembers are sent to examine unexplained maintenance problems, and both disappear. Picard is called to the ship and discovers that the survivors from the Borg sphere have transported onto the ship and are taking over Deck 16. While Picard arranges teams to fight them, the Borg manipulate the climate of the deck to suit their needs and begin to spread throughout the ship. When the Borg attack sickbay, Crusher, her staff, and Lily escape through a Jeffries tube, thanks to a distraction by the ship's Emergency Medical Hologram. While Crusher leads the group down the passageway, Lily steals away in a different direction.

 

On Earth, Riker finds Troi and Cochrane drunk in a bar. Troi justifies that the only way she could get Cochrane to talk to her was by shooting Tequila with him. Denying her drunken state, Troi offers her professional opinion on Cochrane. She explains, "He's nuts."

 

Picard and his team are tracking the Borg through the starship. As Crusher and her staff find Worf's team, Picard's team encounters the Borg, who have begun to assimilate U.S.S. Enterprise crewmembers. Worf's team engages the Borg in combat, but the enemies adapt to the crew's weapons too quickly to make any difference. The teams are ordered to regroup on Deck 15, but Data is captured. Picard cannot save him, so he quickly crawls into a Jeffries tube to escape. Face to face with Picard, Lily steals his phaser and demands an explanation and escape route. Picard agrees.

 

Geordi shows Cochrane the starship Enterprise through a large telescope on Earth and tries to convince him to launch his vessel the next morning. Geordi glorifies Cochrane by explaining that his ship will make first contact with alien life forms. Humanity will be saved if Cochrane launches his ship. Still drunk, Cochrane agrees.

 

Aboard the ship, the Borg Queen introduces herself to a bound Data, claiming that she is the Collective. Reactivating Data's emotion chip, the Borg begin to graph organic, human skin onto the android's arm. As Data is overcome by this new human sensation of touch, something he never thought possible, the Borg continue their work.

 

Lily and Picard wander through the service deck as the captain attempts to explain what has happened between Lily's time and his own. She begins to calm down until they suddenly run into a Borg-infested area. Quickly escaping in the Holodeck, Picard activates a Dixon Hill program. At a dance, he and Lily try to blend in without being noticed by the Borg. Following the Holodeck's story, Picard searches for Nicky the Nose and takes his machine gun. Killing the Borg with the gun, Picard retrieves the memory chip that contains all of the information the Borg has received. Lily then notices that the two dead Borg were once crewmembers of the U.S.S. Enterprise.

 

Back on Earth, Cochrane keeps hearing what an amazing historical figure he is and begins to question whether or not he wants to go through with the launch. He doubts his own nobility and flees the launch site. Geordi and Riker attempt to catch up with Cochrane in the woods and are forced to stun him with a phaser to return him to the Phoenix.

 

Lily and Picard join the rest of the surviving crew and discover that the Borg are outside of the ship. The retrieved memory chip reveals that they are reconfiguring the main deflector in order to contact the Borg of this century, calling them to Earth to assimilate the planet. Picard, Worf and Lieutenant Hawk put on space suits and venture onto the surface of the starship to stop the Borg.

 

Aware of Data's desire to become human, the Borg Queen offers him the chance to be entirely covered in human flesh and join the Borg, in an attempt to get the encryption codes from Data so she can obtain total control over the U.S.S. Enterprise. Outside the Enterprise, Hawk, Worf and Picard attempt to unlock the deflector dish. Attacked by a Borg, Worf's suit begins to depressurize. Two Borg are killed and Hawk is attacked. As the dish is released, a now-assimilated Hawk attempts to kill Picard. Worf saves the captain, but Hawk is killed. Picard and Worf then destroy the free-floating deflector dish.

 

On Earth, Cochrane explains to Riker that his only motivation for inventing warp travel was money. He never expected to save mankind, become a hero, or be instrumental in the founding of a new civilization. He simply wanted to retire in peace.

 

An argument ensues aboard the Enterprise as the majority of the senior officers believe that they should evacuate the ship, destroying it and the Borg. Picard won't give up, and insists they stay. Challenged by Worf, Picard orders him off the Bridge. Lily follows Picard into his ready room and demands that he explain his obsession with fighting the Borg. Picard declares he won't sacrifice the starship, and swears to finally make the Borg pay for all they've done. Lily quietly and calmly compares Picard to Captain Ahab, forever fighting his white whale — the Borg. Realizing that this fight could only destroy himself and his crew, Picard decides to evacuate the ship. Worf, Picard and Crusher activate the ship's self-destruct sequence. The countdown begins, and the crew leaves in escape pods. Picard surveys his ship and prepares to leave when he hears Data calling him.

 

Meanwhile , the earth-bound crew and Cochrane begin takeoff. Cochrane, Geordi and Riker take off in the Phoenix, and with music blaring, the three men launch successfully into orbit.

 

On the ship, Lily and Picard say good-bye and the captain goes to save Data. Entering Engineering, Picard confronts the Borg Queen, whom he knows from his experience with the Borg. The queen reminds Picard that it was not enough that he was assimilated, but that he needed to give himself freely to the Borg — she wished him to stand by her side as an equal to further the power of the Collective. Picard offers himself in exchange for Data, but the android does not comply. He refuses to leave, and at the queen's command, disarms the self-destruct sequence. He quickly enters the encryption codes, offering full control of the Enterprise to the Borg.

 

As Cochrane's ship nears warp, Data arms the U.S.S Enterprise's weapons and aims them at the defenseless Phoenix. At the Borg Queen's order, Data fires, but the missiles fail to hit the Phoenix. His deception of the Borg complete, Data smashes a conduit, releasing a gas that floods engineering, killing all organic material. As the Borg are destroyed, Picard climbs to safety and the Borg Queen falls into the deadly gas. With the Borg threat gone, Cochrane safely completes humanity's first warp flight.

 

Celebrating the flight back on Earth that night, Cochrane and the Enterprise crew see an alien ship land nearby. The doors open, and Zefram Cochrane makes Earth's first contact with an alien race — the Vulcans. Picard and his crew beam out, having witnessed this historic event, and the U.S.S Enterprise NCC 1701-E returns to the 24th century.

 

Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting. The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

I was asked to shoot a couple of photos of Vera. We connected really well and it turned into a two hour photo-shoot in which we had great fun driving around the hackerspace and Buitenplaats Koningsweg compound looking for shooting locations during golden hour.

Beneath Bishop’s Bridge Road, halfway between Sheldon Square and the entrance to Paddington underground station, you’ll find an intriguing work of art. Curated by Futurecity on behalf of British Land, this permanent installation is a collaboration between United Visual Artists and poet Nick Drake.

 

Alan Turing is one of Paddington’s most famous sons. This artwork, Message From the Unseen World, celebrates his groundbreaking work on artificial intelligence. Its outer shell comprises aluminium panels, punctuated with holes. LED lights shine through the holes, forming the words to Drake’s poem. A Turing-inspired algorithm shuffles through the poem, creating new interpretations of the verse.

 

You can see the full poem below.

 

MESSAGE FROM THE UNSEEN WORLD

 

Nick Drake

 

This is Alan speaking

to you who pass by this bridge

in the enchantment of time

under the echoing arch

over the mirror of water

on your way to work or home

and to other places in the infinity

held in the secret dream cave

of your mysterious minds

 

This is Alan speaking

through this interface with time and space

I am the ghost in the universal machine

the one I dreamed as I lay on the grass

that grew in the green of lost time

of a meadow in Grantchester alone

thinking about whoever I was in love with at the time

and the unchanging truth of numbers

in their beautiful equations

and the enigma of human beings

in their infinite possible configurations -

I was puzzling the problem of the apple

of the knowledge of good and evil -

For on that day you eat of it

you shall surely die

but the winding snake

the only creature coded as a question

looked me in the eye and asked

in his intelligent high voice -

 

What’s wrong with this picture?

Why do starfish have five arms

and why are they fish not stars?

What connects stars and grains of sand?

What is the secret ciphered in a fir cone?

Why is the heart always on the left?

Natural wonders every child should know…

 

He smiled like the flickering pages of a book -

Christopher, my first true love, appeared

his beautiful fingers blue with ink

holding his telescope and the star globe

I made him as a present -

We lay side by side

looking through the window at the stars

naming the constellations

as they wheeled across the night

The maths brain lies often awake in his bed

Doing logs to ten places and trig in his head

When I woke in the shock of light

he was gone

and nothing was ever the same again

 

What happens to the dead

when spirit separates from matter?

Is time a river ever giving birth

in an endless wheel?

Why is loss always incalculable?

What is the heart’s square root,

its point and infinite recurrences?

 

This is Alan speaking

perhaps you wish to hear about the task

of deciphering the Enigma messages?

It was the impossible before breakfast

to imagine the unimaginable

the day after war was declared -

but a logical theorem says

you can deduce everything from a contradiction

so we imagined a cryptanalytic machine

an electric brain ticking away

to solve the insoluble

to sort the irrelevant from the essential

to discover the heart of the mystery

in thousands of meaningless signals every day

enciphered and sent by the enemy

in billions of different possible combinations -

like reading a poem written in random static

in wind and rain and dark

threaded with the dot and dash of Morse

encrypted transmitted transcribed

but there was one clue -

a letter was never enciphered as itself

so that was the starting point

to find the letters that made the only word

that helped to save ships and lives

in the middle of the Atlantic

and some say win the war -

We kept hush hush but I wondered

 

Could a machine be intelligent and if so how?

Could a machine be fascinated by another machine?

Could machines talk to each other?

Could a machine experience delight

and suffer fear and jealousy?

If a machine could dream what would it dream

in the forest of the night?

Could a machine fall sick or fall in love?

Could a machine imagine the future?

 

This is Alan speaking

we devised the Automatic Computing Engine

capable of calculating anything

quantified in an algorithm

and that was the basis of the future -

But how is it I found myself

a stranger in a room alone

a sequence of contradictory instructions

coded into my criminal heart?

Of gross indecency accused

I replied truthfully

Englishman atheist mathematician

Order of the British Empire

Recreations listed in Who’s Who

chess long-distance running gardening

(the last a kind of lie, I like wild flowers) -

Homosexual cryptographer

noble in reason or traitor in his bones?

Unable to say a word of what I knew

unable to speak the unspeakable

secret within the secret

I felt no guilt -

They offered me a choice

Prison or probation

with hormonal emasculation -

I made my decision

and emerged a different man

 

Why does nothing happen for a long time

Then everything suddenly changes?

Why does the rational give rise to the irrational?

Who is this man kissing me on the mouth?

Is he telling truth or lies?

 

This is Alan speaking

now as I could not speak before

to you who were unborn when I died -

Oh beautiful people of tomorrow

we are not fallen creatures

life is the only garden

the apple is love

two Adams, two Eves

in open celebration hand in hand

So I delight to watch you dance

in the enchantment of time

like angels in a forest of mirrors

but in the age of shopping

festivals and information consumption

the sign of the bitten apple is everywhere

and your lives are held in the beautiful devices

familiar in your hands -

So revel in your liberty

but read between the lines

you are becoming information

touch screen to touch screen

connected but alone

the algorithm of desires and dreams

end to end encryption held

in the infinite memory of the great ghost server

  

How did the zebra get its stripes

and the leopard its disguise of spots?

Why does a snail have a spiral shell?

Why do sunflowers follow not just the sun

but the Fibonacci sequence

in the structure of their beautiful faces?

How does a bud of cells generate your seeing eyes

and beating heart?

 

This is Alan speaking

I have been waiting a long time

puzzling everything and nothing -

I leave no note of explanation

but a mystery story

it is an ordinary summer evening

by the side of my bed is found

a half-eaten slice of apple

Dip the apple in the brew

let the sleeping death seep through -

I lie alone for the last time

at the edge of reality

my arms at my sides

like a badly-dressed figure on a tomb

looking out of the window at the sun

setting for the final night

a golden apple in the black branches

of a tree of shadows where the birds quibble -

until it disappears into the dark

 

17th February 2017.

 

Once I left the Riddler's Base behind, I set my sights higher. I had to make up for the stupid mistakes I had made as a villainess. Lex Luthor and the Scarecrow were working together now. This unholy combination had to be brought down before Gotham crumbled beneath their might.

 

I slipped my way past the Scarecrow's goons using the air vents. It's funny how convenient these vents are for taking down rooms full of enemies.

 

Finally I made it outside the door to Lex's office. Before I could use my cellphone encryption to break in, a pair of robot sentries attacked. I made surprisingly quick work of them. A larger door opened and a lime green robot turtle scrambled out. This one might take a while...

 

Catwoman has taken LexCorp from Lex Luthor and Scarecrow, rendering it neutral.

Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting. The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

I was asked to shoot a couple of photos of Vera. We connected really well and it turned into a two hour photo-shoot in which we had great fun driving around the hackerspace and Buitenplaats Koningsweg compound looking for shooting locations during golden hour.

psyconnecthing.com/

 

Web sajt kompanije je krucijalni marketinški alat i fasadavašeg poslovanja. Jedinstveni, profesionalni i inspirativni sajt, lak za upravljanje će Vas najbolje predstaviti privlačeći klijente i povećavajući prihode.Mi imamo pravo rešenje za Vas!

 

Nudimo Vam nov i atraktivan vizuelni identitet za Vašu online prisutnost!

U zavisnosti od Vaših potreba i želja nudimo izradu komercijalnog i ekskluzivnog web sajt dizajna. Obratite nam se, opišite nam ukratko kakav sajt želite, a mi će mo Vam poslati procenu troškova izrade vašeg budućeg web sajta.

 

Web, Design,Dizajn,Internet,Prezentacije,Izrada,Povoljno,Jeftino,Sajta,Sajtova,Vizit,Kartice,Business,Card,PHP,MySQL,HTML,XHTML,HTML5,CSS,JS,Turtorials,Graphic,Photoshop,PSD,Priprema,Stampanje,Stampa,Color,Development,Programiranje,Excample,Download,Best,Facebook,Aplikacije Resenja,Tekst,Obrada,Slike,Reci,Dela,Ruka,Majstora,Mehanicki,Twitter,MySpace,Drustvo,Znanje,Ucenje,Napredovanje,Musrerije,Kupci,Posao,Zarada,Prihodi,Povecanje,Novac,Ulaganje,Kes,Lova,Pribor,Graficki,Grafika,Reklame,Reklama,Oglas,Psy,Connect,Hing,SEO,Optimizacija, Design Arts, Internet, Making Money, News, Webmaster, Technology, Computer, Business, Education, Business & Economy, Marketing and Advertising, Publishing Industries, News and Media, Business Cards, Flyers, For Sale, Building and Construction, Video Editing, Webmastering, Article Directories, Communications and Networking, Computers and Technology Weblogs, Contests, Countries, Cultures, and Groups, Design and Development, Design Services, Beauty, Finance, Electronics, Domain Names, Graphics, Information Technology, Macintosh, Multimedia, Operating Systems, Programming and Development, Script Services, Search Engine Optimization, Security and Encryption, Service Providers (ISP), Databases, eCommerce, Email, Tools, Web Browsers, Telecommunications, Tools & Resources, Internet and Web Skills, Web Directories, URL Services, Directory Templates, Directory Blogs, Directories of Directories, Shopping, Web Hosting, Link Building, FAQs, Forums, Domain Name Registration, Deep Web, HTML, HTTP, Magazines, JavaScript, Organizations, Searching the Web, Servers, Site Development, Site Announcement and Promotion, Statistics and Demographics, XML, Portals, Academic Competitions, Business to Business, Education Weblogs, Special Education, Genres, Movies, Music, Booksellers, Travel, Europe, Africa, Asia, Australia, Canada, Hong Kong, Ireland, New Zealand, North America, South America, United Kingdom, English Language Usage, Maps, Standards, Computer Science, Energy, Ecology, Engineering, Computer Games, Crafts, Electronics and Electrical Components, Publications, Internet Access, Wallpapers, People, Work, Women, Social Sciences, Men, Language and Linguistics, Society

Star Trek, First Contact (Paramount, 1996).

youtu.be/wxyZQR2d6yw Trailer

 

youtu.be/GTQzusrfCxc?t=3s

Star Trek - 'Beyond First Contact' The Borg - Making The Movie.

 

Starring Patrick Stewart, Jonathan Frakes, Brent Spiner, LeVar Burton, Michael Dorn, Gates McFadden, Marina Sirtis, Alfre Woodard, James Cromwell, Alice Krige, Neal McDonough, Robert Picardo, and Dwight Schultz. Directed by Jonathan Frakes.

 

Captain Jean-Luc Picard awakens from a nightmare about his Borg assimilation experience to an incoming message from Admiral Hayes. Hayes informs Picard that Deep Space Five reported that a colony has been destroyed. Completing the Admiral's sentence, Picard realizes who destroyed the colony — the Borg.

 

Picard calls a meeting and informs his senior officers that their ship has been instructed to patrol the Neutral Zone. Their orders are to protect the area from any possible Romulan uprising during a Borg attack. Despite protests from his officers, Picard remains faithful to his orders and the U.S.S. Enterprise NCC 1701-E begins to patrol the area. Later, Picard regretfully tells Riker that it is his own fault they are stuck in the Neutral Zone. Starfleet believes Picard to be too emotionally involved with the Borg because of his previous assimilation to tactically complete a mission against them.

 

The men return to the bridge to learn that Starfleet has engaged in combat with the Borg. Intercepting messages between the starships, the crew learns that the Federation is losing. Picard, with his Borg experience, knows he can help the fleet. He informs his staff that he will make a decision directly in opposition to Starfleet commands. With no objections from his crew, Captain Picard gives the order and the starship Enterprise sets a course for Earth and the attacking Borg cube.

 

A massive battle ensues and it appears that the Federation will lose the fight. Despite serious structural damage to the Borg cube, their strength does not weaken. Even the U.S.S. Defiant, commanded by Worf, does not appear to be able to turn the tides of the battle. As the starship Defiant is about to ram the Borg ship on a suicide run, the U.S.S. Enterprise beams aboard its crew, including Worf. Picard, having an inside perspective of the Borg and their vessel, focuses the firepower of the fleet on coordinates he knows to be critical. Just as the main ship is destroyed, a spherical escape pod flies out. The sphere creates a temporal vortex, catching the starship Enterprise in its wake. Immune to the paradoxes created by the time travel, the starship's crew learns that Earth at the present time appears to be inhabited entirely by the Borg. The commanding officers realize that the Borg have gone into the past and assimilated Earth, so they follow them back in time to repair the damage the Borg have done.

 

On Earth, over three centuries earlier, a somber Lily Sloane accompanies a stumbling, drunk Zefram Cochrane out of a bar after a night of revelry. Then, Lily notices a fast moving light. She hardly has time to ask what the object is, when the Borg vessel attacks. Back aboard the Enterprise, Picard demands that Data tell him the exact date and location the Borg ship is attacking. The location: central Montana. The date: April 4, 2063 — the day before First Contact. Realizing that the Borg have come to prevent first contact between alien life forms and humans, the crew knows they must stop the Borg and facilitate this exchange. They destroy the Borg sphere, and Dr. Crusher, Captain Picard, Commander Data, Commander Riker, Counselor Troi and other U.S.S. Enterprise crew transport down to Earth to survey the damage.

 

At the Borg attack site in Montana, the crew finds destruction and chaos. They split into groups to search for Cochrane. Data and Picard hunt for Cochrane's warp ship, the Phoenix. There they encounter a very angry and confused Lily, who believes Data and Picard to be members of a coalition that broke the cease-fire after World War III. She shoots at them in a rage, but impervious to bullets, Data approaches Lily. Overcome by fear and radiation, she falls to the ground. Dr. Crusher diagnoses Lily with radiation sickness caused by the damaged Phoenix, and inoculates the entire crew. Against Picard's better judgment, Crusher takes Lily to sickbay. Geordi is called to help repair the warp vessel and Picard becomes intrigued by its historical significance. In this vessel began the future as the world would know it, and the past as Picard remembers it. He reaches out to touch the ship. Data, curious about the human need for tactile reinforcement, attempts to create the same feelings he observes in Picard, but is unsuccessful in duplicating this aspect of humanity.

 

Aboard the ship, two crewmembers are sent to examine unexplained maintenance problems, and both disappear. Picard is called to the ship and discovers that the survivors from the Borg sphere have transported onto the ship and are taking over Deck 16. While Picard arranges teams to fight them, the Borg manipulate the climate of the deck to suit their needs and begin to spread throughout the ship. When the Borg attack sickbay, Crusher, her staff, and Lily escape through a Jeffries tube, thanks to a distraction by the ship's Emergency Medical Hologram. While Crusher leads the group down the passageway, Lily steals away in a different direction.

 

On Earth, Riker finds Troi and Cochrane drunk in a bar. Troi justifies that the only way she could get Cochrane to talk to her was by shooting Tequila with him. Denying her drunken state, Troi offers her professional opinion on Cochrane. She explains, "He's nuts."

 

Picard and his team are tracking the Borg through the starship. As Crusher and her staff find Worf's team, Picard's team encounters the Borg, who have begun to assimilate U.S.S. Enterprise crewmembers. Worf's team engages the Borg in combat, but the enemies adapt to the crew's weapons too quickly to make any difference. The teams are ordered to regroup on Deck 15, but Data is captured. Picard cannot save him, so he quickly crawls into a Jeffries tube to escape. Face to face with Picard, Lily steals his phaser and demands an explanation and escape route. Picard agrees.

 

Geordi shows Cochrane the starship Enterprise through a large telescope on Earth and tries to convince him to launch his vessel the next morning. Geordi glorifies Cochrane by explaining that his ship will make first contact with alien life forms. Humanity will be saved if Cochrane launches his ship. Still drunk, Cochrane agrees.

 

Aboard the ship, the Borg Queen introduces herself to a bound Data, claiming that she is the Collective. Reactivating Data's emotion chip, the Borg begin to graph organic, human skin onto the android's arm. As Data is overcome by this new human sensation of touch, something he never thought possible, the Borg continue their work.

 

Lily and Picard wander through the service deck as the captain attempts to explain what has happened between Lily's time and his own. She begins to calm down until they suddenly run into a Borg-infested area. Quickly escaping in the Holodeck, Picard activates a Dixon Hill program. At a dance, he and Lily try to blend in without being noticed by the Borg. Following the Holodeck's story, Picard searches for Nicky the Nose and takes his machine gun. Killing the Borg with the gun, Picard retrieves the memory chip that contains all of the information the Borg has received. Lily then notices that the two dead Borg were once crewmembers of the U.S.S. Enterprise.

 

Back on Earth, Cochrane keeps hearing what an amazing historical figure he is and begins to question whether or not he wants to go through with the launch. He doubts his own nobility and flees the launch site. Geordi and Riker attempt to catch up with Cochrane in the woods and are forced to stun him with a phaser to return him to the Phoenix.

 

Lily and Picard join the rest of the surviving crew and discover that the Borg are outside of the ship. The retrieved memory chip reveals that they are reconfiguring the main deflector in order to contact the Borg of this century, calling them to Earth to assimilate the planet. Picard, Worf and Lieutenant Hawk put on space suits and venture onto the surface of the starship to stop the Borg.

 

Aware of Data's desire to become human, the Borg Queen offers him the chance to be entirely covered in human flesh and join the Borg, in an attempt to get the encryption codes from Data so she can obtain total control over the U.S.S. Enterprise. Outside the Enterprise, Hawk, Worf and Picard attempt to unlock the deflector dish. Attacked by a Borg, Worf's suit begins to depressurize. Two Borg are killed and Hawk is attacked. As the dish is released, a now-assimilated Hawk attempts to kill Picard. Worf saves the captain, but Hawk is killed. Picard and Worf then destroy the free-floating deflector dish.

 

On Earth, Cochrane explains to Riker that his only motivation for inventing warp travel was money. He never expected to save mankind, become a hero, or be instrumental in the founding of a new civilization. He simply wanted to retire in peace.

 

An argument ensues aboard the Enterprise as the majority of the senior officers believe that they should evacuate the ship, destroying it and the Borg. Picard won't give up, and insists they stay. Challenged by Worf, Picard orders him off the Bridge. Lily follows Picard into his ready room and demands that he explain his obsession with fighting the Borg. Picard declares he won't sacrifice the starship, and swears to finally make the Borg pay for all they've done. Lily quietly and calmly compares Picard to Captain Ahab, forever fighting his white whale — the Borg. Realizing that this fight could only destroy himself and his crew, Picard decides to evacuate the ship. Worf, Picard and Crusher activate the ship's self-destruct sequence. The countdown begins, and the crew leaves in escape pods. Picard surveys his ship and prepares to leave when he hears Data calling him.

 

Meanwhile , the earth-bound crew and Cochrane begin takeoff. Cochrane, Geordi and Riker take off in the Phoenix, and with music blaring, the three men launch successfully into orbit.

 

On the ship, Lily and Picard say good-bye and the captain goes to save Data. Entering Engineering, Picard confronts the Borg Queen, whom he knows from his experience with the Borg. The queen reminds Picard that it was not enough that he was assimilated, but that he needed to give himself freely to the Borg — she wished him to stand by her side as an equal to further the power of the Collective. Picard offers himself in exchange for Data, but the android does not comply. He refuses to leave, and at the queen's command, disarms the self-destruct sequence. He quickly enters the encryption codes, offering full control of the Enterprise to the Borg.

 

As Cochrane's ship nears warp, Data arms the U.S.S Enterprise's weapons and aims them at the defenseless Phoenix. At the Borg Queen's order, Data fires, but the missiles fail to hit the Phoenix. His deception of the Borg complete, Data smashes a conduit, releasing a gas that floods engineering, killing all organic material. As the Borg are destroyed, Picard climbs to safety and the Borg Queen falls into the deadly gas. With the Borg threat gone, Cochrane safely completes humanity's first warp flight.

 

Celebrating the flight back on Earth that night, Cochrane and the Enterprise crew see an alien ship land nearby. The doors open, and Zefram Cochrane makes Earth's first contact with an alien race — the Vulcans. Picard and his crew beam out, having witnessed this historic event, and the U.S.S Enterprise NCC 1701-E returns to the 24th century.

 

My vintage scanner and monitor radio display, with some related items.

 

In my area these are now useless for monitoring public safety agencies, everything here is now on APCO Phase 2 digital trunking with police using encryption.

meine Aufnahmen mit dem Soligor f=350mm 1:5.6

my shots with this lens

www.flickr.com/photos/150811378@N08/albums/72157681368408001

 

Soligor 350mm f/5.6-32

 

"Soligor" is a trademark under which manufacturers put their products on the market without appearing themselves.

 

The opinion is often expressed that such products are of inferior quality. Manufacturers would get rid of their rejects without damaging their own names. With a short consideration it becomes clear that such a strategy does not work. Trademarks that have been successfully represented on the market for many years - and "Soligor" was one of them - must protect and defend their "brand value". They therefore do not take any risks. As a rule, the selection of OEM manufacturers - yesterday and today - is carried out uncompromisingly according to very strict quality criteria and "who doesn't spurt out flies out". Brand manufacturers, on the other hand, can counteract flops with suitable marketing measures and quickly bring out something "new".

 

The advantage for the OEM manufacturer is that he can concentrate fully on development and production because marketing and sales are carried out by the "brand". Well-known brand manufacturers use the variant of an "umbrella" brand to market production peaks and rarely to market overcapacities. For example, expensive branded goods can be offered more cheaply without the specialist trade going on the barricades and customers being angry because they have "paid too much".

Examples of this were articles from "Quelle" and "Foto-Quelle". In the Stiftung Warentest, they are always at the top. Enlightened customers knew that the article "Privileg 4711" was actually a Bauknecht stove. In order to protect his own brands (e.g. Privileg, Revue etc.), owner Gustav Schickedanz founded the Institute for Product Testing especially for this purpose at an early stage.

 

"Soligor" had originally been the trademark of Allied Impex Corporation, New York (AIC), a distributor of optical articles on the American East Coast, since 1938. The counterpart on the American west coast was "Vivitar".

 

From 1956, the brand name was used for Japanese cameras, lenses and other photographic items.

 

In the 1960s "Soligor" belonged to the very successful "A.I.C. Phototechnik GmbH (AIC)" in Stuttgart. A key success criterion was the company's personnel policy. Many employees from the already shrinking German photo industry found a new job at AIC. In their hand luggage, they not only had sound specialist knowledge, but also excellent contacts to industry and trade.

 

My "Soligor 350mm 1:5.6" was produced in 1969 by "Kino Precision Industries", recognizable by the OEM manufacturer's encryption in the serial number. The great success "Kino" had with the Vivitar Series 1 prompted the company to launch its own brand in the USA in 1980. The "Kiron" brand was born.

 

In a 1966 brochure, the lens costs $120 and the leather quiver $11.

A buyer from Germany would have had to pay 3,644/334 Marks in 1966. Inflation- and currency-adjusted that would be 833/76 Euro.

Today a drumm leather quiver for almost 80€? It's not that absurd, is it?

 

Despite 1:5.6 you can still photograph quite well "out of your hand" with the lens. I don't want to overestimate the sharpness, because there are almost always quality-reducing influences with remote shots. Flickering air, dust and humidity cannot be conjured away with the best and most expensive optics.

 

Strengths of the lens are in my opinion the "tele-impression" in the middle distance range and the possibility to make macros at a distance of 3-4 meters by using extension rings.

  

"Careful when loading that cannister. It might be small, but it has enough explosive power to evaporate this entire hangar."

 

"Yes sir."

 

"And don't forget to activate the stasis field once it's in place."

 

"Oh–"

 

"You forgot didn't you? Each year you rookies get– Nevermind."

 

"Sorry sir. I'll fix it right away sir."

 

"Do you know what happens when you try to fire the charge without the stasis field?Let me tell you about the battle in sector 75 just outside Saturn's gravity well. Our boys got the encryption codes to disable the stasis fields on the enemy munitions just as they were starting their bombing run– now that was a good firework show!"

dark | light | closer

 

[1] [2] [3] [4] [5] [6] :: [semaphore] sensory

 

visual study in

perception of self

and the environment

in relation to the five

physical senses

  

Star Trek, First Contact (Paramount, 1996).

youtu.be/wxyZQR2d6yw Trailer

 

youtu.be/GTQzusrfCxc?t=3s

Star Trek - 'Beyond First Contact' The Borg - Making The Movie.

 

Starring Patrick Stewart, Jonathan Frakes, Brent Spiner, LeVar Burton, Michael Dorn, Gates McFadden, Marina Sirtis, Alfre Woodard, James Cromwell, Alice Krige, Neal McDonough, Robert Picardo, and Dwight Schultz. Directed by Jonathan Frakes.

 

Captain Jean-Luc Picard awakens from a nightmare about his Borg assimilation experience to an incoming message from Admiral Hayes. Hayes informs Picard that Deep Space Five reported that a colony has been destroyed. Completing the Admiral's sentence, Picard realizes who destroyed the colony — the Borg.

 

Picard calls a meeting and informs his senior officers that their ship has been instructed to patrol the Neutral Zone. Their orders are to protect the area from any possible Romulan uprising during a Borg attack. Despite protests from his officers, Picard remains faithful to his orders and the U.S.S. Enterprise NCC 1701-E begins to patrol the area. Later, Picard regretfully tells Riker that it is his own fault they are stuck in the Neutral Zone. Starfleet believes Picard to be too emotionally involved with the Borg because of his previous assimilation to tactically complete a mission against them.

 

The men return to the bridge to learn that Starfleet has engaged in combat with the Borg. Intercepting messages between the starships, the crew learns that the Federation is losing. Picard, with his Borg experience, knows he can help the fleet. He informs his staff that he will make a decision directly in opposition to Starfleet commands. With no objections from his crew, Captain Picard gives the order and the starship Enterprise sets a course for Earth and the attacking Borg cube.

 

A massive battle ensues and it appears that the Federation will lose the fight. Despite serious structural damage to the Borg cube, their strength does not weaken. Even the U.S.S. Defiant, commanded by Worf, does not appear to be able to turn the tides of the battle. As the starship Defiant is about to ram the Borg ship on a suicide run, the U.S.S. Enterprise beams aboard its crew, including Worf. Picard, having an inside perspective of the Borg and their vessel, focuses the firepower of the fleet on coordinates he knows to be critical. Just as the main ship is destroyed, a spherical escape pod flies out. The sphere creates a temporal vortex, catching the starship Enterprise in its wake. Immune to the paradoxes created by the time travel, the starship's crew learns that Earth at the present time appears to be inhabited entirely by the Borg. The commanding officers realize that the Borg have gone into the past and assimilated Earth, so they follow them back in time to repair the damage the Borg have done.

 

On Earth, over three centuries earlier, a somber Lily Sloane accompanies a stumbling, drunk Zefram Cochrane out of a bar after a night of revelry. Then, Lily notices a fast moving light. She hardly has time to ask what the object is, when the Borg vessel attacks. Back aboard the Enterprise, Picard demands that Data tell him the exact date and location the Borg ship is attacking. The location: central Montana. The date: April 4, 2063 — the day before First Contact. Realizing that the Borg have come to prevent first contact between alien life forms and humans, the crew knows they must stop the Borg and facilitate this exchange. They destroy the Borg sphere, and Dr. Crusher, Captain Picard, Commander Data, Commander Riker, Counselor Troi and other U.S.S. Enterprise crew transport down to Earth to survey the damage.

 

At the Borg attack site in Montana, the crew finds destruction and chaos. They split into groups to search for Cochrane. Data and Picard hunt for Cochrane's warp ship, the Phoenix. There they encounter a very angry and confused Lily, who believes Data and Picard to be members of a coalition that broke the cease-fire after World War III. She shoots at them in a rage, but impervious to bullets, Data approaches Lily. Overcome by fear and radiation, she falls to the ground. Dr. Crusher diagnoses Lily with radiation sickness caused by the damaged Phoenix, and inoculates the entire crew. Against Picard's better judgment, Crusher takes Lily to sickbay. Geordi is called to help repair the warp vessel and Picard becomes intrigued by its historical significance. In this vessel began the future as the world would know it, and the past as Picard remembers it. He reaches out to touch the ship. Data, curious about the human need for tactile reinforcement, attempts to create the same feelings he observes in Picard, but is unsuccessful in duplicating this aspect of humanity.

 

Aboard the ship, two crewmembers are sent to examine unexplained maintenance problems, and both disappear. Picard is called to the ship and discovers that the survivors from the Borg sphere have transported onto the ship and are taking over Deck 16. While Picard arranges teams to fight them, the Borg manipulate the climate of the deck to suit their needs and begin to spread throughout the ship. When the Borg attack sickbay, Crusher, her staff, and Lily escape through a Jeffries tube, thanks to a distraction by the ship's Emergency Medical Hologram. While Crusher leads the group down the passageway, Lily steals away in a different direction.

 

On Earth, Riker finds Troi and Cochrane drunk in a bar. Troi justifies that the only way she could get Cochrane to talk to her was by shooting Tequila with him. Denying her drunken state, Troi offers her professional opinion on Cochrane. She explains, "He's nuts."

 

Picard and his team are tracking the Borg through the starship. As Crusher and her staff find Worf's team, Picard's team encounters the Borg, who have begun to assimilate U.S.S. Enterprise crewmembers. Worf's team engages the Borg in combat, but the enemies adapt to the crew's weapons too quickly to make any difference. The teams are ordered to regroup on Deck 15, but Data is captured. Picard cannot save him, so he quickly crawls into a Jeffries tube to escape. Face to face with Picard, Lily steals his phaser and demands an explanation and escape route. Picard agrees.

 

Geordi shows Cochrane the starship Enterprise through a large telescope on Earth and tries to convince him to launch his vessel the next morning. Geordi glorifies Cochrane by explaining that his ship will make first contact with alien life forms. Humanity will be saved if Cochrane launches his ship. Still drunk, Cochrane agrees.

 

Aboard the ship, the Borg Queen introduces herself to a bound Data, claiming that she is the Collective. Reactivating Data's emotion chip, the Borg begin to graph organic, human skin onto the android's arm. As Data is overcome by this new human sensation of touch, something he never thought possible, the Borg continue their work.

 

Lily and Picard wander through the service deck as the captain attempts to explain what has happened between Lily's time and his own. She begins to calm down until they suddenly run into a Borg-infested area. Quickly escaping in the Holodeck, Picard activates a Dixon Hill program. At a dance, he and Lily try to blend in without being noticed by the Borg. Following the Holodeck's story, Picard searches for Nicky the Nose and takes his machine gun. Killing the Borg with the gun, Picard retrieves the memory chip that contains all of the information the Borg has received. Lily then notices that the two dead Borg were once crewmembers of the U.S.S. Enterprise.

 

Back on Earth, Cochrane keeps hearing what an amazing historical figure he is and begins to question whether or not he wants to go through with the launch. He doubts his own nobility and flees the launch site. Geordi and Riker attempt to catch up with Cochrane in the woods and are forced to stun him with a phaser to return him to the Phoenix.

 

Lily and Picard join the rest of the surviving crew and discover that the Borg are outside of the ship. The retrieved memory chip reveals that they are reconfiguring the main deflector in order to contact the Borg of this century, calling them to Earth to assimilate the planet. Picard, Worf and Lieutenant Hawk put on space suits and venture onto the surface of the starship to stop the Borg.

 

Aware of Data's desire to become human, the Borg Queen offers him the chance to be entirely covered in human flesh and join the Borg, in an attempt to get the encryption codes from Data so she can obtain total control over the U.S.S. Enterprise. Outside the Enterprise, Hawk, Worf and Picard attempt to unlock the deflector dish. Attacked by a Borg, Worf's suit begins to depressurize. Two Borg are killed and Hawk is attacked. As the dish is released, a now-assimilated Hawk attempts to kill Picard. Worf saves the captain, but Hawk is killed. Picard and Worf then destroy the free-floating deflector dish.

 

On Earth, Cochrane explains to Riker that his only motivation for inventing warp travel was money. He never expected to save mankind, become a hero, or be instrumental in the founding of a new civilization. He simply wanted to retire in peace.

 

An argument ensues aboard the Enterprise as the majority of the senior officers believe that they should evacuate the ship, destroying it and the Borg. Picard won't give up, and insists they stay. Challenged by Worf, Picard orders him off the Bridge. Lily follows Picard into his ready room and demands that he explain his obsession with fighting the Borg. Picard declares he won't sacrifice the starship, and swears to finally make the Borg pay for all they've done. Lily quietly and calmly compares Picard to Captain Ahab, forever fighting his white whale — the Borg. Realizing that this fight could only destroy himself and his crew, Picard decides to evacuate the ship. Worf, Picard and Crusher activate the ship's self-destruct sequence. The countdown begins, and the crew leaves in escape pods. Picard surveys his ship and prepares to leave when he hears Data calling him.

 

Meanwhile , the earth-bound crew and Cochrane begin takeoff. Cochrane, Geordi and Riker take off in the Phoenix, and with music blaring, the three men launch successfully into orbit.

 

On the ship, Lily and Picard say good-bye and the captain goes to save Data. Entering Engineering, Picard confronts the Borg Queen, whom he knows from his experience with the Borg. The queen reminds Picard that it was not enough that he was assimilated, but that he needed to give himself freely to the Borg — she wished him to stand by her side as an equal to further the power of the Collective. Picard offers himself in exchange for Data, but the android does not comply. He refuses to leave, and at the queen's command, disarms the self-destruct sequence. He quickly enters the encryption codes, offering full control of the Enterprise to the Borg.

 

As Cochrane's ship nears warp, Data arms the U.S.S Enterprise's weapons and aims them at the defenseless Phoenix. At the Borg Queen's order, Data fires, but the missiles fail to hit the Phoenix. His deception of the Borg complete, Data smashes a conduit, releasing a gas that floods engineering, killing all organic material. As the Borg are destroyed, Picard climbs to safety and the Borg Queen falls into the deadly gas. With the Borg threat gone, Cochrane safely completes humanity's first warp flight.

 

Celebrating the flight back on Earth that night, Cochrane and the Enterprise crew see an alien ship land nearby. The doors open, and Zefram Cochrane makes Earth's first contact with an alien race — the Vulcans. Picard and his crew beam out, having witnessed this historic event, and the U.S.S Enterprise NCC 1701-E returns to the 24th century.

 

(Candid street shot, London,UK). Hundreds of friends, but no one to talk to!

 

The U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create,” Apple CEO Tim Cook said. “They have asked us to build a backdoor to the iPhone. Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software – which does not exist today – would have the potential to unlock any iPhone in someone’s physical possession.”

 

Apple’s position on the matter is clear: acquiescing to the FBI’s request to develop a tool to unlock an iPhone, even if it belonged to a murderous terrorist, would set a dangerous precedent and slippery slope.

  

China is watching the dispute closely. Analysts say the Chinese government does take cues from United States when it comes to encryption regulations, and that it would most likely demand that multinational companies provide accommodations similar to those in United States.

 

Last year, Beijing backed off several proposals that would have mandated that foreign firms providing encryption keys for devices sold in China after heavy pressure from foreign trade groups. …

While it’s still not clear how the law might be carried out, it is possible a push from American law enforcement agencies to unlock iPhones would embolden Beijing to demand the same. China would also most likely push to acquire any technology that would allow it to unlock iPhones.

 

-------------------------------------------------

Never mind the FBI in the UK, GCHQ have been monitoring your communications for years, they didn't even bother to ask.

Edward Snowden, former intelligence contractor told the BBC's Panorama that UK intelligence agency GCHQ had the power to hack into phones without their owners' knowledge.

 

The UK government declined to comment.

----------------------------------------

1st March 2016

New UK Snooper’s charter still gives state wide hacking powers

 

The latest version of the Investigatory Powers Bill has failed to clarify tricky issues like encryption and gives police and security services wide-ranging powers

Yet Another Semantic Web Stack, this one from Semantic Web Architecture: Stack or Two Towers? by Ian Horrocks, Bijan Parsia, Peter Patel-Schneider and Jim Hendler.

 

If the link above is inaccessible to you, try this one from Ian Horrocks publications page

 

You may also be interested in Dan Brickleys alternative stack for the New, improved semantic web, (now with added meaning!)

 

DOI:10.1007/11552222_4

 

[single-tower-4.png]

  

LET’S GO TO MONOPOLY SLOTS GENERATOR SITE!

 

[NEW] MONOPOLY SLOTS HACK ONLINE REAL WORKS 100% GUARANTEED: www.generator.mosthack.com

You can add Coins up to 999,999,999 and Diamonds up to 999 each day: www.generator.mosthack.com

Free and added instantly! This method 100% works for real: www.generator.mosthack.com

Please Share this working hack online method guys: www.generator.mosthack.com

 

HOW TO USE:

1. Go to >>> www.generator.mosthack.com and choose Monopoly Slots image (you will be redirect to Monopoly Slots Generator site)

2. Enter your Username/ID or Email Address (you don’t need to enter your password)

3. Select Platform and Encryption then click “CONNECT”, Popup Success alert click “OK”

4. Select Resources then click “GENERATE”, after that click “VERIFY”, finish verification process and check your account!

 

Try Another Free Safe and Secure Hack Online Generator Cheat Real Works 100% Here: www.mosthack.com

 

#generatorgame #onlinegeneratorgame #mosthack #generatormosthack #monopolyslots #monopoly #monopolydeal #monopolymoney #monopolyatmaccas #monopolyempire #monopolyman #monopolygang #monopolynight #monopolytime #monopolyjunior #monopolyguy #monopolygame #monopolymillionaire #monopolyjr #monopolyvision #monopolycity #monopolyking #monopolyhotels #monopolychamp #monopolym #monopolymonday #monopolypubcrawl #monopoly2015 #monopolyboy #monopolylife

 

HACK MONOPOLY SLOTS NOW!

Vera Wilde, artist-in-residence at Hack42. Because Art & Science!

 

Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting.

The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

This is our second photo-shoot together. We have great chemistry and it's loads of fun to shoot with her.

We got to play with a few props, listen to some music and experiment with light and posing.

psyconnecthing.com/

 

Web sajt kompanije je krucijalni marketinški alat i fasadavašeg poslovanja. Jedinstveni, profesionalni i inspirativni sajt, lak za upravljanje će Vas najbolje predstaviti privlačeći klijente i povećavajući prihode.Mi imamo pravo rešenje za Vas!

 

Nudimo Vam nov i atraktivan vizuelni identitet za Vašu online prisutnost!

U zavisnosti od Vaših potreba i želja nudimo izradu komercijalnog i ekskluzivnog web sajt dizajna. Obratite nam se, opišite nam ukratko kakav sajt želite, a mi će mo Vam poslati procenu troškova izrade vašeg budućeg web sajta.

 

Web, Design,Dizajn,Internet,Prezentacije,Izrada,Povoljno,Jeftino,Sajta,Sajtova,Vizit,Kartice,Business,Card,PHP,MySQL,HTML,XHTML,HTML5,CSS,JS,Turtorials,Graphic,Photoshop,PSD,Priprema,Stampanje,Stampa,Color,Development,Programiranje,Excample,Download,Best,Facebook,Aplikacije Resenja,Tekst,Obrada,Slike,Reci,Dela,Ruka,Majstora,Mehanicki,Twitter,MySpace,Drustvo,Znanje,Ucenje,Napredovanje,Musrerije,Kupci,Posao,Zarada,Prihodi,Povecanje,Novac,Ulaganje,Kes,Lova,Pribor,Graficki,Grafika,Reklame,Reklama,Oglas,Psy,Connect,Hing,SEO,Optimizacija, Design Arts, Internet, Making Money, News, Webmaster, Technology, Computer, Business, Education, Business & Economy, Marketing and Advertising, Publishing Industries, News and Media, Business Cards, Flyers, For Sale, Building and Construction, Video Editing, Webmastering, Article Directories, Communications and Networking, Computers and Technology Weblogs, Contests, Countries, Cultures, and Groups, Design and Development, Design Services, Beauty, Finance, Electronics, Domain Names, Graphics, Information Technology, Macintosh, Multimedia, Operating Systems, Programming and Development, Script Services, Search Engine Optimization, Security and Encryption, Service Providers (ISP), Databases, eCommerce, Email, Tools, Web Browsers, Telecommunications, Tools & Resources, Internet and Web Skills, Web Directories, URL Services, Directory Templates, Directory Blogs, Directories of Directories, Shopping, Web Hosting, Link Building, FAQs, Forums, Domain Name Registration, Deep Web, HTML, HTTP, Magazines, JavaScript, Organizations, Searching the Web, Servers, Site Development, Site Announcement and Promotion, Statistics and Demographics, XML, Portals, Academic Competitions, Business to Business, Education Weblogs, Special Education, Genres, Movies, Music, Booksellers, Travel, Europe, Africa, Asia, Australia, Canada, Hong Kong, Ireland, New Zealand, North America, South America, United Kingdom, English Language Usage, Maps, Standards, Computer Science, Energy, Ecology, Engineering, Computer Games, Crafts, Electronics and Electrical Components, Publications, Internet Access, Wallpapers, People, Work, Women, Social Sciences, Men, Language and Linguistics, Society

Enigma machines were used by Axis forces to encrypt communications during WW2. This particular model, an M4, was produced in 1944 and was deployed to encrypt communications between to U Boat submarines and their land command bases. Each machine could be set up in 4,134 million million million possible ways.

It is thought that the end of the war was hastened by as much as two years after Alan Turing and his team at Bletchley Park discovered a method of decryption of the messages, thus enabling the Allies to read the communications being sent by the enemy. This particular model is currently on display outside the Alan Turing Institute in The British Library.

A rare, working example of an original pre-World War II Enigma machine, considered to be one of the pinnacles of coded message encryption at the time. On a recent visit to UCD in June, renowned academic, author and TV personality Dr. Simon Singh presented a keynote talk as part of the Irish Signals and Systems Conference, offering attendees the rare opportunity to witness the machine's operation.

 

More about the Enigma Machine here:

en.wikipedia.org/wiki/Enigma_machine

psyconnecthing.com

 

Web, Design,Dizajn,Internet,Prezentacije,Izrada,Povoljno,Jeftino,Sajta,Sajtova,Vizit,Kartice,Business,Card,PHP,MySQL,HTML,XHTML,HTML5,CSS,JS,Turtorials,Graphic,Photoshop,PSD,Priprema,Stampanje,Stampa,Color,Development,Programiranje,Excample,Download,Best,Facebook,Aplikacije Resenja,Tekst,Obrada,Slike,Reci,Dela,Ruka,Majstora,Mehanicki,Twitter,MySpace,Drustvo,Znanje,Ucenje,Napredovanje,Musrerije,Kupci,Posao,Zarada,Prihodi,Povecanje,Novac,Ulaganje,Kes,Lova,Pribor,Graficki,Grafika,Reklame,Reklama,Oglas,Psy,Connect,Hing,SEO,Optimizacija, Design Arts, Internet, Making Money, News, Webmaster, Technology, Computer, Business, Education, Business & Economy, Marketing and Advertising, Publishing Industries, News and Media, Business Cards, Flyers, For Sale, Building and Construction, Video Editing, Webmastering, Article Directories, Communications and Networking, Computers and Technology Weblogs, Contests, Countries, Cultures, and Groups, Design and Development, Design Services, Beauty, Finance, Electronics, Domain Names, Graphics, Information Technology, Macintosh, Multimedia, Operating Systems, Programming and Development, Script Services, Search Engine Optimization, Security and Encryption, Service Providers (ISP), Databases, eCommerce, Email, Tools, Web Browsers, Telecommunications, Tools & Resources, Internet and Web Skills, Web Directories, URL Services, Directory Templates, Directory Blogs, Directories of Directories, Shopping, Web Hosting, Link Building, FAQs, Forums, Domain Name Registration, Deep Web, HTML, HTTP, Magazines, JavaScript, Organizations, Searching the Web, Servers, Site Development, Site Announcement and Promotion, Statistics and Demographics, XML, Portals, Academic Competitions, Business to Business, Education Weblogs, Special Education, Genres, Movies, Music, Booksellers, Travel, Europe, Africa, Asia, Australia, Canada, Hong Kong, Ireland, New Zealand, North America, South America, United Kingdom, English Language Usage, Maps, Standards, Computer Science, Energy, Ecology, Engineering, Computer Games, Crafts, Electronics and Electrical Components, Publications, Internet Access, Wallpapers, People, Work, Women, Social Sciences, Men, Language and Linguistics, Society

Of course. Making a bit of extra money as a set medic, I went and bought myself a macbook, it's been four long years since my last computer, I've been jonesing for it, so I did it. Apple computers, easy to use, right? Never. Nothing with computers is ever easy.

 

In fact, I do believe this will be the death of me.

 

Damn thing wouldn't connect to the internet. So I called my internet provider, and am transferred to someone...look, here's it straight, this guy was not a native english speaker, and was making a poor show of pretending he a)wasn't from a foreign country and b)knew the first thing about computers. So after ten minutes of grinding me teeth at his incompetence, I asked for the higher level of tech support.

 

Which got me a knowledgeable guy who told me it wasn't an internet problem, it was an Apple problem.

 

So I call them. And they walk me through it(apparently my router is shitty, and newer macs aren't compatible with its default encryption. or some fucking technobabble like that)

 

So now I can connect.

 

Now, my girl's got an iBook and a year-old airport card. I ask Apple Guy if she'll be able to connect. Oh sure, he says.

 

But my girlfriend's computer can't connect. Can't even see the network, let alone connect.

 

And she, like myself, loves her some internet. So now she's pissed. And I'm pissed. And I want to throw this macbook under a bus.

 

Don't even get me started on trying to snyc up my macbook with my iMac. If I ever see .mac on the street, i will kick its fucking ass.

 

Sorry, this has nothing to do with this photo of Natascha, other than the fact that I'd titled it Femme Fatale. Which is what this fucking macbook is. Oh, it's gorgeous, pristine, wonderfully designed, but it will, as Joe Pesci is my witness, BE THE FUCKING DEATH OF ME.

Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting. The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

I was asked to shoot a couple of photos of Vera. We connected really well and it turned into a two hour photo-shoot in which we had great fun driving around the hackerspace and Buitenplaats Koningsweg compound looking for shooting locations during golden hour.

A transparent acrylic layer on top of the first DCT text:

 

The legibility of an encrypted message does not just depend on the complexity of the encryption algorithm, but also on the placement of the data of the message.

The Discreet Cosine Transform is a mathematical technique. In the case of the JPEG compression, a DCT is used to describe a finite set of patterns, called macroblocks, that could be described as the 64 character making up the JPEG image, adding lumo and chroma values as ‘intonation’.

If an image is compressed correctly, its macroblocks become ‘invisible’. The incidental trace of the macroblocks is generally ignored as artifact or error.

Keeping this in mind, I developed DCT. DCT uses the esthetics of JPEG macroblocks to mask its secret message as error. The encrypted message, hidden on the surface of the image is only legible by the ones in the know.

  

          myfriendsandifindl////

           egibilitysoutterlyf//

            ascinatingthatth

            ingscannotbeil//

            legibleenoughi//

            nmyworkiwant///

              tomakereada

               bilityasil/l

              egibleaspo/

               ssible,toe/

               xperienceit

                 asintens//

                 ivelyas//

               possible/

                   /

  

/

Inside the AT&T TSD-3600E Telephone Security Device, an encrypting telephone from 1993 based on the controversial Clipper Chip

 

The Clipper chip was the flagship component of a controversial National Security Agency-designed "key escrow" cryptography scheme, in which intercepted encrypted traffic could be decrypted easily by law enforcement or intelligence agencies for surveillance purposes. The program was extremely controversial and, in the end, not a success. Aside from the obvious fundamental problems (the security risks of having a large database of citizen's keys, the need to implement cryptography in expensive secret hardware, etc), the Clipper architecture had technical flaws that made it possible to circumvent the escrow features and preclude the possibility of law enforcement access. (See "Protocol Failure in the Escrowed Encryption Standard" [pdf format], for details.)

 

AT&T (my employer at the time) was the first (and ultimately only) company to build a commercial product based on the ill-fated system. The AT&T TSD-3600, announced in 1992, was a voice encryption device designed to be installed in a standard telephone (between the phone base and the handset). Calls placed to other TSD-3600-equipped telephones could be automatically digitized (at 4800bps) and encrypted, making eavesdropping on the conversation (by legal or illegal means) effectively infeasible. When the US government learned of AT&T's plans to market the device, it worried that criminals might used them to thwart wiretaps. Plans for a new encryption system with a wiretap backdoor were hurriedly drawn up by the NSA, and AT&T was persuaded to replace the regular (non-escrowed) DES-based encryption scheme in the original TSD product with the new system, called the Clipper chip. The Clipper-based model TSD-3600E hit the market in 1993. As incentive for AT&T's cooperation, the government agreed to purchase a significant quantity of Clipper-equipped TSD-3600Es, which sold for over $1000 each in quantity.

 

Hobbled by the controversial key escrow features and the high retail price, the government ended up being the TSD's only major customer, and even most of the units they bought sat unopened in storage for over ten years. AT&T, for its part, eventually sold off the division that produced the product.

 

I'm aware of five different TSD-3600 models produced between 1992 and the product's cancellation, differing in the cipher algorithm used. The TSD-3600D was the original, using standard DES with a 56 bit key. (These were quickly recalled and disappeared from the market after Clipper was announced). The 3600F was an exportable model that used a proprietary 40 bit cipher that, I was told, was "embarassingly" weak even given the short key. The 3600P used a proprietary 56 bit cipher similar to DES (but not inter-operable with the 3600D). The 3600E was the first controversial key escrowed model, with the then-classified Skipjack cipher and key escrow features implemented on a tamper-resistant MYK-78T Clipper chip. A later model, the 3600S, included a Clipper chip but would also downgrade (or upgrade, depending on your opinion of key escrow) to the F or P ciphers when communicating with those models. All five models use a Diffie-Hellman key exchange (768 bit, if I recall correctly) to establish a session key, a 4 character hash of which is displayed on each unit's LCD. To detect "man-in-the-middle" attacks, users could verify (by voice) that their displayed hashes matched.

 

This photo shows an open unit with its main circuit board exposed. The MYK-78T Clipper chip is visible in the far right of the board. The gray handset module at the front is a removable part that matches the unit to the audio and electrical levels of particular telephones.

 

Rodenstock Gerogon 240mm/9, Sinar P, BetterLight Super 6K-HS. Full resolution (6000x8000) version available.

 

Disclaimer: No emulsions were harmed in the making of this image.

Star Trek, First Contact (Paramount, 1996).

youtu.be/wxyZQR2d6yw Trailer

 

youtu.be/GTQzusrfCxc?t=3s

Star Trek - 'Beyond First Contact' The Borg - Making The Movie.

 

Starring Patrick Stewart, Jonathan Frakes, Brent Spiner, LeVar Burton, Michael Dorn, Gates McFadden, Marina Sirtis, Alfre Woodard, James Cromwell, Alice Krige, Neal McDonough, Robert Picardo, and Dwight Schultz. Directed by Jonathan Frakes.

 

Captain Jean-Luc Picard awakens from a nightmare about his Borg assimilation experience to an incoming message from Admiral Hayes. Hayes informs Picard that Deep Space Five reported that a colony has been destroyed. Completing the Admiral's sentence, Picard realizes who destroyed the colony — the Borg.

 

Picard calls a meeting and informs his senior officers that their ship has been instructed to patrol the Neutral Zone. Their orders are to protect the area from any possible Romulan uprising during a Borg attack. Despite protests from his officers, Picard remains faithful to his orders and the U.S.S. Enterprise NCC 1701-E begins to patrol the area. Later, Picard regretfully tells Riker that it is his own fault they are stuck in the Neutral Zone. Starfleet believes Picard to be too emotionally involved with the Borg because of his previous assimilation to tactically complete a mission against them.

 

The men return to the bridge to learn that Starfleet has engaged in combat with the Borg. Intercepting messages between the starships, the crew learns that the Federation is losing. Picard, with his Borg experience, knows he can help the fleet. He informs his staff that he will make a decision directly in opposition to Starfleet commands. With no objections from his crew, Captain Picard gives the order and the starship Enterprise sets a course for Earth and the attacking Borg cube.

 

A massive battle ensues and it appears that the Federation will lose the fight. Despite serious structural damage to the Borg cube, their strength does not weaken. Even the U.S.S. Defiant, commanded by Worf, does not appear to be able to turn the tides of the battle. As the starship Defiant is about to ram the Borg ship on a suicide run, the U.S.S. Enterprise beams aboard its crew, including Worf. Picard, having an inside perspective of the Borg and their vessel, focuses the firepower of the fleet on coordinates he knows to be critical. Just as the main ship is destroyed, a spherical escape pod flies out. The sphere creates a temporal vortex, catching the starship Enterprise in its wake. Immune to the paradoxes created by the time travel, the starship's crew learns that Earth at the present time appears to be inhabited entirely by the Borg. The commanding officers realize that the Borg have gone into the past and assimilated Earth, so they follow them back in time to repair the damage the Borg have done.

 

On Earth, over three centuries earlier, a somber Lily Sloane accompanies a stumbling, drunk Zefram Cochrane out of a bar after a night of revelry. Then, Lily notices a fast moving light. She hardly has time to ask what the object is, when the Borg vessel attacks. Back aboard the Enterprise, Picard demands that Data tell him the exact date and location the Borg ship is attacking. The location: central Montana. The date: April 4, 2063 — the day before First Contact. Realizing that the Borg have come to prevent first contact between alien life forms and humans, the crew knows they must stop the Borg and facilitate this exchange. They destroy the Borg sphere, and Dr. Crusher, Captain Picard, Commander Data, Commander Riker, Counselor Troi and other U.S.S. Enterprise crew transport down to Earth to survey the damage.

 

At the Borg attack site in Montana, the crew finds destruction and chaos. They split into groups to search for Cochrane. Data and Picard hunt for Cochrane's warp ship, the Phoenix. There they encounter a very angry and confused Lily, who believes Data and Picard to be members of a coalition that broke the cease-fire after World War III. She shoots at them in a rage, but impervious to bullets, Data approaches Lily. Overcome by fear and radiation, she falls to the ground. Dr. Crusher diagnoses Lily with radiation sickness caused by the damaged Phoenix, and inoculates the entire crew. Against Picard's better judgment, Crusher takes Lily to sickbay. Geordi is called to help repair the warp vessel and Picard becomes intrigued by its historical significance. In this vessel began the future as the world would know it, and the past as Picard remembers it. He reaches out to touch the ship. Data, curious about the human need for tactile reinforcement, attempts to create the same feelings he observes in Picard, but is unsuccessful in duplicating this aspect of humanity.

 

Aboard the ship, two crewmembers are sent to examine unexplained maintenance problems, and both disappear. Picard is called to the ship and discovers that the survivors from the Borg sphere have transported onto the ship and are taking over Deck 16. While Picard arranges teams to fight them, the Borg manipulate the climate of the deck to suit their needs and begin to spread throughout the ship. When the Borg attack sickbay, Crusher, her staff, and Lily escape through a Jeffries tube, thanks to a distraction by the ship's Emergency Medical Hologram. While Crusher leads the group down the passageway, Lily steals away in a different direction.

 

On Earth, Riker finds Troi and Cochrane drunk in a bar. Troi justifies that the only way she could get Cochrane to talk to her was by shooting Tequila with him. Denying her drunken state, Troi offers her professional opinion on Cochrane. She explains, "He's nuts."

 

Picard and his team are tracking the Borg through the starship. As Crusher and her staff find Worf's team, Picard's team encounters the Borg, who have begun to assimilate U.S.S. Enterprise crewmembers. Worf's team engages the Borg in combat, but the enemies adapt to the crew's weapons too quickly to make any difference. The teams are ordered to regroup on Deck 15, but Data is captured. Picard cannot save him, so he quickly crawls into a Jeffries tube to escape. Face to face with Picard, Lily steals his phaser and demands an explanation and escape route. Picard agrees.

 

Geordi shows Cochrane the starship Enterprise through a large telescope on Earth and tries to convince him to launch his vessel the next morning. Geordi glorifies Cochrane by explaining that his ship will make first contact with alien life forms. Humanity will be saved if Cochrane launches his ship. Still drunk, Cochrane agrees.

 

Aboard the ship, the Borg Queen introduces herself to a bound Data, claiming that she is the Collective. Reactivating Data's emotion chip, the Borg begin to graph organic, human skin onto the android's arm. As Data is overcome by this new human sensation of touch, something he never thought possible, the Borg continue their work.

 

Lily and Picard wander through the service deck as the captain attempts to explain what has happened between Lily's time and his own. She begins to calm down until they suddenly run into a Borg-infested area. Quickly escaping in the Holodeck, Picard activates a Dixon Hill program. At a dance, he and Lily try to blend in without being noticed by the Borg. Following the Holodeck's story, Picard searches for Nicky the Nose and takes his machine gun. Killing the Borg with the gun, Picard retrieves the memory chip that contains all of the information the Borg has received. Lily then notices that the two dead Borg were once crewmembers of the U.S.S. Enterprise.

 

Back on Earth, Cochrane keeps hearing what an amazing historical figure he is and begins to question whether or not he wants to go through with the launch. He doubts his own nobility and flees the launch site. Geordi and Riker attempt to catch up with Cochrane in the woods and are forced to stun him with a phaser to return him to the Phoenix.

 

Lily and Picard join the rest of the surviving crew and discover that the Borg are outside of the ship. The retrieved memory chip reveals that they are reconfiguring the main deflector in order to contact the Borg of this century, calling them to Earth to assimilate the planet. Picard, Worf and Lieutenant Hawk put on space suits and venture onto the surface of the starship to stop the Borg.

 

Aware of Data's desire to become human, the Borg Queen offers him the chance to be entirely covered in human flesh and join the Borg, in an attempt to get the encryption codes from Data so she can obtain total control over the U.S.S. Enterprise. Outside the Enterprise, Hawk, Worf and Picard attempt to unlock the deflector dish. Attacked by a Borg, Worf's suit begins to depressurize. Two Borg are killed and Hawk is attacked. As the dish is released, a now-assimilated Hawk attempts to kill Picard. Worf saves the captain, but Hawk is killed. Picard and Worf then destroy the free-floating deflector dish.

 

On Earth, Cochrane explains to Riker that his only motivation for inventing warp travel was money. He never expected to save mankind, become a hero, or be instrumental in the founding of a new civilization. He simply wanted to retire in peace.

 

An argument ensues aboard the Enterprise as the majority of the senior officers believe that they should evacuate the ship, destroying it and the Borg. Picard won't give up, and insists they stay. Challenged by Worf, Picard orders him off the Bridge. Lily follows Picard into his ready room and demands that he explain his obsession with fighting the Borg. Picard declares he won't sacrifice the starship, and swears to finally make the Borg pay for all they've done. Lily quietly and calmly compares Picard to Captain Ahab, forever fighting his white whale — the Borg. Realizing that this fight could only destroy himself and his crew, Picard decides to evacuate the ship. Worf, Picard and Crusher activate the ship's self-destruct sequence. The countdown begins, and the crew leaves in escape pods. Picard surveys his ship and prepares to leave when he hears Data calling him.

 

Meanwhile , the earth-bound crew and Cochrane begin takeoff. Cochrane, Geordi and Riker take off in the Phoenix, and with music blaring, the three men launch successfully into orbit.

 

On the ship, Lily and Picard say good-bye and the captain goes to save Data. Entering Engineering, Picard confronts the Borg Queen, whom he knows from his experience with the Borg. The queen reminds Picard that it was not enough that he was assimilated, but that he needed to give himself freely to the Borg — she wished him to stand by her side as an equal to further the power of the Collective. Picard offers himself in exchange for Data, but the android does not comply. He refuses to leave, and at the queen's command, disarms the self-destruct sequence. He quickly enters the encryption codes, offering full control of the Enterprise to the Borg.

 

As Cochrane's ship nears warp, Data arms the U.S.S Enterprise's weapons and aims them at the defenseless Phoenix. At the Borg Queen's order, Data fires, but the missiles fail to hit the Phoenix. His deception of the Borg complete, Data smashes a conduit, releasing a gas that floods engineering, killing all organic material. As the Borg are destroyed, Picard climbs to safety and the Borg Queen falls into the deadly gas. With the Borg threat gone, Cochrane safely completes humanity's first warp flight.

 

Celebrating the flight back on Earth that night, Cochrane and the Enterprise crew see an alien ship land nearby. The doors open, and Zefram Cochrane makes Earth's first contact with an alien race — the Vulcans. Picard and his crew beam out, having witnessed this historic event, and the U.S.S Enterprise NCC 1701-E returns to the 24th century.

 

One of the world’s most confounding literary mysteries may finally be, in part, solved: the author of the mysterious and as-yet untranslatable Voynich manuscript has been identified as a Jewish physician based in northern Italy, an expert in medieval manuscripts has claimed.

 

The Voynich manuscript is an illustrated book printed on vellum written entirely in an indecipherable script, leaving scholars and code-breakers scratching their heads since it re-emerged a century ago.

 

Writing in the foreword of a new facsimile of the 15th-century codex, Stephen Skinner claims visual clues in each section provide evidence of the manuscript’s author. If proved true, Skinner believes his theory will help unlock more secrets of the coded manuscript.

  

The Voynich manuscript: the unbreakable encryption?

Read more

The scholar draws evidence for his theory of the author’s identity from a range of illustrations in the manuscript, particularly a section in which naked women are depicted bathing in green pools supplied by intestinal-like pipes.

 

The doctor, whose work includes editing the spiritual diaries of the Tudor mystic John Dee, believes the illustrations show communal Jewish baths called mikvah, which are still used in Orthodox Judaism to clean women after childbirth or menstruation.

 

Pointing to the fact that the pictures show only nude women and no men, Skinner told the Guardian: “The only place you see women like that bathing together in Europe at that time was in the purification baths that have been used by Orthodox Jews for the last 2,000 years.”

 

He believes the drawings were of an invention designed by the mysterious author that aimed to ensure an efficient supply of clean water to a mikvah. “I think there is no other explanation for what they are: it is either rank fantasy by the author – which doesn’t really fit with the medical, herbal and cosmological sections of the manuscript – or it is a mikvah,” he said.

 

Other evidence Skinner uses to support his theory include the lack of Christian symbolism in the manuscript – unusual at a time of deep religious superstition, as the Inquisition enforced orthodox religion and punished any hint of heresy. “There are no saints or crosses, not even in the cosmological sections,” he said.

 

onsidered in addition to the absence of religious symbolism, Skinner said, visual clues in the manuscript suggest its author was a Jewish physician and herbalist. Many of the plants depicted, alongside astrological charts, are medicinal herbs, such as opium and cannabis. “In those days, doctors had to be astrologers as well, so they could determine the nature of an illness and treatment.”

  

Sign up for the Bookmarks email

Read more

Although Jews were persecuted in the Inquisition, they were in demand as doctors due to their knowledge of Mediterranean botany, he added.

 

Advertisement

 

A visual clue to the geographical origin of the manuscript in northern Italy lies in a sketch of a castle with a “swallow-tail” on one page. The unusual design, Skinner believes, is a Ghibelline fortification found only in castles in northern Italy in the 15th century. Many of the region’s towns, such as Pisa, had significant Jewish populations and could have inspired the Germanic style of some of the illustrations because the ruling family was allied to the German Holy Roman Emperor, instead of the pope.

 

He admitted his theory will have to be rigorously tested by other scholars, but added that he felt “85% certain” he was right. Skinner, who is an expert in medieval esoteric manuscripts, said he was now searching European Jewish books from the period for similar language, codes, scripts or linguistic patterns to those in the Voynich.

 

Should he succeed, Skinner will have solved a problem that has frustrated academics, cryptographers and computer programming experts since it was discovered in 1912 by the Polish collector Wilfrid Voynich.

 

Although there were allegations that Voynich had faked the book, the vellum and ink has been carbon dated to between 1404 and 1438. The authorship of the manuscript has led to heated debate with characters as varied as Dee and Leonardo da Vinci being posited as responsible for the manuscript.

 

Dee has also been suggested as a possible owner of the Voynich manuscript, a claim refuted by Skinner because the Tudor doctor and mystic was a notorious vandal of manuscripts that came into his hands. “The ladder-like symbol of his ownership is not on there and he hasn’t written anything on it,” he said, adding: “A temptation is always to find a name that everyone recognises, but I think it is unlikely to be by anyone famous.”

 

Skinner is hopeful that facsimiles of the manuscript will help decode it. “If it is in bookshops, someone might pick it up and recognise something in it that they are working with in another field of scholarship,” he said.

 

Asked what secrets he hopes it will reveal, he cited the medieval use of willow bark which provided the basis of aspirin: “It would be lovely if the herbalist section provided cures for things that we have forgotten about.”

www.theguardian.com/books/2017/jul/05/author-of-mysteriou...

  

As the 21st century dawned, an emerging generation of artists expanded the performance of self-fashioning, in which dress functions as a signifier of disidentification with the dominant social orders; their aim was to formulate modes of expression that affirm communal identity. In an age when issues of race, ethnicity, religion, gender, and sovereignty dominate national and geopolitical discourse, textiles, "as dense and multivalent sites of encryption," may, art historian Julia Bryan-Wilson argues, "alert others to our sense of self and signal our attempt to collectively belong."

 

In 2003 Liz Collins created "Pride Dress", in collaboration with designer Gary Graham, as part of a series of representations of the seven deadly sins. Today, the tattered gown with its torn and distressed flags precariously tacked together transcends its initial signification to reverberate with the roiling gender wars that rend the fabric of American society.

"The quest for certainty blocks the search for meaning. Uncertainty is the very condition to impel man to unfold his powers."

– Erich Fromm, in 'Man for Himself' (1947), Ch. 3.

 

"Ants are more like the parts of an animal than entities on their own. They are mobile cells, circulating through a dense connective tissue of other ants in a matrix of twigs. The circuits are so intimately interwoven that the anthill meets all the essential criteria of an organism.

– Lewis Thomas, 'The Lives of a Cell: Notes of a Biology Watcher', "Antaeus in Manhattan" (1974).

 

"A good man, through obscurest aspirations,

Has still an instinct of the one true way."

– Johann Wolfgang von Goethe, 'Faust'.

 

Tom Gannon, Vice President, Public Policy, Mastercard

One of the more interesting pieces inside Military Museum in Belgrade

Vera Wilde, artist-in-residence at Hack42. Because Art & Science!

 

Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting.

The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

This is our second photo-shoot together. We have great chemistry and it's loads of fun to shoot with her.

We got to play with a few props, listen to some music and experiment with light and posing.

Example of a Linux 'shadow file' that contains the encrypted passwords for the users.

1 2 3 5 7 ••• 79 80