Tag Archives: windows

Warlike Flyboys – Ww3 – Download Plane Simulator …

Posted: June 16, 2016 at 5:50 pm

Try your skills and join epic battles in the great game Warlike Flyboys – WW3! Aerial wars take place right here and right now! Have you got any ideas about what the third world war may look like? Huge and contemporary weapons and great aviation forces are waiting for their hour of triumph! Take your pilot’s seat without hesitation and raise your iron machine constructed for destruction high into the skies. All the airplanes are extremely powerful and furious, so dont let them stay still not even for a second and get ready for massive attacks! Look through your tasks in the ravishing game Flyboys – WW3 and dont stop while destroying enemies bases. Warlike Flyboys – WW3 like any other serious simulator of its genre includes all well-known standards like non-stop action and explding the enemies bases. That’s why you should be careful and choose your vehicle – some big plane to control, fly and fight. Firstly, you may realize what air forces should be chosen: is your airplane belonging to Sabres or the USA? Have you chosen your destiny? Lets start and have fun!

3D game with easy controls

High-quality graphics, music and effects

Some chances for training

25 planes and 3 levels of difficulty

Download Plane Simulator – Absolutely FREE

Windows 98/ME/2000/2003/XP

DirectX 9

Pentium III processor and higher

256 Mb RAM

50 Mb hard drive space

32 Mb 3D video card

Go here to read the rest:

Warlike Flyboys – Ww3 – Download Plane Simulator …

Posted in Ww3 | Comments Off on Warlike Flyboys – Ww3 – Download Plane Simulator …

Minerva Reef Directions | Island Cruising Association

Posted: June 12, 2016 at 8:24 pm

Minerva sailing directions South Pacific voyagers, particularly those bound from Tonga or Fiji for largely cyclone-free New Zealand, should keep North and South Minerva Reef in mind for a possible storm refuge, rest stop, adventure destination, or at the very least as a potential hazard to navigation. These two atolls also represent an opportunity to see tropical Indo-Pacific sea life in a nearly undisturbed condition. Weather windows The best times to visit the Minervas are either northbound during the late Southern Hemisphere fall near the end of May/ early June or southbound during the late spring in October. Arriving too early (northbound) or too late (southbound) invites exposure to severe weather conditions. Depart New Zealand for the voyage north right behind an outgoing low, not in the middle of a high, and embark from the Minervas southward just as the leading edge of a preferably mild high reaches the area.

Information sources British Admiralty Chart 985, Mi nerva Reefs.: accurately depicts both atolls and includes a close-up of the pass into South Minerva useful for orientation. Approximate CPSentrance coordinates, for use in good light in conjunction with the chart and a lookout only, are 230 37.36 S, 178056.11 W (North Minerva) and 23 56.55 S, 179007.60 W (South Minerva). Sailing Directions Planning Guide for the South Pacific Ocean (Publication 122) also contains useful data for a visit to the Minervas. General layout North Minerva Reef is nearly circular, with an approximate diameter of 3.5 nm. Using a proper lookout, one can move around inside the atoll in order to anchor in the greatest protection for the prevailing wind. South Minerva Reef consists of two roughly circular rings of reef joined in the middle, like a number 8 tilted slightly in a northeast-southwest orientation. Only the two-milediameter eastern lagoon is accessible to larger vessels, and anchoring in Herald Bight, outside the pass, is tenable for wind directions lacking a northerly component. Like North Minerva, movement throughout this eastern lagoon for optimal anchoring is possible with a vigilant lookout. We noted a narrow pass on the northern rim of the western lagoon not shown on the chart, potentially navigable for centerboarders and dinghies. Good holding ground is prevalent inside both Minervas, and both feature slightly

bumpy conditions at higher tides in normal weather conditions. Gear A fully stocked medical kit, manuals, and training; good longdistance communication capability, such as single-sideband or ham radio or an Inmarsat transceiver; and survival fishing and watermaking equipment are all critical for a trip to the Minervas. Fishing and diving gear will greatly enhance your pleasure and dinner menu. Specifically, bring medium to heavy trolling gear for offshore fishing, 10- and 20-poundclass spinning rods for lagoon fishing, wetsuits for diving and snorkeling in the cool water, thick dive boots or other protective footwear for reef walking, and a Hawaiian sling and lobster snare. Jurisdiction The Minerva Reefs were ceded to Tonga in 1972 and ratified by the South Pacific Forum the same year. In 2010 Fiji disputed the Tongan ownership and placed gunboats at North Minerva to try and force their claim. The claim is currently under dispute.

Obviously,you will have either cleared customs out of Tonga or not yet checked in when you visit. The Minervas, however, have been long considered a stopover between countries, certainly in severe weather or for vessel repairs. Nevertheless, go easy on the seafood harvest, never taking more than you can consume in a short time, and do not disturb giant clams, sea turtles, or other threatened creatures. A visit from a Tongan patrol boat should not, under these conditions, be cause for concern.

This entry was posted on Monday, April 25th, 2011 at 2:19 pm and is filed under Cruising Guide, Resources. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.

See the article here:

Minerva Reef Directions | Island Cruising Association

Posted in Minerva Reefs | Comments Off on Minerva Reef Directions | Island Cruising Association

Chocolatey Gallery | Jitsi 2.8.5426

Posted: May 28, 2016 at 4:44 am

Private CDN cached downloads available for licensed customers. Never experience 404 breakages again! Learn more…

This package was approved by moderator ferventcoder on 4/24/2015.

Jitsi (formerly SIP Communicator) is a free and open source multiplatform voice (VoIP), videoconferencing and instant messaging application for Windows, Linux and Mac OS X. It supports several popular instant messaging and telephony protocols, including open recognised encryption protocols for chat (OTR) and voice/video/streaming and voice/video conferencing (SIP/RTP/SRTP/ZRTP), as well as built-in IPv6, NAT traversal and DNSSEC. Jitsi and its source code are released under the terms of the LGPL.

To install Jitsi, run the following command from the command line or from PowerShell:

To upgrade Jitsi, run the following command from the command line or from PowerShell:

In cases where actual malware is found, the packages are subject to removal. Software sometimes has false positives. Moderators do not necessarily validate the safety of the underlying software, only that a package retrieves software from the official distribution point and/or validate embedded software against official distribution point (where distribution rights allow redistribution).

Chocolatey Pro provides runtime protection from possible malware.

This package has no dependencies.

20042012 Emil Ivov

https://jitsi.org/Main/News

Excerpt from:
Chocolatey Gallery | Jitsi 2.8.5426

Posted in Jitsi | Comments Off on Chocolatey Gallery | Jitsi 2.8.5426

Jitsi – OSTN – Guardian Project Open Dev

Posted: May 21, 2016 at 3:44 pm

Jitsi Setup

Go to http://jitsi.org/ in your browser. Download the program onto your computer. Jitsi is an audio/video and chat application that supports protocols such as SIP, XMPP/Jabber, AIM/ICQ, Windows Live, Yahoo! and many other useful features.

When Jitsi is installed, go to the applications folder and open it.

Select the SIP account type in the Network pull down in the new account window. It should look like this

In the Sip id box, add the username & server detail we sent to you in the email (for example foo@ostel.co).

In the Password box, Add the password we sent to you in the email.

Click the Advanced box

Click the Connection tab. Fill out the form fields to match this screenshot

Click the Next button. Confirm the settings are correct on the next screen. Click Sign In

You should see it read “Registering” for a few seconds until the bar to the right of your account name turns Green and reads SIP ON Online.

Congratulations! You’ve successfully signed in.

You can fetch a package or subscribe to the repository.

For details on the current status with the official Debian packaging, please refer to Debian Bug report logs.

Known issues making a ZRTP initiation between clients.

Current successes for ZRTP: Jitsi OSX -> Groundwire / Ostel -> Jitsi OSX

Current failings for ZRTP: Groundwire -> Jitsi OSX / Jitsi OSX -> Ostel

Secure video calls, conferencing, chat, desktop sharing, file transfer, support for your favorite OS, and IM network. All this, and more, in Jitsi – the most complete and advanced open source communicator.

The ever growing use of Voice over IP (VoIP) and other media applications triggered a more widespread use of the Real-time Transfer Protocol (RTP). Thise protocols is the workhorse for VoIP applications. Many VoIP applications send RTP data over the public Internet in clear, thus the data is not protected from eavesdropping or modification. Therefore most VoIP applications are regarded insecure today. During the last years several activities started to enhance the security of RTP.

The Secure Real-time Transfer Protocol (SRTP) enhances security for RTP and provides integrity and confidentiality for RTP media connections. To use SRTP in an efficient way VoIP applications should be able to negotiate keys and other parameters in an automatic fashion.

ZRTP is a protocol that negotiates the keys and other information required to setup a SRTP audio and video session

While it is important to look at the technology, the protocols and alike, it is also important to look at the implications a specific technology may have on its implementation, deployment, and usability. Usability is of major importance for VoIP peer-to-peer applications: these applications are mainly used by non-IT persons. Therefore the handling must be simple, easy to use, and shall not require special infrastructure or registration.

http://jitsi.org/index.php/Documentation/ZrtpFAQ

Original post:
Jitsi – OSTN – Guardian Project Open Dev

Posted in Jitsi | Comments Off on Jitsi – OSTN – Guardian Project Open Dev

The NSA – The Super Secret National Security Agency

Posted: May 7, 2016 at 3:47 am

– A Tale of Two Countries – New Zealand Apologizes for Illegal Domestic Spying, While U.S. Still Refuses to Acknowledge NSAs…

– Attacking Tor – How the NSA Targets Users’ Online Anonymity

– Citizens Against Unidentified Flying Objects Secrecy v. National Security Agency

– Clapper Reveals Bush-Era Docs Showing NSA Spying Dragnet Started 2001

– Covert Operations of the U.S. National Security Agency

– Creation of The NSA – from ‘The Secret Government – Origin, Identity and Purpose of MJ-12’

– DARPA – Defense Advanced Research Projects Agency – Main File

– Did the NSA Kill Hugo Chavez?

– Exposed The Covert, Real-Time Spying on Youtube, Facebook and Blogs

– Foiling Computer Hackers Top Priority With FBI, CIA, Pentagon, NSA

– ‘Follow the Money’ – NSA Spies on International Payments

– Foreign Officials in the Dark About their Own Spy Agencies’ Cooperation with NSA

– Google and The NSA Connection

– Google and The NSA – Whos Holding The ‘Shit-Bag’ Now?

– Google Asks NSA to Help Secure Its Network

– Google, CIA and the NSA – Inside the Secret Network behind Mass Surveillance, Endless War and Skynet

– Google to Enlist NSA to Help It Ward Off Cyber-Attacks

– Hidden Government Scanners Will Instantly Know Everything About You from 164 Feet Away

– High-Level U.S. Government Officials Have Warned for 40 Years that Mass Surveillance Would Lead to Tyranny…

– How Google, Facebook, Skype, Yahoo and AOL are All Blatantly Lying to Their Own Users in Denying NSA Spy Grid…

– How International Treaties Gave NSA Back-Door Access for Surveillance

– How NSA Access Was Built into Windows

– How the NSA Plans to Infect ‘Millions’ of Computers with Malware

– How the NSA Spies on Your Google and Yahoo Accounts

– Inside TAO – Documents Reveal Top NSA Hacking Unit

– Inside The NSAs Largest and Most Expansive Secret Domestic Spy Center in Bluffdale, Utah – Exposed

– It’s Not Just Spying – How the NSA Has Turned Into a Giant Profit Center for Corrupt Insiders

– Key to The Extraterrestrial Messages – NSA Technical Journal Vol XIV No 1

– La NSA Particip en El Desarrollo de Windows 7

– La Red Echelon – Main File

– Lawless NSA Global Spying

-Mat la NSA a Hugo Chvez?

– NSA Able to Target Offline Computers Using Radio-Waves for Surveillance, Cyber-Attacks

– NSA Boss Wants More Control Over The Internet

– NSA Built Back Door in All Windows Software by 1999

– NSA Claims Massive New Surveillance Powers

– NSA Director Defends Plan to Maintain ‘Backdoors’ Into Technology Companies

– NSA Gathers Data on Social Connections of U.S. Citizens

– NSA, GCHQ Using Data from ‘Leaky’ Smartphone Apps to Spy

– NSA has Built its Own, Secret, Warrantless, Shadow Social Network, and You’ve Already Joined It

– NSA Helped With Windows 7 Development – Privacy Expert Voices ‘Backdoor’ Concerns – Security Researchers Dismiss Idea

– NSA ‘Helping’ Microsoft With Windows 7 ‘Security’

– NSA Infiltrates Links to Yahoo and Google Data Centers Worldwide – Snowden Documents Say

– NSA – National Security Agency – Extrapolate Postmodum Prosum – Updated

– NSA Offering ‘Billions’ for Skype Eavesdrop Solution – Business Model for P2P Firm at Last?

– NSA Recent UFO Document Release More Interesting for What It “Could” Not Find

– NSA Refuses to Declassify Obamas Cybersecurity Directive – Exceptionally Grave Damage

– NSAs Computer and Mobile Spying – An Interview with Professor Tung Yin

– NSA’s Domestic Surveillance is Motivated by Fears that Environmental Disasters Could Fuel Anti-Government Activism

– NSA Secretly Exploited Devastating Heartbleed Bug for Years – Report

– NSA Security Running Amok to Plug Leaks About 9/11

– NSA Spying Did Not Result in a SINGLE Foiled Terrorist Plot

– NSA’s Top Hacking Unit

– NSA Top-Secret Document from 2012 – FOXACID – SECONDDATE – WILLOWVIXEN

– NSA Surveillance Goes Beyond Orwell’s Imagination – Says Alan Rusbridger

– NSA Took Part in The Development of Windows 7

– NSA Wants EZ Pass Control for Internet

-“Obese Intelligence” – The NSA Search Engine

– Quantum Insert

– Radio Mensajes Provenientes del Espacio Exterior – Documento Desclasificado de La NSA

– Russian Researchers Expose Breakthrough U.S. Spying Program

– Secret Archives – National Security & Privacy

View post:
The NSA – The Super Secret National Security Agency

Posted in NSA | Comments Off on The NSA – The Super Secret National Security Agency

Jitsi – WOW.com

Posted: April 11, 2016 at 5:45 am

Jitsi Original author(s) Emil Ivov Developer(s) Jitsi Team and Contributors Initial release 2003(2003) Stable release 2.8 (build.5426) (March19, 2015; 11 months ago(2015-03-19)) [] Preview release 2.9 (nightly) [] Development status Active Written in Java Operating system Linux, Mac OS X, Windows (all Java supported) Size 52.4 MB Windows (bundles its own private JRE)[1] 78.8MB Mac OS X (includes private JRE)[2] 22MB Linux 65MB source code[3] Available in Asturian, English, French, German, Bulgarian, Japanese, Spanish, Italian, Romanian, Greek and 25 more Type Voice over Internet Protocol / instant messaging / videoconferencing License Apache Website jitsi.org

Jitsi (formerly SIP Communicator) is a free and open source multiplatform[4]voice (VoIP), videoconferencing and instant messaging application for Windows, Linux, Mac OS X and Android. It supports several popular instant-messaging and telephony protocols, including open recognised encryption protocols for chat (OTR) and voice/video/streaming and voice/video conferencing (SIP/RTP/SRTP/ZRTP), as well as built-in IPv6, NAT traversal and DNSSEC. Jitsi and its source code are released under the terms of the Apache Software Licence.[5]

Work on Jitsi (then SIP Communicator) started in 2003 in the context of a student project by Emil Ivov at the University of Strasbourg.[6] It was originally released as an example video phone in the JAIN-SIP stack and later spun off as a standalone project.[7]

Originally the project was mostly used as an experimentation tool because of its support for IPv6.[8][9] Through the years, as the project gathered members, it also added support for protocols other than SIP.

Jitsi has received support from various institutions such as the NLnet Foundation,[10][11] the University of Strasbourg and the Region of Alsace[12] and it has also had multiple participations in the Google Summer of Code program.[13][14]

In 2009, Emil Ivov founded the BlueJimp company which has employed some of Jitsi’s main contributors[15][16] in order to offer professional support and development services[17] related to the project.

In 2011, after successfully adding support for audio/video communication over XMPPs Jingle extensions, the project was renamed to Jitsi since it was no longer “a SIP only Communicator”.[18][19] This name originates from the Bulgarian “” (wires).[20]

On November 4, 2014, “Jitsi + Ostel” scored 6 out of 7 points on the Electronic Frontier Foundation’s secure messaging scorecard. They lost a point because there has not been a recent independent code audit.[21]

On February 1, 2015, Hristo Terezov, Ingo Bauersachs and the rest of the team released [22] version 2.6 from their stand at the Free and Open Source Software Developers’ European Meeting 2015 event in Brussels. This release includes security fixes, removes support of the deprecated MSN protocol, along with SSLv3 in XMPP. Among other notable improvements, the OS X version bundles a Java 8 runtime, enables echo cancelling by default, and uses the CoreAudio subsystem. The Linux build addresses font issues with the GTK+ native LookAndFeel, and fixes some long standing issues about microphone level on call setup when using the PulseAudio sound system. This release also adds the embedded Java database Hyper SQL Database to improve performance for users with huge configuration files, a feature which is disabled by default. A full list of changes is [23] available on the project web site.

Jitsi supports multiple operating systems, including Windows as well as Unix-like systems such as Linux, Mac OS X and BSD. “Beta” packages built for Android are available[24] but the project’s roadmap describes the porting to Android as “on hold”.[25] It also includes:[26]

The following protocols are currently supported by Jitsi:[4]

Jitsi is mostly written in Java[31] which helps reuse most of the same code over the various operating systems it works on. Its GUI is based upon Swing. The project also uses native code for the implementation of platform specific tasks such as audio/video capture and rendering, IP address selection, and access to native popup notification systems such as Growl.

The project uses the Apache Felix OSGi implementation[32] for modularity.

Among others Jitsi uses the JAIN-SIP protocol stack for SIP support and the Jive Software Smack library [33] for XMPP.[34]

As Jitsi can handle IPv6 it is especially interesting for direct PC-to-PC (peer-to-peer) communication, for instance, if both sides were ‘trapped’ behind NAT routers, but could obtain a reachable IPv6 address via a tunnel-broker.[citation needed]

The Jitsi community has also completed an ICE implementation called ice4j.org, which it uses to provide NAT traversal capabilities, and assist IPv4 to IPv6 transition.[35]

Audio systems supported are PortAudio, PulseAudio and WASAPI (Windows Audio Session API).

Go here to see the original:
Jitsi – WOW.com

Posted in Jitsi | Comments Off on Jitsi – WOW.com

Technology | Define Technology at Dictionary.com

Posted: March 26, 2016 at 8:44 am

Contemporary Examples

And it finishes second, behind New York, for technology Innovation.

But Shawn and Craig, 47, are accused of being interested in technology as well.

Her reveals the sometimes blind, unsettling way love and technology merge.

Yet equal access to education and technology still remains a challenge.

The second feature is how to translate the technology efficiently: how to harness the power of this device for practical use.

British Dictionary definitions for technology Expand

the application of practical sciences to industry or commerce

the methods, theory, and practices governing such application: a highly developed technology

the total knowledge and skills available to any human society for industry, art, science, etc

Derived Forms

technological (tknldkl) adjectivetechnologically, adverbtechnologist, noun

Word Origin

C17: from Greek tekhnologia systematic treatment, from tekhn art, skill

Word Origin and History for technology Expand

1610s, “discourse or treatise on an art or the arts,” from Greek tekhnologia “systematic treatment of an art, craft, or technique,” originally referring to grammar, from tekhno- (see techno-) + -logy. The meaning “science of the mechanical and industrial arts” is first recorded 1859. High technology attested from 1964; short form high-tech is from 1972.

technology in Science Expand

The use of scientific knowledge to solve practical problems, especially in industry and commerce.

The specific methods, materials, and devices used to solve practical problems.

technology in Technology Expand

jargon Marketroid jargon for “software”, “hardware”, “protocol” or something else too technical to name. The most flagrant abuse of this word has to be “Windows NT” (New Technology) – Microsoft’s attempt to make the incorporation of some ancient concepts into their OS sound like real progress. The irony, and even the meaning, of this seems to be utterly lost on Microsoft whose Windows 2000 start-up screen proclaims “Based on NT Technology”, (meaning yet another version of NT, including some Windows 95 features at last). See also: solution. (2001-06-28)

See the original post here:

Technology | Define Technology at Dictionary.com

Posted in Technology | Comments Off on Technology | Define Technology at Dictionary.com

Automation | The Car Company Tycoon Game

Posted: March 25, 2016 at 12:45 pm

Automation is still in development, but you can get in on Early Access now! Youll get instant access to some extra content for the current version of the game, and a copy of the full version when its completed, as well as every update along the way.

IMPORTANT NOTE: Automation is still heavily in development. There is already many hours of interesting gameplay to be had out of Automation, but some major features are not complete. Large updates are usually released every few months

Automation Early Access: Steam

Automation is sold as a Digital Download version only, and is for Windows PCs only

Click here to check the minimum specifications. Noting that if your Graphics Card doesnt support Shader Model 3.0 or above it wont run Automation (almost all modern graphic cards, but please check your graphics card manufacturers website if unsure)

Note: Intel Integrated Graphics cards (as seen on many budget laptops) are not officially supported but some of them may run Automation OK on low settings. Try the demo if unsure.

Excerpt from:

Automation | The Car Company Tycoon Game

Posted in Automation | Comments Off on Automation | The Car Company Tycoon Game

Technology | Define Technology at Dictionary.com

Posted: at 12:44 pm

Contemporary Examples

And it finishes second, behind New York, for technology Innovation.

But Shawn and Craig, 47, are accused of being interested in technology as well.

Her reveals the sometimes blind, unsettling way love and technology merge.

Yet equal access to education and technology still remains a challenge.

The second feature is how to translate the technology efficiently: how to harness the power of this device for practical use.

British Dictionary definitions for technology Expand

the application of practical sciences to industry or commerce

the methods, theory, and practices governing such application: a highly developed technology

the total knowledge and skills available to any human society for industry, art, science, etc

Derived Forms

technological (tknldkl) adjectivetechnologically, adverbtechnologist, noun

Word Origin

C17: from Greek tekhnologia systematic treatment, from tekhn art, skill

Word Origin and History for technology Expand

1610s, “discourse or treatise on an art or the arts,” from Greek tekhnologia “systematic treatment of an art, craft, or technique,” originally referring to grammar, from tekhno- (see techno-) + -logy. The meaning “science of the mechanical and industrial arts” is first recorded 1859. High technology attested from 1964; short form high-tech is from 1972.

technology in Science Expand

The use of scientific knowledge to solve practical problems, especially in industry and commerce.

The specific methods, materials, and devices used to solve practical problems.

technology in Technology Expand

jargon Marketroid jargon for “software”, “hardware”, “protocol” or something else too technical to name. The most flagrant abuse of this word has to be “Windows NT” (New Technology) – Microsoft’s attempt to make the incorporation of some ancient concepts into their OS sound like real progress. The irony, and even the meaning, of this seems to be utterly lost on Microsoft whose Windows 2000 start-up screen proclaims “Based on NT Technology”, (meaning yet another version of NT, including some Windows 95 features at last). See also: solution. (2001-06-28)

The rest is here:

Technology | Define Technology at Dictionary.com

Posted in Technology | Comments Off on Technology | Define Technology at Dictionary.com

Download Tor Browser for Windows 5.5.1 – FileHippo.com

Posted: March 10, 2016 at 1:43 pm

Tor Browser for Windows has been designed to help you preserve your privacy online. Tor Browser is a tool set that can help you anonymize web browsing and publishing, instant messaging, and other applications that use the TCP protocol. This can be helpful for private use and business use.It means that confidential information can be kept from prying eyes. ISPs, key loggers and other types of malware are not able to track your activities easily.

Tor Browser for Windows works by bouncing traffic around a distributed network of servers which it calls “onion routers”. The interface allows you to toggle it on and off based upon when you need anonymity online. Tor Browser for Windows also lets you choose from various proxy tunnels based on a world map that displays exactly where each one is located.

Overall, Tor Browser for Windows is a simple, well organized and effective tool for users who are concerned about security or invasions of privacy whilst they are online. The browser interface is a standard, user friendly affair and the application is relatively lightweight.

Excerpt from:
Download Tor Browser for Windows 5.5.1 – FileHippo.com

Posted in Tor Browser | Comments Off on Download Tor Browser for Windows 5.5.1 – FileHippo.com