Anda di halaman 1dari 16

A proxy is a server that serves as a middle-man for users connecting to other servers.

The user submits a request and the proxy communicates with the website or resource to fulfill that request on the user's behalf. By doing this, the server or resource identifies the proxy's IP address instead of that of the user. The proxy can also allow the user to bypass filters. For instance, a server that restricts its use based on location only allows requests from IP addresses within that location. By using a proxy within that location, the server can be tricked into granting access to the user. There are many different types of proxies. For our purposes, we will be discussing Forward, Open, Reverse, Transparent/Forced/Intercept and Web proxies. I will attempt to write all of the computer-speak in terms that may be understood by the computer-illiterate. A forward proxy forwards traffic from the user to the server(website). It is the most basic proxy, and simply takes requests from the user and forwards them to the server(internet). An open proxy is accessible to anyone on the internet. It is usually in the form of a web browser or website. The user can surf the web using the open proxy, and conceal their IP address from the servers and sites they visit. A reverse proxy appears to be a normal server. Requests sent by the user to the proxy are forwarded to a hidden internal web server that processes the user's request. These are most commonly used at libraries and workplaces, to monitor user activity. A transparent proxy intercepts the user's network communication without his knowledge and without any user configuration. There are two methods used in transparent proxy implementation: GRE Tunneling aka OSI Layer 3 and MAC rewrites aka OSI Layer 2. Generic Routing Encapsulation Tunneling was developed by Cisco

Systems to encapsulate network layer protocols within point-to-point links. GRE is used to send IP packets between networks without having them sniffed. This allows the user to surf the web without revealing his IP, and provides encryption on any packets sent by the user. GRE is done using OSI Layer 3. The network layer, known as OSI 3, is the third layer of the seven layer OSI model of computer networking. MAC rewriting is a protocol that allows for rewriting your MAC address for Layer 2 tunneling. A web proxy is the most common form of proxy, and is a subset of the open proxy. It allows users to input a website's URL, and it subsequently opens that website in the user's browser window. As far as proxies go, there are typically 4 levels of user anonymity. Level 1 provides no anonymity: The remote host knows the user's IP address, and is aware that the user is using a proxy. Level 2 (low): The remote host does not know the user's IP address, but is aware that the user is using a proxy. Level 3 (medium): The remote host does not know the user's true IP address, but is aware that the user is using a proxy. Inbound interface is displayed as "REMOTE_ADDR" for the remote host. Level 4 (high): The remote host does not know the user's IP address, and is unaware that the user is using a proxy. Below are instructions for using a proxy IP with your web browser: Firefox: Tools > Options > Advanced > Settings > Manual proxy configuration. Google Chrome: Options > Under the hood > Network > Change proxy settings > LAN settings > Use a proxy server > Advanced > HTTP. Internet Explorer: Tools > Internet options > Connections > LAN settings > Use a proxy server > Advanced > HTTP.

Once you have made it to either Manual proxy configuration or HTTP, simply type in the proxy's IP address and port number into your browser's configuration. Virtual Private Networks, or VPNs, are much more secure than web proxies. Unlike a web proxy, a VPN tunnels your entire internet connection. This prevents applications on your computer from bypassing the proxy. All traffic on a VPN is heavily encrypted to prevent caching of cookies and packet sniffing. Even proxy detection programs like traceroute are usually unable to detect a good VPN. Examples of VPNs are TOR, I2P and HideMyAss. HideMyAss is the only VPN that I know of that completely prevents all of a system's applications from accessing the internet outside of the proxy. Sonic Weapons Sounds dangerous.

The audible range of the average human ear is from 20Hz to 20,000Hz. Sounds below this range are called infrasonic, and are generally felt in the form of vibrations. Sounds above this range are ultrasonic. Both have the potential of causing disorientation, nausea, hearing loss, injury and even death. The outcome depends on the sound pressure level of these sounds. All sound is energy travelling through matter in the form of a wave. Infrasonic waves are low frequency and have a long wavelength. Ultrasonic waves are high frequency and have a short wavelength. The louder a sound is, the more it moves the structures in your ear. The higher its pitch, the faster it moves them. Loud or high-pitched noises can cross the

threshold of pain, or the point at which a sound is painful. Here's how some everyday sounds compare to the LRAD:

Normal conversation: 60 dB Threshold of pain: 130 dB, depending on the person's tolerance LRAD maximum continuous volume: 162dB

Sound waves can pass through one another without much distortion or change. But in the right conditions, sound waves can change each other dramatically. For example, identical sound waves that are out of phase (their compressions and rarefactions are reversed) can cancel one another out. On the other hand, identical waves that are in phase combine their compressions and rarefactions, doubling their amplitude. As sound waves travel, they spread out in all directions in a curved wave front. The farther they travel from the source, the more they spread and the quieter the sound becomes. This is known as the Dopplar Effect. However, high-frequency waves don't spread as much as low-frequency waves. Also, waves with long wavelengths generally travel farther than ones with short wavelengths. The sound that the LRAD produces can be directed so there's less-than-normal dispersion. This results in a 20-dB drop in the volume of sound 15 degrees outside the beam. This directional sound propagation stems from the fact that the LRAD employs outer and inner transducers in creating sound waves that are not completely in phase with each other. This enables other sound waves to cancel out those that are in the outermost portion of the beam. The resulting wave front of the sound is also flatter than usual, preventing the sound from being dispersed as it propagates.

As the sound waves interact with the air, they create additional frequencies within the wave and thus amplify the sound and pitch. Instead of using one big, moving device to make all this sound, the LRAD uses lots of little ones. A speaker usually uses one rapidly moving diaphragm to make sound. The LRAD has an array of piezoelectric transducers. A transducer is simply a device that changes one kind of energy into another kind of energy. In this case, it changes electrical impulses into sound. A piezoelectric material is a substance that is permanently electrically polarized -- it has a positively charged side and a negatively charged side. If you apply pressure to a piezoelectric material, it creates an electrical impulse. On the other hand, if you apply an electrical charge to it, its molecules move and it changes shape. Using electrical current from a battery, generator or other source, the LRAD applies electrical charge to several piezoelectric transducers. The transducers rapidly change their shape and create sound waves. All of these transducers are attached to a mounting surface. They're staggered to allow more of them to fit into a smaller space. This helps the LRAD create very loud sounds -- identical waves emerge from the transducers, and their amplitudes combine to create louder sounds.

Social Security

The first three digits are called the area number, the next two digits are called the group number, and the last four digits are the serial numbers. The area numbers are assigned on the basis of the zip-code on your SSN application. The group numbers are just for bookkeeping purposes only, they dont have any specific meaning. In each group number, the serial numbers are allocated consecutively from 0001 to 9999. Area numbers increase from east/northeast coast to west coast. People living on the east/northeast coast have the lowest area numbers (for example, people who apply for SSN from New Hampshire have the lowest area numbers) whereas, people living on the west coast and southwest areas have the highest area numbers. Invalid social security numbers include numbers with a set of zeroes ( 000-xx-xxxx, xxx-00-xxxx, xxx-xx-0000), numbers starting with 666 (this would raise religious concerns), numbers from 98765-4320 through 987-65-4329 - which are marked for advertising, and numbers with the starting three digits above 770, which are not yet allocated. Social security numbers are not reassigned after people die. Here is what socialsecurity.gov says about it: We do not reassign a Social Security number (SSN) after the number holders death. Even though we have issued over 420 million SSNs so far, and we assign about 5 and one-half million new numbers a year, the current numbering system will provide us with enough new numbers for several generations into the future with no changes in the numbering

system. So, what about the numbers on the back of the card? Contrary to the beliefs of conspiracy buffs, they do not indicate a bank account or routing number. These alphanumeric codes are printed in red, black or blue ink and help authenticate the card as valid. The sequential control number, which bears no obvious correlation to an individual's Social Security Number should correspond to the date, area, and application of a particular cardholder. According to the SSA: "On the rear of a legitimate card there is a sequential control number. The control number is a combination of alpha and numeric that bears no relation to the actual social security number on the card. However, the computer records of the Social Security Administration should show a correlation between the control number and the social security number and name on the card." This is very interesting for two reasons. First, a counterfeiter could simply copy the sequential control number to a forged card. Second, I have never seen anyone at any DMV office or bank ever pay the least amount of attention to the back of someones social security card. So, how then is this an effective security measure against fraud? You can apply for a SSN in your home country before you come to the United States when filing an application for an immigrant visa with the U.S. Department of State. In almost all cases, if you apply for a Social Security number and card with your immigrant visa application, you do not have to visit a Social Security office in the United States. The Death Master File is publicly available from the

Social Security Administration for a little under $1,800 for a single issue ($6,900 for a quarterly subscription with monthly updates). Anyone can buy 60 million electronic records from the SSA on all deceased Americans. These records contain important personal identifiable information, including the name, social security number, date of birth, date of death, state or country of residence, ZIP code of last residence, and ZIP code of lump sum payment to the deceased's beneficiary. These records are also accessible for free on the web at places like Ancestry.com. The records have over a 3% error rate, and provide information chiefly on those who died after 1960. Unscrupulous users of this database are able to exploit the recently bereaved or take advantage of their changed financial circumstances. Separate from what residual privacy concerns might be there for the recently departed, it is important to appreciate the effect such disclosure has on the survivor's privacy where their spouse's or parent's name, SSN and location is made freely available. Although the procedures of issuing a SSN have changed over the years, these digits can reveal an individual's relative age and place of birth. The area numbers indicate the state in which the number was issued. The group numbers indicate the sequential order in which the SSN was issued in each area. The serial numbers are the only ones that are randomly generated. In their 2009 study, Carnegie Mellon professor Alessandro Acquisti and researcher Ralph Gross demonstrated through a two-step process how someones full SSN is easily calculated by knowing their birth date and place of residence. First, the researchers analyzed public records in the Social Security Administrations Death Master File (DMF) to examine statistical trends in

the assignment of SSN for those whose deaths were reported to the Social Security Administration. Second, combining these patterns derived from DMF analysis with an alive individuals state and birth date (which can be found on various offline sources, such as voter registration lists, or online sources, such as social networking sites), Acquisti and Gross identified the first 5 digits for 44% of DMF records from 1989 to 2003 and complete SSNs in less than 1000 attempts for 8.5% of the records. Acquisti and Gross found a strong correlation between birth date and all nine digits of an SSN, a correlation that increases for individuals in less populous states. Their research proved that anyones SSN can be determined using their birth date and location. In response to growing concerns over the accumulation of massive amounts of personal information, Congress passed the Privacy Act of 1974. Among other things, this Act makes it unlawful for a governmental agency to deny a right, benefit, or privilege merely because the individual refuses to disclose his SSN.

001-003 NH 004-007 ME 008-009 VT 010-034 MA 035-039 RI 040-049 CT 050-134 NY 135-158 NJ 159-211 PA

212-220 MD 221-222 DE 223-231 VA 232-232 NW* 233-236 WV 237-246 NC 247-251 SC 252-260 GA 261-267 FL 268-302 OH 303-317 IN 318-361 IL 362-386 MI 387-399 WI

400-407 KY 408-415 TN 416-424 AL 425-428 MS 429-432 AR 433-439 LA 440-448 OK 449-467 TX 468-477 MN 478-485 IA 486-500 MO

501-502 ND 503-504 SD 505-508 NE 509-515 KS 516-517 MT 518-519 ID 520-520 WY 521-524 CO 525-525 NM 526-527 AZ 528-529 UT 530-530 NV 531-539 WA

540-544 OR 545-573 CA 574-574 AK 575-576 HI 577-579 DC 580-580 VI 581-584 PR 585-585 NM 586-586 PI* 587-588 MS 589-595 FL 596-599 PR

600-601 AZ 602-626 CA 627-645 TX 646-647 UT 648-649 NM 650-653 CO 654-658 SC 659-665 LA 666-666 XX* 667-675 GA 676-679 AR 680-680 NV 681-690 NC 691-699 VA

700-728 RR* 729-733 EE* 734-749 XX* 750-751 HI 752-755 MS 756-763 TN 764-765 AZ 766-772 FL 773-799 XX*

800-899 XX* 900-999 ITIN*

Hotwiring a car

If you're considering hot-wiring your car, chances are you're already in dire straits. Before making things worse by removing the ignition cover and making a general mess of your vehicle, it might be worth trying the old "screwdriver in the ignition" trick. All this calls for is inserting a flathead screwdriver in the ignition and turning it over like a regular key. If the car starts, you've saved yourself the hassle and electrical hazards of hot-wiring. No such luck? Don't fret. You'll still need the screwdriver for the following steps. Just be sure not to get it stuck in the ignition cylinder.

Remove the ignition cover

Be careful not to do permanent damage when removing the cover. Before continuing, be sure to exercise extreme caution.

The following steps can result in painful electrical shocks, so follow the instructions carefully. The first step is to gain access to the wiring. Most cars have large plastic panels that snap together and cover the top and bottom of the steering column. You'll want to carefully remove these panels so that the cylinder (and the wires running into it) are exposed. At some point you'll want to put these pieces back together, so be sure to use a feather touch while separating them.

Identify the battery and starter wires

You'll typically see three pairs of wires running into the back of the cylinder. Don't freak out -- each pair just represents a different key position on the ignition. In short, one pair should trigger the battery-only position, another pair the lights and radio position, etc. Of course, this also means one pair is responsible for the final key position -starting the car. Here's where it gets tricky. Everything you need is laid out in front of you, but there's no universal color system for the wires. Consulting your car's manual is probably the best way to find out your vehicle's specific color code. However, in a pinch the red pair is usually the set that provides power to the car, and the brown (which can be a single wire or a pair depending on the car) handles the starter.

Strip and connect the power wires

Once you've located the wires that provide power to the car, disconnect them from the cylinder. Use the wire stripper to remove the plastic from the ends and then twist them together. The fruits of your labor should be obvious -power to the dashboard, lights, and pretty much everything else in the car.

Connect the starter wires to the power wires


Now things get dangerous. Although connecting the power wires is relatively safe, the wires responsible for starting the car carry live current. Under no circumstances should you touch the bare starter wires! With that in mind, strip the insulation off the ends of the wires and carefully touch them together. You should see a spark and hear the engine fire up. Once it's started idling, separate and cover the ends of the starter wires. They still pose an electrical hazard even after the vehicle has started, and you don't want them dangling around your knees. TIP: This process may be slightly different for older cars. If you discover that the vehicle has a single starter wire (as opposed to a pair), you'll want to disconnect and handle the wire in the same fashion mentioned above. To start the car, the starter wire must come in contact with the connected power wires. Once the engine has started, remove the starter wire from the circuit and cover its exposed tip.

The Freedom of Information Act entitles the following exemptions on documents being requested by the public: 1. Those documents properly classified as secret in the interest of national defense or foreign policy; 2. Related solely to internal personnel rules and practices; 3. Specifically exempted by other statutes; 4. A trade secret or privileged or confidential commercial or financial information obtained from a person; 5. A privileged inter-agency or intra-agency memorandum or letter; 6. A personnel, medical, or similar file the release of which would constitute a clearly unwarranted invasion of personal privacy; 7. Compiled for law enforcement purposes, the release of which a. could reasonably be expected to interfere with law enforcement proceedings, b. would deprive a person of a right to a fair trial or an impartial adjudication, c. could reasonably be expected to constitute an unwarranted invasion of personal privacy, d. could reasonably be expected to disclose the identity of a confidential source, e. would disclose techniques, procedures, or guidelines for investigations or prosecutions, or

f.

could reasonably be expected to endanger an individual's life or physical safety;

8. Contained in or related to examination, operating, or condition reports about financial institutions that the SEC regulates or supervises; or 9. And those documents containing exempt information about gas or oil wells. http://www.sec.gov/foia/nfoia.htm

I think we should start a religion that punishes people for being stupid. When I say stupid, I dont mean ignorant or mentallyhandicapped. I mean, if they say something that is complete bullshit, they should have to hit themselves over the head with a bible. Well, perhaps thats just my sadistic nature talking, but Im sure we could work out a less violent means of penance. Hell, it could be the first religion that actually educates people instead of making them memorize all the fun things theyre not supposed to do. After all, how great can the afterlife be if you cant enjoy this life? Well write our own bible, but instead of claiming that some invisible man in the sky told us what to write, well just write some guidelines with some entertaining stories that teach a lesson. Also, as much as I agree charity is a virtue, I think most religions almost encourage poverty and homelessness. A homeless man will never work to change his situation if he can always rely on a church to give him a handout. Instead of donations, offer to hire homeless people in exchange for wages or food. Maybe even provide them with free training in a skill of their choice. And serve food at the services, damn it. I remember as a kid fidgeting through church services because I was sitting still for an hour or so at the crack of dawn with not a crumb of food to take my mind off of how boring the ministers sermon was. I guarantee more people would be in church if there was food, especially homeless and impoverished people. Even Alcoholics Anonymous has doughnuts and coffee. I bet at least some of them go just for the free doughnuts. Moving along, we have outright blatant hypocrisy of using members donations to construct expensive churches. Why not run a communal business that will actually bring in income for its members?

Have everyone meet at each others homes in the clothes that make them feel comfortable. With the money saved on not building and maintaining a 5 million dollar church, you could hire jobless people to renovate the members homes. Imagine that, a religion that actually makes people less poor and uneducated, instead of taxing them and brainwashing them. In fact, remove the whole religion/ist/ism aspect from the equationmake it a spiritual path that people can alter according to their own needs and beliefs. Let some people make their god a happy, old guy thats waiting to give you a hug and a hot chocolate as you enter Heaven, while the old-fashioned types pray to a god that smites the wicked and what not. Too many people look to religion and other peoples ideas to shape their own lives. I think your choice of religious beliefs should help you express your own unique personality and ideas. Thats something even I could live with. If I say dont think about an elephant, you are immediately going to picture an elephant in your mind. This is a very basic example, but you get the idea. Placing an idea in someones head is the easiest way to manipulate them. If youre really good at it, you can even make them think its their idea. For instance, you are probably going to research and maybe even attempt to replicate or act on one or more of the ideas in my book. Even if you werent, youre twice as likely to do it now that Ive mentioned it. Thats an example of a passive command. Marketers use this tactic with less subtle wording on you every day with commercial headings that read act now! or click HERE to buy now. Believe it or not, the simple act of reading the command has enough of an effect on some people to result in them visualizing and then performing the command. As clich as it may be, reverse-psychology is still one of the best ways to get someone to do exactly what you want them to do. Its because it feeds on one of mans most basic traits, curiosity. Besides the need to satisfy curiosity, most people possess at least some form of a rebellious streak. Nobody likes being told what they can and cannot doat least directly that is.

Anda mungkin juga menyukai