**網上觸~Melody.Blog^

Melody free software sharing space.kr~

2015年3月7日 星期六

---By the Liberty Times reported (1) Iraq offensive attack in three columns IS ,, -!. (2) lost biological children abandoned children become more,,China 10 million people each year -! (3). China find Taiwan media brainwashing arguably doubts? - (4) are not allowed to report leaks ,,Under the Dome staff were suspended - by NTD,,NDTV reported (5) [interactive] Hot "Under the Dome" hot:! Smoke and mirrors - reported by the BBC.(6) West Africa Bamako, Mali attacks killed five people - (7) of the United States billions of e-mail data theft case:!! prosecutors indicted suspects hacking - & - [MEGA announced MEGAchat tests. Browser-based end-to-end encryption of audio and video chat: https: // at the beginning mega.nz] Twitter's Olhar numbers: Kim Dotcom lançaconcorrente do Skype - & - released by kaspersky.com ---''Twitter march Certification: SMS instead of the password?!" - & - by Cyper Kendra released '' uTorrent quietly installs BitCoin Mining Software! '' - & - issued by hotforsecurity.com ---"A bad week !! cybercriminals Britain! "-&- released by netresec.com 'Chinese MITM analysis on Google!?''-&- by ourlove520.com release of" pre-installed software on flooded Samsung Huawei Heibang !! "[article entry: Anonymous,,Editor : admin,,Update Time: 2015-3-7] - ---由自由時報報導的(1).伊拉克反攻IS,,兵分三路出擊!-(2).丟掉親生兒,,中國棄嬰變多,,每年10萬人!-(3).〈社論〉中國找台灣媒體洗腦真可釋疑?-(4).不准報導穹頂之下,,洩密員工遭停職!-由NTD,,新唐人電視台報導的(5).【热点互动】《穹顶之下》火爆: 雾里看花- 由BBC報導的(6).西非馬里首都巴馬科襲擊事件造成五人死亡 !-(7).美十億電郵數據被盜案:檢方起訴涉案黑客!--&- [MEGA宣布MEGAchat測試。 基於瀏覽器的終端到終端加密的音頻和視頻聊天: https://開頭 mega.nz ]Twitter的Olhar數字:金·達康lançaconcorrente做的Skype?!-&-由kaspersky.com發佈的---Twitter的進軍認證:短信代替密碼 !-&-由Cyper Kendra發佈的''uTorrent quietly installs BitCoin Mining Software!''-&-由hotforsecurity.com發佈的---"一個糟糕的一周英國網絡罪犯!!"-由netresec.com發佈的''中國MITM對谷歌分析!?''-由ourlove520.com發佈的"预装软件泛滥成灾 三星华为上黑榜!!"[文章录入:佚名,,责任编辑:admin,,更新时间:2015-3-7]- **All The World City / Country Lauguage**-

*---By the Liberty Times reported (1) Iraq offensive attack in three columns IS ,, -!. (2) lost biological children abandoned children become more,,China 10 million people each year -! (3). <Editorials> China find Taiwan media brainwashing arguably doubts? - (4) are not allowed to report leaks ,,Under the Dome staff were suspended - by NTD,,NDTV reported (5) [interactive] Hot "Under the Dome" hot:! Smoke and mirrors - reported by the BBC.(6) West Africa Bamako, Mali attacks killed five people - (7) of the United States billions of e-mail data theft case:!! prosecutors indicted suspects hacking - & - [MEGA
新聞圖片 
announced MEGAchat tests. Browser-based end-to-end encryption of audio and video chat: https: // at the beginning mega.nz] Twitter's Olhar numbers: Kim Dotcom lançaconcorrente do Skype - & - released by kaspersky.com ---''Twitter march Certification: SMS instead of the password?!" - & - by Cyper Kendra released '' uTorrent quietly installs BitCoin Mining Software! '' - & - issued by hotforsecurity.com ---"A bad week !! cybercriminals Britain! "-&- released by netresec.com 'Chinese MITM analysis on Google!?''-&- by ourlove520.com release of" pre-installed software on flooded Samsung Huawei Heibang !! "[article entry: Anonymous,,Editor : admin,,Update Time: 2015-3-7] -
---由自由時報報導的(1).伊拉克反攻IS,,兵分三路出擊!-(2).丟掉親生兒,,中國棄嬰變多,,每年10萬人!-(3).〈社論〉中國找台灣媒體洗腦真可釋疑?-(4).不准報導穹頂之下,,洩
密員工遭停職!-由NTD,,新唐人電視台報導的(5).【热点互动】《穹顶之下》火爆: 雾里看花- 由BBC報導的(6).西非馬里首都巴馬科襲擊事件造成五人死亡 !-(7).美十億電郵數據被盜案:檢方起訴涉案黑客!--&- [MEGA宣布MEGAchat測試。 基於瀏覽器的終端到終端加密的音頻和視頻聊天: https://開頭 mega.nz   ]Twitter的Olhar數字:金·達康lançaconcorrente做的Skype?!-&-由kaspersky.com發佈的---Twitter的進軍認證:短信代替密碼 !-&-由Cyper Kendra發佈的''uTorrent quietly installs BitCoin Mining Software!''-&-由hotforsecurity.com發佈的---"一個糟糕的一周英國網絡罪犯!!"-由netresec.com發佈的''中國MITM對谷歌分析!?''-由ourlove520.com發佈的"预装软件泛滥成灾 三星华为上黑榜!!"[文章录入:佚名,,责任编辑:admin,,更新时间:2015-3-7]-
**All The World City / Country Lauguage**-



 By the Liberty Times reported (1) Iraq offensive attack in three columns IS ,, -!
 http://news.ltn.com.tw/news/world/paper/859415

Iraqi troops in three columns IS offensive attack

 新聞圖片
 Iraqi security forces and Shiite fighters gathered in the north of Baghdad a day, chanting slogans, prepare advance toward Tikrit. (Reuters).
 2015-03-03.

So far the largest offensive

[International Press Centre / roundup] Iraqi forces consisting of about three million people, the second day of the Shiite militia forces, troops in three columns, land and air hand forward dictator Saddam Hussein's hometown of Tikrit (Tikrit) advance in an attempt to regain lost territory from the Sunni militant group "Islamic State" (IS) hands. This is the Islamic State of Iraq last June seize half the territory of North and tries scored since the Iraqi capital of Baghdad, Iraq, in Salahuddin province (Salahuddin) largest military action.

Jordan's King ︰ confrontation IS just like a third world war

In the meantime, Jordan's King Abdullah II told the US Cable News Network (CNN) interview, when the Western world for the moderator should ask how to deal with IS noted that "The extent, this is a third world war Muslims, Christians and other religious believers must unite to participate in this war. "

 On the 2nd morning, the Iraqi police, anti-terrorism forces, militias "mobilize the people" (Hashid Shaabi) and local anti-Islamic tribal Sunni country, with the cover of air strikes, launched an offensive; troops in three columns towards Tikrit, South Doyle (Ad-Dawr) and north Alan (Al-Alam) advance, warplanes, helicopters and artillery volley, on the one hand to cover the troops advancing on the one hand cut off supply lines. Located near Tikrit in northern Iraqi bases with offensive raid Tikrit city stronghold of the Islamic State.
Military sources said that Iraq sent warplanes in action, the US military said that, did not participate in the action. But the offensive launched after a few hours, the Iraqi army is still unable to enter Tikrit, visible, there should have to fight this battle.
Iraqi forces military progress in Salahuddin province, will greatly affect more Iraqi troops north of Iraq to regain the country's second largest city of Mosul plans. US officials said the fastest will launch a joint offensive in Mosul locking April, but officials declined to confirm the Iraqi national schedule.
Tikrit, about 130 kilometers from Baghdad, lies at the hub of Mosul, the largest city of the seizing of the Islamic State, also a Sunni town. After last year's offensive throughout the Islamic State of Iraq soon, hundreds of recruits to the Shiite majority in Iraq, at a military base near the city of Tikrit, killing of Sunni tribes are considered suspects, Shiite militia immediately vowed revenge. Iraq last year after losing Tikrit and Mosul and other cities, many times offensive, an attempt to regain lost ground, but they are lost.
Abadi day with Iraqi Prime Minister visited the city of Tikrit, Samarra same when Salahuddin province (Samarra), announced that it will expand the offensive. He called on the Sunni tribes to abandon the Islamic State, which was known as "the last chance" to lay down their arms, if not from "the punishment for supporting terrorism."
Shiite majority in Iraq since many years and a few extreme Sunni opposition, so the Sunni tribes to participate in this significant, but the Shiite troops entered Sunni areas, it may bring the opposite effect.
Jordan's King Abdullah II told CNN in an interview that the future will be in Arabic "Dayi Sha" (Daesh) called the Islamic State, in order to avoid giving the organization's legitimacy. "Dayi Sha" is pronounced "trample" the same, highlighting the international community's anger and contempt for the Islamic State.

 


 ===================================
 http://news.ltn.com.tw/news/world/paper/860044

自由時報China abandoned baby birth child becomes lost more than 10 million people each year

新聞圖片
China to rescue abandoned, the establishment of "an abandoned child refuge" in dozens of cities, including Guangzhou abandoned babies Island overburdened already ordered a halt. (From the Internet)

 2015-03-05.
[International Press Centre / roundup] compare competing Chinese people travel abroad birth, Chinese National People's Congress, the State Science and Technology Institute of Health and Family Planning Commission director 24 Ma Xu said China each year about one hundred thousand babies abandoned , to one's 九八 ○ grow two times, in which 99% of people with disabilities illness, abandoned children has become a major social problem.

99% of people with disabilities illness

Ma Xu said that one 九八 ○ years, the number of abandoned children in China each year about 5,000 people, nine ○ five million years; the latest statistics show, now abandoned children has reached thousands of people with an average annual growth of nearly twenty times failure to take relevant measures, the number probably will continue to rise. Abandoned babies, 99% of people with a disability disease, birth defects are increasing year by year, over 70% margin. Therefore, compared to rescue abandoned, but should pay attention to the prevention of birth defects.
To rescue abandoned, Chinese Ministry of Civil Affairs 二 ○ 一 三年 established in dozens of cities' abandoned babies refuges ", receiving abandoned children; With rising number of abandoned children, abandoned children saturation Island crisis, many abandoned babies Island faced with a shortage of funds and other issues. Last year, the Guangzhou island abandoned babies start forty-eight days only to receive two hundred sixty-two abandoned, overload, forced to call a halt.
Statistics show that China's annual birth defects child about nine hundred thousand cases every ten thousand births, one hundred forty-nine. Nine people with congenital defects. Ma Xu admitted that the current status of the atmospheric environment, does affect birth defects; he suggested, for the prevention of disability screening by the government foot the bill, such as the introduction of free maternal prenatal screening. As for the full liberalization of the two tire problem, Ma Xu revealed that this policy will continue to study this year, the pilot should not be fully open a second child.
See More! Please join Liberty Times fans
 自由時報

 =====================================
 http://news.ltn.com.tw/news/opinion/paper/860166
自由時報

<Editorials> China find Taiwan media

brainwashing arguably doubts?

新聞圖片
3rd Meeting of the Chinese mainland in the 12th National People's Congress scheduled opening of the 5th, mainland officials will be held on the 4th morning before the press conference related to the problem described.  2015-03-05.
Chinese National People's Congress opened today, yesterday's press conference China has asked the old question of how much this year's People's Liberation Army's military growth, the answer is ten percent, and last year more than twelve percent. Every year by the international media to ask these questions, Congress spokesman obviously very unhappy, he said, this year is no different from asking "why" to increase military spending. China's huge defense budget increases every year by the national concerns of the reason, of course, has a long history, as the NPC population speak out "bullied" the lessons of history, "we will not forget." Like, chill, not peace.
 This era except for some terrorist organizations, government officials have been very few countries officially 宣达政 policy when put such resentment uneven posture. China's "Rise of shame," so "Kudachoushen", it is difficult for the Communists, always be put on public display Leather hedgehog-like, not only catches the eyebrows, it is difficult to reduce everyone's impression of China's de facto.
 Emphasis on increasing military spending in Congress aims to let the Chinese people can concentrate on production, ease of life at the same time, there are towering pile of things happened. US Federal Bureau of Investigation (FBI) officers recently in California illegal confinement center on a large scale raids, turned out quite all the Chinese bourgeoisie number of women in order to give children the right of abode United States, have to go to the United States through underground pipes production, is now seen as the US government is a major event affecting the national security of the United States Customs and Border Protection has even posted a notice will be fully carried out on pregnant women immigrants strict trial, where there is danger of a visa valid for those of production, fear of being banned from entering the United States.
China's economic development by supporting the growing military spending, causing fear militaristic neighboring countries, is to defend the country under the pretext Weimin, but China has rich exodus to the United States as "American Dream," Sam got the degree of flooding Uncle To close the border point. This is really big shame, China's National People's layout and the layout of the Chinese seem diametrically opposed small intersection, weaving "China Dream" in Beijing regime Should not think this is why?
From this point of view the development of cross-strait relations contradiction, with regard to the original one-sided today announced the opening of M503 route, for example, now westward extension to resolve the rebound and Taiwan, have expressed dissatisfaction with horsehair system is acceptable, in turn, become The new M503 defense staff and commentator. It's like Zhuangzi ramshackle, four twilight towards Fable III, the monkey smile through tears. If the Chinese authorities to see that the Taiwan government's response to get this, it would be wrong, because the people of Taiwan is not a monkey, of course not, as China's Taiwan Affairs Office said politicized and paranoid.
Because, to take military action against Taiwan China may be in black and white after Congress passed. Politically, the Chinese leaders propaganda "peaceful development", but do not let go, "renounce the use of force"; in law, the so-called anti-secession law, has long been the construction of the legal basis of force against Taiwan, Xi took office also did not revocation, visible with Xi Hu regulation; in the military, deployed missiles opposite Taiwan continues to increase, the PLA exercises routine implementation of targeted air and sea blockade, amphibious landing operations, mountain warfare, urban warfare project does not fall; in particular, Taiwan often cracked a total spy case, actions endanger Taiwan's security is underway. These are further scientific evidence, however, did open the East China Air Traffic Control District to Taiwan media tour to doubts of brainwashing?
Existing A470 route congestion, low normal flight is one thing, not obtained the consent of Taiwan announced that M503 route is one thing, deliberately close to the Strait of midline is one thing, the three things that earlier path planning is to route a going on, these four things confuse the people of Taiwan will be able to stir the brain paste? See China's military spending and then break the table, Chinese women to the United States to produce these phenomena, probably not so simple. This is the reason why the sensitive waters of the Taiwan Strait, in fact, the source in China. After this "test", which shows the superficial cross-strait relations based on mutual trust and fragile, it is not reckless; as a big country, and find other routes to solve the record, stop go to provoke it involves complex neural lines, is committed to regional peace and stability The first step, it is wise to Taiwan to deepen understanding. Even standing in Beijing's point of view, it is not clear when the truth runs the risk.
 

 ==============================
 http://news.ltn.com.tw/news/world/breakingnews/1249848

自由時報Employees are not allowed to report leaks under the dome was suspended


新聞圖片
"Under the Dome" Chinese film overnight investigation was immediately after the explosion of red Chinese official pressure, not once issued are not allowed to require media reports, will not be allowed even reported leaked documents media staff, has also been suspended punishment. (Figure captures since YouTube).
 2015-03-06 23:26.
[CNA] The Financial Times reported that Chinese network, Shanghai First Financial Daily, an employee was suspended because of the employee leaked Communist propaganda department asked the media to stop "Under the Dome" documentary report instructions.

 "Under the Dome" is a film about the Chinese film haze severity survey by CCTV host Chaijing before making one million yuan at their own expense. Published on the Internet after February 28, has attracted more than 166 million hits, and triggered a lively discussion.
The film originally been widely reported in the Chinese media, Chinese Minister of Environmental Chen Jining also expressed gratitude and praise. But to the November 2, 2008, but came CCP propaganda department issued instructions to stop media coverage related to this piece.
"Under the Dome" Although still available online to see discussions about it already disappeared from China's popular Sina Weibo topic.
Reported that earlier this week, First Financial Daily, a Chinese Internet executives share screenshots of this instruction. Two Informed sources said that the employee has been suspended, may eventually be dismissed.
This newspaper, said another employee, employee leaks absolutely know this is not public documents.
The directive requires the media to stop "Under the Dome" report is issued by the Publicity Department of the CPC Shanghai Municipal Committee, in charge of signing by First Financial Daily Shanghai Media Group's parent company, on behalf of receipt of order.
The Financial Times said the Chinese network, due to be held at a time when the continent annual NPC and CPPCC (Chinese People Consultative Conference, National People's Congres) during which employees were suspended, highlighting the sensitivity of propaganda affairs during the two sessions.
FT Chinese network also pointed out that can not be linked to the Shanghai Media Group to comment on the matter.

 

 =======================================
  by NTD,,NDTV reported (5) [interactive] Hot "Under the Dome" hot:! Smoke and mirrors -
 http://www.ntdtv.com/xtr/gb/2015/03/03/a1181558.html
 [Hot] interactive "Under the Dome" hot: smoke and mirrors?
[Hot] interactive "Under the Dome" hot: smoke and mirrors? - See more at: http://translate.googleusercontent.com/translate_c?depth=1&hl=zh-TW&rurl=translate.google.com&sl=zh-CN&tl=en&u=http://www.ntdtv.com/xtr/gb/2015/03/03/a1181558.html&usg=ALkJrhhYJ8zIVkmrF_yG_fnHlcOVRBY5vg#sthash.9gSwR7nn.dpuf


[NTD March 3, 2015 (Xinhua) - [interactive] Hot (1280), " Under the Dome "hot: smoke and mirrors: haze is a product of the CCP under the system.
View full text
360P View
- See more at: http://translate.googleusercontent.com/translate_c?depth=1&hl=zh-TW&rurl=translate.google.com&sl=zh-CN&tl=en&u=http://www.ntdtv.com/xtr/gb/2015/03/03/articledownload1181558.html&usg=ALkJrhj0SJg1wzBP9t5tGX1zmS7GExrkaw#sthash.0tpFKCpF.dpuf
 2015-03-03 02:29 AM [New York time].
[NTD March 3, 2015 (Xinhua) - [interactive] Hot (1280), " Under the Dome "hot: smoke and mirrors: haze is a product of the CCP under the system.
View full text
360P View.
[NTD March 3, 2015 (Xinhua) - [interactive] Hot (1280), " Under the Dome "hot: smoke and mirrors: haze is a product of the CCP under the system.

Moderator: Dear viewers Hello everyone, and welcome to "hot spots interactive" live broadcasts of this issue, and today this episode we'll talk about, is now very popular in China a documentary, that is, before the CCTV reporter Chai Jing shooting, about the haze of the documentary " Under the Dome . " The documentary is hot to what extent? US cable television network CNN said that if you live in China still have not watched or heard of "Under the Dome", then you must be living under the stone.

This documentary on Saturday, was released on the Internet side, and finally spread quickly, I heard now in the different video sites get millions of hits. Chai Jing in this film, looking for answers to three questions, what is the haze? Where is it from? How to solve?

Prior to the beginning of that program today, we first tell you about the two gentlemen at the scene, one is Dr. Jason, Jason is good. Another is a political commentator, Mr. Yokogawa, Yokogawa hello. So we are still as usual, on this first look at a documentary newsreel.

February 28, the documentary "Under the Dome" for the first time publicly, provided free of charge to all network platform play, less than one day's time on the line, playing a total of more than 35 million times.

This up to over one hundred minutes of documentary shooting at their own expense by former CCTV host chaijing content about China increasingly serious air pollution problems.

People: "Every day, every year so attached three years, not one or two days."

Shanxi Environmental Protection Bureau deputy director Wang Jinglong: "Like those in fact, it is a strong carcinogen benzene, after a long time, accumulate in the human body is attached, with a plot to a certain extent, it creates the risk of cancer."

CCTV reporter as well-known, and Chaijing opened this open secret.

In fact, the biggest motivation Chaijing shooting this documentary, from pregnancy during her daughter was diagnosed with a benign tumor. Chai Jing to take care of her daughter in the process of haze feelings become more intense, and finally even the "healthy enough" has become a luxury.

So 柴静利 year's time, visiting many foreign experts and academic institutions of atmospheric pollution, visited some of the heavily polluted site, and also went to London, which had polluted the city of Los Angeles, trying to find some lessons of air pollution control and experience.

Measuring Results documentary quoted former Health Minister Chen Zhu CPC, noting that China's annual number of premature deaths due to air pollution is 500,000, over the past 30 years, lung cancer mortality increased by 465%. China's annual burn a lot of coal, iron and steel enterprises have more than 60% without any approval procedures.

After the documentary play, all walks of life there are different voices. Chai Jing has been criticized for selfish reasons, lack of objectivity; also been criticized for her cause haze of blame businesses and individuals, did not point out the responsibility of the government and institutions.

He Qinglian on Twitter scholars say, the film is very intuitive to let everyone see the Chinese people's living environment, officials, miners, all sorts of people who eat the bloody coal black interests of the chain, including their underlying and forced work by child slaves.

It is understood that the source of haze, including air pollution caused by coal combustion emissions; pollution emissions from fuel combustion, industrial pollution. Chinese authorities today the blind pursuit of economic development at the expense of the environment, but also the expense of the health of the Chinese people.

Moderator: Ladies and gentlemen, today we are hot live show, you are welcome to call to express your opinion or ask the guests questions. Two gentlemen, I would like to ask a question, because this haze is actually a lot of people know, so the news say this is an open secret. But why this film appeared Chaijing triggered such a strong reaction, Jason you please.

Jason: The first is to say that she certainly talked a let almost all Chinese people are a hot topic of empathy, the topic is hot. Second, she is indeed a more professional approach, a variety of scientific data, all aspects of giving a very intuitive, clear, immersive feeling. Another one, its website is very successful operation, no matter what kind of background, in February 28 such a critical time, official media and the Internet were also released, you can see all aspects of the operation of a large group behind. So weather, geography, and all aspects of polymerization in one, it creates an explosive effect. And it is the Internet, media operations is very positive. Indeed there have been three days to change an effect on the problem of the Chinese way of thinking.

Moderator: Yokogawa do you think?

Yokogawa: I think the most critical issue is a celebrity, of course, it is very important to the operation, the celebrity is also important achievements of the film together. In fact, some say it was filmed last year, a similar haze on the film, reportedly looks very good, the results are not even out of the seal gave killed. So it takes some conditions, it may come into contact with the audience.

Moderator: Do you see this film, what do you feel is the biggest?

Yokogawa: She's the one we all know the facts come out, but I do not think it is a professional piece, from the experts, the experts have done the work of experts, in fact, that the films are not really even science. It's just taken a personal film, and the film plays a put this things we have to pay attention to, and played a role in this.

Jason: But the positive significance of this film really is there, it uses a lot of their own way, in fact, a bit of knowledge, science, fun, integrated in one piece, let you in a very simple process, understanding to some of the concepts.

Moderator: It is relatively straightforward, right? Individuals.

Jason: Yes, more intuitive. You can see this one is Chaijing spend a lot of thought to do this film, some full of complex data, the full complexity of the science of speech, with all aspects of animation to take it out. And you can see that this person is the intention in doing, because at least in her film, the original intention was for the children, but also to end child. This motherly love can not say there is any adulterated ingredients inside. And I know a lot of people really have the same country, there is such a feeling, so this film every logic itself its online have been talked about. It is the entire film, from the first point to the last point, the last one from the first to feel the feelings, in fact, are already, but she integrated together, so that we resonate and produce such an outbreak The effect of this has become a cultural phenomenon.

Moderator: Yokogawa you just said, she mainly talked about some of the phenomena and to some of the issues raised, and you say what issues she raised major?

Yokogawa: I think it is like this, looping mechanism and all stakeholders in the chain formed throughout the haze, the more she talked, of course, is here so far.

Moderator: give some examples, such as the interests of the chain, which links you are referring to?

Yokogawa: for instance, the local iron and steel enterprises, local steel companies are actually supported by the local government authorities, although it did not complete all the formalities. Why is that? Because such a large enterprise will bring a lot of local taxes, which is an interest-driven, and now this is the steel industry. Then the other you see the legislative process, in the environmental legislation process, deliberately leaving a leak fixed, environmental law enforcement authorities do not explain it is by the environmental protection department of law enforcement.

Moderator: What is not explained in the law enforcement sector.

Yokogawa: Yes, the environmental protection department and finally becomes an obligation, no power, because when the legislation will stay neutral. That left a gap when the legislation, it says there were many ministries opposition, and these ministries is the enforcement of environmental protection to be the object of the background. So many many of these Li Yi chain, from the smallest to the largest, she could find, I think the typical sense she made, and in this respect there is no shortage.

Jason: This film is commendable is that it touches on some Chinese before we all know, but do not say a topic, such as the problem of interest groups. All standards are developed Sinopec oil old original cast, all cars are false, no purification equipment were wearing GB like standard out. Even local governments to sell cars marked with qualified instruction, all aspects of the entire range of national systems cause such a factor, it shows out.

But you can also see that it is indeed the product within the system, the end result is still a lot of it finally fell on Caomin of the factors, such as bad coal, coal bad, the worst comes to the final is the people scattered burning coal. Then he said we must solve the problem, but really can do to solve the problem is to sell his home under the meatloaf that person. So you see a lot of problems she sees the essence, mentioned that some of the previous point to the official media did not dare to point to interest groups, but then, the final solution, it seems we only have a dozen 12369 to report, farmers do not report land cover and the butcher do not smoke fumes. On a concept like this ......

Moderator: So some people say it is expediency on those answers.

Yokogawa: Not expediency, because the film, whether it's a conspiracy theory we Hao, Ye Hao or background, or no background or, the film should be able to come up, we must make compromises. No matter who is to compromise, or who let him compromise, it is another matter. If you really put the real reason for all the links are speaking out, then get out of the film.

Moderator: Or it fundamental solution ......

Jason: I think it is a reasonable guess, this speculation is Shane? This person wants to say Chaijing this film, trying to answer these three questions is clear that the desire is real. But when she did to a certain extent, it is very likely to rise, and some people think that they want to do another thing coincide, then the senior help her, but to help executives in the process, will also rise add to the mix. Finally, this film is a product of my Chaijing will and the will of an integrated mix of high-rise. You can see many of the problems go beyond that.

Of course, after this film recently when alive, not go beyond the discussion of Internet users, Internet users to discuss the idea really is a lot, to a certain extent, to date, the Chinese Central Propaganda Department issued a document that has already begun, to withdraw from the first page down, not allowed to comment, and so on. So to some extent, it is called "controlled bomb," senior Communist Party carried out a controlled explosion of style. The controllable blast force to achieve some kind of shock and vibration, shock and vibration force of this fact is that many users of discussion, the top in the end what to do? This is why the next day the whole green stocks rising, many other corresponding shares in the fall.

Chaijing not quite say how much this man deterrent, the fact is that many people interpreted to support this film that Chaijing senior power from the high-level interpretation of the future direction of the power economy.

Moderator: Yokogawa you agree with this view? It is a product that the Chinese government a certain level of public relations people?

Yokogawa: This question is this, if none of these factors, then, is to get out of this film.

Moderator: that it must get a certain number of people to support?

Yokogawa: Yes! You see the last shot of the films that will not come out. In addition, environmental pressure groups, up to now, the real pressure to engage in environmental protection, and now continues to carry out, is not said to have stopped in.

That no matter how kind of initial motivation? You just have to see this film, it is actually three parts of it! Haze how come? Very clear, right? And then, where is the problem? Speaks very clearly. Suddenly a cop-out! That result is in accordance with the general logic of fact, it can shoot in front of the two most people, is not going to shoot the third part, the third part will not be filmed like this. So anyway, it is there are other factors intervene into, is not simply a talking film haze.

Moderator: But no matter what factors caused it, because the environmental pollution, including haze in China has more than 10 years. Haze more than 10 years, environmental pollution for many years, why at this moment, it is this film can out of it?

Jason: I do not like conspiracy theories, but I like to push the logic, my own analysis, does anyone know this film in China, as long as the brain knows that it can not really be produced Chaijing this person from It works, in fact there are factors behind.

You take a closer look, this year there are two factors exist. First, the overall economy to slow to go, is the overall manufacturing overcapacity, has to be added to the degree. She also talked about himself in the film. Per ton of steel manufacturing a whole earn two dollars, buy boiled eggs on a ton of steel. The entire industry overcapacity has reached the extent of no longer continue. Some of the steel industry every year, banks have to give it two billion blood transfusion.

China's economic development model that is under the GDP-driven, relying on the surplus industrial development model has to die. This industry does not work, you have to make it a part of the bankruptcy, there will be a part of the unemployed people, then this process will make this thing this film has to do more in the name. If at this time you lose your job, you dare to walk in the street, then you are with the people of the country against the lung. So people saw this film onto the street people will curse, this is a problem.

Another problem is to say, this film directed several major industries, the automotive industry, the oil industry, power industry, coal industry. And this year, a Chinese New Year, the commission would send more than 100-finding missions to more than 200 central enterprises to do the investigation. This process, in fact, give this film the entire survey group has created a huge name, because the whole film it really is for these monopolies, many places talked about such a concept of monopoly industries, but also to Xi Jinping, the central enterprises want to break this one special forces group hit a nominal basis.

So you can see that this film is actually willing executives in the inside, so I think blasting, is one such sub-factors.

Moderator: Yokogawa you have any to add?

Yokogawa: From the film itself came out of view, it is time, the two sessions, the two organizations will certainly be some major policy because rubber stamp Well, it was the policy has been decided to green light, at least to cover up a stamp, it may with the industry on a number of adjustments related to, or related to the environment and those factors to be discussed among the two organizations.

Another is, in fact, the economic development over the years it is that time, had this adjustment, because pollution is not only to find today, but just started out 30 years ago, when the construction industry, the pollution problem has been raised. So the problem is not pollution does not know, or is suddenly found today. That is a blind alley, and this way the time has come to this step is no way, because of environmental resources have been used up.

Moderator: Do you mean to say that in the process of development, we have paid such a price?

Yokogawa: because people already have the experience of environmental pollution, and have taught. China's development, when in fact the previous lessons learned, then you can go well, the beginning of time, not so fast, but it can go well, but did not go this way, and so was going to repeat after someone pollution The road then governance. This could have been the most powerful industrial development, when most of the money when the time has come to do a considerable part of the wealth of the transition, but missed this time. Etc. So now forced to go to carry out his fall, when the green industry, in fact, is already too late, too late, too late, but this is no way to avoid.

This means that the Chinese Communist Party 30 years of economic development, which in fact is the key, the key is pollution, because we know that just haze, including water pollution, including pollution of land, it is a full range of pollution, this round The contamination is impossible to say for 30 years did say we do not know. It's out of the question!

Moderator: We now have an online audience, we first look at the audience pick the phone, we'll continue the discussion. Now there is a New Jersey-line Fang, Fang Hello, please.

New Jersey Fang: This film is not so much popular science, or is teaching film, I think it might be considered that sense politically, a barometer of the significance may be more important than others. I agree with the two experts say, that the pollution problem is not a matter of one or two days.

As early as 4.50 years ago, when the Cultural Revolution, Shanghai out of a journal called "Dialectics of Nature" magazine, was a way of publishing the extreme left of this publication. Put the capitalist society, including Japan, Europe, North America, including some industrial development that is blind industrial development, pollution caused by blind pursuit of profit, listed a lot, it does not know, but why now and only then this thing seriously? Is a kind of political needs.

Moderator: Well, Mr. Xie Xiefang. There is a line that we have in Los Angeles Ting phone, Ting hello.

Los Angeles Ting: The Philippines anchor well, Yokogawa good, Jason Good, happy Lantern Festival. About this fog ah, London is the world famous fog, I've been to London, the fog, people walking in the fog which is natural, which is very comfortable to walk in. Copenhagen, Oslo, Stockholm, is a little foggy, very comfortable.

Now as summer dust storms in China, now the haze in Beijing back a friend said he could not see the top of Mao Zedong in Tiananmen Square like; Shanghai a friend that I took out a pocket inside the yuan, Mao's like I can not see ! Right next to my pocket, is very serious. Two sessions this meeting, coordinating all the words on paper is of no use, must find an effective way, so that the impact on human health, but also worse than second hand smoke, this is not acceptable.

Moderator: Mr. Xie Xieding. You talk about Jason.

Jason: We talk about the views are the same, there is a problem is this child, this time a netizen, he released a film on the 28th, March 1 happened to Beijing out of the one called "Dust tax."

Moderator: That you raise up the dust.

Jason: You construction site, you raise the ash came. If you reach the "excellent" level, I only punish you ......

Moderator: "Excellent," there is no dust, or should I say ......

Jason: It is to reach its standard, and I only charge you a 5 1 kg; if you have reached is not particularly good, take you three; then you have to reach the general good, I charge you 6. Anyway, the deal is off to charge you money. Where is the problem? In many cases, there is a problem that is China, the government did not control things like this, then the government tube how do so? Money! But our money, this money go? People never know! It is not used to control the haze of? You do not know. But after this film came out, really from the public, then the creation of public opinion on the correctness of it.

And this film, why the newly appointed Environmental Protection Bureau is pleased to give chaijing call this film seems to understand the unknown EPA injustice. This process, in fact, for the people concerned, who may charge in the head one more classic. The problem how to do?

Let me again one of the most concern is what? That she was talking about the interview, London said one official in London here when we have millions of industrial workers, then we have gone after this industry, we are transformed, and industrial numbers also increased. But she did not ask that, in the United States, the United Kingdom industry has a painful transition process, but these countries have established a very good social welfare system, and in this process you will not starve people, you are poor countries when he sent you food stamps, housing for you to solve, all aspects of the basic safety net has been established.

So in China, it is not often that the workers do not know when he was coal pollution, in fact, like Chaijing considering the safety of her child, when in fact the workers on the side of the furnace contaminated, that workers are not stupid I do not know, and he knew it. But his first problem is the problem of existence, and the second issue is the question of the lung.

So for these people, if these corporate restructuring, while China does not have a safety net to ensure their survival, these people how to live? In other words, when Chaijing this film came out, it allowed me to see the negative effects are very worried.

Moderator: Let's ask Mr. Yokogawa a problem, and then followed by two spectators line phone. Yokogawa, I want to ask you, just say this film is anticlimactic, it mentions some solutions, such as what to play hotlines, driving less or something, you are not referring to them is quite feasible?

Yokogawa: It is entirely feasible solutions! Because this matter did not find it, you is not feasible. You say you call hotlines, the EPA report, right? EPA has said, you do not even have enforcement powers. Conflicts around on it! Since the EPA that are not used, and you play to report what is the use?

Jason: EPA can control butcher.

Moderator: This film may come out a little more power in the future.

Yokogawa: more power to no avail, because the local government does not support you, or in the government under the Environmental Protection Agency, a division, so the government can not ...... this is not the same with the United States. US prosecutors that he was a fire under the mayor's official, an officer can close the city is ...... that year is hurricane comes, has been moved from New Orleans over 50,000 people, to live in the stadium inside, who entered the half , the fire inspector came and said to have been overloaded, closed! Such a big thing, you say who will not budge? No, he was a man, say close to closing. The city mayor officials there to discuss up. Law enforcement people to really, you can not do this.

So she told them, those who are up to scratch inside a neighbor's. So the question in what place? Your words, every link, but so many have been able to form part of a lot from her about the details view, the fundamental reason for the fact that in terms of policy, that the above policy development for so many years, when in fact it is the sacrifice the development of the three price, which is not only the cost of the sacrifice of the three, is intentional to sell.

Moderator: What are the three price?

Yokogawa: Human rights cost, resource cost, environmental costs, the cost of these three is deliberately sell out, it is unlikely that these costs do not attract much foreign investment, can not call this a sunset industry attracted to China, then rapidly. So back to why it do this? It can not choose a better way to develop it?

No!Because it has such a powerful feeling of being chased, that as long as it slowly step it up downfall. Jason: Actually economy is its legitimacy ...... Yokogawa: source of legitimacy. Jason: Under what circumstances say we have money ah! Moderator: the legality of doing this is to give it a good excuse. So we now have two online audience, we will soon take about two spectators phone, we may have to program time, then one is Mr. Money in New York, New Jersey Luk another. Mr. Qian, please first few brief comments. Mr. York Money: Hello. I'm a people, the people out is their lifestyles, and now this Chinese food is not good, not good air and water quality is not good, people will want this government? If I grow in China, I hate all hate it, I eat all drugs Well, the air we breathe are drugs, so the government is not a government of the people, the people should overthrow it it! Moderator: Thank you Mr. money. So the audience is under a New Jersey luk, luk hello. New Jersey Luk: Hello. I would like to talk about, the first one is in this film, I see it there are two inside view, one is a tendency for the environmental sector in mainland China, many people are aware of the EPA also called Helenians money to help people ward off evil In fact they did not like to speak so tragic. The second is for the oil, petrochemical negative attitude, it is clear now is follow the rhythm of walking Xi corruption, can look out behind the high-level operations. Then the other one, I think this film there are some positive, that is a part of citizenship wake some Chinese people, the people, so that people can participate in this civic movement which, in fact, it is said that the Communist Party is concerned it is fear, so that once again we see that the Central Propaganda Department to suppress the film. Well, that's my point. Moderator: Well, Mr. Xie Xielu. Then two a person may show two comments on the end. Jason: Yes, I agree with Mr. Lu talk about, this is a test product directional blasting a Communist, a concept with a sensational female indie producer, and then create a public foundation to reach some of the Chinese Communist Party to do something for the future. At the same time, then it does have a positive effect, that is, Mr. Lu said, "citizenship", that is, when more people accept this, his citizenship in the creation, which is the hope for the future. Yokogawa: I think if you want to embody the highest level of sincere, open environmental organization registered NGO. The question now is no national real effect, each such organization is not the NGO in the true sense. You want to open a registered NGO, in fact true to oversee civil, rather than manipulating the supervision, the result must be good. Moderator: Thank you very much actively involved in the audience today, thank you for watching our show, I hope the next program and you goodbye.


 http://www.ntdtv.com/xtr/gb/2015/03/03/a1181558.html




 ==============================================


 http://www.bbc.co.uk/zhongwen/trad/world/2015/03/150307_mali_nightclub_attack


Bamako, Mali, West Africa, the attack killed five people

  • March 7, 2015
 Mali between government forces and rebel militias in conflict situations due to join the Islamic complicated.
 Mali between government forces and rebel militias in conflict situations due to join the Islamic complicated (photo).
 Northwest National Bamako the attacks, five people were killed. BBC correspondent reported from the scene, a Frenchman was shot and killed in a bar. When the gunmen fled the scene, the two Malian men were also killed.
In a nearby street, a Belgian man was killed by a grenade thrown at their car. Another Europeans were also taken to hospital after death.
Witnesses said the attackers was shouting "God is great" slogan.
A senior intelligence official told Reuters that two people related to the incident have been arrested by the authorities.
French President Francois Hollande on Saturday strongly condemned the attacks as "cowardly attack."
BBC correspondent reported that Smith from Bamako, French soldiers arrived at the scene quickly. They confirmed that the man was killed in bars is a Frenchman.
BBC correspondent, where a Malian who is a police officer killed, another person is security.The Islamic militia in the past few years has been in combat with government forces in Mali



The Islamic militia in the past few years has been fighting government forces in Mali (photo).
A witness told the BBC that he saw four people traveling in a car fled the scene, and another one who escaped by motorcycle.
A local hospital sources told AFP, the attack also resulted in an additional eight people were injured.
The Islamic militia in the past few years has been in combat with government forces in Mali. French and African troops in January 2013 on the situation in Mali to intervene to prevent the al-Qaida linked militants advancing to the capital, Bamako.
These militants in the north gradually cleaning up afterwards, but the Tuareg rebels and Islamist militia groups are still relatively active.
Mali between government forces and rebel militias in conflict situations due to join the Islamic complicated.
(Compiler / Editor: Xiao Er).


 =====================================
 http://www.bbc.co.uk/zhongwen/trad/world/2015/03/150307_us_it_hackers_crime


US one billion e-mail data theft case: Prosecutors indicted suspects hackers

  • March 7, 2015.
 Hacker
 US officials say this is one of the largest data breach in US history.

 US prosecutors on suspicion of theft of two e-mail data and a Vietnamese Canadian prosecution. US officials say this is one of the largest data breach in US history.
Hackers invade eight suspects accused of e-mail service provider, and stole nearly one billion e-mail address. They used to steal data to millions of users junk mail, and fake products sold to users.
US Department of Justice that they benefit from these activities in excess of $ 2 million (about 1.3 one million pounds).
Hacker indicted include two Vietnamese: 28 years old Giang Hoang Vu, as well as 25-year-old Viet Quoc Nguyen.
They were charged with suspicion of conspiracy and implementation of computer intrusions into computer fraud and other crimes, one of whom has pleaded guilty, the other person is still at large. Before March 2014 Vu was extradited to the United States, both living in the Netherlands.
The other defendant is Canadian David - Manuel Santos da Silva (David-Manuel Santos Da Silva), he was accused of involvement in money laundering.
Assistant US Attorney General Calder said were involved in Vietnam, the Netherlands and Canada committing the crime, they accused of the biggest in the history of a case of the US Internet e-mail and name data theft.
Authorities said that in 2009 and 2012, most American companies have been distributing e-mail hacking. Court documents did not disclose the specific e-mail between the company which was hacked.
US Justice Department officials said the hackers involved not only steal the company's e-mail data, and hijack the company's own e-mail distribution platform, a large number of e-mail spam out, will lead to the sale of counterfeit victim user software of Adobe Systems Web site, and from eligible Lee.
(Compiled: Intern Wangpei Yu, Editor: Xiao Er)


 ==========================================
 https://twitter.com/MEGAprivacy/status/558087217730834432



  1. MEGA ‏ @ MEGAprivacy
    MEGA announces MEGAchat beta. Browser based end-to-end encrypted audio and video chat: https:// mega.nz  





    Embedded image permalink
    • Retweets 567
    • Favorites 324
    • Christine McCartney Christian Lupovici Joshua Schmidlkofer Dean Brickland rtTMZ juan jose caldara Prendinger #Crypto #EEV #SoulTradeGame #SL
    6:22 PM - 21 Jan 2015

    Related headlines

    *Note: 

    Olhar Digital: Kim Dotcom lança concorrente do Skype
    UOL @UOL
    1. - ̗̀new ̖́-dangered ‏ @ dangeredwolf Jan 21
      @ MEGAprivacy finally we have something that can destroy skype
      0 replies 0 retweets 1 favorite



  2. Marky ‏ @ combatdstar Jan 21
    @ MEGAprivacy Alright! @ NewWorldAngel
    0 replies 0 retweets 0 favorites
  3. nicole ‏ @ darbysmurf Jan 21
    @ MEGAprivacy the Skype killer 😵
    0 replies 0 retweets 0 favorites
  4. Hiracutch ‏ @ Hiracutch Jan 21
    @ MEGAprivacy La muerte de Skype aquí está caballeros, adelante... pruébenlo ;)
    0 replies 0 retweets 1 favorite
  5. akayed ‏ @ akayed2 Jan 21
    @ MEGAprivacy go megachat
    0 replies 0 retweets 1 favorite
  6. ghetto ‏ @ MrGhettoCraft Jan 21
    @ MEGAprivacy HELL YEAH! Time to get my friends signed up.
    0 replies 0 retweets 0 favorites
  7. Pablo Bollati Masbou ‏ @ pablofabianbm Jan 21
    @ MEGAprivacy Finally!!! I'm very exiced to test it.
    0 replies 0 retweets 0 favorites
  8. Suziam ‏ @ Suzyiam Jan 21
    @ MEGAprivacy @ KimDotcom Oh dear, the USA and American Wannabe John Key are not going to like that ! This is going to be fun !
    0 replies 0 retweets 0 favorites
  9. Eᴅɴᴀx Tᴏʀʀᴇɴᴛᴢ (王) ‏ @ iMexicanboii Jan 21
    @ MEGAprivacy Please have support for mobile devices, I really, really want to use this on my phone and encourage everyone I know to use it.
    0 replies 0 retweets 0 favorites
  10. Eᴅɴᴀx Tᴏʀʀᴇɴᴛᴢ (王) ‏ @ iMexicanboii Jan 21
    @ MEGAprivacy I want to try this on my iPhone 6 Plus, it's going to be way better than @ Microsoft 's failed @ Skype .
    0 replies 0 retweets 0 favorites
  11. Achwaq Khalid ‏ @ AchwaqKhalid Jan 21
    Reply to @ MEGAprivacy Not hating or bragging but i bet @ telegram didn't see that # VOIP implementation coming! I've been requesting for ages 👊
    0 replies 0 retweets 0 favorites
  12. WhiteWhale0928 ‏ @ WhiteWhale0928 Jan 21
    @ MEGAprivacy is this built into the Android app?
    0 replies 0 retweets 0 favorites
  13. William Owen ‏ @ Bill_Owen Jan 21
    @ MEGAprivacy @ mz_chief Encryption is going to be made illegal. Bet on it.
    0 replies 0 retweets 0 favorites
  14. William Owen ‏ @ Bill_Owen Jan 21
    @ ryandolan123 @ MEGAprivacy Skype USED to encrypted until "enthusiastic (nsa) team player" MS bought it.
    0 replies 0 retweets 1 favorite
  15. mz chief © ‏ @ mz_chief Jan 21
    @ Bill_Owen @ MEGAprivacy & Twitter to replace passwords w/ cell verification? Hm https:// twitter.com/abbynormative/ status/558109039872446465   … https:// twitter.com/abbynormative/ status/558121313278369792   … @ amplifyonly
    0 replies 0 retweets 0 favorites
  16. William Owen ‏ @ Bill_Owen Jan 21
    @ mz_chief @ MEGAprivacy @ amplifyonly Abby account is protected. Found this. http:// blog.kaspersky.com/twitter-digits -new-authentication/   … Sigh...
    0 replies 1 retweet 0 favorites
  17. William Owen ‏ @ Bill_Owen Jan 21
    @ mz_chief @ MEGAprivacy @ amplifyonly https://www. youtube.com/watch?v=KXewIR 7Y7cc   …
    0 replies 0 retweets 0 favorites
  18. mz chief © ‏ @ mz_chief Jan 21
    @ Bill_Owen @ MEGAprivacy @ amplifyonly Other ways to do authentication. Sure looks like real-time user id/geolocation to me @ OpPinkPower # YAN
    0 replies 2 retweets 0 favorites
  19. William Owen ‏ @ Bill_Owen Jan 21
    @ mz_chief @ MEGAprivacy @ amplifyonly @ OpPinkPower Absolutely. That makes perfect sense.
    0 replies 2 retweets 0 favorites

 ===========



MEGA @ MEGAprivacy
MEGA宣布MEGAchat測試。 基於瀏覽器的終端到終端加密的音頻和視頻聊天: https://開頭 mega.nz  





嵌入式圖像固定鏈接
  • 銳推567
  • 收藏324
  • 克里斯汀·麥卡特尼 基督教Lupovici 約書亞Schmidlkofer 院長Brickland rtTMZ 胡安·何塞·卡爾達拉 Prendinger #Crypto #EEV #SoulTradeGame #SL
下午6點22分- 2015年1月21日

相關頭條新聞

Olhar數字:金·達康lançaconcorrente做的Skype
UOL @UOL
  1. -新̖-dangered @ dangeredwolf 1月21日
    @ MEGAprivacy最後我們有東西可以摧毀的Skype
    0回复 0銳推 1最愛





  • Marky @ combatdstar 1月21日
    @ MEGAprivacy好吧! @ NewWorldAngel
    0回复 0銳推 0我的最愛




  • 妮可 @ darbysmurf 1月21日
    @ MEGAprivacy Skype的殺手 😵
    0回复 0銳推 0我的最愛




  • Hiracutch @ Hiracutch 1月21日
    @ MEGAprivacy拉老爹去Skype的票數ESTA騎士,前進報...pruébenlo;)
    0回复 0銳推 1最愛




  • akayed @ akayed2 1月21日
    @ MEGAprivacy去megachat
    0回复 0銳推 1最愛




  • 貧民窟 @ MrGhettoCraft 1月21日
    @ MEGAprivacy HELL YEAH! 時間讓我的朋友們報名參加。
    0回复 0銳推 0我的最愛




  • 巴勃羅·博拉蒂Masbou @ pablofabianbm 1月21日
    @ MEGAprivacy最後! 我很exiced對其進行測試。
    0回复 0銳推 0我的最愛




  • Suziam @ Suzyiam 1月21日
    @ MEGAprivacy @ KimDotcom哦,親愛的,美國和美國的崇拜者約翰基是不會喜歡這樣! 這將是有趣!
    0回复 0銳推 0我的最愛




  • EᴅɴᴀxTᴏʀʀᴇɴᴛᴢ(王 )@ iMexicanboii 1月21日
    @ MEGAprivacy請對移動設備的支持,我真的,真的想用這個在我的手機,並鼓勵大家,我知道使用它。
    0回复 0銳推 0我的最愛




  • EᴅɴᴀxTᴏʀʀᴇɴᴛᴢ(王 )@ iMexicanboii 1月21日
    @ MEGAprivacy我想試試這在我的iPhone 6此外,它的將是這樣好過@ 微軟的失敗@ Skype的 。
    0回复 0銳推 0我的最愛




  • Achwaq哈立德 @ AchwaqKhalid 1月21日
    回复@ MEGAprivacy不恨還是在吹牛,但我敢打賭@ 電報沒有看到#VOIP實施來了! 我一直要求的年齡 👊
    0回复 0銳推 0我的最愛




  • WhiteWhale0928 @ WhiteWhale0928 1月21日
    @ MEGAprivacy這是內置在Android應用程序?
    0回复 0銳推 0我的最愛




  • 威廉·歐文 @ Bill_Owen 1月21日
    @ MEGAprivacy @ mz_chief加密將被定為非法。 投注就可以了。
    0回复 0銳推 0我的最愛




  • 威廉·歐文 @ Bill_Owen 1月21日
    @ ryandolan123 @ MEGAprivacy的Skype用於加密,直到“熱情(NSA)的團隊球員”MS買了它。
    0回复 0銳推 1最愛




  • MZ首席©@ mz_chief 1月21日
    @ Bill_Owen @ MEGAprivacy和Twitter來代替密碼瓦特/電池驗證? HM https://開頭 twitter.com/abbynormative/ 狀態/ 558109039872446465   ... https://開頭 twitter.com/abbynormative/ 狀態/ 558121313278369792   ... @ amplifyonly
    0回复 0銳推 0我的最愛




  • 威廉·歐文 @ Bill_Owen 1月21日
    @ mz_chief @ MEGAprivacy @ amplifyonly艾比賬號已被保護。 發現這一點。 HTTP:// blog.kaspersky.com/twitter-digits -new認證/   ...唉...
    0回复 1轉推 0我的最愛




  • 威廉·歐文 @ Bill_Owen 1月21日
    @ mz_chief @ MEGAprivacy @ amplifyonly 的https:// WWW youtube.com/watch?v=KXewIR 7Y7cc   ...
    0回复 0銳推 0我的最愛




  • MZ首席©@ mz_chief 1月21日
    @ Bill_Owen @ MEGAprivacy @ amplifyonly其他方式做認證。 當然看起來像實時的用戶ID /地理位置給我@ OpPinkPower #YAN
    0回复 2 0 轉推 收藏




  • 威廉·歐文 @ Bill_Owen 1月21日
    @ mz_chief @ MEGAprivacy @ amplifyonly @ OpPinkPower絕對。 這非常有意義。
    0回复 2 0 轉推 收藏





     =====================

    Kim Dotcom lança concorrente do Skype

    Por Reda ão Olhar Digital - em 22/01/2015 às 11h45

     Kim Dotcom cumpriu a promessa de lançar um concorrente do Skype que use criptografia para tornar a comunicação mais segura e, nesta quinta-feira, 22, apresentou o MegaChat.
    Ainda em fase beta, o serviço permite que os internautas conversem por vídeo ou áudio sem a preocupação de que o conteúdo seja desviado.

     Ver imagem no Twitter
      MEGA @MEGAprivacy Seguir
    MEGA announces MEGAchat beta. Browser based end-to-end encrypted audio and video chat: https://mega.nz 
    10: 22 - 22 jan 2015

     Todos os usuários do Mega podem testar o chat através do novo domínio mega.nz . Segundo Dotcom, mais de 15 milhões de pessoas já estão cadastradas no Mega, número que tende a subir: "Acredito que o MegaChat pode nos fazer passar de 100 milhões de usuários até o fim de 2015.".

      Kim Dotcom        ✔ @KimDotcom Seguir
    #Mega has over 15 million registered users now. I think #MegaChat could elevate us to 100+ million users by the end of 2015. #Prediction
    21: 22 - 22 jan 2015

     A princípio só a conversa por vídeo está disponível, as funções de chat e videoconferência virão em seguida.

     =======================

    Twitter's Foray into Authentication: SMS to Replace Passwords

    October 24, 2014 Brian Donohue The microblogging service and social network Twitter is now the latest entrant in the race to replace passwords, with a new system called “Digits”. It's got a hip name and the idea behind Digits seems very promising. Digits authentication is based entirely on cellular access. Your username is your phone number and a real-time, disposable SMS-generated code is your password.
    The most interesting thing is that it isn't just for Twitter — it's available for any developer that wants Digits authentication in their app. And there is a reason why they will be glad to have it.
     twitter
     “Phone numbers are the primary identity for the fastest growing mobile demographics, including emerging markets, which account for over 70% of the world's mobile population,” Twitter says. “With Digits, you can build a customized onboarding and sign-in experience for these markets.”
    “Onboarding” seems to be new-age developer jargon for getting people to sign up for a particular app. As in: getting users onboard.


     #Twitter plans to replace usernames with mobile phone numbers & #passwords w/ one-time, SMS-generated codes.

     The service seems particularly useful in parts of the world that aren't beholden to the near-ubiquitous tech-giants. In the United States, for example, countless applications will offer users the capacity to sign up for, and later authenticate themselves into a certain app or service by using their Facebook or Twitter or Gmail account identity as their username along with a specific password. Email accounts are obviously the most popular variation. Just take a moment to think about how many online accounts are tied to your email…
    But once you move a couple of thousand miles from nearest Tesla charging station and your favourite organic food store at the corner, you realise that it isn't that common there to use email, Facebook, Twitter and so on. There is huge amount of people who don't have anything from this list. But what they do have is mobile phone number. Because in many places of the world cellular network is the only option for making call or getting Internet access.
    As example of how it works we can look at mobile banking in emerging markets. Africa, particularly the sub-Saharan parts, home to many of the world's most aggressively emerging markets, rely in part on something of a cashless economy. Payment is dominated by mobile telecoms in Kenya. And people aren't paying with apps on their smart phones: they're relying on relatively simple services like M-Pesa, which work on the older variety brick or burner phones. Through M-Pesa, users can transfer money, make payments and even take out withdrawals from local merchants.
    The graphic below comes from the Wall Street Journal and is based on World Bank statistics:
    Mobile Payment Distribution
    This illustrates that simple mobile phone based services are growing in the developing world. It's hard to say if Twitter's move was based in part on the M-Pesa economy in places like Kenya, Tanzania, India and South Africa, but I think that reality, that cellular access if relatively cheap and available in emerging markets, bodes well for a service like Digits.
    But it isn't just about emerging markets. The core idea looks interesting for developed countries too. We're generally skeptical of new ideas to replace passwords, but Digits strikes us as a simple solution to a tough problem, prompting us to wonder why no one has thought of this before?
    Twitter Digits Code
    And for developers out there, it seems the code required to implement Digits into your app is incredibly simple
    I've written about heartbeat-based, fingerprint-based, iris-based, smell-based, earlobe-based, electromagnetic tattoo- and pill-based, geolocation-based and who knows how many other forms of biometric and wearable authenticators. They we're all interesting but they all seemed overly complicated.
    “When users forget what they used to sign up for your app — you can lose customers. By using our SMS verification you can minimize both support costs and sign-in failures” – says Twitter
    Digits is designed to shift the authentication paradigm away from email and toward mobile number. Perhaps more importantly, Digits offers a seamless replacement for static passwords. It also could help resolve the problem of forgotten passwords.
    “When users forget which service they used to sign up for your app — email addresses, usernames, or passwords — you can lose customers,” Twitter argues in its promotional material. “By using our SMS verification in lieu of passwords, you can minimize both support costs and sign-in failures — all while keeping your users happy and your app growing.”
    Of course, it can't be all good news. Digits isn't particularly helpful in places without a cellular signal. That's not such a big deal out in the wild, where you probably don't have Internet access anyway, but it could spell trouble in your parent's basement.
      Eugene Kaspersky        ✔ @e_kaspersky Follow
    10 tips on how to stop your #iPhone from revealing your secrets https://kas.pr/F9tr 
    12:40 AM - 2 Oct 2014

    10 tips to make your iPhone even more secure

    Even when your iPhone is in your hands or on the table, it can reveal some of your secrets to strangers. Here are 10 tips to prevent this from happening.
    Kaspersky Lab @kaspersky
    Another problem is security. Our phones become more and more precious and we have to take care about their protection.

     ============================================
    http://www.donotlink.com/framed?621363
    Cyber Kendra - Latest Hacking News And Tech News  07 Mar 2015.

    uTorrent quietly installs BitCoin Mining Software

     
     If you are using latest version of the BitTorrent client uTorrent application for download torrent file then here is a warning for you all. The latest version of the Utorrent installation file came up with the bundle of the  unwanted application know as Epic Sale, which is generally a bitcoin mining software.

    On the official forum of the Utorrent, users have reported that uTorrent had silently installed cryptocurrency software from Epic Scale as part of version 3.4.2 build 28913. Once installed, Epic Scale uses some of the computer's spare processing power to generate cryptocurrency (such as Bitcoin or Dogecoin).


    In the above users claim, uTorrent manager confirmed the issue and noted that parent company BitTorrent's partnership with Epic Scale. On the statement  he says -
    The software generates revenue for uTorrent while also contributing some funds to charity. “In the future, Epic Scale plans to contribute CPU cycles to other initiatives, such as Genome mapping and other academic studies that require a great deal of processing power.”
    Utorrent manager also mentioned  that installing the  Epic Share application on the  user's computer was with the users agreement acceptance. uTorrent employee says Epic Scale can be easily uninstalled from Add/Remove programs in windows OS. After the uninstallation of the application, software folder will remain on the system drive of the computer within Programs Files folder, users can safely delete this folder once the uninstall is complete.

    If you see the End-User-Agreement of the latest uTorrent, you see notice that utorrent have clearly mentioned that application came  with the bundle of the Epic Scale, hence by accepting the agreement for  installing the utorrent users are also accepting to install Epic Scale.

    This is why, it is recommend to read all the policy agreement be for installing or download in the application onto your system. 

    About Author

    Vivek Gurung is the Founder and Editor-in-chief of 'Cyber Kendra'. He is Certified Information Security Expert and an Ethical Hacker. Apart from this he is Internet activist, love to learn about technology innovations. Very much interested in Cyber Security. Follow him on
    ===================

     上午8點五十的uTorrent悄悄安裝比特幣挖掘軟件首頁>比特幣»的BitTorrent»新聞»安全»uTorrent的»uTorrent的悄悄安裝比特幣挖掘軟件uTorrent的悄悄安裝比特幣挖掘軟件如果您使用的是BitTorrent客戶端uTorrent的應用程序下載torrent文件的最新版本,那麼這裡就是你所有的警告。該uTorrent的安裝文件的最新版本想出了不必要的應用程序包所知道的史詩銷售,這通常是一個比特幣挖掘軟件。在uTorrent的官方論壇上,網友紛紛報導了uTorrent的默默從史詩級安裝cryptocurrency軟件版本3.4.2安裝後構建28913.一部分,史詩級使用了一些計算機的空閒處理能力產生cryptocurrency(如比特幣或多吉幣)。在上面的用戶聲稱,uTorrent的經理證實了這個問題,並指出,母公司的BitTorrent與史詩級的合作夥伴關係。在聲明中,他說 -

        
    該軟件生成收入uTorrent的同時也有助於一些資金用於慈善事業。 “在未來,史詩規模的計劃作出貢獻CPU週期以其他舉措,如基因組圖譜,並且需要大量的處理能力等學術研究。”uTorrent的經理還提到,安裝在用戶的計算機上的史詩分享應用程序與用戶的一致認可。 uTorrent的員工說,史詩規模可以從添加可以很容易地卸載/刪除在Windows操作系統的程序。該應用程序的卸載之後,軟件文件夾將保持在程序文件文件夾的計算機的系統驅動器上,用戶可以安全地刪除此文件夾,一旦卸載完成。如果你看到的最新的uTorrent的最終用戶協議,你看發現的uTorrent已經明確提到,應用程序附帶的史詩規模的捆綁,從而通過接受協議安裝uTorrent的用戶也接受安裝史詩級。這就是為什麼,這是推薦閱讀所有的政策協議是在應用程序安裝或下載到您的系統。



     ==========================================
     http://www.hotforsecurity.com/blog/a-bad-week-for-uk-cybercriminals-11533.html

    A bad week for UK cybercriminals

    By: Graham Cluley March 06, 2015  56 suspected hackers have been arrested by the UK's National Crime Agency (NCA) as part of what British police are calling “strike week” against cybercriminals.
    In 26 separate operations across the country, people were arrested in connection with a variety of offences related to distributed denial-of-service (DDoS) attacks, internet fraud, phishing attacks, the theft of intellectual property, and malware.
    Those arrested include a 22-year-old man, suspected of involvement in a hack by “D3DDs Company” that saw over 400,000 email addresses and passwords stolen from Yahoo in 2012.
    Separately, a 23-year-old man from Sutton Coldfield suspected of hacking into the US Department of Defence last June, and stealing data from the Enhanced Mobile Satellite Services global communications system. In that attack, the contact information of approximately 800 people – including name, title, email addresses and phone numbers – was stolen, as well as details of around 34,400 devices.
    Following that attack, a message was posted on PasteBin with what appeared to be a message for the notorious LizardSquad hacking gang:
    “We smite the Lizards, LizardSquad your time is near. We're in your bases, we control your satellites. The missiles shall rein upon thy who claim alliance, watch your heads, ** T-47:59:59 until lift off. We're one, we're many, we lurk in the dark,we're everywhere and anywhere. Live Free Die Hard! DoD, DISA EMSS : Enhanced Mobile Satellite Services is not all, Department of Defense has no Defenses.”
    The following video shows the arrest, on 3 March 2015, of a 22-year-old man suspected of developing and distributing malware.

    Crackdown on cyber crime

    National Crime Agency
    National Crime Agency

    The suspected malware developer is arrested by members of the NCA at his home in Aldbourne, Marlborough, in the early hours of the morning. During the video you can see law-enforcement agency officers search the premises for evidence, look inside what appears to be a safe (from where CD ROMs are removed), before they seize computing equipment for forensic analysis and take the suspect into custody.
    You probably won't be surprised to see the suspect is wearing a hoody as the police take him away.
    hoody-suspect
    In other police swoops, a 33-year-old man from Barry was arrested by South Wales police, suspected of launching a denial-of-service attack against a rival company.
    But perhaps the biggest operation of the week involved the 25 suspects apprehended in London and Essex by the Metropolitan Police Fraud and Linked Crime Online (FALCON) unit, after allegedly using the net to steal and launder money and carry out fraud.
    Andy Archibald, deputy director of the NCA's National Cyber Crime Unit, warned those breaking the law on the internet that they could not assume they would remain anonymous to the authorities:
    “Criminals need to realise that committing crime online will not make them anonymous to law enforcement. We are continuously working to track down and apprehend those seeking to utilise computers for criminal ends, and to disrupt the technical networks and infrastructures supporting international cyber crime.”
    The National Crime Agency sent a stark warning via Twitter to others who might be involved in internet criminality:
    This is just the start. Wherever #CyberCriminals hide we will work with industry and international law enforcement to bring them to justice
    We shouldn't be duped into believing that a large wave of arrests such as this can make the internet a safe place. But it will, hopefully, make some online criminals think twice about what they are doing, and understand that the repercussions if caught could be serious.


     =====================================
     http://www.netresec.com/?page=Blog&month=2014-09&post=Analysis-of-Chinese-MITM-on-Google
    NETRESEC Thursday, 04 September 2014 23:55:00 (UTC/GMT)

    Analysis of Chinese MITM on Google

    The Chinese are running a MITM attack on SSL encrypted traffic between Chinese universities and Google. We've performed technical analysis of the attack, on request from GreatFire.org, and can confirm that it is a real SSL MITM against www.google.com and that it is being performed from within China.
    We were contacted by GreatFire.org yesterday (September 3) with a request to analyze two packet captures from suspected MITM-attacks before they finalized their blog post. The conclusions from our analysis is now published as part of GreatFire.org's great blog post titled “ Authorities launch man-in-the-middle attack on Google ”.
    In their blog post GreatFire.org write:
    From August 28, 2014 reports appeared on Weibo and Google Plus that users in China trying to access google.com and google.com.hk via CERNET, the country's education network, were receiving warning messages about invalid SSL certificates. The evidence, which we include later in this post, indicates that this was caused by a man-in-the-middle attack.
    While the authorities have been blocking access to most things Google since June 4th, they have kept their hands off of CERNET, China's nationwide education and research network. However, in the lead up to the new school year, the Chinese authorities launched a man-in-the-middle (MITM) attack against Google.
    Our network forensic analysis was performed by investigating the following to packet capture files:
    Capture Location Client Netname Capture Date Filename MD5
    Peking University PKU6-CERNET2 Aug 30, 2014 google.com.pcap aba4b35cb85ed218 7a8a7656cd670a93
    Chongqing University CQU6-CERNET2 Sep 1, 2014 google_fake.pcapng 3bf943ea453f9afa 5c06b9c126d79557

    Client and Server IP adresses
    The analyzed capture files contain pure IPv6 traffic (CERNET is a IPv6 network) which made the analysis a bit different then usual. We do not disclose the client IP addresses for privacy reasons, but they both seem legit; one from Peking University (netname PKU6-CERNET2) and the other from Chongqing University (CQU6-CERNET2). Both IP addresses belong to AS23910 , named "China Next Generation Internet CERNET2".
    PekingUniversityPic6 by galaygobi
    Peking University entrance, by galaygobi (Creative Commons Attribution 2.0)
    CQUAQUGATE3 by Brooktse
    Chongqing University gate, by Brooktse (Creative Commons Attribution-Share Alike 3.0)
    The IP addresses received for www.google.com were in both cases also legit, so the MITM wasn't carried out through DNS spoofing. The Peking University client connected to 2607:f8b0:4007:804::1013 ( GOOGLE-IPV6 in United States) and the connection from Chongqing University went to 2404:6800:4005:805::1010 ( GOOGLE_IPV6_AP-20080930 in Australia).

    Time-To-Live (TTL) Analysis
    The Time-To-Live (TTL) values received in the IP packets from www.google.com were in both cases 248 or 249 (note: TTL is actually called ”Hop Limit” in IPv6 nomenclature, but we prefer to use the well established term ”TTL” anyway) . The highest possible TTL value is 255, this means that the received packets haven't made more than 6 or 7 router hops before ending up at the client. However, the expected number of router hops between a server on GOOGLE-IPV6 and the client at Peking University is around 14. The low number of router hops is is a clear indication of an IP MITM taking place.
    CapLoader 1.2, Hosts tab
    Image: CapLoader with both capture files loaded, showing TTL values
    Here is an IPv6 traceroute from AS25795 in Los Angeles towards the IP address at Peking University (generated with ARP Networks' 4or6.com tool):
    #traceroute -6 2001:da8:201:[REDACTED]
    1 2607:f2f8:1600::1 (2607:f2f8:1600::1) 1.636 ms 1.573 ms 1.557 ms
    2 2001:504:13::1a (2001:504:13::1a) 40.381 ms 40.481 ms 40.565 ms
    3 * * *
    4 2001:252:0:302::1 (2001:252:0:302::1) 148.409 ms 148.501 ms 148.595 ms
    5 * * *
    6 2001:252:0:1::1 (2001:252:0:1::1) 148.273 ms 147.620 ms 147.596 ms
    7 pku-bj-v6.cernet2.net (2001:da8:1:1b::2) 147.574 ms 147.619 ms 147.420 ms
    8 2001:da8:1:50d::2 (2001:da8:1:50d::2) 148.582 ms 148.670 ms 148.979 ms
    9 cernet2.net (2001:da8:ac:ffff::2) 147.963 ms 147.956 ms 147.988 ms
    10 2001:da8:201:[REDACTED] 147.964 ms 148.035 ms 147.895 ms
    11 2001:da8:201:[REDACTED] 147.832 ms 147.881 ms 147.836 ms
    12 2001:da8:201:[REDACTED] 147.809 ms 147.707 ms 147.899 ms

    As can be seen in the traceroute above, seven hops before the client we find the 2001:252::/32 network , which is called “CNGI International Gateway Network (CNGIIGN)”. This network is actually part of CERNET, but on AS23911 , which is the network that connects CERNET with its external peers. A reasonable assumption is therefore that the MITM is carried out on the 2001:252::/32 network, or where AS23910 (2001:da8:1::2) connects to AS23911 (2001:252:0:1::1). This means that the MITM attack is being conducted from within China.
    Response Time Analysis
    The round-trip time between the client and server can be estimated by measuring the time from when the client sends it initial TCP SYN packet to when it receives a TCP SYN+ACK from the server. The expected round-trip time for connecting from CERNET to a Google server overseas would be around 150ms or more. However, in the captures we've analyzed the TCP SYN+ACK package was received in just 8ms (Peking) and 52ms (Chongqing) respectively. Again, this is a clear indication of an IP MITM taking place, since Google cannot possibly send a response from the US to CERNET within 8ms regardless of how fast they are. The fast response times also indicate that the machine performing the MITM is located fairly close to the network at Peking University.
    Even though the machine performing the MITM was very quick at performing the TCP tree-way handshake we noticed that the application layer communication was terribly slow. The specification for the TLS handshake ( RFC 2246 ) defines that a ClientHello message should be responded to with a ServerHello. Google typically send their ServerHello response almost instantly, ie the response is received after one round-trip time (150ms in this case). However, in the analyzed captures we noticed ServerHello response times of around 500ms.

    X.509 Certificate Analysis
    The X.509 certificates were extracted from the two PCAP files to .cer files using NetworkMiner . We noticed that both users received identical certificates, which were both self signed for “google.com”. The fact that the MITM used a self signed certificate makes the attack easily detectable even for the non-technical user, since the web browser will typically display a warning about the site not being trusted. Additionally the X.509 certificate was created for ”google.com” rather than ”*.google.com”. This is an obvious miss from the MITM'ers side since they were attempting to MITM traffic to ”www.google.com” but not to ”google.com”.
    NetworkMiner 1.6.1, Files tab
    Image: NetworkMiner showing list of X.509 certificates extracted from the two PCAP files
    Certificate SHA1 fingerprint: f6beadb9bc02e0a152d71c318739cdecfc1c085d
    Certificate MD5 fingerprint: 66:D5:D5:6A:E9:28:51:7C:03:53:C5:E1:33:14:A8:3B
    A copy of the fake certificate is available on Google drive thanks to GreatFire.org.

    Conclusions
    All evidence indicates that a MITM attack is being conducted against traffic between China's nationwide education and research network CERNET and www.google.com. It looks as if the MITM is carried out on a network belonging to AS23911, which is the outer part of CERNET that peers with all external networks. This network is located in China, so we can conclude that the MITM was being done within the country.
    It's difficult to say exactly how the MITM attack was carried out, but we can dismiss DNS spoofing as the used method. The evidence we've observed instead indicate that the MITM attack is performed either by performing IP hijacking or by simply reconfiguring a router to forward the HTTPS traffic to a transparent SSL proxy. An alternative to changing the router config would also be to add an in-line device that redirects the desired traffic to the SSL proxy. However, regardless of how they did it the attacker would be able to decrypt and inspect the traffic going to Google.
    We can also conclude that the method used to perform the MITM attack was similar to the Chinese MITM on GitHub , but not identical.


     ============================

     週四,2014年9月4日23時55分零零秒(UTC / GMT)

    中國MITM對谷歌分析

    中國人正在運行的MITM攻擊SSL加密流量中國的大學和谷歌之間。 我們已經進行的攻擊的技術分析,從GreatFire.org請求,可以確認,這是針對www.google.com一個真實的SSL MITM並且它正在從內中國進行的。
    我們進行了接觸,通過GreatFire.org昨日(九月三日)有一個請求,分析涉嫌MITM,攻擊2數據包捕獲,才最終確定自己的博客文章。 從我們的分析得出的結論是,現在公佈為GreatFire.org最偉大的博客文章標題為部分“ 當局發動人在這方面的中間人對谷歌的攻擊 “。
    在他們的博客中寫GreatFire.org:
    從2014年8月28日報導出現在微博上和谷歌加中國用戶嘗試通過CERNET,該國的教育網絡,正在接受有關警告無效的SSL證書的信息訪問google.com及google.com.hk。 這些證據,我們將在這篇文章後來包括表明這是由中間人攻擊造成的。
    而當局一直阻止自6月4日訪問最多的事谷歌,他們已經保留了他們的手離開​​CERNET,中國的全國性教育和科研網絡。 然而,在通往新學年,中國當局發動了對谷歌一個人在這方面的中間人(MITM)攻擊。
    被調查以下數據包捕獲文件執行我們的網絡取證分析:
    拍攝地點 客戶端網絡名 採集日期 文件名 MD5
    北大 PKU6-CERNET2 2014年8月30日 google.com.pcap aba4b35cb85ed218 7a8a7656cd670a93
    重慶大學 CQU6-CERNET2 2014年9月1日 google_fake.pcapng 3bf943ea453f9afa 5c06b9c126d79557

    客戶端和服務器的IP不會忽略
    該分析捕獲文件包含純IPv6流量(CERNET是一個IPv6網絡),這使得分析有點不同,那麼平常。 我們不會透露隱私的原因在客戶端的IP地址,但他們似乎都合法的; 一個來自北京大學(網絡名PKU6-CERNET2),另一個來自重慶大學學報(CQU6-CERNET2)。 這兩個IP地址屬於AS23910 ,命名為“中國下一代互聯網CERNET2”。
    通過galaygobi PekingUniversityPic6
    北大門口,由galaygobi(知識共享署名2.0)
    CQUAQUGATE3由Brooktse
    重慶大學門口,由Brooktse(知識共享署名-相同方式分享3.0)
    收到www.google.com地址的IP是在這兩種情況下也合法,所以MITM不進行通過DNS欺騙。 北京大學客戶端連接到2607:f8b0:4007:804 :: 1013( GOOGLE-IPV6在美國)和重慶大學的連接到2404:6800:4005:805 :: 1010( GOOGLE_IPV6_AP-20080930澳大利亞)。

    時間到現場(TTL)分析
    時間生存(TTL)值從www.google.com收到的IP數據包是在兩種情況下248或249(注:TTL實際上是所謂的IPv6的術語“跳數限制”,但我們更喜歡用井建立所謂“TTL”反正)。 最高可能的TTL值是255,這意味著接收到的報文沒有提出結束了在客戶機之前超過6或7路由器啤酒花。 但是,路由器的預期數量上GOOGLE-IPV6的服務器和客戶端在北京大學之間跳躍大約是14路由器的低躍點數是在一個IP MITM發生的明顯標誌。
    CapLoader 1.2,主機選項卡
    圖片: CapLoader既捕獲文件加載,顯示TTL值
    下面是從AS25795在洛杉磯對北京大學的IP地址(與ARP網絡“產生的IPv6路由跟踪4or6.com工具):
    #traceroute -6 2001:DA8:201:[刪除]
    1 2607:f2f8:1600 :: 1(2607:f2f8:1600 :: 1)1.636毫秒1.573毫秒1.557毫秒
    2 2001:504:13 :: 1A(2001年:504:13 :: 1A)40.381毫秒40.481毫秒40.565毫秒
    3 * * *
    4 2001:252:0:302 :: 1(2001:252:0:302 :: 1)148.409毫秒148.501毫秒148.595毫秒
    5 * * *
    6 2001:252:0:1 :: 1(2001:252:0:1 :: 1)148.273毫秒147.620毫秒147.596毫秒
    7 pku-bj-v6.cernet2.net(2001:DA8:1:1B :: 2)147.574毫秒147.619毫秒147.420毫秒
    8 2001:DA8:1:50D :: 2(2001年:DA8:1:50D :: 2)148.582毫秒148.670毫秒148.979毫秒
    9 cernet2.net(2001:DA8:AC:FFFF :: 2)147.963毫秒147.956毫秒147.988毫秒
    10 2001年:DA8:201:[刪除] 147.964毫秒148.035毫秒147.895毫秒
    11 2001年:DA8:201:[刪除] 147.832毫秒147.881毫秒147.836毫秒
    12 2001年:DA8:201:[刪除] 147.809毫秒147.707毫秒147.899毫秒

    如在上面的跟踪路由中可以看出,在客戶端之前7啤酒花我們發現2001:252 :: / 32網絡 ,它被稱為“CNGI國際網關網絡(CNGIIGN)”。 該網絡實際上是賽爾的一部分,但在AS23911 ,它是與它的外部對等連接賽爾網絡。 因此,一個合理的假設是,MITM進行的2001年:252 :: / 32網絡,或者AS23910(2001:DA8:1:2)連接到AS23911(2001:252:0:1 :: 1) 。 這意味著,MITM攻擊正在從中國境內進行。
    響應時間分析
    客戶端和服務器之間的往返時間,可以通過測量從當客戶端發送它初始TCP SYN數據包時,它接收到一個TCP SYN + ACK從服務器到時間來估計。 預期的往返時間為從賽爾連接到谷歌服務器海外將約為150毫秒或​​更多。 然而,在捕獲,我們已經分析了接收,在短短的8ms(北京),並分別為52ms(重慶)的TCP SYN + ACK包。 再次,這是一個IP MITM發生的明顯標誌,因為谷歌不可能送的8ms內來自美國的回應CERNET不管他們的速度有多快。 快速的響應時間也表明,在執行MITM機器位於相當靠近網絡在北大。
    即使執行MITM機器的速度非常快,在執行TCP樹握手,我們注意到,在應用層通信是非常緩慢的。 該規範的TLS握手( RFC 2246 )定義了一個ClientHello消息應該回應以ServerHello。 谷歌通常發送它們ServerHello響應幾乎瞬間,即響應一個往返時間(在此情況下,150毫秒)後接收。 然而,在被分析的捕獲,我們注意到大約500ms的ServerHello響應時間。

    X.509證書分析
    在X.509證書是從兩個PCAP文件提取到.CER使用文件NetworkMiner 。 我們注意到,這兩個用戶收到相同的證書,這是簽署了“google.com”這兩個自我。 該MITM中使用的自簽名的證書,這使得攻擊甚至對非技術用戶容易檢測的,因為web瀏覽器通常將顯示大約不被信任站點警告。 此外,該X.509證書的“google.com”創造,而不是“* .google.com”。 這是從MITM'ers側的明顯失,因為他們試圖MITM流量為“www.google.com”而不是“google.com”。
    NetworkMiner 1.6.1,文件選項卡
    圖片:NetworkMiner表示從兩個PCAP文件中提取X.509證書列表
    證書SHA1指紋:f6beadb9bc02e0a152d71c318739cdecfc1c085d
    證書MD5指紋:66:D5:D5:6A:E9:28:51:7C:03:53:C5:E1:33:14:A8:3B
    假證書的副本可在谷歌驅動器感謝GreatFire.org。

    結論
    所有的證據都表明,一個MITM攻擊正在對中國的全國性教育和科研計算機網CERNET和www.google.com之間的流量進行。 它看起來好像MITM進行屬於AS23911一個網絡,這是賽爾的外部部分,與所有外部網絡對等體上。 該網絡位於中國,因此我們可以得出這樣的結論MITM正在該國境內進行。
    這很難說究竟如何MITM攻擊進行了,但我們可以辭退DNS欺騙為使用的方法。 我們已經觀察到的,而不是有證據表明,MITM攻擊要么通過執行進行IP劫持或簡單地重新配置路由器的HTTPS流量轉發到一個透明的SSL代理服務器。 一種替代改變路由器配置也將增加一個串聯裝置,該期望的通信重定向到SSL代理。 然而,不管他們怎麼做的,攻擊者能夠解密和檢查交通去谷歌。
    我們還可以得出結論,用於執行MITM攻擊的方法是類似於中國MITM GitHub上 ,但不完全相同。
      短網址: http://netres.ec/?b=14955CB

     =====================================================
     http://www.ourlove520.com/News/zonghe/201503/352143.html
     Swamped with pre-installed software on Samsung Huawei Heibang

    Article Entry: Anonymous Editor: admin Updated: 2015-3-7 10:34:54

    2014 "315" on the eve of a Internet company released "phone preloaded software survey report" that the three pre-installed software unreasonable risks: take a lot of phone memory, automatic network traffic consumed, preset Trojan viruses cause disclosure of personal privacy.
    Samsung preloaded rate of 97.5%
    "Third-party companies brush will certainly be no safety factors, and some will destroy the stability of the system, like pre-installed PC system as well. "Paper CEO in Nanjing Yi Bin told reporters. Nevertheless, in the highly competitive mobile phone software market, APP operators in order to improve its own products in the mobile Internet market share tends to "seize the initiative" in the phone before it reaches the target user's own software that is preloaded .
    Minister of Consumer Council's Legal Department, Shenzhen Jin told "Consumer Reports" reporter, "the point of consumer complaints focused mainly reflected in the pre-installed software will consume the phone in the background flow, power, occupy the phone memory. These preinstalled software only After obtaining root privileges to be uninstalled. " But let consumers helpless, after root treatment phones, brand rework point is usually no longer comply with the warranty obligations.
    IResearch "Chinese smartphone preloaded software user survey report 2013" shows that China's domestic and international market circulation mainstream brand mobile phones "have caught", topped the list of Samsung is 97.5 percent of the phones are pre-existing third party install the software situation. Nanjing easy Paper CEO Yu Bin told reporters, "Andrews systems mainstream mobile phones will have varying degrees of pre, at least one or two types, as many as dozens of species. parallel phone Original less intact, the situation will be preloaded compare minor. "
    The strange thing is, you can not enjoy the country's "three guarantees" policy instead of parallel phone is preloaded with fewer cases. Now a television company 's operations director Ding asked reporters to explain is that the "parallel phone and then stores selling smuggled from abroad, the whole assembly, little circulation, general stores only links can be pre-installed."
    Swamped with pre-installed software Samsung Huawei Heibang
    Preinstalled unlimited phone
    In the film company as director of operations before, Ding APP translation in the field of distribution channels "for years." He told reporters: "The mobile phone sales channels and more channels per link more experienced, so give APP operators to provide more opportunities to cut into that cell phones can be shipped preinstalled unlimited, unlimited uninstall again.."
    Mr Ding worked most of the time was "at least the same phone brush four times, each time a new implant preinstalled software." Location is a Beijing Tongzhou Business Hall, "the former boss brush or salesperson to some money line. "
    It is understood that the mainstream mobile phone factory, pre-route roughly threefold: First, when the factory phone, mobile phone manufacturers in the direct system built-in pre-installed software, the software vendors can develop their own software, but also software and third-party co-APP . With vendors operating standardized malicious software preinstalled basic expelled brand market. Second, cooperation and communication operators, mobile phone software on a custom binding or contract machine. The third is a brush manufacturers in mobile phone sales channels directly cut into the middle and lower pre-installed.
    However, a dedicated pre-installed software to help operators APP palm Star conception manager surnamed Wang told reporters, "In fact, sales channel flows downstream phones are mostly brush upstream suppliers have been cut, but even so, the downstream channel is also unlikely to be found phone unpacked traces "in order not to be other providers anti brush Brush, Brush, another company - Ding open Internet company is the preferred mobile phone sales channels downstream preinstalled. "This can reduce the phone by other manufacturers anti brush Brush probability and shorten the time to reach the pre-installed software consumers." White, director of its business philosophy, told reporters.
    Even due to repeated brush on pre-industrial chain is very common, tripod open palm stars such Brush quotient is "follow the trend of the times", launched the "arrival" and "activate" the two billing methods. Phone sold preinstalled software is still in the hands of consumers, just "arrived", the software is point into use, be considered "Activate." With the recent pre-APP carriers demand is greater than the pre-installed capacity Brush manufacturers, installed costs soared all the way, from the initial 0.5 yuan each software mentioned above 1.5 yuan each software.
    As Brush object, two brush machine manufacturers have said that they are currently pre-installed "tentacles" have been extended to Samsung, Huawei, millet and other mainstream brand mobile phones.
    Swamped with pre-installed software on Samsung Huawei Heibang
    Preinstalled software doorway
    In the mobile phone sales channels, they must attack the "Brush providers" who has become the most crucial hub. In fact, to be brushed off the phone, whether or not to activate, distributors can get about 3-10 yuan per unit profit.
    CCTV was in 2014 on the 315 because of pre-exposure of malware tripod open Internet company philosophy white commercial director told the "Consumer Reports" reporter, depending on each software category, whether it can unload the demand charge each "reaches" phone preloaded cost at least 1.5 yuan.
    Another trader palm brush Star conception company manager surnamed Wang, told reporters the "charter" and "Brush" in two modes of cooperation. Charter for small and medium channel that will be pushed into two main software system layer, and can not be directly unloaded. Work in accordance with the number of the phone to activate the software calculations, while 18% of the total mobile phone starting activation. According to this mode of cooperation, each channel can get three yuan profit.
    The brush is generally suitable for experienced and one hundred thousand shipments monthly phone-level large-scale channels, the channel needs to novice company 's help guide. Brush entire legacy phone system replacement opportunity, the new system and the original system difference is that the former is implanted in their recommended software; this mode, you can do half of the pre-installed software are left in the system layer. Whether or not the phone is activated, the channel can get about $ 10 each profit.
    Consumers should return the right to uninstall
    For now, the face of pervasive Brush, consumers usually no way.
    Back in April 2013, the State Ministry of Industry issued "on the strengthening of mobile intelligent terminal management notice" (hereinafter referred to as the "Notice"), requires the same year in November from handset manufacturers can not preset five categories of malware. In November, the "notice" the official implementation, and now has in the past year.
    The Chinese public legal aid lawyer Zhang Xingbin platform founder, is a bit helpless. He told reporters, "the Ministry" notice "more of the nature of the initiative, the lack of appropriate and binding."
    However, in the White philosophical view, even though the "notice" is not the nature of the initiative, not a threat. "Currently, Brush providers based on the Ministry for the mobile phone pre-installed licenses. As long as APP to get permission of the Ministry of preloaded preloaded no legal risk." He told reporters.
    Although the "notice" does not stipulate the question of how to perform, but in the Ministry of Industry conference by the end of October 2013, the Ministry of Communication Development Division Deputy Director workers had done Zhujun supplementary explanation that "requiring manufacturers to apply intelligent network access terminal application preinstalled software-related information. "
    Accordingly, the reporter found that thirteen major mobile phone manufacturers, only five parameters in the mobile column indicate the built-in software applications, which are millet, apples, vivo, Meizu and hammer. Among them, millet and Apple applications are developed its own; hammer will be built-in applications and third-party software preinstalled separate clearly marked.
    "Mobile pre-installed software is similar to a tying behavior, according to the sales contract rights, business is obliged to inform consumers of the tying product, but consumers should not be forced to have to accept the tying product." Guangzhou Kingland Law Firm Zhu Shaobo lawyer told reporters, the proposed regulations must be clear right to uninstall the software pre-installed should be returned to consumers.
    At October 23, 2014, led by the Guangdong Provincial Council, to join the province's 23 Council petitioned the Ministry of Industry, require that the phone should be pre-installed software applications allow consumers to freely unloaded.

















     ==================
     http://melody-free-shaing.blogspot.com/2015/03/by-liberty-times-reported-1-iraq.html

     ========================================================

     *---By the Liberty Times reported (1) Iraq offensive attack in three columns IS ,, -!. (2) lost biological children abandoned children become more,,China 10 million people each year -! (3). <Editorials> China find Taiwan media brainwashing arguably doubts? - (4) are not allowed to report leaks ,,Under the Dome staff were suspended - by NTD,,NDTV reported (5) [interactive] Hot "Under the Dome" hot:! Smoke and mirrors - reported by the BBC.(6) West Africa Bamako, Mali attacks killed five people - (7) of the United States billions of e-mail data theft case:!! prosecutors indicted suspects hacking - & - [MEGA announced MEGAchat tests. Browser-based end-to-end encryption of audio and video chat: https: // at the beginning mega.nz] Twitter's Olhar numbers: Kim Dotcom lançaconcorrente do Skype - & - released by kaspersky.com ---''Twitter march Certification: SMS instead of the password?!" - & - by Cyper Kendra released '' uTorrent quietly installs BitCoin Mining Software! '' - & - issued by hotforsecurity.com ---"A bad week !! cybercriminals Britain! "-&- released by netresec.com 'Chinese MITM analysis on Google!?''-&- by ourlove520.com release of" pre-installed software on flooded Samsung Huawei Heibang !! "[article entry: Anonymous,,Editor : admin,,Update Time: 2015-3-7] -
    ---由自由時報報導的(1).伊拉克反攻IS,,兵分三路出擊!-(2).丟掉親生兒,,中國棄嬰變多,,每年10萬人!-(3).〈社論〉中國找台灣媒體洗腦真可釋疑?-(4).不准報導穹頂之下,,洩密員工遭停職!-由NTD,,新唐人電視台報導的(5).【热点互动】《穹顶之下》火爆: 雾里看花- 由BBC報導的(6).西非馬里首都巴馬科襲擊事件造成五人死亡 !-(7).美十億電郵數據被盜案:檢方起訴涉案黑客!--&- [MEGA宣布MEGAchat測試。 基於瀏覽器的終端到終端加密的音頻和視頻聊天: https://開頭 mega.nz   ]Twitter的Olhar數字:金·達康lançaconcorrente做的Skype?!-&-由kaspersky.com發佈的---Twitter的進軍認證:短信代替密碼 !-&-由Cyper Kendra發佈的''uTorrent quietly installs BitCoin Mining Software!''-&-由hotforsecurity.com發佈的---"一個糟糕的一周英國網絡罪犯!!"-由netresec.com發佈的''中國MITM對谷歌分析!?''-由ourlove520.com發佈的"预装软件泛滥成灾 三星华为上黑榜!!"[文章录入:佚名,,责任编辑:admin,,更新时间:2015-3-7]-
    **All The World City / Country Lauguage**-

     http://melody-free-shaing.blogspot.com/2015/03/by-liberty-times-reported-1-iraq.html
    ===Melody.Blog===THE   END===>/

    &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&




    張貼者: Unknown 於 下午1:40
    以電子郵件傳送這篇文章BlogThis!分享至 X分享至 Facebook分享到 Pinterest
    標籤: Melody.Blog free software sharing space.com

    沒有留言:

    張貼留言

    window.___gcfg = {
    lang: 'zh-CN',
    parsetags: 'onload'
    };

    較新的文章 較舊的文章 首頁
    訂閱: 張貼留言 (Atom)

    熱門文章

    • - Update [08/11-2015] - this artificial disaster, we can not let the devil control no wonder the UN Legion, American Legion !?UAV was shot down for no reason, do not open these terrorist acts, is only a frenzied beast !! Original URL: [ http://fossbytes.com/how-to-hack-a-military-drone-manual-is-already-online/ ] "how to crack a military UAV manual is online" -Tittle: Nevin Quick-virus tools and actually attached PDF Download !! Who is this thinking is not normal, please look our city / other countries in the military Minister WARNING !!! - -更新[08/11-2015]-這種人為的災禍,怎麼能任由魔鬼操控?!難怪我們聯合國軍團,美國軍團的無人機被無故擊落,不公開你們這些恐怖分子行為,是只有喪心病狂的畜牲!原網址:[ http://fossbytes.com/how-to-hack-a-military-drone-manual-is-already-online/ ]"如何破解一個軍用無人機手冊已聯機"-內文竟附連結病毒工具和PDF下載!!這是誰的思維長得不正常!請我國/各國軍事大臣注意!!--Update[07/11-2015] Anonymous and hacker tribe - cause us a lot of curiosity...! - Add Hong Kong Apple Daily our favorite famous columnist writer Mr. Li Yi's brilliant comment! look at Hong Kong today,, Taiwan tomorrow, garbage Ma Ying-jeou betrayed us Taiwan people us,! we do not want this dirty Ma Ying-jeou, the most suitable for this crap dead in the mainland! -更新[07/11-2015]黑客與匿名部落--引起我們很多好奇之...!-加上香港蘋果日報我們最喜愛的著名專欄主筆李怡先生的精采評論!看今日香港,,明日台灣,垃圾馬英九出賣我們台灣人們,我們不要骯臟的馬英九,這垃圾死在內地最適宜!-*[06/11-2015]Update- By Anonymous Action=更新匿名行動 [ #opchina #ophk ]]- The Anonymous Legion said :"#OpHongKong 7 websites the Chinese government is under the control of Anonymous. You should have expected us. "- "[http://XXXXX.com ]-& By{ news2.mingpao.com }-Well done^^!Melody.Blog Thankgiving for all great" Support Human Right Org."~- [4/11-2015] Update - {1} In November, it is the death of celebrities "accidentally" tear down "the Berlin Wall history hero Schabowski death!" - Reported by the New Tang Dynasty Television - {2} by Anonymous Asia to show the public information - {3} An anonymous knight in the Mainland, he said:"I hate the Communist Party, hate Chinese traditional culture, hate friendships, hate leadership Niubi Hong Hong, hate authoritarianism.Hate Huitie not see posted , hate people do not understand the language of the environment on people who criticize forever hate refuse to listen refused to communicate the " left anger " and " right anger ", hate only ten minutes to observe the life of people on the judgment of others."--- The chivalrous brothers name is" Zola Zhou "also shared some exclusive high IT skills, more a very useful tool to attack the Communist Party of IP delicate, so we can join the fiber off 'Communist' and called "zoonotic" !! - Last by our favorite Hong Kong Apple Daily forum famous critic of " Mr. Li Yi "as the end of this Title article!-*All The World Lauguage*- -[4/11-2015]更新-{1}.在11月日是那位名人的逝世呢?"意外「推倒」柏林牆 歷史功臣沙博夫斯基逝世!"由新唐人電視台報導-{2}.由匿名亞洲給我們的資訊!-{3}.一位在內地的匿名俠客,他説:"我讨厌共产党,讨厌中国传统文化,讨厌称兄道弟,讨厌牛逼哄哄的领导,讨厌威权主义,讨厌回贴不看贴,讨厌不了解别人的语言环境就批判个没完的人,讨厌拒绝倾听拒绝沟通的左愤和右愤,讨厌只用十分钟观察就评判别人一生的人。"---這位俠義哥兒名稱是"Zola Zhou "還分享了一些獨家高技巧資訊,更有一款非常好用的攻擊共產黨IP的精巧工具,使我們也可一起加入纖滅'中共'又名為"畜共"!!-最後,是由我們最喜愛的香港蘋果日報論壇著名評論家李怡先生的文章作為本篇的結尾!-
      *- Update [08/11-2015] - this artificial disaster, we can not let the devil control no wonder the UN Legion, American Legion !?UAV was s...
    • -Update[16/10-2015]By Our Great Famous Anonymous "Ghost Security Group"show ISIS extremists evil Bitcoin !!-*All The World Country Lauguage*- -更新[16/10-2015]我們偉大的馳名匿名“鬼安全組”展示ISIS極端分子邪惡的比特幣!- And- (#捍衛學術自由 ,,#DefendAcademicFreedom)--Update [15-10-2015]:Hong Kong apple daily forum- Famous Edditor: Mr. Li Yi, is always our most beloved !!On the quality of a man is not judged by the wealth, nor be determined by the class, nor is judged by the realists , but not by the power struggle down the decision!-*All The World City Lauguage*- -更新[15-10-2015]:李怡先生的蘋論總是我們最敬愛的!!一個人的質素並不是由財富來判定的,也不是由階級來判定的,亦不是由現實主義者來判定的,更不是由權力鬥爭下來判定的!-*[14/10-1015]'Seven police charged with intentional wounding disclose the name of the Attorney General Title!'-By-hk.apple.nextmedia.com]-*All The World City Laugugae*- [14/10-1015]"七警"被控有意圖傷人罪!律政司披露姓名職銜 !--By-hk.apple.nextmedia.com]- TO My All Great Friendly Anon and my all readers and friends~*- [13 / 10-2015] Mainland China-pig communist miscellaneous swollen manufactured than the extremists still brutal, it's no personality, willing slaves as big thief !! This beast :thief wolf Mr Leung ! - Look at Hong Kong Apple Daily reported - Forum (1) . "Formed monopoly executive hegemony! nowhere !! public scrutiny (by the 'Democratic Party' 'Legislative Council ,, Miss Huang Biyun). (2). The Council is a political reward club! (by the senior media people ,, . Mr. Wu Zhisen). (3).Title:"boilerplate" by a famous writer ~ written by {Mr. Li Yi }.-From Taiwan Apple Daily (4) US religious freedom report released,, Beijing authorities to suppress criticism of Christianity, Muslims and Falun Gong Activity!"-To our Dear "DigitaShadow"-We urge you to cast big magic.[#OPHKGOV #OP_asiaISIS_LeungCHUNYing #OpDAB ]-*All The World City Lauguage*- -[13/10-2015]大陸支那豬共產雜腫製造了比極端份子還野蠻,更沒人格,甘願作為大賊的奴隸賊狼梁振英這件禽獸!-看香港蘋果日報報導-論壇(1)."建制壟斷行政霸道!公眾監察無門!!(由''民主黨''立法會議員,,黃碧雲女士).(2).校董會是政治酬庸俱樂部!(由資深傳媒人,,吳志森先生) (3). 標題:"樣板"由知名作家(李怡) 先生所編寫的~由台灣蘋果日報報導(4).美公布宗教自由報告,,批評北京當局打壓基督教、穆斯林與法輪功的活動!"-我們親愛的"DigitaShadow"-我們懇請你施展大魔法...[ #OPHKGOV #OP_asiaISIS_LeungCHUNYing #OpDAB ]-
      --Update[16/10-2015]By Our Great Famous Anonymous "Ghost Security Group"show ISIS extremists evil Bitcoin !!-*...
    • ---This article is an Apple forum, "independent political commentator," written, the paper described the current Hong Kong people are politically persecuted individuals can not make a stand Fung Choi article author: Mr. Li shui fu "!- ---這篇蘋果論壇文章是一位"獨立時事評論員"所寫的,文中形容現今香港人被政治迫害,個人不能不作出表態的豐彩文章!筆者:李兆富先生"- -미스터 리 풍수 쿵푸 "---이 문서에서는 애플 포럼,"독립적 인 정치 평론가는 "서면, 용지가 현재 홍콩 사람들이 정치적으로 개인이 독립 봉 최 기사 작성자을 할 수 없습니다 박해를 설명입니다!- ---Cet article est un forum Apple ", commentateur politique indépendant," écrit, le papier décrit les gens actuels de Hong Kong sont politiquement persécutés individus ne peuvent pas faire un stand Fung Choi auteur de l'article: M. Li shui fu "- ---この記事は、Appleのフォーラムは、ある「独立政治評論家は、「書かれた、紙が記載され、現在の香港の人々は政治的に個人がスタンドフォンチェの記事の作者作ることができない迫害されています!李風水カンフー」を - ---Dieser Artikel ist ein Apple-Forum, "unabhängige politische Kommentator," geschrieben, beschrieben das Papier die gegenwärtigen Menschen in Hongkong sind politisch verfolgte Personen nicht machen einen Stand Fung Choi Artikel Autor: Li-Shui-fu "- ---Tiu artikolo estas pomo forumo, "sendependa politika komentisto," skribita, la papero priskribis la aktuala Hong Kong personoj estas politike persekutataj individuoj ne povas fari piedestalon Fung Choi artikolo aŭtoro: S-ro Le shui fu"!- **USA/UK/SEAOUL KOREAN/TW/MACAU(FDZ)/HKS/FR/JP/UKN/DE/FA/POL/VI/ESP`/CO/ARG/PY/MEX/MO/AUST./RU/HO/MAL/NW/CA/IT/PH/Swedis/Mongolian/TUR/Arabic/Latin/INDON./Greek/Dansk/THAI/......All the world lauguage**-
      ---This article is an Apple forum, "independent political commentator," written, the paper described the current Hong Kong people ...
    • --Update--Apple Daily on the same day news media union---*candlelight vigil mourning was shot in France with the industry*- -更新--蘋果日報的同日新聞---*傳媒工會燭光集會悼法國被槍殺同業*- -update---*촛불 집회 애도가 업계와 프랑스에서 촬영 한 같은 날 언론 노조에 애플 데일리*- -Mise À jour--Apple Daily sur l'union nouvelles des médias même jour---* veillée aux chandelles deuil a été tourné en France avec l'industrie*- -Update--Apple Daily sur la sama tago amaskomunikiloj unio---*kandellumo Vigil funebro estis pafita en Francio kun la industrio*- **All the World Country Lauguage**--"Today's Apple Daily Forum, author (political commentator,, Pete) Title: [Online Forum] poison bread you eat do not eat? - & - [Political reform consultation] Li Ka-shing: nowhere in Hong Kong are all big losers .- ---"今天的蘋果日報論壇,筆者(政治評論人,, 桑普)標題: 【網上論壇】毒麵包你吃不吃?-&-【政改諮詢】李嘉誠:原地踏步全港都係大輸家.- ---"오늘의 애플 데일리 포럼, 저자 (정치 평론가,, 피트) 제목 : [온라인 포럼] 당신이 먹는 독 빵은 먹지 않아요? - 및 - [정치 개혁 상담] 리자청 :데도 홍콩의 모든 큰 패자는 없습니다 .- ---"Forum Quotidien d'Apple d'aujourd'hui, l'auteur (commentateur politique,, Pete) Titre:[Forum en ligne] poison pain que vous mangez ne pas manger? - & - [Consultation sur la réforme politique] Li Ka-shing: nulle part dans Hong Kong sont tous grands perdants .- ---"La hodiaŭa Apple Daily Forumo, aŭtoro (politika komentisto,, Pete) Titolo: [Enreta Forumo] veneno pano vi manĝas ne manĝas? - & - [Politika reformo konsulto] Li Ka-shing: nenie en Hong Kong estas ĉiuj grandaj perdantoj .- **All the world national city lauguage**-**Ĉiuj mondon naciaj urbo lauguage**
      --Update--Apple Daily on the same day news media union---*candlelight vigil mourning was shot in France with the industry*- -更新--蘋果日報的同日新聞...
    • ---''Update**~**solve computer problems automatically boot !!! & *** use ----- Gigabyte Dual BIOS ~ & **^three brands BIOS modification tools"! **BIOS* warning tones - how to identify?!**- ---''更新**~**解決電腦自動開機的問題!!!&***善用-----技嘉的 Dual BIOS~&**三大^品牌BIOS修改工具**!**BIOS*警告音~怎麼識別?!**- **USA/UK/TW/SEAOUL KOREAN/MACAU(FDZ)/HKS/FR/UKN/JP/PH/CO/ESP`/VI/RU/DE/PY/MAL/THAI/AUST./EUROP./.....All the world lauguage**-
      *---''Update**~**solve computer problems automatically boot !!! & *** use ----- Gigabyte Dual BIOS ~ & **^three brands BIOS ...
    • - Update [11 / 11-2015] information by Anonymous facebook's "Anonymous-Old-School" released of information - a reference to one of them snippets - "The British people, get this into your head before it's too late - look What happened to all the major countries in the West (World)- the United States, Canada, Britain, France, Germany, Turkey, Australia, and more - in every one of the first, ... "! - -更新[11/11-2015]由匿名facebook的"Anonymous-Old-School"發佈的信息-引用其中1小段內容-"英國的人,得到這個到你的頭上之前,為時已晚-看看發生了什麼事在西方各主要國家-美國,加拿大,英國,法國,德國,土耳其,澳大利亞,還有更多-在每一個之一,...!"--Update[2710-2015]For My Dear President Barack Obama" Mr.-Update[2610-2015] Communist China fifty cents slaves liar, The developer how to profit to steal using "Taomike '' mobile applications! - They steal the mainland people use mobile phones all SMS / Privacy Information"!!---Title: "Taomike SDK hijack user All SMS / Privacy Information! "- as they are rogue hackers,, from the mainland white hat (FreeBuf.com) for you expose confidential ! Communism Chi na Fifty Cents is so kind of damage their own countrymen?! Shameful China-pig!! & By "Halifax Nova Scotia Anonymous"-the Anonymous News!-"Brothers, men...thank you Oh!!"- -更新[2610-2015] 謊話連篇的共產支那五毛奴隸-標題:"淘米客SDK会劫持用户的所有短信!"-,由內地白帽子(FreeBuf.com)為你們揭露機密吧!損害對待自已的同胞的!可恥的支那豬!-"哥兒,爺們...謝謝喔!"- Update [12/10-2015]: Can you imagine a USB became a bomb it ?!- -from 'China-pig communist army black devil', 'evil despicable "# PCB manufacturer in China.", 'vulgar despicable 'communist mainland black Army devil '' actually manufactured so notorious bad track of breaking tool ?!!-By Chivalrous Anonymous "Halifax Nova Scotia Anonymous" published information, and then by hackread.com show it on their blog ---Title:* Watch Out - This Killer USB Drive Will Fry Your Laptop !*---evil sin behavior! See chivalrous Anonymous- "Halifax Nova Scotia Anonymous" and hackread.com to unveil 'China-pig communist army black devil's ''conspiracy -! #opchina] -更新[12/10-2015]:"通過俠義匿名"Halifax Nova Scotia Anonymous" 公佈的資訊,再由hackread.com展示了---標題:*Watch Out – This Killer USB Drive Will Fry Your Laptop*---原罪之惡行為!請看俠義匿名"Halifax Nova Scotia Anonymous"和hackread.com為我們揭開''支那共產黑軍魔鬼''的陰謀!-#opchina ]-* Update [12 / 10-2015] "Vintage Computer Fest: Berlin 2015 "{October 9, 2015 year] - by the (hackaday.com) led us to visit we will see different opportunities and German culture in reality -! "In addition to the Berlin machine laissez-faire, it has emerged Vintage Computer Festival 2015 session: Berlin (VCFB). ... "- -*更新[12/10-2015]"復古計算機巨星:柏林2015年"{October 9,2015年]- -Update[10/10-2015] - This Russian Webmaster on the network trumpeted, whether you are a student, working people, people who do not understand computer technology, the elderly, the most popular women in the family to join, its purpose was "to be able to access-( "因特網") " iainternet access provider! They ask the Webmaster How to get the money earned ?...!- For My All Great Anonymous & my readers and friends~Thanks^^-更新[10/10-2015] - 這一俄羅斯的網站管理員在網絡上大肆宣傳,無 論你是學生,工作的人,人誰不明白計算機..其目的是“要能訪問 -(“因特網”)“iainternet接入提供商”!他們發問如何獲得賺來的錢? - [10/10-2015]Mainland China-man , when what a day they does not stealing ??The answer is no ! They put Microsoft's original / creators need to make serious efforts in the world of science and technology studies WH final tool / life electronic equipment / other copyrighted's! The items have been stolen!! Then apply the CCP refuse dictatorship "no credibility" of sinful lying government! - see the thehackernews.com- famous software / tool analyst: 'Mo 希特库马尔 "- written on [18 / 09-2015]" Microsoft has established its own Linux operating system! "- then take a look at the Rubbish China-man is very cunning shameless to theft of Microsoft's copyright !!To: My All Geat Anonymous team and my readers & friends~-*All The World Country Lauguage
      - Update [11 / 11-2015] information by Anonymous facebook's "Anonymous-Old-School" released of information - a ref...
    • ---Released by csoonline.com**Shodan exposes IoT vulnerabilities !**-&--**HackingTeam mobile, PC spyware for governments spans many countries!**-&&-**Police Story: Hacking Team’s Government Surveillance Malware !**- ---由csoonline.com發布的**撒旦暴露物聯網的漏洞**! - &--HackingTeam手機,PC間諜軟件為政府跨越許多國家 !-&&-**警察故事:!黑客團隊的政府監視惡意軟件!**- ---csoonline.com에 의해 출시 **Shodan는 만약 IoT 취약점을 노출** - & - **HackingTeam 모바일은, 정부에 대한 PC의 스파이웨어가 많은 국가에 걸쳐** - && - **경찰 이야기 :! 해킹 팀의 정부 감시 악성 코드!**- ---Libéré par csoonline.com **Shodan expose vulnérabilités IdO** - & - **HackingTeam mobile, PC les logiciels espions pour les gouvernements de nombreux pays se étend** - && - **Police Story:! Surveillance Malware gouvernement de Hacking équipe!**- ---csoonline.comによってリリース**初段はIoTの脆弱性を公開します** - & - ** HackingTeamのモバイルは、政府にとってのPCスパイウェアは、多くの国にまたがる** - && - **警察ストーリー!:ハッキングチームの政府監視マルウェア!**- ---Durch csoonline.com Freigegeben **Shodan macht IoT Schwach** - & - **HackingTeam Handy, PC Spyware Regierungen reicht vielen Ländern** - && - **Police Story:! Hacking Teams Regierung Surveillance Malware!**- ---Ĵetita de csoonline.com **Shodan elmontras IoT vulnerabilidades!** - & - **HackingTeam móviles, PC spyware por registaroj ĉirkaŭprenas multaj landoj!** -&&-**Polico Story: Hacking Team Registaro Surveillance Malware!**- **USA/UK/SEAOUL KOREAN/TW/MACAU(FDZ)/HKS/FR/JP/UKN/DE/FA/POL/VI/ESP`/CO/ARG/PY/MEX/MO/AUST./RU/HO/MAL/NW/CA/IT/PH/Swedis/Mongolian/TUR/Arabic/Latin/INDON./Greek/Dansk/THAI/......All the world lauguage**-
      ---Released by csoonline.com**Shodan exposes IoT vulnerabilities !**-&--**HackingTeam mobile, PC spyware for governments spans many co...
    • *-Update[04/12-2015]- Today Hong Kong's Legislative Council just as like as -...Corrupt regime in Thailand, Hong Kong - Formed faction "DAB" - built the establishment faction is by the dictatorship, authoritarian as like the mainland monster Xi Jinping, the instruction of Chi na slaves beast thief Wolf Leung Chun-ying, corruption and collusion in the darkness of self-interest sub-stealing government! The local Hong Kong residents to pay tax treasury!Mainland China-slaves beast thief Wolf Leung Chun-ying and Formed faction "DAB" arbitrarily take over Hong Kong people tax treasury fund squander on " great ( pay-over )white elephant" projects of garbage Mainland railway , machine, etc..."excess pay" places "wasting building"!-#OpISIS #Opchina #ophongkong #OpThailand #Op_Tibet@TrueTibet ]]---Update[04/12-2015]-今天香港地區的立法會便如-泰國的腐敗政權,香港建制派民.建.聯.便是由獨裁,專制大陸妖怪習近平,指令其奴隸畜牲梁振英,勾結的黑暗私利貪污分賊贓的賊狼政府!把香港本土居民繳納厙税房的積蓄,任意揮霍在"大白象"內地垃圾工程的鐵路,機埸..等等的多餘"虛損建設"上謀奪香港人民的厙税房的積蓄!-#OpISIS #Opchina #ophongkong #OpThailand #Op_Tibet@TrueTibet]]-Update - [02/12-2015] - By sharing the great chivalrous Anonymous "AnonRogue" the most accurate information, all kinds of the (last) analysis, maybe must to loaded more to make the reader to figure out the same by the great chivalrous Anonymous "AnonRogue" as the most accurate information share the main focus! Authoritarian cunning mainland demons Xi Jinping slander of Turkey!- Is you Xi Jinping = this a cunning devil still can face to Putin,Mr.??!-Also Thanksgiving~ -更新-[02/12-2015]-由偉大俠義匿名" AnonRogue "的最準確資訊的分享,上文的各式分析可能還未令讀者弄清楚!加載同樣由偉大俠義匿名" AnonRogue "的最新最準確資訊的分享!土耳其被大陸獨裁狡猾妖魔習近平污蔑了!-虛偽極,,沒有誠信習近平獸,欺騙俄羅斯總統普京先生的謊言??!-Also Thanksgiving~-[01/12-2015]Update- From the great chivalrous Anonymous '' AnonRogue '' tribes - to find the most authentic evidence, citing the {ntdtv.com} detailing News: "Malaysia Airlines MH370 missing alarming news!"- - [01 / 12-2015] Update- De la grande Anonyme chevaleresque '' Les tribus 'AnonRogue' - pour trouver la preuve la plus authentique, citant l'Nouvelles {} ntdtv.com détaillant: "Malaysia Airlines MH370 nouvelles alarmantes manquant!"- - [01 / 12-2015] Update- Dari Anonymous sangat sopan hebat '' puak-puak 'AnonRogue' - untuk mencari bukti yang paling sahih, memetik Berita {ntdtv.com} memperincikan: "Malaysia Airlines MH370 berita membimbangkan hilang" - - [01/12-2015] 從這位偉大俠義匿名''AnonRogue ''的部落-找尋最真實的證據,引用了{ntdtv.com}詳述新聞:"馬航MH370失蹤出現驚人新消息!"- - [01 / 12-2015] Update-С большим рыцарским Anonymous ''- '' AnonRogue племен - найти самые подлинные доказательства, ссылаясь на {} ntdtv.com подробно Новости: "Malaysia Airlines MH370 отсутствует тревожная новость"-
      *-Update[04/12-2015]- Today Hong Kong's Legislative Council just as like as -...Corrupt regime in Thailand, Hong Kong - Formed facti...
    • -Update(14).[31/05/2015] by the international Anonymous launch crashing retaliatory action of #OpChina (demon evil cult Communist mainland Chinaman rubbish sites such as domino effect, by our dear international Anonymous brothers and sisters playing an Earthshaking shaking ! ha ha ha...) - -Update(14)。[31/05/2015]國際匿名發布崩潰#OpChina(大陸妖魔邪教共產黨支那人的豆腐渣網站如骨牌效應的報復行動,給我們親愛的國際匿名兄弟姊妹玩弄個翻天覆地!哈哈哈...)- -Mise À jour (14).[31/05/2015] par le lancement Anonyme internationale écraser des mesures de rétorsion de #OpChina (démon secte communiste Chinaman continentale sites de décharges telles que l'effet domino, par nos chers frères et sœurs jouent un Ennosigee secouant internationales Anonyme ! ha ha ha...)- -I-Update (14).[31/05/2015] sa pamamagitan ng international launch Anonymous crash gumaganti aksyon ng #OpChina (demonyo masasamang uri ng pagsamba Communist mainland Chinaman sites basura tulad ng domino effect, sa pamamagitan ng aming mga mahal na international Anonymous kapatid naglalaro ng isang earthshaking nanginginig ! ha ha ha ...)- -Actualización (14).[31/05/2015] por el lanzamiento internacional Anonymous estrellarse acción de represalia de #OpChina (demonio malvado sitios basura culto Comunista Chinaman continental como efecto dominó, por nuestros queridos hermanos y hermanas que juegan un Earthshaking sacudiendo internacionales Anonymous ja, ja, ja...)- -Update (14). [31/05/2015] bởi Anonymous ra mắt quốc tế đâm hành động trả đũa của #OpChina (con quỷ ác tà giáo cộng sản Trung hoa đại lục các trang web rác như hiệu ứng domino, bởi anh em thân yêu của chúng tôi Anonymous quốc tế chị em chơi một earthshaking lắc ha ha ha...)- -update(14)。[31/05/2015]私たちの愛する国際匿名の兄弟姉妹は、振とう揺るがすを再生することにより、このようなドミノ効果として#OpChina(鬼悪カルト共産本土の中国人のゴミサイトの報復行動をクラッシュ国際匿名打ち上げによって!ハッハッハ...) - -Update (14).[31/05/2015] door de internationale Anonieme lancering crashen vergeldingsactie van #OpChina (demon kwaadaardige sekte Communistische vasteland Chinaman rommel sites als domino-effect, door onze lieve internationale Anonieme broeders en zusters spelen een wereldschokkende schudden ! Ha ha ha...)- -Update (14) ။ [31/​​05/2015] ကျွန်တော်တို့ရဲ့ချစ်သောအပြည်ပြည်ဆိုင်ရာ Anonymous ကညီအစ်ကို, ညီအစ်မလှုပ်ခါတစ် Earthshaker ကစားအသုံးပြုပုံထိုကဲ့သို့သောဒိုမီနိုအကျိုးသက်ရောက်မှုအဖြစ် #OpChina (နတ်ဆိုးသည်မကောင်းသောအမှုဘာသာဝါဒကွန်မြူနစ်ပြည်မကြီးမှ Chinaman အမှိုကျဆိုက်များ၏ပြန်လည်လက်တုံ့ပြန်ခြင်းအရေးယူပျက်ကျနိုင်ငံတကာ Anonymous ကပစ်လွှတ်အားဖြင့် ! ဟက်တာဟက်တာဟက်တာ ... )- -Update (14).[31/​​05/2015] 같은 우리의 친애하는 국제 익명 형제 떨고 Earthshaking 재생 자매 도미노 효과, 같은 악마 악마 숭배 공산주의 본토 중국인 쓰레기 사이트를 #OpChina (의 보복 조치를 충돌 국제 익명 발사로 )...하, 하, 하!- **All The World Lauguage**--Update(14.[30/05/2015] by the international Anonymous launch crashing retaliatory action of #OpChina~.(Communist mainland demon evil cult Chinaman collapsed !! Ha ha ha...)- -更新(14).由國際匿名發動的#OpChina的轟然報復行動~(大陸妖魔邪教共產黨支那人崩潰了!!哈哈哈...)- -I-Update(14).[30/05/2015] sa pamamagitan ng international launch Anonymous crash gumaganti aksyon ng #OpChina ~ (Communist mainland demonyo masasamang uri ng pagsamba Chinaman pinaliit !! Ha ha ha...)- -Update(14).[30/05/2015] bởi Anonymous ra mắt quốc tế đâm hành động trả đũa của #OpChina~(Cộng quỷ đại lục tà giáo Trung hoa bị sập !! Ha ha ha...)- -の報復行動をクラッシュ国際匿名打ち上げによって-update(1430/05/2015]は#OpChina〜
      -Update(14).[31/05/2015] by the international Anonymous launch crashing retaliatory action of #OpChina (demon evil cul...
    • --- **Refresher---** ^^ `` `Windows 7 blue screen code Daquan & blue Raiders` `` `` `` `` ~~~ !! ^ - ---**温故知新---**^^```Windows 7 藍屏代碼 大全 & 藍屏全攻略 `````````~~~!!^- **USA/UK/TW/SEAOUL KOREN/HKS MACAU(FDZ)/FR/UKN/JP/VI/MAL/DE/PH/CO/PY/IT/RU/INDON./OCEAN../AUST./....All the world lauguage**-
      *--- **Refresher---** ^^ `` `Windows 7 & 8 blue screen code Daquan & blue Raiders` `` `` `` `` ~~~ !! ^ - ---**温故知新---**^^```Windows...

    網頁

    • 首頁

    標籤

    • *Melody.Blog free software sharing space*for all the peoples^^~ (158)
    • Melody.Blog free software sharing space.com (83)

    網頁-My 1st blog.

    • 首頁
    • 網上觸

    熱門文章

    • ---Perfect chivalrous gesture by Dear Anonymous Legion issued to 'IS bug' sensational attacks - really excellent technology, fully exposed 'IS bug' bank ... !! (boys handsome ah~ good ah ^^) - (1) # Anonymous hacktivists strike ISIS.. Militant knocked down dozens of job sites offline [http://inquisitr.com/1823930/anonymous-hacktivists-isis/...#GhostSec#OpISIS]--- (2) .Leaked document: HSBC from arms profit providers, blood diamond traffickers, international criminals http://www.techworm.net/2015/02/leaked-docs-hsbc-profited-from-arms-dealers-blood-diamond-traffickers-other-international-outlaws .html ...] - & - (3) .111 Israeli credit card via @ security_511 http://pastebin.com/3K4ZePC2#OpIsrael remain calm and hackers leaked Israeli] - FinalAlways use anonymous proxy [http: // opnewblood .com] - ---由親愛匿名俠義軍團所發出的完美姿勢向'IS小蟲'轟動攻擊~真的是超卓技術,完全暴露'IS小蟲'的銀行...!!(哥兒很帥啊很棒啊^^)-(1).#Anonymous黑客行動主義者打擊ISIS。好戰的招聘網站撞倒幾十個下線[http://inquisitr.com/1823930/anonymous-hacktivists-isis/...#GhostSec#OpISIS]---(2).Leaked文檔:匯豐銀行從軍火商獲利,血鑽石販子,國際不法分子http://www.techworm.net/2015/02/leaked-docs-hsbc-profited-from-arms-dealers-blood-diamond-traffickers-other-international-outlaws.html…]-&-(3).111以色列信用卡通過@ security_511 http://pastebin.com/3K4ZePC2#OpIsrael洩露保持冷靜和黑客以色列] - 最後的是匿名@Always使用代理[http://opnewblood.com] - **All the world city/country lauguage**-
      *---Perfect chivalrous gesture by Dear Anonymous Legion issued to 'IS bug' sensational attacks - really excellent technology, ...
    • -Update[30/6/2015]-By our huge Anonymous #TangoDown by ''p@r@dox17'' .. #Palestine_DZ #AnonGhost #OpChina)-Our Hero fighting to Human Right and sharing the Chinese hackers portion lost China face! A variety of Chinese hacker rubbish programming ..you want to see the scandal open to the public ah...haha^^)- -更新[30/6/2015] - 通過我們的龐大的匿名#TangoDown由''P@R@ dox17''.. #Palestine_DZ#AnonGhost#OpChina) - 我們的英雄戰鬥人權和 分享了中國黑客部分失去中國的臉面!各種中國黑客垃圾programming..你們希望看到的醜事大公開啊...哈哈^^)- -Update [30/6/2015] -Mit unserer riesigen Anonymous #TangoDown durch '' p@r@dox17 ''..#Palestine_DZ #AnonGhost #OpChina) -Unsere Helden kämpfen, um Menschenrecht und die gemeinsame Nutzung der chinesische Hacker Teil verloren China Gesicht! Eine Vielzahl von chinesischen Hacker Müll programming..you möchte den Skandal die Öffentlichkeit zugänglich ah sehen...haha ^^)- -Update[30/6/2015] ''のp@Rの@のdox17''#Palestine_DZ #AnonGhost #OpChinaを)」-により、当社の巨大匿名#TangoDownを-by人権に戦っ-Ourヒーローと]中国のハッカー部分を共有することは中国の顔を失いました!中国のハッカーごみprogramming..youの様々な)^^ハハ...ああ公共に開放スキャンダルを見たいと思っています - -Mise À jour [30/6/2015] -Par notre immense Anonyme #TangoDown par '' p@r@dox17 ''..#Palestine_DZ #AnonGhost #OpChina) -Notre héros luttant pour droit de l'homme et partager la partie de pirates chinois a perdu la Chine visage! Une variété de pirate chinois ordures programming..you veulent voir le scandale ouvert au public ah...haha ​​^^) - -Update [30/6/2015] '피의@r에@를dox17'..#Palestine_DZ #AnonGhost #OpChina을) '에 의해 우리의 거대한 익명 #TangoDown을에 의하여 - 인권에 싸움 - 우리 영웅과-중국 해커 부분을 공유하는 것은 중국에게 얼굴을 잃었다! 중국어 해커 쓰레기 programming..you의 다양한) ^^ 하하...대중 아에게 공개 스캔들을보고 싶어-**All The World Lauguage**----Update 28/06/2015] - our friendly Anonymous huge chivalrous tribe legion "#TangoDown by "p@r@dox17 #opchina) - {we have fallen in love with his swastika heroic action #opchina}- ---更新28/06/2015]-我們的俠義友好匿名龐大部落軍團"#TangoDown by "p@r@dox17 #opchina)-{我們已愛上了他的卍英雄行動 #opchina }- ---Aktualisierung 29/06/2015] - unser freundliches Anonymous großen ritterlichen Stamm Legion "von #TangoDown" p@r@dox17 #opchina) - {wir in der Liebe mit seiner Hakenkreuz Heldentat #opchina gefallen}- **All The World Lauguage**-
      -Update[30/6/2015]-By our huge Anonymous #TangoDown by ''p@r@dox17'' .. #Palestine_DZ  #AnonGhost  ...
    • - [3/11-2015] See Our "Kyfx" show that....& By( thehackernews.com )-(1). Tor Releases Anonymous Instant Messenger. Here's How to Use It [Thursday, October 29, 2015] Editor: Wang Wei -(2)."Hacking CCTV Cameras to Launch DDoS Attacks [Thursday, October 22, 2015] Editor "Swati Khandelwal"-*All The World Lauguage*- -[3/11-2015] 看到我們的“Kyfx”顯示...與通過(thehackernews.com) - (1)。 Tor公佈了匿名即時通訊。以下是如何使用它 [星期四,2015年10月29日]編輯:王偉 - (2)“黑客監控攝像機將推出的DDoS攻擊[週四10月22日,2015年]編輯器”斯瓦特Khandelwal“ --In this moment we moved again, Are you also on the scene?... For My All Huge Anonymous and My All Readers & Friends~ Thanksgiving for Apple Daily Sharing~ ===**All The World Lauguage**-- Update-[26/09-2015]see our great Anonymous "Kyfx"-He is the world hero~ OPKOREAN #opchina #ophk #Op_Tibet@TrueTibet #OpISIS #OpRussian #optaiwan ]]-My Kyfx"-We thanksgiving~|))-**All The World Lauguage**- - 更新-[26/09-2015]看到我們的偉大的匿名“Kyfx” - 他是世界的英雄〜OPKOREAN #opchina #ophk #Op_Tibet@TrueTibet #OpISIS #OpRussian #optaiwan]] - 我的Kyfx“ - 我們感恩〜|))-**世界上所有的語言**- -Continued [24/09-2015] Update - our great chivalrous Anonymous "Kyfx" and "Halifax Nova Scotia Anonymous" - to dictator of the Communist Party of the corrupt human beast violence garbage regime, no stop revenge! -續[24/09-2015]更新-我們的偉大俠義匿名"Kyfx"和"Halifax Nova Scotia Anonymous"對敗壞人權的共產黨獨裁畜牲暴力垃圾政權,作出不停止的報復!**All The World Lauguage**-
      無法查看此摘要。請 按這裡查看文章。
    • - Update [08/11-2015] - this artificial disaster, we can not let the devil control no wonder the UN Legion, American Legion !?UAV was shot down for no reason, do not open these terrorist acts, is only a frenzied beast !! Original URL: [ http://fossbytes.com/how-to-hack-a-military-drone-manual-is-already-online/ ] "how to crack a military UAV manual is online" -Tittle: Nevin Quick-virus tools and actually attached PDF Download !! Who is this thinking is not normal, please look our city / other countries in the military Minister WARNING !!! - -更新[08/11-2015]-這種人為的災禍,怎麼能任由魔鬼操控?!難怪我們聯合國軍團,美國軍團的無人機被無故擊落,不公開你們這些恐怖分子行為,是只有喪心病狂的畜牲!原網址:[ http://fossbytes.com/how-to-hack-a-military-drone-manual-is-already-online/ ]"如何破解一個軍用無人機手冊已聯機"-內文竟附連結病毒工具和PDF下載!!這是誰的思維長得不正常!請我國/各國軍事大臣注意!!--Update[07/11-2015] Anonymous and hacker tribe - cause us a lot of curiosity...! - Add Hong Kong Apple Daily our favorite famous columnist writer Mr. Li Yi's brilliant comment! look at Hong Kong today,, Taiwan tomorrow, garbage Ma Ying-jeou betrayed us Taiwan people us,! we do not want this dirty Ma Ying-jeou, the most suitable for this crap dead in the mainland! -更新[07/11-2015]黑客與匿名部落--引起我們很多好奇之...!-加上香港蘋果日報我們最喜愛的著名專欄主筆李怡先生的精采評論!看今日香港,,明日台灣,垃圾馬英九出賣我們台灣人們,我們不要骯臟的馬英九,這垃圾死在內地最適宜!-*[06/11-2015]Update- By Anonymous Action=更新匿名行動 [ #opchina #ophk ]]- The Anonymous Legion said :"#OpHongKong 7 websites the Chinese government is under the control of Anonymous. You should have expected us. "- "[http://XXXXX.com ]-& By{ news2.mingpao.com }-Well done^^!Melody.Blog Thankgiving for all great" Support Human Right Org."~- [4/11-2015] Update - {1} In November, it is the death of celebrities "accidentally" tear down "the Berlin Wall history hero Schabowski death!" - Reported by the New Tang Dynasty Television - {2} by Anonymous Asia to show the public information - {3} An anonymous knight in the Mainland, he said:"I hate the Communist Party, hate Chinese traditional culture, hate friendships, hate leadership Niubi Hong Hong, hate authoritarianism.Hate Huitie not see posted , hate people do not understand the language of the environment on people who criticize forever hate refuse to listen refused to communicate the " left anger " and " right anger ", hate only ten minutes to observe the life of people on the judgment of others."--- The chivalrous brothers name is" Zola Zhou "also shared some exclusive high IT skills, more a very useful tool to attack the Communist Party of IP delicate, so we can join the fiber off 'Communist' and called "zoonotic" !! - Last by our favorite Hong Kong Apple Daily forum famous critic of " Mr. Li Yi "as the end of this Title article!-*All The World Lauguage*- -[4/11-2015]更新-{1}.在11月日是那位名人的逝世呢?"意外「推倒」柏林牆 歷史功臣沙博夫斯基逝世!"由新唐人電視台報導-{2}.由匿名亞洲給我們的資訊!-{3}.一位在內地的匿名俠客,他説:"我讨厌共产党,讨厌中国传统文化,讨厌称兄道弟,讨厌牛逼哄哄的领导,讨厌威权主义,讨厌回贴不看贴,讨厌不了解别人的语言环境就批判个没完的人,讨厌拒绝倾听拒绝沟通的左愤和右愤,讨厌只用十分钟观察就评判别人一生的人。"---這位俠義哥兒名稱是"Zola Zhou "還分享了一些獨家高技巧資訊,更有一款非常好用的攻擊共產黨IP的精巧工具,使我們也可一起加入纖滅'中共'又名為"畜共"!!-最後,是由我們最喜愛的香港蘋果日報論壇著名評論家李怡先生的文章作為本篇的結尾!-
      *- Update [08/11-2015] - this artificial disaster, we can not let the devil control no wonder the UN Legion, American Legion !?UAV was s...
    • ---update [12 / 09-2015] dynamic DNS update client (DUC) for Windows ,, keep your current IP address and no IP host or domain name you sync with our dynamic update client (DUC).By-http://changyang319.com(TW).&- KPROXY- Free Anonymous Web Proxy -Anonymous Proxy"- & -http://tools.rosinstrument.com/proxy/ ]- ---update[12/09-2015]動態DNS更新客戶端(DUC)的Windows,,保持你當前的IP地址與你無IP主機或域名與我們的動態更新客戶端(DUC)同步。By-http://changyang319.com(TW).-&- KPROXY - Free Anonymous Web Proxy -& - [ http://tools.rosinstrument.com/proxy/ ]- Anonymous Proxy"&-5 Best Free VPNs-**All The World Lauguage**-- Update[11/09-2015] seek knowledge regardless of geographical, see expert analysis (1)."oldest" Koran fragment "- the Russian people to learn,, is in how it forms and tutorials ?(2).Judgments about information security. sage and teacher Yin Fu in [part.1], recorded by his disciple s.- (3).from our chivalrous Anonymous fire@cat's blog, he gives us a software tool, this tool name called "Chinese chopper", which we are curious strange name, so we use our Great God Google search ..freebuf.com ..! -更新[11/09-2015]尋求知識不分地域,看專家分析(1)."最古老的“古蘭經片段"-俄羅斯人們的學習,,是在怎樣的形式和教程的呢?(2).Judgments關於信息安全。至聖先師尹福在【系統Part.1],記錄了他的弟子們..!.-(3).從我們的俠義匿名fire@cat的博客中,他給我們一種軟件工具,這工具的名字稱為"中國菜刀",這陌生的名字我們感到好奇,於是便運用我們的谷歌大神搜索了..freebuf.com..!- - Update [11/09-2015] suchen, Wissen unabhängig von geographischen, siehe Expertenanalyse (1) "älteste" Koran-Fragment. "- Das russische Volk zu lernen, ,, ist, wie es bildet und Tutorials (2)....!- - アップデート[11/09から2015]専門家の分析(1)"最古"コーランフラグメント」を参照してくださいに関係なく、地理の知識を求めて - (2)について.Judgments,,...!-**All The World Lauguage**-- Update [11-09-2015] Our favorite Apple Daily Forum famous writer " Mr. Li Yi ", portrays the voice of Hong Kong's 7 million citizens! -& By the hackread.com/anonymous-ghostsec-attacing-isis/ ]-&- By-p@r@dox17[ ‏ 9月10日]-#TangoDown by p@r@dox17 ..#Palestine_DZ #AnonGhost #OpChina -更新[11-09-2015]我們最喜愛的蘋果日報論壇著名作家李怡先生,描寫出了香港7000000市民的心聲!-與hackread.com/anonymous-ghostsec-attacing-isis/ ]-與由-p@r@dox17[ ‏ 9月10日]-#TangoDown by p@r@dox17 ..#Palestine_DZ #AnonGhost #OpChina ]-**All The World Lauguage**----Update [10/09-2015] from Taiwan Disp Technology -Disp BBS (facebook) Kanban - Author: zxc5867146] - and internet friends Chat online '' kanban '' - [Note: We really very like and enjoyed ^^] - the next is we very favorite that politics, current events in Hong Kong's Apple Daily reported and Appledaily.com.tw Oh! - (# today Hong Kong - tomorrow Taiwan) - #opchina #OPHK #OpISIS #OpRussian #Op_Tibet #optaiwan ))- >> Anonymous is omnipotent << - ---更新[10/09-2015]由台灣Disp Technology -Disp BBS (facebook)看板-作者: zxc5867146]-與網友的Chat ''看板''-[註:我們非常喜歡^^]-接下來便是我們愛看政治,時事新聞的香港 蘋果日報的報導和Appledaily.com.tw喔!-(#今日香港-明日台灣)- #opchina #OPHK #OpISIS #OpRussian #Op_Tibet #optaiwan ))- >>匿名是無所不能<< - ---Update [10 / 09-2015] aus Taiwan Disp Technologie -Disp BBS (facebook) Kanban - Autor: zxc5867146] - und Internet-Freunde Chat online '' Kanban '' - [Anmerkung: Wir sind wirklich sehr ähnlich und haben ^^] - der nächste ist, dass wir sehr beliebt, dass die Politik, aktuelle Ereignisse in Hongkong Apple Daily berichtet, und Appledaily.com.tw Oh! - (# Heute Hong Kong - morgen Taiwan) - #opchina #OPHK #OpISIS #OpRussian #Op_Tibet #optaiwan)) - >> Anonymous ist allmächtig <<- ---台湾DISP技術-Disp BBSから更新[10/09から2015](Facebookの)かんばん - 著者:zxc5867146] - -**All The Wold Country Lauguage**-
      ---update [12 / 09-2015] dynamic DNS update client (DUC) for Windows ,, keep your current IP address and no IP host or domain name you sync ...
    • --Update--Apple Daily on the same day news media union---*candlelight vigil mourning was shot in France with the industry*- -更新--蘋果日報的同日新聞---*傳媒工會燭光集會悼法國被槍殺同業*- -update---*촛불 집회 애도가 업계와 프랑스에서 촬영 한 같은 날 언론 노조에 애플 데일리*- -Mise À jour--Apple Daily sur l'union nouvelles des médias même jour---* veillée aux chandelles deuil a été tourné en France avec l'industrie*- -Update--Apple Daily sur la sama tago amaskomunikiloj unio---*kandellumo Vigil funebro estis pafita en Francio kun la industrio*- **All the World Country Lauguage**--"Today's Apple Daily Forum, author (political commentator,, Pete) Title: [Online Forum] poison bread you eat do not eat? - & - [Political reform consultation] Li Ka-shing: nowhere in Hong Kong are all big losers .- ---"今天的蘋果日報論壇,筆者(政治評論人,, 桑普)標題: 【網上論壇】毒麵包你吃不吃?-&-【政改諮詢】李嘉誠:原地踏步全港都係大輸家.- ---"오늘의 애플 데일리 포럼, 저자 (정치 평론가,, 피트) 제목 : [온라인 포럼] 당신이 먹는 독 빵은 먹지 않아요? - 및 - [정치 개혁 상담] 리자청 :데도 홍콩의 모든 큰 패자는 없습니다 .- ---"Forum Quotidien d'Apple d'aujourd'hui, l'auteur (commentateur politique,, Pete) Titre:[Forum en ligne] poison pain que vous mangez ne pas manger? - & - [Consultation sur la réforme politique] Li Ka-shing: nulle part dans Hong Kong sont tous grands perdants .- ---"La hodiaŭa Apple Daily Forumo, aŭtoro (politika komentisto,, Pete) Titolo: [Enreta Forumo] veneno pano vi manĝas ne manĝas? - & - [Politika reformo konsulto] Li Ka-shing: nenie en Hong Kong estas ĉiuj grandaj perdantoj .- **All the world national city lauguage**-**Ĉiuj mondon naciaj urbo lauguage**
      --Update--Apple Daily on the same day news media union---*candlelight vigil mourning was shot in France with the industry*- -更新--蘋果日報的同日新聞...
    • -Update[16/10-2015]By Our Great Famous Anonymous "Ghost Security Group"show ISIS extremists evil Bitcoin !!-*All The World Country Lauguage*- -更新[16/10-2015]我們偉大的馳名匿名“鬼安全組”展示ISIS極端分子邪惡的比特幣!- And- (#捍衛學術自由 ,,#DefendAcademicFreedom)--Update [15-10-2015]:Hong Kong apple daily forum- Famous Edditor: Mr. Li Yi, is always our most beloved !!On the quality of a man is not judged by the wealth, nor be determined by the class, nor is judged by the realists , but not by the power struggle down the decision!-*All The World City Lauguage*- -更新[15-10-2015]:李怡先生的蘋論總是我們最敬愛的!!一個人的質素並不是由財富來判定的,也不是由階級來判定的,亦不是由現實主義者來判定的,更不是由權力鬥爭下來判定的!-*[14/10-1015]'Seven police charged with intentional wounding disclose the name of the Attorney General Title!'-By-hk.apple.nextmedia.com]-*All The World City Laugugae*- [14/10-1015]"七警"被控有意圖傷人罪!律政司披露姓名職銜 !--By-hk.apple.nextmedia.com]- TO My All Great Friendly Anon and my all readers and friends~*- [13 / 10-2015] Mainland China-pig communist miscellaneous swollen manufactured than the extremists still brutal, it's no personality, willing slaves as big thief !! This beast :thief wolf Mr Leung ! - Look at Hong Kong Apple Daily reported - Forum (1) . "Formed monopoly executive hegemony! nowhere !! public scrutiny (by the 'Democratic Party' 'Legislative Council ,, Miss Huang Biyun). (2). The Council is a political reward club! (by the senior media people ,, . Mr. Wu Zhisen). (3).Title:"boilerplate" by a famous writer ~ written by {Mr. Li Yi }.-From Taiwan Apple Daily (4) US religious freedom report released,, Beijing authorities to suppress criticism of Christianity, Muslims and Falun Gong Activity!"-To our Dear "DigitaShadow"-We urge you to cast big magic.[#OPHKGOV #OP_asiaISIS_LeungCHUNYing #OpDAB ]-*All The World City Lauguage*- -[13/10-2015]大陸支那豬共產雜腫製造了比極端份子還野蠻,更沒人格,甘願作為大賊的奴隸賊狼梁振英這件禽獸!-看香港蘋果日報報導-論壇(1)."建制壟斷行政霸道!公眾監察無門!!(由''民主黨''立法會議員,,黃碧雲女士).(2).校董會是政治酬庸俱樂部!(由資深傳媒人,,吳志森先生) (3). 標題:"樣板"由知名作家(李怡) 先生所編寫的~由台灣蘋果日報報導(4).美公布宗教自由報告,,批評北京當局打壓基督教、穆斯林與法輪功的活動!"-我們親愛的"DigitaShadow"-我們懇請你施展大魔法...[ #OPHKGOV #OP_asiaISIS_LeungCHUNYing #OpDAB ]-
      --Update[16/10-2015]By Our Great Famous Anonymous "Ghost Security Group"show ISIS extremists evil Bitcoin !!-*...
    • *-Update[04/12-2015]- Today Hong Kong's Legislative Council just as like as -...Corrupt regime in Thailand, Hong Kong - Formed faction "DAB" - built the establishment faction is by the dictatorship, authoritarian as like the mainland monster Xi Jinping, the instruction of Chi na slaves beast thief Wolf Leung Chun-ying, corruption and collusion in the darkness of self-interest sub-stealing government! The local Hong Kong residents to pay tax treasury!Mainland China-slaves beast thief Wolf Leung Chun-ying and Formed faction "DAB" arbitrarily take over Hong Kong people tax treasury fund squander on " great ( pay-over )white elephant" projects of garbage Mainland railway , machine, etc..."excess pay" places "wasting building"!-#OpISIS #Opchina #ophongkong #OpThailand #Op_Tibet@TrueTibet ]]---Update[04/12-2015]-今天香港地區的立法會便如-泰國的腐敗政權,香港建制派民.建.聯.便是由獨裁,專制大陸妖怪習近平,指令其奴隸畜牲梁振英,勾結的黑暗私利貪污分賊贓的賊狼政府!把香港本土居民繳納厙税房的積蓄,任意揮霍在"大白象"內地垃圾工程的鐵路,機埸..等等的多餘"虛損建設"上謀奪香港人民的厙税房的積蓄!-#OpISIS #Opchina #ophongkong #OpThailand #Op_Tibet@TrueTibet]]-Update - [02/12-2015] - By sharing the great chivalrous Anonymous "AnonRogue" the most accurate information, all kinds of the (last) analysis, maybe must to loaded more to make the reader to figure out the same by the great chivalrous Anonymous "AnonRogue" as the most accurate information share the main focus! Authoritarian cunning mainland demons Xi Jinping slander of Turkey!- Is you Xi Jinping = this a cunning devil still can face to Putin,Mr.??!-Also Thanksgiving~ -更新-[02/12-2015]-由偉大俠義匿名" AnonRogue "的最準確資訊的分享,上文的各式分析可能還未令讀者弄清楚!加載同樣由偉大俠義匿名" AnonRogue "的最新最準確資訊的分享!土耳其被大陸獨裁狡猾妖魔習近平污蔑了!-虛偽極,,沒有誠信習近平獸,欺騙俄羅斯總統普京先生的謊言??!-Also Thanksgiving~-[01/12-2015]Update- From the great chivalrous Anonymous '' AnonRogue '' tribes - to find the most authentic evidence, citing the {ntdtv.com} detailing News: "Malaysia Airlines MH370 missing alarming news!"- - [01 / 12-2015] Update- De la grande Anonyme chevaleresque '' Les tribus 'AnonRogue' - pour trouver la preuve la plus authentique, citant l'Nouvelles {} ntdtv.com détaillant: "Malaysia Airlines MH370 nouvelles alarmantes manquant!"- - [01 / 12-2015] Update- Dari Anonymous sangat sopan hebat '' puak-puak 'AnonRogue' - untuk mencari bukti yang paling sahih, memetik Berita {ntdtv.com} memperincikan: "Malaysia Airlines MH370 berita membimbangkan hilang" - - [01/12-2015] 從這位偉大俠義匿名''AnonRogue ''的部落-找尋最真實的證據,引用了{ntdtv.com}詳述新聞:"馬航MH370失蹤出現驚人新消息!"- - [01 / 12-2015] Update-С большим рыцарским Anonymous ''- '' AnonRogue племен - найти самые подлинные доказательства, ссылаясь на {} ntdtv.com подробно Новости: "Malaysia Airlines MH370 отсутствует тревожная новость"-
      *-Update[04/12-2015]- Today Hong Kong's Legislative Council just as like as -...Corrupt regime in Thailand, Hong Kong - Formed facti...
    • -Update[23/11-2015]-By Our Huge and Friendly Anonymous" 神Cyber風 "-re- "The Hacker News"-Tittle: "Critical Port Fail #Vulnerability Reveals Real IP Addresses of #VPN Users [ http://thehackernews.com/2015/11/vpn-hacking.html … ]]"- 私たちの巨大なとフレンドリー匿名 "神サイバー風" -by -update [23/11から2015] - 轉推 -「ハッカーニュース」-Tittle: "クリティカルポート失敗#Vulnerabilityは#VPNのユーザーの実際のIPアドレスを明らかに[http://thehackernews.com/2015/11/vpn-hacking.html ...]]" - -Update [23 / 11-2015] - 通過我們的巨大的和友好的無名氏“神數碼風” - 轉推 - “黑客新聞”-Tittle:“關鍵端口故障#Vulnerability揭示#VPN用戶的真實IP地址[http://thehackernews.com/2015/11/vpn-hacking.html ...]]” -
      * -Update[2 3 /11-2015]-By Our Huge and Friendly Anonymous" 神Cyber風 "-轉推- "The Hacker News"-Tittle: "Critical...
    • - Update [11 / 11-2015] information by Anonymous facebook's "Anonymous-Old-School" released of information - a reference to one of them snippets - "The British people, get this into your head before it's too late - look What happened to all the major countries in the West (World)- the United States, Canada, Britain, France, Germany, Turkey, Australia, and more - in every one of the first, ... "! - -更新[11/11-2015]由匿名facebook的"Anonymous-Old-School"發佈的信息-引用其中1小段內容-"英國的人,得到這個到你的頭上之前,為時已晚-看看發生了什麼事在西方各主要國家-美國,加拿大,英國,法國,德國,土耳其,澳大利亞,還有更多-在每一個之一,...!"--Update[2710-2015]For My Dear President Barack Obama" Mr.-Update[2610-2015] Communist China fifty cents slaves liar, The developer how to profit to steal using "Taomike '' mobile applications! - They steal the mainland people use mobile phones all SMS / Privacy Information"!!---Title: "Taomike SDK hijack user All SMS / Privacy Information! "- as they are rogue hackers,, from the mainland white hat (FreeBuf.com) for you expose confidential ! Communism Chi na Fifty Cents is so kind of damage their own countrymen?! Shameful China-pig!! & By "Halifax Nova Scotia Anonymous"-the Anonymous News!-"Brothers, men...thank you Oh!!"- -更新[2610-2015] 謊話連篇的共產支那五毛奴隸-標題:"淘米客SDK会劫持用户的所有短信!"-,由內地白帽子(FreeBuf.com)為你們揭露機密吧!損害對待自已的同胞的!可恥的支那豬!-"哥兒,爺們...謝謝喔!"- Update [12/10-2015]: Can you imagine a USB became a bomb it ?!- -from 'China-pig communist army black devil', 'evil despicable "# PCB manufacturer in China.", 'vulgar despicable 'communist mainland black Army devil '' actually manufactured so notorious bad track of breaking tool ?!!-By Chivalrous Anonymous "Halifax Nova Scotia Anonymous" published information, and then by hackread.com show it on their blog ---Title:* Watch Out - This Killer USB Drive Will Fry Your Laptop !*---evil sin behavior! See chivalrous Anonymous- "Halifax Nova Scotia Anonymous" and hackread.com to unveil 'China-pig communist army black devil's ''conspiracy -! #opchina] -更新[12/10-2015]:"通過俠義匿名"Halifax Nova Scotia Anonymous" 公佈的資訊,再由hackread.com展示了---標題:*Watch Out – This Killer USB Drive Will Fry Your Laptop*---原罪之惡行為!請看俠義匿名"Halifax Nova Scotia Anonymous"和hackread.com為我們揭開''支那共產黑軍魔鬼''的陰謀!-#opchina ]-* Update [12 / 10-2015] "Vintage Computer Fest: Berlin 2015 "{October 9, 2015 year] - by the (hackaday.com) led us to visit we will see different opportunities and German culture in reality -! "In addition to the Berlin machine laissez-faire, it has emerged Vintage Computer Festival 2015 session: Berlin (VCFB). ... "- -*更新[12/10-2015]"復古計算機巨星:柏林2015年"{October 9,2015年]- -Update[10/10-2015] - This Russian Webmaster on the network trumpeted, whether you are a student, working people, people who do not understand computer technology, the elderly, the most popular women in the family to join, its purpose was "to be able to access-( "因特網") " iainternet access provider! They ask the Webmaster How to get the money earned ?...!- For My All Great Anonymous & my readers and friends~Thanks^^-更新[10/10-2015] - 這一俄羅斯的網站管理員在網絡上大肆宣傳,無 論你是學生,工作的人,人誰不明白計算機..其目的是“要能訪問 -(“因特網”)“iainternet接入提供商”!他們發問如何獲得賺來的錢? - [10/10-2015]Mainland China-man , when what a day they does not stealing ??The answer is no ! They put Microsoft's original / creators need to make serious efforts in the world of science and technology studies WH final tool / life electronic equipment / other copyrighted's! The items have been stolen!! Then apply the CCP refuse dictatorship "no credibility" of sinful lying government! - see the thehackernews.com- famous software / tool analyst: 'Mo 希特库马尔 "- written on [18 / 09-2015]" Microsoft has established its own Linux operating system! "- then take a look at the Rubbish China-man is very cunning shameless to theft of Microsoft's copyright !!To: My All Geat Anonymous team and my readers & friends~-*All The World Country Lauguage
      - Update [11 / 11-2015] information by Anonymous facebook's "Anonymous-Old-School" released of information - a ref...

    標籤

    • *Melody.Blog free software sharing space*for all the peoples^^~ (158)
    • Melody.Blog free software sharing space.com (83)

    Our old blog~

    http://melodytoyssexy.blogspot.kr/

    Translate

    關於我自己

    Unknown
    檢視我的完整簡介
    Powered By Blogger

    總網頁瀏覽量

    676,023

    網誌存檔

    • ▼  2015 (121)
      • ►  12/20 - 12/27 (1)
      • ►  11/29 - 12/06 (3)
      • ►  11/22 - 11/29 (1)
      • ►  11/15 - 11/22 (2)
      • ►  11/08 - 11/15 (3)
      • ►  11/01 - 11/08 (1)
      • ►  10/18 - 10/25 (1)
      • ►  10/11 - 10/18 (1)
      • ►  09/27 - 10/04 (2)
      • ►  09/20 - 09/27 (1)
      • ►  09/13 - 09/20 (1)
      • ►  09/06 - 09/13 (2)
      • ►  08/30 - 09/06 (1)
      • ►  08/23 - 08/30 (2)
      • ►  08/16 - 08/23 (3)
      • ►  08/09 - 08/16 (4)
      • ►  08/02 - 08/09 (3)
      • ►  07/26 - 08/02 (2)
      • ►  07/19 - 07/26 (3)
      • ►  07/12 - 07/19 (1)
      • ►  07/05 - 07/12 (2)
      • ►  06/28 - 07/05 (4)
      • ►  06/21 - 06/28 (1)
      • ►  06/14 - 06/21 (1)
      • ►  05/31 - 06/07 (2)
      • ►  05/24 - 05/31 (3)
      • ►  05/17 - 05/24 (2)
      • ►  05/10 - 05/17 (2)
      • ►  05/03 - 05/10 (1)
      • ►  04/26 - 05/03 (2)
      • ►  04/19 - 04/26 (1)
      • ►  04/12 - 04/19 (2)
      • ►  04/05 - 04/12 (3)
      • ►  03/29 - 04/05 (4)
      • ►  03/22 - 03/29 (3)
      • ►  03/15 - 03/22 (5)
      • ►  03/08 - 03/15 (4)
      • ▼  03/01 - 03/08 (2)
        • ---By the Liberty Times reported (1) Iraq offensiv...
        • ---Accumulated in our favorite page news by the Li...
      • ►  02/22 - 03/01 (6)
      • ►  02/15 - 02/22 (4)
      • ►  02/08 - 02/15 (4)
      • ►  02/01 - 02/08 (5)
      • ►  01/25 - 02/01 (5)
      • ►  01/18 - 01/25 (6)
      • ►  01/11 - 01/18 (3)
      • ►  01/04 - 01/11 (6)
    • ►  2014 (119)
      • ►  12/28 - 01/04 (4)
      • ►  12/21 - 12/28 (4)
      • ►  12/14 - 12/21 (4)
      • ►  12/07 - 12/14 (11)
      • ►  11/30 - 12/07 (4)
      • ►  11/23 - 11/30 (12)
      • ►  11/16 - 11/23 (13)
      • ►  11/09 - 11/16 (9)
      • ►  11/02 - 11/09 (15)
      • ►  10/26 - 11/02 (12)
      • ►  10/19 - 10/26 (5)
      • ►  10/12 - 10/19 (2)
      • ►  10/05 - 10/12 (7)
      • ►  09/28 - 10/05 (10)
      • ►  09/21 - 09/28 (7)

    網上觸1^^

    • 網上觸1^^
    Powered By Blogger
    頂尖企業主題. 主題圖片來源:enot-poloskun. 技術提供:Blogger.