Thứ Năm, 4 tháng 5, 2017

Waching daily May 4 2017

These new items are essential things to make new suits,I won't introduce them very detailed in this part

But be aware if you are going to play this mod, please prepare NEI or JEI or something like this, otherwise you will

Add gems for equipments

The large version of workbench, from 3*3 to 5*5

In this mod, add the gem system.

Players can put your equipments into modification table to enhance the basic attributes of the characters

Every armour at least has 2 slots, every weapon has 4 slots. And I will list all new gems below this part

But boss, I can't find these gems in survival! How to get these things?

After enter the game, new UI will let you shocked.

Health, hunger, physic resist and magic resist all in left-top corner

I think magic resist is added in this mod

Mod also change the information about mobs, now you can see mobs' attack when you aim at him

So above I mentioned the UI change of character and mobs

Now I will introduce them in detail what's the meaning of these members

First one, mod add level for mobs. The far place you explore, the stronger mobs you will meet.

High level mob gains more health, more attack

(That's the reason I was killed by skeleton)

Because this reason, developer also give players some ways to improve themselves

developer also give players some ways to improve themselves

One is use XP to enhance the character's attributes. Default keyboard is I

Open it you can see a bunch of things to upgrade, just use your XP to gain it!!!

That's a good way to increase mod's playability, hey skeleton, I'm back!

This is not the only thing benefit the player

All your equipments have its own level. Higher level means more endurable. If you keep using it to improve its level.

Nice, I won't worry about the durability anymore!)

If you want to find some shortcuts, just use level up table

It can help you. So in this mod, XP is a really expensive thing

For more infomation >> [Minecraft] 我的模組EP68 - Learn to play RPG in Minecraft World丨Danger RPG - Duration: 6:50.

-------------------------------------------

How To Text Her (With Deadly ♠ MIND CONTROL ♠ Lines) - Duration: 5:17.

Warning.

If the topic of psychological manipulation and emotional enslavement of women offends

you, I want you to stop watching this video.

And if you want to continue, you must agree never to use this knowledge to hurt women.

Deal?

Great.

Let's start!

So, you have the phone number of a girl you'd like to attract.

You went to a tonne of effort to get her to exchange numbers with you.

What should you do next then?

You might be staring at an empty text screen, not having any idea what to say to her.

You might be worried you're going to undo your hard work, or that she'll tell you she's

not interested.

These are both completely normal fears, and ones I've experienced many times.

However, what if I told you there's a Mind Control technique which will make her fall

head over heels for you?

With just a few simple lines, you can get her to the point that she'l become emotionally

addicted to you?

And the good news?

Yes, it works via text message too.

Before I share with you how to use Mind Control over text, do me a favour.

Click on the LIKE button below because, well, you're liking what you see so far, and you'd

like to see more of these videos in the future.

Go do that.

I can wait!

Alright, let me first tell you a story.

My life totally changed a few years ago when I discovered a book entitled the Shogun Method

written by a man named Derek Rake.

In the Shogun Method, I learned of a little trick which has sky-rocketed my success rate

with women to incredible levels.

What we're going to do is use a technique I learnt in the Shogun Method which allows

us access to a woman's subconscious.

First, let me tell you about a certain vulnerability inside a woman's mind.

You see, a woman may or may not believe what you say to her.

However, she will never, ever doubt the conclusions that she arrives to on her own.

This means that if we can bypass a woman's rational thought-process and appeal directly

to her subconscious, she will believe the information we're feeding her to be her own

thoughts.

Therefore, to seduce a woman, you'll need to "guide" her to come to the conclusions

that benefit you.

To do this, you'll use a Mind Control technique called Implanted Commands.

So what's an Implanted Command then?

Very simply, an Implanted Command is a phrase which forms the part of a sentence, which,

if spoken on its own, would be a direct command.

For example, try sending her this text:

"Sure, I can tell you that that by replying to this text and agreeing to meet me for dinner

will change your life for the better, but I' rather you experience it for yourself."

Or:

"You'll never know if by simply replying to this text, you'll be telling your grandkids

about our first date one day."

The phrases which surround the Implanted Command in each sentence will hide the command so

that it goes undetected by her conscious mind.

So, in the examples above, the subconscious messages are "agree to meet me for dinner"

and "telling your grandkids about our first date."

These messages are accepted by her mind without questioning because as Derek Rake says: "what

a woman can't detect, she can't resist".

See why these works like gangbusters?

Excellent!

Implanted Commands are ideal for texting to women because the manipulator doesn't need

to worry about delivery or body language.

They can simply be delivered word for word!

And guess what, these are only 2 of the 44 Implanted Commands found inside the Shogun

Method.

These can be copied directly or adapted to whatever your needs might be.

What works even better is a combination of another Mind Control technique called Fractionation

with Implanted Commands which will pretty much guarantee that she will fall in love

with you in a snap.

If you're familiar with Fractionation, you should already know how powerful it is on

its own.

When used correctly, Fractionation can get a woman under your control, enslave her and

make her fall in love with you far quicker than the usual "Pickup Artist" tricks.

I have to warn you though that it is not possible to "undo" the effects of Fractionation.

Once you have enslaved a woman using this technique, dumping her will cause irreparable

damage to her psychology.

Therefore, please use this technique responsibly and ethically.

To learn how you can use Shogun Method and Fractionation to manipulate a woman's mind

and enslave her to you emotionally, go to FractionationHypnosis.com or click on this

link right now.

For more infomation >> How To Text Her (With Deadly ♠ MIND CONTROL ♠ Lines) - Duration: 5:17.

-------------------------------------------

How To 🌟 Dominate 🌟 A Woman (By Messing With Her Mind) - Duration: 5:26.

Warning.

If the topic of psychological manipulation and emotional enslavement of women offends

you, I want you to stop watching this video.

And if you want to continue, you must agree never to use this knowledge to hurt women.

Deal?

Great.

Let's start!

You've probably heard people say that it's the guy's job to chase a woman, and it's

her job to just sit back and enjoy the perks of being chased, and to decide to accept the

guy or not.

We see this situation all the time in movies, TV and even in "Pickup Artist" advice

books.

Well, I've got this to say: fuck that shit.

I've had incredible success with a technique which not only disproves this point entirely,

but forces a woman's mind into such a state that she can't help but become addicted

to you.. so that she chases you instead!

Before I tell you how I came to discover this awesome technique, please click LIKE because

it will encourage me to create more of these free videos for you.

Do it because you're a cool dude.

Alright?

Done clicking LIKE?

Great!

Here we go!

Even though I devoured all of the trashy "Pickup Artist" literature I could find, I noticed

my success rate with women had gone from moderately good to complete shit.

I realised that none of the advice handed to me was backed by any kind of authority.

That was when I discovered a mysterious manuscript entitled the Shogun Method by a man named

Derek Rake.

The Shogun Method basically implored me to do the opposite of what I had been doing for

so long.

I decided to give it a try.

The results changed my life forever.

Seriously, I'm not exaggerating.

They changed the way I acted around women, the way I talked to them, and my success rate

sky-rocketed!

What's the secret?

I used a little-known technique known as ENTICE / REPEL.

Think about this; don't we all crave exactly what we can't have?

It's the "forbidden fruit" phenomena.

When we're told that we can't have something, it makes us want it even more.

So why wouldn't this be true in the dating world?

After thinking about it, I realised how obvious it was, and not only is it obvious, but it's

also a principle of dark psychology which Derek Rake has adapted into a seduction technique.

It exploits a flaw in the female psyche which states that women have a natural tendency

to chase whatever is running away from them.

After creating enough attraction with a woman, you simply need to REPEL her in order to create

"space" for her to chase you.

This will deepen her attraction to you, intensifying her emotional connection to you.

Derek Rake explains the multiple ways to ENTICE and REPEL in detail inside Module 7 of the

Shogun Method, but I will share one REPEL strategy here:

To repel a woman, you must use DEVALIDATION.

For example, this is a Mixed Signal DEVALIDATION verbal script:

"Wow, I'm impressed.

So far, I mean.

In the next five minutes you may say something silly and completely ruin it."

The negative part of the sentence will act as a comforting technique as she believes

that you have stopped trying to get her into bed.

She will consciously shut down her defence mechanisms, allowing you to take advantage

of her vulnerable emotional state.

As you've seen, this technique works like gangbusters because it's based on hardcore

female psychology and Mind Control, and not some lightweight "Pickup Artist" mumbo

jumbo.

Now once you've spiked a woman's attraction to you using the Devalidation technique, then

it's time to seal the deal and make her your emotional slave forever.

You can do this with a fairly advanced Mind Control technique called Fractionation.

Known as the grand-daddy of all Mind Control seduction techniques, Fractionation can be

used to transform a woman who is attracted to you into someone who is as subservient

to you as a slave.

It exploits a particular vulnerability in a woman's mind to "brute-force" her

to surrender to your dominance for as long as you want.

Pretty powerful stuff!

When used correctly, Fractionation can get a woman under your control, enslave her and

make her fall in love with you far quicker than the usual "Pickup Artist" tricks.

I have to warn you though that it is not possible to "undo" the effects of Fractionation.

Once you have enslaved a woman using this technique, dumping her will cause irreparable

damage to her psychology.

Therefore, please use this technique responsibly and ethically.

To learn how you can use Shogun Method and Fractionation to manipulate a woman's mind

and enslave her to you emotionally, go to FractionationHypnosis.com or click on this

link right now.

For more infomation >> How To 🌟 Dominate 🌟 A Woman (By Messing With Her Mind) - Duration: 5:26.

-------------------------------------------

What Else Is on Steve Bannon's Whiteboard? - Duration: 3:39.

FIRST UP LET'S TALK ABOUT THE NEWS.

FBI DIRECTOR JAMES COMEY TESTIFIED IN FRONT OF CONGRESS

TODAY.

AND WHEN ASKED IF HE THOUGHT HIS INTERFERENCE SWAYED THE

PRESIDENTIAL ELECTION, COMEY SAID THE IDEA MAKES HIS MILDLY

GNAW SHUS.

(LAUGHTER) -- -- MILDLY NAU SEAU S?

MILDLY GNAW SHUS IS-- HOW YOU FEAL TWO HOURS AFTER EATING ROOM

TEMPERATURE FISH.

THAT'S NOW HOW YOU FEEL WHEN YOU HELP DRIVE THE COUNTRY OVER A

CLIFF.

OHK AND BY THE WAY, JUST SO YOU KNOW, MILD NAUSEA IS NOT COVERED

BY TRUMP'S NEW HEALTH PLAN.

IN OTHER NEWS, THE WHITE HOUSE PRESS CORPS WAS PRETTY

DISAPPOINTED WHEN SEAN SPICER ABRUPTLY-- ABRUPTLY ENDED A

PRETION KORCHES YESTERDAY WITHOUT EVEN ANSWERING ONE

QUESTION, HOW DISAPPOINTED WERE THEY, TAKE A LOOK, THIS WAS

REAL.

>> WOULD YOU E PAIL WHERE THAT IS FROM SO WE CAN IDENTIFY

LOCATIONS.

>> APPRECIATE IT.

SEAN, SEAN, HEY SEAN.

>> SEAN!

SEAN!

>> James: SEAN!

SEAN!

, SEAN!

OH, SEAN, COME ON!

COME ON!

ARE THOSE REPORTERS REALLY THAT DISAPPOINTED THAT SEAN SPICER

WOULDN'T ANSWER QUESTIONS? THIS IS SEAN SPICER WE'RE TALKING

ABOUT.

IT IS NOT LIKE HE WOULD HAVE GIVEN THE CORRECT ANSWERS.

I MEAN I GUESS SPICER IS ACTING PRETTY CHILDISH HERE.

HE IS LIKE A KID ON THE PLAYGROUND.

HE'S LIKE I'M GOING TO TAKE MY WALL AND GO HOME.

IN OTHER TRUMP ADMINISTRATION NEWS, I DON'T HE KNOW IF YOU SAW

THIS, IVANKA TRUMP'S NEW BOOK TITLED WOMEN WHO WORK WAS JUST

RELEASED YESTERDAY.

AND IT'S ALREADY RECEIVING A SLEW OF BAD HE REVIEWS, BEING

CRITICIZED AS A VAPID COLLECTION OF INSPIRATIONAL QUOTES BUT

IVANKA SAID SHE WON'T LET IT AFFECT HER, SHE WILL SING LINE

NOBODY'S LISTENING, DANCE LIKE NOBODY'S WATCHING AN LOVE LIKE

SHE'S NEVER BEEN HURT.

(APPLAUSE) I VARCHGA-- I DRK IS TITLED

WOMEN WHO WORK AND HER BROTHER'S BOOK IS YOU WILL CAD MEN WHAT

SIT ON STUMPS.

AND THIS IS INTERESTING.

A PHOTO TAKEN AT THE WHITE HOUSE YESTERDAY REVEALED TWO

STRATEGIST CHIEF STRATEGIST STEVE BANNON HAS A WHITE BOARD

IN HIS OFFICE WHICH INCLUDES BULLET POINTS LIKE BUILD THE

BORDER WALL AND EVENTUALLY MAKE MEXICO PAY FOR IT.

LACK AT THAT, IT LOOKS LIKE WHAT THEY FIND IN THE APARTMENT OF A

SERIAL KILLER ON LAW & ORDER.

HE IS ACTUALLY WRITTEN, BUILD THE BORDER WALL AND EVENTUALLY

MAKE MEXICO PAY FOR IT ON HIS WHITE BOARD.

ALTHOUGH I GUESS IT'S MORE OF A WHITE POWER BOARD.

THE BORDER WALL WASN'T THE ONLY ITEM ON STEVE BANNON'S AGENDA.

WE CAN TAKE A CLOSER LOOK.

HERE IS ONE, IT SAYS SEND EDIBLE ARRANGEMENT TO PUTIN.

TAKE WALK IN PARK.

SECRETLY FLIP OFF BABIES.

HOLD THE PRESIDENT DURING HIS DAILY CRY.

BECOME A BOW TIE GUY AND FINALLY, FIND CURE FOR WHATEVER

IS HAPPENING TO MY FACE.

For more infomation >> What Else Is on Steve Bannon's Whiteboard? - Duration: 3:39.

-------------------------------------------

One Thing: Dennis DeSantis – Humanizing clips - Duration: 1:14.

Hi, I'm Dennis, and this is one thing I do to put a little life or humanness

back into strictly quantized clips.

So I have a pattern here that's snapped directly to the grid.

If I want to create a little bit of smear between the notes and these chords,

I drag in a groove file. It doesn't matter which one because I'm not using the timing off-set at all.

I apply it to the clip, and then I turn up the randomization amount.

So if I turn it up to 100

it kinda falls apart, sounds like I programmed this drunk.

But I find that if I use about 10%, I get a nice off-set between the notes and the chords.

Often what I'll do is duplicate the track then

and take the groove off the 2nd version.

And then pan them a little bit.

So then I get this off-set between where they are in the stereo field

and also between the strictly quantized and the randomized version.

And this is a nice way to get a little life back into these patterns

without having to do a lot of work.

For more infomation >> One Thing: Dennis DeSantis – Humanizing clips - Duration: 1:14.

-------------------------------------------

10 WORST MAN-MADE Disasters Recorded In History - Duration: 15:17.

Many people believe that failure is inevitable.

Mankind failure has frequently created catastrophes that devastate the environment and taken away

many lives.

The following 10 worst man-made disasters of all time are difficult to determine with

so many blunders made by human.

However, excluding the loss of life resulting from war, terrorism or transportation disaster,

this list includes the incidents that have had the most affected on people and the environment.

Here's the complete ten worst man-made disasters recorded in history.

DISASTER #1.

THE DEEPWATER HORIZON OIL SPILL.

On 20 April 2010, while drilling at the Macondo Prospect, an uncontrollable blowout caused

an explosion on the rig that killed 11 crewmen and ignited a fireball visible from 40 miles

away.

The fire was inextinguishable and two days later, on 22 April, the Horizon sank, leaving

the well gushing at the seabed and causing the largest oil spill in U.S. waters.

At the time of the explosion, there were 126 crew on board; seven were employees of British

Petroleum, 79 of Transocean, there were also employees of various other companies involved

in the operation of the rig, including Anadarko, Halliburton and M-I SWACO.

Eleven workers were presumed killed in the initial explosion.

The rig was evacuated, with injured workers airlifted to medical facilities.

After approximately 36 hours, Deepwater Horizon sank on 22 April 2010.

The remains of the rig were located resting on the seafloor approximately 5,000 ft (1,500

m) deep at that location, and about 1,300 ft (400 m) (quarter of a mile) northwest of

the well.

The resultant oil spill continued until 15 July when it was closed by a cap.

Relief wells were used to permanently seal the well, which was declared "effectively

dead" on 19 September 2010.

DISASTER #2.

CASTLE BRAVO.

Castle Bravo was the first in a series of high-yield thermonuclear weapon design tests

conducted by the United States at Bikini Atoll of Marshall Islands, as part of Operation

Castle.

Detonated on 1 March 1954, the device was the most powerful nuclear device detonated

by the United States, and its first lithium-deuteride-fueled thermonuclear weapon.

Castle Bravo's yield was 15 megatons of TNT, two and a half times more than predicted,

which led to the unexpected radioactive contamination of areas to the east of Bikini Atoll.

Fallout from the detonation fell on residents of Rongelap and Utirik atolls and spread around

the world.

The islanders were not evacuated until three days later and suffered radiation sickness.

Twenty-three crewmembers of the Japanese fishing vessel Daigo Fukuryū Maru were also contaminated

by fallout, experiencing acute radiation syndrome.

The blast incited international reaction over atmospheric thermonuclear testing.

DISASTER #3.

THE DOOR TO HELL.

The Darvaza gas crater, known locally as the Door to Hell, or Gates of Hell, is a natural

gas field in Derweze of Turkmenistan that collapsed into an underground cavern, becoming

a natural gas crater.

According to Turkmen geologist Anatoly Bushmakin, the site was identified by Soviet engineers

in 1971.

It was originally thought to be a substantial oil field site.

The engineers set up a drilling rig and operations to assess the quantity of oil available at

the site.

Soon after the preliminary survey found a natural gas pocket, the ground beneath the

drilling rig and camp collapsed into a wide crater and was buried.

Geologists set it on fire to prevent the spread of methane gas, and it has been burning continuously

since then.

The diameter of the crater is 69 metres, and its depth is 30 metres.

Expecting dangerous releases of poisonous gases from the cavern into nearby towns, the

engineers thought it best to burn the gas off.

It was estimated that the gas would burn out within a few weeks, but it has instead continued

to burn for more than four decades.

The years of the crater's history are uncertain.

Local geologists say the collapse into a crater happened in the 1960s, and the gases weren't

set on fire until the 1980s.

There are however no records available for any version of the events.

DISASTER #4.

THE SIDOARJO MUD VOLCANO.

The Sidoarjo mud flow or Lapindo mud is the result of an erupting mud volcano in the Sidoarjo

of Indonesia that has been in eruption since May 2006.

It is the biggest mud volcano in the world; responsibility for it was credited to the

blowout of a natural gas well drilled by a company called Lapindo Brantas, although some

scientists and company officials contend it was caused by a distant earthquake.

There was controversy as to what triggered the eruption and whether the event was a natural

disaster or not.

According to Lapindo Brantas it was the 2006 Yogyakarta earthquake that triggered the mud

flow eruption, and not their drilling activities.

Two days before the mud eruption, an earthquake of moment magnitude 6.3 hit the south coast

of Central Java and Yogyakarta provinces killing 6,234 people and leaving 1.5 million homeless.

At a hearing before the parliamentary members, senior executives of Lapindo Brantas argued

that the earthquake was so powerful that it had reactivated previously inactive faults

and also creating deep underground fractures, allowing the mud to breach the surface, and

that their company presence was coincidental, which should exempt them from paying compensation

damage to the victims.

If the cause of the incident is determined to be natural, then the government of Indonesia

has the responsibility to cover the damage instead.

This argument was also recurrently echoed by Aburizal Bakrie, the Indonesian Minister

of Welfare at that time, whose family firm controls the operator company Lapindo Brantas.

DISASTER #5.

THE MINAMATA DISEASE.

Minamata disease is a neurological syndrome caused by severe mercury poisoning.

Symptoms include ataxia, numbness in the hands and feet, general muscle weakness, loss of

peripheral vision, and damage to hearing and speech.

In extreme cases, insanity, paralysis, coma, and death follow within weeks of the onset

of symptoms.

A congenital form of the disease can also affect fetuses in the womb.

Minamata disease was first discovered in Minamata city in Kumamoto prefecture of Japan in 1956.

It was caused by the release of methylmercury in the industrial wastewater from the Chisso

Corporation's chemical factory, which continued from 1932 to 1968.

This highly toxic chemical bioaccumulated in shellfish and fish in Minamata Bay and

the sea of Shiranui, which when eaten by the local populace, resulted in mercury poisoning.

While cat, dog, pig, and human deaths continued for 36 years, the government and company did

little to prevent the pollution.

The animal effects were severe enough in cats that they came to be named as having "dancing

cat fever".

As of March 2001, 2,265 victims had been officially recognised as having Minamata disease which

1,784 of whom had died and over 10,000 had received financial compensation from Chisso.

By 2004, Chisso Corporation had paid $86 million in compensation, and in the same year was

ordered to clean up its contamination.

On March 29, 2010, a settlement was reached to compensate as-yet uncertified victims.

Before we continue to the next disaster, please take time to hit the like and subscribe button

below to help us grow.

One click from you means a lot to us.

DISASTER #6.

THE EXXON VALDEZ OIL SPILL.

The Exxon Valdez oil spill occurred in Prince William Sound of Alaska in 24 March 1989.

An oil tanker called Exxon Valdez owned by Exxon Shipping Company, bound for Long Beach

California, struck Prince William Sound's Bligh Reef and spilled 10.8 million US gallons

of crude oil over the next few days.

It is considered to be one of the most devastating human-caused environmental disasters.

The Valdez spill is the second largest in US waters, after the 2010 Deepwater Horizon

oil spill in terms of volume released.

Prince William Sound's remote location that was accessible only by helicopter, plane,

or boat, made government and industry response efforts difficult and severely taxed existing

plans for response.

The region is a habitat for salmon, sea otters, seals and seabirds.

The oil originally extracted at the Prudhoe Bay oil field, eventually covered 1,300 miles

of coastline, and 11,000 square miles of ocean.

According to official reports, the ship was carrying approximately 54 million US gallons

of oil, of which about 10.8 million US gallons were spilled into the Prince William Sound.

A figure of 11 million US gallons was a commonly accepted estimate of the spill's volume and

has been used by the State of Alaska's Exxon Valdez Oil Spill Trustee Council, the National

Oceanic and Atmospheric Administration and environmental groups such as Greenpeace and

the Sierra Club.

DISASTER #7.

THE NORTH PACIFIC GARBAGE PATCH.

The Great Pacific garbage patch is a gyre of marine debris particles in the central

North Pacific Ocean discovered between 1985 and 1988.

The patch extends over an indeterminate area of widely varying range depending on the degree

of plastic concentration used to define the affected area.

The patch is characterized by exceptionally high relative concentrations of pelagic plastics,

chemical sludge and other debris that have been trapped by the currents of the North

Pacific Gyre.

Its low density prevents detection by satellite photography, or even by casual boaters or

divers in the area.

It consists primarily of a small increase in microscopic particles in the upper water

column.

The great Pacific garbage patch was described in a 1988 paper published by the National

Oceanic and Atmospheric Administration of the United States.

The description was based on results obtained by several Alaska based researchers between

1985 and 1988 that measured neustonic plastic in the North Pacific Ocean.

Researchers found high concentrations of marine debris accumulating in regions governed by

ocean currents.

Extrapolating from findings in the Sea of Japan, the researchers hypothesized that similar

conditions would occur in other parts of the Pacific where prevailing currents were favorable

to the creation of relatively stable waters.

They specifically indicated the North Pacific Gyre.

DISASTER #8.

THE JILIN CHEMICAL EXPLOSION.

The Jilin chemical plant explosions were a series of explosions which occurred on 13

November 2005 in the Number 101 Petrochemical Plant in Jilin City of China over the period

of an hour.

The explosions killed six, injured dozens, and caused the evacuation of tens of thousands

of residents.

The blast created an 80 km long toxic slick in the Songhua River, a tributary of the Amur.

The slick predominantly made up of benzene and nitrobenzene passed through the Amur River

over subsequent weeks.

The cause of the blast was initially determined two days after the blast: the accident site

is a nitration unit for aniline equipment.

T-102 tower jammed up and was not handled properly, hence the blast.

The blast were so powerful that they shattered windows at least 100 to 200 meters away; at

least 70 people were injured and six were killed.

The fires were finally put out early in the morning of November 14.

Over 10,000 people were evacuated from the area, including local residents and students

at the north campus of Beihua University and Jilin Institute of Chemical Technology, for

fear of further explosions and contamination with harmful chemicals.

The CNPC which owns the company in charge of the factory Jilin Petrochemical Corporation,

has asked senior officials to investigate the cause of the incidents.

The explosions are not thought to be related to terrorism, and the company told a press

conference that they had occurred as a result of a chemical blockage that had gone unfixed.

Disaster #9.

THE BAIA MARE WATER CYANIDE CONTAMINATION.

On the night of 30 January 2000, a dam holding contaminated waters burst and 100,000 cubic

metres of cyanide contaminated water, containing an estimated 100 tonnes of cyanide spilled

over some farmland and then into the Someș river.

After the spill, the Someș had cyanide concentrations of over 700 times the permitted levels.

The Someș flows into the Tisza, Hungary's second largest river which then flows into

the Danube.

The spill contaminated the drinking supplies of over 2.5 million Hungarians.

In addition to cyanide, heavy metals were also washed into the river and had a long

lasting negative impact on the environment.

Wildlife was particularly affected on the Tisza.

On a stretch, virtually all living things were killed and further south in the Serbian

section, 80% of the aquatic life was killed.

200 tons of it was the fish in these rivers.

Large quantities of fish died due to the toxicity of cyanide in the waters of the rivers, affecting

62 species of fish, which 20 of them are protected species.

The Romanian government claimed that the fish had died of cold, and they were not at fault.

In Hungary, volunteers participated in removing the dead fish to prevent the disaster from

spreading across the food chain, as other animals such as foxes, otters, and ospreys

have died after eating the contaminated fish.

DISASTER #10.

THE CHERNOBYL DISASTER.

Chernobyl is a city in the restricted Chernobyl Exclusion Zone situated in Ivankiv Raion of

northern Kieev Oblast of Ukraine, near the border with Belarus.

The city was the administrative center of Chernobyl Raion from 1923 until it was disestablished

in 1988 after the catastrophic nuclear accident occured on 26 April 1986.

The city currently has 704 inhabitants.

During a late night safety test which simulated power failure and in which safety systems

were deliberately turned off, a combination of inherent reactor design flaws.

Together with the reactor operators arranging the core in a manner contrary to the checklist

for the test eventually resulted in uncontrolled reaction conditions that flashed water into

steam generating a destructive steam explosion and a subsequent open air graphite of fire.

This fire produced considerable updrafts for about 9 days, that lofted plumes of fission

products into the atmosphere with the estimated radioactive inventory that was released during

this very hot fire phase, approximately equal in magnitude to the airborne fission products

released in the initial destructive explosion.

Practically all of this radioactive material would then go on to fall out precipitate onto

much of the surface of the western USSR and Europe.

Four hundred times more radioactive material was released from The Chernobyl than by the

atomic bombing of Hiroshima.

The disaster released 1/100 to 1/1000 of the total amount of radioactivity released by

nuclear weapons testing during the 1950s and 1960s.

Approximately 100,000 km of land was significantly contaminated with the fallout, with the worst

hit regions being in Belarus Ukraine and Russia.

Slighter levels of contamination were detected over all of Europe except for the Iberian

Peninsula.

If you think this video is valuable and want to watch our other videos, don't forget

to click that subscribe button because we have a lot of informative videos for you in

the future.

Thank you for tuning in, we hope you enjoyed it.

For more infomation >> 10 WORST MAN-MADE Disasters Recorded In History - Duration: 15:17.

-------------------------------------------

How to Identify the Fake Rice || Do This Simple Rice Test! - Duration: 1:47.

For more infomation >> How to Identify the Fake Rice || Do This Simple Rice Test! - Duration: 1:47.

-------------------------------------------

Wunderbrow Eyebrow Gel 2pack with 1Yr Allure Magazine - Duration: 4:37.

For more infomation >> Wunderbrow Eyebrow Gel 2pack with 1Yr Allure Magazine - Duration: 4:37.

-------------------------------------------

Driving The 750-HP Callaway Corvette Aerowagon Is A Near Death Experience - Duration: 1:08.

Driving The 750-HP Callaway Corvette Aerowagon Is A Near Death Experience

"Don't buy this car because it will kill you."

outlandish looks. Lucky Farah gets the opportunity to drive the only example of the car in existence on one of his favorite mountain roads where he relays information about the car as he goes.

It only takes a single flyby of this oddly shaped 'Vette to realize just how special it is. Much like the Z06, it does try to kill you.

For more infomation >> Driving The 750-HP Callaway Corvette Aerowagon Is A Near Death Experience - Duration: 1:08.

-------------------------------------------

Positivity Challenge - What's the good side of dealing with mental illnesses? - Duration: 4:58.

Hi!

so we are in the positivity challenge week

during this week I will be answering

every day one of your questions

that will try to challenge me

with finding the good sides

of very difficult and hard situations in life

I'd like to make clear

I do NOT underestimate the huge difficulty

of thess hard situations in life

these situations are definitely

NOT situations to wish for

what I am saying

that even in these difficult situations

you can choose not to concentrate

on the pain and the difficulty

but to try to distract yourself from these

by finding some good sides

and by trying

to make the best out of it

so the question for today

comes from

and again I'm sorry if I say it wrong

Sjarlie Wulp

that asks me what's the good side

of dealing with mental illness

such as depression or OCD

Thank You Sjarlie!

fooooooh...

this was actually the hardest question I got

especially when I was thinking about depression

I just didn't manage to think of good sides

of depression by myself

So I turned to the internet

and very quickly actually

I found few articles

that shade some light on the bright side

of being in depression

I put links to the two of them

in the description of my video below

these are the two articles I liked the most

and i just want to show you briefly

what they say

so the first article is

how depression makes you stronger

and it says:

Keedwell says there is good evidence

from long-term studies

to show that after their depression

many patients seem to be able to cope better

with challenges

for most, their vitality,

their social interaction

and their general health

actually improved on recovery

and so did their work performance

I know from patients

that it can also make you more realistic

in your outlook

you develop more empathy

to those around you

Keedwell suffered a bad spell of depression

in his thirties

it went on for months

but I did come out of it

and I think I was a better doctor

as a result

I certainly had more empathy

with my patients

It also made me put my problems

into perspective

and I probably had a little more humility

so this was a one article

and the other one is

can depression make us better people

and here it says

Tom Wootton takes the idea

further than anyone else

with his belief that

depression can be a beautiful part of your life

so then they just list a few benefits

of being in depression

one of them is creative thinking

in the way of being more artistic

here someone says

the slowing down enforced by the illness

helped sharpen her work

depressive bouts feed her art

great leaders who lived with depression

showed their most creative thinking

and leadership at times of crisis

they could face painful disaster

with the sense of possibility

that less emotionally tested leaders

failed to grasp

so here there are apparently some bright sides

to depression too

I know you asked about

mental illness in general

and not only about depression

but I guess each illness is different

and has its own points of light

but probably the common

between them all

is that you get a different perspective about life

perspective that regular people

without this illness don't get

and I guess this is also something valueble

however

I wish you and everyone

good mental and physical health

and I hope you liked my answer

to this question

if so, please hit the thumbs up

and you are welcome to follow me

by subscribing to my channel

and I hope I will see you in my next videos

answering more challenging questions

bye-bye

For more infomation >> Positivity Challenge - What's the good side of dealing with mental illnesses? - Duration: 4:58.

-------------------------------------------

Ed Sheeran "Perfect" (karaoke+chords) - Duration: 4:35.

For more infomation >> Ed Sheeran "Perfect" (karaoke+chords) - Duration: 4:35.

-------------------------------------------

DEF CON 24 - Kai Zhong - 411: A framework for managing security alerts - Duration: 41:24.

>>Ah so today we're here to talk about 411 a framework for managing security alerts ah

which we will be open sourcing after Defcon [cheering] so before we get started let's do

introductions. My name is Kai, oh Kai Zhong and I am a product security engineer at Etsy so I'm

responsible for um helping developers with running secure code and maintaining some of the

um internal applications that we use on the security team like 411 and on occasion I've been

known to wear many hats like you see in that photo and uh after this presentation um I'll be

tweeting out links to the slides on my twitter so follow me please gotta get those followers

alright oh heh sorry I'm supposed to make a really really bad pun here um hopefully you

won't find our presentation to be unbearable yes you groaned >>Thanks Kai my name's Ken Lee

I'm a senior product security engineer at Etsy I'm glad to be back at Defcon I was here three

years ago for a presentation on content security policy and two important facts about me, one my

twitter handle is KennySan and two I really love funny cat gifs so I've managed to sneak one

into the slide deck >>Nice! >>For those that don't know this adorable cat is Maru so let me

go and start by explaining what Etsy is, Etsy is a marketplace for handmade and vintage goods

the security team at Etsy is responsible for keeping private member's personal information

such as credit card details, their addresses, etcetera oh in addition the Etsy security team

has been successfully running our own bug bounty program for the past four years as well

[applause] I'm going to go into some more detail about what we're covering in today's

presentation. First we're going to start by talking a little bit about the history of our

transition to using ELK we're going to go delve into some of the problems that we encountered

during this transition process and we're going to talk more about our solution which we call

411 then we're going to dive into a how we at Etsy do alert management using 411 we're going

to show you some additional more involved examples and we're going to finish things off with

a non live demo I know I really wanted the live demo but I I never trust the demo gods to get

it right um first we're going to go over some terminology for some of you this must be old

news but we're going to try to get over this as quickly as possible. So for those that

don't know this is a log file logs are typically interesting messages generated by web server

that's stored in a log file this is the ELK stack the ELK stack is consisting of three different

technologies, Elasticsearch, Logstash, and Kibana and I'm going to quickly go over what

each of these different applications do. The first as represented by our friendly

mustachioed log over here is called Logstash. Logstash is our data processor and log shipper

tool, we primarily use it as a way to identify interesting fields that we would want to

perform searches on in the future. In addition we also use Logstash to ship logs into

Elasticsearch proper, what is Elastic Search? Great question me! Elasticsearch is the

distributed real time search engine created by Elastic dot CO. It allows for storing

complex nested documents but in this case we primarily use Elasticsearch for storing log

files parsed by Logstash in addition Elasticsearch allows the generation of statistics of

your data so you can run interesting aggregations over the information that you have

stored in Elasticsearch which lends itself very well to analysis of the data that you

have. Finally the la- the K in ELK stands for Kibana and that's the data visualization web

application front end for Elasticsearch. Kibana allows for log discover and more

importantly debugging of problems in your application and in addition Kibana provides for

some interesting visualization options. Unfortunately this was the best stock image that I

could find of Kibana to show you what it does um you can do interesting pie charts, graphs,

eccetera, using Kibana as a front end. So now let's talk a little bit more about the

history of how we transitioned into using ELK so Etsy switched to using the ELK stack back in

mid 2014 from Splunk and the work took about a year and throughout this process we both

learned a lot of good lessons from the migration process and we got a bunch of great tools

out of it including 411 but it wasn't a super easy rode to go down we were aware of the fact

that we were going to run into issues when we started to transition to using ELK and we

had to deal with our fair share of really annoying performance impacting bugs with our ELK

cluster. In addition the security team was concerned about the usability of the ELK

as a solution for being able to do some of our alerting and monitoring. So to give an

example of one of these bugs here we have two Anitech articles, ones from September of

2014 and the other from April of 2015 that's a span of about six or so months basically this

article illustrates the discovery of uh a bug with Samsung's line of solid state

hard drives and the fix acknowledge is coming out about six months plus later so

unfortunately for us our ELK our ELK cluster used these SSDs to power the um ELK cluster and so

we were affected by this reperformance bug for more than six months in addition this is

just a small snippet from an email we had a small issue with a kernel level bug affecting how

it was handling NSF mounds this caused a lot of instability with our ELK cluster and

unfortunately some additional outage uh downtime as well. So to say the least you know these

are just two example bugs that we had to encounter at times it felt like we were riding the

struggle bus with regards to all of the bugs and issues that we had to deal with with regards to

ELK but that aside, Kai is now going to talk to you about um some of the actual problems, not

just bugs that we encountered, when migrating to Elk >>Thank you Ken, so um like most

security organizations alerting is a major part of how the security team at Etsy knows what

is going on on the site um and some mechanisms that we use for alerting are um Splunk, or used

to use our Splunk, StatsD and Graphite and unfortunately um when we first started this

migration um there we were making use of Splunk safe searches to automatically

schedule queries on some sort of periodic interval and Elasticsearch didn't offer like

equivalent functionality at that time and additionally, Elasticsearch also didn't offer

some sort of web UI for managing those um queries that we were writing which is pretty useful

when say it's like the middle of the weekend and you're getting spammed with alerts and you need

to make a change to one of the queries but doing so would require a could push and you

don't want to like break something with some sort of web UI where everything is handled

for you you could just go in there, change the query and then update it and you're good to go.

Now the second problem was that um we were just not familiar with the new query language that

we were um faced with um our old queries were built using SPL which is the language that

Splunk uses and um so the some of the functionality that we needed in order to write our

queries simply wasn't available um in Elasticsearch's Lucene shorthand. Additionally there

were some things that weren't obvious coming from um Splunk like especially with how

Elasticsearch indexes documents um it has an affect on like whether or not and how you can

query um the actual fields that you are searching on. So this came as a surprise to us at

certain points and because of these issues the road to ELK integration was a long one in

order to successfully um complete the migration we essentially needed three things,

firstly we needed a query language that would allow us to build complex queries preferably

without having to write any code, uh we also needed a mechanism to actually run these

queries and like email us with those results and finally we would like to have all of this

ready before we turned off Splunk because then we're then dark otherwise and that would be

really bad. Alright so as it turns out the first half of the solution was provided to us by

um the data engineering team at Etsy and that solution is called ESQuery and what it is is it's a

superset of the standard Lucene shorthand and um it's intactictly pretty similar to

SPL so it's got like a bunch of pipelines everywhere that you can then like take data from the

first one and transfer it to the second one. I'll provide an example in in a bit but more

importantly it supports all of the functionality that we need. So here's a quick summary of all

of the syntax um when you define a um Elasticsearch query you do it via this large json DSL and

we provided the ability to like in line all of these directly into the query so you can see it

over here you can specify say like size or how you're sorting the results that come back or

just what fields are coming back. Additionally you can do an emulated join so you can results

from one query and then like insert them into a subsequent query and all the irrigation

functionality that is available in Elasticsearch is also available in ESQuery but in

line. And finally you can also um define variables within ESQuery um and you configure

them in 411 and then have those queries get substituted into uh sorry those variables get

substituted into your queries at one time so like you can have a list of values that you can

update independently of these queries so here's an example SPL query. Um what this is doing is

it's finding all um failed login attempts and then giving you the top ten IP addresses that made

attempts this is the same query but um when using uh Lost Searches um DSL and finally this

is the same query but when using ESQuery so you can see it's pretty similar to how you would

write it using SPL and way shorter as well and the two are actually similar enough that um

someone at Etsy was able to write a simple query translator which we made use of during our

migration so what we did was we would just plug it in, um test it out, and make changes if

necessary and then stick them into 411. Speaking of which next up let's talk about what 411 is

so 411 is an alert management interface or application and what it does is it allows you to

write queries that get automatically executed on some sort of schedule then you can

configure it to email you with like email you alerts whenever those data sources that you're

querying return any results and additionally you can manage the alerts that our generated

through the web interface. Before we dive into 411 let's um talk briefly about how

scheduling works within um the system. So whenever a search job is run it executes um a query

against a data source and then generates a a an alert for every single result that comes back

you can then configure a series of filters on those alerts to re- like reduce or modify the

stream somehow and then finally um specify a list of targets that you can send uh the

remaining alerts to. So an example of one target that is pretty neat is the Jira target

which allows you to like generate a a ticket for every single alert that goes through

the pipeline. Alright wait oh sorry additionally if we um take a step back what happens is

there's a scheduler that runs periodically and generates those search jobs which then get fed

off to a bunch of workers that actually execute them. And now we're ready to get into 411. So

the first thing you'll see when you log on is the dashboard which is this thing over here

it's pretty simple but you see there's some um userful information about the current

status of 411 there's a breakdown of alerts that are currently active as well as a

histogram of just like alerts that have come in over the last few days. Alright moving on um

one of the most important things you'll want to do in 411 is manage the queries that you are

like schedule to execute and you do that via the search management page which you can

see here the center you've got all the searches listed out with like some categorization

information and on the right you'll you can see the health of that particular search, whether

or not it's been running correctly, and whether or not it's been able to execute. Now

if you want to modify an individual search you'll get taken to this page over here

which has a whole like slew of options that you can configure um there's a title which is not

too exciting but more importantly there are all of these fields so let's go through

all of these briefly. At the top here is the query which is quite simply the query that you're

sending off to whatever data source in this case this is a Logstash source so we're sending

this to an ElasticSearch cluster with a Logstash index um you can also configure we can also

configure a results type so whether or not you want the actual contents of the log

inside um match the query or whether you just want like a simple count or even an

indication that there's like no results and finally you can filter you can apply thresholds

on like how many results that you want to get back next up you can you can also provide a

description that um gets included whenever an alert gets sent to you so you should

preferably put some information that allows you allows whoevers um assigned to the alert to

resolve it and there are a few categorization options at the bottom as well for the alerts

that are generated much better alright next up is the frequency which is how often you want to

run this search and the time range which is how how far back of a like time window you want

to search most of the time you're gonna want both of these to be the same value but if you

want say like better granularity you might want to specify a frequency of one minute and a

time range of ten minutes and finally we've got the status bun which lets you toggle this

search. Cool that's all for the basic tab next up let's talk about uh notifications. So in

411 you can configure uh you can configure email notifications whenever um it generates any

alerts and those notifications can be sent out as soon as the alerts are generated or included

in a hourly or daily roll out. You can also assign you also have to assign um these alerts

to an assignee which is the person or the group of people that are responsible for

actually resolving and taking a look at those alerts and finally the owner field is just um for

bookkeeping so you can keep track of who is responsible for maintaining that particular

search. And here's the AppSec group that we're currently using here you see it's got a list of

all the users that are currently on the security AppSec team and uh whenever 411 generates an

alert for this particular um search they'll email all of these people. Alright moving on

to the final tab the here we've got some more advanced functionality that's less

commonly used like auto close which allows you to automatically close alerts that

haven't seen any activity after a while so they're probably stale and we've also got um the

actual configuration for filters and targets here as well so again recall that filters

allowed you to reduce the list of alerts that get passed through um 411 and eventually

get generated and here is a list of filter that are currently available so I'll just highlight

a few of them. Dedupe allows you to just like dedupe alerts that are the same and you can

throttle um the alerts that are generated to like some threshold for the purposes of this

presentation let's talk about the regular expression one because that's relatively

complicated uh you can configure this particular filter to um have some sort of key like what

keys you want to match on within the alert as well as a regular expression to match on and then

you can specify whether or not you want matching alerts to be included or excluded from the

like final list of alerts. Similarly on the other side we've got the list of targets

that you can configure and we're going to cover the Jira target which allows you to specify a

Jira instance and a a project a type and a and a assignee and then any alerts that make it to

this target get turned into Jira tickets so that's useful if you want to use Jira as your alert

management workflow cool so that's about it as far as managing searches go next up

we're going to get into actually managing the alerts that are generated by 411. So here it is

the main alert management interface you'll notice at the top there's a search bar for

filtering the list of alerts that are visible and this 411 actually indexes all of its

alerts into Elasticsearch so all of your standard like Lucene or hand queries are valid here um

in the center you'll see all of the actual alerts that matched the current filter and you can

select um individual alerts and apply actions to them using the search um action bar at the

bottom. Now if you want to drill down into a individual alert you can so this is the view for

viewing just like a single alert and you can see at the center there's all of the information

that was available before but also a change log for viewing all actions that have been taken

on this one's alert. Additionally you'll see there is the same action bar that's

available at the bottom and let's say thank you let's say we were to investigate investigate

this alert like we took a look at IP address and then we've determined that it's just a

scanner so nothing to worry about we can then hit resolve on that action bar which will pop

up this little dialog where we can select a resolution status in this case not an issue and a

description of exactly what actions we took to resolve this alert and then once you hit

resolve there you'll see the change log has been updated with this um additional action. 411

also offers a um alert feed so what you can do is just keep this open and whatever new

alerts come in um it'll just hop up on this list and you can also leave it running in the

background because it's got desktop notifications so you'll see that nice little chrome pop

up uh whenever there are new alerts cool alright next up >>Thanks Kai I'm gonna talk to

us talk to you more about how we do alert management at Etsy using 411. So here we have a

sample email generated by 411 I'm going to go into some more depth and explain to you what's

going on so the subject line of this email says login service five hundreds ah the description

says login five hundreds investigate for people that aren't very familiar with it log

in is just basically a process to essentially log you into a website, five hundreds is

basically a a message that says oh something bad is happening and usually this is pretty bad

to the extent where you would want to create an alert for it and be notified about it and we

can see from the time range that this alert is taken place over the past five minutes and we

have buttons on the bottom to both view the alert in 411 as well as to be able to view this

link in Kibana as well we also get a short snippet including the PHP error that was thrown

and as you can see from this sort of short email snippet people are sort of taking action

based on this alert. But let's take a step back a little bit and think more about what we do

to actually crea- create high quality alerts and at Etsy the secret is we create alerts that

have a high degree of sensitivity. What do I mean when I say high sensitivity well

let's say that we have an alert that fires one hundred times over the course of a day and out

of those hundred times that alert correctly predicts an event actually happening ninety

times so what that means is out of a hundred times that alert only improperly fires ten times

so there's a one in ten chance that that alert is misfiring so ninety percent of the time that

alert is responding correctly to an event so we say that that that particular has a

sensitivity of ninety percent that's a pretty high sensitivity that we would you know find to

be useful for alerts that aren't as important we still create them as searches and alerts in

411 but what we do is we end up not generating email notifications out of them and

I'll go into more detail as to why in just a moment for more important alerts we still

generate alerts off of them but what we do is we set them up as um rollups so every hour or

every day we have this alert go off and it'll email us the results and one reason why we

really like doing this is because it gives us the option of being able to monitor a

particular search over a period of time for anomalies. So one of the reasons why we take this

sort of tiered approach to alerting is because attackers hitting your website will often

generate a lot of noise and in the process of doing so they'll set off a bunch of different

alerts that you have set up. So one thing that we often have to answer when we see an alert on

our phone at three in the morning is is this something that I really need to respond to

at three in the morning? Do I Can I Can I just continue sleeping? Do I have to you know

can I just answer this tomorrow or even after the weekend? Well one way in which we make that

determination is by seeing and looking at the other alerts that have gone off in the same period

of time so we look at the high alerts the low alerts the medium alerts that have gone off over

this period of time an example uh a good example of this would be let's say there is a very

high number of failed login attempts that an alert a high alert that has gone off recently

well maybe if we also have a lower alert that indicates that we have a low quality uh series

of bots trying to scan us at the same time maybe that's indicative that actually this

isn't like a really concentrated attack that we need to worry about so we can go back to

sleep. So in addition to creating alerts one thing that we also have to be vigilant

about is maintaining our alerts sometimes we create alerts that overfit on a particular attacker

and as a result of that the alerts become less useful over time one way in which this

happens is the alert simply generates too much noise we've sometimes we've created this

search and it turns out we're the IP address for example might be shared by some legitimate

users as well um and that can create a bunch of false positives so in those cases we

sometimes have to finetune our alerts and one way in which we do that is we look at other

fields so another example is sometimes say an attacker might accidentally be using a static

but very easily identifiable user agent when attacking our website one way in which so we

can create a search off of that to easily identify that attacker but perhaps they become a little

savvier and realize that they're making this terrible mistake in the first place and they make an

att- they make an effort to randomize the user agent and by doing this what they essentially

do is they're forcing us to have to use other fields to identify the attacker may be looking at

what data center it's coming from or IP or other IP addresses that they're coming from for

example so let's take a step back we've sort of sold 411 as a tool for security teams but it's

also a very useful team um a very useful tool for the average developer as well and one way in

which 411 can be useful for a developer is creating alerts based off of potential error

conditions in your code so a good example of this would be when you want to know potential

exception conditions say for example code wrapped in a tri catch statement for example you

generally don't want your application to be running into too many exceptions so generally

by entering in a log line and creating an alert based off that log line you'll get a

notification when something bad happens in your application. Another condition under which

you'd want to create an alert is when you're getting a large amount of unwanted traffic to an

endpoint that you uh consider sensitive. A good example of this would be uh an attack for

example trying to hit a gift card redemption endpoint or a credit card number re- uh

entering endpoint you know those endpoints are probably already rate limited in the first place

so it's only natural to add basically an additional alert on top of that just so you know

that someone's trying to intentionally brute force this particular endpoint and finally

the last instance under which you might want to consider creating an alert is when you're

deprecating old code. So at Etsy we have what's called a feature flag system that allows us to

very easily flag on and off particular bits of code but sometimes we need to evaluate

how often a particular code branch is being exercised before we can move it entirely from the

code base one way in which we do that is we sometimes just like to add a log line and create an

alert just to I with a rollup to see how many times this particular code branch has been

exercised throughout the course of a day or even a week and by doing that once we have

confidence in knowing yes this code is not really being used that often we can go ahead and

actually remove the code in question. So at Etsy we actually have a couple different

instances of 411 set up and I'll explain what they are. Our main instance that the application

security and risk engineering teams used is called Sec411 in this instance it's primarily

used for monitoring issues that happened on Etsy dot com itself. The network security team has

it's own instance of 411 called appropriately netsec411 and this instance is set up primarily to

aid in monitoring laptops and our servers and finally for those compliance loving folks we

have an instance of 411 setup called Sox411 which is primarily uh used for sox related

compliance issues. Now I'm going to go into some more examples of uh some functionality that we

have present in 411 that we're going to be making available to you when we open source the tool

a lot of this additional functionality was made av- was made at the request of

developers at Etsy and we found it useful enough to include in the open source version of 411

as well. So Kai mentioned earlier that 411 has the ability to incorporate lists into

queries here we have a search functionality that looks for suspicious duo activity coming

from known TOR exit nodes so this query looks fairly straightforward but let's take a

look let's take a deeper look so we're looking at logs of the type duo login and we're looking

for the IP address that matches this TOR exits variable well if we take a look at what the list

functionality is we can see that TOR exits is defined as a URL that just enumerates a list of

IP addresses so what 411 is actually doing behind the scenes is it's taking this TOR exits

node variable and expanding the query out to include all of those IP addresses in that TOR

exits node list so essentially when you get when you get any hit in a log line that contains

a TOR exit node IP address it matches with the search and generates an alert. Now I'm

gonna talk more about some of the additional functionality that we offer beyond just the

ELK stack with 411. We offer a searcher for graphite which is basically a way of storing and

viewing time series data this is what graphites front end interface looks like as you can

it's a very nice way of easily generating graphs, this particular graph shows an

overlay of potential cross site scripting over potential scanners um it's just a really

nice way of being able to determine when you are when there are anomalies happening

and so the graphite searcher gives you a really easy way to do simple threshold style

alerting uh and because the graphite searcher basically directly sends the query to

Graphite itself all of graphite's data transform functions are available for you

to be able to use for the searcher so as an example of some of the things you can do

you can essentially write a query to say please fire off an alert when you see a high rate

of change for failed logins. Now I'm gonna talk a little bit about the HTTPS searcher that

we're also making available. This is a fairly straightforward searcher what it does is you

provide an HTTP endpoint and if you receive an unexpected response code it creates an

alert based off of that. It's very useful for web services when you want to know if a

particular service is for example down or even up and for those in the devops community

this is very similar in functionality to the tool called NAGIOS. Now I'm gonna go to the

non live demo portion let's hope this works [laughter] okay I'll be narrating this so for this

demo we set up a very simple wordpress blog instance called Demo All The Things and we have

a we have a plugin installed called WP Audit Log which logs everything that happens in this

wordpress instance. In addition we are forwarding the logs to our own ELK stack so that we can

index the log files um here I'm just showing off this one nice blog post that we have uh red is

apparently the best color. Now we're going into Kibana proper to actually look at some of the

log files from this wordpress instance and we can see here there's an interesting log line

user deactivated a wordpress plugin okay that's kind of interesting maybe we can make an

alert off of that particular phrase that we can use for the future. So what we're going to

go and do now is we're going to go into 411 proper we're going to go into the searches tab

we're going to go and hit the create button and create a new searcher of the Logstash type

and we're basically just going to create a new search to look for this particular message

we're going to call this search disabled wordpress plugin and the query is going to look for

anything in the message field that contains the phrase user deactivated a wordpress plugin

and we're going to provide a little description in the search to let others that use 411 know

what this search is about in case they have to deal with an alert generated by it in the

future. We're going to look back in the past fifteen minutes and we're gonna test this alert and

we can see here that 411 has successfully grabbed data from um from logstash so we're going

to go ahead and create the search and to actually generate a real alert we're going to go

ahead and hit the execute button which will cre- which will not just test the alert it will

actually create a real alert for us in the alert page we can see here we get the same results

back that we just got from hitting the test button so now we're going to go into alerts

we're going to click on view to take a look at our particular the alert that was just

generated and we can see here that in the in the plugin file information we can see that the

duo wordpress plugin was disabled well that's not good so now that we've gotten the

relevant information from this particular plugin we're going to go ahead and remediate this

issue we're gonna go into the wordpress back end we're going to go into the plugins page oh

and what do you know? Duo two factor off plugin the plugin is disabled so we're gonna go ahead

and re enable it and now that we've taken care of that issue we're gonna go ahead and hit

resolve and we're gonna just say that we've taken action to re enable this plugin and we've

taken care of the alert by doing that. That concludes the live demo, not live demo [applause].

>>Cool and that also happens to conclude the presentation as well um once again 411s gonna be

open sourced after uh Defcon and we will take questions now um there's a mic over there and

over there so if you've got a question please line up [movement in the room] >>if

you're leaving you have to leave out these doors in the back >>when deciding to move away

from Splunk um how did you guys scale ELK versus going with Splunk like so ELK has a problem

when it gets really big it gets really expensive so was it a cost decision moving from

Splunk? >>ah the the question was why did we switch from Splunk um it was basically a

decision made by our operations team >>Okay, one last question, what are you guys using as your

send mail function? Are you guys using like mail chimp? Um we've just got everything setup

correctly already so it's whatever um you provide to PHP >>The question was what do we

use to send mail in 411? >>So um yeah I have a question so you're open sourcing 411 after this

talk or that's the first part and the second part is do you have an a is this built on a AWS

architecture such as using a simple email service is it using elasticsearch what is it using

as far as your infrastructure that you can talk about? >>Um we're going to be open sourcing

this after Defcon and as far as Gmail um sorry what was the second question, email right?

>>No is it AWS architecture, so do you have an AWS architecture to go with it? >>Uh no it's just

um whatever email like >>No no no I meant in general the entire because like elasticsearch are

you using like lando functions or is it all pretty much like uh uh internal to itself instances

as far as >>Everything's inside like our data centers >>Okay got it thanks >>questions? >>Hey um

I have a question about the configuration you showed us, the beautiful UOI but how is the

configuration actually stored and uh yes there is a change log on individual pages but would it

be easy to version control the configuration somehow? >>so the question was about change log

and version controlling of alerts uh >>There is no version controlling of alerts but there

is a change log of all of the things that have been taken on the alert so could you also

speak louder because I think the mic isn't that great. >>oh okay So the initial question was how

is the configuration stored? Is it like is it stored in some text format that you can review

is it xml is it, can we version control it? >>All of it's stored in MySql so we're using MySql as

a database. >>Hello Hello Hey uh so at this point you guys are probably definitely aware of

Watcher Allasa Searches own alerting service um what's the motivation between using their

own uh plugin built in straight to the you know cluster? >>So uh at the time when we started um

working on this I don't think Watcher existed yet >>Yeah it's super new >>So that's' why we

ended up writing this >>Right um so is there any point to using it now as opposed to just

running the plugin? I don't want to be like that guy I'm just >>Um I don't know you're kind of

putting me on the spot uh there's also so it's not just elasticsearch like you can also

plug in other data searches into 411 for like querying those data sources >>Okay, thank you. >>Hi

um my questi- I have like two questions one of them is what was your motivation to move away

from Splunk and build your own your motivation to move away from Splunk and build your own

uh >>So that was a decision made by our Sys Ops team. >>Okay >>So I didn't really have any like

much input on that >>Uh but any security concerns they had or? Was it I mean did they have any

security concerns at all or yeah >>I don't think so I think there at one point like uh the

scripting functionality in ELK was enabled by default and there were some like serious security

issues with that so that's as far as I can remember >>Okay and um just one last question um

does ELK also help like you know doing log analysis across multiple servers and senses?

>>Uh >>Or is it like dedicated to just like one group of >>Yeah you can setup multiple instances

and have them like connect to the same database and that would just work >>Oh okay thanks

>>Okay >>Uh are ya'll open sourcing that ESQuery as well? Because Query DSL sucks >>Uh

yeah it's built in >>Oh it's already up >>Huh? >>Oh it's already up? Oh it's built in?

Okay >>MMhmm >>My questions on uh Jira integration in your demo you showed that you resolved uh

the issue with the user turning off the the feature in wordpress does that end up um closing a

jira ticket? >>Um no it doesn't so uh the Jira like target is pretty much separate you just

send that data off to Jira and then like 411 forgets about it >>Okay thank you >>Mmhmm >>K so

my question is a little bit two fold >>Okay >>Uh we saw a lot of web UI about this but uh there

wasn't any real uh uh focus on any API around it so uh like consider the use case where

there might be something where uh the same type of alert happens frequently but self

resolves uh would it have the possibility to either escalate the same type of alert due to

it's frequency or in contrast if it somehow self resolves all of the history of those alerts get

resolved as well? >>Um that's not currently built in but that's because like it hasn't

been asked for yet so um like once this is open sourced you could create an issue and then

we could consider it >>Okay thank you >>Cool, guess that's it [applause]

For more infomation >> DEF CON 24 - Kai Zhong - 411: A framework for managing security alerts - Duration: 41:24.

-------------------------------------------

Boku no Hero Academia (My Hero Academia) - The Day (Opening) Guitar Tutorial | Guitar Lesson + TABS - Duration: 4:18.

Thank you for watching my Boku no Hero Academia (My Hero Academia) - The Day Opening Guitar Tutorial.

You can download Boku no Hero Academia (My Hero Academia) Tabs from my site, link in the description

If you want to see more Boku no Hero Academia (My Hero Academia) Guitar Lessons and other Anime Guitar Lessons, feel free to subscribe!

I hope you like my Boku no Hero Academia (My Hero Academia) - The Day Opening Tabs.

Any way I could improve this Boku no Hero Academia (My Hero Academia) - The Day Opening Guitar Lesson? Let me know in the comments.

Remember to ask the tab author for permission first before making an Boku no Hero Academia (My Hero Academia) Guitar Cover

For more infomation >> Boku no Hero Academia (My Hero Academia) - The Day (Opening) Guitar Tutorial | Guitar Lesson + TABS - Duration: 4:18.

-------------------------------------------

Zika Prevention Kit - Duration: 0:47.

zika prevention kit

how to prevent zika

hi it's alaskagranny there is no vaccine

or medicine for the Zika virus prevention is what

we need to do what can you do to prevent the Zika virus

avoid mosquito bites wear long sleeves

and long pants use a mosquito repellent

containing deet sleep under a mosquito

net stop the spread of Zika by

avoiding mosquito bites Zika can be

passed through sexual activity condoms

maybe part of your Zika prevention plan Zika prevention kit

how to prevent Zika

learn more at alaskagranny.com please subscribe to the AlaskaGranny channel

For more infomation >> Zika Prevention Kit - Duration: 0:47.

-------------------------------------------

How Much Will It Cost to Charge My Tesla? - Duration: 8:57.

For more infomation >> How Much Will It Cost to Charge My Tesla? - Duration: 8:57.

-------------------------------------------

Star Wars - Main Title - Rebel Blockade Runner (Piano) - Duration: 2:54.

Hey audience!

Hope you enjoyed the Star Wars theme.

You can check out a piano tutorial for this over on Sheet Music Boss which is my new project

with Sam where we release a new piano tutorial every single day of the year so go and check

it out!

If you want to support me, head on over to my Patreon and get some sheet music and mp3s

and cool stuff!

So be sure to SUBSCRIBE and I'll see you in the next one.

See ya!

For more infomation >> Star Wars - Main Title - Rebel Blockade Runner (Piano) - Duration: 2:54.

-------------------------------------------

DEF CON 24 - JusticeBeaver - Discovering and Triangulating Rogue Cell Towers - Duration: 32:07.

[applause] >> Alright, ooo wow, you guys can hear me really well, can't you? Alright, my

name is, uh, Eric Escobar, I'm a Security Engineer for Barracuda Networks. Uh and today I'm going

to be talking to you guys about Discovering and Triangulating Rogue Cell Towers. Uh, so a bit

about me, oh that's loud. Uh, I started out as a civil engineer and when I say started out, I

went through, got my Bachelors, my Masters and now I have a PE, I'm a licensed Civil Engineer.

Um, my parents love that, but I told them I was going to go into computers, so that that didn't

go over so well. Um, I've always loved computers, uh, I've always nerded out on all things

wireless, even before that I was a licensed hand radio operator. Um and I also love to automate

things. So my chicken coop is automated, opens, closes, feeds them, does the whole thing. Uh

and my sprinklers are run by a cron Job, so that's the level of nerd that we're talking.

[applause] Uh and so three years ago is when I started working at barracuda Networks. Um, I was

previously about exactly three years ago pumping water in the middle of a field, um as a civil

engineer doing some well maintenance and then I got a lucky break from my great boss

and he said, hey, you know what, I think you have a good mind for this, uh, if you want to try

this security space, then, um, you know, we'd love to have you and so I took them up on it and

then we headed over to DefCon and since then I've been in in all things wireless. Um, so the

first year somebody asked me, are you the Fox? And I said, uh, no, no I'm not the Fox, what are

you talking about? And they said, hey, I'm doing the wireless CTF. And I said

wireless CTF, I could totally get involved with that. The next year, we came back thinking,

we're just going to go look for the Fox and we ended up winning the wireless CTF. Um, so that

was really great. And so this year, hopefully, uh, when I'm done with this talk, we will

have won second year in a row. So that will be pretty awesome too. Um, let's see. Alright, so

a bit about what I do at barracuda Networks. I'm a security engineer like I said,

so I do incident response with my team, uh, pen testing, we do red team Fridays where we bring

in pizza and red team our network, which is pretty awesome. Uh, I've even been

lucky enough to do some social engineering campaigns, phishing campaigns, uh and if any of you

are bug crowd researchers when it was just barracuda doing it, you probably talked to me at

some point in time. Um, I also do infrastructure scanning and I've done a little bit of IPAM

work and multi-factor authentication for barracuda. Alright, so today what we're

going to cover is uh what is a rogue cell tower, why you should care about rogue cell towers,

how to detect rogue cell tower, how to find one after you've detected it and how you can

build a detector at home. And then once you've detected one, what the heck do you do with it.

Alright, so first up, what is a rogue cell tower? Well, it's something that's purchased by

companies, governments or other hackers and it has the ability to trick your phone into

thinking that it's a real cell phone tower. So it's kind of like an evil twin attack if

you're familiar with wireless at all. Uh, these are known as IMSI Captures, Interceptors, cell

site simulators, sting rays and there's probably a few other things, but really, they're

pretty much called cell site simulators or IMSI catchers, cause sting rays, they're

popular known by is a corporate term or it's, uh, the name of the actual company that makes

them. Uh and rogue cell towers have the ability to collect information about you.

Indirectly, just through metadata and metadata can tell you a lot of things about you.

Uh, call length, numbers that you've dialed, uh and those kinds of things. In some

conditions, they can even downgrade, uh, your connection, um, and so they can listen to

your messages, your calls and they can even get some data. Alright, so how are they used

today? I'm not going to go over this a whole lot. But pretty much, the ACLU has identified 66

agencies and 24 states that own stingrays. Um, these have been used to monitor demonstration in

the United States. Such as in, uh, Chicago and the political protests. Last year there was,

uh, Freddy Martinez, he talked at the Crypto Village and he did a great talk on Freedom of

Information Act Requests and dealing with IMSI Catchers and how to prove that they're

actually being used. And then and it's also possible to make IMSI Catcher at home. Um, Chris

back in DefCon 18, uh, he made an actual IMSI Catcher and showed it off and that was way

more technical than I probably ever hope to do in any time soon, but it's a really cool

trick--or not trick--it's a really cool hack and, uh, from there basically we're going to

see if we can detect what he did. So if you want to know more about cell site simulator of if

this is the first time that you've heard that, uh go check EFF and the ACLU, they have

these two, um, great links and they're awesome for just getting a lot more information and it

goes far more in depth than I could do in even a full presentation about that. Um and

so abroad they're also used, there's not a whole lot of great data on this, but we know that

there have been, you know, sightings of these in Ireland, the UK, China, Germany, Norway,

South Africa. Um, Chinese spammers are also also caught using this to send spam phishing

messages. And they're used by governments and corporations alike. And I think corporate

espionage is also where they're used. In terms of, there's a lot of other data that they probably

want from their competitors and if somebody doesn't have a way to detect cell site simulator,

you'd be giving up corporate secrets without even knowing it. So let's talk about what the

IMSI in IMSI Catcher. So IMSI stands for International Mobile Subscriber Identity. Uh, it uses

a means of identifying a device on the cell network. It's typically 15 digits long, um and

it contains information about your device. So there's the MTC, which is the Mobile Country

Code, the MNC which is the Network Code and there's the Mobile Subscription Identity

Identification Number or MSIN. Um, so all of the country codes, the MCC, are available on

Wikipedia, so if you want to look one up, maybe you make one of the devices, you know and

say, he, that doesn't look like the United States country code, and if you're in the United

States, you know, what should mine be? Um, and you see something come up, you can take

a look at these, they're all on Wikipedia. Same thing with MNC. All of these are available,

there's a bit list of them. So if you're ever curious, you can just head over there and check

it out. Uh, so basically to summarize all that, an IMSI is a unique identifier to your

device. So that's you, that's like your MAC address of your laptop, that that's what can

identify your device. And so if you swap you know your SIM card into different phones, then

that's something that can still identify that SIM card itself. And so here's what a sample IMSI

would look like. So you can see it has the MCUU, which is 310 for the USA, has MNC for AT&T

and that's 026 and then the unique identifier, which isSO your MSIN. So why should you

care about this? Well, if somebody were to drive up, uh and have an IMSI catcher, you

know maybe you're sitting there and you're having coffee at a coffee shop. Um, you're one big

fish in that or you're one fish in that big net. So what could happen is if they're driving up

and say their say somebody's looking for someone in the area and they think that they're

there. They grab all of the information, because your phone, it just goes for the strongest

signal strength and so if they, if it happens to be that IMSI Catcher, then that's you and it

doesn't matter if it's the government , it doesn't matter if it's a hacker, these things

are easy to build for less than you know a couple grand. Um and to get all that personal

information, it could be well worth it. And also there was a talk of LTE downgrade to GSN

this year and so that's another thing that you, uh, cell tower, um, controls when you know some

of the options that are sent to the mobile device and so if they want to downgrade you. You can

totally do that. I saw a couple of times, when I was upstairs in the wireless village, that, uh,

what had happened is it downgraded from LTE to 2G and you knew something bad was going

on. Um. Uh, so that that's just one way is you're just a small fish in a big net and they catch

anybody that's around you. Alright, so why should you care about this. Well, I think if you

don't know by now, there's a couple reasons why you should. Um, your phone will connect

automatically to cell site simulators. It doesn't matter, you know, it's not like

connecting to an access point with your cell phone. What will happen is, uh, your phone will

just pick the thing that has the strongest signal, doesn't ask you, doesn't say, hey, this one

looks kind of fishy. It just says, this one gives me the best signal, let's go from there. Um

and these conceal your personal information. Hackers can track where you go, who you're talking

to and they can grab all sorts of data about you. Uh, your digital life can be sniffed out

of the air by anyone. And I mean, it's real, the hardware is always coming down in cost. Um

and your company could be leaking trade secrets. I mean, just think about two-factor

authentication. If it's sent over SMS and they can intercept that. Um, ya know, then they can

have that second factor if they've already got your password. Uh, not to mention, a

lot of people think that text messages are um you know, they're, they're extremely

private and if you don't believe so, just ask somebody, hey, can I flip through your text

messages real quick? They won't let you. Alright, so why build a detector, so there's some

Android phones that have apps that you know that you can do this, but I've found that you

need to have a specific model and you need to have it root to work. Um and I wanted something

cheaper, I didn't want to have a phone dedicated only to just watching, uh, cell towers. Um

and I also wanted a device that was really cheap. I mean, I just want something that's somewhere

around 50 dollars so that it's easy to make and it's not like, oh, well you can totally detect

them for a couple grand. Um, and I also wanted to be able to set it and forget it and I wanted to

be alerted to any anomalies. I didn't want it to have to be something where I got suspicious

all of a sudden. I had to go turn it on and figure out how to rig it all up. Um, I wanted to

be and I wanted the ability to network them together. So if I wanted 3, if I wanted 5, if I

wanted 100. I wanted the ability to just plug it into the network and have them all talk to each

other. So how do you actually detect rogue cell tower? Well, every cell tower or a base

transceiver station – BTS – beacons out information about itself. And this is available to

your phone, um, but you know has stuff like the the radio frequency channel number that

it's on. We talked about the MCC, the MNC, the cell ID, the location area code, so that's

specific to where you actually are. Um, the transmit power and some neighboring cells.

Neighboring cells, I haven't had a lot of luck with, but all the rest should still be enough to

to do it. Um, so like I said, these values should remain pretty constant, you know, you

don't want your country code to change, because if you're not in the United States, then all of a

sudden, I mean, you could have a problem. You know that if you're in the United States, you should

have a 310, if it's not, then something, something else is going on. Um, the MNC, you're

network code shouldn't change. The cell tower, the unique identifier shouldn't change. The

area code shouldn't change. And the transmit power, that should also, that should also not

change. On other reflections and things and ways that can change, but overall, at a period of

time, it should just average out. Um, so ok, so how do you, so if if values deviate from

what you've expected, it can mean that there's some maintenance taking place. It's

not necessarily that, hey, all of a sudden transmit power went down or maybe a cell tower went

down. Uh, it could just mean that something has deviated. And it could just mean that changes

are being made to the network. Um, but that's the whole reason why I wanted to be able to go

find it, because if there's a new signal that's coming out, I want to go see, hey, is this a

cell tower that's messing up? Is this, you know, maybe they're adding some extra, you know

carriers to it. There could be something actually happening. So the ability to go out and find

it, is really crucial to knowing if something's actually happening. And really the way

that this works is it's like a ba-, it's like you're you're talking a baseline. And so

you're sitting there and you're watching the neighborhood, you're watching to see you know

what cars go in and out, um, you're just being familiar with what's in your airspace and if

something drastically different hops in your airspace, you know that, hey, maybe I should be

suspicious of this. Maybe I need to go check it out. So these are just some sample values. 310

again, United States. 026 is AT&T. The unique ID for the cell tower and the radio channel that

it's on. If any of those change or you if the tower goes completely away or a new tower

comes up in its place with a really strong signal strength, you know that it's something you

should probably look at. Alright, so how, so so let let's just do a quick example of this.

Um, if a new tower pops up with an unknown cell tower ID and high transmission power, you

know the mobile country code could mismatch, the frequency could mismatch. Um, and you

know, maybe the location area code could change too. These are all things to keep in mind, all

things to look for. They don't all need to change, but a couple of changes here and there are

enough o be suspicious of. And so obviously, why locate a tower? Well, you want to know if

it's a cell tower or if it's a van with a tower inside of it. And now, now let's talk about

actually locating them. So I'm going to combine all this unique cell phone tower, receive power

and location and and, uh, the easiest way that I've found is to combine all of that

information on one detector that can be moved around. If you just have a couple of detectors

spread out, you know say, throughout a neighborhood or something, um, you're not going

to get as great a data, is if you can just move around, because then you can take a

bunch of different points. And we'll talk about that later on. So this is an example heat map

that I made and this is just me driving around and I selected one tower and this is this is me

practicing on an actual tower. This isn't a rogue cell tower, this is just me driving around

and seeing like, hey, let's see if I can find a what an actual tower, kind of as a blind test.

And so when I plotted up the data, here, this is, you know you can see that red spot and

you can see that signal strength is highest. And that comes down to probably about a 20 30 meter

radius and that's enough to tell is there a tower poking up out of the ground that's a couple

hundred feet. Um, it's really easy to tell if there's nothing there or if there is something

there. Or maybe on top of a building there's some antennae that's um that's a good way of

telling. You know, does that look shady or is that, you know, a van parked outside my street

or some, you know hacker kid sitting in the back of a car. Um, so multiple detectors with

known locations allow for trilateration of suspected, you know, towers. Um and the

received power and distance are they're not inversely proportional. You'll some

regression formulas and they're required to calculate in order to fine tune the results. It's

less accurate, but it's still pretty good. And, uh, TDOA, or Time Distance of Arrival, this

is another way that I had thought, hey, maybe I can find a cell tower this way. But really,

I don't have an accurate enough time and if you're not familiar with what TDOA is, it's a way

to, um, you know, you're waiting for a signal to come in and you're measuring the speed or

the length of time that it takes. Uh, a light signal to come from that tower to wherever

you are. And measuring the time it's kind of like GPS, it works with, you know, the speed of

light is constant and so you can use that to kind of do some math. But you need a really

accurate clock and that's not something that I have and so I thought, ok well that's not

going to work. Alright, so now I'm going to talk about trilateration verse

triangulation. So a lot of people get mad at me when I inversely use these, um, and I

get it, but some people don't and when I was doing this presentation before, there's a

lot of questions about it. So I'm going to go over it real quick, um, if this is something

you already understand. Great. You get a refresher. And if you don't, hopefully you know the

difference. Alright, so like any good engineer, I have my north arrow for my free body diagram.

And so let's let's picture there is an explosion or a really loud sound. The way triangulation

works is if you're at home and your friends at the store, maybe your wife's at work, you all

hear the same big explosion, you're all going to look in the same, or you're all going to

look of the explosion. And so if you were to intersect all the lines of where you guys are

looking, you're going to see pretty much a pretty good representation of where the

explosion probably happened if you all call each other and say, hey, ya know, I'm at home, I'm

looking towards the southeast and if I'm at the store, I'm looking west and I'm at work

looking north, you can have a pretty good idea of kind of where it came from. Um and so

triangulation, the angle there from the north arrow, you know, to wherever direction you're

looking, that's the angle you're actually talking about. And a lot of people get that confused

with what trilateration is. Um, so with triangulation you have your known points of where you

are and you can use that to find, you know, the very center of that triangle. So this is

something that I've wanted to do. I've wanted to add this feature. I didn't have enough

time to do it before this, but if somebody wants to help me work on it, I'd love to take up

any helpers. Um, so conceptually this makes sense, but I haven't actually tried it out. And so

what I want to do is basically put like an RF shielded dome on top of my antennae and have it

spin around. And when it spins around, uh at some point, when it hits where it, when it lines

up where the cell tower is, it will have a high signal strength. So right now, if you

see this, uh, like this is a cross-section of it, if the cell tower is right in line with were

the slice is in it, you'll have a high signal strength reading as it spins around. And then you

can tell right here, the signal is being blocked because it's RF shielded and so you'll have a

lower signal. And so if you spin this all around, you'll have multiple detectors, you have

different able and when all those angles intersect, that's typically where it's gonna be.

So this is all just conceptual, I haven't done this one. This isn't how I normally do it, but

it's something I just threw out there. And so technically my detector uses trilateration. And

so this is kind of, this is, a good representation of what I mean by that. So trilateration

is just magnitude of what's being felt. So say you're 100 feet away from a cell tower,

you'll have full bar versus say you're 300 feet, you know, you maybe only have two bars, 1000

feet it drops off to single bar. So you know that your certain distance away based on your

signal, however, you don't know, um, what direction that's coming in. And so, uh, if you're 100

feet away, that cell tower, could be in a circle anywhere that's a 100 feet away from you.

And likewise, you know, if you have a weak signal strength, you know that you could be about

1000 feet away from that tower, um, but it could be anywhere on that big circle. So how do you

fix this? Well you add more detectors. And so say you have two detectors that are there.

And you know, they have the same power strength, then you're gonna have two cell towers, ya

know, possibly two cell towers, where those two circles intersect. And so how do you

determine if it's only or which one of those that it is. You add a third detector and then where

all three of those circles intersect, that's where your cell tower most likely is. Or in

and around that area. But that's a way that you can get rid of just knowing uh the power level

that it's at. Uh and so again, you do a lot of math. There are plenty of python scrips, plenty

of batch scripts, plenty of other ways that you can easily calculate this, when you know

where you are and the magnitudes that you're feeling. Um, so that's one of those things, if

you don't know how to do it, just Google it. There's plenty of information out there. Um, so

how do you actually locate that tower. Well, power, it's not, it's not linear. Um, you'll need

more data, you'll need more monitoring nodes and you'll need to do back the envelope math. So

what I mean to say is that you're not gonna directly find, ya know the, square, ya know one

foot by one foot area where this towers transmitting from, but it's good enough to get you in

the general vicinity of it. And cell towers they also have different sectors, so they're

not just a perfect omnidirectional antenna that radiates in all directions. So

that's why having multiple detectors helps you kind of work out the fuzzy math and help you

actually find out where it is. Um and so that's why I like the multi-point trilateration, so

you get a lot of points, you collect a lot of data. And it gives you a lot more accurate

results. And so obviously, I don't I don't have a rogue cell tower that I can just test it

with and I'm not going to make one and have the FCC get mad at me, so I uh, tested this on just

real towers and say, hey, maybe this is a cell tower or you know that's a rogue one. Let's

pretend like it's rogue and now when I go check it out. So that's that's kind of just drove

around town and saw what was out there. Um, so yeah, back to this slide again. You can tell,

there's probably a tower in this area and sure enough if I were to show you the Google Maps of

where this is, there's absolutely a tower there. Alright, so let's talk about the

actual build itself. I used a raspberry pi 3 power adapter and an SD card running the stock

raspi and all this stuff is really, um, you know, there's plenty of guides on how to set

this up. Then I bought a SIM900 GSM module, it's all available on Amazon. You can go there,

it's like 17 dollars. I'll post links to all this and stuff you'll see later on, um, there's

a serial GPS module, again 16 dollars off Amazon. Pretty cheap. And then a software

defined radio and now there's more cautionary tales about this, but I'll tell you about

that going on. and then it's also made of scrap wood and hot glue. I was gonna 3D print some

really nice case for this and then I figured, uh, we're at a hacker conference and this is

hacked together, so I'm not going to make it any better, 'cause it definitely works. So

brace yourself. This is quite literally a hack. If it shows up. There we go. [applause]

Alright so let's break this down now actually and see what's there. Uh, ok, so on top you

have the GPS module, 'cause that extra 7 inches, you know, really gives it the height that it

needs to get a clear view of the sky. Um, the SIM900 cell module also goes up on top, 'cause hey

you want the best reception possible. Um, mind you this is in my passenger seat, so, uh

then there is, on both sides of this, to connect the the Bluetooth and the GPS module

together. There's a serial to USB adapter there. And so that basically just gives you serial

data and that's why I liked using the Raspberry Pi, 'cause it gives you four USBs, so it's

pretty easy, um, to connect it all up and and set it going so you don't have to burn your CPU

on added GPIO pins. Um, so again, scrap wood and hot glue. That's pretty much what I always

use. And then uh there's a software defined radio, it's a USB TV tuner, it's called an

RTLSTR, uh, we'll talk more about that. So how much does it actually cost. Well, if you want

to do this with Raspberry Pi 0 and really keep costs down, Raspberry Pi 0 is about 10

dollars and when you include shipping with it, uh, 5 dollar wireless adapter off Amazon, you

know, 5 dollar USB hub, 5 dollar SD card. You can shop around and find all of this a lot cheaper

or you know you might just have it sitting somewhere in your bedroom. Um and then the the

real piece that you probably don't have lying around is the 27 dollar uh SIM900 module and

you can just buy this off Amazon. You know, it's FCC regulated has all its FCC IDs,

um, and then there's also the 16 dollar serial GPS module and if you want to get a little bit

nicer one, I got the adafruit model. It's about 40 dollars, but it gets the job done a lot

nicer, it's a lot quicker to fix positions. So in total it's oooo, in total it's 52 dollars.

Um and again you can make it cheaper than that depending on where you source some of your

materials from. So let's talk about the SIM900 module. Um so it it will give you uh a whole

list of commands and this is the typical modem AT commands that I didn't know anything about um

and so I had to dig into. And there there guide that they have online has a ton of different

commands. You can just read through it and one of the ones that I found is this engineering

mode. So when you toss the SIM900, when you give it the AT commands, which I'll go through

in a little bit, um, it'll show you, hey, ok, it's good to go. And it'll give you 7 towers with

the highest information. Um and there's a ton of information and it's all via serial connections.

So if if you know how to use serial, it's all exactly the same. And what's even better is

there's no SIM card required just to put in engineering mode and I just also want to stress

this, that does not sniff any traffic. This is FCC regulated, this is not doing anything bad.

This is everything that your phone can see, that you can see on your phone. Um and I'll go

over how you can actually see this on your phone, to some degree, not nearly as good as

this, but um, let's move on. So there's something called field test mode, which most phones

have. Uh if you have an iPhone, if you just pretend to dial a number and you put in star 3001,

you know pound 12345, pound star, uh that will bring in field test mode and I'm not

trolling you, that actually will do it. Um and this is a good way to see a lot of information

about, uh, what's around you. Now it's a little bit hard to navigate and if you want you can

Google and there are plenty of guides that show you how to use this field test mode. Um, with

Android the, it can, vary from phone to phone. So just Google it, you can find it. And there's

also plenty of other apps since Android is much more open that you can see. Um, so here's

here's a quick example of what the SIM900 readout is. So AT did it's check if it's ok, um and

then that setting in engineering mode and then, uh, after that you check, hey engineering mode,

you know, what do you have for me? And then it will relay a bunch of data and at first I

looked at this and I was like, I have absolutely no idea what this means. So let's dig into

it. Um and so basically you have your channel number, your receive level, you have your,

uh, you have your base station identifier code, your cell ID, your MCC and your MNC and your

LAC. These are all things that we talked about. Um and so for, so this is the GPS serial that I

got. This is a little bit nicer than the one you can get online, but uh the cheaper one will

definitely do. This is the adafruit model and it fixes, the reason that I picked it is

because it fixes the position very quickly and have great indoor reception and it works

exactly like you would expect it to work. Um, it just, you plug it in and it just starts dumping

data. And when I say dumping data, this is exactly what I saw when I first plugged it in and

this scrolls so fast that to take the screenshot it was hard not to get it to blur. Umm, so

you can get idea, you know, I looked at this, I like, I don't even know what this means.

Luckily, you know, there's plenty of information online on how to handle this data. And so

you break it down, you really only care about this type of a line. Uh and this line you know

we translate it out and dump it and the SQL database that I have it setup to go into, you get

your latitude, your longitude, the number of satellites that you have, the GPS quality, the

altitude and the units of that altitude. Uh the GPS quality too goes zero one two. Zero is if

you don't have a fix and it doesn't know here you are. One if it's not that accurate, but

it will still do and two if it's locked on and you have a good positioning. Um, so next up is

Raspberry Pi 3, pretty straight forward. Um runs stock Raspbian is the operating system. And it

has enough power to run the software to find radio. So I use this uh Raspberry Pi to do other

software defined radio stuff and it's setup to use it. Um and so I just, you know, I just

repurpose that, I didn't want to have to get something else. and it also has 4 USB ports, which

is really nice. 'Cause you can plug in as many serial adapters as you want with a hub and it

works, it works a lot better than trying to use any GPIO pins as a serial adapter. And it's

also really easily powered by USB battery pack. You can get one of these battery packs

online for say 5-10 dollars. Um and you can run it all day off of this 'cause it's so low

power. So now next I wanna talk to you guys about the the I guess semi-controversial part of

this. So there's the TV tuner. It's, so this is designed so you get a USB and you can, uh,

basically you plug this in and you can you know, watch, uh, TV on your phone, any of the

broadcast, or not TV on your phone, TV on your laptop. And of the broadcast channels that are

out there. Um it has a wide range of frequencies and is typically used by a lot of

hackers to do really cheap software defined radio. 'Cause it's 20 dollars. Um, however

depending on where you are, this could be definitely against the law to listen to the GSM

traffic. So I don't want to encourage this at all if this is not legal where you are. Um, but

there are plenty of GitHub repositories out there that will let you listen into unencrypted

traffic and not to break it. We're not breaking any GSM traffic. Um and it's not

necessary at all to locating the towers, it just gives you some deeper insights if that's

something that you're interested in. Uh, and trying out and if you do, just let me know how it

works, 'cause I'd be really interested in hearing it. Um, so basically everything dumps to a

SQL like database. It's it's pretty simple when you when you look at this because I just

basically went through and the Python script and it just goes through goes, you know, every

couple seconds and it will snag all the data that's out there. And it dumps it and it lets you

do a lot of queries on it, so you know you can, you have your time of where you are, your

time, where you are, you have your latitude, longitude, you know, all the information that

we just talked about all in one nice and neat place. And uh you know, after you take a drive,

you don't wanna have to go through and look through, you know, hundreds of thousands of

lines of cell of cell data, I mean, it's gonna suck and there's no way to really divine

anything meaningful out of that. Um, so that's why, uh, you wanna make it pretty. You wanna make

it really easy to look at. You wanna make it so that you can show a picture to your wife,

mom, cat and then you know say, hey, this is what I did and they're like, oh, that's not

just numbers on a screen. Um and so, when I was in civil engineering, I used a ton of GIS

software, but it's real expensive. And so that's when I came across QGIS. It's

completely free. Open source. Um and basically what this does is kind of like Google maps, you

can place points and you can do math between those points. Um and it's it's a really extensive

program, so I could do a full talk on just how to use QGIS and all the stuff to learn. But some

of the things you're gonna want QGIS, you're gonna want IDW or Inverse Distance Weighting.

You'll want the openlayers plugin. This will give you maps and GIS data. And you also want,

or it also gives you Python Command Line automation. And it's it's super easy, once you

visualize it and it and it let's you just you know actually get your hands on the data and make

sense of it. Now, what I really really like about this is that, uh, once you've done everything

the right way. Once you're comfortable with how to do this in the GUI, it has a full

command line set, so you can know exactly what you're doing and then script it all up, so

you can just run a cron job and have it, you know, pump out nice looking images all the time. Um

and with that with the Python script, then you can have it say, hey, you know, this doesn't

look right. I wanna send an alert out. I'll talk more about alerts here in a little bit. But

basically this is just a sample of like, hey, how am I going to import data and get the x y and

power information and stuff like that into it. And so this is just a sample of just of me just

making some random points kind of, uh, in the program itself. And you can see that you can

overlay maps to it, you can have street data, you can even have satellite data. Um, this is a

great program if you're just looking for anything GIS related. And you just want to

get started in GIS 'cause it's a very similar to ArcGIS. So if you're looking to get into maybe

some professional tools, check this out first. Good for a lot of other things, not just

finding rogue cell towers. Alright, so the next part of this is, ok, so you detected

that there's a disturbance in the force. You see that, ok, my my maps are showing that there

might be a new tower somewhere. You know, I'm getting these notifications, so you know what

the heck do you do. How do you actually get this information to you. You know, so you're at the

grocery store and you know that there's something outside or maybe there's you know a new

cell tower popping up. How do you know, how do you get that information to yourself? There's

a couple of ways, um, you can, if depending on what your favorite scripting language is,

you can go in there and have it just send you a straight e-mail. A lot of people check their

e-mail, you know, very frequently, so you maybe you want to have it setup with

Twilio and have it send you a text message. Uh, Twilio is about 20 dollars a year if you

just want to send a couple text messages. It's really great, they have a great documentation.

I recommend using them and if you're a little bit more technical and you just want to

send push notifications to your phone. I use an app called, uh, Pushover. And it allows you to

send, just like it says, push notification that's really great, gives you ton of

different settings. So now, here's the problem that I have. Uh, when you're detector goes

off, what the heck do you do? Um, well, you turn off your phone. I mean if you're not

really sure and you're actually nervous about your privacy being infringed upon, turn off your

phone. Um, that's that's really the only thing you can do. Uh and then you can start looking

at the data. You can take what I, you know, the maps that I've showed you how to make and you

can look at it and say, uh, where is this? Let's go take a look at it. And then maybe you

go on a road trip. Well with this, you can just go out there and you can, um, you know, you

can go see, hey is there anything out there. Um, am I nervous, you know, that

something's you know, gonna be where it's not, it shouldn't be. Or you could just say, hey,

looks like they're doing some maintenance on a tower somewhere. Um, so this allows

you the opportunity to go drive around and see what's actually out there. And with that, I

think that's it. Um, if you guys want, just send me an email to this email address and I'll

answer any questions. [applause] And I'll be posting the slides by Friday, to this website,

Raging Security dot Ninjas, so feel free to go check it out and, yeah, I really encourage

you guys to shoot me an e-mail. [applause]

For more infomation >> DEF CON 24 - JusticeBeaver - Discovering and Triangulating Rogue Cell Towers - Duration: 32:07.

-------------------------------------------

HSN | Kitchen Solutions featuring Cuisinart 05.03.2017 - 05 PM - Duration: 1:00:01.

For more infomation >> HSN | Kitchen Solutions featuring Cuisinart 05.03.2017 - 05 PM - Duration: 1:00:01.

-------------------------------------------

Egi Wants You To Know This - Duration: 2:11.

2.5 million children in Indonesia are not able to get education

and 2.7 million are involved in some form of child labor.

Sadly, about half of them are under the age of 13 years old.

Almost half of children aged between 5 and 14 years old who are working as labors,

must work in dangerous places and unhealthy working environments.

Peduli Anak Foundation is a child development centre,

especially for street children,

neglected children, victims of abusive family,

or victims of child exploitation.

For more infomation >> Egi Wants You To Know This - Duration: 2:11.

-------------------------------------------

Destiny Series: The Vex, the Queen and the Stranger - Episode 3 - Duration: 14:51.

I arrived at Venus!

I parked my jumpship near the ruins of an old colony city,

and I went looking for the stranger that contacted me.

During my search,

I encountered large groups of fallen.

They were part of the House of Winter.

These are just fallen. I can't imagine the

stranger thinks these guys are worse

than the Hive spawn.

Unfortunately, I was right.

Wait what is that? Some sort of smoke?

No, no, no, not again!

Contact... Do you co... I'm under at...

The Vex overwhelmed me,

but someone helped me out.

Stranger: You need my help Guardian.

They brought us here.

The Vex...

Evil, so dark it despises other evil.

Mark: I feel a new mission is coming up!

Stranger: Find the Black Garden! A greater threat to us all,

lies there...

Where these machines are born.

Rip out it's heart. Only then will your Traveller begin to heal.

Nate: If we're going to find the Black Garden,

We need to see the Awoken.

Mark: So I went on my way to visit the awoken Queen...

in the Reef

Mark: Not the welcome I expected.

Mark: It could be worse.

Mark: Oh that Grima Wormtongue is her brother, right!

He looks so friendly!

Mark: Luckily for me, Nate came up with a plan.

Nate: I know how to find a Gate Lord.

Each Vex is part of a giant network, that spreads

through the mantle, of the entire planet!

If i can just get into their system,

we can draw a gate lord out!

It's revivable. I'll see what they discovered here.

Mark: We sabotaged the Vex network and lured them

into a trap

Nate: The Vex, they're coming!

Mark: They didn't know what hit them.

The Vex had some teleporting gates,

That we destroyed. Because... well if you blow up

enough gates, sooner or later, a Gate Lord

will appear to get rid of the problem.

I bought some extra heavy weapon ammo in the tower.

Just activate it. You see that?

I received five rockets, so now I'm all

geared up, to face the Gate Lord.

After I've loaded all my weapons of course.

I destroyed the gates so be ready to face a

really angry motherfucker.

I'm climbing the endless steps, that's how they call this place.

Now that looks promising.

Yes Nate confirms it. Oh a lot of goblins here!

Goblins are the basic units of the Vex.

And unlike the other antagonist races

in Destiny their weak spot isn't their head.

You see knocking off their heads

won't kill them. It will only make them angry.

They might look like robots, but in fact

they aren't. The Vex are a

biological life-form. The Machine body is

just a shell, the actual creature is

inside their belly. And that's also their

weak spot. Oh the guy over there is a

Hobgoblin, they are the Vex snipers

and I really have to watch out for them.

Because they pack a punch. When I hit them,

they will summon a shield. So that gives

me time, to find some cover.

No that's not good! Damn! I really waste my super there.

But I had no other options left.

Here is one last Hobgoblin. He's hiding...

Let's surprise him with my shotgun.

He had no chance!

The other vex units we have are

Minotaurs. These are some bulkier units.

Who use grenade launchers, and they look

a lot like the super battle droids from Star Wars.

And Minotaurs have bigger

brothers which are called Praetorians,

but these are only encountered in raids.

Then there are stationary turret-like creatures.

Called a Cyclops.

And the Vex also have flying units

called harpies! That are as useless as the

Fallen shanks.

And last but not least... There is a big ugly guy called a Hydra!

Who commands the Vex army.

If you've payed attention during history class,

you may have noticed, that these names are

derived from Greek mythology.

Well all but one, cause the Praetorian is Roman, not a Greek.

And they really existed.

I need to pick up that loot.

I got a little too optimistic with advancing here.

Let's go back quickly.

My healthbar is replenishing now. Time to reload.

And we're back in action!

watch this!

These Vex have lost their head.

So then they will push forward and shoot blindly.

It really fucks my game plan.

You see that hobgoblin had time to aim

for my head. Let's slow him with his shield.

Just like that!

Now take him out! This fight takes so incredibly long.

It will really make

you run out of ammo. Hey there's another

hobgoblin on the left.

Where is he?

Over here now do the same shotgun trick

Always works!

now I'm going to summon the Gate Lord

while dancing. I wonder how the automatic

subtitles will translate Gate Lord.

because it sounds like Gaylord right. (It translated correctly)

Yes, yes, here we go! That's a Minotaur

Immune? Spawn killing isn't allowed in Destiny, unfortunately.

Well those bullets aren't really effective. That's why I

brought this fellow.

Aim for his weak spot.

Damn! He steps away that's so annoying . later on in the

game I receive rocket launchers that can

track their targets. But for now, we have to

deal with this crap.

Here a lot of goblins.

Hey, I unlocked an upgrade.

I'm going to activate it. First find some cover.

Impact induction! It reduces my grenade cooldown time,

when I'm dealing melee damage.

For all of you who are wondering: "what the

hell did he just do?" You need to activate

an upgrade, by buying it. Pretty lame I know.

Okay I was complaining about the

eye of Oryx that he didn't come at me.

Well this guy is only advancing and that

makes him a little harder to take out!

There are some hobgoblins over there and

on the other side. Fuck I missed him again.

Okay, last chance.

It's a hit!

He is taking cover, and let his minions

do the job. Pretty smart!

That grenade hit him right in the face!

Oh, this headless goblin was standing behind me!

I need to save my bullets and pick up some ammo cases.

I want that heavy ammo case.

Just show some guts! Only received one rocket.

And I need to hit him

Ah no! He steps away! I knew that was

going to happen!

I'm going to finish it with my pulse rifle cause this takes

way too long! I have 300 bullets

so that will definitely be enough.

Slow that sniper!

And those two!

You're going down my friend!

No not yet. How about now?

Yes, that's it! Away with him!

I picked up his head!

Thanks Nate!

This is my progress screen.

Exactly 100 kills, but only 39 precision kills.

Not really accurate. No rewards that's cheap!

Nate and I went to the Queen to

collect a big reward. Uldren Sov: There is no shame

in running away Guardian! - We didn't run!

Here bitch! Suck on it!

We need to find the Black Garden.

Mars, 84 north, 32 east, Meridian Bay.

Your grace.

Finally I'm on my way to the Red Planet.

To stop the Darkness, once and for all!

We hope you liked this episode!

Please subscribe to our channel by clicking the Traveller.

Watch Episode 4 of the Destiny Series here,

or watch another random Brotocol video here!

Make sure to follow us on Facebook and Twitter

for more information.

Thanks for watching. We hope to see you soon!

Không có nhận xét nào:

Đăng nhận xét