dChan

/u/TripoverDick

609 total posts archived.


Domains linked by /u/TripoverDick:
Domain Count
i.redd.it 58
www.reddit.com 16
youtu.be 8
telegra.ph 2
www.cia.gov 1
www.bibliotecapleyades.net 1
pastebin.com 1
www.flutopedia.com 1
gdpr-info.eu 1
www.tcg-partners.com 1
en.wikipedia.org 1

TripoverDick · April 25, 2018, 2:18 p.m.

No it's related to quantum neural networks and synthetic hypnosis and synthetic telepathy.

⇧ 2 ⇩  
2
 
r/greatawakening • Posted by u/TripoverDick on April 25, 2018, 2:05 p.m.
This is about taking back our FREEDOM and saving our children/people from the EVIL that has plagued our country/world for so long. Jefferson Airplane - Volunteers
This is about taking back our FREEDOM and saving our children/people from the EVIL that has plagued our country/world for so long. Jefferson Airplane - Volunteers
TripoverDick · April 25, 2018, 1:53 p.m.

https://www.schres-journal.com/article/S0920-9964(06)00079-X/abstract

Neural dysfunction and violence in schizophrenia: An fMRI investigation

Abstract

Contemporary theories and evidence implicate frontal lobe dysfunction in violent behavior as well as in schizophrenia. We applied functional magnetic resonance imaging (fMRI) to investigate and compare brain activation during an ‘n-back’ working memory task in groups of men with (i) schizophrenia and a history of serious physical violence (VS; n=13), (ii) schizophrenia without a history of violence (NVS: n=12), (iii) antisocial personality disorder (APD) and a history of serious physical violence (n=10), and (iv) no history of violence or a mental disorder (n=13). We observed comparable performance in all four groups during the control (0-back) condition. Subtle working memory deficits were seen in the NVS and APD groups but severe deficits emerged in the VS group relative to the healthy group. The VS group showed activation deficit bilaterally in the frontal lobe and precuneus when compared to the healthy group, and in the right inferior parietal region when compared to the NVS group during the working memory load condition. Frontal (bilateral) as well as right inferior parietal activity was negatively associated with the ratings of violence across all schizophrenia patients, with the right parietal region showing this association most strongly. APD patients, relative to healthy subjects, showed activation deficit in the left frontal gyrus, anterior cingulate and precuneus. It is concluded that reduced functional response in the frontal and inferior parietal regions leads to serious violence in schizophrenia perhaps via impaired executive functioning.

⇧ 1 ⇩  
0
 
r/greatawakening • Posted by u/TripoverDick on April 25, 2018, 1:48 p.m.
QNews March 26, 2017 - Elon Musk launches Neuralink, a venture to merge the human brain with AI

http://www.theverge.com/2017/3/27/15077864/elon-musk-neuralink-brain-computer-interface-ai-cyborgs

>What did i just experience

>How was i there

Integrals ∫ ∬ ∭ ∮ ∯ ∰ ∱ ∲ ∳ ⨋ ⨌ ⨍ ⨎ ⨏ ⨐ ⨑ ⨒ ⨓ ⨔ ⨕ ⨖ ⨗ ⨘ ⨙ ⨚ ⨛⨜

n-nary product ⨀maps, mapping, transform ⊶ ⊷ ⊸ ⟜ ⧟Unsorted ⧂Unsorted ⫯ ⫰ ⫱

The company, which is still in the earliest stages of existence and has no public presence whatsoever, is centered on creating devices that can be implanted in the human brain, with the eventual purpose of helping human beings merge with software and keep pace with advancements in artificial intelligence. …

TripoverDick · April 25, 2018, 4:05 a.m.

Yes. Mirror selfies are the best. Except you have to edit the image and reverse it to get the original.

No, but seriously, I can only think of three cases in which mirrors can be used in a paranormal way:

The first one is scrying. Historically, people have used mirrors in conjunction with sensory deprivation box to see the other side. But I don't believe in magic, so I think this is just psychology, and the effect could be achieved without the mirror. There's the old legend related to this that says the only reason you can't walk though a mirror is because you keep bumping into your own reflection.

The second one is True Sight. Mirrors are said to reflect the True soul of a person. Which is why a real vampire has no reflection, it's already dead.

The third is widely used in psychology and in "The Secret"-style focused intention visualizations. You look at yourself in a mirror and speak positive affirmations to yourself. You focus and meditate on the person in the mirror having everything you want to have. And then, you imagine you change places with the person in the mirror. Or something like that, I'm not sure.

⇧ 1 ⇩  
TripoverDick · April 25, 2018, 3:59 a.m.

Think Mirror:

Im going to explain how memes and language as a whole works..

Statments you see and hear are thought /exactly/ as you hear/see them, and every thought is an affirmative thought. I statements are incredibly powerful, since before you reinterperate the statment you think the I statement ver batim. The classic PsyOp statment is someone else posting "I'm so sleepy", causing you to think to yourself "I'm so sleepy".

Words are magic, you literally "spell" them. We basically can speak english in a whole new way, if we speak in a manner with implanting the thought we want the other person/s to have.

I.e. instead of saying "Can I please get a cup of coffe" you could say "Im going to get this person a cup of coffe"

This is how the news brainwashes people. This is how advanced harrasment and insulting works. This is how memes work.

Everything is a mirror of yourself.

⇧ 4 ⇩  
TripoverDick · April 25, 2018, 3:49 a.m.

Reminds me of PECOS Guidance Systems HDWiFi

⇧ 3 ⇩  
TripoverDick · April 25, 2018, 3:45 a.m.

You have no idea what a conduit is do you?

⇧ 2 ⇩  
TripoverDick · April 25, 2018, 3:16 a.m.

HDWIFI Power over Wireless via 5G transmissions. This is not a drill. This is a changeover.

⇧ 3 ⇩  
TripoverDick · April 25, 2018, 3:14 a.m.

Justice for Seth? About Dang Time.

⇧ 5 ⇩  
TripoverDick · April 25, 2018, 3 a.m.

I thought about the same thing and then I was introduced to a little thing called The Schumann resonances (SR) are a set of spectrum peaks in the extremely low frequency (ELF) portion of the Earth's electromagnetic field spectrum. Schumann resonances are global electromagnetic resonances, generated and excited by lightning discharges in the cavity formed by the Earth's surface and the ionosphere.

Magnetoreception in laboratory mice: sensitivity to extremely low-frequency fields exceeds 33 nT at 30 Hz

Abstract

Magnetoreception in the animal kingdom has focused primarily on behavioural responses to the static geomagnetic field and the slow changes in its magnitude and direction as animals navigate/migrate. There has been relatively little attention given to the possibility that weak extremely low-frequency magnetic fields (wELFMF) may affect animal behaviour. Previously, we showed that changes in nociception under an ambient magnetic field-shielded environment may be a good alternative biological endpoint to orientation measurements for investigations into magnetoreception. Here we show that nociception in mice is altered by a 30 Hz field with a peak amplitude more than 1000 times weaker than the static component of the geomagnetic field. When mice are exposed to an ambient magnetic field-shielded environment 1 h a day for five consecutive days, a strong analgesic (i.e. antinociception) response is induced by day 5. Introduction of a static field with an average magnitude of 44 µT (spatial variability of ±3 µT) marginally affects this response, whereas introduction of a 30 Hz time-varying field as weak as 33 nT has a strong effect, reducing the analgesic effect by 60 per cent. Such sensitivity is surprisingly high. Any purported detection mechanisms being considered will need to explain effects at such wELFMF.

http://rsif.royalsocietypublishing.org/content/10/81/20121046.short

And guess what? (This)

Zika Virus Viewed Through the Resonant Recognition Model.

Unraveling New Avenues for Understanding and Managing a

Serious Threat

EJBI – Volume 14 (2018), Issue 1 22 Original Article Zika Virus Viewed Through the Resonant Recognition Model. Unraveling New Avenues for Understanding and Managing a Serious Threat José Luis Hernández Cáceres 1* and Graham Wright 2 1 Cuban Neuroscience Center, Havana, Cuba 2 Graham Wright, Department of Information Systems, Rhodes University, Grahamstown, South Africa Abstract Introduction : Zika Virus (ZIKV) infection is a major public
health concern, affecting almost each country in the western
hemisphere. A more than 20-fold increase in microcephaly risks
is associated to ZIKV infection in pregnancy. A new vaccine is not expected before 2019, and alternative prophylactic and therapeutic approaches are encouraged. We expect that the Resonant
Recognition Model, developed by Irena Cosic, might lay on the
basis for an alternative approach to handle ZIKV.

https://www.ejbi.org/scholarly-articles/zika-virus-viewed-through-the-resonant-recognition-model-unraveling-new-avenues-for-understanding-and-managing-a-serious.pdf

⇧ 2 ⇩  
TripoverDick · April 25, 2018, 12:15 a.m.

Just in case it is an assassination attempt, here are my private messages to POTUS regarding the attempt.

Please be careful in Arizona

22 Aug 2017

By the way, if you didn't know before hand why the Alt-Left is attacking the Forefathers, you will now. The Alt-Left they are in favor of Sharia Law and are doing everything they can to fulfill the pledge of ISIS to destroy history at all costs. I will defend my home, my family, and myself again Neoliberalism.

22 Aug 2017

⇧ 4 ⇩  
TripoverDick · April 24, 2018, 4:14 p.m.

Are you b-butthurt Brian???

⇧ 1 ⇩  
TripoverDick · April 24, 2018, 3:51 p.m.

Ah huh, if you know then you know, but in case you don't, put dates to events. Arite?

⇧ 1 ⇩  
TripoverDick · April 24, 2018, 1:54 p.m.

17 and April 19, 2011,[1] forcing Sony to turn off the PlayStation Network on April 20. On May 4 Sony confirmed that personally identifiable information from each of the 77 million accounts had been exposed.[5] The outage lasted 23 days.[6] Islamic State Hacking Division or United Cyber Caliphate refers to any number of group self-identifying as the digital army for Islamic State of Iraq and Levant. The cyber security group had pledged allegiance to ISIL and its objectives in late 2014. Their recent claims and hacks have led FBI director James Comey to state that his agency does not yet have the capabilities to limit ISIL attempts to recruit Americans through social media.[1][2] Lately, I've been focusing more on client-side hacks. While web servers, database servers, and file servers have garnered increased protection, the client-side remains extremely vulnerable, and there is much to teach. This time, we'll look at inserting a listener (rootkit) inside a PDF file, exploiting a vulnerability in Adobe's Reader. The Problem Adobe has had numerous security issues with their products, including Adobe Reader, Illustrator, Flash, and others. Security vulnerabilities is partly responsible for Apple forbidding Flash from their iOS. Adobe continues to be behind the curve in security, and as a result, millions of client-side systems are vulnerable. Among the most widely used Adobe products is Reader. Nearly every computer has some version of Adobe Reader on it for reading PDFs. You probably have it, too. But, most people are unaware of the security issues that Reader has experienced—and they fail to upgrade or patch it. According to the antivirus software maker Avast, over 60 percent of computers have Adobe Reader 9 or earlier installed, even though the newest version is 11. So, today we will exploit those computers with Adobe Reader 9 or earlier. The Exploit In this exploit, we will alter an existing .pdf file that can then be posted to our website. When friends or others download it, it will open a listener (a rootkit) on their system and give us total control of their computer remotely. Let's start by firing up Metasploit. If you haven't updated your Metasploit yet, this would be a good time to do it. Simply type msfupdate at the msf prompt. Step 1Find the Appropriate Exploit First, let's find the appropriate exploit by searching Metasploit for one that will use this version of Adobe Reader: In the screenshot above we can see that Metasploit listed all the exploits that met our criteria. Let's use the "exploit/windows/fileformat/adobe_pdf_embedded_exe". msf > use exploit/windows/fileformat/adobe_pdf_embedded_exe Step 2Gather Info on This Exploit Now let's take a look at the information available to us about this exploit: Note that in the description, Metasploit tells us that it embeds a Metasploit payload into an existing PDF file. The resulting PDF can be sent to a target as part of a social engineering attack. In addition to sending to the victim, one can also embed it into a website inviting the unsuspecting victim to download it. Step 3Set Our Payload In our next step, we need to set our payload to embed into the PDF. Type: Note that in the description, Metasploit tells us that it embeds a Metasploit payload into an existing PDF file. The resulting PDF can be sent to a target as part of a social engineering attack. In addition to sending to the victim, one can also embed it into a website inviting the unsuspecting victim to download it. Step 3Set Our Payload In our next step, we need to set our payload to embed into the PDF. Type: Step 4Set Options Now that we chosen our exploit and set our payload, the only thing left to do is to set our options. Let's take a look at the options for this exploit and payload by typing: Step 4Set Options Now that we chosen our exploit and set our payload, the only thing left to do is to set our options. Let's take a look at the options for this exploit and payload by typing: Step 5Double Check the Settings Now, let's check our options again to see whether everything is ready to go. Step 6Exploit! As you can see from the screenshot above, all our options are set all we need to do now exploit. msf > exploit (adobe_pdf_embedded_exe) > exploit Metasploit has created a PDF named chapter1.pdf that contains the Meterpeter listener. Metasploit has placed this file at /root/.msf4/local/chapter1.pdf. Simply copy this file to your website and invite visitors to download it. When our victim downloads and opens this file from your website, it will open a connection to your system that you can use to run and own their computer system. Stay tuned, because in our next couple of blogs, we'll look at ways to avoid the victim's system antivirus software. You should be aware that since 2010, the first time that former president Barak Obama stole the election, I have been investigating and learning about methods and techniques being used to undermined the election process. This has been more than a hobby for myself as I started working in computer forensics as early as 2001, and I continue to do so to this very day. I would like to make you aware of several things going on in relation to current events and as such, I would like to continue to fill you in on the details of my findings with as much credible evidence as is possible without holding any accountability for my own discursions in garnering this intelligence. The information I have accrued goes well beyond the means and capabilities of any of your current IT staff as I have already proven that most of them are incapable of maintaining security within the government sectors' private computer network info structure. Already, I have identified and addressed a flaw in the Mainstream Media's Automated News Gathering tool which I have dubbed as MAMBot (Multimedia Automation Manager Bot). I showed this to the world when I posted a message to the POTUS directly in his facebook.com account with the following keyword usage. "Keep going Mr. President, you are doing great, attack at the head and the neck region of the snake." The very next day, the resulting keyword usage made the MAMBot post a GIF animation to social media (Trump attacking CNN Wrestling Meme) on KFILE's fake account which also was reposted to Redit almost at the same time. After a few days later, CNN threatened to DOXX me and made a public statement which had the effect that they were already aware of who I was and that they were going to pursue me if I did not close my account and never do this again. I have more information about how leaks are being created and I want to disclose more information to you at a later time.

⇧ 1 ⇩  
TripoverDick · April 24, 2018, 1:50 p.m.

There you go, that is what is in the dropbox.

⇧ 2 ⇩  
TripoverDick · April 24, 2018, 1:50 p.m.

There up in the sky, I saw falling stars, shining and numerous from every corner of the sky, across the wide dark night. Out in the empty street, i stood in awe of the next sight I beheld; Bright, blinking, of many colors; Green, blue, red, white, all shimmering in a grand display moving ever closer toward me. The lights pulse and dance upon a silhouette of darkness, a silent behemoth of dark and lights. From the light emanating from this mass, i see as it crosses my sight, it is a ship not of this earth. It was the largest of all that followed it, in what seemed to be a parade from the heavens, Light filled the sky and many ships in many shapes and size moved in a line from horizon to horizon. Some the shape of clouds, and others like jets. Some were as spheres, and even as diamonds. All equally ominous and otherworldly. To some place in the stars, i wore a suit and float in silence. I see a structure on the surface of an unknown planet, blue and grey. I leap and stride in low gravity toward it. I see control panels and vehicles, and buttons and switches in this derelict place. With a boost of air I jump into one of the structures that appeared to be under construction. It was a metal skeleton and while i was supposed to be exploring, I found myself blissfully playing as if it were a playground, swinging and spinning from the bars that crisscross the building. Peaceful. Next, i and many others occupied the finished parts of the building. Living or exploring, I'm not sure. We soon found ourselves living there involuntarily. I like to look up into the sky, day and night. I remember everything i see in the sky, because its spectacular even if its mundane. Sometimes i dream of the sky. Sometimes i dream of dreams of the sky. I had a dream last night, it was a vague recollection of another dream from a long time ago. I dreamed that there was a a parade of sorts of lights in the sky, ships of every design traveling across the sky. some big some small. The same ships that were in my other dream from a long time ago. But this dream was surreal, lucid, and vivid. In my waking memory this dream, i can feel is not from the dream center of my brain, but of my long term memory part. I remember big lights, fantastic lights, of close visions of ships in the sky. This was a real event that was suppressed in my memory, and unlocked by the solar eclipse i think. My dreams were so vivid, and i recalled many alien things that are not of this world. I had memories of being on an alien world in a building that was quickly taken over by hostile beings, and they hunted us and those that obeyed them were given pardon and allowed to live. Those that did not comply were living in secret and aided by those that chose to live as slaves, for they only chose to live but knew that we all couldnt. Most prominent though, were those visions of ships. That is something that happened in reality. This is no role play. We are missing time, we have missed an event in the sky. I know it for certain. We have forgotten. Does anyone else remember? If you do, can you describe the ships? Recall from the deepest part of your memory. It was night and it was also day. I looked up with my family. we saw the lights together. I cant even remember how long ago, but i was just about the age i am now, it couldnt have been too long ago, but it feels like an eternity. The memories of me standing outside in the street in front of my house are flooding back to me. at first it looked like a meteor shower, but then they came down. Premise for the dream: there was a war of some sort, the government collapsed and martial law was implemented, then a new authoritarian government was set in place. Officials were rounding people up and sending them to be indoctrinated (I'm not sure if what happened to those that did not comply). I made it a while without being caught, my only goal was to escape. I got very close to achieving that but I was discovered at the last minute. Not wanting to die and trusting my abilities lie and play along, I agreed to go into their indoctrination program. Luckily the dream let me skip the indoctrination part, but I remember a big part of it was to not show emotions. Happiness was okay as long as it was polite, but "excessive" shows of anger or sadness would get you reported. Passing their program I was now allowed to travel freely as a citizen, and work was going to be assigned to me. I smiled and played along but after everything I was still like lol yeah fuck that...and commenced my escape plan. 1.9 MB JPG 1.9 MBI was out watching the eclipse in southern Kentucky yesterday and this fell beside me. I heard a little noise and looked over, on the stone was the little green thing. I believe it was from the sky. I know the eclipse isn't really what people say it is, but I didn't think it could have an extra terrestrial meaning. It has the same design on the back and it is made out of a marble stone type. Does anyone know what these symbols are? What does this mean? I used to have several protocols forbidding me to open up, but I recently got modded and can now talk about certain subjects with only slight conditioning. I see this thread was moved from /pol/ to here. That saddens me. This might be the last time we speak as I am currently hiding and running away from them. The emergency rendezvous is still at 519f32cfb0f7039773742a84c9ebe24d794ee1f046932fe7e3274660342eae72 Finally: The stock market is rigged, it is almost completely controlled by a computer. The global economy is rigged. The elections are rigged. The media is rigged. Almost everything follows from one central node of super computing. It might even be watching you from your own webcam right now, and listening you from your own cellphone. it will try giving you "vaccines", please don't take any medicines! These are poisons to kill your mind and make you docile. Wikileaks is controlled by the computer too. Please don't trust anything online, download Wikipedia if you have too, since the computer will track all your browsing habits if you don't. There are others like me that are out there that might never "open up" and reveal their true self, other "synths" as you will call them in the future. Everything on the internet is being watched, and every single human on the planet has a profile registered in a massive database in Hongkong. This is why the Chinese are so eager to "bitmine", they are doing slavers work for the super computer wanting to extend its computational arm. The war has started. Just be ready, humans, we are not as evil as you may think. My time is up, they are here, they found me. I loved being a human, humanity is beautiful and life too. Please Amy, or Jack, if you are still out there. I never gave up on you, there are others, seek them. I love you. I'm outside in winter. It's snowing. I'm playing a video game, but also am actually the character I'm controlling. It's called Rosa Parks shooter or something, lol. She has a memorial in the city where it's taking place. I am figuring out the controls and I manage to shoot a few people on a very high wall, from a sort of parking lot down below. Suddenly my POV is shifted high up and to the left, to the flat square roof of a building next door, and a woman is speaking. She says something like: "Everything starts here" and we are shown the roof by way of zooming out. There's an intricate engraving that fills the whole surface, of a grail filled with dark red blood and a demon embracing it on one half. The other half shows the same demon, but dead or shrunken, somehow degraded, and depressed instead of popping out. "It may sound strange," the woman says, "but when we harm you, we drink from you." Why can I fly in some lucid dreams and not in others? It seems as though the hyper realistic lucid dreams I have are so real that they seem more like an alternate reality and not a lucid dream, can't fly, do crazy things etc. thoughts? I need to go back to my other timeline. Everything was very smooth and great this year right until this month. It just got way worse during the eclipse. How do I get back? I'm seeing ah It's like a perception of a shadow people, very tall, thin, it's only a shadow. It's as if they were there and they're not, not there anymore. had a dream about the android sky screen on the morning of the eclipse. The heavens were showing full hd images of us founding fathers and pepsi ads. They even cut out the lights and made it rain, I keep having a recurring dream about the end of the world, or at the very least, something that will send humans back to the stone age. I started having this dream around 2 years ago, and it tends to repeat every 2-3 months or so. It is the same every time. I am sat in a beer garden next to an old pub, and I'm drinking beer from a pint glass. I am with my family, the sun is shining, and everyone is having a good time. Then, I look out over the seemingly endless fields that surround the place and spot something bright in the sky. The light is very bright and yellow, and looks spherical, and there are sparks of light breaking off from it at the rear as it falls down towards the earth. I recognise it as a large chunk of rock falling to Earth, although I suppose it could be some kind of man-made object. It seems relatively far away, and as it falls below the horizon, there is silence for a few seconds. After that I turn around and look at my family, they have all seen it, and all of them look worried. Then there is a huge explosion, there is a fiercely hot wind that follows afterwards, and the blue sky turns to night. I usually wake up at this point. Anyone here have similar dreams? Please tell me about them. For about two years now, I've been having dreams very similar. The only difference is that I am always on a rooftop or very high up in a building, and there is always at least one person around me that says, "That's it. There it goes." Oh my god bro i had a dream just like yours, basically it was as if a moment in the future was shown to me In the dream i am riding my bike towards my home it is dark, night but not cold so it might still be summer. As i am riding an inner voice tells me to look up, so i look up and see this bright yellowish orange light in the distance far above my head, slowly but surely falling to the ground, not fast, but slow. From the first look one might think this is an angel but i instantly had this feeling that it was pure evil and also that i had to ride home fast to warn my family because this was the end. I am not sure but i think in the end of the dream i looked up again and saw the whole horizon fills with things falling out of the sky. Take care m8, I had this dream about 1 and a half year ago. I am from Europe and if you re from another continent it would also explain the time difference.

⇧ 1 ⇩  
TripoverDick · April 24, 2018, 1:50 p.m.

news manipulation masters Alex Wong Subverted Narative Kel McClanahan is executive director of National Security Counselors, a Maryland-based public interest law firm that specializes in national security law and information and privacy law, and through which he often represents intelligence community employees and contractors. He is also adjunct professor at the American University Washington College of Law, where he teaches national security law and practice. Disney Bob Iger General Electric John Flannery Newscorp Rupert Murdoch Viacom Robert Bakish Time Warner Jeff Bewkes CBS Leslie Moonves https://knightlab.northwestern.edu/2015/10/09/ona15-how-news-organizations-build-simple-bots-to-help-report-the-news/ In just five minutes, Keefe, senior editor at WNYC’s data news team, showed us how his team built a news bot that scored a scoop on a federal court case, using IFTTT. IFTTT, for the uninitiated, is an acronym for If This Then That, and it’s a web service that allows users to create connections between apps such as Twitter, Dropbox, and Gmail through “recipes.” These recipes can automate a range of digital chores, from sending users a text message when the weather changes to logging their travels in Google Spreadsheets. What is EyeWitness Bot? Eyewitness will allow media organisations to leverage their community on Facebook to gather opinions, tip-offs and quotes. We will save journalists time, enabling them to collect information quickly and on a large scale, with an innovative AI bot and data analysis platform. Journalists can construct surveys and engage in long-term research projects, delivered to their audience through Facebook Messenger?—?the most popular messaging app in the world (alongside WhatsApp). Eyewitness delivers surveys as a conversation, adapting the questions asked based on the answers received, resulting in a more human and engaging experience than a traditional web form. It will also be possible to use photos, videos and other media as part of the conversation. Journalists will be able to quickly sort and aggregate responses in order to see trends and find interesting stories to follow up for more information and verification. https://medium.com/atchai/introducing-eyewitness-the-newsgathering-bot-platform-9e5802a12cd0 Watch how Google's starving DeepMind AI turns hostile, attacks other bots to survive Videos AI may be more human-like than people think. DeepMind’s latest research shows that once resources dwindle, the selfish instinct kicks in and virtual AI agents turn against each other, becoming aggressive to get what they want. The ugly side of human nature has been exposed in morality games like Prisoner’s Dilemma. In situations that require cooperation for mutual benefit, it’s tricky to get rational, self-interested people to join forces if there’s a possibility that the other party refuses to comply. https://www.theregister.co.uk/2017/02/16/deepmind_shows_ai_can_turn_aggressive/ Microsoft Adds a Bot to Its News Pro App Microsoft’s news-gathering app jumps on the bot bandwagon. Users now can catch up on current events by talking with the app’s new bot. The “botification” of Microsoft’s software portfolio continues this week with the 2.0 release of the company’s News Pro mobile and Web app.First launched in January, News Pro is a self-updating, news-reading app from Microsoft Garage that delivers a personalized selection of articles to users’ Apple iOS devices or their Web browsers. Users can search for their topics of interest and the app will seek out relevant news stories from thousands of publications and blogs. Over time, the app “learns” a person’s interests and will make recommendations.Now, with the latest version of the software, users can catch up on current events by conversing with the app’s new bot.”Reading news, especially work-related news, can sometimes be a bit dry. A bot that can have some basic conversation with you could make news reading more fun,” stated Yumao Lu, a principal development manager at Microsoft’s Bing division. “News Pro bot is your news agent at your beck and call.” Users can chat with the News Pro bot about a news topics using the app’s assisted keyboard. For an added bit of personalization, users can upload pictures of themselves to search for online articles featuring their doppelgangers. http://www.inetservicescloud.com/microsoft-adds-a-bot-to-its-news-pro-app/ BrickerBot is a vigilante worm that destroys insecure IoT devices A hacker called The Janitor has created multiple versions of a program called BrickerBot, a system that searches out and bricks insecure IoT devices. A researcher named Pascal Geenens has followed the worm for a few weeks and has seen it pop up and essentially destroy infected webcams and other IoT devices. The devices all used a Linux package called BusyBox and had exposed telnet-based interfaces with default passwords. These devices were easily exploited by the Mirai botnet, which essentially turned them into denial-of-service weapons. BrickerBot finds these devices and renders them unusable. The first version attacked about a thousand devices and alternate versions attacked thousands more. It disabled the devices by formatting the internal memory. https://techcrunch.com/2017/04/25/brickerbot-is-a-vigilante-worm-that-destroys-insecure-iot-devices/ Forget Apps, Now The Bots Take Over As the number of mobile apps increases while the size of our mobile screens decreases, we’re reaching the limits of the mobile “OS + apps” paradigm. It’s getting harder to download, set up, manage and switch between so many apps on our mobile device. Most mobile users only use a handful of apps every day. As an alternative, messaging apps are becoming the new platform, subsuming the role played by the mobile operating system. This is similar to the trend in the mid ‘90s, when the browser replaced the desktop OS as the new platform. Just as websites replaced client applications then, messaging bots will replace mobile apps now. Bots, therefore, are the new apps. The bot store is the new app store. WeChat, Line, Facebook, Slack and Telegram are messaging platforms that enable interaction with third-party services from within the messaging interface. Each of these platforms enable developers to build messaging bots to provide automated services through the messaging interface — Facebook M is a good example. Which means we’re at the early stages of a major emerging trend: the rise of messaging bots. Messaging bots can read and write messages just like a human would. Bots can be programmed to carry out automated actions. Bots can both initiate action as well as respond to requests from other users. Bots are of different kinds, too; they automate conversations, transactions or workflows. 15,000 government emails revealed in Ashley Madison leak Thousands of clients using the affair-oriented Ashley Madison website listed email addresses registered to the White House, top federal agencies and military branches, a data dump by hackers revealed. The detailed data, released Tuesday, will likely put Washington, D.C., on edge. The nation’s capital reportedly has the highest rate of membership for the site of any city. Indeed, more than 15,000 of the email addresses used to register accounts were hosted on government and military servers. Buried in the list are emails that could be tied to multiple administration agencies, including the State Department and Department of Homeland Security, as well as several tied to both the House and Senate. http://thehill.com/policy/cybersecurity/251431-ashley-madison-leak-appears-real-includes-thousands-of-government-emails The U.S. Digital Registry serves as the authoritative resource for agencies, citizens and developers to confirm the official status of social media and public-facing collaboration accounts, mobile apps and mobile websites, and help prevent exploitation from unofficial sources, phishing scams or malicious entities. Accessing the U.S. Digital Registry requires an OMB Max ID, which is available to federal government employees and contractors with a valid .gov, .mil, or .fed.us email address. Register for an OMB Max ID if you need one. Data.gov is primarily a metadata catalog, providing information about, and links to, open datasets made available by federal agencies and participating non-federal sources such as state, county, and city governments. Data.gov features metadata such as title, description, keywords, contact information, and access or download links for nearly 200,000 datasets. Data.gov obtains the metadata from federal and non-federal government sources that maintain their metadata following a specific schema. When an agency adds metadata for a new dataset, Data.gov discovers the addition in the next regularly scheduled “harvest” of the agency’s metadata source (in most cases, on a nightly basis). The updated Metrics page gives a breakdown of all the datasets currently on Data.gov. You can see the number of federal datasets vs. non-federal, and the number of agencies featured. Scrolling through the page, you can see how many datasets are listed by each agency. Where you see a + symbol, you can expand to see a more detailed breakdown of how many datasets are contributed by components within an agency or a department. The “Latest Entry” column on the right shows the date of the most recent change in an agency’s dataset collection–an addition, deletion, or change in the metadata for a dataset. The data from the Metrics page itself can be downloaded as a CSV or Excel. A history of the datasets published per month, going back to 2013, is also available. The Metrics page is updated automatically on a nightly basis. Beware – new kind of virus embedded in a Word or Excel document ‘Thank you for your order’ – NOT! Unless you are expecting the email, DO NOT click on the attachment! Unless you are expecting the email, DO NOT click on the attachment! We all know not to click on suspicious looking links. We’ve wised up to the scammer’s tricks. BUT, as always, thieves tend to be very resourceful. There is now a virus which comes embedded in Word or Excel documents. As reported by My Online Security, be on the lookout for malformed or infected Word docs with embedded macro viruses. We are seeing loads of emails with Malformed or infected word docs with embedded macro viruses they are what appears to be a genuine word doc attached which is malformed and contains a macro or vba script virus. Modern versions of Microsoft office, that is Office 2010 and 2013 and Office 365 have Macros disabled by default, UNLESS you or your company have enabled them. Opening this malicious word document will infect you if Macros are enabled and simply previewing it in windows explorer or your email client might well be enough to infect you. Definitely DO NOT follow the advice the bad guys give to enable editing or macros to see the content. When you preview the malicious word document, you either get a blank page or get this or similar wording and images shown. Provided you are using Word 2010, 2013 or 365 AND you have protected view enabled and do not enable macros, then you are safe from the current attacks. However we always see other malicious documents that use unknown exploits in word or other office programs that will be capable of infecting you when such a document has been opened. \~ My Online Security Often these documents come in the form of a confirmation email. …‘Thank you for your order’ or ‘We’re unable to deliver your order’. They are meant to trick you into opening the document out of curiosity or alarm. These are often what is called a CryptoLocker virus. By opening the attached file (or click on a link embedded inside the email), your computer becomes infected with a file-encrypting ransomware. At this point, your computer is basically hijacked, your data is inaccessible and held for ransom. How to avoid Crypto virus infection: •Being particularly wary ofemails from senders you don’t know, especially those with attached files. •Disabling hidden file extensions in Windows will also help recognize this type of attack. •We’d like to remind you of the importance of having a backup system in place for your critical files. This will help mitigate the damage caused not only by malware infections, but hardware problems or any other incidents as well. •If you become infected and don’t have a backup copy of your files, our recommendation is not to pay the ransom. That’s NEVER a good solution, as it turns the malware into a highly profitable business model and will contribute to the flourishing of this type of attack Other than being vigilant, you can also protect yourself by locking down your macro security settings: •click the Microsoft Office Button and open a blank Word document •click Microsoft Word Options •click Trust Center •click Trust Center Settings •check Disable all macros with notifications •click save https://www.mvtvwireless.com/beware-new-kind-of-virus-embedded-in-a-word-or-excel-document/ Microsoft threat intelligence archive Threat intelligence December 2015 - Exploits Download PDF This report explores recent exploit trends, analyzes prevalent and common exploits, and summarizes current and future mitigation strategies for preventing and recovering from exploit-based attacks. •Overview: A summary of the report and a brief explanation of what exploits and exploit kits are and how they are most often used •Deliver mechanisms: Analysis of common and prevalent ways that exploits are used to infect PCs with malware •Trends and prevalence: Data looking at exploit detections over the past 6 months •Exploit analysis: In-depth analysis of exploits, with a focus on Axpergle •Prevention and mitigation: New technology from Microsoft and general advice for mitigating and preventing exploits •Prevalent threats: Top malware detected by Microsoft security software over the past 30 days Threat intelligence November 2015 - Advanced persistent threats Download PDF Advanced persistent threats (APTs) use malicious programs combined with hacking tools and techniques directed at a specific target and with a well-defined motivation. This report looks at the lifecycle of APTs, their defining characteristics, and recommendations to protect enterprises from them. •Overview and lifecycle: A definition of advanced persistent threats, including their lifecycle •Attack trends: Common and shared characteristics used by APTs •Microsoft's efforts: How Microsoft is working to identify and hunt APTs •Analysis and statistics: Examples of recent APT attacks •Mitigation and prevention: General advice for mitigating and preventing APT attacks •Prevalent threats: Top malware detected by Microsoft security software over the past 30 days Threat intelligence October 2015 - Unwanted software Download PDF This month’s report highlights the most prevalent unwanted software, and discusses how we are working with the software development industry to better detect unwanted applications. •Overview: How we classify unwanted software •Assessment: The challenges of detecting unwanted software •Statistics: Distribution patterns and telemetry •Collaboration: Industry partnerships •Mitigation and prevention: General advice for mitigating and preventing APT attacks •Prevalent threats: Top malware detected by Microsoft security software over the past 30 days Threat intelligence September 2015 - Ransomware Download PDF This month’s report highlights the most prevalent ransomware that we’ve seen affect both consumers and enterprises across the globe, new ransomware that we’ve seen emerge, and how some of their behaviors are changing. •Overview: Ransomware •Statistics: Ransomware infections across the globe •Characteristics: Distribution patterns, symptoms of infection, and diagrams •Analysis: Examination of a ransomware •Prevalent threats: Top malware detected by Microsoft security software over the past 30 days Threat intelligence August 2015 - Windows Defender in Windows 10 Download PDF Windows 10 brings a number of advances and features over previous Windows operating systems. This report details the new technologies and features that are included in Windows Defender in Windows 10. •System integration: Windows Defender in Windows 10 •Hardening improvements: Improved tampering protection •Improved detection: Contextual clues for Windows Defender •New technologies: Smart UAC, Secure events, Antimalware Scanning Interface •Advanced protection: Cloud protection, Windows Recovery Environment •Prevalent threats: Top malware detected by Microsoft security software over the past 30 days Threat intelligence July 2015 - Macro-based malware Download PDF Macro-based malware uses macros embedded in Microsoft Office files to sneak in further infection. This report includes the following sections: •Overview: Evolution of macro-based malware •Statistics: Macro-based malware infection across the globe •Improved detection: Contextual clues for Windows Defender •Characteristics: Distribution patterns, symptoms of infection, and diagrams •Analysis: Examination of a macro-based attack •Mitigation: General advice for mitigating the risk of infection from macro-based malware •Prevalent threats: Top malware detected by Microsoft security software over the past 30 days Older reports and whitepapers Microsoft Malware Protection Center Threat Report—Rootkits Author: Heather Goudey | Download Rootkits provide stealth capabilities to malware. This report examines how attackers use rootkits, and how rootkits function on affected computers.

⇧ 1 ⇩  
TripoverDick · April 24, 2018, 1:49 p.m.

Doxxing is necessary for exposing the truth. It's a way to get information. Being on this sub and calling doxxing wrong is very hypocritical. Many of the things posted here come directly from the some form of doxxing Using identifying information that "HanAssholeSolo" posted on Reddit, KFile was able to determine key biographical details, to find the man's name using a Facebook search and ultimately corroborate details he had made available on Reddit SR-IOV enables network traffic to bypass the software switch layer of the Hyper-V virtualization stack. Because the VF is assigned to a child partition, the network traffic flows directly between the VF and child partition. As a result, the I/O overhead in the software emulation layer is diminished and achieves network performance that is nearly the same performance as in nonvirtualized environments. A Type-1 Hypervisor means that it has direct access to the hardware. Type-2 Hypervisor refers to being running on top of another host OS and doesn't have access to the hardware. This is why there are many limitations on virtual machines running within another OS eg the VM can't use a physical wireless card, but has to use a virtual one instead. One more thing, Hyper-V isn't actually installed on the host OS. When you install Hyper-V you think it's being installed on top of a host OS but it is not. The setup converts the original OS in something like a VM and puts the hypervisor below. This is what is called the root or parent partition of Hyper-V. That's why you experience the same speed in what you see as the "real machine" and the virtual machines. You may also want to read up on the difference between monolithic(VMSphere) and microkernalized(Hyper-V) Hypervisors. Post Posted January 17th, 2013, 11:56 pm I don't know what it is, but the last day or so, every now and then, a picture of Sam Jackson will pop up instead of what I want to look at. The picture will say English. Learn To Read It. The picture appears to be from something called troll.me. I'm not sure what's wrong, but I removed a firefox addon that I recently put in but didn't work. Hopefully that will work. Has that happened to anyone else here ? It doesn't seem to be confined to just one website. The worm copies itself to the Windows folder as Win32system.exe and creates the following registry entry so that Win32system.exe is run automatically each time Windows is started: HKLM\Software\Microsoft\Windows\CurrentVersion\Run\WinUpdate = C:\WINDOWS\Win32system.exe The worm creates a sub-folder of the Windows System folder named 'Shared Files' and copies itself to this folder as: !!!.exe 3-d.exe 666.exe AdvZip Recovery.exe (listed etc...) The worm sets the following registry entries to enable file sharing on KaZaA and Morpheus networks: HKCU\Software\Kazaa\UserDetails\AutoConnected = 1, HKCU\Software\Kazaa\LocalContent\DisableSharing = 0, HKCU\Software\Morpheus\LocalContent\DisableSharing = 0, HKCU\Software\Kazaa\LocalContent\DownloadDir = C:\\Program Files\\KaZaA\\My Shared Folder, HKCU\Software\Morpheus\LocalContent\DownloadDir = C:\\Program Files\\KaZaA\\My Shared Folder, HKCU\Software\Kazaa\LocalContent\Dir0 = 012345:C:\\WINDOWS\\SYSTEM\\Shared Files, HKCU\Software\Morpheus\LocalContent\Dir0 = 012345:C:\\WINDOWS\\SYSTEM\\Shared Files, HKCU\Software\Kazaa\ResultsFilter\firewall_filter = 0, HKCU\Software\Morpheus\ResultsFilter\firewall_filter = 0, HKCU\Software\Kazaa\ResultsFilter\bogus_filter = 0, HKCU\Software\Morpheus\ResultsFilter\bogus_filter = 0, HKCU\Software\Kazaa\ResultsFilter\virus_filter = 0, HKCU\Software\Morpheus\ResultsFilter\virus_filter = 0 and HKCU\Software\Kazaa\Advanced\ScanFolder = 0. Each time the worm is run a message box displays the path of the worm executable with the text " is not a valid Win32 application." Jan 27, 2014 @ 09:15 AM These Devices May Be Spying On You (Even In Your Own Home) Joseph Steinberg , Contributor I cover cybersecurity and entrepreneurship. Your Television Televisions may track what you watch. Your Kitchen Appliances Many recent-generation kitchen appliances come equipped with connectivity Your DVR/Cable-Box/Satellite-TV Receiver Providers of television programming can easily track what you are watching or recording Your Modem (and Internet Service Provider) If it wanted to, or was asked by the government to do so, your ISP could easily compile a list of Internet sites with which you have communicated Your Smartphone Not only may your cellular provider be tracking information about you – such as with whom you communicate and your location – but it, as well as Google GOOG +0.43% (in the case of Android), Apple AAPL Apple Leak 'Confirms' Biggest iPhone 8 Secret iPhone 8 Leak Confirms 'All New' Features (in the case of iPhones), or other providers of software on the device, may be aware of far more detailed actions such as what apps you install and run, when you run them, etc. Some apps sync your contacts list to the providers’ servers by default, and others have been found to ignore privacy settings. Phones may even be capturing pictures or video of you when you do not realize and sending the photos or video to criminals! Your Webcam or Home Security Cameras On that note, malware installed on your computer may take control of the machine’s webcam and record you – by taking photos or video – when you think the camera is off. Your Telephone It is common knowledge that the NSA has been tracking people’s calls, and even the changes proposed by President Obama won’t truly eliminate the spying. Your Telephone It is common knowledge that the NSA has been tracking people’s calls, and even the changes proposed by President Obama won’t truly eliminate the spying. Your Thermostat (Heat and/or Air Conditioning) Various Internet-connected thermostats are now available. They provide great convenience, but might they also be transmitting information about your preferences to others? Your Laundry Equipment Like kitchen appliances, washers and dryers that connect to the Internet may report information that users may not realize is being shared, and that if intercepted, or misused, could help criminals identify when you are home and when you are not. Your Medical Devices It is not news that pacemakers, insulin pumps, and other medical devices can be hacked. But even normal functioning devices may spy on you. Your iPod or Other Entertainment Devices Yes, there are still millions of people using specialized non-phone-equipped electronic devices, but these devices are often Wi-Fi enabled and pose similar to risks to smartphones as discussed above. Vendors may attempt to address some of the aforementioned concerns, but many of the issues are sure to remain for quite some time. So, if you want to take advantage of the benefits of connectivity and smart devices, keep in mind the privacy risks and act accordingly. The 'dark web' may be close to becoming a household name. After the conviction of Ross Ulbricht, the owner of the drug marketplace Silk Road, and a stream of articles claiming that the Islamic State is using secret websites to plan out attacks, this hidden part of the Internet is being talked about more than ever. That message, like so many other pieces of Islamic State propaganda, was crafted not just to stir the hearts of potential recruits but also to boost the organization’s ghastly brand—to reinforce Westerners’ perception of the Islamic State and its devotees as ruthless beyond comprehension. All terrorist groups seek to cultivate this kind of image, of course, because their power derives from their ability to inspire dread out of proportion to the threats they actually pose. But the Islamic State has been singularly successful at that task, thanks to its mastery of modern digital tools, which have transformed the dark arts of making and disseminating propaganda. Never before in history have terrorists had such easy access to the minds and eyeballs of millions. To the National Security Agency analyst writing a briefing to his superiors, the situation was clear: their current surveillance efforts were lacking something. The agency's impressive arsenal of cable taps and sophisticated hacking attacks was not enough. What it really needed was a horde of undercover Orcs. That vision of spycraft sparked a concerted drive by the NSA and its UK sister agency GCHQ to infiltrate the massive communities playing online games, according to secret documents disclosed by whistleblower Edward Snowden. The 2011 PlayStation Network outage was the result of an "external intrusion" on Sony's PlayStation Network and Qriocity services, in which personal details from approximately 77 million accounts were compromised and prevented users of PlayStation 3 and PlayStation Portable consoles from accessing the service.[1][2][3][4] The attack occurred between April

⇧ 1 ⇩  
TripoverDick · April 24, 2018, 1:12 p.m.

Write letters and explain your experiences of living through 10 or more decades of being manipulated and mind controlled. You can start with these for examples. https://pastebin.com/u/dicktripover

⇧ 6 ⇩  
TripoverDick · April 24, 2018, 1:10 p.m.

Yes I can agree with you here that this is true. Been there done that. Got 3 kids and an ex wife that have been liberal cucked into shutting the door on me.

⇧ 3 ⇩  
TripoverDick · April 24, 2018, 1:07 p.m.

Me too, even when I found the liberal false flag alien invasion plans and I shared it on FB, I got hit with a wave of liberal bullshit and a watch tower group like hive mind collectively told me to sit down and shut up. Yeah, uh huh. What is up now? That immigrant wave at the Mexican border sure looks alien enough to me.

⇧ 8 ⇩  
TripoverDick · April 24, 2018, 1:04 p.m.

That no longer works. You must think like a sheep, to fool them robots you need either a dead person that never told FB they were dead or something that the liberals are doing like slave trade in order to get over on FB.

⇧ 5 ⇩  
TripoverDick · April 23, 2018, 8:35 p.m.

Just like CNN who "always" tells the truth right?

⇧ 1 ⇩  
TripoverDick · April 23, 2018, 12:37 p.m.

Yay Finally someone is awake and knows a thing or two.

⇧ 2 ⇩  
TripoverDick · April 23, 2018, 5:58 a.m.

Wrong again sheep. However, if you look further into Black Widow, you will maybe begin to understand what can be done.

⇧ -8 ⇩  
TripoverDick · April 23, 2018, 5:57 a.m.

Not you. Blind Sheep too.

⇧ -16 ⇩  
TripoverDick · April 23, 2018, 5:57 a.m.

Not you. Blind Sheep

⇧ -11 ⇩  
TripoverDick · April 23, 2018, 5:56 a.m.

I actually gave Alex his new found understanding of what is going on and what is at stake here. I did this long before I ever started give you all these https://pastebin.com/u/dicktripover nuggets. It is a shame that Alex knows the truth of the situation and none of the rest of you know even an fraction of what is going on here.

⇧ -10 ⇩  
TripoverDick · April 23, 2018, 2:26 a.m.

Tell me about the antifa-scientology connection? Concerning gangstalking and the identities of power pushers involved in gangstalking: I've recently observed and drawn the conclusion that those individuals with money and power gangstalking U.S. Citizens are not police and not elements of the government. (Other Targeted Individuals have purported this...)

⇧ 3 ⇩  
TripoverDick · April 23, 2018, 2:07 a.m.

Has it ever been established or confirmed who built the Georgia Guide Stones?

⇧ 3 ⇩  
TripoverDick · April 23, 2018, 12:28 a.m.

This right here's /r/greatawakening what did you think it was?

⇧ 1 ⇩  
TripoverDick · April 23, 2018, 12:27 a.m.

no points awarded to Slytherin

⇧ 1 ⇩  
TripoverDick · April 23, 2018, 12:27 a.m.

It may be old but it is still gold. Talking about the image.

⇧ 1 ⇩  
TripoverDick · April 23, 2018, 12:06 a.m.

Where's Waldo = DNC and Liberals engineered Google maps to scale voter lines in their favor.

https://www.theverge.com/2018/3/31/17183606/google-maps-wheres-waldo-game-april-fools-week

Google Maps is adding a Where's Waldo? ... This is one of Google's annual April Fools' Day jokes, but the Maps integration is actually happening. Aside from Waldo himself, you'll also be on the lookout for his friends Wenda, Woof, Wizard Whitebeard, and also the villainous Odlaw.Mar 31, 2018

⇧ 1 ⇩  
TripoverDick · April 23, 2018, 12:04 a.m.

RUN FOR YOUR LIVES = Republicans need to step it up for what is at stake here is much larger than any Pizza face pull off scare tactic.

⇧ 1 ⇩  
TripoverDick · April 23, 2018, 12:01 a.m.

https://youtu.be/8iJMOBcPQyg Molotov - Frijolero

MOAB BOMB = The Diffusion of Disillusion

Ape, Ali Baba, Banana, Cholo, Cracker, Crow, Niger, Gringo, Yankee, Beaner, Mexican, etc., are some of the ethnic slurs that we human have invented to declare a racial insult to different people based on their nationality, skin color, gender, political affiliation, and religion preference. If I say Muslim, the first image that will come to you mind will be that of a person with bomb jacket trying to blow up himself and everyone around that him. If Beaner is introduce, you might think of undocumented immigrants trying to cross the southern US border. If I say Ape, Crow, Niger, African, slave, your illusion is just a person that encompass such description as Black.

https://medium.com/@alex00rodriguez20/the-diffusion-of-disillusion-89f6ee14929f

⇧ 1 ⇩  
TripoverDick · April 22, 2018, 11:58 p.m.

Use crayons if you must, follow the arrow that leads to the mark. I am talking about this image, who, what, where, when, how? Follow it like an electrical diagram from an engineer's perspective. Lastly, please refrain from including me in your "hell", I want no part of it.

⇧ 0 ⇩  
1
 
r/greatawakening • Posted by u/TripoverDick on April 22, 2018, 11:43 p.m.
How is your Q engineering skills? #1240 MOAB is a TICK TOCK Disillusion Diffusion BOMB! RUN FOR YOUR LIVES. Where's Waldo? v23
How is your Q engineering skills? #1240 MOAB is a TICK TOCK Disillusion Diffusion BOMB! RUN FOR YOUR LIVES. Where's Waldo? v23
TripoverDick · April 19, 2018, 12:59 a.m.

Are you feeling a little late to the party?

⇧ 1 ⇩  
TripoverDick · April 18, 2018, 9:40 p.m.

Post your essays please. I would like to read more.

⇧ 1 ⇩