[16 Jan 2014] The Debate - Privacy Piracy - English
Imagine if you\\\'re not connected to the internet, yet your computer is still vulnerable in being spied on: That is the latest leak by former NSA...
Imagine if you\\\'re not connected to the internet, yet your computer is still vulnerable in being spied on: That is the latest leak by former NSA contractor Edward Snowden: that the US National Security Agency (NSA) used secret technology to spy on computers that were not even connected to the internet. In this edition of the debate, we\\\'ll discuss how this takes spying on ordinary citizens to a whole new level, even though NSA claims targets included the Chinese and Russian military as well as drug cartels. We\\\'ll also further disclose how this violates privacy laws, not to mention the US constitution.
25m:13s
6006
[26 Dec 2013] Iran charity organization provides support to Somali women...
After months-long training, Iran\\\'s Imam Khomeini Relief Foundation and the Iranian embassy in Somalia held the graduation ceremony of more than...
After months-long training, Iran\\\'s Imam Khomeini Relief Foundation and the Iranian embassy in Somalia held the graduation ceremony of more than fifty women and girls in Mogadishu on Wednesday. Through its training centers in Mogadishu, Iran has assisted Somali women by offering them training in the fields of tailoring and use of computers. The women and girls were issued with sewing machines and certificates upon completion of their respective courses in a colorful event that was held in capital city\\\'s Hamar Weyne district.
2m:7s
6112
Dhul Qarnayn : The Ultimate Journey - Part 4 I French sub English
So, my brothers and sisters, we can hear like you and me, we have heard it before, that it is the little voice of Iblis that whispers in our ears...
So, my brothers and sisters, we can hear like you and me, we have heard it before, that it is the little voice of Iblis that whispers in our ears and that\'s right, that\'s the voice of the devil. But today, how this verse makes sense, as it has never made so much sense, because that voice of Iblis, it is evident all over the world. Through what intermediary? Well, through communication tools: Television, information that is broadcast on television, telephones, computers, etc... All means of communication that allow to the machine, to Iblis, through the machine of artificial intelligence. And that he works hard, as we say, so that this voice is permanently broadcasted, by radio waves, by satellites, etc... And that voice is always there.
And incite with your voice those among them that you can, he says those you can, because you know that in the rest of the verse, there\'s one part (among people) he can\'t have. And gather against them your cavalry and your infantry, and how can you gather your cavalry and infantry? By sharing with them, how? Through wealth, it means, through money. And through what? Through the children.
https://www.timetowitness.com/dhul-qarnayn-the-ultimate-journey-part-4/
📺 Check out our Playlists
Science & Technology : https://link.timetowitness.com/play/science
Eschatology : https://link.timetowitness.com/play/eschatology
Spirituality: https://link.timetowitness.com/play/spirituality
Neom Project: https://link.timetowitness.com/play/neom
🔴 Don\'t forget to 🔴
🔵 Join our Telegram channel : https://link.timetowitness.com/telegram
✅ Subscribe to our channel : https://link.timetowitness.com/youtube/subscribe
📩 Subscribe to our newsletter : https://link.timetowitness.com/email/subscribe
🔴 Follow us on 🔴
🌐 Our Blog : https://www.timetowitness.com/
📢 Facebook : https://link.timetowitness.com/facebook
📢 Twitter : https://link.timetowitness.com/twitter
📢 Pinterest : https://link.timetowitness.com/pinterest
📢 Reddit : https://link.timetowitness.com/reddit
📢 Instagram : https://link.timetowitness.com/instagram
PLEASE NOTE:
Any of the views expressed by the speakers do not necessarily represent the views of Time2Witness or any other projects it may have or intend to do. Time2Witness and it\'s affiliates do not advocate nor condone any unlawful activity towards any individual or community.
10m:47s
2360
Flash Military Radar Screen Animation Actionscript 3.0 Tutorial CS3 CS4...
Source Code: http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=1132
Adam Khoury shows Flashers how to construct their own military...
Source Code: http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=1132
Adam Khoury shows Flashers how to construct their own military radar screen animations from scratch. Complete with moving enemies and sound.
Lesson @ http:www.developphp.com ... where tons more tutorials reside.
23m:6s
5687
How computers translate human language - Ioannis Papachimonas - English
View full lesson: http://ed.ted.com/lessons/how-computers-translate-human-language-ioannis-papachimonas
Is a universal translator possible in...
View full lesson: http://ed.ted.com/lessons/how-computers-translate-human-language-ioannis-papachimonas
Is a universal translator possible in real life? We already have many programs that claim to be able to take a word, sentence, or entire book in one language and translate it into almost any other. The reality, however, is a bit more complicated. Ioannis Papachimonas shows how these machine translators work, and explains why they often get a bit mixed up.
Lesson by Ioannis Papachimonas, animation by NOWAY Video Club.
4m:44s
1771
How to Download & Install Adobe Flash Player - English
To download and install Adobe Flash Player, visit adobe.com, select the "Downloads" section, find the Flash Player, and follow the...
To download and install Adobe Flash Player, visit adobe.com, select the "Downloads" section, find the Flash Player, and follow the instructions for downloading it to the computer. Wash flash videos using the Adobe Flash Player with helpful tips from a software developer in this free video on computers.
2m:23s
6998
Recent Cyber Attacks On Irans Infrastructure - US & israel likely...
US, Israel behind cyber-attack on Iran?
Experts say a computer worm that has targeted Iran's industrial sites may be part of a cyber-attack by...
US, Israel behind cyber-attack on Iran?
Experts say a computer worm that has targeted Iran's industrial sites may be part of a cyber-attack by the US or Israel against the Islamic Republic.
The Stuxnet, a computer worm that is viewed as potentially the most dangerous piece of computer malware discovered, has targeted industrial computers in Iran.
The complex worm recognizes a specific facility's control network and then destroys it.
Experts say the worm, which has a very sophisticated design, may have been created by a state-sponsored organization in the US or Israel to target specific control software being used in the Iranian industrial sector, including the Bushehr plant -- Iran's first nuclear power plant.
"All the details so far to me scream that this was created by a nation-state," Bloomberg quoted Frank Rieger, technology chief for a maker of encrypted mobile phones, as saying.
Iran's nuclear facilities may have been the targets, said both Rieger and Richard Falkenrath of the Chertoff Group, a Washington-based security advisory firm.
"It is theoretically possible that the US government did this," Falkenrath said during an interview with Bloomberg Television on Saturday. "But in my judgment, that's a very remote possibility. It's more likely that Israel did it."
Meanwhile, a top US cyber-security official claims that the US does not know who is behind the cyber-attack and is still analyzing the worm.
"We've conducted analysis on the software itself," Sean McGurk, director of the National Cybersecurity and Communications Integration Center, told reporters on Friday.
"It's very difficult to say 'This is what it was targeted to do,'" he said, adding the center was not looking for those behind the attack but it rather sought to prevent the spread.
The US and Israel accuse Iran of developing a nuclear weapons program. Iran rejects the allegation, saying its nuclear program is solely for peaceful purposes.
The International Atomic Energy Agency, in its several reports, has confirmed that it continues to verify the country's non-diversion from its peaceful path.
Article Source: http://www.presstv.ir/detail/143868.html
0m:40s
11617
Security Education using Virtualization and Remote Labs - English
Erich Spengler and John Sands, from Moraine Valley Community College and CSSIA, give a presentation on Security Education using Virtualization and...
Erich Spengler and John Sands, from Moraine Valley Community College and CSSIA, give a presentation on Security Education using Virtualization and Remote Labs at the 2011 National and Mid-Pacific ICT Center Winter Educator Conference at City College of San Francisco.
41m:4s
5747