Scams in Binary Options - Blacklist of Brokers and Services

Part 2: Tools & Info for Sysadmins - Mega List of Tips, Tools, Books, Blogs & More

(continued from part 1)
Unlocker is a tool to help delete those irritating locked files that give you an error message like "cannot delete file" or "access is denied." It helps with killing processes, unloading DLLs, deleting index.dat files, as well as unlocking, deleting, renaming, and moving locked files—typically without requiring a reboot.
IIS Crypto's newest version adds advanced settings; registry backup; new, simpler templates; support for Windows Server 2019 and more. This tool lets you enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows and reorder SSL/TLS cipher suites from IIS, change advanced settings, implement best practices with a single click, create custom templates and test your website. Available in both command line and GUI versions.
RocketDock is an application launcher with a clean interface that lets you drag/drop shortcuts for easy access and minimize windows to the dock. Features running application indicators, multi-monitor support, alpha-blended PNG and ICO icons, auto-hide and popup on mouse over, positioning and layering options. Fully customizable, portable, and compatible with MobyDock, ObjectDock, RK Launcher and Y'z Dock skins. Works even on slower computers and is Unicode compliant. Suggested by lieutenantcigarette: "If you like the dock on MacOS but prefer to use Windows, RocketDock has you covered. A superb and highly customisable dock that you can add your favourites to for easy and elegant access."
Baby FTP Server offers only the basics, but with the power to serve as a foundation for a more-complex server. Features include multi-threading, a real-time server log, support for PASV and non-PASV mode, ability to set permissions for download/upload/rename/delete/create directory. Only allows anonymous connections. Our thanks to FatherPrax for suggesting this one.
Strace is a Linux diagnostic, debugging and instructional userspace tool with a traditional command-line interface. Uses the ptrace kernel feature to monitor and tamper with interactions between processes and the kernel, including system calls, signal deliveries and changes of process state.
exa is a small, fast replacement for ls with more features and better defaults. It uses colors to distinguish file types and metadata, and it recognizes symlinks, extended attributes and Git. All in one single binary. phils_lab describes it as "'ls' on steroids, written in Rust."
rsync is a faster file transfer program for Unix to bring remote files into sync. It sends just the differences in the files across the link, without requiring both sets of files to be present at one of the ends. Suggested by zorinlynx, who adds that "rsync is GODLY for moving data around efficiently. And if an rsync is interrupted, just run it again."
Matter Wiki is a simple WYSIWYG wiki that can help teams store and collaborate. Every article gets filed under a topic, transparently, so you can tell who made what changes to which document and when. Thanks to bciar-iwdc for the recommendation.
LockHunter is a file unlocking tool that enables you to delete files that are being blocked for unknown reasons. Can be useful for fighting malware and other programs that are causing trouble. Deletes files into the recycle bin so you can restore them if necessary. Chucky2401 finds it preferable to Unlocker, "since I am on Windows 7. There are no new updates since July 2017, but the last beta was in June of this year."
aria2 is a lightweight multi-source command-line download utility that supports HTTP/HTTPS, FTP, SFTP, BitTorrent and Metalink. It can be manipulated via built-in JSON-RPC and XML-RPC interfaces. Recommended by jftuga, who appreciates it as a "cross-platform command line downloader (similar to wget or curl), but with the -x option can run a segmented download of a single file to increase throughput."
Free Services
Temp-Mail allows you to receive email at a temporary address that self-destructs after a certain period of time. Outwit all the forums, Wi-Fi owners, websites and blogs that insist you register to use them. Petti-The-Yeti says, "I don't give any company my direct email anymore. If I want to trial something but they ask for an email signup, I just grab a temporary email from here, sign up with it, and wait for the trial link or license info to come through. Then, you just download the file and close the website."
Duck DNS will point a DNS (sub domains of duckdns.org) to an IP of your choice. DDNS is a handy way for you to refer to a serverouter with an easily rememberable name for situations when the server's ip address will likely change. Suggested by xgnarf, who finds it "so much better for the free tier of noip—no 30-day nag to keep your host up."
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed reports. The Community Edition of Joe Sandbox Cloud allows you to run a maximum of 6 analyses per month, 3 per day on Windows, Linux and Android with limited analysis output. This one is from dangibbons94, who wanted to "share this cool service ... for malware analysis. I usually use Virus total for URL scanning, but this goes a lot more in depth. I just used basic analysis, which is free and enough for my needs."
Hybrid Analysis is a malware analysis service that detects and analyzes unknown threats for the community. This one was suggested by compupheonix, who adds that it "gets you super detailed reports... it's about the most fleshed out and detailed one I can find."
JustBeamIt is a file-transfer service that allows you to send files of any size via a peer-to-peer streaming model. Simply drag and drop your file and specify the recipient's email address. They will then receive a link that will trigger the download directly from your computer, so the file does not have to be uploaded to the service itself. The link is good for one download and expires after 10 minutes. Thanks to cooljacob204sfw for the recommendation!
ShieldsUP is a quick but powerful internet security checkup and information service. It was created by security researcher Steve Gibson to scan ports and let you know which ones have been opened through your firewalls or NAT routers.
Firefox Send is an encrypted file transfer service that allows you to share files up to 2.5GB from any browser or an Android app. Uses end-to-end encryption to keep data secure and offers security controls you can set. You can determine when your file link expires, the number of downloads, and whether to add a password. Your recipient receives a link to download the file, and they don’t need a Firefox account. This one comes from DePingus, who appreciates the focus on privacy. "They have E2E, expiring links, and a clear privacy policy."
Free DNS is a service where programmers share domain names with one another at no cost. Offers free hosting as well as dynamic DNS, static DNS, subdomain and domain hosting. They can host your domain's DNS as well as allowing you to register hostnames from domains they're hosting already. If you don't have a domain, you can sign up for a free account and create up to 5 subdomains off the domains others have contributed and point these hosts anywhere on the Internet. Thanks to 0x000000000000004C (yes, that's a username) for the suggestion!
ANY.RUN is an interactive malware analysis service for dynamic and static research of the majority of threats in any environment. It can provide a convenient in-depth analysis of new, unidentified malicious objects and help with the investigation of incidents. ImAshtonTurner appreciates it as "a great sandbox tool for viewing malware, etc."
Plik is a scalable, temporary file upload system similar to wetransfer that is written in golang. Thanks go to I_eat_Narwhals for this one!
Free My IP offers free, dynamic DNS. This service comes with no login, no ads, no newsletters, no links to click and no hassle. Kindly suggested by Jack of All Trades.
Mailinator provides free, temporary email inboxes on a receive-only, attachment-free system that requires no sign-up. All @mailinator.com addresses are public, readable and discoverable by anyone at any time—but are automatically deleted after a few hours. Can be a nice option for times when you to give out an address that won't be accessible longterm. Recommended by nachomountain, who's been using it "for years."
Magic Wormhole is a service for sending files directly with no intermediate upload, no web interface and no login. When both parties are online you with the minimal software installed, the wormhole is invoked via command line identifying the file you want to send. The server then provides a speakable, one-time-use password that you give the recipient. When they enter that password in their wormhole console, key exchange occurs and the download begins directly between your computers. rjohnson99 explains, "Magic Wormhole is sort of like JustBeamIt but is open-source and is built on Python. I use it a lot on Linux servers."
EveryCloud's Free Phish is our own, new Phishing Simulator. Once you've filled in the form and logged in, you can choose from lots of email templates (many of which we've coped from what we see in our Email Security business) and landing pages. Run a one-off free phish, then see who clicked or submitted data so you can understand where your organization is vulnerable and act accordingly.
Hardening Guides
CIS Hardening Guides contain the system security benchmarks developed by a global community of cybersecurity experts. Over 140 configuration guidelines are provided to help safeguard systems against threats. Recommended by cyanghost109 "to get a start on looking at hardening your own systems."
Podcasts
Daily Tech News is Tom Merrit's show covering the latest tech issues with some of the top experts in the field. With the focus on daily tech news and analysis, it's a great way to stay current. Thanks to EmoPolarbear for drawing it to our attention.
This Week in Enterprise Tech is a podcast that features IT experts explaining the complicated details of cutting-edge enterprise technology. Join host Lou Maresca on this informative exploration of enterprise solutions, with new episodes recorded every Friday afternoon.
Security Weekly is a podcast where a "bunch of security nerds" get together and talk shop. Topics are greatly varied, and the atmosphere is relaxed and conversational. The show typically tops out at 2 hours, which is perfect for those with a long commute. If you’re fascinated by discussion of deep technical and security-related topics, this may be a nice addition to your podcast repertoire.
Grumpy Old Geeks—What Went Wrong on the Internet and Who's To Blame is a podcast about the internet, technology and geek culture—among other things. The hosts bring their grumpy brand of humor to the "state of the world as they see it" in these roughly hour-long weekly episodes. Recommended by mkaxsnyder, who enjoys it because, "They are a good team that talk about recent and relevant topics from an IT perspective."
The Social-Engineer Podcast is a monthly discussion among the hosts—a group of security experts from SEORG—and a diverse assortment of guests. Topics focus around human behavior and how it affects information security, with new episodes released on the second Monday of every month. Thanks to MrAshRhodes for the suggestion.
The CyberWire podcasts discuss what's happening in cyberspace, providing news and commentary from industry experts. This cyber security-focused news service delivers concise, accessible, and relevant content without the gossip, sensationalism, and the marketing buzz that often distract from the stories that really matter. Appreciation to supermicromainboard for the suggestion.
Malicious Life is a podcast that tells the fascinating—and often unknown—stories of the wildest hacks you can ever imagine. Host Ran Levi, a cybersecurity expert and author, talks with the people who were actually involved to reveal the history of each event in depth. Our appreciation goes to peraphon for the recommendation.
The Broadcast Storm is a podcast for Cisco networking professionals. BluePieceOfPaper suggests it "for people studying for their CCNA/NP. Kevin Wallace is a CCIE Collaboration so he knows his *ishk. Good format for learning too. Most podcasts are about 8-15 mins long and its 'usually' an exam topic. It will be something like "HSPR" but instead of just explaining it super boring like Ben Stein reading a powerpoint, he usually goes into a story about how (insert time in his career) HSPR would have been super useful..."
Software Engineering Radio is a podcast for developers who are looking for an educational resource with original content that isn't recycled from other venues. Consists of conversations on relevant topics with experts from the software engineering world, with new episodes released three to four times per month. a9JDvXLWHumjaC tells us this is "a solid podcast for devs."
Books
System Center 2012 Configuration Manager is a comprehensive technical guide designed to help you optimize Microsoft's Configuration Manager 2012 according to your requirements and then to deploy and use it successfully. This methodical, step-by-step reference covers: the intentions behind the product and its role in the broader System Center product suite; planning, design, and implementation; and details on each of the most-important feature sets. Learn how to leverage the user-centric capabilities to provide anytime/anywhere services & software, while strengthening control and improving compliance.
Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam is a practical guide to network infrastructure. Provides an in-depth view of routers and routing, switching (with Cisco Catalyst and Nexus switches as examples), SOHO VoIP and SOHO wireless access point design and configuration, introduction to IPv6 with configuration examples, telecom technologies in the data-networking world (including T1, DS3, frame relay, and MPLS), security, firewall theory and configuration, ACL and authentication, Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ), IP address allocation, Network Time Protocol (NTP) and device failures.
Beginning the Linux Command Line is your ally in mastering Linux from the keyboard. It is intended for system administrators, software developers, and enthusiastic users who want a guide that will be useful for most distributions—i.e., all items have been checked against Ubuntu, Red Hat and SUSE. Addresses administering users and security and deploying firewalls. Updated to the latest versions of Linux to cover files and directories, including the Btrfs file system and its management and systemd boot procedure and firewall management with firewalld.
Modern Operating Systems, 4th Ed. is written for students taking intro courses on Operating Systems and for those who want an OS reference guide for work. The author, an OS researcher, includes both the latest materials on relevant operating systems as well as current research. The previous edition of Modern Operating Systems received the 2010 McGuffey Longevity Award that recognizes textbooks for excellence over time.
Time Management for System Administrators is a guide for organizing your approach to this challenging role in a way that improves your results. Bestselling author Thomas Limoncelli offers a collection of tips and techniques for navigating the competing goals and concurrent responsibilities that go along with working on large projects while also taking care of individual user's needs. The book focuses on strategies to help with daily tasks that will also allow you to handle the critical situations that inevitably require your attention. You'll learn how to manage interruptions, eliminate time wasters, keep an effective calendar, develop routines and prioritize, stay focused on the task at hand and document/automate to speed processes.
The Practice of System and Network Administration, 3rd Edition introduces beginners to advanced frameworks while serving as a guide to best practices in system administration that is helpful for even the most advanced experts. Organized into four major sections that build from the foundational elements of system administration through improved techniques for upgrades and change management to exploring assorted management topics. Covers the basics and then moves onto the advanced things that can be built on top of those basics to wield real power and execute difficult projects.
Learn Windows PowerShell in a Month of Lunches, Third Edition is designed to teach you PowerShell in a month's worth of 1-hour lessons. This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and it includes v5 features like PowerShellGet. For PowerShell v3 and up, Windows 7 and Windows Server 2008 R2 and later.
Troubleshooting with the Windows Sysinternals Tools is a guide to the powerful Sysinternals tools for diagnosing and troubleshooting issues. Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis provide a deep understanding of Windows core concepts that aren’t well-documented elsewhere along with details on how to use Sysinternals tools to optimize any Windows system’s reliability, efficiency, performance and security. Includes an explanation of Sysinternals capabilities, details on each major tool, and examples of how the tools can be used to solve real-world cases involving error messages, hangs, sluggishness, malware infections and more.
DNS and BIND, 5th Ed. explains how to work with the Internet's distributed host information database—which is responsible for translating names into addresses, routing mail to its proper destination, and listing phone numbers according to the ENUM standard. Covers BIND 9.3.2 & 8.4.7, the what/how/why of DNS, name servers, MX records, subdividing domains (parenting), DNSSEC, TSIG, troubleshooting and more. PEPCK tells us this is "generally considered the DNS reference book (aside from the RFCs of course!)"
Windows PowerShell in Action, 3rd Ed. is a comprehensive guide to PowerShell. Written by language designer Bruce Payette and MVP Richard Siddaway, this volume gives a great introduction to Powershell, including everyday use cases and detailed examples for more-advanced topics like performance and module architecture. Covers workflows and classes, writing modules and scripts, desired state configuration and programming APIs/pipelines.This edition has been updated for PowerShell v6.
Zero Trust Networks: Building Secure Systems in Untrusted Networks explains the principles behind zero trust architecture, along with what's needed to implement it. Covers the evolution of perimeter-based defenses and how they evolved into the current broken model, case studies of zero trust in production networks on both the client and server side, example configurations for open-source tools that are useful for building a zero trust network and how to migrate from a perimeter-based network to a zero trust network in production. Kindly recommended by jaginfosec.
Tips
Here are a couple handy Windows shortcuts:
Here's a shortcut for a 4-pane explorer in Windows without installing 3rd-party software:
(Keep the win key down for the arrows, and no pauses.) Appreciation goes to ZAFJB for this one.
Our recent tip for a shortcut to get a 4-pane explorer in Windows, triggered this suggestion from SevaraB: "You can do that for an even larger grid of Windows by right-clicking the clock in the taskbar, and clicking 'Show windows side by side' to arrange them neatly. Did this for 4 rows of 6 windows when I had to have a quick 'n' dirty "video wall" of windows monitoring servers at our branches." ZAFJB adds that it actually works when you right-click "anywhere on the taskbar, except application icons or start button."
This tip comes courtesy of shipsass: "When I need to use Windows Explorer but I don't want to take my hands off the keyboard, I press Windows-E to launch Explorer and then Ctrl-L to jump to the address line and type my path. The Ctrl-L trick also works with any web browser, and it's an efficient way of talking less-technical people through instructions when 'browse to [location]' stumps them."
Clear browser history/cookies by pressing CTRL-SHIFT-DELETE on most major browsers. Thanks go to synapticpanda, who adds that this "saves me so much time when troubleshooting web apps where I am playing with the cache and such."
To rename a file with F2, while still editing the name of that file: Hit TAB to tab into the renaming of the next file. Thanks to abeeftaco for this one!
Alt-D is a reliable alternative to Ctrl-L for jumping to the address line in a browser. Thanks for this one go to fencepost_ajm, who explains: "Ctrl-L comes from the browser side as a shortcut for Location, Alt-D from the Windows Explorer side for Directory."
Browser shortcut: When typing a URL that ends with dot com, Ctrl + Enter will place the ".com" and take you to the page. Thanks to wpierre for this one!
This tip comes from anynonus, as something that daily that saves a few clicks: "Running a program with ctrl + shift + enter from start menu will start it as administrator (alt + y will select YES to run as admin) ... my user account is local admin [so] I don't feel like that is unsafe"
Building on our PowerShell resources, we received the following suggestion from halbaradkenafin: aka.ms/pskoans is "a way to learn PowerShell using PowerShell (and Pester). It's really cool and a bunch of folks have high praise for it (including a few teams within MSFT)."
Keyboard shortcut: If you already have an application open, hold ctrl + shift and middle click on the application in your task bar to open another instance as admin. Thanks go to Polymira for this one.
Remote Server Tip: "Critical advice. When testing out network configuration changes, prior to restarting the networking service or rebooting, always create a cron job that will restore your original network configuration and then reboot/restart networking on the machine after 5 minutes. If your config worked, you have enough time to remove it. If it didn't, it will fix itself. This is a beautifully simple solution that I learned from my old mentor at my very first job. I've held on to it for a long time." Thanks go to FrigidNox for the tip!
Websites
Deployment Research is the website of Johan Arwidmark, MS MVP in System Center Cloud and Datacenter Management. It is dedicated to sharing information and guidance around System Center, OS deployment, migration and more. The author shares tips and tricks to help improve the quality of IT Pros’ daily work.
Next of Windows is a website on (mostly) Microsoft-related technology. It's the place where Kent Chen—a computer veteran with many years of field experience—and Jonathan Hu—a web/mobile app developer and self-described "cool geek"—share what they know, what they learn and what they find in the hope of helping others learn and benefit.
High Scalability brings together all the relevant information about building scalable websites in one place. Because building a website with confidence requires a body of knowledge that can be slow to develop, the site focuses on moving visitors along the learning curve at a faster pace.
Information Technology Research Library is a great resource for IT-related research, white papers, reports, case studies, magazines, and eBooks. This library is provided at no charge by TradePub.com. GullibleDetective tells us it offers "free PDF files from a WIIIIIIDE variety of topics, not even just IT. Only caveat: as its a vendor-supported publishing company, you will have to give them a bit of information such as name, email address and possibly a company name. You undoubtedly have the ability to create fake information on this, mind you. The articles range from Excel templates, learning python, powershell, nosql etc. to converged architecture."
SS64 is a web-based reference guide for syntax and examples of the most-common database and OS computing commands. Recommended by Petti-The-Yeti, who adds, "I use this site all the time to look up commands and find examples while I'm building CMD and PS1 scripts."
Phishing and Malware Reporting. This website helps you put a stop to scams by getting fraudulent pages blocked. Easily report phishing webpages so they can be added to blacklists in as little as 15 minutes of your report. "Player024 tells us, "I highly recommend anyone in the industry to bookmark this page...With an average of about 10 minutes of work, I'm usually able to take down the phishing pages we receive thanks to the links posted on that website."
A Slack Channel
Windows Admin Slack is a great drive-by resource for the Windows sysadmin. This team has 33 public channels in total that cover different areas of helpful content on Windows administration.
Blogs
KC's Blog is the place where Microsoft MVP and web developer Kent Chen shares his IT insights and discoveries. The rather large library of posts offer helpful hints, how-tos, resources and news of interest to those in the Windows world.
The Windows Server Daily is the ever-current blog of technologist Katherine Moss, VP of open source & community engagement for StormlightTech. Offers brief daily posts on topics related to Windows server, Windows 10 and Administration.
An Infosec Slideshow
This security training slideshow was created for use during a quarterly infosec class. The content is offered generously by shalafi71, who adds, "Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it relevant to your people. Include corporate stories, include your audience, exclude yourself. This ain't about how smart you are at infosec, and I can't stress this enough, talk about how people can defend themselves. Give them things to look for and action they can take. No one gives a shit about your firewall rules."
Tech Tutorials
Tutorialspoint Library. This large collection of tech tutorials is a great resource for online learning. You'll find nearly 150 high-quality tutorials covering a wide array of languages and topics—from fundamentals to cutting-edge technologies. For example, this Powershell tutorial is designed for those with practical experience handling Windows-based Servers who want to learn how to install and use Windows Server 2012.
The Python Tutorial is a nice introduction to many of Python’s best features, enabling you to read and write Python modules and programs. It offers an understanding of the language's style and prepares you to learn more about the various Python library modules described in 'The Python Standard Library.' Kindly suggested by sharjeelsayed.
SysAdmin Humor
Day in the Life of a SysAdmin Episode 5: Lunch Break is an amusing look at a SysAdmin's attempt to take a brief lunch break. We imagine many of you can relate!
Have a fantastic week and as usual, let me know any comments or suggestions.
u/crispyducks
submitted by crispyducks to sysadmin [link] [comments]

#Website Announcements 2018

#Website Announcements 2018
Order is bottom (oldest) to top (newest).
------
#---# Merry Christmas and a Happy New Year #---#
I’m sure you are all itching to join us in having a good ISW’mas and to kick this festive period off with a great deal of internet spaceship based chaos.
It gives us great pleasure to open the alpha to you all, hopefully you will enjoy this, the first version, of many to come!
Naturally there will be issues so please do let us know, give us feedback and suggestions and let’s try and make ISW bigger and better than it once was.
Please join us in Click here for Slack and Click here for Discord
Have Merry Christmas and a Happy New Year
Yours, The Dr’s

#---# December Developer Update - Get HYPED Edition #---#
Happy Holidays to everybody! Everything is infused with Peppermint, Christmas music is playing in every public place, Interstellar War is going to have an Open Alpha, people are decorating for the season, everyone is shopping for gifts, and hoping to find something great under the tree this year.
Wait....
Did you just read that Interstellar War is having an OPEN ALPHA!!!
That's right folks! Santa and his elves (aka the Doctors) are bringing something exciting for all of us. We have been chugging along aggressively over the past few months and think it is time to show off what we've got.
Everyone is invited to this party, so spread the good news that ISW is coming to town!
ISW Holiday Alpha-stravaganza Info
  1. December 24th - January 4th: From Christmas Eve til the 4th the game will be an open alpha
  2. You can register right now, and on Christmas Eve the account will be activated.
  3. Or, on those dates you can go to the homepage, register, and start playing immediately.
  4. Everyone playing is expected to the adhere to the Rules of Conduct.
  5. The alpha will end Jan. 4th, and the game will be suspended while we recover from the mayhem of letting everybody go crazy, and fix everything you guys broke. At this time we do not know if a reset will be necessary. It will be a judgement call based on what happens.
Tips, Tricks, Recommendations and Warnings
  1. The game is completely playable and we are still adding features and functionality through the end of this month. However, it is an alpha, so we suspect that there will be bugs and exciting things you will break.
  2. There are still some feature gaps that we are hoping to get into the game, but we are choosing to open the floodgates with some missing functionality that we will add, rather than keeping you guys waiting.
  3. Building: We intend to have some basic functionality for building, but you might want to hold off maxxing it out. There will be terraforming and planet claiming, but other functionality is pending.
  4. Security: The redesign of how it will work is underway, but time constraints mean it is not functional. Don't bother putting points into it.
  5. Cloaking Doesnt work. At all.
  6. IMPORTANT - FACTION CHOICES: when we open it up, there will be NO faction changing or username changing. We recommend that people discuss joining different factions so we don't end up with only two factions with players. Try something other than Terran
On behalf of the Doctors, I want to thank all of you for sticking around and following our development. We are very excited to be able to bring something to all of you this holiday season.
Interstellar Wars is back! (from December 24th to Jan 4th. Normal rules and conditions apply, the doctors cannot be held liable for angry spouses, grandmothers, parents, or other entities which may take issue with you spending Christmas morning playing ISW instead of spending time with loved ones)

#---# November Update #---#
Hey there everybody, I know this update comes a bit late in the month, but it contains exciting news. We can’t express how much we appreciate your support and patience through the process, and we believe that the wait will have been worth it. This is a labor of love for us, and we are pouring as much time and energy as possible into getting it up and running as fast as possible.
Get HYPED, because we are so close. We are planning an opportunity to get people into the game and start having fun, breaking things, and getting a full blown dose of that good old fashioned nostalgia.
Major updates:
  1. We have been making incredible headway and are aiming for a Christmas Alpha release.
    1. Much of our time is being spent on finishing up and polishing the existing game features as we try to implement as much as we can before the Alpha go-live.
    2. How this will look and how many/who will be involved is still being determined, but we have some BIG plans.
    3. Look for the Alpha Announcement at the beginning of next month, and instructions for how to join the Alpha shortly after that.
  2. The Admin team has put together a preliminary Rules of Conduct, check it out at the end of the update. We needed to put this together so that the community has rules that govern behavior. We want everybody to want to play the game and know that they aren't going to run into issues.
Development Updates:
  1. Planets and Systems
    1. Mapped planet locations and Imported to the game
    2. Imported Planet minerals
    3. Linked Mining to the Tick
  2. Ship Combat
    1. Shield functionality added
    2. Critical Hits! Will be implemented after the Alpha
  3. NPC Interaction
    1. Populated NPCs in All Star Systems
    2. Behavior Adjusted, Auto-Attack, Chase, Fight Back~
    3. Experience for Killing NPCs added~
    4. Shared Experience Distribution pushed to later build, delayed until after Alpha~
    5. Add enemy Ship Size and Rank to Tooltip
  4. Character
    1. Experience implemented, includes experience from NPCs and Mining
    2. Leveling up skills added and working
  5. Architecture and UI Improvements (technical)
  6. Business Planning
    1. Created a Patreon
    2. Supporter tiers and levels still in development
  7. Arena, unsure if it will make first Alpha build
  8. Building: we are hoping to push it into the Alpha build, but will depend on time constriants.
    1. Implement Building Skill
    2. Implement Terraforming/Claiming planets
    3. Add the old ISW Building Tables
    4. Add Size/Space Attribute to planets
  9. Security (Unlikely for Initial Alpha build)
    1. Mechanics for actual combat completed
    2. Boarding
    3. Taking control
  10. Bug Fixing (edited)
Interstellar War Rules of Conduct
Interstellar War is a game created by fans, for newcomers and fans, of the original Interstellar War. We aim to recreate the experience of excitement and player interaction that made it a great game. Cracking jokes, creating rivalries, pulling off impressive heists, and inter-player politics are a part of Interstellar Wars, but building a community of collective fun is about trusting that players are doing the right thing and treating each other properly.
Our Code of Conduct is intended to outline the behavior that can take away from the collective and therefore will not be tolerated.
  1. Offensive language - You must not use any language that is offensive, discriminatory, racist or obscene.
  2. Player Abuse (includes spamming) – You must not threaten, insult, solicit, or abuse other players of this game.
  3. Bug abuse (cheating) - Any bugs found within the game must be reported to ISW Admins immediately.
  4. Using third-party software like bots or Macros - You must not use other programs to gain an unfair advantage at the game.
  5. Account sharing/trading - Each account should only be used by ONE person.
  6. Multiple logging in - If you create more than one ISW account, they must not interact or be used to gain an unfair advantage within or outside the game.
  7. Password scamming - Asking for another player's password for any reason will not be tolerated.
  8. Asking for personal details (addresses, phone numbers, emails, etc.) - To protect players' safety and privacy, you must not ask for personal details.
  9. Advertising/website - You are not allowed to actively advertise in the ISW game or ISW forums.
  10. Real world trading - ISW items must only be exchanged for other items/services within the game.
  11. ISW Admin or Mod impersonation - You should not attempt to impersonate Admins or Mods in any way.
  12. Misuse of official forums - Forums must be used respectfully at all times.
  13. Encouraging others to break rules (all rules included) - You must not encourage others to break any of the rules.
  14. All rules are at the discretion of moderators and Admins, but we are reasonable gods.

#---# October Update #---#
Hey Community!
Major updates:
  1. The skeleton of the game is playable. You can start from the beginning, gain experience and credits by mining and killing npcs, buy better ships to get more EXP and CR, jump to Hyperspace and visit other Star Systems. IT FEELS LIKE ISW!
  2. Chat is live, along with the in chat Combat log
  3. Governments motions are live
Upcoming/Work In Progress Updates:
  1. Planet Mapping Continues.
  2. Ship Combat
  • Shields First
  • Critical Hits!
  • Link Mining to the Tick
  1. NPC Interaction
  • Populate NPCs in All Star Systems
  • Behavior Adjustment, Auto-Attack, Fight Back, Repair
  • Experience Distribution
  1. Planets
  • Correct Mineral/Planet Table
  • Add Size/Space Attribute to planets
  1. Architecture Improvements (technical)
  2. Business Planning: Looking into Patreon
  3. Arena (Nice to have, unsure if it will make first Alpha build)
  4. Building (Unlikely for Initial Alpha build)
  • Implement Building Skill
  • mplement Terraforming/Claiming planets
  • Add the old ISW Building Tables
  1. Security (Unlikely for Initial Alpha build)
    1. ~Mechanics for actual combat completed~
    2. Boarding
    3. Taking control
We are incredibly excited about the progress we've made, and a Christmas gift for all of us.
We are targetting an Initial Alpha release in the last quarter before Christmas. ISW is almost back!
- The Doctors

#---# September #---#
Hey Everybody!
The progress on ISW continues in ernest. The summer has been busy, so thanks for not taking up the torches and pitchforks when the August Update did not come
Major Updates:
  1. The Arena is underway and being tested with 100 ships!
  2. NPCs: We've populated the NPCs and have been testing combat against them to make sure it feels right and fun, and doing some tweaks where we felt appropriate.
  • NPC experience will be implemented next.
  • We have an exciting change where anyone who attacks and deals damage will gain a portion of the experience.
  • They attack and get aggressive after you have engaged.
  1. Chat functionality has been progressing nicely.
  2. Government systems and fuctionality is built out. We've been working on adjusting the way some of the systems work, and how the standings (At War, Cease Fire, Neutral, Friendly) Let us know if you think the standings should affect whether you can attack another faction.
  3. I have been working on mapping the Star System planets, which is a manual, tedious, and exciting process.
We're feeling really excited about the progress and where we are getting to.
- The Doctors

#---# July Update #---#
Hey there everybody!
We Doctors have been chuggin’ along nicely, designing, coding, tweaking, and adding features as fast as we can.
Some major accomplishments this past month despite us both moving homes:
-Shield Design aligned with the way ships work, -Designed security both as a base functionality and planning for the future -Player Experience and Skill ups are LIVE! Designed the NPC experience gain. -Mining, unloading, and selling minerals is live! You even gain exp from Mining! -Government systems have been tweaked to align with the faction background material, and designed so that they should all be equally viable. They should be live pretty soon.
We are feeling super positive about the pace and how nicely everything is coming along. We can’t say when the Alpha will go live, but we are aiming for SOON™, and it is well inside the realm of possibility that Christmas comes early.
Our Current Project Plans Below
  1. Engineering
  • Ship System Control (On/Off binary)
  • Powernet
  • Repair
  • Lock Repair to the Tick
  • Design Shield Functionality
  • Add Shield Functionality
  • Lock all Module Performance to Module % Health
  1. Player Skills and Attributes
  • Add Player Skills (Command, Gunnery, Engineering, Piloting, Security, Building)
  • Add Player Experience Attribute
  • Experience Point Cost/Skill Level Up Calculation
  • Skill Level Ups (Spend Experience)
  • Link Skills to Various Systems
  1. Planet Interaction Mechanics
  • Planet Attributes + minerals tables
  • Move to orbit
  • Mine!
  1. Economy
  • Ship Inventory Interaction.
    • Add/Create [Mining or loot etc],
    • Remove (see below)
  • Trade Screen: Xfer to Base/Another Player (Delayed)
  • Sell to Starbases
  • ?Faction Mineral Tables?
  • Auction System for Minerals (Delayed)
  1. NPC introduction to tactical. Attributes/tables there, just populate them
  • Create Base level NPC loot (exp, credits, minerals)
  • Design NPC exp awarding
  • Determine NPC placement coordinates
  • Ensure NPC behavior is correct (edited)
  1. Security
  • Design Security Combat
  • Implement MVP Security
  1. System Layout
  • Planets Coordinates in Core systems
  • Planet Coordinates in secondary/bonus systems
  1. Government Systems Revamp
  • Adjust GovSys to be inline with Racial lore and feel
    • Collective
    • Democracy
    • Oligarchy
    • Dictatorship
  • Design/Adjust Government to Bring them inline with eachother.
  • Implement high level government systems.
  1. ARENA!!!! Do it
  2. Chat
  • Test Chat UI
  • Update/Upgrade the test chat system
  • Implement channels

#---# June Update #---#
Hey Community!
As hinted in our last update, we've had a number of commitments that have halted our progress. Thankfully (as those of you in slack would have seen) progress has been made and we should be back on track in due course to start implementing the remaining features.
Below as before is our current High level document for tracking design and implementation, less the now removed the completed tasks and updated with a few now complete/inprogress.
  1. Engineering
  • Design Shield Functionality
  • Implement Shield Functionality
  • Lock all Module Performance to Module % Health
  1. Player Skills and Attributes
  • Skill Level Ups (Spend Experience)
  1. Planet Interaction Mechanics
  • Mine!
  1. Economy
  • Ship Inventory Interaction.
    • Remove (see below)
  • Trade Screen: Xfer to Base/Another Player
  • Sell to Starbases
  • Faction Mineral Tables
  • Auction System for Minerals
  1. NPC introduction to tactical
  • Create Base level NPC loot (exp, credits, minerals)
  • Determine NPC placement coordinates
  • Ensure NPC behavior is correct (edited)
  1. System Layout
  • Planets Coordinates in Core systems - In progress

#---# May Update #---#
Hey Community!
The Admin team wanted to provide an update on our progress and our current work being done. The members of the Admin team have had some personal responsibilities that briefly interfered with the pace of implementation, but we can assure you we kept the ball rolling.
Below is our current High level document for tracking design and implementation. We’d like to be highly transparent with you guys. If you have questions or input let it rip on Slack.
  1. Engineering
  • Ship System Control (On/Off binary)
  • Powernet
  • Repair
  • Lock Repair to the Tick
  • Design Shield Functionality
  • Implement Shield Functionality
  • Lock all Module Performance to Module % Health
  1. Player Skills and Attributes
  • Add Player Skills (Command, Gunnery, Engineering, Piloting, Security, Building)
  • Add Player Experience Attribute
  • Experience Point Cost/Skill Level Up Calculation
  • Skill Level Ups (Spend Experience)
  1. Planet Interaction Mechanics
  • Planet Attributes + minerals tables
  • Move to orbit
  • Mine!
  1. Economy
  • Ship Inventory Interaction.
    • Add/Create [Mining or loot etc]
    • Remove (see below)
  • Trade Screen: Xfer to Base/Another Player
  • Sell to Starbases
  • Faction Mineral Tables
  • Auction System for Minerals
  1. NPC introduction to tactical
  • Create Base level NPC loot (exp, credits, minerals)
  • Determine NPC placement coordinates
  • Ensure NPC behavior is correct (edited)
  1. System Layout
  • Planets Coordinates in Core systems
You can see some screenshots below as well.
Starbase and Star Ship


#---# April Update #---#
Many of you have been asking after the progress being made, and Dr. Strange and I wanted to give you all an update. Moving forward, I will be taking over the Project updates so Dr. Strange can use his superior abilities elsewhere. My aim is to go frequent, informative, and transparent.
Dr. Boom (that’s me) is a Game Designer, rules engineer, and Project manager. He is responsible for most of the formulas that make use of ship statistics, player attributes, and leveling/experience. He is the guy who assembled most of the tables, and designed the NPC statistics. All of my ideas are bounced off Dr. Strange, dude’s a genius.
Dr. Strange is the Lead Developer mastermind behind all of the actual code, systems interactions, and screen layouts that comprise the game. He manages the database that holds the tables that populate the information within the game. Anytime something new needs to be added to the game, an adjustment or tweak needs to be made, etc. he is the man doing it.
Dr. Who is the Workspace Admin and he manages the web portals, and keeps everything online. Without him the lights go out.
Together, we discuss ideas, determine prioritization, and then test our ideas once they’re live. We have made significant progress, but there is still work to do.
First, I want you all to know what you can currently do in the game, and then in my next post I’ll give you a glimpse into our development project pipeline.
Currently, the game is in an incomplete state. You can commission a ship, board it, turn the systems on, fly around, fire your weapons, repair the ship hull. You can even “Activate Hyperdrive”, and then scoot on over to another of the 9 current starsystems. But we aren’t quite "there" yet.
The team has our project plan for the “Ultra-Minimum Viable Product” and we would like to share it very soon. Our goal is to complete that and then open up an Alpha testing phase.

https://preview.redd.it/ep9srpoyf7841.png?width=1050&format=png&auto=webp&s=89988870ec5a1d4da1a71aba25ee8ad8b3c685cd

https://preview.redd.it/k7hnmtdzf7841.png?width=1067&format=png&auto=webp&s=13e29691102bfe0ee22ea329d8a6bce6c863bdd9
#---# A year in review #---#
Well, nearly, it’s been 9 months since the first update (but who’s counting). It was an exciting day for us all and although we’ve been working away as fast as possible, time and commitments permitting, it’s always been somewhat difficult to show (let alone describe) some of the work taking place.
Hopefully however you will now notice the somewhat dramatic nature of recent changes and pop over to Slack with any feedback.
Although it may seem minor, the update(s) you are now seeing is the result of 6 months of behind the scenes decisions, development and design.
This new design also marks the first release since we first launched, to put that into perspective, 1520 files have been modified/created and 304347 lines of code have been written.
We’ve still got a way to go but hopefully this will serve as a taster of what direction we are moving in; currently however we’ve got some troublesome NPC’s to wrangle and mechanics to tweak.
Hopefully you all had a good Christmas and are looking forward to the year ahead.

#---# All of your bases #---#
As some will have likely seen on Slack, recently a picture of all of the starbases occupying the void was posted. Although this may seem a little greedy or indeed sinister the purpose was in fact quite the opposite.
By bringing all the starbases into one system we’ve been flitting between them, grabbing different ships and having a bit of a free-for-all, although fun, this is in a view to test that everything is working as it should when ships are purchased, commanded, shot and destroyed.
This effectively being what we’d all like to be doing. Although these areas are looking more rounded there is still quite a bit of work to be done and a lot to be tested.
Much as the previous hinted, we are still considering a preview/testing session, although this may evolve to an alpha style release. Although limited, it would allow us to test a lot of the core mechanics and stresses of certain aspects of the game.
As ever work is ongoing and I’ll endeavour to keep posting updates, feel free to pop into Slack and give us a poke however… we don’t bite.

#---# Trigger Happy #---#
Since the last update, we’ve been working tirelessly on the game mechanics, ship combat, engineering and module interactions. All of which have come a long way. Each has been tested (perhaps a little too much) and I’m excited to soon start considering a limited alpha… a date with a dev if you will.. where I will likely invite a select few on a number of dates for “supervised” testing.
There are, as ever, still several issues to work out and balancing to consider but for the most part it should feel like the old game, with a few surprises.
Tactical, for some time has been an issue for us. I’m happy to say this is no longer the case, we’ve achieved something which will hark back nicely to 2002 but also fit in 2017 (it’s really been that long!) and I suspect most will be excited to see.
Special mention, for those that have joined slack and provided support/feedback, thank you (you know whom you are). For those that haven’t, join us: Slack
PS, although updates have been less frequent, don’t fear, we are tirelessly working away. Find us on slack if you need constant reminders and sneak peaks of what we’re tinkering with.

#---# Objectives #---#
Buy a ship, launch, explore…. Then??... over the next few weeks we will be looking at the much needed “what happens next” aspect. Currently our one system is a little lonely… lacking much more than a few boring planets and a starbase.
First up is NPC’s, what we have are NPC’s that are a little lifeless, they spawn as necessary and roam a system (within reason) … at this point we’re looking at adding some firepower and attitude into the mix.
To start this off we will be looking firstly into how damage is delivered, which skills and modules have which effects and more importantly how this is relayed to you to make decisions upon.
We have a few ideas of our own but are open to suggestions (forum if you please). This will likely be a time consuming processes so updates as ever may be few and far between but rest assured we are still here and toiling away.
Lastly, we have a slack channel, please feel free to join and ask questions or be there purely for moral support... this will be rescinded if abused or if we’re harassed too vigorously . Slack Invite

#---# What good is tactical anyway? #---#
As many will fondly remember, starbases where the hub of most activity within ISW, mainly as this is where our vast arsenals of ships where stored. With this in mind our attention is now shifting away from tactical and it seems as good a point as any to delve into starbases.
Currently we can purchase, dock, commandeer, repair and sell ships… all a good start but more critically we are now able to undock… it seems however docking is somewhat of an art form at present….
Over the coming weeks (once we get our ship back into the base and stop flying around tactical) we should hopefully refine some of the mechanisms involved and start to round of other areas off the game.
Stay tuned.

#---# Tactical Part 3 #---#
Tough decisions ahead; for some time now the focus has been exclusively on the new tactical. The idea behind the new tactical is to allow us to slowly move away from turn based logic (but not too far) and add other dynamic layers to the gameplay.
For example, previously ship moment was constrained to the ticks and was purely linear, the newer tactical allows real time ship movement by double clicking the grid, the fastest route (avoiding obstacles) is calculated and said ship will begin its movement. This allows greater use of ship characteristics such as a speed and range but also will add an element of piloting to the mix.
Furthermore, the real-time aspect would also prevent the need to refresh the game which has various performance benefits.
Here in lies the dilemma, the added complexity in delivering tactical 2 is putting a strain on development as naturally there are more hurdles to overcome. As a result it is consuming more time than anticipated.
The existing or old tactical however has been implemented and does function as before (albeit slightly upgraded) however at this stage it feels a little out of place.
At this stage in the project it might be worth taking a fork in the road and returning to tactical 2 at a later stage or it might be worth the delay to proceed as we are.
Decisions decisions.
Over the coming weeks I will be away on holiday, a higher power has banned the use of laptops for the duration and as such there will be a break in development. I will however endeavour to monitor the forum and answer questions so please discuss.

#---# Tactical Part 2 #---#
Having eluded to something a bit different being on the cards for tactical, I wondered how best to visualise something that we’ve been tinkering with…
Alas words didn’t seem quite enough soo…. maybe look ... here
N.b: Full disclosure this is a prototype (we are in closed development after all).

#---# Tactical Part 1 #---#
It’s been a while since the last update, mainly because we’ve been tirelessly testing different options which alongside other commitments has taken a fair bit of time.
Some of these include:
  • TacticalXL: Expanding the tactical screen, somewhere in the region 1000px x 1000px.
  • TacticalDynamic: Expand the map to the available screen dynamically.
  • TacticalCamera: Have the player centred in the view (camera) whilst they move around a map (like the old starmap).
Unfortunately, there are issues with those among a few less notable options. We do however have another option albeit a complex one. Currently we’re exploring this further but as is likely evident we aren’t given too much away, but stay tuned… there may be a few surprises ahead.

#---# Tactical #---#
Over the coming weeks our focus is shifting to tactical. The tactical grid allowed for most of the games actual behaviour by using the 15 second tick to allow players to move, shoot and generally cause chaos (as I’m sure most will recall).
Tactical however was quite basic, click here, go there, click here, shoot that. It also only spanned a whopping 580px by 440px (7 x 9 squares), this leaves us some room to get a bit creative in modernising the game.
Here in lies a dilemma, how should we modernize tactical?
Right now, we have a few ideas which we are exploring, ranging from the seemingly simple “make it bigger” through to some quite experimental ideas that could open several doors.
We’re not 100% sure which route at this stage we will take but there will be a few more updates in coming weeks as we explore each accordingly.

#---# The Tick #---#
There have been a few posts in the past about which aspects of the game we are looking to keep and which are looking to improve or even replace.
The 15 second tick being somewhat crucial among them. This past week we’ve been focusing on the tick, something that we had already put in place but thought it best to revisit.
In the days of old the ill-fated browser refreshing and server unavailable slowly got the better of the game, to keep this in check we’re adopting a new approach.
Instead of refreshing the browser or polling the server for updates we are now pushing data directly to your browsers, this has several benefits but key among them are that:
  • We can cut the number of browser refreshes (eventually to nil)
  • We can keep all users synchronised in real time (refreshing will be discouraged)
But why keep the 15 second tick?
The game lends itself to a delay, you may need to type a message, cycle your weapons, pick a destination and ultimately choose whom to fire upon (or not).
This will likely be revisited again over time but for now, we’ll be ticking.

#---# Forum #---#
Is it Back? In short, Yes.
Over the recent weeks there have been numerous changes afoot. As a result, we’ll not only be breaking our radio silence but also aiming to deliver more updates on a more frequent basis.
The first of which is the forum, we’ve been forced due to technical reasons to create a new forum. In the interim, both will be available and we encourage you to move any content/ideas and or suggestions from the old to the new (as well as signing up).
OLD: http://community.interstellar-war.com/
NEW: https://iwcommunity.interstellar-war.com/
We will eventually close the old forum and have no plans at this stage to create any new forums.

#---# Update #---#
Comming Soon™
submitted by LuzPT to InterstellarWar [link] [comments]

Tools & Info for MSPs #2 - Mega List of Tips, Tools, Books, Blogs & More

(continued from part #1)
Unlocker is a tool to help delete those irritating locked files that give you an error message like "cannot delete file" or "access is denied." It helps with killing processes, unloading DLLs, deleting index.dat files, as well as unlocking, deleting, renaming, and moving locked files—typically without requiring a reboot.
IIS Crypto's newest version adds advanced settings; registry backup; new, simpler templates; support for Windows Server 2019 and more. This tool lets you enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows and reorder SSL/TLS cipher suites from IIS, change advanced settings, implement best practices with a single click, create custom templates and test your website. Available in both command line and GUI versions.
RocketDock is an application launcher with a clean interface that lets you drag/drop shortcuts for easy access and minimize windows to the dock. Features running application indicators, multi-monitor support, alpha-blended PNG and ICO icons, auto-hide and popup on mouse over, positioning and layering options. Fully customizable, portable, and compatible with MobyDock, ObjectDock, RK Launcher and Y'z Dock skins. Works even on slower computers and is Unicode compliant. Suggested by lieutenantcigarette: "If you like the dock on MacOS but prefer to use Windows, RocketDock has you covered. A superb and highly customisable dock that you can add your favourites to for easy and elegant access."
Baby FTP Server offers only the basics, but with the power to serve as a foundation for a more-complex server. Features include multi-threading, a real-time server log, support for PASV and non-PASV mode, ability to set permissions for download/upload/rename/delete/create directory. Only allows anonymous connections. Our thanks to FatherPrax for suggesting this one.
Strace is a Linux diagnostic, debugging and instructional userspace tool with a traditional command-line interface. Uses the ptrace kernel feature to monitor and tamper with interactions between processes and the kernel, including system calls, signal deliveries and changes of process state.
exa is a small, fast replacement for ls with more features and better defaults. It uses colors to distinguish file types and metadata, and it recognizes symlinks, extended attributes and Git. All in one single binary. phils_lab describes it as "'ls' on steroids, written in Rust."
rsync is a faster file transfer program for Unix to bring remote files into sync. It sends just the differences in the files across the link, without requiring both sets of files to be present at one of the ends. Suggested by zorinlynx, who adds that "rsync is GODLY for moving data around efficiently. And if an rsync is interrupted, just run it again."
Matter Wiki is a simple WYSIWYG wiki that can help teams store and collaborate. Every article gets filed under a topic, transparently, so you can tell who made what changes to which document and when. Thanks to bciar-iwdc for the recommendation.
LockHunter is a file unlocking tool that enables you to delete files that are being blocked for unknown reasons. Can be useful for fighting malware and other programs that are causing trouble. Deletes files into the recycle bin so you can restore them if necessary. Chucky2401 finds it preferable to Unlocker, "since I am on Windows 7. There are no new updates since July 2017, but the last beta was in June of this year."
aria2 is a lightweight multi-source command-line download utility that supports HTTP/HTTPS, FTP, SFTP, BitTorrent and Metalink. It can be manipulated via built-in JSON-RPC and XML-RPC interfaces. Recommended by jftuga, who appreciates it as a "cross-platform command line downloader (similar to wget or curl), but with the -x option can run a segmented download of a single file to increase throughput."
Free Services
Temp-Mail allows you to receive email at a temporary address that self-destructs after a certain period of time. Outwit all the forums, Wi-Fi owners, websites and blogs that insist you register to use them. Petti-The-Yeti says, "I don't give any company my direct email anymore. If I want to trial something but they ask for an email signup, I just grab a temporary email from here, sign up with it, and wait for the trial link or license info to come through. Then, you just download the file and close the website."
Duck DNS will point a DNS (sub domains of duckdns.org) to an IP of your choice. DDNS is a handy way for you to refer to a serverouter with an easily rememberable name for situations when the server's ip address will likely change. Suggested by xgnarf, who finds it "so much better for the free tier of noip—no 30-day nag to keep your host up."
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed reports. The Community Edition of Joe Sandbox Cloud allows you to run a maximum of 6 analyses per month, 3 per day on Windows, Linux and Android with limited analysis output. This one is from dangibbons94, who wanted to "share this cool service ... for malware analysis. I usually use Virus total for URL scanning, but this goes a lot more in depth. I just used basic analysis, which is free and enough for my needs."
Hybrid Analysis is a malware analysis service that detects and analyzes unknown threats for the community. This one was suggested by compupheonix, who adds that it "gets you super detailed reports... it's about the most fleshed out and detailed one I can find."
JustBeamIt is a file-transfer service that allows you to send files of any size via a peer-to-peer streaming model. Simply drag and drop your file and specify the recipient's email address. They will then receive a link that will trigger the download directly from your computer, so the file does not have to be uploaded to the service itself. The link is good for one download and expires after 10 minutes. Thanks to cooljacob204sfw for the recommendation!
ShieldsUP is a quick but powerful internet security checkup and information service. It was created by security researcher Steve Gibson to scan ports and let you know which ones have been opened through your firewalls or NAT routers.
Firefox Send is an encrypted file transfer service that allows you to share files up to 2.5GB from any browser or an Android app. Uses end-to-end encryption to keep data secure and offers security controls you can set. You can determine when your file link expires, the number of downloads, and whether to add a password. Your recipient receives a link to download the file, and they don’t need a Firefox account. This one comes from DePingus, who appreciates the focus on privacy. "They have E2E, expiring links, and a clear privacy policy."
Free DNS is a service where programmers share domain names with one another at no cost. Offers free hosting as well as dynamic DNS, static DNS, subdomain and domain hosting. They can host your domain's DNS as well as allowing you to register hostnames from domains they're hosting already. If you don't have a domain, you can sign up for a free account and create up to 5 subdomains off the domains others have contributed and point these hosts anywhere on the Internet. Thanks to 0x000000000000004C (yes, that's a username) for the suggestion!
ANY.RUN is an interactive malware analysis service for dynamic and static research of the majority of threats in any environment. It can provide a convenient in-depth analysis of new, unidentified malicious objects and help with the investigation of incidents. ImAshtonTurner appreciates it as "a great sandbox tool for viewing malware, etc."
Plik is a scalable, temporary file upload system similar to wetransfer that is written in golang. Thanks go to I_eat_Narwhals for this one!
Free My IP offers free, dynamic DNS. This service comes with no login, no ads, no newsletters, no links to click and no hassle. Kindly suggested by Jack of All Trades.
Mailinator provides free, temporary email inboxes on a receive-only, attachment-free system that requires no sign-up. All @mailinator.com addresses are public, readable and discoverable by anyone at any time—but are automatically deleted after a few hours. Can be a nice option for times when you to give out an address that won't be accessible longterm. Recommended by nachomountain, who's been using it "for years."
Magic Wormhole is a service for sending files directly with no intermediate upload, no web interface and no login. When both parties are online you with the minimal software installed, the wormhole is invoked via command line identifying the file you want to send. The server then provides a speakable, one-time-use password that you give the recipient. When they enter that password in their wormhole console, key exchange occurs and the download begins directly between your computers. rjohnson99 explains, "Magic Wormhole is sort of like JustBeamIt but is open-source and is built on Python. I use it a lot on Linux servers."
EveryCloud's Free Phish is our own, new Phishing Simulator. Once you've filled in the form and logged in, you can choose from lots of email templates (many of which we've coped from what we see in our Email Security business) and landing pages. Run a one-off free phish, then see who clicked or submitted data so you can understand where your organization is vulnerable and act accordingly.
Hardening Guides
CIS Hardening Guides contain the system security benchmarks developed by a global community of cybersecurity experts. Over 140 configuration guidelines are provided to help safeguard systems against threats. Recommended by cyanghost109 "to get a start on looking at hardening your own systems."
Podcasts
Daily Tech News is Tom Merrit's show covering the latest tech issues with some of the top experts in the field. With the focus on daily tech news and analysis, it's a great way to stay current. Thanks to EmoPolarbear for drawing it to our attention.
This Week in Enterprise Tech is a podcast that features IT experts explaining the complicated details of cutting-edge enterprise technology. Join host Lou Maresca on this informative exploration of enterprise solutions, with new episodes recorded every Friday afternoon.
Security Weekly is a podcast where a "bunch of security nerds" get together and talk shop. Topics are greatly varied, and the atmosphere is relaxed and conversational. The show typically tops out at 2 hours, which is perfect for those with a long commute. If you’re fascinated by discussion of deep technical and security-related topics, this may be a nice addition to your podcast repertoire.
Grumpy Old Geeks—What Went Wrong on the Internet and Who's To Blame is a podcast about the internet, technology and geek culture—among other things. The hosts bring their grumpy brand of humor to the "state of the world as they see it" in these roughly hour-long weekly episodes. Recommended by mkaxsnyder, who enjoys it because, "They are a good team that talk about recent and relevant topics from an IT perspective."
The Social-Engineer Podcast is a monthly discussion among the hosts—a group of security experts from SEORG—and a diverse assortment of guests. Topics focus around human behavior and how it affects information security, with new episodes released on the second Monday of every month. Thanks to MrAshRhodes for the suggestion.
The CyberWire podcasts discuss what's happening in cyberspace, providing news and commentary from industry experts. This cyber security-focused news service delivers concise, accessible, and relevant content without the gossip, sensationalism, and the marketing buzz that often distract from the stories that really matter. Appreciation to supermicromainboard for the suggestion.
Malicious Life is a podcast that tells the fascinating—and often unknown—stories of the wildest hacks you can ever imagine. Host Ran Levi, a cybersecurity expert and author, talks with the people who were actually involved to reveal the history of each event in depth. Our appreciation goes to peraphon for the recommendation.
The Broadcast Storm is a podcast for Cisco networking professionals. BluePieceOfPaper suggests it "for people studying for their CCNA/NP. Kevin Wallace is a CCIE Collaboration so he knows his *ishk. Good format for learning too. Most podcasts are about 8-15 mins long and its 'usually' an exam topic. It will be something like "HSPR" but instead of just explaining it super boring like Ben Stein reading a powerpoint, he usually goes into a story about how (insert time in his career) HSPR would have been super useful..."
Software Engineering Radio is a podcast for developers who are looking for an educational resource with original content that isn't recycled from other venues. Consists of conversations on relevant topics with experts from the software engineering world, with new episodes released three to four times per month. a9JDvXLWHumjaC tells us this is "a solid podcast for devs."
Books
System Center 2012 Configuration Manager is a comprehensive technical guide designed to help you optimize Microsoft's Configuration Manager 2012 according to your requirements and then to deploy and use it successfully. This methodical, step-by-step reference covers: the intentions behind the product and its role in the broader System Center product suite; planning, design, and implementation; and details on each of the most-important feature sets. Learn how to leverage the user-centric capabilities to provide anytime/anywhere services & software, while strengthening control and improving compliance.
Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam is a practical guide to network infrastructure. Provides an in-depth view of routers and routing, switching (with Cisco Catalyst and Nexus switches as examples), SOHO VoIP and SOHO wireless access point design and configuration, introduction to IPv6 with configuration examples, telecom technologies in the data-networking world (including T1, DS3, frame relay, and MPLS), security, firewall theory and configuration, ACL and authentication, Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ), IP address allocation, Network Time Protocol (NTP) and device failures.
Beginning the Linux Command Line is your ally in mastering Linux from the keyboard. It is intended for system administrators, software developers, and enthusiastic users who want a guide that will be useful for most distributions—i.e., all items have been checked against Ubuntu, Red Hat and SUSE. Addresses administering users and security and deploying firewalls. Updated to the latest versions of Linux to cover files and directories, including the Btrfs file system and its management and systemd boot procedure and firewall management with firewalld.
Modern Operating Systems, 4th Ed. is written for students taking intro courses on Operating Systems and for those who want an OS reference guide for work. The author, an OS researcher, includes both the latest materials on relevant operating systems as well as current research. The previous edition of Modern Operating Systems received the 2010 McGuffey Longevity Award that recognizes textbooks for excellence over time.
Time Management for System Administrators is a guide for organizing your approach to this challenging role in a way that improves your results. Bestselling author Thomas Limoncelli offers a collection of tips and techniques for navigating the competing goals and concurrent responsibilities that go along with working on large projects while also taking care of individual user's needs. The book focuses on strategies to help with daily tasks that will also allow you to handle the critical situations that inevitably require your attention. You'll learn how to manage interruptions, eliminate time wasters, keep an effective calendar, develop routines and prioritize, stay focused on the task at hand and document/automate to speed processes.
The Practice of System and Network Administration, 3rd Edition introduces beginners to advanced frameworks while serving as a guide to best practices in system administration that is helpful for even the most advanced experts. Organized into four major sections that build from the foundational elements of system administration through improved techniques for upgrades and change management to exploring assorted management topics. Covers the basics and then moves onto the advanced things that can be built on top of those basics to wield real power and execute difficult projects.
Learn Windows PowerShell in a Month of Lunches, Third Edition is designed to teach you PowerShell in a month's worth of 1-hour lessons. This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and it includes v5 features like PowerShellGet. For PowerShell v3 and up, Windows 7 and Windows Server 2008 R2 and later.
Troubleshooting with the Windows Sysinternals Tools is a guide to the powerful Sysinternals tools for diagnosing and troubleshooting issues. Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis provide a deep understanding of Windows core concepts that aren’t well-documented elsewhere along with details on how to use Sysinternals tools to optimize any Windows system’s reliability, efficiency, performance and security. Includes an explanation of Sysinternals capabilities, details on each major tool, and examples of how the tools can be used to solve real-world cases involving error messages, hangs, sluggishness, malware infections and more.
DNS and BIND, 5th Ed. explains how to work with the Internet's distributed host information database—which is responsible for translating names into addresses, routing mail to its proper destination, and listing phone numbers according to the ENUM standard. Covers BIND 9.3.2 & 8.4.7, the what/how/why of DNS, name servers, MX records, subdividing domains (parenting), DNSSEC, TSIG, troubleshooting and more. PEPCK tells us this is "generally considered the DNS reference book (aside from the RFCs of course!)"
Windows PowerShell in Action, 3rd Ed. is a comprehensive guide to PowerShell. Written by language designer Bruce Payette and MVP Richard Siddaway, this volume gives a great introduction to Powershell, including everyday use cases and detailed examples for more-advanced topics like performance and module architecture. Covers workflows and classes, writing modules and scripts, desired state configuration and programming APIs/pipelines.This edition has been updated for PowerShell v6.
Zero Trust Networks: Building Secure Systems in Untrusted Networks explains the principles behind zero trust architecture, along with what's needed to implement it. Covers the evolution of perimeter-based defenses and how they evolved into the current broken model, case studies of zero trust in production networks on both the client and server side, example configurations for open-source tools that are useful for building a zero trust network and how to migrate from a perimeter-based network to a zero trust network in production. Kindly recommended by jaginfosec.
Tips
Here are a couple handy Windows shortcuts:
Here's a shortcut for a 4-pane explorer in Windows without installing 3rd-party software:
(Keep the win key down for the arrows, and no pauses.) Appreciation goes to ZAFJB for this one.
Our recent tip for a shortcut to get a 4-pane explorer in Windows, triggered this suggestion from SevaraB: "You can do that for an even larger grid of Windows by right-clicking the clock in the taskbar, and clicking 'Show windows side by side' to arrange them neatly. Did this for 4 rows of 6 windows when I had to have a quick 'n' dirty "video wall" of windows monitoring servers at our branches." ZAFJB adds that it actually works when you right-click "anywhere on the taskbar, except application icons or start button."
This tip comes courtesy of shipsass: "When I need to use Windows Explorer but I don't want to take my hands off the keyboard, I press Windows-E to launch Explorer and then Ctrl-L to jump to the address line and type my path. The Ctrl-L trick also works with any web browser, and it's an efficient way of talking less-technical people through instructions when 'browse to [location]' stumps them."
Clear browser history/cookies by pressing CTRL-SHIFT-DELETE on most major browsers. Thanks go to synapticpanda, who adds that this "saves me so much time when troubleshooting web apps where I am playing with the cache and such."
To rename a file with F2, while still editing the name of that file: Hit TAB to tab into the renaming of the next file. Thanks to abeeftaco for this one!
Alt-D is a reliable alternative to Ctrl-L for jumping to the address line in a browser. Thanks for this one go to fencepost_ajm, who explains: "Ctrl-L comes from the browser side as a shortcut for Location, Alt-D from the Windows Explorer side for Directory."
Browser shortcut: When typing a URL that ends with dot com, Ctrl + Enter will place the ".com" and take you to the page. Thanks to wpierre for this one!
This tip comes from anynonus, as something that daily that saves a few clicks: "Running a program with ctrl + shift + enter from start menu will start it as administrator (alt + y will select YES to run as admin) ... my user account is local admin [so] I don't feel like that is unsafe"
Building on our PowerShell resources, we received the following suggestion from halbaradkenafin: aka.ms/pskoans is "a way to learn PowerShell using PowerShell (and Pester). It's really cool and a bunch of folks have high praise for it (including a few teams within MSFT)."
Keyboard shortcut: If you already have an application open, hold ctrl + shift and middle click on the application in your task bar to open another instance as admin. Thanks go to Polymira for this one.
Remote Server Tip: "Critical advice. When testing out network configuration changes, prior to restarting the networking service or rebooting, always create a cron job that will restore your original network configuration and then reboot/restart networking on the machine after 5 minutes. If your config worked, you have enough time to remove it. If it didn't, it will fix itself. This is a beautifully simple solution that I learned from my old mentor at my very first job. I've held on to it for a long time." Thanks go to FrigidNox for the tip!
Websites
Deployment Research is the website of Johan Arwidmark, MS MVP in System Center Cloud and Datacenter Management. It is dedicated to sharing information and guidance around System Center, OS deployment, migration and more. The author shares tips and tricks to help improve the quality of IT Pros’ daily work.
Next of Windows is a website on (mostly) Microsoft-related technology. It's the place where Kent Chen—a computer veteran with many years of field experience—and Jonathan Hu—a web/mobile app developer and self-described "cool geek"—share what they know, what they learn and what they find in the hope of helping others learn and benefit.
High Scalability brings together all the relevant information about building scalable websites in one place. Because building a website with confidence requires a body of knowledge that can be slow to develop, the site focuses on moving visitors along the learning curve at a faster pace.
Information Technology Research Library is a great resource for IT-related research, white papers, reports, case studies, magazines, and eBooks. This library is provided at no charge by TradePub.com. GullibleDetective tells us it offers "free PDF files from a WIIIIIIDE variety of topics, not even just IT. Only caveat: as its a vendor-supported publishing company, you will have to give them a bit of information such as name, email address and possibly a company name. You undoubtedly have the ability to create fake information on this, mind you. The articles range from Excel templates, learning python, powershell, nosql etc. to converged architecture."
SS64 is a web-based reference guide for syntax and examples of the most-common database and OS computing commands. Recommended by Petti-The-Yeti, who adds, "I use this site all the time to look up commands and find examples while I'm building CMD and PS1 scripts."
Phishing and Malware Reporting. This website helps you put a stop to scams by getting fraudulent pages blocked. Easily report phishing webpages so they can be added to blacklists in as little as 15 minutes of your report. "Player024 tells us, "I highly recommend anyone in the industry to bookmark this page...With an average of about 10 minutes of work, I'm usually able to take down the phishing pages we receive thanks to the links posted on that website."
A Slack Channel
Windows Admin Slack is a great drive-by resource for the Windows sysadmin. This team has 33 public channels in total that cover different areas of helpful content on Windows administration.
Blogs
KC's Blog is the place where Microsoft MVP and web developer Kent Chen shares his IT insights and discoveries. The rather large library of posts offer helpful hints, how-tos, resources and news of interest to those in the Windows world.
The Windows Server Daily is the ever-current blog of technologist Katherine Moss, VP of open source & community engagement for StormlightTech. Offers brief daily posts on topics related to Windows server, Windows 10 and Administration.
An Infosec Slideshow
This security training slideshow was created for use during a quarterly infosec class. The content is offered generously by shalafi71, who adds, "Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it relevant to your people. Include corporate stories, include your audience, exclude yourself. This ain't about how smart you are at infosec, and I can't stress this enough, talk about how people can defend themselves. Give them things to look for and action they can take. No one gives a shit about your firewall rules."
Tech Tutorials
Tutorialspoint Library. This large collection of tech tutorials is a great resource for online learning. You'll find nearly 150 high-quality tutorials covering a wide array of languages and topics—from fundamentals to cutting-edge technologies. For example, this Powershell tutorial is designed for those with practical experience handling Windows-based Servers who want to learn how to install and use Windows Server 2012.
The Python Tutorial is a nice introduction to many of Python’s best features, enabling you to read and write Python modules and programs. It offers an understanding of the language's style and prepares you to learn more about the various Python library modules described in 'The Python Standard Library.' Kindly suggested by sharjeelsayed.
SysAdmin Humor
Day in the Life of a SysAdmin Episode 5: Lunch Break is an amusing look at a SysAdmin's attempt to take a brief lunch break. We imagine many of you can relate!
Have a fantastic week and as usual, let me know any comments.
Graham | CEO | EveryCloud
Fyi - I've set up a subreddit /itprotuesday, where we feature / encourage posts of some additional tools, tips etc. throughout the week. Pop over and subscribe if you’re interested.
submitted by crispyducks to msp [link] [comments]

IT Pro Tuesday #64 (part 2) - Mega List of Tips, Tools, Books, Blogs & More

(continued from part 1)
Captura is a flexible tool for capturing your screen, audio, cursor, mouse clicks and keystrokes. Features include mixing audio recorded from microphone and speaker output, command-line interface, and configurable hotkeys. Thanks to jantari for the recommedation.
Unlocker is a tool to help delete those irritating locked files that give you an error message like "cannot delete file" or "access is denied." It helps with killing processes, unloading DLLs, deleting index.dat files, as well as unlocking, deleting, renaming, and moving locked files—typically without requiring a reboot.
IIS Crypto's newest version adds advanced settings; registry backup; new, simpler templates; support for Windows Server 2019 and more. This tool lets you enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows and reorder SSL/TLS cipher suites from IIS, change advanced settings, implement best practices with a single click, create custom templates and test your website. Available in both command line and GUI versions.
RocketDock is an application launcher with a clean interface that lets you drag/drop shortcuts for easy access and minimize windows to the dock. Features running application indicators, multi-monitor support, alpha-blended PNG and ICO icons, auto-hide and popup on mouse over, positioning and layering options. Fully customizable, portable, and compatible with MobyDock, ObjectDock, RK Launcher and Y'z Dock skins. Works even on slower computers and is Unicode compliant. Suggested by lieutenantcigarette: "If you like the dock on MacOS but prefer to use Windows, RocketDock has you covered. A superb and highly customisable dock that you can add your favourites to for easy and elegant access."
Baby FTP Server offers only the basics, but with the power to serve as a foundation for a more-complex server. Features include multi-threading, a real-time server log, support for PASV and non-PASV mode, ability to set permissions for download/upload/rename/delete/create directory. Only allows anonymous connections. Our thanks to FatherPrax for suggesting this one.
Strace is a Linux diagnostic, debugging and instructional userspace tool with a traditional command-line interface. Uses the ptrace kernel feature to monitor and tamper with interactions between processes and the kernel, including system calls, signal deliveries and changes of process state.
exa is a small, fast replacement for ls with more features and better defaults. It uses colors to distinguish file types and metadata, and it recognizes symlinks, extended attributes and Git. All in one single binary. phils_lab describes it as "'ls' on steroids, written in Rust."
rsync is a faster file transfer program for Unix to bring remote files into sync. It sends just the differences in the files across the link, without requiring both sets of files to be present at one of the ends. Suggested by zorinlynx, who adds that "rsync is GODLY for moving data around efficiently. And if an rsync is interrupted, just run it again."
Matter Wiki is a simple WYSIWYG wiki that can help teams store and collaborate. Every article gets filed under a topic, transparently, so you can tell who made what changes to which document and when. Thanks to bciar-iwdc for the recommendation.
LockHunter is a file unlocking tool that enables you to delete files that are being blocked for unknown reasons. Can be useful for fighting malware and other programs that are causing trouble. Deletes files into the recycle bin so you can restore them if necessary. Chucky2401 finds it preferable to Unlocker, "since I am on Windows 7. There are no new updates since July 2017, but the last beta was in June of this year."
aria2 is a lightweight multi-source command-line download utility that supports HTTP/HTTPS, FTP, SFTP, BitTorrent and Metalink. It can be manipulated via built-in JSON-RPC and XML-RPC interfaces. Recommended by jftuga, who appreciates it as a "cross-platform command line downloader (similar to wget or curl), but with the -x option can run a segmented download of a single file to increase throughput."
Free Services
Temp-Mail allows you to receive email at a temporary address that self-destructs after a certain period of time. Outwit all the forums, Wi-Fi owners, websites and blogs that insist you register to use them. Petti-The-Yeti says, "I don't give any company my direct email anymore. If I want to trial something but they ask for an email signup, I just grab a temporary email from here, sign up with it, and wait for the trial link or license info to come through. Then, you just download the file and close the website."
Duck DNS will point a DNS (sub domains of duckdns.org) to an IP of your choice. DDNS is a handy way for you to refer to a serverouter with an easily rememberable name for situations when the server's ip address will likely change. Suggested by xgnarf, who finds it "so much better for the free tier of noip—no 30-day nag to keep your host up."
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed reports. The Community Edition of Joe Sandbox Cloud allows you to run a maximum of 6 analyses per month, 3 per day on Windows, Linux and Android with limited analysis output. This one is from dangibbons94, who wanted to "share this cool service ... for malware analysis. I usually use Virus total for URL scanning, but this goes a lot more in depth. I just used basic analysis, which is free and enough for my needs."
Hybrid Analysis is a malware analysis service that detects and analyzes unknown threats for the community. This one was suggested by compupheonix, who adds that it "gets you super detailed reports... it's about the most fleshed out and detailed one I can find."
JustBeamIt is a file-transfer service that allows you to send files of any size via a peer-to-peer streaming model. Simply drag and drop your file and specify the recipient's email address. They will then receive a link that will trigger the download directly from your computer, so the file does not have to be uploaded to the service itself. The link is good for one download and expires after 10 minutes. Thanks to cooljacob204sfw for the recommendation!
ShieldsUP is a quick but powerful internet security checkup and information service. It was created by security researcher Steve Gibson to scan ports and let you know which ones have been opened through your firewalls or NAT routers.
Firefox Send is an encrypted file transfer service that allows you to share files up to 2.5GB from any browser or an Android app. Uses end-to-end encryption to keep data secure and offers security controls you can set. You can determine when your file link expires, the number of downloads, and whether to add a password. Your recipient receives a link to download the file, and they don’t need a Firefox account. This one comes from DePingus, who appreciates the focus on privacy. "They have E2E, expiring links, and a clear privacy policy."
Free DNS is a service where programmers share domain names with one another at no cost. Offers free hosting as well as dynamic DNS, static DNS, subdomain and domain hosting. They can host your domain's DNS as well as allowing you to register hostnames from domains they're hosting already. If you don't have a domain, you can sign up for a free account and create up to 5 subdomains off the domains others have contributed and point these hosts anywhere on the Internet. Thanks to 0x000000000000004C (yes, that's a username) for the suggestion!
ANY.RUN is an interactive malware analysis service for dynamic and static research of the majority of threats in any environment. It can provide a convenient in-depth analysis of new, unidentified malicious objects and help with the investigation of incidents. ImAshtonTurner appreciates it as "a great sandbox tool for viewing malware, etc."
Plik is a scalable, temporary file upload system similar to wetransfer that is written in golang. Thanks go to I_eat_Narwhals for this one!
Free My IP offers free, dynamic DNS. This service comes with no login, no ads, no newsletters, no links to click and no hassle. Kindly suggested by Jack of All Trades.
Mailinator provides free, temporary email inboxes on a receive-only, attachment-free system that requires no sign-up. All @mailinator.com addresses are public, readable and discoverable by anyone at any time—but are automatically deleted after a few hours. Can be a nice option for times when you to give out an address that won't be accessible longterm. Recommended by nachomountain, who's been using it "for years."
Magic Wormhole is a service for sending files directly with no intermediate upload, no web interface and no login. When both parties are online you with the minimal software installed, the wormhole is invoked via command line identifying the file you want to send. The server then provides a speakable, one-time-use password that you give the recipient. When they enter that password in their wormhole console, key exchange occurs and the download begins directly between your computers. rjohnson99 explains, "Magic Wormhole is sort of like JustBeamIt but is open-source and is built on Python. I use it a lot on Linux servers."
EveryCloud's Free Phish is our own, new Phishing Simulator. Once you've filled in the form and logged in, you can choose from lots of email templates (many of which we've coped from what we see in our Email Security business) and landing pages. Run a one-off free phish, then see who clicked or submitted data so you can understand where your organization is vulnerable and act accordingly.
Hardening Guides
CIS Hardening Guides contain the system security benchmarks developed by a global community of cybersecurity experts. Over 140 configuration guidelines are provided to help safeguard systems against threats. Recommended by cyanghost109 "to get a start on looking at hardening your own systems."
Podcasts
Daily Tech News is Tom Merrit's show covering the latest tech issues with some of the top experts in the field. With the focus on daily tech news and analysis, it's a great way to stay current. Thanks to EmoPolarbear for drawing it to our attention.
This Week in Enterprise Tech is a podcast that features IT experts explaining the complicated details of cutting-edge enterprise technology. Join host Lou Maresca on this informative exploration of enterprise solutions, with new episodes recorded every Friday afternoon.
Security Weekly is a podcast where a "bunch of security nerds" get together and talk shop. Topics are greatly varied, and the atmosphere is relaxed and conversational. The show typically tops out at 2 hours, which is perfect for those with a long commute. If you’re fascinated by discussion of deep technical and security-related topics, this may be a nice addition to your podcast repertoire.
Grumpy Old Geeks—What Went Wrong on the Internet and Who's To Blame is a podcast about the internet, technology and geek culture—among other things. The hosts bring their grumpy brand of humor to the "state of the world as they see it" in these roughly hour-long weekly episodes. Recommended by mkaxsnyder, who enjoys it because, "They are a good team that talk about recent and relevant topics from an IT perspective."
The Social-Engineer Podcast is a monthly discussion among the hosts—a group of security experts from SEORG—and a diverse assortment of guests. Topics focus around human behavior and how it affects information security, with new episodes released on the second Monday of every month. Thanks to MrAshRhodes for the suggestion.
The CyberWire podcasts discuss what's happening in cyberspace, providing news and commentary from industry experts. This cyber security-focused news service delivers concise, accessible, and relevant content without the gossip, sensationalism, and the marketing buzz that often distract from the stories that really matter. Appreciation to supermicromainboard for the suggestion.
Malicious Life is a podcast that tells the fascinating—and often unknown—stories of the wildest hacks you can ever imagine. Host Ran Levi, a cybersecurity expert and author, talks with the people who were actually involved to reveal the history of each event in depth. Our appreciation goes to peraphon for the recommendation.
The Broadcast Storm is a podcast for Cisco networking professionals. BluePieceOfPaper suggests it "for people studying for their CCNA/NP. Kevin Wallace is a CCIE Collaboration so he knows his *ishk. Good format for learning too. Most podcasts are about 8-15 mins long and its 'usually' an exam topic. It will be something like "HSPR" but instead of just explaining it super boring like Ben Stein reading a powerpoint, he usually goes into a story about how (insert time in his career) HSPR would have been super useful..."
Software Engineering Radio is a podcast for developers who are looking for an educational resource with original content that isn't recycled from other venues. Consists of conversations on relevant topics with experts from the software engineering world, with new episodes released three to four times per month. a9JDvXLWHumjaC tells us this is "a solid podcast for devs."
Books
System Center 2012 Configuration Manager is a comprehensive technical guide designed to help you optimize Microsoft's Configuration Manager 2012 according to your requirements and then to deploy and use it successfully. This methodical, step-by-step reference covers: the intentions behind the product and its role in the broader System Center product suite; planning, design, and implementation; and details on each of the most-important feature sets. Learn how to leverage the user-centric capabilities to provide anytime/anywhere services & software, while strengthening control and improving compliance.
Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam is a practical guide to network infrastructure. Provides an in-depth view of routers and routing, switching (with Cisco Catalyst and Nexus switches as examples), SOHO VoIP and SOHO wireless access point design and configuration, introduction to IPv6 with configuration examples, telecom technologies in the data-networking world (including T1, DS3, frame relay, and MPLS), security, firewall theory and configuration, ACL and authentication, Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ), IP address allocation, Network Time Protocol (NTP) and device failures.
Beginning the Linux Command Line is your ally in mastering Linux from the keyboard. It is intended for system administrators, software developers, and enthusiastic users who want a guide that will be useful for most distributions—i.e., all items have been checked against Ubuntu, Red Hat and SUSE. Addresses administering users and security and deploying firewalls. Updated to the latest versions of Linux to cover files and directories, including the Btrfs file system and its management and systemd boot procedure and firewall management with firewalld.
Modern Operating Systems, 4th Ed. is written for students taking intro courses on Operating Systems and for those who want an OS reference guide for work. The author, an OS researcher, includes both the latest materials on relevant operating systems as well as current research. The previous edition of Modern Operating Systems received the 2010 McGuffey Longevity Award that recognizes textbooks for excellence over time.
Time Management for System Administrators is a guide for organizing your approach to this challenging role in a way that improves your results. Bestselling author Thomas Limoncelli offers a collection of tips and techniques for navigating the competing goals and concurrent responsibilities that go along with working on large projects while also taking care of individual user's needs. The book focuses on strategies to help with daily tasks that will also allow you to handle the critical situations that inevitably require your attention. You'll learn how to manage interruptions, eliminate time wasters, keep an effective calendar, develop routines and prioritize, stay focused on the task at hand and document/automate to speed processes.
The Practice of System and Network Administration, 3rd Edition introduces beginners to advanced frameworks while serving as a guide to best practices in system administration that is helpful for even the most advanced experts. Organized into four major sections that build from the foundational elements of system administration through improved techniques for upgrades and change management to exploring assorted management topics. Covers the basics and then moves onto the advanced things that can be built on top of those basics to wield real power and execute difficult projects.
Learn Windows PowerShell in a Month of Lunches, Third Edition is designed to teach you PowerShell in a month's worth of 1-hour lessons. This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and it includes v5 features like PowerShellGet. For PowerShell v3 and up, Windows 7 and Windows Server 2008 R2 and later.
Troubleshooting with the Windows Sysinternals Tools is a guide to the powerful Sysinternals tools for diagnosing and troubleshooting issues. Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis provide a deep understanding of Windows core concepts that aren’t well-documented elsewhere along with details on how to use Sysinternals tools to optimize any Windows system’s reliability, efficiency, performance and security. Includes an explanation of Sysinternals capabilities, details on each major tool, and examples of how the tools can be used to solve real-world cases involving error messages, hangs, sluggishness, malware infections and more.
DNS and BIND, 5th Ed. explains how to work with the Internet's distributed host information database—which is responsible for translating names into addresses, routing mail to its proper destination, and listing phone numbers according to the ENUM standard. Covers BIND 9.3.2 & 8.4.7, the what/how/why of DNS, name servers, MX records, subdividing domains (parenting), DNSSEC, TSIG, troubleshooting and more. PEPCK tells us this is "generally considered the DNS reference book (aside from the RFCs of course!)"
Windows PowerShell in Action, 3rd Ed. is a comprehensive guide to PowerShell. Written by language designer Bruce Payette and MVP Richard Siddaway, this volume gives a great introduction to Powershell, including everyday use cases and detailed examples for more-advanced topics like performance and module architecture. Covers workflows and classes, writing modules and scripts, desired state configuration and programming APIs/pipelines.This edition has been updated for PowerShell v6.
Zero Trust Networks: Building Secure Systems in Untrusted Networks explains the principles behind zero trust architecture, along with what's needed to implement it. Covers the evolution of perimeter-based defenses and how they evolved into the current broken model, case studies of zero trust in production networks on both the client and server side, example configurations for open-source tools that are useful for building a zero trust network and how to migrate from a perimeter-based network to a zero trust network in production. Kindly recommended by jaginfosec.
Tips
Here are a couple handy Windows shortcuts:
Here's a shortcut for a 4-pane explorer in Windows without installing 3rd-party software:
(Keep the win key down for the arrows, and no pauses.) Appreciation goes to ZAFJB for this one.
Our recent tip for a shortcut to get a 4-pane explorer in Windows, triggered this suggestion from SevaraB: "You can do that for an even larger grid of Windows by right-clicking the clock in the taskbar, and clicking 'Show windows side by side' to arrange them neatly. Did this for 4 rows of 6 windows when I had to have a quick 'n' dirty "video wall" of windows monitoring servers at our branches." ZAFJB adds that it actually works when you right-click "anywhere on the taskbar, except application icons or start button."
This tip comes courtesy of shipsass: "When I need to use Windows Explorer but I don't want to take my hands off the keyboard, I press Windows-E to launch Explorer and then Ctrl-L to jump to the address line and type my path. The Ctrl-L trick also works with any web browser, and it's an efficient way of talking less-technical people through instructions when 'browse to [location]' stumps them."
Clear browser history/cookies by pressing CTRL-SHIFT-DELETE on most major browsers. Thanks go to synapticpanda, who adds that this "saves me so much time when troubleshooting web apps where I am playing with the cache and such."
To rename a file with F2, while still editing the name of that file: Hit TAB to tab into the renaming of the next file. Thanks to abeeftaco for this one!
Alt-D is a reliable alternative to Ctrl-L for jumping to the address line in a browser. Thanks for this one go to fencepost_ajm, who explains: "Ctrl-L comes from the browser side as a shortcut for Location, Alt-D from the Windows Explorer side for Directory."
Browser shortcut: When typing a URL that ends with dot com, Ctrl + Enter will place the ".com" and take you to the page. Thanks to wpierre for this one!
This tip comes from anynonus, as something that daily that saves a few clicks: "Running a program with ctrl + shift + enter from start menu will start it as administrator (alt + y will select YES to run as admin) ... my user account is local admin [so] I don't feel like that is unsafe"
Building on our PowerShell resources, we received the following suggestion from halbaradkenafin: aka.ms/pskoans is "a way to learn PowerShell using PowerShell (and Pester). It's really cool and a bunch of folks have high praise for it (including a few teams within MSFT)."
Keyboard shortcut: If you already have an application open, hold ctrl + shift and middle click on the application in your task bar to open another instance as admin. Thanks go to Polymira for this one.
Remote Server Tip: "Critical advice. When testing out network configuration changes, prior to restarting the networking service or rebooting, always create a cron job that will restore your original network configuration and then reboot/restart networking on the machine after 5 minutes. If your config worked, you have enough time to remove it. If it didn't, it will fix itself. This is a beautifully simple solution that I learned from my old mentor at my very first job. I've held on to it for a long time." Thanks go to FrigidNox for the tip!
Websites
Deployment Research is the website of Johan Arwidmark, MS MVP in System Center Cloud and Datacenter Management. It is dedicated to sharing information and guidance around System Center, OS deployment, migration and more. The author shares tips and tricks to help improve the quality of IT Pros’ daily work.
Next of Windows is a website on (mostly) Microsoft-related technology. It's the place where Kent Chen—a computer veteran with many years of field experience—and Jonathan Hu—a web/mobile app developer and self-described "cool geek"—share what they know, what they learn and what they find in the hope of helping others learn and benefit.
High Scalability brings together all the relevant information about building scalable websites in one place. Because building a website with confidence requires a body of knowledge that can be slow to develop, the site focuses on moving visitors along the learning curve at a faster pace.
Information Technology Research Library is a great resource for IT-related research, white papers, reports, case studies, magazines, and eBooks. This library is provided at no charge by TradePub.com. GullibleDetective tells us it offers "free PDF files from a WIIIIIIDE variety of topics, not even just IT. Only caveat: as its a vendor-supported publishing company, you will have to give them a bit of information such as name, email address and possibly a company name. You undoubtedly have the ability to create fake information on this, mind you. The articles range from Excel templates, learning python, powershell, nosql etc. to converged architecture."
SS64 is a web-based reference guide for syntax and examples of the most-common database and OS computing commands. Recommended by Petti-The-Yeti, who adds, "I use this site all the time to look up commands and find examples while I'm building CMD and PS1 scripts."
Phishing and Malware Reporting. This website helps you put a stop to scams by getting fraudulent pages blocked. Easily report phishing webpages so they can be added to blacklists in as little as 15 minutes of your report. "Player024 tells us, "I highly recommend anyone in the industry to bookmark this page...With an average of about 10 minutes of work, I'm usually able to take down the phishing pages we receive thanks to the links posted on that website."
A Slack Channel
Windows Admin Slack is a great drive-by resource for the Windows sysadmin. This team has 33 public channels in total that cover different areas of helpful content on Windows administration.
Blogs
KC's Blog is the place where Microsoft MVP and web developer Kent Chen shares his IT insights and discoveries. The rather large library of posts offer helpful hints, how-tos, resources and news of interest to those in the Windows world.
The Windows Server Daily is the ever-current blog of technologist Katherine Moss, VP of open source & community engagement for StormlightTech. Offers brief daily posts on topics related to Windows server, Windows 10 and Administration.
An Infosec Slideshow
This security training slideshow was created for use during a quarterly infosec class. The content is offered generously by shalafi71, who adds, "Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it relevant to your people. Include corporate stories, include your audience, exclude yourself. This ain't about how smart you are at infosec, and I can't stress this enough, talk about how people can defend themselves. Give them things to look for and action they can take. No one gives a shit about your firewall rules."
Tech Tutorials
Tutorialspoint Library. This large collection of tech tutorials is a great resource for online learning. You'll find nearly 150 high-quality tutorials covering a wide array of languages and topics—from fundamentals to cutting-edge technologies. For example, this Powershell tutorial is designed for those with practical experience handling Windows-based Servers who want to learn how to install and use Windows Server 2012.
The Python Tutorial is a nice introduction to many of Python’s best features, enabling you to read and write Python modules and programs. It offers an understanding of the language's style and prepares you to learn more about the various Python library modules described in 'The Python Standard Library.' Kindly suggested by sharjeelsayed.
SysAdmin Humor
Day in the Life of a SysAdmin Episode 5: Lunch Break is an amusing look at a SysAdmin's attempt to take a brief lunch break. We imagine many of you can relate!
Have a fantastic week and as usual, let me know any comments.
Graham | CEO | EveryCloud
submitted by crispyducks to ITProTuesday [link] [comments]

Groestlcoin June Development Update & Release!

Another Quarter, Another Release! The Groestlcoin production factory has been working overtime as always in order to deliver even more tech to push Groestlcoin mainstream when the time comes.
There have been many new fantastic wallets and exchanges added to Groestlcoins repertoire over the past 3 months so we will re-cap these before moving on to what is new today.

Recap

What's New

Re-forged: Groestlcoin Samourai

Groestlcoin Samourai is a wallet for the streets. A modern Groestlcoin wallet hand-forged to keep your transactions private, your identity masked, and your funds secure. Its main advantages are its extreme portability and is the most secure Groestlcoin mobile HD wallet.
We've built a wallet that Groestlcoin deserves. If you are looking for a wallet that Silicon Valley will never build, the regulators will never allow, and the VC's will never invest in, this is the perfect wallet for you.
![Groestlcoin Samourai Release Video](http://img.youtube.com/vi/i3WU8Tde8XQ/0.jpg)

Head over to the Groestlcoin Samourai Release Page here for the full release announcement.

New: GroestlImage

Groestlimage turns any file into a mnemonic phrase allowing users to generate Groestlcoin private keys and addresses based on the data URI of the provided file. A picture is worth a thousand Groestls.

Features:

Link

https://groestlcoin.org/groestlimage/

Source Code

https://github.com/Groestlcoin/groestlimage

New: Groestlcoin Core Config Generator

Groestlcoin Core Config Generator is a simple GUI to configure the groestlcoin.conf file – A developers dream tool!
Each configuration option is available via the user interface, grouped by what attributes they affect. For ease of getting started with a new configuration, a variety of preset "node classes" are available on the right-hand-side of the screen. Selecting a preset will load our recommended base configuration for a node fitting that description, at which point you can then tune the configuration at the single option level.

Features

Link

https://config.groestlcoin.org/

Source Code

https://github.com/Groestlcoin/groestlcoin-core-config-generator

New: Groestlcoin Dumb Block Explorer

Dumb Block Explorer is a trivial block explorer written in a single PHP file. Now everybody can run their own block explorer.

Features

Link

https://www.groestlcoin.org/explore

Source Code

https://github.com/Groestlcoin/dumb-block-explorer

New: Groestlcoin SMS Push TX

Groestlcoin Simple Push TX is a server to push Groestlcoin transactions via SMS. Now everybody can send new transactions via SMS if the Internet is not usable (i.e. blocked by government entities or becomes otherwise unavailable).

Features

Source Code

https://github.com/Groestlcoin/smspushtx

Update: Electrum-GRS 3.3.6

Electrum-GRS is Groestlcoins #1 thin-client for Windows, MacOS, Linux and Android, based on a client-server protocol. Supporting multi-sig wallets without the bloat of downloading the entire blockchain.

New Features (Universal)

New Features (Windows, MacOS, Linux)

New Features (Android)

Link

https://github.com/Groestlcoin/electrum-grs/releases/download
https://play.google.com/store/apps/details?id=org.groestlcoin.electrumgrs

Source Code

https://github.com/Groestlcoin/electrum-grs
submitted by Yokomoko_Saleen to groestlcoin [link] [comments]

The main events of the week: MasterCard and VISA impose restrictions on Forex cards, cryptocurrencies and ICO. See our report for other useful updates.

The main events of the week: MasterCard and VISA impose restrictions on Forex cards, cryptocurrencies and ICO. See our report for other useful updates.
We present to you the report filed by the analysts of our closed club for October 15–22.
Main market events
1) One of the world’s largest asset management companies, Fidelity Investments, announced the launch of a Bitcoin and Ethereum trading platform for institutional investors in early 2019.
2) MasterCard and VISA are imposing restrictions on card payments in underregulated and risky companies from such areas as Forex, binary options, cryptocurrency and ICO. MasterCard promised to do it next Monday, VISA — in December.
3) Users who lost their funds when a Singapore-based WEX exchange disabled the withdrawals decided to team up to take up the matter with the Russian police.
4) Barclays Investment Bank froze the launch of its crypto-trading project. The reason for that was not disclosed.
5) Sony will develop a blockchain for its written data copyright management system.
6) A new version of the Parity Signer app has been released, which allows turning old phones into crypto-wallets. It can also double as a security system on MyCrypto platform and MyCrypto wallet.
7) In Tolyatti, at the AvtoVAZ enterprise, a cryptocurrency mining farm was discovered. Since 2017, the farm has stolen 600,000 rubles worth of electricity from the enterprise, and mined over 1.2 million rubles worth of bitcoins.
8) By the end of the fall, the blockchain platform Telegram Open Network (TON) will be launched in test mode. The development of protocols, the mechanism of smart contracts and the TON blockchain network is almost complete.
9) Bithumb has officially opened a decentralized exchange. Until October 15, users will get a chance to run fee-free transactions and participate in the airdrop. Also, 1,000 most active traders will receive 500 ETH from Bithumb.
10) A New Zealand developer managed to send Bitcoin 12 kilometers away using four goTenna devices and a $30 Android phone without Internet connection, cellular communication or electricity.
11) Bitcoin Core developer Jimmy Song claims that EOS is a scam, and Ethereum is an amateur project. He is very enthusiastic about Bitcoin though.
12) Crypto enthusiasts caught American Express promoting articles criticizing Bitcoin. The American financial company that issues credit and payment cards, as well as traveler’s cheques, promoted a Twitter post of a Bloomberg TicToc news account with the title “The crypto industry is using more energy than all the world’s electric vehicles”.
13) Chief strategic officer of Ripple Cory Johnson claims that the administration of US President Donald Trump is concerned that China is a world leader in mining of cryptocurrency.
14) The head of the Central Bank of the Russian Federation Elvira Nabiullina stated that Russia has started forming a sound attitude to cryptocurrency.
15) On November 5, the USA will auction 660 BTC, which were seized by law enforcement agencies earlier.
Market analysis from club experts for October 15–22, 2018
The last week proved to be really good for many holders, despite the fact that BTC failed to grow over the week. Though Monday was surprising with its USDT rally. However, the things evened out later and no turmoil was observed over the week. After a huge $17 billion fall on Monday, the total capitalization climbed back to its usual level of $209–211 billion by Monday evening, where it remained until the end of the week. Monday’s trading volumes doubled due to active exchange of altcoins and the BTC, and then things got stable again: $22 billion on Monday, $10–12 billion by the end.
BTC dominated the market at 54% mark, a shift in the share would mean a change in the interests of traders, but this has not been the case so far. Price for 1 BTC grew from $6,300 to $6,800 (on some exchanges, the price reached $7,860) in a matter of hours, then bounced back to $6,450- $6,550 and remained around that mark until the end of the week ($6,515 at the time of the report). This spike in the BTC price was due to a well-planned campaign against the USDT. Persistent rumors about Bitfinex issues, idle wallets due to kernel updates, fake Tweet from Binance — all this resulted in short-sighted holders rushing to change USDT to BTC at any price — that of course just happened to skyrocket. If you are a trader, cool head and lack of emotion shall be your default state. If you are a long-term investor, stick with BTC and reliable altcoins. Second-guessing is not a good idea now! The silver lining is almost there!
TOP-3 growing coins from the long-term portfolio for October 15–22, 2018 (including portfolio updates) The fastest-growing coins for the last week: BAT + 52% (updates and rumors), Mysterium MYST + 34% (high-quality updates), Elastic XEL + 30% (major updates).
Changes in the cost and capitalization of the TOP-10 cryptocurrencies in October 15–22, 2018.

https://preview.redd.it/2cbxps7ifxt11.jpg?width=672&format=pjpg&auto=webp&s=26028002053247229513d5be7ce0b94d63d5bd0c
Do you want to be the first to receive updates and trade signals? Join @gitsupport and start earning with us!

submitted by Golden_Island_Club to u/Golden_Island_Club [link] [comments]

void salad

There's so much good material in Critical Shower Thoughts, you as a community should feel proud. Here's some of my favorites from among the stuff you voted to the top.
from u/RMFN 's Retribalization in the age of illiteracy. Prepare to have your mind blown like Zeus birthing Athena.
Instantaneous electronic communication has made the whole world the size of an iPhone. Electronic media has the effect of making the ordinary individual gigantic. Post literacy has created a society that does not have time to read. When knowledge is everywhere and instantaneous it becomes impossible to effectively absorb. Television is a mythic and myth making medium. The shadows taken for truth on Plato's cave are the flashes and sounds of our HDTV sets.
Everything that is flashed on the screen creates a self luminous two dimensional avatar of a physically real object removed from time and space. Once television melded itself onto the realm of leisure sports the televisual tribe was born. The realm of sports has made a neo tribal structure based on the digital geography of the time slot and not ethnicity. The sports team itself does not unify the individuals who follow the team. No, it is the ritual battle of the televised avatars that creates the tribal ties.
Now every individual is imitating the metamorphosis made by Elvis from man to a two dimensional electronic media avatar. This is the age of personal mythology. The persona or mask has replaced the individual in the form of the electric two dimensional avatar. People live through their facebook avatar and no longer live their lives. It is the individual trying to form their own personal myth in a world without the traditional unifying sign regime of Christian iconography. The personal myth fills the void left by the death of god.
from u/cro_magnet 's "Cultural Marxism is a war on Oxytocin"
Do you think just because you manufacture your own supply of a molecule, in the core of your brain, that war can't be waged on it? Oxytocin is a peptide hormone produced in the hypothalamus, deep in our limbic system near the brainstem. It is stored in - and released from - our pituitary gland, AKA the "master" gland. Oxytocin has a half-life of about 3 minutes in the blood, so its effects are very short-lasting, but it initiates a cascade of positive hormonal events that reinforce overall health and pro-social behavior. Its release is especially affinitive to touch: a hug, a handshake, even a Duchenne smile can evoke it... it's enmeshed in the intricate nonverbal dance, the largely subconscious symphony of communication linking all humanity. It's also intimately involved in father-child bonding, lactation, wound healing, sexual arousal, and orgasm (when again, its release is copious).
Oxytocin release reduces fear and anxiety, quelling the amygdalae (crucial dangealert neurostructures) and suppressing the stress hormone cortisol. It evokes contentment, enabling feelings of calmness and security by inhibiting overactive brain regions associated with behavioural control. Deprived of it, we are scattered, timid, and paranoid: shut inside ourselves. Trust is increased by oxytocin: it affects social distance and friendship, and plays an essential role in romantic attraction and subsequent monogamous pair-bonding. We find receptors for it in the heart, and in the vomeronasal organ, which is directly wired to both the hypothalamus and the amygdalae. Thus we detect it pheromonally, and when bonding in person, this facilitates mutual positive feedback.
The Western cultural mindset has its feet rooted in the bedrock of Ice Age Europe. Its ethos of openness, cooperation, stoicism, and personal sacrifice towards the future of the community was an adaptation to the harsh environment. It made sense to help strangers and contribute. Cultural Marxism exploits this deep-rooted template. It operates chiefly through the manipulation of language and managing mass-perception, and its most effective adherents are indeed uniquely talented in their capacity for the generation of new terms and symbols and the redefinition and recontextualization of old ones, often flipping them into new meanings exactly opposite from original. This is something Orwell foresaw with great prescience. The thinking style it engenders has gained dominance over the channels through which information and opinion are disseminated, principally academia and media, and is now being standardized as the "official" cultural framework of business.
from u/depdepdepdepdepdepdp 's I believe men are the more emotional sex and that our stereotypes of men are based on conditioning, rather than inborn traits
Tears. Men do not cry less easily because they prevent themselves from doing so. Male tear ducts are shaped differently (making it more difficult to cry) and the tear wells are deeper (meaning men can "tear up" without shedding tears - women cannot). Men have fewer chemicals that allow for the shedding of tears than women, and more testosterone, which hinders tear production.
from u/magnora7 's The problem with being moderate now is that the right thinks you're pushing leftist talking points, and the left thinks you're pushing rightist talking points. In this way, the center is abolished, and only extremism is allowed to exist. This polarizes the culture which makes it easier to control.
When everyone is pushed to extremes by this mechanism, society becomes this dichotomy that is easy to control. If everyone is forced in to one of two categories by the mechanisms of public shame, with no grey area allowed in between, then the owners of our country can predict easily what the two sides will do. It makes the two sides have more power than the middle just by sheer population, which means conflict is inevitable between the two sides, and thus the country.
from u/elnegroik 's Tulsi Gabbard is a member of CFR- Council on Foreign Relations. She's being primed for 2020 as controlled opposition to perpetuate the illusion of duality. The following are a series of observations from my recent post on conspiracy. I'm keen to be challenged so please don't be shy.
The reason that presidential candidates’ promises of “change” go largely unfulfilled once in office: they draw their top personnel from the same establishment groups — of which the Trilateral Commission is only one. Chief among these groups is the Council on Foreign Relations (CFR), the most visible manifestation of what some have called the American establishment. Members of the council have dominated the administrations of every president since Franklin D. Roosevelt, at the cabinet and sub-cabinet level. It does not matter whether the president is a Democrat or Republican. As we will see, Barack Obama is no exception to CFR influence. Effective way to close a prospect is by pitching a the extreme choice as an anchor, so when you offer the moderate option (the one you always wanted to offer) the disparity makes compliance easier.
They've been controlling the political dialogue since their inception, with a revolving door straight into the White House. You suggest I may be hasty in indicting her as controlled opposition before she's done anything- I disagree. I'm being prudent, in delaying my endorsement until the concerns I have are addressed. It seems unlikely Gabbard will reach office and choose that point to disavow herself from the organisation that's provided the apparatus for her predecessors. When she doesn't, it's a given she'll proceed to fill her cabinet with the exact same CFR characters that have populated her predecessors. Voila! -synthetic change occurs and the false dichotomy continues.
from u/911bodysnatchers322 's The Occult is a type of intelligence test
If, however, you take the activity of studying the occult seriously, you start to see things. First and foremost, that the world is made of language, and that your interface to language is through symbols. And through symbols, one is able to understand not only language but the evolution of culture, the evolution of civilization. For example, what does a symbol mean and how did it 'acquire' that meaning and by which groups in history. If one group adopts a symbol, then you can pretty much be sure they came in contact with another group that also used that symbol. We take 'found things' and make them ours. We build our culture, like a raven's nest, out of the shiny, or the scratchy, or colorful things we pick up along the way. We grab things along the way, suggesting we were in an specific area, or along a specific path.
So to my mind, if you don't have definitive hard 'proof', but you have polyangulation, then you have a very good reason for your suspicions, as they are based on oblique coincidences that are almost an attempt to mock you by telegraphic covert allegiances. In the case of google, we have at least one hard proof of their connection to cia, and that's enough to form a betrayal of their customers, and enough to give us reason to keep an eye on them. But just one eye. For now.
from u/omenofdread 's Many Americans are unaware that they are de facto Satanists.
According to a few sources, (allegedly, as I am not a Satanist) Satanism is pretty much all about the four tenets: Service to self above all else, moral relativism, social darwinism, and eugenics. That's really all you need. In the same way that a "good christian" can go about his life without entering a church, just by living The Golden Rule, many Americans are going about their lives completely unaware that they are "good Satanists". Like it or not, the US has a bunch of really dark symbolism going on its currency and several of its "great seals". You may not "believe" in these kinds of things, but they did, and they do.
from u/Wolfwoman1210 's There's no grand conspiracy there's just a whole bunch of privileged assholes ruling the world and all they are doing is feeding their own egos and bank balances until the day they die and then their children get to take over.
I've worked in government and I've seen the same mentality there, people who think they know what's best for everyone else, people who are screaming for attention & a pay-rise, coming up with ridiculous controls and plans simply because they think they know what is best and because they have other people's money to spend. You know what you morons? I don't believe you ever got past Piaget's formal operational stage and you are screwing up the world not because you are clever but because you have way too much money or more brains than sense. These people have no mental capacity to truly think about the abstract and therefore cannot even conceive of the multi-faceted ramifications of their actions or they are so caught up in self that they don't even care to try & think about it.
So for now I am going to focus on what makes me happy and that's the simple things like looking at nature, sitting amongst it, breathing it in, just admiring the beauty of this world. That's all I need in this life other than the usual food, shelter & water, I just wish it was all everyone else needed to feel happy. So current plan of attack is, to ride this wave, enjoy the beauty in this world that does still exist, teach my children to see the beauty, be kind to others when it doesn't feed another ego, and hope, hope is all I have. Anyone got better ideas?
from u/murphy212 's The Real Conspiracy of History - the biggest scam is not that it's a lie, but that it focuses on the recitation of war crimes committed by psychopathic conspirators.
It took me years to realize this wasn't an organic, random occurrence. It's part of the big lie. From what I gather America is somewhat exempted from that ubiquitous statist paradigm. They use over there another method: schools barely teach history anymore (no offense to Americans). And the little they teach still suffers from the same statist bias (e.g. how Lincoln was such a great president for waging war on his countrymen). Do you know the name Thomas Newcomen? I didn't either. He invented the atmospheric engine in 1712, which heralded the start of the industrial revolution. Or George Stephenson? He is responsible for the locomotive and thus the historical transcontinental American railway system. These are important historic events, and people, and yet they are barely ever mentioned.
Humans came up with the idea of the shipping container in the 19th century. Before that, goods were handled individually as break bulk cargo; unloaded one at a time from the boat onto the carriage, and vice versa. A standardized transportation box would have been a great idea in Antiquity (they had quite effective manual cranes). They were smart, they did tremendous commerce, and yet they didn't think of it. For many millennia nobody had thought of putting the stuff in a big box. The "container revolution" is directly responsible for an increase in world commerce of 700% in just 20 years. This is much larger than the effects of all so-called "free trade" agreements.
The point is made. So what is the truth? Stochastic and distributed innovation is, has always been, and will always be, in aggregate, superior to monolithic, centrally planned undertakings. This is an observable fact of nature: unilateral action, trial and error, and competition are what characterize it. This is why Wikipedia is superior to Britannica, Linux superior to Windows, or crypto-currencies superior to fiat money; this is also why economic freedom is congruent with prosperity, and why freedom of expression is a thing. They trust only the organized collective - with themselves atop. Arguments such as "military research and wars help scientific innovation" are complete and utter bullcrap.
from u/BrapAllgood 's Your Primary Energy Source
I don't want to give you all of my own patterns, though, I just wanna help you find yours. I'll be happy to revisit the subject another day, share more of my personal rituals, but right now I just want you to get yours going...and explore, wouldya? Also...anyone here tend towards wild emotions? I guarantee you that you suck at breathing, for starters-- and too much of a good thing can be a bad thing, too-- it's not about quantity, it's about quality. Proper breathing centers you by reaching a parity of being. If you learn to breathe properly AND DO IT, you will find yourself a new person, not the...I'm not pulling this punch: not the asshole you normally can be to others and yourself. o_o And this goes deeper than I'm willing to this day. Just sayin'...if I get too 'newage', people like to turn off and give themselves that excuse to do so...but there's a deeper layer here and it's as invisible as your breath usually will be.
If you find yourself winding up inside, getting tense, anxious-- any of that sort of language being needed to describe it, you can STOP, close your eyes or lose their focus, whatever works for you, and even one minute of 4x4 can reset you. Again, there's a deeper layer available as to the why, but it will also just encourage argument, which I have no interest in-- believe what you like, even if it's dumb. I'll be okay. :) Food, water, shelter-- none have meaning without your breath. Love, hate? Need breath. It all needs breath, which needs breathing, so it's damn time you learn this Human Skill. No other one human is likely to give you what you need for this, but YOU ARE THE ONE to figure it out for yourself. You need to be able to sit and breathe and know you are doing something, not nothing. Make that a goal, if you haven't achieved it yet.
from u/LightBringerFlex 's I spent a full year studying the matrix. I'm not done yet, but this is what I found so far.
The 5 personality points of God are listed below. It is also important to know that God represents the self actualized mind. We are all aiming to become God once again after a massive decent from the God head. Keep in mind, God doesn't do anything unless it has a purpose so these 5 personality points, which he himself created as he precedes everything including things like Love, Fun, Freedom, Unity, Peace; This is who we all are at the very core of our self actualized mind. One of the purposes of the matrix is to achieve this over multiple lifetimes. The matrix is a section of God which is darkened. What God wanted to do was descend in 2 separate levels where he loses most of his power and yet has needs/desires just like he does in infinity although all of his desires are met in infinity.
So God makes the matrix by using multiple big bangs. The matrix occasionally has game changing moments and each planet also has game changing moments. The nucleus in the center is infinity and the center works like a monster 3rd printing machine that prints copies of multiple things such as the Nebula. Around the nucleus is a universe outside of time space. Outside of that are the 4 outerspace regions where only particles remain. The lowest descenders start off as particles and work their way inward towards the nucleus over multiple lifetimes. Ignorance involves not knowing what to do and believing incorrect actions are correct actions. The ego's main job is to act as the devil on the left shoulder thereby adding challenge to the matrix game and giving us total free will on which path to choose. We can choose the ego or we can choose life itself. The ego's main job is to drive people into insanity and the intuitions main job is to save people from insanity.
We were growing so he came in and gave us the inside scoop that God really is love, forgiveness restores burned bridges which is important for productivity and quality of life, that all the religions were wrong and misleading us, and finally the ego convinced the local religious cabal to kill Jesus "because he was so perfect that he was a blasphemy to God since God says none of us are perfect". Jesus was the first one to call out fear based religion as bullshit however, we still run fear based religions! He knows that we are in a matrix and he knows the worst possible outcomes. He knows how people go insane and why. This matrix is more of a dream than reality because none of this can actually happen in reality so the matrix had to be made for us to experience ungodliness. After this life is over, we all meet up in infinity and laugh it all off.
So, what God wants is that each person uses God consciousness to walk the earth with God's power in a magic wand. That magic want stems in a superconcious part of our minds and the tunnel to it is the intuition. The intuition is labeled as the highest/clearest thought in the mind. His enemies would go to arrest him and change their minds because he "says such wonderful things." He was fearless, highly optimistic powerhouse of a man, yet still humble, very loving and people were shocked when he kept his calm, peaceful posture upon his death sentencing. He looked like everything was perfectly ok in court waiting for them to finish. He was completely unphased and in peace even when they sentenced him to death. He loved the animal savage as much as he loved the spiritually enlightened. He loved the criminal as much as the cop. He only hated error. Note: Good and evil are really progress and regress. Politics is spirituality in action. Spirituality is learning how large sectors of life work together and how life behaves as one big organism.
As far as our planet goes, in a nutshell, we have a problem. The elite are acting like cancer on the planet since they don't realize we are all the same person in essence and most everyone is heading into different directions. A planet must operate as clockwork and we are at a point of either self-destruction or we will enter the golden age of mankind. The problem with the Muslims is that they militarized their religion. The Christians made the mistake of turning every heavenly pleasure into a sin (i.e. Making money, sex, managerial power). The Jews made the mistake of thinking they are a chosen people which is common among primitive people. Education is problematic because they teach us everything except how to do a job properly. They also separate age groups instead of forcing older kids to teach the younger students which in turn, locks the info in memory. Representative government is good but you need to put angelic geniuses in power, not greedy selfish monsters. Also people need to be a part of politics and not just sitting on the sidelines. I'll leave you with a quote from masterpiece Conversations With God: "If you knew how much the elite were holding back from society, you would kill them with your bare hands."
from u/twiceblessedman 's Four words you may need to hear.
We're working on fixing this together, even if we're separate. Despite his flaws, at his core, man is good-willed, and we'll be able to solve the problems of our species. With the advent of computers and a global internet, we are now able to share knowledge and ideas with virtually anyone on the planet -- who knows what might spark the creative drive of the next Da Vinci or Tesla? The point is that there's a much greater chance of that young genius coming to fruition if everybody has access to the collective human knowledge gained by the work of our predecessors. Anyone on the planet could have the right brain to solve global warming or the energy crisis because who knows the recipe for genius? If we want our species to advance and prosper, we need to raise problem-solvers who can solve the critical problems facing our world today.
When you get down to it, language can be simply defined as the shared mental associations with certain patterns. We see these meaningful combinations of lines or hear a meaningful combination of vibrations and we interpret it as a certain word, which in turn elicits an idea that is, on average, the same as other people's idea of that word. And as I understand it, neuroplasticity is basically the brain's ability to make the connections between neurons (neural pathways) and that's what makes those pattern-idea associations possible. So if we consider the whole "critical period" for language acquisition, the question becomes: do we lose the ability to truly learn more about the patterns of the world at a certain age? My theory is no, we do not lose that ability. But we also do not use it, so it atrophies. Anyway, play puzzle games, they help you loosen up those pathways.
from u/Axana 's Revisiting “Curious George": A dark tale about a prisoner who happily forgets he is living in a prison.
The native is living peacefully in nature until the system, literally called “The Man” in this story, invades his paradise armed with a gun. The native is forced into an utterly foreign and unnatural lifestyle, and is then severely punished by the law for not understanding it. Despite multiple attempts to escape this oppressive civilization, the native always comes back to his captors. The native then happily accepts his new prison and eventually forgets his old, peaceful, free life in nature. What if this is the history of humanity? Were we uprooted from paradise (the Garden of Eden?), forced by The Powers That Be into a system that generates physical, mental, and spiritual suffering, and then collectively forgot over the generations that we are prisoners are living in a free range prison?
from u/taomark 's Everyone else has already evolved. All the Synchronicity you experience is everybody shouting back to you to get you to wake up.
The idea is, YOU (Or I) are the last one to evolve. Everyone else has moved on to the next "stage," and you're the last hold up. All the people you see in the world around you are not separate people, they are just different ways of being Not-You, that you're experiencing subjectively. You're not seeing other people, you're seeing patterns of light and energy, and you are the one entitizing them with personality, the source of which is your own Self. The reason they can't just tell me directly is presumably because of the distance between us. In this metaphor, the vertical distance of the well shaft is the equivalent of evolutionary progress through dimensions of consciousness. The language that the folks at the top of the well are shouting in is far beyond what I'm capable of processing with my limited bottom-of-the-well consciousness. Instead of being able to say, "Dude, you're in a well. Follow my voice and climb out", the message ends up taking the form of a narrative of synchronicity and symbolic happenings, slowly but surely guiding me toward the realizations I need to be able to move on from this place.
Sometimes, when I've been in the midst of super bizarre experiences, and when my research into esoterics is starting to get very real, I start to see and hear everyone differently. I feel like they all get it, but they can't just come out and say it. They all can only hint at it, and there's this unspoken understanding that they know exactly where I'm at. I'm even talking about complete strangers, people driving by in traffic, people at the supermarket. They all get it. They all know. They're waiting for me to get it, dropping hints and giving me secret looks. Sometimes it's gotten so intense that I've become honestly afraid that I'm cultivating schizophrenia, and I drop all of my research and try not to think about any of this stuff. Does anyone know what on Earth I'm talking about
from u/LEGALinSCCCA 's Cities disgust me
I look around at all of these people, doing all of this wrong stuff, because they refuse to educate themselves. For example, eating sugar and processed crap. Aggressiveness and rudeness. Gangs, drugs, sex, greed etc. Nature and lack there of. Willingness to help. Pollution. They often have devastating drug problems. There are definitely rude people. There are authoritarians the too. It's just, the city is like a prison without walls. It's not safe, it's unhealthy, it's bad for you, it disconnects your spirit from nature.
from u/2birds1bone 's Food has been weaponized
So I just completed my second month of the Whole 30 diet. Only organic, free-range, grass-fed food. Fairly expensive to eat this way and.. I feel fucking amazing. Better then I've felt in 20 years (I'm 35). Our mainstream food supply is fucking poison. It disrupts your hormonal balance and toxifys your brain. I'm not going to shill for the Whole 30 diet specifically, but try eating organic and cut out sugar or dairy. It may change your life.
from u/mtryp 's Haunting Nostalgia
Have you ever driven down familiar roads at night, places where your soul was paradoxically tormented, yet soared highest at the same time? When you were the confident person you used to be, the one who took on this matrix, this conspiracy head first, and now you collide with the fragile mess that you've become? Have the disorienting lights and noise pollution which fill the darkness around you, ever hit you all at once, and you literally feel every single lie, slicing through your senses? This 21st century, to you, feels like we're living in the distant past. While everyone around you is boasting about their new smart phone, or talking about whatever hypnosis is being spewed from the TV, you're quietly contemplating all the exotic energy technologies that could literally heal our planet, our bodies, our lives. According to your intuition, your higher self, this is the distant past. Everything you know to be true is inverted within surface reality.
You know that everything is energy, and energy fields can be manipulated in a positive way, to heal your own personal ailments, so you take whatever you can get, whatever suppressed technology slips through the cracks. Your body unfortunately lives in the distant past, yet your mind and soul live within the infinite potentials that you know exist. This division creates immense pain, causes you to self destruct physically and emotionally. The more you learn about the actual reality of things, the more distance keeps growing between you, and everyone you know and love, because their minds and souls are trapped in the distant past. You lose people, because you can no longer relate; you live in the real world, and you're tired of faking it, to be superficially accepted in the pseudo world. It's the isolating journey of a spiritual warrior. And so you come here, because at this point in your journey, this is the closest place to home.
from u/murphy212 's If you realize all your sensory experiences, emotions and thoughts are projections on a screen, and if you learn to notice the screen, and the light that shines on it, you will achieve self-realization and peace.
The number one existential fact is the answer to the question: "who am I?". To that question, I can only reply "I am conscious". So the question becomes: "what is consciousness?" A corollary to that is: "is it fundamental in the universe, or is matter the fundamental, prime component?" If however consciousness is a fundamental substance in the universe, these are not only chemical reactions, they have an absolute quality. In a nutshell, a particle of matter is a wave (probability) function up until it "collapses" (i.e emerges into reality) when it is observed (more precisely, when an observer is made aware of it). So particles exist in reality insofar as they exist as "knowledge" in an observer's mind. This is what contemporary science teaches us. Intent produces and drives the universe, and everything inside it. Even rocks. You are consciousness. The material world you experience is an illusion. here is a substrate that is common to all your experiences, something that's already there, always present, an observer, an "I", that allows for everything to exist in your realm; if you sense it once, you'll know; at first it'll provoke a small (kind of) (existential) "vertigo". It is sensed by simply asking yourself "who am I", not trying to answer through the mind, but rather by trying to "touch" that underlying feeling, substance.
from u/Vich88 's The Trivium
The trivium works as grammar (acquiring knowledge) which is then processed by logic (who, what, where, when, why and how, basically critical thinking) followed by rhetoric which is an ability to speak about or teach the ideas you have learned and stabilized by logic. This is the method to acquire the ability of how to learn rather than what to be told and then repeat with the belief of that being an education. As I study this I realize how immature I am with critical thinking and how the system has sculpted me to just repeat and not think for myself.
from u/420baker 's The apocalypse is upon us..
Apocalypse (Ancient Greek: ἀποκάλυψις apokálypsis, from ἀπό and καλύπτω meaning "uncovering"), translated literally from Greek, is 'through the concealed', meaning a disclosure of knowledge, i.e., a lifting of the veil or revelation. In religious contexts it is usually a disclosure of something hidden, “a vision of heavenly secrets that can make sense of earthly realities" Basically, the point of my post is to change your understanding of the word, next time you see the latest end of days movie or see anything referring to the apocalypse, you know it's true meaning, it is not death and destruction, it is to bring truth, a revelation if you will to help us evolve. Do not let fear into your world. An afterthought: We are in the information age, the internet is still young and we all know it isn't being used to it's full potential. We have the tools, just not the know how. It will come.
from u/ge01f 's Improving the bicamerality of your brain, improving the communication between the hemispheres
If you look at animals, and look at their eyes, you can see that the apex predators of their realm (as we are, in some ways) like tigers and lions and bears, they have no darting of the eyes. No noticeable saccades. They might still saccade, but it is not like modern civilized people do it, and my thinking on this current is that it is because they are not neurotic, and we are. When compared to aboriginal people, I have the same impression: they are not neurotic, and we are. Once you know the process, new exercises are easier to describe, and you can make up your own, once you understand the patterns, and you can learn more about the patterns to start making your own patterns as well. You have all the information available to you, if you can use it.
from u/CharCzard 's MEMEs ARE MAGIK...
It seems that there is only one law regarding spirituality that can be quantified by science. The law of attraction. But hidden in this law, is the ability to attract as-of-yet formless things, and make them manifest on earth. Whether those formless things we are able to will into existence really are products of our imagination, or just pre-existing jungian archetypes seems to be a 'chicken or the egg' type of situation.. but regardless, The law of attraction is the basis of any synchronistic phenomenon we all might experience throughout our lives.. the universe is simply manifesting our conscious or unconscious desires into reality. The belief, is that if enough people will something, the universe will manifest it. If done correctly, what else is a meme other than the proselytizing of an idea, that spreads throughout the collective, whom subsequently yearn (if unconsciously) for a manifestation? MEMEs can literally be talismans, in every definition and understanding of the word.. the infusion of a symbol, with an idea, and a shared cultural experience (ritual).
if i had to take a guess as to how this works... "Gods" are archetypes of what Jung called "the collective unconscious." They exist as archetypal patterns whose traits manifest in man and are thereby recognizable in this way because the only way to freely interact with the divine is through nature which we are a part of. The traits are deemed what is best in man and reoccur enough that they are in effect deified by their very nature of reoccurring and never being forgotten, for they reside in the blood memory of a race and continue as long as a people do. I'd assume it'd be that all of these "lesser" (but still awe-inspiringly powerful nonetheless) deities are either memetic archetypes, or preexisting lifeforms/conscious entities of their own right with incredible power that have been understandably-mistaken for at/the god. I would also to like to expand on how this relates to propaganda. It is important to note that all of these archetypes will appear on their own through stories.
from u/pieceofchance 's The grand deception: Binary Thinking
Crucially, when you begin thinking in threes, all of your knowledge begins to come under far more scrutiny than previously – you can't think in threes without adopting the principles of fallibilism. Fallibilism is quite simple in essence, and is also the foundation of the scientific method; it is the axiom that no matter what we believe, our knowledge ever remains possibly wrong and open to revision. It is ever possible that new information or a new interpretation on old information can radically change everything we believe, and it is only on this basis that we can have any assurance of our conclusions. It is only through such a process and with such an approach to the nature of epistemology that knowledge can become legitimate. The grounds upon which we can make a claim to knowledge cannot be littered with hypotheses we hold beyond proof of their illegitimacy, and we must be prepared, if we are in search of knowledge, to cast aside what we believe to be true as being in fact wrong with less hesitation than if we were to be learning a new fact or word or term for something already known.
The tapestry of reality may be much more complex than you imagine. A thing can at once exist in many manifestations: a being, a vibration, a colour and sound (both just vibrations), a musical note and an entire endless symphony, fractal in composition. The same thing can also manifest as what may be otherwise considered binary opposites, an example of this might be that you can only ever hate another person as much as you have loved them. In binary thinking (as in the scale repeated to us ad nauseum of the polarity between love and fear), these emotions (expressions of Secondness) are opposites, but you know intimately that this is just not true. When observed from a perspective removed from time and chronology, when a life is viewed in its completeness of becoming (in a circle), every expression of hate overlaps in a perfect sine wave with the measure of expression of love.
from u/iamablackbeltman 's The Plan
We want the best future. We offer them contraception that they might indulge every sexual desire with no long term repercussion. We offer them ethanol that they might distance themselves from their sorrows for a while. We offer them a platform with which they might exchange ideas with people all over the earth in an instant with the hope they might stumble upon the right ideas. For the people too busy to alter course for long, we have provided plants, fungi, and lab-synthesized chemicals that they might pause for a moment and realize that life can be something different. We use fear that the cream might rise to the top. Be the fittest you can knowing you are constituted of ideas. We love you.
I made it through 125 of them feel free to turn it into an Olympic sport, carry the torch. These articles stood out to me while searching around for interesting material.
edit: 6:04 am 5/31 , I just now realized I included two of murphy's articles, nice writing lol.
submitted by Ninja180p to C_S_T [link] [comments]

Snapcash Binary Review - Real Review! Binary Options Trading System Review Avoid Binary Scams & Earn Real Binary Income NOW! Binary Options SCAMS!!!! TradeRush & Franco - YouTube Binary Options Ultimatum System - Trading System Ultimate4Trading Review  Scam or Legit Binary Options Trading Binary Options Broker Scams! General Stone wants a Clean Up!

Binary Scam Alerts is reviews site focused on exposing binary options, Forex, CFDs, Cryptocurrency, and Bitcoin trading scams. We also blacklist fraudulent brokers, and recommend systems that perform. If you have been scammed or are searching the internet for genuine crypto robot reviews then this site is for you! Trading should be viewed like running a business of your own. If you treat trading as a hobby, there’s no way you’ll make it in the long run. How to Avoid Binary Options Scams. Unfortunately for the retail traders, the binary options industry is gripped with scammers, starting with the brokers and ending with individual traders. In other ... After all, with ‘over the counter’ binary options brokers, you are betting against the house; if the ‘house’ is making the trading decisions for you, it’s hardly likely that those decisions will be in your best interests. This form of “upselling” is often the most lucrative for the broker, and is usually the where traders lose the most. Encouraged by an “account manager ... Trading Scams is a subjective term anyway. Option trading services don't have to engage in actual fraud for me classify them as scams. They just have to have the capacity (or likelihood?) to lose their subscribers a lot of money. Remember the 3 crucial questions I ask of a valid options trading service? Well, consider the checklist below to be the inverse equivalent. Here are 6 warning signs ... Binary Options Mastery Scams. It’s been several years since binary options trading and binary options robots became an Internet fad and for a moment, everyone was interested in getting into the venture. It was seen as the new avenue of making it big in the world of financial trading. The opportunities were countless, the possibilities infinite with multiple binary options brokers and ... Trading binary options is a multi-billion dollar industry with many profitable opportunities. Any trader can learn a lot and generate substantial sums with the right Education, Resources, Automated Trading Softwares, and of course a Trusted Broker. Without a reliable broker or auto-trader, you execute all the trades you want. But what good is it if you cant even withdraw you winnings? Binary options scams, forex trading scams and cryptocurrency scams are on the rise. It takes a keen eye and verse awareness to see them coming. We'll walk you through their common tricks so you fall victim and if you already do, we can help you recover your lost funds. Though binary options sometimes trade on a regulated exchange, they are generally unregulated, trading on the Internet, and prone to fraud." Binary Options Scam. Conclusion: If a binary options or forex broker promises you big returns on your money, this is a clear sign of a scam. You will not make $100,000 on a mega-trade; you will not make a ... Additionally, some binary options Internet-based trading platforms may overstate the average return on investment by advertising a higher average return on investment than a customer should expect, given the payout structure. For example, a customer may be asked to pay $50 for a binary option contract that promises a 50% return if the stock price of XYZ company is above $5 per share when the ... Binary Options Trading Scam: How It Works. More and more people are sending us emails asking if the binary options trading sector is a scam in itself, as many horror stories have been shared lately on the Internet. Whether it’s about binary options brokers, signals, or winning strategies, watch out for the big and sketchy world of this business.

[index] [1388] [2656] [8596] [16279] [27777] [7188] [25960] [799] [16141] [27601]

Snapcash Binary Review - Real Review!

Learn to get up and running quickly with our Binary Options Trading System Review. Get the info now by visiting the site above. Get the info now by visiting the site above. Why not subscribe to ... Snapcash Binary - Snapcash Binary is a new scam product that just launched. Check out my full review and learn the truth before it's too late. This system is a scam and I am not recommending it ... Ultimate4trading works by calculating the trend of stock markets and heps to predict how the price of the market will behave on a short-term basis, Ultimate4Trading is able to sharply enhance ... Please watch: "Tom Arnold Talks About Kinghuman - REALLY????" True! See what Tom Arnold said about me... https://www.youtube.com/watch?v=5HfBtiQORlw --~-- ht... In Binary Options trading, the trader chooses whether the value of an exchange rate, stock or commodity will go up or down in the next 15 minutes.With what I now knew I was able to predict with ... With so many binary options brokers known scams, showing scam behavior like withdrawal issues, bad pricing and support games. Forget them and trade with a legit broker.

http://arab-binary-option.clummicimbcin.cf