Sunday, November 4, 2012

Introduction to Wi-Fi Network Security

A consideration on any computer network, security is especially important on Wi-Fi wireless networks. Hackers can easily intercept Wi-Fi network traffic over open air and extract information like passwords and credit card numbers. Several Wi-Fi network security technologies have been developed to combat hackers, of course, although some of these technologies can be defeated more easily than others.


Network Data Encryption

Network security protocols usually use encryption technology. Encryption scrambles data sent over network connections to hide information from humans while still allowing computers to properly decipher the messages. Many forms of encryption technology exist in the industry.

Network Authentication

Authentication technology for computer networks verifies the identity of devices and people. Network operating systems like Microsoft Windows and Apple OS-X include built-in authentication support based on user names and passwords. Home network routers also authenticate administrators by requiring them to enter separate login credentials.

Ad Hoc Wi-Fi Network Security

Traditional Wi-Fi network connections go through a router or other wireless access point. Alternatively, Wi-Fi supports a mode called ad hoc wireless that allows devices to connect directly to each other in peer to peer fashion. Lacking a central connection point, the security of ad hoc Wi-Fi connections tends to be low. Some experts discourage the use of ad-hoc Wi-Fi networking for this reason.

Common Wi-Fi Security Standards

Most Wi-Fi devices including computers, routers and phones support several security standards. The available security types and even their names vary depending on a device's capabilities.

WEP stands for Wired Equivalent Privacy. It is the original wireless security standard for Wi-Fi and is still commonly used on home computer networks. Some devices support multiple versions of WEP security
  • WEP-64-bit key (sometimes called WEP-40)
  • WEP 128-bit key (sometimes called WEP-104)
  • WEP 256-bit key
and allow an administrator to choose one, while other devices only support a single WEP option. WEP should not be used except as a last resort, as it provides very limited security protection.

WPA stands for Wi-Fi Protected Access. This standard was developed to replace WEP. Wi-Fi devices typically support multiple variations of WPA technology. Traditional WPA, also known as WPA-Personal and sometimes also called WPA-PSK (for pre-shared key), is designed for home networking while another version, WPA-Enterprise, is designed for corporate networks. WPA2 is an improved version of Wi-Fi Protected Access supported by all newer Wi-Fi equipment. Like WPA, WPA2 also exists in Personal/PSK and Enterprise forms.

802.1X provides network authentication to both Wi-Fi and other types of networks. It tends to be used by larger businesses as this technology requires additional expertise to set up and maintain. 802.1X works with both Wi-Fi and other types of networks. In a Wi-Fi configuration, administrators normally configure 802.1X authentication to work together with WPA/WPA2-Enterprise encryption. 802.1X is also known as RADIUS.

Network Security Keys and Passphrases

WEP and WPA/WPA2 utilize encryption keys, long sequences of hexadecimal numbers. Matching key values must be entered into a Wi-Fi router (or access point) and all client devices wanting to join that network. In network security, the term passphrase can refer to a simplified form of encryption key that only uses alphanumeric characters instead of hexadecimal values. However, the terms passphrase and key are often used interchangeably.

Configuring Wi-Fi Security on Home Networks

All devices on a given Wi-Fi network must use matching security settings. On Windows 7 PCs, the following values must be entered on the Security tab of Wireless Network Properties for a given network:
  • Security type refers to authentication options including Open, Shared, WPA-Personal and –Enterprise, WPA2-Personal and –Enterprise, and 802.1X. The Open option utilizes no authentication, while Shared utilizes WEP for authentication.

  • Encryption type options available depend on the Security type chosen. Besides None, which can be only used with Open networks, the WEP option can be used with either WEP or 802.1X authentication. Two other options, called TKIP and AES, refer to specialized encryption technologies usable with the WPA family of Wi-Fi security standards.

  • An encryption key or passphrase can be specified in the Network security key field when required.

  • The Key Index, a value between 1 and 4, refers to the position of the matching key stored on the wireless router (access point). Many home routers allow four different encryption keys numbered 1 through 4 to be configured in order to support legitimate clients without forcing them to all use a common key.

WiFi Profile Manager 8 Sets Your Preferred Networks in Windows 8

Advertisement
  1. WiFi Profile Manager 8 Sets Your Preferred Networks in Windows 8


    By Whitson Gordon
    Ever run into a situation where you have multiple wireless networks available, but one is clearly better than the other? WiFi Profile Manager 8 lets you tell your computer which networks are better, so Windows doesn’t automatically stick you with the wrong one.

Use Microsoft Word for Emergency Image Editing


Use Microsoft Word for Emergency Image Editing


by Shep McAllister
Say you need to make some quick edits to a photo or screenshot, but you’re on a public or work computer with no image editors installed. Where can you turn?

Houdini Chess Engine


Houdini 3: The Best Got Even Better!


The new Houdini 3 contains many evaluation and search improvements in all phases of the game and is about 50 Elo stronger than its predecessor Houdini 2. The opening improvements are mostly related to piece activity and space management and are convincingly demonstrated by the progress in Fischer Random Chess for which Houdini 3 has become about 75 Elo stronger. In the middle game Houdini 3 has significant enhancements for recognizing pieces with limited mobility and in king-side safety. In end games Houdini 3 will seek deeper and solve more positions than before.

Three Long Time Control Challenges As a serious challenge for the new Houdini 3, last month three long matches between the Houdini 3 Beta version and other top engines (Houdini 2.0c, Stockfish 2.3.1 and Komodo 5) were played. Each match consisted of 120 games at 90 min + 30 sec/move, starting from 60 Noomen opening positions played from both sides. Over-all result: Houdini 3 scored 62% (Perf: +81 Elo ± 24 Elo) against the average of Houdini 2.0c, Komodo 5 and Stockfish 2.3.1. Download all the Games The final Houdini 3 Release version is even slightly stronger than the Beta version used in these matches.

In the new Tactical Mode Houdini 3 will adapt its search strategy to prefer tactical solutions rather than positional moves in the root position. Some clever search tricks transform the engine into the most proficient tactical position solver ever. In tactical test suites the Tactical Mode will find more solutions and provide significantly faster solution times. The Accelerated Principal Variation Search or “Smart Fail-High” is especially useful in very deep analysis when a different move becomes best at very high search depth. Houdini 3 will apply an automatic depth reduction that often speeds up finding the Principal Variation by a factor of 5 to 10. Besides Nalimov and Gaviota End Game Table Bases, Houdini 3 now also supports Scorpio bitbases. These bitbases are loaded in memory when the program starts (requiring about 300 MB of memory) and are then readily available to the engine. Hash usage has been optimized, improving back-tracking analysis. Houdini 3 Pro will now support hash tables up to 256 GB. The engine evaluations have been carefully recalibrated so that +1.00 pawn advantage gives a 80% chance of winning the game against an equal opponent at blitz time control. At +2.00 the engine will win 95% of the time, and at +3.00 about 99% of the time. If the advantage is +0.50, expect to win nearly 50% of the time. Fun fact: Over 10 million chess games were played for the development and tuning of Houdini 3!

Version History

For a detailed list of the corrections and features in the new Houdini 3, see the Version History page.
Houdini 3
  • Houdini 3 (20121015): Major new version. Improved search and evaluation (+50 Elo), Tactical Mode, Scorpio bitbases.

Houdini 2
  • Houdini 2.0c (20111120): Maintenance update with minor bug corrections and new analysis options.
  • Houdini 2.0b (20111007): Maintenance update with minor bug corrections and Nalimov EGTB support.
  • Houdini 2.00 (20110901): Improved analysis capabilities, enhanced search and evaluation.

Houdini 1.5
  • Houdini 1.5a (20110115): Maintenance update with work-arounds for Fritz GUI and other minor improvements.
  • Houdini 1.50 (20101215): Improved search and evaluation. Gaviota Table Base Support.

Houdini 1.0
  • Houdini 1.03a (20100717): Bug fix for Multi-PV.
  • Houdini 1.03 (20100715): Multi-PV, searchmove and large page support. Improved evaluation function.
  • Houdini 1.02 (20100618): SMP and hash collision bug fixes. Work-around for Shredder GUI.
  • Houdini 1.01 (20100601): Bug fixes. Improved search algorithm.
  • Houdini 1.00 (20100515): First release.

Acknowledgements


An invaluable resource for any chess engine author is the excellent Chess Programming Wiki. Without many ideas and techniques from the open source chess engines Ippolit and Stockfish, Houdini would not nearly be as strong as it is now. The Gaviota EGTB probing code used by Houdini is © Miguel A. Ballicora, the Nalimov EGTB probing code is © Eugene Nalimov and the Scorpio bitbase probing code is © Daniel Shawul. The Houdini 3 development was greatly aided by the kind support of Mr. Ahmed Mansoor.
To visit the home page
http://www.cruxis.com/chess/houdini.htm

Saturday, November 3, 2012

Lesbian: origen of this word

Sappho

From Wikipedia, the free encyclopedia
Jump to: navigation, search
Bust inscribed Sappho of Eressos, Roman copy of a Greek original of the 5th century BC
Sappho (play /ˈsæf/; Attic Greek Σαπφώ [sapːʰɔ̌ː], Aeolic Greek Ψάπφω [psápːʰɔː]) was a Greek lyric poet, born on the island of Lesbos. The Alexandrians included her in the list of nine lyric poets. Her birth was sometime between 630 and 612 BC, and it is said that she died around 570 BC, but little is known for certain about her life. The bulk of her poetry, which was well-known and greatly admired throughout antiquity, has been lost, but her immense reputation has endured through surviving fragments.


Life
Roman bust of Sappho, copied from a lost Hellenistic original in Istanbul Archaeological Museum
The only contemporary source for Sappho's life is her own poetry, and scholars are skeptical of reading it biographically. Later biographical accounts are also unreliable.

Sexuality and community
Depiction of Sappho in foreground with female associate
Sappho's poetry centers on passion and love for various people and both genders. The word lesbian derives from the name of the island of her birth, Lesbos, while her name is also the origin of the word sapphic; neither word was applied to female homosexuality until the nineteenth century.[20][21] The narrators of many of her poems speak of infatuations and love (sometimes requited, sometimes not) for various females, but descriptions of physical acts between women are few and subject to debate.[22][23] Whether these poems are meant to be autobiographical is not known, although elements of other parts of Sappho's life do make appearances in her work, and it would be compatible with her style to have these intimate encounters expressed poetically, as well. Her homoerotica should be placed in the context of the seventh century (BC). The poems of Alcaeus and later Pindar record similar romantic bonds between the members of a given circle.[24]
Sappho's contemporary Alcaeus described her thus: "Violet-haired, pure, honey-smiling Sappho" (ἰόπλοκ᾽ ἄγνα μελλιχόμειδε Σάπφοι, fr. 384). The third-century philosopher Maximus of Tyre wrote that Sappho was "small and dark" and that her relationships to her female friends were similar to those of Socrates:
What else could one call the love of the Lesbian woman than the Socratic art of love? For they seem to me to have practised love after their own fashion, she the love of women, he of men. For they said they loved many, and were captivated by all things beautiful. What Alcibiades and Charmides and Phaedrus were to him, Gyrinna and Atthis and Anactoria were to her ...[25]
During the Victorian era, it became fashionable to describe Sappho as the headmistress of a girls' finishing school. As Page DuBois (among many other experts) points out, this attempt at making Sappho understandable and palatable to the genteel classes of Great Britain was based more on conservative sensibilities than evidence. There are no references to teaching, students, academies, or tutors in any of Sappho's scant collection of surviving works. Burnett follows others, like C. M. Bowra, in suggesting that Sappho's circle was somewhat akin to the Spartan agelai or the religious sacred band, the thiasos, but Burnett nuances her argument by noting that Sappho's circle was distinct from these contemporary examples because "membership in the circle seems to have been voluntary, irregular and to some degree international."[26] The notion that Sappho was in charge of some sort of academy persists nonetheless.

http://en.wikipedia.org/wiki/Sappho


http://www.greeknet.com/history1.htm

Las 7 leyes Universales. per Kybalion

Los siete principios [editar]Los siete principios, o axiomas, como están descritos en el libro son:

EL KYBALION




El Kybalión es un libro creado desde la época egipcia cuyo fin son las enseñanza de la filosofía hermética, su autor es Hermes Trismigisto y fue difundida su obra por un grupo pequeño denominado los tres iniciados , que pareciera ser al principio un libro simple de esoterismo con ideas desarrolladas por Walter Mercado o Giovannita, sobre la concepción general del universo, en sí de este libro se desprenden todos los demás preceptos de esoterismo, que sin embargo al ir leyendo el documento da unas concepciones con una lógica muy interesante. Se basa principalmente en siete principios que son:

  1. Mentalismo: El Todo es mente, el universo es mental.
  2. Correspondencia: Como es arriba es abajo como es abajo es arriba. Afirma que este principio se desarrolla en los tres grandes planos: el físico, el mental y el espiritual.
  3. Vibración: nada está quieto, todo se mueve, todo siempre esta en movimiento.
  4. Polaridad: Todo es doble, todo tiene dos polos; todo, su par de opuestos: los semejantes y los antagónicos son lo mismo, los opuestos son idénticos en naturaleza, pero diferentes en grado; los extremos se tocan; todas las verdades son medias verdades, todas las paradojas pueden reconciliarse.
  5. Ritmo: Todo fluye y refluye; todo tiene sus periodos de avance y retroceso, todo asciende y desciende; todo se mueve como un péndulo; la medida de su movimiento hacia la derecha, es la misma que la de su movimiento hacia la izquierda; el ritmo es la compensación.
  6. Causa y Efecto: Toda causa tiene su efecto; todo efecto tiene su causa; todo sucede de acuerdo a la ley; la suerte o azar no es más que el nombre que se le da a la ley no reconocida; hay muchos planos de causalidad pero nada escapa a la ley.
  7. Generación: La generación existe por doquier; todo tiene su principio masculino y femenino: la generación se manifiesta en todos los planos. En el plano físico es la sexualidad.
Como se puede apreciar estos preceptos a simple vista no aclara y hacen difuso su interpretación al principio, pero que el mismo autor va desarrollando en cada apartado y exponiendo de una manera más lógica, como premisa principal menciona al Todo, el todo es mente, es el universo, etc. el todo es todo valga la redundancia pero que es creado por su propio pensamiento, por lo tanto denomina que el universo es mental y a partir de esto se desprenden los demás conceptos, en mi opinión uno de los más trascendentes es el de vibración donde hace referencia que todo esta en movimiento nada esta estático, aun por más diminuta que sea una partícula esta se mantiene en movimiento, lo cual dentro de la ciencia es cierto ya que nosotros como muchas cosas al estar formados por átomos estos son compuesto por energía y sus partículas se encuentran en constante movimiento. Si bien es cierto que estos preceptos de acuerdo a esta teoría se conjugan dentro del universo pero en especial del pensamiento, donde este es el que los desarrolla en correlación con el propio universo, provoca confusión y puede caer en una complejidad; Sin embargo en realidad más que buscar únicamente la imposición de una verdad absoluta busca sustentar su idea en preceptos que dan pie a un análisis racional, pero que no puede ser respondido de manera práctica, en mi caso me ha dejado otra perspectiva para analizar los sucesos que ocurren en nuestro entorno y a la vez dejar de lado los dogmas que sin meditarlo generamos y damos por hecho

http://arturoisrael82.blogspot.com/2010/09/el-kybalion.html
http://es.wikipedia.org/wiki/Kybali%C3%B3n

OVNI video recorded on the beaches

Uploaded by on Aug 17, 2007
DOS PLATILLOS VOLADORES A UNOS CUANTOS METROS DE LA CAMARA,Y VARIOS MAS QUE SE MIRAN A LARGA DISTANCIA

Category: