Profile

Cover photo
Ch Te
Worked at Holographic Projections Universal
Attended Sovereignty High
Lives in Ojai, CA
9 followers|34,057 views
AboutPostsPhotosVideos+1's

Stream

Ch Te

Shared publicly  - 
 
http://boards.straightdope.com/sdmb/showthread.php?t=236974

In my estimation, people in Nazi Germany and any other Nazi controlled area generally fell into four main groups:

1. People who risked their lives and tried to help. A very small percentage, way less than 1%.

2. True Believers. The deluded and the stupid. Probably around 10% at most.

3. Profiteers. The people who benefitted as much as they could from the situation. Politics meant nothing to them so long as they made money. Far more evil than the previous group. Maybe 15-20%.

4. The silent majority. Everyone else. These people just kept their heads down, their eyes and ears shut and just tried to weather the storm. All they wanted to do was survive and keep their family alive.
Nazi Germany: How Much Did the Average German Know? General Questions
1
Ch Te's profile photo
Ch Te
 
FUCK. I'm the fourth type.
Add a comment...

Ch Te

Shared publicly  - 
 
sigh ... up at 3am, not coding ... a good way to meet no one ..
1
Ch Te's profile photo
Ch Te
 
scapy videos?
Add a comment...

Ch Te

Shared publicly  - 
 
 
Two weeks ago at Google I/O we announced the early developer preview of the Google+ history API. Back then I mentioned [1] that Google Search activity would soon appear in Google+ history, and I’m happy to report that this feature is now live.

If you’re a Google+ history developer, you (and only you) will now see moments related to your search tasks -- just turn on your web history to start seeing your private search data (http://www.google.com/history/). Rather than write a new moment for each individual search query (like [peter higgs] or [large hadron collider]), we’re writing moments for higher-level tasks (such as “Researched Higgs Boson”).  As you work to write your own moments, we encourage you to consider the right granularity that provides the most value to your users.

As always, we welcome your feedback and questions in our developer forum (https://groups.google.com/forum/#!forum/google-plus-developers). And if you want to catch up on all things Google+ history-related, we’ve also posted videos of our sessions at Google+ I/O -- both Getting Started [2], and Advanced [3].

References:
[1] https://plus.google.com/117350989957881101918/posts/9SGntdGTCKJ
[2] http://youtu.be/ypO2q_KBz9I
[3] http://youtu.be/fBvgP4jSWJw
1
Add a comment...

Ch Te

Shared publicly  - 
 
is this cool or WHAT ....
1
Add a comment...
Have him in circles
9 people
Stephen Sher's profile photo
Nelly Yoshi S.'s profile photo
Adam Fitch's profile photo
Lena Terry's profile photo
VJ Fader Cui's profile photo
Ivaylo Georgiev's profile photo
ystriveinc's profile photo
Nelly Sanchez's profile photo

Ch Te

Shared publicly  - 
 
Protecting SSH communications for your organization is fairly straightforward if you do some work. You need to use multiple layers. Here is our guide to protecting SSH:
https://it.wiki.usu.edu/ssh_description [usu.edu]
We try to use multiple overlapping security layers to protect SSH:
* If possible, use firewalls to limit the vulnerable scope of SSH to a few trusted hosts.
* Configure firewalls to limit credential guessing by rate-limiting connections to the SSH port.
* If possible, treat the SSH Port as a shared secret. Then, only interesting, targeted attacks find the SSH server. In many situations, this gives you very real protection. This protection is based on the very real increase in cost for an attack to find and attack an SSH server on an alternate, properly obscured port.
* The SSH server should not allow known usernames including root. The attacker must find a username.
* Motivated admins should use 2-factor authentication to access their critical SSH servers.
* Admins are trained to create good passwords for their usernames.
* SSH users should verify the identity of their systems when they first connect.
* System admins must regularly review the activity of their SSH servers.
* Security monitors all SSH connections, including ones on non-standard ports. We follow up on interesting connections.
* We have SSH Honeypots that help us track, understand and respond to SSH attack. These Honeypots allow us to track which credentials are being attacked. They give us advance warning when a institutional credential is attacked. And, analyzing the use of unique credential lists gives us insight into our attackers.
Much of this work can be automated. The rest is excellent training material for new security recruits and interns.
Looking back, the main change I should have made to improve our SSH protections would be to default block incoming TCP/22 at the border years ago. Then, only allow it for groups that can show they use it to provide services to a large community. Anybody using SSH for administration can change the SSH port.
Protecting SSH communications for your organization is fairly straightforward if you do some work. You need to use multiple layers. Here is our guide to protecting SSH: https://it.wiki.usu.edu/ssh_de... We try to use multiple overlapping security layers to protect SSH: * If possible, use firewa...
1
Add a comment...

Ch Te

Shared publicly  - 
 
we'll see what happens!
Sort it out. We have the ability, nearly on our phones, to amass, organize, extract patterns from, and find borderline relationships between incredible amounts of data. The methods and programs for do...
1
Add a comment...

Ch Te

Shared publicly  - 
1
Add a comment...
People
Have him in circles
9 people
Stephen Sher's profile photo
Nelly Yoshi S.'s profile photo
Adam Fitch's profile photo
Lena Terry's profile photo
VJ Fader Cui's profile photo
Ivaylo Georgiev's profile photo
ystriveinc's profile photo
Nelly Sanchez's profile photo
Work
Occupation
Breath, Break Computers, Mangle Language, Steal Sound and Light, Loop It
Employment
  • Holographic Projections Universal
    Optic Coordinations, 2011
  • The Church of the Wholly Living Light
    2010
Places
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Currently
Ojai, CA
Previously
Harlem, NY - Oakland, CA - Santa Barbara, CA - Moreno Valley, CA - N'Djemena, TChad - Honolulu, HI - Millerton, NY - Bakersfield, CA - Torrence, CA - Toronto, CAN
Story
Tagline
*may or may not be aware of the fact that his dreams control reality
Introduction
har yer doin, i'm chard, and i rejarct yer realitees, tharnk yew
Bragging rights
can put two feet on the ground, at same time
Education
  • Sovereignty High
Basic Information
Gender
Male
Other names
terbospeed
Apps with Google+ Sign-in
Ch Te's +1's are the things they like, agree with, or want to recommend.
Obsessed With The Dress
market.android.com

Obsessed with the Dress is the inside look at selecting the ultimate gown that can either make or break a pageant girl's hopes of clinching

DriveDroid
market.android.com

This application requires rootDriveDroid allows you to boot your PC from ISO/IMG files stored on your phone. This is ideal for trying Linux

Lightbot - Programming Puzzles
market.android.com

Get kids hooked on programming within minutes!Lightbot is a programming puzzle game: a puzzle game that uses game mechanics that are firmly

Pie Control
market.android.com

Touch the left and right edges of the screen.Easy Interface PieControl!*To request permission to use the menu key and back key. Toccare i bo

Ideal Weight (BMI)
market.android.com

Are you in your right weight? Check it easily with this app. It will calculate your Body Mass Index (BMI) and will let you know if you are u

FxCamera
market.android.com

FxCamera is a free, easy and creative camera app. With over 30 filters to choose from, we will assure you that every photo will turn out to

KBB.com Car Prices & Reviews
market.android.com

KBB.com Car Prices & ReviewsThis free, interactive car app will provide you with trusted Kelley Blue Book® Values and the information you ne

Holy Quran Maher Moagely
market.android.com

Holy Quran (Quran Kareem) Reciter: Maher MoagelyThis App has the following features: Ability to download one or multiple Sura(s). Share Sura

Learn Physics
market.android.com

Learn Physics is an app that helps to understand physics easily and fast with core concept tutorials, formulas calculator and quizzes.The ap

Magic Canvas
market.android.com

Magic Canvas allows you to create beautiful images by changing color into selected areas.Features includes: * use photo gallery or camera im

As We May Think
www.theatlantic.com

The Atlantic covers news and analysis on politics, business, culture, technology, national, international and life on the official site of T

Google Takeout
www.google.com

Google Takeout allows you to download a copy of your data stored within Google products.

The Scale of The Universe 2 | Visual.ly
visual.ly

Various size comparisons in the universe. Zooming from quantum foam all the way out to the estimated universe.

LoopStack
market.android.com

LoopStack is the ultimate Android looper.Features:- 4 independent recordable tracks. - Combine tracks via drag and drop. - High quality 44KH

Fun With Data Mining | Irregular Times
irregulartimes.com

Practically everything I do online these days is tracked by data mining firms, working just under the surface to use my own information to t

IndyBroadcast
www.ustream.tv

IndyBroadcast @ USTREAM: Streaming our party to your party in seconds. Hello World, my name is Adam Fitch, I've been going around my city to

jmpress.js - a jQuery plugin to build a website on the infinite canvas
shama.github.com

jmpress.js is a jQuery plugin to build a website on the infinite canvas

OMG! I just got possessed on Perezhilton.com
perezhilton.com

Connect with Facebook to see what Perez Hilton has to say about you.

Apple's cloud rains on its own parade
www.guardian.co.uk

The iCloud hacking disaster that befell prominent tech journalist Mat Honan was all too easy to predict, but will it scare off users of the

Home network crawler - cataloging every file on the home LAN with C# and...
blog.abodit.com

With the addition of two more 3TB drives to the home network it's becoming impossible to track files and to remember where each one is and w