際際滷shows by User: opencu1 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: opencu1 / Fri, 28 Nov 2014 10:11:31 GMT 際際滷Share feed for 際際滷shows by User: opencu1 The Rise of BaaS A Utopia for Client-Side Developers /slideshow/baas-42134944/42134944 goinstantbaas09-140315124051-phpapp01-141128101131-conversion-gate01
The Rise of BaaS - A Utopia for Client-Side Developers]]>

The Rise of BaaS - A Utopia for Client-Side Developers]]>
Fri, 28 Nov 2014 10:11:31 GMT /slideshow/baas-42134944/42134944 opencu1@slideshare.net(opencu1) The Rise of BaaS A Utopia for Client-Side Developers opencu1 The Rise of BaaS - A Utopia for Client-Side Developers <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/goinstantbaas09-140315124051-phpapp01-141128101131-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The Rise of BaaS - A Utopia for Client-Side Developers
The Rise of BaaS A Utopia for Client-Side Developers from Marc Manthey
]]>
967 1 https://cdn.slidesharecdn.com/ss_thumbnails/goinstantbaas09-140315124051-phpapp01-141128101131-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Javascript on Fiber - http://fibjs.org /slideshow/fibjs/40720923 fibjs-141025154606-conversion-gate02
http://fibjs.org/]]>

http://fibjs.org/]]>
Sat, 25 Oct 2014 15:46:06 GMT /slideshow/fibjs/40720923 opencu1@slideshare.net(opencu1) Javascript on Fiber - http://fibjs.org opencu1 http://fibjs.org/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fibjs-141025154606-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> http://fibjs.org/
Javascript on Fiber - http://fibjs.org from Marc Manthey
]]>
2514 2 https://cdn.slidesharecdn.com/ss_thumbnails/fibjs-141025154606-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Future topic geoengineering https://de.slideshare.net/slideshow/future-topic-geoengineering/36416712 futuretopicgeoengineering-140628145825-phpapp01
Geo-Engineering: Gezielt das Klima beeinflussen Bereits seit Langem versucht der Mensch sich als Wettermacher. Die Bandbreite seiner Bem端hungen reicht dabei vom religi旦sen Ritual bis zur Nutzung wissenschaftlicher Erkenntnisse. Gegenw辰rtig aber unternimmt er Anstrengungen, nicht allein lokale Wetterph辰nomene, sondern das gesamte globale Klima gezielt zu beeinflussen.]]>

Geo-Engineering: Gezielt das Klima beeinflussen Bereits seit Langem versucht der Mensch sich als Wettermacher. Die Bandbreite seiner Bem端hungen reicht dabei vom religi旦sen Ritual bis zur Nutzung wissenschaftlicher Erkenntnisse. Gegenw辰rtig aber unternimmt er Anstrengungen, nicht allein lokale Wetterph辰nomene, sondern das gesamte globale Klima gezielt zu beeinflussen.]]>
Sat, 28 Jun 2014 14:58:25 GMT https://de.slideshare.net/slideshow/future-topic-geoengineering/36416712 opencu1@slideshare.net(opencu1) Future topic geoengineering opencu1 Geo-Engineering: Gezielt das Klima beeinflussen Bereits seit Langem versucht der Mensch sich als Wettermacher. Die Bandbreite seiner Bem端hungen reicht dabei vom religi旦sen Ritual bis zur Nutzung wissenschaftlicher Erkenntnisse. Gegenw辰rtig aber unternimmt er Anstrengungen, nicht allein lokale Wetterph辰nomene, sondern das gesamte globale Klima gezielt zu beeinflussen. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/futuretopicgeoengineering-140628145825-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Geo-Engineering: Gezielt das Klima beeinflussen Bereits seit Langem versucht der Mensch sich als Wettermacher. Die Bandbreite seiner Bem端hungen reicht dabei vom religi旦sen Ritual bis zur Nutzung wissenschaftlicher Erkenntnisse. Gegenw辰rtig aber unternimmt er Anstrengungen, nicht allein lokale Wetterph辰nomene, sondern das gesamte globale Klima gezielt zu beeinflussen.
from Marc Manthey
]]>
2820 7 https://cdn.slidesharecdn.com/ss_thumbnails/futuretopicgeoengineering-140628145825-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
PTS- Wissenschaftliche Grundlagen des Analysesystems https://de.slideshare.net/opencu1/1-pts-hintergrund 1pts-hintergrund-140330091705-phpapp02
Wissenschaftliche Grundlagen des Analysesystems]]>

Wissenschaftliche Grundlagen des Analysesystems]]>
Sun, 30 Mar 2014 09:17:04 GMT https://de.slideshare.net/opencu1/1-pts-hintergrund opencu1@slideshare.net(opencu1) PTS- Wissenschaftliche Grundlagen des Analysesystems opencu1 Wissenschaftliche Grundlagen des Analysesystems <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/1pts-hintergrund-140330091705-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Wissenschaftliche Grundlagen des Analysesystems
from Marc Manthey
]]>
1215 10 https://cdn.slidesharecdn.com/ss_thumbnails/1pts-hintergrund-140330091705-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Firmen die Monsanto verwenden /slideshow/monsanto-31519962/31519962 monsanto-140222134928-phpapp01
Quelle Universit辰t Berlin Mehr http://www.poppelsdorfer.de/download/greenpeace.pdf]]>

Quelle Universit辰t Berlin Mehr http://www.poppelsdorfer.de/download/greenpeace.pdf]]>
Sat, 22 Feb 2014 13:49:27 GMT /slideshow/monsanto-31519962/31519962 opencu1@slideshare.net(opencu1) Firmen die Monsanto verwenden opencu1 Quelle Universit辰t Berlin Mehr http://www.poppelsdorfer.de/download/greenpeace.pdf <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/monsanto-140222134928-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Quelle Universit辰t Berlin Mehr http://www.poppelsdorfer.de/download/greenpeace.pdf
Firmen die Monsanto verwenden from Marc Manthey
]]>
910 3 https://cdn.slidesharecdn.com/ss_thumbnails/monsanto-140222134928-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Bt hack-full-disclosure Uncovered //NONSA//NOGCHQ//NOGOV - CC BY-ND /opencu1/bt-hackfulldisclosure bt-hack-full-disclosure-131218194500-phpapp01
Special AgentBT This special software installed on all modems provided by BT called BTAgent. This software listens on port 161, which is the IANA assigned port for Simple Network Management Protocol (SNMP), anyone looking at this process would automatically assume this to be the case. SNMP type programs are often referred to as SNMP Agents. The primary purpose of BTAgent is unpublished, but a version has been partially reverse engineered and the software does download firmware and update the modems flash.BT responses to queries about their BTAgent is to claim that they need to remotely manage modems for security purposes.]]>

Special AgentBT This special software installed on all modems provided by BT called BTAgent. This software listens on port 161, which is the IANA assigned port for Simple Network Management Protocol (SNMP), anyone looking at this process would automatically assume this to be the case. SNMP type programs are often referred to as SNMP Agents. The primary purpose of BTAgent is unpublished, but a version has been partially reverse engineered and the software does download firmware and update the modems flash.BT responses to queries about their BTAgent is to claim that they need to remotely manage modems for security purposes.]]>
Wed, 18 Dec 2013 19:45:00 GMT /opencu1/bt-hackfulldisclosure opencu1@slideshare.net(opencu1) Bt hack-full-disclosure Uncovered //NONSA//NOGCHQ//NOGOV - CC BY-ND opencu1 Special AgentBT This special software installed on all modems provided by BT called BTAgent. This software listens on port 161, which is the IANA assigned port for Simple Network Management Protocol (SNMP), anyone looking at this process would automatically assume this to be the case. SNMP type programs are often referred to as SNMP Agents. The primary purpose of BTAgent is unpublished, but a version has been partially reverse engineered and the software does download firmware and update the modems flash.BT responses to queries about their BTAgent is to claim that they need to remotely manage modems for security purposes. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bt-hack-full-disclosure-131218194500-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Special AgentBT This special software installed on all modems provided by BT called BTAgent. This software listens on port 161, which is the IANA assigned port for Simple Network Management Protocol (SNMP), anyone looking at this process would automatically assume this to be the case. SNMP type programs are often referred to as SNMP Agents. The primary purpose of BTAgent is unpublished, but a version has been partially reverse engineered and the software does download firmware and update the modems flash.BT responses to queries about their BTAgent is to claim that they need to remotely manage modems for security purposes.
Bt hack-full-disclosure Uncovered //NONSA//NOGCHQ//NOGOV - CC BY-ND from Marc Manthey
]]>
2172 7 https://cdn.slidesharecdn.com/ss_thumbnails/bt-hack-full-disclosure-131218194500-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Ecolog2000 /slideshow/ecolog2000/27708302 ecolog2000-131029161620-phpapp01
T-MOBILE, the mobile phone giant, has been accused of burying a scientific report it commissioned that concluded handsets and masts contribute to cancer and genetic damage. The report argued that officially recommended limits on radiation exposure should be cut to 1/1000th of those in force. The suggestion has not been taken up by the company or by regulators. Campaigners claimed T-Mobiles handling of the report was part of a wider pattern of behaviour by the industry in its efforts to keep discussion of the health risks off the agenda.]]>

T-MOBILE, the mobile phone giant, has been accused of burying a scientific report it commissioned that concluded handsets and masts contribute to cancer and genetic damage. The report argued that officially recommended limits on radiation exposure should be cut to 1/1000th of those in force. The suggestion has not been taken up by the company or by regulators. Campaigners claimed T-Mobiles handling of the report was part of a wider pattern of behaviour by the industry in its efforts to keep discussion of the health risks off the agenda.]]>
Tue, 29 Oct 2013 16:16:20 GMT /slideshow/ecolog2000/27708302 opencu1@slideshare.net(opencu1) Ecolog2000 opencu1 T-MOBILE, the mobile phone giant, has been accused of burying a scientific report it commissioned that concluded handsets and masts contribute to cancer and genetic damage. The report argued that officially recommended limits on radiation exposure should be cut to 1/1000th of those in force. The suggestion has not been taken up by the company or by regulators. Campaigners claimed T-Mobiles handling of the report was part of a wider pattern of behaviour by the industry in its efforts to keep discussion of the health risks off the agenda. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ecolog2000-131029161620-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> T-MOBILE, the mobile phone giant, has been accused of burying a scientific report it commissioned that concluded handsets and masts contribute to cancer and genetic damage. The report argued that officially recommended limits on radiation exposure should be cut to 1/1000th of those in force. The suggestion has not been taken up by the company or by regulators. Campaigners claimed T-Mobiles handling of the report was part of a wider pattern of behaviour by the industry in its efforts to keep discussion of the health risks off the agenda.
Ecolog2000 from Marc Manthey
]]>
3468 8 https://cdn.slidesharecdn.com/ss_thumbnails/ecolog2000-131029161620-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Wi fi technology - an uncontrolled global experiment on the health of mankind - marko markov & yuri g. grigoriev.pdf /slideshow/wi-fi-technology-an-uncontrolled-global-experiment-on-the-health-of-mankind-marko-markov-yuri-g-grigorievpdf/27702382 wi-fitechnology-anuncontrolledglobalexperimentonthehealthofmankind-markomarkovyurig-131029131031-phpapp01
Barrie Trower - The Dangers of Microwave Technology http://www.youtube.com/watch?v=m9YM_vLKR8c]]>

Barrie Trower - The Dangers of Microwave Technology http://www.youtube.com/watch?v=m9YM_vLKR8c]]>
Tue, 29 Oct 2013 13:10:31 GMT /slideshow/wi-fi-technology-an-uncontrolled-global-experiment-on-the-health-of-mankind-marko-markov-yuri-g-grigorievpdf/27702382 opencu1@slideshare.net(opencu1) Wi fi technology - an uncontrolled global experiment on the health of mankind - marko markov & yuri g. grigoriev.pdf opencu1 Barrie Trower - The Dangers of Microwave Technology http://www.youtube.com/watch?v=m9YM_vLKR8c <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wi-fitechnology-anuncontrolledglobalexperimentonthehealthofmankind-markomarkovyurig-131029131031-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Barrie Trower - The Dangers of Microwave Technology http://www.youtube.com/watch?v=m9YM_vLKR8c
Wi fi technology - an uncontrolled global experiment on the health of mankind - marko markov & yuri g. grigoriev.pdf from Marc Manthey
]]>
1233 6 https://cdn.slidesharecdn.com/ss_thumbnails/wi-fitechnology-anuncontrolledglobalexperimentonthehealthofmankind-markomarkovyurig-131029131031-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document 安艶庄 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Wifi - a thalidomide in the making - who cares /slideshow/wi-fi-a-thalidomide-in-the-making-who-cares/27692197 wifi-athalidomideinthemaking-whocares-131029090010-phpapp01
]]>

]]>
Tue, 29 Oct 2013 09:00:10 GMT /slideshow/wi-fi-a-thalidomide-in-the-making-who-cares/27692197 opencu1@slideshare.net(opencu1) Wifi - a thalidomide in the making - who cares opencu1 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wifi-athalidomideinthemaking-whocares-131029090010-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Wifi - a thalidomide in the making - who cares from Marc Manthey
]]>
718 11 https://cdn.slidesharecdn.com/ss_thumbnails/wifi-athalidomideinthemaking-whocares-131029090010-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document 安艶庄 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Silent weapons for quiet wars /slideshow/silent-weapons-for-quiet-wars-27149256/27149256 silentweaponsforquietwars-131013151905-phpapp01
Silent Weapons For Quiet Wars Document Full Read http://www.youtube.com/watch?v=TCl9EHlnFV8]]>

Silent Weapons For Quiet Wars Document Full Read http://www.youtube.com/watch?v=TCl9EHlnFV8]]>
Sun, 13 Oct 2013 15:19:04 GMT /slideshow/silent-weapons-for-quiet-wars-27149256/27149256 opencu1@slideshare.net(opencu1) Silent weapons for quiet wars opencu1 Silent Weapons For Quiet Wars Document Full Read http://www.youtube.com/watch?v=TCl9EHlnFV8 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/silentweaponsforquietwars-131013151905-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Silent Weapons For Quiet Wars Document Full Read http://www.youtube.com/watch?v=TCl9EHlnFV8
Silent weapons for quiet wars from Marc Manthey
]]>
1547 6 https://cdn.slidesharecdn.com/ss_thumbnails/silentweaponsforquietwars-131013151905-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document 安艶庄 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Nasa the futureof war https://fr.slideshare.net/opencu1/nasa-thefutureofwar-27141879 nasa-thefutureof-war-131013063838-phpapp01
For the people that STILL not believe this is the ORIGINAL document from the http://dtic.mil website via archive.org http://web.archive.org/web/20060512051411/http://www.dtic.mil/ndia/2001testing/bushnell.pdf]]>

For the people that STILL not believe this is the ORIGINAL document from the http://dtic.mil website via archive.org http://web.archive.org/web/20060512051411/http://www.dtic.mil/ndia/2001testing/bushnell.pdf]]>
Sun, 13 Oct 2013 06:38:38 GMT https://fr.slideshare.net/opencu1/nasa-thefutureofwar-27141879 opencu1@slideshare.net(opencu1) Nasa the futureof war opencu1 For the people that STILL not believe this is the ORIGINAL document from the http://dtic.mil website via archive.org http://web.archive.org/web/20060512051411/http://www.dtic.mil/ndia/2001testing/bushnell.pdf <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nasa-thefutureof-war-131013063838-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> For the people that STILL not believe this is the ORIGINAL document from the http://dtic.mil website via archive.org http://web.archive.org/web/20060512051411/http://www.dtic.mil/ndia/2001testing/bushnell.pdf
from Marc Manthey
]]>
16460 4 https://cdn.slidesharecdn.com/ss_thumbnails/nasa-thefutureof-war-131013063838-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document 安艶庄 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Xkeyscore /slideshow/xkeyscore-2013-0731/24808190 xkeyscore2013-07-31-130731120444-phpapp02
]]>

]]>
Wed, 31 Jul 2013 12:04:44 GMT /slideshow/xkeyscore-2013-0731/24808190 opencu1@slideshare.net(opencu1) Xkeyscore opencu1 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/xkeyscore2013-07-31-130731120444-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Xkeyscore from Marc Manthey
]]>
603 3 https://cdn.slidesharecdn.com/ss_thumbnails/xkeyscore2013-07-31-130731120444-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation 安艶庄 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Vision 2015 - Geheimdienste Global verkn端pfen /slideshow/vision-2015/24547597 vision2015-130723124843-phpapp02
Ein aus dem Jahre 2008 stammendes Dokument, das auf einem offiziellen Webserver der amerikanischem Geheimdienste liegt, beschreibt als Zielsetzung f端r das Jahr 2015 ein global vernetztes Geheimdienstunternehmen. Es handelt sich um einen Leitfaden f端r ein neues Handlungskonzept und eine st辰rkere Zusammenf端hrung aller US-Dienste in diesen einen zentralen Dienst. http://www.internet-law.de/2013/07/amerikanische-uberwachungsstrategien-ganz-offiziell.html]]>

Ein aus dem Jahre 2008 stammendes Dokument, das auf einem offiziellen Webserver der amerikanischem Geheimdienste liegt, beschreibt als Zielsetzung f端r das Jahr 2015 ein global vernetztes Geheimdienstunternehmen. Es handelt sich um einen Leitfaden f端r ein neues Handlungskonzept und eine st辰rkere Zusammenf端hrung aller US-Dienste in diesen einen zentralen Dienst. http://www.internet-law.de/2013/07/amerikanische-uberwachungsstrategien-ganz-offiziell.html]]>
Tue, 23 Jul 2013 12:48:42 GMT /slideshow/vision-2015/24547597 opencu1@slideshare.net(opencu1) Vision 2015 - Geheimdienste Global verkn端pfen opencu1 Ein aus dem Jahre 2008 stammendes Dokument, das auf einem offiziellen Webserver der amerikanischem Geheimdienste liegt, beschreibt als Zielsetzung f端r das Jahr 2015 ein global vernetztes Geheimdienstunternehmen. Es handelt sich um einen Leitfaden f端r ein neues Handlungskonzept und eine st辰rkere Zusammenf端hrung aller US-Dienste in diesen einen zentralen Dienst. http://www.internet-law.de/2013/07/amerikanische-uberwachungsstrategien-ganz-offiziell.html <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/vision2015-130723124843-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Ein aus dem Jahre 2008 stammendes Dokument, das auf einem offiziellen Webserver der amerikanischem Geheimdienste liegt, beschreibt als Zielsetzung f端r das Jahr 2015 ein global vernetztes Geheimdienstunternehmen. Es handelt sich um einen Leitfaden f端r ein neues Handlungskonzept und eine st辰rkere Zusammenf端hrung aller US-Dienste in diesen einen zentralen Dienst. http://www.internet-law.de/2013/07/amerikanische-uberwachungsstrategien-ganz-offiziell.html
Vision 2015 - Geheimdienste Global verkn腴pfen from Marc Manthey
]]>
686 12 https://cdn.slidesharecdn.com/ss_thumbnails/vision2015-130723124843-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Wenn diese Petition es vor den Petitionsausschuss schafft geb ich einen Aus https://de.slideshare.net/slideshow/petition-44117/24197891 petition44117-130713041616-phpapp01
Der Deutsche Bundestag m旦ge beschlieen das die Bundesrepublik eine Verfassung bekommt und somit Souver辰nit辰t von unseren Besatzungsm辰chten erh辰lt. ]]>

Der Deutsche Bundestag m旦ge beschlieen das die Bundesrepublik eine Verfassung bekommt und somit Souver辰nit辰t von unseren Besatzungsm辰chten erh辰lt. ]]>
Sat, 13 Jul 2013 04:16:16 GMT https://de.slideshare.net/slideshow/petition-44117/24197891 opencu1@slideshare.net(opencu1) Wenn diese Petition es vor den Petitionsausschuss schafft geb ich einen Aus opencu1 Der Deutsche Bundestag m旦ge beschlieen das die Bundesrepublik eine Verfassung bekommt und somit Souver辰nit辰t von unseren Besatzungsm辰chten erh辰lt. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/petition44117-130713041616-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Der Deutsche Bundestag m旦ge beschlieen das die Bundesrepublik eine Verfassung bekommt und somit Souver辰nit辰t von unseren Besatzungsm辰chten erh辰lt.
from Marc Manthey
]]>
524 3 https://cdn.slidesharecdn.com/ss_thumbnails/petition44117-130713041616-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Top Secret National Reconnaissance Office declassification guideline /slideshow/top-secret-national-reconnaissance-office-declassification-guideline/24197092 declass-130713031808-phpapp01
Top Secret National Reconnaissance Office declassification guideline, refers to Signals Intelligence (SIGINT) Exchange descriptors. I explained to The Observer that code words found on Page 9 of the document like DIKTER and SETTEE, stood for Third Party SIGINT exchanges with Norway and the Republic of Korea, respectively. I also impressed on The Observer that these agreements, like the Second Party arrangements, are truly one-way streets, whereby NSA grabs all of the SIGINT from partner countries with the partners, especially the Third and Fourth Parties -- the latter include China, Sweden, Finland, Austria, and Switzerland]]>

Top Secret National Reconnaissance Office declassification guideline, refers to Signals Intelligence (SIGINT) Exchange descriptors. I explained to The Observer that code words found on Page 9 of the document like DIKTER and SETTEE, stood for Third Party SIGINT exchanges with Norway and the Republic of Korea, respectively. I also impressed on The Observer that these agreements, like the Second Party arrangements, are truly one-way streets, whereby NSA grabs all of the SIGINT from partner countries with the partners, especially the Third and Fourth Parties -- the latter include China, Sweden, Finland, Austria, and Switzerland]]>
Sat, 13 Jul 2013 03:18:08 GMT /slideshow/top-secret-national-reconnaissance-office-declassification-guideline/24197092 opencu1@slideshare.net(opencu1) Top Secret National Reconnaissance Office declassification guideline opencu1 Top Secret National Reconnaissance Office declassification guideline, refers to Signals Intelligence (SIGINT) Exchange descriptors. I explained to The Observer that code words found on Page 9 of the document like DIKTER and SETTEE, stood for Third Party SIGINT exchanges with Norway and the Republic of Korea, respectively. I also impressed on The Observer that these agreements, like the Second Party arrangements, are truly one-way streets, whereby NSA grabs all of the SIGINT from partner countries with the partners, especially the Third and Fourth Parties -- the latter include China, Sweden, Finland, Austria, and Switzerland <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/declass-130713031808-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Top Secret National Reconnaissance Office declassification guideline, refers to Signals Intelligence (SIGINT) Exchange descriptors. I explained to The Observer that code words found on Page 9 of the document like DIKTER and SETTEE, stood for Third Party SIGINT exchanges with Norway and the Republic of Korea, respectively. I also impressed on The Observer that these agreements, like the Second Party arrangements, are truly one-way streets, whereby NSA grabs all of the SIGINT from partner countries with the partners, especially the Third and Fourth Parties -- the latter include China, Sweden, Finland, Austria, and Switzerland
Top Secret National Reconnaissance Office declassification guideline from Marc Manthey
]]>
627 6 https://cdn.slidesharecdn.com/ss_thumbnails/declass-130713031808-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Third part nations - S-CCO leaked document 1 /slideshow/third-part-nations/24196976 thirdpartnations-130713031408-phpapp01
In the case of Germany, France, and others, they are both partners and targets and leaders like German Chancellor Angela Merkel is well aware that the German intelligence agencies assist NSA in spying on Germans and others in the same manner as the UK, Canada, Australia, and New Zealand, the so-called "Five Eyes [FVEY]" English-speaking club of signals intelligence partners. ]]>

In the case of Germany, France, and others, they are both partners and targets and leaders like German Chancellor Angela Merkel is well aware that the German intelligence agencies assist NSA in spying on Germans and others in the same manner as the UK, Canada, Australia, and New Zealand, the so-called "Five Eyes [FVEY]" English-speaking club of signals intelligence partners. ]]>
Sat, 13 Jul 2013 03:14:08 GMT /slideshow/third-part-nations/24196976 opencu1@slideshare.net(opencu1) Third part nations - S-CCO leaked document 1 opencu1 In the case of Germany, France, and others, they are both partners and targets and leaders like German Chancellor Angela Merkel is well aware that the German intelligence agencies assist NSA in spying on Germans and others in the same manner as the UK, Canada, Australia, and New Zealand, the so-called "Five Eyes [FVEY]" English-speaking club of signals intelligence partners. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thirdpartnations-130713031408-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In the case of Germany, France, and others, they are both partners and targets and leaders like German Chancellor Angela Merkel is well aware that the German intelligence agencies assist NSA in spying on Germans and others in the same manner as the UK, Canada, Australia, and New Zealand, the so-called &quot;Five Eyes [FVEY]&quot; English-speaking club of signals intelligence partners.
Third part nations - S-CCO leaked document 1 from Marc Manthey
]]>
927 2 https://cdn.slidesharecdn.com/ss_thumbnails/thirdpartnations-130713031408-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document 安艶庄 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Der spiegel 28-2013_-_nur_der_snowden_und_nsa_part https://de.slideshare.net/slideshow/der-spiegel-282013nurdersnowdenundnsapart/23986024 derspiegel28-2013-nurdersnowdenundnsapart-130707025449-phpapp02
"Die stecken unter einer Decke mit den Deutschen" ]]>

"Die stecken unter einer Decke mit den Deutschen" ]]>
Sun, 07 Jul 2013 02:54:49 GMT https://de.slideshare.net/slideshow/der-spiegel-282013nurdersnowdenundnsapart/23986024 opencu1@slideshare.net(opencu1) Der spiegel 28-2013_-_nur_der_snowden_und_nsa_part opencu1 "Die stecken unter einer Decke mit den Deutschen" <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/derspiegel28-2013-nurdersnowdenundnsapart-130707025449-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> &quot;Die stecken unter einer Decke mit den Deutschen&quot;
from Marc Manthey
]]>
2202 8 https://cdn.slidesharecdn.com/ss_thumbnails/derspiegel28-2013-nurdersnowdenundnsapart-130707025449-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Wirtschaftsspionage in Zeiten von Voll端berwachung https://de.slideshare.net/slideshow/07-wirtschaftsspionage/23971456 07wirtschaftsspionage-130706084809-phpapp02
Wirtschaftsspionage bekommt nach den letztlichen Enth端llungen eine v旦llig neue Dimension- Wie deutsche Unternehmen von ausl辰ndischen Geheimdiensten ausgepl端ndert und ruiniert werden(auf der Basis des Buches von Udo Ulfkotte)]]>

Wirtschaftsspionage bekommt nach den letztlichen Enth端llungen eine v旦llig neue Dimension- Wie deutsche Unternehmen von ausl辰ndischen Geheimdiensten ausgepl端ndert und ruiniert werden(auf der Basis des Buches von Udo Ulfkotte)]]>
Sat, 06 Jul 2013 08:48:09 GMT https://de.slideshare.net/slideshow/07-wirtschaftsspionage/23971456 opencu1@slideshare.net(opencu1) Wirtschaftsspionage in Zeiten von Voll端berwachung opencu1 Wirtschaftsspionage bekommt nach den letztlichen Enth端llungen eine v旦llig neue Dimension- Wie deutsche Unternehmen von ausl辰ndischen Geheimdiensten ausgepl端ndert und ruiniert werden(auf der Basis des Buches von Udo Ulfkotte) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/07wirtschaftsspionage-130706084809-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Wirtschaftsspionage bekommt nach den letztlichen Enth端llungen eine v旦llig neue Dimension- Wie deutsche Unternehmen von ausl辰ndischen Geheimdiensten ausgepl端ndert und ruiniert werden(auf der Basis des Buches von Udo Ulfkotte)
from Marc Manthey
]]>
2777 8 https://cdn.slidesharecdn.com/ss_thumbnails/07wirtschaftsspionage-130706084809-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation 安艶庄 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CoCCA OpenReg development, registry software /opencu1/aslam-coccapreso aslam-cocca-preso-130510151941-phpapp02
Council of Country Code Administrators, or CoCCA, is a non-profit organization and a forum engaged in the collaboration of ccTLD managers.]]>

Council of Country Code Administrators, or CoCCA, is a non-profit organization and a forum engaged in the collaboration of ccTLD managers.]]>
Fri, 10 May 2013 15:19:41 GMT /opencu1/aslam-coccapreso opencu1@slideshare.net(opencu1) CoCCA OpenReg development, registry software opencu1 Council of Country Code Administrators, or CoCCA, is a non-profit organization and a forum engaged in the collaboration of ccTLD managers. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/aslam-cocca-preso-130510151941-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Council of Country Code Administrators, or CoCCA, is a non-profit organization and a forum engaged in the collaboration of ccTLD managers.
CoCCA OpenReg development, registry software from Marc Manthey
]]>
920 2 https://cdn.slidesharecdn.com/ss_thumbnails/aslam-cocca-preso-130510151941-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Drdos /slideshow/drdos/20307132 drdos-130501014626-phpapp02
DRDoS is the latest in the series of Denial of Service attacks. An explanation of the history of this type of attack is in order to fully understand the ramifications of this new threat.http://servv89pn0aj.sn.sourcedns.com/~gbpprorg/2600/DRDoS-Spyrochaete.html]]>

DRDoS is the latest in the series of Denial of Service attacks. An explanation of the history of this type of attack is in order to fully understand the ramifications of this new threat.http://servv89pn0aj.sn.sourcedns.com/~gbpprorg/2600/DRDoS-Spyrochaete.html]]>
Wed, 01 May 2013 01:46:26 GMT /slideshow/drdos/20307132 opencu1@slideshare.net(opencu1) Drdos opencu1 DRDoS is the latest in the series of Denial of Service attacks. An explanation of the history of this type of attack is in order to fully understand the ramifications of this new threat.http://servv89pn0aj.sn.sourcedns.com/~gbpprorg/2600/DRDoS-Spyrochaete.html <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/drdos-130501014626-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> DRDoS is the latest in the series of Denial of Service attacks. An explanation of the history of this type of attack is in order to fully understand the ramifications of this new threat.http://servv89pn0aj.sn.sourcedns.com/~gbpprorg/2600/DRDoS-Spyrochaete.html
Drdos from Marc Manthey
]]>
877 4 https://cdn.slidesharecdn.com/ss_thumbnails/drdos-130501014626-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-opencu1-48x48.jpg?cb=1547738957 I am an internet activist, techenthusiast, producer, musican, and started to discover my passion for music, photography and electronic at a very young age. I spend my youth in bands and experimenting with different computers like , Commodore 64, Yamaha CX5-M and Atari and later on Apple Macintosh. After i was working in one one of the biggest music stores in europe for several years i founded the "Les Enfants terribles Studio" in 1992, which was one of the first fully digital 16 track harddisk based music studios in cologne using Protools and an Apple Macintosh. Between 1993 and 2001 i produced, mixed and engineered many regional and international artists,doing commercials and post pro.. wordpress-to-go.de https://cdn.slidesharecdn.com/ss_thumbnails/goinstantbaas09-140315124051-phpapp01-141128101131-conversion-gate01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/baas-42134944/42134944 The Rise of BaaS A Uto... https://cdn.slidesharecdn.com/ss_thumbnails/fibjs-141025154606-conversion-gate02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/fibjs/40720923 Javascript on Fiber - ... https://cdn.slidesharecdn.com/ss_thumbnails/futuretopicgeoengineering-140628145825-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/future-topic-geoengineering/36416712 Future topic geoengine...