Search This Blog

Showing posts with label documentary.. Show all posts
Showing posts with label documentary.. Show all posts

Sunday 21 May 2023

Douglas MacArthur: a brief history.


The Flood recollection.

 On the deluge


A flood myth or a deluge myth is a myth in which a great flood, usually sent by a deity or deities, destroys civilization, often in an act of divine retribution. Parallels are often drawn between the flood waters of these myths and the primaeval waters which appear in certain creation myths, as the flood waters are described as a measure for the cleansing of humanity, in preparation for rebirth. Most flood myths also contain a culture hero, who "represents the human craving for life".[1]

The flood-myth motif occurs in many cultures, including the Mesopotamian flood stories, Native American in North America, the Genesis flood narrative, manvantara-sandhya in Hinduism, and Deucalion and Pyrrha in Greek mythology.


Friday 19 May 2023

The Western schism: a brief history.

 The western schism


Western Schism, also called Great Schism or Great Western Schism, in the history of the Roman Catholic Church, the period from 1378 to 1417, when there were two, and later three, rival popes, each with his own following, his own Sacred College of Cardinals, and his own administrative offices.Shortly after the return of the papal residence to Rome following almost 70 years of the Avignon papacy, the archbishop of Bari was elected pope as Urban VI amid demands by the Roman populace for “a Roman or at least an Italian.” Urban VI proved to be so hostile to the cardinals, who had assumed great powers during the years at Avignon, that a group of cardinals retired to Anagni and elected one of themselves, Robert of Geneva, as Clement VII, claiming the election of Urban VI had been invalid because it was made under fear. Clement VII then took up residence at Avignon. Although Roman Catholic church historians generally agree that Urban VI and his successors were the legitimate popes, there has never been an official pronouncement to this effect.The double election had disastrous effects upon the church. The followers of the two popes were divided chiefly along national lines, and thus the dual papacy fostered the political antagonisms of the time. The spectacle of rival popes denouncing each other produced great confusion and resulted in a tremendous loss of prestige for the papacy.

Various proposals for ending the schism were made, especially by the University of Paris, which suggested either mutual resignation or a decision by an independent tribunal or a general council. This last proposal was in line with the growing conciliar movement, according to which a general council has greater authority than a pope. Both lines of popes refused to submit. Eventually cardinals from both obediences, seeking to end the schism, arranged the Council of Pisa, which met in 1409 and elected a third pope, Alexander V, who was succeeded shortly thereafter by Baldassare Cossa, who took the name John XXIII. Under pressure from the emperor Sigismund, John convoked, in 1414, the Council of Constance, which deposed him, received the resignation of the Roman pope, Gregory XII, and dismissed the claims of the Avignon pope, Benedict XIII. That series of events opened the way to the election of Martin V in November 1417, whereby the schism was ended.

Friday 12 May 2023

On the dark art of social hacking

 THE DARK ARTS: HACKING HUMANS


One of the biggest challenges for a company that holds invaluable data is protecting it. At first, this task would seem fairly straightforward. Keep the data on an encrypted server that’s only accessible via the internal network. The physical security of the server can be done with locks and other various degrees of physical security. One has to be thoughtful in how the security is structured, however. You need to allow authorized humans access to the data in order for the company to function, and there’s the rub. The skilled hacker is keenly aware of these people, and will use techniques under the envelope of Social Engineering along with her technical skills to gain access to your data.

Want to know how secure your house is? Lock yourself out. One of the best ways to test security is to try and break in. Large companies routinely hire hackers, known as penetration testers, to do just this. In this article, we’re going to dissect how a hired penetration tester was able to access data so valuable that it could have destroyed the company it belonged to.

INFORMATION GATHERING

The start of any hack involves information gathering. This is usually pretty easy for larger companies. Their website along with a few phone calls can reveal quite a bit of useful information. However, you can be assured that any company who has hired a pen tester has taken the necessary precautions to limit such information.

And such was the case for our hacker trying to gain access to the ACME Corp. servers. Her first target was the dumpsters – dumpster dives have been proven to unearth a trove of valuable information in the past. But the dumpsters were inside the complex, which was guarded by a contracted security firm. Through a bit of website snooping and a few phone calls, she was able to find out the department that was in charge of trash removal for the company. She then placed a phone call to this department. Using a social engineering (SE) technique known as Pretexting, she pretended to be with a trash removal company and wanted to submit a quote to service their business. Using another SE technique called Elicitation, she was able to find out:

that trash collection took place on Wednesdays and Thursdays
the total number of dumpsters
that there was a special dumpster for paper and technology trash
the name of the current waste removal company – Waster’s Management
the name of the employee in charge of the waste removal – [Christie Smith]

DUMPSTER DIVE

Armed with this information, she went to the Waster’s Management website and grabbed their JPEG logo.

Within a few days, she had a shirt and hat with the logo in her hands. She called the security department and said she was with Waster’s Management, and that [Christie Smith] had told her one of the dumpsters was damaged, and she needed to take a look at it before the next trash removal.

The next day, wearing the shirt and hat she had ordered online, she was given a badge from security and allowed access to the dumpsters. Now, any hacker worth her weight in PIC16F84’s already knows what dumpster she dove into. It didn’t take her long to walk away with several hard drives, a few USB drives and some useful documents. She was able to gain knowledge of an upcoming IT contract work, the name of the CFO, and the name of a server with some level of importance – prod23.

HACKING THE SERVER

With some more SE, she was able to find out when the IT work was scheduled. It was after hours. She showed up a bit late and was able to walk right through the front door by claiming she worked for the IT contract company. She then shifted roles and pretended to be an employee. She approached one the real IT contract guys, and said she worked for the CFO, [Mr. Shiraz], and asked if he knew to be careful with the prod23 server. With more SE, she was able to find out the prod23 server was off-limits, encrypted, and only accessible by specific admins.

She was able to access an admin office, and it was there she would don her black hat. She booted the computer with BackTrack via USB and installed a key logger. She made an SSH tunnel to her personal server where she could dump the contents of the key logger, along with some other shells. Now, this is where things get interesting. She opened Virtual Box and used the computer’s hard drive as the boot medium. The VM booted the OS, and she hid all of the screen decorations to make it look like the target OS was running. The admin would log in without a clue, and our hacker would get their username and password through the key logger.

Once the login information came in, she was able to access the admin’s computer, and from there the prod23 server. You can imagine the look on the faces of the top executives for ACME Corp when our hacker handed them a copy of the keys to their kingdom.

Social engineering is human hacking, and a dark art in itself. Our hacker in this story would have never been able to even get close to the server if she did not have SE skills. No matter how secure you make something, so long as you allow humans access to it, it’s vulnerable to attack. And then it’s down to how well-trained your people are in repelling these kinds of intrusion.

Monday 8 May 2023

On the myth of the gay gene.

 No ‘gay gene’: Massive study homes in on genetic basis of human sexuality


Massive Study Finds No Single Genetic Cause of Same-Sex Sexual Behavior
Analysis of half a million people suggests genetics may have a limited contribution to sexual orientation

By Sara Reardon on August 29, 2019


Few aspects of human biology are as complex—or politically fraught—as sexual orientation. A clear genetic link would suggest that gay people are “born this way,” as opposed to having made a lifestyle choice. Yet some fear that such a finding could be misused “cure” homosexuality, and most research teams have shied away from tackling the topic.

Now, a new study claims to dispel the notion that a single gene or handful of genes make a person prone to same-sex behavior. The analysis, which examined the genomes of nearly half a million men and women, found that although genetics are certainly involved in who people choose to have sex with, there are no specific genetic predictors. Yet some researchers question whether the analysis, which looked at genes associated with sexual activity rather than attraction, can draw any real conclusions about sexual orientation.

“The message should remain the same that this is a complex behavior that genetics definitely plays a part in,” said study co-author Fah Sathirapongsasuti, a computational biologist at genetic testing company andMe in Mountain View, Calif., during a press conference. The handful of genetic studies conducted in the past few decades have looked at only a few hundred individuals at most—and almost exclusively men. Other studies have linked sexual orientation with environmental factors such as hormone exposure before birth and having older brothers.
             In the new study, a team led by Brendan Zietsch of the University of Queensland, Australia, mined several massive genome data banks, including that of 23andMe and the UK Biobank (23andMe did not fund the research). They asked more than 477,000 participants whether they had ever had sex with someone of the same sex, and also questions about sexual fantasies and the degree to which they identified as gay or straight.

The researchers found five single points in the genome that seemed to be common among people who had had at least one same-sex experience. Two of these genetic markers sit close to genes linked to sex hormones and to smell—both factors that may play a role in sexual attraction. But taken together, these five markers explained less than 1 percent of the differences in sexual activity among people in the study. When the researchers looked at the overall genetic similarity of individuals who had had a same-sex experience, genetics seemed to account for between 8 and 25 percent of the behavior. The rest was presumably a result of environmental or other biological influences. The findings were published Thursday in Science.
                  Despite the associations, the authors say that the genetic similarities still cannot show whether a given individual is gay. “It’s the end of the ’gay gene,’” says Eric Vilain, a geneticist at Children’s National Health System in Washington, D.C., who was not involved in the study.

The research has limitations: almost all of the participants were from the U.S. or Europe, and the individuals also tended to be older—51 years old on average in the 23andMe sample and at least 40 in the UK Biobank sample.

Still, researchers welcome the data. “A lot of people want to understand the biology of homosexuality, and science has lagged behind that human interest,” says William Rice, an evolutionary geneticist at the University of California, Santa Barbara, who also was not involved in the work. “It’s been a taboo topic, and now that we’re getting information I think it’s going to blossom.”
                  The study will not be the last word on the vexing question of what causes homosexuality, however. In 1993 geneticist Dean Hamer of the U.S. National Cancer Institute and his colleagues published a paper suggesting that an area on the X chromosome called Xq28 could contain a “gay gene.” But other studies, including the new paper, found no such link, and Sathirapongsasuti says that the new study is the final nail in the coffin for Xq28 as a cause of same-sex attraction.

But Hamer, now retired, disagrees. His study, which analysed the genomes of 40 pairs of gay brothers, looked exclusively at people who identified as homosexual. He sees the new paper as an analysis of risky behavior or openness to experience, noting that participants who engaged in at least one same-sex experience were also more likely to report having smoked marijuana and having more sexual partners overall. Hamer says that the findings do not reveal any biological pathways for sexual orientation. “I’m glad they did it and did a big study, but it doesn’t point us where to look.”

Rice and Vilain agree that the conclusion is unclear. A more detailed questionnaire that looks at more aspects of sexuality and environmental influences would allow the researchers to better pinpoint the roots of attraction.
                        The authors say that they did see links between sexual orientation and sexual activity, but concede that the genetic links do not predict orientation. “I think it’s true we’re capturing part of that risk-taking behavior,” Sathirapongsasuti says, but the genetic links still suggested that same-sex behavior is related to attraction.

Nevertheless, Hamer and others praise the new contribution to a field that suffers from a dearth of good studies. “I hope it will be the first of many to come.”

Face to face with a monster.