The censored Great White Shark
This is the one you can’t view for security reasons – it’s censored.
Don’t view this image. Danger, Danger, Danger Oh too late
That was so dangerous. You’ve looked at it now. Be very, very, very afraid.
This is the one you can’t view for security reasons – it’s censored.
Don’t view this image. Danger, Danger, Danger Oh too late
That was so dangerous. You’ve looked at it now. Be very, very, very afraid.
because they are so beautiful && pisses them off so much
1/3/14: shark ‘right’ ;)
The plan has changed. The plan now is learn to sail <will happen>, get a boat, sail the Med this yer and possibly many more yers.
edit: and also much more sailing
later: My boat will be renamed ‘Eau de Vie’
Yes I know – rough brandy but literally the water of life
XXX
later later: just checked it out
One of those cryptic messages again that only a few will catch the meaning.
I am really pleased that I can do it again
and I will
be doing it again
edit: Yers ago before I knew anything about this m****k I did another m****k. It’s returned now, I am able to do it again and I am very pleased.
A selection of recent UK and international political articles.
A selection of recent UK and international news articles
If the government gets its way, from May this year your family’s patient-identifiable data will be uploaded from your GP surgery to a single, centralised database for the very first time. This ‘care-data’ database will include your NHS number, date of birth, postcode, ethnicity and gender. Your medical diagnoses, including cancer and mental health, your referrals to specialists, your prescriptions, your body mass index, details of your vaccinations and screening tests and your smoking and alcohol habits will be on there too.
The scheme, led by health secretary Jeremy Hunt, is being hailed as a revolution in the use of information to improve our healthcare and to advance medical research – admirable aims indeed. But once it goes live, organisations including drug and insurance firms will be able to apply to purchase ‘pseudonymised’ details about patients. And ‘backdoors’ to the database will allow bodies like the police to enjoy direct access to your medical records as well.
17/2/14 edit: That would be Alex Salmon “accused of overheating production of Scottish farmed salmond to meet Japan’s insatiable demand for sushi in return for China’s loan of two pandas to Edinburgh Zoo.”
There’s a judgement that says a bedroom is a room furnished as a bedroom or used to sleep in. All bedroom tax decisions can be appealed. Time is running out to appeal.
The Bedroom Tax is Dead here’s why | SPeye Joe (Welfarewrites)
Bedroom Tax – Finally Killed by Plain Old Common-Sense?
…
The effect of this outbreak of common-sense is that, potentially, any or all of the original Bedroom Tax decisions taking effect last April are wrong – as councils cannot have known the actual situation and were making decisions based on an assumption that the rooms concerned were bedrooms. What’s more, despite the time elapsed since then, these decisions are still appealable – appeals can be accepted up to thirteen months after the date of the original decision. This clearly makes it important to act quickly. Anyone in any doubt about the correctness of their Bedroom Tax decision should write to the local authority decision-maker and seek an appeal in their own individual case. But this must be done soon – it will probably be too late by April.
The implications of this legal development may even go so far as to invalidate all of the decisions. If a room isn’t habitually used as a bedroom, it may fall outwith the normal everyday definition of the word – and therefore beyond the scope of the legislation as it stands. Technically, in order to assess whether a particular room qualifies as a “bedroom”, the local authority would have to go out and inspect it. In practice, this would be a task on a scale made impossible by limitations on resources. But unless a property has been thus assessed, then no decision can properly be made.
…
A small selection of recent UK politics news articles
The report mentioned that police were called to the scene, but omitted the scale of the response which, according to details in a Freedom of Information request, included Territorial Support Group riot police and the Armed Response Unit. In total, 48 officers and two dogs attended the scene.
Human rights campaigner David Mery who made the FOI request, said he was concerned about the report’s omissions and the way in which “crucial details” were “left out.”
He said: “Normally they would make it clear that information has been blacked out. Learning that 48 police officers were deployed for this incident is incredible. What else are they not saying?”
A small selection of news articles about UK and international politics …
For the bargain basement price of $5,000, hackers offered for sale a software flaw in Adobe Acrobat that allows you to take over the computer of any unsuspecting victim who downloads a document from you. At the opposite end of the price range, Endgame Systems of Atlanta, Georgia, offered for sale a package named Maui for $2.5 million that can attack targets all over the world based on flaws discovered in the computer software that they use. For example, some years ago, Endgame offered for sale targets in Russia including an oil refinery in Achinsk, the National Reserve Bank, and the Novovoronezh nuclear power plant. (The list was revealed by Anonymous, the online network of activist hackers.)
While such “products,” known in hacker circles as “zero day exploits,” may sound like sales pitches from the sorts of crooks any government would want to put behind bars, the hackers and companies who make it their job to discover flaws in popular software are, in fact, courted assiduously by spy agencies like the NSA who want to use them in cyberwarfare against potential enemies.
Take Vupen, a French company that offers a regularly updated catalogue of global computer vulnerabilities for an annual subscription of $100,000. If you see something that you like, you pay extra to get the details that would allow you to hack into it. A Vupen brochure released by Wikileaks in 2011 assured potential clients that the company aims “to deliver exclusive exploit codes for undisclosed vulnerabilities” for “covertly attacking and gaining access to remote computer systems.” …
So in a world where, increasingly, nothing is private, nothing is simply yours, what is an Internet user to do? As a start, there is an alternative to most major software programs for word processing, spreadsheets, and layout and design — the use of free and open source software like Linux and Open Office, where the underlying code is freely available to be examined for hacks and flaws. (Think of it this way: if the NSA cut a deal with Apple to copy everything on your iPhone, you would never know. If you bought an open-source phone — not an easy thing to do — that sort of thing would be quickly spotted.) You can also use encrypted browsers like Tor and search engines like Duck Duck Go that don’t store your data.
Next, if you own and use a mobile device on a regular basis, you owe it yourself to turn off as many of the location settings and data-sharing options as you can. And last but hardly least, don’t play Farmville, go out and do the real thing. As for Angry Birds and Call of Duty, honestly, instead of shooting pigs and people, it might be time to think about finding better ways to entertain yourself. Pick up a paintbrush, perhaps? Or join an activist group like theElectronic Frontier Foundation and fight back against Big Brother.