search results matching tag: computer system

» channel: learn

go advanced with your query
Search took 0.000 seconds

    Videos (19)     Sift Talk (1)     Blogs (0)     Comments (50)   

bobknight33 (Member Profile)

newtboy says...

Uh-oh.
Trump personally directed employees to move and hide the classified documents after getting a subpoena for them, and directed them to lie about it, but now that the FBI has security footage of them doing it, they have admitted hiding the stolen documents at Trump’s direction and insistence and admitted to lying about it.

They also have these employees cooperation. They have agreed to testify that Trump himself directed them to move/hide boxes he knew contained classified documents that had been subpoenaed AFTER he received the subpoena. Game over.

His lawyers knew this when they lied that all documents had been returned….unfortunately for them so did the FBI.

This is evidence of his knowledge of guilt….proof he knew he was committing crimes, and a crime itself. Obstruction carries up to a 20 year sentence per document he hid….and there are hundreds if not thousands of stolen pages he hid.

Can’t wait until some of these documents show up on Chinese and Russian government computer systems.

Also….enjoy…. https://videosift.com/video/Trump-Signed-Order-Immediately-Withdraw-Afghanistan-Troops

If [Durham Filing] Is True, It's A Lot Bigger Than Watergate

bcglorf says...

He carefully leaves out the most important part about the network traffic they took from the office of the President.

The lawyer, Sussman, is being accused of lying in a Sept. 2016 interview about whom all he was working for.

He was indeed working for the Clinton campaign amongst other groups. It also appears there is compelling evidence that he was working with Tech staff with access to Whitehouse internet data.

Remember though, the interview is in September 2016, while the sitting president was Barack Obama. The lawyer was working for the Clinton campaign and presumably the DNC, because they were investigating the Russian hack of their email and computer systems...

But Fox and anyone willing to be compliant like Sen Cruz are tripping over themselves to make sure they fuel the false conception that Trump was spied on in the white house.

If you watch Cruz words here, he chooses them terrifically carefully to leave ambiguous the timing of the allegations about the whitehouse data to leave the impression by omission.

bobknight33 (Member Profile)

newtboy says...

Holy shit.
Did you know that three weeks ago cyber ninjas actually admitted they had installed malware into Maricopa voting machines?
I knew the machines had been invalidated after cyber ninjas had them because of fears that in their incompetence this could have happened, now it seems cyber ninjas knew it had happened (it looks intentional) but didn't admit it until three weeks ago.
These guys are the right's best digital security people?

And what did we get for this $3 million mistake? A review that any competent middle schooler could have done better, would have made fewer mistakes, and wouldn't have destroyed an entire county’s voting equipment, and wouldn't have been a dishonest tool for Trump making outrageous and completely false claims that can be debunked within an hour.
Their Twitter accounts are suspended for lying.

Now consider, cyber ninjas was demanding access to dmv computers, police, sheriff, county, and state computer systems and routers, even health care records...and would have infected every state owned system had they been given access. They want to repeat this in every county Trump lost....destroying the voting ability of any county that went to Biden. Just to replace the routers in one county would cost $6 million....and because there's a severe computer chip shortage, it would take up to multiple years to buy and install them, during which time they couldn't vote.

I think it's time to audit all counties that voted for Trump, because any county that would elect him has something seriously wrong, and because all the actual fraud found has been by his voters. If some malware disenfranchises all those voters in the next election, it will only be in an effort to secure the vote, so no foul, just like the targeted anti voting rights laws you guys are enacting to disenfranchise tens of millions of voters.

Keep in mind, Democrats have sponsored uncountable bills to safeguard the election systems nationwide, republicans wouldn’t even consider a single one. They aren’t interested in a fair vote, a safe vote, or a secure vote…only a Republican vote by any means. They’ve said so publicly uncountable times….if every eligible American has the opportunity to vote, “ you’d never have a Republican elected in this country again,”-DJ Trump

Honest Government Ad | Julian Assange

newtboy says...

Jesus Hitler Christ! When did Juice become Russia's anti-western-countries bitch?

It the crime of helping his source break passwords on classified government computer systems, conspiracy to hack classified government computer systems, and likely theft of top secret classified information, that's not good journalism you dumb twat. If Manning had just come to him with classified info, that's journalism. When Assange helped him steal that info, he became an enemy of the United States and it's allies. If it could be proven he did it with or for an enemy nation, that's an act of war. I'm pretty sure sentencing guidelines could include death for that.

I guess The Juice Media needs to make a "if juice media clips were honest" clip. This one was a huge fail that seemed purely snarky and angry, not even funny, and certainly not honest.

DHS - Russia Did NOT "Attack" Elections --

newtboy says...

So, to save you wasting 22 minutes watching this dreck, this is all a semantic argument about how you define "attack".

If you say illicitly intruding on a system and stealing the data, and probing the system to prepare for future intrusions is just "scanning" and to be an "attack" they must successfully, detectably use that stolen data to take over/directly influence the system (like deleting or invalidating voters or freezing/ransomwareing the election computer systems) or to successfully change the results inside election machines, then there was no successful attack detected.
If you think breaking into election systems, stealing the data, and scanning the election system for exploitable vulnerabilities is an attack, there were many attacks detected.

Jebus Christ, this is what Jimmy Dore has become, a ranting conspiracy theorist that gleefully twists any fact to match his narrative? How sad.

Arnold Schwarzenegger Has A Blunt Message For Nazis

JustSaying says...

BASF is a huge german corporation that produced Zyklon B, the gas used in Ausschwitz to kill thousands of people. They're still going strong. It is by far not the only german corporation that benefitted greatly from the Holocaust. Take IBM for example, they delivered card-computing systems to manage concentration camp popula... Oh shit! IBM is american, my bad.
The Bundeswehr, the german military, was run by Nazi Generals in its early years. Just this year there were several scandals concerning Neo Nazis among their ranks.
A lot of people benefited from the atrocities of the third Reich. Don't kidd yourself. Remember, Hitler hired Ferdinand Porsche to develop the Volkswagen. The development of the VW Beetle was started by the Fuehrer.

newtboy said:

...
BTW....because you seem confused, no one ever was forced under penalty of death to keep slaves, and very few Nazi's families benefited after the fact from having been Nazis....it's not the same thing by far.

Airbus circling approach Calvi by Captain Joe

Flying dog - Epic jump - Awesome jump 3.90 meters - New Reco

Payback says...

"What you must learn is that these rules are no different that the rules of a computer system. Some of them can be bent. Others can be broken. Understand?"

Dog understands.

BB-8 droid from The Force Awakens Rolls out on stage

grahamslam says...

It would appear to me that the "head" is sitting on the body, not needing to be connected physically at all. Keeping in mind it is also remote controlled, I'm sure it has a "segway" type gyroscope/computer system to keep it from falling off, but the independent ability from the operator to spin it, or move it around on top of the body. And indeed the interior of the body would have it's own little wheeled robot, just like a hamster ball. That's my 2 cents.

Early CGI - BBC Tomorrow's World 1982

Sagemind says...

Mind blowing technology there.
I remember as a kid, betting a tour of the local cable news station with my class, and we were shown all this stuff, and how amazing and advanced their new new computer systems were.

Amazing Pilot Skills - Saves His Plane

SFOGuy says...

So, he thought it was a computer system problem when in actuality (very end of video) something basically blew off the back end of the jet nozzle assembly and by implication damaged the tail assembly? Gutsy. And if they figured why and could fix it in the other production planes, heroism worth the title.
*promote

Tesla Burning on Roadside ~ Kent, WA. 2013

RFlagg says...

Seems a piece of metal managed to punch a 3" hole in the 1/4" armor plating with, according to Elon Musk, 25 tons of force. The on board computer systems alerted the driver, he exited the freeway as instructed by the system and exited the car. The fire never reached the passenger compartment even after the fire department punctured the protective cover to put the fire out. The battery system has internal fire walls that worked as expected. Musk notes that Tesla's fire rate is much lower than a gas powered fire rate. The company is giving the guy another car as a loaner.
http://www.teslamotors.com/blog/model-s-fire

Obama "I Won't be Scrambling Jets to Get 29-Year-Old Hacker"

shatterdrose says...

Um, so where did he say "because a drone strike . . . " ? I didn't see or hear him say it. So without that, there's nothing special here.

"hack·er [hak-er] Show IPA
noun
1.
a person or thing that hacks.
2.
Slang. a person who engages in an activity without talent or skill: weekend hackers on the golf course.
3.
Computer Slang.
a.
a computer enthusiast.
b.
a microcomputer user who attempts to gain unauthorized access to proprietary computer systems."

Well, I'd be damned. It seems according to the dictionary he is a hacker. Hmmmm.

Greatest Mysteries of WWII: Hitler's Stealth Fighter

Xaielao says...

I don't see how it could possibly fly with any sort of stability? The only reason modern aircraft of that shape fly is because of fly-by-wire, computer systems that adjust the vehicles systems hundreds of times a second. So yes, it certainly is advanced for the time I really doubt it would have seen all that much success. Just one of dozens of scrapped designs the Germans tried to develop.

Olafur Ragnar Grimsson ~ "Let banks go bankrupt"

CreamK says...

Nothing is and nothing was too big to fail. It was the largest theft in history organized by politicians. If banks don't their shit right, they need to suffer from it. I understand protecting the savings of individuals that would've been lost but not the worthless lines of text in some computer system that is used to create money from thin air.

Next: derivatives that will burst and even larger theft where rest of the wealth is transferred from poor to the rich. Then they can start to decrease our numbers.



Send this Article to a Friend



Separate multiple emails with a comma (,); limit 5 recipients






Your email has been sent successfully!

Manage this Video in Your Playlists

Beggar's Canyon