Hay Day Cheats for iPhone

1 tricks · Last: 14/08/2013.

  Add to my tricks
General Advice / mini guide

Some good tips to have the best farm and make your time:

1. Buy wholesale, sell retail

A good way to make money is to buy large quantities of material, «wholesale» for a lot of money, but for a low cost per unit. When you make a large collection of materials, start selling them one by one. Use advertising in the newspaper to let people know what you sell.

Two. Diamonds are the most valuable

Diamonds are the most valuable of the set of all elements that we can get and spend. Be sure to save them, and spend only on those things strictly necessary, and never use them to speed things up. Diamonds are valuable and scarce, get to level up, to meet certain achievements and to do things like connect the game with our Facebook account, or else we will have to pay for them. From level 24 we can build our own diamond mine, but until we get there we have to use them very carefully.

How to get diamonds:
– Following Hay Day on Facebook you get a diamond.
– Hay Day with Facebook Connecting receive Five Diamonds.
– You get two diamonds when you see a trailer for another game.
– As you level you get one or two diamonds.
– You get diamonds, very occasionally, to examine mysterious boxes.
– You get diamonds in the mine at level 24.
– You get one or two diamonds per level up.
– You get a diamond every time you get an achievement.
– You can get diamonds organized the Facebook page of the game competitions.

Three. Balance between livestock and agriculture

Both animal farms and plantations depend on each other. Try to balance both facilities, and you end up without food for animals.

April. Find mystery boxes and open them

Browsing the stage sometimes arise mystery boxes. Open them will always give you something, sometimes valuable, sometimes less, but always beneficial.

May. The trick wheat

Buy wheat to fill your warehouse. Plant half that wheat when harvest time comes, put your phone parallel to the ground, looking up, and shake. You will receive bonus items.

6. Walking sooner ripe crops

The earlier cuts the crop when it has matured before you can plant new and thus achieve more benefits. Once a crop is at 100%, it will not grow or improve more.

7. Think short and long term

When you go to keep track mobile plant crops that take a little. When you go to take longer to watch mobile, for example to go to sleep, other plant last longer. The plants take longer to grow can be a little desperate, but then are those that give more benefits.

8. The tools are very valuable

The tools that are used to expand the space of the barn and silo are the most valuable in the game. Be sure to save them and not sell them because you’ll need and are hard to get.

Source: http://www.vandal.net/trucos/iphone/hay-day/21481

After Columbia mall shooting, no closer to gun control reforms

If you think it’ll be a month of Sundays before this country gets serious about gun violence, you’re probably underestimating.

It’s already been nearly three months of Mondays — 77, to be exact — and we’re not making progress.

Dana Milbank

Dana Milbank writes a regular column on politics.
Archive
@MilbankFacebookRSS
Gallery

Tom Toles on gun control: A collection of cartoons about the debate.
Video

Ann Telnaes animation: Nothing has changed since the Newtown massacre.
You may also like…

Ruth Marcus
In Virginia, not politics as usual

Richard Cohen
A war without purpose
After the July 2012 shooting at a movie theater in Aurora, Colo. , a group of Washington women — a preschool teacher, a retired principal and a few friends — resolved to meet outside the White House every Monday until the nation comes to its senses on guns. They’ve missed only a couple of Mondays since then because of extreme weather, and they’ve been there through the Navy Yard shootings, the Sikh temple shootings in Wisconsin and the school massacre in Newtown, Conn., among others, and they’ve been keeping a running list of victims.

“There are 68 mass shootings on our timeline,” said Linda Finkel-Talvadkar, the retired principal.

“Or was it 90?” inquired Barbara Elsas, the preschool teacher. “Shoot!”

On second thought, don’t shoot.

I had come to see the gun-control activists because of the shootings Saturday at a mall in Columbia, Md., 25 miles outside Washington. For a few hours, cable news went with the story, but the incident quickly faded into a collective ho-hum. It apparently wasn’t a terrorist — police at this writing are still searching for a motive — and only three people were killed, including the shooter. That falls short of the standard “mass murder” definition, which requires four deaths, not including the shooter.

By any definition, the level of gun violence is obscene. USA Today reported last month that 934 people had died in mass shootings over the past seven years, and that’s only 1 percent of all gun-related homicides. The newspaper’s tally, including incidents in which four or more people were killed, was 146 mass shootings since 2006.

A crowd-sourced count on Reddit of any gun incident in which four or more were shot found 365 mass shootings in 2013 alone. The liberal Center for American Progress’s ThinkProgress blog found that in the first 14 school days of this year, there had been at least seven school shootings of all types, compared with 28 in all of 2013.

With so many shootings, it’s perhaps inevitable that the Columbia incident seems almost routine. The weapon used, a 12-gauge Mossberg shotgun, was ordinary, and the shooter reportedly had no criminal record and bought the gun legally.

But it is this sort of numbness that the women outside the White House are trying to counteract with their weekly vigils. They stand in the closed-to-traffic stretch of Pennsylvania Avenue, as few as two of them and as many as a dozen, wearing “Stop gun violence” pins and yellow crime-scene tape, and buttonholing passersby during lunch hour. Their signs bear messages such as “Shame on the U.S. Senate” and “Who gave the NRA so much power?”

The women are not motivated by any personal connection to gun violence but by a generalized outrage. They have been involved in demonstrations since the civil rights and Vietnam War movements of the 1960s, but nothing recurring like this.

At first, they had plenty of company outside the White House from the Brady Campaign and other gun-control organizations, but “after Newtown, those groups got swamped,” Elsas said, and the groups decamped to work on gun legislation that ultimately failed.

The friends remained, and they’re disappointed that their action — and gun control in general — has not gained more news media attention. They said most of the interest has been from foreign media — Russian, German, Japanese — that are curious about American gun culture.

Yet the women continue, week after week. On Monday, a strong wind was blowing their signs down the street and one of their trash bags over the fence and onto the White House lawn. Moments later, the wind toppled their supply cart, to which was taped a Margaret Mead quotation about a small group of committed citizens changing the world. Another gust sent a protest sign at Elsas’s head, knocking off her glasses.

I asked if they worried they might become part of the scenery, like the nearby anti-nukes encampment, or the ubiquitous Falun Gong demonstrators who also were on location Monday. Elsas said they aren’t concerned about that, “because, unfortunately, these shootings keep happening.” And the women can point to small triumphs from their conversations — 100 per week, they say — including the time they won over two pro-gun skateboarders who decided to join their protest.

“We haven’t given up hope,” Elsas said.

Real gun control, Finkel-Talvadkar added, “will happen in our lifetime.”

Good health, ladies.

Twitter: @Milbank

Read more from Dana Milbank’s archive, follow him on Twitter or subscribe to his updates on Facebook.

Read more:

Kevin O’Holleran: Support for gun control helped Democrat win in Virginia

Editorial: A year after Newtown, gun control has moved to the states

Dana Milbank: R.I.P. for gun control

Fred Hiatt: Searching for the tipping point on gun control

Source: http://www.washingtonpost.com/opinions/dana-milbank-after-columbia-mall-shooting-no-closer-to-gun-control-reforms/2014/01/27/8bc0f030-879e-11e3-916e-e01534b1e132_story.html

When a smartphone user opens Angry Birds, the popular game application…

20140128-060532.jpg

…and starts slinging birds at chortling green pigs, spies could be lurking in the background to snatch data revealing the player’s location, age, sex and other personal information, according to secret British intelligence documents.
In their globe-spanning surveillance for terrorism suspects and other targets, the National Security Agency and its British counterpart have been trying to exploit a basic byproduct of modern telecommunications: With each new generation of mobile phone technology, ever greater amounts of personal data pour onto networks where spies can pick it up.
According to dozens of previously undisclosed classified documents, among the most valuable of those unintended intelligence tools are so-called leaky apps that spew everything from the smartphone identification codes of users to where they have been that day.
The N.S.A. and Britain’s Government Communications Headquarters were working together on how to collect and store data from dozens of smartphone apps by 2007, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor. Since then, the agencies have traded recipes for grabbing location and planning data when a target uses Google Maps, and for vacuuming up address books, buddy lists, telephone logs and the geographic data embedded in photographs when someone sends a post to the mobile versions of Facebook, Flickr, LinkedIn, Twitter and other Internet services.
The eavesdroppers’ pursuit of mobile networks has been outlined in earlier reports, but the secret documents, shared by The New York Times, The Guardian and ProPublica, offer far more details of their ambitions for smartphones and the apps that run on them. The efforts were part of an initiative called “the mobile surge,” according to a 2011 British document, an analogy to the troop surges in Iraq and Afghanistan. An N.S.A. analyst’s enthusiasm was evident in the breathless title — “Golden Nugget!” — given to a slide for a top-secret talk in 2010 that described iPhones and Android phones as rich resources, another document noted.
The scale and the specifics of the data haul are not clear. The documents show that the N.S.A. and the British agency routinely obtain information from certain apps, particularly those introduced earliest to cellphones. With some newer apps, including Angry Birds, the agencies have a similar ability, the documents show, but they do not make explicit whether the spies have put that into practice. Some personal data, developed in profiles by advertising companies, could be particularly sensitive: A secret British intelligence document from 2012 said that spies can scrub smartphone apps to collect details like a user’s “political alignment” and sexual orientation.
President Obama announced new restrictions this month to better protect the privacy of ordinary Americans and foreigners from government surveillance, including limits on how the N.S.A. can view the metadata of Americans’ phone calls — the routing information, time stamps and other data associated with calls. But he did not address the information that the intelligence agencies get from leaky apps and other smartphone functions.
And while Mr. Obama expressed concern about advertising companies that collect information on people to send tailored ads to their mobile phones, he offered no hint that American spies have routinely seized that data. Nothing in the secret reports indicates that the companies cooperated with the spy agencies to share the information; the topic is not addressed.
The agencies have long been intercepting earlier generations of cellphone traffic like text messages and metadata from nearly every segment of the mobile network — and, more recently, computer traffic running on Internet pipelines. Because those same networks carry the rush of data from leaky apps, the agencies have a ready-made way to collect and store this new resource. The documents do not address how many users might be affected, whether they include Americans or how often, with so much information collected automatically, analysts would see personal data.
“N.S.A. does not profile everyday Americans as it carries out its foreign intelligence mission,” the agency wrote in response to questions about the program. “Because some data of U.S. persons may at times be incidentally collected in N.S.A.’s lawful foreign intelligence mission, privacy protections for U.S. persons exist across the entire process.” Similar protections, the agency said, are in place for “innocent foreign citizens.”
The British spy agency declined to comment on any specific program, but said all its activities complied with British law.
Two top-secret flow charts produced by the British agency in 2012 showed incoming streams of information skimmed from smartphone traffic by the Americans and the British. The streams were divided into “traditional telephony” — metadata — and others marked “social apps,” “geo apps,” “http linking,” webmail, MMS and traffic associated with mobile ads, among others. (MMS refers to the mobile system for sending pictures and other multimedia, and http is the protocol for linking to websites.)
In charts showing how information flows from smartphones into the agency’s computers, analysts included questions to be answered by the data, like “Where was my target when they did this?” and “Where is my target going?”
As the program accelerated, the N.S.A. nearly quadrupled its budget in a single year, to $767 million in 2007 from $204 million, according to a top-secret analysis written by Canadian intelligence around the same time.
Even sophisticated users are often unaware of how smartphones offer spies a unique opportunity for one-stop shopping for information. “By having these devices in our pockets and using them more and more,” said Philippe Langlois, who has studied the vulnerabilities of mobile phone networks and is the founder of the Paris-based company Priority One Security, “you’re somehow becoming a sensor for the world intelligence community.”
Smartphones almost seem to make things too easy. Functioning as phones to make calls and send texts and as computers to surf the web and send emails, they both generate and rely on data. One secret report showed that just by updating Android software, a user sent more than 500 lines of data about the phone’s history and use onto the network.
Detailed Profiles
Such information helps mobile advertising companies, for example, create detailed profiles of people based on how they use their mobile device, where they travel, what apps and websites they open, and other factors. Advertising firms might triangulate web shopping data and browsing history to guess whether someone is wealthy or has children.
The N.S.A. and the British agency busily scoop up this data, mining it for new information and comparing it with their lists of intelligence targets.
One secret British document from 2010 suggested that the agencies collected such a huge volume of “cookies” — the digital traces left on a mobile device or a computer when a target visits a website — that classified computers were having trouble storing it all.
“They are gathered in bulk, and are currently our single largest type of events,” the document said.
The two agencies displayed a particular interest in Google Maps, which is accurate to within a few yards or better in some locations. Intelligence agencies collected so much data from the app that “you’ll be able to clone Google’s database” of global searches for directions, according to a top-secret N.S.A. report from 2007.
“It effectively means that anyone using Google Maps on a smartphone is working in support of a GCHQ system,” a secret 2008 report by the British agency said.
(In December, The Washington Post, citing the Snowden documents, reported that the N.S.A. was using metadata to track cellphone locations outside the United States and was using ad cookies to connect Internet addresses with physical locations.)
In another example, a secret 20-page British report dated 2012 included the computer code needed for plucking the profiles generated when Android users play Angry Birds. The app was created by Rovio Entertainment, of Finland, and has been downloaded more than a billion times, the company has said.
Rovio drew public criticism in 2012 when researchers claimed that the app was tracking users’ locations and gathering other data and passing it to mobile ad companies. In a statement on its website, Rovio says that it may collect its users’ personal data, but that it abides by some restrictions. For example, the statement says, “Rovio does not knowingly collect personal information from children under 13 years of age.”
The secret report noted that the profiles vary depending on which of the ad companies — which include Burstly and Google’s ad services, two of the largest online advertising businesses — compiles them. Most profiles contain a string of characters that identifies the phone, along with basic data on the user like age, sex and location. One profile notes whether the user is currently listening to music or making a call, and another has an entry for household income.
Google declined to comment for this article, and Burstly did not respond to multiple requests for comment. Saara Bergstrom, a Rovio spokeswoman, said the company had no knowledge of the intelligence programs. “Nor do we have any involvement with the organizations you mentioned,” Ms. Bergstrom said, referring to the N.S.A. and the British spy agency.
Another ad company creates far more intrusive profiles that the agencies can retrieve, the report said. The names of the apps that generate those profiles were not given, but the company was identified as Millennial Media, which has its headquarters in Baltimore.
In securities filings, Millennial documented how it began working with Rovio in 2011 to embed ad services in Angry Birds apps running on iPhones, Android phones and other devices.
According to the report, the profiles created by Millennial contain much of the same information as others, but several categories that are listed as “optional,” including ethnicity, marital status and sexual orientation, suggest that much wider sweeps of personal data may take place.
Millennial Media declined to comment for this article.
Possible categories for marital status, the secret report said, include single, married, divorced, engaged and “swinger”; those for sexual orientation are straight, gay, bisexual and “not sure.” It is unclear whether the “not sure” category exists because so many phone apps are used by children, or because insufficient data may be available.
There is no explanation of precisely how the ad company defined the categories, whether users volunteered the information or whether the company inferred it by other means. Nor is there any discussion of why all that information would be useful for marketing — or intelligence.
Unwieldy Heaps
The agencies have had occasional success, at least by their own reckoning, when they start with something closer to a traditional investigative tip or lead. The spies say that tracking smartphone traffic helped break up a bomb plot by Al Qaeda in Germany in 2007, and the N.S.A. boasted that to crack the plot, it wove together mobile data with emails, logins and web traffic. Similarly, mining smartphone data helped lead to the arrests of members of a drug cartel hit squad in the killing of an American Consulate employee in Mexico in 2010.
But the data, whose volume is soaring as mobile devices have begun to dominate the technological landscape, is a crushing amount of information for the spies to sift through. As smartphone data builds up in N.S.A. and British databases, the agencies sometimes seem a bit at a loss on what to do with it all, the documents show. A few isolated experiments provide hints as to how unwieldy the data can be.
In 2009, the American and British spy agencies each undertook a brute-force analysis of a tiny sliver of their cellphone databases. Crunching just one month of N.S.A. cellphone data, a secret report said, required 120 computers and turned up 8,615,650 “actors” — apparently callers of interest. A similar run using three months of British data came up with 24,760,289 actors.
“Not necessarily straightforward,” the report said of the analysis.
The agencies’ extensive computer operations had trouble sorting through the slice of data. Analysts were “dealing with immaturity,” the report said, encountering computer memory and processing problems. The report made no mention of anything suspicious in the data.
Ginger Thompson contributed reporting. Jeff Larson is a reporter at ProPublica.

Source: New York Times

11 things you should know about social media

20140127-093128.jpg

BJ Mendelson, the author of «Social Media is Bullshit» is the owner of a Twitter account verified with three-quarters of a million followers and a stint in the list of Twitter followers suggested. «I am essentially the Forrest Gump of Twitter,» Mendelson, who spoke at the Marketing Conference in San Francisco AllTwitter said. He shared 11 tips for successful social networks:

1. In the U.S., less than 16% of the population actually uses Twitter. Of that 16%, 40% actually does nothing. Of the remaining 60%, only 25% are creating most of the tweets you see. This includes celebrities and brands.

Two. If you can not answer the question, «why am I here using Twitter?» You should not be using it.

Three. A U.S. journalists love Twitter. It’s like crack for them. If you have a story in the media, there are two things you must have: one is a Wikipedia page, and the other is a Twitter account. If you have a Twitter account for any other reason, is because journalists looking at it.

April. If you have a Twitter profile, go to join so many other social platforms as possible, even if you never use them. They call it a «link wheel» or a «network».

May. You have to have some kind of plan. Sports teams or big brands can get away with doing things on the fly. But for everyone else, resources are limited, time is limited and a comprehensive social media strategy is needed.

6. Have a landing page optimized to appear on your Twitter account. Include background information on how to use Twitter.

7. There is no universal right to send number of Tweets per day. That figure is based on customer data. Making customer research will learn when to send tweets, how many to send, and what kind. If you do not know who your customers are, have to stop, realize that, and then come to a plan.

8. If you have something to push, you have to push at least 3 times. Your followers on Twitter will not be through historical Tweets to see what they missed. Sending the same Tweet three times in different time zones ensures that more of your followers see the message.

9. If you are in the middle of a controversy, such as social media crisis exploding in Twitter, take these 4 steps to fix: 1. «Ask yourself: am I wrong,» Mendelson said. «If the answer is no, then do not worry about it.» 2. If «you did» apologize immediately. Three. Must also solve the problem in a transparent manner in public, on platforms where the negative feedback appears. April. Follow up with an update when the problem is resolved.

10. If you do not have email, phone number and the name of his followers, you’re doing it wrong. People will give you information with the right incentive.

11. The bigger you do, people tried to take him down. If you are big enough so that the media could be seeking to say «I have,» it pays to have at least one person who is trained to use Twitter. And it’s worth equipping everyone else in the company with at least a Twitter account so they can respond appropriately to a problem way.

How to become a hacker. By Eric Steven Raymond

Thyrsus Enterprises

Copyright © 2001 Eric S. Raymond

Original English: How To Become A Hacker
Translation: Miquel Vidal ,
from a previous version by César Ballardini.

Table of Contents

Why is this document?
What is a hacker?
The hacker attitude
1. The world is full of fascinating problems waiting to be solved
Two. No problem would be solved twice
Three. Boredom and drudgery are evil
April. Freedom is good
May. Attitude is no substitute for competence
Basic Skills for hacking
1. Learn to program
Two. Get one of the free Unixes and learn to use and operate it
Three. Learn how to use the Web and HTML programming
April. If you do not have functional English, learn
Status in the Hacker Culture
1. Programming software free
Two. Help test and debug software free
Three. Post useful information
April. Help keep the infrastructure working
May. Serve the hacker culture itself
Connecting hacker / nerd
Style Matters
Other sources of information
FAQ
Why is this document?

As editor of the Jargon File (the «Jargon File hacker») and author of some well-known documents of the same type, I often get emails from enthusiastic novices Network asking, «How I can learn to be a skilled hacker?» Sad to say that there seems no web or FAQ document addressing this vital issue, so here goes mine.

If you’re reading this document offline, the original online version can be found at http://www.catb.org/ ~ esr / faqs / hacker-howto.html.

Note: There is a list of Frequently Asked Questions at the end of this document. Please read it before -2 times-email me with questions about this document.

There available numerous translations of this document: Bulgarian, Catalan, Chinese (Simplified), Chinese (Traditional), Danish, Dutch, French, German, Hebrew, Hungarian, Indonesian, Japanese, Italian, Korean, Portuguese (Brazilian), Portuguese (European) , Russian, and Swedish. Please note that the content of this document changes occasionally, such translations may be outdated to varying degrees.

What is a hacker?

The Jargon File contains a bunch of definitions of the term ‘hacker’, most adeptness to technical and pleasure to solve problems beyond the limits. To learn how to become a hacker, well, just 2 points are really relevant.

There is a community, a shared culture, of expert programmers and networking wizards, whose history goes back decades to the days of the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term ‘hacker’. Hackers built the Internet. Hackers made the Unix operating system it is today. Hackers do go Usenet. Hackers operated the WWW. If you are part of this culture, if you have contributed to it and other people know who you are and call you a hacker, then you’re a hacker.

The hacker mentality is not confined to this software culture. There are people who apply the hacker attitude to other things, like electronics or music-in fact, you can find it in the highest levels of any science or art. Software hackers recognize these kindred spirits elsewhere and may call them ‘hackers’ too, and some claim that the hacker nature is really independent of the particular medium in which the hacker works. However, in the remainder of this document we will focus on the skills and attitudes of software hackers, and the traditions of the shared culture that originated the term ‘hacker’.

There is another group of people who call themselves hackers, but are not. These are people (usually male teenagers) having fun illegally breaking into computers and doing «phreaking» in the phone system. Real hackers have a name for those people: «crackers» and want no part of them. Real hackers say that most crackers are lazy, irresponsible, and not very bright, and based on its review to be able to break security does not make one a hacker, in the same way to be able to start a car with a bridge in the key does not make him automotive engineer. Unfortunately, many journalists and writers mistakenly use the word ‘hacker’ to describe crackers, this causes huge irritation to the real hackers.

The basic difference is this: hackers build things, crackers break them.

If you want to be a hacker, keep reading. If you want to be a cracker, go read the alt.2600 live and ready to withstand the harsh reality when you discover you’re not as smart as you think. And that’s all I’ll say about crackers.

The hacker attitude

Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. To be accepted as a hacker, you have to behave as if you had this attitude in you. And to behave as though you have this attitude, you will truly believe that attitude.

But if you think of cultivating hacker attitudes as just a way to gain acceptance in the culture, you’re wrong. Becoming the kind of person who believes these things is important for you, to help you learn and stay motivated. As with all creative arts, the most effective way to become a master is to imitate the mind of the teachers-not just intellectually, but also emotionally.

Or as the following modern Zen poem says:

To follow the path:
look at the teacher,
follows the master,
walking with the teacher,
looking through teacher
become the master.
So if you want to be a hacker, repeat the following until you believe what you’re saying:

1. The world is full of fascinating problems waiting to be solved

It’s fun to be a hacker, but it’s the kind of fun that requires much effort. The effort takes motivation. The winners athletes get their motivation from a kind of physical pleasure from working your body, to force themselves past their own physical limits. Similarly, to be a hacker you have to feel a thrill of primitive type when solving problems, you sharpen your skills, and exercising your intelligence.

If you’re not the kind of person that you feel inclined to these things naturally, you need to be able to experience to become a hacker. Otherwise, you will find your energy to «hack» you will be exhausted by other distractions like sex, money or social approval.

(Also you should develop some sort of faith in your own ability to learn-the belief that even though you may not know all you need to solve a problem, if you take part of it and learn from there, you’ll learn enough to solve the next part, and so, until you have fully resolved.)

Two. No problem would be solved twice

Creative brains are a valuable and limited resource. Should not be wasted reinventing the wheel when there are so many fascinating new problems waiting out there.

To behave like a hacker, you must believe that the time to think about using other hackers is precious-so much that it’s almost a moral duty for you to share information, solve problems and then exposing the solution so that other hackers can solve new problems instead of dealing with old perpetually.

(You need not think you’re obligated to give all your creative product, even those hackers that do are the ones that get most respect from other hackers.’s Consistent with the values ​​of a hacker sold enough to pay for food, rent and computers.’s also good to use these hacking skills to support a family or even get rich, as long as do not forget your loyalty to your art and your fellow hackers while you do it.)

Three. Boredom and drudgery are evil

Hackers (and creative people in general) should never be subjected to stupidly repetitive work, because when this happens it means they are not doing what only they can do: solve new problems. This waste of talent hurts everyone. Therefore, routine, repetitive and boring tasks are not only unpleasant, but intrinsically evil.

To behave like a hacker, you have to believe this enough to automate routine tasks all that is possible, not only for yourself, but for the benefit of everyone else (especially other hackers).

(There is one apparent exception to this rule. Hackers sometimes do things that may seem repetitive or boring to an observer, but an exercise to achieve mental clarity or to acquire some skill or get some kind of experience that could not be achieved in other mode. But this is an election-any thinking person should ever be forced into a situation that they get bored.)

April. Freedom is good

Hackers are naturally anti-authoritarian. Anyone who can give you orders can force you to stop you solve that problem is fascinating-and, given the way authoritarian minds work, will find some appallingly stupid reason to do so. So the authoritarian attitude has to be fought wherever you find it’s because if left to suffocate you, both you and other hackers.

(This is not the same as fighting all authority. Children need guidance and criminals restrictions. A hacker may agree to accept some kinds of authority in order to get something he wants more than the time spent on follow orders. But this is a limited pact, conscious,. kind of authoritarian submission that want is not on offer)

Authoritarians thrive on censorship and secrecy. And they distrust voluntary cooperation and information-sharing cooperation only pleases them under their control. So to behave like a hacker, you have to develop an instinctive hostility to censorship, secrecy, and the use of force or fraud to subdue responsible adults. And you must be prepared to act on consencuencia.

May. Attitude is no substitute for competence

To be a hacker, you have to develop some of these attitudes. But having the attitude not only transform you into hacker, as I can not transform into a champion athlete or a rock star. To transform into hacker need intelligence, practice, dedication and hard work.

Therefore, you must learn to distrust attitude and respect competence in all its forms. A hacker likes to waste any time with those who adopt the pose of hacker but revere competition-especially the hacking competition, but competition in any field is good. Especially good is the competition in demanding skills that few people master, and is the best competition in demanding skills that require mental alertness, skill and concentration.

If you respect the competition, you’ll enjoy developing it in yourself, hard work and dedication will become a kind of intense play, and not a routine. That attitude is vital to becoming a hacker.

Basic Skills for hacking

The hacker attitude is vital, but even more so are the skills. Attitude is no substitute for competence, and there is a certain set of basic tools that you must master before any hacker dream with the name.

This toolkit changes slowly over time as technology creates new skills and makes old ones obsolete. For example, the schedule included in machine language, and did not talk about HTML until recently. But by late 1996, it is clear that you must include the following:

1. Learn to program

This is, of course, the fundamental skill of the attacker. If you do not know any programming language, I recommend starting with Python. It is clean, well documented, and relatively easy for novices. Despite being a good first language, it is not a toy, it is very powerful, flexible and well suited to large projects. I have written a detailed analysis of Python. There are good tutorials available on the website of Python.

Java is also a good language to start programming. It’s harder than Python, but produces faster code than Python. I think it’s a good second language to learn.

But do not think you can be a hacker, a programmer even if you only know one language, you must learn how to think about programming problems in a general, independent of any language. To be a real hacker, you get to the precise point at which you learn a new language in days by relating what’s in the manual to what you already know before. This means you should learn several very different languages ​​together.

If you seriously want to get into programming, you have to learn C, based on Unix. C + + is very similar to C, if you know one, learning the other will not be difficult for you. However, none of them is good to learn programming. And today, the more you can avoid programming in C the more productive you will be.

C is very efficient, and works well with the resources of the machine. Unfortunately, C gets its efficiency based much low-level management of resources (like memory) by hand. All the low-level programming is very complex and prone to errors, and you have to spend a lot of time debugging the programs. With today’s machines, so powerful, so this is no longer necessary, it is smarter to use a language that uses the machine time less efficiently, but instead use your time more efficiently. That is, Python.

Other languages ​​of particular importance to hackers are Perl and LISP. Perl is worth learning for practical reasons: it is overwhelmingly the used by dynamic web pages and system administration, so even if you’ve never written in Perl, you should learn to read. Many people use Perl in the way I suggest using Python, to avoid C programming on jobs that do not require the efficiency of C. You’ll need to be able to understand.

LISP is worth learning for a different reason – the profound and enlightening experience that you get when you succeed you will finally be better programmer for the rest of your days, even if you do not use LISP lot. (You can easily get some first experience with LISP writing and modifying editing modes Emacs editor.)

The best thing today is to learn these five (Python, Java, C / C + +, Perl and LISP). Besides being these the most important languages ​​in the hacking, represent very different ways of approaching programming, and each will educate you in different ways.

I can not give complete instructions in this document you can learn how to program-is a complex skill. But I can come on the books and courses will not do (many, maybe most of the best hackers are self-taught). You can learn language features-parts-book knowledge, but the true knowledge you acquire in real life by applying what you know. What we serve is a) reading code and b) writing code.

Learning programming is like learning to write good natural language. The best way to learn is to read some of the things written by the masters of style, then write some things yourself, read a lot more, write some more … and repeat until your writing begins to show the kind of strength and economy you appreciate in your models.

Earlier it was difficult to find good quality code to read, because there were few programs of some magnitude in source code so that novice hackers could get his hands. This situation has changed dramatically: open source software, free programming tools and free operating systems (all done by hackers) are now widely available. Which brings me to our next topic elegantly …

Two. Get one of the free Unixes and learn to use and operate it

I assume you have a personal computer or you can access one (these kids today find it so easy to get it … :-)). The very most important step any newbie can give in the way of acquiring hacker skills is to get a copy of Linux or one of the other free BSD Unices, install it on a personal machine and make it work.

Yes, it is true that there are other operating systems in the world besides Unix. But they can only be found in binary format-no you can not read the code or modify it. If you’re trying to learn to hack on a DOS machine, Windows or MacOS you will feel as if you try to learn to dance with the body casting.

Under OS / X is possible, but only part of the system is open-source code is like you’re hitting a wall of several layers of cement, and other have to be careful not to develop the bad habit of relying on proprietary code Apple. If you concentrate on Unix under the hood, you can learn more useful things.

Unix is ​​the operating system of the Internet. While you can learn to use the Internet without knowing Unix, you can never be an Internet hacker without knowing. For this reason, the hacker culture today is very focused on Unix. (This was not always so, and even dislikes the situation to some of the most experienced hackers, but the symbiosis between Unix and the Internet is so strong that even the power of Microsoft seems unable to make a dent.)

So with a Unix-personally I like Linux, but there are other (and yes, you can run Linux and DOS / Windows on the same machine). I learn it. Make it work. Métele hand, go for it. Contact him via Internet. Read the code. Modify it. The best programming tools (including C, Lisp and Perl) than any Microsoft operating system could not even dream of, plus you’ll have fun and find yourself immersed in a wealth of knowledge such that you never imagined that system includes until at one point, looking back, you will realize that you are already a consummate master hacker.

To learn more about learning Unix, see The Loginataka.

If you want to get your hands on Linux, take a look at where I can get Linux.

You can find help and resources http://www.bsd.org BSD Unix.

I have written about the basics of Unix and the Internet.

(. Note: I recommend installing Linux or BSD or alone if you are new to Linux, is a group of local Linux users and ask for help, or contact him by LISC maintains Open Projects IRC Network where you can get help..)

Three. Learn how to use the Web and HTML programming

Most of the things the hacker culture has built work out of sight of the general public, helping run factories, offices and universities, and lack of an obvious impact on the lives of those who are not hackers. The Web is the one big exception, and it is so huge shiny hacker toy that even politicians admit is changing the world. For this reason alone (and there are plenty of other equally good), you must learn to work on the Web.

I’m not referring to learning to drive a browser (anyone can do that), but you must learn how to write HTML, the markup language of the Web. If you do not know how to program, learning that involves writing HTML will teach you some mental habits that will then help with programming. So do yourself a personal page. Try XHTML, which is lighter than classic HTML. (There are good beginner tutorials on the Web, here’s one.)

But do not go thinking that having a personal page’re closer to being a hacker. The Web is full of home pages. Most of them are banal, without content-trash trash very showy, but rubbish at the end (if you want to know more about this topic, see The HTML Hell Page in).

To be worthwhile, your page must have content-should be interesting and / or useful to other hackers. And this brings us to the next topic …

April. If you do not have functional English, learn

As an American and native English speaker, he was reluctant to suggest this, as it was interpreted as a kind of cultural imperialism. But native speakers of other languages ​​have urged me to point out that English is the working language in the hacker culture and the Internet, and you need to know to function in the hacker community.

This is very true. Way back around 1991, I learned that many hackers who have English as a second language I used in technical discussions even when they shared their native language, I was told that English has a richer than any other language and simply technical vocabulary so It was better tool for the job. For similar reasons, translations of technical books originally written in English are often unsatisfactory with (if you do).

Linus Torvalds, a Finn, comments his code in English (it apparently never occurred to him to do otherwise). His fluency in English has been an important factor in their ability to recruit a worldwide community of Linux developers. And this brings us to the next topic …

Status in the Hacker Culture

Similar to many other cultures without monetary economy way the hackerism is based on reputation. You’re trying to solve interesting problems, but how interesting and good is to find solutions is something that only your equal or superior technically be able to judge.

Accordingly, when you play the game hacker, you learn to puntuarte mainly depending on what other hackers think about your skills (this is the reason why you can not be a real hacker until other hackers will denominate so consistently). This fact is obscured by the image of hacking as solitary work, also by a hacker cultural taboo (now declining, but still strong) that prevents the ego or external validation as elements involved in one’s motivation is supported.

Specifically, hackerism is what anthropologists call a gift culture. You gain status and reputation not by dominating other people, nor by being beautiful / a, nor by having things other people want, but rather by giving things. Specifically, by donating your time, your creativity, and the results of your skill.

There are basically five kinds of things you can do to get respect from hackers:

1. Writing open source software

What (most central and most traditional) first is to write programs that other hackers opinion that are fun or useful, and donate supplies to the hacker culture program to be used.

(We used to call free software but this confused too many people who were not sure what was supposed to mean free [in English, the term free is polysemic and can mean «free» or «free.» In Castilian such ambiguity is given so the term «free software» is perfectly adequate -. NT] Most of us, at least 2:1 ratio according to the analysis of web content, software now prefer the term «open source «[In Castilian, however, is usually using» free software «, but in this version we have respected, of course, the change in terminology from Eric, which has replaced» free software «for open source in its documents, and we have translated as «open source» – NT]).

The most revered demigods hackerism are people who have written large programs with large capacities to meet long-range needs, and donate, so that anyone can use.

Two. Help test and debug open-source software

Are also recognized those who purify errors open source software. In this imperfect world, inevitably spend most of our development time in the debugging phase. This is why the developers of open source software think that a good «beta-tester» (beta tester, someone who knows how to clearly describe the symptoms, which can correctly locate problems, tolerating errors a rushed delivery, and is willing to apply a few simple diagnostic routines) are worth their weight in gold. Even with a single tester of these, it can be made to the debugging process from being a long nightmare that leaves one exhausted to be just a healthy discomfort.

If you are new, try to find a program under development in which you are interested, and you become a beta tester good. There is a natural progression from helping test programs to helping debug them and then later helping modify them. You will learn a lot that way, and people will help you in the future.

Three. Post useful information

Another good thing you can do is to collect and filter useful and interesting information and build web pages or type FAQ («Frequently Asked Questions») documents and make them available to others.

People who hold the most important technical FAQ enjoyed almost as much respect as the authors of free software.

April. Help keep the infrastructure working

The hacker culture (and the engineering development of the Internet, for that matter) run on voluntary work. There is a lot of necessary but unglamorous work that must be done for this to continue marching-manage mailing lists, moderating forums, sites maintain large amounts of archived software, developing RFCs and other technical standards.

People who develop these activities has a lot of respect, because everybody knows these jobs are huge consumers of time and not as fun as messing with the code. By doing so demonstrate their dedication.

May. Serve the hacker culture itself

Finally, you can spread the hacker culture itself (for example, typing a text on how to become a hacker :-)). This is something that you will not be willing to do until you are well known in the atmosphere for any of the four things just described.

The hacker culture does not have leaders, exactly, but has cultural heroes, tribal elders and historians and spokespeople. When you’ve been in the trenches long enough, you can grow and transform into one of them. But beware: hackers distrust noisy ego in their tribal elders, so the visible search for that kind of fame is dangerous. Rather than work hard at it, is better placed in a position such that it falls on you, then you should behave modestly and gracefully with their status.

Connecting hacker / nerd

Contrary to popular myth, you do not have to be a nerd [literally «nerd», but in hacker jargon has taken ironically, losing the originally derogatory nuance, and ended up being used as a synonym for someone who cares about the important things and does not linger on trivia. – N. T.] to be hacker. Help, however, and many hackers are nerds. Being a social outcast, the nerd can stay focused on the really important things, like thinking and hacking.

For this reason, many hackers have adopted the «nerd» label and even use the term as a badge of geek pride unpleasant-it’s his way of declaring their independence from normal social expectations.

If you can you concentrate enough on hacking to be good at it, and enjoy personal life over, okay. It is much easier now than when I was a rookie in the seventies, the dominant culture sees more favorably to techno-nerds now. There is also a growing number of people who realize that hackers are often high-quality item for boyfriend / girlfriend / husband / wife.

If you are attracted by the hacker activity because you have no life, that’s fine too, at least you will not have trouble concentrating. Maybe later you can get a life like other people.

Style Matters

Again, to be a hacker, you have to develop the mindset of the hacker. There are some things you can do when you are without a computer, which can help you. These things are no substitute for the activity of hacking (nothing is) but many hackers are performed, and feel that in some primitive way connected with the essence of hacking activity.

Learn to write correctly in your language. Although there is a stereotype that programmers are not able to write, a surprising number of hackers (including the best I know), are proficient writers.

Read science fiction. Go to meetings on science fiction (it’s a good way to meet hackers and proto-hackers).

Study Zen, and / or practicing martial arts. (The mental discipline is similar in both cases.)

Develop an analytical ear for music. Learn to appreciate peculiar kinds of music. Learn how to properly play a musical instrument or sing.

Develops penchant for double entenders and puns.

The more of these things you’ve done, are more likely to possess natural material for hacker. Why these particular things and not others is something that is not completely clear, but all are connected to a mixing of your left and right of your brain skills, what appears to be an important thing; hackers be able both logical as taking steps outside apparent logic of a problem at a given time reasoning.

Work as intensely as you play and play as intensely as you work. For true hackers, the diferiencia between «play», «work», «science» and «art» tend to disappear, or mixed in a high level of creativity. Also, do not give satisfied with having a narrow range of skills. Though most hackers self-describe as programmers, they tend to be more competent in various activities-management systems, web design and fix hardware problems are common. A hacker, on the one hand, systems administrator, on the other is also skilled at script programming and web design. Hackers do not do things by halves, if they get a full issue, tend to be very good at it.

Finally, a few things you should not do:

Do not use a silly name or grandiose user.

Do not get in «flamewars» (angry discussions) on Usenet (or anywhere else).

Do not call yourself «cyberpunk», and do not waste your time with anyone who does.

Do not post in forums or posting emails with lots of typos or incorrect grammatical constructions.

The only reputation you gain with these customs you is silly. Hackers have long memories-can take years until you accept again after these things.

The problem with virtual aliases deserves some explanation. Hide your identity behind a nickname is a childish and foolish behavior that is characteristic of crackers, warez d00dz, and other lower forms of life. Hackers do not do that, they are proud of what they do and they want it associated with their real names. So if you have a name for these, abandon. In the hacker culture will only serve to mark you as a loser.

Other sources of information

Peter Seebach maintains an excellent Hacker FAQ for managers who do not understand the deal with hackers. If the page does not answer Peter, the following Excite search you can find a copy.

I have also written A Brief History Of hackerdom [Spanish translation exists: Brief history of the hacker culture – N. T.].

I wrote an article The Cathedral and the Bazaar [Spanish translation exists: The Cathedral and the Bazaar – N. T.], which explains a lot about how the culture of Linux and open source software works. I have studied this issue more directly in its sequel, Homesteading the Noosphere [Spanish translation exists: Cultivating the noosphere – N. T.].

Rick Moen has written an excellent document on how to run a Linux user group.

Rick Moen and I have collaborated on another document on How To Ask Smart Questions [Spanish translation exists: How to ask questions intelligently – N. T.]. This will help you find roadside assistance.

If you need instructions on basics such as personal computers, Unix and the Internet, see The Unix and Internet Fundamentals HOWTO.

When you publish software or write patches, try to follow the guidelines in the Software Release Practice HOWTO.

FAQ

Q: Will you teach me to hack?
Q: How I can initiate me then?
Q: When should I start? Is it too late to learn?
Q: How long will it take me to learn to hack?
Q: Are Visual Basic or C # good languages ​​to start?
Q: Can you help me to crack a system, or you teach me how?
Q: How I can get the password for the account of another person?
Q: How do I access / read / monitor someone else’s email?
Q: How I can steal channel op privileges on IRC?
Q: I’ve been cracked. Will you help me to protect myself from future attacks?
Q: I am having problems with my Windows, will you help me?
Q: Where I can find some real hackers to talk with them?
Q: Can you recommend useful books about hacking and related topics?
Q: I need to be good at math to become a hacker?
Q: What language should I learn first?
Q: What kind of hardware do I need?
P:. I want to contribute. Can you help me pick a problem to work on?
Q: Do I need to hate and beat Microsoft?
Q. But not preclude open source software living for programmers?
Q: How I can get started? Where I can get a free Unix?

http://biblioweb.sindominio.net/telematica/hacker-como.html

9 reasons why you should not buy Apple

20140127-085852.jpg

Before hostilities should clarify several things. Simply put: I’m a graphic designer, my first Mac was an LC 475, the famous «Pizza box», and for over 20 years I have worked with Macs and PCs alike survived several battles between fans of both sides and I have been active in both rows as the other one. I currently work with PC, a clone that does not have many original parts, and use an iphone and an ipad for professional issues.

That said, and based on my experience, this article will argue that applying the most basic rules of common sense should not buy Apple products. That from an objective and rational view there are better alternatives. On the other hand I must assume that I have also succumbed (and perhaps succumb again), sometimes under the hypnotic power of manzanita, and finally, the heart has reasons that reason does not understand.

And now I wear a helmet, I review the parachute and here we go:

Apple is expensive. Period. If you add the cost of the parts list containing any Apple product you will not leave the accounts. Some people say that when you pay pay Apple innovation, R & D pay, and pay for the apple. But the reality is that Apple knows that a product is worth exactly what their customers would pay for it (first dogma of pricing) and the legion of defenders of the Cupertino company is always willing to spend the night in a queue with briefcase full of money . Therefore rationally price of Apple products is overrated, but apparently there are many who think the status is priceless. If we add that the apple makes a dollar conversion to euro 1-1 when pricing their products (!) We see that Apple’s products simply not worth the cost or cost what they are worth.

To ride roughshod current standards Apple offers a warranty of its products a year, when the law in hand are two-year warranty. For this reason, Apple has denounced FACUA to the National Institute of Consumption and Consumption regional administrations for violating the revised text of the General Law for the Defence of Consumers and Users, which states that «the seller responds nonconformities expressed within a period of two years from delivery. » This is even more hurtful when it tries to sell Apple’s extended warranty plans with Apple Care Protection Plan (299 Euros for a Macbook Air). Even the most devout proponents of Apple recognized this deficiency.

Apple is a bunker, and it is in many ways:

From the point of view of Apple software is a model of seamless secrecy keeps tight control over what programs can and should run on their devices and what should not. To maintain secure borders has taken steps such as not to allow the use of Flash on many devices, tightly control your app store or contents, or not installed in its many ports USB devices by which you can enter any program or content not controlled by Apple.

Apple is an informational bunker deploying an intensive strategy of disinformation to cause anxiety to his followers. The leaks, speculations and prototypes cases «lost» become the talk of media and fans until they reach the messianic counted and official presentations.

It is a bunker, also, in his conception of hardware skipping all industry standards: Attempting to access the guts of your i-you-either to change the batteries: the task borders on the impossible and of course violates the conditions of appliance guarantee, invalidating.

The catalog of games available for Mac computers is laughable: 27, no more no less, today at the Apple Store. And this is perfectly normal (and apply other types of software): Why invest in the portability of my games to Apple when only 5% of computer users use a Mac? However, if yours playing on the iphone or ipad, ie casual games, maybe Apple products are good enough for you.

If I lived in a merciless war against regarding Apple products has been in the web design. Advocated irreconcilable fronts, one, for the excellence of Macs as computers to design web pages, and the other for their tremendous deficiencies.

From my point of view the issue is very simple: Macs can be as effective design tools as any PC (processing power, graphics power, …), the problem that arises is this. The problem is that Macs do a different interpretation to the PCs that make concepts like typography and color. Mac World is in the different (perhaps more beautiful) things are therefore provided by the display substantially different Macs that have 95% of the users of a web page from their PCs If someone fills the mouth to speak of «user centered design», start with the basics …

Successful sales figures Apple has a cost: the deplorable working conditions in Chinese factories that produce some of the components of their machines. Many studies in this regard and efforts Cupertino company who claims to be made against this exploitative situation appear neither convincing nor effective. Not at least for those workers in Foxconn factories provider (Apple) that is to sign no-suicide clause in the company.

Apple’s subsidiary in Spain declared in 2010 a gross profit of about 400 million euros and should have paid the Iberian Treasury an amount exceeding 100 million euros. However, since the Spanish subsidiary only legally enter a 1% commission on sales, enough to cover the expenses of its staff in Spain, at the end of its profit before tax is only 5.8 million and paid in corporation tax is only 2 million. Summing up: Apple allowed to enter the public treasury about 100 million, that’s nothing.

Greenpeace offers a study in which periodic rate to large corporations based on their level of commitment to environmental policies. Apple has gone directly to the latest editions of these studies and the reason is more than simple: the company has refused to provide the data needed to Greenpeace evaluation. Thus, at a stroke and no answer, the apple has gone to the dark side of gardening but significant offering samples of their commitment to the environment.

With the ipod, iphone and ipad Apple revolutionized the market and rose on top of the «coolismo» but there are signs that this may change and indeed is changing: at Christmas 2012, the Samsung Galaxy 2 took a bath in previously untouchable iphone sales in the segment of smartphones. It was slimmer, lighter. Was simply more «cool». The latest presentation of Apple disappointed and sundry for his conservative approach and continuity, could the passing away of the omniscient guru manzanita, Steve Jobs, I point to the final decline of the «cool factor» of Apple.

Source: http://www.netteo.es/9 reasons why you should not buy Apple

People would feel upset if he saw where their iPhone comes

20140127-084438.jpg

A worker at the Foxconn plant in Shenzhen (China). -BLOOMBERG

Apple announces record profits while The New York Times reveals the unsanitary conditions of its Chinese factories

Archive of 2012
 

A worker at the Foxconn plant in Shenzhen (China). -BLOOMBERG
Examine your smartphone, your tablet or your laptop and check into housing, in small letters, you can read «Assembled in China». If the answer is yes, it is very likely that your device has been forged in the bowels of Foxconn, the largest supplier of consumer electronics and occupationally sinister place.

An extensive report published yesterday by the New York Times back on the spotlight on a tragedy that jumped all international forums two years ago: the Taiwanese company Foxconn, which employs 1.2 million people in China alone, fails flagrantly labor laws and even assaults the dignity of their workers, for the sole purpose of producing electronic devices as quickly and cheaply as possible. Companies like Apple, Amazon, Dell, Hewlett-Packard, Nintendo, Nokia and Samsung benefit from this situation.

Workers fall into depression, suffer serious injury or suicide

Apple well knows, who this week announced a record profit: 13.060 million just in the last quarter of 2011, thanks to the sale of 37 million iPhones (especially 4G) and 15.4 million iPads. While the Californian firm ranks as one of the largest market capitalization in the world, manufacturers of that miracle grimy live in overcrowded homes and work more than 60 hours weekly limit that marks how the Code of Conduct for Suppliers of Apple. The most unfortunate workers suffer humiliating punishments fall into depressions, seriously injured or simply commit suicide.

«We’re trying to make things better, but many people feel really upset if he saw where their iPhone comes,» one former Apple executive to the Daily News. Despite complaints, little has changed in Foxconn. At most, an increase in wages, which to spate of suicides in 2010 stood at 100 euros (200 euros working 12 hours a day).

Last year, Foxconn conducted 229 audits. There were slight improvements in some areas, but has concluded that more than half of employees exceeds 60 hours per week and work more than six days a week. Episodes of discrimination, lack of safety measures, unpaid overtime and other labor violations were the norm. As a result, four employees were killed and 77 wounded in explosions within their facilities.

Foxconn is the world’s largest supplier of electronic equipment
One of the dead was Lai Xiaodong, in charge of the section where the covers are polished aluminum plant in Chengdu, southwest of the country. Although Sacom, a group of Hong Kong against corporate wrongdoing, Apple warned the deplorable state of ventilation on and reminded him of the risk of accident due to aluminum dust, the signature apple chose to ignore. Only two weeks later, in May last year, a tremendous explosion killed Lai and three companions and wounded 18 more.

Ignoring the problem
«If you see the same pattern of problems, year after year, that means the company’s ignoring the issue rather than trying to fix it,» complains another former executive of Apple. In fact, the immaculate code of conduct of the company is constantly breached in Foxconn, although Apple notes that if «a supplier refuses to change,» he breaks up with him. Something that Apple seems not arise in the case of the senior partner in the production of its iPhone and iPad, key to meet the huge global demand for these devices and continue increasing their own profit tool. According to reports a former executive of the Taiwanese company, «as the contract is signed and Foxconn becomes an Apple supplier, is not paying any attention again.»

137 employees were injured by a toxic chemical handling

Besides tolerate own working conditions of the nineteenth century, many independent reports have reported total neglect by the Apple environment. The Institute of Public and Environmental Affairs in Beijing in September published a lengthy report accusing all of Apple’s suppliers in China of dumping contaminated waste and heavy metals in the communities surrounding its production, creating a serious threat to public health. The next day, a spokesman for the firm said that Apple was committed «to meeting the highest standards and social responsibility in their supply chain.»

Also last year, the Cupertino company admitted that 137 employees of a factory in the city of Suzhou were seriously injured due to the handling of a toxic chemical used to make ultra-thin glass screens of the iPhone. Another case is that of the section of Chengdu polish Cases where the deadly explosion occurred. Lack of ventilation during months affected thousands of workers by aluminum dust, well recognized toxic. Another giant who supplies Apple, Wintek, suffered a strike in January 2010 because more than one hundred employees lived so exposed continuously to hexane, a neurotoxic hydrocarbon, also by failures in ventilation systems.

Ma Jun, director of the Institute of Public and Environmental Affairs, said after submitting the report that Apple is far less proactive in investigations other giants. And indeed, although Apple says it is at the forefront, The New York Times quoted an employee of the BSR consultant ensures that Apple is at the bottom of multinationals in terms of pressure on their suppliers, despite the constant » recommendations «of labor unions and environmental groups.

Source: http://www.publico.es/418911/la-gente-se-sentiria-molesta-si-viera-de-donde-viene-su-iphone

Monsanto spends organic products: Redemption or marketing strategy?

20140127-082609.jpg

Monsanto is introducing new strains of food crops, invented by that company and endowed by their Creator with features and much higher than those of traditional agricultural properties.

All about this topic

Monsanto agrees to U.S.
U.S. Endorses the right to patent GMO Monsanto
Monsanto GM aims to grow marijuana in Uruguay
Paran building a Monsanto plant in Argentina
READ MORE »
A transgenic (genetically modified organism or GMO) is grafted genes of one species into another. The man has been doing to create hybrid grafts same species (plants with plants, for example) for years, seeking better food.

But the difference with GM is that these transgenic organisms are made across genetically distinct species. That is, normal cross fruit with other fruits or vegetables with other vegetables, but no collard with mosquito, for example, because from the point of view of natural law is simply unfeasible.
Healthy? ‘Supervegetales’?

Monsanto has created more sweet and crisp lettuce, peppers miniature concentrated flavor and properties, sweetest fruit or broccoli and tomatoes with a lot of antioxidants three times normal levels.
 
«Grocery stores are looking for new products to their shelves, to have something different,» says Kenny Avery, vice president of Monsanto. «And consumers looking for the same,» he adds.
  
Although GMOs have to be labeled as such to inform consumers in more and more places, these requirements do not apply to the new ‘supervegetales’ Monsanto, because although created in a laboratory, from a technical point of view, these vegetables are almost as natural as they sell at farmers market.
 
However, for the American Robert Lustig, a pediatric endocrinologist and president of the Institute for Responsible Nutrition California, no one really knows if these foods are healthy. Lusting explains that «nobody has ever toyed with the levels of sugar in food as Monsanto is doing.» It is essentially an experiment, «he adds, saying that» the only result that matters is profit. »
Monsanto experiments

 
Monsanto has made impossible as a cross maize genes from a salmon or bacteria, and the results of this trasgenia are new life forms, new proteins and enzymes, the effects on the environment and health are still unknown.
 
The big risk is that by skipping the genetic rules also affect not only biodiversity but the chain of life, as organisms have something called selectivity, so a person accustomed to eating vegetables cow reacts badly if the fed meat, that’s what happened with the disease of «mad cow». Therefore, to feed the animals and humans with GM, there is a serious danger to cancel this selectivity and the body is unable to react when eating something you should not.
 
Given the controversy and rejection Monsanto products are generating globally, the company has decided to return to ancestral practices, crossing vegetables in his laboratory, but applying natural scientific knowledge accumulated by the company for decades to create products’ ‘non-GM.
 
The leitmotif of Monsanto

Here, David Stark, head of the Department of Consumer Protection Monsanto, recently stated that «the objective is to get the consumer trust products and buy.» «That’s what I really want. Which sales to grow,» he adds.

Full text at: http://actualidad.rt.com/actualidad/view/118110-monsanto-productos-organicos-salud

How to install Ubuntu?

20140127-022632.jpg

How to install Ubuntu 13.10 step by step

Today sees the light of a new child of the Ubuntu Linux distribution, Saucy Salamander, reaching 13.10 version which today I will show you how to install it step by step.
Because if you install Ubuntu 13.10 is equal to its previous sibling, 13.04? Ok, visual improvements can be said to be minimal because most of the work is internal increasing their speed as much recognition hardware, plus other hard.

New Features

Smart Scopes Unity makes internet searches
New wallpapers are added to existing
Kernel 3.11 very stable and greater number of hardware using
and many details of the OS that the UI will not live to see but if you feel in your performance
-We downloaded the iso from the Ubuntu site. I recommend using the option to download through a torrent client as it will be much faster while not saturate the central servers of Canonical.

-Generate a cd from iso image or we can create a bootable USB.

-We started doing boot install on the computer and choose the language for our Ubuntu. In this article I am installing virtualbox virtual way but do not worry, the steps are the same on a computer. Press Enter

20140127-022645.jpg

-We choose the second option if we will install once, if we have any questions we can go for the first option there if you can try it and decide whether or not installed. Press Enter

20140127-022826.jpg

The installer welcome us and we can if we want to change the language. We click the Continue button

20140127-022955.jpg

We preparations which recommends installation comply with 3 points, have enough free disk space, be connected to an electrical outlet (if a laptop) and be connected to internet. As a plus it is suggested to download updates and install third party software like MP3 support. We click the Continue button

20140127-023115.jpg

Moment of the partitioning of the team, we can take full or enter More options for us to decide how to partition. If only you used it to Ubuntu and have no experience of leaving the default disk partitioning and LVM brand. If you are also paranoid can enable encryption and safer leaving your facility. We click the Install Now button

20140127-023244.jpg

-Next step, choose the country where we are to change the time zone, if you are hard to find on the map you can type in the text box. We click the Continue button

20140127-023500.jpg

-An important step, choose the keyboard that we are using. By doing so you can try special keys such as ñ. We click the Continue button

20140127-023624.jpg

-We fill the data to create the master account and we click the Continue button

20140127-023843.jpg

-If you are using cloud storage, Canonical invites you to use Ubuntu One, can activate an account, create a new one or just skip this step by clicking the Login button then

20140127-024100.jpg

-Installation begins …

20140127-024207.jpg

-After a while we will have our Saucy Ubuntu Linux installed. We click the Restart Now button

20140127-024500.jpg

-Team reboot giving us time to remove the CD or USB from where we were installing

20140127-024527.jpg

-You ask us reset the password for our account. Press Enter

20140127-024702.jpg

Once inside, we can customize to our liking in the System Settings panel

20140127-024936.jpg

20140127-024944.jpg

20140127-024950.jpg

CrossOver Linux

ARTICLES ABOUT CROSSOVER LINUX
5 enhancements Wine for Linux
Based on Wine, CrossOver Linux is a complete application that can bring you all the best of the Windows environment, but completely integrated to your Desktop GNOME or KDE.

We talked about applications like Word, Excel, PowerPoint, QuickTime, Dreamweaver, Windows Media Player and even iTunes or Adobe Photoshop. In total, more than 7,000 applications that you can install using CrossOver Linux.

CrossOver Linux moves to GNU / Linux some of the most popular Windows applications, including some that do not have version or no alternative for Linux, such as Internet Explorer and plugins, thanks to CrossOver Linux, be compatible with Konqueror, Mozilla, Galeon and Opera.

For example, CrossOver Linux QuickTime is the only solution for Linux, so you can watch movie trailers directly from your browser in GNOME or KDE. CrossOver Linux interface is very intuitive as it puts installing Windows applications at our fingertips, just a click away.

Most important, perhaps, is the integration of all these applications with GNOME KDE, and to be executed exactly as they had done in Windows but with that touch that gives our work environment.

20140126-221459.jpg

http://www.codeweavers.com/compatibility/

Official Website of CrossOver: http://www.codeweavers.com