Sunday, September 4, 2016

Strain Hunters Morocco Expedition by Green House Seed Co

Strain Hunters Morocco Expedition by Green House Seed Co

Sit back and watch Arjan and Franco discover Morocco in the 3rd Strain Hunters documentary: Strain Hunters Morocco Expedition by Green House Seed Company Amsterdam. 

Visit for more...

Sunday, August 7, 2016

DARPA's Cyber Grand Challenge: Early Highlights from the Competition

"Early highlights from the world's first all-machine hacking tournament, DARPA's Cyber Grand Challenge (CGC). 

This computer security competition featured seven High Performance Computers as competitors. CGC took place on Thursday, August 4, 2016."

Learn more at

Friday, August 5, 2016

Simple Survival Model Earthship

"Aimed at being the cheapest and most affordable Earthship possible.A very simple set of details to put together.
Radically Sustainable Buildings. The Most Versatile and Economical building design in the world.

Earthshipscan be built in any part of the world, in any climate and still provideyou with what you need to survive, with 'modern' amenities, if desired.
The Earthship building method has been evolving 

for over 40 years.


We have come to the conclusion that we (the people of the world)
all need...
disaster or not...

1) shelter/comfortable living space
2) water
3) sanitation (sewage treatment/containment)
4) energy
5) food
6) garbage recycling concepts"

Monday, August 1, 2016

Cybercrime in The Deep Web

"All content not indexed by traditional web-based search engines is known as the DeepWeb. Wrongly been associated only with the Onion Routing (TOR), the DeepWeb's ecosystem comprises a number of other anonymous and decentralized networks. The Invisible Internet Project (I2P), FreeNET, and Alternative Domain Names (like Name.Space and OpenNic) are examples of networks leveraged by bad actors to host malware, high-resilient botnets, underground forums and bitcoin-based cashout systems (e.g., for cryptolockers).

We designed and implemented a prototype system called DeWA for the automated collection and analysis of the DeepWeb, with the goal of quickly identifying new threats as soon they appear.

In this talk, we provide concrete examples of how using DeWA to detect, e.g., trading of illicit and counterfeit goods, underground forums, privacy leaks, hidden dropzones, malware hosting and TOR-based botnets."

by Marco Balduzzi & Vincenzo Ciancaglini


Source: Black Hat conference Official

Wednesday, July 27, 2016

Bosnian Pyramids : A Tour of Prehistoric Ravne Tunnels Labyrinth [FULL V...

"Whatnew discoveries exist inside these Bosnian pyramids and tunnels -- two of which are taller than any other pyramids in the world -- can only be

Dr Semir Osmanagic takes us through this ancient,
30,000-year-old tunnel labyrinth
, to engage the many mysteries of this ancient pyramid complex and its labyrinth of tunnels.

This underground tunnel complex could rewrite human history to reflect the
fact of the existence of technologically and spiritually advanced human civilizations in the distant past.

Wednesday, June 22, 2016

Photo reveals even Zuckerberg tapes his Webcam and Microphone for Privacy

Photo reveals even Zuckerberg tapes his Webcam and Microphone for Privacy