Monday, March 20, 2017

Rh- Negative Blood and Antediluvian Civilizations (Robert Sepehr)


Top 20 best chess engine from 2017

CCRL 40/40
Downloads and Statistics
March 18, 2017
Testing summary:
Total: 698'425 games
played by 1'846 programs
96217 CPU days (X2 4600+)

White wins: 240'830 (34.5%)
Black wins: 178'969 (25.6%)
Draws: 278'626 (39.9%)
White score: 54.4%

Rating list

CCRL 40/40 Rating List — All engines (best versions only) (Quote)

Ponder off, General book (up to 12 moves), 3-4-5 piece EGTB
Time control: Equivalent to 40 moves in 40 minutes on Athlon 64 X2 4600+ (2.4 GHz), about 15 minutes on a modern Intel CPU.
Computed on March 18, 2017 with Bayeselo based on 698'425 games
Color legend: CommercialFreeOpen sourcePrivate.
Bold font - tested with 200 games or more. Normal font - less than 200 games.
RankNameRatingScoreAverage
Opponent
DrawsGamesLOS
Elo+
1Stockfish 8 64-bit 4CPU3390+17−1769.4%−124.757.1%1015 
61.9%
2Houdini 5.01 64-bit 4CPU3386+20−2067.6%−112.357.6%786
69.2%
3Komodo 10.3 64-bit 4CPU3380+21−2167.3%−115.552.4%698
100.0%
4Deep Shredder 13 64-bit 4CPU3287+21−2155.8%−33.664.8%619
82.8%
5Fire 5 64-bit 4CPU3273+23−2352.3%−13.464.9%524
87.5%
6Fizbo 1.9 64-bit 4CPU3253+26−2651.1%−4.154.1%416
71.7%
7Andscacs 0.89 64-bit 4CPU3243+25−2550.1%+1.858.0%450
97.7%
8Chiron 4 64-bit 4CPU3207+26−2642.8%+45.555.3%416
77.8%
9Gull 3 64-bit 4CPU3196+11−1145.9%+24.157.5%2564
87.8%
10Equinox 3.20 64-bit 4CPU3186+12−1242.7%+46.960.6%1927
73.3%
11Booot 6.1 64-bit 4CPU3179+21−2139.5%+64.060.9%632
70.5%
12Fritz 15 64-bit 4CPU3172+14−1441.1%+57.357.4%1591
62.8%
13Critter 1.6a 64-bit 4CPU3169+8−847.5%+16.656.0%4727
54.9%
14Hannibal 1.7 64-bit 4CPU3168+18−1840.0%+61.555.8%942
67.1%
15NirvanaChess 2.3 64-bit 4CPU3162+20−2039.7%+67.657.1%730
60.3%
16Bouquet 1.8 64-bit 4CPU3159+11−1143.6%+41.356.6%2395
63.6%
17Rybka 4 64-bit 4CPU3156+10−1048.8%+7.250.8%3130
75.0%
18Protector 1.9.0 64-bit 4CPU3150+17−1744.5%+37.155.2%1074
61.4%
19Alfil 15.7 64-bit 4CPU3146+18−1840.7%+62.255.5%878
57.7%
20Texel 1.06 64-bit 4CPU3143+21−2144.7%+34.553.6%683
78.4%

Sunday, March 19, 2017

Picture of the Month


TRUMP WAS RIGHT – Intel Confirms ISIS Hid Among Refugee Hordes Flooding Europe

TRUMP WAS RIGHT – Intel Confirms ISIS Hid Among Refugee Hordes Flooding Europe


Donald Trump has said all along that islamic refugees could be a trojan horse for ISIS – now he has been proven right with the latest incident in Germany.
The Federalist Reports

In Germany last week, the vice president of Bavaria’s intelligence-gathering agency, Manfred Hauser, announced ISIS “hit squads” had entered Europe with the flood of migrants that came across the borders over the last year and a half. According to Hauser, there are hundreds of reports that these kinds of terrorist cells have infiltrated European countries, and “irrefutable evidence that there is an IS command structure in place” that will “likely” launch a coordinated attack on Germany.

It appears ISIS took advantage of Europe’s generosity by concealing its fighters in the mass of people desperately seeking a new home. If this comes as a surprise, you haven’t been paying attention.
When the migrant crisis began in 2015, German Chancellor Angela Merkel was quick to inform all would-be refugees that Europe would take in anyone who crossed its borders. She famously said that anyone who could reach Germany would be welcome to stay. Merkel’s proclamation and the ensuing million-and-a-half migrants who came knocking on Europe’s door raised concerns that terrorists based in Syria and Iraq, or elsewhere, would blend in with the crush of refugees and wreak havoc in countries that ISIS considers apostate.

The Politically Correct Insisted This Wouldn’t Happen

National Review’s Ian Tuttle wrote in September 2015, “Given the sheer magnitude of the migration, it is a virtual certainty that terrorist organizations are taking advantage of the crisis to insinuate themselves into Europe.” Months later, after the Bataclan nightclub massacre in November, Hungarian Prime Minister Viktor Orbán, who had erected a razor-wire fence on Hungary’s Serbian border, said migrants “present a security threat because we don’t know who they are. If you allow thousands or millions of unidentified persons into your house, the risk of…terrorism will significantly increase.” Frontex, which manages European Union borders, warned of this possibility in early 2015.

But these concerns met censure from European and American politicians and media elites for being xenophobic and bigoted against refugees. The Huffington Post listed terrorists embedded with refugees among their top five myths about the migrant crisis in September 2015. Another myth-buster at the Washington Post came to a similar conclusion in response to Tuttle: “Yes, in theory, terrorists could exploit the same porous borders exposed by human smugglers. But in practice, they are unlikely to use migration routes to infiltrate Europe — and checks are in place to catch them if they try.”

The Southern Poverty Law center reacted to the Paris attack with shock and horror that anyone would connect refugees to fears of Islamic terrorism, calling the mere mention of it Islamaphobic. Of course, no one was accusing refugees themselves of being terrorists. They were simply pointing out that it would be difficult to vet every migrant coming in, and therefore bad actors could easily slip in under the guise of being a refugee.

The deputy chairman of a parliamentary committee on immigration and security in Italy, Giorgio Brandolin, said last year, “Terror groups spend money on training militants; it makes no sense for them to send them over on death boats, risking them drowning on the way.” But Brandolin made the mistake of thinking that ISIS, which sends its men and women on suicide bombings, cares about putting its soldiers in harm’s way.

He further assumed he understood ISIS’ strategy. But the reality is that he, like many others, lacked the imagination to see what ISIS was capable of. They thought that because there was then no proof that terrorists were posing as refugees, it couldn’t have been happening and would never occur in the future. Of course, this is exactly what ISIS was doing.

Political Correctness Contributes to Mass Murder

Now, in the face of the recent attacks in Germany, Interior Minister Thomas de Maizière has proposed a number of new security measures, including expedited deportations for migrants who are denied asylum or pose a threat to public safety, and increased scrutiny for asylum applicants specifically targeted at detecting Islamist radicals. But will these measures be sufficient, or has Europe learned the lessons of its own folly too late?

What has happened with Europe’s migrant crisis is evidence of an ongoing pathology in the West, especially with regard to Islam. Anything perceived as offensive or xenophobic is off-limits for discussion, even if it affects national security. Looking clearly at issues of public safety, immigration, integration, and the threat of terrorist organizations takes second chair to keeping up the pretense of inclusivity that multiculturalism mandates. Political leaders and the media get to feel smugly compassionate and morally superior while accusing everyone of bigotry who express concern about mass immigration.

This pathology manifests itself when authorities and media insist an attacker doesn’t have any affiliation with Islamism or ISIS before much is known about the individual, often in face of contrary declarations from the attacker himself. This happened with Fort Hood shooter Nidal Hassan, the San Bernardino killers, the University of California-Merced student, the Orlando shooter, the so-called lone wolf attackers in France and Germany, and countless others.

Many world leaders and members of the media would rather swallow their own tongue than state the obvious. They’d much prefer to acknowledge a risk in retrospect than warn of an impending threat. But as I’ve argued before, Europe’s leaders, and our own, don’t have the luxury of being politically correct about national security. Their sworn duty is to look clearly at the world and spot the risks even if it makes them look cold, not to hold our hand and make us feel good about ourselves.

Yet Merkel remains defiant, repeating “We can still do this” in a speech delivered in the wake of the recent terrorist attacks in Germany, two of which were confirmed to be ISIS-related. She won’t back down. But Germany is quietly beginning to acknowledge the threats. So far this year, the country has let in far fewer refugees than in the same period last year, and increased deportations. Merkel’s rhetoric notwithstanding, her government sees the threat and acknowledges this new population is overwhelming their country. Merkel just won’t say so out loud because she wants to retain the role of compassionate leader.

So here we are. Exactly where so many said we’d be, facing unpredictable attacks by men who traveled to Europe pretending to be the most vulnerable people in the world. Instead they’re the most threatening, attacking indiscriminately and infusing fear into the continent.



Support the Trump Movement and help us fight Liberal Media Bias. Please LIKE and SHARE this story on Facebook or Twitter.

http://truthfeed.com/trump-was-right-intel-confirms-isis-hid-among-refugee-hordes-flooding-europe/17195/

Do you know what happened to Troya from Greek

something like this killed all people from Troya

What is PUP detection criteria: one example is here

Why Malwarebytes recognizes PC Pitstop as Potentially Unwanted

Posted December 22, 2016 by Marcin Kleczynski

At Malwarebytes, we take awesome pride in the way that we're securing clients – not simply from malware – but rather from a developing and troubling danger known as PUPs, or Potentially Unwanted Programs. We as of late fortified our PUP identification criteria because of PUP sellers turning out to be more forceful while in the meantime utilizing more cleaned terrify strategies to push clients into obtaining their items. One organization that we began examining was PC Pitstop. With straightforwardness being critical to us at Malwarebytes, the plan of this blog is to make the certainties open.

PC Pitstop makes a few items including PC Matic, PC Magnum, Optimize, Driver Alert, and Disk MD. Starting at half a month back, we identify these items as PUP.Optional: the initial segment speaking to a Potentially Unwanted Program and the second your optionality, which means we trust it is undesirable by the dominant part of clients but then we need it to be certain that it is your circumspection as a client to expel it.

PC Pitstop set off a few of our PUP criteria, which I've included beneath.

Guaranteeing that registry cleaning is important

A few projects offer to clean or change your PC's registry. In fundamental terms, your Windows registry contains data and settings for projects and equipment introduced on clients working frameworks.

As indicated by Microsoft, registry cleaners are a bit much. Actually, Microsoft itself does not prescribe the utilization of registry cleaners. Items that utilization registry cleaning and advancement as a component to drive deals are viewed as Potentially Unwanted by Malwarebytes.

PC Pitstop's Optimize and PC Matic items utilizes registry cleaning as one of its primary components. They will indicate registry issues, even on a fresh out of the box new PC. It states there are fourteen registry records which "may bring about shameful operation of a few applications." Based on guidelines from Microsoft, we trust this to be a forceful strategy to drive deals.

picture1

Figure 1: PC Pitstop's Optimize indicating issues on a fresh out of the box new machine and provoking clients to "Purchase Now!" with a specific end goal to "settle the issues distinguished."

picture2

Figure 2: PC Matic registry cleaning suggestions.

Asserting that transitory documents are risky

Another of our PUP identification criteria is hailing transitory documents made by the working framework or Internet program as high hazard issues or critical fixes for a non-insightful client. Transitory documents are typical curios of the working framework and program and are not the slightest bit signs of an issue with the PC or an issue that is earnest. These discoveries are typically joined by a red speck or hazard slider.

PC Pitsop's PC Matic indicates impermanent records as earnest issues to the client, even on a shiny new PC.

examine comes about

Figure 3: PC Pitstop's PC Matic indicating brief records, default Operating System settings and circle discontinuity as "issues with your PC" on a fresh out of the plastic new machine and provoking clients to purchase to "Settle All."

Guaranteeing that treats are risky

Program treats are a necessary piece of how programs function. For instance, when you purchase something on the web, the shopping basket is probably determined by program treats. Hailing program treats as an issue that requires prompt consideration is a forceful strategy utilized by numerous Potentially Unwanted Programs.

No working trial

Amid examination of PC Pitstop items, we were incited ordinarily (in the wake of showing the previously mentioned issues!) to purchase the product. There is no working trial and the cost of the item was up to $150. High costs without the capacity to trial the product add to our criteria around Potentially Unwanted Programs.

Noiseless evacuation of fundamental applications

A standout amongst the most stunning practices of PC Matic was the incite to expel important applications, for example, Google Chrome's updater, Java's updater, and the sky is the limit from there. Expelling these segments really puts the machine at hazard as both said are fixing basic vulnerabilities.

Figures 4 and 5: PC Matic prompts to expel essential parts that stay up with the latest.

picture6

Figure 6: PC Matic demonstrating the Google Chrome Media Router module as "Terrible". This module sends as a matter of course with the standard establishment of Google Chrome.

picture7

Figure 7: PC Matic debilitating the Google Update administrations, leaving the machine possibly powerless and outdated.

Noiselessly handicapping the Windows Defragmentation Service

As appeared above in figure 2, PC Matic distinguishes plate discontinuity on a fresh out of the box new PC and prompts the client to buy the item. We have found that amid establishment of PC Matic, one of the primary activities it performs is noiselessly impairing the Windows Defragmentation Service. The issue is that Windows Defragmentation Service is no longer only a defragmenter is to a greater extent a week by week low-level cleanup of the hard drive for things the working framework hurls around. Microsoft exceptionally proposes allowing this to sit unbothered for Windows 8 or more. Indeed, Microsoft says that halting this administration can accomplish more mischief than great.

Once the inherent Windows Defragmentation Service is crippled, PC Matic advances its "SSD Optimization" include that demonstrates the Scheduled Defragmentation benefit as impaired.

picture8

Figure 8: PC Matic impairing the Windows Defragmentation Service

picture9

Figure 9: PC Matic's "SSD Optimization" comprises of impairing the Microsoft defragment benefit which Microsoft prompts against.

Quietly performing other possibly hazardous activities

There are different changes made to the machine running PC Matic fixes that could be possibly perilous, for example, noiselessly including an authoritative client.

picture10

Figure 10: PC Matic noiselessly adding an authoritative client record to the machine.

High hazard security vulnerabilities

On top of the greater part of the practices recorded above, Malwarebytes has found a progression of basic vulnerabilities in PC Pitstop's items that can permit any assailant to take control of your machine. We exhort all PC Pitstop clients to quickly uninstall all PC Pitstop items from their PCs until the defenselessness is settled. We have sent points of interest of the vulnerabilities found to PC Pitstop so they can address them promptly.

We utilize our best judgment and a rundown of criteria we've seen mishandled in the past to figure out if programming ought to be hailed as Potentially Unwanted for our clients. No organization and no product is immaculate, Malwarebytes included. We trust PC Pitstop makes a move to remediate the issues recorded above, and soon thereafter we will quickly quit hailing their items for potential expulsion. We are lowered that our clients confide in us to keep them safe and we will forcefully guard our position against the identification of PC Pitstop's items until that time.

Refresh:

We are eager to report that Malwarebytes is no longer recognizing PC Pitstop's item, PC Matic, as possibly undesirable programming. PC Pitstop has not just quit utilizing alarm strategies against potential clients, they have gone the extent that expelling registry cleaning from their item as a matter of course.

retrieved from
https://blog.malwarebytes.com/puppum/2016/12/why-malwarebytes-detects-pc-pitstop-as-potentially-unwanted/

Judge Jeanine Pirro says a real true about the democratic party