Friday, January 29, 2010

Pinnacle Appalachian Trail

bands operating amateur radio amateur

Radio amateurs can operate on very specific radio spectrum bands. The bands are allocated in HF, VHF, UHF and SHF, according to the National Plan ripartizone frequency, or PNRF, prepared by the Ministry of Communications, on the instructions of the International Telecommunication Union (ITU or ITU).






The HF HF include the frequencies from 3 to 30 MHz in this frequency range are the following bands:



160m - 80m

1.8 MHz - 3.5 MHz 40m

- 7 MHz

30m - 20m

10 MHz - 14 MHz

17m - 15m

18 MHz - 21 MHz

12m - 10m

24 MHz - 28 MHz VHF





include the VHF frequencies from 30MHz to 300MHz. The bands for amateur radio operators are:

6m - 50/51 MHz

2m - 144/146 MHz UHF





include The UHF frequencies from 300MHz to 3000MHz (equivalent to 3GHz) The amateur bands in UHF are



70cm - 23cm

432 MHz - 1200 MHz

13cm - 2400 MHzs

Sunday, January 24, 2010

Black Wedding Invitations

Perché il potere ha paura del web

Our goal is to change the world ", a slogan by Eric Schmid, chief executive of Google. The same Schmid that four years ago, at the opening of the search engine in Mandarin, with the local address marked by the suffix. "Cn", he declared: "We are here in China to stay there forever." Now those two statements - to change the world, stay in China - have become irreconcilable. If Google does not accept the rules of Beijing, and the complaint of local authorities, will close its Chinese adventure. The epic battle that has opened between the greatest power of the Internet and the greatest nation on the planet, is set to redefine the next few years the global architecture of the Web, the geopolitical boundaries of freedom of information, and the new concetto di sovranità nello spazio online.

Il precipitare degli eventi ha colto tutti di sorpresa, almeno in Occidente. Questo copione non è stato scritto né a Mountain View, il quartier generale di Google nella Silicon Valley californiana, né tanto meno a Washington nelle sedi del potere politico. Negli scenari più pessimisti elaborati dal Pentagono, quando due anni fa l'Esercito Popolare di Liberazione centrò in pieno un proprio satellite in un test di guerre stellari, fu detto che la conquista dello spazio sarebbe stata la prossima sfida tra l'America e la Cina. Nessuno aveva messo in conto quello che sta accadendo da due settimane: l'improvviso gelo tra i soci del G2 per il controllo del cyber-spazio.

Eppure quando Google lanciò la sua versione in mandarino nel 2006, la censura di Stato esisteva già. Come Microsoft, come Yahoo, come Rupert Murdoch, anche il colosso di Mountain View accettò il patto con il diavolo: collaborare con il regime facendo propri i suoi tabù, interiorizzarne i limiti alla libertà di espressione, autocensurarsi con dei filtri di software automatici approvati dalle autorità locali. Sembrava logico. Google si comportava come tante altre multinazionali "normali", separava le regole universali del business capitalistico dal contesto politico locale. Come un qualsiasi fabbricante di auto o di jeans, Schmid pensò di poter chiudere gli occhi sugli abusi contro i diritti umani, e partire alla conquista del più vasto world market. Indeed, in 2006 the question of conscience for the Americans seemed to be resolved once and for all the optimistic words of Bill Gates: "For those limitations might make the work of Microsoft, the advent of the Internet in Chinese society introduces a volume of information unprecedented. China will still be better than before, thanks to us. " At the top of Google, to be fair, not everyone thinks so. The conditions of the landing in China had strong doubts of one of the two co-founders, Sergey Brin. For his personal biography - born in the Soviet Union, immigrated to America with his parents as a child - none had sensed an incompatibility between the "nature" deep business Google and the People's Republic.

The series of conflicts between authoritarian regimes and free online has lots of precedents, from Iran to Burma. But the question is completely different when the stakes are a market of 330 million users, now the most populous. The statement condemns the Chinese government and Google responds to criticism of Hillary Clinton, makes explicit reference to the "rules of the Chinese network." No one imagines that there might be an "Internet Iran." There are only the barriers that stand in the way Tehran for local access to the network: that is one, undivided and whole. But the idea that China can organize itself as a cyber-universe independent from us, it is equally unthinkable?
In the West we take for granted for years that the Earth's surface is thoroughly explored by GoogleMap. I remember the pleasure with which I saw when I lived in San Francisco, from satellite photos that could be seen not only my home but also the plate of my car. As soon as I moved to Beijing in 2004 found that entire areas instead of the Chinese capital were blacked out, starting from the district of Zhongnanhai, where the residence of the communist nomenklatura. What appears to us natural, or inevitable, that the land mapping is done by a private American, is not acceptable to Beijing. E 'intrusion into the virtual sovereignty: a value for which the States go to war for centuries. And because of Beijing on the border that separates a giant private by the government in Washington as Google, is rather vague.

Ken Auletta, author of the essay "Googled" (the past tense of the verb "google"), notes that "few other technologies - the Gutenberg press, the telephone - have had a social revolutionary as this search engine, which has shocked our way of producing information, select it, eat it. " But the Internet was born in America, the whole organization of the world wide web has made an impression in the U.S.. Bring the unmistakable signs of a "system" rules and values \u200b\u200bborn in the U.S., by extension western, not necessarily perceived as universal in Beijing. Where we speak of "open architecture", altri capiscono "egemonia americana".

La Grande Muraglia di Fuoco, è il nome che i dissidenti hanno affibbiato alla censura online della Repubblica Popolare. E' il più moderno e sofisticato apparato di controllo dell'informazione, con almeno 15.000 tecnici informatici in servizio permanente. Eppure il governo di Pechino ha avuto bisogno fino a ieri di appoggiarsi sul "collaborazionismo" di Google, Yahoo, Microsoft. I dissidenti, o anche i giovani cinesi più curiosi e dotati per l'informatica, hanno appreso ad aggirare la Grande Muraglia. Usano metodi simili a quelli degli hacker: ad esempio per dissimularsi attraverso domicili online all'estero. Sono esattamente i metodi mutuati dai cyber-pirati al servizio del governo, nelle Google reported incursions by January 12. They have violated the privacy of Gmail e-mail of many human rights activists, as well as a large law firm in Los Angeles engaged in a lawsuit against China's state companies for copyright infringements. And they have defiled the email of 34 high-tech companies in Silicon Valley, a major episode of industrial espionage that casts a shadow on the safety of the whole Google empire.

The expert data-Holman Jenkins recalls an earlier offensive in this little known. "In the early nineties there was an escalation of incidents of piracy in the South China Sea shipping. Hong Kong, which was still a British colony, collected evidence that the pirates were in fact serving the Chinese armed forces. It was a way to reclaim the sovereignty of Beijing on routes of strategic communication. "Cyber-pirates that China has unleashed on Google, sparking a conflict that led to the intervention until the Obama Administration, they would like playing a game. How the pirate Francis Drake in the service of Her Majesty Queen Elizabeth I against the English empire. Up for grabs this time there is a virtual space, even more strategic maritime routes. China aims very high, if he felt the need to intimidate Google to question the privacy of its industrial clients: all now potentially bugged. The leaders of the People's Republic can imagine a third of the Treaty of Yalta millennium, with which America takes notice of their sovereignty over a part of the Internet. If you pass their plan, the visionary speech by Hillary Clinton who has praised the Internet as "the great Equalizer," applies only to the side of the Great Wall.

Federico Rampini
www.repubblica.it

Saturday, January 23, 2010

Fish Eye Lense For Minolta X-700

COURAGE


"E 'through the eyes of the world that you can solve the contradictions, through attention and adherence, the feeling called into question even for events far away.
And not with the isolation, neglect, ignorance with each other. "
ROBERTO SAVIANO

Friday, January 15, 2010

What Gloves Does Transporter Wear

Site Friend

report the psychic and fortune-telling site http://www.cartomanziachiromanzia.it/

Thursday, January 14, 2010

Pinkberry Yogurt At Grocer

Peer to peer, nuova offensiva nel mirino Telecom e utenti

USERS peer to peer sites and the Italians are the center of a legal dispute that marked a turning point in the war on online piracy. The FAPAV (audio visual anti-piracy Federation) asked the Civil Court of Rome to impose some extraordinary measures to Telecom Italy: first, to compel the telephone company to report to judicial authorities in your network who is guilty of piracy; secondo, impedire l'accesso ad alcuni notissimi siti collegati, anche indirettamente, al peer to peer; terzo, battersi, d'ora in avanti, in prima linea contro il fenomeno.

Se dovesser accettare le richieste di Fapav, quindi, Telecom dovrebbe scoprire quali utenti scambiano file pirata e fare pressioni perché smettano. Nel ricorso d'urgenza presentato da Fapav si legge anche un'accusa alla compagnia: non aver fatto abbastanza finora per dissuadere i propri utenti peer to peer, perché a Fapav risultano "centinaia di migliaia di utenti Telecom" che hanno scaricato film recenti. La Federazione ha addirittura fatto una classifica dei film più scaricati illegalmente: in testa Baaria (600 mila file scambiati), seguito da Il Big Dreams (300 thousand), Love 14 (200 thousand), Bruno (180 thousand) Whatever Works (178 000), double time (100 000), Purple Sea (60 thousand).

fact is that Telecom is opposing the demand. Not only that: in his own defense before the Court, in turn accused of having monitored FAPAV user connections Telecom, violating their privacy. Only by this means the Federation could have obtained the data on the most downloaded movies. According to the operator, it is a story similar to that of
Peppermint (German record company that had bought up a peer to peer user data Italians). A case that had ended in 2007 with the record of conviction, the Court of Rome and by of the Privacy. We do not know how FAPAV has monitored the peer to peer traffic, but perhaps has used appropriate software (Peppermint used to Logistep).

The hearing date has not been set yet (in contrast to that reported by other news organizations), because the last time you changed the court (now Antonella Izzo). Because this is an emergency procedure, however, should only be a matter of a few days.

possible sentence would change much of the surfing habits of Italians. First, why are millions of people our own peer to peer (8 million just to emulate, according to Nielsen). Second, perché i siti che Fapav vuole oscurare solo molto popolari: c'è The Pirate Bay e poi un gran numero di indirizzi italiani: Italianshare, ItalianSubs, Vedogratis, Youandus, Italianstreaming, 1337x, Dduniverse, Angelmule, Italiafilm, Ilcorsaronero. Alcuni di questi permettono di vedere direttamente film pirata, altri solo di trovarli (a mo' di motore di ricerca). Ma c'è anche il caso di ItalianSubs, che si limita a fornire sottotitoli in italiano a film inglesi che l'utente si deve procurare altrove. Se scaricare e condividere un file pirata è illegale, non è così scontato che lo siano anche tutti quei siti. Solo The Pirate Bay è stato condannato per aver favorito la pirateria: da un tribunale svedese e poi di recente also by the Italian Supreme Court, alleging that it is correct to prevent access to sites that facilitate downloading pirated files. The ruling of the Supreme Court may open the way to a campaign of complaints against sites linked to peer to peer. FAPAV of this may just be the first in a long series.

Alessandra Longo
www.repubblica.it

Wednesday, January 13, 2010

Manic Panic African American

Facebook trascina in tribunale chi spinge ai "suicidi" virtuali

Some prefer to give us a clean cut. Others are over, but then thought better. Still others leave it to software to perform for them the last click. It is the varied world of suicide, or aspiring, virtual.

for fun or because the dependence on social networks is too strong, because it is the sfufi its data-body and is better rifarsene a new one, or simply because it's nice to spend time with people in the flesh, more and more users that delete profiles, avatars, feeds, and tracks in the dense network of personal relationships of Web 2.0.

that the phenomenon has reached danger levels is evident from the fact that the defection is alongside a staff exodus increasingly organized, premeditated, collectively. Two Seppukoo services and Web 2.0 Suicide Machine will allow their users to unplug from social networks like Facebook, MySpace, LinkedIn and Twitter through an automated procedure.

both Launched in December, the two software are finished by few days under the fire of the legal team on Facebook, which denies them the violation of the Declaration of Rights and Responsibilities of Facebook users. Not only that, while lawyers for the parties are engaged in preliminary skirmishes of what could be a long legal battle, Facebook has blocked access to its network from the two sites, making them ineffective.

Created by Les Liens Invisibles (The Invisible Connections), a group of Italian artists consists of net Pestelli Clement and Jonathan Quintin, Seppukoo allows users to delete their own profile by following a procedure "ritualized" (Seppuku is ritual suicide samurai Japanese). To do so the user Facebook inserisce il proprio nome utente e password su Seppukoo.com, compone una pagina Web con cui essere ricordato/a, e scrive un biglietto d'addio. Il servizio disattiva l'account, spedisce le sue ultime parole al suo intero network di amici, e gli attribuisce un punteggio. Quanti più amici dell'utente suicidato decidono di imitare il suo gesto, tanto più l'utente ottiene un punteggio alto su Seppukoo.com - un meccanismo volto a incentivare il carattere virale dell'azione. Nel giro di poche settimane infatti, e prima dello stop di Facebook, Seppukoo avrebbe disconnesso circa ventimila utenti. Effettuata la rimozione, il servizio consentiva comunque agli utenti di riattivare il proprio profilo.


Più radicale l'approccio della Suicide Machine, una piattaforma lanciata da poche settimane da Moddr Lab, laboratorio multimediale di stanza a Rotterdam, coordinato dall'artista austriaco di origini bosniache Goran Savicic. In questo caso, una volta lanciata la Suicide Machine, gli utenti non possono più tornare indietro. Il programma inizia cambiando la password utente (il che significa che diventa impossibile riattivare il proprio account Facebook) e la foto del profilo utente. Poi procede alla rimozione di tutti i suoi amici, dei gruppi cui è iscritto e di tutti i suoi post. Infine, crea una pagina di commemorazione con una foto e poche parole d'addio e, per chi loro richiede, un video-ricordo del processo di cancellazione. Inoltre la Suicide Machine permette agli utenti di disconnettersi anche da Myspace, LinkedIn e Twitter. Ma a differenza di Seppukoo, e probabilmente per il carattere irreversibile dell'azione, la Suicide Machine avrebbe disconnesso finora "solo" 900 utenti, un numero che dopo lo stop di Facebook, arrivato nei primi giorni del 2010, non sembra destinato a salire di molto.

Difficile prevedere quale sarà l'esito della battaglia legale in corso. La principale contestazione che i legali di Facebook muovono ai due servizi è di fare phishing, cioé di utilizzare i dati personali dei suoi utenti e di farlo senza il loro consenso. I gestori dei siti rivendicano invece il diritto degli utenti di disporre come meglio credono dei propri dati personali.

Come dichiara a Repubblica.it Guy McMusker, art director e portavoce immaginario di Les Liens Invisibles, le richieste di Facebook "sono ingiustificate e nascondono la volontà di mantenere una posizione di monopolio nel sistema dei network e, soprattuto, nella conservazione e gestione dei dati dati personali che l'uso di questo sistema consente di ottenere a chi lo gestisce. In realtà - prosegue McMusker - le informazioni che risiedono sul sito seppukoo.com ci sono state comunicate volontariamente e coscientemente dagli iscritti a Facebook che ne sono gli unici titolari e che devono poter disporre di queste come vogliono; devono dunque avere la facoltà di poterle condividere con chiunque, anche esterno a Facebook e senza le imposizioni di Facebook."

www.repubblica.it

Can You Bring Womans Razor On A Plane






The Amateur Amateur, OM is an investigator in the jargon of the radio. Since we enabled the use of equipment without certification by a third party, the radio amateur to operate must give proof of its competence to the Ministry of Communications by passing a written examination to obtain a license. The Amateur Radio can now design, edit or build their own equipment within the specifications assigned by the Ministry.

obtained the necessary certification by passing the exams, you can get by the Ministry for permission to transmit (once called "license" now "general authorization"). The station in this way, you are authorized to install and use worldwide is identified uniquely by a ham radio callsign. The name is assigned by the Ministry of Communications and identifies the station and its owner.


The establishment and operation of amateur station


are allowed to those who have: 1
citizenship one of the countries of the European Union or European Economic Area, to countries with which reciprocity agreements have lapsed, subject to the provisions of Article 2, paragraph 2, of Legislative Decree 25 luglio1998, 286, or reside in Italy
2 has aged sixteen
3 is in possession of the relevant license
4 has not been convicted of crimes not culpable deprivation than two years and has not been subjected to security measures and prevention while they last the effects of the measures and provided that no action sentence rehabilitation

Exams

Following the entry into force of Decree 21 July 2005 which adopted the recommendation CEPT TR 61-02 licenses to operate a radio station of class A and B (referred to in Annex 26 to the Legislative Decree of 1 August 2003, n. 259, containing the "Electronic Communications Code") have been merged in the one Class A license

for obtaining the license class A (ordinary ex) should be supported by a written test on theory multiple choice quizzes


amateur radio activities amateur radio activities is the exchange, carried out in clear language, or with the ' use of internationally accepted codes, messages of a technical nature, with other amateur radio operators who have obtained the relevant permission and are interested in the general technique and experiments radio on a personal basis and without any interest of an economic nature. Outside of the amateur radio site of the installation can be done with even half a mobile handheld device, except air


PHONETIC ALPHABET


A = Alfa



B = Bravo C = Charlie D = Delta





E = Echo F = Foxtrot G = Golf





H = Hotel I = India J = Juliet



K = Kilo

L = Lima M = Mike



N = November O = Oscar





P = Papa Q = Quebec R = Romeo





S = Sierra T = Tango U = Uniform



V = Victor W = Whiskey



X = X-Ray

Y = Yankee Z = Zulu




=============================== ======================================

Code

Answer Question
==== ================================================== =============== What
'intelligibility Intelligibility of


QRK
of my signal?
your signals and '

------------------------------------------- --------------------------

QRM Are you troubled? I am troubled

---------------------------------------------- ----------------------- You are disturbed by noise

are disturbed by noise


atmospheric QRN?
atmospheric

---------------------------------------------- ----------------------- I have to increase the power

Increase the power of

QRO
issue?
emission

---------------------------------------------- ----------------------- Shall I decrease power

diminish the power of

QRP
transmission?
transmission

---------------------------------------------- ----------------------- I have to send more
'Send more
'

QRS
slowly?
slowly

---------------------------------------------- ----------------------


QRT Shall I stop transmitting
?
Cease transmission

-------------------------------------------- -------------------------

QRZ Who is calling? You are called by


-------------------------------------------- -------------------------
QRV
Are you ready? I'm ready


--------------------------------------------- ------------------------
The strength of my signals
The strength of your


QSB and 'variable?
signals varies

--------------------------------------------- ------------------------
Can you give me a charge of receiving


QSL? Do
acknowledgment

------------------------------------------- --------------------------
can communicate
I can communicate directly with


QSO?
directly

--------------------------------------------- ------------------------
Shall I change frequency
Send up another

QSY
transmission?
frequency ... kHz (or MHz)

------------------------------------------- --------------------------
will call you back 'to


QRX When I call back?
hours ....

------------------------------------------------ ---------------------
Which 'your
My position' ....



position in latitude and latitude and ... of


QTH longitude?
longitude




OPERATIONAL ABBREVIATIONS USED IN THE AMATEUR SERVICE
=================================== ================================== AR End of transmission





======================================== =============================
Signal used to interrupt a transmission in


act BK (break)

--- -------------------------------------------------- ----------------

CQ Calling all stations

------------------------ ---------------------------------------------

CW Continuous Wave - Telegraphy

---------------------------------------------- -----------------------
K
Invitation to provide

------------------------------------------------- --------------------
MSG messages


------------------------ ---------------------------------------------

PSE Please

------------------------------------------------ ---------------------
RTD
intelligibility, signal strength, tone

----------------- -------------------------------------------------- - R

Received

------------------------------------------ ---------------------------
Receiver RX


----------------- -------------------------------------------------- -
SIG Signal


------------------------------------------ ---------------------------
TX Transmitter


-------------------------------------------- -------------------------
UR
your

How To Get The Dog On Poptropica

Google sotto attacco in Cina basta censura, ma rischia stop

Google threatens to leave China. The dramatic announcement came yesterday from the headquarters in Mountain View, California in Silicon Valley, after an escalation of tension between the Internet giant and the Beijing regime. The top of Google have revealed that their search engine - in the version in Mandarin - has been the subject of increasingly frequent attacks by Chinese hackers who are suspected of being at the service of state censorship.

most serious attacks, which led to the announcement yesterday, have failed to e-mail of some human rights activists, as well as large Western companies. In a group blog, the Google executives have yesterday evening revealed to have "discovered a highly sophisticated and targeted attack against our infrastructure, which originated from China." Further internal investigations have confirmed that the main target were "G-mail accounts of several civil rights activists."

Google has not explicitly accused the Chinese government to be the director of this violation. However, the reaction of the Californian group leaves no doubt. In fact, as a response to this unprecedented attack, Google has decided that it will leak more information on its Chinese site. Stop that is the policy of cooperation with the authorities of the PRC in the past had been the subject of controversy in the United States according to the NGO that defend human rights in fact Google would have practiced a "collaboration" with the censorship regime, just to have access to the largest online market in the world (as well as Yahoo who came to patches of denunciation to the police the personal email of a Chinese dissident) .


The beginning of collusion with the Chinese government was in 2006: in that year that Google has opened the Mandarin version of its search engine, and then a site that ends with the suffix. "Cn". But now that pact with the regime is in crisis. If Google stops to filter its search engine in Mandarin, in all likelihood the Chinese government block access and could permanently darken. In the past Beijing has not hesitated to remove the visibility of Google, or sites like Wikipedia, if not agreed to "purge" spontaneously. Among the demands of the Chinese Ministry of Information, for example, there is a cancellation of the sites that defend the rights of Tibet and Xinjiang. To be authorized to operate in the Chinese market, Google has now installed the software that automatically prevents access to sites or words that are taboo for the regime's propaganda. A heavy price to pay, in exchange for the possibility of contact with 300 million Internet users: the online audience that China has now overtaken the United States.

front of the last provocation, Google appears to have estimated that the price d'immagine da pagare verso l'opinione pubblica americana rischia di essere troppo elevato. Il motto dei fondatori dell'azienda di Mountain Valley, dopotutto, è "don't be evil", non essere malvagi.

Federico Rampini
www.repubblica.it