snow white and the huntsman snow white and the huntsman rupaul drag race walking dead comic kratom broncos broncos
Tuesday, December 11, 2012
Phone cos. to relay 911 texts by May 2014
WASHINGTON (AP) ? The Federal Communications Commission says the nation's four largest wireless carriers have agreed to relay text messages to text-enabled 911 call centers by May 2014.
The four carriers ? AT&T, Verizon, Sprint and T-Mobile ? cover 90 percent of the population. However, only a handful of call centers are able to receive texts today, and it's unclear how many will be able to receive them in 2014.
Brian Fontes, CEO of the National Emergency Number Association, said the agreement and the associated deadline help call centers plan their technology upgrades and training. NENA organizes state and local agencies that operate such centers.
One 911 call center in Iowa started accepting texts in 2009, and trials of 911 texting are going on in Vermont. In other areas, there is no response to texts sent to 911.
Under the agreement announced Thursday, texters will get an answer, whether their call center is able to receive texts or not. If it can't, they'll get an automated response telling them to call instead.
The FCC said texting to 911 could be useful when a phone call could put the caller in danger. Texting could also aid a person with disabilities who is unable to call.
However, the FCC says people should always call 911 during an emergency if they can.
Associated Pressleah remini desean jackson kyle orton kyle orton ncaa tournament schedule black and tan dwight howard trade
Bitcoin-Central becomes first Bitcoin exchange licensed to operate like a bank
BitInstant may be aiming for a Bitcoin debit card, but it looks like a European Bitcoin exchange will beat it to the punch. After working with French financial regulators, Bitcoin-Central has hammered out a deal with French payment processor Acoba and France's Credit Mutuel bank to become a payment service provider, which allows it to function much like a bank. According to Bitcoin-Central, it's the first exchange of the digital currency to be licensed to operate as a bank and function within the framework of European regulations. Customers will now have funds held under their name -- rather than that of the exchange -- at Credit Mutuel and insured by the Garantie des dépôts, the French analog of the FDIC (Federal Deposit Insurance Corporation). Soon, users of the service will be able to order debit cards that can use Bitcoins and Euros for purchases and cash withdrawals. Yearning for some direct deposit action? In a few months, the organization will be able to accept direct deposits and even automatically convert hard-earned cash into Bitcoins. The virtual bullion has taken its lumps, but this is a development that fans of the currency can be proud of. For more details, tap the bordering source link.
[Image credit: Zach Copley, Flickr]
Via: Ars Technica
Source: Bitcoin Forum
Source: http://www.engadget.com/2012/12/09/bitcoin-exchange-bitcoin-central-licensed-bank/
mad cow pennsylvania primary jerome simpson hand sanitizer obama on jimmy fallon google drive apple stock
Monday, December 10, 2012
French film "Amour" named best film by LA critics
LOS ANGELES (Reuters) - The French movie about an aging couple, "Amour," was the surprise choice for best film of 2012 by the Los Angeles Film Critics Association on Sunday, while Joaquin Phoenix was named best actor for his role as a troubled outsider in the cult drama "The Master."
In a list that broke ranks with early movie award picks in New York, the Los Angeles Film Critics Association named Paul Thomas Anderson best director for "The Master" and the film's Amy Adams best supporting actress.
"Zero Dark Thirty," the thriller about the killing of Osama bin Laden, took just one award, for best editing.
Last week, "Zero Dark Thirty" picked up two best picture accolades from the New York-based National Board of Review and the New York Film Critics Circle.
Nominations are to be announced later this week for the Screen Actors Guild and Golden Globe awards, in what are likely to be leading indicators for the Oscars in February.
The 60 or so members of Los Angeles Film Critics Association showed wide-ranging tastes and little agreement with awards industry watchers.
Emmanuelle Riva, 85, who plays a retired piano teacher who suffers a stroke in the Cannes film festival winner "Amour," ("Love") was named best actress in a tie with American Jennifer Lawrence, who plays a young widow in the quirky comedy "Silver Linings Playbook."
Supposed Oscar front-runners like actors Daniel Day-Lewis ("Lincoln"), Jessica Chastain ("Zero Dark Thirty") were shut out by the Los Angeles critics, along with much-anticipated musical "Les Miserables" and epic fantasy "The Hobbit."
Newcomer Dwight Henry won best supporting actor for playing a beleaguered father in mythical indie film "Beasts of the Southern Wild," and the Los Angeles critics gave the best screenplay award to Iran hostage drama "Argo."
Nominations for the Critics Choice awards come on Tuesday, with the Screen Actors Guild announcing their nominations for the best movie and TV performances in the year on Wednesday. Organizers of the Golden Globes unveil their picks on Thursday.
Nominations for the Oscars - the highest honors in the movie industry - are announced on January 10, with the Oscar awards ceremony set for February 24 in Hollywood.
(Reporting By Jill Serjeant; editing by Christopher Wilson)
Source: http://news.yahoo.com/french-film-amour-named-best-film-la-critics-014100523.html
unemployment rate jesse ventura keri russell drew barrymore bill o brien portland trailblazers will kopelman
Turn Your FreeNAS Box Into the Ultimate Anonymous Downloading Machine
A low-powered home server is one of the best ways to download files with BitTorrent and Usenet, but if you really want to stay safe on file sharing services, you need to anonymize your traffic. Here's how to turn your FreeNAS box into the ultimate downloading machine so you can download safely and monitor its activity from anywhere.
We've shown you how to turn an old computer into a networked backup, streaming, and torrenting machine with FreeNAS, and even gone a little further and installed some Usenet and media management programs on it. But even with all that power, our downloading machine is missing a few things. Namely:
- A VPN service that can anonymize all our traffic, to keep it safe from prying eyes
- A method of monitoring our downloads and media management tools from the internet, so you can keep up with them from anywhere?even your phone
In this guide, we'll show you how to add both of these features, turning your home server into the ultimate anonymous downloading machine.
Note: If you're just starting out, we recommend checking out our other FreeNAS guides first. Our original guide will show you how to set up FreeNAS 7, while our second guide will show you how to install programs manually, using Usenet as an example. Keep in mind that, while we're still referring to it as FreeNAS to keep some consistency with earlier guides, these guides use the FreeNAS 7 project, now known as NAS4Free, instead of the more current FreeNAS 8 (which we won't be using). This guide should work whether you have an old FreeNAS 7 box or a new NAS4Free box?they're essentially the same piece of software.
Set Up a VPN for Anonymous Downloading
We've said it once, and we'll say it again: the only way to stay anonymous is by using a proxy or VPN service. Yes, it costs money?usually around $10 a month or so?but these days, you shouldn't download without one. Unfortunately, FreeNAS doesn't come with a VPN, so you'll need to do it from scratch. Luckily, that isn't too hard?you just need to find a VPN service that works for you.
What You Should Look For in a VPN
There are a lot of great VPN services out there, and everyone has different needs, so you'll want to find one that works for you. Here are the features you may need to look for:
- OpenVPN Support without plain-text authentication. Most VPNs support OpenVPN?which is what we'll be using on our NAS?but many of them require you to store your username and password in a plain text file. Not only is this insecure, but it requires additional features that require a complex installation, so we don't want that. If you're considering a VPN service, look up their guides on how they work OpenVPN. There won't usually be any guides for FreeBSD, but their Linux guide should be a good example. If it requires having some sort of
password.txt
file rather than a.key
file, you'll want to look elsewhere. - Port Forwarding, if you want to use the VPN in conjunction with the first tip in this guide regarding monitoring your NAS from afar. Otherwise, you won't be able to specify which ports on the VPN go to your NAS. Check your VPN's FAQ to see if it supports port forwarding if you want to use Dynamic DNS (and note that this is different from the port forwarding on your router?it's a feature of the VPN service itself).
- BitTorrent Support. Some privacy servers have clauses against using their services for BitTorrent, so if you're using BitTorrent on your NAS, you obviously want to make sure your VPN allows it.
- Other Privacy Features depending on your wants and needs. If you're going for anonymity, you should obviously look for a VPN client that doesn't log activity, but you might even want one that accepts Bitcoin or goes through a specific country. This is up to you, and is often advertised heavily on the VPN's home page.
For this guide, we'll be using a VPN service called Mullvad as an example, but I highly recommend you research other VPN services that fit your specific needs. Everyone is different, and what VPN you choose will be based on how you're using your NAS and what kind or privacy features or services you want. Photo by Pavel Ignatov (Shutterstock).
Step One: Set Up a Jail for Installing New Programs
We'll need to install OpenVPN from the FreeBSD command line, just like we did with SABnzbd and Sick Beard in our previous guide. Before you do so, you'll need to set up a "jail" on your system, which allows you to install programs on one of your NAS' drives (since our FreeNAS installation resides on a flash drive).
If you followed our guide to setting up SABnzbd and Sick Beard, you can skip this step and move on to step two of this guide, since you've already done all of this.
First, SSH into your NAS. Windows users should download PuTTY, and type in the IP address of your NAS on the main page. You'll want to log in as root
and type in the password you created for yourself when you set up the NAS. If you're on OS X, type this command into the Terminal and press Enter.
ssh -l root 192.168.0.10
Where 192.168.0.10
is the IP address of your NAS.
Once you've logged in as root
, you'll need to create a few folders and mount them, using the following commands. Replace SEAGATE
with the drive on your NAS where you'll store the programs.
cd /mnt/SEAGATE
mkdir extensions
cd extensions
mkdir var
mkdir usr
mkdir tmp
mount_unionfs -o w /mnt/SEAGATE/extensions/usr/ /usr/
umount -f /var
mount_unionfs -o w /mnt/SEAGATE/extensions/var/ /var/
This puts your usr
, var
and tmp
folders on an actual hard drive where you'll be allowed to install programs that don't come with your NAS. You'll want to run a few of these every time you start up your NAS from now on, so head to your NAS' web interface and go to System > Advanced > Command Scripts and add the following command to the list as a PostInit
script:
mount_unionfs -o w /mnt/Media/extensions/usr/ /usr/
When you're done, head to step two.
Step Two: Install OpenVPN
We're going to use OpenVPN to connect to our VPN service. Assuming you're running the newest version of NAS4Free, which is based on FreeBSD 9, run the following commands:
setenv PKG_TMPDIR /mnt/SEAGATE/extensions/tmp/
setenv PACKAGESITE "ftp://ftp.freebsd.org/pub/FreeBSD/ports/i386/packages-9-current/Latest/"
pkg_add -rv openvpn
If you're using an older version of FreeNAS, check what version of FreeBSD it's based on from the home page of the Web interface. Chances are, it's FreeBSD 7.3, in which case you'll want to install OpenVPN with the following commands instead:
setenv PKG_TMPDIR /mnt/SEAGATE/extensions/tmp/
setenv PACKAGESITE "http://ftp6.us.freebsd.org/pub/FreeBSD-Archive/ports/i386/packages-7.3-release/Latest/"
pkg_add -rv openvpn
Everyone's NAS may be a little bit different, so make sure you're installing the correct package for your NAS' software. You'll also want to replace i386
with amd64
if your NAS is 64-bit.
Step Three: Set Up OpenVPN with Your VPN Service
This is the trickiest part. Now, you need to head to your VPN provider's web site and look up their OpenVPN guide. Chances are, it'll have a ZIP file you can download with a config file and some certificates inside. With Mullvad, for example, you get a ZIP with a config file for Windows and Linux, as well as a
.key
file and a few .crt
files. First, we're going to edit our config file. Open it up in your favorite text editor (the Linux one is best, if it exists) and take a peek inside. It should look something like this:
client
dev tun
proto udp
remote openvpn.mullvad.net 1194
resolv-retry infinite
nobind
persist-key
persist-tun
ca master.mullvad.net.crt
cert mullvad.crt
key mullvad.key
remote-cert-tls server
comp-lzo
verb 3
ping-restart 120
ping 10
Usually it'll have some instructions inside, too, so you know what each setting does. Most of the defaults should be fine, but if you have any trouble, try some of the above settings and see if they work (obviously using your VPN's server under remote
and the correct file names under ca
, cert
, and or key
.
When you're done, SSH back into your NAS and run the following command:
mkdir /mnt/SEAGATE/extensions/usr/local/etc/openvpn
Rename your configuration file to
openvpn.conf
and drag it into your newly-created folder, along with any .crt
and .key
files that came with it. You may need to drag them to /mnt/SEAGATE
first, then use the FreeNAS File Manager (Advanced > File Manager from the Web interface) to copy them to /mnt/SEAGATE/extensions/usr/local/etc/openvpn
.
Lastly, open up your NAS' web interface and head to System > Advanced > rc.conf and add the following variables:
openvpn_enable
with a value of YES
openvon_if
with a value of tun
Once you've saved those variables, continue to the next step to try running OpenVPN for the first time.
Step Four: Start OpenVPN
Once all your config files are in place and your ports are forwarded, it's time to try running OpenVPN for the first time. Open up your NAS' web interface and go to Advanced > Command. Type the following command into the "Command" box and press Execute:
/usr/local/etc/rc.d/openvpn start /usr/local/etc/openvpn/openvpn.conf
Then, head to Diagnostics > Log to see if your VPN works properly. You should see a pretty big wall of text, ending with something like
openvpn[1234]: Initialization Sequence Completed
. (You may need to refresh your log a few times before it shows up, as it'll take a few seconds for the VPN to start). If everything looks okay, SSH back into your NAS and try to ping www.google.com
again. If it works, you've successfully set up a VPN on your NAS!
If it didn't work, you may need to change some settings in your config file. Look for any errors you see in your log and try it again. If OpenVPN is running but you can't connect, you'll need to go to Advanced > Command and run kill 1234
before trying again, where 1234
is the process ID of OpenVPN. You'll see this in the log, and it'll change every time you restart OpenVPN.
This is the hardest part of the process, and troubleshooting the problem is different for everyone depending on your VPN service and the other things you have running on your NAS. Don't give up, and make sure to follow all the instructions to the letter to get everything working. If you're using BitTorrent, now would be a good time to check your torrent client's IP using CheckMyTorrentIP.com, as described in step three of our BitTorrent anonymization guide. If you get your VPN's IP, then you've successfully set up an anonymous downloading NAS!
Step Five: Set Up Your Firewall
The last thing you should do, once your VPN is up and running, is set up a firewall on your NAS that blocks all traffic except your VPN connection. That way, if your VPN goes down, your NAS won't fall back on your regular connection, which can expose your actual IP and destroy any anonymity you may have had.
In your NAS' web interface, go to Network > Firewall. Everyone's firewall may be a bit different, but here's a template you can use to create your rules:
Click on the image for a closer look. Going number by number in the image, here's what each set of rules does:
- This rule allows all local traffic on your network. That way, no matter what happens, you can still access your NAS and its web interface from your other computers.
- These two rules allow your DNS connection, which usually travels along port 53.
- These two rules allow your VPN to establish a connection. The rule in the screenshot assumes your VPN uses port 1194 to do so. If you use a different port in your OpenVPN config file, use that here instead.
- These rules allow any traffic that travels over the VPN, like your downloading. These may be different depending on your VPN service you use. Look in the log when you connect and see what IP addresses it uses in its routes. For example, mine uses addresses like
10.8.0.169
, so I added10.8.0.0/24
to my firewall to allow any connections from that range of IP addresses. - These rules allow multicast connections, which your NAS will need if it uses services like Bonjour to connect to other computers on your home network. Not everyone needs these open, but you may?if you don't add these rules, you'll just see a few errors in your log from time to time that don't matter.
- These two rules allow DHCP, if your NAS uses it. If you have a static IP, you don't need this rule.
- Lastly, this rule denies all other traffic that doesn't match the above rules. For our purposes, this basically means all traffic that doesn't go through the VPN. If your VPN goes down, your NAS won't be able to access the internet, and everyone trying to peep on your downloading will not be able to see who you are.
Again, your firewall may differ a bit, but this is a good place to start. Click the Plus sign to add each individual rule, and when you're done, check the Enable box and click "Save and Restart" in the bottom left corner. Head back to your SSH window and try to ping www.google.com
again, first with OpenVPN running, and then after you've killed OpenVPN as described in step four. The ping should work correctly when OpenVPN is running, and return errors when OpenVPN isn't running. Again, if it doesn't work correctly, you may have to fiddle with some settings until you get it right.
Once everything's working properly, give yourself a pat on the back, because you've now anonymized all the traffic coming in and out of your NAS! It's not an easy process, especially because it's a little different for everyone, but it can be done?it just takes a little patience and a little knowledge about how all everything works.
Monitor Your Downloads From Afar with Dynamic DNS
So you've got yourself a kickass downloading machine, but what happens when you're out and about and come across a file you'd like to download? Or maybe you want to check in on your server and see what TV shows you've downloaded or ripped to your home theater PC? By default, you can't access your NAS from outside your home network, but all it takes is a few tweaks to make this possible. Then you can monitor downloads, start new ones, and check in with your NAS from your laptop, phone, or even someone else's computer while on-the-go.
Step One: Sign Up for a Dynamic DNS Service
We've talked about how to do this before, and the process is pretty similar with your NAS. To start, you'll want to sign up for a service like DynDNS or No IP, which will give your home network an easy-to-remember domain name like myawesomenas.dynalias.org
. This makes your NAS easier to connect to from the outside world, and ensure you don't need to memorize a bunch of different IP addresses. Most of these services are free, though you can pay a fee for more advanced features.
Before you sign up, check your router's admin page to see which services your router supports. Mine only supports DynDNS, for example, so that was the one I had to use. Other routers may support different services, so check the Dynamic DNS settings of your router for more info.
Step Two: Set Up Dynamic DNS on Your Router and NAS
Once you've signed up for your service of choice, head back to your router's admin page and type in your credentials and domain name into the provided boxes. This will be different for every router, but yous hould find it in your router's settings under "Dynamic DNS," "DDNS," or something similar.
Next, do the same thing on your NAS. Open up your NAS' web interface and go to Services > Dynamic DNS. Pick your provider, type in your domain name and credentials, then check the Enable box in the upper-right corner. Click the Save and Restart button to start the service.
Step Three: Forward Any Necessary Ports
Lastly, you'll probably need to forward a few ports on your router so your NAS is accessible from the outside world. Once again, we've talked about this before, so check our guide to port forwarding if this is the first time you've done it.
If you're using a VPN, all you need to do is forward the port that your VPN uses to connect. In our case, that's port 1194, as shown in our VPN config file. So, head to your router's configuration page and find the section for port forwarding, then forward port 1194 over the UDP protocol.
You'll also need to set up port forwarding from your VPN service's web site. Otherwise, your VPN won't know who you are when you try to connect from the outside world (since a number of other users are using the same VPN as you). Head to your VPN's home page, log in, and look for the section on port forwarding. (If you're using Mullvad, it's on the main page after you log in). Click the New button to add a new port. Your VPN service decides how many you're allowed to have; many limit you to just a few so you don't hoard them from other users.
Now, you don't get to choose which ports your VPN gives you, so after it's assigned a few ports to your account, you'll need to assign them to the services on your NAS. For example, if your VPN assigns you port 12345 after clicking "New," and you want to access your BitTorrent downloads from afar, you'll need to go into your BitTorrent settings on your NAS (Services > BitTorrent) and change the web UI's port number to 12345. If you're running other web-based services, like Sabnzbd or Sick Beard, you'll need to assign them each their own port as well, as provided to you by your VPN service. Note that you won't be able to access your NAS' web interface from afar, since you can't customize what port it uses, but you can access everything else, which is really what's important. Be sure to update your bookmarks with the new port numbers, too!
Step Four: Try Accessing Your NAS From Elsewhere
Lastly, just try to access one of your web interfaces using your new hostname. For example, if your hostname is myawesomenas.dynalias.org
and your newly-assigned BitTorrent port is 12345, you would type the following into your address bar to access it:
http://myawesomenas.dynalias.org:12345/transmission/web/
Again, repeat this process for any other services you have running, like SABnzbd or Sick Beard. If everything works, then congratulations! Now you can monitor your downloads, add new downloads, and otherwise keep track of your NAS from anywhere on any device.
It isn't a simple process, and it can be a little different for everyone, but all the setup is well worth it. When you're done, you'll have a quiet, low-power machine that stays on 24/7 and downloads all your files for you, completely anonymously, with easy access from wherever you are. If you run into any problems during setup, be sure to check out the NAS4Free forums, the OpenVPN forums, the FreeBSD forums, or right here in the comments of this post. Good luck!
Chris Brown Tattoo Innocence of Muslims Clara Schumann Jael Strauss Alison Pill Sam Bacile sprint
Sunday, December 9, 2012
Asada, Takahashi win Grand Prix Final in Russia
SOCHI, Russia (AP) ? Mao Asada of Japan won the Grand Prix Final on Saturday, topping American Ashley Wagner in a clean free program that ranged from sprightly to quietly refined.
Daisuke Takahashi of Japan won the men's gold, despite falling on his opening quad. Yuzuru Hanyu of Japan won silver, edging Patrick Chan of Canada.
Wagner was just a half point behind Asada heading into the free skate, but fell twice and ended up a distant second. Akiko Suzuki of Japan was third at the Iceberg arena, which will host figure skating at the 2014 Sochi Olympics.
Americans Meryl Davis and Charlie White won the ice dancing gold, beating Canadian world champions Tessa Virtue and Scott Moir. Nathalie Pechalat and Fabian Bourzat of France took bronze.
Wagner said her second fall, on a double axel in combination after a triple loop, "was a bit of a freak fall. But to have such a hard fall and then go and complete the triple flip of that quality is definitely something I can take away from this competition."
The team doctor told her she injured a hip.
"I can't tell you what that is, but I can tell you it really hurts," Wagner said. "For me, I always like to go big or go home, so when I fall I like to fall really hard."
Asada landed six triples in her program to excerpts from Tchaikovsky's "Swan lake," a musical choice that delighted the Russian spectators to boost Asada's spirits.
"When it began, I head some people clapping and I was happy to hear that," she said." Looking back on my performance there were no major mistakes, so that's a great takeaway."
Chan was just 0.04 points ahead of Spain's Javier Fernandez, who was the only one of the six men to land two quads. He placed first in the free program, but not by enough to overcome the deficit of a fifth-place short program.
Asada's only significant misstep was doubling what would have been her seventh triple of the program. But her presentation followed the music's emotional range, from the dreamy opening to its lively conclusion.
Takahashi recovered from his opening fall to land a quad toe-loop, but made other errors including a hand down on a triple-double. He took gold with mixed emotions.
"Of course I am the champion of the GP Final, but there's a lot to be done, there's a lot of challenges and issues that remain," he said.
Hanyu nailed his opening quad but turned the planned next one, a salchow, into a double. Chan also fell on his initial quad, which was to be a combination with a triple toe-loop.
"To be honest, I'm pretty disappointed with my performance today," Chan said. "Looking at the whole program I think there were a lot of good things also. I did the triple axel-triple loop sequence, those two jumps that I missed at Cup of Russia. So each competition I'm kind of tuning in onto every little detail of the program, which is what I like to see."
In the women's field, Kiira Korpi of Finland took fourth, followed by Russia's Elizaveta Tuktamysheva and American skater Christina Gao. In the men's, Japan's Takahiko Kozuka and Tatsuki Mmachida were in fifth and sixth.
Davis and White performed an array of complex moves, including one in which he appears to drop her but holds on with one hand while she wraps her legs around one of his. Virtue and Moir, dressed in all black, made a moving interpretation of the classic "Carmen" story.
Both duos said the ease they showed on the ice was deceptive.
"It was one of those skates when nothing really came easily, we felt like we had to fight through it but that's OK," Davis said. "It's good to have skates like that, and it's really times like that where we feel we grow the most."
Moir said it was tough.
"It was definitely a program we had to work through, but our execution was spot-on today. We had a really good, strong technical skate and we were able to bring the motion as well. So that's exciting, especially in this venue, to lay down two strong skates," Moir said.
Source: http://news.yahoo.com/asada-takahashi-win-grand-prix-final-russia-174923313--spt.html
Friday, December 7, 2012
Police arrest, spray protesters at Mich. Capitol
LANSING, Mich. (AP) ? Michigan State Police say they have used chemical spray on right-to-work protesters who to tried rush into the Senate chamber at the state Capitol, and minority Democrats in the Legislature accuse Republican leaders of taking a "shameful step" to undermine free speech.
State police Inspector Gene Adamczyk says eight people were arrested for resisting and obstructing when they tried to rush past two troopers guarding the Senate door Thursday. He says the troopers used chemical spray after the people refused orders to stop.
Adamczyk says the Capitol was temporarily closed because of safety concerns. He estimates about 2,500 visitors were at the Capitol.
A state Democratic Party statement says Republicans are showing "their true colors" and "shutting down dissent."
The Associated Press left a message seeking comment from Republican leaders.
Associated Pressferris state hockey mary poppins john derbyshire kinkade thomas kinkade paintings easter bunny navy jet crash virginia beach