• New Horizons on Maelstrom
    Maelstrom New Horizons


    Visit our website www.piratehorizons.com to quickly find download links for the newest versions of our New Horizons mods Beyond New Horizons and Maelstrom New Horizons!

Wacky News Stories

:shock I thought wacky things like that only lived in tropical climates! xD: Are you going to be alright? :?
Yea I'm doing a lot better . Still hurts , but it's healing . Actually if I had gone to the doctor right off I guess it wouldn't have been so bad . But I waited til it was bad before finally deciding I better go in . When I first noticed I'd been bit it just itched like crazy , so I figured it was just a flea bite or something . The next day though my leg was all swollen great big and I'd broke out in an red itchy rash from head to foot . Still I didn't go to the doctor til the next day :rolleyes: . Figured it would go away on it's own . Oh well . Live and learn I guess.
Thanks for your concern though Stallion. :gday
 
I got bitten by a spider and had to go to hospital a couple of months ago, for the following month my entire body was ichy and rashy as well as most of my body started to peal especcially around my hand where I was bitten...

I went into and sezure like 5 minutes after I was bitten so I was rushed straight to the hospital
 
You too? :shock Are you okay? :?

I hate spiders! Anything with more than four legs just shouldn't exist in my book. :no
 
Police have made their first arrest using a remote-controlled hover drone complete with thermal-imaging equipment.
15547630.jpg


A suspected car thief was believed to be hiding from police in thick undergrowth in Bootle, Merseyside, so officers launched their new Unmanned Aerial Vehicle (UAV).

They used the on-board thermal imaging camera to seek out the teenager and pinpoint his hiding place 300-metres away.

The officer operating the drone from the ground was then able to guide colleagues to the exact location and they arrested the 16-year-old youth.

A second 20-year-old man was also arrested. Both have been released on bail pending further inquiries.

Merseyside Police, who took delivery of the drone in November, say it can be used for monitoring everything from serious firearms incidents and hostage situations, to public events and football matches.

The drone has a top speed of 30mph, can fly to a height of 400ft and even comes with flashing blue lights.

Chief Inspector Nick Gunatilleke, from Merseyside Police, said: "We are the only police force in the country currently using a UAV like this.

"This is the first time the thermal imaging equipment has led directly to an arrest since the UAV went live in November so we are very pleased.

"We will use it whenever we can to support other resources such as the force helicopter and dog patrols in dealing with incidents when they arise."
 
Here's something that maybe should be in the main news section, but I'll just stick it here:

From http://www.cnn.com/2010/WORLD/americas/02/16/vbs.toxic.garbage.island/index.html?hpt=C1 :

Back in the mid-zeroes, I remember reading a lot of stories about a buildup of trash in the Pacific Ocean so massive that it had formed a floating island of waste the size of Texas. Its colorful nickname was the Great Eastern Garbage Patch, and what was even more mind-boggling than the purported scale was that pretty much the only places you could dig up any substantial info about it were in minor oceanographic and environmental publications. You also couldn't find a photo of it to save your life. It was like Garbage Brigadoon. Anyhoo, the idea that one of the biggest environmental disasters of our age had been going on outside nearly everyone's awareness piqued our curiosity, so we decided to head out there (the middle of the ocean) and see it for ourselves.

The Garbage Patch is located at a natural collecting point at the center of a set of revolving currents called the North Pacific Gyre. The middle of the Gyre is more of a meteorological phenomenon than an actual place: a consistent high-pressure zone north of the Hawaiian Islands that, combined with the extremely weak currents, helps keep the ocean surface as placid as lake water.

Flotsam has been sucked into this area from the encircling currents for as long as the Pacific's existed, but up until the last century this process ended with the refuse safely biodegrading and being reabsorbed into the food chain as nutrients. With the advent of plastics, however, the Garbage Patch has transformed from a fertile feeding ground to the oceanic equivalent of a desert. And a particularly crap-strewn desert at that.

More can be found by following the above link.

Anybody ever heard of this thing before? It's like some kind of seriously twisted time capsule for humanity, or something.
 
I first heard of this back in the 80's . It was a hot topic in the early 90's . Apparently it was perfectly legal to dump garbage in international waters 'til sometime in the mid 90's . There are some countries that still do . Still after all these years I have never actually seen pictures or video footage of it .
 
Well, I know Vancouver and its surrounding region still dumps raw sewage into the ocean 24/7 - I discovered that a while back on a trip to the coast, when the folks we were staying with went to look at one of the monster houses in a charity lottery. Nobody could figure out why they didn't try to sell it, since it was, well, usable for something above 4,000 square feet - until I took a walk down to the edge of the back yard, which backed right on to the ocean, and found the big pipe. Darn good there wasn't a wind from the West, or I'd have been toast! xD: :eww
 
MOSCOW (Reuters) - Theater posters proclaiming "We await you, merry gnome" were taken down from a Russian town shortly before a visit by the country's diminutive President Dmitry Medvedev, a local website reported on Friday.

The advertisements were for a children's theater show, but were removed from a street that the president's convoy was due to use on his visit to Omsk on February 12, the nr2.ru website reports, citing local sources.

Russian media say Medvedev is 5 feet, 4 inches tall.

The poster depicted a child fairy but was one of a number of sudden renovation projects that took place ahead of the Medvedev's visit, it reported, quoting bloggers and journalists.

The authorities recommended that fresh snow should be sprinkled over older dirty snow as part of the facelift, it said.
 
Dozens of U.S. defense contractors, agencies hacked
By Andy Greenberg, Forbes.com Date: Sunday Feb. 21, 2010 7:23 AM ET

For anyone who has a security clearance and doesn't believe the U.S. faces a cyber-espionage crisis, Steven Shirley has 102 stories to share with you.

That's the number of cases in which Shirley's team of Pentagon researchers discovered cyberspies breaching the networks of government agencies, defense contractors and other organizations with ties to the U.S. Department of Defense, gaining administrator-level access with the aim of stealing military secrets.

The Pentagon's forensics-focused Cyber Crime Center, where Shirley is executive director, found that between August 2007 and August 2009, 71 government agencies, contractors, universities and think tanks with connections to the U.S. military had been penetrated by foreign hackers, in some cases multiple times. In total, Shirley told Forbes, the center performed 116 investigations following spying breaches and found that in all but 14 of those cases the intruders had gained complete administrator-level access to the victim's network.

"There are some significant defense contractors among that number," Shirley says. "We can say that any company that's involved in high-technology research and development is a target for these adversaries."

Shirley wouldn't reveal what information was stolen in any of the breaches, where the attackers seemed to be located or whether they appeared to be state-sponsored, saying only that the attacks were based "offshore."

He also declined to name any specific companies or organizations penetrated in the defense industry's hacking epidemic. But military contractors General Dynamics and Northrop Grumman have both been successfully breached by cyberspies in the last two years, according to sources familiar with the security situations of those companies. It's also likely that many other major defense contractors have recently had data stolen by hackers.

Northrop Grumman's chief information security officer Tim McKnight said the company is "always in the trenches" defending its network from cyberattacks but doesn't discuss internal security issues. "We don't talk about successful or unsuccessful intrusions," he says. A General Dynamics spokesperson declined to comment.

The defense-industrial complex's hemorrhaging of intellectual property to cyberspies is hardly new--in fact, it dates back much farther than the private sector hacking incidents revealed by Google's admission of a breach by hackers last month.

As early as 2003 Sandia National Laboratories and its managing company, Lockheed Martin, were penetrated by cyberspies, seemingly based in China, who pilfered plans for the Mars Reconnaissance Orbiter, a class of technology with potential military uses. In 2007 Forbes reported that cyberspies, again seemingly based in China, had breached the largest 10 military contractors, including Lockheed Martin, Northrop Grumman, Raytheon and Boeing.

But threats are increasing in both "sophistication and number," Shirley says, and many defense firms haven't kept up. "In some cases, there was a huge attack surface for an adversary," says Shirley. "The IT staffs in some companies were simply overwhelmed or inexperienced in their ability to contend with threats."

Almost every breach his agency investigated, Shirley says, began when an employee was sent a highly targeted and convincing phishing e-mail that spoofed a trusted sender. When the recipient opened a file attached to that message, it used a flaw in the target computer's software to invisibly plant malicious software on the machine and give it access to the user's network. (Finnish cybersecurity firm F-Secure recently found one such booby-trapped PDF intended to infect an Air Force computer using a vulnerability in Adobe Reader.)

But the large majority of those attacks, Shirley says, didn't use new, previously unknown software vulnerabilities. Instead, they exploited old software bugs that IT administrators had failed to patch, configuration errors and even poor password practices.

"We were surprised to see that even companies that we regarded as tech savvy in a lot of cases had significant vulnerabilities correlated with inattention to the basic blocking and tackling of information assurance," says Shirley. "The most popular password in the world is still 'password,' and we still see that from time to time even in these companies."

As top-tier contractors respond to attacks by improving their security, hackers are increasingly targeting a second tier of smaller defense firms with innovative military technology but little experience in protecting secrets. That's made defense contractors' acquisitions of small, insecure companies a prime avenue for introducing new vulnerabilties, says Shirley. "When you've just inherited a network, you also inherit all the ensuing impact on protection of intellectual property," he says.

But hacker exploits are also evolving to challenge the security of even long-established defense firms, says Kevin Mandia, a former Pentagon researcher whose firm, Mandiant, serves as a post-breach consultancy. In some cases, he says, intruders hide multiple hidden backdoors or steal documents from one computer that they later use to spoof an e-mail after an initial breach is thought to be contained. "The techniques imply that attackers have a great familiarity with the victim organizations, their people, their roles and responsibilities," says Mandia.

The spying software that hackers hide on victims' networks is also becoming harder to detect--particularly the code aimed at defense firms, he says. In a test in December 2009 of 1,400 malicious software or "malware" samples pulled from victims' machines, Mandia says only 24 per cent of the programs were found by antivirus programs. "We see malware hitting the contractors that hits everyone else six to nine months later," he says.

Even as cyberspies expand their targets to other sectors like law firms, oil companies and technology companies, that evolution of tactics means the defense industry's cyberstruggles are far from over. "As you do your judo to combat these guys, they escalate," says Mandia. "If you're Boeing, Lockheed or Raytheon, you simply have a threat that wakes up every day and tries to compromise you."
 
N.M. parents upset over porn mix-up in classroom
CLIFF, N.M. – Cliff High School students studying World War I history saw a few seconds of pornography during viewing of a video about the 1919 Treaty of Versailles. A History Channel program apparently had been recorded over a porn tape. A substitute teacher who was overseeing the class told school officials he was shocked by the porn and that he had received the tape from a friend. The videotape apparently was shown at least twice in the classroom without incident.

Superintendent Dick Pool won't disclose if any action was taken against the teacher.

Several parents spoke at a school board meeting Thursday. Parent Francesca Estevez said Cliff, located in rural southwestern New Mexico, is "very cohesive" and the videotape "was not acceptable by community standards."

Pool apologized to parents.
 
xD: That's all my school ever used. Of course, an incident involving someone using the school's first-ever DVD as a death Frisbee directed at a teacher's head might have also had something to do with it. :cheeky
 
There is now tax on cow fart:
Call for tax on livestock emissions

Livestock should be taxed to reduce the contribution made by their flatulence to greenhouse gas emissions, the United Nations said on Thursday in a report that will give fresh ammunition to campaigners against the preponderance of meat in the foodchain.

The novel suggestion by the UN’s Food and Agriculture Organisation to use taxation comes as campaigners focus on the impact on climate change of emissions of methane from cattle, sheep and pigs.

“Market-based policies, such as taxes and fees for natural resource use, should cause [livestock] producers to internalise the costs of environmental damages,” the FAO said in its annual report, The State of Food and Agriculture .

“The sector is consuming a large share of the world’s resources and is contributing a significant portion of global greenhouse gases emissions,” the report adds.

Wouldn't it make more sense to tax meat instead?
 
Back
Top