Web Toolbar by Wibiya Smarter Hiphop

Total All Time Pageviews

Friday, December 16, 2011

U.S Congress trying to take wholeof entire internet find out here !!!

An Open Letter From Internet Engineers to the U.S. Congress

Today, a group of 83 prominent Internet inventors and engineers sent an open letter to members of the United States Congress, stating their opposition to the SOPA and PIPA Internet blacklist bills that are under consideration in the House and Senate respectively.

We, the undersigned, have played various parts in building a network called the Internet. We wrote and debugged the software; we defined the standards and protocols that talk over that network. Many of us invented parts of it. We're just a little proud of the social and economic benefits that our project, the Internet, has brought with it.
Last year, many of us wrote to you and your colleagues to warn about the proposed "COICA" copyright and censorship legislation. Today, we are writing again to reiterate our concerns about the SOPA and PIPA derivatives of last year's bill, that are under consideration in the House and Senate. In many respects, these proposals are worse than the one we were alarmed to read last year.
If enacted, either of these bills will create an environment of tremendous fear and uncertainty for technological innovation, and seriously harm the credibility of the United States in its role as a steward of key Internet infrastructure. Regardless of recent amendments to SOPA, both bills will risk fragmenting the Internet's global domain name system (DNS) and have other capricious technical consequences. In exchange for this, such legislation would engender censorship that will simultaneously be circumvented by deliberate infringers while hampering innocent parties' right and ability to communicate and express themselves online.
All censorship schemes impact speech beyond the category they were intended to restrict, but these bills are particularly egregious in that regard because they cause entire domains to vanish from the Web, not just infringing pages or files. Worse, an incredible range of useful, law-abiding sites can be blacklisted under these proposals. In fact, it seems that this has already begun to happen under the nascent DHS/ICE seizures program.
Censorship of Internet infrastructure will inevitably cause network errors and security problems. This is true in China, Iran and other countries that censor the network today; it will be just as true of American censorship. It is also true regardless of whether censorship is implemented via the DNS, proxies, firewalls, or any other method. Types of network errors and insecurity that we wrestle with today will become more widespread, and will affect sites other than those blacklisted by the American government.
The current bills -- SOPA explicitly and PIPA implicitly -- also threaten engineers who build Internet systems or offer services that are not readily and automatically compliant with censorship actions by the U.S. government. When we designed the Internet the first time, our priorities were reliability, robustness and minimizing central points of failure or control. We are alarmed that Congress is so close to mandating censorship-compliance as a design requirement for new Internet innovations. This can only damage the security of the network, and give authoritarian governments more power over what their citizens can read and publish.
The US government has regularly claimed that it supports a free and open Internet, both domestically and abroad. We cannot have a free and open Internet unless its naming and routing systems sit above the political concerns and objectives of any one government or industry. To date, the leading role the US has played in this infrastructure has been fairly uncontroversial because America is seen as a trustworthy arbiter and a neutral bastion of free expression. If the US begins to use its central position in the network for censorship that advances its political and economic agenda, the consequences will be far-reaching and destructive.
Senators, Congressmen, we believe the Internet is too important and too valuable to be endangered in this way, and implore you to put these bills aside.

Signed,
  • Vint Cerf, co-designer of TCP/IP, one of the "fathers of the Internet", signing as private citizen
  • Paul Vixie, author of BIND, the most widely-used DNS server software, and President of the Internet Systems Consortium
  • Tony Li, co-author of BGP (the protocol used to arrange Internet routing); chair of the IRTF's Routing Research Group; a Cisco Fellow; and architect for many of the systems that have actually been used to build the Internet
  • Steven Bellovin, invented the DNS cache contamination attack; co-authored the first book on Internet security; recipient of the 2007 NIST/NSA National Computer Systems Security Award and member of the DHS Science and Technology Advisory Committee
  • Jim Gettys, editor of the HTTP/1.1 protocol standards, which we use to do everything on the Web
  • Dave Kristol, co-author, RFCs 2109, 2965 (Web cookies); contributor, RFC 2616 (HTTP/1.1)
  • Steve Deering, Ph.D., invented the IP multicast feature of the Internet; lead designer of IPv6 (version 6 of the Internet Protocol)
  • David Ulevitch, David Ulevitch, CEO of OpenDNS, which offers alternative DNS services for enhanced security.
  • Elizabeth Feinler, director of the Network Information Center (NIC) at SRI International, administered the Internet Name Space from 1970 until 1989 and developed the naming conventions for the internet top level domains (TLDs) of .mil, .gov, .com, .org, etc. under contracts to DoD
  • Robert W. Taylor, founded and funded the beginning of the ARPAnet; founded and managed the Xerox PARC Computer Science Lab which designed and built the first networked personal computer (Alto), the Ethernet, the first internet protocol and internet, and desktop publishing
  • Fred Baker, former IETF chair, has written about 50 RFCs and contributed to about 150 more, regarding widely used Internet technology
  • Dan Kaminsky, Chief Scientist, DKH
  • Esther Dyson, EDventure; founding chairman, ICANN; former chairman, EFF; active investor in many start-ups that support commerce, news and advertising on the Internet; director, Sunlight Foundation
  • Walt Daniels, IBM’s contributor to MIME, the mechanism used to add attachments to emails
  • Nathaniel Borenstein, Chief Scientist, Mimecast; one of the two authors of the MIME protocol, and has worked on many other software systems and protocols, mostly related to e-mail and payments
  • Simon Higgs, designed the role of the stealth DNS server that protects a.root-servers.net; worked on all versions of Draft Postel for creating new TLDs and addressed trademark issues with a complimentary Internet Draft; ran the shared-TLD mailing list back in 1995 which defined the domain name registry/registrar relationship; was a root server operator for the Open Root Server Consortium; founded coupons.com in 1994
  • John Bartas, was the technical lead on the first commercial IP/TCP software for IBM PCs in 1985-1987 at The Wollongong Group. As part of that work, developed the first tunneling RFC, rfc-1088
  • Nathan Eisenberg, Atlas Networks Senior System Administrator; manager of 25K sq. ft. of data centers which provide services to Starbucks, Oracle, and local state
  • Dave Crocker, author of Internet standards including email, DKIM anti-abuse, electronic data interchange and facsimile, developer of CSNet and MCI national email services, former IETF Area Director for network management, DNS and standards, recipient of IEEE Internet Award for contributions to email, and serial entrepreneur
  • Craig Partridge, architect of how email is routed through the Internet; designed the world's fastest router in the mid 1990s
  • Doug Moeller, Chief Technology Officer at Autonet Mobile
  • John Todd, Lead Designer/Maintainer - Freenum Project (DNS-based, free telephony/chat pointer system), http://freenum.org/
  • Alia Atlas, designed software in a core router (Avici) and has various RFCs around resiliency, MPLS, and ICMP
  • Kelly Kane, shared web hosting network operator
  • Robert Rodgers, distinguished engineer, Juniper Networks, signing as a private citizen
  • Anthony Lauck, helped design and standardize routing protocols and local area network protocols and served on the Internet Architecture Board
  • Ramaswamy Aditya, built various networks and web/mail content and application hosting providers including AS10368 (DNAI) which is now part of AS6079 (RCN); did network engineering and peering for that provider; did network engineering for AS25 (UC Berkeley); currently does network engineering for AS177-179 and others (UMich)
  • Blake Pfankuch, Connecting Point of Greeley, Network Engineer
  • Jon Loeliger, has implemented OSPF, one of the main routing protocols used to determine IP packet delivery; at other companies, has helped design and build the actual computers used to implement core routers or storage delivery systems; at another company, installed network services (T-1 lines and ISP service) into Hotels and Airports across the country
  • Jim Deleskie, internetMCI Sr. Network Engineer, Teleglobe Principal Network Architect
  • David Barrett, Founder and CEO, Expensify
  • Mikki Barry, VP Engineering of InterCon Systems Corp., creators of the first commercial applications software for the Macintosh platform and the first commercial Internet Service Provider in Japan
  • Peter Rubenstein,helped to design and build the AOL backbone network, ATDN.
  • David Farber, distinguished Professor CMU; Principal in development of CSNET, NSFNET, NREN, GIGABIT TESTBED, and the first operational distributed computer system; EFF board member
  • Bradford Chatterjee, Network Engineer, helped design and operate the backbone network for a nationwide ISP serving about 450,000 users
  • Gary E. Miller Network Engineer specializing in eCommerce
  • Jon Callas, worked on a number of Internet security standards including OpenPGP, ZRTP, DKIM, Signed Syslog, SPKI, and others; also participated in other standards for applications and network routing
  • John Kemp, Principal Software Architect, Nokia; helped build the distributed authorization protocol OAuth and its predecessors; former member of the W3C Technical Architecture Group
  • Christian Huitema, worked on building the Internet in France and Europe in the 80’s, and authored many Internet standards related to IPv6, RTP, and SIP; a former member of the Internet Architecture Board
  • Steve Goldstein, Program Officer for International Networking Coordination at the National Science Foundation 1989-2003, initiated several projects that spread Internet and advanced Internet capabilities globally
  • David Newman, 20 years' experience in performance testing of Internet
    infrastructure; author of three RFCs on measurement techniques (two on firewall performance, one on test traffic contents)
  • Justin Krejci, helped build and run the two biggest and most successful municipal wifi networks located in Minneapolis, MN and Riverside, CA; building and running a new FTTH network in Minneapolis
  • Christopher Liljenstolpe, was the chief architect for AS3561 (at the time about 30% of the Internet backbone by traffic), and AS1221 (Australia's main Internet infrastructure)
  • Joe Hamelin, co-founder of Seattle Internet Exchange (http://www.seattleix.net) in 1997, and former peering engineer for Amazon in 2001
  • John Adams, operations engineer at Twitter, signing as a private citizen
  • David M. Miller, CTO / Exec VP for DNS Made Easy (IP Anycast Managed Enterprise DNS provider)
  • Seth Breidbart, helped build the Pluribus IMP/TIP for the ARPANET
  • Timothy McGinnis, co-chair of the African Network Information Center Policy Development Working Group, and active in various IETF Working Groups
  • Richard Kulawiec, 30 years designing/operating academic/commercial/ISP systems and networks
  • Larry Stewart, built the Etherphone at Xerox, the first telephone system working over a local area network; designed early e-commerce systems for the Internet at Open Market
  • John Pettitt, Internet commerce pioneer, online since 1983, CEO Free Range Content Inc.; founder/CTO CyberSource & Beyond.com; created online fraud protection software that processes over 2 billion transaction a year
  • Brandon Ross, Chief Network Architect and CEO of Network Utility Force LLC
  • Chris Boyd, runs a green hosting company and supports EFF-Austin as a board member
  • Dr. Richard Clayton, designer of Turnpike, widely used Windows-based Internet access suite; prominent Computer Security researcher at Cambridge University
  • Robert Bonomi, designed, built, and implemented, the Internet presence for a number of large corporations
  • Owen DeLong, member of the ARIN Advisory Council who has spent more than a decade developing better IP addressing policies for the internet in North America and around the world
  • Baudouin Schombe, blog design and content trainer
  • Lyndon Nerenberg, Creator of IMAP Binary extension (RFC 3516)
  • John Gilmore, co-designed BOOTP (RFC 951), which became DHCP, the way you get an IP address when you plug into an Ethernet or get on a WiFi access point; current EFF board member
  • John Bond, Systems Engineer at RIPE NCC maintaining AS25152 (k.root-servers.net.) and AS197000 (f.in-addr-servers.arpa. ,f.ip6-servers.arpa.); signing as a private citizen
  • Stephen Farrell, co-author on about 15 RFCs
  • Samuel Moats, senior systems engineer for the Department of Defense; helps build and defend the networks that deliver data to Defense Department users
  • John Vittal, created the first full email client and the email standards still in use today
  • Ryan Rawdon, built out and maintains the network infrastructure for a rapidly growing company in our country's bustling advertising industry; was on the technical operations team for one of our country's largest residential ISPs
  • Brian Haberman, has been involved in the design of IPv6, IGMP/MLD, and NTP within the IETF for nearly 15 years
  • Eric Tykwinski, Network Engineer working for a small ISP based in the Philadelphia region; currently maintains the network as well as the DNS and server infrastructure
  • Noel Chiappa, has been working on the lowest level stuff (the IP protocol level) since 1977; name on the 'Birth of the Internet' plaque at Stanford); actively helping to develop new 'plumbing' at that level
  • Robert M. Hinden, worked on the gateways in the early Internet, author of many of the core IPv6 specifications, active in the IETF since the first IETF meeting, author of 37 RFCs, and current Internet Society Board of Trustee member
  • Alexander McKenzie, former member of the Network Working Group and participated in the design of the first ARPAnet Host protocols; was the manager of the ARPAnet Network Operation Center that kept the network running in the early 1970s; was a charter member of the International Network Working Group that developed the ideas used in TCP and IP
  • Keith Moore, was on the Internet Engineering Steering Group from 1996-2000, as one of two Area Directors for applications; wrote or co-wrote technical specification RFCs associated with email, WWW, and IPv6 transition
  • Guy Almes, led the connection of universities in Texas to the NSFnet during the late 1980s; served as Chief Engineer of Internet2 in the late 1990s
  • David Mercer, formerly of The River Internet, provided service to more of Arizona than any local or national ISP
  • Paul Timmins, designed and runs the multi-state network of a medium sized telephone and internet company in the Midwest
  • Stephen L. Casner, led the working group that designed the Real-time Transport Protocol that carries the voice signals in VoIP systems
  • Tim Rutherford, DNS and network administrator at C4
  • Mike Alexander, helped implement (on the Michigan Terminal System at the University of Michigan) one of the first EMail systems to be connected to the Internet (and to its predecessors such as Bitnet, Mailnet, and UUCP); helped with the basic work to connect MTS to the Internet; implemented various IP related drivers on early Macintosh systems: one allowed TCP/IP connections over ISDN lines and another made a TCP connection look like a serial port
  • John Klensin, Ph.D., early and ongoing role in the design of Internet applications and coordination and administrative policies
  • L. Jean Camp, former Senior Member of the Technical Staff at Sandia National Laboratories, focusing on computer security; eight years at Harvard's Kennedy School; tenured Professor at Indiana Unviersity's School of Informatics with research addressing security in society.
  • Louis Pouzin, designed and implemented the first computer network using datagrams (CYCLADES), from which TCP/IP was derived
  • Carl Page, helped found eGroups, the biggest social network
    of its day, 14 million users at the point of sale to Yahoo for around $430,000,000, at which point it became Yahoo Groups
  • Phil Lapsley, co-author of the Internet Network News Transfer Protocol (NNTP), RFC 977, and developer of the NNTP reference implementation
  • Jack Haverty (MSEE, BSEE MIT 1970), Principal Investigator for several DARPA projects including the first Internet development and operation; Corporate Network Architect for BBN; Founding member of the IAB/ICCB; Internet Architect and Corporate Founding Member of W3C for Oracle Corporation
  • Glenn Ricart, Managed the original (FIX) Internet interconnection point
  • Ben Laurie, Apache Software Foundation founder, OpenSSL core team member, security researcher. Over half the secure websites on the Internet are powered by his software.
  • Chris Wellens President & CEO InterWorking Labs

Friday, December 9, 2011

Make Money online using facebook youtube and twitter Find out @smarterhiphop

SponsoredTweets referral badgeSponsoredTweets referral badge


SponsoredTweets referral badge

Oil imports drove May trade deficit to $50.2B find out @smarterhiphop

WASHINGTON — The U.S. trade deficit surged in May to the highest level in more than two and a half years, driven by a big increase in oil imports.


The Commerce Department said Tuesday that the deficit increased 15.1% to $50.2 billion in May. That's the largest imbalance since October 2008.
Exports declined 0.5% to $174.9 billion. Imports rose 2.6% to $225.1 billion. Oil prices have fallen since early May, so the effect of higher prices should ease some in the coming months.
The deficit with China jumped to $25 billion, the largest monthly gap since November. The deficit with Japan fell 26.4% to $2.6 billion. Japanese imports shrank further because of supply-chain disruptions caused by the March earthquake and tsunami.
Economists say Japan is starting to rebound from the crisis and a parts shortage that followed those disasters is beginning to dissipate. As a result, Japan's factories should increase shipments to the United States over the next few months.
American companies depend on component parts supplied from Japan. The supply-chain disruptions have slowed production at U.S. factories, particularly among those companies that make autos and electronics.
Manufacturing has been one of the strongest areas of the U.S. economy in the two years since the recession officially ended. Sales in foreign markets have been helped by increased demand and a weaker dollar, which makes U.S. goods cheaper overseas and imported goods more expensive.
Last year, the U.S. deficit with China hit $273 billion. It's the largest deficit the United States has ever had with any country. The huge trade gap between the two countries has prompted many companies and members of Congress to criticize China for manipulating its current to gain a trade advantage. U.S. manufacturers contend that China is keeping its currency undervalued against the dollar by as much as 40%.
The Obama administration has been pressuring China to allow its currency to rise at a faster rate against the dollar. But in May, the administration declined to cite China as a currency manipulator. Such a designation could eventually lead to U.S. economic sanctions against China.
The Chinese government says it has been allowing its currency to rise in value against the dollar for more than a year. But Beijing says it must do so gradually to avoid adverse consequences to the Chinese economy. 

Iran releases video of downed U.S. spy drone find out @smarterhiphop

Iran's Press TV on Thursday broadcast an extended video tour of the U.S. spy drone that went down in the country--and it indeed appeared to look mostly intact.
American officials have acknowledged that an unmanned U.S. reconnaissance plane was lost on a mission late last week, but have insisted that there is no evidence the drone was downed by hostile acts by Iran. Rather, they said, the drone likely went down because of a malfunction, and they implied the advanced stealth reconnaissance plane would likely have fallen from such a high altitude--the RQ-170 Sentinel can fly as high as 50,000 feet--that it wouldn't be in good shape.
But Iranian military officials have claimed since Sunday that they brought down an American spy drone that was little damaged. And now they have provided the first visual images of what looks to be a drone that at least outwardly appears to be in decent condition, in what is surely another humiliating poke in the eye for U.S. national security agencies.
The Pentagon declined to comment on the released images Thursday, a Defense Department spokesman told Yahoo News. But military analysts said it appeared to them to be the American drone in question.
"I have been doing this for thirty years, and it sure looks like [a stealthy U.S. drone] to me," Loren Thompson, a military analyst with the Lexington Institute and consultant to the RQ-170's manufacturer, Lockheed Martin, told Yahoo News in a telephone interview Thursday. "I think we are going to face the high likelihood that Iran has an intact version of one of our most important intelligence gathering tools."
Still, Thompson went on, the intelligence "windfall" to Iran from obtaining the advanced U.S. stealthy drone may be mitigated.

"I don't think the Iranians get as much out of it as they might hope," he said. "It probably came into their hands as a result of a technical malfunction. What that means is they still don't have a real defense against the U.S. flying other vehicles that have similar capabilities, without much fear of interception."
Analysts also noted that the video of the drone released by Iran did not show the drone's underside. "Pretty intact," the Center for Strategic and International Studies' James Lewis said by email. "Interesting that they covered the underside."
The New York Times reported Thursday that--unsurprisingly--the RQ-170 was lost while making the latest foray over Iran during an extended CIA surveillance effort of Iran's nuclear and ballistic weapons program.
"The overflights by the bat-winged RQ-170 Sentinel, built by Lockheed Martin and first glimpsed on an airfield in Kandahar, Afghanistan, in 2009, are part of an increasingly aggressive intelligence collection program aimed at Iran, current and former officials say," the Times' Scott Shane and David Sanger wrote. "The urgency of the effort has been underscored by a recent public debate in Israel about whether time is running out for a military strike to slow Iran's progress toward a nuclear weapon."
Iran in turn has complained that the drone overflights represent an act of aggression and violation of its sovereignty, and summoned the Swiss envoy--who represents U.S. interests in Iran--on Thursday to lodge a protest.
However, while the images of the U.S. drone surely allowed Iran to score another public relations blow against Washington, Iran may find it tough to generate much in the way of international sympathy for being the target of U.S. surveillance.
Last week, Iranian hardliners ransacked the British embassy in Tehran, prompting the United Kingdom to recall its diplomatic staff from Tehran and order Iran's embassy in London closed. Last month, the UN atomic watchdog agency issued a report raising concerns about research Iran is suspected by some nations to have conducted before 2003 on military aspects of its nuclear program. Iran has insisted its nuclear program is for peaceful energy purposes. In October, the United States accused elements of Iran's Qods force of plotting to assassinate the Saudi envoy to the United States. The United Nations General Assembly voted last month in favor of a resolution condemning the Iranian plot.
Amid its growing international isolation, Iran, unsurprisingly, seemed intent to play up the drone incident for all it could.
"China, Russia want to inspect downed U.S. drone," proclaimed a headline from Iran's Mehr news agency Thursday.
The RQ-170 Sentinel, however, reportedly did not use the latest U.S. surveillance technology on board, in part because as a single-engine aircraft, it was thought more likely to occasionally go down.
"The basic principles of stealthy aircraft are fairly well known," Thompson said. "In terms of [the drone's] on-board electronics and information systems, it is fairly routine in combat to require authentication codes to make them hard to unlock."
Other popular Yahoo! News stories:
Want more of our best national security stories? Visit The Envoy or connect with us on Facebookand on TwitterWant more politics? Visit The Ticket or connect with us on Facebook and follow uson Twitter.

Wednesday, November 30, 2011

@BabyKaely 6 year old supter star rapper find out @smarterhiphop

STUFF LIKE THIS IS GETTING 1,000 OF VIEWS A WEEK RECORD COMPANYS CANT STAND IT !!!!!
"FOllow her @babykaely!!! FOllow her @babykaely!!!!!
FOllow her @babykaely!!!

FOllow her @babykaely lol FOllow her @babykaely!!!" 
\\\








FOllow her @babykaely SHIE IS PRETTY AWESOME

Friday, November 25, 2011

the full mixtape by @Followmrtower & D. Lane download @SMARTERHIPHOP



mmediate download of 15-track album in your choice of MP3 320, FLAC, or just about any other format you could possibly desire.