Sunday, February 21, 2016

440-HZ VS. 432-HZ Your country Government is no your friend! Remember that

Music Pitch International Concert

In 1936 the American Standards Association recommended that the A above middle C be tuned to 440 Hz.

 This standard was taken up as the International Concert pitch. 

Believe me, they knew exactly what they were doing. “If one should desire to know whether a kingdom is well governed, if its morals are good or bad, the quality of its music will furnish the answer.” – Confucius Now how do we tell the world we need to re-set the International Concert pitch to A=432

 HZ? 

A=432 Hz, known as Verdi’s ‘A’ is an alternative tuning that is mathematically consistent with the universe. Music based on 432 Hz transmits beneficial healing energy, because it is a pure tone of math fundamental to nature. There is a theory that the change from 432 Hz to 440 Hz was dictated by Nazi propaganda minister, Joseph Goebbels. He used it to make people think and feel a certain manner, and to make them a prisoner of a certain consciousness. Then around 1940 the United States introduced 440 Hz worldwide, and finally in 1953 it became the ISO 16-standard. 

What is 440 Hz? 440 Hz is the unnatural standard tuning frequency, removed from the symmetry of sacred vibrations and overtones that has declared war on the subconscious mind of Western Man. In a paper entitled ‘Musical Cult Control’, Dr. Leonard Horowitz writes: “The music industry features this imposed frequency that is ‘herding’ populations into greater aggression, psycho social agitation, and emotional distress predisposing people to physical illness.

” READ MORE: http://www.disclose.tv/news/440Hz_Vs_432Hz/111123


Thursday, February 18, 2016

Did Aliens Leave Behind This 2,800-Year-Old Nokia?

Archaeologists digging in Austria found an ancient clay tablet that looks like a cell or cordless phone with keys etched with cuneiform characters that would imply it originally came from Mesopotamia. What is it? Is it evidence of an advanced civilization or time travel?
The tablet was reportedly found earlier this year by archaeologists digging in Fuschl am See, a city in the Austrian state of Salzburg. There’s not much information on what the researchers were digging for in this region but it probably wasn’t cuneiform tablets. Yet that’s what they found. Even more shocking, the tablet strongly resembles the cell phones they were most likely using to take pictures of it.
three phone
The tablet was dated to around the 13th century BCE. By that time, the Sumerian writing style known as cuneiform had already been around for a few thousand years. Cuneiform tablets aren’t unusual – an estimated 2 million have been excavated. The language was a mystery until the 19th century when its code was deciphered.
The cuneiform alphabet
The cuneiform alphabet
However, this particular tablet is unusual for a number of reasons. First, it was found in Austria, not Iran or one of the other modern countries that was once Sumer or Mesopotamia. The only cuneiform object found further away from there is the controversial Fuente Magna Bowl, which was discovered in Tiahuanaco in modern-day Bolivia. Since there’s no evidence that the Sumerians visited this ancient pre-Columbian city, how did the bowl or the knowledge of cuneiform get there?
The Fuente Magna Bowl
The Fuente Magna Bowl
By cell phone, of course! A controversial theory proposed by author Zecharia Sitchin is that aliens known as the Anunnaki came from Nibiru (the rumored Planet X beyond Neptune) and created the Sumerian civilization. The tablet looks surprisingly like a modern phone, with the 12 keys, a display and a ‘talk’ button. Could these extraterrestrials have tried to introduce the Sumerians to a phone-like communications device, only to find they weren’t ready for it and dialed them back to a stylus and clay tablets?
Is this what they could have had?
Is this what they could have had?
It would be interesting if some cuneiform expert could translate the characters on the ancient phone (unfortunately, Google translate does not yet recognize cuneiform).
Did some Anunnaki accidentally leave his phone in Austria? Probably not. The archaeologists believe the tablet was most likely  brought there by traders from Earth.
Is the tablet’s resemblance to a modern cell phone just an odd coincidence, a hoax  or evidence of time travel or alien contact? If only some phone hacker knew cuneiform.
http://mysteriousuniverse.org/2015/12/ancient-tablet-looks-like-cell-phone-with-cuneiform-keys/

Top 10 Best VPN Providers 2016




Advantages of VPN: Secure Your Communication on the Internet from Anywhere in the World

Virtual Private Networks (VPN) scramble and secure your information association over the Internet. What you transmit over the Internet is open for prying eyes, however you can ensure and conceal your IP location and information by utilizing a VPN. A VPN secures information in the middle of you and your business, or you can acquire namelessness and insurance for your own data utilizing a VPN supplier administration.

What is a VPN and How Does It Work?

VPN associations are now and again alluded to as "burrowing." Usually, you have some sort of programming introduced on your PC, and you utilize that product to interface with the VPN administration. This administration can be inside of a corporate system, or you can associate with a private server that you use for Internet access. You should confirm before getting to a VPN administration, which implies you require a client name and secret key to get to the system. This ensures your association, so no one but you can get to the administration.

After verification happens, you then have a safe association between your PC and the server's system. The server's director can constrain access to benefits from the server's end, yet generally, you have comparative access as though you are confirmed privately. All information is scrambled between your PC and the server, which is particularly vital when you get to private systems over the Internet.

ExpressVPN
1403votes
One of the most popular VPNs, featuring strong servers across 78 countries... Read more
  • 15,000+ IP addresses with 100 servers
  • Total anonymity & device protection
Exceptional 9.8 
Price$8.32 per month

SaferVPN
1009votes
User-friendly, boasting servers in 24 countries & excellent connection speeds... Read more
  • 7,500+ IP addresses with 150 servers
  • No throttling, caps or bandwidth limits
Outstanding 9.1
Price$4.79 per month

PureVPN
773votes
Provides internet freedom with complete online security in 141 countries... Read more
  • 80,000+ IP addresses with 500 servers
  • Unlimited bandwidth, server switches & speed
Excellent 8.7
Price$2.08 per month

HideMyAss
1157votes
An affordable, reliable & personal VPN with timely support in 221 countries... Read more
  • 126,000+ IP addresses with 934 servers
  • Compatible with all devices
Great 8.4
Price$5.99 per month

IPVanish
1937votes
One of the fastest growing tier-1 VPN networks with service in 60 countries... Read more
  • 40,000+ IP addresses with 325 servers
  • Boasts the highest encryption on the market
Great 8.1
Price$6.49 per month

VyprVPN
415votes
Superior speed with maximum security in 50 countries... Read more
  • 200,000+ IP addresses with 700 servers
  • 100% unique software & unlimited data usage
Great 8.1
Price$6.67 per month


How VPN Connections Benefit You

Organizations of all shapes and sizes advantage from setting up VPN associations. VPN permits representatives who are telecommuting to interface with a private system over the Internet while as yet securing their IP addresses. A VPN administration offers security to the business and the worker. The product is normally introduced on the representative's PC, and the worker utilizes the support of perform every day undertakings as though the representative is signed in privately.

Web clients can likewise profit by VPN administration. On the off chance that you need to enhance namelessness on the Internet, VPN suppliers give you an approach to get to the Internet through a "passage" administration. You interface with the VPN administration, and after that you associate with the Internet from the VPN administration. This sort of access veils your correspondence (by concealing your IP) over the Internet in light of the fact that the information is encoded. It likewise shows the VPN's IP address when you associate with a site, rather than your own. This implies your private home IP location is covered up when scanning distinctive sites.

Web advertising individuals in some cases require an outside IP to check site web search tool rank or utilize instruments that are just accessible to specific nations. VPN administrations offer you an alternate IP address, so you can "parody" your preferred IP address in the nation. Case in point, on the off chance that you need to interface with a site or administration that just permits United States clients, you can utilize a VPN administration in the United States to get to the administration. While checking site web index rank for a specific nation, you can utilize the VPN to check factual information from the objective nation.

Utilizing a VPN administration has a few advantages, however the general point of preference is the security through information encryption between your PC and the objective server. Utilizing a VPN, you can enhance the insurance of your information, and stay mysterious on the Internet. In the event that you require more help picking, read one of our VPN surveys and locate the best VPN supplier for your necessities.

http://www.top10bestvpn.com/

Friday, February 12, 2016

MTU Ping Test

MTU Ping Test

A series of ping tests using the command, ping www.expedient.net -f -l xxxx, where xxxx is the packet size, can be used to determine the optimal MTU for your connection.
  • Go to Start and select Run.
  • Type in cmd (Windows 2000/XP) or command (Windows 98/ME) into the Open: field. Hit the enter key or click OK. The DOS prompt should open.
  • At the DOS prompt, type in ping www.expedient.net -f -l 1492 and hit the Enter key.

  • Note the results above indicate that the packet needs to be fragmented. Lower the size the packet in increments of +/-10 (e.g. 1472, 1462, 1440, 1400) until you have a packet size that does not fragment.
  • Begin increasing the packet size from this number in small increments until you find the largest size that does not fragment. Add 28 to that number (IP/ICMP headers) to get the optimal MTU setting. For example, if the largest packet size from ping tests is 1462, add 28 to 1462 to get a total of 1490 which is the optimal MTU setting.
  • Change the MTU using DrTCP or editing the registry. See MTU Settings for further information.

MTU Maximum Packet Size Test Application

Title: MtuTest.exe
Subject: MTU Maximum Packet Size Test Application
Author: Kevin Ottalini (qUiCkSiLvEr) 
Website: http://qsextreme.com/mtutestCategory: Network Diagnostic
Keywords: MTU, packet, Ethernet, TCP/IP, fragmentation, ping

You can download the latest tool (v1.0d, 17Apr2011) from here: mtutest.zip 
Put the tool in a folder by itself and make a shortcut on your desktop for easy use.
Change History:
VersionDateComment
1.0d17Apr2011Added some pop-up information for the registry setting.
1.0c24July2010Updated to allow updating the registry string, additional testing for invalid settings.
1.0a110May2008Initial Public Release, Vista not tested
Note: This program requires Microsoft Dot Net 1.0, 1.1 or 2.0 to be installed on your system (see bottom of page for more info).
This tool works under Windows XP, WinXP 64 and Server 2003, it has not been tested under Vista or Vista 64 or other Windows Operating Systems.

Screenshot:


Summary:
Maximum Transmission Unit or Maximum Transfer Unit the largest physical packet size measured in bytes that a network can transmit.

For example, an Ethernet MTU is 1500 bytes.

Packets that are longer than the MTU must be divided or fragmented into smaller frames.  The layer 3 network protocol, typically IP, extracts the MTU from the layer 2 data link protocol such as Ethernet and fragments the messages into that frame size so that they can travel over the lower layer.

Every network has a different MTU, which is typically set by the network administrator or has a default Value set when the operating system was installed.

On Windows 95/98/XP/Vista you can set the MTU of your machine for best performance although typically the default of 1500 is usually the best.
Changing network properties for VISTA is not recommended at this time since the defaults appear to do a pretty good job already.

Ideally, you want the MTU to be the same as the smallest MTU of all the networks between your machine and a message's final destination, otherwise, if your messages are larger than one of the intervening MTUs, they will get broken up (fragmented), which slows down transmission speeds.

Trial and error is the only sure way of finding the optimal MTU, but there are some guidelines that can help.

For example, the MTU of many PPP connections is 576, so if you connect to the Internet via PPP, you might want to set your machine's MTU to 576 too.

Most Ethernet networks, on the other hand, have an MTU of 1500, which is the default MTU setting for Windows 95, 98, XP, Server and Vista.

Some Current and Historical MTU sizes:

Size Description
17914 16 Mbit/Sec Token Ring
4464 4 Mbits/Sec Token Ring
4352 FDDI
1500 The largest Ethernet packet size recommended. This is the typical setting for non-PPPoE, non-VPN connections.
1492 The maximum MTU recommended for Internet PPPoE implementations.
1472 The maximum ping data payload before fragmentation errors are received on non-PPPoE, non-VPN connections.
1468 The size DHCP prefers.
1464 The maximum ping data payload before fragmentation errors are received when using a PPPoE-connected machine. 
1460 Usable by AOL if you don't have large email attachments, etc.
1460 TCP Data size (MSS) when MTU is 1500 and not using PPPoE 
1452 TCP Data size (MSS) when MTU is 1492 and using PPPoE
1430 The size VPN and PPTP prefer.
1400 Maximum size for AOL DSL.
576 Typical value to connect to dial-up ISPs.
NOTE: 28 bytes need to be added to the Discovery value since this tool discovers the ping (ICMP) packet size which doesn't include the 28-byte TCP/IP header.
IE: 28 is the sum of IP and ICMP headers,  48 is the sum of IP, TCP and PPPoE headers.

Normally you should never need to change the MTU size but it doesn't hurt to check since some application may have tweaked it.

This little tool will scan a range of packet sizes and display the maximum size that won't fragment as well as your current MTU setting in the registry.

MtuTest uses your operating system native Ping application to do all the work, it basically just automates the manual discovery process and prepares a report.

MtuTest does not change your MTU, it only discovers and displays the results.  If you need to change your MTU, please click on the help button and read the information at DSL Reports: http://www.dslreports.com/faq/695
Kevin Ottalini (qUiCkSiLvEr)
http://qsextreme.com/mtutest


If this tool does not run on your system, or if you get an error like this:

It means that you don't have the Dot Net 1.1 or Dot Net 2.0 framework installed on your system.  This should be a part
of all XP systems these days and is part of your Microsoft Window Update.  If you are unable to find it there,
you can download and install the updates separately:

 
Be sure to run Windows update after installing these as there are probably additional security updates.

http://qsextreme.com/mtutest/

Komodo is triple champion, wins the Top Chess Engine Championship 2015! (updated)


TCEC Season 7 SuperfinalKomodo is the Grand champion of the 2015 edition of theTop Chess Engine Championship! It won the gold medal in the strongest match in Chess history after defeating Stockfish in the Season 8 Superfinal.
Komodo dominated the match and secured the title five games before the end of the hundred games marathon. It started with a victory in game 1 and later increased the difference by winning game 13. Stockfish managed to pull one back in game 36, but from then on it was Komodo’s show – it won games 38, 46, 72, 78, 83, and 86 to make a 8-1 difference. Despite Stockfish returning one game by winning game 88, Komodo secured the victory with score 53.5 – 46.5 after 100 games.
Komodo also proved dominant in earlier stages of the competition. It won Stage 1a, then easily cruised through Stage 2. In Stage 3 it gave the first warning to its main opponent by winning with a two points difference.
With this Season’s victory, Komodo successfully defended its title from TCEC Season 7 and together with the victory from TCEC Season 5 Komodo is now triple champion of TCEC. That makes it the engine with most titles in Top Chess Engine Championship, together with Houdini which won Seasons 1,2, and 4. Stockfish is the only other engine that has a title from the competition.
Season 8 was also very successful for the organizers of the event – Chessdom.com and ChessArena.com. The official website registered about 1 million unique sessions for the event, a 25% increase over the previous season.
TCEC Season 8 winners poster - Gold for Komodo, Silver for Stockfish and Bronze for Gull
TCEC Season 8 winners poster – Gold for Komodo, Silver for Stockfish and Bronze for Gull
(click on the image for full size)
(click on the image for full size)
Official Superfinal poster by Santiago Mendez
Official Superfinal posters by Santiago Mendez (https://www.behance.net/SantiagoMendez)
Top Chess Engine Competition Season 8 poster