хочу сюди!
 

Анастасия

41 рік, риби, познайомиться з хлопцем у віці 42-48 років

Замітки з міткою «security»

Bandits of Yanukovich and freedom

   Прошу ознайомитися з листом, що прийшов на адресу УВО. Це офіційна заява ректора Українського Католицького Університету до міжнародної спільноти з приводу політичних репресій нової антиукраїнської влади - якщо часто буваєте на іноземних сайтах, дуже прошу поширити.

   Найближчими годинами з"явиться українська версія заяви.

   Memorandum Regarding the
Visit to UCU of a representative of the
Security
Service of Ukraine (SBU) (former KGB)
(responsible for contacts with
Churches)
18 May 2010, office of the rector, 9:50-10:34

At
9:27 in the morning Fr. Borys Gudziak received a call on his private
mobile phone from a representative of the Security Service of Ukraine
requesting a meeting. The meeting was scheduled for 20 minutes later at
the rectorate of UCU. This official had had contacts with the UCU
rectorate a year ago at the time of the visit to the university of the
then President of Ukraine Viktor Yushchenko. He had made a visit to the
rectorate in the late afternoon on May 11 with regard to a request of
the Ecumenical and Church History Institutes to sign an agreement to use
the SBU archives. At that time members of the rectorate were away from
the office. He had, what Dr. Antoine Arjakovsky, director of the
Institute of Ecumenical Studies, called a “very good meeting.”

Upon
arrival on May 18 in a polite manner the agent related that certain
political parties are planning protests and demonstrations regarding the
controversial (and in some cases inflammatory) policies of the new
Ukrainian authorities. Students are to be engaged in these protests.
There is a danger that some of these manifestations may be marred by
provocations. He stated that, of course, students are allowed to protest
but that they should be warned by the university administration that
those involved in any illegal activities will be prosecuted. Illegal
activities include not only violent acts but also, for example, pickets
blocking access to the work place of government officials (or any
protests that are not sanctioned by authorities).

After his oral
presentation the agent put on the table between us an unfolded one-page
letter that was addressed to me. He asked me to read the letter and then
acknowledge with a signature my familiarity with its contents. He
stated that after I had read and signed the letter it would be necessary
for him to take the letter back. Since I could see that the document
was properly addressed to me as rector (I also noticed that it had two
signatures giving it a particularly official character) I replied calmly
that any letter addressed to me becomes my property and should stay
with me -- at least in copy form. Only under these conditions could I
agree to even read the letter (much less sign).

The agent was
evidently taken back by my response. It seemed that the situation for
him was without precedent because in my presence using his mobile phone
he called his (local) superiors to ask for instructions on how to
proceed. The superior refused permission to leave me either the original
letter or a copy, saying that the SBU fears I “might publish it in the
internet.” I questioned this entire procedure and the need for secrecy
and refused to look at the letter and read its contents. The young
official was disappointed and somewhat confused but did not exert
additional pressure and did not dispute my argumentation.
Our
conversation also had a pastoral moment. I cautioned the agent of the
fact that the SBU as the former KGB, with many employees remaining from
the Soviet times, has a heavy legacy of breaking and crippling people
physically and morally and that he as a young married person should be
careful not to fall into any actions that would cause lasting damage to
his own identity and shame his children and grandchildren. I sought to
express this pastorally as a priest. To his credit he both acknowledged
the past and declared his desire to serve the needs of Ukrainian
citizens. He also asked that I indicate to him if I feel that he is
exercising improper pressure.

Finally, I expressed my and the
general population’s profound disappointment that the work of the SBU is
so uneven, that security and police officers live lavishly on low
salaries because they are involved in corrupt activities, and that the
legal rights of citizens and equal application of the law are severely
neglected. I gave the recent example of my cousin, Teodor Gudziak mayor
of Vynnyky, who in February 2010 (three days after the election of the
new president) was arrested in a fabricated case of bribery that was set
up by a notoriously corrupt political rival and former policemen
through the regional and city police. Despite the fact that two weeks
before the fabricated affair the mayor, based on a vote of the town
council, had given the SBU a video of plainclothes policemen breaking
into his office and safe in city hall in the middle of the night and
using town seals on various documents the SBU took no action. (The
leadership of the Church, specifically Cardinal Lubomyr Husar, fears
that by manipulated association this case may be used as a devise to
compromise the rector of UCU and the whole institution which has a
unique reputation of being free from corruption.) I also related that I
had reliable testimony and audible evidence that my phone is tapped and
has been for many months.

The population of Ukraine continues to
fear and distrust both state security and police personnel because of
the woeful track record of law enforcement and because of the diffuse
practice of police intimidation of honest politicians, journalist,
common citizens and the wonton extortion practiced by security
institutions and police with respect to middle and small business. I
asked the young agent to convey these concerns to his superiors. I had
the impression that personally he is open to moral argument but that he
also was simply doing his job. It was clear to me that he was dutifully
“following orders.”

During our conversation the agent asked me
about the imminent (May 20-22) General Assembly of the Federation of
European Catholic Universities (FUCE) that will be hosted by UCU in
Lviv. He characterized it as an important event (it has received
considerable publicity) and asked about the program and whether it is
open to the public. It was clear that he would have been interested in
participating in the proceedings. I said that the main theme,
“Humanization of society through the work of Catholic universities,” was
announced in a press release as will be the outcome of the
deliberations. The working sessions of the university rectors, however,
are not open to the public. I explained that the 211 members of the
International Federation of Catholic Universities (IFCU) and the 45
members of FUCE follow closely the development of the only Catholic
university in the former Soviet Union. They will be monitoring the
welfare of UCU, especially since in Japan in March at the annual meeting
of the Board of Consultors of IFCU I had the opportunity to describe
some of our socio-political concerns and the threats to the freedom of
intellectual discourse (imposition of Soviet historical views,
rehabilitation of Stalin and Stalinism, to whom a new monument was
unveiled in Zaporizhzhia 5 May 2010) and new censorship of the press and
television that are incompatible with normal university life.

Subsequently,
as had been arranged at the beginning of the meeting, I called in the
UCU Senior Vice Rector Dr. Taras Dobko to whom the official repeated the
SBU’s concerns.

Besides noting the SBU’s solicitude for
stability in Ukrainian society there are a few conclusions to be drawn
from the encounter and the proposals that were expressed:

1.
Signing a document such as the letter that was presented for signature
to me is tantamount to agreeing to cooperate (collaborate) with the SBU.
The person signing in effect agrees with the contents of the letter and
their implication. In KGB practice getting a signature on a document
that was drafted and kept by the KGB was a primary method of recruiting
secret collaborators.
2. Such methods have no known (to me) precedent
in independent Ukraine in the experience of UCU and of the Lviv
National University whose longtime rector (and former Minister of
Education, 2008–10) Ivan Vakarchuk I consulted immediately after the
meeting. These methods were well known in the Soviet times.
3. The
confiscation of the letter after signature makes the letter and
signature instruments to be used at the complete discretion of the SBU
4.
The possible scenarios for the exploitation of such a document include
the following:
a.) In case of the arrest of a student the SBU could
confront the rectorate and charge that the university was informed of
the danger to students and did not take necessary measures to protect
them from violence or legal harm. In this case the university
administration could be charged with both moral and legal
responsibility. A charge with legal ramifications could become an
instrument to try to force the university to compromise on some
important principle (freedom of expression, forms of social engagement
and critique, even religious practice, all of which have precedent in
recent history). Furthermore, the authorities could use such a pretext
to exert a high degree of pressure on the university to curb any and all
protest by students.
b.) After a hypothetical arrest of a student
or students the students and their parents as well as other members of
the university community could be shown the document with which the
administration was warned and counseled to curb student activities.
Since the administration did not stop the students from the activities
that became the pretext for the arrest, parents or others could draw the
conclusion that the university does not have adequate concern for the
welfare of its students. This would be a most effective way of dividing
the university community and undermining the university’s reputation
among its most important constituents–students.
5. The apparent
genuine surprise of the agent at my refusal to do as requested could
mean that he is not used to such a reaction. He had explained to me that
he works with clergy on a regular basis. It could be assumed that other
clergy (who work with youth, students, etc.) have been approached and
that they have not refused to sign such documents.
6. Measures of
this nature create apprehension and unease. They are meant to intimidate
university administrations and students. They are part of a whole
pattern of practice that is well known to the Ukrainian population. The
revival of such practices is a conscious attempt to revive the methods
of the Soviet totalitarian past and to re-instill fear in a society that
was only beginning to feel its freedom.
7. Since only two of the
approximately 170 universities of Ukraine have been voicing there
protest regarding recent political and educational developments and many
rectors have been marshaled/pressured to express their support
regarding the turn of events, it is clear that in recent months fear and
accommodation are returning to higher education at a rapid pace. It can
be expected that UCU will be subject to particular attention and
possible pressure in the coming months. The solidarity of the
international community, especially the academic world, will be
important in helping UCU maintain a position of principle regarding
intellectual and social freedom.
8. Speaking and writing openly about
these issues is the most peaceful and effective manner of counteracting
efforts to secretly control and intimidate students and citizens. As
was apparent during this incident, state authorities are particularly
sensitive about publicity regarding their activity. Information can have
a preemptory, corrective and curing role when it comes to planned
actions to circumscribe civic freedom, democracy, and the basic dignity
of human beings.

It should be noted that on 11 May 2010, when
Ukrainian students were organizing protest activity in Lviv as well as
Kyiv, a representative of the office of Ihor Derzhko, the Deputy Head of
the Lviv Regional Administration responsible for humanitarian affairs
called the rectorate and asked for statistics on the number of students
participating in the demonstrations. UCU's response was that the
uniersity does not know how to count in that way.

Please keep UCU
and all the students and citizens of Ukraine in your thoughts and
prayers.

Fr. Borys Gudziak
Rector, Ukrainian Catholic
University
19 May 2010

Ransomhide 0.2.27 Portable

Утилита для удаления навязчивой рекламы, всплывающих баннеров и порно-окон, окон с предупреждением о блокировании системы до тех пор, пока не будет отправлено платное СМС. Предоставляет сервис получение разблокировочного кода, который создали уже многие антивирусные компании, но для того, чтобы получить код у них, требуется подключение к интернету, чего как раз не будет, так как вирус блокирует доступ к Сети.

Операционная система: Windows® XP/Vista/7 Язык интерфейса: Русский Размер: 1 Mb

Скачать программу

Рейтинг блогов

0%, 0 голосів

100%, 2 голоси
Авторизуйтеся, щоб проголосувати.

The Cleaner 6.21.2030 Portable

Обновилась The Cleaner, программа-охотник, нацеленная на отлов всевозможных троянов, кейлоггеров и прочих "подарочков". Утилита сидит резидентно в памяти и отслеживает активность приложений, может сканировать диски, тем самым, обеспечивая высокую защиту от многих известных троянов. База данных обновляется очень часто, так что даже самые новые разновидности вредоносных программ не укроются от внимания The Cleaner.

Скачать программу

Рейтинг блогов

100%, 2 голоси

0%, 0 голосів
Авторизуйтеся, щоб проголосувати.

Hitman Pro

Антивирусный сканер Hitman Pro предназначен для выявления и удаления различных шпионских и вредоносных программ с Вашего компьютера. Особенность сканера в том, что он использует базы сигнатур самых известных программ: Ad-Aware SE Personal, Spy Sweeper, Spybot Search & Destroy, CWShredder, SpywareBlaste, Spyware Block List, Sysclean Package, SuperDAT VirusScan. Сканер автоматически проверит наличие обновлений по всех базах и комплексно просканирует систему на предмет наличия шпионского ПО. Сканер не требует инсталляции и может работать с любого съемного носителя. Кроме всех возможностей присущих антивирусным сканерам подобного класса Hitman Pro имеет следующие отличительные особенности * Режимы работы: 1. Стандартный поиск; 2. Быстрый поиск; 3. Система раннего реагирования (обнаружение следов заражения системы). * Использование технологии Поведенческого сканирования - SurfRight сделал обширные исследования вредоносных файлов, чтобы определить общие характеристики (поведение) вредоносных программ. Сканер Hitman Pro использует эти исследования, когда он сканирует компьютер на наличие вирусов. * Подробная информация по каждому подозрительному файлу. * Поддержка ежедневного поиска инфекций во время запуска системы. * Короткое время сканирования - всего нескольких минут. * Поддержка автоматической загрузки подозрительных файлов для сканирования их в системе – Scan Cloud. Scan Cloud представляет собой кластер из нескольких компьютеров, постоянно работающих в сети Интернет. Невозможность ложных срабатываний на важные системные файлы, благодаря профилированию и белому списку. * Автоматическое создание точки отката перед очисткой системы от инфекций. Скачать программу


100%, 2 голоси

0%, 0 голосів
Авторизуйтеся, щоб проголосувати.

Error Repair Pro 4.2.3 Portable

Cлужит для того, чтобы содержать Ваш PC в оптимально работающем состоянии. Error Repair Pro очистит и восстановит ошибки в Вашем PC единственным щелчком мыши. Всего несколько несколькими легких шагами, Вы сможете просмотреть весь реестр. Удалит, и исправит ошибки для любых неправильных записей и обеспечит вывод списка найденных ошибок. Так же Вы можете выборочно (вручную) исправлять любую ошибку или автоматически восстанавливать после сбоя в работе. Keep your PC operating smoothly by using Error Repair Professional to scan, identify, clean and repair errors in your PC with a single click. With a few easy steps, it will scan your entire registry for any invalid entries and provides a list of the registry errors found. You can then choose to selectively clean each item or automatically repair them all. "95% of All PCs Have Hidden Errors on Them! Let Us Scan Your PC and Discover How Many Errors Are Lurking Inside It..." "Eliminate Them Instantly and Have The Peace Of Mind Knowing Your PC is Automatically Kept Error Free, 24 Hours A Day!" Информация о программе: Язык интерфейса: английский Год выхода: 2010 Размер (RAR): 2.27 Мб 

Скачать программу

Рейтинг блогов

100%, 2 голоси

0%, 0 голосів
Авторизуйтеся, щоб проголосувати.

Цікаве спостереження - погляд ззовні на протести..

Цікавий погляд ззовні на пртести в авторитарних та тоталітарних країнах на прикладі Республіки Білорусь 2020 року. Взято з Facebook.  Або про  рівень європейського розуміння того, що відбувається в РФ та Білорусі.

Влітку 2023 року литовське видання Delfi публікує документальний фільм, у якому показує учасників протестів у Білорусі влітку 2020 року, коли громадяни вийшли на вуличні протести, після того, як Олександр-3%-Лукашенко нахабно фальсифікував вибори, і були за це, буквально, забиті кийками, а багато хто навіть вбитий пострілами в потилицю. І це свідомо знаючи про масовий лукашенківський терор у країні, свідомо знаючи про тортури і вбивства навіть не те що опозиціонерів, а тих, що просто мають незадоволене обличчя, знаючи про Окрестино і все інше.
Чому не були розмиті (заблюрені) особи протестувальників у кадрі? Ні, зовсім не через злість, і не на замовлення КДБ РБ чи ФСБ РФ. Справа в тому, що справжні європейці просто не думають про можливість арештів і вбивств на підставі показу документального фільму, свого сюжету в новинах або опитування перехожих на вулицях Москви. Це за межами їхнього всесвіту, і навіть особистий/сімейний досвід життя у СРСР (а Delfi базується на країни Балтії) не стукнув у потилицю, ні. Нічого не змінилося з тих часів, коли  англійка, яка дізналася про сталінські репресії, щиро дивувалася тому, що жертви незаконних арештів не викликали поліцію. Рівень розуміння який був, такий і лишився.
Чисті ясні очі та абсолютна відсутність думок про долю героїв своїх фільмів та репортажів. «Ми люди, а вони — так», ага. Для авторів цих сюжетів ті, хто до кадру, — просто м'ясо, сировина, з якої вони роблять свою котлетку. Що там буде з м'ясом не дуже важливо, важливо, щоб покупцям сподобалася котлетка.

P.S. І це теж про безпеку. Спілкуючись з європейцями завжди варто пам'ятати, що вони зіллють вас катам-поліцаям навіть не зі зла, і навіть не з байдужості (вони можуть бути цілком щирими вашими особистими друзями), а так просто не замислюючись про наслідки своєї балаканини. «Потрібно було просто викликати поліцію»….

10 Best Home Security Systems In Tulsa, Ok

10 Best Home Security Systems In Tulsa, Ok

This is one of the reasons why people consider Protect America at top10pack as one of the most affordable option in the home security industry. There is a control panel included in every security package, and it serves as the command point for your entire home security system. You simply stick to each garage door, door locks, door window, motion sensors, smoke detectors, door window sensors, where it belongs. Protect America offers security cameras and video monitoring that you can stream live video footage from via their app. The first security camera is free and each additional is $179 out of pocket. It is worth the cost to most users for a true peace of mind to be able to check on the home when away on vacation, at work or on a date. A few months ago I was looking for more than just an alarm system for my home – I was looking for peace of mind for both me and my family.

  • A person don’t have in order to be a Band device owner in order to be a part of Neighbours; there is the standalone Neighbors application for iOS plus Android devices.
  • You’ll find an abundance of indoor and outdoor video surveillance options, including video and lighting combinations to monitor areas such as driveways and backyards.
  • Jamie created this business because he desired to provide their wife with security.
  • This company offers a portable Wi-fi camera, which means you don’t have to drill down holes in your own wall to set up it.

In the protection industry if the customer feels sculpted off they usually let the globe know. This implies these people have dedicated personnel to keep clients happy. Being the renter doesn’t imply you shouldn’t safeguard your belongings. A person can be the renter and obtain an alarm program with Protect The united states! It is a great alleviation since many security businesses require homeownership. May serve a double purpose like a child monitor for a lot of mother and father. Choose your color…5 choices; 3 options; each higher bundle comes with even more security equipment.

You can access other benefits, like customizable packages, professional installation, help learning how to use the equipment, and possibly even lower monitoring rates or other discounts. Remote monitoring features give smartphone users the ability to check in on their home’s status anytime using the monitoring company’s mobile app. If your system has video cameras, you can even check the feed from your cell phone. You can see if your packages were delivered safely or check on your furry friends inside while you’re out running errands. Top companies often offer cloud storage backup for footage.

Best Home Security Equipment For Renters

Being locked in to a contract could be good, because that will also means a person are locked in to a price. Nevertheless , it can become bad in case you don’t need the support for an prolonged time period, or you’re unsure if you’ll enjoy it.

adt security for renters

All of us will also maintain prior versions associated with this Privacy Plan within an archive with regard to your review. All of us use commercially affordable physical, technical plus administrative security steps and safeguards in order to protect the privacy and security of the personal information.

Many packages include the particular option to get one free digital camera whether that become an inside, outdoor, or even doorbell camera. Any kind of additional cameras are usually required to become purchased separately. Based to its DO-IT-YOURSELF policy, customers can build a specific smart home protection systems package that will best suits their own specific requirements, rather compared to choosing a particular plan. The gear available includes the wide range associated with devices manufactured simply by Z-Wave, including interior and outdoor digital cameras, video doorbells, plus door locks. Within addition, Link Online offers up notices in the situation of power black outs, a central supervising station, and the reliable cellular program. Amazon’s Ring — yes, the popular video doorbell organization — also provides a good affordable DIY home security alarm.

HSoft Key

Пользуясь HSoft KeYs Вам не нужно будет тратить много времени на поиски нужных ключей для антивируса или другой программы. Программа имеет русскоязычный интуитивно понятный и простой в использовании интерфейс. Поддерживает: - avast! - Avira - Cracks - Dr. Web - ESET NOD32/Smart Security - Kaspersky Internet Security/Antivirus - KeyGens - Norton - USB - Русификаторы - Любой другой антивирус Скачать программу


60%, 3 голоси

40%, 2 голоси
Авторизуйтеся, щоб проголосувати.

IObit Malware Fighter 1.1 Portable

Антивирусный сканер IObit Malware Fighter предназначен для удаления вредоносных программ с вашего компьютера. Сканер позволяет обнаружить, удалить и заблокировать нежелательные приложения. Продвинутый алгоритм поиска вредоносных программ (malware) и программ-шпионов (Spyware) обнаруживает и удаляет самые глубокие инфекции, защищая компьютер от различных угроз. Кроме всех возможностей характерных для сканеров данного класса IObit Malware Fighter имеет следующие отличительные особенности: * Уникальный "Dual-Core" движок, использование технологии на уровне драйвера и эвристическое обнаружение позволяет обнаруживать самые глубокие инфекции. * Три режима сканирования (Умное сканирование, Полное сканирование, Выборочное сканирование). * Поддержка защиты в реальном времени: 1. Процессов автозагрузки; 2. Текущих системных процессов; 3. Сети (от WEB страниц которые содержат потоки); 4. Запускаемых файлов; 5. Cookie; 6. Браузера; 7. Сменных носителей, подключаемых к USB-портам; 8. От проявления вредоносной активности. * Поддержка безопасности путем сканирования на основе облачных технологий. Полное название: IObit Malware Fighter 1.1 Portable Год выпуска: 2011 Оф.сайт: http://iobit.com Язык интерфейса: Английский Платформа: Windows 2K/XP/Vista/Windows 7

Скачать

ifolder

hotfile

Рейтинг блогов

100%, 1 голос

0%, 0 голосів
Авторизуйтеся, щоб проголосувати.

Sophos Anti-Rootkit 1.5.4 Portable

Утилита для обнаружения и удаления из системы вредоносных скрытых объектов (Rootkit). Программа Sophos Anti-Rootkit имеет удобный графический интерфейс, показывающий информацию о спрятанных системных ресурсах, включая имена всех распознанных руткитов и требуемые действия. Cпособна обнаруживать и удалять известные и неизвестные активные руткиты. В отличие от других имеющихся программ, утилита Sophos Anti-Rootkit выдает пользователю предупреждение в случае, если удаление какого-либо конкретного руткита повлияет на производительность или целостность операционной системы зараженного компьютера. Руткиты классифицируются как вредоносный софт, который может вызвать сбои в работе операционной системы. Их используют хакеры для быстрого и беспрепятственного доступа к компьютеру жертвы. Sophos Anti-Rootkit scans, detects and removes any rootkit that is hidden on your computer using advanced rootkit detection technology. Rootkits can lie hidden on computers and remain undetected by anti-virus software. Although new rootkits can be prevented from infecting the system, if you had any rootkits before you installed your anti-virus, they may never be revealed. Removing rootkits without compromising system integrity is particularly challenging and needs to be done with care. Simplified management Using Sophos Anti-Rootkit is easy. Whether you use its simple graphical user interface or run it from the command line, you can easily detect and remove any rootkits on your computer. Easy to use Sophos Anti-Rootkit provides an extra layer of protection, by safely and reliably detecting and removing any rootkit that might already have hidden itself on your system. Stay free of rootkits As part of its complete protection of endpoint computers, Sophos Endpoint Security and Data Protection has an integrated detection functionality that removes and prevents them being installed onto your desktops, laptops and servers. Информация о программе: Язык интерфейса: английский Разработчик: sophos.com Год выхода: 2010 Размер (RAR): 1.2 Мб    Скачать программу

Рейтинг блогов

100%, 1 голос

0%, 0 голосів
Авторизуйтеся, щоб проголосувати.
Сторінки:
1
2
3
попередня
наступна