Tuesday, October 13, 2009

None of your business: Encryption

There is a fine line between individual privacy and what your employer
needs to know. Should schools be able to run background checks on
teachers, to verify credentials and make sure they have to past history
of child abuse or molestation? Certainly. Should your insurance
company be able to consider your past medical history before selling you
a policy? This is not as clear. Should you be able to remain
completely anonymous online, without even the government able to identify
you? This would protect, for example, a homosexual sailor who would
like to keep his job in the Navy but stay in touch with a boyfriend (this
actually happened and the sailor lost his job, see Don't
Ask, Don't AOL, by Margie Wylie). But shouldn't the government
be able to trace hackers who steal important financial information from
consumers at Amazon.com?


The apparent solution to the lack of privacy on the internet is a technique known
as encryption. Encryption is running
data through filters. One filter scrambles the message, a second
unscrambles it. Anyone who picks up the information in transit would
(in theory) see nothing but garbled characters. (To experience what
this is like, try opening an image file in a word processor). However,
such encryption would also allow people to hide far more easily online.
Many hackers can also run intercepted data through filters of their own
and recover the information. Business moves far more slowly than
the underground community of hackers.

In 1993, the government suggested that the government should hold a
key to all encryption. This way, data could only be accessed by the
receiving part (who would hold a 'key') or the government.
This idea was called a Clipper chip.
The Clipper chip used a mathematical formula known as the SLAPJACK algorithm.
Proponents argued that the Clipper chip (also referred to as "key escrow",
or, later, "key recovery") would thwart hackers and that wiretapping was
often vital to convicting a criminal. Opponents argued that truly
clever hackers would easily find their way around the Clipper's defenses
and that the SLAPJACK algorithm used in the chip had flaws. (Seeman,
Outline)
The Clipper chip initiative was backed by the White House, the National
Security Administration (NSA), and the Attorney General's office and has
been revised several times since it's advent. (EPIC, The
Clipper Chip
) The Commerce department shifted the focus of the
Clipper to comply with European regulations and many companies expressed
frustration with the Clipper initiative. The limits placed by the
government on encryption levels (56-bit) have been proved ineffective and
in March, 1998, internal government files were discovered by EPIC that
admitted that "key recovery" was expensive and impractical (CDT, Cryptography
Headlines
).

In more recent events, Congress is reviewing the Security
and Freedom through Encryption (SAFE) Act [full
text]
, introduced in late February by Representatives Bob Goodlatte
(R-VA) and Rep. Zoe Lofgren (D-CA). The SAFE Act ensures that US
citizens may use any form of encryption, anywhere, denies the government
the right to "key recovery", and creates penalties for using encryption
to cover a crime, among other things. (CDT, SAFE
HR 850
). The House vote on SAFE will take place in September.

The Online Privacy Alliance,
made up of prominent companies in communications and technology like IBM,
AOL,
and Time Warner, is trying to help
the internet industry self-regulate encryption and other privacy topics.
This may be a step in the right direction - if industry and government
can work together, encryption could be regulated but commonly used.
Still, this leaves out individual consumers and others whose privacy is
actually what is being debated. The Online Privacy Alliance
suggests a caveat emptor approach - consumers should look for privacy
policies and be careful where they post their information.


Last revised: 7/23/99

None of your business: Privacy

Do you have a secret? Have you ever lied? Are there certain
things you don't want your parents to know? How about your friends?
How would you feel if in twenty years, in the midst of a successful career,
someone told your boss that once, when you were 17, you tried some pot
at a party. Or that you are gay or have AIDS. What if they
got this information from an e-mail that you fully expected would not go
beyond yourself and the recipient, but was intercepted and posted on a
web page? That would be an unfair violation of your privacy.

While the Constitution does not literally guarantee your right to privacy,
over the past 223-odd years the Supreme Court has granted privacy protections
under, most notably, the Fifth Amendment's protection for self-incrimination
and the Fourth Amendments protection from unreasonable search and seizure
(Privacy Basics)
Fair
Information Practices
have been loosely followed by government and
industry. These are not laws - they are a set of industry ethics.
A generic
copy
of these policies states that practices should be open, individuals
maintain the right to know and see what data is being collected from them,
data collection should be limited, specific, and secure, and that data
collectors will be responsible for the use of the information.


To discuss online privacy, there are a couple basic definitions to take
into account. I'm sure that no matter how little time you have spent
online, you have been asked if you would like to accept a cookie, or told
that a cookie has been sent. Well, of course,
you think at first. Mmmmm....cookie. Unfortunately, cookies
are not quite that tangible nor delectable. A cookie
is a piece of data that a web site collects about you when you visit (Cookie
Central,
Cookies).
The data varies with the web site - a commercial web site will collect
demographics
(that is, sex, age, and other advertising information) to learn more about
you, while an e-mail service may collect identifying
or personal (name, mailing address) information
to recognize you. Cookies allow a web site to be tailor made for
you as long as you stay in that domain name or each time you visit.
An CGI or JavaScript code in the beginning of the web page you visit instructs
you browser to send certain information to a server. If you have
ever checked a box saying "Remember My Password", you have set a cookie.

There are two aspects of privacy online. One is a need for protection
for yourself. Online stalking has been a problem, with people harassing
new 'friends' online and sometimes even threatening them, or confronting
them in person. The second is a need to protect your data from strangers.
This comes not from the fear of physical, but financial harm. The
first is the fear of being mugged on the way down to the mail box, and
the second is the fear of being mugged on the way back, while carrying
your paycheck and credit card bill.

The Communication Decency Act (CDA, see also section How
Obscene!: The Plot Thickens
) stated that telecommunications,
meaning the internet, e-mail, chat and chat programs (including IRC, AIM,
and ICQ) should not be used to purposely harass or intimidate. You
cannot e-mail bomb people. Also, under the law you must identify
yourself. This part of the CDA was unaffected by the Supreme Court
decision regarding obscenity clauses.

There are three levels
of online privacy provided by systems administrators (admin), like the
guy in the back room at school or AOL monitors. (Bowman, What
Is Privacy?
). The first is Complete Privacy. Here, the
admin agrees not to read any of your e-mail or keep track of where you
go on the web in any way. This obviously allows the most privacy,
but often creates a liability to admins and Internet Service Providers
(ISP). The second level is Almost Complete Privacy. Here admins
will look at your e-mails and chats if they suspect any sort of illegal
activity. The third level is No Privacy. Here admins are allowed
to look at any email you send, whether the subject is "My Plan To Plunge
The Internet Into Darkness" or "My Rave With Dave".

Your privacy is protected by some laws already. The Electronic
Communcations Privacy Act, created in the late 70's in response to the
Watergate scandal, already protects against interception of electronically
transmitted messages as well as the privacy of information stored within
a private computer system (Bowman, What
Is The Electronic Communications Privacy Act ("ECPA")
). But in
March of 1992, the FBI suggested that all communications be designed so
that law enforcement agents could tap into them from afar (Cranor, Digital
Liberties
). This would have made e-mail, the internet, chat rooms,
and even ISPs vulnerable to be intercepted at any time. Opponents
claimed that the first version of the bill gave the FBI privileges it had
not been afforded in older wiretapping laws. The FBI worked with
Senator Patrick Leahy (D-VT) and Representative Don Edwards (D-CA) to refine
a new bill (Edwards/Leahy
Digital Telephony Legisl
ation (HR 4922/S 2375)), which was passed almost
unanimously into law. ISPs were now exempt from the law. Some
considered this a failure, but most agreed that the protection afforded
to ISPs was a victory or at least a good compromise. However, this
simply makes intercepting data illegal. It does not make it impossible.

A recent survey by the Georgetown
Business School
states that 93% of commercial internet sites collect
some sort of data that may be used to identify your (this may be your home
address, you e-mail address, name, etc.) and 57% collect demographics. Over
one third of these sites did not post any information that they were collecting
data and/or what it would be used for. The report concluded that
only 10% of the commercial web sites that collected personal or demographic
information followed fair information practices in respect to notice, choice,
access, security and contact information. The Center for Democracy
and Technology believes that "the study shows that definite progress
has been made in making many more Web sites privacy sensitive. But those
numbers also show that real fair information practices are incorporated
by only a small number of sites and most sites have yet to embody more
than minimum disclosure of their information practices."




Last revised: 7/23/99


Sunday, September 27, 2009

Browse the Internet Virus Free

Copied: Code speck

The internet is a dangerous place these days no matter if you have a PC or MAC, you download or you don't. In this article I'm going to show how to protect your Windows PC with some free software that essentially makes your PC impervious to ANY virus (or potential unwanted programs - PUPS) while browsing websites on the Internet.

First, let me explain how 90% of my customers get infected. We'll use "Bob" as our example.

  1. Bob never installs his Windows critical updates for whatever reason.
  2. Bob has basic antivirus (also known as signature based antivirus) that may or may not be updated.
  3. Bob gets on the Internet everyday and mainly reads the news from various news site, searches for stuff on Google and maybe plays free online games.
  4. One day while searching for a cheap cell phone Bob all of the sudden is inundated with lot's of popups and a new (fake) antivirus program that says he's infected and needs to buy this antivirus "right now!!!"
  5. Bob is infected with malware and a fake anti-virus.

Bob could have prevented this malware infection with a few free anti-malware applications, and when I say a few I only mean two:

  1. A free anti-virus - There are 3 free anti-virus applications that are pretty robust and easy for the average PC user to install. Avira's AntiVir, Avast Antivirus and Grisoft's AVG Free.
  2. Sandboxie Free - This application places all files downloaded from the Sandboxie web browser into a "virtual computer" that runs on your computer (ya never know it's there). If configured properly, once you close the Sandboxie web browser the virtual computer is destroyed along with any malicious files that you may have accidentally downloaded to it.

Now we're going to secure your PC with both applications: A free Anti-virus and the Sandboxie web browser.

  1. Pick your antivirus. My personal favorite is Avira, but any of the 3 anti-viruses I previously mentioned will work just fine. Download, install and update it (updates are usually automatic). Remember, anti-virus by itself is not enough protection for your PC these days, you need additional protection.
  2. Now it's time to install Sandboxie. You can go to Sandboxie(dot)com and download the free version of Sandboxie from there. Once Sandboxie is installed you should have an icon on the desktop called "Run Sandboxed Web Browser". If the shortcut is not on the desktop you may click start, all programs, Sandboxie, then right-click over "Run Sandboxed Web Browser" and click send to desktop. Next, we'll configure the Default Sandbox to DELETE all contents once the Sandboxed Web Browser is closed. This is the most important part.
  3. Click Start (or click the Windows globe for Vista).
  4. Click All Programs.
  5. Click Sandboxie.
  6. Click Sandboxie Control.
  7. Right Click Sandbox DefaultBox.
  8. Click Sandbox Settings.
  9. Click Delete.
  10. Click Invocation.
  11. Click the First Checkbox (automatically delete the contents of the sandbox).
  12. Click Apply and OK.
  13. Close Sandboxie Control.

Ok, now we're all set to say goodbye to any form of malware (viruses) that get's installed via browsing ANY site on the internet. Go ahead and double click "Run Sandboxed Web Browser". Looks just like you're default web browser (firefox or IE) right!

Notice the little # signs on each side of the title bar at the top of the web browser. This means that ALL files downloaded unintentionally are stuck inside the sandbox and are DELETED as soon as you close the web browser. Basically this means you can visit any website without having to EVER worry about getting infected. That is the power of browsing the web via a sandboxed web browser.

One last quick note. If you want to intentionally download a file (like a picture) Sandboxie will ask you where you would like to "recover" the file. This is up to you. You can recover to the default folder or choose a folder. Please be aware that recovering files can be dangerous, this is where you'll need your free anti-virus (to scan recovered files).

About the Author:

My name is Matt and I offer st. louis computer repair and consulting services. If you're not in St. Louis I can help with your PC remotely right over your internet connection! Call my St. Louis office at 314.226.4279 and schedule your appointment today. I also have a site that reviews cheap all in one printers.

Article Source: ArticlesBase.com - Browse the Internet Virus Free

Thursday, September 17, 2009

How to Remove Spyware from Your Computer?

Copied: Code Speck

How can we remove spyware from our computer? This is a tough task for those people who know little about computer knowledge. Fortunately, you can take a few minutes to read this article and follow the steps bellow to protect your computer from spyware.

There are two main paths that spyware act on a computer. One is to monitor everything the users do in his system and then transfer the information or data it collects from this computer to the third party of this spyware. The other is to catch the setting of IE or other browsers on users’ computer and then change it to other unwanted, malicious or insecure websites. Large scale of pop ups will show up while you use this infected computer and your computer system will finally be a mess. For the safety of your PC, you have to pay enough attention to deal with spyware.

If you really want to prevent spyware, you can follow the five steps here:

1. Backup your important files and data first and then disconnect the internet;

2. Download the anti-spyware program from safe website.

3. Run the Full scan or Online Scan and remove the detected threats.

4. Install a forcible Fire Wall.

5. Contact the support team of security program once you have any question on the program or your computer.

The existence of spyware definitely will slow down your PC; bring other negative effect to your computer. It is so bad to your computer life. You should equip your computer with forcible security or anti-spyware program and be watchful while using computer, then you can be at ease with your computer experience!

http://www.threatremove.com/how-to-save-your-computer-from-viruses/

About the Author:

Spyware Cease, started its development cycle in early 2006. It is is a highly-integrated anti-spyware program that enables you to prevent and clean up the latest spyware threats like keyloggers, trojans, adware, malicious cookies tracking, browser hijackers, worms, phishing attacks and other malicious spyware attacks, effectively eliminating unwanted pop-ups, minimizing identities thieves and speed up PC performance.

Article Source: ArticlesBase.com - How to Remove Spyware from Your Computer?

How to Save Your Computer from Viruses?

Copied: Code Speck

Many computer users are not masters in solving computer problems. So they always like to turn to some professional persons for help. However, it will be better if we can grasp some basic knowledge about computer and sometimes we can even save our computer from viruses by ourselves. So what should we do for this?

In the first place, we should know the symptoms of an infected computer. And this is especially crucial for computer rookie because it is difficult to tell whether your computer has been infected or not. You know that because of the power of internet and the development of computer technology, computer virus will also update and be more complex than it just showed up decades ago. So if we want to distinguish infected files and remove them successfully, carefulness and patience are needed as well as relative knowledge. Here are some examples for an infected computer:

Your computer freezes or block up frequently;

You get lots of error messages or popups;

You can’t load some programs or applications as usual;

Your browser goes blank without any reason or become empty when you click some websites, etc.

What can we do if our computers really get infected? Don’t be panic! You can follow the steps bellow and save your computer by yourself!

  1. Backup the important documents or information first.
  2. Download a forcible security program for your computer.
  3. Run the Online scan of this program to detect threats on your computer.
  4. Disconnect your computer from internet and run the Full scan.
  5. Remove the detected files found by your anti-virus program. For those files in Quarantine folder, you can delete them after confirming.

After the above steps, you can also send your Scan results or Analysis report to the support team and ask for further help for your problem. If possible, have your anti-virus program keep up-to-date whenever you use it. This will be the guarantee of your computer security.

About the Author:

Spyware Cease, started its development cycle in early 2006. It is is a highly-integrated anti-spyware program that enables you to prevent and clean up the latest spyware threats like keyloggers, trojans, adware, malicious cookies tracking, browser hijackers, worms, phishing attacks and other malicious spyware attacks, effectively eliminating unwanted pop-ups, minimizing identities thieves and speed up PC performance.

Article Source: ArticlesBase.com - How to Save Your Computer from Viruses?

Wednesday, September 16, 2009

Internet and Computer Fraud


White Collar Crime Unit
The Department of the Prosecuting Attorney's White Collar Crime Unit prosecutes traditional economic crimes such as theft, forgery, credit card fraud, and identity theft. It also prosecutes a variety of high-tech computer crimes, including computer fraud, computer damage, and unauthorized computer access crimes.

White Collar Inquiries
The White Collar Crime Unit receives frequent inquiries from the public about internet and computer fraud. Some inquiries turn out to be civil matters rather than criminal matters. Civil matters are referred elsewhere for resolution. Criminal matters are investigated by a team of skilled investigators who prepare cases for prosecution by the deputies of the White Collar Crime Unit. They aggressively pursue criminals suspected of computer crimes and have an excellent track record for seeking restitution when possible.

Prevention
It is far easier to prevent computer crime than it is to prosecute it and secure restitution, and most victims will never fully recover all that they have lost. For this reason, the White Collar Crime Unit also focuses on Crime Prevention, providing computer safety information and extensive community outreach.



Protect yourself! Learn all that you can on the ways to prevent these types of computer-related scams.

Just as you should take caution with any phone calls or mail you receive about suspicious-sounding deals, you should do the same when you're online. Internet fraud can be found in chat rooms, e-mail, web sites and message boards. Listed below are the top ten online frauds for 2003, which cost each victim an average of $5271:

1. Online Auction Sites


Nearly 90 percent of Internet fraud was associated with online auction sites. These sites offer anything from high-value collectibles to computers. Generally you will send money for the item, but you will receive a lower-quality or lower-priced item, or nothing at all.

2. General Merchandise Sales

Sites that offer retail goods. Like the online auction sites, what you pay for may not be what you receive.


3. Nigerian Money Offers


Someone claiming to be a representative of the Nigerian (or any other country's) government asks you to help move millions of dollars of overpayments into overseas bank accounts. They ask for your bank account number, so they can transfer the money into your account temporarily and claim you will receive a percentage of the money for helping. In actuality, they drain your bank account.


4. Information / Adult Services


Web sites that offer music, pictures or games for download. Some downloads could contain viruses that can infect your computer, and some can charge your phone bill (if using a dial-up modem).


5. Internet Access Services


So-called "internet providers" that promise free or low-priced Internet access, free web page design or other Internet services, then do not deliver.


6. Computer Equipment and Software


Computer equipment and software that was paid for but was never delivered or was not what you ordered.


7. Work-At-Home Schemes


Business opportunities that claim you can make thousands of dollars a month working at home. These schemes usually require buying materials or information about the business. What you receive in return is inadequate materials or nothing at all.


8. Lotteries


False promises to help a consumer win money or collect on winnings from foreign lotteries.


9. Fake Checks


Consumers are paid with phony checks for products or services, with instructions to wire back some of the money to the offender.


10. Advance Fee Loans


Loan schemes that charge an up-front fee, and promise you will be approved for a loan regardless of your credit history.


Also be leery of online investment schemes. Remember, if it sounds too good to be true, most likely it is too good to be true.

In Hawaii, Internet fraud can be prosecuted under traditional theft statutes. If the amount of the victim's loss exceeds $300.00, the suspect can face up to five-years in prison and a $10,000.00 fine. If the amount of the victim's loss exceeds $20,000.00, the suspect can face up to ten-years in prison and a $25,000.00 fine.

Computer Crimes


With the advent of the Internet, the phrases "computer tampering" and "network intrusions" (commonly known as "hacking" or "cracking") have taken on several new meanings. The Hawaii Penal Code has been updated to include the realm of cyberspace.

Breaking into someone's computer may seem like fun, but the consequences are not: Under Hawaii law, breaking into someone's computer and causing damage may result in a prison sentence of up to ten-years and a $25,000.00 fine. Merely accessing a computer and obtaining information could result in a prison sentence of up to ten-years and a $25,000.00 fine.
The Department of the Prosecuting Attorney takes computer-related crimes very seriously. As criminals have become more high-tech, so has law enforcement. The Department of the Prosecuting Attorney has access to considerable resources, including investigators trained in computer forensic examination who assist us with a criminal prosecution.


Telecommunication Fraud


The telecommunications industry is booming, as is the amount of fraud associated with it. Although there is no guaranteed fix to stop this type of fraud and abuse, some fraud can be prevented by adopting the following procedures, both at home and the office:

  • Insist everyone use common sense when using the telephone.
  • Catch problems early by reviewing your telephone bill immediately after your receive it.
  • Question long calls, calls with high costs-per-minute or calls made late at night or after business hours.
  • Monitor your total telecommunications usage/costs each month, and if there is a sudden increase, investigate it.
  • If you receive a call about free cable television, free cellular phone, free long distance or any other telecommunications deal that sounds too good to be true, most likely it is too good to be true.

Prevention

"Spam Scam" – Spoofing You Out Of Personal Information


Consumers should be on the alert for sophisticated "spoof" e-mails that trick unwary and unsuspecting Internet users into giving personal information that can be used to drain bank accounts, fraudulently get credit cards and commit other crimes.

The scam is commonly called "spoofing" because the spam mail sent uses familiar or legitimate-sounding names of companies to gain personal information. This scam capitalizes on names that are close to the real one. In a recent example, instead of the real Earthlink.net, the spam mail used an URL like www.earthlinkservice.com. Small and large companies have been spoofed, such as Bank of America, Best Buy, PayPal and Ebay.

Consumers may be sent e-mails that seemingly come from a company with which they've done business or be sent by hyperlink to a phony web site - designed even to look like the legitimate business web site. One victim reported getting a seemingly authentic e-mail from what appeared to be his Internet Service Provider telling him his credit card had expired and new information was needed. He was asked to provide a credit card number and to give his bank account number and ATM PIN number.
Another name for "spoofing" is "phishing". In "phishing" scams, "phishers" send millions of bogus e-mails with the hope of luring victims to a fraudulent (or spoofed) website where the Internet user would then be tricked into divulging personal information, such as passwords, account numbers, or credit card information. According to Kiplinger's Magazine, up to five percent of e-mail recipients respond to phishing e-mails, leaving them vulnerable to credit card fraud and identity theft.



Tuesday, September 15, 2009

How to Update your Computer with Latest Computer Accessories

Author: Vinnit

Are you a technology driven person Do you want to pool in whatever is latest and exciting in your computer or laptop Well, if such is the case with you, then you must be looking for extremely proficient, smart and handy computer accessories. With the latest technology hailing in, the computing standards of an individual have undergone a drastic change – for the better! Computing is no more a story of working with traditional computer sets as today it demands a list long of additional accessories to add flair in one’s ways of computing.

Talking about the list of computer accessories, there is a lot available which a person wishes to buy. But an individual should always heed to the factor that as to what he actually requires at his domicile. There are numerous computer peripherals that one can get along with his computer such as speakers, printers etc. but one has to see whether these things are actually needed or not.

Connectors play a vital role in your day to day computing needs. But without the availability of basic computer peripherals it stands almost as a handicap. To make it work efficiently, you should buy latest computer accessories like parallel port, serial port, Ethernet network, universal serial busmodem, PS2 port etc. Consider those connectors which deliver a good air flow as they help in proper functioning of your computer devices.

Flash products come next in the list of products driven by latest technology among computer accessories. These products are used to store your digital data and which can be retained for daily use. The alluring advantage is that they can be easily plugged in to any computer and are effortless to deal with. These latest computer accessories are included in the list of vital purchases for the simple reason that they are easy to carry. You can buy them as pen driver, USB driver, thumb driver, key driver etc. They feature a bulk of storage capacity and are advantageous to take in use for data storage needs.

The crucial need of transferring data from one computer to another is best dealt by the switch boxes. These are used in case computers do not function good in swapping the devices like monitors and PS2. If done so, they can harm the functioning of other computer. One can buy latest Computer Accessories online as well, to increase the functionality of their PC and enjoy new dimensions like never before!

About the Author:

Vinnit Alex is well known author has written article on Acer Laptops, Computer Store, UPS, Online Shopping and many other subjects.

Article Source: ArticlesBase.com - How to Update your Computing with Latest Computer Accessories

Wednesday, August 26, 2009

The real story behind Uchiha Madara

The real story behind Uchiha Madara

Sasuke: Uchiha Madara's Reincarnation
By: Bloody Hurricane


Itachi's Change

As we all know that during a time span of half a year after Itachi's entry into ANBU, he began to have a sudden change. His speech and action toward the clan became increasingly different by the age of 13.

What event could have marked this change within Itachi?
Why would Itachi suddenly detest the clan?

Scenario

Sometime while on a mission within ANBU, Itachi met Uchiha Madara. At first, Itachi attempted to fight him, greatly undestimating the power of the first ever Mangekyou Sharingan user. Although easily defeating Itachi, Madara noticed that this boy was no ordinary Uchiha. He noticed that Itachi's strength and brillence in battle was somthing that regular Uchiha members did not possess, so he took intrest in Itachi's abilites. He then tells Itachi that if Itachi desires true power, then he will seek the truth of his clan, directing Itachi to the Uchiha Shrine, where the secret of the sharingan can be found.

The Secret

Mentaly distraught by his chance meeting with Uchiha Madara, Itachi wondered how anyone could posess that much power. A power far greater than he, the genious of the Uchiha Clan.

Had he not done everything he could do?

Intrested by Madara's words, Itachi tells Shisui about his encounter, confident about confiding in his best freind. He tells him how Madara told Itachi that if he wanted the truth of the clan, he should go and seek knowledge in the Uchiha Shrine.

Both Itachi and Shisui check the Uchiha Shrine, later that night. What they see is truly astonishing.

The true sharingan, and the Uchiha clan as a whole, is merley a tool of destruction. Uchiha clan members are vessels for a greater power. Only those who fulfil a special terrifying requirement can unlock a true sharingan. He who posesses the true sharingan, the Mangekyou, will eventually lead the destruction of the entire Uchiha Clan

Completly alarmed at their findings, Itachi and Shisui dont know what to do next.

Why had Madara Shown Itachi this?
What did he hope to gain by revealing this to him


"The Path"

That night, both Itachi and Shisui sware that they would take immediate steps to prevent anyone from ever finding out about the true sharingan. To do this, they must keep the secret guarded from the rest of the clan. They called these measure of cautionary steps "the path".


Content that he was doing something to preserve his clan, Itachi thought all was well, until he started questioning himself and his actions.

Is this clan a truly worth this effort?
Could the destruction of the Uchiha Clan be prevented even if people gained Mangekyou?
Was the reason the clan did not gain mangekyou because they were simply scared and weak?

Second Encounter

Eager to confirm if this clan was truly worthy, Itachi tells Shishui to meet him on the outskirts of the clan, where he has met Uchiha Madara before. Itachi wants to ask Madara his own interpretation of the Uchiha Shrine. But he also wanted Shisui's help if anything happend. ( So they both stayed behind and didn't participate in the Celebration that night )

Itachi arrives, but Shisui never makes it. Itachi wonders where Shishui is, but soon after, Madara appears before him.

Madara asks him if he has read the truth. Itachi tells him that he has read it but does not understand it. ( feigning ignorance and avoiding Madara from realising that Itachi had planed to keep the truth from the rest of the clan )

Madara tells Itachi that he was the first to gain the true sharingan, the Mangekyou Sharingan. He then explains that the Uchiha clan is simply a vessel of his own terrifying power. Through him, the Uchiha Clan was born in the first place. Also, he has lived for many years, and searches for the one person whom is capable enough to handle his power. He who is capable of Madara's power, is the person who will be able to kill him... ( capacity that Itachi soon spoke of )

Next Madara then tells Itachi the very thing that he hoped to avoid. Madara tells him that he knows about Itachi's plan to keep the truth from the clan. Itachi asks Madara why he showed him the truth, to which he explains that he knew Itachi was most capable to handle the truth, and reprimands him for telling Shisui, someone who was far less capable than he. Madara goes on to tell Itachi that he has taken steps to clean up the mess Itachi has caused, and that he, Madara, had killed Shisui earlier on that night.

Hate takes over him, and Itachi attempts to fight Uchiha Madara again. Madara explains that it is futile, and then uses Tsukiyomi on him, making him relive Shisui's death firsthand, for the next 24 hours. Itachi's hatred towards himself, Madara, and the clan together, has awakend somthing special, Madara explains. The Mangekyou sharingan.

Itachi's Realization

The net day, the Uchiha Police Force, comes and questions Itachi about Shisui's death. Itachi, who knows exactly how his best freind has died, takes great offense to this. When given the supposed suicide note that Shisui had written, which says:

So he knew, Itachi thought. And to add insault to injury, he attempted to frame him with this note that he had copied with his sharingan.

Why was this happening to him?
Why couldn't the clan see what was going on udner their noses
Why had he invested all this time into the preservation of this clan, only for it to end up like this.

They were simply judging Itachi by how the situation appeared, not realising the truth.

The Mangekyou Sharingan had given him a burst of hatred that he could not avoid no matter how hard he tried to. Uchiha Madara's Influence became evident. With his newly aquired Mangekyou sharingan, he could even hear Madara's voice inside his own head, trying to dictate his actions.

Itachi, stil under Uchiha Madara's evil influence, thinks that the Uchiha Clan was headed no where. All sharingan users were only tools of destruction by Uchiha Madara. After that, Itachi exploded, Confronting all his inner thoughts.

The Uchiha Clan was afraid..afraid of what might happen with power that they should be entitled to. They were afraid, because they were weak. Itachi then questions how someone can be afraid when they dont understand what will happen.

Hatred, Death, and Reincarnation

Itachi struggled to overcome his hatred and overcome what was going on. But he couldn't. Madara, still inside his head, tells Itachi that he must kill the clan, because they are unworthy of his power. But Itachi's will was strong.. he soon rejected Madara's influence. Madara then tells him that with all the time he has invested in Itachi, it turned out that He was unfit to weild the Mangekyou Sharingan. There was only one other person who was worthy of that power, and it was Uchiha Madara himself.

But this triumphant rejection of Evil was short lived. When Itachi Uchiha arrived back home after his Anbu mission, he was emotionally crumbled. Madara had killed the entire clan. He was sure it was him. It had to be.
While Desperatly trying to search for Madara, and avenge his clan, Itachi spotted his brother, Sasuke Uchiha. Why hadn't Uchiha Madara killed Sasuke? Even though Sasuke was at his academy classes, If Madara wanted to erradicate all the weak Uchiha then little sasuke would surley have been killed. And then Itachi remembered everything Uchiha Madara had told him.

Madara then tells him that with all the time he has invested in Itachi, He was unfit to weild the Mangekyou Sharingan. There was only one other person who was worthy of that power, and it was Uchiha Madara himself.

Through him, the Uchiha Clan was born in the first place. Also, he has lived for many years, and searches for the one person whom is capable enough to handle his power.


The only person who was capable of handling Uchiha Madara's power.. was Uchiha Madara himself, he remembered. Sasuke was the token Uchiha suitible enough tp have Mangekyou. All along, it was Sasuke. Sasuke and Uchiha Madara were connected. They were the same. Sasuke, was....... Madara's reincarnation.

Itachi's Goal

Realising this, Itachi noted that even if he did fight Madara Again, he would not be able to kill him. Only Sasuke had the power to kill Uchiha Madara. However.. Sasuke must first get Mangekyou Sharingan. To do this he must commit himself to hatred.. hatred of The Clan, hatred of Itachi, and hatred of himself. Engulfing himself to hating all 3 would unlock the Uchiha Madara's Manegekyou sharingan.
Itachi tells Sasuke how to unlock mangekyou sharingan, thinking that if he is able to kill the closest person to him, then he will be able to completly consume himself with nessacary hatred of Itachi, and he will be able to fulfil the other 2 requirements of the path to gaining Mangekyou. But only one phase can be carried out at one time.

Itachi also, says that Sasuke must gain the MS for "his sake" as well, hinting freedom from Uchiha Madara's Influence.

Itachi tells Sasuke that there are 3 possible MS users, acknowledging Uchiha Madara as the this MS user

So Sasuke learns the truth of the Sharingan, but is unaware that Uchiha Madara is referenced in it.

Sasuke doesn't fully understand the situation


As to what exactly Uchiha Madara is, and how he came to be, I wont go to much into that, because I beleive some of Yasha's theory about him having a connection to Tengu.

I do beleive that Itachi's joining the Akatsuki is another method of trying to rid Uchiha Madara, althought at this time, I wont go to much into that, since that is another theory in its own. I hope you enjoyed the theory.

Monday, August 10, 2009

THE CHESS MASTER | Originally aired Dec. 3 on CBC-TV; Repeats Dec. 7 at 11pm on CBC-TV; Check your local listings for CBC Newsworld airings



On March 30, 2009 the long awaited public inquiry into the dealings between former Prime Minister Brian Mulroney and businessman Karlheinz Schreiber will finally begin.
However, the "Commission of Inquiry into Certain Allegations Respecting Business and Financial Dealings Between Karlheinz Schreiber and the Right Honourable Brian Mulroney," or the “Oliphant Commission” as it will become to be known will NOT be dealing with the so-called “Airbus Affair.” the fifth estate reveals how we came to such a limited mandate.
For weeks, it was a daily spectacle that fascinated the country. In November, 2007, a Parliamentary Ethics Committee began to hear testimony that, many believed, would finally unlock the mysteries of what has become known as the Airbus scandal: who received secret commissions from the sale of Airbus planes to Air Canada?
Expectations were high; explosive testimony was anticipated, particularly from the man who has been at the centre of the Airbus scandal for more than two decades, German/Canadian businessman Karlheinz Schreiber. What happened next confounded the Committee and everyone else watching.
Reporter Linden MacIntyre shows how Schreiber’s canny tactics manipulated the drama and the facts. In new documents gained by the fifth estate and in interviews with main players in this political drama, The Chess Master shows how Schreiber devised a gambit to trap the other players in a political checkmate and set the course for the next chapter of this story.
the fifth estate reveals that sworn testimony before a Parliamentary committee contained manipulation and lies.

Tuesday, July 28, 2009

The dominating dragon..i have

these are my dragons adopted from the http://www.dragonadopters.com/ site...if you want to have and adopt a dragon just like what i have, all you have to do is to click the hightlightened link... feel free to register and get your own dragon..just follow the link..
Dragonadopters

Dragonadopters

Dragonadopters

Dragonadopters

if you want to view my dragon, just click the link below..
http://www.hacques.dragonadopters.com/dragon_47639

Tuesday, July 14, 2009

The Legendary Sannin















Jiraiya (自来也) was one of the legendary Sannin, along with Tsunade and Orochimaru, who was trained by the Third Hokage. He was a self-proclaimed super-pervert, and wrote a popular adult book series called Icha Icha, a favorite of Kakashi Hatake. He was also known as the Toad Sage (蝦蟇仙人, Gama Sennin), because of his signature toad summonings. He was the Fourth Hokage's teacher. He then became Naruto Uzumaki's teacher. Jiraiya had the kanji for "oil" on his forehead protector.


Orochimaru (大蛇丸, Orochimaru) was one of Konohagakure's Sannin. He later became a member of Akatsuki and the leader of Otogakure. He was the primary antagonist for most of Part I.


Tsunade (綱手) is the Fifth Hokage (五代目火影, Godaime Hokage) of Konohagakure, taking over after Hiruzen Sarutobi died. Along with Orochimaru and Jiraiya, she is one of the Legendary Sannin of Konoha, and the only one left alive after Jiraiya's death and Orochimaru's permanent sealing. She excels in medical ninjutsu.




Lyrics to 1234: by Plain White T's
















Plain White T's lyrics
Album: Big Bad World
Year: 2008
Title: 1234


1-2-1-2-3-4
Give me more loving than I’ve ever had
Make me feel better when I’m feeling sad
Tell me I’m special even though I know I’m not
Make me feel good when I hurt so bad
Barely getting madI’m so glad I found you
I love being around you
You make it easy
Its as easy as 1-2-1-2-3-4
There’s only one thing
To Do
Three words
For you(I love you)
I love you
There’s only one way to say
Those three words
That’s what I’ll do
(I love you) I love you
Give me more loving from the very start
Piece me back together when I fall apart
Tell me things you never even tell your closest friends
Make me feel good when I hurt so bad
You’re the best that I’ve had
And I’m so glad I found you
I love being around you
You make it easy
It’s easy as 1-2-1-2-3-4
There’s only one thing
To Do
Three words
For you(I love you) I love you
There’s only one way to say
Those three words
That’s what I’ll do
(I love you) I love you
(I love you) I love you
You make it easy
It’s easy as 1 2 1 2 3 4
There’s only one thing
To Do
Three words
For you
(I love you) I love you
There’s only one way to say
Those three words
That’s what I’ll do
(I love you) I love you
(I love you) I love you
1-2-3-4I love you
(I love you) I love you



(Thanks to Brandi for these lyrics)
[ 1234 Lyrics on http://www.lyricsmania.com/ ]