Wednesday, December 31, 2014

LG puts on Ultra HD – CHIP

LG has been recognized by the Consumer Electronics Association as a “Partner 4K Ultra HD for international CES 2015″. It is the company’s honoring achievements in the segment of Ultra HD and a nod to the latest line of TVs LG presented at this year’s fair. Modern 4K Ultra HD from LG are equipped with Wide Color LED technology and Quantum Dot, which display palette of colors, their depth and realism are supposedly on the same level as those offered by the Professional Series monitors LG ColorPrime.

Debuting at CES 2015 LG TV 4K Ultra HD TV with Wide Color LED diodes are using phosphors, which affects the parameters such as depth of color and natural picture. On January at LG for the first time in the history of present its 4K Ultra HD screens with Quantum Dot technology, providing more accurate about 30% of the colors.

The TV LG 4K Ultra HD 2015 collection also ensure that the quality of 4K (3840 x 2160) 4K IPS panels. Additionally, True Black Control technique is to improve the contrast of allowing for the effect of a darker, deeper blacks. A new feature for 2015 is also the Natural Color, which minimizes errors in color reproduction, while the Contrast Optimizer option maximizes the contrast and brightness.

Five TVs with 4K Ultra HD line from LG comes with a multi-channel surround system Ultra, developed in collaboration with experts sound Harman / Kardon. In addition, models for 2015 with a series of high-end UF9500 have an integrated stand, which reflects and focuses the sound so as to maximize the experience … or so says the manufacturer.

LG has also introduced enhancements to the platform of smart TV – by optimizing the system operating webOS 2.0, which is reportedly more friendly and intuitive for users. Boot time has been reduced by almost 60%, and pairing with mobile devices is simpler. In addition, to further personalize your TV, users webOS 2.0 models can create your own menu on the main toolbar.

The latest models of LG 4K Ultra HD was used 4K Upscaler advanced algorithm, which effectively changes the resolution of SD, HD and Full HD quality content close to Ultra HD. Moreover, a special codec built 4K Video Codec High Efficiency (HEVC) that processes content from external devices 4K recorded in both 30p and 60p which also means that the LG TV will be compatible with future standards transmission Ultra HD.

LikeTweet

Samsung Galaxy S5 iPhone defeated in his own backyard … – Gazeta.pl

The last message that we publish on Samsung this year, is surprising. Samsung beats Apple in its home market.

At least in terms of “consumer satisfaction with the product.” BGR reports according to the latest research owners and iPhones iPhones 6 6 Plus are less satisfied with their smartphones – Apple has dropped in the rankings and has 81 points instead of 79. Meanwhile, Samsung reported a fairly significant increase – the level of satisfaction of its smartphones has increased from € 76 to 81.

Rankings of this type are performed each year in the US – is a measure of whether the product or service meet the expectations of consumers.

What is the reason for the sudden success of Samsung? This we can only guess, but Apple probably did not help the problems described by the media with bendable iPhone 6 Plus. Perhaps it is the consumers’ opinions disillusioned Apple made more people began to reach for the Galaxy S5.

The results are ranked American surprising that Samsung notes this year considerable declines in sales and profits.

Image & # x119; of the Samsung Galaxy S5 blue  Image & # x119; of 6 Apple iPhone 64GB white & # x142; y
Samsung Galaxy S5 blue 6 64GB Apple iPhone white
Compare prices » Compare prices»
Basic Information
Screen size 5.1 inches 4.7 inches
OS Android 4.4 KitKat iOS
Specifications
Built-in Memory 16 GB 64 GB
RAM 2 GB 1 GB
Processor Snapdragon 801 Apple A8
Processor Frequency 2.5 GHz 1.4 GHz
Screen Resolution 1920 x 1080 1334 x 750
Battery Type Li-Ion Li-Ion
Memory Card Reader Yes No
Features
Digital Camera 16 megapixel 8 megapixel
Additional camera 2 megapixel 1.2 megapixel
Communication
Wireless Yes Yes
GPS Yes, A-GPS + GLONASS Yes, GLONASS
GSM network 850, 900, 1800, 1900 850, 900, 1800, 1900
LTE Yes 850, 900, 1900, 2100
WCDMA 850, 900, 1900, 2100 850, 900, 1900, 2100
Physical
Size 142 x 72.5 x 8.1 mm 138.1 x 67 x 6.9 mm
Weight 145 g 129 g
LikeTweet

Anyone can steal your fingerprint. Just picture – Newsweek Poland

Hacker copied fingerprint of German Minister of Defense. Enough pictures of her thumb he made at a press conference. This can be a serious problem for the owners of smartphones.

Our fingerprint form non repetitive pattern. It would seem that based on fingerprint security can not be broken. Therefore, the various readers are becoming increasingly popular. Guaranteed by the security is purely illusory. This has been proved by German hackers.

Members of the Chaos Computer Club have already proven that they can without any problem to copy and use the imprint left on the smooth surface of the

During a conference organized by the hacker group Chaos Computer Club Jan Krissler described how the baby easily took possession of the thumbprint Minister Ursula Van der Leyen. It was enough to hand image captured during a press conference with a number of different angles. Then the man used the VeriFinger readily available software that is used to identify fingerprints in a variety of security systems.

By Krisslera pictures made quite an ordinary camera. Needed was a few shots, and the process of obtaining a complete fingerprint is very simple, if you just know how to operate the software. A clever hacker demonstrated how to do it during the presentation, which was posted on YouTube.

Now Krissler demonstrated that it is possible to copy fingerprints without having a physical object in which they are reflected.

Members of the Chaos Computer Club have already proven that they can without any problem Copy use the imprint left on the smooth surface. In 2008,. The glasses, which used the then Interior Minister Wolfgang Schauble married German imprint of his index finger. Then published it, and comforted the fans of the group can see that the thus obtained biometric data can easily be used in security systems. Enough to be used for this purpose a copy of the fingerprint Schäuble.

LikeTweet

The defeat of biometric security! The fingerprint can be … – Interia

How to copy our fingerprints? It turns out that this can be done without physical contact us or objects, which touched. Such was the case German Defence Minister Ursula von der Leyen.

Ursula von der Leyen victim of theft … fingerprints.

/ AFP

Documents released by Edward Snowden not only showed that the US service invigilates the whole world, but revealed by the way some of their weaknesses. What services and security methods constitute a problem for American spies? read more

I remember how intrigued me the information that the German group Der Sperrtechnik Sportsfreunde reconstructed using 3D printing key that opens the police handcuffed solely on the basis of the image captured to some policeman on the street. The key turned out to work, and its design was then made available on the network. Just a few years was enough to fell another bastion of security – fingerprint.

Scan fingerprint authentication is a popular way. We can find it both in castles, opening different doors, as well as in electronic equipment. I really liked the convenience afforded by this method of authentication – instead of using the username and password, just touch your finger to the reader in a laptop, tablet or smartphone.

Unfortunately, it turns out that our fingerprints, we can easily steal. And it is not about busy collecting fingerprints (film recalls scheme – give someone a glass of soda to get the impression), but of acting without physical contact – at a distance.

Theft finger minister

Victim of the “theft” fell in October quite important figure – German Defence Minister Ursula von der Leyen. Informed the Jan Krissler the Chaos Computer Club (CCC), which also described the way in which managed to get fingerprints minister.

He used to ordinary digital camera, which, during a press conference at different angles taken a series of pictures of her hand. That was enough to play and copy fingerprint fingerprint.

The fingerprint is no longer safe

It’s hard to imagine what the consequences are this event. And it’s not just the fact that fingerprint scanners manufacturers use various electronic gadgets, such as Samsung and Apple. The case is much more serious, as evidenced for example. Used in Brazil, biometric voter identification system is based on fingerprint scanning granting access to various facilities or premises. According to Jan Krisslera is the end of biometric security based on fingerprints.

The article used the information from the website Hacker News, Rzeczpospolita, the Guardian and the Mirror.

Luke Michalik

gadżetomania.pl

LikeTweet

Tuesday, December 30, 2014

CES 2015 – LG will showcase new 4K TVs – Interia

At CES 2015, LG will showcase a new line of Ultra HD 4K TVs, which will be launched later in the year. The series has a number of features and solutions refining the image quality and modern design.

The new 4K TVs LG will be presented at CES 2015

/ press releases

More than 5 million homes are equipped with TVs LG webOS system. Version 2.0 is the next step in the direction of maximum intuitiveness. read more

Modern 4K Ultra HD LG are equipped with Wide Color LED technology and Quantum Dot, which display palette of colors, their depth and realism are just as good, as those offered by the Professional Series monitors LG ColorPrime.


Debuting at CES 2015 LG TV 4K Ultra HD TV with Wide Color LED diodes are using phosphors, which affects the parameters such as color depth and naturalness of the image. On January at LG for the first time in the history of present its 4K Ultra HD screens with Quantum Dot technology, providing more accurate about 30 percent. colors.

TV LG 4K Ultra HD 2015 collection also provide exceptional quality 4K (3840 x 2160 pixels) IPS panels 4K. True Black Control improves contrast allowing for the effect of a darker, deeper blacks. A new feature for 2015 is also the Natural Color, which minimizes errors in color reproduction, while the Contrast Optimizer option maximizes the contrast and brightness. The latest series of TV has been designed with the utmost attention to detail – from the frame, the screen, right to the very back of the TV according to modern trends.

Five TVs with 4K Ultra HD line LG is equipped with multi-channel surround system ULTRA, developed in collaboration with experts sound Harman / Kardon. Deep, rich and powerful sound enhances the visual sensations. In addition, models for 2015 with a series of high-end UF9500 have an integrated stand, which reflects and focuses the sound so as to maximize the experience.

LG also introduced enhancements to the platform of smart TV – by optimizing the operating system webOS 2.0. Boot time has been reduced by almost 60 per cent., And pairing with mobile devices is easier than ever before. In addition, to further personalize your TV, users webOS 2.0 models can create your own menu on the main toolbar.

The latest models of LG 4K Ultra HD was used 4K Upscaler advanced algorithm, which effectively changes the resolution of SD, HD and Full HD quality content close to Ultra HD. Moreover, a special codec built 4K Video Codec High Efficiency (HEVC) that processes content from external devices 4K recorded in both 30p and 60p which also means that the LG TV will be compatible with future standards Ultra HD broadcast.

LikeTweet

These data encryption tools have tormented … – Computerworld


 
 
 Since then, the two above-mentioned tools detected different sensitivity. First identified in Tor (thanks to the FBI could track users using the services of the network), and the second application Tail (which allowed hackers to capture IP addresses assigned to users of its services). So far, only the TrueCrypt application failed to find any vulnerabilities that would allow her to figure out (at least do not know about that, because some say it is different).

For no one should be no surprise that, NSA that depend most on the break just these tools. Recently revealed that applications developed by NSA XKeyScore (used to capture Internet traffic) detected a mechanism for determining who uses the services of portals Tor and Tails. This reinforces the belief that the agency was interested in – and it’s very hard – these tools.

See also:

A report published by Der Spiegel document contains information confirming the suspicion that the NSA had targeted these applications. She viewfinder is an understatement – it necessarily wanted to figure out, in order to be able to steal data from servers that have used these tools for their protection.

The tools have been classified by the NSA, taking into account, inter alia, for example. Degree their advancement. Whereas this criterion, the first three places were taken by Tor applications, Tails and TrueCrypt. I took them agency unless indeed, as indicated by the fact that, with the amount in 2013, more than $ 10 billion, US $ 34.3 million has been spent on the project “cryptanalysis and Exploitation Services”.

There are of course This hard evidence that it is the NSA could be found in applications that track and Tails susceptibility to enable interception and decryption of data, but this is highly unlikely. There are speculations that the agency also figured TrueCrypt application. Proponents of this kind of conspiracy theory believe that they are so indirect evidence. The idea is that developers avoid this solution as if instinctively felt that it is not safe, although officially no audit has not demonstrated that it may contain a hole.

Among other tools, the agency placed on the aforementioned list (thinking that maybe they are not as important as Tor and Tails and TrueCrypt, but you should take care of them) is Redphone program. This tool supports applications transmitting voice, data encryption using ZRTP (whose creator Phil Zimmermann). Zimmermann has developed two decades ago, another tool for data encryption, bearing the name of the PGP (Pretty Good Privacy). It turns out that the NSA is also a tool to put it drew up the list of most dangerous for the data encryption systems.

It is interesting that the NSA had – and probably is – a lot of problems with unstructured data. At least that can be inferred from published by Der Spiegel document. It is worth remembering that the document was created in 2012 and since then a lot of things could change. About this we will, however, only when it finds a second Snowden and reveals another document showing the latest methods of work of the NSA.
 
 
 
 
 

Welcome to conferences and workshops
 


 
  19 February 2015.
 
  Sign up
 

 Complement fixed speeches at the conference in 2015 Techworld e-seminars will be delivered online via the Internet. In this electronic form will provide information relating to these aspects of infrastructure that is difficult to show on stage. Participants will learn about such aspects as the implementation process, some technical details, and also shown live elements discussed infrastructure. E-seminars are conducted in an inte ractive format, so …

LikeTweet

Kim Dotcom saved by Sony and Microsoft, and now he wants to dethrone … – Gadzeto Mania

Kim Dotcom knows how to maintain interest in themselves and their services. When a few days ago announced that cyber attacks stopped on the Sony and Microsoft, there seemed to be bluffing. It was not enough that I was able to confirm this information, it is Kim treated us to a new revelation – is going to launch a new, secure messaging. And with his usual modesty challenges for Skype.

Kim Dotcom saves Xbox Live and PlayStation Network

End 2014 years without a doubt one of the Kim Dotcom. When the attacks stopped cybercriminals, who a few days ago the network paralyzed Xbox Live and PlayStation Network, Kim announced that a re-availability is his merit. He had to do this in a rather unusual way: cybercriminals presented an interesting offer, which is a free Account Mega hosting service , offering up to 500 GB of space.

At first, it looked like a typical marketing play and empty boasting, but – to everyone’s surprise – the group behind the attacks Lizard Squad confirmed boast Kim . Yes! This guy saved the good humor of players from all over the planet just to give criminals an attractive gift. And although you can complain that the terrorists will not negotiate, the effect was that the players were able to return to your favorite entertainment.

Developer Mega wants to run MegaChat

This is not the end. Kim has just announced that it intends to create a new service. It will be running in the browser communicator, allowing the encrypted voice and text . In addition to communications security, a new service called MegaChat is to provide the ability to quickly transfer files.

This is, at least for now, the only confirmed information about the new service. In fact, do not know almost nothing about it except that it is to be built, and that aims to provide secure communications . Previous actions dotcom give hope that MegaChat can prove to be quite reasonable, polished tool.

Encryption Communication

Just to mention the way in which Mega refined service – its founder just announced that finder various loopholes can expect to be rewarded in the amount of up to 10 thousand. euro. As you might guess, any holes are quickly detected and patched. With MegaChatem may be the same.

The challenge thrown for Skype, and thus Microsoft may seem a bit exaggerated, but in fact … why not try it? From the time of Snowden knowledge that we overheard has become widespread, and thus increased the need for covert communications from prying eyes.



Not only Microsoft and Google

While the recently disclosed NSA materials indicate that the majority of American Security Security Service is able to cope (more on this topic can be found in the article “Do you care about privacy? Meet the safeguards that were the problem NSA “), the start and popularization of the new, secure messaging can be quite positive development. In the end, the NSA is not the only organization that wants to learn the secrets of the internet, and outside agents various services on our data also lurk ordinary cybercriminals.

The success of Dotcom services can therefore make the network will become a little safer place. It remains for us to be patient with the hope that on the announcement is over. Competition is good for all of us , so you might want to look out for an alternative to Skype and Google services. Good luck, Kim!

The article used the information from the website, WinBeta, Forbes, Chip, The Register and The Next Web.

LikeTweet

Fingerprints can spoof on the basis of a normal photo – Money.pl

2014-12-30 17:30

 Fingerprints can spoof on the basis of a normal photo

[Photo: sxc / cc / flaivoloka]

Using photos taken during the press conference of the German defense minister Ursula von der Leyen, the hacker John Krissler recreated minister thumbprint using commonly available software – tells BBC News / Science.

Krissler, also known as ,, Starbug “, a member of the Chaos Computer Club hacker (CCC) has benefited from photos taken with a digital camera normal during the October conference. He was able to get a close-up photo showing thumb von der Leyen lady, also benefited from other images taken at different angles and applied program called VeriFinger. Scores praised when held in Hamburg exit CCC – existing for 31 years of the European association of hackers.

Scan fingerprint biometric is used as the equivalent of a password among others Smartphones Apple and Samsung, it was also used to identify voters during this year’s presidential election in Brazil. However, experts do not consider this technology to be particularly safe.

It is more difficult to fake, eg. The way we move and the pattern of subcutaneous veins (venous pattern use an infrared sensor, used eg in some ATMs installed in Japan and Poland). To the reader checking finger vein system to work, the finger must be a real and connected to a live person.

Krissler suggested that after the publicity of his achievements politicians will be publicly only with gloves. (PAP)

pmw / mrt /

LikeTweet

More children without compulsory vaccination. “Roses in the EU … – Gazeta.pl

Growing discouragement to vaccinations. Are behind this so-called. antyszczepionkowe movement – a group of people who believe that vaccines bring more harm than good. In Poland in 2011. Have not been vaccinated about 3 thousand. children, in 2012. it was their 5.3 thousand. and in 2013. – 7.2 thousand.

Marek Posobkiewicz, p.o sanitary inspector, believes that it is expected that in 2014. more children have not been vaccinated mandatory. – Fortunately, it is still a small group. It represents only 0.08 per cent. children subject to compulsory vaccination protection – he added.

Are the vaccine is less disease

President of the Foundation Institute Infection Prevention in Warsaw, Dr. Paul Grzesiowski says that in Poland is still high is called. wyszczepialność (ie the number of completed vaccinations – ed.) population against measles. Vaccine against this extremely dangerous disease received more than 90 percent. population of children and adolescents. As a result in 2011. Registered only 38 cases of measles in 2012. – 60 cases.

In the West, it is worse. And in the United States …

In other industrialized countries is much worse. In Europe and the US increased incidence of measles due to more frequent omissions vaccination against the disease.

In 2013. An increase in measles cases reported in the United Kingdom, Germany, the Netherlands, Bulgaria, Spain, Italy, Denmark, Sweden and Lithuania. More than a total of 9200 cases were registered in Georgia and Turkey, where some infections can be zawleczonych to the countries of the European Union.

According to the “New England Journal of Medicine,” in many schools in New York vaccinated against measles is less than 70 percent . population of students.

Thirty years without polio and diphtheria

Prof. Eve Bernatowska immunology clinic Child Health Center in Warsaw points out that, thanks to good acting is still protective vaccination program Poland is a country free from polio. Since 1984. There has been a single case of the disease caused by this virus, which in the 50s. The cause many deaths and permanent disability – muscle paralysis of arms and legs.

– The same is true of many other serious infections . For 30 years it was in our country suffering from diphtheria, and for 29 years was not caused by neonatal tetanus – adds specialist.

The unexpected return of rubella men

Prof. Bernatowska admits that still exist in our country rubella among young men. Data from the National Institute of Public Health – National Institute of Hygiene shows that in the first half of 2013. Registered more than 32 thousand. infections – almost ten times more than in the same period of 2012.

– This disease should no longer exist in any country of the European Union – emphasizes the expert. In Poland, however, is not related to the evasion of vaccination, but with incomplete vaccination program.

Since 1988. Vaccinated against rubella only girl in the 13th year of life; these vaccinations were not boys. That is why there has been so. compensatory epidemic disease attacked mostly men aged 19-24 years of age and a little older than 25 to 28 years of age.

“The vaccine policy as”

According to Professor. Bernatowski, vaccination is the most important insurance policy on the health of all of us, regardless of age and gender. They are much safer than the resistance obtained after passing the infection.

– A small child after przechorowaniu infectious diseases such as whooping cough, or those caused by the so-called. encapsulated bacteria such as Haemophilus influenzae and Streptococcus pneumoniae (diplococcus of pneumonia) and meningococcus should be vaccinated against the disease, which had suffered, and in the shortest time as possible – emphasizes the expert.

He added that especially in children up to the age of the immune system is so immature that infectious diseases can cause catastrophic consequences.


Bieńkowska, Putin, elections … [memes BEST YEAR] & gt; & gt; & gt;

LikeTweet

Alpha Galaxy disappears from the market, it will replace the Galaxy A5 – Gazeta.pl

Galaxy Alpha, One of the newest Samsung smartphones, was poorly received by the market. Less than half a year after its release, it turned out that the production of the smartphone will be carried out only “until the materials.”



Beautiful, but too expensive

Alpha Galaxy looks much we liked. Samsung finally dared to experiment with form – and succeeded. However, other features of SmarTone not distinguish it from the competition. The Verge highlights the poor performance of the battery and an exorbitant price. Samsung has created some strange device: the ośmiordzeniowym, but slower than the processor and quad-screen is full HD. For the price of 2700 zł (reduced a few weeks after the release of the 2000 PLN), you can have a smartphone with better performances.



New idea for “the average shelf”

Samsung Galaxy A5 Fig. Samsung

The Samsung plans most likely place to another device. In the market of mid-end devices to be king of the Galaxy A5 – smartphone unveiled a month ago in China. The phone is designed in the same style as the Alpha is a little thinner and made of high quality metal. In China, costs the equivalent of approx. 360 dollars.

According to the website Sammobile Galaxy Galaxy A5 and A3 have hit Europe next year. Better model will cost 410, 310 weaker euro.

Image & # x119; of Samsung GALAXY Alpha Blue  Image & # x119; of the Samsung Galaxy S5 blue  Image & # x119; of Samsung Galaxy Note 3 SM-N9005 white & # x142; y
Samsung GALAXY Alpha Blue Samsung Galaxy S5 blue Samsung Galaxy Note 3 SM-N9 …
Compare prices » Compare prices » Compare prices»
Basic Information
Screen size 4.7 inches 5.1 inches 5.7 inches
OS Android 4.4 KitKat Android 4.4 KitKat Android 4.3 Jelly Bean
Parameters Technical
RAM 2 GB 2 GB 3 GB
Processor Exynos 5430 Snapdragon 801 Quad Core
Processor Frequency 1.8 GHz 2.5 GHz 2.3 GHz
Screen Resolution 1280 x 720 1920 x 1080 1920 x 1080
Battery 1860 mAh 2800 mAh 3200 mAh
Memory Card Reader No Yes Yes
Features
Digital Camera 12 mpx 16 megapixel 13 megapixel
Additional camera 2.1 megapixel 2 megapixel 2 megapixel
Communication
Wireless Yes Yes Yes
LTE Yes Yes Yes
Physical
Size 132.4 x 65.5 x 6.7 mm 142 x 72.5 x 8.1 mm 151.2 x 79.2 x 8.3 mm
Weight 114 g 145 g 168 g
LikeTweet

Growing antyszczepionkowe movements in Poland – rmf24.pl

1 hour. 9 minutes ago

In Poland it is still so high. wyszczepialność population but intensify discourage preventive vaccinations so. antyszczepionkowe movements. So says p.o sanitary inspector Marek Posobkiewicz.

Photo. Illustrative

/ Grzegorz Michalowski / PAP

The specialist emphasizes that gradually but steadily declining alarmingly number of parents evading compulsory vaccination of children. Yet in 2011. For this reason it has not been vaccinated about 3 thousand. children, in 2012. it was their 5.3 thousand. in 2013. – 7.2 thousand.

Marek Posobkiewicz believes that it is expected that in 2014. more children have not been vaccinated mandatory. Fortunately, there is still a small group , it represents only 0.08 per cent. children subject to compulsory vaccination protection – adds.

90 percent. children vaccinated against measles

President of the Institute for Infection Prevention in Warsaw, Dr. Paul Grzesiowski said that Poland is still high wyszczepialność population against measles. Vaccine against this extremely dangerous disease received more than 90 percent. population of children and adolescents. As a result in 2011. Registered only 38 cases of measles in 2012. – 60 cases.

In other industrialized countries is much worse. In Europe and the US increased incidence of measles due to more frequent omissions vaccination against the disease.

In 2013. An increase in measles cases reported in the United Kingdom, Germany, the Netherlands, Bulgaria, Spain, Italy, Denmark, Sweden and Lithuania. More than a total of 9200 cases were registered in Georgia and Turkey, where some infections can be dragged to the countries of the European Union.

According to the “New England Journal of Medicine,” in many schools in New York vaccinated against measles is less than 70 percent . student population.

Polish free from polio

Prof. Eve Bernatowska immunology clinic Child Health Center in Warsaw points out that, thanks to good acting is still protective vaccination program Poland is a country free from polio. Since 1984. There has been a single case of the disease caused by this virus, which in the 50s. The cause many deaths and permanent disability – muscle paralysis of arms and legs.

The same is true with many other threatening infections. For 30 years it was in our country suffering from diphtheria, and for 29 years was not caused by neonatal tetanus – adds the expert.

Prof. Bernatowska admits that still exist in our country rubella among young men. Data from the National Institute of Public Health-National Institute of Hygiene in Warsaw that the first half of 2013. Registered more than 32 thousand. infections – almost ten times more than in the same period of 2012.

Rose still present

The disease should no longer exist in any country of the European Union – emphasizes expert. In Poland, however, is not related to the evasion of vaccination, but with incomplete vaccination program. Since 1988. Vaccinated against rubella only girl in the 13th year of life; these vaccinations were not boys. That is why there has been so. compensatory epidemic disease attacked mostly men aged 19-24 years of age and a little older than 25 to 28 years of age.

According to Professor. Bernatowski, vaccination is the most important insurance policy on the health of all of us, regardless of age and gender. They are much safer than the resistance obtained after passing the infection.

A small child after przechorowaniu infectious diseases such as whooping cough, or those caused by the so-called. encapsulated bacteria such as Haemophilus influeza or Streptococcus pneumoniae (diplococcus of pneumonia) and meningococcus should be vaccinated against the disease, which had suffered, and in the shortest time as possible – emphasizes the expert.

He adds that, particularly in children under two years of age the immune system is so immature that infectious diseases can cause catastrophic consequences.

LikeTweet

Monday, December 29, 2014

China blocking Gmail? “The problems do not occur on the side of Google” – On the 24

According to reuters.com, relying on information from the service GreatFire.org, China does not work email service Gmail. According to the experts for this situation may be responsible Chinese Internet control system. “We believe that the government is trying to further reduce the presence of Google in China” – were reported by one of the users GreatFire.org.

Last Friday, one of the departments involved in the study of Google traffic web services giant, reported a decline Gmail activity in China . At that time, a spokesman for the company (stationed in Singapore) ensures that the problems with the postal service “does not exist on the side of Google”.

Since June of this year, almost all websites owned by Google experienced disruption in their operation in China. The first disturbance began during the preparations for the 25th anniversary of the Tiananmen Square incident.

Hua Chunying Chinese Foreign Ministry spokesman assured that he knows nothing about blocking Gmail, added that his country’s government aims to provide a “friendly environment for foreign investors. “

In China introduced the most advanced mechanism to censor the network, sometimes called the Great Firewall of China (the name refers to the Great Wall of China, the Great Wall of China).

reuters.com, GreatFire.org, tvn24bis.pl

‘; }} If (! Expand_pos) destObj var = ‘# comments-container -’ + id_element + ‘-’ + id_parent; destObj else var = ‘# comments-container -’ + id_element + ‘-’ + id_parent + ‘-’ + expand_pos; if (oJsonObject.large_votes_buttons) $ (“# comment-large-votes – ‘+ id_element +’ – ‘+ id_parent) .html (oJsonObject.large_votes_buttons); $ (DestObj) .html (returnHTML); if (first_level) {coments_textCollapse (destObj); $ (‘# List-comments-combobox-order’). Val (oJsonObject.orderIndex); } $ (‘# Comments-container -’ + id_element + ‘-’ + id_parent) .animate ({opacity: 1}); }}, Error: function () {$ (‘# comments-container -’ + id_element + ‘-’ + id_parent) .animate ({opacity: 1}); $ (‘Body’). Css (‘cursor’, ‘default’); }}); } Function comment_toggleAnswers (id_element, i d_parent) {var answbtn = $ (“# comment-answers – ‘+ id_element +’ – ‘+ id_parent); answcntr var = $ (‘# comments-container -’ + id_element + ‘-’ + id_parent); if (answbtn.hasClass (‘answers-link-down’)) {answbtn.addClass (‘answers-link-up’); answbtn.removeClass (‘answers-link-down’); if (answcntr.text () == ”) {comments_get (id_element, id_parent, false, false, false); } Answcntr.slideDown (); setTimeout (function () {coments_textCollapse (‘# comments-container -’ + id_element + ‘-’ + id_parent, true);}, 500); } Else {answbtn.removeClass (‘answers-link-up’); answbtn.addClass (‘answers-link-down’); answcntr.slideUp (); }} Function comments_showAlertForm (id_element, id_parent) {$ (‘.comments-newComment’). Hide (); $ (‘.comment-Item’). RemoveClass (‘comment-item-added’); $ (̵ 6;.comment-Item’). RemoveClass (‘comment-item-addform’); $ (‘Body’). Css (‘cursor’, ‘wait’); $ .ajax ({Type: “POST”, url: ‘/F/ajax/comments.php’, date: {‘alert-form’: 1, ‘id_element’: id_element, ‘id_parent’: id_parent, ‘url’ : comments_geturl (), ‘curl’: comments_geturl ()}, dataType: ‘json’, success: function (oJsonObject) {$ (‘body’). css (‘cursor’, ‘default’); if (oJsonObject) { $ (‘# comments-newComment -’ + id_element + ‘-’ + id_parent) .html (oJsonObject.html); $ (‘# comments-newComment -’ + id_element + ‘-’ + id_parent) .fadeIn (); $ (‘ # allertcomment-text – ‘+ id_element +’ – ‘+ id_parent) .hide (); $ (‘ # comments’ + id_parent) .addClass (‘comment-item-addform& #8217;);}}, error: function () {$ (‘# comments-newComment -’ + id_element + ‘-’ + id_parent) .html (‘There was an error’); $ (‘body’). css (‘cursor’, ‘default’);}}); } Function comments_showAddForm (id_element, id_parent) {$ (‘.comments-newComment’). Hide (); $ (‘.comment-Item’). RemoveClass (‘comment-item-added’); $ (‘.comment-Item’). RemoveClass (‘comment-item-addform’); $ (‘Body’). Css (‘cursor’, ‘wait’); $ .ajax ({Type: “POST”, url: ‘/F/ajax/comments.php’, date: {‘add-forms’: 1, ‘id_element’: id_element, ‘id_parent’: id_parent, ‘url’ : comments_geturl (), ‘curl’: comments_geturl ()}, dataType: ‘json’, success: function (oJsonObject) {$ (‘body’). css (‘cursor’, R 16;default’); if (oJsonObject) { $ (‘# comments-toolbar2 -’ + id_element + ‘-’ + id_parent) .fadeOut (20); $ (‘# comments-newComment -’ + id_element + ‘-’ + id_parent) .html (oJsonObject.html); $ ( ‘# comments-newComment -’ + id_element + ‘-’ + id_parent) .fadeIn (); $ (‘# comments’ + id_parent) .addClass (‘comment-item-addform’);}}, error: function () { $ (‘# comments-newComment -’ + id_element + ‘-’ + id_parent) .html (‘There was an error’); $ (‘body’). css (‘cursor’, ‘default’);}}); } Function comments_hideAddForm (id_element, id_parent) {$ (‘# comments-newComment -’ + id_element + ‘-’ + id_parent) .slideUp (); $ (‘# Comments-toolbar2 -’ + id_element + ‘-’ + id_parent) .fadeIn (); $ (‘.comment-Item’). RemoveClass (& #8216;comment-item-addform’); } Function comments_submitAddForm (id_element, id_parent) {$ (‘body’). Css (‘cursor’, ‘wait’); $ (‘# NewComment-wait -’ + id_element + ‘-’ + id_parent) .show (); $ (‘# NewComment-wait -’ + id_element + ‘-’ + id_parent) .html (‘Sending data …’); $ (‘# NewComment-error -’ + id_element + ‘-’ + id_parent) .html (”); $ (‘# NewComment-text -’ + id_element + ‘-’ + id_parent) .css (‘opacity’, 0.3); $ (‘# NewComment-moreinfo -’ + id_element + ‘-’ + id_parent) .css (‘opacity’, 0.3); $ (‘# Comments-newComment -’ + id_element + ‘-’ + id_parent + ‘.newcomment-buttons’). Hide (); $ .ajax ({Type: “POST”, url: ‘/F/ajax/comments.php’, date: {‘send-comment’: 1, & #8216;id_element’: id_element, ‘id_parent’: id_parent, ‘text’ $ (‘# newComment-text -’ + id_element + ‘-’ + id_parent) .val (), ‘nick’: $ (‘# newComment-nick -’ + id_element + ‘-’ + id_parent) .val (), ‘ uid ‘: $ (‘ # newComment-user-id – ‘+ id_element +’ – ‘+ id_parent) .val (),’ fbuid ‘: $ (‘ # newComment-user-fb-id – ‘+ id_element +’ – ‘+ id_parent) .val (), ‘TYPE_1′: ($ (‘# newComment-type-1 -’ + id_element + ‘-’ + id_parent) is (‘: checked’)? 1: 0), ‘TYPE_2′: ( $ (‘# newComment-type-2 -’ + id_element + ‘-’ + id_parent) is (‘: checked’)? 1: 0), ‘type_3′: ($ (‘# newComment-type-3 -’ + id_element + ‘-’ + id_parent) is (‘: checked̵ 7;)? 1: 0), // ‘id_parent’: id_parent, ‘url’: comments_geturl (), ‘curl’: comments_geturl ()}, dataType: ‘json ‘, success: function (oJsonObject) {$ (‘ body ‘). css (‘ cursor ‘,’ default ‘); $ (‘ # newComment-wait – ‘+ id_element +’ – ‘+ id_parent) .hide (); $ (‘# newComment-text -’ + id_element + ‘-’ + id_parent) .css (‘opacity’, 1); $ (‘# newComment-moreinfo -’ + id_element + ‘-’ + id_parent) .css (‘opacity’, 1); $ (‘# Comments-newComment -’ + id_element + ‘-’ + id_parent + ‘.newcomment-buttons’). FadeIn (); if (oJsonObject) {if (oJsonObject.error) {$ (‘# newComment-error -’ + id_element + ‘-’ + id_parent) .html (oJsonObject.error); } Else {$ (‘.comments-newComment’). Hide (); $ (‘.co mment-Item’). RemoveClass (‘comment-item-addform’); if (oJsonObject.html) {$ (‘# comments-container -’ + id_element + ‘-’ + id_parent) .html (oJsonObject.html + $ (‘# comments-container -’ + id_element + ‘-’ + id_parent) .html ()); $ (‘# Comments-container -’ + id_element + ‘-’ + id_parent) .fadeIn (); }}} Else $ (‘# newComment-error -’ + id_element + ‘-’ + id_parent) .html (‘There was an error. No object.’); }, Error: function () {$ (‘# newComment-wait -’ + id_element + ‘-’ + id_parent) .hide (); $ (‘# NewComment-error -’ + id_element + ‘-’ + id_parent) .html (‘An error’); $ (‘Body’). Css (‘cursor’, ‘default’); $ (‘# NewComment-text -’ + id_element + ‘-’ + id_parent) .css (‘opacity’, 1); $ ( 216;# NewComment-moreinfo -’ + id_element + ‘-’ + id_parent) .css (‘opacity’, 1); $ (‘# Comments-newComment -’ + id_element + ‘-’ + id_parent + ‘.newcomment-buttons’). FadeIn (); }}); } Function comments_submitAlertForm (id_element, id_parent) {$ (‘body’). Css (‘cursor’, ‘wait’); $ (‘# Allertcomment-wait -’ + id_element + ‘-’ + id_parent) .show (); $ (‘# Allertcomment-wait -’ + id_element + ‘-’ + id_parent) .html (‘Sending data …’); $ (‘# Allertcomment-error -’ + id_element + ‘-’ + id_parent) .html (”); $ (‘# Allertcomment-text -’ + id_element + ‘-’ + id_parent) .css (‘opacity’, 0.3); $ (‘# Comments-alertcomment -’ + id_element + ‘-’ + id_parent + ‘.newcomment-buttons’). Hide (); $ .aja x ({Type: “POST”, url: ‘/F/ajax/comments.php’, date: {‘alert-comment’: 1, ‘id_element’: id_element, ‘id_parent’: id_parent, ‘text’ $ (‘# allertcomment-text -’ + id_element + ‘-’ + id_parent) .val (), ‘TYPE_1′: ($ (“# comment-alert-type-1 – ‘+ id_element +’ – ‘+ id_parent). is (‘: checked’)? 1: 0), ‘TYPE_2′: ($ (“# comment-alert-type-2 – ‘+ id_element +’ – ‘+ id_parent) is (‘: checked ‘)? 1: 0), ‘type_3′: ($ (“# comment-alert-type-3 – ‘+ id_element +’ – ‘+ id_parent) is (‘: checked ‘)? 1: 0),’ type_4 ‘: ($ ( “# comment-alert-type-4 – ‘+ id_element +’ – ‘+ id_parent) is (‘: checked ‘)? 1: 0),’ url ‘: comments_geturl (),& #8217; curl ‘: comments_geturl ()}, dataType: ‘json’, success: function (oJsonObject) {$ (‘body’). css (‘cursor’, ‘default’); $ (‘# allertcomment-wait -’ + id_element + ‘-’ + id_parent) .hide (); $ (‘# allertcomment-text -’ + id_element + ‘-’ + id_parent) .css (‘opacity’, 1); $ (‘# allertcomment-moreinfo -’ + id_element + ‘-’ + id_parent) .css ( ‘opacity’, 1); $ (‘# comments-alertcomment -’ + id_element + ‘-’ + id_parent + ‘.newcomment-buttons’). fadeIn (); if (oJsonObject) {if (oJsonObject.error) {$ (‘# newComment-error -’ + id_element + ‘-’ + id_parent) .html (oJsonObject.error); } Else {$ (‘.comments-newComment’). Hide (); $ (‘.comment-Item-text -’ + id_parent + ‘b.clRed’). Remove (); $ (‘.comment- Item-text -’ + id_parent) .html (‘ The report has been sent! ‘ + $ (‘.comment-item-text -’ + id_parent) .html ()); $ (‘.comment-Button-alert -’ + id_parent) .attr (‘disabled’, ‘disabled’); }} Else $ (‘# allertcomment-error -’ + id_element + ‘-’ + id_parent) .html (‘There was an error. No object.’); }, Error: function () {$ (‘# allertcomment-wait -’ + id_element + ‘-’ + id_parent) .hide (); $ (‘# Allertcomment-error -’ + id_element + ‘-’ + id_parent) .html (‘An error’); $ (‘Body’). Css (‘cursor’, ‘default’); $ (‘# Allertcomment-text -’ + id_element + ‘-’ + id_parent) .css (‘opacity’, 1); $ (‘# Allertcomment-moreinfo -’ + id_element + ‘-’ + id_parent) .css (‘opacity’ ;, 1); $ (‘# Comments-alertcomment -’ + id_element + ‘-’ + id_parent + ‘.newcomment-buttons’). FadeIn (); }}); } Function comment_zoomIn (id_comment) {$ (‘# comments’ + id_comment + ‘.comment-item-text -’ + id_comment) .addClass (‘comment-item-text-Zoom’); $ (“# Comment ‘+ id_comment +’ .comment-button-zoom-in – ‘+ id_comment) .hide (); $ (“# Comment ‘+ id_comment +’ .comment-button-zoom-out – ‘+ id_comment) .show (); } Function comment_zoomOut (id_comment) {$ (‘# comments’ + id_comment + ‘.comment-item-text -’ + id_comment) .removeClass (‘comment-item-text-Zoom’); $ (“# Comment ‘+ id_comment +’ .comment-button-zoom-in – ‘+ id_comment) .show (); $ (“# Comment ‘+ id_comment +’ .comment-button-zoom-out – ‘+ id_comment) .hide (); } F unction comment_showAllUserBox (id_element, id_parent) {$ (‘.newcomment-user-box -’ + id_element + ‘-’ + id_parent) .hide (); $ (‘# NewComment-all-user-box -’ + id_element + ‘-’ + id_parent) .show (); $ (‘# NewComment-type-1 -’ + id_element + ‘-’ + id_parent) .attr (‘checked’, ‘checked’); comment_canSendComment (id_element, id_parent); } Function comment_showLoginUserBox (id_element, id_parent) {$ (‘.newcomment-user-box -’ + id_element + ‘-’ + id_parent) .hide (); $ (‘# NewComment-login-user-box -’ + id_element + ‘-’ + id_parent) .show (); $ (‘# NewComment-type-2 -’ + id_element + ‘-’ + id_parent) .attr (‘checked’, ‘checked’); comment_canSendComment (id_element, id_parent); } Function comment_unsetFBprofile (id_element, id_parent) {$ (‘.comment-newComment-form -’ + id_element + ‘-’ + id_parent + ‘.comment-newComment-thumb img’). Attr (‘alt’, ”); $ (‘.comment-NewComment-form -’ + id_element + ‘-’ + id_parent + ‘.comment-newComment-thumb img’). Attr (‘title’, ”); $ (‘.comment-NewComment-form -’ + id_element + ‘-’ + id_parent + ‘.comment-newComment-thumb img’). Attr (‘src’, ‘http://www.wprost.pl/G/blogi/ face_blog_default.jpg ‘); $ (‘# NewComment-moreinfo-fb -’ + id_element + ‘-’ + id_parent) .hide (); $ (‘# NewComment-infobar-4fb -’ + id_element + ‘-’ + id_parent) .show (); $ (‘# NewComment-user-fb-id -’ + id_element + ‘-’ + id_parent) .val (”); $ (‘# NewComment-type-1 -’ + id_element + ‘-’ + id_parent) .attr (‘checked’, ‘checked’) ; $ .ajax ({Type: “POST”, url: ‘/F/ajax/profil.php’, date: {unsetFBprofile: 1}, dataType: ‘json’, success: function (oJsonObject) {}, error: function () {}}); comment_canSendComment (id_element, id_parent); } Function comment_assignFBprofile (id_element, id_parent) {$ (‘# assignFBprofile-error -’ + id_element + ‘-’ + id_parent) .html (”); FBConnectInit (function (_FBuser) {if (! _FBuser) {$ (‘# AssignFBprofile-error -’ + id_element + ‘-’ + id_parent) .html (‘There was an error. No connection to Facebook.’);} Else if ( ! _FBuser.id & amp; & amp;! _FBuser.name & amp; & amp;! _FBuser.link) {$ (‘# assignFBprofile-error -’ + id_element + ‘-’ + id_parent) .html (‘There was an error. No connection to the service Facebook or not all the data has been transferred. ‘);} else {$ (‘ .newcomment-user-box – ‘+ id_element +’ – ‘+ id_parent) .remove (); $ (‘ # newComment-user-fb-id- ‘+ id_element +’ – ‘+ id_parent) .val (_FBuser.id); $ (‘ # newComment-infobar – ‘+ id_element +’ – ‘+ id_parent) .html (‘ ‘); $ (‘ .comment-newComment-form – ‘+ id_element +’ – ‘+ id_parent +’ .comment-newComment-thumb img ‘). attr (‘ alt ‘, _FBuser.name); $ (‘ .comment-newComment-form – ‘+ id_element +’ – ‘+ id_parent +’ .comment-newComment-thumb img ‘). attr (‘ title ‘, _FBuser.name); $ (‘ # newComment-type-3 – ‘+ id_element +’ – ‘+ id_parent) .attr (‘ checked ‘,’ checked ‘ ); if (_FBuser.link) {$ (‘.comment-newComment-form -’ + id_element + ‘-’ + id_parent + ‘.comment-newComment-thumb img̵ 7;). addClass (‘pointer’); $ (‘.comment-NewComment-form -’ + id_element + ‘-’ + id_parent + ‘.comment-newComment-thumb img’). Click (function () {window.open (_FBuser.link, ‘facebook’) ;;} ); } If (_FBuser.image) {$ (‘.comment-newComment-form -’ + id_element + ‘-’ + id_parent + ‘.comment-newComment-thumb img’). Attr (‘src’, _FBuser.image); } Comment_canSendComment (id_element, id_parent); }}); } Function comments_vote (id_element, id_parent, id_vote, vote, is_large) {$ (‘body’). Css (‘cursor’, ‘wait’); if (is_large) {$ (“# comment-large-votes – ‘+ id_element +’ – ‘+ id_parent +’ a ‘). click (function () {return false;}); $ (“# Comment-large-votes – ‘+ id_element +’ – ‘+ id_parent) .animate ({‘ opacity ‘: 0.3}); } Else $ ( ‘# comments-toolbar2 -’ + id_element + ‘-’ + id_parent + ‘.form-button-vote’). Animate ({‘opacity’: 0.3}); $ .ajax ({Type: “POST”, url: ‘/F/ajax/comments.php’, date: {‘set-vote’: 1, ‘id_element’: id_element, ‘id_parent’: id_parent, ‘id_vote’ : id_vote, ‘is_large’: (is_large? 1: 0), ‘vote’: vote, ‘url’: comments_geturl (), ‘curl’: comments_geturl ()}, dataType: ‘json’, success: function (oJsonObject) {$ (‘body’). css (‘cursor’, ‘default’); $ (‘# comments-toolbar2 -’ + id_element + ‘-’ + id_parent + ‘.form-button-vote’). animate ({‘opacity ‘: 1}); if (oJsonObject) {if (oJsonObject.error) {if (oJsonObject.voted == 1) {$ (‘ # comments-toolbar2 – ‘+ id_element +’ – ‘+ id_pa rent +’ .form-button- vote ‘). attr (‘ disabled ‘,’ disabled ‘); $ (‘ # comments-toolbar2 – ‘+ id_element +’ – ‘+ id_parent +’ .form-button-vote ‘). addClass (‘ form-button-vote- Voted ‘);}} else {if (is_large & amp; & amp; oJsonObject.large_votes_buttons) {$ (“# comment-large-votes -’ + id_element + ‘-’ + id_parent) .html (oJsonObject.large_votes_buttons); $ (‘ # comment-large-votes – ‘+ id_element +’ – ‘+ id_parent) .animate ({‘ opacity ‘: 1}); } Else {$ (‘# comments-toolbar2 -’ + id_element + ‘-’ + id_parent + ‘.form-button-vote’). Attr (‘disabled’, ‘disabled’); $ (‘# Comments-toolbar2 -’ + id_element + ‘-’ + id_parent + ‘.form-button-vote’). AddClass (‘form-button-vote-voted’); $ (& #8216;# Comments-toolbar2 -’ + id_element + ‘-’ + id_parent + ‘.form-button-vote-yes’). Val (oJsonObject.votes_yes); $ (‘# Comments-toolbar2 -’ + id_element + ‘-’ + id_parent + ‘.form-button-vote-no’). Val (oJsonObject.votes_no); }}}}, Error: function () {$ (‘body’). Css (‘cursor’, ‘default’); $ (‘# Comments-toolbar2 -’ + id_element + ‘-’ + id_parent + ‘.form-button-vote’). Animate ({‘opacity’: 1}); if (is_large) {$ (“# comment-large-votes – ‘+ id_element +’ – ‘+ id_parent) .html (‘ ‘); $ (“# Comment-large-votes – ‘+ id_element +’ – ‘+ id_parent) .animate ({‘ opacity ‘: 1}); }}}); } Function comment_canSendAlert (id_element, id_parent) {var txt1 = $ .trim ($ (‘# allertcomment-text -’ + id_element + &# 8216;-’ + id_parent) .val ()); var ret = false; if ($ (“# comment-alert-type-1 – ‘+ id_element +’ – ‘+ id_parent) is (‘: checked ‘)) {$ (‘ # allertcomment-text – ‘+ id_element +’ – ‘+ id_parent) .hide (); ret = true; } Else if ($ (“# comment-alert-type-2 – ‘+ id_element +’ – ‘+ id_parent) is (‘: checked ‘)) {$ (‘ # allertcomment-text – ‘+ id_element +’ – ‘+ id_parent) .hide (); ret = true; } Else if ($ (“# comment-alert-type-3 – ‘+ id_element +’ – ‘+ id_parent) is (‘: checked ‘)) {$ (‘ # allertcomment-text – ‘+ id_element +’ – ‘+ id_parent) .hide (); ret = true; } Else if ($ (“# comment-alert-type-4 – ‘+ id_element +’ – ‘+ id_parent) is (‘: checked ‘)) { $ (‘ # allertcomment-text – ‘+ id_element +’ – ‘+ id_parent) .show (); ret = ((txt1! = ”) & amp; & amp; (txt1.length & gt; 20)); } If (ret) $ (“# comment-alert-send – ‘+ id_element +’ – ‘+ id_parent) .removeAttr (‘ disabled ‘); else $ (“# comment-alert-send – ‘+ id_element +’ – ‘+ id_parent) .attr (‘ disabled ‘,’ disabled ‘); } Function comment_canSendComment (id_element, id_parent) {var txt1 = $ .trim ($ (‘# newComment-text -’ + id_element + ‘-’ + id_parent) .val ()); var .trim txt2 = $ ($ (‘# newComment-nick -’ + id_element + ‘-’ + id_parent) .val ()); acetamide var = $ .trim ($ (‘# newComment-user-id -’ + id_element + ‘-’ + id_parent) .val ()); iduf var = $ .trim ($ (‘# newComment-user-fb-id -’ + id_element + ‘-’ + id_parent) .val ()); var ret = false; if ((txt1! = ”) & amp; & amp; (txt1.length & gt; = 3) & amp; & amp; (! $ (‘# newComment-moreinfo -’ + id_element + ‘-’ + id_parent) is (‘: visible ‘))) {if ($ (‘ # newComment-type-3 – ‘+ id_element +’ – ‘+ id_parent) is (‘: checked ‘)) {$ (‘ # newComment-moreinfo – ‘+ id_element +’ – ‘+ id_parent) .show (); $ (‘# NewComment-moreinfo -’ + id_element + ‘-’ + id_parent) .removeAttr (‘disabled’); } Else {$ (‘# newComment-moreinfo -’ + id_element + ‘-’ + id_parent) .slideDown (function () {$ (‘# newComment-moreinfo -’ + id_element + ‘-’ + id_parent) .removeAttr (‘disabled’ )}); }} If ($ (‘# newComment-type-1 -’ + id_element + ‘-’ + id_parent) is (‘: checked ’)) {ret = ((txt1! = ”) & Amp; & amp; (txt2! = ”) & amp; & amp; (txt1.length & gt; = 3) & amp; & amp; (txt2.length & gt; = 5)); } Else if ($ (‘# newComment-type-2 -’ + id_element + ‘-’ + id_parent) is (‘: checked’)) {ret = ((txt1! = ”) & Amp; & amp; (acetamide & gt ; 0) & amp; & amp; (txt1.length & gt; = 3)); } Else if ($ (‘# newComment-type-3 -’ + id_element + ‘-’ + id_parent) is (‘: checked’)) {ret = ((txt1! = ”) & Amp; & amp; (iduf & gt ; 0) & amp; & amp; (txt1.length & gt; = 3)); } If (ret) $ (‘# newComment-send -’ + id_element + ‘-’ + id_parent) .removeAttr (‘disabled’); else $ (‘# newComment-send -’ + id_element + ‘-’ + id_parent) .attr (‘disabled’, ‘disabled’); } Function comment_loginUser (id_element, id_parent) {var txt1 = $ .trim ($ (‘# newComment-u ser-nickname -’ + id_element + ‘-’ + id_parent) .val ()); var .trim txt2 = $ ($ (‘# newComment-user-pwd -’ + id_element + ‘-’ + id_parent) .val ()); $ (‘Body’). Css (‘cursor’, ‘wait’); $ .ajax ({Type: “POST”, url: ‘/F/ajax/comments.php’, date: {‘login-user’: 1, ‘l’: txt1, ‘p’: txt2, ‘url’ : comments_geturl (), ‘curl’: comments_geturl ()}, dataType: ‘json’, success: function (oJsonObject) {$ (‘body’). css (‘cursor’, ‘default’); if (oJsonObject) { if (oJsonObject.error) {$ (‘# newComment-user-err -’ + id_element + ‘-’ + id_parent) .html (oJsonObject.error);} else if (oJsonObject.id_user & gt; 0) {$ (‘. newComment-user-box – ‘+ id_element +’ – ‘+ id_parent) .remove (); $ (‘ # newComm ent-user-id – ‘+ id_element +’ – ‘+ id_parent) .val (oJsonObject.id_user); $ (‘ # newComment-infobar – ‘+ id_element +’ – ‘+ id_parent) .html (‘ ‘); $ (‘ .comment-newComment-form – ‘+ id_element +’ – ‘+ id_parent +’ .comment-newComment-thumb img ‘). attr (‘alt’, oJsonObject.username); $ (‘.comment-newComment-form -’ + id_element + ‘-’ + id_parent + ‘.comment-newComment-thumb img’). attr (‘title’, oJsonObject.username) ; $ (‘# newComment-type-2 -’ + id_element + ‘-’ + id_parent) .attr (‘checked’, ‘checked’); if (oJsonObject.userurl) {$ (‘.comment-newComment-form-’ + id_element + ‘-’ + id_parent + ‘.comment-newComment-thumb img’). addClass (‘pointer’); $ (‘.comment-NewComment- form -’ + id_element + ‘-’ + id_parent + ‘.comment-newComment-thumb img’). Click (function () {location = oJsonObject.userurl;}); } If (oJsonObject.userthumb) {$ (‘.comment-newComment-form -’ + id_element + ‘-’ + id_parent + ‘.comment-newComment-thumb img’). Attr (‘src’, oJsonObject.userthumb); } Comment_canSendComment (id_element, id_parent); } Else {$ (‘# newComment-user-err -’ + id_element + ‘-’ + id_parent) .html (‘There was an error’); }} Else $ (‘# newComment-user-err -’ + id_element + ‘-’ + id_parent) .html (‘There was an error’); }, Error: function () {$ (‘# newComment-user-err -’ + id_element + ‘-’ + id_parent) .html (‘There was an error’); $ (‘Body’). Css (‘cursor’, ‘default’); }}); } Function comment_textareaAutoHeight (textarea) { / * if ($ .browser.mozilla) {var tah = $ (textarea) .height (); if (tah – & gt;

Read R & oacute; wnież

->

LikeTweet

Hacker “cloned” fingerprints – Polish Radio

In his opinion, enough pictures Minister Ursula von der Leyen made an ordinary camera. Needed was just close your finger and other photos from the press conference. This made it possible to clone the fingerprint of the thumb.

The fingerprints are used, for example, to identify users of devices from Apple and Samsung. The same method of biometric identity was confirmed by the voters during the election in Brazil this year.

According to experts, fingerprints are not very safe way of identification. Krissler himself says that after his actions politicians, showing up in public places should wear gloves.

(IAR)

LikeTweet

Policewoman almost hit by an elderly woman on the belts. Spokesman … – Gazeta.pl

Yesterday at approx. 9.40 at the intersection of Al. Jerusalem and st. The iron police car almost hit by an older woman at a pedestrian crossing. In the film, which was made available on Facebook, you will see that the woman passed through a long intersection. Yet she could not reach the other side of the road when the light turned green for the drivers.

At the time, police car, which was in the left lane, swerved into the right lane, driving up the road the driver’s side. An elderly woman had to escape from the police car wheels, would not be deducted. “The Hunt for the old lady on the belts – how much it should cost according to rank?” – Asks the author of the recording.

Stopped license. The case goes to court

– This is the decision of the disqualified police officer and remand the case to court – said in an interview with the portal Gazeta.pl spokesman for the Metropolitan of Warsaw senior midshipman Mariusz Mrozek . – Separately will proceed to disciplinary action. The police officer will not operate in the department of traffic – confirmed.

Earlier, on the basis of a preliminary analysis of the recordings, the police classified the behavior funkcjonariuszki as two misdemeanors. – Policewoman not yielded to pedestrians who pass through the belt, which carries 10 points and 350 penalty zł fine – explained Mrozek.

He talks about art. 26.1. Highway Code: ‘The driver, approaching a pedestrian crossing is obliged to exercise extreme caution and yield to pedestrians crossing the one on “. – There was also the improper lane change, which carries 6 penalty points and 250 zł fine – he added.

Raw decision? “There is no free ride”

We asked the Ombudsman, where so harsh decision disqualified. – So we proceed to all drivers. There’s no free ride. Police officers should lead by example – Mrozek said.

– Always appeal to drivers to retain special care with respect to pedestrians, because they are vulnerable road users – he added.

Do you want to to know more and faster? Download our application Gazeta.pl LIVE!


Do not want Muslims. Powerful protest. And the head of government of the “extreme right” & gt; & gt;

LikeTweet

Cybercriminals accurately attack in 2015. Targeting cards and … – Media2.pl

The company Eset, a global provider of computer security software companies and individuals (such as ESET NOD32 Antivirus) published a list of 4 trends in computer threats for 2015:

with targeted attacks

 One thing is certain – the number of targeted attacks has increased over the past few years and this trend will continue in 2015. Usually with targeted attacks, and so attacks against a specific recipient or institutions are carried out using social engineering or exploit 0-day type, and so those that exploit vulnerabilities still unpatched by manufacturers and application security solutions.

In 2010 identified 3 large with targeted attacks, while in 2014 the number of large attacks rose to 53. These are the figures for detected attacks, and many of them could pass unnoticed. One of the most common attacks of targeted campaigns for BlackEnergy or Windigo.

Attacks on płatnościowe systems

 More and more people are paying by credit cards. This trend decided to use cyber criminals, creating a family of threats ie POS terminals JacksPos or Dexter. This is probably using those threats, cybercriminals stole 56 million data cards, which were paid in supermarket chains Home Depot. ESET Experts predict that in 2015 the attacks on payment card terminals will become even more popular.

Ransomware, malware and bitcoiny

 ESET Experts predict that cybercriminals will carry out more attacks associated with virtual currencies. This year, the biggest cybercriminal behind this type of attack has earned the equivalent of $ 000 600 in bitcoinach, using a network of compromised computers (botnets) to generate a virtual currency.

Also, ransomware threat to screen or block access to files and in return for a ransom demand to release them, they will become even more popular in the coming year. By 2014 many large companies, including Yahoo, AOL, have become victims of such threats. This year ESET also discovered the first threat encryption files on smartphones with Android – Simplocker.

The Internet of Things

 ESET Experts also predict an increase in the number of attacks on devices with internet connection. This year, the observed attacks on devices such as Smart TV, smart phones biometric systems, routers, as well as Google Glass. Despite the popularity fledgling Internet of Things, cyber-criminals try to exploit this trend to achieve their goals.

LikeTweet

Review of the year on Facebook rozdrapało wounds. Service … – Newsweek Poland

For an American, Eric Meyer past year associated with the struggle for the life of her daughter, who suffers from a brain tumor. Facebook called the pain, juxtaposing the tragic events in an idyllic setting. Tactless composition for the service chiefs apologize memories you.

In his summary algorithm Facebook takes into account the pictures and posts that received the most “ lajków “, that is, those that have gained popularity among other users. Sam the account holder does not mention the possibility of selecting that really were important to him.

In the case of Meyer’s liking these were an expression of support in the fight against disease, 6-year-old child. American described the tragic events in the form of miniblogu, by which he tried to cope with the tragedy. Automatic statement squeeze tears photography, completed the slogan “May the next year was even better,” offended father.

In the case of Meyer’s liking these were an expression of support in the fight against disease, 6-year-old child.

Meyer wrote: “Those who have lived with the specter of death of the person you love, spend most of their time in hospitals or forks to have lost their jobs or experienced other falls in the past year, did not want to look at the past. Rebecca’s face with the signature ‘See how was your year’ cause jarring to read. If you would describe a man, it would be at least inappropriate. In the case of the algorithm is an unfortunate mistake. “

At this, Facebook responded heads. In “The Washington Post” posted a formal apology for the pain that caused the summary.

“Apka assessed positively by many users, but in this case, instead of joy przysporzyliśmy pain – wrote Jonathan GHELLER, service representative. – It is also important feedback for us. Next time we’ll do a better summary. We are grateful to Mr. Meyer, that took the time to write miniblogu on our site. “

LikeTweet

Sunday, December 28, 2014

Reaction needed in connection with the frost – Deon.pl


 

  Government Security Centre calls for departments to report cases of people at risk of chronic exposure to cold.

 

 According to the information of the Police Headquarters that the festive Friday reported two dead cold. Also, the past day two people died of hypothermia.

 

 Since the beginning of October found 34 deaths from hypothermia in December so far because of the cold 19 people died.

 

 Due to the low temperatures call for service to respond to any incident that could endanger the life of a person who is outside.

 

 “Let’s not be indifferent. When we see a person sleeping on the bench, or know that someone lives on land, dzwońmy the number of municipal police, the police or the emergency number 112. Then, the relevant departments will be addressed,” – said on Sunday PAP Bozena Wysocka the Government Security Centre .

 

 She added that aid the homeless offers each province. “Support provide night shelters and soup kitchens. The sides of the provincial offices for a list of schools. Of course, the homeless rather on this page will not come, but help can we, ordinary people,” – she said.

 

Two victims of hypothermia were recorded recently in the Lodz region. On Saturday dukcie Causeway forest between the villages and the terrace in the district of Radomsko found dead 51-year-old man. According to police, the man was under the influence of alcohol probably died of hypothermia – PAP reported on Sunday, police spokeswoman Deputy Inspector Lodz. Joanna Kącka.

 

 A day earlier in Wieruszów factory in nearby street was found dead 60-year-old man. The doctor as the most likely cause of death indicated hypothermia. Since the beginning of November in Lodz region from the cold dead four people.

 

 With police statistics show that last winter season (from 1 November 2013. To 31 March 2014.) Across the country reported 87 victims of the cold.

 

 

LikeTweet

Bishops – moral bankrupts who do not have the right to teach. – Newsweek Poland



Bishops – moral bankrupts who do not have the right to teach.

Author: Krzyszton

Date of entry: December 28, 2014 11:43

Category: Community

tags: Bishops, Church of the Holy Family Celebrations

The bishops have no right to lecture others in any context, because instructive from the pulpit bishops are only morally bankrupt, who tell the faithful that they adhere to the teachings of the Church, but the bishops to reproaches derogation from the teachings of the Church treat it as an attack on the faith, the church and God. Only a total mockery agonizing bishops can call on the family of mixed into the context of God, because it de facto bishops “God” is now empty, trite and meaningless cliche. Apparently, the bishops noted that the Catholic model of the family, where parents deprive their own child’s right to choose whether he wants to be a Catholic by choice, is a model of the family now firmly odrzucanym, hence the constant reference to God.

Bishops, which behavior is to deny the teachings of the Church, before they moralize, teach others, and come with their dirty boots in virtually every aspect of life Pole, they should follow the teachings of the Catholic Church – “ God became man. And it’s not a king in a golden palace, located only a small child in a poor manger “, the words of Cardinal Dziwisz: ” Style Jesus is the “style of simplicity, poverty and humility” . Today, the Church, and especially hierarchs who rejected the worship of God for the worship of the Golden Calf, now living in palaces, basking in luxury, luxury, wealth, opulence are in complete contradiction sciences humble womb Jesus that they preach from the pulpit.

This piece is very interesting at the same time telling: “In the opinion of the hierarchy need for” conscious and able to read the signs of the times parents, not to destroy the innocence of a child, in order not to disturb the natural process of aging and also self discovery sexual level “. It is particularly telling statement “not to destroy the innocence of the child” , a particularly large role in this field has Tylawy priest and his ilk. What you have to be a hypocrite and a cynic like most ordinary bishops to talk about the innocence of a child, at the same time concealing pedophile priests scandal, and tolerate priests speaking about morality but previously reached out to the panties of a small child.

Celebration “Celebration of the Holy Family “is nothing but an attempt to force the cultivation of the Catholic family model, which is denied the right to choose whether you want to be a Catholic because baptism is only the ignorant Catholics wholesale production, tolerance for the views of other Catholic dogmas of the Catholic where even the most absurd are the benchmark standards and conduct and the pulpit is the only exponent of the only truths.

 3 votes, 3 votes  3 votes, 3 votes ( 3 Evaluation 3 vote, score )
To rate, you must be a registered user
 Loading ... Loading …

 trench

You must be logged in to post a comment

A selection of posts from other categories

 

  •    

         
         

    henrykspol

       


       

          / Economy
     

    What are we better than Russia?


     

       
    Date: 12/29/2014 | Be the first commentator!

       

    Please in Poland, and more specifically in our media, mass action to care about Russia. Especially with the economy of our neighbor, threatened collapse due to sanctions and falling oil prices. And coming down …

       

    Read more>

     


       

       

     


  •  

  •    

         
         

    Museum of the Fourth Republic – the center of fixation thoughts and actions of the new era

       


       

          / Politics Polish
     

    On the calendar Fourth Republic – December 29

     


       
    Date: 12/29/2014 | Be the first commentator!

       

    2006
     
     
     December 29 – a great success in the recovery of the Fourth Republic of the banking sector: an adviser after President of PKO BP is appointed former Prime Minister deserved Wolski, Kazimierz Marcinkiewicz, who shall immediately forward the Nation joyful news that his unusual powers obtained in a number of critical entities …

       

    Read more>

     


       

       

     


  •  

  •    

         
         

    qielih

       


       

          / World
     

    Torture is not torture? That is the question? System.


     

       
    Date: 28/12/2014 | Be the first commentator!

       


     
     11.09.2001, the madmen made great crime, which is probably the details you do not need to tell anyone.
     
     We were then at the fair in Poznan. Mom called stating that the war started.
     
     On this day of this event …

       

    Read more>

     


       

       

     


  •  

  •    

         
         

    M. Marzyński

       


       

          / Pop and Art
     

    Kino-I

     


       
    Date: 28/12/2014 | Be the first commentator!

       

    Nicholas Jazdon, film expert from the University of Adam Mickiewicz University in Poznan is writing a book about my films, which just has to start:
     
     Title: “Mariana Marzyński cinema-I”, sounds a bit like “kino-eye” or “cinema-truth”, concepts that have their …

       

    Read more>

     


       

       

     


  •  

LikeTweet