Posts

Asteroid mining

Image
Asteroid mining is the exploitation of raw materials from asteroids and other minor planets, including near-Earth objects.
Hard rock minerals could be mined from an asteroid or a spent comet. Precious metals such as gold, silver, and platinum group metals could be transported back to Earth, whilst iron group metals and other common ones could be used for construction in space.
Difficulties include the high cost of spaceflight, unreliable identification of asteroids suitable for mining, and ore extraction challenges. Thus, terrestrial mining remains the only means of raw mineral acquisition used today. If space program funding, either public or private, dramatically increases, this situation may change as resources on Earth become increasingly scarce compared to demand and the full potentials of asteroid mining—and space exploration in general—are researched in greater detail.
Purpose
Based on known terrestrial reserves, and growing consumption in both developed and developing countrie…

Circumvent internet censorship

Image
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Applications running on a computing device, e.g. a laptop, desktop, smartphone, across a VPN may therefore benefit from the functionality, security, and management of the private network. Encryption is a common though not an inherent part of a VPN connection.
VPN technology was developed to allow remote users and branch offices to access corporate applications and resources. To ensure security, the private network connection is established using an encrypted layered tunneling protocol and VPN users use authentication methods, including passwords or certificates, to gain access to the VPN. In other applications, Internet users may secure their transactions with a VPN, to circumvent geo-restrictions and censorship, or to connect to proxy servers to prot…

Difference between 1080p, 480p, 720p, Blueray, BRRIP, CAM, DVDrip, DVDSCR, Hdrip, HDTS, HDTV and WebRip | Detailed Explanation .

Image
CAM : A cam is a theater rip usually done with a digital  video camera. A mini tripod is sometimes used, but a lot of the time  this wont be possible, so the camera make shake. Also seating placement  isn’t always idle, and it might be filmed from an angle. If cropped  properly, this is hard to tell unless there’s text on the screen, but a  lot of times these are left with triangular borders on the top and  bottom of the screen. Sound is taken from the on board microphone of the camera, and especially in comedies, laughter can often be heard  during the film. Due to these factors picture and sound quality are  usually quite poor, but sometimes we’re lucky, and the theater will be fairly empty and a fairly clear signal will be heard.
TELESYNC (TS)
A telesync is the same spec as a CAM except it uses an external audio source (most likely an audio jack in the chair for hard of hearing people). A  direct audio source does not ensure a good quality audio source, as a  lot of background noise…

PRIVATE LIMITED COMPANY COMPLIANCES

Image
Private Limited Company Compliances :
Ask anyone with experience, and he’ll tell you running a company is no easy task, certainly not for the faint of heart. Besides all the business stress involved and all the financial pressure to handle, you have customers demanding payment, employees expecting salaries, clients pushing for performance, and that’s enough in itself to make anyone snap. But even all of this is perhaps not so much of a headache for entrepreneurs as the massive legal and regulatory requirements the government expects you to fulfill as a private limited company. Let’s look at a few of these.
Below are a list of just some of the compliances every private limited company is mandatorily required and expected by the law to fulfil.
Board Meetings
At least four board meetings need to be held in a year and at least one meeting needs to be held every quarter. Presence of the directors is needed for the meeting. Quorum is 1/3rd or 2 Directors whichever is greater. The meetings …

BEST EVER TORRENT SITES FOR DOWNLOAD ALL FILES WITHOUT ANY RESTRICTION

Image
In the BitTorrent file distribution system, a torrent file or METAINFO is a computer file that contains metadata about files and folders to be distributed, and usually also a list of the network locations of trackers, which are computers that help participants in the system find each other and form efficient distribution groups called swarms. A torrent file does not contain the content to be distributed; it only contains information about those files, such as their names, sizes, folder structure, and cryptographic hash values for verifying file integrity. The term torrent may refer either to the metadata file or to the files downloaded, depending on the context.
In a nutshell, a torrent file is like an index, which facilitates the efficient lookup of information (but doesn't contain the information itself) and the address of available worldwide computers which upload the content. Torrent files themselves and the method of using torrent files have been created to ease the load on …

TORRENTING WITH A MASK | TOR / I2P

Image
Tor:
Tor has several torrent sites. The Pirate Bay, for example, has a .onion backup at  uj3wazyk5u4hnvtk.onion. One thing to keep in mind, however, is that Tor wasn’t built for torrenting. If your goal is to remain anonymous, this simply isn’t possible if you torrent through Tor. Downloading the .torrent file over Tor is fine. Routing the subsequent 36GB download of Inception.3D.60FPS.1080p.5.1.DTS.BDRip.mp4 through Tor is not fine. Unlike other networks, Tor’s infrastructure is unable to support high bandwidth applications like that. There’s about 700 exit relays serving 3 million people at any given time. If too many people torrent, the network will saturate to a standstill. Then you have the problem that your BitTorrent client needs to publicly announce your IP to the tracker in order for peers to find you. Your client may “anonymously” send your real IP to the tracker, in which case you’ve literally seen no benefit in using Tor. Furthermore, torrenting over the Tor network is pa…

BLOCKCHAIN - BE YOUR OWN BANK

Image
A blockchain, originally block chain, is a growing list of records, called blocks, which are linked using cryptography.[1][6] Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data (generally represented as a Merkle tree).
By design, a blockchain is resistant to modification of the data. It is "an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way". For use as a distributed ledger, a blockchain is typically managed by a peer-to-peer network collectively adhering to a protocol for inter-node communication and validating new blocks. Once recorded, the data in any given block cannot be altered retroactively without alteration of all subsequent blocks, which requires consensus of the network majority. Although blockchain records are not unalterable, blockchains may be considered secure by design and exemplify a distributed computing system with high Byzantine faul…