Home
Search results “Inline network encryptor wiki”

07:45
This is a short vid which shows the code for the matrix multiplication for the MixColumns step. I initially intended to make this vid and the previous AES one around the same length, but we actually covered almost everything in the previous vid! Mix Columns Wikipedia Page: https://en.wikipedia.org/wiki/Rijndael_mix_columns Code for dot products: tmp[0] = (unsigned char)(mul2[state[0]] ^ mul3[state[1]] ^ state[2] ^ state[3]); tmp[1] = (unsigned char)(state[0] ^ mul2[state[1]] ^ mul3[state[2]] ^ state[3]); tmp[2] = (unsigned char)(state[0] ^ state[1] ^ mul2[state[2]] ^ mul3[state[3]]); tmp[3] = (unsigned char)(mul3[state[0]] ^ state[1] ^ state[2] ^ mul2[state[3]]); tmp[4] = (unsigned char)(mul2[state[4]] ^ mul3[state[5]] ^ state[6] ^ state[7]); tmp[5] = (unsigned char)(state[4] ^ mul2[state[5]] ^ mul3[state[6]] ^ state[7]); tmp[6] = (unsigned char)(state[4] ^ state[5] ^ mul2[state[6]] ^ mul3[state[7]]); tmp[7] = (unsigned char)(mul3[state[4]] ^ state[5] ^ state[6] ^ mul2[state[7]]); tmp[8] = (unsigned char)(mul2[state[8]] ^ mul3[state[9]] ^ state[10] ^ state[11]); tmp[9] = (unsigned char)(state[8] ^ mul2[state[9]] ^ mul3[state[10]] ^ state[11]); tmp[10] = (unsigned char)(state[8] ^ state[9] ^ mul2[state[10]] ^ mul3[state[11]]); tmp[11] = (unsigned char)(mul3[state[8]] ^ state[9] ^ state[10] ^ mul2[state[11]]); tmp[12] = (unsigned char)(mul2[state[12]] ^ mul3[state[13]] ^ state[14] ^ state[15]); tmp[13] = (unsigned char)(state[12] ^ mul2[state[13]] ^ mul3[state[14]] ^ state[15]); tmp[14] = (unsigned char)(state[12] ^ state[13] ^ mul2[state[14]] ^ mul3[state[15]]); tmp[15] = (unsigned char)(mul3[state[12]] ^ state[13] ^ state[14] ^ mul2[state[15]]); Music Channel: Sober: https://youtu.be/Y2LCg3cGu7U Gold Digger: https://youtu.be/wAoXB8tg0co Become a patron and support What's a Creel programming vids on Patreon: www.patreon.com/whatsacreel FaceBook: www.facebook.com/pages/WhatsaCreel/167732956665435
Views: 21192 What's a Creel?

04:15
Learn more by visiting: http://cs.co/9004B2eMg. This Fundamentals animation produced as part of TechWiseTV Episode 67. Cisco TrustSec builds security and intelligence into the network with policy-based access control, identity-aware networking, and data confidentiality and integrity. Because your networks have no borders, Cisco TrustSec helps you secure borderless networks with confidence, consistency, and efficiency.
Views: 35490 Cisco

23:43
This is something i have been using for awhile now, thought i would show you the entire process, This is a tutorial for setting up a raspberry pi vpn router. Thank for the view!! ○○○ LINKS ○○○ Raspberry Pi 3 ► http://amzn.to/2oquADd Private Internet Access ► https://goo.gl/StVNEU Novaspirit Post ► https://goo.gl/JbRztf ○○○ Send Me Stuff ○○○ Don Hui PO BOX 765 Farmingville, NY 11738 ○○○ Other Videos ○○○ Microcenter Haul ► https://www.youtube.com/watch?v=-SsL89kxwJ4 HiKey 960 Review ► https://www.youtube.com/watch?v=bxNe9bBXWO4 Watercooled Ryzen 7 Build ► https://youtu.be/dKY2F-yu5e8 RPi Touchscreen ► https://youtu.be/M0p4oTChKEc Voice Acvtivated Google ► https://www.novaspirit.com/Lc2Fb Google Assistant Button Trigger ► https://novaspirit.com/ICsME Google assistant on raspberry pi ► https://novaspirit.com/TX9TF Running Mac OS on Raspberry Pi ► https://novaspirit.com/faVd1 kali linux replacement? parrot os ► https://novaspirit.com/3f2iY GeChic Portable Monitor ► https://novaspirit.com/pyLVF Install Desktop Minecraft on Rpi ► https://goo.gl/nmLhKJ patreon @ https://patreon.com/novaspirittech Tweet me: @ http://twitter.com/novaspirittech facebook: @ http://facebook.com/novaspirittech Instagram @ https://instagram.com/novaspirittech DISCLAIMER: This video and description contains affiliate links, which means that if you click on one of the product links, I’ll receive a small commission. This help support the channel and allows us to continue to make videos like this. Thank you for the support!
Views: 166483 Novaspirit Tech

17:10
uBlock Origin has very confusing user interface in the advanced user mode if you haven't read the lengthy documentation. If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 66%! This video tutorial explains how to use uBlock Origin in advanced user mode and all the advanced settings to protect your online privacy. With this uBlock Origin video, you'll learn how to use it to protect your online privacy and security. The biggest benefit of this tutorial is that you'll learn how to block scripts with uBlock Origin. uBlock Origin is essential to learn how to protect your online privacy, and can replace other extensions like uMatrix, Request Policy, Adblock Plus, Privacy Badger, and many other blockers. Help me build the first crypto-funded channel on YouTube by donating to one of my addresses. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Many people take uBlock Origin as an adblocker but it's actually a wide-spectrum blocker. That means uBlock Origin can block malware, spyware, trackers, analytics software, scripts, iframes, CSS, and images. Ublock Origin has an incredible power and potential to protect you from virtually all malware, trackers, advertisers, hackers, and creeps much better than any other blocker or even your anti-virus software. In this video I explain how uBlock Origin works in both static filtering and dynamic filtering and I also explain cosmetic filtering. Then I go into in-depth explanation of how to best use uBlock Origin in easy mode (slightly enhanced default mode), medium mode, and hard mode. If you don’t protect yourself, there are thousands of remote servers making requests on just a handful of your most favorite websites you visit daily. They have the audacity to track you without your consent and drain your power and bandwidth on top of that. When you learn to use uBlock Origin to its full potential, it will act as your top-layer firewall that will block loads of malware circulating across the web. For example, with uBlock Origin in advanced mode, you would be immune to many cyber attacks and malware circulating across the web. Reading Official Wiki: https://github.com/gorhill/uBlock/wiki Credits Music by Chuki Beats https://www.youtube.com/user/CHUKImusic The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
Views: 52891 The Hated One

06:47
For more on spin, check out: http://youtu.be/v1_-LsQLwkA This video was supported by TechNYou: http://bit.ly/19bBX5G A quantum computer works in a totally different way from a classical computer. Quantum bits or 'qubits' can exist in a superposition state of both zero and one simultaneously. This means that a set of two qubits can be in a superposition of four states, which therefore require four numbers to uniquely identify the state. So the amount of information stored in N qubits is two to the power of N classical bits. Thank you to Andrea Morello and UNSW. For more info, check out: http://bit.ly/17wZ7lt
Views: 3099282 Veritasium

06:58
What is SESSION HIJACKING? What does SESSION HIJACKING mean? SESSION HIJACKING meaning - SESSION HIJACKING definition - SESSION HIJACKING explanation. Source: Wikipedia.org article, adapted under https://creativecommons.org/licenses/by-sa/3.0/ license. SUBSCRIBE to our Google Earth flights channel - https://www.youtube.com/channel/UC6UuCPh7GrXznZi0Hz2YQnQ In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server. It has particular relevance to web developers, as the HTTP cookies used to maintain a session on many web sites can be easily stolen by an attacker using an intermediary computer or with access to the saved cookies on the victim's computer (see HTTP cookie theft). A popular method is using source-routed IP packets. This allows an attacker at point B on the network to participate in a conversation between A and C by encouraging the IP packets to pass through B's machine. If source-routing is turned off, the attacker can use "blind" hijacking, whereby it guesses the responses of the two machines. Thus, the attacker can send a command, but can never see the response. However, a common command would be to set a password allowing access from somewhere else on the net. An attacker can also be "inline" between A and C using a sniffing program to watch the conversation. This is known as a "man-in-the-middle attack". HTTP protocol versions 0.8 and 0.9 lacked cookies and other features necessary for session hijacking. Version 0.9beta of Mosaic Netscape, released on October 13, 1994, supported cookies. Early versions of HTTP 1.0 did have some security weaknesses relating to session hijacking, but they were difficult to exploit due to the vagaries of most early HTTP 1.0 servers and browsers. As HTTP 1.0 has been designated as a fallback for HTTP 1.1 since the early 2000s—and as HTTP 1.0 servers are all essentially HTTP 1.1 servers the session hijacking problem has evolved into a nearly permanent security risk. The introduction of supercookies and other features with the modernized HTTP 1.1 has allowed for the hijacking problem to become an ongoing security problem. Webserver and browser state machine standardization has contributed to this ongoing security problem. There are four main methods used to perpetrate a session hijack. These are: Session fixation, where the attacker sets a user's session id to one known to him, for example by sending the user an email with a link that contains a particular session id. The attacker now only has to wait until the user logs in. Session side jacking, where the attacker uses packet sniffing to read network traffic between two parties to steal the session cookie. Many web sites use SSL encryption for login pages to prevent attackers from seeing the password, but do not use encryption for the rest of the site once authenticated. This allows attackers that can read the network traffic to intercept all the data that is submitted to the server or web pages viewed by the client. Since this data includes the session cookie, it allows him to impersonate the victim, even if the password itself is not compromised. Unsecured Wi-Fi hotspots are particularly vulnerable, as anyone sharing the network will generally be able to read most of the web traffic between other nodes and the access point. Cross-site scripting, where the attacker tricks the user's computer into running code which is treated as trustworthy because it appears to belong to the server, allowing the attacker to obtain a copy of the cookie or perform other operations.
Views: 3332 The Audiopedia

03:44
What is SSL ACCELERATION? What does SSL ACCELERATION mean? SSL ACCELERATION meaning - SSL ACCELERATION definition - SSL ACCELERATION explanation. Source: Wikipedia.org article, adapted under https://creativecommons.org/licenses/by-sa/3.0/ license. SUBSCRIBE to our Google Earth flights channel - https://www.youtube.com/channel/UC6UuCPh7GrXznZi0Hz2YQnQ SSL acceleration (TLS acceleration) is a method of offloading processor-intensive public-key encryption for Transport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL) to a hardware accelerator. Typically this means having a separate card that plugs into a PCI slot in a computer that contains one or more co-processors able to handle much of the SSL processing. SSL accelerators may use off the shelf CPUs, but most use custom ASICs and RISC chips to do most of the difficult computational work. The most computationally expensive part of an SSL session is the SSL handshake, where the SSL server (usually an SSL webserver) and the SSL client (usually a web browser) agree on a number of parameters that establish the security of the connection. Part of the role of the SSL handshake is to agree on session keys (symmetric keys, used for the duration of a given session), but the encryption and signature of the SSL handshake messages itself is done using asymmetric keys (contained in the certificates), which requires more computational power than the symmetric cryptography used for the encryption/decryption of the session data. Typically a hardware SSL accelerator will offload processing of the SSL handshake while leaving it to the server software to process the less intense symmetric cryptography of the actual SSL data exchange, but some accelerators handle all SSL operations and terminate the SSL connection, thus leaving the server seeing only unencrypted connections. Modern x86 CPUs support Advanced Encryption Standard (AES) encoding and decoding in hardware, using the AES instruction set proposed by Intel in March 2008. Allwinner Technology provides a hardware cryptographic accelerator in its A10, A20, A30 and A80 ARM system-on-chip series, and all ARM CPUs have acceleration in the later ARMv8 architecture. The accelerator provides the RSA public-key algorithm, several widely used symmetric-key algorithms, cryptographic hash functions, and a cryptographically secure pseudo-random number generator.[1] TLS 1 was first defined in RFC 2246 in January 1999 as an upgrade to SSL Version 3. Because TLS is essentially an updated form of SSL, TLS session acceleration is essentially the same thing as SSL acceleration. As stated in the RFC, "the differences between this protocol and SSL 3 are not dramatic, but they are significant enough that TLS 1 and SSL 3 do not interoperate." TLS 1 does include a means by which a TLS implementation can downgrade the connection to SSL 3. The current version of TLS (1.2) was defined in RFC 5246 in August 2008. It is based on the earlier TLS 1.1 specification.
Views: 710 The Audiopedia

01:38:35
https://media.ccc.de/v/EH2017-8499-towards_automatic_end_to_end_mail_encryption mail encryption overview and hands-on Autocrypt sessions Email has been declared dead but refuses to die. And there are good reasons to re-inforce efforts to improve it. Or do you want to have everything tied to trackable proprietary mobile phone numbers? The session starts with an overview of past and present mail encryption approaches, namely traditional PGP, the pEp project and the relatively new Web key service and Autocrypt specs and efforts. It dives into and demos Autocrypt and evolves into a hands-on session for getting it to work for participants. holger krekel juga
Views: 796 media.ccc.de

02:48
What is PROMISCUOUS MODE? What does PROMISCUOUS MODE mean? PROMISCUOUS MODE meaning - PROMISCUOUS MODE definition - PROMISCUOUS MODE explanation. Source: Wikipedia.org article, adapted under https://creativecommons.org/licenses/by-sa/3.0/ license. In computer networking, promiscuous mode (often shortened to "promisc mode" or "promisc. mode") is a mode for a wired network interface controller (NIC) or wireless network interface controller (WNIC) that causes the controller to pass all traffic it receives to the central processing unit (CPU) rather than passing only the frames that the controller is intended to receive. This mode is normally used for packet sniffing that takes place on a router or on a computer connected to a hub (instead of a switch) or one being part of a WLAN. Interfaces are placed into promiscuous mode by software bridges often used with hardware virtualization. In IEEE 802 networks such as Ethernet, token ring, and IEEE 802.11, and in FDDI, each frame includes a destination Media Access Control address (MAC address). In non-promiscuous mode, when a NIC receives a frame, it normally drops it unless the frame is addressed to that NIC's MAC address or is a broadcast or multicast frame. In promiscuous mode, however, the NIC allows all frames through, thus allowing the computer to read frames intended for other machines or network devices. Many operating systems require superuser privileges to enable promiscuous mode. A non-routing node in promiscuous mode can generally only monitor traffic to and from other nodes within the same broadcast domain (for Ethernet and IEEE 802.11) or ring (for token ring or FDDI). Computers attached to the same network hub satisfy this requirement, which is why network switches are used to combat malicious use of promiscuous mode. A router may monitor all traffic that it routes. Promiscuous mode is often used to diagnose network connectivity issues. There are programs that make use of this feature to show the user all the data being transferred over the network. Some protocols like FTP and Telnet transfer data and passwords in clear text, without encryption, and network scanners can see this data. Therefore, computer users are encouraged to stay away from insecure protocols like telnet and use more secure ones such as SSH.
Views: 6014 The Audiopedia

31:51
Welcome to episode #2 of Block Digest! (Wednesday, August 16th 2017) Join us: https://bitcoinmumble.com/ The topic for today is "Cryptocurrency and the Original Vision of PayPal," a discussion on David Sacks' claim that blockchain-based cryptocurrencies like Bitcoin and Ethereum resemble ideas that PayPal had back in its early days, of creating 'the new world currency.' Is this just a PR move in response to a burgeoning competitor or did they truly stray from a goal to build the new money? We also talk about Bitcoin in North Korea and efforts to undermine the division using weather balloons. Credits ======== Shinobius - https://twitter.com/brian_trollz Chris Ellis - https://twitter.com/MrChrisEllis Aknix - https://twitter.com/rm0rf Inline Producer Steve - https://twitter.com/MrHodl This video is licensed under Creative Commons (CC BY 4.0): https://creativecommons.org/licenses/by/4.0/ Links ==== "David Sacks: Cryptocurrency fulfills the 'original vision' we tried to build at PayPal" by Eric M. Jackson (@ericjackson) via CNBC - https://www.cnbc.com/2017/08/14/david-sacks-cryptocurrency-interview.html Reddit discussion thread - https://www.reddit.com/r/Bitcoin/comments/6u0mm9/david_sacks_cryptocurrency_fulfills_the_original/?sort=top&sh=6d4e8bb4&st=j6fcc1b8 "Timeline of PayPal" - https://en.wikipedia.org/wiki/Timeline_of_PayPal More on Peter Thiel - https://twitter.com/J9Roem/status/870360806709506049 "There's a New Money in Town" Bitcoin Parody of PayPal Ad - https://youtu.be/P4tci6E18_0 From yesterday's story: "Streaming Bitcoin Blockchain from the space Starter Pack" - https://www.reddit.com/r/Bitcoin/comments/6tv8qz/streaming_bitcoin_blockchain_from_the_space/dloi6mx/?st=j6fc1do0&sh=7df8f028 "The Giant Balloons Smuggling Tech into North Korea" via Bloomberg - https://youtu.be/m_nx8L7pqEo
Views: 540 Block Digest

06:33
This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/Cubesat_Space_Protocol 00:01:30 1 Description 00:03:35 2 Operating systems supported 00:04:17 3 Physical layer drivers 00:05:36 4 Protocol header 00:05:46 4.1 Version 1 Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. Listen on Google Assistant through Extra Audio: https://assistant.google.com/services/invoke/uid/0000001a130b3f91 Other Wikipedia audio articles at: https://www.youtube.com/results?search_query=wikipedia+tts Upload your own Wikipedia articles through: https://github.com/nodef/wikipedia-tts Speaking Rate: 0.9138210869671606 Voice name: en-US-Wavenet-E "I cannot teach anybody anything, I can only make them think." - Socrates SUMMARY ======= CubeSat Space Protocol (CSP) is a small network-layer delivery protocol designed for CubeSats. The idea was developed by a group of students from Aalborg University in 2008, and further developed for the AAUSAT3 CubeSat mission that was launched in 2013. The protocol is based on a 32-bit header containing both network and transport layer information. Its implementation is designed for embedded systems such as the 8-bit AVR microprocessor and the 32-bit ARM and AVR from Atmel. The implementation is written in C and is ported to run on FreeRTOS and POSIX and pthreads-based operating systems such as Linux. Support for Mac OS X and Microsoft Windows will be available in version 1.1. The three-letter acronym CSP was adopted as an abbreviation for CAN Space Protocol because the first MAC-layer driver was written for CAN-bus. The physical layer has since been extended to include several other technologies, and the name was therefore extended to the more general CubeSat Space Protocol without changing the abbreviation. The protocol and the implementation is actively maintained by the students at Aalborg University and the spin-off company GomSpace. The source code is available under an LGPL license and hosted on GitHub.
Views: 0 wikipedia tts

51:16
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/White-Green/DEFCON-22-Kenneth-White-and-Matthew-Green-The-Open-Crypto-Audit-Project-Updated.pdf The Open Crypto Audit Project Kenneth White CO-FOUNDER, OPEN CRYPTO AUDIT PROJECT Matthew Green RESEARCH PROFESSOR, JOHNS HOPKINS UNIVERSITY Join us for the story of the origins and history of the Open Crypto Audit Project (OCAP). OCAP is a community-driven global initiative which grew out of the first comprehensive public audit and cryptanalysis of the widely used encryption software TrueCrypt®. Our charter is to provide technical assistance to free and open source software projects in the public interest. We serve primarily as a coordinator for volunteers and as a funding mechanism for technical experts in security, software engineering, and cryptography. We conduct analysis and research on FOSS and other widely software, and provide highly specialized technical assistance, analysis and research on free and open source software. This talk will present how we audited TrueCrypt, detailing both the Phase I security assessment, and the Phase II cryptanalysis. Looking forward, in light of GotoFail and HeartBleed, we will discuss future plans for our next audit projects of other open source critical infrastructure. Kenneth White is a co-founder of the CBX Group, and formerly principal scientist and senior security R&D engineer at Social & Scientific Systems. His work focuses on cloud security, machine learning, and distributed database architecture. At SSS, White led the Biomedical Informatics team that designed and runs the operations center for the largest clinical trial network in the world, with research centers in over 100 countries. Together with Matthew Green, White co-founded the TrueCrypt audit project, a community-driven initiative to conduct the first comprehensive cryptanalysis and public security audit of the widely used TrueCrypt encryption software. White holds a MEd from Harvard and is a PhD candidate in neuroscience and cognitive science, with research focusing on expert systems, real-time classification and machine learning. He is a technical reviewer for the Software Engineering Institute, and publishes and speaks frequently on computational neuroscience, signal processing, and security engineering. Twitter: @kennwhite Matthew D. Green, PhD is a professor of computer science at Johns Hopkins University. He teaches applied cryptography and builds secure systems. Green trained under Susan Hohenberger and Avi Rubin, and his research includes techniques for privacy-enhanced information storage, anonymous payment systems, and bilinear map-based cryptography. Green formerly served as a senior research staff member at AT&T Labs. Together with Kenneth White, he co-founded the TrueCrypt audit project, a community-driven initiative to conduct the first comprehensive cryptanalysis and public security audit of the widely used TrueCrypt encryption software. He blogs at Cryptography Engineering, and talks about cryptography and privacy. Twitter: @matthew_d_green Web: https://opencryptoaudit.org/people
Views: 3432 DEFCONConference

04:02
Want all of our OS X training videos? Visit our Learning Library, which features all of our training courses and tutorials at http://learn.infiniteskills.com?utm_source=youtube&utm_medium=youtube_video_description&utm_campaign=os_x_beyond_basics_encrypting_adiskvolume&network=youtube More details on this OS X - Beyond the Basics training can be seen at http://www.infiniteskills.com/training/os-x-beyond-the-basics.html?utm_source=youtube&utm_medium=youtube_video_description&utm_campaign=os_x_beyond_basics_encrypting_adiskvolume&network=youtube. This clip is one example from the complete course. For more free OS X tutorials please visit our main website. YouTube: https://www.youtube.com/user/OreillyMedia Facebook: https://www.facebook.com/OReilly/?fref=ts Twitter: https://twitter.com/OReillyMedia Website: http://www.oreilly.com/

01:01
https://www.youtube.com/watch?v=EIKQbwyItjs
Views: 106 Jesse Allen

01:46:37
This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/List_of_file_formats 00:00:56 1 Archive and compressed 00:08:11 1.1 Physical recordable media archiving 00:10:11 2 Ceramics glaze recipes 00:11:03 3 Computer-aided Design 00:11:26 3.1 Computer-aided design (CAD) 00:16:59 3.2 Electronic design automation (EDA) 00:19:41 3.3 Test technology 00:19:58 4 Database 00:23:35 5 Desktop publishing 00:24:50 6 Document 00:25:02 7 Financial records 00:25:25 7.1 Financial data transfer formats 00:26:05 8 Font file 00:27:33 9 Geographic information system 00:28:54 10 Graphical information organizers 00:30:14 11 Graphics 00:30:23 11.1 Color palettes 00:31:08 11.2 Color management 00:31:24 11.3 Raster graphics 00:31:37 11.4 Vector graphics 00:34:17 11.5 3D graphics 00:40:39 12 Links and shortcuts 00:41:25 13 Mathematical 00:41:52 14 Object code, executable files, shared and dynamically linked libraries 00:46:05 15 Page description language 00:47:00 16 Personal information manager 00:47:25 17 Presentation 00:48:58 18 Project management software 00:49:11 19 Reference management software 00:49:35 20 Scientific data (data exchange) 00:50:59 20.1 Multi-domain 00:51:31 20.2 Meteorology 00:52:01 20.3 Chemistry 00:52:33 20.4 Mathematics 00:52:49 20.5 Biology 00:56:52 20.6 Biomedical imaging 00:58:09 20.7 Biomedical signals (time series) 01:00:18 20.8 Other Biomedical Formats 01:00:41 20.9 Biometric Formats 01:01:25 21 spanProgramming languages and scripts 01:03:24 22 Security 01:03:52 22.1 Certificates and keys 01:04:34 22.1.1 X.509 01:11:39 23 Encrypted files 01:14:13 24 Password files 01:14:38 25 Signal data (non-audio) 01:18:32 26 Sound and music 01:19:21 27 Spreadsheet 01:27:39 28 Tabulated data 01:32:29 29 Video 01:32:39 29.1 Video editing, production 01:33:11 30 Video game data 01:34:17 31 Video game storage media 01:34:30 32 Virtual machines 01:34:54 32.1 Microsoft Virtual PC, Virtual Server 01:35:19 32.2 EMC VMware ESX, GSX, Workstation, Player 01:37:26 32.3 Virtualbox 01:38:18 32.4 Parallels Workstation 01:41:28 32.5 QEMU 01:41:45 33 Webpage 01:41:54 34 Markup languages and other web standards-based formats 01:42:17 35 Other 01:43:22 35.1 Cursors 01:43:41 36 Generalized files 01:44:23 36.1 General data formats 01:44:50 36.1.1 Text-based 01:44:59 36.2 Generic file extensions 01:45:13 36.2.1 Binary files 01:45:49 36.2.2 Text files 01:46:11 36.3 Partial files Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. Listen on Google Assistant through Extra Audio: https://assistant.google.com/services/invoke/uid/0000001a130b3f91 Other Wikipedia audio articles at: https://www.youtube.com/results?search_query=wikipedia+tts Upload your own Wikipedia articles through: https://github.com/nodef/wikipedia-tts Speaking Rate: 0.9169784042185908 Voice name: en-AU-Wavenet-C "I cannot teach anybody anything, I can only make them think." - Socrates SUMMARY ======= This is a list of file formats used by computers, organized by type. Filename extensions are usually noted in parentheses if they differ from the file format name or abbreviation. Many operating systems do not limit filenames to one extension shorter than 4 characters, as was common with some operating systems that supported the File Allocation Table (FAT) file system. Examples of operating systems that do not impose this limit include Unix-like systems, and Microsoft Windows NT, 95, 98, and Me which have no three character limit on extensions for 32-bit or 64-bit applications on file systems other than pre-Windows 95 and Windows NT 3.5 versions of the FAT file system. Some filenames are given extensions longer than three characters. Some file formats, such as .txt, may be listed multiple times.
Views: 187 wikipedia tts

08:19:20

04:31
This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/NaCl_(software) 00:01:02 1 Basic functions 00:01:13 1.1 Public-key cryptography 00:01:36 1.2 Secret-key cryptography 00:02:13 1.3 Low-level functions 00:02:36 2 Implementations 00:03:18 2.1 Alternative implementations 00:04:15 3 See also Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. Listen on Google Assistant through Extra Audio: https://assistant.google.com/services/invoke/uid/0000001a130b3f91 Other Wikipedia audio articles at: https://www.youtube.com/results?search_query=wikipedia+tts Upload your own Wikipedia articles through: https://github.com/nodef/wikipedia-tts Speaking Rate: 0.7076941629349395 Voice name: en-US-Wavenet-F "I cannot teach anybody anything, I can only make them think." - Socrates SUMMARY ======= NaCl (pronounced "salt") is an abbreviation for "Networking and Cryptography library", a public domain "...high-speed software library for network communication, encryption, decryption, signatures, etc".NaCl was created by the mathematician and programmer Daniel J. Bernstein who is best known for the creation of qmail and Curve25519. The core team also includes Tanja Lange and Peter Schwabe. The main goal while creating NaCl, according to the paper, was to "avoid various types of cryptographic disasters suffered by previous cryptographic libraries".
Views: 2 wikipedia tts

02:30
Get the Extension https://chrome.google.com/webstore/detail/password-revealer-with-ke/knbnoooohffobecbjfgemggdbmbhenpo Typing in password, especially long, complicated ones can be frustrating. The password box shows asterisks when you type instead of text. So if you mistype something, you usually have to start over because you can't tell what went wrong. This simple trick allows you to see what you are typing in the password box as text. It can NOT be used to hack an unknown password, but will help you when typing in your own passwords. Test Password Strength http://HowSecureIsMyPassword.net/ Go to the site you wish to log in to Type in you username/email Now you need to change the html code that tells the password section to be hidden The basic principle is to "Inspect Element" of the password box and change type="password" to type="text" -In Google Chrome, right-click in the password field and select "Inspect Element" A portion of the lower part of the screen should now be occupied by a new window. The line highlighted should begin with "input" If it doesn't, make sure you are in the password box and right-click "Inspect Element" again Look for the piece of code that says type="password" Change this to type="text" and press "Enter" Now you can see the password when you type Just press Login to access your account -In FireFox, it the same thing. Right-click, "Inspect Element", and change the type to "text" and press enter -In Internet Explorer, "Inspect Element" is not available from the right-click menu. So click "Tools" and select "F12 Developer Tools" (or press F12) Below the HTML section on the left, click the Mouse Icon Now click on the password box and the input field code will be highlighted Change the type from "password" to "text" as explained above and press enter
Views: 109031 TanUv90

02:03:40
This is an audio version of the Wikipedia Article: Timeline of United States inventions (before 1890) Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. You can find other Wikipedia audio articles too at: https://www.youtube.com/channel/UCuKfABj2eGyjH3ntPxp4YeQ You can upload your own Wikipedia articles through: https://github.com/nodef/wikipedia-tts "The only true wisdom is in knowing you know nothing." - Socrates SUMMARY ======= A timeline of United States inventions (before 1890) encompasses the ingenuity and innovative advancements of the United States within a historical context, dating from the Colonial Period to the Gilded Age, which have been achieved by inventors who are either native-born or naturalized citizens of the United States. Copyright protection secures a person's right to his or her first-to-invent claim of the original invention in question, highlighted in Article I, Section 8, Clause 8 of the United States Constitution, which gives the following enumerated power to the United States Congress: In 1641, the first patent in North America was issued to Samuel Winslow by the General Court of Massachusetts for a new method of making salt. On April 10, 1790, President George Washington signed the Patent Act of 1790 (1 Stat. 109) into law proclaiming that patents were to be authorized for "any useful art, manufacture, engine, machine, or device, or any improvement therein not before known or used". On July 31, 1790, Samuel Hopkins of Pittsford, Vermont became the first person in the United States to file and to be granted a patent for an improved method of "Making Pot and Pearl Ashes". The Patent Act of 1836 (Ch. 357, 5 Stat. 117) further clarified United States patent law to the extent of establishing a patent office where patent applications are filed, processed, and granted, contingent upon the language and scope of the claimant's invention, for a patent term of 14 years with an extension of up to an additional 7 years. However, the Uruguay Round Agreements Act of 1994 (URAA) changed the patent term in the United States to a total of 20 years, effective for patent applications filed on or after June 8, 1995, thus bringing United States patent law further into conformity with international patent law. The modern-day provisions of the law applied to inventions are laid out in Title 35 of the United States Code (Ch. 950, sec. 1, 66 Stat. 792). From 1836 to 2011, the United States Patent and Trademark Office (USPTO) has granted a total of 7,861,317 patents relating to several well-known inventions appearing throughout the timeline below.
Views: 215 wikipedia tts

01:19:02
This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/Steam_(software) 00:01:53 1 History 00:05:22 2 Client functionality 00:05:32 2.1 Software delivery and maintenance 00:10:21 2.2 Storefront features 00:18:15 2.3 Privacy and security 00:22:32 2.4 User interface 00:28:38 2.5 Developer features 00:30:52 2.6 Steam Workshop 00:32:58 2.7 Steam for Schools 00:33:40 3 Storefront curation 00:34:42 3.1 Steam Greenlight 00:36:57 3.2 Steam Direct 00:38:53 3.3 Discovery updates 00:42:19 3.4 Policies 00:45:34 3.4.1 Trolling and other violations 00:50:33 3.4.2 Mature content 00:53:34 4 Platforms 00:53:43 4.1 Microsoft Windows 00:54:42 4.2 macOS 00:56:22 4.3 Linux 00:59:08 4.4 Consoles 01:01:02 4.5 Mobile platforms 01:02:41 4.6 Steam Machine 01:03:40 5 Market share and impact 01:03:50 5.1 Users 01:05:30 5.2 Sales and distribution 01:10:43 5.3 Curation 01:12:45 5.4 Sector competition 01:15:44 5.5 Legal issues Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. You can find other Wikipedia audio articles too at: https://www.youtube.com/channel/UCuKfABj2eGyjH3ntPxp4YeQ You can upload your own Wikipedia articles through: https://github.com/nodef/wikipedia-tts "The only true wisdom is in knowing you know nothing." - Socrates SUMMARY ======= Steam is a digital distribution platform developed by Valve Corporation for purchasing and playing video games. Steam offers digital rights management (DRM), matchmaking servers, video streaming, and social networking services. Steam provides the user with installation and automatic updating of games, and community features such as friends lists and groups, cloud saving, and in-game voice and chat functionality. The software provides a freely available application programming interface (API) called Steamworks, which developers can use to integrate many of Steam's functions into their products, including networking, matchmaking, in-game achievements, microtransactions, and support for user-created content through Steam Workshop. Though initially developed for use on Microsoft Windows operating systems, versions for macOS and Linux were later released. Mobile apps with connected functionality with the main software were later released for iOS, Android, and Windows Phone in the 2010s. The platform also offers a small selection of non-video game content, such as design software, anime, and films. The Steam platform is the largest digital distribution platform for PC gaming, estimated in 2013 to have 75% of the market space. By 2017, users purchasing games through Steam totaled roughly US\$4.3 billion, representing at least 18% of global PC game sales. By early 2018, the service had over 150 million registered accounts with a peak of 18.5 million concurrent users online. The success of the Steam platform has led to the development of a line of Steam Machine microconsoles, which include the SteamOS operating system and Steam Controllers, and various virtual reality devices using SteamVR such as the HTC Vive.
Views: 27 wikipedia tts

50:52
This is an audio version of the Wikipedia Article: Portable Document Format Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. You can find other Wikipedia audio articles too at: https://www.youtube.com/channel/UCuKfABj2eGyjH3ntPxp4YeQ You can upload your own Wikipedia articles through: https://github.com/nodef/wikipedia-tts "The only true wisdom is in knowing you know nothing." - Socrates SUMMARY ======= The Portable Document Format (PDF) is a file format developed by Adobe in the 1990s to present documents, including text formatting and images, in a manner independent of application software, hardware, and operating systems. Based on the PostScript language, each PDF file encapsulates a complete description of a fixed-layout flat document, including the text, fonts, vector graphics, raster images and other information needed to display it. PDF was standardized as an open format, ISO 32000, in 2008, and no longer requires any royalties for its implementation. Today, PDF files may contain a variety of content besides flat text and graphics including logical structuring elements, interactive elements such as annotations and form-fields, layers, rich media (including video content) and three dimensional objects using U3D or PRC, and various other data formats. The PDF specification also provides for encryption and digital signatures, file attachments and metadata to enable workflows requiring these features.
Views: 9 wikipedia tts

45:16
This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/Timeline_of_computer_viruses_and_worms 00:00:14 1 Pre-1970 00:00:44 2 1971–1979 00:00:56 2.1 1971 00:01:36 2.2 1973 (Fiction) 00:02:46 2.3 1974 00:03:18 2.4 1975 00:04:36 3 1981–1989 00:04:48 3.1 1981 00:05:26 3.2 1983 00:06:22 3.3 1984 00:06:58 3.4 1986 00:07:56 3.5 1987 00:09:57 3.6 1988 00:11:20 3.7 1989 00:12:11 4 1990–1999 00:12:22 4.1 1990 00:13:05 4.2 1992 00:13:50 4.3 1993 00:14:01 4.4 1994 00:14:16 4.5 1995 00:14:34 4.6 1996 00:15:08 4.7 1998 00:15:28 4.8 1999 00:16:25 5 2000–2009 00:16:36 5.1 2000 00:18:39 5.2 2001 00:20:05 5.3 2002 00:20:51 5.4 2003 00:23:00 5.5 2004 00:26:11 5.6 2005 00:26:59 5.7 2006 00:28:00 5.8 2007 00:28:51 5.9 2008 00:31:28 5.10 2009 00:32:19 6 2010–present 00:32:29 6.1 2010 00:34:03 6.2 2011 00:35:51 6.3 2012 00:37:43 6.4 2013 00:38:42 6.5 2014 00:39:19 6.6 2015 00:39:44 6.7 2016 00:43:13 6.8 2017 00:44:56 7 See also Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. Listen on Google Assistant through Extra Audio: https://assistant.google.com/services/invoke/uid/0000001a130b3f91 Other Wikipedia audio articles at: https://www.youtube.com/results?search_query=wikipedia+tts Upload your own Wikipedia articles through: https://github.com/nodef/wikipedia-tts Speaking Rate: 0.9067364698237281 Voice name: en-AU-Wavenet-A "I cannot teach anybody anything, I can only make them think." - Socrates SUMMARY ======= This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.
Views: 19 wikipedia tts

50:52
This is an audio version of the Wikipedia Article: Portable Document Format Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. You can find other Wikipedia audio articles too at: https://www.youtube.com/channel/UCuKfABj2eGyjH3ntPxp4YeQ You can upload your own Wikipedia articles through: https://github.com/nodef/wikipedia-tts "The only true wisdom is in knowing you know nothing." - Socrates SUMMARY ======= The Portable Document Format (PDF) is a file format developed by Adobe in the 1990s to present documents, including text formatting and images, in a manner independent of application software, hardware, and operating systems. Based on the PostScript language, each PDF file encapsulates a complete description of a fixed-layout flat document, including the text, fonts, vector graphics, raster images and other information needed to display it. PDF was standardized as an open format, ISO 32000, in 2008, and no longer requires any royalties for its implementation. Today, PDF files may contain a variety of content besides flat text and graphics including logical structuring elements, interactive elements such as annotations and form-fields, layers, rich media (including video content) and three dimensional objects using U3D or PRC, and various other data formats. The PDF specification also provides for encryption and digital signatures, file attachments and metadata to enable workflows requiring these features.
Views: 5 wikipedia tts

50:52
This is an audio version of the Wikipedia Article: PDF Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. You can find other Wikipedia audio articles too at: https://www.youtube.com/channel/UCuKfABj2eGyjH3ntPxp4YeQ You can upload your own Wikipedia articles through: https://github.com/nodef/wikipedia-tts "The only true wisdom is in knowing you know nothing." - Socrates SUMMARY ======= The Portable Document Format (PDF) is a file format developed by Adobe in the 1990s to present documents, including text formatting and images, in a manner independent of application software, hardware, and operating systems. Based on the PostScript language, each PDF file encapsulates a complete description of a fixed-layout flat document, including the text, fonts, vector graphics, raster images and other information needed to display it. PDF was standardized as an open format, ISO 32000, in 2008, and no longer requires any royalties for its implementation. Today, PDF files may contain a variety of content besides flat text and graphics including logical structuring elements, interactive elements such as annotations and form-fields, layers, rich media (including video content) and three dimensional objects using U3D or PRC, and various other data formats. The PDF specification also provides for encryption and digital signatures, file attachments and metadata to enable workflows requiring these features.
Views: 5 wikipedia tts

24:36
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. It has uses in the study of human-computer interaction. There are numerous keylogging methods, ranging from hardware and software-based approaches to acoustic analysis. This video is targeted to blind users. Attribution: Article text available under CC-BY-SA Creative Commons image source in video
Views: 380 Audiopedia

30:07
Btrfs (B-tree file system, variously pronounced: "Butter F S", "Butterface", "Better F S", "B-tree F S", or simply by spelling it out) is a GPL-licensed experimental copy-on-write file system for Linux. Development began at Oracle Corporation in 2007. As of August 2014, the file system's on-disk format has been marked as stable; however, the Btrfs version included in the most recent Linux kernel mainline release should be used since the development of Btrfs is still very fast-paced. Btrfs is intended to address the lack of pooling, snapshots, checksums, and integral multi-device spanning in Linux file systems, these features being crucial as Linux use scales upward into the larger storage configurations common in enterprise. Chris Mason, the principal Btrfs author, has stated that its goal was "to let Linux scale for the storage that will be available. Scaling is not just about addressing the storage but also means being able to administer and to manage it with a clean interface that lets people see what's being used and makes it more reliable." This video is targeted to blind users. Attribution: Article text available under CC-BY-SA Creative Commons image source in video
Views: 927 Audiopedia

01:46:20
Views: 5553 CS75

01:50:17
Our Miss Brooks is an American situation comedy starring Eve Arden as a sardonic high school English teacher. It began as a radio show broadcast from 1948 to 1957. When the show was adapted to television (1952--56), it became one of the medium's earliest hits. In 1956, the sitcom was adapted for big screen in the film of the same name. Connie (Constance) Brooks (Eve Arden), an English teacher at fictional Madison High School. Osgood Conklin (Gale Gordon), blustery, gruff, crooked and unsympathetic Madison High principal, a near-constant pain to his faculty and students. (Conklin was played by Joseph Forte in the show's first episode; Gordon succeeded him for the rest of the series' run.) Occasionally Conklin would rig competitions at the school--such as that for prom queen--so that his daughter Harriet would win. Walter Denton (Richard Crenna, billed at the time as Dick Crenna), a Madison High student, well-intentioned and clumsy, with a nasally high, cracking voice, often driving Miss Brooks (his self-professed favorite teacher) to school in a broken-down jalopy. Miss Brooks' references to her own usually-in-the-shop car became one of the show's running gags. Philip Boynton (Jeff Chandler on radio, billed sometimes under his birth name Ira Grossel); Robert Rockwell on both radio and television), Madison High biology teacher, the shy and often clueless object of Miss Brooks' affections. Margaret Davis (Jane Morgan), Miss Brooks' absentminded landlady, whose two trademarks are a cat named Minerva, and a penchant for whipping up exotic and often inedible breakfasts. Harriet Conklin (Gloria McMillan), Madison High student and daughter of principal Conklin. A sometime love interest for Walter Denton, Harriet was honest and guileless with none of her father's malevolence and dishonesty. Stretch (Fabian) Snodgrass (Leonard Smith), dull-witted Madison High athletic star and Walter's best friend. Daisy Enright (Mary Jane Croft), Madison High English teacher, and a scheming professional and romantic rival to Miss Brooks. Jacques Monet (Gerald Mohr), a French teacher. Our Miss Brooks was a hit on radio from the outset; within eight months of its launch as a regular series, the show landed several honors, including four for Eve Arden, who won polls in four individual publications of the time. Arden had actually been the third choice to play the title role. Harry Ackerman, West Coast director of programming, wanted Shirley Booth for the part, but as he told historian Gerald Nachman many years later, he realized Booth was too focused on the underpaid downside of public school teaching at the time to have fun with the role. Lucille Ball was believed to have been the next choice, but she was already committed to My Favorite Husband and didn't audition. Chairman Bill Paley, who was friendly with Arden, persuaded her to audition for the part. With a slightly rewritten audition script--Osgood Conklin, for example, was originally written as a school board president but was now written as the incoming new Madison principal--Arden agreed to give the newly-revamped show a try. Produced by Larry Berns and written by director Al Lewis, Our Miss Brooks premiered on July 19, 1948. According to radio critic John Crosby, her lines were very "feline" in dialogue scenes with principal Conklin and would-be boyfriend Boynton, with sharp, witty comebacks. The interplay between the cast--blustery Conklin, nebbishy Denton, accommodating Harriet, absentminded Mrs. Davis, clueless Boynton, scheming Miss Enright--also received positive reviews. Arden won a radio listeners' poll by Radio Mirror magazine as the top ranking comedienne of 1948-49, receiving her award at the end of an Our Miss Brooks broadcast that March. "I'm certainly going to try in the coming months to merit the honor you've bestowed upon me, because I understand that if I win this two years in a row, I get to keep Mr. Boynton," she joked. But she was also a hit with the critics; a winter 1949 poll of newspaper and magazine radio editors taken by Motion Picture Daily named her the year's best radio comedienne. For its entire radio life, the show was sponsored by Colgate-Palmolive-Peet, promoting Palmolive soap, Lustre Creme shampoo and Toni hair care products. The radio series continued until 1957, a year after its television life ended. http://en.wikipedia.org/wiki/Our_Miss_Brooks
Views: 91488 Remember This

12:23
My advice is this: Settle! That's right. Don't worry about passion or intense connection. Don't nix a guy based on his annoying habit of yelling "Bravo!" in movie theaters. Overlook his halitosis or abysmal sense of aesthetics. Because if you want to have the infrastructure in place to have a family, settling is the way to go. Based on my observations, in fact, settling will probably make you happier in the long run, since many of those who marry with great expectations become more disillusioned with each passing year. (It's hard to maintain that level of zing when the conversation morphs into discussions about who's changing the diapers or balancing the checkbook.) Obviously, I wasn't always an advocate of settling. In fact, it took not settling to make me realize that settling is the better option, and even though settling is a rampant phenomenon, talking about it in a positive light makes people profoundly uncomfortable. Whenever I make the case for settling, people look at me with creased brows of disapproval or frowns of disappointment, the way a child might look at an older sibling who just informed her that Jerry's Kids aren't going to walk, even if you send them money. It's not only politically incorrect to get behind settling, it's downright un-American. Our culture tells us to keep our eyes on the prize (while our mothers, who know better, tell us not to be so picky), and the theme of holding out for true love (whatever that is—look at the divorce rate) permeates our collective mentality. Even situation comedies, starting in the 1970s with The Mary Tyler Moore Show and going all the way to Friends, feature endearing single women in the dating trenches, and there's supposed to be something romantic and even heroic about their search for true love. Of course, the crucial difference is that, whereas the earlier series begins after Mary has been jilted by her fiancé, the more modern-day Friends opens as Rachel Green leaves her nice-guy orthodontist fiancé at the altar simply because she isn't feeling it. But either way, in episode after episode, as both women continue to be unlucky in love, settling starts to look pretty darn appealing. Mary is supposed to be contentedly independent and fulfilled by her newsroom family, but in fact her life seems lonely. Are we to assume that at the end of the series, Mary, by then in her late 30s, found her soul mate after the lights in the newsroom went out and her work family was disbanded? If her experience was anything like mine or that of my single friends, it's unlikely. And while Rachel and her supposed soul mate, Ross, finally get together (for the umpteenth time) in the finale of Friends, do we feel confident that she'll be happier with Ross than she would have been had she settled down with Barry, the orthodontist, 10 years earlier? She and Ross have passion but have never had long-term stability, and the fireworks she experiences with him but not with Barry might actually turn out to be a liability, given how many times their relationship has already gone up in flames. It's equally questionable whether Sex and the City's Carrie Bradshaw, who cheated on her kindhearted and generous boyfriend, Aidan, only to end up with the more exciting but self-absorbed Mr. Big, will be better off in the framework of marriage and family. (Some time after the breakup, when Carrie ran into Aidan on the street, he was carrying his infant in a Baby Björn. Can anyone imagine Mr. Big walking around with a Björn?)
Views: 209056 Shari Wing