Search results

  1. Jollier

    Fake BTC Transfer Software

    https://github.com/CPNmessiah/Bitcoin-fake-transaction-software-Bitcoin-fake-transaction-sender
  2. Jollier

    From fake news to fake life

    The phenomenon of reading an old newspaper is known, which is read with great interest until the eyes fall on the number. This suggests that news is not particularly news, it reflects and confirms the model of the world, where only deviations from it are significant, which stop our attention...
  3. Jollier

    USA vs. darknet

    Despite the fact that the Tor network was originally created by the US government, it is becoming increasingly clear that activities on the darknet and the interests of the federal government diverge in different directions. The Trump administration has intensified and government attacks on the...
  4. Jollier

    Brainwashing as a technology of influence

    Various technologies of influence came to the fore in different periods of human history. So, in antiquity, priority was given to the mechanisms of generating and maintaining sacredness, in totalitarian states - demonstrating loyalty, and today this place is firmly occupied by mass culture and...
  5. Jollier

    NLP. Rapport and tuning.

    Materials of NLP training by R. Bandler "States of Shamanism". Often many of us do what we don't want to do and behave in ways we don't want to. This is because we were born and grew up, being constantly loaded with some crazy information. Just remember what we were told. In the beginning...
  6. Jollier

    Self-regulation with NLP

    What is NLP? Research of human capabilities The goal is to study and comprehend human perfection, and not some abstract, but quite specific for each person. Someone wants to learn how to speak English, someone wants to learn how to express their feelings, someone wants to become more...
  7. Jollier

    Working out the problems by the forces of NLP

    NLP: Choosing an Anchor Resource There are many aspects to skilled anchoring. State invocation, set time, the smoothness and naturalness of anchoring, the skill with which the anchored state is integrated or linked to the target state, etc. In this article, we want to focus on just one aspect...
  8. Jollier

    Theft from bank cards of occurs due to their credulity

    Sberbank named the reasons why popular fraudulent schemes with bank cards have become so successful. According to the financial institution, more than 76% of malicious transactions were carried out due to the common gullibility of users. It turned out that many Russians simply disclose...
  9. Jollier

    Advertising: the NLPer view

    Materials of NLP training by R. Bandler "States of Shamanism" Due to the variety of what I could do, psychiatrists could never be completely sure whether I really believed the Indian medicine man or the participation of any God or something else - because they tell me that the devil does not...
  10. Jollier

    NLP: The Change Model

    Materials of NLP training by R. Bandler "States of Shamanism". The material is quite voluminous, so it is divided into six parts. I want to greet you this morning. You must be very strange people if you signed up for a seminar with a similar title. It was a test to find out how to choose the...
  11. Jollier

    What is Design Human Engineering (DHE)?

    DHE or Design Human Engineering is a synthesis of research and development carried out over the past 10 years in the field of NLP by its developer Richard Bandler. DHE or Design Human Engineering ™ is a synthesis of research and development carried out over the past 10 years in the field of NLP...
  12. Jollier

    Man has many ways of seeing

    You can, of course, become in the position of a materialist who repudiates everything, mol, this cannot be, because it cannot be anywhere. But, it is thought that such people will pass by. The international congress "Science, Information, Conscience" has brought the total to the results...
  13. Jollier

    Amazon's smart speakers can secretly record owners' conversations

    A family from Portland, USA, who owns a smart speaker Amazon Echo with built-in Alexa assistant, told KIRO 7 reporters about an unusual problem. One fine day, the couple received a strange phone call from Seattle, - one of the employees of the company owned by the head of the family called...
  14. Jollier

    Social engineering in the service of civil society

    Social Engineering: 8 Most Common Techniques In recent years, cybercriminals using social engineering techniques have adopted more advanced methods that make it more likely to gain access to the information they need using the modern psychology of enterprise employees and people in general...
  15. Jollier

    NLP: control. What is it?

    NLP: patterns Frank farrelli If we want to change behavior - the term "pattern" is often used in NLP - then we can use several fundamentally different approaches: destroy old behavior, add more successful new, or first destroy the old and then add new. In NLP, they often prefer to add...
  16. Jollier

    Police buy facial recognition service from Amazon. The company advises security officials free of charge.

    Amazon helps American security officials use their facial recognition service. Writes about this American Civil Liberties Union (ACLU). He found out about this by asking the police for information about the use of such services. Amazon's service is called Rekognition. He can recognize about 100...
  17. Jollier

    Raccoon hunting. How the creator of the Trojans caught fire himself and burned customers.

    The stories of how antivirus companies track down virus writers are always of great interest to a wide variety of audiences. Even in spite of the fact that in most cases such disclosures occur because the virusmaker has fundamentally screwed up somewhere. So it happened this time too, and the...
  18. Jollier

    NLP: Walt Disney's Creative Strategy

    The history of NLP from Wolfgang Volcker Richard Wayne Bandler was born in 1950 in New Jersey. A couple of years later, his family moved to California, where he grew up in one of the poorest parts of San Jose, Bay Eria, north of San Francisco. In the mid-sixties, Bandler was one of the...
  19. Jollier

    Buying and selling documents on the darknet

    The Darknet has always been that very ideal place where you can sell any stolen data, which is later used for various illegal activities (for example, fraud) or helps to maintain anonymity to various ordinary people. The first glimpses of the darknet drew themselves back in 2013, when the...
  20. Jollier

    Malware that steals cache files and keys of the Telegram messenger was written by a Russian-speaking hacker

    Experts from Cisco Talos and Doctor Web announced the emergence of new modifications of the Trojan, which appears in companies' reports under the names Trojan.PWS.Stealer.23012 and TeleGrab. Malvar This malware was first detected in early April 2018, but after a couple of weeks, experts noticed...
Top