butlincat's blog - a blog...a seeker of the truth

“As long as justice is postponed we always stand on the verge of these darker nights of social disruption...so said Martin Luther King Jr. in a speech on March 14, 1968, just three weeks before he was assassinated.

...hello + welcome!

FAIR USE NOTICE: This site may contain copyrighted (© ) material. Such material is made available to advance understanding of ecological, political, human rights, economic, democracy, scientific, moral, ethical, and social justice issues. This constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, this material is distributed for analysis, commentary, educational and intellectual purposes. In some cases comedy and parody have been recognized as fair use - Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License..... For more information please visit: http://www.law.cornell.edu/uscode/text/17/107

This blog is for regular updates + info connected to the ILLUMINATI, 911, 7/7, recent UFO sightings, CHEMTRAILS, MORGELLONS [98% OF WORLDS POPULATION HAS MORGELLONS DISEASE, they claim - see "Morgellons & SmartDust Infect Individuals to be Tracked via Satellite" https://www.youtube.com/watch?v=Baua4QzgAjc - MIND CONTROL {MK ULTRA, MANNEQUIN etc.}, ELECTRONIC SURVEILLANCE, JOHN LEAR, ALEX COLLIER, PROJECT CAMELOT, PROJECT AVALON, MICHAEL TSARION, JORDAN MAXWELL, PRESTON NICHOLS, AL BIELEK, STEWART SWERDELOW, DUNCAN CAMERON, WILLIAM COOPER, PHIL SCHNEIDER, David Wilcock, FRITZ SPRINGMEIER, BILLY MEIER, MAX IGAN, STEW WEBB, "Democracy Now!", Henry Makow, Linda Moulton-Howe, Dan Burisch, Webster Tarpley, Brother Nathanael, Timothy Good, Miles Johnson, Jim Marrs, John Hutchison, Wikileaks, Julian Assange #FreeAssange #FreeManning #FreeHammond, Dr. John Hall, Edward Snowden, Vladimir Putin, John Lennon, Bob Zimmerman [Dylan], award winning journalist John Pilger's site is www.johnpilger.com + many more who can only be described as heroes...

Like many, this site is shadowbanned, as daily viewing figures prove since March 2018, when before then the figures were 10 times as much as they are since [from approx. 5000 views per day to 500]: "Shadowbanning" is the "act of blocking or partially blocking a user or their content from an online community" - see more: What is "shadowbanning - truther sites are often targeted:

NewsGuard Launches War on Alternative Media ...

Targeted? victimised?...been dealt "rough justice"? see more: VICTIMS OF THE STATE https://butlincat.com/

my Twitter: http://www.twitter.com/butlincat

my Facebook: https://www.facebook.com/butlin.cat.9

"Do not be deceived, God is not mocked; for whatever a man sows, this he will also reap" Galatians 6:7

......Namaste.....John Graham - butlincat

Jai guru deva om जय गुरुदेव ॐ ... peace!

Saturday, 25 July 2015

THE HACKER NEWS 25 JULY 2015


Newsletter

Latest News Jul 25, 2015
All Smartwatches are vulnerable to Hackers Do you own a Smartwatch? If yes, then how safe it is? There are almost 100 percent chances that you own a vulnerable Smartwatch. Computer manufacturer Hewlett-Packard is warning users of smartwatches including Apple Watch and Samsung Gear that their wearable devices are vulnerable to cyber attacks. In a study, HP's Fortify tested today's top 10 smartwatches for security features, such ...
Read more... TwitterFacebookLinkedin
Introducing 93Gbps High-Speed Tor-Like Encrypted Anonymous Network I think you'll agree with me when I say: It's quite hard to maintain anonymity on the Internet using the slow Tor network. Or is it? Well, it turns out, you may soon boost your online anonymity dramatically with the help of a new high-speed anonymity network. A group of six academics have developed a Tor network alternative for users that allows high-speed anonymous web surfing, ...
Read more... TwitterFacebookLinkedin
RCSAndroid — Advanced Android Hacking Tool Leaked Online As digging deeper and deeper into the huge Hacking Team data dump, security researchers are finding more and more source code, including an advanced Android Hacking Tool. Yes, this time researchers have found a source code to a new piece of weaponized android malware that had the capability to infect millions of Android devices even when users are running latest versions of the android ...
Read more... TwitterFacebookLinkedin

Learn how mid-sized and smaller organizations can manage their IT risks and meet regulatory compliance with minimal staff and budget. Click here to download
[Sponsored] Latest News
Jul 24, 2015
Oh Gosh! Four Zero Day Vulnerabilities Disclosed in Internet Explorer How many Zero-Days do you think could hit Microsoft today? Neither one nor two; this times its Four. The Hewlett-Packard's Zero-Day Initiative (ZDI) has disclosed four new zero-day vulnerabilities in Microsoft's Internet Explorer browser that could be exploited to remotely execute malicious code on victim's machine. All the four zero-days originally were reported to Microsoft, affecting ...

Read more... TwitterFacebookLinkedin
WordPress 4.2.3 Security Update Released, Patches Critical Vulnerability WordPress has just released the new version of its content management system (CMS), WordPress version 4.2.3, to fix a critical security vulnerability that could have been exploited by hackers to take over websites, affecting the security of its Millions of sites. WordPress version 4.2.3 resolves a Cross-Site Scripting (XSS) flaw that could allow any user with the Contributor or Author role ...

Read more... TwitterFacebookLinkedin
Bug in OpenSSH Opens Linux Machines to Password Cracking Attack A simple but highly critical vulnerability recently disclosed in the most widely used OpenSSH software allows attackers to try thousands of password login attempts per connection in a short period. OpenSSH is the most popular software widely used for secure remote access to Linux-based systems. Generally, the software allows 3 to 6 Password login attempts before closing a connection, but a ...

Read more... TwitterFacebookLinkedin
Apple Mac OS X Vulnerability Allows Attackers to Hack your Computer A security researcher has discovered a critical vulnerability in the latest version of Apple's OS X Yosemite that could allow anyone to obtain unrestricted root user privileges with the help of code that fits in a tweet. The privilege-escalation vulnerability initially reported on Tuesday by German researcher Stefan Esser, could be exploited by to circumvent security protections and gain ...

Read more... TwitterFacebookLinkedin
Hacking Team: We're Victim of a Criminal Cyber Attack Hacking Team, the Italy-based spyware company that sells spying software to law enforcement agencies worldwide, says the company has always operated with the law and regulation in an ethical manner. However, there was only one Violation of Law in this entire event, and that is – "the massive cyber attack on the Hacking Team." company stated. The recent hack on Hacking Team exposed ...

Read more... TwitterFacebookLinkedin


Social has changed many aspects of information security. Click here to download
[Sponsored]