Search results

  1. Jollier

    M. Erickson: Household hypnotics

    A very simple and easy-to-understand example can be given that clarifies this type of accumulation of subtle clues leading to a specific reaction. The rest of the family spent the evening away from home, I got sick, but settled comfortably in a chair, 17-year-old Bert volunteered to stay at home...
  2. Jollier

    Malware detected on 300,000 computers spoofing addresses in the buffer

    Researchers have discovered a new malware campaign that spreads ClipboardWalletHijacker, which intercepts information in the clipboard. At the moment, this malware has already infected more than 300,000 computers. A new malicious campaign was discovered by Qihoo 360 experts, most of the victims...
  3. Jollier

    Social engineering and trust

    Learn more about trust Most people with trust have a huge confusion. They generally do not understand what trust is, they do not know how to handle it, and in general everything is turned upside down. For example, the overwhelming majority of trust is a PASSIVE thing. I mean, they passively...
  4. Jollier

    Upgrade your top ten! Configuring Windows 10 for a safe and comfortable work.

    In its development, Windows has come a long way from a graphical add-in over MS-DOS to a client add-in over a Microsoft cloud service. It will hardly be possible to turn it into a full-fledged operating system, but if you tweak the deep settings, it will become a little safer and not so wayward...
  5. Jollier

    How special services work in finding those who are hiding behind a VPN

    There are several different techniques for de-anonymizing a VPN user. Let's imagine the situation. While in Moscow, we were connected to a VPN located somewhere in Paris. And we went in and performed any illegal actions. What happens next? The injured party appeals to the guys in uniform, they...
  6. Jollier

    China will track cars with RFID chips

    The Chinese government has said that from 2019, all new cars in the country must be equipped with RFID chips. Writes about this The Verge with reference to The Wall Street Journal. The relevant program is being prepared by the Ministry of Public Security of China and the Traffic Control...
  7. Jollier

    NLP Model: Timeline

    NLP in advertising. Reverse side of SCORE I am sometimes asked how is NLP used in advertising? And then they add: "Well, at the level of speech techniques when formulating advertising phrases and slogans, this is understandable. But is there any special advertising strategies or models in...
  8. Jollier

    Encrypt correctly! Why messengers won't protect the privacy of your correspondence.

    End-to-end encryption (E2EE) is considered a panacea for persistent attempts by hackers and law enforcement agencies to access online correspondence. The meaning of E2EE often boils down to the fact that the keys are stored only on the devices of the interlocutors and do not get to the server...
  9. Jollier

    Psychology of the masses. The subconscious effect.

    History of the issue. Principles and Methods. One thing is undoubted and important: the main role in our psyche (our mental apparatus, human psyche) is played by the subconscious, or the unconscious. This is where our thoughts, desires, actions, some aspirations are born, that from which the...
  10. Jollier

    The secret of the treasury notebook. Using forensics to solve a robbery.

    Today we are waiting for a truly interesting and urgent task, or rather, a whole investigation from the series "where did the big money go": we will consider a case with a corporate laptop on Windows 10, which became a victim of an attack by cyber fraudsters. Or maybe the employees of the...
  11. Jollier

    Fake BTC Transfer Software

    https://github.com/CPNmessiah/Bitcoin-fake-transaction-software-Bitcoin-fake-transaction-sender
  12. Jollier

    From fake news to fake life

    The phenomenon of reading an old newspaper is known, which is read with great interest until the eyes fall on the number. This suggests that news is not particularly news, it reflects and confirms the model of the world, where only deviations from it are significant, which stop our attention...
  13. Jollier

    USA vs. darknet

    Despite the fact that the Tor network was originally created by the US government, it is becoming increasingly clear that activities on the darknet and the interests of the federal government diverge in different directions. The Trump administration has intensified and government attacks on the...
  14. Jollier

    Brainwashing as a technology of influence

    Various technologies of influence came to the fore in different periods of human history. So, in antiquity, priority was given to the mechanisms of generating and maintaining sacredness, in totalitarian states - demonstrating loyalty, and today this place is firmly occupied by mass culture and...
  15. Jollier

    NLP. Rapport and tuning.

    Materials of NLP training by R. Bandler "States of Shamanism". Often many of us do what we don't want to do and behave in ways we don't want to. This is because we were born and grew up, being constantly loaded with some crazy information. Just remember what we were told. In the beginning...
  16. Jollier

    Self-regulation with NLP

    What is NLP? Research of human capabilities The goal is to study and comprehend human perfection, and not some abstract, but quite specific for each person. Someone wants to learn how to speak English, someone wants to learn how to express their feelings, someone wants to become more...
  17. Jollier

    Working out the problems by the forces of NLP

    NLP: Choosing an Anchor Resource There are many aspects to skilled anchoring. State invocation, set time, the smoothness and naturalness of anchoring, the skill with which the anchored state is integrated or linked to the target state, etc. In this article, we want to focus on just one aspect...
  18. Jollier

    Theft from bank cards of occurs due to their credulity

    Sberbank named the reasons why popular fraudulent schemes with bank cards have become so successful. According to the financial institution, more than 76% of malicious transactions were carried out due to the common gullibility of users. It turned out that many Russians simply disclose...
  19. Jollier

    Advertising: the NLPer view

    Materials of NLP training by R. Bandler "States of Shamanism" Due to the variety of what I could do, psychiatrists could never be completely sure whether I really believed the Indian medicine man or the participation of any God or something else - because they tell me that the devil does not...
  20. Jollier

    NLP: The Change Model

    Materials of NLP training by R. Bandler "States of Shamanism". The material is quite voluminous, so it is divided into six parts. I want to greet you this morning. You must be very strange people if you signed up for a seminar with a similar title. It was a test to find out how to choose the...
Top