{"id":2110,"date":"2016-04-22T15:01:22","date_gmt":"2016-04-22T14:01:22","guid":{"rendered":"http:\/\/epanne.de\/epanne\/cms\/wp\/?p=2110"},"modified":"2016-04-22T15:01:22","modified_gmt":"2016-04-22T14:01:22","slug":"links4we-063","status":"publish","type":"post","link":"https:\/\/epanne.de\/epanne\/cms\/wp\/2016\/links4we-063\/","title":{"rendered":"LINKS4WE 063"},"content":{"rendered":"<p><b>Und hier nun wieder die Links &#8230;<\/b><\/p>\n<p>&nbsp;<a href=\"http:\/\/epanne.de\/epanne\/cms\/wp\/wp-content\/uploads\/2016\/04\/img_3328.jpg\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" alt=\"links4we\" src=\"http:\/\/epanne.de\/epanne\/cms\/wp\/wp-content\/uploads\/2016\/04\/img_3328.jpg\" title=\"links4we\" class=\"size-large\"><\/a>&nbsp;<b><br \/>\n<\/b><\/p>\n<p><b>Linux<\/b>: Ubuntu 16.04 <a href=\"LTShttp:\/\/releases.ubuntu.com\/\">LTShttp:\/\/releases.ubuntu.com\/<\/a><\/p>\n<p><b>Verkehr<\/b>: Bodenampel<br \/>\n<a href=\"https:\/\/www.sw-augsburg.de\/ueber_uns\/4551_9148.php\">https:\/\/www.sw-augsburg.de\/ueber_uns\/4551_9148.php<\/a><\/p>\n<p><b>Fotos<\/b>: vom sony Fotowettbewerb<br \/>\n<a href=\"http:\/\/www.worldphoto.org\/\">http:\/\/www.worldphoto.org\/<\/a><\/p>\n<p><b>Security<\/b>: Simulation von Trojaner befall<br \/>\n<a href=\"http:\/\/www.heise.de\/newsticker\/meldung\/l-f-Was-waere-wenn-Batch-Skript-simuliert-Locky-Infektion-3180132.html\">http:\/\/www.heise.de\/newsticker\/meldung\/l-f-Was-waere-wenn-Batch-Skript-simuliert-Locky-Infektion-3180132.html<\/a><\/p>\n<p><a href=\"https:\/\/blog.rootshell.be\/2016\/04\/18\/impact-ransomware-infection\/\">https:\/\/blog.rootshell.be\/2016\/04\/18\/impact-ransomware-infection\/<\/a><\/p>\n<p><b>RetroComputing<\/b>: CPCtelera<br \/>\n<a href=\"http:\/\/www.heise.de\/newsticker\/meldung\/Retro-Computing-CPCtelera-Version-1-4-freigegeben-3180264.html\">http:\/\/www.heise.de\/newsticker\/meldung\/Retro-Computing-CPCtelera-Version-1-4-freigegeben-3180264.html<\/a><\/p>\n<p><a href=\"http:\/\/lronaldo.github.io\/cpctelera\/files\/readme-txt.html#Installing_CPCtelera\">http:\/\/lronaldo.github.io\/cpctelera\/files\/readme-txt.html#Installing_CPCtelera<\/a><\/p>\n<p><b>Anweisung<\/b>: Spione haben es nicht leicht<br \/>\n<a href=\"http:\/\/www.golem.de\/news\/interne-anweisungen-spione-duerfen-sich-nicht-selbst-suchen-1604-120472.html\">http:\/\/www.golem.de\/news\/interne-anweisungen-spione-duerfen-sich-nicht-selbst-suchen-1604-120472.html<\/a><\/p>\n<p>PDF<\/p>\n<p><a href=\"https:\/\/privacyinternational.org\/sites\/default\/files\/39.%20Secret%20Intelligence%20Service.%20SIS%20Database%20.%20Code%20of%20Practice%20version%203%20October%202014%20to%20November%202015_0.PDF\">https:\/\/privacyinternational.org\/sites\/default\/files\/39.%20Secret%20Intelligence%20Service.%20SIS%20Database%20.%20Code%20of%20Practice%20version%203%20October%202014%20to%20November%202015_0.PDF<\/a><br \/>\n<a href=\"https:\/\/privacyinternational.org\/node\/842\">https:\/\/privacyinternational.org\/node\/842<\/a><\/p>\n<p><b>hackerStory:<\/b> hacking team hack<br \/>\n<a href=\"http:\/\/www.golem.de\/news\/it-security-wie-hacking-team-gehackt-wurde-1604-120394.html\">http:\/\/www.golem.de\/news\/it-security-wie-hacking-team-gehackt-wurde-1604-120394.html<\/a><\/p>\n<p><a href=\"http:\/\/pastebin.com\/raw\/GPSHF04A\">http:\/\/pastebin.com\/raw\/GPSHF04A<\/a>&nbsp;(nett aber die Sprache kann ich nicht \ud83d\ude42 )<\/p>\n<p><a href=\"http:\/\/motherboard.vice.com\/read\/the-vigilante-who-hacked-hacking-team-explains-how-he-did-it\">http:\/\/motherboard.vice.com\/read\/the-vigilante-who-hacked-hacking-team-explains-how-he-did-it<\/a><\/p>\n<p><b>Anh\u00e4nger<\/b>: f\u00fcr hoverbords \ud83d\ude42<br \/>\n<a href=\"http:\/\/www.boatstogo.com\/HoverCart.asp\">http:\/\/www.boatstogo.com\/HoverCart.asp<\/a><\/p>\n<p><b>Fotos<\/b>: mit Monstern noch Besser \ud83d\ude42<br \/>\n<a href=\"http:\/\/petapixel.com\/2016\/04\/20\/artist-improves-typical-photos-typical-places-adding-monsters\/\">http:\/\/petapixel.com\/2016\/04\/20\/artist-improves-typical-photos-typical-places-adding-monsters\/<\/a><\/p>\n<p><a href=\"http:\/\/www.tailjar.com\/\">http:\/\/www.tailjar.com\/<\/a><br \/>\ndamit dann ein sch\u00f6nes Wochenende \ud83d\ude42<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Und hier nun wieder die Links &#8230; &nbsp;&nbsp; Linux: Ubuntu 16.04 LTShttp:\/\/releases.ubuntu.com\/ Verkehr: Bodenampel https:\/\/www.sw-augsburg.de\/ueber_uns\/4551_9148.php Fotos: vom sony Fotowettbewerb http:\/\/www.worldphoto.org\/ Security: Simulation von Trojaner befall http:\/\/www.heise.de\/newsticker\/meldung\/l-f-Was-waere-wenn-Batch-Skript-simuliert-Locky-Infektion-3180132.html https:\/\/blog.rootshell.be\/2016\/04\/18\/impact-ransomware-infection\/ RetroComputing: CPCtelera http:\/\/www.heise.de\/newsticker\/meldung\/Retro-Computing-CPCtelera-Version-1-4-freigegeben-3180264.html http:\/\/lronaldo.github.io\/cpctelera\/files\/readme-txt.html#Installing_CPCtelera Anweisung: Spione haben es nicht leicht http:\/\/www.golem.de\/news\/interne-anweisungen-spione-duerfen-sich-nicht-selbst-suchen-1604-120472.html PDF https:\/\/privacyinternational.org\/sites\/default\/files\/39.%20Secret%20Intelligence%20Service.%20SIS%20Database%20.%20Code%20of%20Practice%20version%203%20October%202014%20to%20November%202015_0.PDF &hellip; <a href=\"https:\/\/epanne.de\/epanne\/cms\/wp\/2016\/links4we-063\/\">Weiterlesen <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,163],"tags":[408,409,420,419,500],"class_list":["post-2110","post","type-post","status-publish","format-standard","hentry","category-allgemein","category-tipp","tag-links4we","tag-links","tag-links-fuer-das-wochenende","tag-linksammlung","tag-linktipps"],"_links":{"self":[{"href":"https:\/\/epanne.de\/epanne\/cms\/wp\/wp-json\/wp\/v2\/posts\/2110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/epanne.de\/epanne\/cms\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/epanne.de\/epanne\/cms\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/epanne.de\/epanne\/cms\/wp\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/epanne.de\/epanne\/cms\/wp\/wp-json\/wp\/v2\/comments?post=2110"}],"version-history":[{"count":1,"href":"https:\/\/epanne.de\/epanne\/cms\/wp\/wp-json\/wp\/v2\/posts\/2110\/revisions"}],"predecessor-version":[{"id":2111,"href":"https:\/\/epanne.de\/epanne\/cms\/wp\/wp-json\/wp\/v2\/posts\/2110\/revisions\/2111"}],"wp:attachment":[{"href":"https:\/\/epanne.de\/epanne\/cms\/wp\/wp-json\/wp\/v2\/media?parent=2110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/epanne.de\/epanne\/cms\/wp\/wp-json\/wp\/v2\/categories?post=2110"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/epanne.de\/epanne\/cms\/wp\/wp-json\/wp\/v2\/tags?post=2110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}