Archive for October, 2014

Griffith scientists propose existence and interaction of parallel worlds

Posted in Cosmos, Nature, Science on October 31, 2014 by betweentwopines

Many Interacting Worlds theory challenges foundations of quantum science

This is Professor Howard Wiseman, Director of Griffith University’s Centre for Quantum Dynamics.Click here for more information.

Griffith University academics are challenging the foundations of quantum science with a radical new theory based on the existence of, and interactions between, parallel universes.

In a paper published in the prestigious journal Physical Review X, Professor Howard Wiseman and Dr Michael Hall from Griffith’s Centre for Quantum Dynamics, and Dr Dirk-Andre Deckert from the University of California, take interacting parallel worlds out of the realm of science fiction and into that of hard science.

The team proposes that parallel universes really exist, and that they interact. That is, rather than evolving independently, nearby worlds influence one another by a subtle force of repulsion. They show that such an interaction could explain everything that is bizarre about quantum mechanics

Quantum theory is needed to explain how the universe works at the microscopic scale, and is believed to apply to all matter. But it is notoriously difficult to fathom, exhibiting weird phenomena which seem to violate the laws of cause and effect.

As the eminent American theoretical physicist Richard Feynman once noted: “I think I can safely say that nobody understands quantum mechanics.”

However, the “Many-Interacting Worlds” approach developed at Griffith University provides a new and daring perspective on this baffling field.

“The idea of parallel universes in quantum mechanics has been around since 1957,” says Professor Wiseman.

“In the well-known “Many-Worlds Interpretation”, each universe branches into a bunch of new universes every time a quantum measurement is made. All possibilities are therefore realised – in some universes the dinosaur-killing asteroid missed Earth. In others, Australia was colonised by the Portuguese.

“But critics question the reality of these other universes, since they do not influence our universe at all. On this score, our “Many Interacting Worlds” approach is completely different, as its name implies.”

Professor Wiseman and his colleagues propose that:

  • The universe we experience is just one of a gigantic number of worlds. Some are almost identical to ours while most are very different;
  • All of these worlds are equally real, exist continuously through time, and possess precisely defined properties;
  • All quantum phenomena arise from a universal force of repulsion between ‘nearby’ (i.e. similar) worlds which tends to make them more dissimilar.

Dr Hall says the “Many-Interacting Worlds” theory may even create the extraordinary possibility of testing for the existence of other worlds.

“The beauty of our approach is that if there is just one world our theory reduces to Newtonian mechanics, while if there is a gigantic number of worlds it reproduces quantum mechanics,” he says.

“In between it predicts something new that is neither Newton’s theory nor quantum theory.

“We also believe that, in providing a new mental picture of quantum effects, it will be useful in planning experiments to test and exploit quantum phenomena.”

The ability to approximate quantum evolution using a finite number of worlds could have significant ramifications in molecular dynamics, which is important for understanding chemical reactions and the action of drugs.

Professor Bill Poirier, Distinguished Professor of Chemistry at Texas Tech University, has observed: “These are great ideas, not only conceptually, but also with regard to the new numerical breakthroughs they are almost certain to engender.”

###

Go to: https://journals.aps.org/prx/abstract/10.1103/PhysRevX.4.041013

 

Related:  Quantum Phenomena Modeled by Interactions between Many Classical Worlds

 

Source:  http://www.eurekalert.org/pub_releases/2014-10/gu-gsp102914.php

Peking Duck Recipe

Posted in Recipe on October 30, 2014 by betweentwopines

Total Time: 2 hr 55 min
Prep: 5 min
Inactive: 2 hr
Cook: 50 min
Yield: 30 servings
Level: Intermediate

Ingredients

1 large pot 3/4 full with water, boiling
1 whole duck, head on
1/4 cup sugar
1/4 cup salt
1 teaspoon five-spice powder
1 cup molasses
2 cups oil, hot

Directions

Soak the whole duck in the large pot of boiling water. Remove it as soon as the skin changes color.

Sprinkle the inside of the duck with sugar, salt, and five-spice powder. Rub the skin of the duck with molasses. Truss the duck with string and hang in an airing place for 2 hours, or put the duck in the refrigerator overnight without any cover. This will dry the skin of the duck so that it will be crispy.

Preheat rotisserie oven to 375 degrees and bake for 45 minutes or until the skin is reddish brown.

Before serving, pour hot oil over the skin to increase the crispiness. Carve the skin and meat from the duck, and serve.

Recipe courtesy Ming’s Restaurant, Palo Alto, CA

Source: http://www.foodnetwork.com/recipes/peking-duck-recipe0.html?oc=linkback

Gluten-Free, Homemade Gyro Meat (γύρος)

Posted in Food on October 29, 2014 by betweentwopines

 


Gyro meat, often referred to as doner or shawarma meat, is simply meat roasted on a rotating vertical spit and shaved off. Most Mediterranean and Middle-Eastern countries have some variation of this dish as a common street food. Depending on where you’re getting it, the meat can be made of lamb, beef, goat, chicken or a combination of meats. It’s one of my favorite meats of all time, and one that’s not easily replicated at home without a rotisserie setup. Lava Lake Lamb was gracious enough to send me some ground lamb recently, so I thought it was time to try and figure out how to make it on my own.

I spent a lot of time researching how to make authentic gyro meat at home, and in the end I found that Alton Brown’s approach was just about perfect. It involves processing the meat to make a thick paste, which is then stored for a couple hours before being cooked on the grill using a rotisserie or in the oven using a meatloaf pan. I went with the meatloaf pan variation with just a few adjustments, and it was awesome.

You’ll Need:
2 lbs ground lamb from Lava Lake Lamb (or 2 lbs ground beef, or 1 lb of each)
1 medium onion
2 cloves garlic, minced
1 tbsp each dried marjoram and rosemary
2 tsp kosher salt
1/2 tsp fresh-ground black pepper

Chop your onion and put it in a food processor, mixing until it is finely minced/blended. Take the onion out of the processor and squeeze it in a cheese cloth to remove most of its juices.

Add the remaining ingredients, including the squeezed onion, and process/pulse it for about a minute.

The meat is done processing when it is well-mixed and slightly tacky to the touch.

Place the meat on a large piece of plastic wrap, and wrap it as tightly as you can. Twirling the ends of the wrap will help tighten the loaf. Place the loaf in the fridge for two hours.

After two hours, remove the loaf from the plastic wrap and place it in a loaf pan, pressing it firmly down to remove any air pockets. Preheat your oven to 325 degrees.

Place the loaf pan in a large roasting pan and fill it with enough water to reach halfway up the loaf pan. Bake in the oven until the internal temperature of the meat reaches 170 degrees, about an hour and 20 minutes.

Allow the beautiful loaf to rest for 10 minutes before slicing thinly.

Serve it however you please.

 

Link :  http://thedomesticman.com/2012/04/05/gluten-free-homemade-gyro-meat-%CE%B3%CF%8D%CF%81%CE%BF%CF%82/

Coconut Flour Flatbread

Posted in Uncategorized on October 29, 2014 by betweentwopines

Prep time : 5 mins
Cook time: 5 mins
Total time:10 mins
Serves: 1 serving (for you!)
Ingredients
  • 2 Tablespoons coconut flour
  • ⅛ teaspoon salt
  • ⅛ teaspoon baking powder
  • ⅛ teaspoon baking soda
  • 2 eggs OR 1 Tablespoon Ener-g egg replacer mixed with 4 Tablespoons water
  • ¼ cup unsweetened almond milk
Instructions
  1. In a medium bowl, combine coconut flour, salt, baking powder, and baking soda. Add in the eggs or egg replacer and unsweetened almond milk and stir until completely combined and thick. This may take awhile, but be patient; the batter will thicken up as you stir.
  2. Spread ½ the batter into a greased small skillet and smooth with a spoon. Cook over medium heat until solidified, and carefully flip. Transfer to a plater and repeat with remaing half of batter. Top as desired and devour.
Notes
To keep vegan, use egg replacer.

You may substitute your milk of choice for the unsweetened almond milk.

For best results, do eat immediately.

Nutritional information calculated with egg replacer.

Nutrition Information
Serving size: 1 recipe (2 pieces) Calories: 80 Fat: 3 grams

4 Ways to Crack a Facebook Password and How to Protect Yourself from Them

Posted in Computer on October 29, 2014 by betweentwopines

By Nelson Aguilar

 

Despite the security concerns that have plagued Facebook for years, most people are sticking around and new members keep on joining. This has led Facebook to break records numbers with over one billion monthly active users as of October 2012—and around 600 million active daily users.

We share our lives on Facebook. We share our birthdays and our anniversaries. We share our vacation plans and locations. We share the births of our sons and the deaths of our fathers. We share our most cherished moments and our most painful thoughts. We divulge every aspect of our lives. We even clamor to see the latest versions even before they’re ready for primetime.

But we sometimes forget who’s watching.

We use Facebook as a tool to connect, but there are those people who use that connectivity for malicious purposes. We reveal what others can use against us. They know when we’re not home and for how long we’re gone. They know the answers to our security questions. People can practically steal our identities—and that’s just with the visible information we purposely give away through our public Facebook profile.

The scariest part is that as we get more comfortable with advances in technology, we actually become more susceptible to hacking. As if we haven’t already done enough to aid hackers in their quest for our data by sharing publicly, those in the know can get into our emails and Facebook accounts to steal every other part of our lives that we intended to keep away from prying eyes.

In fact, you don’t even have to be a professional hacker to get into someone’s Facebook account.

It can be as easy as running Firesheep on your computer for a few minutes. In fact, Facebook actually allows people to get into someone else’s Facebook account without knowing their password. All you have to do is choose three friends to send a code to. You type in the three codes, and voilà—you’re into the account. It’s as easy as that.

In this article I’ll show you these, and a couple other ways that hackers (and even regular folks) can hack into someone’s Facebook account. But don’t worry, I’ll also show you how to prevent it from happening to you.

Method 1: Reset the Password

The easiest way to “hack” into someone’s Facebook is through resetting the password. This could be easier done by people who are friends with the person they’re trying to hack.

  • The first step would be to get your friend’s Facebook email login. If you don’t already know it, try looking on their Facebook page in the Contact Info section.
  • Next, click on Forgotten your password? and type in the victim’s email. Their account should come up. Click This is my account.
  • It will ask if you would like to reset the password via the victim’s emails. This doesn’t help, so press No longer have access to these?
  • It will now ask How can we reach you? Type in an email that you have that also isn’t linked to any other Facebook account.
  • It will now ask you a question. If you’re close friends with the victim, that’s great. If you don’t know too much about them, make an educated guess. If you figure it out, you can change the password. Now you have to wait 24 hours to login to their account.
  • If you don’t figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three and five friends.
  • It will send them passwords, which you may ask them for, and then type into the next page. You can either create three to five fake Facebook accounts and add your friend (especially if they just add anyone), or you can choose three to five close friends of yours that would be willing to give you the password.

How to Protect Yourself

  • Use an email address specifically for your Facebook and don’t put that email address on your profile.
  • When choosing a security question and answer, make it difficult. Make it so that no one can figure it out by simply going through your Facebook. No pet names, no anniversaries—not even third grade teacher’s names. It’s as easy as looking through a yearbook.
  • Learn about recovering your account from friends. You can select the three friends you want the password sent to. That way you can protect yourself from a friend and other mutual friends ganging up on you to get into your account.

Method 2: Use a Keylogger

Software Keylogger

A software keylogger is a program that can record each stroke on the keyboard that the user makes, most often without their knowledge. The software has to be downloaded manually on the victim’s computer. It will automatically start capturing keystrokes as soon as the computer is turned on and remain undetected in the background. The software can be programmed to send you a summary of all the keystrokes via email.

CNET has Free Keylogger, which as the title suggests, is free. If this isn’t what you’re looking for, you can search for other free keyloggers or pay for one.

Hardware Keylogger

These work the same way as the software keylogger, except that a USB drive with the software needs to be connected to the victim’s computer. The USB drive will save a summary of the keystrokes, so it’s as simple as plugging it to your own computer and extracting the data. You can look through Keelog for prices, but it’s bit higher than buying the software since you have the buy the USB drive with the program already on it.

How to Protect Yourself

  • Use a firewall. Keyloggers usually send information through the internet, so a firewall will monitor your computer’s online activity and sniff out anything suspicious.
  • Install a password manager. Keyloggers can’t steal what you don’t type. Password mangers automatically fill out important forms without you having to type anything in.
  • Update your software. Once a company knows of any exploits in their software, they work on an update. Stay behind and you could be susceptible.
  • Change passwords. If you still don’t feel protected, you can change your password bi-weekly. It may seem drastic, but it renders any information a hacker stole useless.

Method 3: Phishing

This option is much more difficult than the rest, but it is also the most common method to hack someone’s account. The most popular type of phishing involves creating a fake login page. The page can be sent via email to your victim and will look exactly like the Facebook login page. If the victim logs in, the information will be sent to you instead of to Facebook. This process is difficult because you will need to create a web hosting account and a fake login page.

The easiest way to do this would be to follow our guide on how to clone a website to make an exact copy of the facebook login page. Then you’ll just need to tweak the submit form to copy / store / email the login details a victim enters. If you need help with the exact steps, there are detailed instructions available by Alex Long here on Null Byte. Users are very careful now with logging into Facebook through other links, though, and email phishing filters are getting better every day, so that only adds to this already difficult process. But, it’s still possible, especially if you clone the entire Facebook website.

How to Protect Yourself

  • Don’t click on links through email. If an email tells you to login to Facebook through a link, be wary. First check the URL (Here’s a great guide on what to look out for). If you’re still doubtful, go directly to the main website and login the way you usually do.
  • Phishing isn’t only done through email. It can be any link on any website / chat room / text message / etc. Even ads that pop up can be malicious. Don’t click on any sketchy looking links that ask for your information.
  • Use anti-virus & web security software, like Norton or McAfee.

Method 4: Stealing Cookies

Cookies allow a website to store information on a user’s hard drive and later retrieve it. These cookies contain important information used to track a session that a hacker can sniff out and steal if they are on the same Wi-Fi network as the victim. They don’t actually get the login passwords, but they can still access the victim’s account by cloning the cookies, tricking Facebook into thinking the hacker’s browser is already authenticated.

Image via wikimedia.orgFiresheep is a Firefox add-on that sniffs web traffic on an open Wi-Fi connection. It collects the cookies and stores them in a tab on the side of the browser.

From there, the hacker can click on the saved cookies and access the victim’s account, as long as the victim is still logged in. Once the victim logs out, it is impossible for the hacker to access the account.

How to Protect Yourself

  • On Facebook, go to your Account Settings and check under Security. Make sure Secure Browsing is enabled. Firesheep can’t sniff out cookies over encrypted connections like HTTPS, so try to steer away from HTTP.
  • Full time SSL. Use Firefox add-ons such as HTTPS-Everywhere or Force-TLS.
  • Log off a website when you’re done. Firesheep can’t stay logged in to your account if you log off.
  • Use only trustworthy Wi-Fi networks. A hacker can be sitting across from you at Starbucks and looking through your email without you knowing it.
  • Use a VPN. These protect against any sidejacking from the same WiFi network, no matter what website you’re on as all your network traffic will be encrypted all the way to your VPN provider.

Protecting Yourself: Less Is More

Social networking websites are great ways to stay connected with old friends and meet new people. Creating an event, sending a birthday greeting and telling your parents you love them are all a couple of clicks away.

Facebook isn’t something you need to steer away from, but you do need to be aware of your surroundings and make smart decisions about what you put up on your profile. The less information you give out on Facebook for everyone to see, the more difficult you make it for hackers.

If your Facebook account ever gets hacked, check out our guide on getting your hacked Facebook account back for information on restoring your account.

Bonus: If you’re interested in who’s checking you out, there are some ways you can (kindof) track who’s viewed your Facebook profile.

More Password-Hacking Guides

For more info on cracking passwords, check out our guides on hacking Linux passwords, hacking Windows passwords, and our super-easy beginner’s guide on hacking Wi-Fi passwords (or for newer wireless routers, how to crack WPA2-PSK wifi passwords).

 

Source:  http://null-byte.wonderhowto.com/how-to/4-ways-crack-facebook-password-and-protect-yourself-from-them-0139532/

13 Best Firefox Add-ons

Posted in Computer on October 29, 2014 by betweentwopines

Every month, a committee of Firefox volunteers — who really, REALLY love Firefox Add-ons  — puts their time and effort into finding the best new add-ons. These add-ons are the little pieces of software that add functionality to your Firefox browser and help you customize Firefox to meet your needs and tastes. Can you see why these volunteers like them so much?

These were their top choices of each month in 2013, plus they picked one extra because, well, picking just one each month was hard!

URLlink1) URL Link: Have you ever had an email that had a broken url across several lines? Or seen a textual link on a Web page that isn’t a clickable link? URL Link solves your problem by letting you select a string of text that isn’t a URL and open it as if it were a real, working link.

Click and Clean2) Click and Clean: It’s like spring cleaning all the time, and on your browser! Delete your browsing history, temporary Internet files, download history and more. The CNET editors said “If you’re a Firefox user, and a fan of CCleaner, we highly recommend this free extension for easy access.” Not only do the professionals like it, the add-on also gets 5-star user reviews!

Clear Console3) Clear Console: The developers of this add-on had a vision. “Our work demanded frequent deletion of browser history, cookies and cache and it was boring every time go to the preferences and clear them. So, we thought that an add-on would serve the purpose, not just for us, but for all those who need it.” Thanks to them, you can clear your history, HTML5 storage, cache, cookies and more with one click. (Be sure to thank them when you download it!)

 Self Destructing Cookies4) Self-Destructing Cookies: This add-on isn’t just a cookie manager, it’s a new cookie policy. It lets you delete cookies from any site automatically when you close the window or tab. Would you prefer your cookie jar to be empty, except for a few sites that you care about? Are you worried about unconventional tracking methods? Then give this add-on a try.

New Tab Plus5) New Tab Plus: When you open a new tab, you can enhance that experience with added features and plugins, such as speed dial, cloud addition and cloud backup. (Plus, it’s based on HTML5!)

Video Resumer6) Video Resumer: Usually, when you click through YouTube videos, they start from the beginning. No more! This add-on automatically resumes YouTube videos from where you played them last. Even if you restart your browser. Isn’t that better?

Reload Plus7) Reload Plus: This one’s for the power users of Firefox. Now, you can supercharge your reload button and hot keys with new tasks!

Stylish8) Stylish: Restyle your Web. This add-on lets you easily install themes and skins for Google, Facebook, YouTube, Orkut, and many other sites. You can even customize Firefox and other programs. Make the Web more beautiful for you.

Fastest Search9) Fastest Search: Search and ye shall find – faster than ever. For example, Search plain text, whole-word, regular expression, in page(s) for current tab, all tabs or filtered tabs. And that’s just the beginning. Get searching!

Google Search Link Fix10) Google/Yandex Search Link Fix: This extension prevents Google Search from modifying result links when they are clicked. Google Search makes some people unhappy when they change the result link when you click it. If, instead, you try to copy the link you get some gibberish instead of the actual link. This extension disables this behavior — on any Google domain — without having to configure anything. Simply install and enjoy!

S3 Google Translator11) S3 Google Translator: Hola! Bom Dia! Want to add the power of Google Translate into your Firefox browser? This add-on supports translation of  selected text, an entered phrase or the whole Web page in more than 50 languages.

BluHell Firewall12) BluHell Firewall: There are lots of add-ons for blocking ads, but some have extra features that you may not want or need. You just want to have a light-weight alternative. That’s BluHell Firewall!

X-Notifier13) X-notifier: Know right away when “you’ve got mail!” X-notifier checks all of your Webmail accounts and notifies you about unread emails. It also supports some of your social channels, so you’re always on top of what your friends are saying.

These are just the top 13 of the year. There are thousands of add-ons to let you customize your Firefox. There’s also a Support page for you if you ever have questions about how to install or troubleshoot add-ons.

Source:  The Den: A cozy corner of the Web filled with content just for you.

How to Make CDS Water, the World’s Most Powerful Germ Killer & Disease Eradicator at Home ~ For Next to Nothing

Posted in Drugs, Health, Medicine on October 29, 2014 by betweentwopines

 

CDS stands for Chlorine Dioxide Solution. Chlorine Dioxide is a greenish-yellow gas that readily dissolves in water. We release this gas from a solution of 28% Sodium Chlorite (now called MMS1 by Jim Humble) by “activating” it with an equal amount (drops, or 1/2 oz., or even 1 oz.) of 50% Citric Acid solution inside a glass mixer bottle. We then screw on the mixer bottle’s plastic lid which has two holes drilled in it to accept two lengths of 1/4 inch tubing (silicone tubing is ideal, but vinyl tubing is okay). Each tubing length is only inserted a short distance (E.g. 1/4 inch) inside the mixer bottle lid (I use a thin bead of Goop to seal where the tubing enters the hole so the tubing can’t be easily pulled out of the lid). One length of tubing in 24 inches (66cm) long which I use to blow air into the mixer bottle which will force the chlorine dioxide gas coming off the activated Sodium Chlorite solution into the second length of tubing which is inserted deep into my first bottle of distilled water (through a hole in the screwed-on cap) which I’ve marked as “A” in the photos seen below.

A second hole is drilled in the cap of water bottle “A” to accept another length of tubing which is inserted deep into my second bottle of distilled water (which I’ve marked as “B”). I don’t have to use a screw-on cap for my second bottle of water because I want the air that I’m blowing through the two bottles of water to be able to escape. If I wanted to make three bottles of CDS water at the same time, then I would have to use a screw-on cap on the second bottle of water and drill a second hole into the “B” water bottle cap to accept another length of tubing which would then go into a third bottle of water (but making two quarts of CDS water at one time is more than enough for my purpose).

I’m using one quart (one liter) plastic bottles made of translucent HDPE which I find ideal as it doesn’t react with the chlorine dioxide gas in the water. I’m using square HDPE #2 plastic bottles that originally held Summerhill Goat Milk purchased from Trader Joe’s. Some people use clear PET bottles to hold their CDS water, but clear PET bottles will leach chemicals into any water, and more so into distilled water. Therefore, it’s preferable to use translucent HDPE bottles, however, it’s not critical if clear plastic is the only type you can find.

After we’re done infusing our bottles of distilled water with chlorine dioxide gas, we’re going to tightly cap each bottle (using a new bottle cap), mark each bottle as “CDS Water,” and then store them in the refrigerator. If you don’t cap your bottle of CDS water, it’s going to turn completely clear within a few hours, since the chlorine dioxide gas will escape into the air from the top of the bottle (if you allow it). Over many weeks (8-12), the chlorine dioxide gas will gradually come out of the CDS water bottle anyway, but the refrigeration will slow down the process substantially. The hue of the green/yellow color will gradually begin to fade after a couple of weeks in the refrigerator, but it will still remain useful for 2 months or more. People who are trying to address a health problem will get better results by drinking a small amount of CDS water every hour, rather than drink a large amount at one time. Most people will take one half (1/2 oz.) or one ounce (1 oz.) per hour for 8 hours or 10 hours per day. I will usually let the CDS water remain in my mouth as I swish it around my teeth and gums for 10 minutes of more before swallowing. This will clean your teeth and gums like you cannot believe and rid your mouth of every possible pathogenic organism which causes gum and teeth infections. If you currently are having trouble with gum, mouth, or teeth infections, you’re going to become a very happy camper after you swish CDS water on a daily basis. CDS is a truly amazing oxidizer which will knock down and destroy just about every pathogenic organism in the book, yet it’s incredibly benign and gentle to the body (by the way, we have Andreas Kalcker and two unnamed friends to thank for putting out the information about infusing chlorine dioxide gas into water).

INgredients needed to produce CDS waterYou can read more about The Basic Science of MMS and CDS water at this link:

http://educate-yourself.org/mms/chlorinedioxidebasics004sep12.shtml

Here’s my step by step procedure for making CDS water:

Preparation

You need 4 things:

A) 28% Sodium Chlorite solution,
B) 50% Citric Acid solution,
C) Distilled water, and
D) a CDS production “rig” consisting of a mixer bottle, 3 or 4 lengths of 1/4 inch tubing, and 1 or more quart-size HDPE plastic water bottles with screw-on plastic caps.

A) 28% Sodium Chlorite solution can be purchased ready-made from internet vendors or you can make it yourself at home by adding a certain amount of distilled water (ounces or mls) to so many grams of Sodium Chlorite flakes (See “Ingredients for making CDS water” at the end of this article. ).

I make my own Sodium Chlorite solution by adding 9 ounces of distilled water to exactly 100 grams of Sodium Chlorite flakes. This will yield a little over 12 ozs. of Sodium Chlorite solution which I keep in a brown glass 16 oz. bottle in a kitchen cabunet, This is my master solution bottle which I will label “28% Sodium Chlorite” and store in a kitchen cabinet. From the master solution, I fill up a 1 oz. (or 2 oz.) amber (or cobalt blue) glass dropper bottle which I will also label “28% Sodium Chlorite” and either store it in a kitchen cabinet or in the refrigerator, on the door shelf.

B) I make the 50% Citric Acid solution by adding equal amounts of citric acid powder and distilled water. For example, if I want to make a 12 oz. master solution of 50% Citric Acid, I’ll mix 6 ozs. (170 g.) of citric acid crystals with 6 ozs. (170 ml) of distilled water and store in a brown 16 oz. Boston Round glass bottle marked “50% Citric Acid”. I will then fill up a 1 oz. or 2 oz. dark glass dropper bottle, label it “50% Citric Acid” and keep it with my 28% Sodium Chlorite dropper bottle.

C) I purchase Arrowhead distilled water from the supermarket here in southern California because I know with certainty that the water is 100% distilled and free of minerals (I tested it many years ago with a TDS meter). If you buy a well known national brand of distilled water, it will likely be 100% distilled, but if you buy a local market, unknown brand of water marked “distilled”, it may not be distilled at all. Stick with a national water company brand or get a TDS meter to check if your local brand of distilled water is truly distilled water.

I fill my two 1 quart bottles with distilled water up to within two inches of the top. I want to leave a little head room for the chlorine dioxide gas to expand into with the first bottle of water. I leave a little head room in the second water bottle to prevent the bubbling water from coming over the top and splashing onto the counter.

MMS bottleAfter I finish making my CDS water, I will then add distilled water to the mixer bottle (up to the top), label it “MMS” and store in the refrigerator door. This is MMS water which I use as a sterilizing agent, adding one ounce to a basin of water in which I’m soaking newly purchased vegetables or fruits (after I washed them 3 times with hot water). I will also add an entire bottle or two of MMS water to bath water and soak in it for 20 – 30 minutes. The sterilizing action of the MMS water will rid the skin of infective conditions including acne, psoriasis, boils, toenail fungus, etc. I put the back of my head into the bath water covering my ears (for 10 – 15 minutes) so the MMS goes into the ears and works on ear wax or any infection one might have in the ears. Just leave the MMS in the bath water overnight (after finishing your bath) and the MMS will remove soap scum and other filmy residues left in the bathtub from showers. Drain the water the next morning.

D) The CDS production “rig” includes 3 or 4 lengths of 1/4 inch silicone or vinyl tubing (which you can buy from a store that sells aquarium supplies or from the internet), one, two, or three quart (liter) size HDPE plastic water bottles with screw-on plastic caps (you’ll need one or two extra caps for the drilled holes), a glass mixer bottle with a screw-on plastic lid (you’ll need a second lid for the drilled holes). I use amber glass supplement/vitamin bottles for my mixer bottles. They come in many different sizes, but the 7 oz. size is convenient (see photo above). I would like to have a large amount of MMS water after I’m through making CDS, but I still need a bottle size that will fit inside a coffee cup (or small bowl, or wide mouth jar) which I will half-fill with hot water, to serve as a hot water bath, while I’m making my CDS water (more on this later).

Drilling holes in the plastic lid

You are going to drill two holes in the lid of the mixer bottle and in the plastic cap of your water bottle. If your water bottle cap has an inner peripheral ring of plastic that seals the bottle from spillage, then keep your two holes in the center portion of the cap and not drill through the inner peripheral plastic ring. “1/4 inch” tubing usually refers to the outer diameter of the tubing, so a 1/4 inch drill bit will allow the tubing to easily fit into the hole. If you want to make the hole a little bit tighter, especially if you are using 1/4 inch silicone tubing, you can use a 15/64 drill bit and still push the tubing into the hole with a little bit of effort. I use a bead of Goop around the tubing where it meets the hole to fasten it tightly to the lid so it won’t easily pull out. The first length of tubing that fits into the mixer lid is the 24 inch long “blower” tube. The second length of tubing has to be long enough to go from the mixer bottle into the bottom of your first water bottle. I made mine 22 inches long, but you can make yours a little longer if you want. I made my third length of tubing 18 inches long because I only have to travel from bottle “A” to bottle “B” which are both standing right next to each other. If you want to make three bottles of water at the same time, then drill a second water bottle cap with two holes and add a 4th length of tubing cut 18 inches long. You don’t need a drilled hole bottle cap in your last bottle of water. Just stick the tubing into the bottom of the water bottle.

Mixing the two solutions

Mixer elevated above CDS water bottles sitting in hot water bathI used to measure out 10 or 15 or 20 drops at a time, but I now just count out 4 or 5 entire droppers of 28% Sodium Chlorite solution and the same number of droppers of 50% Citric Acid and squirt it into the mixer bottle (the reaction will start immediately to liberate chlorine dioxide gas). I then screw on the mixer bottle plastic lid with the two lengths of tubing and place the mixer bottle into a coffee mug that is half filled with hot water. I then elevate the coffee mug and mixer bottle combo with a stand (or box) so that it stands higher than the two water bottles, otherwise the water from the water bottle could back fill into the mixer bottle (when not blowing through the blower tube) if you place the mixer bottle at the same height as the water bottles (the hot water from the water bath will cause the chlorine dioxide gas in the mixer bottle to produce at a much faster rate than if left at room temperature).

After waiting a minute or two for the chlorine dioxide gas to build up in the mixer bottle, I’ll blow on the blower tube and force the gas to percolate through the water bottles. I keep my tongue on the blower tube while inhaling or preparing to blow into the tube so the chlorine dioxide gas won’t come back into my mouth (you want to avoid breathing the gas, which can be unpleasant). It doesn’t take long before you start seeing the water turn a greenish-yellow color. The longer you blow the chlorine dioxide gas into the water bottles, the darker the color becomes.

After my first water bottle “A” has a nice deep yellow-green color, I’ll reverse the position of the two water bottles, so that now bottle “B” will get the first gas coming off the mixer bottle and bottle “A” will get the secondary gas coming from bottle “B”. When the color of bottle “B” is the same as bottle “A”, I’m done.

I’ll remove the tubing from both water bottles, screw on new caps, and store them in the refrigerator. I then remove the mixer bottle from the coffee cup with the hot water and unscrew the drilled cap with the tubing. I’ll add distilled water to the mixer bottle and fill to the top. I then screw on a new lid onto the mixer bottle and place in the refrigerator after labeling it “MMS.”

I then shake out the tubing of my CDS production rig to remove water and store in a large plastic zip lock bag.

Ingredients for making CDS water

If you want more information on how to obtain economical Sodium Chlorite flakes and Citric Acid powder for making solutions used for making MMS or CDS water (or a CDS Production Rig), leave a voice message at 949-544-1375 and I’ll call you back. If you have a Skype name, let me know.

Ken

You can subscribe to the MMS Newsletter at this link:
http://www.mmsnews.org/newsletter-signup

MMS WPD CDS Testimonials:
MMS Testimonials | Videos (https://youtube.com/MMStestimonials)
MMS Testimonials | Written (http://genesis2church.org/all-mms-testimonials.html)

Source:  http://educate-yourself.org/mms/cdsproductionexplained15mar13.shtml

Lemon and Baking soda Miraculous combination

Posted in Drugs, Health, Medicine on October 29, 2014 by betweentwopines

 

BakingSoda

Lemon and Baking soda Miraculous combination: 10, 000 times stronger than Chemotherapy!

Why do we not know about this?

Because there are organizations that continue to profit from disease.  It is that simple.

Do you know how many people die while this secret is kept simply in the name of profit?

Lemon has already been proven to have strong anti – carcinogenic properties. In addition to this there are many other useful properties. Lemon has a strong effect on cysts and tumors.

lemon

Citrus fruit can cure cancer. Recent studies have shown that consuming citrus fruits, specifically lemons have prevented and in some cases cured cancer.  And by adding baking soda you will normalize the pH of the body which does not allow the cancer to continue to spread.

A recent case-control study out of Europe showed that consuming four or more 150-gram portions per week of citrus fruit decreased the risks of throat cancer by 58 percent, oral/pharyngeal cancer by 53 percent, stomach cancer by 31 percent, and colorectal cancer by 18 percent. This study did not find a protective effect of citrus against breast cancer, but a recent American study did show that women consuming about 75 grams daily of grapefruit (fruit or juice) saw a 22% reduction in breast cancer risk if they had never used hormone replacement therapy. It is noteworthy that the protective level of citrus consumption was nearly identical in both these studies (525-600 grams per week) and could be interpreted as a minimum intake level for meaningful cancer protection. However, it’s also important to know the best sources of limonoids if they are key to citrus fruit’s anti-cancer properties.

Lemon has a very strong antimicrobial effect with a very broad spectrum of activity against bacterial and fungal infections. Lemon is effective against internal parasites and worms, it regulates blood pressure and is a powerful antidepressant, reduces stress and nerve crises.

Baking_Soda

What is the source of this information?  It comes from one of the largest manufacturers of drugs, which states that after 20 laboratory tests conducted since 1970 they have proved that:

Lemon destroys carcinogenic cells in 12 types of cancers. Lemon prevents the spread of carcinogenic cells and has 10,000 times stronger effect then drugs like Adriamycin, chemotherapy and narcotic products.

lemon-and-baking-soda

Chemotherapy has horrible side effects the worst being that it destroys healthy cells, simply put it kills you. Lemon juice and baking soda, on the other hand only kills the cancer cells.

Patients should drink two teaspoons of lemon juice with a half of teaspoon of baking soda.

Please make sure to use organic lemons.   Organic lemons  are 100 times more effective than a lemon grown with chemical fertilizers and sprayed with chemicals .

 

Source:    http://www.healthy-holistic-living.com/lemon-baking-soda-miraculous-combination.html#

 

Related:

Studies, testimonials, side effects and uses of sodium bicarbonate

Research Baking soda cancer cure

Banker Suicides Return: DSK’s Hedge Fund Partner Jumps From 23rd Floor Apartment

Posted in Conspiracy, Finance on October 26, 2014 by betweentwopines

By Tyler Durden

The summer, thankfully, has been largely bereft of the dismal trend of bankers committing suicide, but as Bloomberg reports, Thierry Leyne, a French-Israeli banker and partner of Dominique Strauss-Kahn, the disgraced former chief of the IMF, was found dead Thursday after apparently taking his own life by jumping off the 23rd floor of one of the Yoo towers, a prestigious residential complex in Tel Aviv. This is the 16th financial services executive death this year.

 

 

Bloomberg reports that Thierry Leyne, the French-Israeli entrepreneur who last year started an investment firm with former International Monetary Fund Managing Director Dominique Strauss-Kahn, has died. He was 48.

Leyne died yesterday in Tel Aviv, according to his assistant at the firm, who asked not to be identified. Le Figaro newspaper reported that he committed suicide.

 

Last year, Leyne joined Strauss-Kahn in establishing the Paris-traded firm Leyne, Strauss-Kahn & Partners after the former IMF head bought a 20 percent stake to help develop the investment-banking franchise of Leyne’s company, Luxembourg-based Anatevka SA. Leyne had taken Anatevka public in March 2013 before joining forces with Strauss-Kahn, commonly referred to in France as DSK.

 

The new partnership — usually called LSK & Partners by using both men’s initials — was part of Strauss-Kahn’s efforts to rebuild his post-IMF life after he was charged in 2011 of criminal sex, attempted rape, sexual abuse, unlawful imprisonment and the forcible touching of a chambermaid at the Sofitel hotel in Manhattan. Strauss-Kahn denied the charges, which were later dropped. He settled the maid’s lawsuit in 2012.

And NYTimes adds,

Mr. Leyne, 48, jumped off the 23rd floor of one of the Yoo towers, a prestigious residential complex, according to Israeli officials.

Leyne’s Background:

Leyne, who resided in Tel Aviv, built his career as a financier in France, Israel and Luxembourg. He founded the investment firm Assya Capital in 1994 and listed it on Euronext in Paris in 2001. Leyne merged the business with Global Equities Capital Markets in 2010 to provide financial advice and private banking to clients in eastern Europe, Le Figaro reported.

 

Anatevka, which had a market value of 50 million euros ($63 million) when Strauss-Kahn purchased his stake, controlled the merged entity, known as Assya Compagnie Financiere, offering asset management, brokerage, corporate finance and capital investment. Anatevka had a staff of about 100 people in six countries — Luxembourg, Belgium, Monaco, Israel, Switzerland and Romania — in September 2013.

 

In 1996, Leyne founded the company Axfin, one of the first independent investment firms in France, according to the website of Assya Capital. Axfin listed on the Paris stock exchange in 1999 before it was bought by Nuremberg, Germany-based Consors Discount Broker AG. Leyne was the supervisory board chairman of Consors France until the end of 2002.

 

Leyne was born in September 1965, according to French public records. He held French and Israeli citizenship, Figaro said. He had an engineering degree from the Israel Institute of Technology in Haifa, his LinkedIn profile shows.

*  *  *

This is the 16th financial services executive death this year…

1 – William Broeksmit, 58-year-old former senior executive at Deutsche Bank AG, was found dead in his home after an apparent suicide in South Kensington in central London, on January 26th.

2 – Karl Slym, 51 year old Tata Motors managing director Karl Slym, was found dead on the fourth floor of the Shangri-La hotel in Bangkok on January 27th.

3 – Gabriel Magee, a 39-year-old JP Morgan employee, died after falling from the roof of the JP Morgan European headquarters in London on January 27th.

4 – Mike Dueker, 50-year-old chief economist of a US investment bank was found dead close to the Tacoma Narrows Bridge in Washington State.

5 – Richard Talley, the 57 year old founder of American Title Services in Centennial, Colorado, was found dead earlier this month after apparently shooting himself with a nail gun.

6 – Tim Dickenson, a U.K.-based communications director at Swiss Re AG, also died last month, however the circumstances surrounding his death are still unknown.

7 – Ryan Henry Crane, a 37 year old executive at JP Morgan died in an alleged suicide just a few weeks ago.  No details have been released about his death aside from this small obituary announcement at the Stamford Daily Voice.

8 – Li Junjie, 33-year-old banker in Hong Kong jumped from the JP Morgan HQ in Hong Kong this week.

9 – James Stuart Jr, Former National Bank of Commerce CEO, found dead in Scottsdale, Ariz., the morning of Feb. 19. A family spokesman did not say whatcaused the death

10 – Edmund (Eddie) Reilly, 47, a trader at Midtown’s Vertical Group, commited suicide by jumping in front of LIRR train

11 – Kenneth Bellando, 28, a trader at Levy Capital, formerly investment banking analyst at JPMorgan, jumped to his death from his 6th floor East Side apartment.

12 – Jan Peter Schmittmann, 57, the former CEO of Dutch bank ABN Amro found dead at home near Amsterdam with wife and daughter.

13 – Li Jianhua, 49, the director of China’s Banking Regulatory Commission died of a sudden heart attack

14 – Lydia _____, 52 – jumped to her suicide from the 14th floor of Bred-Banque Populaire in Paris

15 – Julian Knott, 45 – killed wife and self with a shotgun in Jefferson Township, New Jersey

16 – Thierry Leyne, 48 – jumped from 23rd floor apartment in Tel Aviv.

 

Source: http://www.zerohedge.com/news/2014-10-24/banker-suicides-return-dsks-hedge-fund-partner-jumps-23rd-floor-apartment

The origins of human beings according to ancient Sumerian texts

Posted in Alien, Ancient History, Archaeology on October 26, 2014 by betweentwopines

Sumerian creation myth
By johnblack
Sumer, or the ‘land of civilized kings’, flourished in Mesopotamia, now modern-day Iraq, around 4500 BC. Sumerians created an advanced civilization with its own system of elaborate language and writing, architecture and arts, astronomy and mathematics. Their religious system was a complex one comprised of hundreds of gods. According to the ancient texts, each Sumerian city was guarded by its own god; and while humans and gods used to live together, the humans were servants to the gods.

The Sumerian creation myth can be found on a tablet in Nippur, an ancient Mesopotamian city founded in approximately 5000 BC.

The creation of Earth (Enuma Elish) according to the Sumerian tablets begins like this:

When in the height heaven was not named,
And the earth beneath did not yet bear a name,
And the primeval Apsu, who begat them,
And chaos, Tiamut, the mother of them both
Their waters were mingled together,
And no field was formed, no marsh was to be seen;
When of the gods none had been called into being,
And none bore a name, and no destinies were ordained;
Then were created the gods in the midst of heaven,
Lahmu and Lahamu were called into being…

Sumerian mythology claims that, in the beginning, human-like gods ruled over Earth. When they came to the Earth, there was much work to be done and these gods toiled the soil, digging to make it habitable and mining its minerals.

The texts mention that at some point the gods mutinied against their labour.

When the gods like men
Bore the work and suffered the toll
The toil of the gods was great,
The work was heavy, the distress was much.

Anu, the god of gods, agreed that their labour was too great. His son Enki, or Ea, proposed to create man to bear the labour, and so, with the help of his half-sister Ninki, he did. A god was put to death, and his body and blood was mixed with clay. From that material the first human being was created, in likeness to the gods.

You have slaughtered a god together
With his personality
I have removed your heavy work
I have imposed your toil on man.

In the clay, god and man
Shall be bound,
To a unity brought together;
So that to the end of days
The Flesh and the Soul
Which in a god have ripened –
That soul in a blood-kinship be bound.

This first man was created in Eden, a Sumerian word which means ‘flat terrain’. In the Epic of Gilgamesh, Eden is mentioned as the garden of the gods and is located somewhere in Mesopotamia between the Tigris and Euphrates rivers.

Sumerian tablet depicting Enki in the creation myth. (world-myth.com)

Initially human beings were unable to reproduce on their own, but were later modified with the help of Enki and Ninki. Thus, Adapa was created as a fully functional and independent human being. This ‘modification’ was done without the approval of Enki’s brother, Enlil, and a conflict between the gods began. Enlil became the adversary of man, and the Sumerian tablet mentions that men served gods and went through much hardship and suffering.

Adapa, with the help of Enki, ascended to Anu where he failed to answer a question about ‘the bread and water of life’. Opinions vary on the similarities between this creation story and the biblical story of Adam and Eve in Eden.

Featured image: Sumerian chaos monster and sun god. (Wikipedia)

Note: Ancient Sumerian translations were taken from William Bramley’s book, The Gods of Eden.

Related Links

Adam and Adapa: Two Anthropological characters

Sumerian creation myth

Enuma Elish – The Epic of Creation

Sumerian Myths of Origins

Sumerian Deities

Full story at: http://www.ancient-origins.net/human-origins-folklore/origins-human-beings-according-ancient-sumerian-texts-0065#sthash.s3pZ2eIf.dpuf