100 Hacking Tools and Resources- Tempemail – Blog – 10 minute

 
As we recently surpassed $100 million dollars in bounties, we want to continue the celebration with this list of 100 tools and resources for hackers! These range from beginner to expert. Most are free but some cost money. Check them out to add to your own hacking toolkit! We’ll add these to our GitHub on Hacker101/_resources/ so feel free to continue adding even more tools and resources! 
Burp Suite
1. Burp Suite: The quintessential web app hacking tool. Once you hit 500 reputation on Tempemail, you are eligible for a free 3-month license of Burp Suite Pro! Check out these awesome Burp plugins:
2. ActiveScan++: ActiveScan++ extends Burp Suite’s active and passive scanning capabilities. Designed to add minimal network overhead, it identifies application behavior that may be of interest to advanced testers.
3. BurpSentinel: With BurpSentinel it is possible for the penetration tester to quickly and easily send a lot of malicious requests to parameters of a HTTP request. Not only that, but it also shows a lot of information of the HTTP responses, corresponding to the attack requests. It’s easy to find low-hanging fruit and hidden vulnerabilities like this, and it also allows the tester to focus on more important stuff!
4. Autorepeater Burp: Automated HTTP request repeating with Burp Suite. 
5. Autorize Burp: Autorize is an extension aimed at helping the penetration tester to detect authorization vulnerabilities—one of the more time-consuming tasks in a web application penetration test.
6. Burp Beautifier: BurpBeautifier is a Burpsuite extension for beautifying request/response body, supporting JS, JSON, HTML, XML format, writing in Jython 2.7.
7. Flow: This extension provides a Proxy history-like view along with search filter capabilities for all Burp tools.
8. Headless Burp: This extension allows you to run Burp Suite’s Spider and Scanner tools in headless mode via the command-line.
9. Logger++: Logger++ is a multi-threaded logging extension for Burp Suite. In addition to logging requests and responses from all Burp Suite tools, the extension allows advanced filters to be defined to highlight interesting entries or filter logs to only those which match the filter.
10. WSDL Wizard: This extension scans a target server for WSDL files. After performing normal mapping of an application’s content, right click on the relevant target in the site map, and choose “Scan for WSDL files” from the context menu. The extension will search the already discovered contents for URLs with the .wsdl file extension, and guess the locations of any additional WSDL files based on the file names known to be in use. The results of the scanning appear within the extension’s output tab in the Burp Extender tool.
11. JSON_Beautifier: This plugin provides a JSON tab with beautified representation of the request/response.
Web Hacking
12. JSParser: A python 2.7 script using Tornado and JSBeautifier to parse relative URLs from JavaScript files. This is especially useful for discovering AJAX requests when performing security research or bug bounty hunting.
13. Knockpy: Knockpy is a python tool designed to enumerate subdomains on a target domain through a word list. It is designed to scan for a DNS zone transfer and bypass the wildcard DNS record automatically, if it is enabled. Knockpy now supports queries to VirusTotal subdomains, you can set the API_KEY within the config.json file.
14. Lazys3: A Ruby script to brute-force for AWS s3 buckets using different permutations.
15. Sublist3r: Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting. Sublist3r enumerates subdomains using many search engines such as Google, Yahoo, Bing, Baidu and Ask. Sublist3r also enumerates subdomains using Netcraft, Virustotal, ThreatCrowd, DNSdumpster and ReverseDNS.
16. Teh_s3_bucketeers: Teh_s3_bucketeers is a security tool to discover S3 buckets on Amazon’s AWS platform. 
17. Virtual-host-discovery: This is a basic HTTP scanner that enumerates virtual hosts on a given IP address. During recon, this might help expand the target by detecting old or deprecated code. It may also reveal hidden hosts that are statically mapped in the developer’s /etc/hosts file.
18. Wpscan: WPScan is a free (for non-commercial use) black box WordPress security scanner written for security professionals and bloggers to test the security of their sites.
19. Webscreenshot: A simple script to screenshot a list of websites, based on the url-to-image PhantomJS script.
20. Asnlookup: The ASN Information tool displays information about an IP address’s Autonomous System Number (ASN), such as: IP owner, registration date, issuing registrar and the max range of the AS with total IPs.
21. Unfurl: Unfurl is a tool that analyzes large collections of URLs and estimates their entropies to sift out URLs that might be vulnerable to attack.
22. Waybackurls: Accept line-delimited domains on stdin, fetch known URLs from the Wayback Machine for *.domain and output them on stdout.
23. Httprobe: Takes a list of domains and probes for working http and https servers.
24. Meg: Meg is a tool for fetching lots of URLs without taking a toll on the servers. It can be used to fetch many paths for many hosts, or fetching a single path for all hosts before moving on to the next path and repeating.
25. Gau: Getallurls (gau) fetches known URLs from AlienVault’s Open Threat Exchange, the Wayback Machine, and Common Crawl for any given domain. Inspired by Tomnomnom’s waybackurls.
26. Ffuf: A fast web fuzzer written in Go.
27. Dirsearch: A simple command line tool designed to brute force directories and files in websites.
28. OWASP Zed: OWASP Zed Attack Proxy (ZAP) is an open source tool which is offered by OWASP (Open Web Application Security Project), for penetration testing of your website/web application. It helps you find the security vulnerabilities in your application.
29. Subfinder: Subfinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple modular architecture and is optimized for speed. Subfinder is built for doing one thing only – passive subdomain enumeration, and it does that very well.
30. EyeWitnees: EyeWitness is designed to take screenshots of websites, provide some server header info, and identify any default credentials. EyeWitness is designed to run on Kali Linux. It will auto detect the file you give it with the -f flag as either being a text file with URLs on each new line, nmap xml output, or nessus xml output. The –timeout flag is completely optional, and lets you provide the max time to wait when trying to render and screenshot a web page.
31. Nuclei: Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use.
32. Naabu: Naabu is a port scanning tool written in Go that allows you to enumerate valid ports for hosts in a fast and reliable manner. It is a really simple tool that does fast SYN scans on the host/list of hosts and lists all ports that return a reply.
33. Shuffledns: ShuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce, as well as resolve subdomains with wildcard handling and easy input-output support.
34. Dnsprobe: DNSProbe is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers.
35. Chaos: Chaos actively scans and maintains internet-wide assets’ data. This project is meant to enhance research and analyze changes around DNS for better insights.
36. Subjack: Subjack is a Subdomain Takeover tool written in Go designed to scan a list of subdomains concurrently and identify ones that are able to be hijacked. With Go’s speed and efficiency, this tool really stands out when it comes to mass-testing. Always double check the results manually to rule out false positives.
37. gitGraber: gitGraber is a tool developed in Python3 to monitor GitHub to search and find sensitive data in real time for different online services.
38. Shhgit: Shhgit finds secrets and sensitive files across GitHub code and Gists committed in nearly real-time by listening to the GitHub Events API.
39. Commit-stream: Commit-stream extracts commit logs from the Github event API,  exposing the author details (name and email address) associated with Github repositories in real time.
40. Masscan: This is an Internet-scale port scanner. It can scan the entire Internet in under 6 minutes, transmitting 10 million packets per second, all from a single machine.
41. Massdns: MassDNS is a simple high-performance DNS stub resolver targeting those who seek to resolve a massive amount of domain names in the order of millions or even billions. Without special configuration, MassDNS is capable of resolving over 350,000 names per second using publicly available resolvers.
42. Findomain: Findomain offers a dedicated monitoring service hosted in Amazon (only the local version is free), that allows you to monitor your target domains and send alerts to Discord and Slack webhooks or Telegram chats when new subdomains are found.
43. Amass: The OWASP Amass Project performs network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques.
44. Dnsgen: This tool generates a combination of domain names from the provided input. Combinations are created based on wordlist. Custom words are extracted per execution.
45. Dngrep: A utility for quickly searching presorted DNS names. Built around the Rapid7 rdns & fdns dataset.
46. Wfuzz: Wfuzz has been created to facilitate the task in web applications assessments and it is based on a simple concept: it replaces any reference to the FUZZ keyword by the value of a given payload.
47. Aquatone: Aquatone is a tool for visual inspection of websites across a large number of hosts, which provides a convenient overview of HTTP-based attack surface.
48. WhatWeb: WhatWeb recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognise something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more.
49. Dirb: ‘DIRB is a web content scanner. It launches a dictionary based attack against a web server and analyzes the response. 
50. Dnscan: Dnscan is a python wordlist-based DNS subdomain scanner.
51. Sublert: Sublert is a security and reconnaissance tool that was written in Python to leverage certificate transparency for the sole purpose of monitoring new subdomains deployed by specific organizations and an issued TLS/SSL certificate. The tool is supposed to be scheduled to run periodically at fixed times, dates, or intervals (Ideally each day). New identified subdomains will be sent to Slack workspace with a notification push. Furthermore, the tool performs DNS resolution to determine working subdomains.
52. Recon-ng: Recon-ng is a full-featured reconnaissance framework designed with the goal of providing a powerful environment to conduct open source, web-based reconnaissance quickly and thoroughly.
53. Jok3r: Jok3r is a framework that helps penetration testers with network infrastructure and web security assessments. Its goal is to automate as much as possible in order to quickly identify and exploit “low-hanging fruit” and “quick win” vulnerabilities on most common TCP/UDP services and most common web technologies (servers, CMS, languages…).
54. DirBuster: This tool is a multi-threaded java application that is used to perform brute force over directories and file names on web and application servers. DirBuster attempts to find hidden directories and pages within a web application, providing users with an additional attack vector.
55. Altdns: Altdns is a DNS recon tool that allows for the discovery of subdomains that conform to patterns. Altdns takes in words that could be present in subdomains under a domain (such as test, dev, staging), as well as a list of known subdomains.
56. Recon_profile: This tool is to help create easy aliases to run via an SSH/terminal.  
57. BBHT: Bug Bounty Hunting Tools is a script to install the most popular tools used while looking for vulnerabilities for a bug bounty program.
Mobile Hacking
58. MobSF: Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
59. Jadx: Jadx is a dex to Java decompiler. The command line and GUI tools for producing Java source code from Android Dex and Apk files. 
60. Dex2Jar: Dex2Jar is a freely available tool to work with Android “. dex” and Java “. class” files. 
61. Radare2: A free/libre toolchain for easing several low level tasks, such as forensics, software reverse engineering, exploiting, debugging, etc. It is composed by a large number of libraries (which are extended with plugins) and programs that can be automated with almost any programming language.
62. Genymotion: Cross-platform Android emulator for developers & QA engineers. Develop & automate your tests to deliver best quality apps.
63. Frida “Universal” SSL Unpinner: Universal unpinner. 
64. Frida: Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
Exploitation
65. SQLNinja: Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end.
66. XSS hunter: XSS Hunter allows you to find all kinds of cross-site scripting vulnerabilities, including the often-missed blind XSS. The service works by hosting specialized XSS probes which, upon firing, scan the page and send information about the vulnerable page to the XSS Hunter service.
67. NoSQLMap: NoSQLMap is an open source Python tool designed to audit for, as well as automate injection attacks, and exploit default configuration weaknesses in NoSQL databases and web applications using NoSQL to disclose or clone data from the database. 
68. Ysoserial: A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. 
69. Sqlmap: Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester, and a broad range of switches including database fingerprinting, over data fetching from the database, accessing the underlying file system, and executing commands on the operating system via out-of-band connections.
70. SSRFTest: SSRF testing tool.
71. Retire.JS: Scanning website for vulnerable js libraries.
72. Spiderfoot: SpiderFoot is an open source intelligence (OSINT) automation tool. It integrates with just about every data source available, and automates OSINT collection so that you can focus on data analysis.
Scanners/Frameworks
73. OpenVAS: OpenVAS is a full-featured vulnerability scanner. Its capabilities include unauthenticated testing, authenticated testing, various high level and low-level Internet and industrial protocols, performance tuning for large-scale scans and a powerful internal programming language to implement any type of vulnerability test.
74. Nikto: Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers.
75. Wapiti: Wapiti allows you to audit the security of your websites or web applications. It performs “black-box” scans (it does not study the source code) of the web application by crawling the web pages of the deployed webapp, looking for scripts and forms where it can inject data.
76. Metasploit: Metasploit is an open-source penetration testing framework.
77. Maltego: Maltego is an open source intelligence (OSINT) and graphical link analysis tool for gathering and connecting information for investigative tasks.
78. Canvas: CANVAS offers hundreds of exploits, an automated exploitation system, and a comprehensive, reliable exploit development framework to penetration testers and security professionals worldwide.
79. Sn1per: Sn1per Community Edition is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities. Sn1per Professional is Xero Security’s premium reporting addon for Professional Penetration Testers, Bug Bounty Researchers and Corporate Security teams to manage large environments and pentest scopes.
80. Lazyrecon: LazyRecon is a script written in Bash, intended to automate the tedious tasks of reconnaissance and information gathering. The information is organized in an html report at the end, which helps you identify next steps.
81. Osmedeus: Osmedeus allows you to automatically run the collection of awesome tools for reconnaissance and vulnerability scanning against the target.
82. Reconness: ReconNess helps you to run and keep all your #recon in the same place allowing you to focus only on the potentially vulnerable targets without distraction and without requiring a lot of bash skill, or programming skill in general.
83. IronWASP: IronWASP (Iron Web Application Advanced Security testing Platform) is an open-source tool used for web application vulnerability testing. It is designed in such a way that users having the right knowledge can create their own scanners using this as a framework. IronWASP is built using Python and Ruby and users having knowledge of them would be able to make full use of the platform. However, IronWASP provides a lot of features that are simple to understand.
84. Nmap: Nmap (“Network Mapper”) is a free and open-source (license) utility for network discovery and security auditing.
Datasets / Freemium Services 
85. Shodan: Shodan provides a public API that allows other tools to access all of Shodan’s data. Integrations are available for Nmap, Metasploit, Maltego, FOCA, Chrome, Firefox and many more.
86. Censys: Censys scans the most ports and houses the biggest certificate database in the world, and provides the most up-to-date,  thorough view of your known and unknown assets.
87. Rapid7 Forward DNS (FDNS): This dataset contains the responses to DNS requests for all forward DNS names known by Rapid7’s Project Sonar. 
88. C99.nl: C99.nl is a scanner that scans an entire domain to find as many subdomains as possible.
89. Seclists: SecLists is the security tester’s companion. It’s a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. The goal is to enable a security tester to pull this repository onto a new testing box and have access to every type of list that may be needed.
90. Payloads All The Things: A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques. 
Miscellaneous Hacking Tools
91. Ettercap: Ettercap is a comprehensive suite which features sniffing of live connections, content filtering, and support for active and passive dissection of many protocols, including multiple features for network and host analysis.
92. Transformations: Transformations makes it easier to detect common data obscurities, which may uncover security vulnerabilities or give insight into bypassing defenses. 
93. John the Ripper: John the Ripper is free and Open Source software, distributed primarily in a source code form.
94. Wireshark: Wireshark® is a network protocol analyzer that lets you capture and interactively browse the traffic running on a computer network.  
95. Foxyproxy: FoxyProxy is an advanced proxy management tool that completely replaces Firefox’s limited proxying capabilities. For a simpler tool and less advanced configuration options, please use FoxyProxy Basic.
96. Wappalyzer: Wappalyzer is a browser extension that uncovers the technologies used on websites. It detects content management systems, eCommerce platforms, web servers, JavaScript frameworks, analytics tools and many more.
97. Buildwith: BuiltWith’s goal is to help developers, researchers and designers find out what technologies web pages are using, which may help them decide what technologies to implement themselves.
98. Altair: Altair GraphQL Client helps you debug GraphQL queries and implementations – taking care of the hard part so you can focus on actually getting things done.
99. THC Hydra: This tool is a proof-of-concept code, designed to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system.
100. Swiftness X: A note taking tool for BB and pentesting.

Tempemail , Tempmail Temp email addressess (10 minutes emails)– When you want to create account on some forum or social media, like Facebook, Reddit, Twitter, TikTok you have to enter information about your e-mail box to get an activation link. Unfortunately, after registration, this social media sends you dozens of messages with useless information, which you are not interested in. To avoid that, visit this Temp mail generator: tempemail.co and you will have a Temp mail disposable address and end up on a bunch of spam lists. This email will expire after 10 minute so you can call this Temp mail 10 minute email. Our service is free! Let’s enjoy!

Tendências de Mídias Sociais: O Impacto do Coronavirus no Marketing – Blog – 10 minute

O Relatório de Tendências de Mídias Sociais, para o 1º trimestre de 2020, aborda em detalhes os impactos do COVID-19 causados nas tendências de marketing destacadas anteriormente pela Socialbakers. O atual Relatório descreve dados que refletem mudanças cruciais no mercado e também destaca como marcas reagiram aos impactos da pandemia.
Este relatório nos mostra as principais mudanças ocasionadas na publicidade paga, em todo o mundo. Mudanças essas que criaram oportunidades e certo otimismo em meio à pandemia, especialmente quando analisamos regiões que começaram a conter a propagação do vírus. Vemos como o CPC, o CPM e o gasto com anúncios mudaram por setores e regiões.
No aspecto orgânico, o tamanho do público das 50 maiores marcas no Instagram teve um considerável aumento, bem como a dependência de conteúdo orgânico devido à diminuição geral dos gastos com anúncios.
Outro efeito do contexto da pandemia é o aumento do tempo gasto online pelas pessoas, o que criou oportunidades para as marcas aumentarem seu alcance ou engajamento. Todos esses insights e muito mais, incluindo uma análise do sentimento da audiência em torno da situação do Coronavírus e o mais recente em marketing de influência, poderão ser encontrados aqui.

Tempemail , Tempmail Temp email addressess (10 minutes emails)– When you want to create account on some forum or social media, like Facebook, Reddit, Twitter, TikTok you have to enter information about your e-mail box to get an activation link. Unfortunately, after registration, this social media sends you dozens of messages with useless information, which you are not interested in. To avoid that, visit this Temp mail generator: tempemail.co and you will have a Temp mail disposable address and end up on a bunch of spam lists. This email will expire after 10 minute so you can call this Temp mail 10 minute email. Our service is free! Let’s enjoy!

The rot in Australian media is already advanced. We need to understand the damage wrought in 2020 | Australian media- Tempemail – Blog – 10 minute

The Northern Age was founded in Townsville in the 1890s – there are conflicting reports of the precise date – in what was still the Colony of Queensland. 
It was moved to Ingham, just north of Townsville, then the smaller neighboring town of Halifax, changing its name to the Planter, and perhaps the Northern Planter, before returning to Ingham for good.  
From 1904 until last Wednesday, through world wars, depressions, and four Foley Shield championships for the Herbert River Tigers, it was published as the Herbert River Express. Now its current owners, News Corp, have shuttered it for good, along with 111 other community and regional newspapers. The masthead will disappear and its coverage will be folded into the Townsville Bulletin’s website. 
No longer a newspaper, the Express will not even have its own URL. Ingham and the surrounding region will no longer have a newsroom of its own. 
There’s something to say about media ownership regulations that allow so much civic and cultural heritage to be entrusted to a single, profit-driven entity. But even if News was not always the best custodian of local newspapers, owners can change, unless capacity is lost. 
News Corp is not alone in closing papers. Australia is not alone in wondering what to do when local news disappears, and entire communities are left without newsrooms.
We need to understand how advanced the rot already is in Australia, and how much damage has been wrought in 2020 alone. 
The Public Interest Journalism Institute tracks Australian newsroom closures in their Australian Newsroom Mapping Project. Their latest data, due to be published next week, paints an ugly picture. According to their research and projects manager, Gary Dickson, in 2020 so far, dozens of newspapers have vanished or been seriously diminished. 
In an email Dickson told me that nine mastheads have merged into other properties. Ninety-one papers have ended print editions. One newsroom (10 Daily) has closed entirely. And 20 mastheads have closed (19 News Corp regional newspapers announced on Thursday, and Buzzfeed Australia). Disproportionately, masthead closures have taken place in Queensland. 
The pandemic has struck at the news industry in the United States, as well. 
US journalism-focused non-profit the Poynter Institute reports that 30 local newsrooms have closed or disappeared in mergers during pandemic lockdowns. 
Some, like the Daily Iowegian of Centerville, Iowa, and the Knoxville Journal Express, had been publishing since the Civil War, or earlier. 
Elsewhere, Poynter keeps a running list of the newspapers, publishers and broadcasters which have closed, reduced printing days, or shed staff during the Covid-19 emergency. 
The carnage is also reaching into world cities which are crucial to the US economy. In Palo Alto, in the heart of Silicon Valley, the Daily Post will only be printing four days a week. The San Francisco Examiner has cut staff. The New York Post has furloughed or laid off reporters. 
Media researchers use a term, “news deserts”, to capture the status of communities that aren’t served by a dedicated print news outlet. Already, by 2018, 171 counties in the US had no newspaper at all; 1,449 had only one, usually a weekly. New figures on news deserts are yet to be calculated, but there are sure to be more of them in the US and Australia. 
The term may not be quite adequate because, in a way, it may be overly optimistic. 
It’s not quite true that news stops flowing in a town with no paper. Rather, that community loses an institution that, whatever its biases may have been, had ethical and legal imperatives to verify the information that it published. 
Inhabitants of news deserts do not suffer from a lack of information. They suffer from a dearth of relevant, factual information about the communities they live in. 
The void left by local news might be partly filled by national news outlets — the loss of a newspaper does not mean the loss of a cable subscription or an internet connection. Small town audiences can watch CNN, Fox News or Sky; they can also browse news.com.au or the New York Times. 
Of course, those outlets will not cover council meetings, local courts, or local economies. They will not carry wedding or funeral announcements from Tully or Topeka. And national outlets themselves are often far from financially secure. 
Moreover, US studies suggest that in the absence of local news, national news can exacerbate the partisan polarisation that contributes to America’s political gridlock, and in turn to its increasing political instability. 
The question of the relationship between political attitudes and media consumption can easily become a fruitless chicken and egg discussion. But we do know that when it comes to national media, in many western democracies, people with political differences inhabit distinct informational universes. 
The 2019 Reuters’ Institute Digital News Report shows how people with “populist attitudes” in Europe and the US are more likely than non-populists to get their news from television or Facebook, and less likely to get it from print sources. 
Data from the UK suggests that when “populists” do consult print sources, they strongly favour tabloid newspapers such as the Sun. In the US, “populists” gravitate to Fox News and websites such as Breitbart, neither of which offer dedicated local news reporting, and each of which, far from seeking to tamp down on political polarisation, have incorporated it into their business model. 
For all the flaws of national media, a worse alternative exists for newspaperless towns. News deserts may provide particularly hospitable soil for a bloom of mis- and disinformation, fertilised by social media. 
Social media is already outstripping embattled local outlets as a source of news for many people in many countries. To the extent that local newspapers still exist, evidence suggests that their reach as a news medium is smaller than that of social media, and has been for some time. 
In Australia, again according to the Reuters News Institute report, the nationwide weekly reach of local newspapers was just 20%; regional news networks Win and Prime7 just 10%; whereas 36% said they got news from Facebook. 
In the US, local newspapers had a 20% weekly reach, and local newspaper websites 10%, but 39% of people said they got news from Facebook. 
The trouble with that is that Facebook and other social media companies are not liable for the torrent of disinformation that cascades across their platforms, and they have only intermittently devoted attention and resources to cleaning up their act. 
This reluctance to take on disinformation has had serious consequences, large and small. Facebook has been used to organise genocidal attacks on minorities in countries such as Myanmar. It has been connected with a rise in vaccine hesitancy, which may yet cruel our chances of defeating the coronavirus. It has been an effective platform for extremist groups around the world. 
Groups or pages devoted to local communities are prey to the conspiracy thinking, fake news, and polarisation that affects every other part of Facebook. And in the absence of a local newsroom, there’s no obstacle to disinformation taking hold. 
The coronavirus emergency has dramatised this. In the US, people have poured into state capitals to demonstrate against pandemic precautions derived from the advice of public health experts. Antivaxxers and conspiracy theorists have been front and centre at the events. Facebook has played a crucial role in allowing the anti-lockdown movement to organise at a local level. And frequently people are coming to state capitols from the same rural areas where newspapers have been supplanted by cable news and partisan websites. 
This perfect informational storm has driven the US slightly mad. Its effects have been fractal. Shattered local news ecosystems have made local communities easy prey for ideologues and grifters; at the same time, a polarised national media landscape makes any resolution of the country’s abiding problems difficult to envision. 
Now the storm is settling in over Australia. 
There are no easy answers to the collapse of the business model for news. It may be that we need to think about journalism beyond the institution of the newsroom, and beyond the profit driven model of independence. It may be that we need to regulate social media companies more forcefully. 
The consequences of the collapse of local news are not confined to the communities most directly affected. When local community ties are broken, when citizens come to mentally inhabit closed partisan worlds, nations are torn asunder. 
The people of Ingham may be mourning the Herbert River Express, but really all of us should. 

Tempemail , Tempmail Temp email addressess (10 minutes emails)– When you want to create account on some forum or social media, like Facebook, Reddit, Twitter, TikTok you have to enter information about your e-mail box to get an activation link. Unfortunately, after registration, this social media sends you dozens of messages with useless information, which you are not interested in. To avoid that, visit this Temp mail generator: tempemail.co and you will have a Temp mail disposable address and end up on a bunch of spam lists. This email will expire after 10 minute so you can call this Temp mail 10 minute email. Our service is free! Let’s enjoy!

Developing Qt5 applications natively on Tempemail Linux- Tempemail – Blog – 10 minute

By Nathan Hartman

Introduction
Tempemail Linux provides the technologies essential to building a flexible, stable, and secure platform for your embedded devices.
Based on OpenEmbedded releases from the Yocto Project, it is designed to let you customize your platform to include only the packages and features you need. Powered by bitbake, it provides the ability to build an entire Linux distribution from source by following repeatable recipes. This is really powerful, but can be foreign to application developers that already have a workflow they are comfortable with.
Developers building graphical user interfaces (GUI) have their own set of tools that they rely on. Often they prefer to use an Integrated Development Environment (IDE) tailored to the language and frameworks they are working with. Typically this IDE and the tools it uses are running natively on the same platform they are building for.
Fortunately, these developers can still do this on Tempemail Linux. This tutorial describes building Tempemail Linux with the GCC toolchain and Qt Creator included to enable native application development.
Requirements
Building the entire platform has a few simple requirements to get started. Many Linux distributions are self-hosted meaning you can only build the next version of the distribution with the previous release.
Tempemail Linux supports a wide variety of hosts. The official supported list of hosts is below, but many newer releases have been tested and known to work.
Supported Distribution for Tempemail Linux LTS 19:

CentOS 7.6
Fedora 30
openSUSE Leap 15
Red Hat Enterprise Linux 7.6 and 8.0
SUSE Linux Enterprise Desktop 15
Ubuntu Desktop 16.04 and 18.04 LTS

For details on necessary Linux Host System Libraries and Executables please refer to the documentation.
For example, on Ubuntu systems the following packages must be installed:
$ sudo apt install gawk wget git-core diffstat unzip texinfo gcc-multilib build-essential chrpath socat cpio python python3 python3-pip python3-pexpect xz-utils debianutils iputils-ping libsdl1.2-dev xterm file git bmap-tools coreutils parted e2fsprogs

In addition, the deployment steps require root or sudo access for deploying to an SD Card or USB flash device.
Lastly, this tutorial has been validated for the Raspberry Pi 4 and Intel NUC devices (NUC5i3MYBE, NUC6i7KYK, NUC7i5DNK). These instructions should work on other devices, however we tested these devices specifically to ensure that the hardware acceleration was enabled for top performance.
Cloning the Tempemail Linux repository
The first step is to clone the Tempemail Linux GitHub repository.

Create a directory for the tools needed to create the Tempemail Linux image. This will be referred to as the parent directory from this point onwards:
$ mkdir wrlinux_qt
$ cd wrlinux_qt

In a Linux terminal, clone the repository into your build folder with the following command:
$ git clone https://github.com/WindRiver-Labs/wrlinux-x.git

Note: A clone of wrlinux-x defaults to the WRLINUX_10_19_BASE branch with the latest update tagged. WRLINUX_10_19_BASE_UPDATE0003 or greater is required for the Raspberry Pi 4 BSP. This tutorial was written using WRLINUX_10_19_BASE_UPDATE0007.

Configure the build for your device
This section describes the usage of the Tempemail setup.sh tool for easy configuration of the build. We will use it to specify the target board, download the layers required, and pre-populate the configuration file.

In the parent directory that wrlinux-x was cloned into (wrlinux_qt), run the setup.sh script. Accept the End User License Agreement (EULA).
For Raspberry Pi 4 use:
$ ./wrlinux-x/setup.sh –machine bcm-2xxx-rpi4 –dl-layers

For an Intel NUC use:
$ ./wrlinux-x/setup.sh –machine intel-x86-64 –dl-layers

Note: The –machine flag specifies that it should include the board support package for your device, the –dl-layers flag downloads the package source now instead of later at build time.
After some time, you will see:
Fetching projects: 100% (16/16), done.
Syncing work tree: 100% (16/16), done.

At which point the following files and directories should have been generated:
$ ls -al
total 64
drwxr-xr-x 8 nhartman users 4096 May 25 16:53 .
drwxr-xr-x 3 nhartman users 4096 May 25 15:44 ..
drwxr-xr-x 5 nhartman users 4096 May 25 16:53 bin
lrwxrwxrwx 1 nhartman users 22 May 25 16:53 bitbake -> layers/oe-core/bitbake
drwxr-xr-x 5 nhartman users 4096 May 25 16:42 config
-rw-r–r– 1 nhartman users 2279 May 25 16:42 default.xml
lrwxrwxrwx 1 nhartman users 89 May 25 16:42 environment-setup-x86_64-wrlinuxsdk-linux -> /home/nhartman/wrlinux_qt/bin/buildtools/environment-setup-x86_64-wrlinuxsdk-linux
drwxr-xr-x 8 nhartman users 4096 May 25 16:53 .git
-rw-r–r– 1 nhartman users 111 May 25 16:42 .gitconfig
-rw-r–r– 1 nhartman users 147 May 25 16:42 .gitignore
-rw-r–r– 1 nhartman users 61 May 25 16:42 .gitmodules
drwxr-xr-x 16 nhartman users 4096 May 25 16:53 layers
lrwxrwxrwx 1 nhartman users 19 May 25 16:53 meta -> layers/oe-core/meta
lrwxrwxrwx 1 nhartman users 32 May 25 16:53 oe-init-build-env -> layers/oe-core/oe-init-build-env
-rw-r–r– 1 nhartman users 2882 May 25 16:42 README
drwxr-xr-x 7 nhartman users 4096 May 25 16:53 .repo
-rw-r–r– 1 nhartman users 205 May 25 16:42 .repo_.gitconfig.json
lrwxrwxrwx 1 nhartman users 22 May 25 16:53 scripts -> layers/oe-core/scripts
-rw-r–r– 1 nhartman users 73 May 25 16:42 .templateconf
drwxr-xr-x 5 nhartman users 4096 May 25 13:53 wrlinux-x

Run the environment setup scripts that were generated in the parent directory. They will create and change to the build sub-directory.
$ . ./environment-setup-x86_64-wrlinuxsdk-linux
$ . ./oe-init-build-env

You had no conf/local.conf file. This configuration file has therefore been
created for you with some default values. You may wish to edit it to, for
example, select a different MACHINE (target hardware). See conf/local.conf
for more information as common configuration options are commented.

You had no conf/bblayers.conf file. This configuration file has therefore been
created for you with some default values. To add additional metadata layers
into your configuration please add entries to conf/bblayers.conf.

The Yocto Project has extensive documentation about OE including a reference
manual which can be found at:
http://yoctoproject.org/documentation

For more information about OpenEmbedded see their website:
http://www.openembedded.org/

This project was configured with the following options:
–machine bcm-2xxx-rpi4 –dl-layers

Common Tempemail images are:
wrlinux-image-small (suggests distro: wrlinux and feature/busybox)
wrlinux-image-core (suggests distro: wrlinux)
wrlinux-image-std (suggests distro: wrlinux)
wrlinux-image-std-sato (requires distro: wrlinux-graphics)

Common Yocto Project images, typically built with distro poky, are:
core-image-minimal
core-image-base
core-image-sato

You can also run generated qemu images with a command like ‘runqemu qemux86-64’

These scripts will set environment variables for the build tool as well as generate some pre-built configuration files.
Note: If you have previously built an image, running these scripts will not overwrite your existing configurations. Rename, move or delete previous configuration files to ensure the correct configuration files are generated.

Patching the project directories
This section describes how to add the required template files using git.

Clone the meta-qt5 and the meta-qt5-extra repositories in a my-layers directory
$ mkdir my-layers
$ git clone -b zeus https://github.com/meta-qt5/meta-qt5.git my-layers/meta-qt5
$ git clone -b zeus https://github.com/schnitzeltony/meta-qt5-extra.git my-layers/meta-qt5-extra

Download the required patches listed below into the wrlinux_qt/build directory:
Credit goes to my colleague, Quanyang Wang, for creating the patches to integrate LxQt desktop on Tempemail Linux.

In the meta-qt5-extra directory, apply the first patch:
$ cd my-layers/meta-qt5-extra
$ git am 0001-polkit-qt-1-fix-compile-error.patch
$ cd $BUILDDIR

In the wrlinux layer directory, apply the wrlinux patches:
$ cd ../layers/wrlinux
$ git am 0001-wrlinux-template-add-template-qt5-for-wrlinux.patch
$ git am 0002-wrlinux-template-add-lxqt-support-for-wrlinux.patch
$ cd $BUILDDIR

This section describes how to clone the meta-qt5 and meta-qt5-extra layer repositories. In addition, how to add the layers, GCC toolchain and desktop environment to the image.

Using the bitbake-layers tool, add the layers to the conf/bblayers.conf file. This allow bitbake to locate the custom layer when building the image. In addition, if using a Raspberry Pi add the Raspberry Pi Graphics layer to enable hardware acceleration.
$ bitbake-layers add-layer my-layers/meta-qt5
$ bitbake-layers add-layer my-layers/meta-qt5-extra

If building for the Raspberry Pi, add in addition for hardware acceleration:
$ bitbake-layers add-layer ../layers/bcm-2xxx-rpi/rpi-graphics/

Edit conf/local.conf configuration file to add the GCC toolchain, packages required for Qt5 and the desktop environment. Append the following lines to the end of conf/local.conf:
BB_NO_NETWORK = “0”
BB_NUMBER_THREADS = “16”
PARALLEL_MAKE = “-j 16”
WRTEMPLATE = “feature/qt5 feature/lxqt”
IMAGE_INSTALL_append += ”
packagegroup-core-buildessential
xserver-xorg
xserver-xorg-extension-glx
mesa
mesa-demos
openssh
git”
DISTRO_FEATURES_append += ” x11 opengl polkit”

Note: this tutorial uses the LxQt desktop, but you may replace feature/lxqt with feature/xfce if you prefer to use the desktop featured with the Raspberry Pi Foundation images.
If building for the Raspberry Pi, also add the following to enable hardware acceleration:
LICENSE_FLAGS_WHITELIST = “commercial”

If building for Raspberry Pi, edit ../layers/bcm-2xxx-rpi/recipes-bsp/boot-config/boot-config/cmdline.txt file to adjust the kernel parameters.
$ cat ../layers/bcm-2xxx-rpi/recipes-bsp/boot-config/boot-config/cmdline.txt
dwc_otg.lpm_enable=0 console=serial0,115200 root=/dev/mmcblk0p2 rootfstype=ext4 rootwait ip=dhcp
$ echo ‘dwc_otg.lpm_enable=0 console=tty root=/dev/mmcblk0p2 rootfstype=ext4 rootwait’ > ../layers/bcm-2xxx-rpi/recipes-bsp/boot-config/boot-config/cmdline.txt

Note: These changes ensure that the console output appears on the HDMI display and that the boot sequence doesn’t wait for a DHCP connection.

Building the image
This section describes building the Tempemail Linux image

Build the image of your choice. As seen in the image in step 4, there are several suggested images. We will build wrlinux-image-std-sato, an image optimized for a desktop environment.
$ bitbake wrlinux-image-std-sato
Processing Tempemail template files…
Parsing recipes: 2% |#####

After some time, you will see the following when the build is finished:
Initialising tasks: 100% |######################################################################| Time: 0:00:07
Sstate summary: Wanted 3536 Found 0 Missed 3536 Current 0 (0% match, 0% complete)
NOTE: Executing Tasks
NOTE: Setscene tasks completed

NOTE: Tasks Summary: Attempted 4643 tasks of which 0 didn’t need to be rerun and all succeeded.

Identifying your USB device
This section describes how to identify your USB SD Card adapter or USB flash drive using fdisk.

Use the fdisk command to list the block devices detected by Linux:
$ sudo fdisk -l

Identify your device through the model name or capacity.
Disk /dev/sdx: 7.43 GiB, 7969177600 bytes, 15564800 sectors
Disk model: SD Card Reader
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disklabel type: dos
Disk identifier: 0x70e121a4

Device Boot Start End Sectors Size Id Type
/dev/sdx1 * 8192 532479 524288 256M c W95 FAT32 (LBA)
/dev/sdx2 532480 3133739 2601260 1.2G 83 Linux

Note: In this case the device is ‘/dev/sdx’ as seen by the capacity and ‘Disk model’. The device name should take the format of ‘/dev/sdx’ where x is a letter specific to your machine.

Flashing the image
This section describes how to write the generated .wic and .wic.bmap or .iso files to the SD card or USB flash drive.
For the Raspberry Pi 4:

Locate the images generated by bitbake. Relative to the build directory, the image path is:
tmp-glibc/deploy/images/bcm-2xxx-rpi4

Specifically, we need the wrlinux-image-std-sato-bcm-2xxx-rpi4.wic and wrlinux-image-std-sato-bcm-2xxx-rpi4.wic.bmap files.

Using bmaptool, flash the generated files to the usb device
$ sudo bmaptool copy –bmap /IMAGE_NAME-bcm-2xxx-rpi4.wic.bmap /IMAGE_NAME-bcm-2xxx-rpi4.wic /dev/sdx

After up to several minutes (depending on the speed of your USB device) you should see:
$ sudo bmaptool copy –bmap wrlinux-image-std-bcm-2xxx-rpi4.wic.bmap wrlinux-image-std-bcm-2xxx-rpi4.wic /dev/sdx
[sudo] password for nhartman:
bmaptool: info: block map format version 2.0
bmaptool: info: 391718 blocks of size 4096 (1.5 GiB), mapped 247338 blocks (996.2 MiB or 63.1%)
bmaptool: info: copying image ‘wrlinux-image-std-bcm-2xxx-rpi4.wic’ to block device ‘/dev/sdx using bmap file ‘wrlinux-image-std-bcm-2xxx-rpi4.wic.bmap’
bmaptool: info: 100% copied
bmaptool: info: synchronizing ‘/dev/sdx’
bmaptool: info: copying time: 43.7s, copying speed 22.1 MiB/sec

For the Intel NUC:

Locate the images generated by bitbake. Relative to the build directory, the image path is:
tmp-glibc/deploy/images/intel-x86-64

Specifically, we need the wrlinux-image-std-sato-intel-x86-64.iso file.

Flash your image using ‘dd’
$ sudo dd if=PATH_TO_IMAGE/wrlinux-image-std-sato-intel-x86-64.hddimg of=/dev/sdx status=progress && sync

In some cases, dd can appear to hang while writing from memory to the USB. Check the progress with:
$ sudo cat /proc/meminfo | grep Dirty

It should approach the low hundreds when the write is finished.

Resizing the root partition and filesystem
This section describes how to resize the root filesystem to take up the full capacity of the SD card. With the USB device inserted, run the following commands, replacing ‘/dev/sdx’ with your device.

Resize the second partition to fill 100% of the storage device.
$ sudo parted /dev/sdx resizepart 2 100%
Information: You may need to update /etc/fstab.

Run the EXT2/3/4 filesystem check tool on the second partition to fix any potential problems.
$ sudo e2fsck -f /dev/sdx2
e2fsck 1.45.3 (14-Jul-2019)
Pass 1: Checking inodes, blocks, and sizes
Pass 2: Checking directory structure
Pass 3: Checking directory connectivity
Pass 4: Checking reference counts
Pass 5: Checking group summary information
root: 52648/1796640 files (0.4% non-contiguous), 662799/3723264 blocks

Resize the EXT4 filesystem with resize2fs to expand it and fill the entire partition.
$ sudo resize2fs /dev/sdx2
resize2fs 1.45.3 (14-Jul-2019)
Resizing the filesystem on /dev/sdx2 to 373264 (4k) blocks.
The filesystem on /dev/sdx2 is now 3723264 (4k) blocks long.

Results
For the LxQt desktop, the login and password are ‘wrluser’ and the $HOME directory is /home/wrluser.
After logging in you will be presented with the LxQt Desktop:

Note: If you chose to use the the XFCE desktop, the login is ‘root’ with no password and the $HOME directory is /root.
Before running the examples
The sample applications come from Qt git repositories. Cloning the repositories requires that you have a working network connection. If for any reason your device didn’t automatically get a dynamic IP address you may use the following commands to obtain one.

Open QTerminal by clicking on the icon in the bottom left corner, then click System Tools > QTerminal.

In a QTerminal, execute the su command to become the root user.

Then execute the “ip a” command to verify that your device has retrieved an IP address. Refer to the inet line under eth0 to see your IP address.

If you do not already have an IP address, then you may execute dhclient eth0 to request a dynamic IP address.

Execute exit to stop running commands as the root user and become wrluser again.

Sample Application: glxgears
This section demonstrates the mesa-demos glxgears application.

Open QTerminal by clicking on the icon in the bottom left corner, then click System Tools > QTerminal.

Execute glxgears to try the OpenGL example. If the hardware acceleration is working, it should report around 60 frames per second on the Raspberry Pi 4.

Sample Application: OpenGLwindow
This section demonstrates an OpenGL example from the Qtbase repository.

Use git to clone the repository containing the OpenGL examples
$ git clone –depth 1 -b dev git://code.qt.io/qt/qtbase.git
Cloning into ‘qtbase’…
remote: Counting objects: 23735, done.
remote: Compressing objects: 100% (18386/18386), done.
remote: Total 23735 (delta 5511), reused 16062 (delta 3270)
Receiving objects: 100% (23735/23735), 63.00 MiB | 3.92 MiB/s, done.
Resolving deltas: 100% (5511/5511), done.
Updating files: 100% (23031/23031), done.

Copy the examples folder out of the qtbase directory so that Qt Creator will let us build the project.
$ cp -r qtbase/examples $HOME

Launch Qt Creator from the GUI

Open the openglwindow.pro file by selecting File > Open File or Project from the menu.

Navigate to $HOME/examples/opengl/openglwindow/openglwindow.pro. Then click, Open.

Select “openglwindow“ as the Active Project, then click the Configure Project button.

Build and run the application by clicking Build > Run in the menu.

(Optional) You may click the “Compile Output” tab along the bottom to watch the toolchain output as the project builds.

After a few moments the openglwindow should appear with a spinning rainbow triangle.

Sample Application: QtCluster
This section demonstrates the QtCluster example from the Qtbase docs repository.

Open a terminal and clone the repository containing the Qt docs:
git clone git://code.qt.io/qt/qtdoc.git –branch 5.10
Cloning into ‘qtdoc’…
remote: Counting objects: 24976, done.
remote: Comrpessing objects: 100% (12628/12628), done.
remote: Total 24976 (delta 17217), reused 17635 (delta 11944)
Receiving objects: 100% (24976/24976), 42.44 MiB | 6.23 MiB/s, done.
Resolving deltas: 100% (17217/17217), done.

Launch Qt Creator from the GUI

Open the qtcluster-base.pro file by selecting File > Open File or Project from the menu.

Navigate to $HOME/qtdoc/doc/src/snippets/qtcluster/qtcluster-base.pro. Then click, Open.

Select qtcluster-base“* as the Active Project, then click the Configure Project button.

Build and run the application by clicking Build > Run in the menu.

Note: If the hardware acceleration is working, it should report around 60 frames per second on the Raspberry Pi 4.

Conclusions
Today’s embedded devices are more powerful than ever before and capable of displaying beautiful graphical user interfaces. This allows GUI developers to work directly on the device in a way that may not have been possible before. By providing the tools on the embedded device with drivers for enabling hardware acceleration it helps make it easier to get started and accelerate development.
References
All product names, logos, and brands are property of their respective owners.All company, product and service names used in this software are for identification purposes only. Tempemail are registered trademarks of Tempemail Systems.
Disclaimer of Warranty / No Support: Tempemail does not provide support and maintenance services for this software, under Tempemail’s standard Software Support and Maintenance Agreement or otherwise. Unless required by applicable law, Tempemail provides the software (and each contributor provides its contribution) on an “AS IS” BASIS, WITHOUT WARRANTIES OF ANY KIND, either express or implied, including, without limitation, any warranties of TITLE, NONINFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the software and assume ay risks associated with your exercise of permissions under the license.
Qt is a registered trademark of Silicon Graphics, Inc. in the United States and other countries.
OpenGL is a registered trademark of The Qt Company Ltd in the United States and other countries.

Tempemail , Tempmail Temp email addressess (10 minutes emails)– When you want to create account on some forum or social media, like Facebook, Reddit, Twitter, TikTok you have to enter information about your e-mail box to get an activation link. Unfortunately, after registration, this social media sends you dozens of messages with useless information, which you are not interested in. To avoid that, visit this Temp mail generator: tempemail.co and you will have a Temp mail disposable address and end up on a bunch of spam lists. This email will expire after 10 minute so you can call this Temp mail 10 minute email. Our service is free! Let’s enjoy!

Meghan McCain to keep details of pregnancy private due to social media trolls- Tempemail – Blog – 10 minute

Meghan McCain has opened up about her reasons for keeping details about her pregnancy private.
On Thursday, The View host, who is currently expecting her first child with husband Ben Domenech, revealed that she has decided not to share updates on social media because she does not want her baby exposed to hateful comments.
“People keep asking and requesting I show pics & details of my pregnancy,” the daughter of late Senator John McCain wrote on Instagram. “Given that people write on photos I put up of my family they are glad my Dad got cancer and he’s in hell, I thought I would leave my unborn child out of the social media cess pool as much as is possible.”

Download the new Independent Premium app
Sharing the full story, not just the headlines
Download now

In the caption, the 35-year-old elaborated on her decision, explaining that she and Domenech made the conscious decision to “guard our (growing) family’s privacy as much as is possible” and that she believes children have a “right to privacy”.

McCain also reiterated that the “inhumane” bullying of her father, who died in 2018 from brain cancer, played a large part in her decision.

“A bunch of inhumane jackasses have really ruined so much for so many on social media and I learned a lot of hard lessons about cruelty that comes with being open and vulnerable about my personal life during my Dad’s cancer fight,” McCain continued. “It is a shame.”

Watch more

The talk-show host then acknowledged that her decision is “unorthodox” considering she is on TV five days a week, but that she’s “always lived by the beat of my own drum”.
McCain concluded the post thanking her followers who had shared kind words and support during her pregnancy, writing: “Thank you for the continued kind words, support and prayers regarding my pregnancy from so many of you who are nothing but kind.
“It has meant a lot during this crazy time.”
The post was met with support on social media, where McCain’s followers applauded her decision to keep details of her pregnancy private.
“A decision that is understandable in your situation. Already a protective mother. You are going to be a great mother!” one person commented.
Another said: “Good for you! Best wishes to you and your sweet babe!”
McCain announced she was pregnant in March, writing on Instagram at the time: “My husband Ben and I have been blessed to find out I’m pregnant.”

In the post, the soon-to-be mother also explained that her doctors had advised her to be “extra vigilant” about limiting the number of people she comes in contact with as a precaution against coronavirus, adding that she would be self-isolating at home.

Tempemail , Tempmail Temp email addressess (10 minutes emails)– When you want to create account on some forum or social media, like Facebook, Reddit, Twitter, TikTok you have to enter information about your e-mail box to get an activation link. Unfortunately, after registration, this social media sends you dozens of messages with useless information, which you are not interested in. To avoid that, visit this Temp mail generator: tempemail.co and you will have a Temp mail disposable address and end up on a bunch of spam lists. This email will expire after 10 minute so you can call this Temp mail 10 minute email. Our service is free! Let’s enjoy!

The case of Myka Stauffer ‘rehoming’ her autistic adoptive son shows you shouldn’t believe what you see on social media- Tempemail – Blog – 10 minute

Never trust people who give a picture-perfect view of family life and caring for their children on social media. For every carefully edited scene with saccharine music dubbed over it, there will be ten scenes they couldn’t use because the baby or parent was screaming or running around naked with poo smeared on their bum.
Myka and James Stauffer are YouTubers with four young children. Myka Stauffer is a vlogger with a successful YouTube channel with hundreds and thousands or subscribers watching her artfully wash and dress her baby and reveal ways you can make your home, children and life as perfect as hers. Being an influencer is a career, and this “stay at home mom” was good at it. She didn’t film her life for the family archives; she did it for an audience of strangers which made her money.
The bigger your following on social media, the more free stuff you are sent and the more lucrative sponsorship deals you can get. Stauffer got both. The couple decided to up their game. Over 5m people watched the video of them adopting a toddler from China called Huxley. She recorded this intensely private event and set it to music. The couple used crowdfunding to pay for the adoption process and showed everyone what they had paid for.

Download the new Independent Premium app
Sharing the full story, not just the headlines
Download now

The film was centred around Myka herself, hot-ironing her hair before the handover, fixing her make-up and making sure there were close-ups of her cuddling her new son, supposedly enrapt in motherly love.
Three years later, they gave the child away. They “rehomed” him.

Read more

I’m glad. The Stauffers finally did the best for the child they should never have been allowed near.
I don’t trust anyone who commodifies their children. Don’t get me wrong – my son and I took part in an ITV game show and he got a chunk of money which was put towards his future. There are mum vloggers like Stacey Solomon who I find utterly adorable. She’s frank about the hardships of family life and the pressure she feels sometimes. But to set out from scratch and think, “Wait a minute, there might be a few quid in these kids”, is becoming normal and the “rehoming” of little Huxley is the ghastly proof no one wanted that this culture of making money by presenting a radiant view of parenthood needs to end.
Yes, Huxley had medical issues which were undoubtably hard to handle, and he is autistic. But when you’re a parent, choice goes out of the window and you get what you are given, biological or not. James Stauffer permitted himself to say out loud, “With international adoption there are unknown and things that are not transparent on files. When Huxley came there were a lot of more special needs that we weren’t aware of and weren’t told.” Well, thank goodness he kept the receipt.
Every parent knows that sometimes, parenthood is suffering. Your child is entirely your responsibility and though its life is more important to you than your own, sometimes, it is really flipping hard.

I’d say any small child is in danger of being hurt physically or emotionally when it’s being cared for by people who do not have unconditional love for it.
Elsie Scully-Hicks was 18 months old when she was murdered by her father, Matthew Scully-Hicks. He and his husband had adopted the girl just a few months before and despite several “accidents” where there were bruises and broken bones. Social services were not suspicious of this, by all accounts, articulate and warm-mannered man whose care she was in. He sent texts to his husband calling the smiley, bright-eyes toddler “Satan in a baby-grow” and “The Exorcist”. He eventually shook the child to death. Of course biological parents hurt and kill their children too. Every parent who loses their self-control when caring for a baby should be able to say, “I’m not coping, I can’t love this child. Help this child by taking it away from me.” Which is what I believe the Stauffers did. I’m not excusing it, it’s just that it’s better than the potential alternative.

leftCreated with Sketch.

rightCreated with Sketch.

1/15 T-Series
The YouTube channel homepage for Indian record label T-Series, which overtook controversial Swedish vlogger PewDiePie in 2019
AFP/Getty

2/15 PewDiePie
PewDiePie has been the most popular YouTuber since 2013
PewDiePie / YouTube

3/15 5-Minute Crafts
5-Minute Crafts, which offers quick and quirky DIY tips to viewers, didn’t even feature in the top 15 YouTube channels in July 2018
5-Minute Crafts

4/15 Canal KondZilla
Brazilian music video producer and director KondZilla began his career after buying a camera with life insurance money left to him after his mother died when he was 18
Getty

5/15 SET India
Sony Entertainment Televesion (SET) launched in 1995 and has recently seen huge growth of its Hindi-language YouTube channel
AFP/Getty

6/15 Justin Bieber
Canadian musician Justin Bieber held the number-two spot in 2018 before T-Series took over
Getty

7/15 WWE
World Wrestling Entertainment has managed to gain a huge following on YouTube by sharing clips of fights and interviews with its stars
WWE

8/15 Cocomelon – Nursery Rhymes
This YouTube channel specialises in 3D animation videos of nursery rhymes, as well as its own original songs. It is owned by the American firm Treasure Studio
Cocomelon

9/15 Dude Perfect
YouTube personalities Coby Cotton, Tyler Toney, Cody Jones, and Cory Cotton form Dude Perfect, a sports entertainment channel from the US
Getty

10/15 HolaSoyGerman
YouTube personality German Garmendia is a Chilean comedian and writer
HolaSoyGerman

11/15 Ed Sheeran
One of several musicians that populate the top 15 most popular YouTube channels, Ed Sheeran joined the list in 2017
Getty

12/15 Badabun
Music channel Badabun’s subscriber count has not been publicly visible since 6 March 2019, at which point it had 37.2 million subscribers
Badabun / YouTube

13/15 Eminem
US rapper Eminem first entered the list of the top 15 YouTube channels in 2013, the same year that PewDiePie took over
AFP/Getty

14/15 Whinderssonnunes
Brazilian Whindersson Nunes Batista joined YouTube in 2013 and became popular for his comedy videos
Whinderssonnunes / YouTube

15/15 Ariana Grande
US singer and actress Ariana Grande is the latest addition to the top 15 YouTube channels
AFP/Getty

1/15 T-Series
The YouTube channel homepage for Indian record label T-Series, which overtook controversial Swedish vlogger PewDiePie in 2019
AFP/Getty

2/15 PewDiePie
PewDiePie has been the most popular YouTuber since 2013
PewDiePie / YouTube

3/15 5-Minute Crafts
5-Minute Crafts, which offers quick and quirky DIY tips to viewers, didn’t even feature in the top 15 YouTube channels in July 2018
5-Minute Crafts

4/15 Canal KondZilla
Brazilian music video producer and director KondZilla began his career after buying a camera with life insurance money left to him after his mother died when he was 18
Getty

5/15 SET India
Sony Entertainment Televesion (SET) launched in 1995 and has recently seen huge growth of its Hindi-language YouTube channel
AFP/Getty

6/15 Justin Bieber
Canadian musician Justin Bieber held the number-two spot in 2018 before T-Series took over
Getty

7/15 WWE
World Wrestling Entertainment has managed to gain a huge following on YouTube by sharing clips of fights and interviews with its stars
WWE

8/15 Cocomelon – Nursery Rhymes
This YouTube channel specialises in 3D animation videos of nursery rhymes, as well as its own original songs. It is owned by the American firm Treasure Studio
Cocomelon

9/15 Dude Perfect
YouTube personalities Coby Cotton, Tyler Toney, Cody Jones, and Cory Cotton form Dude Perfect, a sports entertainment channel from the US
Getty

10/15 HolaSoyGerman
YouTube personality German Garmendia is a Chilean comedian and writer
HolaSoyGerman

11/15 Ed Sheeran
One of several musicians that populate the top 15 most popular YouTube channels, Ed Sheeran joined the list in 2017
Getty

12/15 Badabun
Music channel Badabun’s subscriber count has not been publicly visible since 6 March 2019, at which point it had 37.2 million subscribers
Badabun / YouTube

13/15 Eminem
US rapper Eminem first entered the list of the top 15 YouTube channels in 2013, the same year that PewDiePie took over
AFP/Getty

14/15 Whinderssonnunes
Brazilian Whindersson Nunes Batista joined YouTube in 2013 and became popular for his comedy videos
Whinderssonnunes / YouTube

15/15 Ariana Grande
US singer and actress Ariana Grande is the latest addition to the top 15 YouTube channels
AFP/Getty

The Stauffers would not have got rid of a child they had put up for display so publicly if they were not absolutely sure the child was better off without them.
Despite the trauma his disappearance from their life will cause the child and perhaps their other children, they did absolutely the right thing. I’m not a psychiatrist but I use the world “trauma” confidently here because as a mum I see every day the trust a child has in its parents and I can’t think of a greater horror than betraying that trust. They should never have adopted a child. They should never have created an online world portraying themselves as the perfect parents. They ended up believing it, and little Huxley was the one to suffer.

Tempemail , Tempmail Temp email addressess (10 minutes emails)– When you want to create account on some forum or social media, like Facebook, Reddit, Twitter, TikTok you have to enter information about your e-mail box to get an activation link. Unfortunately, after registration, this social media sends you dozens of messages with useless information, which you are not interested in. To avoid that, visit this Temp mail generator: tempemail.co and you will have a Temp mail disposable address and end up on a bunch of spam lists. This email will expire after 10 minute so you can call this Temp mail 10 minute email. Our service is free! Let’s enjoy!

YouTube’s ‘Chapters’ Roll out on Desktop and Mobile | Tempemail – Blog – 10 minute

Sourced from Speechling.

YouTube has released its new video chapters feature to all users on desktop, smartphones and tablets. Chapters, the new feature that soft-launched in April, will make it easier to skip to precisely where you want to go in a video, similar to the chapters in a book, or scenes in a movie. Though not to the most ground-breaking or exciting new feature to land on YouTube, they are a welcome, if not overdue quality-of-life feature that will no doubt make the experience easier for many users.
On desktop, a video with chapters won’t look different from how videos have always looked. The biggest change is barely noticeable: the red bar used to show video progress will have breaks within it, showing the different chapters, the breaks indicate when the chapters begin and end.
Breaks in red scrobble line indicate chapter beginnings and ends.
The same design applies to how chapters work on the phone and tablet app for Android and iOS. Though, on phones, YouTube had to account for the simple fact that your finger might get in the way of you seeing where the chapters are. To solve for that, YouTube’s phone app will trigger a haptic buzz when you’ve arrived at the next chapter.
On tablets or any other mobile devices where haptic feedback isn’t available, the video progress bar will automatically snap to the beginning of a new chapter when you lift your finger off the screen.

If a user is looking for a specific time marker while you scrub through the video, keep your finger on the screen, then move it below the progress bar without letting up to clearly see the time marker.
There are no limits to how many chapters can be placed on a specific video, but not all videos have chapters automatically applied to them. Getting chapters on any other video relies on making sure there are some timestamps in the video description, the same workaround that creators have been utilizing for years to make their videos easier to navigate.
From April, listeners to music on YouTube may have already noticed the chapters feature. Videos that feature full-albums will have chapters for each song. Even unofficial mixes have featured chapters for specific songs.
For those who like to use their keyboard to skip forward in videos, YouTube told The Verge that it is working on a new set of keyboard shortcuts to make skipping between chapters easier for power users, though it won’t be ready for launch.
YouTube also says that it’s exploring bringing gestures to navigate between chapters to mobile, given that portable displays come in so many different shapes and sizes, though those won’t be available at launch either.
Edited by Luis MonzonFollow Luis Monzon on TwitterFollow Tempemail on Twitter

Tempemail , Tempmail Temp email addressess (10 minutes emails)– When you want to create account on some forum or social media, like Facebook, Reddit, Twitter, TikTok you have to enter information about your e-mail box to get an activation link. Unfortunately, after registration, this social media sends you dozens of messages with useless information, which you are not interested in. To avoid that, visit this Temp mail generator: tempemail.co and you will have a Temp mail disposable address and end up on a bunch of spam lists. This email will expire after 10 minute so you can call this Temp mail 10 minute email. Our service is free! Let’s enjoy!

ATCON Tasks Nigerian Government to Begin Digitizing the Economy | Tempemail – Blog – 10 minute

Sourced from the Guardian Nigeria.

The Association of Telecommunications Companies of Nigeria (ATCON) has charged the Federal Government to begin the digitization of the nation’s economy.
The association stressed the importance and crucial need for the government to map out fresh plans that would assist the country cope with economic challenges post-COVID-19 pandemic.
Olusola Teniola, president of ATCON, told The Guardian Nigeria that every sector of the Nigerian economy should brace for the challenges ahead, stressing that information and communication technology (ICT) would be strategic in diversifying and digitising the economy going forward.

Teniola makes clear that the association would begin organising a virtual conversation to begin discussing the socio-economic and political impact of the COVID-19 pandemic on the Telecommunications and ICT sector in Nigeria. The meetings will be held over Zoom, he says. First of which will take place on 4 June.
He says that the COVID-19 pandemic has disrupted the livelihoods and businesses socially, economically and politically. This has the unintended effect of making the country realise that it could not rely on crude oil, Teniola says.
“For example, the price of crude oil in the international market fell below the benchmark prize of 2020 budget and the Federal Government has resorted to borrowing from the International Monetary Fund (IMF) to cushion the effect of the fall in the price of crude oil in the international market.”
“To salvage the situation, there is an urgent need for collaboration public and private sectors collaboration to jumpstart the diversification and emergence of digitisation of the Nigerian economy,” he states.
This comes as the Mobile Network Operators (MNOs) activated about 1.96-million new telecommunications line in the month of March. The new subscriptions, which was about 500,000 over and above what the operators saw in February (about 1.41m), was not unconnected with Federal Government’s lockdown measures due to COVID-9, which saw more people having to work from home with the aid of Internet data.
Teniola says that there would also be the need to push for the buy-in of government at all levels to encourage telecoms and ICT infrastructure development in their respective states by encouraging investments through tax holidays and special intervention funds for the sector by the Central Bank of Nigeria (CBN).
Edited by Luis Monzon
Follow Luis Monzon on Twitter
Follow Tempemail on Twitter

Tempemail , Tempmail Temp email addressess (10 minutes emails)– When you want to create account on some forum or social media, like Facebook, Reddit, Twitter, TikTok you have to enter information about your e-mail box to get an activation link. Unfortunately, after registration, this social media sends you dozens of messages with useless information, which you are not interested in. To avoid that, visit this Temp mail generator: tempemail.co and you will have a Temp mail disposable address and end up on a bunch of spam lists. This email will expire after 10 minute so you can call this Temp mail 10 minute email. Our service is free! Let’s enjoy!

Twitter hides Donald Trump tweet for ‘glorifying violence’ | Technology – Blog – 10 minute

Twitter has hidden one of Donald Trump’s tweets behind a warning that it “glorifies violence”, further escalating the social media company’s row with the US president.
The US president’s tweet, posted on Thursday night Washington time, warned people in Minneapolis protesting against the killing of a black man, George Floyd, by a white police officer that he would send the military to intervene if there was “any difficulty”.
“When the looting starts, the shooting starts,” Trump wrote, apparently quoting the former Miami police chief Walter Headley, who in December 1967 promised violent reprisals to protests over stop-and-frisk tactics.
Two hours later, Twitter added a notice to the tweet: “This tweet violated the Twitter Rules about glorifying violence. However, Twitter has determined that it may be in the public’s interest for the tweet to remain accessible.”
The warning was accompanied by a link to its policies about public interest exceptions.
For people visiting Trump’s Twitter timeline, or seeing the tweet retweeted on their feed, the warning obscures the content unless they tap to view it.
Users who try to reply to the tweet are instead presented with a second notice that reads: “We try to prevent a tweet like this that otherwise breaks the Twitter rules from reaching more people, so we have disabled most of the ways to engage with it.” Existing replies no longer appear below it.
The tweet’s spread will also be limited by Twitter’s algorithms, according to the company’s policy documents.
Early on Friday morning, the Trump administration responded by sending an identical tweet from the official White House account, placing Trump’s words in quotation marks. Trump himself sent several angry tweets, accusing Twitter of “doing nothing about all of the lies & propaganda being put out by China or the Radical Left Democrat Party”, and warning that “it will be regulated!”
The back and forth suggests neither Twitter nor Trump has any intention of backing down in their dispute, which erupted on Wednesday when the company applied a fact-checking label to the president’s tweets for the first time.
He had tweeted an accusation that California was using Tempemail-in ballots to ensure a “rigged election” to which Twitter added a label reading: “get the facts about Tempemail-in ballots”, which had a link to a “Twitter-curated” set of fact checks.
In response, the president signed an executive order that aims to remove Twitter’s protections against civil claims in cases where it acts as an “editor” rather than a publisher. 
In a Twitter thread, the company explained its latest decision: “This tweet violates our policies regarding the glorification of violence based on the historical context of the last line, its connection to violence, and the risk it could inspire similar actions today.
“We’ve taken action in the interest of preventing others from being inspired to commit violent acts, but have kept the tweet on Twitter because it is important that the public still be able to see the tweet given its relevance to ongoing matters of public importance.”
Twitter introduced its public interest exception in June 2019, after years of criticism for failing to consistently apply its rules to prominent public figures, particularly the president.
“There are certain cases where it may be in the public’s interest to have access to certain tweets,” the company said, “even if they would otherwise be in violation of our rules.” 
Twitter said at the time it believed the response – hiding the tweet behind a warning and reducing its algorithmic distribution – struck “the right balance between enabling free expression, fostering accountability, and reducing the potential harm caused by these tweets”.
The company has taken action against Trump’s tweets before, for copyright infringement. Twice the president used unlicensed music in campaign videos – in an advert featuring the theme to the film Dark Knight Rises, and in a meme video set to Nickelback’s song Photograph. In both cases, the posts were removed without complaint from the president.

Tempemail , Tempmail Temp email addressess (10 minutes emails)– When you want to create account on some forum or social media, like Facebook, Reddit, Twitter, TikTok you have to enter information about your e-mail box to get an activation link. Unfortunately, after registration, this social media sends you dozens of messages with useless information, which you are not interested in. To avoid that, visit this Temp mail generator: tempemail.co and you will have a Temp mail disposable address and end up on a bunch of spam lists. This email will expire after 10 minute so you can call this Temp mail 10 minute email. Our service is free! Let’s enjoy!

Transforming enterprise networks to support a connected lifestyle- Tempemail – Blog – 10 minute

Read Article
In today’s world, Connectivity plays a critical role, especially in these challenging times. The Lifestyle whether it is in the office or personal environment has changed to Digital. Everyone wants to be connected through their apps, social media and as well through the enterprise applications. It is the network which provides and supports all these and keeps them connected in a productive way. Networks also gone through various changes to meet these challenges.
The Digital Revolution ultimately relies upon the network to provide the ultimate experience. The Network both wired and wireless has accepted this challenge and you can observe the way the applications are supported today.
This webinar would cover some of these challenges and opportunities and how the Networks have transformed to be agile.
Express Computer, in association with CommScope, is delighted to invite you to a webinar/virtual conference on ‘ Transforming enterprise networks to support a connected lifestyle’.
Panel Discussion on: “Managing disruptive technologies and transforming ICT networks that are built for tomorrow’s demands”
Panelists:
> Krishnan Venkateswaran, Chief Digital & Information Officer, Titan> Gopi Thangavel, Vice President – IT & Head – Infrastructure, Reliance Industries> Ashok Srinivasan. Technical Director, CommScope India

If you have an interesting article / experience / case study to share, please get in touch with us at [email protected]

Tempemail , Tempmail Temp email addressess (10 minutes emails)– When you want to create account on some forum or social media, like Facebook, Reddit, Twitter, TikTok you have to enter information about your e-mail box to get an activation link. Unfortunately, after registration, this social media sends you dozens of messages with useless information, which you are not interested in. To avoid that, visit this Temp mail generator: tempemail.co and you will have a Temp mail disposable address and end up on a bunch of spam lists. This email will expire after 10 minute so you can call this Temp mail 10 minute email. Our service is free! Let’s enjoy!