Saturday, 8 October 2011

Fake iPhone 5 goes on sale in China for $50


Yesterday, the world watched with bated breath as Apple’s new face, Tim Cook unveiled the iPhone 4S – the latest from the technology heavyweight. While everyone was present, and those keeping a track of every update knew that it would be a while, albeit short before it actually hits the stores, a mall in China claims to have it already. A mall in Fuzhou, located in the Fujian province in south east China were found to have several units of the iPhone 4S in their possession by the local authorities there. The absurdity of the situation doesn’t stop there. According to a FirstPost report, the latest iPhone is being sold with a $50 price tag; obviously it’s fake.

This incident seems to be on similar lines of the previous instance, where 5 members of a gang in Shanghai were arrested after they were found assembling components to build a fake iPhone (almost genuine in their appearance). In this case, too, the iPhone 4S’s, which were seized in the raid held definite resemblances to its genuine counterparts, which are yet to get onto store shelves, globally.
The fake version of the iPhone reportedly passes off as a genuine one, well almost! For starters, the phones bore the embossed trademark Apple logo, but for obvious reasons came without the mention of any details of the manufacturer or serial number, whatsoever. However, that is only as far as resemblance goes. Reportedly, the functionalities of both phones showed extreme differences. It further revealed that, the dual-SIM functionality on the fake version didn’t quite perform; the responsiveness of the touchscreen was poor, too. The camera, too didn’t bring anything worthwhile to the table and the images looked hazy.
The report further revealed that these phones were manufactured in Shenzhen, located in Southern China.

Oil futures edge higher


he contract surged $4.01, or 5.3%, to settle at $79.68 a barrel on the New York Mercantile Exchange in regular trading on Wednesday.
Click to Play
Exit in sight for this bear market?
Barron’s Clare McKeen and Vito Racanelli discuss how the fourth quarter, if history proves true, might show a little bit of a recovery for long-term investors willing to look beyond this volatile market period.
The gains on Wednesday followed data from the Energy Information Administration which reported that oil inventories declined 4.7 million barrels in the week to Sept. 30, against market expectations for an increase of approximately 2.5 million barrels.
Oil prices also got a lift Wednesday from U.S. employment numbers. Automatic Data Processing data that showed private-sector payrolls increased 91,000 in September, after an expansion of 89,000 in August.
Oil finished below $76 a barrel for the first time in more than a year in regular New York trading earlier in the week as investors fretted that energy demand will evaporate along with U.S. economic growth.
Key for investors attempting to gauge the health of the U.S. economy will be U.S. employment data due Friday although markets may see some volatility Thursday, with interest rate decisions from the Bank of England and the European Central Bank due.
Although Barclays Capital strategists believe that the Bank of England will likely leave its key rate on hold, they do expect the ECB’s hawkish stance to soften on Thursday. The strategists said that the ECB will likely loosen policy using conventional and unconventional measures and added “the combination of these measures is likely to surprise markets.”
Sarah Turner is MarketWatch’s bureau chief in Sydney.

Reed Elsevier CFO Mark Armour to leave end 2012

MADRID (MarketWatch) — Anglo-Dutch publisher Reed Elsevier PLC UK:REL
+1.77% on
Thursday announced that Chief Financial Officer Mark Armour will retire at the end of 2012. The company said it is beginning a process to replace him. Armour joined Reed Elsevier as deputy chief financial officer in 1995 and was appointed chief financial officer in 1996.

Canadian dollar’s drop may outpace Aussie, krone


More pain could be in store for the loonie, the Australian dollar, and Norwegian krone. These currencies, which surged as investors sought highly liquid investments that corresponded with demand for global resources such as copper and oil, have been among the most vulnerable as commodities have corrected.
One U.S. dollar bought as many as 1.0656 Canadian dollars on Tuesday USDCAD
-0.11% , the highest in just over a
year, before the Canadian unit rebounded a bit Wednesday to trade at $1 per 1.0408 Canadian dollars.
“Canada is still perceived as a global commodities play,” said Francis Campeau, broker at MF Global in Montreal. “As foreigners liquidate equities, they also need to liquidate the underlying currency.”
Analysts anticipate the Canadian dollar will continue falling. Kathy Lien, director of currency research at GFT Forex, is predicting the U.S. dollar could rise as high as 1.10 Canadian dollars, or another 3% from this week’s highs, as a sluggish economic growth curbs demand for commodities and related assets. Read more on Europe recession fears.
The Canadian dollar closely tracks the movements of oil prices, which just finished their worst quarter since the financial crisis. Crude-oil futures ended Tuesday’s session under $76 for the first time since September 2010, before recovering to close above $79 on Wednesday. Read more on oil.
An extended recovery in investor sentiment about the economy, which helped U.S. stocks rally for two straight sessions this week, could provide a floor for the Canadian dollar.

Apple, Cisco, RIM highlight tech gainers


The Nasdaq Composite Index COMP
+2.32% climbed more than 55 points, or 2.3%, to
close at 2,460, while the Morgan Stanley High Tech 35 Index MSH
+3.09% and the
Philadelphia Semiconductor Index SOX
+3.10% each rose more than 3%.
But the bullish session was overshadowed by a high-profile spat between the chief executives of Oracle Corp. ORCL
+2.86% and Salesforce.com Inc.
CRM
-0.30%
Salesforce CEO Marc Benioff claimed that his planned presentation of his was taken off the agenda at Oracle’s annual OpenWorld conference in San Francisco. Oracle claimed Benioff’s speech wasn’t a keynote address and had been moved to Thursday.
However, Benioff, who has recently taken some shots at Oracle’s Larry Ellison over the concept of cloud computing, said he had been dropped entirely from the OpenWorld schedule, and instead held court Wednesday morning at a hotel near Oracle’s convention site. Read more about the Oracle-Salesforce dispute.
Oracle shares rose almost 3% to close at $29.51, while Salesforce shares dipped less than 1% to end the day at $117.25.
Apple AAPL
+1.54% shares rose $5.75, or 1.5%, to $378.25, regaining ground lost in the
previous session, when the launch of its iPhone 4S failed to create a buzz.

Saturday, 3 September 2011

free download UltraSurf 10.03



UltraSurf 10.03 | 5 Mb


Facts of UltraSurf:
  1. Service provided for 6 years
  2. Millions of users
  3. Users from over 150 countries
  4. Daily hits over 300 million
  5. Daily traffic over 5,000 GB
  6. Privacy

Protect Internet privacy with anonymous surfing and browsing — hide IP addresses and locations, clean browsing history, cookies & more …



Security
Completely transparent data transfer and high level encryption of the content allow you to surf the web with high security.
Freedom
UltraSurf allows you to overcome the censorship and blockage on the Internet. You can browse any website freely, so as to obtain true information from the free world.

If you use the browser Firefox then open “wjbutton_en” With choose Firefox.

download Premium Proxy Switcher | firefox addon


download Premium Proxy Switcher | firefox addon

Premium Proxy Switcher makes proxy usage user friendly. It can download proxy list automatically/manually, setup, switch proxy automatically/manually, enable or disable proxy easy and fast, with single click. 

Main features
  1. Automatically loads proxy servers every 1-30 minutes from our VIP zone or from user specified URL.
  2. Automatically changes proxy server every 1-30 minutes, that in turn increases your privacy level since your requests will be sent though different proxy servers.
  3. Setup any proxy server from available proxy list with just a single click.
  4. Manually switch proxy server to random one from the available proxy list with single click
  5. Delete selected proxy server from the list if it is not working any more and switch to random proxy server from available proxy list.
  6. Enable or Disable proxy server usage in Firefox with single click.
  7. Manually load proxy servers from our VIP section or user defined URL.
  8. Display proxy country in available proxy list menu, so user could easily select necessary one for that particular moment.
  9. Add shortcuts to all commands for those users who prefer to do everything fast (with keyboard).
  10. The possibility to manage proxy list manually with help of keyboard.


Download Here: (For FIREFOX users)
https://addons.mozilla.org/firefox/downloads/latest/161958/addon-161958-latest.xpi?src=addondetail

What is Proxy Server?


What is a Proxy Server?


It is a server that sits between a client application, such as a Web browser, and a real server for which client requested. Proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. It intercepts all requests from client to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.In some cases, the proxy may alter the client's request or the server's response for various purposes.
Proxy servers have two main purposes:


Improve Performance: Proxy servers can improve performance for users. This is because it saves the results of all requests for a certain amount of time. Next time if same request comes, it serves from the saved pages rather than the real server.


Filter Requests: Proxy servers can also be used to filter requests. FOr Ex: a company might use a proxy server to prevent its employees from accessing a specific set of Web sites.


Types of proxy servers
You may see different types of proxy servers:


Transparent Proxy or Caching
This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it.


Distorting Proxy
This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers.


Anonymous Proxy
This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users.

High Anonymity Proxy
This type of proxy server does not identify itself as a proxy server and does not make available the original IP address.


Reverse proxy 
A reverse proxy is another common form of a proxy server and is generally used to pass requests from the Internet, through a firewall to isolated, private networks. It is used to prevent Internet clients from having direct, unmonitored access to sensitive data residing on content servers on an isolated network, or intranet. If caching is enabled, a reverse proxy can also lessen network traffic by serving cached information rather than passing all requests to actual content servers.

Operation Shady RAT- Biggest cyber attack revealed by McAfee

Operation Shady RAT- Biggest cyber attack revealed by McAfee


Security researchers from McAfee have released a report revealing the biggest cyber attack in which 76 organizations have been compromised during the past five years. in all compromised organizations, 49 are from US. This investigation was started in 2006 under the vice president of threat research of McAfee. They have released a 14 pages reportabout this operation with details the cyber attacks recorded. see the report and image below


McAfee believes that a single nation is behind it but didn't give any name. But After reading the line, i know you are also thinking about the 1 nation china. 
According to the report, The shortest time a targeted organization remained compromised by the actor behind Shady RAT was one month and the longest was 28 months, the Olympic Committee of an Asian country. SOme other long term compromised include a South Korean government agency (27 months), a U.S. federal government agency (25 months), a U.S. satellite communications company (25 months), a Southern California county government (24 months) and the Hong Kong office of a U.S. news organization (21 months).

Symantec releases free Android security solution



Symantec releases free Android security solution


Security company Symantec has released a free security solution for Android that features anti-malware and anti theft technologies. It is called Norton Mobile Security Lite which scans all files and app update for malwares. It also have a remote locking feature in which users can  remotely lock their devices by sending text messages to them. But it is not only useful when a device is stolen.


Its a lighter version of Norton Mobile Security which is a commercial product. This type of software is need for android because latest report says that Android users are two and a half more likely to encounter malware now then they were six months ago, with 30% of them likely to encounter web-based threats.


"In the same day, a smartphone user can stream their favorite music station, get the high score hurling birds through the air and then file their taxes online. Having Norton installed means feeling equally confident regardless of what you do on your mobile phone," said Dave Cole, vice president mobile products, Norton.

Spyeye Toolkit Has Been Leaked onto the Internet


Spyeye Toolkit Has Been Leaked onto the Internet


According to the report, the source code of the Spyeye toolkit has been leaked onto the Internet. This kit has been incorporating functionality of the Zeus malware builder kit since early 2011. the Spyeye toolkit, which includes the Zeus malware builder, was leaked by an infamous French security researcher named Xyliton, who is part of the Reverse Engineers Dream Crew (RED Crew).
Now the security researchers can analyse the code to know the actual working of the kit and modify it t make it more powerful. They can also get the info obout the working of this team.
Now it will be interesting to see the next updates of this kit by other security researchers..


Read More:
http://blog.damballa.com/?p=1357

How to access blocked website to school, colleges and office with ultrasurf


How to access blocked website to school, colleges and office with ultrasurf


Ultrasurf is a nice tool to enable users to visit any public website in the world safely and freely. You can also use it your internet privacy and security.


Download this software from my older post
http://www.hackingtricks.in/2010/11/free-download-ultrasurf-1003.html


Settings:
  • Run software
  • Click on option at top of the tool
  • In new windows, click on proxy settings in the bottom
  • Click on Auto-Detect Proxy Option as shown above
  • Click OK and close all windows.
  • Reopen the software by clicking in the .exe
  • Wait for few seconds to connecting the server.
  • Once the ultrasurf connected to server, it will show- Successfully connected to server
  • The right side speed bar will auto generated after connected to server.
  • IE will open automatically. Close this IE.
  • Download GOOGLE CHROME INTERNET BROWSER. This is my recommendation because this software is best compatible with google chrome.
  • PLS DNT TRY ULTRASURF WITH MOZILLA FIREFOX.




Once you successfully connected check the settings in your IE. The Address will show 127.0.0.1 and port 9666. It means you are ready to open blocked websites.


Install Google chrome and open it. NOW OPEN ANY WEBSITE AND ENJOY.

Top 10 Codes You Aren’t Meant To Know


, hospitals, entertainment venues, and other places where the public are together in large numbers, use secret codes to pass information between store employees. These are meant to be a secret as they don’t want to alarm the non-staff members or alert someone (like a thief) to the fact that they have been noticed. Many stores have their own codes – for example WalMart, but there are a number that are nearly universal in application. This is a list of ten secret codes that may prove useful to you in future, or at least dispel any curiosity you may have if you hear them.
10
Ten Codes
Cops Robbers
The Ten Codes are a list of codes used by law enforcement officers in the United States. They are available on the Internet which would make them seem inappropriate for this list, but a large number of police departments have tried to have them made illegal for distribution, so they deserve a mention. The codes were developed initially in 1937 and were expanded in 1974. The California Police use a variety of extra codes which predated the ten codes. For example, a 187 (one eighty-seven) means homicide. In the ten codes system, a 10-31 means that a crime is in progress, a 10-27-1 means homicide (the 10 is usually not said when it is a three-number sequence), and a 10-00 (ten double-zero) means “officer down – all patrols respond. Wikipedia has a complete list of the police codes here.

9
Professional Codes
Pebkac
In computer support, a variety of codes can be used when referring to a customer. One of these codes has become fairly well known on the internet: PEBKAC (Problem Exists Between Keyboard And Chair) but there are a variety of others that are lesser known. One of these is used when reporting a fault which has been fixed: “The fault was a PICNIC” (problem in chair – not in computer), or “ID 10 T Error” – ID 10 T is, of course, IDIOT. Let us hope that you never see this noted down on your file when a serviceman is fixing your computer.
8
Time Check
Time-Bomb
Time Check (usually taking a similar form to: “Time check: the time is 12:00″) can be a code in stores for a bomb alert. It alerts the staff to follow the bomb procedure, which can be to either try to locate any suspicious packages, or to prepare to get the hell out. If you hear a time check in a store, it is probably a good idea to start moving toward the exit. Surprisingly – and shockingly, the majority of stores that use this code actually expect their staff to search for the bomb – certainly an aspect of the job that the majority of teenaged checkout operators weren’t expecting when they signed up I am sure.
7
Code 10
Cashier-3-G
A code 10 in hospitals can refer to a mass casualty or serious threat (such as a bomb alert), but the majority of people experiencing a code 10 will do so for another far more common reason: a “code 10 authorization” is made by a merchant when he needs to call a credit card company to enquire about your card. This means that he is suspicious of you or your card and doesn’t want you to know it while he gets it checked out. When the credit card company hears that they have a code 10, they will ask a series of yes/no questions to the merchant in order to find out what the situation is. This will often result in the merchant keeping your card if they believe it is safe to do so. This type of call often results in a call to law enforcement.
6
Doctor Brown
Doctorninja
“Doctor Brown” is a code word often used in hospitals to alert security staff to a threat to personnel. If a nurse or doctor is in danger from a violent patient or non-staff member, they can page Doctor Brown to their location and the security staff will rush to their aid. In some hospitals, code silver is used to refer to a person with a weapon, and code gray can mean a violent person without a weapon. Hospitals have a huge array of various codes to describe all manner of situations. They often differ from hospital to hospital and they are usually not internationally recognized. [Image courtesy of The Adventures of Dr. McNinja]

5
Code Oscar
Mob-Rescue-767968
On a ship, a code oscar means someone has gone overboard. If the ship has to maneuver erratically to handle the situation, it must also send out blasts on the signal so that other ships nearby are aware of the fact that it is about to change its course. It should be noted that ships don’t have an internationally standardized set of PA signals and they can differ from place to place, but this is a fairly commonly used one. Oh – and a code delta can mean that there is a biological hazard – though who knows what that might be on a passenger ship. And finally, Code Alpha often means “medical emergency”.
4
Code Bravo
Tsa-Main Full
Code Bravo is the code phrase for a general security alert at airports. Unlike most of the codes on this list, the code is meant to cause alarm – but not through knowing what it means: when this alert is raised, all of the security agents will begin to yell “Code Bravo” in order to frighten the passengers – this is supposed to make it easier for the agents to locate the source of the problem without interference from the general public. For those of you who travel on ships from time to time, you may like to know that Code Bravo means “fire” and it is the most serious alert on a ship – if it burns, you either get off or burn with it. Ships also often use sound signals, such as 7 short and 1 long, meaning “man the lifeboats”.
3
Inspector Sands
Blogger London Underground
Inspector Sands (or sometimes Mr Sands), is a code for fire in the United Kingdom. Obviously it would not be appropriate for the service staff of a store to announce a fire publicly, so this code is used to alert the appropriate staff to the danger without upsetting customers. The wording differs from place to place and in the Underground network a recorded “Inspector Sands” warning is automatically triggered by smoke detectors. In some shops you will hear the code used in a phrase such as “Will inspector Sands please report to the men’s changing room” if the fire is in the men’s changing room. It was played on a continuous loop through the underground during the July 7, 2005 bombings, and has been incorrectly described as a code word for a bomb – the frequently used code for a bomb in the Underground is “Mr Gravel” – for example, “Mr Gravel is in the foyer”. Mr Sands (or sometimes Mr Johnson) is also used in theaters in the case of fire. You can listen to a recording of the Underground “Inspector Sands” warning here.
2
WalMart
Walmart-1
WalMart gets its own item on this list because they have a large number of codes that are store specific. Some of their codes should not worry you – for example a code 10 or a code 20 just means that there has been a dry spill or a wet spill – the biggest danger this poses to you is that you might slip over. A code 300 calls for security and a code orange means there has been a chemical spill. But here are the ones you really need to worry about: Code red means there is a fire in the building – get the hell out if you hear this. Worse still, a code blue means there is a bomb in the building. Exit swiftly but don’t run – in case they think you planted it. A code green means there is a hostage situation and a code white means there is an accident. The one you are most likely to hear is a code c which is simply a call for customer service (usually meaning that more cashiers are needed). And finally – the most famous WalMart code… well, it’s so famous it needs its own item:
1
Code Adam
0528061512
Code Adam was invented by Walmart but it is now an internationally recognized alert. It means “missing child”. The code was first coined in 1994 in memory of Adam Walsh, a six-year old, who went missing in a Sears department store in Florida in 1981. Adam was later found murdered. The person making the announcement will state “we have a code Adam,” followed by a description of the missing child. As soon as the alert is heard, security staff will begin to monitor the doors and other exits. If the child is not found within 10 minutes, the police are alerted and a store search begins. Also, if the child is found in the first 10 minutes in the company of an unknown adult, the police must be called and the person detained if it is safe to do so. In 2003, the US Congress passed legislation making a “Code Adam” program compulsory in all federal office buildings. A similar alert is called an AMBER alert, a backronym for “America’s Missing: Broadcasting Emergency Response” but initially named for Amber Hagerman, a 9 year old girl who was abducted and murdered.

10 Great People You Should Know But Don’t


As a child the things that most interested me were things little known by others. I am not sure what drew me to love all things obscure and unknown, but that passion remains with me to this day – and can certainly be considered the greatest motivation for making Listverse. On this list we look into the lives of ten people (or groups of people) that we should know about, but don’t. I don’t know why there is such a plethora of historical events and people that we seem to universally forget, but at least that gives good fodder for more lists like this!
Aside from sources on the Internet I also used the excellent book History’s Forgotten Milestones (Kindle edition), by Joseph Cummins, in researching the historical figures for this list. It is an excellent and interesting book that I recommend to all who like this list, as well as his fascinating History’s Great Untold Stories.
10
Nicolas Steno
Steno
Nicolas Steno (11 January 1638 – 25 November 1686) was a Danish pioneer in both anatomy and geology. In 1659, he decided not to accept anything simply written in a book, instead resolving to do research himself. The consequences of this self-study is that he is considered the father of geology and stratigraphy. He was responsible for the the recognition of geological strata, and the theory that successive layers of geological formations (strata) contained a fossil record of life in chronological order. He eventually became a tutor to the de Medici family and, ultimately, became a Bishop and a strong leader in the Catholic Counter-Reformation. He is largely unknown, despite his many great achievements, which may have been due to his religious zeal in a time that was moving away from reasoned science and towards observational science.
9
Cleisthenes
Cleisthenes1
Who is the father of democracy? Not Thomas Jefferson, as many people oddly seem to think. It was, in fact, the little known Cleisthenes. He first introduced democracy to the Greek city states (undoubtedly following some of the principles previously set forth by Solon) in 508 BC, after he gained political power in Athens. From 508 to 502 BC, he began to develop a series of major reforms, leading to the formation of Athenian Democracy. He made all free men living in Athens and Attica citizens, giving them the right to vote as part of a democratic society. He also established a council (boule). All citizens over the age of thirty were eligible to sit on the council, encouraging public involvement in the government. While the format may not be the same as the many democracies around the world today, there is no doubt that this was the first step.
8
Elisha Kane
Elishakane4
It is astounding that Elisha Kane is known to so few people – especially considering that his funeral was said to be the largest in US history, second only to that of Abraham Lincoln. Kane (28 February 1820 – 16 February 1857) was a US Navy Officer who was a member of two Arctic expeditions to attempt to rescue (without success) the explorer Sir John Franklin (a British Arctic explorer who vanished while attempting to chart and navigate the Canadian Arctic). Though suffering from scurvy, and at times near death, he resolutely pushed on and charted the coasts of Smith Sound and the Kane Basin, penetrating farther north than any other explorer had done up to that time. His ship was eventually icebound and so, on 20th May 1855, he led his party on an 83 day march across the frozen north, carrying their sick with them. They lost only one man on the journey and were eventually rescued. However, the toll on his health was too extreme and he died two years later in Havana, where he was trying to recuperate. His body was carried from New Orleans to Philadelphia, and nearly every platform on the trip was met by a memorial delegation.
7
Rabban Sauma
800Px-Voyagesofrabbanbarsauma
Rabban Bar Sauma (c. 1220–1294) is the Marco Polo of the East, and yet is relatively unknown. He was a Turkic/Mongol monk, turned diplomat, of the Nestorian Christian faith. He is known for embarking on a pilgrimage from Mongol-controlled China to Jerusalem with one of his students, Rabban Markos. Due to military unrest along the way, they never reached their destination, but instead spent many years in Mongol-controlled Baghdad. Markos was eventually chosen as Nestorian Patriarch, and later suggested his teacher, Rabban Bar Sauma, be sent on another mission, as Mongol ambassador to Europe. The elderly monk met with many of the European monarchs, as well as the Pope, in attempts to arrange a Franco-Mongol alliance. The mission bore no fruit, but in his later years in Baghdad, Rabban Bar Sauma documented his lifetime of travel. His written account of his journeys is of unique interest to modern historians, as it gives a picture of medieval Europe at the close of the Crusading period, painted by a keenly intelligent, broadminded and statesmanlike observer. His travels occurred prior to the return of Marco Polo to Europe, and his writings give a reverse viewpoint of the East looking to the West.
6
Mary Anning
436Px-Mary Anning Painting
Mary Anning (21 May 1799 – 9 March 1847) was a British fossil collector, dealer and palaeontologist who became known around the world for a number of important finds she made in the Jurassic age marine fossil beds at Lyme Regis, where she lived. Her work contributed to the fundamental changes in scientific thinking about prehistoric life and the history of the earth that occurred in the early 19th century, and yet she is barely known today, while Darwin has become a household name. Her discoveries included the first ichthyosaur skeleton to be correctly identified, which she and her brother, Joseph, found when she was just twelve years old, the first two plesiosaur skeletons ever found, the first pterosaur skeleton located outside Germany, and some important fish fossils. Because of her sex and religious rebellion, much of her work was never published and, in fact, she rarely even received credit for her scientific contributions.



5
Fighting Women of Dahomey
Dahomey Amazons
The Dahomey Amazons, or Mino, were a Fon (a major West African ethnic and linguistic group in the country of Benin, and southwest Nigeria) all-female military regiment of the Kingdom of Dahomey (now Benin), which lasted until the end of the 19th century. They were so named by Western observers and historians due to their similarity to the semi-mythical Amazons of ancient Anatolia and the Black Sea. The Mino were recruited from among the ahosi (“king’s wives”), of which there were often hundreds. They trained with intense physical exercise. Discipline was emphasized. In the latter period, they were armed with Winchester rifles, clubs and knives. Units were under female command. Captives who fell into the hands of the Amazons were often decapitated. The French army lost several battles to them due to the female warriors’ skill in battle that was “the equal of every contemporary body of male elite soldiers from among the colonial powers”. The last surviving Amazon of Dahomey died in 1979.
4
Jan Wnęk
Screen Shot 2011-04-12 At 9.36.25 Am
Since reading about Jan Wnęk a year ago, I have desperately sought an opportunity to include him on a list. I am very glad that today that opportunity has arisen, for Wnęk truly was a remarkable man who is little known outside of his native Poland. Wnęk was an illiterate carpenter, born in 1828, who went on to become a prolific sculptor, artist and aviation pioneer. All of this with only natural talent. He studied the wings of ducks to try to learn how to fly, and ultimately built a glider that allowed him to make a number of short flights. His fame was great in the towns around where he lived because of his flying ability. He died at the age of 41, when one of his flights went wrong. He left no written records or drawings of his work in aviation. Above is one of the incredible sculptures he created. You can see many more here.
3
Pope Leo the Great
Pope-Saint-Leo-The-Great-02
Most of us know Pope Saint Gregory the Great – the inventor of our calendar, but far fewer have heard of Pope St Leo the Great (400 – November 10, 461) who single handedly did what no army could do: stop Attila the Hun. In 452, when the King of the Huns, Attila, invaded Italy and threatened Rome, Pope Leo went to meet him personally to beg him to withdraw. Attila, so impressed by Leo, simply turned around and left. Unfortunately, Leo’s intercession could not prevent the sack of the city by the Vandals in 455, but murder and arson were repressed by his influence. In addition to this great achievement, St Leo is remembered for his writings on equality of all men, and the call for all to live in dignity. His feast day is April 11. Pictured above is the famed meeting between St Leo and Attila.
2
Empress Myeongseong
Purported Photograph Of Empress Myeong Seong (Not Verified)
Empress Myeongseong (19 October 1851 – 8 October 1895), also known as Queen Min, was the first official wife of King Gojong, the twenty-sixth king of the Joseon dynasty of Korea. At the age of 16 she was married to the then 15 year old King. But, instead of being the demure queen expected of her, she was assertive and ambitious. She gave up many of the royal functions such as hosting tea parties for the aristocracy, and, instead, read books reserved for men only, teaching herself philosophy, history, science, politics and religion. When her husband took full power (at 22), Queen Min took a very active role in politics, and placed her own family members into high positions, solidifying her power. It was during her so-called rule that Korea began to open to modernization – first with the help of the much despised Japanese (due to forced treaties and threats of war) and later from the West. The Queen reorganized government to deal with the influence of Westernization, and allowed freedom of religion which had previous been suppressed. This caused great upset amongst her own political leaders. The Japanese, seeing her power, decided to assassinate her – which they did, in 1895, by stabbing her multiple times. The King, despairing from the loss of his wife, began to sign treaty after treaty with the Japanese, which eventually led to their colonial rule from 1910-1945. Pictured above is a purported photograph of the Queen.
1
Baldwin IV
Baldwin The Leper
Baldwin IV of Jerusalem (1161–16 March 1185) was the King of Jerusalem, from 1174 to 1185. In his youth it was discovered that he had contracted leprosy and, due to his young age, most people thought he would not reign long. He was crowned at the age of 13, and so Jerusalem was ruled by two regents, one of whom signed a treaty of peace with Saladin. When Baldwin came of age he did not renew the treaty, and, instead, began a series of wars against him – fighting on horseback despite suffering from leprosy. He had numerous successes in his battles, which led the Muslim population to refer to him as “the pig”. Baldwin was courageous in battle and wise in politics – organizing marriages that would fortify the kingdom and his power. He ended up reigning for eleven years – the last two years of which he co-reigned with his five year old nephew, King Baldwin V. Oh – and unlike the movie Kingdom of Heaven, Baldwin IV did not wear a mask.