Mindkind - La Circulaire IGA ( 2013-2015 ).

Circulaire IGA [Circulaire 0109, 2eme Semaine de fevrier 2015, v1.0 build 1.8 - soupir ]


One of four titles used to classify someone based on their technical and social skills. The other 
three titles are nerd, dork, and normie. The difference between the four titles can be easily 
shown in table form: 

................ Technical ........ Social 
Title ............ Skills ......... Skills 
----------   ----------------    ------------ 
Normie ............ No .............. Yes 
Geek .............. Yes ............. Yes 
Nerd .............. Yes ............. No 
Dork .............. No .............. No
We are the borg Gaming Zone Other stuff
Hack the planet "Pourquoi forcer la serrure quand on peut dévisser les pentures?"


1. To program a computer in a clever, virtuosic, and wizardly manner. Ordinary computer jockeys 
merely write programs; hacking is the domain of digital poets. Hacking is a subtle and arguably 
mystical art, equal parts wit and technical ability, that is rarely appreciated by non-hackers. 
See hacker. 

2. To break into computer systems with malicious intent. This sense of the term is the one that 
is most commonly heard in the media, although sense 1 is much more faithful to its original 
meaning. Contrary to popular misconception, this sort of hacking rarely requires cleverness or 
exceptional technical ability; most so-called "black hat" hackers rely on brute force techniques 
or exploit known weaknesses and the incompetence of system administrators.
Tutorial Exploit [Wordpress] [Microsoft Internet Explorer] [ProFTPD] [PHP] [OSSEC] [D-link] shellcode [Linux] Proof of concept [D-link] [Wordpress] Theorical Vulnerability [Linux Kernel] [Debian] [Ubuntu] [Red Hat] [Internet Explorer] [Windows Media player] [Windows] [Subversion]


(HACKer acTIVIST) A person who demonstrates against a company or government agency by malicious 
technological means. Examples are causing a Web site to fail or slow down, or breaking into a 
computer system to obtain unauthorized information. In 2011, after MasterCard, Visa and PayPal 
cut off service to Wikileaks, hacktivists set up denial of service attacks against their Web 
sites. Hacktivists promote free availability of information on the Internet and may protest when 
actions inhibit this freedom.

Gears of war

Killer app

A killer application (commonly shortened to killer app) is a computer program that is so useful 
that you cant just imagine your life without.

Big Brother

Big Brother

A widely used phrase from the book 1984 by George Orwell.
"Big Brother is watching you" 

An omnipresent, seemingly benevolent figure representing the oppressive control over individual 
lives exerted by an authoritarian government. 

The practical applications of Big Brother watching you today: surveillance  cameras, wiretaps, 
tracking Internet use, spychips, digital facial recognition, etc.



Science is the pursuit and application of knowledge and understanding of the natural and social 
world following a systematic methodology based on evidence.
Biology [Medical, Drugs, DNA, Virus, Health] Robotics [Machines, Robots, AI, Drones]