Amateur, computer-based video editing and production

Archive for September, 2012

MI5 Persecution: Browse the Website (4195)

MI5 Persecution Update: Friday 25 March, 1999

If You Intend To Reply, Please Read This
Please…. keep your response to one page if you can!. Faxes over a page
or two will be deleted without being read.

The Usual Words

The persecutors-who-wont-admit-theyre-MI5 have been active again this
week. On Saturday 20/3/99 I visited Ravenscourt Park in west London, and
was verbally assaulted with the usual words, "something wrong with
him". This audio file is on the web at URL;

This afternoon (Friday 26/March) I was again verbally assaulted while
travelling by bus. The same sexual obscenity was thrown at me, and the
incident was recorded on my minidisc-walkman. Because of the deeply
offensive nature of the slander, I will not be posting this on the

Keith Hill MP (Labour – Streatham), my elected representative, as ever
refuses to help.

MI5 Persecution : Browse Website

The March 1998 issue (number 42) of .net Magazine reviews the website
describing it as an "excellent site". Since August 11, 1996 over 50,000
people have browsed this website.

You are encouraged to read the web pages which include

a FAQ (frequently asked questions) section outlining the nature of the
persecutors, their methods of harassment through the media, people at work
and among the general public

an evidence section, which carries audio and video clips of media and
workplace harassment, rated according to how directly I think they refer to me

objective descriptions of the state security agencies involved

scanned texts of the complaints I have made to media and state security agencies involved

posts which have been made to netnews over the last four years on this topic

This article outlines what is to be found on the webpages, which you are
encouraged to browse for the complete story.

Frequently Asked Questions

Your excursion through the website starts with the "FAQ – Frequently Asked
Questions" portion. MI5s campaign of harassment against me has been going
on for almost 9 years, and its longevity and breadth is reflected in the
FAQ. Many thousands of people in Britain and abroad, including some
recipients of this fax, have known for many years of MI5s activities
against me. The FAQ describes the mass "Omerta suppressing its
publication"; we pretend Britain is part of the "Free World", yet the
British Secret Police, which is what MI5 are, carry on for many years a
campaign which politicians and the media know about, and rely on the
silent complicity of so many thousands of people.

The FAQs introductory article names those who are "in the know"; media
figures like Martyn Lewis, Michael Buerk, entertainment figures like Chris
Tarrant, politicians and many in the general public, "all united in a
conspiracy which breaks the laws which the UK does have regarding
harassment, and all completely uncaring for any semblance of decency or
elementary respect for individual rights.

Broadcast media play a key role in the harassment. The very first incident
in June 1990 was when a television newsreader reacted to what she saw
happen in my living room at home; such incidents of "interactive
television" are still happening in 1999. The same goes for radio stations
such as Capital FM. In spring 1994, Chris Tarrant on his Capital morning
show made an aside to someone else in the studio, about a person he didn’t
identify. He said, "You know this bloke? He says we’re trying to kill
him. We should be done for attempted manslaughter". Tarrant and Capital
have made strenuous efforts to avoid answering this charge.

Perhaps worst of all, MI5 have deliberately set-up many incidents in
public places such as tube stations, shops, cinemas, where they have paid
people to throw abuse at me. Since MI5 obtains funds to the tune of 160
million a year to fund its criminal activities, it has funds both to pay
its operatives and to "buy" media figures and members of the public to
take part in its campaign of persecution.

The Security Service are professional liars. They throw slanderous abuse,
yet they refuse to admit out loud that they are doing so. When challenged
about their activities through the Security Service Tribunal they lie and
deny their activities. They induce other workers and managers at places of
employment to take part in their campaign of abuse, presumably by buying
them in the same way they buy media figures.

Complaints, and Press Coverage (BBC Lies, MI5 Lies)

As you might expect I have challenged both the Security Service, through
the Security Service Tribunal, and offending broadcasters, to own up to
what they have been doing. And as you might also expect, all of these
people have lied through their teeth. Still worse, they have refused to
commit unambiguous lies on paper; they have couched their lies in
bureaucratic language, and allowed others to make false assurances and
tell lies on their behalf. So when their lies are exposed, they will then
tell further Clintonesque lies about how they werent really telling lies
in the first place!

On 6/Feb/1997 the BBC told me they would "never engage in any form of
surveillance activity such as you describe". The BBC told me Buerk and
Lewis had refused to put their lies in writing, but had stated verbal
falsehoods denying my accusations of "interactive watching" during news
broadcasts. Clearly Buerk and Lewis fear being caught and exposed, so they
hide behind their Viewer Correspondence department.

In March 1997 I issued a summons against the BBC to try to "smoke them
out". This summons was struck out as "disclosing no reasonable cause of
action", because I had acted as a Litigant-in-Person and most LiP summons
are treated thus. My case was arguable in law, so the striking out was

In June 1997 the Security Service Tribunal wrote to me regarding the
complaint I had brought against MI5 in February. They say, "The Security
Service Tribunal have now investigated your complaint and have asked me to
inform you that no determination in your favour has been made on your
complaint." I think you can guess the contempt which I feel for the
Security Service Tribunal, who have never made a determination against
MI5, and act as merely a whitewashing body for the Security
Service. Unsurprisingly in May 1997 the Interception of Communications
Tribunal gave the same result.

The last few items of "Press Coverage" give details of mentions of the MI5
Persecution in various magazines and newspapers such as BBCs Ariel, the
Observer and .net magazine.


Some audio and video clips of evidence have been recorded. My weakness in
this area is because most of the really unambiguous evidence would have
been obtainable in 1990-92, but I wasnt taping anything at the time, and
its very difficult to now obtain recordings from that period.

The audio clip "Life is so Hard" relates to harassment at my workplace in
Canada. In the latter half of 1996, I was sitting near to co-worker Mark
Lee, who kept coming out with words and phrases which showed MI5 were
supplying him with data from my home life. For example, I would say
something on the telephone at home, and the following day he would repeat
verbatim what I had said. When Mark Lee saw I was recording what he was
saying, he started to make his remarks more ambiguous, or make the obvious
ones out of earshot of the recorder.

However, during the evening of 12 November 1996, at home in my apartment
(flat to you UK-ers), I said "life is so hard, and then you die". A
nihilistic, negative thing to say, but quite distinctive. The following
day, 13 November, Mark said loudly, "life is so hard eh, and then you
die" followed by loud laughter. I captured this on my tape-walkman and the
computer-audio file is posted on the website.

There are a number of other audio files in the websites "Evidence" area
demonstrating the abuse to which MI5 subject me to through their paid

Also in this section is a very interesting article by journalist Bernard
Levin, which followed a meeting I had with a friend in 1991, and to my
mind describes in some details Levins "artists impression" of the
meeting. He talks about a "madman" who "bursts into tears, and swears it
is all true. And it is."

Internet Newsgroup (Usenet) archive

From May 1995 until the present day, this matter has been discussed
exhaustively on internet newsgroups. The most interesting articles from
the first two years of posts are documented here. This area is worth
reading since most of the questions which the reader would ask, have been
asked at some time or another by someone on usenet. Perhaps the very first
article posted sums it all up so succinctly;

Date: Thu May  4 18:27:24 1995
Newsgroups: alt.conspiracy
Subject: BBC’s Hidden Shame

Remember the two-way televisions in George Orwell’s 1984? The ones which
watched you back? Which you could never get rid of, only the sound could
be turned down?
Well the country which brought Orwell into the world has made his
nightmare follow into the world after him. Since 1990 the British have
been waging war against one of their own citizens using surveillance to
invade privacy and a campaign of abuse in the transmitted media in their
efforts to humiliate their victim.
And the most remarkable thing about it is that what they do is not even
illegal – the UK has no laws to protect the privacy of its citizens, nor
does it proscribe harassment or abuse except in the case of racial abuse.
A lot of people in England know this to be going on, yet so far they have
maintained perfect "omerta"; not a sound, not a squeak has escaped into
the English press, and for all the covert harassment absolutely nothing
has come out into the public domain.
Have the British gone mad? I think we should be told.

So how much deeper will the persecutors-who-wont-admit-theyre-MI5 sink in
their campaign of lies and intimidation? Each time I thought they could
sink no lower, they have managed to surprise me. You thought it could
never happen here? When the MI5 British Secret Police make their smears
against me, it is the corruption of the Establishment, which they are part
of, that is demonstrated.


posted by admin in Uncategorized and have No Comments

Optimum Display Resolution (to CRT Television over S-Video)

Country: Uk
CPU: PENTIUM D915 2.8Ghz (dual core)
RAM: 2Gb DDR2 6400

I record and playback freeview (Uk) digital television (DVB-T) using
the Pinnacle card.

I playback recorded Tv to a standard CRT television (as the secondary
display) over an S-Video cable from the Inno3d Graphics card.

What is the best display resolution setting for the CRT television for
best picture quality of a DVB-T broadcast? currently the graphics card
for this display is configured for "I/PAL" and the resolution is set
1024×768 (the other options are 960/600 or 800×600)?

Incidentally, the resolution for the Samsung TFT display (which I use
as the primary display, not for watching recorded Tv) is set for the
native resolution of 1680×1050.


posted by admin in Uncategorized and have No Comments

how are u

Dear Sir/Madam
We are one of the largest wholesalers in China who mainly sell stylish
electronic product and equipment such as Digital Cameras, Mobile
Phone, Laptops, Mp4, GPS, Digital Video and bulk products such as LCD
TV, Motorcycles, Binoculars and Musical Instruments and so on with
various international famous brands.
We offer our customer good valuable product with very competitive
price because we have advanced goods circulating solution and
supporter. We have our own warehouse and stores, our clients all over
the world. When you choose our products you will also enjoy our fast
We appreciate all of customers’ comments and will continue to improve
our service in order to satisfy our old and new customer. During
Christmas and New Year Holiday we have a various promotion plan. It
will be out soon. Please welcome to visit our website
to check your voucher.


MSN & E-mail:elec…

posted by admin in Uncategorized and have No Comments

Need some information ?????????????

I have been trying to download a video off the St. Louis News video
section that my dad was in. But I have tried on real player and
windows player. I would like to know step by step on how to download
it to my pc and then burn it to a cd or dvd ????????? Which would be
better to burn to?
Any help sure would be nice.

Thank you all,

posted by admin in Uncategorized and have Comments (2)

Womble: Automatic update

As per my 19 Nov 2007 thread, ‘Womble update check doesn’t work’,
Womble acknowledged that this was a bug. The update facility hadn’t
been working at all. They said it was now fixed. But I’m still unsure.

Having reverted, my release is ‘April 2007′. If I use Check for
Updates I now see:

A newer version is available. (total size:  2.04 Mb)

30/04/2007 Update

1. (BUG) Export crashes when changing PAR in video encoder expert.
2. (BUG) MPEG Format Converter tool crashes for certain MPEG-2 TS
3. (BUG) Problem opening MPEG-2 PS files with invalid NV-Pack data.
4. (BUG) MBS Scanner hangs when scanning movies with PCM audio.

Q1: Why am I getting this if I already *have* the April edition?

Q2: Why am I not being offered the very *latest* version, i.e.
October? (I wouldn’t install it, of course, because of the bug I
described in my thread of 29 Nov, ‘Womble – black frames in output
monitor’ )

Q3: I did at least have my first ever automatic message when I started
the program this morning, helpfully informing me that there was an
update. So I tried it, expecting it would probably take me to the Oct
version again and that I’d have to re-install April (or maybe July).
But my version still shows April. (BTW, it would be sensible IMO if
Womble put a *day* in that Help|About message, not just the month.
There may be more than one release in a month.) So my question: is the
update actually working anyway?

All the above makes me suspect Womble still haven’t thoroughly tested
this. Could other Womble users check this out please?

Terry, East Grinstead, UK

posted by admin in Uncategorized and have Comments (2)

Computer Security Information and What You Can Do To Keep Your System Safe!

.:: Unix and Linux Hacking and Security ::.
1. Unix – Vulnerabilities and Advisories
— Tutorials and Papers
— Specific Exploits and Vulnerabilities

2. Unix – Security Tools
— Unix Security and Audit Tools (Including IDS and Access Control
— Unix Log Analysis Tools
— Unix Proxies, Firewalls and Accessories
— Unix Miscellany

3. Unix – BSD, FreeBSD, etc…
— FreeBSD
— BSD and Misc. BSD variants
— BSD Security Tools
— BSD Micro-distributions

4. Unix – Solaris, SunOS etc…
— Solaris
— SunOS
— Cobalt Appliances
— SunOS and Solaris Security Tools

5. Unix – Other Flavors (Irix, HPUX, AIX, etc…)
— SGI/Irix
— Miscellaneous

6. Linux – Vulnerabilities and Advisories
— Linux – General Hacking
— Linux Application Exploits
— Linux – Red Hat Specific
— Linux – Debian Specific

7. Linux – Security Tools
— Linux – Intrusion Detection
— Linux – Access Control
— Linux Log Analysis Tools
— Linux Rootkits
— Linux Proxies and Firewalls
— Linux – General Security and Audit Tools

8. Linux – Security-oriented mini- and micro-distributions
— DMZS-Biatchux
— NSA Security Enhanced Linux
— Linux Mini- and Micro-distributions
— Applications

.:: Windows Hacking and Security ::.
1. Windows Vulnerabilities, Advisories, and even security flaws
introduced by so-called security products!!!
— Microsoft IIS Vulnerabilities
— Microsoft FrontPage Vulnerabilities
— Microsoft Internet Explorer Vulnerabilities
— Windows Application Vulnerabilities
— Windows Internet/Networking Vulnerabilities
— Insecurities introduced by "security" programs!
— Netscape Browsers
— Windows Hacks – Miscellaneous

2. Windows Security and Auditing Tools
— Windows Registry Tools
— Windows and MSDOS Security and Auditing Tools
— Windows Local Security
— File/Disk/Log Shredders

3. Windows Miscellany
— Raw Sockets and Custom Packet Building
— A Few Little Extras for Microsoft "Fans"

.:: Crypto, Virology, Cracking and Backdoors ::.
1. Cryptography, Cryptanalysis, Steganography
— Crypto: PGP and GPG
— Crypto: Cryptanalysis
— Crypto: Steganography
— Crypto: Miscellaneous
— Misc. File Encryptors

2. About Viruses and Worms
— Virus Info Files and Advisories
— Worms
— Virus/Worm Protection Utilities

3. Backdoors, Trojans and defenses
— Back Orifice and BO2K
— SubSeven and Addons
— Other Remote Administration Tools
— Trojan Detectors/Removers/Retaliators
— Information Files

.:: Learn what Hackers know, how they do it, and what you can do to
keep your system safe ::.
1. General Hacking Information
— General Security Concepts
— Antique Systems
— Oracle
— Tools, Advisories and Exploits affecting multiple platforms
— PC Software and BIOS Hacking
— Truly Miscellaneous Hacking Info

2. Password Security
— Password Hacking
— Password Generators
— Password Security Audit Programs
— Word Lists

3. Scanning, Fingerprinting and similar techniques
— Network Scanning
— "Wargames" Modem Carrier Scanning
— Fingerprinting
— Sniffing

4. How Hackers Attack Numerous Internet Services
— Denial of Service Attacks
— Email and News
— Proxies and IP Spoofing
— DNS and BIND
— General Unsorted Information
— Indispensible Internet Utilities
— Cable and DSL Info and Hacking

5. How Hackers Attack Web Servers, CGIs, PHP, ASP, etc…
— Web Site Hacking – General and Miscellaneous
— Web Site Hacking – Specific Sites
— Web Site Hacking – Servers
— Web Site Hacking – CGI, Perl, ASP, PHP etc.
— Web BBSes
— Web Site Hacking – Audit Tools

6. How Hackers attack IRC, Instant Messaging, and Multiplayer Games
— ICQ Hacking
— IRC Hacking, Scripts and Bots
— AOL Instant Messenger (AIM)
— Miscellaneous Chat/gaming Systems

7. Vulnerabilities found in Platforms with Smaller Market Share
— Macintosh
— PalmOS
— Printers
— Dedicated Network Appliances, Hubs, Routers, etc…
— Cisco Equipment
— Miscellaneous

8. How Hackers Attack Novell and 802.11b Networks
— Novell Networks
— Wireless LANs
— X.25 Networks
— Miscellaneous Networking Information

.:: Computer Security Information ::.
— Access Control
— Basics
— Chat Systems
— Cryptography
— Denial Of Service
— Hacking Security Groups
— Hardening Securing Papers
— Intrusion Detection Systems
— Miscellaneous
— Network Auditing Secuirty Penetration
— Online Privacy
— Operating Systems
— Protocols

.:: Phreaking – The black art of telephony ::.
1. GENERAL – General Information About the Phone Company
— Hacking Answering Machines and Voice Mail
— Phreaking Programs

2. Electronic Toll Fraud and Other Phone Devices
— The Fixer’s Box Review – Read this before you read the rest of
these files!
— Blue and Green Boxes
— Red Box
— Beige and Bridge Boxes
— Various new boxes
— Programs to generate phreak tones

3. All about Payphones, COCOTs, BOCOTs, etc…
— Payphones
— Nortel/Quortech Millennium
— Smart Cards/Phone Cards

4. Cellular Telephones and the Hacking Thereof
— Cellular Phones by Manufacturer
— Miscellaneous Info
— Miscellaneous Utilities

5. Caller ID and ANI
— Caller ID and CLASS
— ANI and ANAC

6. Scans, numbers of interest
— Lists of Phone Numbers

7. Sounds from the phone system
— SIT Tones are said to thwart predictive dialers used by

.:: Security Publications ::.
— Computer Incident Advisory Capability
— Call And Response Telephone Compilations
— Forbidden Knowledge
— Keen Veracity
— Lexxicor
— Midnight Hackers Private Club
— Phrack
— Risks Forum Digest
— Tricks Of The Trade
— Underground Periodical

.:: Law, Privacy, Wetware, Hardware, File Sharing and more ::.
1. HARDWARE – Hardware, Electronics, Radio etc.
— Bugs and Listening Devices
— Miscellaneous

2. Hackers and the Law
— Copyright Law and Cases
— Net Censorship
— Cases involving 2600 Magazine
— The SDMI affair
— Brian West
— September 11th Backlash Legislation
— General Legal Bufu

3. About Napster, Gnutella, and other File Sharing schemes

4. About your dwindling privacy
— Privacy Digest
— Internet Privacy
— Espionage
— Privacy Deprivation Tools

5. Wetware Hacking!
— Social Engineering and NLP
— Seduction
— Miscellaneous Wetware Hacking

6. Physical Security, Scams etc…
— Physical Security and Countersecurity
— Financial Crimes Detection and Prevention
— Vending Machine Hacking

.:: The standards that define the Internet ::.
1. RFCs – Internet RFCs 3094 to 3195
— Internet RFCs 3094 to 3195

2. Other Standards and Official Publications
— US Department of Energy CIAC-2300 Documents
— NIPC CyberNotes

— Thank You —


posted by admin in Uncategorized and have Comment (1)

MAGIX – English support site?

I recently bought MAGIX Movie Edit Pro 11 e-version (build
I’m having difficulty finding the online tutorials after clicking
Help|Online Tutorials. And so far I’ve not found an english language
support page or contact route. Anyone able to point me in the right
direction please?

Terry, East Grinstead, UK

posted by admin in Uncategorized and have Comments (10)

Professional Video Commercials for YouTube and your site created in one day!

Get Noticed, and Sell More Products with a High Impact ONEDAYVIDEO
custom video!  Use them on your website, YouTube and any other video
sharing site.

Don’t spend big bucks and wait weeks for a professional video
commercial to be created for you, your company or business.
ONEDAYVIDEOS can create a very professional video for a fraction of
what you wll pay at design studios. You can use these video
commercials to market your products and services on YouTube(R), other
video sharing sites or on your own website.

Online Video is hot and getting hotter by the day! Now you can create
a professional image for your company or product in 24 hours!

posted by admin in Uncategorized and have No Comments

Redhat Linux Network Security

Redhat Linux Network Security

Covering everything about security would take several volumes of
books, so we can only look at the basics. We can take a quick look at
the primary defenses you need in order to protect yourself from
unauthorized access through telephone lines (modems), as well as some
aspects of network connections. We won’t bother with complex solutions
that are difficult to implement because they can require a
considerable amount of knowledge and they apply only to specific

Instead, we can look at the basic methods of buttoning up your Linux
system, most of which are downright simple and effective. Many system
administrators either don’t know what is necessary to protect a system
from unauthorized access, or they have discounted the chances of a
break-in happening to them. It happens with alarming frequency, so
take the industry’s advice: Don’t take chances. Protect your system.

Weak Passwords

Believe it or not, the most common access method of breaking into a
system through a network, over a modem connection, or sitting in front
of a terminal is through weak passwords. Weak (which means easily
guessable) passwords are very common. When these are used by system
users, even the best security systems can’t protect against intrusion.

If you’re managing a system that has several users, you should
implement a policy requiring users to set their passwords at regular
intervals (usually six to eight weeks is a good idea), and to use non-
English words. The best passwords are combinations of letters and
numbers that are not in the dictionary.

Sometimes, though, having a policy against weak passwords isn’t
enough. You might want to consider forcing stronger password usage by
using public domain or commercial software that checks potential
passwords for susceptibility. These packages are often available in
source code, so they can be compiled for Linux without a problem.

File Security

Security begins at the file permission level and should be carried out
carefully. Whether you want to protect a file from snooping by an
unauthorized invader or another user, you should carefully set your
umask (file creation mask) to set your files for maximum security.

Of course, this is really only important if you have more than one
user on the system or have to consider hiding information from certain
users. However, if you are on a system with several users, consider
forcing umask settings for everyone and set read-and-write permissions
only for the user, and no permissions for everyone else. This is as
good as you can get with file security.

For very sensitive files (such as accounting or employee information),
consider encrypting them with a simple utility. There are many such
programs available. Most require only a password to trigger the
encryption or decryption.

More information visit

posted by admin in Uncategorized and have No Comments

optimizing video upload for youtube; conflicting info?

While searching the web for this topic, I found many different

For encoding, youtube says to use divx or xvid, some others says to use
ffmpegx, mencoder, quicktime, …

For resolution, youtube suggests 640 x 480, others suggest 320 x 240, and
some other non standard resolution.

Some says flv files can pass through without being re-compressed by youtube,
some says youtube re-compresses everything.

Is there a site that maintains the latest correct info?

posted by admin in Uncategorized and have Comments (10)