Matches: 70 Displayed: 20
- Local Information > Africa > Mali
- Local Information > Mali > Mali
- Local Information > Africa > Mali > 2013
- Malicious Software Removal Tool (MSRT) (Microsoft.com)
"The Microsoft Windows Malicious Software Removal Tool checks computers running Windows XP, Windows 2000, and Windows Server 2003 for infections by specific, prevalent malicious software—including Blaster, Sasser, and Mydoom—and helps remove any infection found." 04-06
- -06-17-07 Interview With Iraq's Prime Minister Maliki (MSNBC News)
"In a candid interview, Iraqi Prime Minister Nuri al-Maliki talks about his struggles, relationship with President Bush and nation's future." 06-07
- -05-20-08 Senator Edward Kennedy Has a Malignant Brain Tumor (Time.com)
"Doctors for the Massachusetts Democrat say tests conducted after Kennedy suffered a seizure this weekend show a tumor in his left parietal lobe. His treatment will be decided after more tests but the usual course includes combinations of radiation and chemotherapy." News coverage suggests that his prognosis is poor for the type of cancer involved. 05-08
- -05-20-08 Senator Edward Kennedy Has a Malignant Brain Tumor (MSNBC News)
" 'Our thoughts and prayers go out to his family and to him,' said McCain."
" 'I have described Ted Kennedy as the last lion in the Senate. And I have held that view because he remains the single most effective member of the Senate.' " 05-08
- -12-05-08 Malia Obama to Use Lincoln's Desk (ABC News)
"Malia Obama, the 10-year-old daughter of President-elect Obama, plans to make herself right at home in the White House and has already called dibs on using Abraham Lincoln's desk for her homework." 12-08
- -01-28-13 Why Islamists Are Destroying Mali's Cultural Heritage (Time.com)
"In the puritanical strain of Islam adhered to by Ansar Dine (and the Taliban), veneration of Sufi saints counts as idolatry, a heretical practice that cannot be tolerated. Militants bearing guns, pickaxes and shovels reduced to rubble the tomb of Sidi Mahmoud, who died in 955 A.D. They have also knocked down tombs of two other prominent medieval saints, Sidi Moctar and Alpha Moya. One Ansar Dine spokesman told the BBC that they plan to destroy every single Sufi shrine in the city, 'without exception'.”
"International outrage has been swift. UNESCO, which designates some of Timbuktu’s mosques and tombs as World Heritage sites, has desperately urged an end to the campaign of destruction." 01-13
- Mali (Dinar)
- Mali (Geographia.com)
Provides information on the land, history, and people. 7-02
- Dogs - Herding Group (Planet-Pets.com)
Provides descriptions and pictures of the Australian Cattle Dog, Bearded Collie, Belgian Malinois, Belgian Sheepdog, Belgian Tervuren, Border Collie, Bouvier des Flandres, Briard, Collie, German Shepherd, Old English Sheepdog, Puli, Shetland Sheepdog , Welsh Corgi Cardigan, and Welsh Corgi Pembroke. 06-07
- Rulers by Country - J-O (Schulz)
Provides a list of leaders by country and date. Jamaica, Japan, Jordan, Kasakhstan, Kenya, Kiribati, Korea (Democratic People´s Republic), Korea (Republic), Kuwait, Kyrgyzstan, Laos, Latvia, Lebanon, Lesotho, Liberia, Libya, Liechtenstein, Lithuania, Luxembourg, Macedonia, Madagascar, Malawi, Malaysia, Maledives, Mali, Malta, Marshal Islands, Mauritania, Mauritius, Mexico, Micronesia, Moldova, Monaco, Mongolia, Morocco, Mozambique, Myanmar (Burma), Namibia, Nauru, Nepal, Netherlands, New Zealand, Nicaragua, Niger, Nigeria, Norway, and Oman. leaders, rulers, Presidents, and Prime Ministers 9-00
- -Nations of Native Americans M - P (NativeWeb)
Includes Maasai, Makah, Maliseet, Maori, Mapuche, Mattaponi, Maya, Mechoopda, Menominee, Metis, Mi'kmaw, MicMac, Mingo, Miskitu, Miwok, Mixteca, Mlabri, Mohave, Mohawk, Mohegan, Mohican, Monacan, Montaukett, Muscogee, Nanticokes, Narragansett, Nasion Chamoru, Naticoke, Navajo, Nez Perce, Ngarrindjeri, Nipmuc, Nisga'a, Nungas (Australia), Odawa, Ogoni, Ohiyesa, Ohlone, Ojibwe, Okmulgee (Creek), Omaha, Oneida, Onondaga, Osage, Paiute, Palong, Passamaquoddy, Pawnee, Pehuenche, Penobscot, Pequot, Pima, Piscataway, Pocomoke, Pocumtuck, Pomo, Ponca, Potawatomi, Powhatan, Pueblo, and Puyallup.
- Perrun Virus Attacks Pictures (PCMag.com)
"A new computer virus is the first ever to infect picture files, an anti-virus firm reported Thursday, making sharing family photos on the Internet a potentially dangerous activity." "The virus, dubbed Perrun, is not currently infecting computers but worries anti-virus experts because it is the first to cross from program infection into data files, long considered safe from malicious data." 6-02
- Algonquian Language Family (Native-Language.org)
Includes Eastern Algonquian Languages: Abenaki-Penobscot (Dialects: Abenaki and Penobscot), Maliseet-Passamaquoddy (Dialects: Maliseet and Passamaquoddy), Mi'kmaq (Micmac), Lenape Languages: Delaware (Lenape), Munsee Delaware, and Nanticoke, Mohican Languages: Mahican (Mohican/Stockbridge), Mohegan, Narragansett, and Wampanoag (Massachusett).
Central Algonquian Languages: Cree Languages, Attikamekw (Tete de Boule), Cree, Michif (Cree-French creole), Montagnais Innu, and Naskapi Innu. Ojibwa Languages: Algonkin (Algonquin), Ojibwe (Chippewa, Ojibwa, Ojibway, Anishinabemowin), and Ottawa (Odawa). Kickapoo, Menominee, Mesquakie-Sauk (Sac and Fox), Miami-Illinois, Potawatomi, and Shawnee.
Plains Algonquian Languages: Arapaho Languages: Arapaho and Gros Ventre (Atsina). Blackfoot (Siksika, Peigan, Blackfeet), and Cheyenne.
California Algic (Ritwan) Languages: Wiyot and Yurok.
Lost/Unattested/Uncertain Algonquian Remnant Languages: Beothuk, Etchemin, Loup A/Loup B, Lumbee (Croatan, Pamlico), and Powhatan. 11-03
- Editorial: Verified Paper Ballots Essential for Audits (VoteTrustUSA.org - Schade and Zeese)
"The bad news is that a corporate conflict of interest of a member of the Commission raises doubts that they will recommend the common sense solution – voter verified paper ballots."
"With regard to the counting of votes, people are concerned about paperless electronic voting because it provides no independent record for audits or recounts. The machines have been shown to be a high security risk by insiders who can put undetectable malicious code in the software, by election officials who have access to the machines and by outside hackers – all of these people can change the outcome of an election. And, of course, all Americans know computers make mistakes. For example, computers freezing and crashing are experiences we have all had – it is also an experience that election administrators have seen with the use of computers in elections."
"Bill Gardner, the New Hampshire Secretary of State, unlike many election administrators, has come to learn that recounts are an important part of ensuring credibility of an election outcome. He makes the point that a successful election is when the losing candidate, and his or her supporters, are confident that the result was accurate. The capability of conducting a transparent hand recount of paper ballots in public with the media and all interested parties watching, is critical to achieving that goal."
"Other election administrators like Linda Lamone of Maryland, believe the false claim that paperless DRE machines allow for a recount. In fact all they allow for is recounting the record created by the computer. When machines make an error recording the vote the recount will merely repeat that error." 5-05
- Security Standards for Elections Hardware and Software (SIMS)
"Voting systems shall deploy protection against the many forms of threats to which they may be exposed such as file and macro viruses, worms, Trojan horses, and logic bombs. Vendors shall develop and document the procedures to be followed to ensure that such protection is maintained in a current status."
Editor's Note: No test or assessment was included in the standards to preclude software or firmware with malicious code embedded from the vendor, one of the most likely possible sources of election mischief or fraud. 5-05
- 08-15-05 Study of e-Voting Funded (Berkeley.edu)
"Researchers at the University of California, Berkeley, will join colleagues at five institutions nationwide in a bold, new effort to improve the reliability and trustworthiness of electronic voting technology."
" 'We'll look into ways of making the innards of the machine more trustworthy,' said David Wagner, UC Berkeley assistant professor of computer sciences and co-principal investigator of the center. 'This could range from building software that would make it hard for somebody to insert malicious logic without detection to building machines that include components from multiple vendors so the system can cross check itself.' " 8-05
- CIA Operates Secret Prisons (CNN News)
"Human rights groups have criticized the practice of 'rendition,' in which the CIA purportedly has been allowed to secretly transfer terrorist suspects overseas for interrogation."
"Human Rights Watch spokesman Tom Malinowsky said the practice of holding suspects incommunicado in secret facilities has done 'enormous damage' to the reputation of the United States without producing useful intelligence."
"If true, the arrangement suggests U.S. agents are engaged in activities 'that under U.S. law and in U.S. territory and by U.S. personnel would be clearly illegal,' said former U.S. Rep. Bob Barr, who was once a federal prosecutor."
"In October the Senate voted 90-9 to require American troops to follow interrogation standards set in the Army Field Manual and barred 'cruel, inhuman and degrading treatment' of prisoners in U.S. custody."
"The provision was not included in a House bill, and the White House has threatened to veto a $440 billion Pentagon spending bill if the measure is part of the final legislation."
"The administration says existing law already prohibits the mistreatment of prisoners in American custody and the amendment would restrict Bush's power as commander-in-chief."
Editor's Note: Huh? 11-05
- Dalai Lama Meets With Muslims (CBS News)
"The Dalai Lama urged religious leaders Saturday to reach out to Muslims, saying Islam is a compassionate faith that has been unfairly maligned because of a few extremists." 05-09
- Trojan Horses Definition (Wikipedia.org)
"In the context of computer software, a Trojan horse is a malicious program that is disguised as legitimate software. The term is derived from the classical myth of the Trojan Horse. They may look useful or interesting (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed." 04-06