What is up, everyone! It's Brian here, ramenadventures.com,
Yummy Japan.
And I'm here with the man itself.
Mr.Shono, ramen creator.
Hi, everyone. My name is Shono and I'm a ramen creator.
This is my new shop in Gokokuji.
Today, we are gonna make Takeoka style ramen from Chiba prefecture! So enjoy!
So we are gonna make a simple ramen here.
Something you can make at home.
His normal ramen, you can't make it at home. It's tough.
But this one, yeah!
These are... No problem.
I don't have this in my home but I can get it.
Do you have this in America?
Yeah, it's a big green onion.
I've used leak at my ramen shop in America
but it has a different smell from the one of green onion.
So green onion is better.
Alright, Shono san, what's the first step?
Okay, first , let's make chashu and tare.
These are ingredients you need.
Pork belly
Garlic
Green onion
We are gonna boil them with tare made with soy sauce.
Let's cut the ingredients.
Cut the green onion into 10cm size.
I've already peeled the garlic.
And for tare, we need Honmirin, sake and soy sauce.
This has stronger taste. It's called Tamari joyu.
Tamari soy sauce is pure soy beans.
There's no flour in it.
The color is really dark.
Nihonshu! (Sake)
Oh, don't drink!
Okay, let's cut the pork.
Cut into 3 pieces.
Let's put the ingredients in the pot.
Green onion
Garlic
Tamari soy sauce
It's darker than normal soy sauce, right?
And put sake and
honmirin.
For 2 hours at low heat.
As it being boiled, the flavors of green onion and pork come out.
And we will use the sauce as tare for ramen.
So this is 2 hours later.
Tare is ready to go. Chashu is looking good.
Let's cut the onion for topping.
I'm gonna soak them in water
to get rid of the bite.
Now, let's cut the chashu.
Oh my god.
Yes!
So this way?
Yes!
Okay!
Please cut into 5 pieces.
5 pieces?
Yes!
Good job!
You messed up but it's okay.
Beautiful!
This is not beautiful.
You can eat this.
WHOOOO! The fat!
We boiled it for only 2hours so it still has the sweetness of the meat inside.
Let's take out the onion from the water. And the topping is ready.
Okay, it's easy.
What's this?
This is oil, chicken oil.
This is chiyu, right?
Chiyu, yes!
Chiyu is chicken oil.
You can get chicken oil at a lot of Asian markets.
Or it's called schmaltz. Look for schmaltz at your local deli.
Let's strain out the tare and put it in the bowl here.
I'm gonna strain it out.
Yeah, strain it out.
This is tare for ramen.
We'll use this and oil.
So right, we've got the basic of all ramen, right?
5 elements?
Yes!
Toppings.
Okay, we've got topping.
Soup.
-Noodles. -Noodles, we've got them.
Oil.
We've got the oil.
And Tare.
Tare, yes
That's it! That's the philosophy.
Okay, now let's boil the noodles.
We are gonna use the instant noodles.
Are you sure it's gonna be okay?
Yeah, it's okay.
This is the traditional style of ramen in Chiba prefecture.
Do you know the shop called Umenoya?
Yeah!
They use the same type of noodles.
So we are gonna use this today.
Yeah, the chashu looks like one in Umenoya.
Yeah, it does.
Okay, let's boil the noodles.
About 2 minutes.
While the noodles are being boiled, let's put the tare and oil in a bowl.
In 2 minutes, right?
Let's put the tare and oil in a bowl.
Okay!
Tare is 80ml.
The oil is 30ml.
Please fulfill the ladle.
No!
More!
It's more tare than normal ramen right?
Yeah, that's a lot.
This is Takeoka style ramen.
That's a lot of tare.
Great!
I minced one piece of garlic.
Please put it in the bowl.
And the soup.
The soup is 200ml.
Even 1 ml makes a big difference.
Great!
Oh no, it's dripping.
Okay, just put it in the bowl.
Please add a little bit later.
I'm gonna add a little bit.
Even 1 ml makes a big difference.
I know.
Now the soup and noodles are ready.
And what else?
Make it pretty.
Hold it up like this and fold it.
Okay, now let's put the chashu.
Please try to make it beautiful.
More, more, more.
Yeah, 5 pieces.
5?
Yeah!
Great!
Let's put the minced onion.
And the green onion from Kyoyo. (It's called Kujo negi)
And for last , let's sprinkle some ground pepper.
Okay, it's done!
Beautiful.
It's great, man.
It's finished.
Itadakimasu.
Whooo!
Whooo!
How is it?
Even though the noodles are instant kind, they really soak up the super strong soup,
the super strong seasoning.
Wow!
Is it good?
Nice! Try it.
Wow!
It's so good.
Very tasty.
I try the soup.
Ohhhh!
Whooo!
It's really good.
I might just make the chashu.
Very nice.
Alright, so, awesome! We made a simple ramen here from ramen creator, Shono-san.
What do you think? Did you like this recipe?
Do you wanna see more recipes like this, leave us a comment down below.
And let us know. What style, what kind of topping do you wanna see?
What sort of stuff do you wanna know?
Shono san here is going to teach us. The guy is genius.
He is here at our disposal.
So let us know what you wanna see!
Please ask me anytime :)
Looking forward to seeing you guys soon!
For more infomation >> How to Make Ramen Like a Pro at Home Feat. Mr. Shono from MENSHO - Duration: 8:20.-------------------------------------------
PROVANDO SALGADINHOS DO BRASIL feat OneWorld2Hearts / BRAZILIAN SNACKS - Duration: 7:11.
-------------------------------------------
Alexa 101 - The Basics of Amazon's Voice Assistant - Duration: 5:07.
-------------------------------------------
DARPA Vader and the Evil Intel Empire Inside - Duration: 33:05.
DARPA
Vader and the Evil Intel Empire Inside.
By the Anonymous Patriots.
One of the best ways to describe the U.S. Department of Defense and DARPA (Defense Advanced
Research Projects Agency) is to use the Star Wars moniker �Evil Empire� to describe
its international, secretive agenda to take over the world and turn all of us into neo-feudal
slaves who have no choice but to give allegiance to the controllers of the universe�Darth
Vader and the Sith Lords.
DARPA �Vader� has controlled technological innovation since 1958 when it was created
by the military-driven Evil Empire, a/k/a Department of Defense. Every emerging technology
from the Evil Empire leads humanity into the science fiction fate of machines controlling
humans, much like Darth Vader became a weapon that was half man and half machine. There
is much wisdom and truth that lies behind the first Star Wars movie, and its story was
given to humanity as a warning of how the Evil Empire and its Death Star planned to
destroy the entire planet.
Folks, this is no longer science fiction. This battle for Earth is going on now and
we, like the Rebel Alliance, must join forces to destroy the imperial forces of Darth Vader.
Aside: Do you know the real back story of Star Wars? If not, see Star Wars: The Secret
Weapon and Why George Lucas has Kept It Hidden.
Folks at the DoD should read science fiction so that they can see how their actions�individually
and collectively�are leading humanity into the evil destiny commonly found in sci-fi:
robot wars, cyborgs turning against humans, computer take-over of the world, endless weapons,
and, you guessed it � the Death Star. DARPA is the father of war-fighting, both conventional
and digital. And as we all know, Darth Vader took his orders from the Evil Emperor. DARPA
Vader is controlled by a man they called �Yoda,� but is in reality the Evil Emperor who leads
a group called the Highlands Forum (Evil Empire Imperial Command) that directs all military
research and development.
Who is this Evil Emperor who looks as innocent as Yoda? His name is Andrew Marshall and for
decades this single man has driven the Highland Forum (Evil Empire) into creating weapons
of every sort that have been released into the corporate world and now control your laptop,
phone, computer, and every other device with a microprocessor inside � especially the
�Evil Intel Empire Inside.�
Intel Inside is found in our private digital devices and is, in fact, collecting �Intelligence�
for the Department of Defense, CIA, and NSA who are all members of the Evil Empire. Yes,
the one they call �Yoda� is actually the Evil Emperor in disguise who controls DARPA
Vader and the evil Sith lords of war. He does not have lightning bolts shooting out of his
fingers � unless of course he uses one of his many DARPA inventions to do so.
Andrew Marshall: Former Head of the Highlands Forum
The Evil Emperor, as we call Andrew Marshall, was the director of the United States Department
of Defense�s Office of Net Assessment from 1973 to 2015. He was appointed by Richard
Nixon and remained in office during all successive administrations that followed until his retirement
on January 2, 2015. Marshall created the Highlands Forum as a secret think tank for warfare innovation.
All meetings are invitation only and not open to the public and no written records are kept.
Marshall created this type of secret platform so that no one could prove the Highland Forum
exists or has the greatest power over tech warfare on the planet.
DARPA and the Highlands Forum have essentially taken over the world and few people have noticed.
From creating the devices that control all nuclear weapons to incubating the technologies
that created the Internet (originally ARPANET), Intel microprocessors, Cisco routers, Google
search engines, Facebook, the Internet of Things, I-phones, Microsoft software, MacAfee
security software, and all conventional and digital warfare devices, among many others.
The Highlands Forum has been the headquarters of the Evil Imperial Empire for five decades.
The Evil Emperor Andrew Marshall has the blood of millions on his hands and yet he is considered
an America hero instead of a warlord criminal.
There�s an Intel Inside
To be truthful, this ad should read:
Intel �LOOKS� Inside
Ever wonder why Intel used to run those warm fuzzy ads letting us know that there was an
�Intel Inside,� as if we had a choice of what microprocessor was inside our computer?
They had a monopoly on microprocessors for decades and certainly end-use consumers didn�t
have a choice of what components were inside their computers. Why would Intel spend money
on ads to make us feel good about Intel? For goodness sake, it is just a microchip in your
computer.
Key Point: What if we were to tell you that inside every Intel microprocessors is a smaller
processor that lets the Sith Lords at Intel � who work for the Department of Defense
�control every aspect of your computer remotely no matter what encryption codes you use.
Yes, the Evil Emperor (Andrew Marshall) was able to retire two years ago at age 94 knowing
that the Empire�s control has reached into every digital device in the world through
the good work of his best student, DARPA Vader. The only thing left for the Evil Emperor to
do is activate the Death Star, which as you will see in the DARPA �future plans� below,
has already been built. The question is: �Will Luke Skywalker show up and defeat the Evil
Empire?�
Intel-Based PC�s Permanently Hackable
To be truthful, this ad should read:
Intel �Controllers� of Tomorrow
All Intel microprocessor chips have a built-in backdoor that allows complete remote access
to a PC, your PC, through a second physical processor embedded within the main processor
which has its own operating system embedded on the chip. It is being advertised as something
that will allow IT professionals the ability to remotely troubleshoot a PC. Intel�s latest
x86 chips contain a secret backdoor with an embedded subsystem called the Management Engine
(ME) that functions as a separate CPU and cannot be disabled, and the code is proprietary.
The Management Engine is a dedicated micro-controller on all recent Intel platforms. The first versions
were included in the network card and later moved into the chipset where it shares flash
with the BIOS but is completely independent of the CPU. It allows IT professionals to
view the contents of hard drives, check the memory, hunt for problems on a machine remotely,
or take over the system entirely.
Even an encrypted hard drive can be monitored and controlled by the �processor within
the processor� that already has your encryption key. There is more than just the NSA monitoring
your calls, emails, and transmissions � there is Intel (DARPA) �Inside� your computer.
Intel collects �intelligence� but it also provides a backdoor to control, or turn off
your computer at will just like it has been demonstrated that Cisco routers have a backdoor
open to the NSA. A backdoor is a method of bypassing normal authentication in a cryptosystem
used for securing unauthorized remote access to a computer.
Key Point: The word Intel was used for this DARPA product because it is collecting personal
INTELLIGENCE from YOU that can be used against YOU anytime the Evil Empire decides it is
to be done.
Why does DARPA, through Intel, have open access to all of your files and your computer? DARPA
funded all of the original development of microprocessors. Intel is a front for DARPA
and the military efforts to create, control, and weaponize all digital platforms through
cyber-warfare. DARPA, ARPARNET, DARPANET, the Internet, and microprocessors are military
creations that were allowed to come into the public market place only after the Department
of Defense, and the CIA through In-Q-Tel, installed backdoors to control these powerful
digital platforms of war fighting.
Some European-made chips used in defense contracts have a built-in �kill switch� that can
be accessed remotely to disable a microprocessor remotely on weapons that use the chip. The
Pentagon has realized that it no longer controls who manufactures the chips that go into its
increasingly complex systems. Nearly every military system today contains some commercial
hardware. No entity, no matter how well funded, can afford to manufacture its own safe version
of every chip in every piece of equipment.
Vetting a chip is nearly impossible and requires a scanning electron microscope to examine
the many layers of a chip and the millions or billions of transistors. Semiconductor
chips are made in Singapore, Taiwan, China, Europe, but Intel designs and manufactures
all their own chips in their own fabrication plants in America.
Defense Science Board, which advises the DoD on science and technology developments, warned
in a report that the continuing shift to overseas chip fabrication would expose the Pentagon�s
most mission-critical integrated circuits to sabotage. The board was especially alarmed
that no existing tests could detect such compromised chips, which led to the formation of the DARPA
Trust in IC program. Each year, secure government computer networks weather thousands of attacks
over the Internet from places where most of our electronics are being manufactured. Any
malefactor who can penetrate government security can find out what chips are being ordered
by the DoD and then target them for sabotage.
In other words, DARPA Vader and the Evil Emperor are in open warfare with the rebellion that
has hi-jacked the microprocessing industry in the infiltrated the Imperial Command.
Calling on Rebels of the Alliance to Take Out the Real Death Star
Fellow Patriots and Rebels of the Alliance, we have taken the plans of the Galactic Empire�s
Death Star and trust that you will know what to do with this Intel. Rebels have been preparing
themselves since 1977, when the first Star Wars was released, to face the real Evil Empire,
Darth Vadar, the Sith Lords, and the Imperial Command. This is no longer a science fiction
fantasy or sequel to the next Star Wars. This is the real war and all Rebels of the Alliance
are called to save the galaxy, or at least western civilization.
A Citizens Intelligence Report was previously given in a recent article. If you have not
armed yourself with this intelligence, please do so now. The CIA and Deep State Exposed.
We need all Alliance Rebels to analyze the Death Star�s plans and identify vulnerable
exhaust ports that connect to the main reactor.
In this additional intelligence report to fellow Alliance Rebels, we will show you the
following to assist in your planning efforts in analyzing the Death Star:
Microprocessors, the Internet, Cisco Systems, Google, and Intel were all DARPA projects
that were allowed to flourish with new technologies created and funded by the military for cyberwarfare.
Most high-tech moguls are simply �front men� selling DARPA and In-Q-Tel (the CIA�s
DARPA) products that control our lives and spy on us continually.
Intel processors have a backdoor built into the microprocessor that allows complete monitoring
and control over your personal computer.
Cisco Systems is a front for DARPA routers that were created with a backdoor for the
NSA to spy on �virtually every exchange on the Internet.�
Cisco System�s �Internet of Things� plants net-bots in all devices under its control
that can be activated remotely and used for cyber-attacks.
The Internet was first a DARPA project called the ARPANET which was created as an information
technology weapon for cyberwarfare.
DARPA, the Inventors of Warfare Technology
In 1999, the CIA created its own venture capital investment firm, In-Q-Tel, to fund promising
start-ups that might create technologies useful for intelligence agencies just as the Department
of Defense had years earlier created DARPA. Both groups are controlled by the Highlands
Forum (Group). The Highlands Forum provides the ideas and funding for the scientific weaponization
of new inventions through cooperation between the military and corporate contractors. Its
biggest successes recently have been led by the CIA�s In-Q-Tel in the development of
high-tech network-based cyber-warfare.
In-Q-Tel contracts almost all of its work through SAIC (Science Applications International
Corporation) which changed its name to Leidos in 2013. Leidos is among the top 10 largest
defense contractors in the U. S. and has a symbiotic relationship with the NSA and U.
S. intelligence agencies.
The Highland Forum, DARPA, and In-Q-Tel are secret multi-national high-tech think tanks
for inventing and controlling innovations that can be turned into weapons. Military
and information technology experts gather at the Forum meetings to consider the impacts
of the globalization of IT on U. S. interests and warfare. The Forum developed the idea
of �network-centric warfare� which is now a top concern of the military and the
corporations that serve it.
DARPANET = Internet
In 1973, DARPA initiated a research program to investigate techniques and technologies
for interlinking packet networks of various kinds. The objective was to develop communication
protocols which would allow networked computers to communicate transparently across multiple,
linked packet networks for the use of defense contractors. This was called the �Internetting
Project� and the system of networks which emerged from the research was known as ARPANET,
later to be called Internet.
In 1986, the U.S. National Science Foundation (NSF) initiated the development of the NSFNET
which, today, provides a major backbone communication service for the Internet. The National Aeronautics
and Space Administration (NASA) and the U.S. Department of Energy contributed additional
backbone facilities in the form of the NSINET and ESNET respectively. Thus, the electronic
connectivity of the Internet was advanced with government funding.
A great deal of support for the Internet community has come from the U.S. Federal Government,
since the Internet was originally part of a federally-funded research program and, subsequently,
has become a major part of the U.S. research infrastructure.
Cisco Systems � DARPA Routers
Once the ARPANET proved to be effective, routers were created that could handle exchanges between
systems and computers. In 1998, virtually every Internet exchange went through a Cisco
router. In 2010, a researcher at IBM publicly revealed a flaw in a Cisco operating system
that allows a hacker to use a backdoor that was supposed to be available only to law enforcement
agencies. The intruder could hi-jack the Cisco device and use it to spy on all communications
passing through it, including the content of e-mails, leaving products vulnerable to
attack, particularly ubiquitous software programs like those produced by Microsoft. These backdoors
put millions of customers and their private information at risk and jeopardizes the security
of electrical power facilities, public utilities, and transportation systems.
Cisco has been accused of remotely monitoring users� connections through Cisco�s Linksys
E2700, E3500, E4500 devices. They have been reported to be remotely updated to a firmware
version that forces users to register for a cloud service which allows Cisco to monitor
their network use and ultimately shut down the cloud service account and render the affected
router unusable.
Cisco has also been accused of building into their routers a firewall backdoor developed
by NSA. The Tailored Access Operations (TAO) unit and other NSA employees intercept servers,
routers and other network gear being shipped to organizations targeted for surveillance
and install covert firmware onto them before they�re delivered. These Trojan horse systems
were described by an NSA manager as being �some of the most productive operations
in TAO because they pre-position access points into hard target networks around the world.�
The Creation of DARPA�s Google
The United States intelligence community funded, nurtured and incubated Google as a military
weapon to control information. Seed-funded by the NSA (DARPA) and CIA (In-Q-Tel & SAIC),
Google was one among a group of private sector start-ups co-opted by U.S. intelligence to
control information warfare.
In 1994 (the same year the Highlands Forum �DARPA�s boss � was founded under the
stewardship of the Office of the Secretary of Defense, the ONA, and DARPA) ?two PhD students
at Stanford University, Sergey Brin and Larry Page, made their breakthrough on the first
automated web crawling and page ranking application. That application remains the core component
of what eventually became Google�s search service. Brin and Page had performed their
work with funding from the Digital Library Initiative (DLI), a multi-agency program of
the National Science Foundation (NSF), NASA and DARPA.
The NSA needed to control and monitor digital information, particularly the data flowing
over the Internet. With its millions of customers around the world, Google is effectively a
directory of people using the Internet. It stores users e-mail addresses and knows where
they�re physically located, when they log in, and what they search for on the web. Google
has a profile on every user. The government can �command� that any company must turn
over that information, and it does so as part of the NSA�s Prism program, which Google
had been participating in for years by the time it signed the cooperative agreement with
the NSA.
Under Google�s terms of service, the company advises its users that it may share their
personal information with outside organizations, including government agencies, in order to
�detect, prevent, or otherwise address fraud, security or technical issues� and to �protect
against harm to the rights, property or safety of Google.�
Intelligence Agencies Control Industry
No intelligence organization can survive if it doesn�t know its enemy. As expansive
as the NSA�s network of sensors is, it�s sometimes easier to get precise intelligence
about hacking campaigns from the targets themselves. That�s why the NSA partnered with Google.
Google�s Sergey Brin is just one of hundreds of CEOs who have been brought into the NSA�s
circle of secrecy. Starting in 2008, the agency began offering executives temporary security
clearances, some good for only one day, so they could sit in on classified threat briefings.
Private high-level meetings are just one way the NSA has forged alliances with corporations.
Several classified programs allow companies to share the designs of their products with
the agency so it can inspect them for flaws and, in some instances, install backdoors
or other forms of privileged access. The types of companies that have shown the NSA their
products include computer, server, and router manufacturers; makers of popular software
products, including Microsoft; Internet and e-mail service providers; telecommunications
companies; satellite manufacturers; antivirus and Internet security companies; and makers
of encryption algorithms.
The NSA helps the companies find weaknesses in their products. But it also pays the companies
not to fix some of them. Those weak spots give the agency an entry point for spying
or attacking foreign governments that install the products in their intelligence agencies,
their militaries, and their critical infrastructure. Microsoft, for instance, shares zero day vulnerabilities
in its products with the NSA before releasing a public alert or a software patch. McAfee,
the Internet security company owned by Intel, provides the NSA, the CIA, and the FBI with
network traffic flows, analysis of malware, and information about hacking trends.
Companies that promise to disclose holes in their products only to the spy agencies are
paid for their silence. To an extent, these openings for government surveillance are required
by law. Telecommunications companies in particular must build their equipment in such a way that
it can be tapped by a law enforcement agency presenting a court order. But when the NSA
is gathering intelligence abroad, it is not bound by the same laws. The surveillance it
conducts via backdoors and secret flaws in hardware and software would be illegal in
most of the countries where it occurs.
AT&T is Controlled by Homeland Security
The Homeland Security Department conducts meetings with companies through its �cross
sector working groups� initiative. These sessions are a chance for representatives
from the large group of companies with which the government shares intelligence to meet
with one another and hear from U.S. officials. The attendees at these meetings often have
security clearances and have undergone background checks and interviews. Between January 2010
and October 2013, the period for which public records are available, the government held
at least 168 meetings with companies just in the cross sector working group. There have
been hundreds more meetings broken out by specific industry categories, such as energy,
telecommunications, and transportation.
Through this exchange of intelligence, the government has created a cyber security business.
AT&T and CenturyLink are in effect its private sentries, selling protection to select corporations
and industries. AT&T has one of the longest histories of any company participating in
government surveillance. Most phone calls in the United States pass through AT&T equipment
at some point, regardless of which carrier initiates them. The company�s infrastructure
is one of the most important and frequently tapped repositories of electronic intelligence
for the NSA and U.S. law enforcement agencies.
CenturyLink, which has its headquarters in Monroe, Louisiana, has been a less familiar
name in intelligence circles over the years. In 2011, the company acquired Qwest Communications,
which is now a part of the NSA�s extended security apparatus.
DARPA�s History
DARPA�s history is littered with death and destruction. DARPA and In-Q-Tel, through the
Highlands Forum (Group), have driven research and development for the military that has
cost American taxpayers trillions. This same technology is also shared with countries throughout
the world through open source sharing. The U. S. military wants our enemies to have the
technology so that they can be spied upon with ever more sophisticated technology and
attacked with ever-better weapons.
Key Point: If both sides have the same technology and weapons, then the Military-Industrial
Complex always needs more money to spend on bigger and better weapons, continually.
Areas of focus and discovery for DARPA over its history include: NASA space projects,
information processing, ARPANET (Internet), ballistic missile defense, nuclear test detection,
counterinsurgency, computer processing, behavioral sciences, materials sciences, sensors, surveillance,
radar, infrared sensing, x-ray/gamma ray detection, global positioning satellites, information
processing, tactical technologies, time-sharing systems, wide-area packet switching networks,
packet radio networks, packet satellite networks, artificial intelligence, speech recognition,
signal processing, robotics, hypermedia systems, virtual reality, personal computing, space
technology, tactical armor, anti-armor programs, infrared sensing for space-based surveillance,
high-energy laser technology, antisubmarine warfare, advanced cruise missiles, advanced
aircraft, defense applications of advanced computing, integrated circuit research, submicrometer
electronic technology and electron devices, very large-scale integration, charged particle
beams, automatic target recognition, space based sensing, propulsion, aerospace planes,
hypersonic research, strategic computing, advanced processing, networking technologies,
lightweight satellites, interstellar travel, X-planes, computer security, and cyberwarfare,
to name a few that have come into the public domain.
The list above is only the tip of the iceberg for DARPA projects. We do not know of the
projects that are still classified, which could potentially be a much greater list.
Every project of DARPA and In-Q-Tel have been weaponized before they are shared with the
companies who then are the �front� for a DARPA sponsored company. DARPA and In-Q-Tel
keep the encryption codes and build in backdoors so that they can always attempt to control
the military weapons that have been released into the corporate world for public use.
Below is a list of DARPA projects on the drawing board, or at least the ones that we know about.
You might notice that the ideas are completely insane and only perpetuate continuous warfare.
Aircraft Carriers in the Sky: Using large manned aircraft to launch and recover small
UAVs
ACTUV: A project to build an unmanned anti-submarine warfare vessel
Adaptive Execution Office: Robust connections to the war-fighter community
Air Dominance Initiative: Sixth-generation jet fighters
Atlas: A humanoid robot
Battlefield Illusion
Captive Air Amphibious Transporter
Clean-Slate Design of Resilient, Adaptive, Secure Hosts (CRASH)
Cognitive Technology Threat Warning System
Collaborative Operations in Denied Environment: Modular software architecture for UAVs
Combat Zones That See: �Track everything that moves�
Computational Weapon Optic: Computer rifle scope
DARPA XG: Technology for Dynamic Spectrum Access for assured military communications
Experimental Spaceplane 1: First stage of a reusable space transport
Gremlins: Air-launched and recoverable UAVs
Ground X-Vehicle Technology
Fast Lightweight Autonomy: Software algorithms that enable UAVs to fly anywhere
High Energy Liquid Laser Area Defense System
High Productivity Computing Systems
Human Universal Load Carrier: Battery-powered human exoskeleton
Hydra: Undersea network of mobile unmanned sensors
Long Range Anti-Ship Missile
MAHEM: Molten penetrating munition
MEMS Exchange: Microelectromechanical Systems Implementation Environment
MeshWorm: An earthworm-like robot
Mind�s Eye: A visual intelligence system for detecting and analyzing activity from
video feeds
Near Zero Power RF and Sensor Operations
Next Generation Tactical Wearable Night Vision
One Shot: Sniper scope that automatically measures crosswind and range
Persistent Close Air Support
Phoenix: A satellite project with the aim to recycle retired satellite parts
Remote-controlled Insects
Satellite Remote Listening System: A satellite mounted system that can eavesdrop on a targeted
area
DARPA Silent Talk: Identify EEG patterns for words and transmit these for covert communications
System of Systems Integration Technology and Experimentation: Distribute air warfare capabilities
Squad X Core Technologies: Digitized, integrated technologies that improve infantry awareness
SyNAPSE: Systems of Neuromorphic Adaptive Plastic Scalable Electronics
XOS: Powered military exoskeleton
SIGMA Devices: A network of mobile devices the size of smart phones
Tactical Boost Glide: Air-launched hypersonic boost glide missile
Tactically Exploited Reconnaissance Node: Ship-based long-range ISR UAV
(Urban Leader Tactical Response, Awareness and Visualization): Heads-up display
VTOL X-Plane
Warrior Web: Soft exosuit
WolfPack
XDATA: Processing and analyzing vast amounts of information
We think it fair to say that any reasonable person would agree that DARPA Vader is simply
evil and focused on killing, warfare, and manipulation science.
Just the list above shows the insanity driving this agency that is not being controlled by
any governmental agency outside of the military. There is no limit to research and development
for warfare and any idea that advances warfare is funded and put into production before anyone
can object. According to DARPA and In-Q-Tel, innovation and technological advances must
first be a weapon that can be controlled by its makers � the military.
What the Rebel Alliance Can Do to Stop the Evil Empire
Investigate, audit and then defund DARPA, In-Q-Tel and the Highlands Forum.
End the Highlands Forum and investigate all participants for industrial and military espionage.
Stop using integrated circuits, chips, and microprocessors from foreign countries.
Investigate Cisco, Google, Intel, Facebook, Microsoft, Apple, and other DARPA sponsored
and funded technology companies and seize ownership of the companies for the U. S. taxpayers
whose tax dollars created these fronts.
Seize the assets of all companies found to use backdoors in their products for any reason.
Stop the NSA from using backdoors on routers, microchips, and processors and close those
avenues of manipulation and surveillance.
There may be other strategies and tactics that we haven�t listed, and we welcome your
ideas and call to action to your community of Rebels and Patriots. We ask that citizens
around the world call on their inner Hans, Luke and Leia. The story of Star Wars is more
than a science fiction movie. The characters and plot are deeply embedded memes that actually
point to the truth about forces in the world that wish to destroy humanity.
Guided by the spirit of Obi-Wan, we can each find the FORCE within us to destroy the Death
Star created by DARPA and the DoD�and, yes, save
the world.
Rebel Alliance Unite!
-------------------------------------------
YouTube Inferno: GradeAUnderA (EXPOSED!?) - JMAA - Duration: 19:39.
[GradeAUnderA intro]
(GradeA voice) What the fuck!?
Is this the fuckin' guy who's goin' to try to EXPOSE me?
The same guy who is LITERALLY Satan himself?
Well, today, we're going to give some asskickin' to this giant bastard.
We're going to expose…
(JMAA voice) GradeAUnderA.
[intro music]
HEY, GAY DEMONS!
How are you?
Have you missed my PRETTY FACE?
(baby crying)
Well, today is a very fantastic day, because today is GradeAUnderA time!
And what's not better than a guy who's already spewed the same kind of bullshit exposed
video on Grade, and in the process, he's going to get a huge amount of dislikes from
Grade's brainless fans?
Oh, how appropriate.
[UNFUNNY]
Well, don't get me wrong, Grade is a good youtuber, he used to be entertaining back
in the day, and that's completely fine.
But something actually happened.
Somehow, a chip in Grade's brain exploded and he suddenly turned into this unfunny,
boring and uncharismatic piece of shit since those drama videos.
He's got to the point where his videos became completely unwatchable, and I just don't
have any FUCKING idea of how people still allow this catastrophe to happen.
Specially his fucking US elections videos are just plain drivel of horseshit, you'll
know for a fact of Grade's character style of being like this awful redneck piece of
turd complaining about the barber shop.
Well, sad thing is, it doesn't fucking work while trying to give legitimate opinions on
Donald Trump and Hillary Clinton, and he even looks more like a fucking asshole.
And he seems to do this kind of rambling about horseshit for 10 or 20 minutes.
I mean, would you take any seriously videos where he rambles about pointless shit like
numbers, Santa Claus, or some other boring crap for 25 minutes?
But I know what you're asking: "Juan, this video from GradeA lasts like 10 or 20
minutes but it could have lasted less than 10 minutes or even 5 minutes.
What gives?"
What gives is that basically Grade spews as much boring drivel as possible, repeating
points and overextending his video like a piece of bubblegum.
Grade has already lost his charm since the infamous drama videos.
And oh boy he sure did.
On the "What's Wrong With YouTube" videos.
Oh yeah, YouTube HAS A PROBLEM, false copyright strikes?
No, not that stuff.
Maybe false flagging videos and channels being taken down?
No, no, absolutely not.
Let's just vomit through the mouth 25 FUCKING MINUTES OF HOW I DON'T LIKE THIS YOUTUBER.
Oh, you are getting bored with all this horse crap?
YOU DON'T KNOW BETTER.
YOU DON'T KNOW ANY BETTER.
Grade is afraid of changing his style, not because people will stop liking his videos
as soon as he does, but because he seems to be a lazy fuck.
And says a lot about his style of videos when he seems to keep working on the same MS Paint
and Windows Movie Maker garbage.
(Grade) "I am spending WAY TOO MUCH TIME MAKING YOUTUBE VIDEOS and I'M GOING FUCKING
MAD MAKING THEM."
"My diet and nutrition has gone to shit 'cause I'm barely eating nowadays 'cause
I's always working on a video and forgetting to feed myself and I even caught (?) my exercise
routine for my life, just to make more time to make videos."
"But worst of all, I've recently started developing some shit called Dyshidrotic Eczema"
Oh, my shitty MS Paint and Windows Movie Maker videos are causing me health problems… boo
hoo…
You know, that's a load of horseshit, let's be honest.
I would start believing him whenever this guy would have gotten to work on Sony Vegas
instead.
He might become fucking dead on the inside if he did!
Bottom line, Grade is fucking lazy and fucking boring.
But more importantly, his videos are fucking shit lately.
[DO YOU EVEN FACT CHECK?]
There's a common problem in Grade's boring, unentertaining and lazy-made horseshit: he
likes saying some opinions and then putting them on a moral pedestal as "facts".
Would you take Grade saying "he's getting a shitload of stress" just because he makes
videos on Windows Movie Maker?
Well, any mentally sound person would say "no", but apparently Grade's shitty
fans always take it as fact.
While it isn't.
Like that moment where he says "advertisers don't want to advertise on videos about
ISIS, rape or suicide, especially on MrRepzion's videos!"
(Grade) "He had videos about some very advertiser-friendly topics such as Islam, Death and Suicide, some
random cartoon porn shit, numerous videos on RAPE, and even a couple of videos about
RAPING YOUR FAMILY!"
Um… yes…
I agree with that sentiment, Grade, I think these are not really advertiser-friendly topics,
but, Grade…
I think you're still a fucking moron to not realize MrRepzion is a real person like
you?
I GOT YA.
I GOT YA, GRADE.
Everyone who doesn't agree with your lazy shit is NOT A REAL PERSON!
Well, I don't seem to think you're real either.
In fact, you seem to be already eaten on all your remaining real person by the big-chin
demon that you've just created.
That surely is a fiber diet that can put you back in shape after spending SO MUCH TIME
on your crappy videos.
If you want to look at a more sadder display of boring, horseshit opinions without any
factual evidence, I'd thoroughly recommend you the "What's Wrong With YouTube"
series.
These are the golden Arc of the Covenant of his channel's demise, because they are boring.
But more importantly, they are retarded.
Instead of talking about the real problems that YouTube faces, which are false strikes
and all that faulty shit that YouTube has, he wants to take down even more youtubers
by masquerading this intent with a "good deed".
He rambles in the entire video about youtubers that quote unquote "infringe the community
guidelines" while even fanning more the flames of how YouTube is broken with false
community guidelines strikes and without addressing the REAL problems on YouTube.
Ok, let's just forget the fact that there are numerous movie reuploads fully monetized
on YouTube, that's not really my problem.
But if I don't like you, guess what?
You're what's wrong with YouTube, BITCH.
[SOME KEEMSTAR HORSESHIT]
Grade seems to be contradicting himself a lot between what he says in one place or another.
And not certainly only in these previous drama videos.
He did a stream where he seemed fine with Keemstar paying him a 6 figure deal or something,
regardless of Keem saying the "n-word", but I think you'll notice that Grade needed
to join in with Idubbbz on the "Keemstar hate bandwagon" back then.
Not really because he hates Keem, but just because it seemed more profitable for his
pocket at that time than just receiving 6 figures from Keem.
In the same fashion than his "What's Wrong With YouTube" videos, not only he masquerades
this brigading against Keem as a good deed of "#MakeYouTubeGreatAgain" like he usually
does in these cases, but also he's stepped as low as Keemstar would do by just making
the same kind of false pedophile allegations than Keemstar.
What a fucking rat, isn't he?
And no, I don't just mean Keemstar, I also mean Grade.
(Grade) "All because of Keem's dogshit reporting and his false pedophile accusations.
Which is not only irresponsible as fuck and a shitty thing to do, right?
But is fucking illegal."
(Slowed Grade) "Which is not only irresponsible as fuck and a shitty thing to do, right?
But is fucking illegal."
Grade, I know you like the whole thing with "payback", or "an eye for an eye"
in here, because you're basically a drama whore like myself, but I think you're pretty
much not aware that you're getting as low as Keemstar.
Keemstar is a fucking rat.
But more importantly, you don't want to become the same kind of rat as Keemstar.
Oh, sorry, I am the one defending Keemstar, I am the bad guy here!
You got me, Grade.
Grade, I know what you're gonna say, you're shaking, you're going to tell me that you
hate Keemstar because he said some racist shit.
OH NO!
Oh, wait, turns out in stream you defended Keem for giving you money as I said before.
(Grade on stream) "But for this LOSER to tell me I shouldn't like someone who offered
me a 6 figure deal because they called someone the n-word in the past and did falsely accuse
someone a pedophile for 3 hours, I don't give a fuck, my parents don't give a fuck,
they would've have taken that money in 2 seconds…"
"B-but Juan, Grade turned against Keemstar after he realized his racist shit came to
light!"
That's a load of horseshit.
Is he really that much of a fucking retard to not having discovered Keem's racist rambling
on his Battlecam and Blog.tv stream when Keem did it YEARS AGO!?
Oh sure, Grade, you hate it when people do "expose people first and do research later"!
Gandhi said it best, Grade.
An eye for an eye only makes the world blind.
More importantly if you're blinded by your own shitty huge ego.
[EGO]
Speaking of huge shitty ego, I'll let everyone know that at this point in my channel, that
I LOVE DRAMA.
And we should admit that Grade ALSO LOVES DRAMA.
But the whole point of making drama, is that you don't fucking make yourself look like
the superhero, or otherwise you'll look like a narcissistic, boring and lazy cunt.
Apparently Grade doesn't like when he's called a "drama whore".
Yeah, that surely makes sense.
His ego doesn't allow him to like drama because he's afraid of changing his style
of videos in general.
He LOVES drama, but to look to everyone else like the winner here, he makes it look like
he doesn't like it and puts his drama into the "good drama" category.
(Grade) "Back when I was making my #MakeYouTubeGreatAgain (...), even if the aim is to fix the fucking
website we're on, you still get some braindead idiots complaining that this is all drama
and you just do it for the views!"
Well, Grade, I know he was pretty much a dick, but, big shocker: he's right, YOUR DRAMA
VIDEOS ARE FUCKING TERRIBLE AND BORING.
He surely likes to masquerade his drama videos with the #MakeYouTubeGreatAgain good deed
kind of thing, just to justify his shit content with a heroic aesthetic, and just because
the CEO of YouTube tweeted at him, so that might have boosted his ego even more.
(Grade) "And the drama video that I did 2 months ago, got the CEO of YouTube Susan
Wojcicki to tweet at us and start listening to us about how to make YouTube better!"
Yeah, keep using the word "us" as if it was some collective effort, you know your
brainless fans are only helping you boost your shitty fucking narcissistic ego.
(Grade) "Like, for example, this fucking dickhead who's telling me not to waste my
time making my #MakeYouTubeGreatAgain videos back in February telling me that they wouldn't
get YouTube to listen or change anything.
I'm lucky mate!"
Yeah, I'm lucky, mate, I got the CEO of YouTube to tweet at me!
I'm important now!
Shut the fuck up, Grade.
Do you even think YouTube cares?
Your fans spammed the shit out to Susan on Twitter your video with YOUR shitty hashtag.
What did you expect her to do?
Fucking watch your shitty video?
Is she ever gonna sit to 25 minutes of talking shit about youtubers you want to be taken
down?
I'll tell you, Grade: no.
They don't give a shit.
Especially when they have to sit through 25 minutes of your boring, lazily edited and
made shit complaining about youtubers you don't like.
Oh no, I surely look like the bad guy here again!
I really should look like a downer!
I am YouTube's "Devil's Advocate"!
I am such a big faggot!
But hey, you do love to suck the dicks of all the famous people just for them to tweet
at you, do you?
Be famous, by pandering to the famous.
You sure love that tweet from Donald Trump.
#MakeYouTubeGreatAgain!
Wait, someone told me not to waste my time with this sugarcoated hashtag movement, YOU'RE
A DISGRACE!
I AM A YOUTUBE HERO!
Every time someone criticizes Grade, Grade just acts like a fucking dick, considering
he has done so in Twitter and Reddit, this last one having deleted an actual piece of
constructive criticism.
Well, sounds like something hypocritical, isn't it?
That's because it is.
Once Grade said that "everyone should be open for criticism", so, hey, maybe that
explains why he deleted some post on Reddit in a hissy fit.
Or when he has replied angrily to a tweet about his own shitty intent in his drama videos.
Oh, Grade, you have a real winner mentality, you know that?
You should be a motivational speaker.
LOL fuck off with your narcissism please mate.
[RASH]
Grade not only seems like a huge narcissistic cunt, but also Grade has done quite a bit
of hypocritical bull, as I said before, but more than just because he's a liar, it is
because he's just pretty fucking moronic and self-centered.
One of his many narcissistic loads of dogshit is in the What's Wrong With YouTube videos,
especially in the first part of the series, where he purposefully rambles during almost
the entire video about reaction channels like Tyrone Magnus for no logical reason.
He complains about how Tyrone Magnus doesn't earn him money, but hey, this ain't bad
drama, this is good drama!
#MakeYouTubeGreatAgain!
Huge fucking ego, anyone?
This could just be another generic humdrum video about reaction channels, but no, he
decided that he would easily pass it as a good heroic act by just naming it "What's
Wrong With YouTube" and the hashtag "#MakeYouTubeGreatAgain".
This won't make YouTube Great Again.
The only thing that would make YouTube great is to get rid of narcissistic pieces of shit
like Grade from just false striking more youtubers and making boring shit content.
"But Juan, you would be doing the same than Grade by brigading him!"
Well, ever heard of the phrase "taste of his own medicine"?
Pretty much like Grade tried to do with Keemstar by making bullshit false pedophile allegations
while looking like the hero.
But as much of a narcissistic idiot Grade is, he not only likes to make horseshit opinions
and actions like these, but also likes to counter opinions with more bullshit.
Grade usually uses a tactic to counter people's opinions, which is called the "anti-argument".
He denies other people's opinions not because they're flawed arguments, but because of
their personal looks or subscriber counts.
Kinda like "PewDiePie is Fred 2.0", or "Markiplier has red SJW hair".
(Grade) "Does this look like the hair of someone who can be taken seriously?
NO, OF COURSE NOT!"
UGH, YOUR OPINION IS INVALID BECAUSE YOU HAVE DYED HAIR EUGH
UGH, YOUR OPINION IS INVALID BECAUSE YOU'RE THE BIGGEST AND FRED WAS THE BIGGEST, EUGH
MY OPINION IS BEST.
MY OPINION IS ONLY BEST.
Then he does seem to complain in a later video he doesn't like when people expose him for
horseshit points.
But seems like Grade is the only one who is able to use horseshit points here.
ME GRADE, ME BEST POINTS.
Well, it's surely a thing that you don't like when people expose you, Grade, but boy,
if you see anyone you don't like, that's a new GradeAUnderA video, right?
Don't fucking bore me any more.
[MONEY WHORING CUNT]
Adding to the whole boring horseshit video making he's usually into, we got numerous
examples of Grade not only feeding his ego and self-centered attitude, but also feeding
his wallet in the most lazy and forced way possible, pretty much like the rest of his
video style.
Because if he does all these "good deeds" which are reduced to his own huge immense
ego, it all ends into his earnings, like the big scumbag he is.
You know, I'd like to have sponsors.
More money to me.
But now, Grade has made me hate sponsors.
Because he literally puts zero effort in making the sponsored bits entertaining as in the
rest of his videos.
Grade, please, stop forcing Lootcrate sponsors in every single one of your videos, they're
forced, but more importantly, they're FUCKING BORING.
(Grade is sponsored by Lootcrate compilation)
By the way, this fine episode of YouTube Inferno has been sponsored by Sony.
Because this Sony Vegas is acting like fucking shit.
The same kind of shit as Grade.
[#NOREALFACE]
You know?
It says a lot that Grade likes to mess up with people or invalidate their opinions in
shitty boring videos just because of their personal looks.
But if you're obviously hiding your personal identity behind the big-chin stick figure
cartoon that he shittily draws on MS Paint, that could probably say that he's pretty
insecure.
So far, there's a "face reveal" of his old University graduation photo, but it's
fucking goddamn horseshit.
Doesn't do any justice to him, so I decided to start up a hashtag movement.
God knows what boring bloke you can pull out from his real life identity.
And the best way to expose a boring YouTube character is to expose a boring real life
personality.
All you need to do is to tweet at GradeAUnderA "#NoRealFace" and demand him for a real
current face reveal, so probably he finally shows up with his real putrid paki face.
Because we gotta Make YouTube Great Again, and bring this GradeA fucker to justice!
One of us is weak, but TOGETHER WE ARE STRONG!
We united can defeat the cancer that is GradeA!
Let's join together on this fight!
And Grade, if you're watching this, hear me on this, you filthy sack of scum: I'll
never forget what you managed to do for the easy views, and I'll swear I'll end up
making you KILL YOURSELF!
Hail Gay Satan!
[GRADE'S EXPECTED RESPONSE]
(Grade) "WHAT?"
(Grade) "Does this look like the hair of someone who can be taken seriously?
NO, OF COURSE NOT!"
(Grade) "And the drama video that I did 2 months ago, got the CEO of YouTube Susan
Wojcicki to tweet at us and start listening to us about how to make YouTube better!"
(Grade) "Like, for example, this fucking dickhead who's telling me not to waste my
time making my #MakeYouTubeGreatAgain videos back in February telling me that they wouldn't
get YouTube to listen or change anything.
I'm lucky mate!"
(Grade) "You bastard"
(#NoRealFace)
Oh, by the way, Grade, you'll surely hate me for this, but…
Like Keemstar once said: you fucking nigger.
Thanks for watching this video!
If you like what you see, and want to join the Gay Demon forces of Hell, please subscribe
to see more!
I'll see you next time!
Hail Gay Satan!
-------------------------------------------
Advice From Your Future Self | + G I V E A W A Y - Duration: 1:57.
-------------------------------------------
One Love Bob Marley | Musica Instrumental para Casamento - Duration: 1:31.
-------------------------------------------
Gaboomfilms se présente - Duration: 9:33.
hum.
Hi
the famous guys from Gaboom
the guys behind ''f@ck-a-you''
it's us
there were no point. It was poorly brought.
you had to get it out
that we were the ''f@ck-a-you'' guys
So, there's some people
maybe 2-3
that asked us
what are our names?
we never introduced ourselves
we make stupid videos, but
you don't know who we are behind the camera
we'll present Gaboom
I'm Kévin
I had my first video camera 13 years ago
I've always made videos just for fun
I never studied that field
In fact, none of us have ever studied in cinema
and we share this passion
And this is Andrew!
My name's Andrew
I'm into photography and videos since 5-6 years
since I know Kevin, precisely
you can find me on Instagram
my name's SKRADZ
I'll probably write it somewhere
up there, here maybe
you can find me on Facebook
Barley wine
Barley Wine
Île d'Orléans
How is born Gaboomfilms?
Ok, I was doing Improv before
Andrew thought I was funny
We eventually met in a Chalet
I told him ''Hey, I make videos'', -''oh yeah? you make videos''
Yes! Come with me!
So I influenced him
he started making videos
''hey, let's start a film making group,
let's call it, hum...
how do we call it actually?''
So we came up with this idea of ''gaboomfilms''
We were looking for a Logo
Andrew was good at making this particular face
the little downward smile
and, it made us think of a Goomba
in Super Mario
so we thought: ''Hey!
let's take the letters from goomba, and
Gaboom!
It was either Gaboom or...
Bagoom, goomba
no... what was it already?
short, we came up with Gaboom.
so, there is no Gabriel in our team...
there's no more explosion than necessary in our videos
just, Gaboom.
first english page
The first Gaboomfilms channel we did on Youtube
was in English, because we thought we would become world wide famous
We were dreaming big
First video we posted on Youtube
that was a parody of...
of Going to the Store
It was one of my friend that
challenged us to do a parody
We passed all night long making a parody called
Going to Work at Night
partly because we didn't want to do it during the day
we were too... shy.
once we finished filming the video,
we arrived to Kévin's place
Kévin started editing
I fell asleep
I woke up
the video was finished
At that time, I thought video making was magical
because, everything was made by itself
Given the success,
because, Going to the Store just came out
there were millions of views
when we posted ours, it rapidly increased
it motivated us to make more vids
in 2013,
we decided to make our first French film
for the Québec people.
-the good Québec People -the good people
We thought that nobody was doing something with the same humor
on Youtube, in Québec (province)
this is why we decided to start our own channel here
and since Kévin spoke better in French than English,
it worked out well.
we started the Gaboomfilms QC page
Québec
francophone
in 2013
with the first video
Tire-moé dessus (shoot me)
you f@cking ''dumbass'' (litteral translation : cauldron)
my jacket, I ain't wearing it on the knees!
it had a certain success
so we told ourselves, let's keep doing that
Since 2013,
we make videos in french or with few words
we try to caption our vids sometimes
sometimes, our vids have some english,
but, we're from Montreal
so, we are...
open to the world
it wa..
wow
and your music?
we don't have in our abilities
the capacity of creating music
or, instead, we don't take the time to do it.
we found someone
Didier Boulad
Didier
is passionate about photo and video like us,
but also about musical creation
we call upon him to make our music
he has his little studio and
he's doing a great job, he's efficient
why do you make videos
to make people laugh
it's a nice platform for us where we can learn
we don't put pressure on ourselves, cause non of us have studied in that field
and we learn with experience
we help each other a lot
Actually, Andrew pays particular attention to the quality of our productions
I pay attention on making sure people laugh
and that it is funny
i'm not saying that you're not funny...
not at all
as a team, we complement each other well
we have our strenghts and weaknesses
I know that Kévin is better in some areas
Kévin is like Billy the Kid in editing
he edits videos pretty quickly
often, I won't even bother and let him that task
what I like a lot is
being able to educate people via humor
sure, for the moment, it's very absurd
we're looking to build a certain audience, then
eventualy we slip messages through humor
and I like it a lot
you take the S from you SA VA
and you replace it with a C
and when you will have sufficiently practiced
and only when you'll master this
you will add the Cedilla
with a little touch of humor
otherwise, some people don't even bother trying to learn something by themselves
so
*Québec expression* I joke
where do you get you inspiration
Personally, in the 2000s
there were 2 groups of Québécois that were making videos before youtube became popular
Idiot Fortier, Actum Imago
that I was following
RBO
Monty Python
it totally resonates with me, it's my genre of humor
there's also some youtubers like TV MAXWELL
College Humor
We're big fans of Key and Peele
we were watching their videos each week
it made us laugh so much, and we got inspired by these vids
and it's also a reason we keep on making vids
when we watch that kind of videos
there's a little cultural tendency here
francophone
anglophone
y'know, we make a mix of all that
it makes a nice thing
When we brainstorm
often, we go take a beer in a bar
we'll go there with a paper and a pen
once we start drinking our beer
we write everything
I read somewhere that
it's good to drink beer to find an idea
and you drink coffee to develop your idea
There's many videos we made
that resulted from beer drinking
a beer or twelve
we realized with time that it became easier to find new ideas
when we started, we were sitting on a couch waiting for something to come up
it was sometimes pretty long, we tried to find ideas
like, we went on the internet, and we did that thing with three words
random three word generator
we took three words and
we had to build a movie idea with that
look, we'll give you an example
Jesus
pool
floor lamp
jesus, pool, floor lamp
ok.
so...
it's a dude, y'know
he thinks he's Jesus
he says to everybody
I changed the water in the pool into wine!
but
people can't see nothing
so he says
open the floor lamp, or the light
so, someone opens the light
and, suddenly they see that he killed somebody
so the pool is full of blood
I'm not sure we will put this one
were you laughing Steph?
Andrew's girlfriend is the one who
does the quality control of our ideas
sometimes, we get a bit too much excited with an idea
and
it's not that good
no, it's shit
yeah, and that's it
she reminds us
2017 goals
with a good glass of
vino!
just kidding, it was beer
were we doing PL Cloutier? I don't know.
Yes, we were doing... yes
PL
on t'aime
So, for 2017
sure, our problem right now is to be
assiduous
being assiduous
we don't release vids as often as we should
we release a video at least once per month
and
sometimes we try for every two weeks
when we have time
it's because of our busy schedule, we don't always have time to make it
but, for 2017, we intend to become
assiduous
and
synchronized
I have projects of dancing videos
I try to bring Andrew into dancing
we will try to improve the quality of our productions
more wow
more haha
more
hehe
more: wooaahhh
more
*swearing*
more
aaaaahhh
more
this is shit
no!
hey thanks
Thank you
without you, we probably wouldn't make any films
because nobody would watch our films
and we wouldn't get the adrenaline from it
exact, and if there's something thats gives me adrenaline
it's when I post a video and I read things like:
I pissed myself
HAHA watch this, it made my day
I watch this video 20 times
I can't breathe
We keep up, we work hard
and we hope 2017 will be our year
we have an account on fb, yt, it
so if you want to follow us, type Gaboomfilms
snapchat
oh yes, it's true, we also have snapchat
gbfilms
hey ciao là
à demain là! (see you tomorrow)
not a demano
c'est à demain là
à demain là (see you)
-------------------------------------------
SSX Tricky - Skater Reviews (Xbox, PS2) ❄🏂🎮 - Duration: 10:32.
So far I've covered a few different snowboarding games this winter - but now I'm going to
take a look at SSX Tricky on the Xbox and also the PS2.
Let's take a look.
Welcome to Rad Rat Video.
I'm usually a skateboarding channel, and I talk about where tricks came from and all
kinds of other skateboarding topics, but for the winter, I'm taking a look at some snowboarding
games.
Back when the PS2 was released, you might remember all the shortages they had.
Stores just couldn't keep the system in stock.
One time, my mom was at the store and saw one.
Some other lady had taken it to the counter and asked them to hold it for her, so she
could go get her checkbook or something.
My mom walked up, pointed to their policies sign on the wall, and asked if they were even
allowed to hold something for a customer.
They said no… and she bought it out from under her and brought it home to surprise
me and my brother.
But… we didn't have any games.
We played Spiderman for PS1 on it all night.
But the next day we convinced my dad to bring us SSX.
That game was my first "next gen" game and also my first snowboarding game too if
you don't count 2Xtreme.
So when I got some suggestions to review an SSX game, I jumped at the opportunity and
I decided to try Tricky, which is the second game in the series.
It's kind of a remix of the first game, instead of a true sequel.
I never played it at the time for whatever reason, and I was excited to give it a shot.
So if you aren't familiar with the game in general, here's what it's about.
You have all of these different characters that you can choose from, and they're all
really well voice acted - David Arquette, Lucy Liu, Macy Gray, Billy Zane…
You pick a character and do some racing.
Let's take a look at the World Circuit mode.
These are the ones you want to do to unlock stuff in the game.
Start the race, and it lets you know who your friends and enemies are.
I don't know what this does exactly, but your enemies are more likely to try to knock
you over.
I don't think friends do anything… but to be fair I just punched everybody so I made
enemies really fast.
You risk them coming after you, but knocking someone down fills your boost meter, so it's
worth it.
Sometimes they talk crap to you after a race.
The other way to fill your boost meter is by doing tricks.So let's talk about the
trick control.
To wind up for a spin or flip, you hold down the jump button and a direction on the D-pad.
Usually you steer with the joystick so you have to lose steering control for a second
when you switch.
Then you let go of jump and hold the direction to keep spinning.
You can add in grabs by using the triggers and face buttons in different combinations.
You can do slides by jumping on a rail.
It will automatically lock you in.
It can be really hard to get these to work though.
You'll miss them a lot of the time.
To balance you have to move left and right on the left joystick, which will make you
shift from side to side on the rail.
It's much easier in a board- or lipslide compared to a 50-50 because you have the whole
length of the board.
Hitting left and right on the D-pad will make you spin, but you can get yourself into some
weird positions trying to work the D-pad and joystick at the same time.
That's about all there is to it, but that's plenty because there's too much other stuff
to worry about during an actual race.
There are alternate paths, obstacles and shortcuts to keep an eye out for.
These big glass panes show you where to cut through the course, and the color shows you
how big of a shortcut it is.
Blue will be small and red will be big.
But there's this one that I kept trying that basically took me nowhere and I kept
getting stuck.
I don't know if I needed a higher speed stat to have enough to clear this, but it
seems like they kind of messed this up.
But in general, the design of the levels is really good, and all the alternate paths help
mix things up.
There are parts with really tight paths, or icy sections.
There's also this area, where you can choose to hit the ramp to get points and earn boost,
OR you can just ride straight down the middle to get through there faster.
There's also this high risk area where you can either air over all the barriers in the
halfpipe, or you can try to ride down the middle and narrowly get through all these
passages.
You can try different things on different runs and try to refine your technique.
Especially in the later levels, like this one in Tokyo.
It's like a giant pinball machine.
You can ride around on these water slide type of things, which will keep you going kind
of straight and you avoid obstacles on the course below.
Or if you enter this fan thing the right way, you can actually do a slide over the whole
section of the level.
Down here you have these walls that you have to open by pushing buttons.
You can also make these poles go back into the ground and smooth it out.
This level is when the game is at its best.
Completely over the top, ridiculous and completely impossible in real life.
There are speed boosters, giant fans, huge things that move around and can hit you…
I always think that white flash is funny.
A lot of Xbox games have stuff like that where it doesn't fit, but it's because the game
is in HD and the white fade out thing is in standard def.
They'll forget to upscale certain assets when they port it from PS2.
But this game isn't even in HD, so it's just weird that it's got that glitch.
Aside from that small thing, I didn't run into any other glitches.
The frame rate drops a tiny bit from time to time, but it's not really noticeable.
The game engine is really solid and everything feels polished.
Plus, the control is really good too.
The steering and the carving feel good, the ice feels like ice, and it's rare that something
goes wrong that feels like it wasn't your fault.
It's important that the design and controls are good, because you're going to be playing
these levels over and over and over.
So you know how a circuit mode works in most games, like Mario Kart or even Gran Turismo?
You race on a few different tracks and get a medal at the end.
If you get first place 3 times and 3rd place once, chances are you'll still get the gold
because all the races are weighted.
SSX is totally different.
Instead of all of that, you're just racing the exact same course over and over.
It's like: qualifier, semi finals, finals.
A race can take around 4 minutes, so it can be about 12 minutes to get through a single
course.
But the big frustration is that your first 2 races are worthless.
If you get first place on those two but place second in the final, you still get a silver.
Or worse, you can get first place twice and then completely blow the last race.
Maybe you get stuck somewhere or you take the wrong path.
Maybe you made too many enemies and they keep knocking you down this one time.
Or in this case, a fan blew me up into the air and wasted a bunch of time right before
the finish line.
Now you have to replay this level 3 more times.
This happened to me fairly often.
I don't mind replaying these levels 6 or 9 times, but I'd rather they be mixed into
an actual circuit and not back to back.
The Tokyo level has 3 laps in each round, so it's actually 9 times per attempt.
This is the one major flaw in the game that really got me annoyed with it.
Going back to unlock some more levels started to feel like a chore after a while.
When you do eventually win, you get stat points that you can give your character - speed,
edging, tricks and stability.
Every now and then you'll also gain a rank, going from amateur to pro and then star and
veteran and stuff like that.
OK, so I wasn't exactly blown away by the race modes, but racing isn't the name of
the game.
It's TRICKY.
And the game has a "showoff" event mode as well.
Let's take a look at that.
So in this mode, there are a bunch of extra obstacles in all the levels, like rails and
extra ramps and stuff like that.
There are also these colored snowflakes, which give you different multipliers based on their
size.
This new stuff makes the levels play a lot differently.
Also, there are no other racers that you have to compete with - just a high score.
And there is technically a timer, but it's not a big deal.
It's just there to make sure you don't cheat like I did - just trying to hit the
same halfpipe for a while to rack up points.
You do still have to keep moving through these levels and not bail too much to lose your
momentum.
These events start really easy but get hard quickly.
You have to mix up your tricks so you don't get penalized for repeating, and you have
to get better at slides.
There isn't a balance meter, really, but you fall off if you end up leaning too far
to one side.
It can be tough planning out the flips too - just making sure you have the right amount
of air time and you flip at the right angle so you can come around and land it instead
of spinning around like a top on your head.
But the biggest draw to the game, what really sets it apart from the other similar kinds
of racing titles, is what happens when you fill this boost, or adrenalin, meter.
[tricky music]
You unlock all your Uber tricks, which are basically your Tony Hawk special tricks, except
that they're completely insane.
Breakdancing on your board, unhooking and doing kickflips, and all kinds of other crazy
stuff becomes available.
It takes a ton of airtime, and for me, it's more of a hassle to try to do one in a race
because you never know how much airtime you'll get.
But in trick mode, there are a ton of big ramps you can use.
You can also spin and flip when you do them, which makes them even crazier and harder to
land.
When you do an uber trick, you fill out one of the letters in TRICKY here at the top of
the meter.
If you manage to fill up the whole word, you'll get permanent boost and the ability to do
uber tricks whenever you want.
When you beat all of the events, you'll unlock a few stages that you can only play
in free ride mode.
They're pretty cool, especially this mega park course.
With no time limit, you can actually take a break and hit the same obstacle a few times.
It might have been cool to get this one as a training level in the beginning of the game
though, so you could use it to learn how the game works.
So SSX Tricky might not have been the best game in the series for me to play.
Since it wasn't numbered, I actually thought it was later in the series.
I might have done better picking out another one to play for the channel.
Which game in the series is the best?
Let me know in the comments.
Is the reboot of it any good?
I don't think I'm going to do another SSX game this winter, but there's always
next year.
So is this game worth playing today?
You know, I didn't get to test this again these days, but I remember having a lot of
fun playing head to head with friends.
If you've got good memories of that too, it might be worth playing for a few bucks.
Otherwise, I would recommend one of the later games, or maybe even Tony Hawk's Downhill
Jam.
The PS2 version is supposed to be a bit too easy, but it's not a bad game if you think
of it like SSX on a skateboard.
You can see my full review of the wii version here.
But if you're mostly in it for the tricks and you want something a little more serious,
I would check out the Amped series, especially number 2, and also Infinite Air.
You can see reviews of those games in my snowboard playlist.
Well that's it for this time.
It's still winter for a little while, so I'm going to be trying to put out a few
more of these snowboard reviews soon.
I'm not sure exactly what they'll be yet, but to make sure you don't miss them, hit
the subscribe button on screen now.
It's a circle with my logo in it.
After that, here are some of the videos I mentioned earlier that you might want to check
out.
Thanks for watching.
-------------------------------------------
Imigração EUA: Como passar pela imigração dos Estados Unidos | Rachel Travel Tips - Duration: 5:06.
-------------------------------------------
How Hackers Hack, and How To Stop Them - Duration: 8:47.
You hear about this all the time:
A big bank was hacked.
Tumblr was hacked.
The infidelity website Ashley Madison was hacked and now everybody knows who was cheating
on each other.
But there's a lot more to it, and it's a lot less flashy than what you see in the movies.
Hacking isn't about typing in a few magic words with one hand on one keyboard and the
other hand on another keyboard.
Or like, two people using the same keyboard at once.
Hacking is difficult, and it usually takes careful planning and a fair amount of time.
Stopping malicious hackers can be even more challenging.
But some people dedicate a lot of time and energy to doing just that.
Hacking is when an unauthorized person gets into a computer system.
A hacker breaks in, and then suddenly they have access to information they aren't supposed
to have.
You hear people say their Facebook or Twitter was hacked, but that's not exactly the same
thing we're talking about here.
When someone's personal Facebook account is hacked, that's usually because the hacker
found out their password.
It can be devastating, but it's not on the same level as breaking into a company's
whole infrastructure and stealing a billion passwords.
Thankfully, these large-scale attacks are much harder to do.
But they do still happen — in December, for example, Yahoo announced that they had
been hacked back in 2013 and just realized that more than a billion accounts had been
compromised with personal data like answers to security questions and passwords.
That's why companies have to be really vigilant to protect against hackers.
Once a hacker gets in, they have a few choices:
They can gather information, they can cause some damage to the computer system, or they
can do nothing at all, and just tell the company about the security risk.
And that's the difference between the three major types of computer hackers:
There are black hats, hackers who are basically the bad guys: they hack into systems to get
information or otherwise cause damage.
Which is very illegal, by the way.
There are also white hats, hackers who are either breaking into their own systems or
are hired to break into other people's systems — not to cause damage, but to test out vulnerabilities
that can then be fixed.
And then there are grey hats, hackers who, as the name would suggest, sort of walk the
line between black and white hat hacking.
They don't actively seek to cause damage, but they still do things that are illegal
or considered unethical — like, they might break into a system without being hired to
do that.
They wouldn't steal any information, and they'd tell the company afterward, but they
might publish the vulnerability online in the meantime.
But whether you're a black hat, a white hat, or a grey hat, the techniques used in
hacking are largely the same.
If you're a white hat testing a system for vulnerabilities, you have to know how to do
all the same things a black hat hacker would do.
It's like Defense Against the Dark Arts in Harry Potter — you have to know what
the dark side is doing if you're going to be able to defend yourself against it.
One of the main things white hats do is called a penetration test, or pen test for short.
You test a system for vulnerabilities, then fix any that you find, instead of causing
damage like a black hat would.
This is a pretty standard procedure, so looking at the steps is a great way to explore some
of the basic principles of hacking.
Usually, the first step in a pen test is reconnaissance, or recon, while you gather data about the
target to figure out the best way to hack into their system.
For example, if you were a black hat, it would help to know what kinds of operating systems
the target's computers are running so that you could launch an attack that's tailored
to those operating systems.
So if you're a white hat, you'll want to know what data you can access so you can
figure out what vulnerabilities need to be fixed.
There are two different types of recon: passive and active.
Passive recon is where a hacker gathers information without actually interacting with any of the
target's computer systems.
There are lots of different ways to do passive recon: you can look for information that's
already out there, like files that are publicly available on a website.
Or a black hat might even try to steal old hard drives the target threw away.
Passive recon strategies can take a while, but when a black hat uses them, they're
also difficult for companies to detect and fight — because there is nothing fishy to detect.
The hacker isn't touching the company's systems, so there's no warning that an attack
is being planned.
The best a company can do is try to make sure that they don't leave any clues lying around
by destroying as much unneeded data as possible, even if it seems harmless.
It also helps if you don't just toss old hard drives into the dumpster out back.
Active recon, on the other hand, is when a hacker tries to learn valuable information
about a company by interacting directly with the company's systems.
Hackers can get information more quickly this way, but it's also easier to detect.
That's because companies can track things like which computers are communicating with
their servers — the more central computers that provide data to other computers.
If they notice a strange machine on their network, or suspicious commands being sent,
they can take action — like by blocking the address sending those commands.
So as a white hat, part of pen testing usually involves doing some sort of active recon yourself,
to see if the protections you've set up can stop a black hat from learning too much.
Usually, you start by looking for open connections, or ports.
Each open port serves as a kind of link between a device and the internet, where data can
be exchanged.
And that can be dangerous, because a hacker can use an open port to send code that attacks
a machine.
As a white hat, once you've found an open port, the next step might be to see if you
can tell what kind of hardware is running the port, and what operating system it uses.
Because that is exactly what a black hat would do.
If you find that a black hat could collect enough information to launch an attack, you
might have to rethink the ports you have open, or find ways to stop machines from disclosing
information about themselves.
And for the most part, you're going to want to keep as many ports closed as you can.
One of the ways to do that is by using a firewall, which is either a program or a whole device
that's designed to block unwanted access to a computer.
Among other things, firewalls keep track of a computer's ports and make sure that the
only ports that are open are ones that need to be open.
They're like a computer's security guard, making sure that all the right doors are locked.
Now, once you've done some recon, you may want to move on to protecting against attacks
that take advantage of your specific setup.
Basically, you take a list of the hardware and operating system versions you're running
and see if they have any known hacks.
When people find ways to exploit an operating system or a piece of software, the exploit
will usually be published online.
Then, the company that makes the OS or software will try to patch the vulnerability.
But patches and updates won't always be installed on your systems right away, so it's
important to see if you're running older, vulnerable versions.
Of course, a black hat could also come up with new exploits and use those.
But that takes much more effort and skill, so protecting against known hacks can make
it much less likely that you'll be hacked.
Another part of the penetration test has to do with websites.
For every website on the internet, there's the part you're supposed to be able to see.
Like on YouTube, you can see different channel pages and video pages.
And you can watch me do this with my hands.
But there's also a whole administrative side to websites, with pages and files that
you aren't supposed to see.
Those pages might store information the developer needs to run the site, or files that the public
isn't supposed to be able to access — like, databases of user names and addresses.
Ideally, you want those pages and files secured so that some random dude named Steve can't
access all of them just by just typing a certain URL.
And the way to figure out if someone could get access to them is to do what a black hat
would do: try different URLs and see if you end up finding pages or files that shouldn't
be publicly accessible.
To do this, you can use crawlers — programs that automatically map out the site by visiting
different links and directories.
You can also use programs that try the typical URLs where this kind of information might
be stored.
So pages like, yourwebsite.com/info, or /files, or whatever.
If the crawler lands on an error page, that can be important too.
Companies need to make sure that the errors that come up don't contain information that
a hacker can use against them.
If an error says that a certain page is private, for example, that tells a black hat that this
page would be a great target if they do get into your system.
So you'll want to be careful about how much info shows up on your error pages.
Another part of the website test involves pages that use forms, like where you type
in your shipping address, or fill out hundreds of questions for your OkCupid profile.
If these forms aren't set up properly, black hats can use them as a way to send malicious
code into a system.
Often, they can use this kind of code to collect information from any databases a company might
be using, like to nab all the credit card numbers anyone's ever submitted.
So it's important to make sure that a website checks its form inputs for anything that looks
suspicious, and to test those protections by trying to break through them yourself.
There are often more steps to a penetration test, but those are the basics.
Once the test is done, it's time to go through the results and fix any vulnerabilities.
Even then, a company's systems might not be totally safe from all hacking attempts.
Black hats are always thinking up more creative ways to break into systems, and when they
have a specific target, like a government or other high-profile organization, white
hats have to be constantly on the lookout for attacks.
But as long as they keep track of possible security threats and stay one step ahead of
the black hats, which apparently Yahoo is completely incapable of doing, they can put
up a pretty strong defense.
Thank you for watching this episode of SciShow, which was brought to you by our patrons on Patreon.
If you want to help support this show, you can give us your money and we will use it
to make scishow happen at patreon.com/scishow.
And if you just want to keep getting smarter with us you can go to youtube.com/scishow and subscribe!
-------------------------------------------
CARA MUDAH DAN CEPAT MEMBUAT BLOG PADA BLOGGER - Duration: 1:46.
HOW TO CREATE BLOG ON BLOGGER
OPEN YOUR BROWSER .. YOU CAN USE MOZILLA FIRE FOX OR GOOGLE CHROME
COPY THIS LINK https://accounts.google.com/ServiceLogin?continue=https%3A%2F%2Fwww.blogger.com%2Fhome<mpl=blogger&service=blogger&sacu=1&passive=1209600&ignoreShadow=0&acui=1# AND PASTE ON ADDRESS BAR YOUR BROWSER
SIGN IN to YOUR GMAIL ACCOUNT
click CREATE NEW BLOG
write a TITLE, LINK ADDRESS and CHOOSE YOUR TEMPLATE
CREATE BLOG
CONGRATULATION ! 😃 YOU'VE GOT YOUR OWN BLOG NOW
SHOW YOUR BLOG
THIS IS IT ! THANK YOU FOR WATCHING
-------------------------------------------
Google Plus for Business: How to Claim Your Online Listing - Duration: 3:36.
hello everyone Denise Keniston here and
in this video we're gonna talk about
how you can claim your online listing on
Google Plus today I'm showing you the
way to find and claim your business
listing on Google if you're a business
owner who wants to up his chances of
getting found on google than keep
watching this video step one go to
google.com forward business and follow
the step-by-step process you can look up
your business through the search box
select your business name when it popped
up if you don't find it means that it
isn't listed and you'll have to add your
business at this point number two when
you enter your business information go
over it carefully be sure that there are
no typos that can really hurt your
business if you're listening includes a
misspelled business name or incorrect
address or phone number number three the
final step is the verification process
don't forget it this is when your Center
code which will have to enter in order
to verify that you are the current owner
of the business
what if you find that your business has
been claimed by another owner take these
steps number one first be sure that you
haven't already claimed the business
using a different email address once
you checked with all your email
addresses you can move on or just
glanced at the listing the phone number
listed should tell you right away
whether you're the one who claims it
number two if someone else has claimed
your listing click report a problem
you'll have the option of including a
message to the person currently claiming
the business you should tell them who
you are and that you are the business
owner and that you need to have them
relinquish ownership to you
number three allow seven full days for a
response
it's a full week passes without your
message being acknowledged contact
support google by replying to the confirmation
message that you have received
all right let's see that was very hard
but hold on just in case you didn't take
it all in we've created a free
infographic that will take you
step-by-step through the process and all
you have to do is click the link in the
description below fill in your email and
i'll send you this easy step-by-step
formula for your online marketing
success and that's how to claim your
listing on Google we use google
interchangeably with look it up
why because everything is on google if
your business isn't there you even kind
of exists but enough of that now i hope
you were able to learn some valuable
tips from this video
ok download my infographic right and get
on your way to Google my business
success and don't forget subscribe to my
youtube channel for more how-to videos
instructional videos some really cool
free stuff
also make sure to check out our other
videos and learn more and look while
you're at it let you hop on over and
check out my facebook page for some
inspiration and other photos and I would
really love it if you would visit my
Denisekeniston website after
all that folks i will see you in the
next video
-------------------------------------------
Marnie Simpson shows off taut tum during nonsurgical lipo procedure - Duration: 1:58.
-------------------------------------------
TWO YEAR/5,000 SUBSCRIBER UPDATE - ALSO CURIOUSCAT - Duration: 0:58.
Hey!
So, wow, StrucciMovies is almost two years old AND just hit 5,000 subscribers.
That is wild.
Thank you so much to everyone for all of the support!
I just wanted to say that I am working on a ton of stuff that will go up eventually.
And just because I haven't been uploading anything lately doesn't mean that I haven't been busy.
First thing to go up will probably be a short film that my friend Devon and I have been working on recutting
that we are both super, super proud of and want to put out the best possible version of.
I'm also working on a few different video essays and a bunch of other projects as well
as setting up some more convention appearances for 2017.
If you have a con you'd like me to come to that you think I'd be a good fit for,
let me know!
I'll have a full list of my 2016 podcast appearances in the description if you missed
any of those.
I have more appearances coming up so stay tuned!
In the meantime, I have an account on a website called curiouscat where you can submit anonymous
questions and I answer them.
It's a pretty simple and direct way to interact with me if you want movie recommendations
or anything like that, soo check it out.
Thanks!
-------------------------------------------
CBB's Coleen twerks and Nicola pretends to snort cocaine - Duration: 2:11.
-------------------------------------------
Undateables' Daniel Wakeford has finally found love - Duration: 2:00.
-------------------------------------------
Middle of the road - Chirpy chirpy cheep cheep - Letra (lyrics) - Duration: 3:03.
-------------------------------------------
Como Alcançar Metas # DouraSoft Lotérica - Duration: 6:49.
-------------------------------------------
Hulk SpiderMan & Disney Pixar Cars McQueen! Kids video! Wheels On The Bus Go Round And Round! - Duration: 10:31.
Hulk SpiderMan & Disney Pixar Cars McQueen! Kids video! Wheels On The Bus Go Round And Round!
Không có nhận xét nào:
Đăng nhận xét