Aerospace Turbine Rotables, Inc. Announces Major Expansion in Wichita, KS

WICHITA, KS, United States, via ETELIGIS INC., 03/27/2015 - - Aerospace Turbine Rotables, Inc. (AeTR), a wholly owned subsidiary of First Aviation Services Inc., announced today the relocation to its new facilities at 1919 East Northern, Wichita, KS to be completed on June 1, 2015.

The 72,000 sq. ft. facility has gone through an extensive fit up to permit a doubling of AeTRs operational capacity and to accommodate the firms continued growth. Over the last year AeTR successfully introduced new capabilities in each of its major product lines including landing gear, structural repairs, hydrostatic, flight control, safety equipment, electrical and hydraulic.

We have some of the most talented people in the industry and with this new state of the art facility they will be able to provide even more capability to our customers, says Dave Seavey, Vice President and General Manager of AeTR. We do not expect any interruption of service during the move as both the current and new facilities will remain in operation and be FAA-certified during the transition.

About Aerospace Turbine Rotables Inc. (www.turbinerotables.com)

Aerospace Turbine Rotables, Inc. (AeTR), a subsidiary of First Aviation Services Inc., has over 40 years experience as an FAA and EASA certified repair station in the repair and overhaul of various aircraft system components, primarily serving the corporate, paramilitary and military markets. AeTRs extensive repair and overhaul capabilities include Landing Gear Systems, Struts & Actuators, Wheels and Brakes, Hydraulic Power Packs, Flap Actuators, Motors & Gear Boxes, Flight Control Actuators, Beacons, Landing Lights, Emergency Power Supplies, Strobe Lights, Power Supplies, Tach Generators, Voltage Regulators, Oxygen & Fire Bottles Hydrostatic Testing, Crew Masks & Oxygen Regulators, Control Surfaces, and other advanced composite and metal bond repairs. AeTR is also a certified Stratoflex hose distributor.

About First Aviation Services Inc. (www.firstaviation.com)

First Aviation Services Inc. (FAvS), located in Westport, Connecticut, is a leading provider of repair and overhaul, rotables management and related engineering services to the aviation industry worldwide. FAvS principal operating subsidiaries are Aerospace Turbine Rotables, Inc. (AeTR) in Wichita, Kansas, and Piedmont Propulsion Systems, LLC (PPS) in Winston-Salem, North Carolina. FAvS also owns a minority interest in Aerospace Products International, Inc., based in Memphis, Tennessee. More information about FAvS and its subsidiaries may be found on the companys website, http://www.firstaviation.com. Please see our forward looking statements at http://www.firstaviation.com/forward.

Read the original:

Aerospace Turbine Rotables, Inc. Announces Major Expansion in Wichita, KS

PSA Project for English 212 SVSU (Censorship Causes Mixed Messages) – Video


PSA Project for English 212 SVSU (Censorship Causes Mixed Messages)
BY: Shane Guerin, Tyler Newell, Jason Churray, and Chris Currie and special guest star, Jennifer Mielke PSA Project for English 212 SVSU (Censorship Causes Mixed Messages) This is a public...

By: Shane Guerin

Read the original here:

PSA Project for English 212 SVSU (Censorship Causes Mixed Messages) - Video

is Censorship Vital in White Peoples System of White Supremacy? Pt 1 – Video


is Censorship Vital in White Peoples System of White Supremacy? Pt 1
I discussed what I think is an oxymoron in America, which is free speech. Do white people feel it is absolutely necessary to control speech? There is no doubt in my mind that white people censor...

By: Aaron B

The rest is here:

is Censorship Vital in White Peoples System of White Supremacy? Pt 1 - Video

China anti-censorship projects attract GitHub's largest ever DDoS attacks

Home News Security China anti-censorship projects attract GitHub's largest ever DDoS attacks GitHub has halted most of the distributed denial-of-service (DDoS) attacks it has faced from Thursday of last week.

Share

A GitHub service called Gists, which lets people post bits of code, was still affected,the site said yesterday (Sunday 29 March). On Twitter, GitHub said it continued to adapt its defenses.

The attacks appeared to focus specifically on two projects hosted on GitHub, according to a blogger who goes by the nickname of Anthr@Xon a Chinese- and English-language computer security forum.

One project mirrors the content of The New York Times for Chinese users, and the other is run by Greatfire.org, a group that monitors websites censored by the Chinese government and develops ways for Chinese users to access banned services.

China exerts strict control over Internet access through its "Great Firewall," a sophisticated ring of networking equipment and filtering software. The country blocks thousands of websites, including ones such as Facebook and Twitter and media outlets such as The Wall Street Journal, The New York Times and Bloomberg.

Anthr@X wrote that it appeared advertising and tracking code used by many Chinese websites appeared to have been modified in order to attack the GitHub pages of the two software projects.

The tracking code was written by Baidu, but it did not appear the search engine -- the largest in China -- had anything to do with it. Instead, Anthr@X wrote that some device on the border of China's inner network was hijacking HTTP connections to websites within the country.

The Baidu tracking code had been replaced with malicious JavaScript that would load the two GitHub pages every two seconds. In essence, it means the attackers had roped in regular Internet users into their attacks without them knowing.

"In other words, even people outside China are being weaponised to target things the Chinese government does not like, for example, freedom of speech," Anthr@X wrote.

Read more from the original source:

China anti-censorship projects attract GitHub's largest ever DDoS attacks

'Largest DDoS attack' in GitHub's history targets anticensorship projects

GitHub has been hammered by a continuous DDoS attack for three days. It's the "largest DDoS attack in github.com's history." The attack is aimed at anti-censorship GreatFire and CN-NYTimes projects, but affected all of GitHub; the traffic is coming from China as attackers are reportedly using China's search engine Baidu for the purpose of "HTTP hijacking."

According to tweeted GitHub status messages, GitHub has been the victim of a Distributed Denial of Service (DDoS) attack since Thursday March 26. 24 hours later, GitHub had "all hands on deck" working to mitigate the continuous attack. After GitHub later deployed "volumetric attack defenses," the attack morphed to include GitHub pages and then "pages and assets." Today, GitHub said it was 71 hours into defending against the attack.

Seven hours later, GitHub said the attackers changed DDoS tactics and it was experiencing outages again.

Four hours later, GitHub said its services were stable although it was continuing to mitigate against the large-scale DDoS attack. Four hours after that, GitHub said the ongoing attack was affecting connectivity to GitHub Gist.

The attack is aimed at GreatFire and CN-NYTimes projects that help Chinese users get around their government's online censorship, but affected all of GitHub. The traffic is coming from China.

According to analysis by Insight Labs, by a Chinese security researcher living outside of China, "My first thought was someone naughty XSSed the page, so I opened developer tools to find the source of the XSS," Anthr@X wrote. "Almost instantly I saw it was keep trying to load these two URLs: github.com/greatefire/ and github.com/cn-nytimes/ every a few seconds."

Baidu is like China's Google and many Chinese website using tracking and advertising code from Baidu. The "HTTP hijacking" was explained as "a certain device at the border of China's inner network and the Internet has hijacked the HTTP connections" and "replaced some JavaScript files from Baidu with malicious ones" that would load GitHub's GreatFire and CN-NYTimes projects "every two seconds."

CN-NYTimes gets around censorship by mirroring NYTimes and GreatFire has long been fighting against Chinese censorship.

Ten days ago, GreatFire said it was "under attack" and asked for help. Last week GreatFire wrote about having "concrete proof from Google that CNNIC (and by extension CAC) is indeed complicit in MITM attacks." That post pointed to Google Security Engineer Adam Langley saying Google was aware of "unauthorized digital certificates for several Google domains." The certificates were issued by CNNIC (China Internet Network Information Center).

While GreatFire was reportedly "delighted that Google, Microsoft and Mozilla have taken steps to blacklist the intermediate certificate used in the attack," the online censorship watchdog called on "Google, Mozilla, Microsoft and Apple to revoke trust for CNNIC immediately in order to protect Chinese user data and user data worldwide."

More:

'Largest DDoS attack' in GitHub's history targets anticensorship projects

Terrorism! The Greatest Excuse to End Free Speech and Canada’s New Anti Terror Bill 2015 – Video


Terrorism! The Greatest Excuse to End Free Speech and Canada #39;s New Anti Terror Bill 2015
Video by Dolores Flores Channel - https://www.youtube.com/channel/UCJ09JezMOEsdjno1BIbc4Sg Canada #39;s Bill C-51 https://shawglobalnews.files.wordpress.com/2015/01/bill-c-51.pdf.

By: Falling Awake

The rest is here:

Terrorism! The Greatest Excuse to End Free Speech and Canada's New Anti Terror Bill 2015 - Video