Giannis Antetokounmpo was born in 1994 in Athens, Greece to Nigerian parents. He grew up in poverty in Athens and helped his family by selling items in the streets as a child. He began playing basketball in 2007 and was drafted 15th overall by the Milwaukee Bucks in 2013, becoming the first Greek player drafted in the NBA. Antetokounmpo has since become an NBA All-Star, leading the Eastern Conference in points during the 2017 All-Star Game, and signed a $100 million contract with the Bucks, making him the first NBA player to finish in the top 20 of all major stats.
The Hatziemmanouil winery is a family-owned business located on the Greek island of Kos. Due to its Mediterranean climate, Kos has ideal conditions for grape-growing and wine production. The winery owns 60 acres of fertile land and is the second largest but highest quality wine producer on the island. In 2004, the winery relocated to a larger facility, allowing them to expand production and modernize with new equipment. Today they employ 6 people seasonally to manage the grape growing and winemaking process, which culminates in 6 varieties of award-winning wines that are bottled and distributed.
Ecclesiastical nursing home in Kos, GreeceAthina MINAIDI
The Ecclesiastical Nursing Home "Agios Nektarios" in Kos, Greece was built in 1969-1971 with funding from the Metropolitan Bishop Nathaniel, citizens of Kos, the municipality, and endowments. It currently houses 8 women and 2 men and has capacity for 40 elderly residents. Residents generally stay until the end of their lives as their families are unable or unwilling to care for them. A daily routine includes meals, activities, visits from doctors, and optional participation in programs depending on individual abilities and needs. Common problems faced by residents include loneliness, lack of companionship, and issues with family relationships. Local students recently visited and found the facility to be clean and meeting residents' needs.
This document discusses an Erasmus+ program called "Safe Internet for All" involving schools from across Europe. The schools work on projects related to internet addiction, health, security, ethics, and safety. It describes visits between schools in Austria, Norway, Sweden, Greece, and Poland focused on internet safety workshops and lectures. It provides instructions for accessing the program's website, available in multiple languages, to learn more about the participating schools and their activities.
Hackers are people who try to gain unauthorized access to computer systems. Originally, the term "hacker" referred positively to computer enthusiasts who enjoyed programming, but it now generally refers to those who break into systems or use their skills maliciously. Common types of hacking include breaking into networks, bypassing passwords, defacing websites, and denial of service attacks. Hackers can steal valuable information like credit cards or install backdoors and programs to spy on users. Motives for hacking range from challenges, attention-seeking, education, and criminal plans to steal data and money. Famous hackers include Jonathan James, Kevin Mitnick, Albert Gonzalez, Kevin Poulsen, and Gary McKinnon.
Giannis Antetokounmpo was born in 1994 in Athens, Greece to Nigerian parents. He grew up in poverty in Athens and helped his family by selling items in the streets as a child. He began playing basketball in 2007 and was drafted 15th overall by the Milwaukee Bucks in 2013, becoming the first Greek player drafted in the NBA. Antetokounmpo has since become an NBA All-Star, leading the Eastern Conference in points during the 2017 All-Star Game, and signed a $100 million contract with the Bucks, making him the first NBA player to finish in the top 20 of all major stats.
The Hatziemmanouil winery is a family-owned business located on the Greek island of Kos. Due to its Mediterranean climate, Kos has ideal conditions for grape-growing and wine production. The winery owns 60 acres of fertile land and is the second largest but highest quality wine producer on the island. In 2004, the winery relocated to a larger facility, allowing them to expand production and modernize with new equipment. Today they employ 6 people seasonally to manage the grape growing and winemaking process, which culminates in 6 varieties of award-winning wines that are bottled and distributed.
Ecclesiastical nursing home in Kos, GreeceAthina MINAIDI
The Ecclesiastical Nursing Home "Agios Nektarios" in Kos, Greece was built in 1969-1971 with funding from the Metropolitan Bishop Nathaniel, citizens of Kos, the municipality, and endowments. It currently houses 8 women and 2 men and has capacity for 40 elderly residents. Residents generally stay until the end of their lives as their families are unable or unwilling to care for them. A daily routine includes meals, activities, visits from doctors, and optional participation in programs depending on individual abilities and needs. Common problems faced by residents include loneliness, lack of companionship, and issues with family relationships. Local students recently visited and found the facility to be clean and meeting residents' needs.
This document discusses an Erasmus+ program called "Safe Internet for All" involving schools from across Europe. The schools work on projects related to internet addiction, health, security, ethics, and safety. It describes visits between schools in Austria, Norway, Sweden, Greece, and Poland focused on internet safety workshops and lectures. It provides instructions for accessing the program's website, available in multiple languages, to learn more about the participating schools and their activities.
Hackers are people who try to gain unauthorized access to computer systems. Originally, the term "hacker" referred positively to computer enthusiasts who enjoyed programming, but it now generally refers to those who break into systems or use their skills maliciously. Common types of hacking include breaking into networks, bypassing passwords, defacing websites, and denial of service attacks. Hackers can steal valuable information like credit cards or install backdoors and programs to spy on users. Motives for hacking range from challenges, attention-seeking, education, and criminal plans to steal data and money. Famous hackers include Jonathan James, Kevin Mitnick, Albert Gonzalez, Kevin Poulsen, and Gary McKinnon.
This document summarizes research on internet addiction. It discusses characteristics of addiction and compares chemical and non-chemical addictions. It reviews research showing relationships between internet addiction and factors like loneliness, obesity, sleep problems, school performance, and depression. While most studies are cross-sectional, some longitudinal and treatment studies suggest internet addiction can cause and result from other issues. The document concludes there is evidence for links between internet addiction and other problems but more research is still needed.
This document provides information about the 2nd Lyceum of Kos, a state school in Greece. It has 270 students and 30 teachers. Students take a common curriculum in the first year and can choose between theoretical, technological, or science studies for the final two years. All courses lead to the same secondary school diploma. The school has ICT and science labs, a gym, and library. It offers computer science courses and participates in European educational projects to supplement students' learning.
Greece is a southern European country located in Southeast Europe, with a population of around 11 million people. It has a long history dating back to ancient Greek civilizations like the Minoan and Mycenaean cultures. In modern times, Greece struggled against Ottoman occupation for 400 years before gaining independence in the 19th century. Today, Greece is a parliamentary republic and member of the European Union, with a predominantly Greek Orthodox population and a culture that highly values family and interpersonal relationships.
The document provides information about the Greek island of Kos. It notes that Kos is located in the Dodecanese Islands in the Aegean Sea and has sandy beaches, a rich history, and vibrant nightlife. The document then discusses Kos's history, including being originally colonized by the Carians, participating in the Trojan War, and being ruled by various powers like the Venetians, Ottomans, Italians, and eventually being ceded to Greece. It also mentions that the famous physician Hippocrates was born on Kos and founded the first ancient hospital there called the Asclepion.
1. DARK NET PROJECT Σελίδα 1
`
2ο Γενικό Λύκειο Κω
Συντάκτες:
Γιώργος Κεφαλάς
Παύλος Κουλλόλλι
Αναστάσιος Κουτσοφάβας
Μάθημα:
Project Α
Β τετράμηνο
2. DARKNET PROJECT Σελίδα 2
DARK NET
Περιεχόμενα
Εισαγωγή......................................................................................................................... 3
Λειτουργία του Darknet....................................................................................................4
Η Φωτεινή Πλευρά του Dark Net....................................................................................... 5
Μετάφραση Κειμένου...................................................................................................... 6
3. DARKNET PROJECT Σελίδα 3
Εισαγωγή
Πέρα από τον κόσμο του διαδικτύου που βλέπουμε και χρησιμοποιούμε
καθημερινά, υπάρχει και ένας άλλος, αθέατος κόσμος, άγνωστος στο ευρύ
κοινό, όπου οι διευθύνσεις αλλάζουν κάθε λεπτό και οι εγκληματίες
εμπορεύονται τα πάντα, από ναρκωτικά μέχρι ανθρώπινες ζωές.
4. DARKNET PROJECT Σελίδα 4
Λειτουργία του Darknet
Για να κατανοήσουμε καλύτερα τη λειτουργία του Darknet, μπορούμε να
φανταστούμε το διαδίκτυο ως ένα τεράστιο παγόβουνο, η κορυφή του οποίου
περισσεύει ελάχιστα από τη θάλασσα ενώ ο τεράστιος όγκος του κρύβεται στο
βυθό. Σε αυτή την περίπτωση η μύτη του παγόβουνου είναι οι ιστοσελίδες
που χρησιμοποιούμε καθημερινά όπως το Goοgle και το Youtube
αλλα,μια τεράστεια σωρεία πληροφοριών και ιστοσελίδων κρύβεται στο βυθό
και δεν είναι προσβάσιμη από τα συμβατικά browsers. Το σκοτεινό διαδίκτυο,
γνωστό και ως Darknet, παρέχει ανωνυμία στους χρήστες, ευνοώντας έτσι
κάθε λογής παράνομες αγοραπωλησίες. Από τις έκνομες δραστηριότητες που
βρίσκει κανείς συχνά στο Darknet, ψηλά στη λίστα βρίσκεται η διακίνηση
παιδικής πορνογραφίας, ναρκωτικών, όπλων, κλεμμένων πιστωτικών καρτών
και πλαστών ταυτοτήτων
Προκειμένου να «κρύβεται» από το FBI, το Darknet χρησιμοποιεί ένα δίκτυο
από σέρβερ, που βασίζονται σε τεχνολογίες κρυπτογράφησης για να
ανταλλάσσουν δεδομένα. Η πιο διαδεδομένη τεχνολογία γι' αυτό τον σκοπό
είναι το Tor (The onion router), το οποίο , αναπτύχθηκε αρχικά από το
Ερευνητικό Εργαστήριο του αμερικανικού πολεμικού ναυτικού, για την
προστασία των στρατιωτικών επικοινωνιών και μπορεί να καμουφλάρει τον
σέρβερ που το φιλοξενεί.
Πρόσφατα, το Darknet απέκτησε και το δικό του ηλεκτρονικό ψαχτήρι,
αντίστοιχο του γνωστού Google, ονόματι Grams, μια μηχανή αναζήτησης που
συγκεντρώνει αποτελέσματα από οκτώ online «μαύρες αγορές» και τις
αγγελίες τους. Βέβαια, επειδή ακριβώς το κίνητρο είναι το κέρδος, μελλοντικά
το Grams, θα αρχίσει να χρεώνει όσους θέλουν να διαφημίσουν τις αγγελίες
τους.
5. DARKNET PROJECT Σελίδα 5
Η Φωτεινή Πλευρά του Dark Net
Μπορεί το Darknet να έρχεται στην επικαιρότητα συνήθως με αφορμή
αστυνομικές επιχειρήσεις που έχουν στο στόχαστρο «μαύρες αγορές» σαν το
Silk Road, ωστόσο αυτό δεν σημαίνει πως είναι απλώς το online ανάλογο του
πραγματικού υποκόσμου. «Το Σκοτεινό Διαδίκτυο έχει και μία εξαιρετικά
σημαντική “φωτεινή” πλευρά, εξασφαλίζοντας την ελευθερία της έκφρασης σε
ανθρώπους που ζουν σε απολυταρχικά καθεστώτα και βοηθώντας να έρθουν
στο φως συνταρακτικά ντοκουμέντα, χωρίς τον φόβο όσων τα διέρρευσαν
πως θα διωχθούν ποινικά», σημειώνει ο ( Brad Chacos) από το περιοδικό
PC World.
Ενδεικτικά, στο Darknet έχουν κατά καιρούς φιλοξενηθεί αντίγραφα του
GlobalLeaks και του Wikileaks, ενώ το περιοδικό New Yorker έχει
δημιουργήσει το Strongbox , μια υπηρεσία στο Σκοτεινό Διαδίκτυο που
εγγυάται ανωνυμία σε όσους θελήσουν να επικοινωνήσουν με τους συντάκτες
του με μεγαλύτερη ασφάλεια από αυτήν που προσφέρουν τα ηλεκτρονικά
ταχυδρομεία. Επίσης, η οργάνωση «Δημοσιογράφοι Χωρίς Σύνορα»
συμβουλεύει τα μέλη της να το χρησιμοποιούν για να έρχονται σε επαφή με
τις πηγές τους, στην περίπτωση που θέλουν να διασφαλίσουν πως θα μείνει
μυστική η ταυτότητα όσων επικοινωνούν.
Το Darknet κατακλύσθηκε από μπλογκ κατά τη διάρκεια της «Αραβικής
Ανοιξης», από ανθρώπους που συμμετείχαν στις εξεγέρσεις και ήθελαν να
μεταφέρουν στο εξωτερικό τη μαρτυρία τους. Δυνατότητες που, όπως
σημειώνει ο συντάκτης του PC World, δεν θα μπορούσαν να γίνουν
πραγματικότητα, αν το Σκοτεινό Διαδίκτυο δεν προσέφερε ένα επίπεδο
ασφάλειας το οποίο δυστυχώς το κάνει ελκυστικό και σε εγκληματίες.
6. DARKNET PROJECT Σελίδα 6
Μετάφραση Κειμένου
Beyond the world of the Internet we see and use every day, there is another,
invisible world, unknown to the general public, where addresses change
every minute and criminals trade everything from drugs to human lives.
In order to 'hide' from the FBI, the Dark net uses a network from a server,
based on encryption technologies to exchange data. The most common
technology for this purpose is the Tor (The onion router), which was originally
developed by the Research Laboratory of the US Navy, to protect military
communications and can camouflage the server that hosts it.
The Dark Internet has an extremely important" bright "side, ensuring freedom
of expression for people living under totalitarian regimes and helping to bring
to light shocking documents, without the fear of those who leaked that will
prosecute, notes ( Brad Chacos ) by the magazine PC World.
Indicatively to Dark net have occasionally hosted copies of Global Leaks
and Wiki leaks, while the New York magazine has created the Strongbox, a
service on the Internet Dark guaranteed anonymity to those who want to
contact the authors with greater security than that offered by emails. Also, the
organization Reporters Without Borders' advises its members to use it to
come into contact with their sources, if they want to ensure that the identity of
those who communicate would stay secret.
the Dark net flooded with blogs during the "Arab Spring," by people who
participated in the uprisings and wanted to transfer abroad their evidence.
Features such as notes the author of PC World, could become reality if the
Dark Internet did not offer a level of safety which unfortunately makes it
attractive to criminals.