|
The Intentional Flooding of America's Heartland |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Présentation : Hugh Pickens writes Joe Herring writes that sixty years ago, the U.S. Army Corps of Engineers began the process of taming the Missouri by constructing massive dams at the top to moderate flow to the smaller dams below, generating electricity while providing desperately needed control of the river's devastating floods, but after about thirty years of operation, as the environmentalist movement gained strength throughout the seventies and eighties, the Corps received a great deal of pressure to include specific environmental concerns into their Master Water Control Manual, the 'bible' for the operation of the dam system, as preservation of habitat for at-risk bird and fish populations soon became a hot issue among the burgeoning environmental lobby. The Corps began to utilize the dam system to mimic the previous flow cycles of the original river, holding back large amounts of water upstream during the winter and early spring in order to release them rapidly as a spring pulse. 'Whether warned or not, the fact remains that had the Corps been true to its original mission of flood control, the dams would not have been full in preparation for a spring pulse,' writes Herring. 'The dams could further have easily handled the additional runoff without the need to inundate a sizable chunk of nine states.' The horrifying consequence is water rushing from the dams on the Missouri twice as fast as the highest previous releases on record while the levees that protect the cities and towns downstream were constructed to handle the flow rates promised at the time of the dam's construction. Read more of this story at Slashdot.
Les mots clés de la revue de presse pour cet article : heartland
Les derniers articles du site "Slashdot Your Rights Online" :
- FBI Director Suggests iPhone Hacking Method May Remain Secret - City Installs Traffic Lights In Sidewalks For Smartphone Users - Tesla Will Install More Energy Storage With SolarCity In 2016 Than The US Installed In 2015 - Symantec Cruz and Kasich Campaign Apps May Expose Sensitive Data - New 'Tunneling' State of Water Molecules Discovered by Scientists - Your Pay Is About To Go Up - Software Audits How High-Tech Software Vendors Play Hardball - Swedish ISP Vows to Protect Users From a Piracy Witch Hunt - US Wants Its Own Secure and Self-Destructing Messaging App -- And It's Willing to Pay - Spy Chief Complains That Edward Snowden Sped Up Spread of Encryption By 7 Years
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|