Obtain a Student Visa to Study in the USA


Are you interested in knowing how to obtain a student visa in order to study at a university in the USA? If so then read about the steps I took in obtaining a student visa in order to study at the one of the largest public universities in America, The City University of New York (CUNY).

This post is a bit unusual in the sense that we typically don't cover non-tech related stuff on this blog but given my experience in this area I thought that this might benefit our readers. So, in this and upcoming posts I will walk you through the step by step process of applying for a student visa, entering into the USA, and give you some pointers on what to do during and after your studies are complete and you've earned a degree.

How to Setup Angular CLI

Angular is one of the third top front-end frameworks in 2020. Angular is a TypeScript-based open-source web application framework led by the Angular Team at Google.

In this tutorial we are going to show you a step by step guide to setting up your environment for Angular development and a simple hello-world application.

Wikileaks Vault 7: CIA Tips for Git Workflow

Wikileaks has begun dumping a large number of files on the CIA's hacking tools. The dump is called Vault 7. It is a goldmine, not only for information about the CIA's activities, but also for information on things like how to set up a development environment or properly use Git in your everyday programming workflow. Here are a couple highlights from some cursory searches of the document dump:

CIA Git Tutorials

CIA Vim Tutorials

CIA Setting Up a Development Environment

Hide My IP Address: How to Browse a Website without Visiting It

In this article, we'll provide a few tips and tricks on how to use a couple simple advanced web searches to browse a website without actually visiting the target site, effectively remaining invisible to the site's proprietors. Maybe the website is blocked on the computer you are using. Maybe the site seems somewhat sketchy and you want to check it out before you actually visit it. Maybe you want to read some content on the site, while depriving them of your own web traffic. Maybe you don't want the site's proprietors to know your IP address. Whatever the case may be, if you have access to Google, you may very well be able to see the content you are looking for without ever connecting to the site in question.

County Government Computer System Taken Over by Ransomware

From The Newark Advocate:
A computer virus discovered late Tuesday night caused Licking County government to shut down its computers and phone systems indefinitely to prevent the virus from spreading, protect data and preserve evidence. The FBI and Bureau of Criminal Investigation have been notified. 
The virus, accompanied by a financial demand, is labeled ransomware, which has hit several local governments in Ohio and was the subject of a warning from the state auditor last summer.

The United States Pirate Party

Did you know there is a United States Pirate Party?

The United States Pirate Party (USPP) was founded in 2006 by Brent Allison and Alex English. Our platform is aligned with the International Pirate Movement. 
We support and work toward reformation of intellectual property (IP) laws, true governmental transparency, and protection of privacy and civil liberties. 
We strive for evidence-based policies and egalitarianism, while working against corporate personhood and welfare. We believe that people, not corporations, come first. 
We would like to encourage you to learn more about our name and values here. The Pirate National Committee (PNC), formed in 2012, tracks and assists the growth and development of newly-formed state parties across the nation. As of January 2013, there are 8 member-state parties of the PNC. 
The PNC includes delegates from member-state parties across the nation, and is the governing body of the United States Pirate Party.  Meetings of the PNC are open to the general public and are held biweekly on Wednesdays at 9PM over IRC.

How to Make Sense of the Wikileaks Clinton Campaign Email Document Dump and Controversy

It is becoming increasingly difficult to distinguish fact from fiction in the coverage of Wikileaks' ongoing publication of internal emails from Hillary Clinton's presidential campaign, known as the Podesta emails. There are internet hoaxsters pushing fake emails that are not contained in the actual published files. There are junk reports from prominent newsy websites that are based on obvious misreadings of the files in question. There is Clinton campaign and Democratic party spin seeking to distract from the content of the published emails. There is Trump campaign and Republican party spin exaggerating the content and import of what has been revealed by the leaked documents. And so on. In this article, we'll provide a bit of context on the leak itself, cover some examples of how it is being exploited by hoaxsters, how it is helping to reveal the incompetence of newsy sources of information, and how it is playing out within the context of the presidential campaign itself. We'll conclude with some tips on how to sift through the bullshit.