I am watching the Redwings and the Sabers skate to a 2-2 stalemate. So I have been multi-tasking, pondering opportunities gained and those lost and decided to catch up on some of my blog reading. Reading other peoples blogs always makes me want to post to my own blog.
This post is going to be the non-linear human thought that is the result of todays events and the experiences of the last week. First I needed to figure out if my phone was capable of acting as a web 2.0 client, it seems to be. Still tied 1:13 to go Redwings going to a powerplay.
I got a new iPod Nano 5g Thursday and decided to load it up with video podcasts to watch when I am on vacation. I found some interesting podcasts - Security Now and TWiT. Watching TWiT with Leo Laporte and friends is a fun blast from the TechTV past. Interesting social experiments using Web 2.0 technologies like skype, twitter, audible.com and gotomeeting. It is obvious that these technologies are in their infancy, our job is to enable and protect them.
Interestingly I was visiting my parents today and two telling signs of the times became evident. In visits past to my fathers house, I could generally expect to perform some amount of PC maintenance. Today I was not asked for any assistance, could it be that Dad has reached self sufficiency? On to my Mothers house where a generous double chocolate layer cake was found to be freshly prepared. Over cake the conversation turned to my neices new glasses. Mom hadn't seen them yet, my wife and I both raced to put our cell phones, iPods and digital cameras in front of her displaying neice in glasses. The kicker here was when my revealed that she had subcribed to vzw dsl. It seems distant grand childrens picture only available online had finally convinced her that the internet could no longer be ignored. As one parent has spread his wings and left the nest another ha been born to the wild wild west of the internet. How shall I impart all my hard earned wisdom to her without sending her back under the rock of abstinence? One day at a time I guess. Go Mom Go!
BTW Redwings win in OT3-2, a good end to nice day.
Saturday, March 13, 2010
Subscribe to:
Posts (Atom)
My Blog List
-
-
Cybercrooks are targeting Bengal cat lovers in Australia for some reason - In case today’s news cycle wasn’t shocking enough, here’s a gem from Sophos Fresh from a series of serious reports detailing its five-year battle with Chi...1 hour ago
-
Today's NYT Connections: Sports Edition Hints and Answers for Nov. 6, #44 - Here are some hints — and the answers — for Connections: Sports Edition No. 44 for Nov. 6.2 hours ago
-
Today's NYT Connections: Sports Edition Hints and Answers for Nov. 6, #44 - Here are some hints — and the answers — for Connections: Sports Edition No. 44 for Nov. 6.2 hours ago
-
Canadian Man Arrested in Snowflake Data Extortions - A 26-year-old man in Ontario, Canada has been arrested for allegedly stealing data from and extorting more than 160 companies that used the cloud data serv...1 day ago
-
What Are Normal Users Supposed to Do with IDS Alerts from Network Gear? - Probably once a week, I see posts like this in the r/Ubiquiti subreddit. Ubiquiti makes network gear that includes an "IDS/IPS" feature. I own some older U...3 weeks ago
-
Anybody knows that this URL is about? Maybe Balena API request?, (Wed, Feb 7th) - Yesterday, I noticed a new URL in our honeypots: /v5/device/heartbeat. But I have no idea what this URL may be associated with. Based on some googleing, I ...8 months ago
-
Best EDR Of The Market (BEOTM) – Endpoint Detection and Response Testing Tool - BestEDROfTheMarket is a naive user-mode EDR (Endpoint Detection and Response) tool designed to serve as a testing ground10 months ago
-
Comic for March 12, 2023 - Dilbert readers - Please visit Dilbert.com to read this feature. Due to changes with our feeds, we are now making this RSS feed a link to Dilbert.com.1 year ago
-
87% of Container Images in Production Have Critical or High-Severity Vulnerabilities - At the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed how to shore up the software supply chain.1 year ago
-
Vulnerability Summary for the Week of November 29, 2021 - Original release date: December 6, 2021 High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info abb -- rtu50...2 years ago
-
AA21-336A: APT Actors Exploiting CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus - Original release date: December 2, 2021 Summary *This joint Cybersecurity Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (AT...2 years ago
-
20 years of CGISecurity: What appsec looked like in the year 2000 - Just realized that 20 years have passed since I started this site to learn more about web security threats. What 'appsec' looked like in 2000 OWASP didn't ...3 years ago
-
Ransomware: Why one city chose to the pay the ransom after falling victim - Posted by InfoSec News on Aug 12 https://www.zdnet.com/article/ransomware-why-one-city-chose-to-the-pay-the-ransom-after-falling-victim/ By Danny Palmer Z...4 years ago
-
What the newly released Checkra1n jailbreak means for iDevice security - There are reasons to embrace it. There are reasons to be wary of it. Here's the breakdown.4 years ago
-
Privacy and Mobile Device Apps - Original release date: July 9, 2019 | Last revised: November 15, 2019 What are the risks associated with mobile device apps? Applications (apps) on your sm...5 years ago
-
44CON 2018 - 12th-14th September, London (UK) - Posted by Steve on Feb 28 44CON 2018 is the UK's best annual Security Conference and Training event. The conference spans 2.5 days with training on the 1...6 years ago
-
Cryptopp Crypto++ 5.6.4 octets Remote Code Execution Vulnerability - Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER decoding routine. The library will allocate a memory block based on the leng...7 years ago
-
V2V Communications security considerations - The future of vehicles, road infrastructure and driving are changing. We are progressing with vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) ...7 years ago
-
vTech – ignorance is no defence (and neither are weasel words) - This morning, Troy Hunt published a blog post alerting to a recent change in the Terms & Conditions published by children’s toy manufacturer vTech. The cha...8 years ago
-
DOJ probing claims U.S. drug agency 'collaborated' with NSA on intelligence - The U.S. Justice Dept. said it was "looking into the issues" raised by an Reuters story, that one of its law enforcement agencies collaborated with the NSA...11 years ago
-
-
-
-
-
-
-
-
-