I am watching the Redwings and the Sabers skate to a 2-2 stalemate. So I have been multi-tasking, pondering opportunities gained and those lost and decided to catch up on some of my blog reading. Reading other peoples blogs always makes me want to post to my own blog.
This post is going to be the non-linear human thought that is the result of todays events and the experiences of the last week. First I needed to figure out if my phone was capable of acting as a web 2.0 client, it seems to be. Still tied 1:13 to go Redwings going to a powerplay.
I got a new iPod Nano 5g Thursday and decided to load it up with video podcasts to watch when I am on vacation. I found some interesting podcasts - Security Now and TWiT. Watching TWiT with Leo Laporte and friends is a fun blast from the TechTV past. Interesting social experiments using Web 2.0 technologies like skype, twitter, audible.com and gotomeeting. It is obvious that these technologies are in their infancy, our job is to enable and protect them.
Interestingly I was visiting my parents today and two telling signs of the times became evident. In visits past to my fathers house, I could generally expect to perform some amount of PC maintenance. Today I was not asked for any assistance, could it be that Dad has reached self sufficiency? On to my Mothers house where a generous double chocolate layer cake was found to be freshly prepared. Over cake the conversation turned to my neices new glasses. Mom hadn't seen them yet, my wife and I both raced to put our cell phones, iPods and digital cameras in front of her displaying neice in glasses. The kicker here was when my revealed that she had subcribed to vzw dsl. It seems distant grand childrens picture only available online had finally convinced her that the internet could no longer be ignored. As one parent has spread his wings and left the nest another ha been born to the wild wild west of the internet. How shall I impart all my hard earned wisdom to her without sending her back under the rock of abstinence? One day at a time I guess. Go Mom Go!
BTW Redwings win in OT3-2, a good end to nice day.
Saturday, March 13, 2010
Subscribe to:
Posts (Atom)
My Blog List
-
-
Tyson Fury vs. Oleksandr Usyk Livestream: When It Starts and How to Watch Heavyweight Boxing Fight - CNET - The unbeaten rivals clash in a hotly anticipated undisputed title fight in Saudi Arabia.5 hours ago
-
Tyson Fury vs. Oleksandr Usyk Livestream: When It Starts and How to Watch Heavyweight Boxing Fight - CNET - The unbeaten rivals clash in a hotly anticipated undisputed title fight in Saudi Arabia.5 hours ago
-
An attorney says she saw her library reading habits reflected in mobile ads. That's not supposed to happen - Follow us down this deep rabbit hole of privacy policy after privacy policy *Feature* In April, attorney Christine Dudley was listening to a book on her i...7 hours ago
-
Patch Tuesday, May 2024 Edition - Microsoft today released updates to fix more than 60 security holes in Windows computers and supported software, including two "zero-day" vulnerabilities i...4 days ago
-
Anybody knows that this URL is about? Maybe Balena API request?, (Wed, Feb 7th) - Yesterday, I noticed a new URL in our honeypots: /v5/device/heartbeat. But I have no idea what this URL may be associated with. Based on some googleing, I ...3 months ago
-
Best EDR Of The Market (BEOTM) – Endpoint Detection and Response Testing Tool - BestEDROfTheMarket is a naive user-mode EDR (Endpoint Detection and Response) tool designed to serve as a testing ground4 months ago
-
My Last Email with W. Richard Stevens - In the fall of 1998 I joined the AFCERT. I became acquainted with the amazing book *TCP/IP Illustrated, Volume 1: The Protocols* by W. Richard Stevens...10 months ago
-
Comic for March 12, 2023 - Dilbert readers - Please visit Dilbert.com to read this feature. Due to changes with our feeds, we are now making this RSS feed a link to Dilbert.com.1 year ago
-
87% of Container Images in Production Have Critical or High-Severity Vulnerabilities - At the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed how to shore up the software supply chain.1 year ago
-
Vulnerability Summary for the Week of November 29, 2021 - Original release date: December 6, 2021 High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info abb -- rtu50...2 years ago
-
AA21-336A: APT Actors Exploiting CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus - Original release date: December 2, 2021 Summary *This joint Cybersecurity Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (AT...2 years ago
-
20 years of CGISecurity: What appsec looked like in the year 2000 - Just realized that 20 years have passed since I started this site to learn more about web security threats. What 'appsec' looked like in 2000 OWASP didn't ...3 years ago
-
Ransomware: Why one city chose to the pay the ransom after falling victim - Posted by InfoSec News on Aug 12 https://www.zdnet.com/article/ransomware-why-one-city-chose-to-the-pay-the-ransom-after-falling-victim/ By Danny Palmer Z...3 years ago
-
What the newly released Checkra1n jailbreak means for iDevice security - There are reasons to embrace it. There are reasons to be wary of it. Here's the breakdown.4 years ago
-
Privacy and Mobile Device Apps - Original release date: July 9, 2019 | Last revised: November 15, 2019 What are the risks associated with mobile device apps? Applications (apps) on your sm...4 years ago
-
44CON 2018 - 12th-14th September, London (UK) - Posted by Steve on Feb 28 44CON 2018 is the UK's best annual Security Conference and Training event. The conference spans 2.5 days with training on the 1...6 years ago
-
Cryptopp Crypto++ 5.6.4 octets Remote Code Execution Vulnerability - Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER decoding routine. The library will allocate a memory block based on the leng...6 years ago
-
V2V Communications security considerations - The future of vehicles, road infrastructure and driving are changing. We are progressing with vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) ...7 years ago
-
vTech – ignorance is no defence (and neither are weasel words) - This morning, Troy Hunt published a blog post alerting to a recent change in the Terms & Conditions published by children’s toy manufacturer vTech. The cha...8 years ago
-
DOJ probing claims U.S. drug agency 'collaborated' with NSA on intelligence - The U.S. Justice Dept. said it was "looking into the issues" raised by an Reuters story, that one of its law enforcement agencies collaborated with the NSA...10 years ago
-
-
-
-
-
-
-
-
-