I am watching the Redwings and the Sabers skate to a 2-2 stalemate. So I have been multi-tasking, pondering opportunities gained and those lost and decided to catch up on some of my blog reading. Reading other peoples blogs always makes me want to post to my own blog.
This post is going to be the non-linear human thought that is the result of todays events and the experiences of the last week. First I needed to figure out if my phone was capable of acting as a web 2.0 client, it seems to be. Still tied 1:13 to go Redwings going to a powerplay.
I got a new iPod Nano 5g Thursday and decided to load it up with video podcasts to watch when I am on vacation. I found some interesting podcasts - Security Now and TWiT. Watching TWiT with Leo Laporte and friends is a fun blast from the TechTV past. Interesting social experiments using Web 2.0 technologies like skype, twitter, audible.com and gotomeeting. It is obvious that these technologies are in their infancy, our job is to enable and protect them.
Interestingly I was visiting my parents today and two telling signs of the times became evident. In visits past to my fathers house, I could generally expect to perform some amount of PC maintenance. Today I was not asked for any assistance, could it be that Dad has reached self sufficiency? On to my Mothers house where a generous double chocolate layer cake was found to be freshly prepared. Over cake the conversation turned to my neices new glasses. Mom hadn't seen them yet, my wife and I both raced to put our cell phones, iPods and digital cameras in front of her displaying neice in glasses. The kicker here was when my revealed that she had subcribed to vzw dsl. It seems distant grand childrens picture only available online had finally convinced her that the internet could no longer be ignored. As one parent has spread his wings and left the nest another ha been born to the wild wild west of the internet. How shall I impart all my hard earned wisdom to her without sending her back under the rock of abstinence? One day at a time I guess. Go Mom Go!
BTW Redwings win in OT3-2, a good end to nice day.
Saturday, March 13, 2010
Subscribe to:
Comments (Atom)
My Blog List
-
-
Flickr emails users about data breach, pins it on 3rd party - Attackers may have snapped user locations and activity information, message warns Legacy image-sharing website Flickr suffered a data breach, according to...4 hours ago
-
Please Don’t Feed the Scattered Lapsus ShinyHunters - A prolific data ransom gang that calls itself Scattered Lapsus ShinyHunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim f...4 days ago
-
Happy 23rd Birthday TaoSecurity Blog - Happy birthday TaoSecurity Blog, born on this day in 2003! The best way to digest the key lessons from this site is to browse my four volume Best of Ta...4 weeks ago
-
Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like - Systemic ransomware events in 2025, how Jaguar Land Rover’s shutdown exposed Category 3 supply chain risk, with lessons from Toyota, Nissan and Ferrari.2 months ago
-
Today's NYT Mini Crossword Answers for Tuesday, Oct. 7 - Here are the answers for The New York Times Mini Crossword for Oct. 7.3 months ago
-
Today's NYT Mini Crossword Answers for Tuesday, Oct. 7 - Here are the answers for The New York Times Mini Crossword for Oct. 7.3 months ago
-
Announcing SecTemplates.com release #6: Security Partner Program Pack v1 - I have built several security partner programs at companies such as Box Inc. and Coinbase, with over 8 years of experience leading them. I have consistentl...8 months ago
-
Anybody knows that this URL is about? Maybe Balena API request?, (Wed, Feb 7th) - Yesterday, I noticed a new URL in our honeypots: /v5/device/heartbeat. But I have no idea what this URL may be associated with. Based on some googleing, I ...1 year ago
-
Comic for March 12, 2023 - Dilbert readers - Please visit Dilbert.com to read this feature. Due to changes with our feeds, we are now making this RSS feed a link to Dilbert.com.2 years ago
-
87% of Container Images in Production Have Critical or High-Severity Vulnerabilities - At the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed how to shore up the software supply chain.2 years ago
-
Vulnerability Summary for the Week of November 29, 2021 - Original release date: December 6, 2021 High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info abb -- rtu50...4 years ago
-
AA21-336A: APT Actors Exploiting CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus - Original release date: December 2, 2021 Summary *This joint Cybersecurity Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (AT...4 years ago
-
Ransomware: Why one city chose to the pay the ransom after falling victim - Posted by InfoSec News on Aug 12 https://www.zdnet.com/article/ransomware-why-one-city-chose-to-the-pay-the-ransom-after-falling-victim/ By Danny Palmer Z...5 years ago
-
What the newly released Checkra1n jailbreak means for iDevice security - There are reasons to embrace it. There are reasons to be wary of it. Here's the breakdown.6 years ago
-
Privacy and Mobile Device Apps - Original release date: July 9, 2019 | Last revised: November 15, 2019 What are the risks associated with mobile device apps? Applications (apps) on your sm...6 years ago
-
44CON 2018 - 12th-14th September, London (UK) - Posted by Steve on Feb 28 44CON 2018 is the UK's best annual Security Conference and Training event. The conference spans 2.5 days with training on the 1...7 years ago
-
Cryptopp Crypto++ 5.6.4 octets Remote Code Execution Vulnerability - Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER decoding routine. The library will allocate a memory block based on the leng...8 years ago
-
V2V Communications security considerations - The future of vehicles, road infrastructure and driving are changing. We are progressing with vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) ...8 years ago
-
vTech – ignorance is no defence (and neither are weasel words) - This morning, Troy Hunt published a blog post alerting to a recent change in the Terms & Conditions published by children’s toy manufacturer vTech. The cha...9 years ago
-
DOJ probing claims U.S. drug agency 'collaborated' with NSA on intelligence - The U.S. Justice Dept. said it was "looking into the issues" raised by an Reuters story, that one of its law enforcement agencies collaborated with the NSA...12 years ago
-
-
-
-
-
-
-
-
-