I am watching the Redwings and the Sabers skate to a 2-2 stalemate. So I have been multi-tasking, pondering opportunities gained and those lost and decided to catch up on some of my blog reading. Reading other peoples blogs always makes me want to post to my own blog.
This post is going to be the non-linear human thought that is the result of todays events and the experiences of the last week. First I needed to figure out if my phone was capable of acting as a web 2.0 client, it seems to be. Still tied 1:13 to go Redwings going to a powerplay.
I got a new iPod Nano 5g Thursday and decided to load it up with video podcasts to watch when I am on vacation. I found some interesting podcasts - Security Now and TWiT. Watching TWiT with Leo Laporte and friends is a fun blast from the TechTV past. Interesting social experiments using Web 2.0 technologies like skype, twitter, audible.com and gotomeeting. It is obvious that these technologies are in their infancy, our job is to enable and protect them.
Interestingly I was visiting my parents today and two telling signs of the times became evident. In visits past to my fathers house, I could generally expect to perform some amount of PC maintenance. Today I was not asked for any assistance, could it be that Dad has reached self sufficiency? On to my Mothers house where a generous double chocolate layer cake was found to be freshly prepared. Over cake the conversation turned to my neices new glasses. Mom hadn't seen them yet, my wife and I both raced to put our cell phones, iPods and digital cameras in front of her displaying neice in glasses. The kicker here was when my revealed that she had subcribed to vzw dsl. It seems distant grand childrens picture only available online had finally convinced her that the internet could no longer be ignored. As one parent has spread his wings and left the nest another ha been born to the wild wild west of the internet. How shall I impart all my hard earned wisdom to her without sending her back under the rock of abstinence? One day at a time I guess. Go Mom Go!
BTW Redwings win in OT3-2, a good end to nice day.
Saturday, March 13, 2010
Subscribe to:
Post Comments (Atom)
My Blog List
-
-
Researchers call out QNAP for dragging its heels on patch development - WatchTowr publishes report claiming vendor failed to issue fixes after four months Infosec boffins say they were forced to go public after QNAP failed to ...2 hours ago
-
Mushroom Coffee: How It Works, Potential Health Benefits and Things to Consider - CNET - Mushroom coffee has gained popularity in recent years and many claim it's a better alternative to regular coffee. Here's what you need to know.2 hours ago
-
Mushroom Coffee: How It Works, Potential Health Benefits and Things to Consider - CNET - Mushroom coffee has gained popularity in recent years and many claim it's a better alternative to regular coffee. Here's what you need to know.2 hours ago
-
Patch Tuesday, May 2024 Edition - Microsoft today released updates to fix more than 60 security holes in Windows computers and supported software, including two "zero-day" vulnerabilities i...5 days ago
-
Anybody knows that this URL is about? Maybe Balena API request?, (Wed, Feb 7th) - Yesterday, I noticed a new URL in our honeypots: /v5/device/heartbeat. But I have no idea what this URL may be associated with. Based on some googleing, I ...3 months ago
-
Best EDR Of The Market (BEOTM) – Endpoint Detection and Response Testing Tool - BestEDROfTheMarket is a naive user-mode EDR (Endpoint Detection and Response) tool designed to serve as a testing ground4 months ago
-
My Last Email with W. Richard Stevens - In the fall of 1998 I joined the AFCERT. I became acquainted with the amazing book *TCP/IP Illustrated, Volume 1: The Protocols* by W. Richard Stevens...10 months ago
-
Comic for March 12, 2023 - Dilbert readers - Please visit Dilbert.com to read this feature. Due to changes with our feeds, we are now making this RSS feed a link to Dilbert.com.1 year ago
-
87% of Container Images in Production Have Critical or High-Severity Vulnerabilities - At the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed how to shore up the software supply chain.1 year ago
-
Vulnerability Summary for the Week of November 29, 2021 - Original release date: December 6, 2021 High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info abb -- rtu50...2 years ago
-
AA21-336A: APT Actors Exploiting CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus - Original release date: December 2, 2021 Summary *This joint Cybersecurity Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (AT...2 years ago
-
20 years of CGISecurity: What appsec looked like in the year 2000 - Just realized that 20 years have passed since I started this site to learn more about web security threats. What 'appsec' looked like in 2000 OWASP didn't ...3 years ago
-
Ransomware: Why one city chose to the pay the ransom after falling victim - Posted by InfoSec News on Aug 12 https://www.zdnet.com/article/ransomware-why-one-city-chose-to-the-pay-the-ransom-after-falling-victim/ By Danny Palmer Z...3 years ago
-
What the newly released Checkra1n jailbreak means for iDevice security - There are reasons to embrace it. There are reasons to be wary of it. Here's the breakdown.4 years ago
-
Privacy and Mobile Device Apps - Original release date: July 9, 2019 | Last revised: November 15, 2019 What are the risks associated with mobile device apps? Applications (apps) on your sm...4 years ago
-
44CON 2018 - 12th-14th September, London (UK) - Posted by Steve on Feb 28 44CON 2018 is the UK's best annual Security Conference and Training event. The conference spans 2.5 days with training on the 1...6 years ago
-
Cryptopp Crypto++ 5.6.4 octets Remote Code Execution Vulnerability - Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER decoding routine. The library will allocate a memory block based on the leng...6 years ago
-
V2V Communications security considerations - The future of vehicles, road infrastructure and driving are changing. We are progressing with vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) ...7 years ago
-
vTech – ignorance is no defence (and neither are weasel words) - This morning, Troy Hunt published a blog post alerting to a recent change in the Terms & Conditions published by children’s toy manufacturer vTech. The cha...8 years ago
-
DOJ probing claims U.S. drug agency 'collaborated' with NSA on intelligence - The U.S. Justice Dept. said it was "looking into the issues" raised by an Reuters story, that one of its law enforcement agencies collaborated with the NSA...10 years ago
-
-
-
-
-
-
-
-
-
Hello There. I discovered your blog using msn. That is an extremely
ReplyDeleteneatly written article. I will make sure to bookmark it and come back to learn extra of your useful info.
Thanks for the post. I will definitely comeback.