Search This Blog

30 December 2007

Car broken into


So Meridee and I went to Century16 tonight. When we got back to the car, I noticed that the hazard lights were on. I thought that was odd until we noticed the giant gaping wound in the side of the car (passenger rear window). They stole the radar detect, fm transmitter, gps, etc.

26 November 2007

Dino moved out

So as many of you know by now, Dino got her new apartment keys on FRI and moved out SAT. I am not going to go into any details about what happened or what the future holds - just please be there for her if she needs anything.

21 November 2007

The Greek Mythology Personality Test


Your Score: Orpheus


0% Extroversion, 66% Intuition, 100% Emotiveness, 80% Perceptiveness




You are an artist, an aesthete, a sensitive, and someone who has never really let go of that childlike innocence. To you, all of life has a sense of wonder in it, and the story of Orpheus was written about someone just like you.



When the Argo passed the island of the Sirens, Orpheus played a song more beautiful than the Sirens to prevent the crew from becoming enticed. When his wife died, he ventured into the underworld to charm Hades but, in his naivete, he looked back becoming trapped there.



You can capture your unique world view and relate it to others with the skill of a master storyteller. Your sensitivity and creativity make you a treasure to the human race, but your thin-skinned nature and innocence can cause you a lot of disenchantment and pain. What's doubly unfortunate is that, if you try to lose those traits, you never will, and everyone will be able to tell that you're putting up an artificial shell to prevent yourself from being hurt.



Famous people like you: Hemingway, Shakespeare, Mr. Rogers, Melville, Nick Tosches

Stay clear of: Icarus, Hermes, Atlas




Link: The Greek Mythology Personality Test written by Aleph_Nine on OkCupid Free Online Dating, home of the The Dating Persona Test

07 November 2007

Stolen from my wife's blog

07 Nov 07 Wednesday

It Warrants a Blog
Category: Life

I just want to get this out in the open. Malachi and I, are getting a divorce. Some of you may be shocked by this news. This is because Mal and I try not to air our dirty laundry in public. So what went wrong? Once again, Mal and I try not to air our dirty laundry in public. It is safe to say however, that mistakes were made by both parties. I am lucky that Mal is still my friend, and I am sorry I had to hurt such a good person. Please have patients with he and I while we try to ses out this whole "life" thing.


Thanks to all,

Dino


9:18 PM - 0 Comments - 0 Kudos - Add Comment

09 October 2007

Bath Time for Kittens

Here's some of the pictures Dino took of the kitties the other day. We measured the water level at 8-1/2" before Eris got out.

06 October 2007

Fright Town

In case any of you were wondering why Dino has been gone all night every night for the last month, take a look at her blog entry (click on 'Fright Town' above).

22 September 2007

Wonky Shizzinit pt deux

You might remember what happened the last time I tried to reboot.

Well, as it happens, I had to reboot again today (yes, it was the first time since the last post). And lo and behold, the same friggin problem.

After a few attempts to get timing right, here's how I got it to boot this time:
As soon as the Windows progress bar starts, hammer the F8 button until it finally boots into Windows

05 September 2007

News from the Net

The UK wants a national DNA database -- which would include visitors.

OOh - robotic telecommuting.

More info is available about New Mexico's new terminal. You know, the term 'spaceport' seems a lot cooler than 'space terminal' - they should use that instead :)

Looks like Comcast may get busted for forgery (impersonation). In similar news, Belgium is suing the Church of Scientology for being a criminal organization.

Why would it be illegal to sell pollution free cars in most states?

Want to make your own heart valves?

The govt says that China hacked the Pentagon. So do we believe that: 1) they did and the pentagon has shitty security; or 2) they didn't do it and they are just using this as an excuse for Bush to claim dictatorship per his recent survivorship changes? I guess there is also 3) that they are getting ready to start another war a'la 9/11 based on the cyberattacks like they simulated happening a few years ago.

Ground based telescopes now better than the Hubble.

Head of Columbia Records outs Sony.

Want to try out Google Earth's Flight Simulator?

01 September 2007

31 August 2007

Homeland Security Committee denied access

Thanks to Layne for finding this:

DeFazio asks, but he's denied access
Classified info - The congressman wanted to see government plans for after a terror attack
Friday, July 20, 2007
JEFF KOSSEFF
The Oregonian Staff

WASHINGTON -- Oregonians called Peter DeFazio's office, worried there was a conspiracy buried in the classified portion of a White House plan for operating the government after a terrorist attack.

As a member of the U.S. House on the Homeland Security Committee, DeFazio, D-Ore., is permitted to enter a secure "bubbleroom" in the Capitol and examine classified material. So he asked the White House to see the secret documents.

On Wednesday, DeFazio got his answer: DENIED.

"I just can't believe they're going to deny a member of Congress the right of reviewing how they plan to conduct the government of the United States after a significant terrorist attack," DeFazio says.

Homeland Security Committee staffers told his office that the White House initially approved his request, but it was later quashed. DeFazio doesn't know who did it or why.

"We're talking about the continuity of the government of the United States of America," DeFazio says. "I would think that would be relevant to any member of Congress, let alone a member of the Homeland Security Committee."

Bush administration spokesman Trey Bohn declined to say why DeFazio was denied access: "We do not comment through the press on the process that this access entails. It is important to keep in mind that much of the information related to the continuity of government is highly sensitive."

Norm Ornstein, a legal scholar who studies government continuity at the conservative American Enterprise Institute, said he "cannot think of one good reason" to deny access to a member of Congress who serves on the Homeland Security Committee.

"I find it inexplicable and probably reflective of the usual, knee-jerk overextension of executive power that we see from this White House," Ornstein said.

This is the first time DeFazio has been denied access to documents. DeFazio has asked Homeland Security Committee Chairman Bennie Thompson, D-Miss., to help him access the documents.

"Maybe the people who think there's a conspiracy out there are right," DeFazio said.

Jeff Kosseff: 202-383-7814 jeff.kosseff@newhouse.com

Original Oregonian Article

Monster Database Hacked

As many of you probably know, the database at Monster.com was hacked. Well, I received an email from them (???) today... thought I would share it:

Monster
Dear Valued Monster Customer,

Protecting the job seekers who use our website is a top priority, and we value the trust you place in Monster. Regrettably, opportunistic criminals are increasingly using the Internet for illegitimate purposes. As is the case with many companies that maintain large databases of information, Monster is from time to time subject to attempts to illegally extract information from its database.

As you may be aware, the Monster resume database was recently the target of malicious activity that involved the illegal downloading of information such as names, addresses, phone numbers, and email addresses for some of our job seekers with resumes posted on Monster sites. Monster responded to this specific incident by conducting a comprehensive review of internal processes and procedures, notified those job seekers that their contact records had been downloaded illegally, and shut down a rogue server that was hosting these records.

The Company has determined that this incident is not the first time Monster's database has been the target of criminal activity. Due to the significant amount of uncertainty in determining which individual job seekers may have been impacted, Monster felt that it was in your best interest to take the precautionary steps of reaching out to you and all Monster job seekers regarding this issue. Monster believes illegally downloaded contact information may be used to lure job seekers into opening a "phishing" email that attempts to acquire financial information or lure job seekers into fraudulent financial transactions. This has been the case in similar attacks on other websites.

We want to inform you about preventive measures you can take to protect yourself from online fraud. While no company can completely prevent unauthorized access to data, we believe that by reaching out to job seekers like you, the Company can help users better defend themselves against those who have attacked Monster as well as other databases.

We are committed to maintaining an ongoing dialogue with all of our job seekers about Internet security and the steps Monster is taking to protect its job seekers. The Company has placed a security alert on Monster sites offering information to educate you about online fraud. This information can be found at http://help.monster.com/besafe/. We have also included information on Internet safety and examples of fraudulent "phishing" emails at the bottom of this letter.

Monster has launched a series of initiatives to enhance and to protect the information you have entrusted to us. Some of these steps are being immediately implemented, while others will be put into place as appropriate.

We believe these actions are the responsible steps to protect the trust you place in Monster. We are also working with Monster's hundreds of thousands of employer customers to ensure a safe and effective online job search. We will continue to share information with you about the enhancements we are making as we serve as your online career resource partner. We invite you to keep reading to learn more about how to use the Internet safely.

Sincerely,

Signature
Sal Iannuzzi

Chairman and CEO

Monster Worldwide

HOW TO BE A SAFE INTERNET USER

Every Internet site in the world is facing the growing issue of fraudulent usage of information, and we want to work with users around the world to stop this practice - please keep reading to learn more about the warning signs and what you can do.

Spam email is such a common occurrence today; you may think you know what to look for. But there are two types of email scams - what's known as "phishing" and "spoofing" - that can be more difficult to identify. Both practices concern fraudulent email where the 'from address' has been forged to make it appear as if it came from somewhere, or someone, other than the actual source. Below are the warning signs to look for:

What's "phishing" all about – and how do I spot it?

Phishing emails are used to fraudulently obtain personal identification and account information. They can also be used to lure the recipient into downloading malicious software. The message will often suggest there are issues with the recipient's account that requires immediate attention. A link will also be provided to a spoof website where the recipient will be asked to provide personal/account information or download malicious software. Monster will never ask you to download software in order to access your account or use our services.

How is it different than "spoofing"?

Spoof emails often include a fraudulent offer of employment and/or the invitation to serve as a go-between for payment processing or money transfers. This scam is primarily directed at a general audience, but it can also reach Monster members who have included contact information on their resumes. Like with phishing emails, the sender's address is often disguised.

Examples of fraudulent email:

These examples of fraudulent email show you what to watch out for (click to see details):

Example 1 Example 2 Example 3 Example 4 Example 5

Consumer Advice: How to Avoid Phishing Scams

The number and sophistication of phishing scams sent out to consumers is continuing to increase dramatically. While online banking and e-commerce is very safe, as a general rule you should be careful about giving out your personal financial information over the Internet. The Anti-Phishing Working Group has compiled a list of recommendations that you can use to avoid becoming a victim of these scams.


Be suspicious of any email with requests for personal financial information.

Phishers typically include upsetting or exciting (but false) statements in their emails to get people to react immediately.

They typically ask for information such as usernames, passwords, credit card numbers, social security numbers, date of birth, etc.

Don't use the links in an email, instant message, or chat to get to any web page if you suspect the message might not be authentic.

Instead, call the company on the telephone, or log onto the website directly by typing in the Web address in your browser.

You should only communicate information such as credit card numbers or account information via a secure website or the telephone.

Always ensure that you're using a secure website when submitting credit card or other sensitive information via your Web browser.

Additional consumer advice is available at http://www.antiphishing.org/consumer_recs.html.

If you have more questions, please visit http://help.monster.com/besafe.

Contact us at http://www.monster.com/contact.





Monster respects your online time and privacy. This is a service-related email to notify you of important account information.

Questions? Email us directly by visiting http://www.monster.com/contact/. Please do not reply to this email.

To read the Monster Privacy Commitment, visit http://about.monster.com/privacy/

Monster, 5 Clock Tower Place, Suite 500, Maynard, MA 01754

Add monster@e0.monster.com to your address book to ensure delivery of Monster emails.