Monday, September 24, 2012

Screening for Hemochromatosis — NEJM

Screening for Hemochromatosis — NEJM: Edwards and Kushner (June 3 issue)1 advocate universal screening for presymptomatic hemochromatosis. Such screening would probably identify 10 times the number of people with this condition now identified.

Screening for Hereditary Hemochromatosis: Systematic Review (continued)

Screening for Hereditary Hemochromatosis: Systematic Review (continued): U.S. Preventive Services Task Force. Guide to Clinical Preventive Services, 2nd ed. Washington, DC: Office of Disease Prevention and Health Promotion; 1996.

Garden State Owner Describes Misfire | NBC 7 San Diego

Garden State Owner Describes Misfire | NBC 7 San Diego:

Garden State Fireworks co-owner August Santore talks with NBC 7s Megan Tevrizian about what went wrong in San Diego on July 4, 2012

YouTube Downloader - Software to download and convert YouTube video

YouTube Downloader - Software to download and convert YouTube video:

YouTube Downloader is software that allows you to download videos from YouTube, Facebook, Google Video, Yahoo Video, and many others and convert them to other video formats.

Thursday, September 20, 2012

U.S.: Laws of war apply to cyber attacks - Army News | News from Afghanistan & Iraq - Army Times

U.S.: Laws of war apply to cyber attacks - Army News | News from Afghanistan & Iraq - Army Times: The U.S. government believes that cyber attacks can amount to armed attacks, and are subject to international humanitarian law and rules of war, the top State Department lawyer said Tuesday.

Why Be Invisible? - Public WiFi is just public - Firewalls and anti-virus can't stop your sensitive information from being stolen out of thin air.

Why Be Invisible? - Public WiFi is just public - Firewalls and anti-virus can't stop your sensitive information from being stolen out of thin air.:

Most people don’t realize that wifi signals are just radio waves. Anyone within range can “listen in” to what you’re sending as easily as tuning to the right station. All it takes is a laptop and simple, readily available software and a hacker can easily view:

Monday, September 17, 2012

The Mormon Candidate by Laurie Winer

Los Angeles Review of Books - The Mormon Candidate: When Romney stepped down as bishop to run for the U.S. Senate against Edward Kennedy in 1994, Carrel Sheldon may have been surprised to learn then that he believed “abortion should be safe and legal in this country.”

Thursday, September 13, 2012

Golden Trailer Awards

Golden Trailer Awards:

The 13th Annual Golden Trailer Awards
Winners were announced at the awards celebration on May 31st, 2012 in Los Angeles, California.
*Nominated Trailers are (listed in Alphabetical Order by Film Title)
*Order= Film Title, Studio/Production Company, Trailer house

Disk recovery service saves Wired writer from losing everything after MacBook Air hack | VentureBeat

Disk recovery service saves Wired writer from losing everything after MacBook Air hack | VentureBeat: Honan, of course, now backs up his data with physical copies.

The fee for the DriveSavers service is based on how large the media is and what data is recovered. It’s zero if DriveSavers fails to get back any of the desired data. Honan said he paid $1,690.

USB flash drive security - Wikipedia, the free encyclopedia

USB flash drive security - Wikipedia, the free encyclopedia: "In the early days of computer viruses and malware the primary means of transmission and infection was the floppy disk. Today, USB flash drives perform the same data and software storage and transfer role as the floppy disk, often used for transferring files between computers which may be on different networks or in different offices, owned by different people; this has made USB flash drives a leading form of information system infection. When a piece of malware gets onto a USB flash drive it may infect the devices into which that drive is subsequently plugged."

'via Blog this'

Does Cybercrime Really Cost $1 Trillion? - ProPublica

Does Cybercrime Really Cost $1 Trillion? - ProPublica: "Yet corporate cybersurveys are repeatedly invoked; the NSA’s Alexander is merely among the most prominent senior officials to do it. ProPublica provided the NSA’s media office with links to critical studies, stories and blog posts about the Symantec and McAfee numbers and asked whether Alexander or the agency was aware of them or, alternately, had other data to support the numbers he cited. The NSA media office responded: "The information is publicly available and was appropriately sourced.""

'via Blog this'

ICS-CERT Advisories and Reports Archive

ICS-CERT Advisories and Reports Archive:

"Control Systems Security Program (CSSP)
ICS-CERT Advisories and Reports Archive
Monthly Monitors  |  Alerts & Advisories (by Vendor)  |  Other Alerts & Advisories   |  Other Reports 
Notable ICS-Related Vulnerabilities"

'via Blog this'

Marketing Your Mobile App: Get It Right from the Start | BCP Business Center

Marketing Your Mobile App: Get It Right from the Start | BCP Business Center: "The app business is burgeoning and you’ve decided to get in on the boom.  Maybe you work for an exciting start-up or are striking out on your own.  Regardless of the size of your business, the Federal Trade Commission (FTC) — the nation’s consumer protection agency — has guidelines to help you comply with truth-in-advertising standards and basic privacy principles."

'via Blog this'

Three Killer Security Awareness Webcasts This Oct

Three Killer Security Awareness Webcasts This Oct: "Folks, as many of you know next month is NCSA (National Cyber Security Awareness) month. This is a great time to spruce up your security awareness program. To help energize your awareness training SANS Securing The Human will be hosting three free webcasts. Sign up now and don't miss a great opportunity to learn and share with others."

'via Blog this'

Wednesday, September 12, 2012

CISSP (7 Days)

CISSP (7 Days): "During our award-winning 7-day (ISC)² CISSP® Training Camp, students will live, learn, and take the CISSP certification exam at one of our state-of-the-art education centers. "

'via Blog this'

Monday, September 10, 2012

Why You Don’t Need Mac Anti-Virus Software - Plus What You Do Need

Why You Don’t Need Mac Anti-Virus Software - Plus What You Do Need:

“Some companies have done just fine having no anti-virus at all on their Mac population,” said David Johnson, a Forrester analyst and author of the report on managing Macs in the Windows-dominated computing environment found in most businesses.

And some have not....

Friday, September 7, 2012

▶ NO 'What's Your Name' by WhiteIrisRecs

▶ NO 'What's Your Name' by WhiteIrisRecs:
@playlist artwork
NO
2 tracks, 6.44 WhiteIrisRecs 2 months ago"

'via Blog this'

A dingo ate my Visa: 500K credit card numbers stolen in Australian hack | VentureBeat

A dingo ate my Visa: 500K credit card numbers stolen in Australian hack | VentureBeat:

According to SC Magazine, law enforcement was alerted to the scheme when banks started noticing fraudulent activity on the credit cards. It is expected that the 500,000 credit cards will be sold on the black market. The banks have already shut down access to those credit card numbers.

Tuesday, September 4, 2012

Hereditary hemochromatosis HFE: regula... [Ann Biol Clin (Paris). 2012] - PubMed - NCBI

Hereditary hemochromatosis HFE: regula... [Ann Biol Clin (Paris). 2012] - PubMed - NCBI:

"HFE hereditary hemochromatosis is a chronic illness (ALD n(o) 17 - Maladies métaboliques et héréditaires) which is the first genetic disease in France (60% of all genetic diseases)."

'via Blog this'