Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Friday, December 28, 2012
Aldosterone and Renin: The Test
Aldosterone and Renin: The Test: Aldosterone and renin tests are used to evaluate whether appropriate amounts of aldosterone are being produced and to distinguish between the potential causes of excess or deficiency.
Low levels of potassium - definition of Low levels of potassium in the Medical dictionary - by the Free Online Medical Dictionary, Thesaurus and Encyclopedia.
Low levels of potassium - definition of Low levels of potassium in the Medical dictionary - by the Free Online Medical Dictionary, Thesaurus and Encyclopedia.: Hypokalemia is a condition of below normal levels of potassium in the blood serum. Potassium, a necessary electrolyte, facilitates nerve impulse conduction and the contraction of skeletal and smooth muscles, including the heart.
Differences That May Explain Hypertensive Risk: Dietary Potassium Deficiency Independently Associated With Increased Blood Pressure
Differences That May Explain Hypertensive Risk: Dietary Potassium Deficiency Independently Associated With Increased Blood Pressure: "We are currently doing more research to test how low potassium in the diet affects blood pressure through the activity of this gene,"
Friday, December 21, 2012
World’s Most Used Encryption Technologies, Cracked in No Time with $299 Forensics Tool | HOTforSecurity
World’s Most Used Encryption Technologies, Cracked in No Time with $299 Forensics Tool | HOTforSecurity: The Elcomsoft tool analyzes memory dumps taken while these encrypted volumes are mounted and isolates the encryption keys. When the process is over, the forensic team (or attacker) can mount the volumes as they would normally do and authenticate with the data provided by the forensics tool.
Sunday, December 16, 2012
Population Screening in Hereditary Hemochromatosis - Annual Review of Public Health, 21(1):65
Population Screening in Hereditary Hemochromatosis - Annual Review of Public Health, 21(1):65: Hemochromatosis is a common autosomal recessive condition found in the homozygous state in 1/200–1/400 people of northern-, central-, and western-European origin.
Screening for Hemochromatosis: Recommendation Statement
Screening for Hemochromatosis: Recommendation Statement: This statement summarizes the U.S. Preventive Services Task Force (USPSTF) recommendation on screening for hemochromatosis and the supporting scientific evidence.
Thursday, December 13, 2012
Invasion of the cyber hustlers
Invasion of the cyber hustlers: "The cybertheorists, however, are a peculiarly corporatist species of the Leninist class: they agitate for constant revolution but the main beneficiaries will be the giant technology companies before whose virtual image they prostrate themselves"
'via Blog this'
'via Blog this'
A case study in personal genomics from Genomes Unzipped
A case study in personal genomics : Genomes Unzipped: After some thinking, I decided to take my test results to my GP, and see if there was any advice or testing he would recommend. In the end, my GP referred me to a clinical geneticist, which started a cascade of appointments which in turn led to a number of important changes in how I treat my own health.
Saturday, December 1, 2012
Thursday, November 29, 2012
Gartner Says Android to Command Nearly Half of Worldwide Smartphone Operating System Market by Year-End 2012
Gartner Says Android to Command Nearly Half of Worldwide Smartphone Operating System Market by Year-End 2012: " Worldwide smartphone sales will reach 468 million units in 2011, a 57.7 percent increase from 2010, according to Gartner Inc."
'via Blog this'
'via Blog this'
Worldwide Mobile Phone Revenues, Prices & Profits Jump Higher in Q3 2012
Worldwide Mobile Phone Revenues, Prices & Profits Jump Higher in Q3 2012: Samsung and Apple dominate the industry and they are tightening their grip on value share, squeezing out almost all other rivals.
Wednesday, November 28, 2012
Money and Manipulation: Documentary Takes On the Super-rich Residents of 740 Park | Observer
Money and Manipulation: Documentary Takes On the Super-rich Residents of 740 Park | Observer: This is a story about the richest of the rich, as it were, the residents of 740 Park—a building that is home to more billionaires than any other building in New York—and how they have managed to claim a larger and larger share of the nation’s wealth, or as Mr. Gibney puts it in his opening voice-over, how they have enjoyed “unprecedented prosperity from a system they increasingly control.”
Extending Your Content Reach Through Social Media | Business 2 Community
Extending Your Content Reach Through Social Media | Business 2 Community: As savvy organizations work to engage with target audiences through this new medium, one fact has clearly emerged – quality content is vital to social media campaigns that are meaningful, impactful and provide lasting value.
SC's Data Security Company Also Got Hacked - FITSNews
SC's Data Security Company Also Got Hacked - FITSNews: South Carolinians by the tens of thousands are signing up with Experian – one of the nation’s largest credit reporting firms – to protect their data in the wake of an unprecedented security breach at the S.C. Department of Revenue (SCDOR). In fact the state of South Carolina is paying (up to $12 million) to cover the costs associated with this protection – even though Experian is likely to make millions in recurring business off of the deal.
But will such a move do anything to make our state’s data safer?
But will such a move do anything to make our state’s data safer?
Experian Customers Unsafe as Hackers Steal Credit Report Data - Bloomberg
Experian Customers Unsafe as Hackers Steal Credit Report Data - Bloomberg: The cyberthieves broke into an employee’s computer in September 2011 and stole the password for the bank’s online account with Experian Plc, the credit reporting agency with data on more than 740 million consumers.
Tuesday, November 20, 2012
Five Ways to Jump on the Instagram Bandwagon
Five Ways to Jump on the Instagram Bandwagon:
So how can your company engage with the 7.3 million people who use Instagram daily? Here are five suggestions to get the Instagram ball rolling.
So how can your company engage with the 7.3 million people who use Instagram daily? Here are five suggestions to get the Instagram ball rolling.
2012 conferences: Social media, tech & marketing | Socialmedia.biz
2012 conferences: Social media, tech & marketing | Socialmedia.biz:
"we’ve assembled a calendar of the best social media, technology, marketing and news media conferences for the upcoming year. Here’s our roundup of 2012 conferences and events."
'via Blog this'
"we’ve assembled a calendar of the best social media, technology, marketing and news media conferences for the upcoming year. Here’s our roundup of 2012 conferences and events."
'via Blog this'
Sunday, November 18, 2012
Acoustic Absorbing Panels, Room Acoustics Treatment by Audimute – Effective, Affordable Panel Acoustics Kit - Audimute Soundproofing
Acoustic Absorbing Panels, Room Acoustics Treatment by Audimute – Effective, Affordable Panel Acoustics Kit - Audimute Soundproofing: Are you looking for a room acoustics treatment that looks as good as it sounds?
Acoustic Panels | Acoustical Panels | Acoustic Wall Panels
Acoustic Panels | Acoustical Panels | Acoustic Wall Panels: Acoustic Panels are not used for soundproofing and they will not stop sound from traveling from one room to the next, however they will make the sound inside the room much less noisy, and the less noisy the room is inside, the less noisy it will be outside.
How do I prevent bass frequencies from pounding on my neighbor's wall? - Yahoo! Answers
How do I prevent bass frequencies from pounding on my neighbor's wall? - Yahoo! Answers: I have a little problem where my neighbor can hear even the slightest amount of bass coming out of my speakers at a low volume.
HowStuffWorks "Blocking Sound Through the Walls"
HowStuffWorks "Blocking Sound Through the Walls": When contractors are building apartments or townhomes to sell, they're generally trying to keep construction costs as low as possible. To do this, they'll often construct walls in the cheapest way possible, with shared walls containing nothing more than some 2x4 studs with a layer of drywall on either side. In some buildings, they may add a layer of fiberglass batt insulation to help with noise and temperature control.
Tuesday, November 13, 2012
Silicon Valley Objects to Online Privacy Rule Proposals for Children - NYTimes.com
Silicon Valley Objects to Online Privacy Rule Proposals for Children - NYTimes.com:
Apple, Facebook, Google, Microsoft and Twitter have all objected to portions of a federal effort to strengthen online privacy protections for children.
Apple, Facebook, Google, Microsoft and Twitter have all objected to portions of a federal effort to strengthen online privacy protections for children.
Scammer Alert: Phishing for Photos | NBC 7 San Diego
Scammer Alert: Phishing for Photos | NBC 7 San Diego:
"We don't know what they're trying to do with those images," said Stephen Cobb with ESET Security, "but it's an indication of where future attacks may be coming."
"We don't know what they're trying to do with those images," said Stephen Cobb with ESET Security, "but it's an indication of where future attacks may be coming."
'Parasite' porn websites stealing images and videos posted by young people | Technology | guardian.co.uk
'Parasite' porn websites stealing images and videos posted by young people | Technology | guardian.co.uk:
A study by the Internet Watch Foundation (IWF) reveals that 88% of self-made sexual or suggestive images and videos posted by young people, often on social networking sites, are taken from their original online location and uploaded on to other websites.
A study by the Internet Watch Foundation (IWF) reveals that 88% of self-made sexual or suggestive images and videos posted by young people, often on social networking sites, are taken from their original online location and uploaded on to other websites.
Monday, November 12, 2012
Karma Lekshe Tsomo
Karma Lekshe Tsomo:
In addition to her academic work, she is actively involved in interfaith dialogue and in grassroots initiatives for the empowerment of women.
In addition to her academic work, she is actively involved in interfaith dialogue and in grassroots initiatives for the empowerment of women.
Saturday, November 10, 2012
Melatonin vs Jet lag
Melatonin vs Jet lag:
I have had great success in using Melatonin and daylight to minimize jetlag. Here is the recipe I follow, taken from New York Times, April 30 1997.
I have had great success in using Melatonin and daylight to minimize jetlag. Here is the recipe I follow, taken from New York Times, April 30 1997.
Idaho Mountain Express: Hemingway on Hemingway - September 14, 2005
Idaho Mountain Express: Hemingway on Hemingway - September 14, 2005:
The inaugural Sun Valley Ernest Hemingway Festival takes place Sept. 22 to Sept. 24 in Ketchum and Sun Valley.
The inaugural Sun Valley Ernest Hemingway Festival takes place Sept. 22 to Sept. 24 in Ketchum and Sun Valley.
Malware Steals Image Files from Systems | Security Intelligence Blog | Trend Micro
Malware Steals Image Files from Systems | Security Intelligence Blog | Trend Micro:
It appears that information theft has taken a new form: we’ve found a malware that steals image files from all drives of an affected system and then sends them to a remote FTP server.
It appears that information theft has taken a new form: we’ve found a malware that steals image files from all drives of an affected system and then sends them to a remote FTP server.
Friday, November 9, 2012
Web page security report
Web page security report:
"Maybe you can spot some suspicious details there.
For more comprehensive diagnostics consider the following"
'via Blog this'
"Maybe you can spot some suspicious details there.
For more comprehensive diagnostics consider the following"
'via Blog this'
Thursday, November 8, 2012
Image-Stealing Trojan Exposes Victims to ID Theft, Blackmail
Image-Stealing Trojan Exposes Victims to ID Theft, Blackmail:
The threat of image-focused malware may become a big issue on mobile devices.
The threat of image-focused malware may become a big issue on mobile devices.
Wednesday, November 7, 2012
iTunes - Podcasts - The Malware Report by ESET
iTunes - Podcasts - The Malware Report by ESET: "Anti-virus protection has changed. New forms of spyware, trojans, phishing, and run-time packers leave traditional anti-virus software, and your network, vulnerable. IT managers need new solutions to combat the ever changing threats to network security."
'via Blog this'
'via Blog this'
Max OS X Lion Training: How to use Spotlight Search - YouTube
Max OS X Lion Training: How to use Spotlight Search - YouTube:
In this free lesson from our Mac OS X Lion training App discover how to use your Macs built in Spotlight search feature to locate files, launch apps, define words or perform calculations.
In this free lesson from our Mac OS X Lion training App discover how to use your Macs built in Spotlight search feature to locate files, launch apps, define words or perform calculations.
Sunday, November 4, 2012
Angels in Our Lives
Angels in Our Lives: The prophets knew the angels communicated with people through an area on the head where the pineal gland is located. This is the reason why the people in some religious groups shave their heads or shave a bald spot on the back of their heads.
IPM Workshops and Classes
IPM Workshops and Classes:
In this Exploring Inner Dynamics Workshop you will experience the Real You; a soul with a unique purpose and talents. Understand why you are here on Planet Earth.
In this Exploring Inner Dynamics Workshop you will experience the Real You; a soul with a unique purpose and talents. Understand why you are here on Planet Earth.
Saturday, November 3, 2012
Freelance Comic Artists : San Diego, California | Find Freelancers | Freelanced.com
Freelance Comic Artists : San Diego, California | Find Freelancers | Freelanced.com:
"an Illustrator/Designer who specializes in comic and album illustration."
'via Blog this'
"an Illustrator/Designer who specializes in comic and album illustration."
'via Blog this'
Thursday, November 1, 2012
Election campaign ends with chess match in swing states - CNN.com
Election campaign ends with chess match in swing states - CNN.com:
"we need a president who understands business and I do, and that's why I'll be able to get this economy going.""
'via Blog this'
"we need a president who understands business and I do, and that's why I'll be able to get this economy going.""
'via Blog this'
TJX Hacker Gets 20 Years in Prison | Threat Level | Wired.com
TJX Hacker Gets 20 Years in Prison | Threat Level | Wired.com: (Old)
Convicted TJX hacker Albert Gonzalez was sentenced to 20 years in prison on Thursday for leading a gang of cyberthieves who stole more than 90 million credit and debit card numbers from TJX and other retailers.
Convicted TJX hacker Albert Gonzalez was sentenced to 20 years in prison on Thursday for leading a gang of cyberthieves who stole more than 90 million credit and debit card numbers from TJX and other retailers.
Tuesday, October 30, 2012
Why the GOP Should Fear a Romney Presidency - Jack M. Balkin - The Atlantic
Why the GOP Should Fear a Romney Presidency - Jack M. Balkin - The Atlantic:
if Obama loses, the president who finally unravels Reaganism could turn out to be Mitt Romney.
if Obama loses, the president who finally unravels Reaganism could turn out to be Mitt Romney.
Sunday, October 28, 2012
Infosecurity - Consumer loyalty depends on privacy and data security, survey finds
Infosecurity - Consumer loyalty depends on privacy and data security, survey finds:
Consumers are taking privacy and security into account more often when making purchasing decisions, would consider leaving companies in the wake of a data breach incident, and measure corporate reputation based on these issues, according to a survey by public relations firm Edelman.
Consumers are taking privacy and security into account more often when making purchasing decisions, would consider leaving companies in the wake of a data breach incident, and measure corporate reputation based on these issues, according to a survey by public relations firm Edelman.
Wednesday, October 24, 2012
IRS policies help fuel tax refund fraud, officials say - CNN.com
IRS policies help fuel tax refund fraud, officials say - CNN.com:
"It's like the federal government is putting crack cocaine in candy machines," said Detective Craig Catlin of the North Miami Beach, Florida, Police Department. "It's that easy."
"It's like the federal government is putting crack cocaine in candy machines," said Detective Craig Catlin of the North Miami Beach, Florida, Police Department. "It's that easy."
Tuesday, October 23, 2012
Chrome Web Store - PhishAri
Chrome Web Store - PhishAri:
PhishAri is a Twitter application which detects phishing tweets in realtime.
PhishAri is a Twitter application which detects phishing tweets in realtime.
Paterva / Maltego
Paterva / Maltego:
Maltego is a unique platform developed to deliver a clear threat picture to the environment that an organization owns and operates.
Maltego is a unique platform developed to deliver a clear threat picture to the environment that an organization owns and operates.
Monday, October 22, 2012
Presentations by CAIDA
Presentations by CAIDA:
Awesome collection of research: Presentations by CAIDA personnel and collaborators are available for download below (UCSD)
Awesome collection of research: Presentations by CAIDA personnel and collaborators are available for download below (UCSD)
3 Tools to Scan the File System With Custom Malware Signatures
3 Tools to Scan the File System With Custom Malware Signatures:
ClamAV is a free antivirus engine. Its Unix version allows the user to create custom signatures for files based not only on their cryptographic hash, but also to fingerprint file sections, match specific byte sequences, use wildcards, and combine signatures according to Boolean rules.
ClamAV is a free antivirus engine. Its Unix version allows the user to create custom signatures for files based not only on their cryptographic hash, but also to fingerprint file sections, match specific byte sequences, use wildcards, and combine signatures according to Boolean rules.
yara-project - A malware identification and classification tool - Google Project Hosting
yara-project - A malware identification and classification tool - Google Project Hosting:
YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or binary patterns contained on samples of those families
YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or binary patterns contained on samples of those families
Google And Android To Move From Running Your Mobile Devices To Driving Your Cars? - Tapscape
Google And Android To Move From Running Your Mobile Devices To Driving Your Cars? - Tapscape:
Google isn’t just interested in dominating the information super highway by having a tight grip on the internet and the mobile device market via their Android devices. They also want to rule actual concrete-and-asphalt roads by filling them with Google driverless cars running on a combination of existing sensor technology and several homegrown platforms.
Google isn’t just interested in dominating the information super highway by having a tight grip on the internet and the mobile device market via their Android devices. They also want to rule actual concrete-and-asphalt roads by filling them with Google driverless cars running on a combination of existing sensor technology and several homegrown platforms.
Many Android apps from Google Play security-challenged
Many Android apps from Google Play security-challenged:
German university researchers have found hundreds of popular Android apps in the Google Play market that leave 10s of millions of users vulnerable to attackers looking to steal banking credentials, credit card numbers and other personal information.
German university researchers have found hundreds of popular Android apps in the Google Play market that leave 10s of millions of users vulnerable to attackers looking to steal banking credentials, credit card numbers and other personal information.
IRS pays billions in refunds to identity thieves - Aug. 2, 2012
IRS pays billions in refunds to identity thieves - Aug. 2, 2012:
IRS attributed the increase in tax fraud to a number of issues, including an increase in electronic filing, higher dollar amounts of refundable credits and a growing number of people using debit cards to receive refunds.
IRS attributed the increase in tax fraud to a number of issues, including an increase in electronic filing, higher dollar amounts of refundable credits and a growing number of people using debit cards to receive refunds.
IRS pays billions in refunds to identity thieves - Aug. 2, 2012
IRS pays billions in refunds to identity thieves - Aug. 2, 2012:
It attributed the increase in tax fraud to a number of issues, including an increase in electronic filing, higher dollar amounts of refundable credits and a growing number of people using debit cards to receive refunds.
It attributed the increase in tax fraud to a number of issues, including an increase in electronic filing, higher dollar amounts of refundable credits and a growing number of people using debit cards to receive refunds.
China cracks hacking syndicate | ZDNet
China cracks hacking syndicate | ZDNet:
Chinese police have detained a gang of hackers, certificate forgers, and personal data collectors, believed to be responsible for attacks on 185 government Web sites to manufacture and sell fake certificates ranging from medical care to financial services.
Chinese police have detained a gang of hackers, certificate forgers, and personal data collectors, believed to be responsible for attacks on 185 government Web sites to manufacture and sell fake certificates ranging from medical care to financial services.
6 Ways to Add Twitter to Your WordPress Site
6 Ways to Add Twitter to Your WordPress Site:
This article will cover various ways to merge your Twitter presence with your website, and thus, maximize opportunities to relate to your web audience.
This article will cover various ways to merge your Twitter presence with your website, and thus, maximize opportunities to relate to your web audience.
Sabu - The FBI's most valuable hacker — RT
Sabu - The FBI's most valuable hacker — RT:
In the nine months since the FBI busted the hacker known as Sabu for his roles with LulzSec and Anonymous, authorities say he worked all hours of the night to help them nab others within the group.
In the nine months since the FBI busted the hacker known as Sabu for his roles with LulzSec and Anonymous, authorities say he worked all hours of the night to help them nab others within the group.
25% of Americans Were Victims of Security Breaches in Past Year
25% of Americans Were Victims of Security Breaches in Past Year:
One in four consumers in the United States had personal identification lost or stolen due to a data breach in the past year, a new study suggests.
One in four consumers in the United States had personal identification lost or stolen due to a data breach in the past year, a new study suggests.
Officials say Chinese spies have targeted every sector of the U.S. economy - Rock Center with Brian Williams
Officials say Chinese spies have targeted every sector of the U.S. economy - Rock Center with Brian Williams:
The Chinese are playing dirty in the international spy game, according to current and former intelligence officials at the highest levels of government.
The Chinese are playing dirty in the international spy game, according to current and former intelligence officials at the highest levels of government.
China busts 700 cybercriminal gangs | ZDNet
China busts 700 cybercriminal gangs | ZDNet:
A country-wide Web policing campaign led by China's Ministry of Public Security has dealt a blow to 700 cybercriminal gangs in the country.
A country-wide Web policing campaign led by China's Ministry of Public Security has dealt a blow to 700 cybercriminal gangs in the country.
U.K. to probe Huawei, BT relationship over security concerns | ZDNet
U.K. to probe Huawei, BT relationship over security concerns | ZDNet:
The relationship between embattled Chinese telecoms equipment maker Huawei, and the U.K.'s largest telecoms company British Telecom (BT) will be investigated by the U.K. Parliament's intelligence and security committee.
The relationship between embattled Chinese telecoms equipment maker Huawei, and the U.K.'s largest telecoms company British Telecom (BT) will be investigated by the U.K. Parliament's intelligence and security committee.
Common WordPress Malware Infections — Smashing WordPress
Common WordPress Malware Infections — Smashing WordPress:
WordPress security is serious business. Exploits of vulnerabilities in WordPress’ architecture have led to mass compromises of servers through cross-site contamination.
WordPress security is serious business. Exploits of vulnerabilities in WordPress’ architecture have led to mass compromises of servers through cross-site contamination.
Friday, October 19, 2012
Ranking America
Ranking America: "According to UNICEF, 23.1% of American children under the age of seventeen live in poverty, which makes the United States rank second out of thirty-five economically advanced countries ranked in that category. Romania ranks first, with 25.5% of children living in poverty."
'via Blog this'
'via Blog this'
Billing Records Mixed with Recyclables Causes Breach - HDM Latest News Article
Billing Records Mixed with Recyclables Causes Breach - HDM Latest News Article:
A mix-up by a janitorial services firm has resulted in a major data breach at a 19-member radiology group practice in Springfield, Mo.
A mix-up by a janitorial services firm has resulted in a major data breach at a 19-member radiology group practice in Springfield, Mo.
Snooping Gets Employees Fired at Akron General - HDM Latest News Article
Snooping Gets Employees Fired at Akron General - HDM Latest News Article:
Akron General Medical Center in Ohio has terminated a “few” employees for snooping in the electronic health records system following the shooting death
Akron General Medical Center in Ohio has terminated a “few” employees for snooping in the electronic health records system following the shooting death
Thursday, October 18, 2012
Free Online Tools for Looking Up Potentially Malicious Websites
Free Online Tools for Looking Up Potentially Malicious Websites:
"Several organizations offer free on-line tools for looking up a potentially malicious website."
'via Blog this'
"Several organizations offer free on-line tools for looking up a potentially malicious website."
'via Blog this'
Wednesday, October 17, 2012
Respondents were asked if they kept PII in a secure location
Demographics-Study.pdf (application/pdf Object)
http://www.laresinstitute.com/wp-content/uploads/2011/09/Demographics-Study.pdf
Respondents were asked if they kept PII in a secure location in their home, and overall 76% did,
and 24% did not, and interestingly, people with no college degree were more likely to keep their
information in a secure location than those that had a college or post-graduate degree.
http://www.laresinstitute.com/wp-content/uploads/2011/09/Demographics-Study.pdf
Respondents were asked if they kept PII in a secure location in their home, and overall 76% did,
and 24% did not, and interestingly, people with no college degree were more likely to keep their
information in a secure location than those that had a college or post-graduate degree.
Follow-Up Test: 1999 BMW 323i Sport
Follow-Up Test: 1999 BMW 323i Sport
The new 3 Series upholds the BMW tradition of stellar handling and makes a strong argument for the inherent balance of a finely tuned rear-drive car.
The new 3 Series upholds the BMW tradition of stellar handling and makes a strong argument for the inherent balance of a finely tuned rear-drive car.
Sunday, October 14, 2012
House Is Gone but the Debt Lives On - WSJ.com
House Is Gone but the Debt Lives On - WSJ.com:
The result was a foreclosure hangover that homeowners rarely anticipate but increasingly face: a "deficiency judgment."
The result was a foreclosure hangover that homeowners rarely anticipate but increasingly face: a "deficiency judgment."
Saturday, October 13, 2012
Tuesday, October 9, 2012
Successful cyberattacks driving up cost of cybercrime, study finds
Successful cyberattacks driving up cost of cybercrime, study finds
Cyberattacks on organizations have more than doubled over a three-year period, driving up the costs associated with fallout from the attacks, according to a new study conducted by the Ponemon Institute.
Cyberattacks on organizations have more than doubled over a three-year period, driving up the costs associated with fallout from the attacks, according to a new study conducted by the Ponemon Institute.
Cyber crime costs UK organisations Q2.1m a year
Cyber crime costs UK organisations Q2.1m a year:
Cyber crime costs UK organisations an average of Q2.1m a year each, according to the 2012 Cost of Cyber Crime study by the Ponemon Institute.
Cyber crime costs UK organisations an average of Q2.1m a year each, according to the 2012 Cost of Cyber Crime study by the Ponemon Institute.
New Research Shows Cybercrime Costs Have Increased Nearly 40 Percent - HotHardware
New Research Shows Cybercrime Costs Have Increased Nearly 40 Percent - HotHardware:
The third-annual Cost of Cyber Crime Study shows the occurrence of cyberattacks has more than doubled since 2010. The cost of the attacks has increased by nearly 40 percent over the same three year period.
The third-annual Cost of Cyber Crime Study shows the occurrence of cyberattacks has more than doubled since 2010. The cost of the attacks has increased by nearly 40 percent over the same three year period.
Monday, October 8, 2012
Lit Motors Will Shake Up The Electric Vehicle Market With Its Two-Wheeled, Untippable C-1 | TechCrunch
Lit Motors Will Shake Up The Electric Vehicle Market With Its Two-Wheeled, Untippable C-1 | TechCrunch: What you get is Lit Motors‘ C-1, the world’s first gyroscopically stabilized, two-wheeled all-electric vehicle,
Wednesday, September 26, 2012
Computer and Internet Use in the United States: 2010 - People and Households - U.S. Census Bureau
Computer and Internet Use in the United States: 2010 - People and Households - U.S. Census Bureau: Computer and Internet Use in the United States: 2010
Monday, September 24, 2012
Screening for Hemochromatosis — NEJM
Screening for Hemochromatosis — NEJM: Edwards and Kushner (June 3 issue)1 advocate universal screening for presymptomatic hemochromatosis. Such screening would probably identify 10 times the number of people with this condition now identified.
Screening for Hereditary Hemochromatosis: Systematic Review (continued)
Screening for Hereditary Hemochromatosis: Systematic Review (continued): U.S. Preventive Services Task Force. Guide to Clinical Preventive Services, 2nd ed. Washington, DC: Office of Disease Prevention and Health Promotion; 1996.
Garden State Owner Describes Misfire | NBC 7 San Diego
Garden State Owner Describes Misfire | NBC 7 San Diego:
Garden State Fireworks co-owner August Santore talks with NBC 7s Megan Tevrizian about what went wrong in San Diego on July 4, 2012
Garden State Fireworks co-owner August Santore talks with NBC 7s Megan Tevrizian about what went wrong in San Diego on July 4, 2012
YouTube Downloader - Software to download and convert YouTube video
YouTube Downloader - Software to download and convert YouTube video:
YouTube Downloader is software that allows you to download videos from YouTube, Facebook, Google Video, Yahoo Video, and many others and convert them to other video formats.
YouTube Downloader is software that allows you to download videos from YouTube, Facebook, Google Video, Yahoo Video, and many others and convert them to other video formats.
Thursday, September 20, 2012
U.S.: Laws of war apply to cyber attacks - Army News | News from Afghanistan & Iraq - Army Times
U.S.: Laws of war apply to cyber attacks - Army News | News from Afghanistan & Iraq - Army Times: The U.S. government believes that cyber attacks can amount to armed attacks, and are subject to international humanitarian law and rules of war, the top State Department lawyer said Tuesday.
Why Be Invisible? - Public WiFi is just public - Firewalls and anti-virus can't stop your sensitive information from being stolen out of thin air.
Why Be Invisible? - Public WiFi is just public - Firewalls and anti-virus can't stop your sensitive information from being stolen out of thin air.:
Most people don’t realize that wifi signals are just radio waves. Anyone within range can “listen in” to what you’re sending as easily as tuning to the right station. All it takes is a laptop and simple, readily available software and a hacker can easily view:
Most people don’t realize that wifi signals are just radio waves. Anyone within range can “listen in” to what you’re sending as easily as tuning to the right station. All it takes is a laptop and simple, readily available software and a hacker can easily view:
Tuesday, September 18, 2012
Garden State Owner Describes Misfire | NBC 7 San Diego
Garden State Owner Describes Misfire | NBC 7 San Diego: Garden State Fireworks co-owner August Santore talks with NBC 7s Megan Tevrizian about what went wrong in San Diego on July 4, 2012.
Android smartphone share passes 50 percent - Nielsen | The National Business Review
Android smartphone share passes 50 percent - Nielsen | The National Business Review: Android's share of the US smartphone market has passed the 50% mark, Nielsen says.
IDC tracks big jump in NZ smartphone ownership | The National Business Review
IDC tracks big jump in NZ smartphone ownership | The National Business Review: A new mobile research report from IDC New Zealand says smartphone ownership by households has jumped significantly from 13% in 2011 to around 44% in 2012.
Monday, September 17, 2012
The Mormon Candidate by Laurie Winer
Los Angeles Review of Books - The Mormon Candidate: When Romney stepped down as bishop to run for the U.S. Senate against Edward Kennedy in 1994, Carrel Sheldon may have been surprised to learn then that he believed “abortion should be safe and legal in this country.”
Thursday, September 13, 2012
Golden Trailer Awards
Golden Trailer Awards:
The 13th Annual Golden Trailer Awards
Winners were announced at the awards celebration on May 31st, 2012 in Los Angeles, California.
*Nominated Trailers are (listed in Alphabetical Order by Film Title)
*Order= Film Title, Studio/Production Company, Trailer house
The 13th Annual Golden Trailer Awards
Winners were announced at the awards celebration on May 31st, 2012 in Los Angeles, California.
*Nominated Trailers are (listed in Alphabetical Order by Film Title)
*Order= Film Title, Studio/Production Company, Trailer house
Disk recovery service saves Wired writer from losing everything after MacBook Air hack | VentureBeat
Disk recovery service saves Wired writer from losing everything after MacBook Air hack | VentureBeat: Honan, of course, now backs up his data with physical copies.
The fee for the DriveSavers service is based on how large the media is and what data is recovered. It’s zero if DriveSavers fails to get back any of the desired data. Honan said he paid $1,690.
The fee for the DriveSavers service is based on how large the media is and what data is recovered. It’s zero if DriveSavers fails to get back any of the desired data. Honan said he paid $1,690.
USB flash drive security - Wikipedia, the free encyclopedia
USB flash drive security - Wikipedia, the free encyclopedia: "In the early days of computer viruses and malware the primary means of transmission and infection was the floppy disk. Today, USB flash drives perform the same data and software storage and transfer role as the floppy disk, often used for transferring files between computers which may be on different networks or in different offices, owned by different people; this has made USB flash drives a leading form of information system infection. When a piece of malware gets onto a USB flash drive it may infect the devices into which that drive is subsequently plugged."
'via Blog this'
'via Blog this'
Does Cybercrime Really Cost $1 Trillion? - ProPublica
Does Cybercrime Really Cost $1 Trillion? - ProPublica: "Yet corporate cybersurveys are repeatedly invoked; the NSA’s Alexander is merely among the most prominent senior officials to do it. ProPublica provided the NSA’s media office with links to critical studies, stories and blog posts about the Symantec and McAfee numbers and asked whether Alexander or the agency was aware of them or, alternately, had other data to support the numbers he cited. The NSA media office responded: "The information is publicly available and was appropriately sourced.""
'via Blog this'
'via Blog this'
ICS-CERT Advisories and Reports Archive
ICS-CERT Advisories and Reports Archive:
"Control Systems Security Program (CSSP)
ICS-CERT Advisories and Reports Archive
Monthly Monitors | Alerts & Advisories (by Vendor) | Other Alerts & Advisories | Other Reports
Notable ICS-Related Vulnerabilities"
'via Blog this'
"Control Systems Security Program (CSSP)
ICS-CERT Advisories and Reports Archive
Monthly Monitors | Alerts & Advisories (by Vendor) | Other Alerts & Advisories | Other Reports
Notable ICS-Related Vulnerabilities"
'via Blog this'
Marketing Your Mobile App: Get It Right from the Start | BCP Business Center
Marketing Your Mobile App: Get It Right from the Start | BCP Business Center: "The app business is burgeoning and you’ve decided to get in on the boom. Maybe you work for an exciting start-up or are striking out on your own. Regardless of the size of your business, the Federal Trade Commission (FTC) — the nation’s consumer protection agency — has guidelines to help you comply with truth-in-advertising standards and basic privacy principles."
'via Blog this'
'via Blog this'
Three Killer Security Awareness Webcasts This Oct
Three Killer Security Awareness Webcasts This Oct: "Folks, as many of you know next month is NCSA (National Cyber Security Awareness) month. This is a great time to spruce up your security awareness program. To help energize your awareness training SANS Securing The Human will be hosting three free webcasts. Sign up now and don't miss a great opportunity to learn and share with others."
'via Blog this'
'via Blog this'
Wednesday, September 12, 2012
CISSP (7 Days)
CISSP (7 Days): "During our award-winning 7-day (ISC)² CISSP® Training Camp, students will live, learn, and take the CISSP certification exam at one of our state-of-the-art education centers. "
'via Blog this'
'via Blog this'
Monday, September 10, 2012
Why You Don’t Need Mac Anti-Virus Software - Plus What You Do Need
Why You Don’t Need Mac Anti-Virus Software - Plus What You Do Need:
“Some companies have done just fine having no anti-virus at all on their Mac population,” said David Johnson, a Forrester analyst and author of the report on managing Macs in the Windows-dominated computing environment found in most businesses.
And some have not....
“Some companies have done just fine having no anti-virus at all on their Mac population,” said David Johnson, a Forrester analyst and author of the report on managing Macs in the Windows-dominated computing environment found in most businesses.
And some have not....
Friday, September 7, 2012
▶ NO 'What's Your Name' by WhiteIrisRecs
▶ NO 'What's Your Name' by WhiteIrisRecs:
@playlist artwork
NO
2 tracks, 6.44 WhiteIrisRecs 2 months ago"
'via Blog this'
@playlist artwork
NO
2 tracks, 6.44 WhiteIrisRecs 2 months ago"
'via Blog this'
A dingo ate my Visa: 500K credit card numbers stolen in Australian hack | VentureBeat
A dingo ate my Visa: 500K credit card numbers stolen in Australian hack | VentureBeat:
According to SC Magazine, law enforcement was alerted to the scheme when banks started noticing fraudulent activity on the credit cards. It is expected that the 500,000 credit cards will be sold on the black market. The banks have already shut down access to those credit card numbers.
According to SC Magazine, law enforcement was alerted to the scheme when banks started noticing fraudulent activity on the credit cards. It is expected that the 500,000 credit cards will be sold on the black market. The banks have already shut down access to those credit card numbers.
Tuesday, September 4, 2012
Hereditary hemochromatosis HFE: regula... [Ann Biol Clin (Paris). 2012] - PubMed - NCBI
Hereditary hemochromatosis HFE: regula... [Ann Biol Clin (Paris). 2012] - PubMed - NCBI:
"HFE hereditary hemochromatosis is a chronic illness (ALD n(o) 17 - Maladies métaboliques et héréditaires) which is the first genetic disease in France (60% of all genetic diseases)."
'via Blog this'
"HFE hereditary hemochromatosis is a chronic illness (ALD n(o) 17 - Maladies métaboliques et héréditaires) which is the first genetic disease in France (60% of all genetic diseases)."
'via Blog this'
Friday, August 31, 2012
Oracle v. Google: The bewildering Java trial explained | Digital Trends
Oracle v. Google: The bewildering Java trial explained | Digital Trends:
"If Oracle wins its assertions that the Java APIs are copyrightable, the jury finding seems to imply that Google could be on the hook for infringement."
'via Blog this'
"If Oracle wins its assertions that the Java APIs are copyrightable, the jury finding seems to imply that Google could be on the hook for infringement."
'via Blog this'
Oracle's Billion Dollar Question: Can You Copyright a Language?
Oracle's Billion Dollar Question: Can You Copyright a Language?:
"It is fair to say that Oracle figured it could take all the intellectual property it acquired from Sun and use it to make money through litigating companies that supposedly infringe on Java patents."
'via Blog this'
"It is fair to say that Oracle figured it could take all the intellectual property it acquired from Sun and use it to make money through litigating companies that supposedly infringe on Java patents."
'via Blog this'
Thursday, August 30, 2012
Wednesday, August 29, 2012
NO by WhiteIrisRecs on SoundCloud - Create, record and share your sounds for free
NO by WhiteIrisRecs on SoundCloud - Create, record and share your sounds for free:
Produced by NO & Eric Palmquist
Mixed by Lewis Pesacov & Dave Schiffman
Produced by NO & Eric Palmquist
Mixed by Lewis Pesacov & Dave Schiffman
How to Make Firefox, IE, Safari, Chrome, Opera, Your Default Browser
How to Make Firefox, IE, Safari, Chrome, Opera, Your Default Browser:
"We're going to show you how to permanently set your web browser of choice to be your default browser in all situations."
'via Blog this'
"We're going to show you how to permanently set your web browser of choice to be your default browser in all situations."
'via Blog this'
Executive Excess 2012: The CEO Hands in Uncle Sam's Pocket - IPS
Executive Excess 2012: The CEO Hands in Uncle Sam's Pocket - IPS
"These tax dollars are flowing from average Americans who depend on public services to the kingpins of America’s private sector. "
'via Blog this'
"These tax dollars are flowing from average Americans who depend on public services to the kingpins of America’s private sector. "
'via Blog this'
Tuesday, August 28, 2012
Monday, August 27, 2012
Simple Auto-Playing Slideshow | CSS-Tricks
Simple Auto-Playing Slideshow | CSS-Tricks
Very nice!
Wrapper with div's as the "slides", which can contain any content.
Very nice!
Wrapper with div's as the "slides", which can contain any content.
Friday, August 24, 2012
Schneier on Security: Is iPhone Security Really this Good?
Schneier on Security: Is iPhone Security Really this Good?
Simson Garfinkel writes that the iPhone has such good security that the police can't use it for forensics anymore:
Simson Garfinkel writes that the iPhone has such good security that the police can't use it for forensics anymore:
Court affirms $675,000 penalty in music-downloading case | Politics and Law - CNET News
Court affirms $675,000 penalty in music-downloading case | Politics and Law - CNET News
A jury found that Tenenbaum's infringement was willful and ordered him to pay $675,000 in damages. Tenenbaum argued that the jury award was unconstitutional and the federal judge who oversaw his trial agreed that the amount was "excessive."
A jury found that Tenenbaum's infringement was willful and ordered him to pay $675,000 in damages. Tenenbaum argued that the jury award was unconstitutional and the federal judge who oversaw his trial agreed that the amount was "excessive."
Are 30 Songs Really Worth $675,000? The Justice System Thinks So | WebProNews
Are 30 Songs Really Worth $675,000? The Justice System Thinks So | WebProNews
Tenenbaum is stuck with a massive $675,000 fine that’s now set in stone. Despite not even being 30 yet, he’s pretty much ruined for life.
Tenenbaum is stuck with a massive $675,000 fine that’s now set in stone. Despite not even being 30 yet, he’s pretty much ruined for life.
Wednesday, August 22, 2012
More details on the Florida Hospital breach | PHIprivacy.net
More details on the Florida Hospital breach | PHIprivacy.net:
Dissent says: "The hospital couldn’t cooperate in an investigation involving theft of patient data because of HIPAA? I’d like to see/understand their explanation of this. I have sent an email inquiry to the hospital about certain points raised in WFTV’s coverage."
'via Blog this'
Dissent says: "The hospital couldn’t cooperate in an investigation involving theft of patient data because of HIPAA? I’d like to see/understand their explanation of this. I have sent an email inquiry to the hospital about certain points raised in WFTV’s coverage."
'via Blog this'
Monday, August 20, 2012
Why are elderly duped? Area in brain where doubt arises changes with age
Why are elderly duped? Area in brain where doubt arises changes with age
A study conducted for the National Institute of Justice in 2009 concluded that nearly 12 percent of Americans 60 and older had been exploited financially by a family member or a stranger. And, a report last year by insurer MetLife Inc. estimated the annual loss by victims of elder financial abuse at $2.9 billion.
A study conducted for the National Institute of Justice in 2009 concluded that nearly 12 percent of Americans 60 and older had been exploited financially by a family member or a stranger. And, a report last year by insurer MetLife Inc. estimated the annual loss by victims of elder financial abuse at $2.9 billion.
FBI — New Internet Scam
FBI — New Internet Scam:
"There is a new “drive-by” virus on the Internet, and it often carries a fake message—and fine—purportedly from the FBI."
'via Blog this'
"There is a new “drive-by” virus on the Internet, and it often carries a fake message—and fine—purportedly from the FBI."
'via Blog this'
Saturday, August 18, 2012
Download Tableau Public | Tableau Public
Download Tableau Public | Tableau Public:
"Tableau Public is a free application that brings data to life. Create and share interactive charts and graphs, stunning maps, live dashboards and fun applications in minutes then publish anywhere on the web. Anyone can do it, it’s that easy—and it’s free."
'via Blog this'
"Tableau Public is a free application that brings data to life. Create and share interactive charts and graphs, stunning maps, live dashboards and fun applications in minutes then publish anywhere on the web. Anyone can do it, it’s that easy—and it’s free."
'via Blog this'
Friday, August 17, 2012
Right Of Publicity � Brief History of RoP
Right Of Publicity � Brief History of RoP:
New York’s limiting viewpoint was addressed by Judge Jerome Frank in Haelan Laboratories, Inc. v. Topps Chewing Gum, Inc. 202 F.2d 866 (2nd Cir. 1953). In his decision, Judge Frank distinguished the “right of publicity” from the “right of privacy” by focusing on the economic interests involved, rather than the personal interests characteristic of the right of privacy. Haelan is also cited as the first articulation of these interests as the “Right of Publicity.”
New York’s limiting viewpoint was addressed by Judge Jerome Frank in Haelan Laboratories, Inc. v. Topps Chewing Gum, Inc. 202 F.2d 866 (2nd Cir. 1953). In his decision, Judge Frank distinguished the “right of publicity” from the “right of privacy” by focusing on the economic interests involved, rather than the personal interests characteristic of the right of privacy. Haelan is also cited as the first articulation of these interests as the “Right of Publicity.”
Thursday, August 16, 2012
Germany Investigating Facebook's Face-Recognition Features Again
Germany Investigating Facebook's Face-Recognition Features Again
Data privacy officials in Germany have reopened a probe to look deeper at Facebook’s face recognition technology and determine if the social networking giant was collecting member photos without their knowledge.
Data privacy officials in Germany have reopened a probe to look deeper at Facebook’s face recognition technology and determine if the social networking giant was collecting member photos without their knowledge.
TrapWire Antiterrorist Software Leaks Set Off Web Furor - NYTimes.com
TrapWire Antiterrorist Software Leaks Set Off Web Furor - NYTimes.com
A new release of stolen corporate e-mails by WikiLeaks has set off a flurry of concern and speculation around the world about a counterterrorist software program called TrapWire, which analyzes images from surveillance cameras and other data to try to identify terrorists planning attacks.
A new release of stolen corporate e-mails by WikiLeaks has set off a flurry of concern and speculation around the world about a counterterrorist software program called TrapWire, which analyzes images from surveillance cameras and other data to try to identify terrorists planning attacks.
White hats publish DDoS hijacking manual, turn tables on attackers | Ars Technica
White hats publish DDoS hijacking manual, turn tables on attackers | Ars Technica
Turning the tables on miscreants who paralyze websites with torrents of junk data, security researchers have published a detailed manual that shows how to neutralize some of the Internet's most popular denial-of-service tools.
Turning the tables on miscreants who paralyze websites with torrents of junk data, security researchers have published a detailed manual that shows how to neutralize some of the Internet's most popular denial-of-service tools.
Daily Kos: The Gentleperson's Guide to Forum Spies
Daily Kos: The Gentleperson's Guide to Forum Spies
What follows is a lengthy dissertation on how to subvert/co-opt Internet discussion groups. A veritable how-to manual for Forum Trolls and Hijackers.
What follows is a lengthy dissertation on how to subvert/co-opt Internet discussion groups. A veritable how-to manual for Forum Trolls and Hijackers.
Monday, August 13, 2012
Wanna Hack Mars "Curiosity"? This is all it takes....
Could you hack into Mars rover Curiosity? | ExtremeTech: "The first approach would involve the would-be hacker building the equivalent of NASA’s Deep Space Network (DSN), a worldwide network of big-dish antenna that send and receive spacecraft signals, and perform radio astronomy. To perform uplink communications (to the rover), the DSN’s biggest antennae — 230-feet (70-meter) dishes — are outfitted with transmitters that deliver up to 400 kilowatts of output power. The hacker would also have to replicate the exact same encoding scheme (probably QPSK, the same as satellite TV) and use the same frequency (X band, around 8GHz)."
'via Blog this'
'via Blog this'
Sunday, August 12, 2012
Death Benefits for Google Employees...
Even if you've only worked at Google for weeks, you are entitled (or, rather, your significant other is entitled to) Google's Death Benefit:
Here's What Happens To Google Employees When They Die - Forbes: "Should a U.S. Googler pass away while under the employ of the 14-year old search giant, their surviving spouse or domestic partner will receive a check for 50% of their salary every year for the next decade. Even more surprising, a Google spokesperson confirms that there’s “no tenure requirement” for this benefit, meaning most of their 34 thousand Google employees qualify."
'via Blog this'
Here's What Happens To Google Employees When They Die - Forbes: "Should a U.S. Googler pass away while under the employ of the 14-year old search giant, their surviving spouse or domestic partner will receive a check for 50% of their salary every year for the next decade. Even more surprising, a Google spokesperson confirms that there’s “no tenure requirement” for this benefit, meaning most of their 34 thousand Google employees qualify."
'via Blog this'
Saturday, August 11, 2012
Same Old Story...forgot to maintain important infrastructure
Here's a rant I have about failsafes: They were created so bad things would never happen. Think about factory explosions, oil spills, fires, and any of the thousands of catastrophes we see every year...each time there was a failsafe in place but, over the years, things were going so well, that upper management decided to forgo updates/upgrades or even regular maintenance because, well, things were going so well! That should never, ever be an excuse to justify not keeping failsafes up to date because the day will come when it all bites you in the arse.
AP NewsBreak: Refinery probe focusing on possible corrosion in decades-old pipe - The Washington Post: "Federal investigators probing the cause of a massive Chevron oil refinery fire are focusing on possible corrosion in a decades-old pipe the company inspected late last year but did not replace."
'via Blog this'
AP NewsBreak: Refinery probe focusing on possible corrosion in decades-old pipe - The Washington Post: "Federal investigators probing the cause of a massive Chevron oil refinery fire are focusing on possible corrosion in a decades-old pipe the company inspected late last year but did not replace."
'via Blog this'
Wednesday, August 8, 2012
Has Hacking Team's government trojan been used against journalists? | Privacy International
Has Hacking Team's government trojan been used against journalists? | Privacy International:
According to Hacking Team, the Da Vinci software logs Skype calls, emails, instant messaging, web browsing records, deleted files and shots taken from the computer’s own webcam. In effect, the company claims that their product not only relays what's happening on a target’s computer, but also enables surveillance of anything that occurs within the range of the computer’s internal camera or microphone.
Hacking Team’s Remote Control System was detected 'in the wild' last week - shortly after Gamma International's FinSpy (a similar tool) was identified in email attachments sent to Bahraini activists.
According to Hacking Team, the Da Vinci software logs Skype calls, emails, instant messaging, web browsing records, deleted files and shots taken from the computer’s own webcam. In effect, the company claims that their product not only relays what's happening on a target’s computer, but also enables surveillance of anything that occurs within the range of the computer’s internal camera or microphone.
Hacking Team’s Remote Control System was detected 'in the wild' last week - shortly after Gamma International's FinSpy (a similar tool) was identified in email attachments sent to Bahraini activists.
Tuesday, August 7, 2012
This Hot Hybrid Hovercraft Needs a Little Extra Lift | Autopia | Wired.com
This Hot Hybrid Hovercraft Needs a Little Extra Lift | Autopia | Wired.com:
he promises that the Mercier-Jones hovercraft will be like nothing else ever built before. With an exterior inspired by exotic cars, the design also has a unique gas-electric hybrid drivetrain that allows for continuous airflow while still providing enough energy for short bursts of power necessary in high-speed maneuvering. The setup is lightweight and promises to be quieter than existing hovercraft.
he promises that the Mercier-Jones hovercraft will be like nothing else ever built before. With an exterior inspired by exotic cars, the design also has a unique gas-electric hybrid drivetrain that allows for continuous airflow while still providing enough energy for short bursts of power necessary in high-speed maneuvering. The setup is lightweight and promises to be quieter than existing hovercraft.
This Hot Hybrid Hovercraft Needs a Little Extra Lift | Autopia | Wired.com
This Hot Hybrid Hovercraft Needs a Little Extra Lift | Autopia | Wired.com:
he promises that the Mercier-Jones hovercraft will be like nothing else ever built before. With an exterior inspired by exotic cars, the design also has a unique gas-electric hybrid drivetrain that allows for continuous airflow while still providing enough energy for short bursts of power necessary in high-speed maneuvering. The setup is lightweight and promises to be quieter than existing hovercraft.
he promises that the Mercier-Jones hovercraft will be like nothing else ever built before. With an exterior inspired by exotic cars, the design also has a unique gas-electric hybrid drivetrain that allows for continuous airflow while still providing enough energy for short bursts of power necessary in high-speed maneuvering. The setup is lightweight and promises to be quieter than existing hovercraft.
Monday, August 6, 2012
Spear Phishing Statistics: 2012 Findings from Microsoft TechEd, RSA Security Conference Surveys | Proofpoint: Security, Compliance and the Cloud
Spear Phishing Statistics: 2012 Findings from Microsoft TechEd, RSA Security Conference Surveys | Proofpoint: Security, Compliance and the Cloud:
"Today, Proofpoint published the findings from a recent survey of more than 330 IT professionals, aimed at learning the extent and impact of targeted phishing attacks (a.k.a., "spear phishing")."
'via Blog this'
"Today, Proofpoint published the findings from a recent survey of more than 330 IT professionals, aimed at learning the extent and impact of targeted phishing attacks (a.k.a., "spear phishing")."
'via Blog this'
PhishTank > Statistics about phishing activity and PhishTank usage
PhishTank > Statistics about phishing activity and PhishTank usage: "
Online, valid phishes
Total Submissions
Total Votes
6,923
1,487,747
5,853,008"
'via Blog this'
Online, valid phishes
Total Submissions
Total Votes
6,923
1,487,747
5,853,008"
'via Blog this'
How to Watch the Mars Curiosity Rover Landing | News & Opinion | PCMag.com
How to Watch the Mars Curiosity Rover Landing | News & Opinion | PCMag.com:
"NASA's Mars Curiosity Rover is making its final approach to the Red Planet and is expected to touch down at 1:31 a.m. Eastern on Monday, August 6 after a 350 million-mile journey that kicked off in November."
'via Blog this'
"NASA's Mars Curiosity Rover is making its final approach to the Red Planet and is expected to touch down at 1:31 a.m. Eastern on Monday, August 6 after a 350 million-mile journey that kicked off in November."
'via Blog this'
Sunday, August 5, 2012
Creating masking tracks in Vegas
Creating masking tracks in Vegas:
"Vegas software has always offered robust video compositing features which make it possible to create sophisticated composited sequences without opening a dedicated compositing application."
'via Blog this'
"Vegas software has always offered robust video compositing features which make it possible to create sophisticated composited sequences without opening a dedicated compositing application."
'via Blog this'
Loading Progress Bar Intro - Free Download | Sony Vegas | Obviously Tech
Loading Progress Bar Intro - Free Download | Sony Vegas | Obviously Tech:
"Below you’ll find the loading progress bar effect in a video preview! You can download this effect as a simple .wmv video file so you can use it in your videos, and/or you can download it as a .veg Sony Vegas Project File to allow you to customize the loading bar yourself, change the colors, size, text, even add in extra text if you wish!"
"Below you’ll find the loading progress bar effect in a video preview! You can download this effect as a simple .wmv video file so you can use it in your videos, and/or you can download it as a .veg Sony Vegas Project File to allow you to customize the loading bar yourself, change the colors, size, text, even add in extra text if you wish!"
Saturday, August 4, 2012
Skydiving record broken @ 220mph
I haven't even gone that fast being earth-bound! I can't imagine what it would feel like to fall that fast. Can you even keep your mouth closed at those speeds? Do you get bugs in your teeth? ;-)
Vertical skydiving record broken as 138 skydivers hit speeds of 220mph in snowflake formation - The Washington Post:
'via Blog this'
Vertical skydiving record broken as 138 skydivers hit speeds of 220mph in snowflake formation - The Washington Post:
'via Blog this'
Thursday, August 2, 2012
FBI finally computerized!
You ever wonder why there have never been stories about the FBI being hacked? Well.... that was because they didn't have a digital system that was connected to others. (Seriously! There were full analog: paper and pencil!) Now, after all these years, the FBI is finally connected. Anyone placing bets on when the first hack happens? Anyone want to make a side bet on who, or which country, makes the first hack? How long before you can find FBI files with simple Google hacks? LMFAO!!
FBI Files Go Digital, After Delays and Cost Overruns - WSJ.com:
'via Blog this'
FBI Files Go Digital, After Delays and Cost Overruns - WSJ.com:
'via Blog this'
Wednesday, August 1, 2012
USB flash drive security - Wikipedia, the free encyclopedia
USB flash drive security - Wikipedia, the free encyclopedia
Companies in particular are at risk when sensitive data are stored on unsecured USB flash drives by employees, who use the devices to transport data outside the office.
Companies in particular are at risk when sensitive data are stored on unsecured USB flash drives by employees, who use the devices to transport data outside the office.
Out of the Black: The Declassification of the NRO
Out of the Black: The Declassification of the NRO
As the documents illustrate, the issue of NRO declassification was considered as early as 1973. The documents further show that DCI Stansfield Turner (1977-1981) concluded that the fact of NRO and NRP existence did not meet the test of classification. As a result, Turner included declassification as part of a plan to revise the system of handling Sensitive Compartmented Information – but that plan was not implemented before the Carter administration was replaced by the Reagan administration, nor thereafter.
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB24/nsa25.pdf
As the documents illustrate, the issue of NRO declassification was considered as early as 1973. The documents further show that DCI Stansfield Turner (1977-1981) concluded that the fact of NRO and NRP existence did not meet the test of classification. As a result, Turner included declassification as part of a plan to revise the system of handling Sensitive Compartmented Information – but that plan was not implemented before the Carter administration was replaced by the Reagan administration, nor thereafter.
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB24/nsa25.pdf
Daily Kos: NSA: It's not the Privacy - it's the Incompetence
Daily Kos: NSA: It's not the Privacy - it's the Incompetence
If the call is of "interest", but an American is involved - that Americans name would be redacted and the file destroyed until surveillance was authorized by the FISA court. But even before 9/11 this was no longer the case according to Truthout.org
If the call is of "interest", but an American is involved - that Americans name would be redacted and the file destroyed until surveillance was authorized by the FISA court. But even before 9/11 this was no longer the case according to Truthout.org
‘Control-Alt-Hack’ game lets players try their hand at computer security | UW Today
‘Control-Alt-Hack’ game lets players try their hand at computer security | UW Today
“Control-Alt-Hack” gives teenage and young-adult players a taste of what it means to be a computer-security professional defending against an ever-expanding range of digital threats"
'via Blog this'
“Control-Alt-Hack” gives teenage and young-adult players a taste of what it means to be a computer-security professional defending against an ever-expanding range of digital threats"
'via Blog this'
Dropbox Reports User Accounts Were Hijacked, Adds New Security Features | TechCrunch
Dropbox Reports User Accounts Were Hijacked, Adds New Security Features | TechCrunch:
"Two-factor authentication, a way to optionally require a unique code in addition to your password when signing in."
Is not really two-factor.
'via Blog this'
"Two-factor authentication, a way to optionally require a unique code in addition to your password when signing in."
Is not really two-factor.
'via Blog this'
BBC News - Tax havens: Super-rich 'hiding' at least $21tn
BBC News - Tax havens: Super-rich 'hiding' at least $21tn
"A global super-rich elite had at least $21 trillion (£13tn) hidden in secret tax havens by the end of 2010, according to a major study."
'via Blog this'
"A global super-rich elite had at least $21 trillion (£13tn) hidden in secret tax havens by the end of 2010, according to a major study."
'via Blog this'
Tuesday, July 31, 2012
NSA Releases Disputed Email from Drake Case | Secrecy News
NSA Releases Disputed Email from Drake Case | Secrecy News
“If the system continues to be one-sided, where individuals are routinely held to account for supposedly improperly disclosing protected information but no one is ever held accountable for improperly classifying information in the first place, it sends a very clear message to the millions of individuals with security clearances to continue to overclassify with impunity. That does not bode well for either the security of our nation or our democratic form of government.”
“If the system continues to be one-sided, where individuals are routinely held to account for supposedly improperly disclosing protected information but no one is ever held accountable for improperly classifying information in the first place, it sends a very clear message to the millions of individuals with security clearances to continue to overclassify with impunity. That does not bode well for either the security of our nation or our democratic form of government.”
ClevX DriveSecurity powered by ESET
ClevX DriveSecurity powered by ESET
ClevX DriveSecurity™ powered by ESET is a powerful antivirus utility that prevents malware from spreading via portable drives.
ClevX DriveSecurity™ powered by ESET is a powerful antivirus utility that prevents malware from spreading via portable drives.
Monday, July 30, 2012
Daily Kos: The Gentleperson's Guide to Forum Spies
What follows is a lengthy dissertation on how to subvert/co-opt Internet discussion groups. A veritable how-to manual for Forum Trolls and Hijackers
Daily Kos: The Gentleperson's Guide to Forum Spies:
Daily Kos: The Gentleperson's Guide to Forum Spies:
10 Scariest Hacks CIO.com
10 Scariest Hacks CIO.com: Researchers from Black Hat and Defcon showed all manner of serious attacks on everything from browsers to automobiles.
Black Hat USA 2012 | Briefings
Black Hat USA 2012 | Briefings: This talk demonstrates how modern day financial applications, password and credit card managers, and other applications handling sensitive data are attacked on the iOS platform, and sometimes all too easily breached in as little as seconds. Attendees will learn how iOS applications are infected, how low-level classes and objects are manipulated and abused, logic checks bypassed, and other dark techniques used to steal data.
Saturday, July 28, 2012
Defcon 20: Skillz, thrills for the whole hacker family | Security & Privacy - CNET News
Defcon 20: Skillz, thrills for the whole hacker family | Security & Privacy - CNET News: This year's hacker show has something for everyone, from hardware hacking and zero-day contests to con games and nerd-core rappers.
NSA Chief: Agency Wants to Provide Malware Signatures, Not Enter Private Networks | Threat Level | Wired.com
NSA Chief: Agency Wants to Provide Malware Signatures, Not Enter Private Networks | Threat Level | Wired.com: the proposal the NSA had unsuccessfully pushed for at the White House would have required critical infrastructure companies – such as utilities, telecoms, ISPs, transportation and financial services companies – to allow their e-mail and other internet traffic to be scanned using threat signatures provided by the NSA and to turn over any evidence of a suspected attack to the government for analysis. The NSA felt the government needed an expanded role because private firms had failed to demonstrate that they were capable of defending themselves against cyber threats.
Tuesday, July 24, 2012
Defcon 19: Paul Roberts, Aaron Barr, Joshua Corman and Jericho
Defcon 19: Paul Roberts, Aaron Barr, Joshua Corman and Jericho Whoever Fights Monsters.. - YouTube
"This video is part of the Infosec Video Collection at SecurityTube.net: http://www.securitytube.net "
'via Blog this'
"This video is part of the Infosec Video Collection at SecurityTube.net: http://www.securitytube.net "
'via Blog this'
Sunday, July 22, 2012
Carney: Seek balance in a new pain-pill law
Carney: Seek balance in a new pain-pill law: Last week, a grand jury in Suffolk County released a report showing a dramatic increase in arrests and overdose deaths related to prescription painkillers there.
Demise of American Pain Foundation Can Help End the Opioid Lunacy | American News Report
Who sponsored this...
Demise of American Pain Foundation Can Help End the Opioid Lunacy | American News Report:
In the lunacy of the over-prescribing of opioids for all levels of pain in the U.S. and Canada, there is now a large dose of sanity. That sanity is an organization called Physicians for Responsible Opioid Prescribing (PROP). Their mission is to reduce morbidity and mortality from opioids and to promote cautious, safe, and responsible opioid prescribing practices
Demise of American Pain Foundation Can Help End the Opioid Lunacy | American News Report:
In the lunacy of the over-prescribing of opioids for all levels of pain in the U.S. and Canada, there is now a large dose of sanity. That sanity is an organization called Physicians for Responsible Opioid Prescribing (PROP). Their mission is to reduce morbidity and mortality from opioids and to promote cautious, safe, and responsible opioid prescribing practices
A severe and growing shortage of physicians willing to prescribe morphine and related opioid analgesics
There is a Pain Crisis in America. Its primary manifestation is the routine and widespread under-treatment of pain, especially chronic, non-cancer pain. Other manifestations include a severe and growing shortage of physicians willing to prescribe morphine and related opioid analgesics, the widespread use of more toxic and less efficacious classes of medications in an effort to avoid opioids, and the profound distortion of medical education and of the doctor-patient relationship.
Oldest Civilization may be in Antarctica
Oldest Civilization may be in Antarctica
"In 1949 the joint British-Swedish expedition conducted a thorough seismic exploration of the southernmost continent through the thick ice. The results coincided with the map of Reis. However, it was a mystery how the map data were to agree with the level of science of 1513."
'via Blog this'
"In 1949 the joint British-Swedish expedition conducted a thorough seismic exploration of the southernmost continent through the thick ice. The results coincided with the map of Reis. However, it was a mystery how the map data were to agree with the level of science of 1513."
'via Blog this'
Friday, July 20, 2012
CSA 1987
"COMPUTER SECURITY ACT OF 1987
Public Law 100-235 (H.R. 145)
January 8, 1988"
'via Blog this'
http://www.youtube.com/watch?v=2TaMepzJPP0&feature=youtu.be
Public Law 100-235 (H.R. 145)
January 8, 1988"
'via Blog this'
http://www.youtube.com/watch?v=2TaMepzJPP0&feature=youtu.be
Bank Sues Customer Over ACH/Wire Fraud
Bank Sues Customer Over ACH/Wire Fraud
Last week, a federal appellate court reversed a lower court's ruling in the ACH/wire fraud dispute between PATCO Construction Inc. and the former Ocean Bank, which is now part of People's United.
Last week, a federal appellate court reversed a lower court's ruling in the ACH/wire fraud dispute between PATCO Construction Inc. and the former Ocean Bank, which is now part of People's United.
Sunday, July 15, 2012
Vizio Demo — Just another WordPress site
Vizio Demo — Just another WordPress site:
Another Post with Everything In It
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Curabitur quam augue, vehicula quis, tincidunt vel, varius vitae, nulla. Sed convallis orci.
Another Post with Everything In It
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Curabitur quam augue, vehicula quis, tincidunt vel, varius vitae, nulla. Sed convallis orci.
Saturday, July 14, 2012
Problem loading page
https://d33ds.co/archive/yahoo-disclosure.txt
Apparently not there. Trying pastebin.
Apparently not there. Trying pastebin.
Friday, July 13, 2012
Govts should focus on cybersecurity education, not militarization | ZDNet
Govts should focus on cybersecurity education, not militarization | ZDNet:
Governments should spend more time and effort educating citizens and other countries on existing online threats and forge partnerships with private sector organizations rather than militarize the cyber arena.
According to Yaacob Ibrahim, Singapore's minister for information
Governments should spend more time and effort educating citizens and other countries on existing online threats and forge partnerships with private sector organizations rather than militarize the cyber arena.
According to Yaacob Ibrahim, Singapore's minister for information
DarkComet shut-down shows law enforcement works - CSO Online - Security and Risk
DarkComet shut-down shows law enforcement works - CSO Online - Security and Risk
"DarkComet made headlines in February, when it was used in siphoning information from the computers of Syrian activists opposed to dictator Bashar al-Assad,"
'via Blog this'
"DarkComet made headlines in February, when it was used in siphoning information from the computers of Syrian activists opposed to dictator Bashar al-Assad,"
'via Blog this'
Trojan Downloader Determines OS, Infects Systems With Custom Malware | threatpost
Trojan Downloader Determines OS, Infects Systems With Custom Malware | threatpost
"A new downloader uncovered by researchers at the Finnish security firm F-Secure is capable of sniffing out which operating system a user is running and infecting them with a custom malicious payload."
'via Blog this'
"A new downloader uncovered by researchers at the Finnish security firm F-Secure is capable of sniffing out which operating system a user is running and infecting them with a custom malicious payload."
'via Blog this'
Dark Comet RAT Tailored For Attacks On Gamers, Governments | threatpost
Dark Comet RAT Tailored For Attacks On Gamers, Governments | threatpost
"Researchers analyzing the Dark Comet remote access Trojan (RAT) program say that data from more than 400 campaigns suggests the malicious program is being used for a wide range of jobs, from attacks on online gamers, to potential hacks of air force bases and government Web sites."
'via Blog this'
"Researchers analyzing the Dark Comet remote access Trojan (RAT) program say that data from more than 400 campaigns suggests the malicious program is being used for a wide range of jobs, from attacks on online gamers, to potential hacks of air force bases and government Web sites."
'via Blog this'
Wednesday, July 11, 2012
Audio to Text - Speechpad
Audio to Text - Speechpad
Speechpad specializes in converting audio to text to create a high value document that can be read, searched and archived.
Speechpad specializes in converting audio to text to create a high value document that can be read, searched and archived.
NSA: Cybercrime is 'the greatest transfer of wealth in history' | ZDNet
NSA: Cybercrime is 'the greatest transfer of wealth in history' | ZDNet
The director of the National Security Agency (NSA) has called cybercrime "the greatest transfer of wealth in history." As such, he urged politicians and the American population in general to support cybersecurity legislation being pushed through Congress.
The director of the National Security Agency (NSA) has called cybercrime "the greatest transfer of wealth in history." As such, he urged politicians and the American population in general to support cybersecurity legislation being pushed through Congress.
Online Text to Speech Synthesizer
Online Text to Speech Synthesizer:
"You can quickly share the sound and text you entered by copying the generated link and pasting it somewhere."
'via Blog this'
"You can quickly share the sound and text you entered by copying the generated link and pasting it somewhere."
'via Blog this'
The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) | Threat Level | Wired.com
The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) | Threat Level | Wired.com:
"In the process—and for the first time since Watergate and the other scandals of the Nixon administration—the NSA has turned its surveillance apparatus on the US and its citizens"
'via Blog this'
"In the process—and for the first time since Watergate and the other scandals of the Nixon administration—the NSA has turned its surveillance apparatus on the US and its citizens"
'via Blog this'
NSA Chief Denies Wired's Domestic Spying Story (Fourteen Times) In Congressional Hearing - Forbes
NSA Chief Denies Wired's Domestic Spying Story (Fourteen Times) In Congressional Hearing - Forbes:
"if Dick Cheney were elected president and wanted to detain and incessantly waterboard every American who sent an email making fun of his well-known hunting mishaps, what I’d like to know is, does the NSA have the technological capacity to identify those Cheney bashers based upon the content of their emails?"
'via Blog this'
"if Dick Cheney were elected president and wanted to detain and incessantly waterboard every American who sent an email making fun of his well-known hunting mishaps, what I’d like to know is, does the NSA have the technological capacity to identify those Cheney bashers based upon the content of their emails?"
'via Blog this'
NSA Chief: Cybercrime constitutes the “greatest transfer of wealth in history” | The Cable
NSA Chief: Cybercrime constitutes the “greatest transfer of wealth in history” | The Cable: But the real threat on the Internet will come when cyber attacksbecome militarized, a threat the U.S. must deal with now, he said.
Google May Pay $22.5 Million in FTC Privacy Settlement - Security - News & Reviews - eWeek.com
Google May Pay $22.5 Million in FTC Privacy Settlement - Security - News & Reviews - eWeek.com: "Google and the Federal Trade Commission are reportedly close to a settlement regarding charges Google circumvented privacy settings in the Apple Safari Web browser."
'via Blog this'
'via Blog this'
Download Blue Cat's Phaser by Blue Cat Audio
Download Blue Cat's Phaser by Blue Cat Audio
"Modeled after vintage analog phaser circuits, Blue Cat's Phaser reproduces this old vintage phasing effect that you can find on so many recording"
'via Blog this'
"Modeled after vintage analog phaser circuits, Blue Cat's Phaser reproduces this old vintage phasing effect that you can find on so many recording"
'via Blog this'
Over 90 Free VST Effects Plugins
Over 90 Free VST Effects Plugins
"VST plugins can add power and flexibility to your digital audio workstation."
'via Blog this'
"VST plugins can add power and flexibility to your digital audio workstation."
'via Blog this'
Monday, July 9, 2012
Free text to speech software with naturally sounding voices -- Free NaturalReader
Free text to speech software with naturally sounding voices -- Free NaturalReader:
"NaturalReader is a Text to Speech software with natural sounding voices. This easy to use software can convert any written text such as MS Word, Webpage, PDF files, and Emails into spoken words."
'via Blog this'
"NaturalReader is a Text to Speech software with natural sounding voices. This easy to use software can convert any written text such as MS Word, Webpage, PDF files, and Emails into spoken words."
'via Blog this'
Acapela Text to Speech Demo
Acapela Text to Speech Demo: "For demo and evaluation purpose only, for commercial use of generated sound files please go to www.acapela-box.com "
'via Blog this'
'via Blog this'
Online Text to Speech Synthesizer
Online Text to Speech Synthesizer
"This online application converts text into speech.
You may write anything into the text field and press the blue speak button at the bottom left. "
'via Blog this'
"This online application converts text into speech.
You may write anything into the text field and press the blue speak button at the bottom left. "
'via Blog this'
Saturday, July 7, 2012
Pena Nieto Bets on Pablo Escobar Nemesis to Win Mexico Drug War - Businessweek
Pena Nieto Bets on Pablo Escobar Nemesis to Win Mexico Drug War - Businessweek:
Drug War ‘Disaster’ -- “It’s a disaster,” said Suarez-Mier, who representedMexico’s attorney general when the Merida Initiative, a three-year, $1.6 billion anti-narcotics program funded by the U.S.,was signed in 2008. “When you decapitate a cartel, they tend tofracture and now we have more cartels that are more violent.”
Drug War ‘Disaster’ -- “It’s a disaster,” said Suarez-Mier, who representedMexico’s attorney general when the Merida Initiative, a three-year, $1.6 billion anti-narcotics program funded by the U.S.,was signed in 2008. “When you decapitate a cartel, they tend tofracture and now we have more cartels that are more violent.”
U.S. pressures companies to report cybercrime – USATODAY.com
U.S. pressures companies to report cybercrime – USATODAY.com
Wyndham did not report the break-in in corporate filings even though the U.S. Securities and Exchange Commission wants companies to inform investors of cybercrimes.
Wyndham did not report the break-in in corporate filings even though the U.S. Securities and Exchange Commission wants companies to inform investors of cybercrimes.
Friday, July 6, 2012
Novel observations in hereditary hemochromatosis: potential implications for clinical strategies
Novel observations in hereditary hemochromatosis: potential implications for clinical strategies
raises the possibility that compensatory mechanisms exist to partially offset the hepcidin-mediated effects on dietary iron absorption in hereditary hemochromatosis patients with elevated transferrin saturation.
raises the possibility that compensatory mechanisms exist to partially offset the hepcidin-mediated effects on dietary iron absorption in hereditary hemochromatosis patients with elevated transferrin saturation.
Thursday, July 5, 2012
Cybercriminals Sniff Out Vulnerability - WSJ.com
Cybercriminals Sniff Out Vulnerability - WSJ.com
With cybercriminals a greater threat to small businesses than ever before, more entrepreneurs like Lloyd Keilson are left asking themselves who is to blame for hacking attacks that drain their business accounts.
With cybercriminals a greater threat to small businesses than ever before, more entrepreneurs like Lloyd Keilson are left asking themselves who is to blame for hacking attacks that drain their business accounts.
Find and Call: Leak and Spam - Securelist
Find and Call: Leak and Spam - Securelist:
The application is called ‘Find and Call’ and can be found in both the iOS Apple App Store and Android’s Google Play.
The application is called ‘Find and Call’ and can be found in both the iOS Apple App Store and Android’s Google Play.
Wednesday, July 4, 2012
Vegas Pro 11 Overview
Vegas Pro 11 Overview
"an efficient, intuitive and integrated content creation environment for video and broadcast professionals."
'via Blog this'
"an efficient, intuitive and integrated content creation environment for video and broadcast professionals."
'via Blog this'
Tuesday, July 3, 2012
Glyde – Your Online Garage Sale | Culture Milk
Glyde – Your Online Garage Sale | Culture Milk:
Of course, Glyde sells the actual product for a higher price, but the money you actually make through them is higher than any other service.
Of course, Glyde sells the actual product for a higher price, but the money you actually make through them is higher than any other service.
Make an Old Computer Your Home Security System | SecurityNewsDaily.com
Make an Old Computer Your Home Security System | SecurityNewsDaily.com:
Setting up a home camera security system on an old computer is easier than it seems, said Robert Siciliano, a security and ID theft expert based in Boston.
Setting up a home camera security system on an old computer is easier than it seems, said Robert Siciliano, a security and ID theft expert based in Boston.
BBB teaches best back-to-school lesson: How students can avoid identity theft - DailyFinance
BBB teaches best back-to-school lesson: How students can avoid identity theft - DailyFinance:
College students have enough to worry about without falling prey to scammers looking to steal their identities and good credit.
College students have enough to worry about without falling prey to scammers looking to steal their identities and good credit.
Sunday, July 1, 2012
Group makes final push to rid DNSChanger infections - SC Magazine
Group makes final push to rid DNSChanger infections - SC Magazine
Despite months of warnings, 303,867 machines worldwide remain infected with DNSChanger malware
Despite months of warnings, 303,867 machines worldwide remain infected with DNSChanger malware
Stuxnet Will Come Back to Haunt Us - NYTimes.com
Stuxnet Will Come Back to Haunt Us - NYTimes.com
The decision by the United States and Israel to develop and then deploy the Stuxnet computer worm against an Iranian nuclear facility late in George W. Bush’s presidency marked a significant and dangerous turning point in the gradual militarization of the Internet.
The decision by the United States and Israel to develop and then deploy the Stuxnet computer worm against an Iranian nuclear facility late in George W. Bush’s presidency marked a significant and dangerous turning point in the gradual militarization of the Internet.
Back-to-School Shopping? Avoid ATM Scams
Many shoppers are opting to use a debit card to pay for those purchases, increasing the potential of becoming a victim of various high tech scams.
Back-to-School Shopping? Avoid ATM Scams - MetroFamily Magazine - August 2011 - Oklahoma City, OK:
Back-to-School Shopping? Avoid ATM Scams - MetroFamily Magazine - August 2011 - Oklahoma City, OK:
Credit, ATM and Debit Cards: What to do if They're Lost or Stolen
Credit, ATM and Debit Cards: What to do if They're Lost or Stolen
Your liability under federal law for unauthorized use of your ATM or debit card depends on how quickly you report the loss.
Your liability under federal law for unauthorized use of your ATM or debit card depends on how quickly you report the loss.
Information Technology: Edu phishing example
Information Technology: A scam first reported on May 14th of this year has returned. This time, an e-mail allegedly from Sarah Williams at the HelpDesk, includes a request for personal information (Username, Password, Address, and Department).
Amid Back-To-School Season, Feds Warn About ID Theft Scams Targeting Kids
Amid Back-To-School Season, Feds Warn About ID Theft Scams Targeting Kids
But federal authorities are warning parents that back-to-school season is actually a risky time of year when it comes to the potential for young people to become targeted by identity thieves.
But federal authorities are warning parents that back-to-school season is actually a risky time of year when it comes to the potential for young people to become targeted by identity thieves.
How Amazon Saved My Life - IndieReader
How Amazon Saved My Life - IndieReader:
Did I cry over some of these rejections? Absolutely. Did I feel inadequate, untalented, hurt? Yes. Did I doubt my ability to craft a story that readers could fall in love with? You bet.
Did I cry over some of these rejections? Absolutely. Did I feel inadequate, untalented, hurt? Yes. Did I doubt my ability to craft a story that readers could fall in love with? You bet.
Saturday, June 30, 2012
Press Releases | TONIX Pharmaceuticals, Inc.
Press Releases | TONIX Pharmaceuticals, Inc.
"FM patients benefitted from bedtime very low dose cyclobenzaprine and that improvements were correlated with increased nights of restorative sleep. "
'via Blog this'
"FM patients benefitted from bedtime very low dose cyclobenzaprine and that improvements were correlated with increased nights of restorative sleep. "
'via Blog this'
Online PTSD treatment for anxiety and stress
Online PTSD treatment for anxiety and stress:
"For those seeking treatment for PTSD and traumatic stress using confidential computer therapy, PTSDSTRESS.COM offers an affordable and effective treatment option that reduces the stress and painful memories of PTSD and traumatic stress"
'via Blog this'
"For those seeking treatment for PTSD and traumatic stress using confidential computer therapy, PTSDSTRESS.COM offers an affordable and effective treatment option that reduces the stress and painful memories of PTSD and traumatic stress"
'via Blog this'
New University of South Florida therapy may ease PTSD - News - Stripes
New University of South Florida therapy may ease PTSD - News - Stripes
"Accelerated resolution therapy uses elements of existing cognitive behavioral therapies, as well as lateral sets of left/right eye movements designed to minimize anxiety and body sensations associated with recall of traumatic memories, and replace distressing images with favorable ones. The treatment often only takes one to five sessions to complete and does not use drugs."
'via Blog this'
"Accelerated resolution therapy uses elements of existing cognitive behavioral therapies, as well as lateral sets of left/right eye movements designed to minimize anxiety and body sensations associated with recall of traumatic memories, and replace distressing images with favorable ones. The treatment often only takes one to five sessions to complete and does not use drugs."
'via Blog this'
Thursday, June 28, 2012
Richard Zombeck: Below the Fold: Wells Fargo Gets Picked Up On Radar
Richard Zombeck: Below the Fold: Wells Fargo Gets Picked Up On Radar
"Matt Taibbi of Rolling Stone recently published an article that, while long is by no means a slog, details how the TBTF banks were engaged in bid rigging of municipal bonds in "virtually every state, district and territory in the United States," and how "Wall Street wiseguys" spent the past decade taking part in a breathtakingly broad scheme to skim billions of dollars from cities and small towns across America."
'via Blog this'
"Matt Taibbi of Rolling Stone recently published an article that, while long is by no means a slog, details how the TBTF banks were engaged in bid rigging of municipal bonds in "virtually every state, district and territory in the United States," and how "Wall Street wiseguys" spent the past decade taking part in a breathtakingly broad scheme to skim billions of dollars from cities and small towns across America."
'via Blog this'
Tuesday, June 26, 2012
FTC sues Wyndham Hotels after three credit card breaches - SC Magazine
FTC sues Wyndham Hotels after three credit card breaches - SC Magazine
The Federal Trade Commission is suing a major hotel chain and its subsidiaries for allegedly failing to secure the financial information of its guests, which led to fraudulent charges of more than $10 million and the siphoning out of hundreds of thousands of credit card numbers.
The Federal Trade Commission is suing a major hotel chain and its subsidiaries for allegedly failing to secure the financial information of its guests, which led to fraudulent charges of more than $10 million and the siphoning out of hundreds of thousands of credit card numbers.
Stuxnet Will Come Back to Haunt Us - NYTimes.com
Stuxnet Will Come Back to Haunt Us - NYTimes.com:
This mirrors what Stephen Cobb has been saying all along...no matter how hard you try to create a virus to attack a specific host, it will always get out into the wild. There's just no way to ensure that the virus was written perfectly (because, in part, there are no "prefect" systems?)
'via Blog this'
This mirrors what Stephen Cobb has been saying all along...no matter how hard you try to create a virus to attack a specific host, it will always get out into the wild. There's just no way to ensure that the virus was written perfectly (because, in part, there are no "prefect" systems?)
'via Blog this'
Facebook named in a third of divorce filings in 2011 - NY Daily News
Facebook named in a third of divorce filings in 2011 - NY Daily News:
I guess this puts a lot of private detectives out of business! No more crime novels where the grungy retired police officer stakeout cheap hotel rooms in the hopes of finding evidence to be used in a divorce. All they need to do now is look at Facebook pages?
I also recently read that scholarships are looking at applicants' Facebook pages when the applicant is looking for college money. If there are drunken pictures on the applicants' Facebook pages, no money for college. (Maybe that ought to be a type of intelligence test...if you're dumb enough to put up incriminating Facebook postings, then you're too dumb for college!)
I guess this puts a lot of private detectives out of business! No more crime novels where the grungy retired police officer stakeout cheap hotel rooms in the hopes of finding evidence to be used in a divorce. All they need to do now is look at Facebook pages?
I also recently read that scholarships are looking at applicants' Facebook pages when the applicant is looking for college money. If there are drunken pictures on the applicants' Facebook pages, no money for college. (Maybe that ought to be a type of intelligence test...if you're dumb enough to put up incriminating Facebook postings, then you're too dumb for college!)
Friday, June 22, 2012
Debunking cybercrime myths
Light Blue Touchpaper Blog Archive Debunking cybercrime myths
Our paper Measuring the Cost of Cybercrime sets out to debunk the scaremongering around online crime that governments and defence contractors are using to justify everything from increased surveillance to preparations for cyberwar
Our paper Measuring the Cost of Cybercrime sets out to debunk the scaremongering around online crime that governments and defence contractors are using to justify everything from increased surveillance to preparations for cyberwar
Thursday, June 21, 2012
Facing Life With a Lethal Gene by Amy Harmon | Byliner
Facing Life With a Lethal Gene by Amy Harmon | Byliner
Katharine Moser is learning to live with the knowledge that she will inevitably develop Huntington’s disease.
Katharine Moser is learning to live with the knowledge that she will inevitably develop Huntington’s disease.
Wednesday, June 20, 2012
ConceptDev (Craig Dunn's blog): Monitoring iPhone web traffic (with Fiddler)
ConceptDev (Craig Dunn's blog): Monitoring iPhone web traffic (with Fiddler):
"For reasons that will become apparent in a future post, I wanted to 'sniff' the web traffic coming from my iPhone. "
'via Blog this'
"For reasons that will become apparent in a future post, I wanted to 'sniff' the web traffic coming from my iPhone. "
'via Blog this'
Safe Browsing—protecting web users for five years and counting | Official Google Blog
Safe Browsing—protecting web users for five years and counting | Official Google Blog:
"We find about 9,500 new malicious websites every day"
'via Blog this'
"We find about 9,500 new malicious websites every day"
'via Blog this'
Monday, June 18, 2012
Spokeo to Pay $800,000 to Settle FTC Charges Company Allegedly Marketed Information to Employers and Recruiters in Violation of FCRA
Spokeo to Pay $800,000 to Settle FTC Charges Company Allegedly Marketed Information to Employers and Recruiters in Violation of FCRA:
According to the FTC, Spokeo collects personal information about consumers from hundreds of online and offline data sources, including social networks. It merges the data to create detailed personal profiles of consumers. The profiles contain such information as name, address, age range, and email address. They also might include hobbies, ethnicity, religion, participation on social networking sites, and photos.
According to the FTC, Spokeo collects personal information about consumers from hundreds of online and offline data sources, including social networks. It merges the data to create detailed personal profiles of consumers. The profiles contain such information as name, address, age range, and email address. They also might include hobbies, ethnicity, religion, participation on social networking sites, and photos.
RPT-REUTERS SUMMIT-Hacked companies fight back with controversial steps - chicagotribune.com
RPT-REUTERS SUMMIT-Hacked companies fight back with controversial steps - chicagotribune.com: Other security experts say a more aggressive posture is
unlikely to have a significant impact in the near term in the
overall fight against cybercriminals and Internet espionage.
unlikely to have a significant impact in the near term in the
overall fight against cybercriminals and Internet espionage.
Pain Contracts: "Cooperation" or Coercion? | VMCA
Pain Contracts: "Cooperation" or Coercion? | VMCA
Pain Contracts are another result of the DEA's war on pain patients and their doctors. Doctors use pain contracts to cover their rear; as proof to the DEA and other law enforcement agencies that they are properly supervising those patients who get opiates. An additional benefit to doctors is that they serve to dissuade patients from filing lawsuits who have been discharged for failing to follow the rules. They treat pain patients as suspects in advance. But are these contracts really legally binding? Definitely not.
Pain Contracts are another result of the DEA's war on pain patients and their doctors. Doctors use pain contracts to cover their rear; as proof to the DEA and other law enforcement agencies that they are properly supervising those patients who get opiates. An additional benefit to doctors is that they serve to dissuade patients from filing lawsuits who have been discharged for failing to follow the rules. They treat pain patients as suspects in advance. But are these contracts really legally binding? Definitely not.
Sunday, June 17, 2012
What Is Hemochromatosis? - NHLBI, NIH
What Is Hemochromatosis? - NHLBI, NIH
For people who are diagnosed and treated early, a normal lifespan is possible. If left untreated, hemochromatosis can lead to severe organ damage and even death.
For people who are diagnosed and treated early, a normal lifespan is possible. If left untreated, hemochromatosis can lead to severe organ damage and even death.
Clinical consequences of iron overload in hemochromatosis homozygotes
Clinical consequences of iron overload in hemochromatosis homozygotes:
This approach, however, is both impractical and unethical. Once cirrhosis due to hemochromatosis is established, life expectancy is shortened even if phlebotomy therapy is initiated.
This approach, however, is both impractical and unethical. Once cirrhosis due to hemochromatosis is established, life expectancy is shortened even if phlebotomy therapy is initiated.
Wednesday, June 13, 2012
I know someone whose 2-factor phone authentication was hacked... - William Edwards, Coder
I know someone whose 2-factor phone authentication was hacked... - William Edwards, Coder:
They key thing? Phone company support staff have been successfully socially engineered from like forever, and for those preferring technical attacks phones can be cloned too.
They key thing? Phone company support staff have been successfully socially engineered from like forever, and for those preferring technical attacks phones can be cloned too.
Google's two-factor glitch ends in 4chan attack - Security - News - ZDNet Australia
Google's two-factor glitch ends in 4chan attack - Security - News - ZDNet Australia:
Prince was using a 20 character, highly randomised password; however, the hackers were able to bypass it by asking Google for an account reset. One option for recovering an account is to have Google send a confirmation code to the phone number associated with the account, and where SMS is not available, it sends the code as a voice call.
Prince believes that the hackers began the recovery process and intercepted the confirmation code by socially engineering US telco AT&T's support staff to gain access to his voicemail, where the code would have ended up.
Prince was using a 20 character, highly randomised password; however, the hackers were able to bypass it by asking Google for an account reset. One option for recovering an account is to have Google send a confirmation code to the phone number associated with the account, and where SMS is not available, it sends the code as a voice call.
Prince believes that the hackers began the recovery process and intercepted the confirmation code by socially engineering US telco AT&T's support staff to gain access to his voicemail, where the code would have ended up.
Microsoft scrambles as it patches 26 bugs, warns users of active attacks
Microsoft scrambles as it patches 26 bugs, warns users of active attacks
Seven weeks later, Microsoft tossed one of its Chinese partners, Hangzhou DPTech Technologies, from an information-sharing program it hosts for scores of antivirus firms. Microsoft said that DPTech had "breached our non-disclosure agreement" as it pinned the leak on the firm.
Seven weeks later, Microsoft tossed one of its Chinese partners, Hangzhou DPTech Technologies, from an information-sharing program it hosts for scores of antivirus firms. Microsoft said that DPTech had "breached our non-disclosure agreement" as it pinned the leak on the firm.
Why smart authors are cutting Amazon out | VentureBeat
Why smart authors are cutting Amazon out | VentureBeat:
So it would behoove all authors who can sell their book to sell it on their own website and not on Amazon.
So it would behoove all authors who can sell their book to sell it on their own website and not on Amazon.
Facebook privacy policy vote in: users don’t press ‘Like’ - Hindustan Times
Facebook privacy policy vote in: users don’t press ‘Like’ - Hindustan Times:
“Despite our significant efforts to encourage users to vote, only 342,632 people participated, which amounts to a tiny fraction of our user base of more than 900 million,” said Elliot Schrage, Vice President, Communications, Public Policy and Marketing at Facebook.
“Despite our significant efforts to encourage users to vote, only 342,632 people participated, which amounts to a tiny fraction of our user base of more than 900 million,” said Elliot Schrage, Vice President, Communications, Public Policy and Marketing at Facebook.
Monday, June 11, 2012
DEA public health damage
"It is important to note that much of the public health damage here is caused not by the doctors accused of wrongdoing, rather it is caused by doctors-in-good-standing who, faced with a patient in pain and therefore at risk of being targeted by the DEA, modify their treatment in an attempt to avoid regulatory attention."
Dr. DeLuca
Dr. DeLuca
Sunday, June 10, 2012
This is a problem:
The "chilling effect" is a phrase which describes the grotesque distortion of the norms of medical practice and the violation of the doctor-patient relationship that results from the withdrawal of physicians from the appropriate treatment of pain due to fear of litigation, loss of livelihood, and incarceration.
Friday, June 8, 2012
5150 (Involuntary psychiatric hold) - Wikipedia, the free encyclopedia
5150 (Involuntary psychiatric hold) - Wikipedia, the free encyclopedia
Section 5150 is a section of the California Welfare and Institutions Code (specifically, the Lanterman–Petris–Short Act or "LPS") which allows a qualified officer or clinician to involuntarily confine a person deemed to have a mental disorder that makes them a danger to him or her self, and/or others and/or gravely disabled.
Patient rights cannot be denied as a condition of admission, nor as part of a treatment plan (a doctor may not designate patient rights a 'privilege' or 'punishment'). Any time a right is denied under good cause, it must be documented in the patient's medical record and explained to the patient. The denial must be reviewed regularly and removed once good cause no longer exists.
When a right is denied, the reason given for denying the right must have some clear relationship to the right denied.[5] For example, a patient may be denied the right to keep his cigarettes (the right to keep and use personal possessions) because he is burning himself and lighting fires, and lesser restrictive alternatives (supervision during designated smoking times) have failed. This rule prevents facilities from denying rights as a form of punishment; for example, if a patient misbehaves by throwing food at another person, then the facility cannot take away personal possessions or deny visitors for the day.
Section 5150 is a section of the California Welfare and Institutions Code (specifically, the Lanterman–Petris–Short Act or "LPS") which allows a qualified officer or clinician to involuntarily confine a person deemed to have a mental disorder that makes them a danger to him or her self, and/or others and/or gravely disabled.
Undeniable rights
Under California law, the following rights may never be denied (Cal. Welf. & Inst. Code § 5325.1):- The right to treatment services which promote the potential of the person to function independently. Treatment should be provided in ways that are least restrictive of the personal liberty of the individual.
- The right to dignity, privacy, and humane care.
- The right to be free from harm, including unnecessary or excessive physical restraint, isolation, medication, abuse, or neglect. Medication may not be used as punishment, for the convenience of staff, as a substitute for, or in quantities that interfere with the treatment program.
- The right to prompt medical care and treatment.
- The right to religious freedom and practice.
- The right to participate in appropriate programs of publicly supported education.
- The right to social interaction.
- The right to physical exercise and recreational opportunities.
- The right to be free from hazardous procedures.
Additional rights
Additionally, every mental health client has the right to see and receive the services of a Patients' Rights Advocate. All patients also have the following treatment rights:- The right to give or withhold informed consent to medical and psychiatric treatment, including the right to refuse medications (WIC-5325.2) except in emergency (W&I 5008 (m)) situations where danger to life is present; or by court order where the patient is found to lack the capacity to give or refuse informed consent via either a Capacity Hearing (see W&I 5332) and also known as a Riese hearing or via conservatorship.
- The right to refuse psychosurgery (Cal. Welf. & Inst. Code § 5326.6).
- The right to refuse electroconvulsive therapy (ECT) unless court ordered (Cal. Welf. & Inst. Code 5326.7.).
- The right to confidentiality (Cal. Welf. & Inst. Code § 5328).
- The right to inspect and copy the medical record, unless specific criteria are met (Cal. Health & Safety Code § 1795).
- The right to have family/friends notified of certain treatment information with patient's permission (Cal. Welf. & Inst. Code § 5328.1).
- The right to an aftercare plan (Cal. Welf. & Inst. Code § 5622).
Deniable rights with good cause
Psychiatric facilities must also uphold the following specific rights, which can be denied only when "good cause" exists.[4]- The right to wear one's own clothing.
- The right to keep and use one's own personal possessions, including toilet articles, in a place accessible to the patient.
- The right to keep and spend a reasonable sum of one's money for small purchases.
- The right to have access to individual storage space for one's own use.
- The right to see visitors each day.
- The right to have reasonable access to phones both to make and receive confidential calls.
- The right to have access to letter-writing materials, including stamps.
- The right to mail and receive unopened letters and correspondence.
With good cause
Denying a patient's rights requires good cause. Good cause is defined as the belief of the professional in charge of care for the client that the specific right would cause- a danger to self or others;
- a serious infringement on the rights of others; or
- serious damage to the facility;
Patient rights cannot be denied as a condition of admission, nor as part of a treatment plan (a doctor may not designate patient rights a 'privilege' or 'punishment'). Any time a right is denied under good cause, it must be documented in the patient's medical record and explained to the patient. The denial must be reviewed regularly and removed once good cause no longer exists.
When a right is denied, the reason given for denying the right must have some clear relationship to the right denied.[5] For example, a patient may be denied the right to keep his cigarettes (the right to keep and use personal possessions) because he is burning himself and lighting fires, and lesser restrictive alternatives (supervision during designated smoking times) have failed. This rule prevents facilities from denying rights as a form of punishment; for example, if a patient misbehaves by throwing food at another person, then the facility cannot take away personal possessions or deny visitors for the day.
Without good cause
If a right was denied without good cause, a patient can instruct his or her appointed public defender to file an Ex Parte application with the court to restore the right. After filing the application, a hearing is set and an opportunity to be heard by the judge concerning the merits of the case is reviewed; the judge determines if the right will be restored or remain listed as a "good cause" denial. An Ex Parte can bring relief in a matter when a person is deprived of any interest in liberty or property without due process of law.Making Sense of Pain Relief
Welcome to Making Sense of Pain Relief: Health Care Providers Who Treat Pain: If you are looking for a health care provider to help treat your arthritis or joint pain, you have many options.
The use of OxyContin was associated with an average 2.3 day reduction in inpatient services among patients following total knee arthroplasty (Cheville et al., 2001). In addition data from two retrospective database studies have shown OxyContin to have economic advantages among the long-acting opioids. The first study showed that starting pain treatment using OxyContin for chronic pain conditions, compared to either controlled-release morphine sulfate (CRMS) or Duragesic, can produce savings on total healthcare costs, total pharmacy costs, long-acting opioid costs, and often times short-acting opioid costs.
Additionally, a second study documented the fact that health-care costs were $17,580 higher among patients who switched therapy versus those who did not. The study documented that patients who begin therapy with controlled-release oxycodone are less likely to switch to another medication than those initially treated with either transdermal fentanyl or CRMS. These findings are of economic relevance, as health-care costs are significantly higher among patients who switch LAO therapy in comparison with those who do not.
In summary, a consistent pattern of pain reduction or continuing, stable pain control supported the analgesic efficacy of OxyContin tablets among patients with malignant and non-malignant pain syndromes. Use of OxyContin has been associated with significant improvements in patientreported outcomes, and limited available economic evidence suggests that OxyContin represents
a cost-effective use of scarce health resources.
119
The use of OxyContin was associated with an average 2.3 day reduction in inpatient services among patients following total knee arthroplasty (Cheville et al., 2001). In addition data from two retrospective database studies have shown OxyContin to have economic advantages among the long-acting opioids. The first study showed that starting pain treatment using OxyContin for chronic pain conditions, compared to either controlled-release morphine sulfate (CRMS) or Duragesic, can produce savings on total healthcare costs, total pharmacy costs, long-acting opioid costs, and often times short-acting opioid costs.
Additionally, a second study documented the fact that health-care costs were $17,580 higher among patients who switched therapy versus those who did not. The study documented that patients who begin therapy with controlled-release oxycodone are less likely to switch to another medication than those initially treated with either transdermal fentanyl or CRMS. These findings are of economic relevance, as health-care costs are significantly higher among patients who switch LAO therapy in comparison with those who do not.
In summary, a consistent pattern of pain reduction or continuing, stable pain control supported the analgesic efficacy of OxyContin tablets among patients with malignant and non-malignant pain syndromes. Use of OxyContin has been associated with significant improvements in patientreported outcomes, and limited available economic evidence suggests that OxyContin represents
a cost-effective use of scarce health resources.
119
Question abot switching from OXYCONTIN to OPANA ER, Need some Info Please?
Question abot switching from OXYCONTIN to OPANA ER, Need some Info Please?
I have taken Oxycontin for many years at a dosage of 120 mg 4x daily, since people have abused Oxycontin so much, the pharmacutical company changed the breakdown, and therefore they don't work the same,
I have taken Oxycontin for many years at a dosage of 120 mg 4x daily, since people have abused Oxycontin so much, the pharmacutical company changed the breakdown, and therefore they don't work the same,
daily dose oxcontin - Google Search
daily dose oxcontin - Google Search
OxyContin 60 mg and 80 mg tablets, a single dose greater than 40 mg, or a total daily dose greater than 80 mg are only for use in opioid-tolerant patients.
OxyContin 60 mg and 80 mg tablets, a single dose greater than 40 mg, or a total daily dose greater than 80 mg are only for use in opioid-tolerant patients.
Thursday, June 7, 2012
Protect Your Rights. Get Every Penny You Deserve.
Protect Your Rights. Get Every Penny You Deserve
If you are applying for Social Security Disability Insurance, "SSDI," or Supplemental Security Income, "SSI," you must understand... the odds are overwhelming you will be denied... no matter how valid your claim!
If you are applying for Social Security Disability Insurance, "SSDI," or Supplemental Security Income, "SSI," you must understand... the odds are overwhelming you will be denied... no matter how valid your claim!
Thursday, May 31, 2012
Meet the little box that could stop Flame and Stuxnet
Meet the little box that could stop Flame and Stuxnet | Crave - CNET
A new plug-and-play device for factories and power plants could stop malicious code from triggering a major malfunction, or worse.
A new plug-and-play device for factories and power plants could stop malicious code from triggering a major malfunction, or worse.
Wednesday, May 30, 2012
Lightweight Tongue-and-Groove Poly Case - Model TGP422510 | Philly Case
Lightweight Poly Shipping Cases - Lightweight Tongue-and-Groove Poly Case - Model TGP422510 | Philly Case:
Lightweight Tongue-and-Groove Poly Case, looks good for $268.00. Meets 80 inch rule.
Lightweight Tongue-and-Groove Poly Case, looks good for $268.00. Meets 80 inch rule.
Monday, May 28, 2012
InfoSec Resources – DarkComet Analysis – Understanding the Trojan used in Syrian Uprising
InfoSec Resources – DarkComet Analysis – Understanding the Trojan used in Syrian Uprising
two different samples delivered to the opponents of the regime, they found out that both of them were different versions of the popular DarkComet RAT.
two different samples delivered to the opponents of the regime, they found out that both of them were different versions of the popular DarkComet RAT.
Word Counter
Word Counter
Wordcounter is a word count and a character count tool. Simply place your cursor into the box and begin typing. Word counter will automatically count the number of words and characters as you type.
Wordcounter is a word count and a character count tool. Simply place your cursor into the box and begin typing. Word counter will automatically count the number of words and characters as you type.
Sunday, May 27, 2012
Friday, May 25, 2012
Phrase Thesaurus - ideas generator for writers | online thesaurus
Phrase Thesaurus - ideas generator for writers | online thesaurus
It's like an ordinary thesaurus, but it finds phrases rather than single words.
It's like an ordinary thesaurus, but it finds phrases rather than single words.
Thursday, May 24, 2012
Setting Up A SheevaPlug Media Server | Grant Lucas
Setting Up A SheevaPlug Media Server | Grant Lucas
You should be able to get the full server up and running in a day or two following these tutorials
You should be able to get the full server up and running in a day or two following these tutorials
Subscribe to:
Posts (Atom)