http://honors.wsu.edu/academics/thesis/library/HCthesisAnneMeyer.pdf
From My iPhone
Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Sunday, June 30, 2013
Saturday, June 29, 2013
Friday, June 28, 2013
Hereditary Hemochromatosis | HealtheIron - Affordable Iron Lab Tests
Hereditary Hemochromatosis | HealtheIron - Affordable Iron Lab Tests: Of probands with serum levels of ferritin greater than 1000 μg/L at diagnosis, 17.9% of those from Alabama and 14.8% of those from Ontario died of iron overload.
Mobile EHR Application - Greenway Medical
Mobile EHR Application - Greenway Medical: "PrimeMOBILE provides two-way integration with patients and peers to streamline patient care and improve your workflows and the financial health of your practice"
'via Blog this'
'via Blog this'
Thursday, June 27, 2013
NSA spying could mean U.S. tech companies lose international business - CSO Online - Security and Risk
NSA spying could mean U.S. tech companies lose international business - CSO Online - Security and Risk: According to a number of security experts, the U.S. surveillance state —exposed more officially than ever before by former NSA consultant Edward Snowden — will likely undercut the U.S.'s role and influence in Internet governance.
New leak shows NSA harvests To, From, and BCC lines of e-mail data | Ars Technica
New leak shows NSA harvests To, From, and BCC lines of e-mail data | Ars Technica: The Guardian has reported on a new leaked document which reveals that from 2001 until 2011 the US government was collecting e-mail metadata en masse from Internet providers.
Facebook Virus: Hackers Exploiting Facebook API To Send Malware To NFL, NBA And Real Madrid FC Fans
Facebook Virus: Hackers Exploiting Facebook API To Send Malware To NFL, NBA And Real Madrid FC Fans: Cybercriminals are exploiting the Facebook API, the interface that allows developers to create apps for Facebook, to spread malicious links to groups all over the social network,
R v Oliver (2002) The Times 6 Dec 2002
R v Oliver (2002) The Times 6 Dec 2002: the two primary factors determinative of the seriousness of a particular offence were the nature of the indecent material and the extent of the offender's involvement in it.
Tuesday, June 25, 2013
Senators Ask The NSA To Start Telling The Truth | WebProNews
Senators Ask The NSA To Start Telling The Truth | WebProNews:
The last paragraph is the real kicker as Wyden and Udall have essentially caught the NSA with its pants down. As TechDirt points out, the agency told Wyden two years ago that it couldn’t see how many Americans were accidentally spied upon, but its latest statement says that it totally can
The last paragraph is the real kicker as Wyden and Udall have essentially caught the NSA with its pants down. As TechDirt points out, the agency told Wyden two years ago that it couldn’t see how many Americans were accidentally spied upon, but its latest statement says that it totally can
Sunday, June 23, 2013
How to run Terminal script by clicking desktop icon in Kali, Debian, Ubuntu
command line - How to run Terminal script by clicking desktop icon? - Ask Ubuntu:
- Right Click on the desktop
- Create New Document > Empty Document
- Name it: tv or something to your taste
- Open the file with text editor
Don't Run Chrome as Root | Kali Linux Fans Community
Don't Run Chrome as Root | Kali Linux Fans Community: It is much safer to run Chrome or any web browser as non-root user. Newer versions of chrome will not run as root.
Very helpful tutorial but you might find the sux command needs tweaking for this:
sux - nonrootuser google-chrome -- incognito
into this
sux - nonrootuser chromium -- incognito
in order to find Chrome.
Very helpful tutorial but you might find the sux command needs tweaking for this:
sux - nonrootuser google-chrome -- incognito
into this
sux - nonrootuser chromium -- incognito
in order to find Chrome.
Saturday, June 22, 2013
NSA Whistleblower: NSA Spying On – and Blackmailing – Top Government Officials and Military Officers | Washington's Blog
NSA Whistleblower: NSA Spying On – and Blackmailing – Top Government Officials and Military Officers | Washington's Blog: One of the judges is now sitting on the Supreme Court that I had his wiretap information in my hand.
KAYAK Search Results
KAYAK Search Results
http://www.kayak.com/flights/san,nearby-BCN,nearby/2013-09-26/BCN,nearby-TXL,nearby/2013-10-02/TXL,nearby-NYC,nearby/2013-10-04-evening/NYC,nearby-SAN,nearby/2013-10-07-morning
http://www.kayak.com/flights/san,nearby-BCN,nearby/2013-09-26/BCN,nearby-TXL,nearby/2013-10-02/TXL,nearby-NYC,nearby/2013-10-04-evening/NYC,nearby-SAN,nearby/2013-10-07-morning
Hall of Shame/RipOffReport.com and Ed Magedson
The People's Credit Bureau™ - Hall of Shame/RipOffReport.com and Ed Magedson: RipOff Report appears to have been created for purely a money-making scam that has left numerous businesses and individuals tarnished with an unjustified damaged reputation that is completely without merit.
Friday, June 21, 2013
KB Parallels: How to migrate Windows PC to Parallels Desktop 8 Virtual Machine?
KB Parallels: How to migrate Windows PC to Parallels Desktop 8 Virtual Machine?: Download Parallels Transporter Agent for Windows from the Parallels website at http://www.parallels.com/download/desktop/ and double-click the installation file.
Thursday, June 20, 2013
MRT/MR-B - The 73129 - The Locomotive (Standard Five Fund)
MRT/MR-B - The 73129 - The Locomotive (Standard Five Fund): The former British Railway Standard Class 5MT 4-6-0 locomotive no. 73129, now based at the Midland Railway at Butterley, is the sole survivor of the last batch of 30 steam locomotives to be built at Derby Locomotive Works and is unique in being the only preserved Standard Class 5 fitted with Caprotti Valve Gear
Wednesday, June 19, 2013
Fox Banned News 9-11 The Israeli Connection, Mossad, AIPAC, Art Students Spy Ring - YouTube
Fox Banned News 9-11 The Israeli Connection, Mossad, AIPAC, Art Students Spy Ring - YouTube:
Fox Banned News 9-11 The Israeli Connection, Mossad,
Fox Banned News 9-11 The Israeli Connection, Mossad,
Monday, June 17, 2013
Infosecurity - Malicious charger can compromise iPhone and iPad in under one minute
Georgia Tech security researchers have built a malicious charger that can inject persistent malware into current-generation iOS devices, compromising the gadgets in less than 60 seconds.
From My iPhone
Sunday, June 16, 2013
Blame for medical data breaches often rests outside physician office - amednews.com
Blame for medical data breaches often rests outside physician office - amednews.com: Therefore, practices need to be more vigilant in assessing their contractors' ability to handle the data properly, experts say.
Breaches Affecting 500 or More Individuals
Breaches Affecting 500 or More Individuals: These breaches are now posted in a new, more accessible format that allows users to search and sort the posted breaches.
Former Fort Collins Resident Sentenced for Denial of Service Attack on Larimer County Government Computers
Former Fort Collins Resident Sentenced for Denial of Service Attack on Larimer County Government Computers: David Joseph Rezendes, aka Joseph David Rezendes, aka Joe Rezendes, age 27, was sentenced Tuesday by United States District Court Judge R Brooke Jackson to serve 18 months in federal prison for intentionally damaging a protected computer
Private Retaliation in Cyberspace | Center for Strategic and International Studies
Private Retaliation in Cyberspace | Center for Strategic and International Studies: states are responsible for the actions of those resident on their territory and must take action against cybercrime.
Responding to IT Security Incidents
Responding to IT Security Incidents: Proper incident response should be an integral part of your overall security policy and risk mitigation strategy.
What US cybersecurity needs: a few more good guys - CSMonitor.com
What US cybersecurity needs: a few more good guys - CSMonitor.com: “There are about 1,000 security people in the US who have the specialized security skills to operate at world-class levels in cyberspace – we need 10,000 to 30,000,” Jim Gosler, director of the CIA’s Clandestine Information Technol–ogy Office, told CSIS in its report last year.
Thursday, June 13, 2013
Blue Coat Systems to acquire security analytics firm Solera Networks | PCWorld
Blue Coat Systems to acquire security analytics firm Solera Networks | PCWorld: According to Blue Coat Systems CEO Greg Clark, the ability to efficiently mine a large dataset of network history in order to react and resolve security issues in real time is an essential component of the modern security architecture.
4 Reviews for Dr. Julie L. Barone | Surgery in San Diego, CA
4 Reviews for Dr. Julie L. Barone | Surgery in San Diego, CA: I have the highest regard, admiration and respect for Dr. Julie. Such a positive attitude when you're going through a very rough time.
4 Reviews for Dr. Julie L. Barone | Surgery in San Diego, CA
4 Reviews for Dr. Julie L. Barone | Surgery in San Diego, CA: I have the highest regard, admiration and respect for Dr. Julie. Such a positive attitude when you're going through a very rough time.
12 Reviews for Dr. Allan Gamagami | Surgery in San Diego, CA
12 Reviews for Dr. Allan Gamagami | Surgery in San Diego, CA: He really needs to check his attitude and sense of entitlement at the door, and realize that he is here for the patient. I
PRISM: Here's how the NSA wiretapped the Internet | Page 2 | ZDNet
PRISM: Here's how the NSA wiretapped the Internet | Page 2 | ZDNet: But if the NSA were intercepting traffic and decrypting it somehow on the edge connection between the application service provider — such as Facebook, Gmail, Amazon, for example — and the Tier 1 network, the application service provider would be unaware that this was happening.
Over Half Of Big Data & Cloud Projects Stall Because Of Security
Over Half Of Big Data & Cloud Projects Stall Because Of Security: 76% of senior-level IT and security respondents said the inability to secure data across big data initiatives gave them cause for concern. The study[i] further showed that more than half (56%) admitted that these security concerns have kept them from starting or finishing cloud or big data projects.
Wednesday, June 12, 2013
Dell Quest Releases Big Data Security Solutions | SiliconANGLE
Dell Quest Releases Big Data Security Solutions | SiliconANGLE: "52 percent of organizations saw their unstructured data volumes increase by at least 25 percent in the past year, but only 45 are taking the appropriate measures to secure their sensitive information. "
'via Blog this'
'via Blog this'
Sunday, June 9, 2013
Wickr - Leave No Trace
Wickr - Leave No Trace: "Wickr has hundreds of thousands of downloads in over 113 countries. Celebrities, royalty, reporters, feds, lawyers, doctors, investors and teens are the early adopters."
'via Blog this'
'via Blog this'
Saturday, June 8, 2013
Former Fort Collins Resident Sentenced for Denial of Service Attack on Larimer County Government Computers
Former Fort Collins Resident Sentenced for Denial of Service Attack on Larimer County Government Computers: “Rezendes attacked the Larimer County computer system because he was angry about a traffic ticket,” said United States Attorney John Walsh. “His denial of service attack impacted thousands of people for several days.
Friday, June 7, 2013
Ponemon Institute Study Finds that Outdated Communication Technologies Cost U.S. Hospitals More than $8.3 Billion Annually | Imprivata
Ponemon Institute Study Finds that Outdated Communication Technologies Cost U.S. Hospitals More than $8.3 Billion Annually | Imprivata: A new study released today by the Ponemon Institute finds that the use of pagers and other outdated communication technologies decreases clinician productivity and increases patient discharge times, collectively costing U.S. hospitals more than $8.3 billion annually.
Breaches Affecting 500 or More Individuals
Breaches Affecting 500 or More Individuals: As required by section 13402(e)(4) of the HITECH Act, the Secretary must post a list of breaches of unsecured protected health information affecting 500 or more individuals.
Thursday, June 6, 2013
Wednesday, June 5, 2013
Dolce Desk- Dark Walnut : Target
Dolce Desk- Dark Walnut : Target: The Dolce dark walnut desk is made of solid hardwood and wood veneer to offer sturdy performance.
National Small Business Week |
National Small Business Week |: Each state names a Small Business Person of the Year, who go on to compete for national title announced on June 21 in DC.
[SOLVED] Newbie - what to do about huge number attempted ssh logins
[SOLVED] Newbie - what to do about huge number attempted ssh logins: Good. Iptables is OK as long as you know what you're doing.
linux - SSH stops at "using username" with IPTables in effect - Server Fault
linux - SSH stops at "using username" with IPTables in effect - Server Fault: f the inbound chain is on DENY and SSH port open [judged from Webmin], PuTTY will say using username "root" and stops at that instead of asking for public key pw. Inbound chain on ACCEPT the pw is asked.
How to View and Delete Iptables Rules – List and Flush
How to View and Delete Iptables Rules – List and Flush: "How do I view all the current iptables rules? Once I view it, is there a way to delete all the current rules and start from scratch?"
'via Blog this'
'via Blog this'
HowTos/Network/IPTables - CentOS Wiki
HowTos/Network/IPTables - CentOS Wiki: "CentOS has an extremely powerful firewall built in, commonly referred to as iptables, "
'via Blog this'
'via Blog this'
How to view text files in Linux with cat and less
How to view text files in Linux with cat and less: "When you see a weird file on your Linux file system, you may want to know what the file contains. We'll take a look at the cat and less commands that you can use for viewing the contents of a text file."
'via Blog this'
'via Blog this'
25 Most Frequently Used Linux IPTables Rules Examples
25 Most Frequently Used Linux IPTables Rules Examples: "In this article, I’ve given 25 practical IPTables rules that you can copy/paste and use it for your needs."
'via Blog this'
'via Blog this'
RHEL / Centos Linux Disable Firewall
RHEL / Centos Linux Disable Firewall: "You need to disable the following services to disable firewall under Red Hat Enterprise Linux or CentOS Linux version 4 / 5 / 6."
'via Blog this'
'via Blog this'
Tuesday, June 4, 2013
Adrenal Diseases | Patient Experiences Blog: Endocrine Surgery UCLA, Reviews, Comments
Adrenal Diseases | Patient Experiences Blog: Endocrine Surgery UCLA, Reviews, Comments: "I had a tumor in my adrenal glad. I just had a adrenalectomy of my right adrenal gland and I must say, I am cured my gosh I literally went through hell for about a year."
'via Blog this'
'via Blog this'
Saturday, June 1, 2013
Privacy & Security in Healthcare
Privacy & Security: HIMSS Media and Healthcare IT News have partnered once again to bring you The Privacy & Security Forum. The 2nd annual Privacy & Security Forum helps CIOs, IT directors and other senior healthcare professionals answer a critical question: How do you create and sustain a culture of security in the workplace?
HITRUST : Get Started
HITRUST : Get Started: The foundation of all HITRUST programs and services is the HITRUST Common Security Framework (CSF), a certifiable framework that provides organizations with the needed structure, detail and clarity relating to information security tailored to the healthcare industry.
Health-care sector vulnerable to hackers, researchers say - The Washington Post
Health-care sector vulnerable to hackers, researchers say - The Washington Post:
Medical devices at Veterans Affairs facilities were infected by malicious viruses at least 181 times from 2009 to 2011, according to the DHS intelligence report that surfaced in May.
Medical devices at Veterans Affairs facilities were infected by malicious viruses at least 181 times from 2009 to 2011, according to the DHS intelligence report that surfaced in May.
Medical Error | The Number Three Cause of Death in the United States
Medical Error | The Number Three Cause of Death in the United States: The complexity of the US health care system is a large part of the problem. Thousands of patients receive care in outpatient surgical centers, urgent care, and independent doctors’ offices every day.
Subscribe to:
Posts (Atom)