The Technology blog and podcast
This is for the technology blog and podcast Commentary, articles, and podcasts
This is a small blog post.
I have not blogged here in some time.
Firstly as you all know the lj blog has had some posting issues on my
end and is dead.
I plan to eventually put myself on klango as a secondary blog but for now
http://smeveriss.wordpress.com is my blog
another blog will be at http://crashmaster.klangoblog.net when I
finally get that set.
Last night I recieved a few updates.
Along with the certificates for the first half of this year I got 2 updates.
The first one is an out of band update.
I usually don’t look into these since these are security related
and uscert usually informs me.
However they didn’t and I looked.
It seems there is another reason for you to get a page not found.
you know the message
Internet Explorer cannot display the webpage
What you can try:
Diagnose Connection Problems
or some such.
Another reason you can’t get a page is to do with ssl and tls packets.
If a secure site says shopping using ssl and tls has the tls/ssl
packet being to large it fragments it and sends it in bits.
Aparently though ms stuff can’t do this.
Third party tools are used for this.
Ms does not recognise the thirdparty apps implimentations and this
causes it to simply crash because it can’t decode the fragmented packets.
This has been the first stability update i have seen in a while.
It effects windows 7 xp and servers 2003 and 08.
The other update that is quite large is office 2010 sp1.
I was able to get it off the download centre though make sure you
install the right addition.
After installing on xp check your updates again same with win7.
A small note on xp the install will pop up automatically.
when you run the file.
on win7 I had to wait a while at least a minute for the security
permition to come up.
it also took a bit longer to install.
on reboot I had to run windows update and install the program again,
whatever it did it finnished it but left me at the windows update
window which it did not tell me it had and I had to close it manually
which is strange.
Comments Off on out of band updates and office 2010 sp1
Interesting. This report and article says that the lulz security is closing shop. We’ll hace to wait and see. Here’s the article.
Comments Off on Citi: Hackers Stole $2.7 Million From Customers | News & Opinion | PCMag.com
Comments Off on FBI Scrubbed 19,000 PCs Snared By Coreflood Botnet — Krebs on Security
What do you think of this article? I’m going to page 2 right this moment to finish this up. This is quite interesting.
Comments Off on BMW Crash-Severity Algorithm Tells Emergency Room Where it Hurts | ExtremeTech
This is rather interesting. Lulz is probably not laughing after this, now are they? Check this out.
Comments Off on Lulzsec gets owned
GW Micro is proud to present Window-Eyes 7.5.1. Continuing on the success of previous versions, Window-Eyes 7.5.1 maintains the highest expected standard of stability, performance, reliability, and security.
Window-Eyes 7.5.1 features support for Firefox 4, 5 and 6, improved support for Internet Explorer 9 and Microsoft Word. In addition to several stability enhancements, Window-Eyes 7.5.1 also includes some new apps, including Outlook Enhanced, which provides quick access to message attachments, contacts, and TB Enhanced, which provides access to Thunderbird mail box column headers, e-mail auto complete, tabbed message support, and more. Read about the additional features and enhancements that Window-Eyes 7.5.1 offers at http://www.gwmicro.com/Window-Eyes/Latest_Features.
If you own a copy of Window-Eyes 7.5, you may download an upgrade to Window-Eyes 7.5.1 for FREE. To get started, either select the Window-Eyes Update option from the Help menu in the Window-Eyes control panel, or open a web browser and navigate to http://www.gwmicro.com/upgrade. Enter your serial number in the edit box provided, then select the Check for Upgrades button.
If you prefer to obtain a CD version of Window-Eyes 7.5.1 for $20 (free shipping with US postal mail), you may do so by contacting our order department at 260-489-3671, or via email at firstname.lastname@example.org.
All Retail, Dongle, Everlock, Payment Plan, and Evaluation versions of Window-Eyes 7.5 (for both 32-bit and 64-bit operating systems) can be upgraded to Window-Eyes 7.5.1.
If you do not own Window-Eyes 7.5, and are interested in upgrading, refer to the pricing information available at http://www.gwmicro.com/Catalog/Upgrades/.
Comments Off on Window-Eyes 7.5.1 is Now Available! June 21, 2011
I saw multiple things in regards to this. I’m not overly concerned as I don’t have personal files in my account, even the credit card files that are in there are expired. But it is something to be aware of. Glad it was fixed as quick as it was.
Comments Off on Dropbox confirms security glitch–no password required | Privacy Inc. – CNET News
Welcom to podcast 151 for June 17, 2011/. Jacob Sexton and I talk about Netflicks and its accessibility. We have a reairing of a program from IT Conversations where Ray Kurzweil was interviewed on a program. I found it very interesting. I hope you do too, and we’ll see you on another edition of tech right here.
Comments Off on Technology podcast 151 for June 17, 2011
Sense version 6.1 crossed my desk by E-mail, but in a massive E-mail crunch, I deleted Jenny’s E-mail by mistake. We plan on talking about this on my podcast, but wanted to let you guys read this and apply the updates like I will, soon.
Comments Off on Sense products 6.1
A few things in assending order.
First the articles.
Is anything safe, if we think we are safe we are kidding ourselves.
With the new technologies out there, privacy as we know it is in the can.
You are prity much public, your identity is prity much out there.
Even your credit card number, password and several what you would
think is private are probably public somewhere.
This is the type of world we live in, with the ease of use, living
and other cool things about technology and the life we live
in crime, terrorism and a host of other down sides share the same
place with sharing, free thinking and other such things.
If you want to test this search your name in the google.
You will find about every message public or private you sent,
articles you published, postings, etc, etc.
If you go back far enough you will eventually find everything you
ever did, including what you brought from the store 100 years ago.
Its the blessing and curse of the digital age.
Its good and its bad at the same time.
I have often had people to affraid of going online incace someone
steals their identity.
I tell them I read about this all day, what I read could kill them.
Yet I deal with it as best as I can, protect myself reasonably, and
try to make sure I don’t go to far off the rails within reason of cause.
No one is actually legal these days, somewhere you do something and
it means something else and tech can go against you to.
We can rely on it to much so when it fouls, we can screw ourselves.
Ie a police computer has someone with your name commiting murder.
The tech can investigate, or just rely on his database.
He has a chance to get the wrong guy and this has happens.
We are also not ready to recheck what the system tells us.
If it says its white suger on that cake then its obviously that, its
not going to be poison, why check.
Oh someone died, must have been an error somewhere.
Things do crash to.
Getting one hacker for a dos attack is fine but why make a large
hoohar about that, there are a million to take their places.
The police thing is interesting.
There are all the amature scanners active, some not so much but still.
I read somewhere in an hamming book that on some radio stations,
recording what private, government, etc transmitions, decripting
them, etc is alegal.
Listening is not as long as you don’t respond.
It was old but it make sence.
I for example listen to the aircraft weather station at an airport
and a military base.
Its not coded, its clear chatter and I use it to plan my day.
I do off and on listen to shortwave stations and in deed if public
pull their urls and listen to their streams online.
We really shouldn’t be supprised.
Every phone has malware.
Apple and android mostly.
Symbian also has this though you only get this in text and programs.
Ie if you install lagit programs from official sources then you are ok.
I have a 5700 nokia and have never got a virus at all.
But I don’t brouse the net, skype, in fact I only text and phone and
don’t respond to spam.
I am carefull where I text, and only do some station promotions which
So its all prospective.
Windows has just been updated with at least 100 more mb of files.
I had to reformat dure to a crash last week and with all the packs,
for xp alone as well as online stuff we are up to at least a gb of
extra content, not counting sun java, codecs, and other software
including licencing files etc.
Java has just update as of 2 days ago.
Thats another 30 mb flash just updated last week.
Tech good and bad is always in motion.
On that note we finally get to a small thing that is still related to this.
What is spam.
Spam is junk mail, unsolissitated mail, containing adds, viruses, and
Ok, just hang on.
What is junk mail.
Junkmail is then spam.
So with some exceptions why do we accept the local news paper, the
coopons for local shops, food places, stuff from the local mp,
religious groups, charity donations for what we think is a good course, etc.
Why do we readilly accept this spam.
In fact if you are like me I always look foreward to the snail spam I
will get in my letterbox.
I rellish having read to me all the cool products on sale at the
local computer shop, even though I know in my heart I will never buy
them or will do it later but not right now.
Or read the local paper and actually enjoy it.
Or read countless housing and other company adds and although I chuck
those along with the propity mag away, still admire their presentation.
Yet when I get spam, I assume its bad and kill it.
There is little technically different from spam than junk mail.
Ofcause junk has rules which usually are kept.
There are always the same adds and stuff.
Deals on the back of your dockets could be concidered junk, the
entertainment and other books you get full of vouchers are in this
sent just spam though usefull.
When we get spam, well.
And spam was not always bad.
In 1995/1996/1997, I actually got my money’s worth from spam.
I signed with xdrive a now payed for service.
I never used it, but I got loads of free offers from companies which
were lagit, but were basically junk mail.
I myself didn’t have the necessary os, power, or ram to take
advantage of what would be now expensive products.
I was signed to an mp3 site that sent me adds, news letters and only
wanted me to click links to rate music.
From this I got a free cd which I simply got sent to my address.
It came, I didn’t have to pay, and I still have it, some of my
friends have coppies of it.
in 1997 it started to go bad though.
I guess the real difference from junkmail and spam is that junkmail
still has some use.
Spam is just, well junk.
If this is the case should junkmail be renameed to usefull bits and
bobs, and should spam be renamed to junkmail.
Comments Off on comments and other things
This is very interesting. Interesting because it talks about a couple of cases within this one where a man gets convicted for taking down a web site. This is a DDOS attack, that occurred, and other similar cases are discussed that didn’t have convictions. Read this story and give me your thoughts on what might happen in the years ahead.
Comments Off on German court convicts man of online extortion | Science & Technology | Deutsche Welle | 15.06.2011
Oh my. Go case, and I’m glad the guy with the cell phone seemingly won this case. Here you all go.
Comments Off on Key court case tests right to record the police with a cell phone
With all the talk of Android not being safe, do you ghink there is a safe phone anymore? Read this two page article and come back here to air your thoughts.
Comments Off on Google pulls more malware from Android Market | Security – InfoWorld
Here’s a two page article dealing with one of the biggest credit card thefts to date, thank god that no CVV nor expiration dates were found, but this URL deal has me worried. Wow. Check it out and comment right here.
Comments Off on Thieves Found Citigroup Site an Easy Entry – NYTimes.com
Comments Off on Bitcoin: the hacker currency that’s taking over the web | Technology | The Guardian
Here we go. Sony can breathe a little easier now, at least for the time being. This hacker group isn’t stopping any time soon. Check out this article.
Comments Off on Porn Site Users Beware: LulzSec Posts Your E-mail Address | PCWorld
Saw this a couple of days ago before the weekend, and I didn’t have a chance to read this. But i did today, and want to know your thoughts on this. Do you think eventually they will bring down the group that is being called Anonymous, or do you think they will be able to continue? Check out this article.
Comments Off on Spanish police cuff three Anonymous hack suspects • The Register
Interesting post dealing with Sony. What do you guys think? Leave your comments in the comments below.
Comments Off on Sony Still Under Seige from Hackers « Zecurion Company Blog
I’ve got a myspace account, but don’t even use it anymore. it won’t be missed, I assure you of that. Check this article out.
Comments Off on MySpace about to get CANNED
Technology blog and podcast 150: a pen that records, how to podcast commentary, Philmore Productions Interview, and more for June 8, 2011
Welcome to podcast 150. Put together on June 8, 2011: we talk about my opinions on how to podcast, although people will tell me that there are many ways to do so. From the archives of the tech find, we hear about a pen that records. We talk about an article that I posted to the blog dealing with Netflicks and how it is illegal in Tennessee to log in to an account holder’s account even with their permission. Finally, we have an interview with Philmore Productions which has the services net By Phone and Philmore Voice Mail telephone systems. We talk about pricing, and we talk about the different functions of the various systems. We hope you enjoy the program, and come back again when we will have another program for you on the technology blog and podcast series.
Comments Off on Technology blog and podcast 150: a pen that records, how to podcast commentary, Philmore Productions Interview, and more for June 8, 2011
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- Categories of this blog
- Subscribe to Blog via Email
- The tech blog’s pages