go to sections menu

The Technology blog and podcast

This is for the technology blog and podcast Commentary, articles, and podcasts

header picture for Ingegno theme

You are here: November 2019

Go to Homepage [0], contents or to navigation menu



Hospital breaches leading to more heart attacks? You bet!

While I’m getting my day started, I’ve been wanting to try and play some catch up. I’ve been thinking this morning about an article that Krebs On Security penned on his blog entitled Study: Ransomware, Data Breaches at Hospitals tied to Uptick in Fatal Heart Attacks as it has some very serious repercussions. It seems as though the people who send these types of things don’t really care if people die.

Every day, people die for one reason or another. Every day, people are living another day. Why does it have to happen where ransomware is the cause of someone dying because they can’t get the care they need?

How will it feel to them if they died because they sent this to some hospital, then something happens and they can’t get treated? Lets imagine that they survive, get treated, and live to tell the story? What type of story will they be telling? If they die, there is no story, but the family who grieves has no answers and doesn’t really understand what the hell they did. To me, this is just another step lower in the problem of what ransonmware can do.

I’ll be talking about this one on the podcast, this is just sad. Lots of numbers here.

Comments (0)

APT 33 is back, continues to get better it seems

It seems as though APT 33 is getting more sophistocated, according to a Cyber Scoop article APT33 has used botnets to infect targets in the U.S. and Middle East, researchers say and so far, they have not target the United States. This can’t be good, because a group like this will eventually have something for us to eat. I’m not looking forward to the time where we’re targeted next.

Have you seen this, and what do you think?

Comments (0)

Patch Tuesday last tuesday, are you patched?

Last Week, my favorite bloggers Trend Micro and Krebs on Security blogged about patch tuesday. Because of my ongoing work as of late, I’m now trying to play ome catchup of some of the things that I’ve read. I always try to cover Patch Tuesday’s articles if nothing more than to pass along the ones I see.

Have you patched?

Lets stay safe and keep ticking. Thanks for reading!

Comments (0)

Braille 2000 2.274 soon to be released, new features and functionality

EHello all,

Any day now, the Braille2000 staff will be releasing version 2.274 which I’ve been beta testing for the last several months.

  • The Speaking edition is done. We’ve added the ability for speaking exact, which is used to check work. It tells you font attributes, capitalization, and punctuation.
  • Numerous UEB fixes will be in this release.
  • Porterican Spanish will be added to B2K for those who use it.

When the release becomes available, Braille2000 will pop up an announcement letting you know that it is out.

  • Click on menu
  • Select Pannel
  • Select file management
  • Select fetch software update

You must have an internet connection for this to work. When 2.274 is released, you’ll see it in the list. Once highlighted, click OK and B2K will prompt you to save your work when you’re ready and exit. Once done, B2K will install the new version.

Under the hood changes include a new patch for installation from one path to another. It should not effect the usage of the software at all.

B2K will be adding the accessibility department, which I’m responsible. I’m in the process of building a web site under the jaredrimer.info domain. You’re welcome to check this domain for audio demos, and the like.

Don’t worry! This tech podcast will be getting the tutorial material and demos as part of this process.

I’ll start releasing them once the official release is out, and I’m excited for this to happen.

Should you have any questions in the meantime, please feel free to contact me through the about the blog page on here, or through my social media profiles found on on my web site.

Thanks so much for your support, and sorry for the lack of posts as of late! The preparation of this work and the sudden news of a release has gotten me to concentrate on this project, but I still plan to be here.

Comments (0)

Tech podcast 329

Tech podcast 329 has been out, and I believe I’ve neglected the blog. I believe I released it last week, and I apologize for not posting!

I’vll have some big news to share after I do some more development on one of my web sites I may have talked about. Enough of that for now, the RSS and mixcloud should have the podcast.

Below, please find the show notes for this podcast. Truly sorry for the fact I didn’t post it when it was published!

More later.


Released November 5, 2019

Welcome to podcast 329.

  • How can we keep ourselves as safe as possible when databases that companies hold them online? I completeluy understand the aspect of why they need to do so. It isn’t possible for them to store it like I do, and its just becoming a problem. A telecom company breached, mongo DB to blame is the blog post referencing this segment.
  • National Cyber Security month is now complete. Why? In this ever changing landscape where everything is online must we have only one month to teach how to be as secure as possible? Please check out my blog post penning this topic: NCSAM is over, shall we stop teaching for my written thoughts on this important topic. Its something we should be discussing, and we should be discussing it all the time.
  • I found an article through dark reading, and instead of covering that, I think we should try to discuss it in a different light whereby we ask how consumers can be safe in this time of major security problems. It isn’t just the entity that we shop at that should be the main problem, it is in both things. Merchants need to fix their security, but shoppers need to be careful and some tips are discussed on what we can all good.
  • Dice world has some interesting updates and I tie that in to other games and the accessibility landscape. There is always something to learn and I’m happy to see what happens as we continue to grow.
  • Michelle Dyer was a dear friend of mine. I let the domain go because I was under the assumption that the domain was not needed. Family contacted her closest friend, contacted me, and I’ve relaunched the domain on October 31st. Due to some other technical issues I could not fix, the domain is now relaunched and I only made some changes to clean some outdated info. Please click on this link to go to the Michelle Dyer Memorial page where you’ll find tech podcasts to download that she was a part of. We thank each and everyone for your continued support of my work.

The track I selected for this podcast comes from the artist Ehren Starks from the depths of a Year. Contact information is also available at the end of the program. Thanks so much for listening!


Thanks for your understanding while I try and catch up!

Comments (0)

Braille 2000 can’t do greek … fix is in the works

I recently got off the phone with Bob and a very alpha version of assignment 16. I was pointing out some questions I had, and what the braille simulated print of the lesson was showing me. In this context, one of the items he was asking what it was. I looked in the braille, and sure enough, the simulated braille shows in assignment 16 Greek! There are several portions where Greek is used, and Braille 2000 and its Greek is greek to it.

The only fix is to write it in braille, I.E. 6-key entry.

Now, I realize that my grumblings of 6-key and what a waste of time it is, proves to be very valuable.

Here is what I plan to do to fix the horid importation from the PDF to RTF file.

  • Go in to Speech, engine settings, and turn on keyboard feedback.
  • Fix the file up by deleting the old material that doesn’t need to be there and typing by hand the greek that it didn’t understand.
  • Putting in some script signs which were not properly put in place.
  • Fixing item 23 in spots where it was completely and utterly wrong.

I’ve been griping about the lesson material and the teaching of such material before, but I think that this has to be the worst piece of material that ever crossed my desk. I can’t fathom what the powers that be who developed this did a piss-poor job on the material and how correcting some aspects in RTF fixed some of it, but yet, we still have to correct quite a number of things that are completely wrong!

I know, I know, those of you who are reading this will say “This is the job of the transcriber. The software is not going to be perfect.” I get it. If the print is done correctly, and the software is trained how to back translate it, it should not have any problems.

In two of the numbers, it didn’t put a closing mark, it put a dot pattern that I’m not familiar with. The dot pattern is (dot 5 2) as a sequence at the end of the sentence. The elipses it put in place came from the print and was spaced, but braille doesn’t have that spacing so I can correct that and I do not fault the software for that.

My issues with assignment 13 are miniscule because I minipulated the RTF and got it wrong based on what I understood. Once I understood the correct method, I corrected it, and even learned how to correct it for the next RTF copy. Its all a learning process, and I do not blame software for something I did. All of the symbols except for the special symbol (shape indicator emoticon) aspect was done correctly. Once I corrected the emoticon special symbol shape, it was fine although it might not have backtranslated that correctly in to ledgable print.

I definitely know that I need to do some serious work at some point, and I know its going to have to be soon.

Have any of you done foreign language, especially with tools like Duxbury or any other piece of software and what did you think? Did it do an adequate job or did you have to correct it with the knowledge that you have on the subject?

Please contact me by leaving your comments here, by email/imessage/text and info can be found on the About the Blog page which has contact info there. If you can’t find it on the blog, go on over to my Web Site and leave your throughts through the contact/bug reporting form or any available contact info found there.

Thanks for reading, and make it a great day!

Comments (0)

A telecom company breached, mongo DB to blame

When is it going to be time for people to learn especially those who set this stuff up that databases that hold information that is crutial to the business to configure it properly? According to this dark reading article CenturyLink Customer Data Exposed this can’t be good. The fact that the database is connected to the Internet is bad enough, but according to a conversation I had with some folks online when told about this is that there is no other solution. Companies that are large or have multiple call centers need to have a way to have access to all of the customer data to make changes, verify information, and the like. Its not like MENVI where we store it, its amongst a few people who are on staff, and thats it. Hundreds of people need access to this information at these companies when you call in, so I understand the challenge.

Who at these companies are responsible for this type of thing? We need to have them answer these questions, and I’m sure that they;’re answering now. This should never happen, and if it does, let it be a mistake that is quickly remedied. Don’t leave it open for months on end for someone to find, especially a hacker. Luckily, it was a researcher, and it can’t be all bad, but what if it wasn’t? What if the database was to be found to include all customer data? The phone company covers multiple states. How does that look? Lets hear your thoughts.

Comments (0)

‘Camgirl’ sites exposed millions of users after security lapse – TechCrunch

Exposed data linked user profiles to their their viewing history, exposing kinks and private sexual preferences.

Source: ‘Camgirl’ sites exposed millions of users after security lapse – TechCrunch

Oh boy. Now this here is something to post. I am seeing this on twitter, and I thought, really? Could this get any more worse?

Comments (0)

Assignment 16, why does it look so bad?

Hello folks,

I’ve looked at my first braille out of assignment 16 of the braille transcription course. It looks aweful, and I’m nowhere near submitting this assignment.

Here is what I notice:

  • There are dots of an unknown type at the end of several items where quote marks are shown in the braille edition of the lesson.
  • I’m very unfamiliar with foreign language material, but understand why the symbols have changed in conformance with UEB standards, and Braille 2000 can deal with these when written correctly.
  • Bob tells me that in number 23, the PDF to RTF extraction for a base file was absolutely horid. With Braille 2000s tools, I can correct these and get another brailleout.

Bob appreciates the fact that I’ve been sharing my assignments with him. It has opened his eyes on how bad UEB really is, and how BANA has forced the United States in believing this is the best thing we can do. This is not the best thing we can do. Lots of baggage has been reported, and even with my conversation with someone yesterday, the book is aweful in explaining the concepts of how this should be done.

I’m hopeful that I can pass on the first try on this assignment. With the tools we’ve built in to b2k, I’m confident I can correct these mistakes, and get it to a form I’m happy to submit.

As a side note, it took three tries on assignment 15, as there was still confusion, and that confusion was coming from the book. I understood what it was saying, but the instructor wanted it a certain way. The third time was the ticket!

Have you done foreign language material and how has it faired with b2k? What about other software?

I look forward in hearing from you. Please get in touch!

Comments (0)

NCSAM is over, shall we stop teaching

Well, NCSAM is over, and that doesn’t mean we have to stop learning. There’s always something to learn, especially with cyber security. Lastpass, the last password you’ll ever need, has a blog post entitled NCSAM Wrap-Up & Planning for Next Year but why stop there?

Here are some questions Lastpass asks.

  • Did your organization have goals for NCSAM this year?  
  • What new things did you try, or what programs did you continue from previous years?  
  • What type of feedback did you receive?  
  • What would you like to try next year? 
  • What results are you looking to accomplish with your cybersecurity initiatives? 

These are great questions. I think in regards to item 4’s question, I’m trying to teach year around by talking about experiences and things that I’ve read or experienced in life that have happened to me. By talking about what I’ve done after the fact, I can show how proactive I’ve been to the situation at hand. My initiatives for next year is to do the same all year long. This I think should not be a once a month thing. By spreading it all year round, we can always learn, so we can try to prevent the next castrophy.

I’ve received mixed feedback when talking about things. Some have indicated that we’re pretty much screwed anyway, things get on the OS, and it’ll either burn the OS, or the OS will be slow. No matter what we do, we can’t stop the worst of them, they’ll get in regardless. Others like the ideas of what I’m doing, and it can turn in to a discussion on the chat line. Still others, don’t quite comprehend the aspect of how bad it is, and skip it because it can get technical. It just depends, although I try not to be technical about it.

I don’t have goals for the year and I o not have money for programs to implement. I’d love to be involved in phishing simulations because we can always learn so we don’t make a mistake to criple our devices. Its too bad that these types of programs are expensive so people who use a computer but don’t make a lot of money can’t participate in such a program.

I run MENVI and I’m always asked questions by one of my coleagues about something he’s seen. I tell him whats up, and I also send him some of the major articles I find through my RSS feeds. He sends them off to people who need to know.

I believe this is very important year around, not just once a month. By sharing information, we can all participate in reading and understanding what other businesses are going through and can do our best not to fall victim within the net of problems.

Lastpass has ideas for next year including webinars, educating your customers and clients, employee training, share material, and attending a cybersecurity event. I talked about two webinars I’ve attended from Trend Micro and I really need to listen to the last one fully because I’ve missed sone parts of it.

There is more including how they mention inspiring the next generation to get involved by talking about the girl scouts teaming up with a company. Theres plenty of more to read, so take a look around, and lets start making that difference!

Comments (0)

Time change

Its that time of year, the time changes and we have adjusted the blog to minus 8 from GMT to compensate for the change of time. Its too bad that the blog can’t do this itself.

We’ll continue to post and do our regular activity here, and hopefully you all are enjoying what you’re reading and hearing along this network.

Comments (0)

The biggest names in domain registrations have been breached

Hello all,

I’m unfamiliar with register.com, but I am familiar with Network Solutions. I’m also unfamiliar with web.com as well. Apparently they’re under the same umbrella and it got hacked. According to Breaches at NetworkSolutions, Register.com, and Web.com one is letting their customers know on their web page and reaching out by email, one has info but its buried, and the other has nothing. This is just not the way to do things. You need to be as transparent with your customers as you possibly can. Let them know what you know, so they understand what is happening. Its the best medicine you can have.

Have you seen coverage or is this the first time you’re seeing this? If its the first time, be notified of it now, and see if anything is compromised I.E. domains you control and the like. It doesn’t look like in the article that nothing was touched, but you just never know. Stay safe.

Comments (0)

Tech podcast 328

Hello all,

Our RSS feed has the podcast of this last podcast which I put together on October 31st but only uploaded it yesterday. I believe Mixcloud might need it, but I don’t remember I’ll have to check.

Here’s a link to the mixcloud and you can let me know if its there or not. If not, I’ll get it up asquick as I can.

Here are the show notes.


Hi folks, welcome to podcast 328.

I hope you enjoy the program.

Comments (0)

go to sections menu


navigation menu

go to sections menu