go to sections menu

The Technology blog and podcast

This is for the technology blog and podcast Commentary, articles, and podcasts

header picture for Ingegno theme

You are here: May 2021

Go to Homepage [0], contents or to navigation menu

Have I been Pwned goes open source, gets FBI data feed – 9to5Mac

Hello folks,

Have I been powned is going open source, and this is probably the best thing for it. The site is ran by Troy Hunt, and it looks like the FBI will be contributing to it. Here’s an excerpt and a link to the full article. Comment if you wish.

Source: Have I been Pwned goes open source, gets FBI data feed – 9to5Mac

Comments (0)

Bose gets hit with ransomware, … offers credit monitoring to its people

Bose was the latest hit, according to an article published by Cyberscoop. Employee data was apparently exfiltrated, and Bose did not pay a ransom according to the Cyberscoop article.

While the article talks briefly about the Colonial Pipeline attack and how easy it was to spot, some may not be easy to spot or even deal with unless the company reports it.

This is not really what I think is best. Companies need to report incidents especially if it involves the potential exfiltration of personal data.

I’ve published several post-mortem reports on my blog after certain incidents, and I think this is the right thing to do. You can search post-mortem and find them all.

Read more on the Bose situation, and let me know what you think. Ransomware forced Bose systems offline, exposed personal data of 6 former employees is the article. What do you think? What is the appropriate response?

Comments (0)

Why are we struggling, while dark markets can make billions with no repercussions?

In the up coming security box and tweeted through Cyberscoop last week, we’re learning about a dark web marketplace that has pretty much dominated the marketplace for a number of years now.

The notations of this are quite extensive, and I got commentary after I tweeted Cyberscoop’s article.

Here are some stats taken directly from the show notes I’m putting together.

There are other stats. In its first year, according to the article, this compnany made $9.4 million. In 2020, the figure leapt to $1.4 billion a 624% jump within the last three years alone. 75% of the dark net marketplace revenue came from them alone. A Russian news site tallied 2.5 million registered users on the site.

Chew on that, and read How Hydra, a Russian dark net market, made more than $1 billion in 2020 for all of the details as it links to lots of stuff here.

Comments (0)

The Security box, podcast 45: 4 Vulns in Android, Conti in the news double, news notes and more

Welcome to the Security box, podcast 45. We’ve got the 92.47mb download for everyone to go and get.

The RSS feed is also updated with this program for those who want it.

If you’re a paid member of Live Wire, board 974 will have the podcast soon if it isn’t there already. It updates nightly with anything new on the feed.

After the podcast was completed, Live Wire has made the announcement that we will be moving phone companies, more when I know more. I put a short item in news notes which is found below.


News and notes from around the landscape

As stated above, the announcement has been made, we just will wait for further detail before announcing anything publicly. Thanks for your continued support of our work to get good quality security discussion out there for the world to hear. Have a great day!

Comments (0)

Conti has not gone anywhere, is a big threat

Conti isn’t going anywhere. There are two articles being linked within our next podcast which I want to briefly highlight here.

Conti ransomware gang victimized US health care, first-responder networks, FBI says

This is probably the biggest article we’re going to cover. This article talks about and links to an FBI report about what this gang is up too. The problem is, that this gang has asked for as much as $25 million for their payments. Also, 300 out of 400 different organizations were located in the United States itself.

Irish officials analyze decryption tool as long recovery process from ransomware continues

This article talks about the Irish officials and the fact they’re testing a decryption key as their health care system was hit by this gang. Appointments have dropped 80% since this whole thing hit them the week prior to the article being posted.They’re dedicating significant resources to this, and that is a good thing. I hope that they share this information they find to security groups.

Both articles will be linked as part of the topics for tomorrow’s security box program.

Comments (0)

Last Week in Security News, news ending May 22, 2021

Hello folks,

I’ve not posted about any of these in quite awhile. I know that I’m farily behind when it comes to keeping up with the blog and news, so I hope that changes.

  • OMDIA is a company that does research, and there is an article in the digest talking about Trend Micro’s ZDI program getting nominated and won for the most vulnerabilities for the 13th year in a row. The ZDI disclosed 865 of over 1300 vulnerabilities last year.
  • If you think we have problems now, we may have problems in 2030 if robots take over this space.
  • Team TNT’s extended harvester may be a bigger problem. This tool targets cloud services.
  • Microsoft and Adobe are now at the top of the crooks hitlist, according to the digest.

  • We talked about this one last week I think, but Trend Micro Vision 1 is here and the article in the digest goes in to more, or find it in our show notes or blog.
  • Windows has something called a PoC now, there is an exploit that can be used for a wormable RCE. Yikes!
  • There is an article talking about a huge jump in crypto currency theft according to the FTC.
  • <;li> North Carolina is moving to ban ransomware. payments. I don;’t think that’ll matter to the actors, they don’t follow the law anyway, so they wouldn’t care if people break this one.

These are just some of the highlights in this digest, This Week in Security News May 21, 2021 is the full article so go read it and tell me what you think.

Comments (0)

4 vulnerabilities under attack give hackers full control of Android devices

This is an eye opening article. Instead of me putting my thoughts down which I’ve done for the program, I want to hear what you think of this if you use Android. Michael in Tennessee sent me this one, and it is worth looking at more in detail. Should you be scared?

Google updates a 2-week-old security bulletin to say some vulnerabilities were 0-days.

Source: 4 vulnerabilities under attack give hackers full control of Android devices

Comments (0)

The Security box, podcast 44: Windows Update, a true story to a listener, Philmore Productions at it again, News Notes and more

Hello everyone, welcome to the security bocx. I hope you all enjoy the program as much as I have bringing it together for you.

While we only had one call throughout the program, don’t fear. You can still participate if you wish.

Here is the 145.04mb file for you to download. The RSS feed should also have the file as well as the entire notations you’ll see below.

Breaking News! Just before we went to air yesterday, we were notified of something that people should know about when calling Philmore from the outside and participating in bulletin boards. It may or may not be a big deal to you, but it was something we just had to get in, and it was told to us the evening before broadcast day. This is not in the show notes.

Welcome to the Security box, podcast 44. On this episode of the program, its time to make sure we’re all caught up on Windows Update and what may be important to you. Next, we’ll talk about a task force that hopes to disrupt ransomware payments. We’re not done with Experian yet, and we’ll have a things to ponder on this particular article I read about their API which is apparently disabled for at least one vendor. We’ll also have news, notes, commentary and questions from listeners if any, and yes, even podcast listeners can join the fun. Podcast listeners can dial 623-263-8934 to leave a voice message, just follow the prompts. Email, Imessage, text and whatsapp are all given throughout the show.

Windows Update

Windows Update is back, and Microsoft has given us only 54 different patches, but a lot of them are critical. 13 of them were from the ZDI program from Trend Micro.

Things to ponder

Looks like Experian is still being talked about. In this Things to Ponder, Experian API Exposed Credit Scores of Most Americans is the article which we’ll be picking apart as your things to ponder.

A true story of a telephone number not to call and why

Jennifer is now along with a very interesting story, with a very interesting twist and yes, it is a true story.

A task force that is out there to disrupt ransomware

I’m happy to read articles like this one, and I want to talk about it as part of the program. Its not too old, but its something of value to all of us. KrebsOnSecurity has the details. Task Force Seeks to Disrupt Ransomware Payments is the article to read.

News Notes

Comments (0)

A Task force out there to help try to curve Ransomware

Hello folks,

I read this article that came out on Krebs on Security that talks about a task force and an 81 page report that hopes to have some idea on how to curve the ransomware problem we’ve faced in quite large numbers.

The linked article links to a Wall Street Journal report that the Department of Justice also formed their own task force to try and curve this problem. Also, according to the article, the DOJ calls for strategies that target the entire criminal ecosystem. We need to send a message to say what the Shadow has said in every program. That is: “Crime does not pay.” I like that saying and I hope that this pays off.

According to Emsisoft, a security company, almost 2400 U.S. based governments, healthcare and schools were targeted in 2020 alone.That’s a lot! We’ve covered a lot of school coverage as of late, and I think I might have said something about this when I found out that a college I had attended for free classes was effected by Ransomware.

Find something in the article you want to bring up? Task Force Seeks to Disrupt Ransomware Payments is the article, and do give it a look!

Comments (0)

Post-Mortem report: 986themix.com had an unexpected outage

At roughly 6 PM US Pacific Time, the Jared Rimer Network was called in regards to a web site outage from the person who runs and pays for hosting for 986themix.com. Below, we’ll detail what we found, the steps to resolve the problem, and information on how to contact the network for further questions.

What happened?

We aren’t completely sure what happened. We were getting download requests to the main site and the files were strangely named. The JRN doesn’t understand how this could be the case when the site was visited several days prior by the network in curiosity of something else they saw.

What did you find?

What we found were multiple .htaccess files located on the server.

Apache Configuration: .htaccess

Some of the files were located in user specific directories for podcasts that are hosted on the mix. The link we provide you is to Mozilla’s developer site where they talk about this file in more detail, so please check it out if you’re interested in what these files are and what they can do. Its a very powerful thing, but something that can possibly damage your web site.

The .htaccess files were dated from February 28th to today at 9:36 am. While I don’t understand the .htaccess file in full, what I can tell from each of them was that there was some redirect happening, where I don’t know. Some even had cpanel things in it that had a statement of not deleting those lines.

How many files were found?

I think there were about a half dozen of these files or so with varying similarities of what I described above.All of them had different time stamps however.

What did you do?

After determining that none of us who manage the web site wrote these files, or even have the knowledge of writing said files, I felt it safe on deleting these files as clearly they were redirecting somewhere and causing the browser to download strange files. No web site should ever ask you to download strangely named files. All files being downloaded off the Internet needs to be clearly marked as to what it is and placed on a page or clearly indicated in communication with intended recipients.

Per policies marked by our provider, files may not be left on our server without being linked.. This can be loosely taken though, because if you’re sending a link to a file to someone, you’re sending a link.

After I deleted all of these files, I instructed the owner to change the password to the account, as I thought that it was a possibility that someone got in through the control pannel and uploaded these files through the file management interface.

The site should now be up and operational at this time.

Who should I contact for questions?

Please contact the Jared Rimer Network’s Jared Rimer at 818-921-4976 or text/whats app 804-442-6975. Please use this contact and bug reporting form for email communication.

Thank you for your continued support. We’re as safe as possible under these circumstances. We hope that this doesn’t happen again. If it does, rest assured that the JRN will take the necessary steps to fix the problem quickly and efficiently.

Comments (2)

Most Americans are at risk, thanks to Experian

Experian hasn’t really learned their lesson when it comes to keeping information safe. Within the article I’ll be linking to, I just have to laugh at what they say once Krebs on Security contacts them about what I’m going to talk about.

Apparently, a researcher, who is also a sophomore at a university in New York, found that needing a student loan had to be done so he did some research in to what might meet his needs. One of the lenders used an API provided by Experian to do automatic FICO credit score lookups on their web site.

The API had no authentication what so ever. Readers who come here probably know what happens next, right?

“We have been able to confirm a single instance of where this situation has occurred and have taken steps to alert our partner and resolve the matter,” Experian said in a written statement. “While the situation did not implicate or compromise any of Experian’s systems, we take this matter very seriously. Data security has always been, and always will be, our highest priority.”

What’s laughable is: … “we take this matter very seriously. Data security has always been, and always will be, our highest priority.”

Data Security has always been your lowest priority, and you get our information from who knows where, because you buy it. Us consumers do not deal with you directly, but you deal with lenders like the one you shut off, because your API is not secured and authenticated.

The researcher was also shut off and he wasn’t doing anything wrong but trying to help you fix a weakness in your supposed product.

For the full story, read Experian API Exposed Credit Scores of Most Americans for all of the details on what is going on over there. I’m sure my readers will find this of interest.

Comments (0)

Its time to get your windows update on

This month, we’ve got less patches than we have had in the last year alone. Microsoft is only giving us 54 different patches, but the majority are considered critical.

Windows will update on its own schedule, so make sure when it prompts you to restart, that you save your work and let it do its thing.

Its been reported to me that on slower networks, multiple reboots may occur because it doesn’t have everything, and I suppose that may be normal.

13 of the 54 were submitted via Trend Micro’s ZDI program.

Of course, I’ll link to both articles here on the blog for those who want to take their gander on what they want to read.

Pick the one that suits you, both have similar coverage. Please continue to stay safe!

Comments (0)

Transcribing books, it doesn’t have to be difficult with Braille2000

Before I paste this article, I held this article until some fixes were out which 2.275 fixed.

Since I failed the course, the information here may help transcribe a book, but is in no way deemed correct by standards. My understanding of transcribing a book was good, but I just had too many mistakes. With that said, let’s talk about how you might transcribe a book using percent codes for the majority of the work.

Transcribing books, it doesn’t have to be difficult with Braille2000

percent codes, and B2K itself make it very easy for a blind person

Welcome to another article here on the blog, where this article will talk about transcribing a book using Braille2000 and the percent codes.

You can, of course, use Braille2000 to do all the work within it by changing the style, spacing, and the like, but why do that? The only thing you need to do is the special symbols page in B2K as it is very simple to do and you can remove symbols based on the reading level of the student. For example, if they were brand new, maybe leaving all the symbols would be helpful to the reader, where adults need the minimum discussed in assignment 19.

Remember, assignment 19 is not complete. I may still have things to fix, and I’m not going to give the entire transcription of the assignment either. Rather, I’ll give you portions, and talk about codes as necessary.

The Title Page

The Braille title page is quite interesting in its development. Braille2000 has a code called page fill which will fill the page with the content. In another example I saw, preserving blank lines was used instead of spacing commands like I did. No matter the method you choose, you should always check to make sure it did what you wanted.

For the title page, the assignment mentions the 5 different parts of the page, and how it needs to be done. Sample title pages are given based on different criteria but the concept should be learned. I found that doing the title page took some work, as the simulated print gave a bunch of information about the book that is to be transcribed in part and the student needs to take the concepts learned and put it in to a proper title page.

I had the concept down, but questions arose because I am not affiliated with an organization and it said that it needed to be a certain way. I’m not giving any answers, and again, I’m not even graded, but I hope that the info given may be of value.

What does it look like?

Let’s take the concept of the title page and put it in to practice. The following is the way I decided to do the title page for this assignment.

%pagef %bn=t1
The History of the House of Representatives
Robert V. Remini
Published by Smithsonian Books in association with HarperCollins Publishers.
New York, NY
Copyright © 2006 Robert V. Remini and the Library of Congress.
Further reproduction or distribution in other than a specialized format is prohibited.
Transcription of:
ISBN-10: 0-06-088434-7
ISBN-13: 978-06-088434-5
Transcribed 2020 into Unified English Braille by Jared Rimer
Woodland Hills, CA
In 16 volumes
Volume 1
Braille pages t1-t2, p1-p8, and 1-13
Print pages i-vi and 1-b5

Some of the information you will need like the number of print and braille pages may be unknown. When I first created the title page, I created it this way.

%pagef %bn=t1
The History of the House of Representatives
Robert V. Remini
Published by Smithsonian Books in association with HarperCollins Publishers.
New York, NY
Copyright © 2006 Robert V. Remini and the Library of Congress.
Further reproduction or distribution in other than a specialized format is prohibited.
Transcription of:
ISBN-10: 0-06-088434-7
ISBN-13: 978-06-088434-5
Transcribed 2020 into Unified English Braille by Jared Rimer
Woodland Hills, CA
In 16 volumes
Volume 1
Braille pages t1-x, p1-x, and 1-x
Print pages i-vi and 1-5

I may not remember exactly how I did it, but this sample will illustrate what it may be done like if you were to do it. Note also that I used the list percent code, as it needs to be in 1-3 format or first list format. I also learned from Bob that I can put multiple percent codes on a line, but when I did it, I had the percent codes on each line. Some codes like %space I would put on one line, but others seem to be OK.

You’re welcome to play around with these types of examples and see what works for you, each person is going to be different. Remember, if you used preserve blank lines (pbl) you can press enter for your blank line and enter again to type and your line will be kept. After the title page, turn off PBL with pbl=off so that you can have your formatting preserved. In the RTF, I pressed enter when typing so that I had a blank line so I can find paragraphs easier when proofing. Remember that you can also format your file based on structure, but as a blind person, I find percent codes much easier like the above for the title page.

Special Symbols Page and Transcribers Notes

Some transcriptions need a special symbols page and a Transcribers Notes page. This assignment does not have a transcribers notes page, but has a special symbols page. In RTF, the Special Symbols page was created by putting a mark in place on a page so that the page was in place. I simply typed that this is a mark for special symbols. Remember! You want to remove that text before inserting the special symbols at the end of your project. If you were to do the transcribers notes, insert a page for that, and you can even fill that in using RTF if you know what you’re going to do. For example, if the transcription removes photos, it needs to be put on the transcribers notes page. More information is available in lesson 19 about formatting the transcribers notations page, so I won’t cover it here except to say you can put a page in place for that.

On the special symbols page, I also set the running head for the book for this assignment. This is important, because then you don’t have to worry about that later.

What does this look like?

Below, I set the running header for the book, and put my place marker in place for the Special Symbols list to be done in B2K at the end of all of the proofing.

This page will be reserved for the special symbols page.

%page tells B2K to creat a new page. %runhead on a line of its own is very important. The following paragraph is used for the header, so if I wanted the running head to say The History of the House of Representatives, I’d have to put that on its own line. You can learn more about setting a running head and appropriate measures to take in assignments 17-18 of the Transcription Course. The %page at the end of my text is used to tell B2K to move on to the next page. Because I didn’t put any page number indication, it assumes T2. If I needed a Transcribers Notations page, the %page would have it go to t3.

Changing Pages

In this portion of the book, we already established the new page, but we switch from Transcribers pages to Preliminary pages. We also establish print page numbers. This is simple to do in Braille2000 using percent codes in this portion, because the next section is more books by the Author.

%h4> How is this done?

That’s it! I set the print page number for the roman numeral pages and the preliminary page numbers. That is as simple as it goes. Until its changed again, this format will stay in place.

Dedication page

The dedication page is simple. You can put it in paragraph or list, and I chose to do this in paragraph.

What does it look like?

There are two aspects to this portion. First I need to tell Braille2000 to move to the next page, then set the next page.

For my children: Elizabeth, Joan and Bob

I use %indent here, but you could use %3-1 to do the same thing. %space told B2K to leave the necessary blank line between the running head and the paragraph.

Table of Contents

This is the fun part of B2K because this whole thing can be automated. Because the lesson requires this very lengthy table of contents to be done in 16 volumes, even though you’re essentially transcribing only 5 pages of the entire book, I really had fun learning the intricacies of doing this. If you were wanting to type this out, its easy to do.

First of all, we have another print page, because there is a page change roman numeral 7 within the table of contents, and the rules indicate that all back pages should be accounted for even though they don’t appear in print. That is OK, we did the print page setup before, so I just set the new page set instead of %np as shown above.

What does this look like?

Let’s show you the print page change before we talk more about the contents itself.


This code indicates that we’re skipping roman 4 and going to 5, and the next sequence I.E. a5 will be used when it changes pages automatically. We didn’t change braille page numbers, so whatever preliminary page we’re on will continue.

The Table of Contents

This is the exciting part. There is a code you need to set called table of contents otherwise known as TOC for short. After that, you need to use the tab key to discern the text from the page numbers. Whether you space the last word or you just tab, it should be fine. As long as the Table of Contents tag is there you’ll be set. Braille2000 can be used to do this by doing some other settings, but as long as you check your work afterword to make sure you have what you need set correctly, you’ll be fine.

Make sure you review the rules on Table of Contents pages, as it stipulates you need to use listing format based on the headings of the book. Heading 1 is 1-3, heading 2 3-5, etc. The way I’ve learned how to do this is the %list tag which is shown above for the title page.

For illustration purposes, we’re only going to give you the first volume. Remember, you can use the center tag where appropriate for volume numbers and the like, and I would assume that PBL would be useful as there are spots where blank lines are necessary. Look at assignment 19 for complete details.

What does this look like?

%center %tnl Volume 1 %tnr
Prologue 1
1. Inaugurating a New Government, March-April 1789 9
2. The First Session of the 1st Congress, March-September 1789 24

New rules introduced recently indicate that transcribers notes (%tnl %tnr) need to be in place for volume numbers since it is text not in the print copy. Honestly, I’d rather have it the old way, its more cells and is completely unnecessary! Be that as it may, I’m learning this for the first time, and so to pass, I must include these. In the print, there is a tab between the prologue and page 1, the first chapter and page 9, and the final chapter of the volume set on page 24.

Let us show you what volume 16 looks like as this is very important to do at this point. Because the table of contents rules indicate that if you have a page number on the right side, it could be confused with the braille number, so B2K will move things down automatically. There are other things I’ve learned that are necessary too, but I’m not going to give you everything, just the understanding that this is capable of being done. Let’s show you volume 16 as I understand it.

%center %tnl Volume 16 %tnr
Index 593

Notice the %toc=off command? It should be used to indicate that you’re not dealing with table of contents entries in cases where you may press the tab key and type a number which is part of the regular text. This completes the preliminary pages, lets move on!

Text pages

The text pages are pretty simple. There are codes for indention like %indent and if lists come up like %list to tell Braille2000 how to handle certain things. Things like bullets, font attributes, and the like are handled with the processing of the file, but you can use %center for centering or %head for a heading. If subheadings are used, use %subhead for a cell-5 or %subhead7 for a cell 7. These are level 2 or 3 headings. While these are the typical, there are times to do other specific like %7-7 when doing attributes for example.


Remember that we had set a running head for all these pages? %pager suppresses the running head and it appears on the next braille page. We also need to change page numbering altogether, as numeric page numbers are used throughout the book.

%h5> How is this done?

This is done with several codes. First, we set the new page with no running head, then the page numbering as shown below.


I then decided to use a heading for the Prologue which runs for many pages but we are only transcribing the first 5 pages of print. We also by rule, need to rewrite the title of the book as required for the first page of any volume of braille.

%center THE HOUSE
The History of the House of Representatives

The indent tag is basically telling B2K that I want indented paragraphs. From now on, I hit two returns, and it has the knowledge unless otherwise stated, this is normal braille paragraphs.

The United States House of Representatives is regarded by many as the finest deliberative body in human history. A grand conceit, to be sure. But one that is not far from the mark. It is an extraordinary instrument for legislating the will of the American people. Through an electoral process it regularly absorbs fresh blood and fresh ideas so that it can reflect popular needs and demands. Every one of its members from 1789 to the present–over ten thousand individuals!–has been elected. Not one has been appointed. It has been said many times that the United States House of Representatives is the “people’s House,” and as such it has endured for more than two centuries.

Any history of this institution should begin with a reminder that many of the traditions and practices of the American system of government originated in Great Britain, a country ruled by a monarch and a two-house Parliament: the House of Lords and the House of Commons. As England expanded its empire into the New World in the seventeenth and eighteenth centuries and colonies of transplanted settlers were established, the king, or corporate or individual entrepreneurs who subsidized the colonization, appointed governors to represent their will and execute their instructions. To assist them in their responsibilities, these governors chose advisory councils of distinguished residents and over time allowed them to offer suggestions by which the colonies could be administered.

As you can see, if I put those paragraphsin place, it would both be indented based on the above tag. Since we have a page turn within the text, in several places, we can easily add the next page code (%np) anywhere I want a new page. If its in the middle of a paragraph, I can put it right in the text, and if needed, a separator line for the page is put in place. If not, it puts it in the appropriate place without you having to count pages. Where the page change happened to start a new paragraph, I put the tag on a line of its own.

More particularly, in 1619, the stockholders of the company that maintained settlers in what was the colony of Virginia in North America %np ordered the governor to summon two landowning representatives from each of the small settlements in the colony to meet in Jamestown. These representatives were told to provide advice only. Twenty-two men gathered in a tiny church and forthwith ignored the company’s instructions and enacted a series of laws for the colony against gambling, drunkenness, idleness and the breaking of the Sabbath. The House of Burgesses, as it came to be called, then adjourned. But, by its action, this house gave notice that it was prepared to go its own way and assume authority to legislate on matters that it regarded as beneficial for the community. It demonstrated a degree of independence that would be repeated many times in the future by other colonial legislative bodies. When, in 1639, the king instructed the Virginia governor to summon the Burgesses together each year, he was simply acknowledging what had been going on for quite some time. Nonetheless, final authority in the colony still rested with the governor and his council of prominent planters.

In that paragraph, you see that we have the %np right after a word, and we just kept on writing.

… funded and governed by a proprietor or by stockholders in a company, but ultimately most of them evolved into colonies under royal control with a governor and one or two houses of appointed and elected officials. Legislative assemblies, representing the people, became an integral part of the governmental operation.
As the number of immigrants to the New World increased and the frontier moved steadily westward, the colonists became increasingly detached from the Mother Country. Far from England, they lacked regular direction from a ruling body in London, and they needed laws by which they could thrive in a hostile environment–where Native Americans regularly thwarted their efforts to obtain additional land. Thus, the settlers relied on their local assemblies to address their concerns. The colonies had no real representation …

In this subtext, I took a portion of a prior paragraph, and the beginning of the next paragraph with its page change. I didn’t complete the paragraph, but you can see how easy it is with these examples that it can be pretty easy to do your own book There are plenty of codes to help you, and we’re always available to answer any questions about this, or any other aspects of Braille2000 as it can be very complex at first glance.

Comments (0)

The Security box, podcast 43: 2 topics of interest as well as news notes and more

Welcome to another Security Box program folks, I’m happy I’ve gotten some time to get this to you.

The program lasts about 104 minutes and you’re welcome to participate as well.

We’ve got a dial in number right in to my live wire box. Its 623-263-8934. Press the topion to leave a voice message if you wish to do so, or check out any of the programming I’ve got up there.

Here is the 96.02mb file for you to go and download it if you can’t use the rss feed.

Here are the show notes for everyone with links to the various topics and news items for this program.

Welcome to the Security box, podcast 43. On this edition of the podcast, we’ve got two topics. The first talks about a fake vaccine web site that is now shut down, thanks to the US Government. The second topic talks about the Exim 21 bug that recently hit headlines. We’ll have news, notes, your questions comments and any catch up from any older podcasts.



Sans News Bites

We hope you enjoy the program as much as we have bringing it together for you. See you next week!

Comments (0)

John … what’s your name now … is now back in the news

John Davies, AKA John Bernard, AKA John Cavendish is back in the news through Krebs On Security. This post reminds us of the three part series which we covered back on podcasts 10, 12 and 14 of the Security Box. Now, in news notes of the upcoming podcast 43, we’re going to have to bring him up again although it’ll definitely be news notes related as the podcast is booked.

John still finds marks for his continuing due dilligance fees with no promises of delivering the promised money for companies to do the projects they say they need the money for.

The article in part talks about the source that came to Brian with all of the latest.

“I just sat in on a call and John’s voice is unmistakable,” said the broker, who asked to remain anonymous. “He stumbled on the beginning of the call trying to remember which last name he was supposed to use. Immediately they go back to the standard script about the types of deals they are looking for. They want to be minority investors in private transactions and they are industry agnostic.  Their deal sizes are investments in the $5-20 million range, they prefer to not use big 4 firms for due diligence, and they have some smaller firms they use which are better suited for smaller investment deals.”

The article continues:

The source forwarded me some correspondence from Hempton Business Management, and I noticed it was sent from a Mariya Kulykova. This is interesting because Mr. Bernard’s personal assistant in Ukraine was a Mariya Kulikova (Ms. Kulikova deleted Bernard’s former companies from her LinkedIn profile shortly after last year’s series).

The company’s website says Hempton has been around since 2017, but the domain name was only registered in late November 2020. There is no information about who runs or owns the company on its site.

He elluded authorities numerous times and he knows what he’s doing.

The article talks about Hempton , what a shelf company is, and more.

Investment Scammer John Davies Reinvents Himself? is the article, make sure you do your due dilligance.

Comments (0)

‘Jugular’ of the U.S. fuel pipeline system shuts down after cyberattack

I did read this on Saturday thanks to the little wigit page and what it provides. This is still a developing story, but yet something to watch, as there are still questions that need to be answered.

Continue: ‘‘Jugular’ of the U.S. fuel pipeline system shuts down after cyberattack’

Comments (0)

wordpress logins unavailable for the moment

Hi all.
This is a notice to say that wordpress logins for those that give a damn are not available for the moment because of an issue with 2step authentication.
The long and short is, that when I try to activate 2step and run wordpress 2step, ie I login to a site with it, it acts like it is working but I never get my sms code unless I try several times then eventually I will get a code, 2 times if I am lucky, 10 or more if not.
Every time it doesn’t work I need to wait a couple minutes till it resets.
I have been doodling with a few software packages mainly the wordpress packages themselves for windows from wordpress itself, and noticed this.
Wordpress app couldn’t even recieve any authentication till I pulled one from the web then using it for the app.
No idea if its me or wordpress itself but I have sent automatic general a request on the internals of the authentication system.
The only reason I had it on apart from the obvious is jetpack engine, wordpress logins and recommended security settings.
But if its being semi rood right now I just can’t justify having it on if it refuses to send me the number for no reason I can see.
I am conciddering a shut down of the registration system currently in place and if this is not addressed in the next few months that may lead me towards this eventuality.
We havn’t had any more users in the last 6 months or so coming in.
And if security on wordpress site continues to break like this it may be easier to abandon registration possibly and well as the current security subsystem currently in place.
Thats obviously something I don’t want to happen but lets see how that works.
Currently and for the forseeable future no wordpress logins will be allowed so if you want to post you must register the usual way.
I am unsure if I will ever turn on 2step unless that is they fix it.
I do hope they can fix it but if they don’t then they don’t I guess.
I should make a song and dance but the old world has ended and these are covid times.
So I’ll just turn it off and forget about till its sorted or I get an explanation.
At the moment there isn’t an issue with the software on either end but if I don’t get the code then well who knows.
The other way I guess is to start setting app passwords for various catigries of things.
I don’t give a damn about app passwords but I only need 1 for my brouser, and everything else will just work.
Later thats it for now

Comments (0)

Bugs in Exim are documented, time to patch

As reported in Sans News Bites for this week, I found an article also on this from Cyberscoop. Its entitled Qualys researchers uncover 21 bugs in Exim mail servers and should be read.

Researchers have found 21 unique vulnerabilities in Exim, a popular mail transfer agent, some of which would allow hackers to run full remote unauthenticated code execution against targets, the Qualys Research Team announced Tuesday.

Having remote code execution is pretty bad and it looks like it isn’t just versions talked about through Sans and other articles.

If we’re running 4.94.1 or earlier, we really need to get a move on or write our support people. I’ll write some highlights for the show notes and we’ll bring this up for discussion.

Comments (0)

Sans News bites, May 7, 2021

As predicted, Sans News Bites is covering the Exim news that I recently read about and will be making sure to fully blog about.

If you don’t get Sans News bites, than here is the link to this one where there are links and commentary on many topics including a WordPress plug in update. This is going to get interesting, and the headlines are going to be read out loud for the podcast. I’ll link to the same link in our show notes for this episode.

Comments (0)

Podcast catchup: links to podcasts 38-42 of the security box


since I’ve decided to go ahead and have the podcasts as links, there are podcasts that are not linked.

I’m going to link them here, feel free to download them!

We have full show notes for all of the programs, let me know if you need a copy by sending me an email to tech at menvi.org. Thanks for reading, more soon!

Comments (0)

Older Posts »

go to sections menu

navigation menu

go to sections menu