tag:blogger.com,1999:blog-53777212024-02-28T06:15:34.338-05:00You're Standing On My NeckRamblings... Oh so many ramblings - this is my outlet.Unknownnoreply@blogger.comBlogger74125tag:blogger.com,1999:blog-5377721.post-1099766696677126452004-11-06T13:43:00.000-05:002004-11-06T13:44:56.676-05:00Unbelievable
<br />
<br />
<br />Yes - in the mail
<br />
<br />2 not just one - but 2 letters from AOL Thanking me for continuing service.
<br />
<br />Go Figure.
<br />
<br />Gotta love that company. You wonder why they are laying off 700 people...
<br />
<br />HMMMMM.
<br />Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-5377721.post-1098792251451043162004-10-26T01:59:00.000-04:002004-10-26T08:04:11.450-04:00go to Keyword: Annoying
<br />
<br />
<br />After 5 calls to A.O.L. my account is cancelled.
<br />
<br />5 CALLS
<br />
<br />"No - I don't like the service."
<br />
<br />"You've only been online for 7 minutes - thats not enough time to experience AOL."
<br />
<br />"Oh YES it Was!"
<br />
<br />So I started arguing - sort of - with the 4th call-person...
<br />
<br />After 10 minutes of "Go to Keyword blahblah because blahblah costs $3 extra." I promptly hung up.
<br />
<br />Call #5 was the winner.
<br />
<br />"Why do you want to cancel your service?"
<br />
<br />"Honestly - you're the 5th call I've had tonite to cancel. "
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1097294318028705112004-10-08T21:40:00.000-04:002004-10-08T23:58:38.030-04:00So anyway.... I'm writing again!
<br />
<br />News - Good news:
<br />
<br />A client!!! Yay... Got one... Haven't done work for them for 5 years... but I'm back there - and that's pretty cool...
<br />
<br />So I spent half a day yesturday on-site fixing problems and they asked me back for an additional 20 hours...! not too shabby...
<br />
<br />Other things... In the works?....
<br />
<br />Snapstream Media: www.snapstream.com
<br />
<br />Wonderful PVR - as far as I'm concerned...
<br />
<br />Been using the software for years... We've been talking - about a <span style="font-style: italic;">position</span>.... would be Real nice!
<br />
<br />Rakesh? Where are ya? Hope we haven't lost contact...
<br />
<br />Pulling in the <a href="http://chris.pirillo.com">Big Guns </a>
<br />
<br />anything helps...!
<br />
<br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1095980498201317182004-09-23T19:00:00.000-04:002004-09-23T19:01:38.203-04:00<h2><a href="http://www.xvsxp.com">OS Shootout: Mac OS X vs. Windows XP</a></h2>
<br />Just got this Hot link in...
<br />
<br />Interesting info!!
<br />
<br />Good read...
<br />
<br />Go - Check it out - Get The Facts.. ;)
<br />
<br />
<br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1095794168925416912004-09-21T15:13:00.000-04:002004-09-21T15:16:08.926-04:00Interesting concept - dual passwords - one of which is random...
<br />
<br />This system works well - I've used it before...
<br />
<br />kudos to AOL - who is next...?
<br />
<br /><a href="http://www.rsasecurity.com/press_release.asp?doc_id=5033">AOL & RSA Tag Team Security</a>
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1095719419651690672004-09-20T18:27:00.000-04:002004-09-20T18:30:19.650-04:00And what....
<br /><a href="http://www.ctnow.com/news/nationworld/sns-guard,1,6899888.story?coll=hc-headlines-newsat3">
<br />CBS Can't Authenticate Documents</a>
<br />
<br />Enough of the "30 years ago....." Blah blah blah!
<br />
<br />It does not matter Either way who did what and why.
<br />
<br />Let's try to look at Current info - rather than past events?
<br />
<br />Get on with the Real issues!!!!!!
<br />
<br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1095031547187868182004-09-12T19:21:00.000-04:002004-09-12T19:25:47.186-04:00<div style="text-align: center;"><span style="font-weight: bold; font-style: italic; font-family: trebuchet ms; color: rgb(255, 0, 0);">*Piracy For Profit*
<br />
<br /></span> <div style="text-align: left;"><span style="font-weight: bold; font-style: italic; font-family: trebuchet ms; color: rgb(255, 0, 0);"></span>Welcome to my new feature - where I disclose people's evil doings on my blog!
<br />
<br />Here is today's link: <a href="http://cgi6.ebay.com/ws/eBayISAPI.dll?ViewSellersOtherItems&userid=btm545&completed=0&sort=3&since=-1">an eBay infraction against MS</a>
<br />
<br />Selling software to Change the product ID to a valid one eh?
<br />
<br />YA - that sounds Legal.
<br />
<br />Sure...
<br />
<br />
<br /><span style="font-weight: bold; font-style: italic; font-family: trebuchet ms; color: rgb(255, 0, 0);"></span></div> </div> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1094575082898876202004-09-07T13:37:00.000-04:002004-09-07T12:38:02.896-04:00Happy Birthday to meeeeeee... ;)
<br />
<br />anyone want a gmail account? - leave a comment...
<br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1088126302458321412004-06-24T21:18:00.000-04:002004-06-24T21:18:22.456-04:00<a href="http://www.reactos.com/en/content/view/full/47">ReactOS - Home</a>
<br />
<br />This... Is going to be interesting...Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1087856199140433412004-06-21T18:16:00.000-04:002004-06-21T18:16:39.140-04:00<a href="http://www.wtnh.com/Global/story.asp?S=1955971">WTNH.com - Governor Rowland announces resignation effective July 1</a>
<br />
<br />And so it ends...
<br />
<br />Now what Connecticut?
<br />
<br /><a href="http://www.msnbc.msn.com/id/5241442/">MSNBC coverage</a>
<br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1087423991486806782004-06-16T18:12:00.000-04:002004-06-16T21:28:56.286-04:00Gmail invites... It's fun to Give!
<br />
<br />Total given out: 6 so farUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1087300660593113132004-06-15T07:57:00.000-04:002004-06-15T07:57:40.593-04:00<a href="http://biz.yahoo.com/prnews/040614/to071_1.html">G4techTV Canada announces Canadian-produced Call for Help with award-winning U.S. technophile Leo Laporte</a>
<br />
<br />It's totally official!
<br />
<br />Leo's back On The Air...!
<br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1087098619470756362004-06-12T23:49:00.000-04:002004-06-12T23:50:19.470-04:00Cyber Alert:
<br />
<br />Technical Cyber Security Alert TA04-163A
<br />
<br />Cross-Domain Redirect Vulnerability in Internet Explorer
<br />
<br /> Original release date: June 11, 2004
<br /> Last revised: --
<br /> Source: US-CERT
<br />
<br />
<br />Systems Affected
<br />
<br /> Microsoft Windows systems
<br />
<br />
<br />Overview
<br />
<br /> A cross-domain vulnerability in Internet Explorer (IE) could allow an
<br /> attacker to execute arbitrary code with the privileges of the user
<br /> running IE.
<br />
<br />
<br />I. Description
<br />
<br /> There is a cross-domain vulnerability in the way IE determines the
<br /> security zone of a browser frame that is opened in one domain then
<br /> redirected by a web server to a different domain. A complex set of
<br /> conditions is involved, including a delayed HTTP response (3xx status
<br /> code) to change the content of the frame to the new domain.
<br /> Vulnerability Note VU#713878 describes this vulnerability in more
<br /> technical detail and will be updated as further information becomes
<br /> available.
<br />
<br /> Other programs that host the WebBrowser ActiveX control or use the
<br /> MSHTML rendering engine, such as Outlook and Outlook Express, may also
<br /> be affected.
<br />
<br /> This issue has been assigned CVE CAN-2004-0549.
<br />
<br />
<br />II. Impact
<br />
<br /> By convincing a victim to view an HTML document (web page, HTML
<br /> email), an attacker could execute script in a different security
<br /> domain than the one containing the attacker's document. By causing
<br /> script to be run in the Local Machine Zone, the attacker could execute
<br /> arbitrary code with the privileges of the user running IE.
<br />
<br /> Publicly available exploit code exists for this vulnerability, and
<br /> US-CERT has monitored incident reports that indicate that this
<br /> vulnerability is being actively exploited.
<br />
<br />
<br />III. Solution
<br />
<br /> Until a complete solution is available from Microsoft, consider the
<br /> following workarounds.
<br />
<br /> Disable Active scripting and ActiveX controls
<br />
<br /> Disabling Active scripting and ActiveX controls in the Internet Zone
<br /> (or any zone used by an attacker) appears to prevent exploitation of
<br /> this vulnerability. Disabling Active scripting and ActiveX controls in
<br /> the Local Machine Zone will prevent widely used payload delivery
<br /> techniques from functioning. Instructions for disabling Active
<br /> scripting in the Internet Zone can be found in the Malicious Web
<br /> Scripts FAQ. See Microsoft Knowledge Base Article 833633 for
<br /> information about securing the Local Machine Zone. Also, Service Pack
<br /> 2 for Windows XP (currently at RC1) includes these and other security
<br /> enhancements for IE.
<br />
<br /> Do not follow unsolicited links
<br />
<br /> Do not click on unsolicited URLs received in email, instant messages,
<br /> web forums, or internet relay chat (IRC) channels. While this is
<br /> generally good security practice, following this behavior will not
<br /> prevent exploitation of this vulnerability in all cases.
<br />
<br /> Maintain updated anti-virus software
<br />
<br /> Anti-virus software with updated virus definitions may identify and
<br /> prevent some exploit attempts. Variations of exploits or attack
<br /> vectors may not be detected. Do not rely solely on anti-virus software
<br /> to defend against this vulnerability. More information about viruses
<br /> and anti-virus vendors is available on the US-CERT Computer Virus
<br /> Resources page.
<br />
<br />
<br />Appendix B. References
<br />
<br /> * Vulnerability Note VU#713878-
<br /> <http://www.kb.cert.org/vuls/id/713878>
<br />
<br /> * Malicious Web Scripts FAQ -
<br /> <http://www.cert.org/tech_tips/malicious_code_FAQ.html#steps>
<br />
<br /> * Computer Virus Resources -
<br /> <http://www.us-cert.gov/other_sources/viruses.html>
<br />
<br /> * CVE CAN-2004-0549 -
<br /> <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0549>
<br />
<br /> * Microsoft Knowledge Base Article 833633 -
<br /> <http://support.microsoft.com/default.aspx?scid=833633>
<br />
<br /> * Windows XP Service Pack 2 RC1 -
<br /> <http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/wi
<br /> nxpsp2.mspx>
<br />
<br /> * Increase Your Browsing and E-Mail Safety -
<br /> <http://www.microsoft.com/security/incident/settings.mspx>
<br />
<br /> * Working with Internet Explorer 6 Security Settings -
<br /> <http://www.microsoft.com/windows/ie/using/howto/security/settings
<br /> .mspx>
<br />
<br /> _________________________________________________________________
<br />
<br />
<br /> Public incidents related to this vulnerability were reported by Rafel
<br /> Ivgi. Thanks to Jelmer for further research and analysis.
<br />
<br /> _________________________________________________________________
<br />
<br />
<br /> Feedback can be directed to the author: Art Manion.
<br />
<br /> Send mail to <mailto:cert@cert.org>.
<br />
<br /> Please include the Subject line "TA04-163A Feedback VU#713878".
<br />
<br /> _________________________________________________________________
<br />
<br />
<br /> Copyright 2004 Carnegie Mellon University.
<br />
<br /> Terms of use: <http://www.us-cert.gov/legal.html>
<br />
<br /> _________________________________________________________________
<br />
<br /> The most recent version of this document can be found at:
<br />
<br /> <http://www.us-cert.gov/cas/techalerts/TA04-163A.html>
<br />
<br /> _________________________________________________________________
<br />
<br />
<br /> Revision History
<br />
<br /> June 11, 2004: Initial release
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1087098325448146382004-06-12T23:45:00.000-04:002004-06-12T23:45:25.446-04:00<a href="http://www.g4techtv.ca/canada/leo.shtml">G4techTV.ca | G4techTV Canada Brings Leo Back!</a>
<br />
<br />
<br />WooHoo!
<br />
<br />Now... how do I get me some of that Canadian Programming....
<br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1087092831504958282004-06-12T21:57:00.000-04:002004-06-12T22:13:51.503-04:00Ham's!
<br />
<br />Radio amateur's!
<br />
<br />Are you like me?
<br />
<br />Love new technology?
<br />
<br />(low on cash?)
<br />
<br />Would love to operate DX on the HF bands but can't afford a rig? (i can't....)
<br />
<br />Have I got the solution for you!
<br />
<br />Ok - so it's not new - but it's new to ME... (which is odd.....)
<br />
<br />
<br /><a href="http://www.echolink.org">Echo Link</a>
<br />
<br />Combining internet technology (and VoIP) and our broad radio spectrum...
<br />
<br />Go read it - download the app and use it...
<br />
<br />Look for me - N1GWF - and we can QSO!
<br />
<br />TTYLUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1087057203663421482004-06-12T12:19:00.000-04:002004-06-12T12:20:03.663-04:00GMAIL
<br />
<br />I have an invite...
<br />
<br />Any takers?
<br />
<br />Leave a comment...!
<br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1086744015316741722004-06-08T21:17:00.000-04:002004-06-08T21:20:15.316-04:00<em><strong>For your reading enjoyment: the latest Cyber Security Bulletin:</strong></em>
<br />This will be my new feature... I'll post these as they come in.. as an FYI...
<br />
<br />
<br />
<br />Technical Cyber Security Alert TA04-160A
<br /> SQL Injection Vulnerabilities in Oracle E-Business Suite
<br />
<br /> Original release date: June 8, 2004
<br /> Last revised: --
<br /> Source: US-CERT
<br />
<br />Systems Affected
<br />
<br /> * Oracle Applications 11.0 (all releases)
<br /> * Oracle E-Business Suite 11i, 11.5.1 through 11.5.8
<br />
<br />Overview
<br />
<br /> A vulnerability in the Oracle's E-Business Suite allows a remote
<br /> attacker to execute arbitrary script on a vulnerable database system.
<br /> Exploitation may lead to compromise of the database application, data
<br /> integrity, or underlying operating system.
<br />
<br />I. Description
<br />
<br /> Oracle E-Business Suite is a set of applications and modules that
<br /> enables an organization to manage customer interactions, deliver
<br /> services, manufacture products, ship orders, collect payments, and
<br /> other tasks using a single database model.
<br />
<br /> According to the Oracle Security Alert 67, Oracle Applications 11.0
<br /> (all releases) and Oracle E-Business Suite Release 11i, 11.5.1 through
<br /> 11.5.8 are vulnerable to SQL injection vulnerabilities. Oracle
<br /> E-Business Suite Release 11.5.9 and later are not vulnerable. This
<br /> vulnerability is not platform specific. Integrigy Corporation has also
<br /> released an alert about these vulnerabilities.
<br />
<br /> Note that no authentication mechanisms of Oracle E-Business Suite will
<br /> mitigate exploitation of the attack.
<br />
<br /> US-CERT is tracking this issue as VU#961579.
<br />
<br />II. Impact
<br />
<br /> An unauthenticated attacker could exploit this vulnerability to
<br /> execute arbitrary SQL statements on the vulnerable system with the
<br /> privileges of the Oracle server process. In addition to compromising
<br /> the integrity of the database information, this may lead to the
<br /> compromise of the database application and the underlying operating
<br /> system.
<br />
<br />III. Solution
<br />
<br /> Apply Patch or Upgrade
<br />
<br /> According to the Oracle Security Alert 67, patches and related
<br /> information are available from:
<br />
<br /> http://metalink.oracle.com/metalink/plsql/ml2_documents.showDocumen
<br /> t?p_database_id=NOT&p_id=274375.1
<br />
<br />Appendix B. References
<br />
<br /> * http://otn.oracle.com/deploy/security/pdf/2004alert67.pdf
<br /> * http://www.integrigy.com/alerts/OraAppsSQLInjection.htm
<br /> * http://www.kb.cert.org/vuls/id/961579
<br /> _________________________________________________________________
<br />
<br /> US-CERT thanks Stephen Kost of Integrigy Corporation for reporting
<br /> this problem and for information used to construct this advisory.
<br /> _________________________________________________________________
<br />
<br /> Feedback can be directed to the author: Jason A. Rafail
<br /> _________________________________________________________________
<br />
<br /> The latest version of this document can be found at:
<br />
<br /> <http://www.us-cert.gov/cas/techalerts/TA04-160A.html>
<br /> _________________________________________________________________
<br />
<br /> Copyright 2004 Carnegie Mellon University.
<br />
<br /> Terms of use:
<br />
<br /> <http://www.us-cert.gov/legal.html>
<br /> _________________________________________________________________
<br />
<br /> Revision History
<br />
<br /> June 8, 2004: Initial release<strong></strong>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1086471572282233812004-06-05T17:39:00.000-04:002004-06-05T17:39:32.283-04:00<a href="http://www.newsmax.com/archives/articles/2004/6/5/165447.shtml">Ronald Reagan Dies at 93</a>
<br />
<br /><em><strong>RIP</strong></em>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1086398886169092642004-06-04T21:26:00.000-04:002004-06-04T21:28:27.243-04:00Just a quickie - excuse the pun
<br />
<br />Funny SMS Text message:
<br />
<br />Cell Phone: $100. Receive *Hot* text message: $.05 Vibrate feature on phone: Priceless.
<br />
<br />Funny or not?
<br />
<br />I thought it deserved a chuckle anyway.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1086379966770927512004-06-04T16:12:00.000-04:002004-06-04T16:12:46.770-04:00<a href="http://www.iarevolution.com/patginter/Default.aspx?Page=Home">IA Revolution - Welcome to the Instant Access Revolution!</a>
<br />
<br />This software BOTHERS me...
<br />
<br />I have since sent an email to the Tech Support people to get some more info...
<br />
<br />Charging $40 for something that can be accomplished for Free?
<br />
<br />And then add the MLM feature for distribution... Adds to the fun!
<br />
<br />More in a bit.
<br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1083554984019326092004-05-02T23:29:00.000-04:002004-05-02T23:32:53.576-04:00Wow... sellin Gmail accounts on eBay...
<br />
<br />Everything is fair game these days...
<br />
<br />yeah - I got mine... by being asked...! not buying in... and I didn't resell my other invites..
<br />
<br />Whatever!
<br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1083111095397943222004-04-27T20:11:00.000-04:002004-04-27T20:14:39.950-04:00Pics!
<br />
<br />TY to TSS....
<br />
<br /><a href="http://home.eict-tech.com/gallery">Personal Pics - Beta</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1082174521767925362004-04-17T00:02:00.000-04:002004-04-17T00:05:17.576-04:00Whatta day..
<br />
<br />Go do yourself a flavor..
<br />
<br />Sign it...
<br />
<br />You'll enjoy it..
<br />
<br /><a href="http://www.petitiononline.com/cp2004/petition.html">Bring Chris back...! more often!</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1082173434623586322004-04-16T23:43:00.000-04:002004-04-16T23:46:47.996-04:00hmm...
<br />
<br />Works for me! ;>>
<br />
<br /><a href="http://chris.pirillo.com/archives/2004_04.html#009836">Welcome back Chris!</a>
<br />
<br />Da show's got potential ;>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5377721.post-1082173090475555092004-04-16T23:38:00.000-04:002004-04-16T23:41:03.763-04:00Nice Friday...
<br />
<br />3 kids - all in bed...!
<br />
<br />cool.
<br />
<br />other cool newz:
<br />
<br /><a href="http://leo.typepad.com/tlr/2004/04/the_people_have.html">Yay 4 Leo! - We CAN make a difference!</a>Unknownnoreply@blogger.com0