Unbelievable
Yes - in the mail
2 not just one - but 2 letters from AOL Thanking me for continuing service.
Go Figure.
Gotta love that company. You wonder why they are laying off 700 people...
HMMMMM.
Ramblings... Oh so many ramblings - this is my outlet.
Saturday, November 06, 2004
Tuesday, October 26, 2004
go to Keyword: Annoying
After 5 calls to A.O.L. my account is cancelled.
5 CALLS
"No - I don't like the service."
"You've only been online for 7 minutes - thats not enough time to experience AOL."
"Oh YES it Was!"
So I started arguing - sort of - with the 4th call-person...
After 10 minutes of "Go to Keyword blahblah because blahblah costs $3 extra." I promptly hung up.
Call #5 was the winner.
"Why do you want to cancel your service?"
"Honestly - you're the 5th call I've had tonite to cancel. "
After 5 calls to A.O.L. my account is cancelled.
5 CALLS
"No - I don't like the service."
"You've only been online for 7 minutes - thats not enough time to experience AOL."
"Oh YES it Was!"
So I started arguing - sort of - with the 4th call-person...
After 10 minutes of "Go to Keyword blahblah because blahblah costs $3 extra." I promptly hung up.
Call #5 was the winner.
"Why do you want to cancel your service?"
"Honestly - you're the 5th call I've had tonite to cancel. "
Friday, October 08, 2004
So anyway.... I'm writing again!
News - Good news:
A client!!! Yay... Got one... Haven't done work for them for 5 years... but I'm back there - and that's pretty cool...
So I spent half a day yesturday on-site fixing problems and they asked me back for an additional 20 hours...! not too shabby...
Other things... In the works?....
Snapstream Media: www.snapstream.com
Wonderful PVR - as far as I'm concerned...
Been using the software for years... We've been talking - about a position.... would be Real nice!
Rakesh? Where are ya? Hope we haven't lost contact...
Pulling in the Big Guns
anything helps...!
News - Good news:
A client!!! Yay... Got one... Haven't done work for them for 5 years... but I'm back there - and that's pretty cool...
So I spent half a day yesturday on-site fixing problems and they asked me back for an additional 20 hours...! not too shabby...
Other things... In the works?....
Snapstream Media: www.snapstream.com
Wonderful PVR - as far as I'm concerned...
Been using the software for years... We've been talking - about a position.... would be Real nice!
Rakesh? Where are ya? Hope we haven't lost contact...
Pulling in the Big Guns
anything helps...!
Thursday, September 23, 2004
OS Shootout: Mac OS X vs. Windows XP
Just got this Hot link in...
Interesting info!!
Good read...
Go - Check it out - Get The Facts.. ;)
Tuesday, September 21, 2004
Interesting concept - dual passwords - one of which is random...
This system works well - I've used it before...
kudos to AOL - who is next...?
AOL & RSA Tag Team Security
This system works well - I've used it before...
kudos to AOL - who is next...?
AOL & RSA Tag Team Security
Monday, September 20, 2004
And what....
CBS Can't Authenticate Documents
Enough of the "30 years ago....." Blah blah blah!
It does not matter Either way who did what and why.
Let's try to look at Current info - rather than past events?
Get on with the Real issues!!!!!!
CBS Can't Authenticate Documents
Enough of the "30 years ago....." Blah blah blah!
It does not matter Either way who did what and why.
Let's try to look at Current info - rather than past events?
Get on with the Real issues!!!!!!
Sunday, September 12, 2004
*Piracy For Profit*
Welcome to my new feature - where I disclose people's evil doings on my blog!
Here is today's link: an eBay infraction against MS
Selling software to Change the product ID to a valid one eh?
YA - that sounds Legal.
Sure...
Here is today's link: an eBay infraction against MS
Selling software to Change the product ID to a valid one eh?
YA - that sounds Legal.
Sure...
Tuesday, September 07, 2004
Thursday, June 24, 2004
Monday, June 21, 2004
WTNH.com - Governor Rowland announces resignation effective July 1
And so it ends...
Now what Connecticut?
MSNBC coverage
And so it ends...
Now what Connecticut?
MSNBC coverage
Tuesday, June 15, 2004
G4techTV Canada announces Canadian-produced Call for Help with award-winning U.S. technophile Leo Laporte
It's totally official!
Leo's back On The Air...!
It's totally official!
Leo's back On The Air...!
Saturday, June 12, 2004
Cyber Alert:
Technical Cyber Security Alert TA04-163A
Cross-Domain Redirect Vulnerability in Internet Explorer
Original release date: June 11, 2004
Last revised: --
Source: US-CERT
Systems Affected
Microsoft Windows systems
Overview
A cross-domain vulnerability in Internet Explorer (IE) could allow an
attacker to execute arbitrary code with the privileges of the user
running IE.
I. Description
There is a cross-domain vulnerability in the way IE determines the
security zone of a browser frame that is opened in one domain then
redirected by a web server to a different domain. A complex set of
conditions is involved, including a delayed HTTP response (3xx status
code) to change the content of the frame to the new domain.
Vulnerability Note VU#713878 describes this vulnerability in more
technical detail and will be updated as further information becomes
available.
Other programs that host the WebBrowser ActiveX control or use the
MSHTML rendering engine, such as Outlook and Outlook Express, may also
be affected.
This issue has been assigned CVE CAN-2004-0549.
II. Impact
By convincing a victim to view an HTML document (web page, HTML
email), an attacker could execute script in a different security
domain than the one containing the attacker's document. By causing
script to be run in the Local Machine Zone, the attacker could execute
arbitrary code with the privileges of the user running IE.
Publicly available exploit code exists for this vulnerability, and
US-CERT has monitored incident reports that indicate that this
vulnerability is being actively exploited.
III. Solution
Until a complete solution is available from Microsoft, consider the
following workarounds.
Disable Active scripting and ActiveX controls
Disabling Active scripting and ActiveX controls in the Internet Zone
(or any zone used by an attacker) appears to prevent exploitation of
this vulnerability. Disabling Active scripting and ActiveX controls in
the Local Machine Zone will prevent widely used payload delivery
techniques from functioning. Instructions for disabling Active
scripting in the Internet Zone can be found in the Malicious Web
Scripts FAQ. See Microsoft Knowledge Base Article 833633 for
information about securing the Local Machine Zone. Also, Service Pack
2 for Windows XP (currently at RC1) includes these and other security
enhancements for IE.
Do not follow unsolicited links
Do not click on unsolicited URLs received in email, instant messages,
web forums, or internet relay chat (IRC) channels. While this is
generally good security practice, following this behavior will not
prevent exploitation of this vulnerability in all cases.
Maintain updated anti-virus software
Anti-virus software with updated virus definitions may identify and
prevent some exploit attempts. Variations of exploits or attack
vectors may not be detected. Do not rely solely on anti-virus software
to defend against this vulnerability. More information about viruses
and anti-virus vendors is available on the US-CERT Computer Virus
Resources page.
Appendix B. References
* Vulnerability Note VU#713878-
* Malicious Web Scripts FAQ -
* Computer Virus Resources -
* CVE CAN-2004-0549 -
* Microsoft Knowledge Base Article 833633 -
* Windows XP Service Pack 2 RC1 -
nxpsp2.mspx>
* Increase Your Browsing and E-Mail Safety -
* Working with Internet Explorer 6 Security Settings -
.mspx>
_________________________________________________________________
Public incidents related to this vulnerability were reported by Rafel
Ivgi. Thanks to Jelmer for further research and analysis.
_________________________________________________________________
Feedback can be directed to the author: Art Manion.
Send mail to.
Please include the Subject line "TA04-163A Feedback VU#713878".
_________________________________________________________________
Copyright 2004 Carnegie Mellon University.
Terms of use:
_________________________________________________________________
The most recent version of this document can be found at:
_________________________________________________________________
Revision History
June 11, 2004: Initial release
Technical Cyber Security Alert TA04-163A
Cross-Domain Redirect Vulnerability in Internet Explorer
Original release date: June 11, 2004
Last revised: --
Source: US-CERT
Systems Affected
Microsoft Windows systems
Overview
A cross-domain vulnerability in Internet Explorer (IE) could allow an
attacker to execute arbitrary code with the privileges of the user
running IE.
I. Description
There is a cross-domain vulnerability in the way IE determines the
security zone of a browser frame that is opened in one domain then
redirected by a web server to a different domain. A complex set of
conditions is involved, including a delayed HTTP response (3xx status
code) to change the content of the frame to the new domain.
Vulnerability Note VU#713878 describes this vulnerability in more
technical detail and will be updated as further information becomes
available.
Other programs that host the WebBrowser ActiveX control or use the
MSHTML rendering engine, such as Outlook and Outlook Express, may also
be affected.
This issue has been assigned CVE CAN-2004-0549.
II. Impact
By convincing a victim to view an HTML document (web page, HTML
email), an attacker could execute script in a different security
domain than the one containing the attacker's document. By causing
script to be run in the Local Machine Zone, the attacker could execute
arbitrary code with the privileges of the user running IE.
Publicly available exploit code exists for this vulnerability, and
US-CERT has monitored incident reports that indicate that this
vulnerability is being actively exploited.
III. Solution
Until a complete solution is available from Microsoft, consider the
following workarounds.
Disable Active scripting and ActiveX controls
Disabling Active scripting and ActiveX controls in the Internet Zone
(or any zone used by an attacker) appears to prevent exploitation of
this vulnerability. Disabling Active scripting and ActiveX controls in
the Local Machine Zone will prevent widely used payload delivery
techniques from functioning. Instructions for disabling Active
scripting in the Internet Zone can be found in the Malicious Web
Scripts FAQ. See Microsoft Knowledge Base Article 833633 for
information about securing the Local Machine Zone. Also, Service Pack
2 for Windows XP (currently at RC1) includes these and other security
enhancements for IE.
Do not follow unsolicited links
Do not click on unsolicited URLs received in email, instant messages,
web forums, or internet relay chat (IRC) channels. While this is
generally good security practice, following this behavior will not
prevent exploitation of this vulnerability in all cases.
Maintain updated anti-virus software
Anti-virus software with updated virus definitions may identify and
prevent some exploit attempts. Variations of exploits or attack
vectors may not be detected. Do not rely solely on anti-virus software
to defend against this vulnerability. More information about viruses
and anti-virus vendors is available on the US-CERT Computer Virus
Resources page.
Appendix B. References
* Vulnerability Note VU#713878-
* Malicious Web Scripts FAQ -
* Computer Virus Resources -
* CVE CAN-2004-0549 -
* Microsoft Knowledge Base Article 833633 -
* Windows XP Service Pack 2 RC1 -
* Increase Your Browsing and E-Mail Safety -
* Working with Internet Explorer 6 Security Settings -
_________________________________________________________________
Public incidents related to this vulnerability were reported by Rafel
Ivgi. Thanks to Jelmer for further research and analysis.
_________________________________________________________________
Feedback can be directed to the author: Art Manion.
Send mail to
Please include the Subject line "TA04-163A Feedback VU#713878".
_________________________________________________________________
Copyright 2004 Carnegie Mellon University.
Terms of use:
_________________________________________________________________
The most recent version of this document can be found at:
_________________________________________________________________
Revision History
June 11, 2004: Initial release
G4techTV.ca | G4techTV Canada Brings Leo Back!
WooHoo!
Now... how do I get me some of that Canadian Programming....
WooHoo!
Now... how do I get me some of that Canadian Programming....
Ham's!
Radio amateur's!
Are you like me?
Love new technology?
(low on cash?)
Would love to operate DX on the HF bands but can't afford a rig? (i can't....)
Have I got the solution for you!
Ok - so it's not new - but it's new to ME... (which is odd.....)
Echo Link
Combining internet technology (and VoIP) and our broad radio spectrum...
Go read it - download the app and use it...
Look for me - N1GWF - and we can QSO!
TTYL
Radio amateur's!
Are you like me?
Love new technology?
(low on cash?)
Would love to operate DX on the HF bands but can't afford a rig? (i can't....)
Have I got the solution for you!
Ok - so it's not new - but it's new to ME... (which is odd.....)
Echo Link
Combining internet technology (and VoIP) and our broad radio spectrum...
Go read it - download the app and use it...
Look for me - N1GWF - and we can QSO!
TTYL
Tuesday, June 08, 2004
For your reading enjoyment: the latest Cyber Security Bulletin:
This will be my new feature... I'll post these as they come in.. as an FYI...
Technical Cyber Security Alert TA04-160A
SQL Injection Vulnerabilities in Oracle E-Business Suite
Original release date: June 8, 2004
Last revised: --
Source: US-CERT
Systems Affected
* Oracle Applications 11.0 (all releases)
* Oracle E-Business Suite 11i, 11.5.1 through 11.5.8
Overview
A vulnerability in the Oracle's E-Business Suite allows a remote
attacker to execute arbitrary script on a vulnerable database system.
Exploitation may lead to compromise of the database application, data
integrity, or underlying operating system.
I. Description
Oracle E-Business Suite is a set of applications and modules that
enables an organization to manage customer interactions, deliver
services, manufacture products, ship orders, collect payments, and
other tasks using a single database model.
According to the Oracle Security Alert 67, Oracle Applications 11.0
(all releases) and Oracle E-Business Suite Release 11i, 11.5.1 through
11.5.8 are vulnerable to SQL injection vulnerabilities. Oracle
E-Business Suite Release 11.5.9 and later are not vulnerable. This
vulnerability is not platform specific. Integrigy Corporation has also
released an alert about these vulnerabilities.
Note that no authentication mechanisms of Oracle E-Business Suite will
mitigate exploitation of the attack.
US-CERT is tracking this issue as VU#961579.
II. Impact
An unauthenticated attacker could exploit this vulnerability to
execute arbitrary SQL statements on the vulnerable system with the
privileges of the Oracle server process. In addition to compromising
the integrity of the database information, this may lead to the
compromise of the database application and the underlying operating
system.
III. Solution
Apply Patch or Upgrade
According to the Oracle Security Alert 67, patches and related
information are available from:
http://metalink.oracle.com/metalink/plsql/ml2_documents.showDocumen
t?p_database_id=NOT&p_id=274375.1
Appendix B. References
* http://otn.oracle.com/deploy/security/pdf/2004alert67.pdf
* http://www.integrigy.com/alerts/OraAppsSQLInjection.htm
* http://www.kb.cert.org/vuls/id/961579
_________________________________________________________________
US-CERT thanks Stephen Kost of Integrigy Corporation for reporting
this problem and for information used to construct this advisory.
_________________________________________________________________
Feedback can be directed to the author: Jason A. Rafail
_________________________________________________________________
The latest version of this document can be found at:
_________________________________________________________________
Copyright 2004 Carnegie Mellon University.
Terms of use:
_________________________________________________________________
Revision History
June 8, 2004: Initial release
This will be my new feature... I'll post these as they come in.. as an FYI...
Technical Cyber Security Alert TA04-160A
SQL Injection Vulnerabilities in Oracle E-Business Suite
Original release date: June 8, 2004
Last revised: --
Source: US-CERT
Systems Affected
* Oracle Applications 11.0 (all releases)
* Oracle E-Business Suite 11i, 11.5.1 through 11.5.8
Overview
A vulnerability in the Oracle's E-Business Suite allows a remote
attacker to execute arbitrary script on a vulnerable database system.
Exploitation may lead to compromise of the database application, data
integrity, or underlying operating system.
I. Description
Oracle E-Business Suite is a set of applications and modules that
enables an organization to manage customer interactions, deliver
services, manufacture products, ship orders, collect payments, and
other tasks using a single database model.
According to the Oracle Security Alert 67, Oracle Applications 11.0
(all releases) and Oracle E-Business Suite Release 11i, 11.5.1 through
11.5.8 are vulnerable to SQL injection vulnerabilities. Oracle
E-Business Suite Release 11.5.9 and later are not vulnerable. This
vulnerability is not platform specific. Integrigy Corporation has also
released an alert about these vulnerabilities.
Note that no authentication mechanisms of Oracle E-Business Suite will
mitigate exploitation of the attack.
US-CERT is tracking this issue as VU#961579.
II. Impact
An unauthenticated attacker could exploit this vulnerability to
execute arbitrary SQL statements on the vulnerable system with the
privileges of the Oracle server process. In addition to compromising
the integrity of the database information, this may lead to the
compromise of the database application and the underlying operating
system.
III. Solution
Apply Patch or Upgrade
According to the Oracle Security Alert 67, patches and related
information are available from:
http://metalink.oracle.com/metalink/plsql/ml2_documents.showDocumen
t?p_database_id=NOT&p_id=274375.1
Appendix B. References
* http://otn.oracle.com/deploy/security/pdf/2004alert67.pdf
* http://www.integrigy.com/alerts/OraAppsSQLInjection.htm
* http://www.kb.cert.org/vuls/id/961579
_________________________________________________________________
US-CERT thanks Stephen Kost of Integrigy Corporation for reporting
this problem and for information used to construct this advisory.
_________________________________________________________________
Feedback can be directed to the author: Jason A. Rafail
_________________________________________________________________
The latest version of this document can be found at:
_________________________________________________________________
Copyright 2004 Carnegie Mellon University.
Terms of use:
_________________________________________________________________
Revision History
June 8, 2004: Initial release
Saturday, June 05, 2004
Friday, June 04, 2004
IA Revolution - Welcome to the Instant Access Revolution!
This software BOTHERS me...
I have since sent an email to the Tech Support people to get some more info...
Charging $40 for something that can be accomplished for Free?
And then add the MLM feature for distribution... Adds to the fun!
More in a bit.
This software BOTHERS me...
I have since sent an email to the Tech Support people to get some more info...
Charging $40 for something that can be accomplished for Free?
And then add the MLM feature for distribution... Adds to the fun!
More in a bit.
Sunday, May 02, 2004
Tuesday, April 27, 2004
Saturday, April 17, 2004
Whatta day..
Go do yourself a flavor..
Sign it...
You'll enjoy it..
Bring Chris back...! more often!
Go do yourself a flavor..
Sign it...
You'll enjoy it..
Bring Chris back...! more often!
Friday, April 16, 2004
Nice Friday...
3 kids - all in bed...!
cool.
other cool newz:
Yay 4 Leo! - We CAN make a difference!
3 kids - all in bed...!
cool.
other cool newz:
Yay 4 Leo! - We CAN make a difference!
Thursday, April 15, 2004
Monday, April 12, 2004
Sunday, April 11, 2004
Who was Mary Magdalene - really...?
Watch: Quest for Truth
I'm thinking... She was a disciple...
Prove me wrong! - Not gonna happen.
Watch: Quest for Truth
I'm thinking... She was a disciple...
Prove me wrong! - Not gonna happen.
Wednesday, April 07, 2004
Like the Google thing..
however - this is Live...
1GB of email storage... For those MAC fans! yay!
Nice... And Mac related too!
however - this is Live...
1GB of email storage... For those MAC fans! yay!
Nice... And Mac related too!
Friday, April 02, 2004
Leo - Thanks for the great memories!!
And here's to more - via radio and wherever!
End Of The Line.
And thus ends my viewing of TechTV... for the most part...
And here's to more - via radio and wherever!
End Of The Line.
And thus ends my viewing of TechTV... for the most part...
Thursday, April 01, 2004
LOL
Some thought it was a joke - but it wasn't
Gmail - from Google is true...
From Computer World
However - this looks like a great job!
Google Job Opening
C ya
Some thought it was a joke - but it wasn't
Gmail - from Google is true...
From Computer World
However - this looks like a great job!
Google Job Opening
C ya
Wednesday, March 31, 2004
Go get 'em!
Attacking AT&T
RFID...
I like the concept...
Big players are lining up...
Oracle...
Other news?
Nothing much today.
Ciao
Attacking AT&T
RFID...
I like the concept...
Big players are lining up...
Oracle...
Other news?
Nothing much today.
Ciao
Tuesday, March 30, 2004
I'm annoyed...
The start of something new?
or the end of something good..
You decide...
TechTV + G4 =??
Looks like I'll be changing the channel soon...
It's not that I'm anti-gaming! I like games... But I'm more a tech-head...
So this news was not as bad after all:
Leo? Leo? Paging Leo
Well... I did find something interesting...
TiVo-like for Radio
So I can at least catch Mr. Laporte's show on the weekend - yes!
The start of something new?
or the end of something good..
You decide...
TechTV + G4 =??
Looks like I'll be changing the channel soon...
It's not that I'm anti-gaming! I like games... But I'm more a tech-head...
So this news was not as bad after all:
Leo? Leo? Paging Leo
Well... I did find something interesting...
TiVo-like for Radio
So I can at least catch Mr. Laporte's show on the weekend - yes!
Tuesday, March 02, 2004
Subscribe to:
Posts (Atom)
Followers
Blog Archive
-
▼
2004
(40)
- ► 09/19 - 09/26 (3)
- ► 06/20 - 06/27 (2)
- ► 06/13 - 06/20 (2)
- ► 06/06 - 06/13 (5)
- ► 05/30 - 06/06 (3)
-
►
04/11 - 04/18
(8)
- Whatta day.. Go do yourself a flavor.. Sign it.....
- hmm... Works for me! ;>> Welcome back Chris! Da...
- Nice Friday... 3 kids - all in bed...! cool. ot...
- Home Again... We're back... Its been a loooong w...
- Kaleigh Rose Stats: 1:44PM 6lb14oz 19" All cu...
- Getting ready to go.. to the Hospital... Kaleigh ...
- Happy Easter!! More info: Easter Story Have a G...
- Who was Mary Magdalene - really...? Watch: Quest ...
- ► 04/04 - 04/11 (2)
-
►
03/28 - 04/04
(6)
- Leo - Thanks for the great memories!! And here's ...
- very quickly... What the... Leo? Where r u goin...
- Here's some interesting stats! Eight months, one ...
- LOL Some thought it was a joke - but it wasn't G...
- Go get 'em! Attacking AT&T RFID... I like the c...
- I'm annoyed... The start of something new? or t...
-
►
2003
(34)
- ► 12/14 - 12/21 (1)
- ► 12/07 - 12/14 (1)
- ► 09/21 - 09/28 (1)
- ► 09/14 - 09/21 (1)
- ► 09/07 - 09/14 (1)
- ► 08/10 - 08/17 (1)
- ► 08/03 - 08/10 (1)
- ► 07/27 - 08/03 (3)
- ► 07/20 - 07/27 (3)
- ► 07/13 - 07/20 (5)
- ► 07/06 - 07/13 (1)
- ► 06/22 - 06/29 (1)
- ► 06/15 - 06/22 (4)
- ► 05/25 - 06/01 (3)
- ► 05/18 - 05/25 (3)
- ► 05/11 - 05/18 (2)
- ► 05/04 - 05/11 (2)