AMERICA

AMERICA
ONE NATION UNDER GOD!

Friday, October 30, 2009

Phobia:

I'm taking a big chance on this. Hopefully none of my readers will be negatively affected by these images. But please beware; someone some where in the world may be placed into a total, paralyzing panic, simply by viewing these images. Such is the nature of a true phobia.
PHOBIA: an anxiety disorder characterized by extreme and irrational fear, not simple dislike, of simple things or social situations.



Theatraphobia, an irrational fear of Theaters...

Tachophobia: An irrational fear of Speed.


Selenophobia: An irrational fear of the Moon.


Rhytiphobia: An irrational fear of Getting Wrinkles.


Placophobia: An irrational fear of Tombstones.


Pediophobia: An irrational fear of Dolls.


Ornithophobia: An irrational fear of Birds.


Orphidiophobia: An irrational fear of Snakes.


Omphalophobia: An irrational fear of Belly Buttons.


Nephophobia: An irrational fear of Clouds.


Myrmecophobia: An irrational fear of Ants.


Metrophobia: An irrational fear of Poems.


Lutraphobia: An irrational fear of Otters.


Nephophobia: An irrational fear of Lakes.


Lepidopterophobia: An irrational fear of Moths and Butterflies.


Gephyrophobia: An irrational fear of Crossing Bridges.


Geniophobia: An irrational fear of Chins.


Gallophobia: An irrational fear of France or French culture.


Dendrophobia: An irrational fear of Trees.


Cyclophobia: An irrational fear of Bicycles.


Chorophobia: An irrational fear of Dancing.


Chiroptophobia: An irrational fear of Bats.


Chirophobia: An irrational fear of Hands.


Chionophobia: An irrational fear of Snow.


Catoptrophobia: An irrational fear of Mirrors.


Carnophobia: An irrational fear of Meat.


Caligyephobia: An irrational fear of Beautiful Women.


Aulophobia: An irrational fear of Flutes.



Arachnephobia: An irrational fear of Spiders.


Achridophobia: An irrational fear of Grasshoppers.

If you thought you had one of these Phobias, and you are still reading this; Congratulations, either you didn't have it or now you're cured.
HAPPY HALLOWEEN!

Classic Black Friday




My Classic Black Fridays are in homage to my fashionista mentor the NicNacManiac.
Check her pages daily for some of the most interesting fashion and decorating ideas on the web.

Wednesday, October 28, 2009

Thankful Thursday

The President of the United States in the name of the The Congress takes pride in presenting the MEDAL OF HONOR posthumously to

PRIVATE FIRST CLASS DANIEL D. BRUCE
UNITED STATES MARINE CORPS

for service as set forth in the following CITATION:

For conspicuous gallantry and intrepidity at the risk of his life above and beyond the call of duty while serving as a Mortar Man with Headquarters and Service Company, Third Battalion, Fifth Marines, First Marine Division, against the enemy in the Republic of Vietnam. Early on the morning of 1 March 1969, Private First Class Bruce was on watch in his night defensive position at Fire Support Base Tomahawk in Quang Nam Province when he heard movements ahead of him. An enemy explosive charge was thrown toward his position and he reacted instantly, catching the device and shouting to alert his companions. Realizing the danger to the adjacent position with its two occupants Private First Class Bruce Held the device to his body and attempted to carry it from the vicinity of the entrenched Marines. As he moved away, Private First Class Bruce's indomitable courage, inspiring valor and selfless devotion to duty saved the lives of three of his fellow Marines and upheld the highest traditions of the Marine Corps and the United States Naval Service. He gallantly gave his life for his country.

Wordless Wednesday

Monday, October 26, 2009

Manic Monday

What vital IT threat should I cover today? The latest email scam riding the ether is an e-mail pretending to come from the FBI or the Homeland Security department. It has various topics and contents. But they all include an attachment that is a malware, which will search through your computer looking for financial information, and will install a key-logger on your system. Your first suspicion should be to ask "Why is the FBI sending anything to me?" They won't. Unless you belong to a law enforcement department, and even then it's not likely. Please avoid the temptation to play Sherlock, and just delete it. The feds are already aware of this one. But if you would like to read something from the DHS, then by all means go here.




Do you recognize this little Gizmo? It has become ubiquitous in the IT world. They are relatively inexpensive, come in many sizes and shapes, will fit easily in your pocket and look like they belong in a 007 movie. They are just like bad advice; everybody has some. In fact they are so common place that most people are not suspicious of them.
However, not everyone shares this open trust. And rightly so. They are great for students to carry homework back and forth to school. And for people who want to bring work home and finish later. Unfortunately School computer networks are notoriously insecure. And these little FOBS can transport infected files everywhere they go. So when Junior brings his term paper home to work on over the weekend, he leaves something nasty on the PC that you are using to finish the cost analysis spreadsheet for your CFO. So the virus that was on the school's library computer last Thursday is now on the Corp Financial Officer's PC, today.
Sound a little far fetched? In my work I have actually had this very scenario play itself out. But this little tool has a far more sinister element. They can actually be configured to be a boot device.
Lets play a scenario. The year; 2009. The place; a corporate office in a large metropolitan area of the US. The players; CEO of the corp. And a young, hyper-intelligent IT specialist from the help desk.
The day starts like any other work day Friday. Except the CEO can't get into the secure server to retrieve files needed for the Board of Directors meeting tonight. The CEO 's admin assistant calls the help desk, all the triage questions are bypassed and an "Immediate Urgency" trouble ticket is issued. Since this is the CEO, the help desk assigns the best tech they have to the job. Credentials, degrees, and numerous accolades for superior performance of duty. The tech gathers the tools to get the job done and heads for the front office. The CEO is off to a downtown meeting, so the Admin Assistant allows the tech into the bosses office. The assistant was making online reservations for the bosses vacation plans next week, so he leaves the tech alone in the office.
The astute technician quickly discovers from the less than cryptic error message, the user permissions had been revoked from the CEO's account. Probably one of those silly jerks in the SYSADMIN group did a fat-finger on the keyboard yesterday. No time to wonder why? It's a case of do or die. The tech quickly restores the user access permissions to the CEO's account. But the only prudent thing to do is verify the access is working. So she uses the CEO's login to access the secure server. His corporate files are visible and the names of the files are very interesting. Especially the one named "LAYOFFS."
Temptation becomes desire. The consequences are weighted. She was logged in as thec CEO. So the file's access would show the CEO as the last opener. But the time/date stamp showed the file was last closed yesterday. If she opened it now it could be traced to her quit easily. So out comes the trusty thumb drive. It is attached to the lanyard hanging around her neck. She loads the drive into the USB slot and decides to take the contents of the entire directory. 7 Gig in all. There is plenty of room on the 16 Gig thumber. Wait! Someone might notice a trafic flow that big on the highspeed ethernet. But it's only 7:47 AM. Th network engineers are still in their daily morning meeting. And the only security guy here this time in the morning is out back smoking a cigarette. In fact he'll be there until 8:05 when the CSO shows up as per his ritual.
Seven minutes later Shelley the IT tech is back at her desk, with a copy of every file in the CEO's private directory. She opens the LAYOFFS file and third from the top, is her name. Now she feels justified for taking the other files also. Plus this explains the HR appointment on her calendar set for 3:00 PM today. Time is short. If she's being fired this afternoon, she has a lot of work to do.
These little tools pose such a serious security threat, many companies have forbidden their use. Some have taken a more drastic step, and have filled the USB slots on corp PCs with epoxy. There is another possible threat. If you use one of these little gems, besure to safe guard it. There are a couple of companies that manufacture secure thumb drives. But they are quite expensive and won't be found in the local Walmart. In many instances the data housed on a computer is far more valuable than the computer itself. If the data is placed on a device the size of your thumb, I don't need to go anywherenear your PC to steal its most valuable commodity.
'MEMER THIS: Security is inconvenient by its nature. And any new convenient device is bound to open a plethora of security issues.