If reincarnation is real, I hope that I come back as a cheetah or a jaguar or some other fast and sexy jungle cat after I die. I already enjoy yawning, taking long naps and watching Animal Planet, so I imagine the transition wouldn’t be too stark. If I cannot be one of those things, though, my second choice might be to be a mediocre white man, just so that I finally know how it feels to never, ever, ever, ever, ever, ever, ever take responsibility for anything bad that happens to me. It’s too late to come back as Paul Smith, former chief of the Muse Township Volunteer Fire Department in Cecil, Pa. (which is in Washington County—approximately 45 minutes south of Pittsburgh), since he’s already alive and shit. But he would have been a perfect host! Smith made national news this week after posting on Facebook that Mike Tomlin “just added himself to the list of no good niggers”—a reaction to Tomlin’s decision to keep the Steelers in the … [Read more...] about Pittsburgh-Area Fire Chief Resigns After Calling Mike Tomlin the N-Word on Facebook, Blames His Racism on … the Media?
Just n case security
Between 1660 and 1669, a resident of London, Samuel Pepys, kept a diary. At the time, he was working for the Royal Navy as an administrator and ultimately became one of the most important civil servants of his age. That diary has become one of the most important historical documents of British history. What makes his diary important (and fascinating) to historians and scholars is that it forms a unique account of day-to-day life of someone who lived through that period. But it almost didn't happen. Pepys didn't keep his diary with any intention of having historians, scholars, and regular people read it 400 years after he wrote it. He wrote large sections of it in code. Given that it was never intended to be published, someone had to find it, realise its importantce, and then publish it. If that part hadn't happened, as a global society we would have lost something that aided our understanding of how we developed. A problem with history is that you never know who's going to be … [Read more...] about Does the NSA make the case for a “Beneficent Archivist”?
When disaster strikes the enterprise, zero-day vulnerabilities are sometimes at the heart of cyberattacks. In other scenarios, so-called N-days, or known bugs, are used as a way to tunnel into defenses if proper patch management has not been applied. Vendors use different tactics to find zero-days before they reach the hands of cyberattackers, including internal bug hunting for their products, testing, and bug bounties to offer financial rewards for external researchers who find and submit legitimate vulnerability reports. Once bugs have been found, security patches are developed which smooth over these problems in publicly-released software. Microsoft, Adobe, and Google are only a handful of many vendors which implement monthly to quarterly security updates, which then are automatically pushed to the public, or in the case of mobility vendors, made available for companies down the supply chain to release to their customers.Zimperium security researcher Nicolas Trippar told ZDNet that … [Read more...] about The race for N-days: Why millions of us are still vulnerable to known exploits
Security companies have entered a new era: Buy or be bought. Signs of the shift have appeared in a flurry of recent deals. Security giant Symantec is moving outside its niche with its pending purchase of storage maker Veritas Software. On the other side, networking company Cisco Systems and software giant Microsoft have snapped up fast-growing security companies, looking to give their own growth a boost. This push toward diversification, coming amid widespread consolidation in many areas of the tech industry, has investment bankers and analysts wondering whether companies that specialize purely in security products can continue to thrive. News.contextWhat's new:Companies outside the security market are snapping up players within, and security providers are reaching beyond their core markets with their own acquisitions. Bottom line: More stories on this topic "There's a debate whether the security market (will remain) its own market, over time--or will it be subsumed into two … [Read more...] about Security’s new deal
The iolo technologies company is best known for its do-all System Mechanic utility suite, which includes security protection and various other system-maintenance features. The new System Shield 3 Internet Security lets the security protection modules stand on their own, without the other various utilities. Your purchase allows installation on up to three computers running Windows 2000, XP, or Vista. This suite does include the basics—firewall, antivirus, and antispyware. But spam protection is absent, as are parental control and private data protection. In any case, my testing shows that, whether alone or as part of a larger suite, this is not the protection your system needs. SS3's bright and busy main window clearly shows the status of the program's different modules with color-coded heading bars. In addition to the expected green/yellow/red bars, it may show a gray heading if the feature isn't installed, or if it needs to perform analytical tests before reporting status. I … [Read more...] about System Shield 3 Internet Security