She organized my armoire last night, unbenounced to me. Which is awesome, for my OCD :pSent from my iPhone
for the full story, click here -> http://burkhart.bz/u9rsVh
Quoted from nbc4i.com:
COLUMBUS, Ohio --
By: Jason Mays
Published: October 24, 2011
Personnel in Port Columbus’ Traffic Control tower were evacuated Monday night after smoke was reported in the structure.
Officials say around 7 p.m. Monday the traffic control tower at Port Columbus was temporarily evacuated after a report of smoke coming from the vents.
The evacuation was for precautionary reasons only.
All personnel were accounted for.
No injuries were reported.
For additional information, stay with NBC4 and refresh nbc4i.com.
To submit a story idea or news tip, e-mail firstname.lastname@example.org.
Sent from my iPhone
Sent from my iPhone
Apple, you got some ‘splainin’ to do! But no, seriously, this is big. Mark Gurman, from 9to5mac, just posted a video showing how incredibly easy it is to unlock an iPad using just a Smart Cover (or magnets, really). Worse yet, it’s stupid easy to perform. Any Smart Cover could unlock any iPad 2 and jump into the last used screen. Not that I have anything to hide on my iPad. The only reason I use a passcode is to prevent my four-year old from messing up my Jelly Defense game.
This iPad security flaw joins the one concerning Siri found just the other day. In that case the voice tools allow users to send emails and place calls all while the phone is technically locked. Hopefully both flaws make their way to Apple HQ and it will be addressed immediately.
Started by Steve Jobs, Steve Wozniak, and Ronald Wayne, Apple has expanded from computers to consumer electronics over the last 30 years, officially changing their name from Apple Computer, Inc. to Apple, Inc. in January 2007. Among the key offerings from Apple’s product line are: Pro line laptops (MacBook Pro) and desktops (Mac Pro), consumer line laptops (MacBook) and desktops (iMac), servers (Xserve), Apple TV, the Mac OS X and Mac OS X Server operating systems, the iPod (offered with...
The state of hacked accounts
Original story Posted on 06 October 2011.- http://bit.ly/qzdGeF - with @commtouch
Most users get hacked at high rates even when they do not think they are engaging in risky behavior, with 62% unaware of how their accounts had been compromised, according to Commtouch.The increased preference for compromised accounts is illustrated by the graph below which compares the percentage of spam received over sample periods in Q2 and Q3 2011, where the “from” field includes “Gmail” or “Hotmail.”
The results of a survey presenting statistics on the theft, abuse and eventual recovery of Gmail, Yahoo, Hotmail and Facebook accounts, shows that:
“Commtouch’s poll reveals that more than two-thirds of all compromised accounts are used to send spam and scams,” said Amir Lev, Commtouch's CTO. “This is not surprising, as cybercriminals can improve their email delivery rates by sending from trusted domains such as Gmail, Yahoo, and Hotmail, and enhance their open and click-through rates by sending from familiar senders.”Each of the large Webmail providers (Gmail, Yahoo, Hotmail and Facebook) attracted in the range of 15 to 27% of the attention from cybercriminals. This demonstrates that the value of a compromised account is in the “clean” IP address, rather than the specific domain of the address. From this point of view, all accounts have a similar value since it is from a well-known domain. Among those who responded “other” were users of AOL, Comcast and several other providers.
It is not always easy to figure out how an account gets compromised and retracing steps doesn’t always help. None of the respondents believed they had been phished or had been victims of a drive-by download (by following a phony link). It is quite likely that many of the victims simply used easy-to-guess passwords. 15% recalled having used a public Internet terminal or public WiFi prior to the hack.
he majority of survey respondents – 62% – were not sure how their account was compromised, indicating that many people typically engage in risky online behavior without realizing it.
The complete report is available in PDF format here.
Legitimate user Webmail and Facebook accounts are a valuable prize for spammers and scammers. The use of these for spam and scams is expected to increase and users should therefore take basic precautions when they access these in public domains as well as observing sound password management.
Could I be more happy as a beer lover?
I have waited since I was of legal drinking age to have Yuengling for sale in Ohio... to save on gas, more than anything! No more drives, Friday, after work, for a short weekend in Pittsburgh or Huntington West Virginia. As of 10 am today, October 3rd 2001 I can now buy Yuengling in Columbus Ohio. To put it mildly, I am over the moon excited to initiate change for all the Bud Light (or as my friends and I call it "yellow pissy beer") drinkers in this fine state. Time to bring old, trusted flavor and body back to inexpensive beer. I will do my damnedest to convert all who drink the yellow pissy beer, one flavorful sip at a time. A good old... "give this a try" and a "go ahead and finish it, I'll grab another" and so on and so forth we crusade for the love of beer in America. That's how I see it...
follow our Yuengling release party pictures and video at http://BeerLovers.posterous.com