> Coffee Drinkers...... Why do you drink coffee?
Because all of the cool kids do it.
i am asking because i don't get the appeal!.
(preface: at hospital today, can't leave floor to get another h20 bottle, just tried drinking coffee again for the first time in 14years).
.
> Coffee Drinkers...... Why do you drink coffee?
Because all of the cool kids do it.
like i dont have enough going on right now...my kitty is expecting and im not sure when she actually got pregnant but im thinking her due date might be around 5/10.
i have read online a bit about the process and i hope she can handle this.
i made a secure and private kittening box for her and she seems to like it in there with ripped up rags she can pile up into a nest.
When I was a kid our cat had kittens. Everything came out just find. (har har)
i got this from my cnet email.
mcafee's big blunder.
the reputation of software security vendors like mcafee hinges on their ability to keep customers out of harm's way.
I must admit that I feel for McAfee. Sort of like rooting for the underdog.
They have been fighting a loosing battle with Norton Anti Virus for many years. I'm afraid this might be the thing that finally puts them down.
they must be so proud, lol.. the funny thing is that the jw end-of-the-world-ists actually came from a branch of the previous failed bunch.
what losers!.
http://roadtickle.com/5-ends-of-the-world-that-came-and-went/.
One of my favorite quotes: "Throughout history countless numbers of people have predicted the end of the world and they all have one thing in common: They were all wrong."
http://www.youtube.com/watch?v=jzsg28jcrg8.
.
i'm sure you've seen this before, but i still laugh when i see it..
I suffer from Alien Penis Syndrome.
It just has a mind of it's own!
> Are you male or female?
Yes.
http://dogatar.com/a-terrible-mistake/.
.
.
http://www.physorg.com/print191140979.html.
researchers show how to use mobiles to spy on peopleapril 22nd, 2010 in technology / telecom.
(physorg.com) -- researchers have demonstrated how it is possible to use gsm (global system for mobile communications) data along with a few tools to track down a persons mobile phone number and their location, and even listen in on calls and voicemail messages.. independent researcher nick depetrillo and security consultant don bailey demonstrated their system at the source boston security conference earlier this week.
http://www.physorg.com/print191140979.html
April 22nd, 2010 in Technology / Telecom
(PhysOrg.com) -- Researchers have demonstrated how it is possible to use GSM (Global System for Mobile communications) data along with a few tools to track down a person’s mobile phone number and their location, and even listen in on calls and voicemail messages.
Independent researcher Nick DePetrillo and security consultant Don Bailey demonstrated their system at the SOURCE Boston security conference earlier this week. Using information from the GSM network they could identify a mobile phoneuser’s location, and they showed how they could easily create dossiers on people’s lives and their behavior and business dealings. They also demonstrated how they were able to identify a government contractor for the US Department of Homeland Security through analyzing phone numbers and caller IDs.
Bailey and DePetrillo’s demonstration showed up inherent weaknesses in the way mobile providers expose interfaces to each other to interoperate over the GSM infrastructure. They used the Home Location Registry (HLR) and GSM provider caller ID database, along with some of their own tools and voicemail-hacking techniques.
Their technique was to first obtain their victim’s mobile phone number from the ID database, and they used an open-source PBX program to automate phone calls to themselves, which triggered the system to force a name lookup. They could then associate the name information with the phone number in the caller ID database. Their next step was to match the phone number with the location using HLR, which logs the whereabouts of numbers to allow networks to hand calls off to each other. Individual phones are logged to a register of mobile switching centers within specific geographic regions. DePetrillo said he was even able to watch a phone number moving to a different mobile switching center, regardless of where in the world they were located.
The pair were even able to track a journalist who interviewed an informant in Serbia and then traveled back to Germany, and they also obtained the informant’s phone number. DePetrillo said it was also a simple matter to access voicemail without the phone ringing by making two almost simultaneous calls; the first disconnects before it is picked up, and the second goes into voicemail.
The researchers have not released details of the tools they developed, and have alerted the major GSM carriers about their results. Bailey said the carriers were “very concerned,” but mitigating these sorts of attacks would not be easy. In the meantime there is little mobile phone users can do to protect themselves short of turning off their phones. Indications of an attack might include the phone calling itself, or the phone suddenly calling someone by itself, but most attacks would produce no signs visible to the phone user.
DePetrillo said some of their research scared them, since they were able to track important people who were themselves protected by high security measures by tracking people close to them, such as congressional aides, who were not under high security. He also said the attacks they demonstrated could be made on corporations as well as individuals, and corporations would be well advised to look at the security policies they have in place, especially for their executives.
Bailey said their system is not illegal and does not breach the terms of service.
© 2010 PhysOrg.com
"Researchers show how to use mobiles to spy on people." April 22nd, 2010. www.physorg.com/news191140979.html
it was said that i "brought this family into the truth".. i'm happy to report that this woman and her eldest son no longer go.
i heard the other former bethelite children no longer want to converse with her.. i always knew at least, this woman would realize it wasn't the truth after all..
yay!!!
Clearly you are an ineffective teacher, otherwise she would still be in.
this is one of the most important concepts you could ever grasp.
unfortunately humans do not naturally understand this idea, so we need to throw in a bit of simple math to help us understand.. below is a series of videos that will help you understand.
yes, these are extraordinarily boring, but you will be a much better person for watching them.. .
Obey your furry little masters!