Tasking

Tasking

Thursday, August 3, 2017

Karma's Slow Moving Process

First read through these stories; https://didyouknowfacts.com/19-true-stories-slow-burning-karma-turning-total-bitch/

The main focus is that the bullies in life "suffer in death" and it won't be fast. Karma is wracking up. It is there in all of nature. That's how I will teach you, my readers, how Karma comes, whether by disease or other factors, bullies never truly escape justice. No matter what form it comes in.

You may think that it's an isolated phenomena but that's because it's misunderstood. Call it witchcraft, call it voodoo, but whatever you call it, know that it is REAL! And Karma does slowly kill nature's enemies. Especially those who do cruel acts against the innocent. Namely animals. Sometimes Karma is instant but 99% of the time it is slow. It won't be fast. But be vigilant that it is in progress.


Wednesday, March 2, 2016

How One Anon Can Be An Army

With technology enabling all kinds of devices to become multi-taskers within themselves, tech is used to create a greater illusion of reality bent if used in ways that it wasn't normally intended for.

Take the case of the standard iphone. It can be used in ways that back then only the www could have offered. The average iphone can truly be used to create the illusion that you have a network of hundreds of people while in reality you'd be just one single individual. But that scale of network takes a lot of work. A lot. But it can be done, making you seem a lot bigger of a base or group of people than there really is.

Samuel Holt Gird of the now infamous Winnowars of the online gaming community (now defunct) was the sole engineer of this use of technology. He had set up literally hundreds of accounts which asked for a mobile number and used only one phone to do. He had set up a series of numbers that he rerouted through his carrier with cards he'd obtained from various vendors. Then he'd set up the numbers on the phone itself as if it were being activated for the first time. Then enter a desired number and boom like that, he'd have a brand new number until the card's time ran out. He'd buy around a dozen 10 minute cards (10 min is the lowest amount of time that a card can go) and he'd get to work setting up numerous gaming accounts and rack up those points which in turn racked up bitcoins.

He was caught doing so when he'd foolishly told another gamer the secret. And well, loose lips and all that.

Another case involved a bitchy neighbor bitty who'd watch her neighbors come and go about their daily business waiting for any sign of wrongdoing so she could rat them out to the equally old and bitter landlord. And since the age of cell phones, and iphones today, it's very rare that a landowner would know the cell number of each family member of any given caller.

Although this bitchy neighbor didn't go to the lengths of our esteemed Mr Holt Gird, she was able to deceive the landlord enough that he went after an innocent man because she didn't like him feeding the birds, in this case, the seagulls that flew around his apartment corner as it looked out over the San Diego coastline. He had built a rather large shelter atop many rungs as perches for them during storms and heavy sea tides as the area was prone to. The seagulls would always cone to the structure he'd built and of course, they can get loud. But living near the sea it just goes with the territory. This man had also a great knowledge of the gulls because he had built it on a flight path where they could gather and ride out rough weather.

The crazy old bat who didn't like the sound of gulls crying used her phone to make complaints to their landlord and then she'd use the phones of other family members to lodge complaints against the birdman as well. Making it appear that there were more calls than there actually were. Although it's quite possible that the other phone owners didn't know this was going on, the landlord never made any call backs to confirm if these complaints were legitimate. It just simply never occurred to him that this could be done. Of course the landlord paid our birdman a visit and really put him through some shit. It was discovered that the complaints were bogus when the old bat didn't like that the birdman was still living there and set about causing him more trouble by asking other people in the complex to loan her their phones for a few minutes because hers was "out of juice" and that it was an emergency. One other resident loaned her the phone but then immediately checked the history of the call made and noticed that the number was for the landowner. When that was seen, the owner of the phone called him back and asked what was said. Describing the situation, the landlord soon got an earful.

The vigilant phone owner then explained she's never had any problem the birdman.

And the landlord caught on that his old bat tenant was behind all the complaints and he then made a practice of always confirming where all calls came from.







Wednesday, April 15, 2015

Critical Updates for Windows, Flash, Java

Get your patch chops on people, because chances are you’re running software from Microsoft, Adobe or Oracle that received critical security updates today. Adobe released a Flash Player update to fix at least 22 flaws, including one flaw that is being actively exploited. Microsoft pushed out 11 update bundles to fix more than two dozen bugs in Windows and associated software, including one that was publicly disclosed this month. And Oracle has an update for its Java software that addresses at least 15 flaws, all of which are exploitable remotely without any authentication.

Adobe’s patch includes a fix for a zero-day bug (CVE-2015-3043) that the company warns is already being exploited. Users of the Adobe Flash Player for Windows and Macintosh should update to Adobe Flash Player 17.0.0.169 (the current versions other OSes is listed in the chart below).
If you’re unsure whether your browser has Flash installed or what version it may be running, browse to this link. Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x, should automatically update to version 17.0.0.169.

Google has an update available for Chrome that fixes a slew of flaws, and I assume it includes this Flash update, although the Flash checker pages only report that I now have version 17.0.0 installed after applying the Chrome update and restarting (the Flash update released last month put that version at 17.0.0.134, so this is not particularly helpful). To force the installation of an available update, click the triple bar icon to the right of the address bar, select “About Google” Chrome, click the apply update button and restart the browser.

The most recent versions of Flash should be available from the Flash home page, but beware potentially unwanted add-ons, like McAfee Security Scan. To avoid this, uncheck the pre-checked box before downloading, or grab your OS-specific Flash download from here. Windows users who browse the Web with anything other than Internet Explorer may need to apply this patch twice, once with IE and again using the alternative browser (Firefox, Opera, e.g.).
Microsoft has released 11 security bulletins this month, four of which are marked “critical,” meaning attackers or malware can exploit them to break into vulnerable systems with no help from users, save for perhaps visiting a booby-trapped or malicious Web site. The Microsoft patches fix flaws in Windows, Internet Explorer (IE), Office, and .NET
The critical updates apply to two Windows bugs, IE, and Office. .NET updates have a history of taking forever to apply and introducing issues when applied with other patches, so I’d suggest Windows users apply all other updates, restart and then install the .NET update (if available for your system).

Credits:  Krebs

Thursday, May 8, 2014

Some Good Advice

Beware of Free Movie Download Sites

The rip-off: When a much anticipated flick is about to hit movie theaters, cyber-criminals take advantage of the buzz by promising eager fans sneak previews or even free downloads of the entire film. You may stumble onto come-ons like these simply by googling the name of the film.


The tip-off: If you click to view a streaming movie trailer or download a film, you may first be prompted to type in your e-mail address, thereby giving fraudsters your personal contact information. But that’s not the worst of it. While the clip or the download plays, your computer can be infected with a key logger that keeps track of your individual keystrokes and sends them electronically to the scammer, says Loren Spallina, a support specialist with the security-software maker PC Tools. From that point on, when you check your online bank or credit-card account, you may be handing a con artist your log-in name and password.

How to protect yourself: Be suspicious of any site that promises free downloads of new films (unless you’re dealing with the movie’s official website) or that requests personal information, says Spallina. If you do decide to download files that offer film trailers or previews, always scan them for viruses before opening them.

Wednesday, March 19, 2014

The Geeky Side

The Alien Geeky Guy from Weird Al's U.H.F.

Secrets of the Universe

Today we are going to learn to make plutonium from common household items.

Monday, August 12, 2013

Some of the Biggest Forums have Little Secrets

Take for example the message boards of huge providers like phpBB and vBulletin.
These are perhaps the most widely used of all other forums but other sites employ some of their own. For example proboards is one but highly an unreliable source due to the strict nature of a team looking only to have under-aged users supply content and limited Disney 13 and under set of guidelines. There's also the InvisionFree, Network54, and various coms to name but a few of the widely used platforms.

 There's also the huge message board system designed by the International Movie Database.
The secrets of these platforms aren't so much secret as they are a double offering of free account management and paid for services. For instance with the last mentioned forum platform they have the regular use forums and another entirely hidden yet fully functional Pro Version.
It is said that if a member has been on their database for a long enough period of time, they could access the Pro forums without having to pay for the use of those hidden communities that no doubt would be more closely watched by the team that monitors the entire database.
But this is just a rumor I heard and wouldn't know if it's actually true or not. The link here seems to work for those who do have already existing and older accounts. More or less it's simply a workaround for those who don't know about this feature.

The forum giants of the vBulletin platform are far more advanced than they were five years ago and that is where the recent crop of secret and hidden forum offerings have been abounding in network circles.

The secret of the vBulletin workaround is to apply a sub group within the forum itself, if done by a member, and the group has the heading close enough to the name of the forum as a whole, that member has access to moderator functions of the entire forum. Right now there doesn't seem to be a patch for this and so the workaround is there for anyone who happens to know about it.
The big secret with phpBB is pretty much the same as the vBulletin loop, but in this instance, you create a board within an already existing block of topics which is granted as an extra automatic privilege depending on the length of time that member has been there. Of course, with that in mind, it would stand to reason that a long term member would not exploit such a hole in security, but that hole does exist nonetheless.

Sunday, June 16, 2013

The Forum Exchange

I have been refreshing all my favorite links over the years and realized in my tidying up that some of my forums had been moved or altered and I had missed a good deal of what happened to one particular one I liked visiting when I had the time. I can't believe I missed all the events that unfolded in 2008. But here is the article I posted to the now-defunct Art News which disappeared entirely. Luckily enough I saved it.

Jasy is a name for a genre based string of forums dedicated to movies and TV shows. Depending on the genre, they have a forum for each. Drama, Comedy, Sci-Fi, Horror, you name it they got it. Some TV shows are so popular that they dedicated a forum for just that TV show. But sometime around 2008 they had been heavily targeted by spammers taking advantage of the login system which allows login from other social media and networks. While the same protocols are still intact, they have made their boards private and taken any trace of their existence off search engines until such time they feel safe in becoming public again. Drastic measures because the spam had nearly crippled their servers.

Depending on how long your membership was or how long you've had another account on another site may determine if you gain access or not. If you were already a member, you should be able to login given their servers aren't down or in maintenance. Jasy began originally as an art sharing site featuring artworks by the general public who created works of art based on movie scenes, poster art, and the like. Their first 5 contest winners over a 5 year period featured a piece from Lawrance of Arabia, one piece from The Exorcist, one featuring all six Star Wars movies into one giant poster, one was a 3D model of Jaws complete with a swimming shark and a mealtime human and one featuring the Terminator with laser-pointer eyes. Trademarked as Jasy's Concepts.