Quote


“It’s very painful when you are attached to somebody like a brother or family, and you see that person on his last days,” McCollum said. “A lot of them don’t really want to die. … And it hurt me the most to see the state take somebody’s life, when they are committing murder their own self. But they don’t see it that way.”

~ Henry McCollum, released from NC prison after decades on death row

School Security


Today I can walk onto the campus of any college or university, and of most primary and secondary schools in the country as well, with little or no chance of being challenged or my progress impeded in any way that would be effective if I had slaughter on my mind. So can just about anyone else.

This state of affairs is as shameful as the refusal, in the 1970’s, of the Federal Aviation Administration to mandate reinforced cockpit doors on airliners.  That bit of foot-dragging to save the airlines money allowed the 9/11 tragedies to happen. When we invite people to walk into critical areas, we underwrite whatever happens next. We don’t do it in courthouses. We don’t do it in airports. Why in the name of heaven do we permit it at our schools?

Read more at What…Me Sober?

Florida leads U.S. in ethics offenses


The report concluded that Florida had 781 public corruption convictions between 2000 and 2010, tops in the nation. California and Texas were close behind, with New York fourth. But Florida’s corruptions history also contributed to it having three cities listed this year among Forbes magazine’s “most miserable,” with Miami No. 1, West Palm Beach No. 4 and Fort Lauderale No. 7.

http://www.palmbeachpost.com/news/news/state-regional-govt-politics/florida-leads-us-ethics-offenses/nPNyC/

Hacked!


This has happened to three people I know in the past two weeks.  Read the article.  It’s long.  Read it anyway.  If you don’t, then don’t whine when it happens to you.  It’s your own fault.

As email, documents, and almost every aspect of our professional and personal lives moves onto the “cloud”—remote servers we rely on to store, guard, and make available all of our data whenever and from wherever we want them, all the time and into eternity—a brush with disaster reminds the author and his wife just how vulnerable those data can be. A trip to the inner fortress of Gmail, where Google developers recovered six years’ worth of hacked and deleted e‑mail, provides specific advice on protecting and backing up data now—and gives a picture both consoling and unsettling of the vulnerabilities we can all expect to face in the future.

http://www.theatlantic.com/magazine/archive/2011/11/hacked/8673/1/?single_page=true

Mountain man frightens owners of remote Utah cabins


SALT LAKE CITY (AP) – He’s eluded authorities for more than five years, a mountain man who roams the wilderness of southern Utah, breaking into remote cabins in winter, living in luxury off hot food, alcohol and coffee before stealing provisions and vanishing into the woods.

Investigators have clawed for clues, scouring cabins for fingerprints that match no one and chasing reports of brief encounters only to come up short, always a step behind the mysterious recluse.

They’ve found abandoned camps, dozens of guns, high-end outdoor gear stolen from the homes and trash strewn around the forest floor.

But the man authorities say is armed and dangerous and responsible for more than two dozen burglaries has continued to outrun the law….  Read More…

So why do I need a long, complicated password, anyway?


With the amount of hacking and other shenanigans going on around the Web, the practice of using “strong passwords” is getting a lot of coverage.  A strong password can be loosely defined as a random string of at least 14 characters, using no words found in any dictionary, and a combination of upper- and lower-case letters, numerals and special characters (such as &, @, *, +,  = and so forth.

We need these strong passwords because it’s easy to download programs from the Web (no, I won’t tell you the sites) that use so-called “brute force” techniques to crack passwords.  This kind of attack simply tries out a lot of possible combinations of letters, numbers, words and so forth, continuing until it finds a combination that works.
You might think that’s ridiculous. “Heck,” you might say, “There are trillions of  possible combinations of the alphabet alone, and that’s without upper- and lower-case, numbers and special characters.  Having a program that could run all those combinations on a regular computer would be impossible.”

Wrong, Sunshine.  Dead wrong.  A character on a computer is made up of 8 “bits,” or 1 “byte.”  The little netbook I’m writing this on has a 1.5 GHz dual-core processor.  Theoretically, it can process three billion characters a second in various combinations.  (In fact, it’s limited by how well the program is written and several other factors, but it would still be plenty quick.)  Let’s say it could really check only half a billion combinations per second — probably low.  That means it could check a trillion combinations in about 33 minutes.  And this is a little netbook, folks.  Think what an 8-core water-cooled monster running at about 3 GHz, with maybe 64 gigs of RAM, could do with a really efficient program.  Or several of them running together.  That’s why we need strong passwords.
Hell, the Air Force builds supercomputers by stringing a bunch of PlayStations together!  You can buy a lot of computing power for the low five figures nowadays, and the people who steal information have plenty bucks, or rubles, or zlotneys, to throw around.

The bad guys’ job is also made immeasurably easier by our own laziness.  How long do you think it would take to run through a few thousand common pet names, or dates of birth, or…  Well, you get the idea.  Use Fluffy’s name and the day you got her if you like, but don’t think that password will inconvenience anyone but you.  In fact, don’t ever, ever use anything that can be linked to you personally.  If the bad guys come to call — or call on any of the folks on the Web who have your information (probably several hundred by now, if you’ve been online for a few years) — then your data is toast for their marmalade, baby.
Scared yet?  You’d better be.

So, back to strong passwords.  I’m going to show you how to create strong passwords that, while not easy to remember, won’t cause you to blow any aneurysms, especially if you use a password storage system like RoboLocker or LastPass.  With them you only need to remember one strong password.  They remember all the others, and will even populate the fields for you automatically, if you like.  In any case, however, you want to store them, here’s a way to create sp’s that are not only strong, but easy to remember if you have to.

You need two things: the URL of the site for which you’re creating the SW, and a phrase of about seven or eight words that you can’t possibly forget.  I’m going to use the URL of this site, “crackerboy.us,” and the phrase “everywhere that Mary went, the lamb was sure to go.”

First, we write down the first letters of our phrase, keeping capitalization and punctuation.  Be sure that you remember the caps and punctuation, especially if it’s poetry.  They can get sort of strange, and you don’t want confusion:
e   t   M   w   ,   t   l   w   s   t   g   . 
The spaces are for convenience.  Don’t use spaces in your passwords; some sites don’t like that.

Then we plug the first word of the URL, “crackerboy” in this case, into that line of letters:
e c  t M a W c , t l w s t g   .
That gives us ectrMaWc,ktelrwbsotyg.

There you go: a 22-digit password, not random but about the best next thing to it, one that you can recreate any time you might need to and that you don’t need to write down, the third Stupid Password Trick.

So, if I were using that combo as the password on this site (I don’t), I’d just type it in when prompted, my password manager (I use LastPass) would remember it for me along with my username, and log me in automatically.

Obviously, you don’t have to get this carried away if you don’t want to; I just did it to show you how you can create a long, kickass password with very little effort.  You can go even farther if you want, substituting 3’s for e’s, @’s for a’s, 0’s for o, and so forth.  The only thing you need is be consistent about how you do it.  Don’t get fancy with one site, then lazy with another, or you’ll spend a lot of time plugging in substitutions if you ever have to recreate it.

You can easily modify this basic idea to fit your own preferences.  For example, you can plug your phrase into the URL instead of the other way around, do half and half, or switch it around to suit yourself.

There are other ways to create passwords.  All the password managers (and you can see why you might want to consider one) have random password generators.  Trouble is, there is no way to recreate them if you need to, unless you’re a guy with a funny accent and a supercomputer.  This way will work, because those guys aren’t going to spend a lot of processing time on one name from one site.  They’ll have their machines programmed to spend x microseconds on each one, then move on to easier prey.  (If the NSA, FBI or CIA decides to check you out, you’re on your own.)

For more information about computer and Internet security, go here: http://www.cert.org/homeusers/HomeComputerSecurity/#intro

Redneck “justice” Georgia style. Welcome to the Jim Crow South, reloaded.


http://mobile.nytimes.com/article?a=843934&f=112⊂=Editorial

Posted from WordPress for Android