<?xml version='1.0' encoding='utf-8' ?>

<rss version='2.0' xmlns:lj='http://www.livejournal.org/rss/lj/1.0/' xmlns:atom10='http://www.w3.org/2005/Atom'>
<channel>
  <title>charisstoma</title>
  <link>https://charisstoma.dreamwidth.org/</link>
  <description>charisstoma - Dreamwidth Studios</description>
  <lastBuildDate>Sat, 16 May 2020 08:07:59 GMT</lastBuildDate>
  <generator>LiveJournal / Dreamwidth Studios</generator>
  <lj:journal>charisstoma</lj:journal>
  <lj:journaltype>personal</lj:journaltype>
  <image>
    <url>https://v2.dreamwidth.org/797681/770417</url>
    <title>charisstoma</title>
    <link>https://charisstoma.dreamwidth.org/</link>
    <width>61</width>
    <height>100</height>
  </image>

<item>
  <guid isPermaLink='true'>https://charisstoma.dreamwidth.org/1616270.html</guid>
  <pubDate>Sat, 16 May 2020 08:07:59 GMT</pubDate>
  <title>Prompt - magic gone wrong?</title>
  <link>https://charisstoma.dreamwidth.org/1616270.html</link>
  <description>&lt;img src=&quot;https://i.chzbgr.com/full/9484777984/h9504DDD4/says-really-f-ed-up-this-time-thetygre-rolling-1-on-divination-check-puhity4-unity-4-unity-knect&quot; alt=&quot;crystal ball&quot; /&gt;&lt;br /&gt;&lt;br /&gt;Did it used to be a monitor?&lt;br /&gt;Oh the IT Dept is going to have a fit about this.&lt;br /&gt;&lt;br /&gt;For some of us computer tech is magic. There are spells you have to learn. useful example: ctrl/alt/delete&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=charisstoma&amp;ditemid=1616270&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://charisstoma.dreamwidth.org/1616270.html</comments>
  <category>academia</category>
  <category>computer</category>
  <category>wizards&apos; world</category>
  <category>prompt</category>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
<item>
  <guid isPermaLink='true'>https://charisstoma.dreamwidth.org/1596311.html</guid>
  <pubDate>Sun, 08 Mar 2020 06:26:53 GMT</pubDate>
  <title>Computers</title>
  <link>https://charisstoma.dreamwidth.org/1596311.html</link>
  <description>&lt;img src=&quot;https://www.fwisd.org/cms/lib/TX01918778/Centricity/Domain/160/ian-battaglia-9drS5E_Rguc-unsplash.jpg&quot; alt=&quot;computer system&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=charisstoma&amp;ditemid=1596311&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://charisstoma.dreamwidth.org/1596311.html</comments>
  <category>images</category>
  <category>computer</category>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
<item>
  <guid isPermaLink='true'>https://charisstoma.dreamwidth.org/1577413.html</guid>
  <pubDate>Fri, 11 Oct 2019 23:08:35 GMT</pubDate>
  <title>The Long Wait</title>
  <link>https://charisstoma.dreamwidth.org/1577413.html</link>
  <description>&lt;img src=&quot;https://dl-mail.ymail.com/ws/download/mailboxes/@.id==VjN-JRJJWT4Yp-fEuY_648p8Ure1AHRUcsIAuPZ0tG-am5L4rCzNUUOXA0xnHVScTCSmTJVJXmOu9vG5vVhaOWavzw/messages/@.id==ACZSe_5UX45cXaD6uQWxCMkFKe4/content/parts/@.id==2/raw?appid=YMailNorrinLaunch&amp;amp;ymreqid=e920c11b-03b6-b694-1cde-be0000011500&amp;amp;token=zitEzqOML3j84e6ealFTT5U7-km5qEQF52lp7AcCuBZzZNY-Xf0kYYvn917IVTbWk7C8d6vV8BmFKin8fYVlzZwOqFGudti0KsybFX4d8mjpmkTljuDgaBd660PhKPpq&quot; alt=&quot;waiting&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=charisstoma&amp;ditemid=1577413&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://charisstoma.dreamwidth.org/1577413.html</comments>
  <category>humor</category>
  <category>computer</category>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
<item>
  <guid isPermaLink='true'>https://charisstoma.dreamwidth.org/1521972.html</guid>
  <pubDate>Thu, 07 Mar 2019 18:37:26 GMT</pubDate>
  <title>How to Update Google Chrome 2018</title>
  <link>https://charisstoma.dreamwidth.org/1521972.html</link>
  <description>&lt;iframe width=&quot;560&quot; height=&quot;315&quot; src=&quot;https://www.youtube.com/embed/nzmxic8u_GE&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture&quot; allowfullscreen=&quot;allowfullscreen&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;&lt;br /&gt;This is more recent:&lt;br /&gt;The fix is included in Chrome 72.0.3626.121 for Android and desktop platforms.&lt;br /&gt;&lt;a href=&quot;https://www.androidpolice.com/2019/03/06/update-your-browser-right-now-google-releases-fix-for-zero-day-exploit-in-chrome/&quot;&gt;https://www.androidpolice.com/2019/03/06/update-your-browser-right-now-google-releases-fix-for-zero-day-exploit-in-chrome/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;And then there&apos;s...&lt;br /&gt;&lt;a href=&quot;https://www.welivesecurity.com/2019/03/07/latest-chrome-update-plugs-zero-day-hole/&quot;&gt;https://www.welivesecurity.com/2019/03/07/latest-chrome-update-plugs-zero-day-hole/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Google has revealed that the update for Google Chrome,  &lt;br /&gt;&lt;a href=&quot;https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop.html&quot;&gt;https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop.html&lt;/a&gt;&lt;br /&gt;, rolled out late last week, addressed a security hole that attackers were already exploiting in the wild.&lt;br /&gt;&lt;br /&gt;“Google is aware of reports that an exploit for CVE-2019-5786 exists in the wild,” the company noted in an update on Tuesday after initially releasing the advisory last Friday. Also on Tuesday, a tweet by leading Chrome security engineer Justin Schuh added urgency to the issue: “[Like], seriously, update your Chrome installs… like right this minute”.&lt;br /&gt;&lt;br /&gt;The vulnerability that affects the browser in Windows, Mac, and Linux was reported by Clement Lecigne of Google’s Threat Analysis Group on February 27.&lt;br /&gt;&lt;br /&gt;The security hole is a “use-after-free” memory corruption bug in the browser’s FileReader API, a browser component intended to enable web apps to read locally stored files. That said, exploitation of the vulnerability can result in more damage than the API’s name might imply. As revealed by a note by the Center for Internet Security (CIS), attackers may ultimately be able to remotely execute arbitrary code on the targeted system:&lt;br /&gt;&lt;br /&gt;“Depending on the privileges associated with this application, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights,” reads the note. The zero-day can be triggered when a user is lured to a specially crafted web page.&lt;br /&gt;&lt;br /&gt;In light of all that, users are advised to update to Chrome version 72.0.3626.121 if they haven’t done so already. Arguably the easiest way to check if an update is pending is to type chrome://settings/help into the browser’s address bar and, if your browser is indeed out of date, follow the prompts.&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=charisstoma&amp;ditemid=1521972&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://charisstoma.dreamwidth.org/1521972.html</comments>
  <category>computer</category>
  <category>computer virus</category>
  <category>computer - fix</category>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
<item>
  <guid isPermaLink='true'>https://charisstoma.dreamwidth.org/1501605.html</guid>
  <pubDate>Thu, 18 Oct 2018 22:51:56 GMT</pubDate>
  <title>DNS not responding</title>
  <link>https://charisstoma.dreamwidth.org/1501605.html</link>
  <description>&lt;iframe width=&quot;560&quot; height=&quot;315&quot; src=&quot;https://www.youtube.com/embed/Q9xH3OJywl0&quot; frameborder=&quot;0&quot; allow=&quot;autoplay; encrypted-media&quot; allowfullscreen=&quot;allowfullscreen&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;&lt;br /&gt;Yes, yes... I know I won&apos;t be able to watch this if I&apos;ve no internet. &lt;br /&gt;But I can transcribe it later on another computer.&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=charisstoma&amp;ditemid=1501605&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://charisstoma.dreamwidth.org/1501605.html</comments>
  <category>computer</category>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
<item>
  <guid isPermaLink='true'>https://charisstoma.dreamwidth.org/1428711.html</guid>
  <pubDate>Fri, 16 Mar 2018 02:01:02 GMT</pubDate>
  <title>This is available to the public</title>
  <link>https://charisstoma.dreamwidth.org/1428711.html</link>
  <description>&lt;a href=&quot;https://www.us-cert.gov/ncas/alerts/TA18-074A&quot;&gt;https://www.us-cert.gov/ncas/alerts/TA18-074A&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Alert (TA18-074A)&lt;br /&gt;&lt;b&gt;&lt;big&gt;Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors&lt;/big&gt;&lt;/b&gt; Original release date: March 15, 2018&lt;br /&gt;&lt;br /&gt;&lt;u&gt;Systems Affected&lt;/u&gt;&lt;br /&gt;Domain Controllers&lt;br /&gt;File Servers&lt;br /&gt;Email Servers&lt;br /&gt;&lt;br /&gt;&lt;u&gt;Overview&lt;/u&gt;&lt;br /&gt;This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This alert provides information on Russian government actions targeting U.S. Government entities as well as organizations in the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors. It also contains indicators of compromise (IOCs) and technical details on the tactics, techniques, and procedures (TTPs) used by Russian government cyber actors on compromised victim networks. DHS and FBI produced this alert to educate network defenders to enhance their ability to identify and reduce exposure to malicious activity.&lt;br /&gt;&lt;br /&gt;DHS and FBI characterize this activity as a multi-stage intrusion campaign by Russian government cyber actors who targeted small commercial facilities’ networks where they staged malware, conducted spear phishing, and gained remote access into energy sector networks. After obtaining access, the Russian government cyber actors conducted network reconnaissance, moved laterally, and collected information pertaining to Industrial Control Systems (ICS).&lt;br /&gt;&lt;br /&gt;For a downloadable copy of IOC packages and associated files, see: &lt;i&gt;&lt;b&gt;Go to the original link above.&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;u&gt;Description&lt;/u&gt;&lt;br /&gt;Since at least March 2016, Russian government cyber actors—hereafter referred to as “threat actors”—targeted government entities and multiple U.S. critical infrastructure sectors, including the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors.&lt;br /&gt;&lt;br /&gt;Analysis by DHS and FBI, resulted in the identification of distinct indicators and behaviors related to this activity. Of note, the report Dragonfly: Western energy sector targeted by sophisticated attack group, released by Symantec on September 6, 2017, provides additional information about this ongoing campaign. [1] (link is external)&lt;br /&gt;&lt;br /&gt;This campaign comprises two distinct categories of victims: staging and intended targets. The initial victims are peripheral organizations such as trusted third-party suppliers with less secure networks, referred to as “staging targets” throughout this alert. The threat actors used the staging targets’ networks as pivot points and malware repositories when targeting their final intended victims. NCCIC and FBI judge the ultimate objective of the actors is to compromise organizational networks, also referred to as the “intended target.”&lt;span class=&quot;cut-wrapper&quot;&gt;&lt;span style=&quot;display: none;&quot; id=&quot;span-cuttag___1&quot; class=&quot;cuttag&quot;&gt;&lt;/span&gt;&lt;b class=&quot;cut-open&quot;&gt;(&amp;nbsp;&lt;/b&gt;&lt;b class=&quot;cut-text&quot;&gt;&lt;a href=&quot;https://charisstoma.dreamwidth.org/1428711.html#cutid1&quot;&gt;Read more...&lt;/a&gt;&lt;/b&gt;&lt;b class=&quot;cut-close&quot;&gt;&amp;nbsp;)&lt;/b&gt;&lt;/span&gt;&lt;div style=&quot;display: none;&quot; id=&quot;div-cuttag___1&quot; aria-live=&quot;assertive&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=charisstoma&amp;ditemid=1428711&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://charisstoma.dreamwidth.org/1428711.html</comments>
  <category>computer</category>
  <category>politics</category>
  <category>really real life</category>
  <category>real life</category>
  <category>warnings</category>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
<item>
  <guid isPermaLink='true'>https://charisstoma.dreamwidth.org/1423870.html</guid>
  <pubDate>Thu, 08 Mar 2018 14:34:39 GMT</pubDate>
  <title>Ah security</title>
  <link>https://charisstoma.dreamwidth.org/1423870.html</link>
  <description>Stolen from one of those places that takes money, who is one of those &apos;asking for a friend&apos; and helps keep me safe or pays me back. They&apos;ve treated me well.&lt;br /&gt;&lt;br /&gt;You’ve probably seen this phrase a bunch over the past few years: “Your password must contain one letter, one number, one symbol, a never-ending math equation and your DNA.”&lt;br /&gt;&lt;br /&gt;The key to more secure passwords — and more memorable ones — is to focus on length rather than complexity. Push out your password past 12 to 15 characters to outsmart cybercriminals who use automated programs to cycle through passwords. The longer the password, the harder it will be for them to crack the code. &lt;br /&gt;&lt;br /&gt;But make it easy by using a line from a favorite song or a quote from a movie. You can create a sentence about your family that will make you smile every time you use it.&lt;br /&gt;&lt;br /&gt;“Attackers have automated programs that combine dictionary words until they find the right pattern,” &lt;br /&gt;So mix in a number or a punctuation mark. “The key is to put it in a nonobvious place,” he says. “A period at the end of a sentence? Probably not a good idea. But a period between the first and second words is much better.” &lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;u&gt;Four More Sanity-Saving Tips for Passwords That Are Hard to Hack&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;1. &lt;b&gt;Don’t count on special characters to save you.&lt;/b&gt; You can throw a few hash marks or an exclamation point onto the end of a short password, but it’s still a short password, and that makes it easy to crack. Bottom line: A short but complex password isn’t as safe as a long one. &lt;br /&gt;&lt;br /&gt;2. &lt;b&gt;There’s safety in variety.&lt;/b&gt; Don’t use the same password for all your accounts unless you want that jerk who broke into your Facebook to have access to your bank account, too. &lt;br /&gt;&lt;br /&gt;3. &lt;b&gt;Set up a password safe.&lt;/b&gt; Free software programs such as Password Safe (Windows only) let users store all their passwords inside a single encrypted site protected by a master security code.&lt;br /&gt;&lt;br /&gt;4. &lt;b&gt;Two factors are better than one.&lt;/b&gt; For an extra layer of protection, use two-factor authentication if it’s available, which requires a code in addition to a password to access your accounts. A mobile app like VIP Access or Google Authenticator generates a unique code every 30 seconds. You have to enter the code when you log in to an account, so even if a crook has your password, he can’t access your account without the code.&lt;br /&gt;&lt;img src=&quot;https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcR6ABkeecekBbB4eoQuXpqSfkTFrinO51F71Dr9Hw9ctnUtr1RE&quot; alt=&quot;Garcia - Criminal Minds&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=charisstoma&amp;ditemid=1423870&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://charisstoma.dreamwidth.org/1423870.html</comments>
  <category>real life</category>
  <category>computer</category>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
<item>
  <guid isPermaLink='true'>https://charisstoma.dreamwidth.org/1278612.html</guid>
  <pubDate>Tue, 16 May 2017 18:56:36 GMT</pubDate>
  <title>When The Things Go Wrong</title>
  <link>https://charisstoma.dreamwidth.org/1278612.html</link>
  <description>Title: When Things Go Wrong&lt;br /&gt;Author: charisstoma&lt;br /&gt;Word count: 526&lt;br /&gt;And yes all this did happen.&lt;br /&gt;&lt;br /&gt;Two weeks ago the circulation system had gone down. That meant no books checked out except via the downloaded circulation program, named Remote Destiny. Yeah it was remote… far from reality remote and destiny …. Aaden rolled his eyes.&lt;br /&gt;&lt;br /&gt;Yesterday the powers that be had responded to the ransomware attacks that were going on globally and pushed through the patch to fix it. That patch gave you 15 minutes to save your work while it was downloading and then click, it restarted your computer. &lt;br /&gt;Why was there a restart button under the download progress bar if it automatically restarted right after the download finished?  Aaden sighed in remembrance because of course that was when teachers started sending students to the Library to return and check out books. Books that could have neither done to them, because the configure part of the download was as long and more aggravating than the tension of the download itself. Still if it did the trick … Please, please let it do the trick of protecting his computer.&lt;br /&gt;&lt;br /&gt;So at the end of the day, of the awful day of configuration, when the computer techs showed up and worse went into the closet to see where they were going to replace the computer hub, he knew that it was indeed the advent of the apocalypse. Okay maybe only the end of the school year’s approach. If ever there was going to be a time of things going wrong it seemed to always be at the time before the long summer vacation. Heaven forbid that the system come down and be fixed during the Summer Break when they could fix things without interfering with his Library’s circulation.&lt;br /&gt;&lt;br /&gt;It Is the apocalypse. &lt;br /&gt;Aaden looked at his circulation computer. They were supposed to have had it all done by 11:00 the night before. He had a computer that luckily had a tower. The other monitors were computer stations hooked into a server way away at another building. There was no internet access. The stations were boat anchors for all the good they could do. &lt;br /&gt;&lt;br /&gt;Aaden sighed, there wasn’t much else he could do. If he wanted to call someone to report a problem or contact a teacher to tell her that one of the Chromebook that was out to be fixed had been returned he couldn’t. Someone had thought it a great idea to have the computers and the phones linked on the same internet system. When one went down so did the other. You couldn’t use your personal mobile phone to call the office or any room in the building. The phone you were calling was not available… beep, beep, beep.&lt;br /&gt;&lt;br /&gt;Technology was a curse. An evil curse that suckered you into needing it, and then it didn’t work.  Someone needed to work on a foolproof spell to magically ensure that the technology continued to do what it was designed to do. And as soon as the phone/internet came back he’d research that magical business person. They Had Better Exist.&lt;br /&gt;&lt;br /&gt;On the other side of the world, Gervais felt a foreboding tingling. Someone was going to try to make him do the impossible.&lt;br /&gt;&lt;br /&gt;Part 2 &quot;&lt;a href=&quot;http://charisstoma.livejournal.com/1289081.html&quot;&gt;http://charisstoma.livejournal.com/1289081.html&lt;/a&gt;&quot;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://ucpcentralmn.org/wp-content/uploads/2015/12/desktop-computer.jpg&quot; alt=&quot;computer&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=charisstoma&amp;ditemid=1278612&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://charisstoma.dreamwidth.org/1278612.html</comments>
  <category>real life</category>
  <category>story</category>
  <category>computer</category>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
</channel>
</rss>
