How to Update Google Chrome 2018
Mar. 7th, 2019 12:33 pmThis is more recent:
The fix is included in Chrome 72.0.3626.121 for Android and desktop platforms.
https://www.androidpolice.com/2019/03/06/update-your-browser-right-now-google-releases-fix-for-zero-day-exploit-in-chrome/
And then there's...
https://www.welivesecurity.com/2019/03/07/latest-chrome-update-plugs-zero-day-hole/
Google has revealed that the update for Google Chrome,
https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop.html
, rolled out late last week, addressed a security hole that attackers were already exploiting in the wild.
“Google is aware of reports that an exploit for CVE-2019-5786 exists in the wild,” the company noted in an update on Tuesday after initially releasing the advisory last Friday. Also on Tuesday, a tweet by leading Chrome security engineer Justin Schuh added urgency to the issue: “[Like], seriously, update your Chrome installs… like right this minute”.
The vulnerability that affects the browser in Windows, Mac, and Linux was reported by Clement Lecigne of Google’s Threat Analysis Group on February 27.
The security hole is a “use-after-free” memory corruption bug in the browser’s FileReader API, a browser component intended to enable web apps to read locally stored files. That said, exploitation of the vulnerability can result in more damage than the API’s name might imply. As revealed by a note by the Center for Internet Security (CIS), attackers may ultimately be able to remotely execute arbitrary code on the targeted system:
“Depending on the privileges associated with this application, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights,” reads the note. The zero-day can be triggered when a user is lured to a specially crafted web page.
In light of all that, users are advised to update to Chrome version 72.0.3626.121 if they haven’t done so already. Arguably the easiest way to check if an update is pending is to type chrome://settings/help into the browser’s address bar and, if your browser is indeed out of date, follow the prompts.
DNS not responding
Oct. 18th, 2018 05:51 pmYes, yes... I know I won't be able to watch this if I've no internet.
But I can transcribe it later on another computer.
This is available to the public
Mar. 15th, 2018 08:45 pmhttps://www.us-cert.gov/ncas/alerts/TA18-074A
Alert (TA18-074A)
Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors Original release date: March 15, 2018
Systems Affected
Domain Controllers
File Servers
Email Servers
Overview
This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This alert provides information on Russian government actions targeting U.S. Government entities as well as organizations in the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors. It also contains indicators of compromise (IOCs) and technical details on the tactics, techniques, and procedures (TTPs) used by Russian government cyber actors on compromised victim networks. DHS and FBI produced this alert to educate network defenders to enhance their ability to identify and reduce exposure to malicious activity.
DHS and FBI characterize this activity as a multi-stage intrusion campaign by Russian government cyber actors who targeted small commercial facilities’ networks where they staged malware, conducted spear phishing, and gained remote access into energy sector networks. After obtaining access, the Russian government cyber actors conducted network reconnaissance, moved laterally, and collected information pertaining to Industrial Control Systems (ICS).
For a downloadable copy of IOC packages and associated files, see: Go to the original link above.
Description
Since at least March 2016, Russian government cyber actors—hereafter referred to as “threat actors”—targeted government entities and multiple U.S. critical infrastructure sectors, including the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors.
Analysis by DHS and FBI, resulted in the identification of distinct indicators and behaviors related to this activity. Of note, the report Dragonfly: Western energy sector targeted by sophisticated attack group, released by Symantec on September 6, 2017, provides additional information about this ongoing campaign. [1] (link is external)
This campaign comprises two distinct categories of victims: staging and intended targets. The initial victims are peripheral organizations such as trusted third-party suppliers with less secure networks, referred to as “staging targets” throughout this alert. The threat actors used the staging targets’ networks as pivot points and malware repositories when targeting their final intended victims. NCCIC and FBI judge the ultimate objective of the actors is to compromise organizational networks, also referred to as the “intended target.”( Read more... )
Alert (TA18-074A)
Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors Original release date: March 15, 2018
Systems Affected
Domain Controllers
File Servers
Email Servers
Overview
This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This alert provides information on Russian government actions targeting U.S. Government entities as well as organizations in the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors. It also contains indicators of compromise (IOCs) and technical details on the tactics, techniques, and procedures (TTPs) used by Russian government cyber actors on compromised victim networks. DHS and FBI produced this alert to educate network defenders to enhance their ability to identify and reduce exposure to malicious activity.
DHS and FBI characterize this activity as a multi-stage intrusion campaign by Russian government cyber actors who targeted small commercial facilities’ networks where they staged malware, conducted spear phishing, and gained remote access into energy sector networks. After obtaining access, the Russian government cyber actors conducted network reconnaissance, moved laterally, and collected information pertaining to Industrial Control Systems (ICS).
For a downloadable copy of IOC packages and associated files, see: Go to the original link above.
Description
Since at least March 2016, Russian government cyber actors—hereafter referred to as “threat actors”—targeted government entities and multiple U.S. critical infrastructure sectors, including the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors.
Analysis by DHS and FBI, resulted in the identification of distinct indicators and behaviors related to this activity. Of note, the report Dragonfly: Western energy sector targeted by sophisticated attack group, released by Symantec on September 6, 2017, provides additional information about this ongoing campaign. [1] (link is external)
This campaign comprises two distinct categories of victims: staging and intended targets. The initial victims are peripheral organizations such as trusted third-party suppliers with less secure networks, referred to as “staging targets” throughout this alert. The threat actors used the staging targets’ networks as pivot points and malware repositories when targeting their final intended victims. NCCIC and FBI judge the ultimate objective of the actors is to compromise organizational networks, also referred to as the “intended target.”( Read more... )
Ah security
Mar. 8th, 2018 08:03 amStolen from one of those places that takes money, who is one of those 'asking for a friend' and helps keep me safe or pays me back. They've treated me well.
You’ve probably seen this phrase a bunch over the past few years: “Your password must contain one letter, one number, one symbol, a never-ending math equation and your DNA.”
The key to more secure passwords — and more memorable ones — is to focus on length rather than complexity. Push out your password past 12 to 15 characters to outsmart cybercriminals who use automated programs to cycle through passwords. The longer the password, the harder it will be for them to crack the code.
But make it easy by using a line from a favorite song or a quote from a movie. You can create a sentence about your family that will make you smile every time you use it.
“Attackers have automated programs that combine dictionary words until they find the right pattern,”
So mix in a number or a punctuation mark. “The key is to put it in a nonobvious place,” he says. “A period at the end of a sentence? Probably not a good idea. But a period between the first and second words is much better.”
Four More Sanity-Saving Tips for Passwords That Are Hard to Hack
1. Don’t count on special characters to save you. You can throw a few hash marks or an exclamation point onto the end of a short password, but it’s still a short password, and that makes it easy to crack. Bottom line: A short but complex password isn’t as safe as a long one.
2. There’s safety in variety. Don’t use the same password for all your accounts unless you want that jerk who broke into your Facebook to have access to your bank account, too.
3. Set up a password safe. Free software programs such as Password Safe (Windows only) let users store all their passwords inside a single encrypted site protected by a master security code.
4. Two factors are better than one. For an extra layer of protection, use two-factor authentication if it’s available, which requires a code in addition to a password to access your accounts. A mobile app like VIP Access or Google Authenticator generates a unique code every 30 seconds. You have to enter the code when you log in to an account, so even if a crook has your password, he can’t access your account without the code.

You’ve probably seen this phrase a bunch over the past few years: “Your password must contain one letter, one number, one symbol, a never-ending math equation and your DNA.”
The key to more secure passwords — and more memorable ones — is to focus on length rather than complexity. Push out your password past 12 to 15 characters to outsmart cybercriminals who use automated programs to cycle through passwords. The longer the password, the harder it will be for them to crack the code.
But make it easy by using a line from a favorite song or a quote from a movie. You can create a sentence about your family that will make you smile every time you use it.
“Attackers have automated programs that combine dictionary words until they find the right pattern,”
So mix in a number or a punctuation mark. “The key is to put it in a nonobvious place,” he says. “A period at the end of a sentence? Probably not a good idea. But a period between the first and second words is much better.”
Four More Sanity-Saving Tips for Passwords That Are Hard to Hack
1. Don’t count on special characters to save you. You can throw a few hash marks or an exclamation point onto the end of a short password, but it’s still a short password, and that makes it easy to crack. Bottom line: A short but complex password isn’t as safe as a long one.
2. There’s safety in variety. Don’t use the same password for all your accounts unless you want that jerk who broke into your Facebook to have access to your bank account, too.
3. Set up a password safe. Free software programs such as Password Safe (Windows only) let users store all their passwords inside a single encrypted site protected by a master security code.
4. Two factors are better than one. For an extra layer of protection, use two-factor authentication if it’s available, which requires a code in addition to a password to access your accounts. A mobile app like VIP Access or Google Authenticator generates a unique code every 30 seconds. You have to enter the code when you log in to an account, so even if a crook has your password, he can’t access your account without the code.
When The Things Go Wrong
May. 16th, 2017 01:53 pmTitle: When Things Go Wrong
Author: charisstoma
Word count: 526
And yes all this did happen.
Two weeks ago the circulation system had gone down. That meant no books checked out except via the downloaded circulation program, named Remote Destiny. Yeah it was remote… far from reality remote and destiny …. Aaden rolled his eyes.
Yesterday the powers that be had responded to the ransomware attacks that were going on globally and pushed through the patch to fix it. That patch gave you 15 minutes to save your work while it was downloading and then click, it restarted your computer.
Why was there a restart button under the download progress bar if it automatically restarted right after the download finished? Aaden sighed in remembrance because of course that was when teachers started sending students to the Library to return and check out books. Books that could have neither done to them, because the configure part of the download was as long and more aggravating than the tension of the download itself. Still if it did the trick … Please, please let it do the trick of protecting his computer.
So at the end of the day, of the awful day of configuration, when the computer techs showed up and worse went into the closet to see where they were going to replace the computer hub, he knew that it was indeed the advent of the apocalypse. Okay maybe only the end of the school year’s approach. If ever there was going to be a time of things going wrong it seemed to always be at the time before the long summer vacation. Heaven forbid that the system come down and be fixed during the Summer Break when they could fix things without interfering with his Library’s circulation.
It Is the apocalypse.
Aaden looked at his circulation computer. They were supposed to have had it all done by 11:00 the night before. He had a computer that luckily had a tower. The other monitors were computer stations hooked into a server way away at another building. There was no internet access. The stations were boat anchors for all the good they could do.
Aaden sighed, there wasn’t much else he could do. If he wanted to call someone to report a problem or contact a teacher to tell her that one of the Chromebook that was out to be fixed had been returned he couldn’t. Someone had thought it a great idea to have the computers and the phones linked on the same internet system. When one went down so did the other. You couldn’t use your personal mobile phone to call the office or any room in the building. The phone you were calling was not available… beep, beep, beep.
Technology was a curse. An evil curse that suckered you into needing it, and then it didn’t work. Someone needed to work on a foolproof spell to magically ensure that the technology continued to do what it was designed to do. And as soon as the phone/internet came back he’d research that magical business person. They Had Better Exist.
On the other side of the world, Gervais felt a foreboding tingling. Someone was going to try to make him do the impossible.
Part 2 "http://charisstoma.livejournal.com/1289081.html"

Author: charisstoma
Word count: 526
And yes all this did happen.
Two weeks ago the circulation system had gone down. That meant no books checked out except via the downloaded circulation program, named Remote Destiny. Yeah it was remote… far from reality remote and destiny …. Aaden rolled his eyes.
Yesterday the powers that be had responded to the ransomware attacks that were going on globally and pushed through the patch to fix it. That patch gave you 15 minutes to save your work while it was downloading and then click, it restarted your computer.
Why was there a restart button under the download progress bar if it automatically restarted right after the download finished? Aaden sighed in remembrance because of course that was when teachers started sending students to the Library to return and check out books. Books that could have neither done to them, because the configure part of the download was as long and more aggravating than the tension of the download itself. Still if it did the trick … Please, please let it do the trick of protecting his computer.
So at the end of the day, of the awful day of configuration, when the computer techs showed up and worse went into the closet to see where they were going to replace the computer hub, he knew that it was indeed the advent of the apocalypse. Okay maybe only the end of the school year’s approach. If ever there was going to be a time of things going wrong it seemed to always be at the time before the long summer vacation. Heaven forbid that the system come down and be fixed during the Summer Break when they could fix things without interfering with his Library’s circulation.
It Is the apocalypse.
Aaden looked at his circulation computer. They were supposed to have had it all done by 11:00 the night before. He had a computer that luckily had a tower. The other monitors were computer stations hooked into a server way away at another building. There was no internet access. The stations were boat anchors for all the good they could do.
Aaden sighed, there wasn’t much else he could do. If he wanted to call someone to report a problem or contact a teacher to tell her that one of the Chromebook that was out to be fixed had been returned he couldn’t. Someone had thought it a great idea to have the computers and the phones linked on the same internet system. When one went down so did the other. You couldn’t use your personal mobile phone to call the office or any room in the building. The phone you were calling was not available… beep, beep, beep.
Technology was a curse. An evil curse that suckered you into needing it, and then it didn’t work. Someone needed to work on a foolproof spell to magically ensure that the technology continued to do what it was designed to do. And as soon as the phone/internet came back he’d research that magical business person. They Had Better Exist.
On the other side of the world, Gervais felt a foreboding tingling. Someone was going to try to make him do the impossible.
Part 2 "http://charisstoma.livejournal.com/1289081.html"

Cloudbleed
Mar. 1st, 2017 10:15 pmhttp://www.sciencealert.com/here-s-what-you-need-to-know-about-the-massive-cloudbleed-data-breach
Here's What You Need to Know About the Massive 'Cloudbleed' Data Breach
Now's a good time to change some passwords.
PETER DOCKRILL 27 FEB 2017
A huge data breach that may have exposed users' private information and log-in details for thousands of websites was uncovered last week, in what looks to be the most significant internet leak of 2017 so far.
Dubbed 'Cloudbleed' in reference to the notorious 'Heartbleed' breach in 2014, the leak stems from a bug found in code operated by web infrastructure company Cloudflare, which provides security and hosting services for thousands of major internet sites.
Some of these clients are big-name web companies – including Uber, Yelp, Fitbit, and OkCupid – and due to a tiny but significant error in some of Cloudflare's code, sensitive user information from some of these sites was being randomly inserted into web pages when visited by other people.
"For example, you could have visited a page on uber.com, and a chunk of memory from a previous request/response to okcupid.com would be returned," security consultant Andrew Tierney from UK-based Pen Test Partners told Forbes.
"This sensitive data could have been returned to anyone. There was no need to carry out an active attack to obtain the data – my mum may have someone else's passwords stored in her browser cache just by visiting another Cloudflare-fronted site."
The leak was discovered on February 17 by security researcher Tavis Ormandy from Google's Project Zero bug-hunting team, who was sifting through publicly available website data to look for any errors in the code.
"It's not unusual to find garbage, corrupt data, mislabeled data, or just crazy non-conforming data… but the format of the data this time was confusing," Ormandy explained in a blog post detailing the issue.
"In fact, the data was bizarre enough that some colleagues around the Project Zero office even got intrigued."
What they found was evidence of snippets from user sessions on Cloudflare-hosted sites being randomly grabbed and replicated on other Cloudflare sites, including things like encryption keys, cookies, passwords, and other potentially sensitive information.
"I didn't realise how much of the internet was sitting behind a Cloudflare CDN [content delivery network] until this incident," Ormandy said on February 19.
"The examples we're finding are so bad… I'm finding private messages from major dating sites, full messages from a well-known chat service, online password manager data, frames from adult video sites, hotel bookings."
Ormandy reached out to Cloudflare, which assembled an international team of engineers to fix the problem, and who were able to stop the bug in less than 7 hours.
It's great that the parsing error is no more, but that's not the end of the problem.
The leakage may have actually been active from as far back as 22 September 2016 – almost five months before Ormandy found it – and there's no way of knowing how many people's sensitive information was exposed in that time.
In a blog post last week, Cloudflare CTO John Graham-Cumming explained that they hadn't detected any malicious activity resulting from the bug, but with nearly five months of exposed data in the wild, it's difficult to say how many user credentials may have been leaked.
Adding to the problem, any exposed data could have been cached by search engine bots that index website code, meaning sensitive information could have been replicated far and wide, opening up even greater access to it.
According to Cloudflare, the peak of the bug occurred between February 13 and February 18, with around one in every 3,300,000 HTTP Cloudflare requests potentially resulting in data leakage.
That might sound like pretty good odds, but given the potential length of the leak – and that private data may have been cached elsewhere on the internet – now might not be a bad time to change some passwords if you think you may have been compromised.
While there isn't an official list of affected services, a huge number of notable sites were exposed, including Uber, Yelp, Fitbit, OkCupid, the Pirate Bay, Change.org, Feedly, 4chan, and many more.
You can search here to see if sites and services you use are on Cloudflare, and there's also an unofficial listing of the more than 4 million sites that could be affected here.
While the overall level risk to any particular user is probably very low, a lot of personal data could have been leaked here, so it's a good idea to change your passwords for any potentially compromised sites.
"Cloudflare has said the actual impact is relatively minor, so I believe only limited amounts of information were actually disseminated," security researcher and former Cloudflare employee Ryan Lackey wrote in a blog post.
"Regardless, unless it can be shown conclusively that your data was NOT compromised, it would be prudent to consider the possibility it has been compromised."
Of course, to minimise the potential risk of similar breaches (inevitably) happening in the future, make sure you don't use the same password across multiple sites.
Since it's impossible to remember a huge number of passwords – given how many digital services we all uses these days – consider a password manager like LastPass or 1Password.
Another good idea is to make sure you enable two-factor authentication on services that support it, which can protect your accounts even if your passwords do get out.
Here's What You Need to Know About the Massive 'Cloudbleed' Data Breach
Now's a good time to change some passwords.
PETER DOCKRILL 27 FEB 2017
A huge data breach that may have exposed users' private information and log-in details for thousands of websites was uncovered last week, in what looks to be the most significant internet leak of 2017 so far.
Dubbed 'Cloudbleed' in reference to the notorious 'Heartbleed' breach in 2014, the leak stems from a bug found in code operated by web infrastructure company Cloudflare, which provides security and hosting services for thousands of major internet sites.
Some of these clients are big-name web companies – including Uber, Yelp, Fitbit, and OkCupid – and due to a tiny but significant error in some of Cloudflare's code, sensitive user information from some of these sites was being randomly inserted into web pages when visited by other people.
"For example, you could have visited a page on uber.com, and a chunk of memory from a previous request/response to okcupid.com would be returned," security consultant Andrew Tierney from UK-based Pen Test Partners told Forbes.
"This sensitive data could have been returned to anyone. There was no need to carry out an active attack to obtain the data – my mum may have someone else's passwords stored in her browser cache just by visiting another Cloudflare-fronted site."
The leak was discovered on February 17 by security researcher Tavis Ormandy from Google's Project Zero bug-hunting team, who was sifting through publicly available website data to look for any errors in the code.
"It's not unusual to find garbage, corrupt data, mislabeled data, or just crazy non-conforming data… but the format of the data this time was confusing," Ormandy explained in a blog post detailing the issue.
"In fact, the data was bizarre enough that some colleagues around the Project Zero office even got intrigued."
What they found was evidence of snippets from user sessions on Cloudflare-hosted sites being randomly grabbed and replicated on other Cloudflare sites, including things like encryption keys, cookies, passwords, and other potentially sensitive information.
"I didn't realise how much of the internet was sitting behind a Cloudflare CDN [content delivery network] until this incident," Ormandy said on February 19.
"The examples we're finding are so bad… I'm finding private messages from major dating sites, full messages from a well-known chat service, online password manager data, frames from adult video sites, hotel bookings."
Ormandy reached out to Cloudflare, which assembled an international team of engineers to fix the problem, and who were able to stop the bug in less than 7 hours.
It's great that the parsing error is no more, but that's not the end of the problem.
The leakage may have actually been active from as far back as 22 September 2016 – almost five months before Ormandy found it – and there's no way of knowing how many people's sensitive information was exposed in that time.
In a blog post last week, Cloudflare CTO John Graham-Cumming explained that they hadn't detected any malicious activity resulting from the bug, but with nearly five months of exposed data in the wild, it's difficult to say how many user credentials may have been leaked.
Adding to the problem, any exposed data could have been cached by search engine bots that index website code, meaning sensitive information could have been replicated far and wide, opening up even greater access to it.
According to Cloudflare, the peak of the bug occurred between February 13 and February 18, with around one in every 3,300,000 HTTP Cloudflare requests potentially resulting in data leakage.
That might sound like pretty good odds, but given the potential length of the leak – and that private data may have been cached elsewhere on the internet – now might not be a bad time to change some passwords if you think you may have been compromised.
While there isn't an official list of affected services, a huge number of notable sites were exposed, including Uber, Yelp, Fitbit, OkCupid, the Pirate Bay, Change.org, Feedly, 4chan, and many more.
You can search here to see if sites and services you use are on Cloudflare, and there's also an unofficial listing of the more than 4 million sites that could be affected here.
While the overall level risk to any particular user is probably very low, a lot of personal data could have been leaked here, so it's a good idea to change your passwords for any potentially compromised sites.
"Cloudflare has said the actual impact is relatively minor, so I believe only limited amounts of information were actually disseminated," security researcher and former Cloudflare employee Ryan Lackey wrote in a blog post.
"Regardless, unless it can be shown conclusively that your data was NOT compromised, it would be prudent to consider the possibility it has been compromised."
Of course, to minimise the potential risk of similar breaches (inevitably) happening in the future, make sure you don't use the same password across multiple sites.
Since it's impossible to remember a huge number of passwords – given how many digital services we all uses these days – consider a password manager like LastPass or 1Password.
Another good idea is to make sure you enable two-factor authentication on services that support it, which can protect your accounts even if your passwords do get out.
Are we at War and we aren't being told?
Jul. 8th, 2015 02:10 pmNew York Stock Exchange Suspends Trading
Is This What The First World Cyber War Looks Like: Global Real Time Cyber Attack Map
Submitted by Tyler Durden on 07/08/2015 11:41 -0400
After a series of cyber failures involving first UAL, then this website, then the NYSE which is still halted, then the WSJ, some have suggested that this could be a concerted cyber attack (perhaps by retaliatory China unhappy its stocks are plunging) focusing on the US. So we decided to look at a real-time cyber attack map courtesy of Norsecorp which provides real time visibility into global cyber attacks.
What clearly stands out is that for some reason Chinese DDOS attacks/hackers seem to be focusing on St. Louis this morning.

Whether this is related to the series of suspicious cyber failures today, is so far unclear, although if there is a connection at least there is a way to keep track of the first global cyberwar in real-time
Is This What The First World Cyber War Looks Like: Global Real Time Cyber Attack Map
Submitted by Tyler Durden on 07/08/2015 11:41 -0400
After a series of cyber failures involving first UAL, then this website, then the NYSE which is still halted, then the WSJ, some have suggested that this could be a concerted cyber attack (perhaps by retaliatory China unhappy its stocks are plunging) focusing on the US. So we decided to look at a real-time cyber attack map courtesy of Norsecorp which provides real time visibility into global cyber attacks.
What clearly stands out is that for some reason Chinese DDOS attacks/hackers seem to be focusing on St. Louis this morning.

Whether this is related to the series of suspicious cyber failures today, is so far unclear, although if there is a connection at least there is a way to keep track of the first global cyberwar in real-time
In "It's getting close to the end of the year" where I mentioned:
Last evening during the afterschool program that I did not attend there was an incident in the computer lab. Some people started feeling a burning sensation in their throats and airways. One student who has asthma went to the hospital and the school nurse after looking in peoples mouths said that there were white spots in the backs of throats of those complaining of burning. Has anyone heard anything to substantiate a parent's info that some new monitors give off a gas that causes these type problems?
The Computer lab is now closed until the school district can do an investigation. Which is not of high priority right now per what is being said. Of course this is the busy computer usage time when every students NEEEEEEDS to type up their year long project reports. Usually the district's computer servers go down about now too. It is going to get interesting.
The Computer Science Teacher sent out this......
Fellow colleagues:
The air quality in the computer lab tested great! We took the suggestions and advice from the air quality guy from the district which was to change the monitor out to a different monitor. I believe all is good.
The computer lab printer does work. Before printing, please come see me and I’ll show you what you have to do to make the printer work.
Please do not allow students to put paper in the tray. That is one of the parts of the printer that is on its last legs. It has been repaired twice.
Things do work… we just have to be patient and try to be smarter than the equipment…. which I’m not most of the time. I get lucky sometimes.
12 minutes later
…. Never mind…. Printer is dead…. Putting in a heat ticket now….
Sorry…. Have a nice day….
Too:
Found out today that there's a student who has an again 'interesting' quirk. He and his identical twin are in the same class period of a certain class. Maybe one of them is made of negative matter to the other's positive matter but they have to be seated away from each other. So one is seated by the classroom's computer color printer. Everyday; until the teacher taped closed the paper loading draw of the printer and put a note on it that specifically read, Do NOT open the drawer student's name; that student would open the paper loading draw and stick his hands inside. Even when the teacher caught the student before he'd done it one day and told him not to do it and then watched as he pushed the button to open the drawer while looking at the teacher to then stick his hands inside.
These Twins will be in the Library to complete a project next week. They've somehow lost their individual project for this 6 week grading period and have nothing to show for it. So the teacher is giving them a special project that she can then give them their grades on.

Our computer printer is behind the counter where I sit.
Last evening during the afterschool program that I did not attend there was an incident in the computer lab. Some people started feeling a burning sensation in their throats and airways. One student who has asthma went to the hospital and the school nurse after looking in peoples mouths said that there were white spots in the backs of throats of those complaining of burning. Has anyone heard anything to substantiate a parent's info that some new monitors give off a gas that causes these type problems?
The Computer lab is now closed until the school district can do an investigation. Which is not of high priority right now per what is being said. Of course this is the busy computer usage time when every students NEEEEEEDS to type up their year long project reports. Usually the district's computer servers go down about now too. It is going to get interesting.
The Computer Science Teacher sent out this......
Fellow colleagues:
The air quality in the computer lab tested great! We took the suggestions and advice from the air quality guy from the district which was to change the monitor out to a different monitor. I believe all is good.
The computer lab printer does work. Before printing, please come see me and I’ll show you what you have to do to make the printer work.
Please do not allow students to put paper in the tray. That is one of the parts of the printer that is on its last legs. It has been repaired twice.
Things do work… we just have to be patient and try to be smarter than the equipment…. which I’m not most of the time. I get lucky sometimes.
12 minutes later
…. Never mind…. Printer is dead…. Putting in a heat ticket now….
Sorry…. Have a nice day….
Too:
Found out today that there's a student who has an again 'interesting' quirk. He and his identical twin are in the same class period of a certain class. Maybe one of them is made of negative matter to the other's positive matter but they have to be seated away from each other. So one is seated by the classroom's computer color printer. Everyday; until the teacher taped closed the paper loading draw of the printer and put a note on it that specifically read, Do NOT open the drawer student's name; that student would open the paper loading draw and stick his hands inside. Even when the teacher caught the student before he'd done it one day and told him not to do it and then watched as he pushed the button to open the drawer while looking at the teacher to then stick his hands inside.
These Twins will be in the Library to complete a project next week. They've somehow lost their individual project for this 6 week grading period and have nothing to show for it. So the teacher is giving them a special project that she can then give them their grades on.

Our computer printer is behind the counter where I sit.
http://boredomtherapy.com/hidden-usb-treasure-hunt/
There’s a new kind of treasure hunt taking place all over the world. You just need to know where to look.

This treasure, however, isn’t buried on an uninhabited island, it’s all around us. And there’s another twist: the treasure chests are USB drives hidden in plain sight, and the gold is what’s on them.

They’re hidden in walls and other surfaces around the world. Each one is an offline file-sharing community, where the users are anonymous adventure seekers.
All you need to participate is a USB capable device – and you’re in. An artist named Aram Bartholl has been placing them with nothing but a “readme.txt” file explaining how the project works.
Bartholl, a Berlin-based artist, started placing the USBs 5 years ago and has since seen others join in and replicate his work – building a large international community. Because of its popularity, there is quite a broad list of locations that the eagle eyed adventurer can spot.
This past summer, a database of the project was started as a means of locating and documenting the hidden USBs. If you’e feeling up to it, you can start planning out your own quest to find the one nearest – or furthest – from you. You can also follow Bartholl on Twitter and keep up to date on new ones added.
Share this cool project with your friends and get ready to go on an adventure!
Remember this place Meep? Pont Des Arts, Paris

Even there.

There’s a new kind of treasure hunt taking place all over the world. You just need to know where to look.

This treasure, however, isn’t buried on an uninhabited island, it’s all around us. And there’s another twist: the treasure chests are USB drives hidden in plain sight, and the gold is what’s on them.

They’re hidden in walls and other surfaces around the world. Each one is an offline file-sharing community, where the users are anonymous adventure seekers.
All you need to participate is a USB capable device – and you’re in. An artist named Aram Bartholl has been placing them with nothing but a “readme.txt” file explaining how the project works.
Bartholl, a Berlin-based artist, started placing the USBs 5 years ago and has since seen others join in and replicate his work – building a large international community. Because of its popularity, there is quite a broad list of locations that the eagle eyed adventurer can spot.
This past summer, a database of the project was started as a means of locating and documenting the hidden USBs. If you’e feeling up to it, you can start planning out your own quest to find the one nearest – or furthest – from you. You can also follow Bartholl on Twitter and keep up to date on new ones added.
Share this cool project with your friends and get ready to go on an adventure!
Remember this place Meep? Pont Des Arts, Paris

Even there.

I would like ...
Jul. 3rd, 2014 01:43 amRSS reading.
How do I set this up to have a non-lj blog feed to me? Here would be nice but I'd settle for my e-mail which is where here would feed to anyway.
I've seen the little red RSS button but when clicked it gives me a page of computer coding that I have no idea what to do with.
I think I've mentioned that I am a Luddite in the past. If you missed it, well I am. Luddites are technology ignorant, not necessarily by choice or it's a subconscious choice. Don't make me ask my children. They'll go do this and then that and then this in fast succession. There is a reason I don't have a smart phone even though an old one was offered. How people with them in their back pants pocket don't break them just sitting I do not know. It's magic; how to work them and how to not crack their little plastic bodies.
You Don't Want Me Deleting ALL OF the Internet.* *Eddie Izzard reference.
How do I set this up to have a non-lj blog feed to me? Here would be nice but I'd settle for my e-mail which is where here would feed to anyway.
I've seen the little red RSS button but when clicked it gives me a page of computer coding that I have no idea what to do with.
I think I've mentioned that I am a Luddite in the past. If you missed it, well I am. Luddites are technology ignorant, not necessarily by choice or it's a subconscious choice. Don't make me ask my children. They'll go do this and then that and then this in fast succession. There is a reason I don't have a smart phone even though an old one was offered. How people with them in their back pants pocket don't break them just sitting I do not know. It's magic; how to work them and how to not crack their little plastic bodies.
Funny Google Tricks.
Jun. 21st, 2014 11:45 pmIt's still small enough to squint. *sigh*
http://funsubstance.com/fun/156879/some-funny-google-tricks/

http://funsubstance.com/fun/156879/some-funny-google-tricks/

I think I might have fixed it
Mar. 6th, 2012 08:47 pmI want to say thankyou to all of you for your advice and good wishes.
Norton has a free download of a malware killer that is now sitting on my desktop (am sure the genie is hiding off to one side eying it with intent to kill the malware killer. So now I know the Gen's name, Malwar.) The other suggested spyware killer was for Vista and I've an XP. Was really disappointed about that. *sighs*
I also, and this is what I think has really done the trick, downloaded the Microsoft Service Pack 3 2007. *head desk* ooops.
I am SO uptodate on my virus definitions and my computer has been scanned within an inch of its life. All that is suppose to be automatic anyway but I did it anyway.
We shall see.
Norton has a free download of a malware killer that is now sitting on my desktop (am sure the genie is hiding off to one side eying it with intent to kill the malware killer. So now I know the Gen's name, Malwar.) The other suggested spyware killer was for Vista and I've an XP. Was really disappointed about that. *sighs*
I also, and this is what I think has really done the trick, downloaded the Microsoft Service Pack 3 2007. *head desk* ooops.
I am SO uptodate on my virus definitions and my computer has been scanned within an inch of its life. All that is suppose to be automatic anyway but I did it anyway.
We shall see.


