Today is Sunday July 24, 2011

Archive for the ‘Technology’ Category

I am not often moved to write on my blog, because nobody reads it. Well, I do feel strongly enough now to let people know that the underwhelming experience of magazine and newsletter reading on the Kindle CAN be DONE RIGHT.

Up to now, I considered the tiresome adjustment of point size and orientation while trying to read a single page ( on, for example,  Huffington Post, AOL news, CNN, Edcar Cayce (newsletter on PDF), was just the price I paid and nothing could be done about it.

But, the other day, while waiting to see a doctor to get Transcop (TM) for my trip to England/Scotland, I browsed and bought what looked like an interesting magazine. The magazine whose single issue I bought is called NVATE  .  Their layout and formatting is the best I’ve seen on Kindle, and the attention to detail makes reading this magazine. Most other non-book content I’ve seen is poorly proofed, the layouts are fraught with errors, and forget about seeing nice screen shots in documentation and being able to get any meaningful information. I tried this with Jesse Stays great book “Facebook Application Development” and while the content is truly excellent, the exhibits, the screenshots, etc. are crummy.  This work is simply not designed with the Kindle foremost in mind.

To repeat, while I thought that lousy formatting and sloppy editing were just things you had to put up with. NVate proves it ain’t so, Joe. When you see a picture (usually photographs rather than illustrations), they are professionally positioned and sized so they really add to the experience of reading your favorite article(s).

In short, if readers accept slop, they’ll get it. Publishers just seem to treat the Kindle as just another device, and don’t seem to know, care, or appreciate that they can do so much better, and that readers, the folks who pay the bills, will notice good work.

The magazine Nate can be found at   http://nvate.com/35/nvate-magazine-soon-to-be-on-amazon-kindle/

Thank goodness for those souls who have taken the time and spent the effort to do a great job, even though they could have save time and money by just following the sorry examples that others have set.

Louis Latimer Hemmi

brier creek movies
california dream act
hot shot business
israeli palestinian conflict
ashburn ice house

lottery

My First KindleIsDead!

I left it to charge overnight, and that may not have been wise 🙁

I’ve left devices on their chargers overnight and never had a problem. Now, I think I’ll never leave my Kindle 3 charging unattended, like I wouldn’t leave a candle burning.

I went to bed on Sunday, and I put the Kindle on its charger because the battery had run down after a marathon reading session of Mika Waltari’s “The Egyptian.” When I woke on Monday, this is the screen with which I was welcomed to a blue Monday.

I reported this terrible occurrence to Amazon.com and they had a new one on my doorstep in less than 48 hours!

My new one is great (I’d had the old one for ten months, so it was still under warranty). I thought my notes and highlights were backed up to their server, but I had neglected to “sync” so I had no backup of those. As far as the content (books, magazines, PDFs) I lost not a single virtual page.

santa monica zip code
electrical engineer salary
ft myers fl
how to report a scam
pizzahut coupon codes

This is from TechRepublic’s contributor Chad Perrin who is an IT consultant, developer, and freelance professional writer. He holds both Microsoft and CompTIA certifications and is a graduate of two IT industry trade schools.

In How does bad password policy like this even happen? he addressed the deep question of what goes through someone’s head when he or she creates password policy that makes little or no sense and substantially damages security. The case in point was that of Nelnet, which had a comically bad password policy with restrictions that make no reasonable sense at all. For instance:
It can’t contain two separated numbers (i.e., Abc12ef34 would be invalid)
Perhaps the developers are deathly afraid that someone will have 4+7 in a password and somehow cause SQL to do something dangerous with it. If the database is so brittle as to be incapable of handling something like that, even when special characters such as plus signs are disallowed anyway (another golden example of bad policy at the same site), we can be reasonably certain that the offending organization should not be trusted with any private data anyway.
What can be worse than such ludicrous password policy?
How about a slightly less ludicrous policy that is almost as bad for security and comes with a completely absurd, even insane, explanation for why the password policy is so bad?

This is the case of American Express, evidently. A customer received a thoroughly crazy customer service email explaining the reasoning behind a password policy limited to eight characters, with special characters prohibited. The most unbelievable thing about this entire situation is that the email reads like it was written by a Nigerian scammer, but it came from the American Express “Email Servicing Team.”
Key phrases illustrating the lunacy of the explanation include:
• We discourage the use of special characters because hacking softwares can recognize them very easily.
Presumably, this is meant to refer to keyloggers that might harvest passwords, but the fact of the matter is that detecting passwords is not dependent on the characters used. Key factors such as words (or non-word strings of characters) appearing out of context in the middle of other logged keypresses and time delays at either end of a single, relative short string of characters are much more important for identifying passwords than whether an asterisk is typed.
• The length of the password is limited to 8 characters to reduce keyboard contact. Some softwares can decipher a password based on the information of “most common keys pressed.”
For commonality of keypresses to be used to statistically identify passwords, your passwords will have to be incredibly long. Otherwise, every time you type Xerox, the date or time, or an emoticon, someone trying to parse a keypress log is going to have to check to see if it is a password. Sorry — this part of the explanation is even less reasonable than the first quote.
This little gem of an email from Saturday has already spread like wildfire amongst online communities populated by people with an inkling of what “security” means, and the consensus is that whoever this person is, he or she does not not know what “security” is. One can only hope that this person is making things up to BS a customer, rather than actually expressing official American Express “security” policy.
The alternative is too horrible to imagine. It’s like asking Sarah Palin to memorize the nuclear arsenal launch codes without writing on her palm.

eastbay coupon codes
lemon drop martini
canisius high school
zulily coupon code
letter of credit

An acquaintance of mine recently sent out an email to dozens of contacts. He advised that several of his friends had their email accounts hacked, and we all should be sure to use strong passwords and to ‘be careful.’

I thought about this, and concluded that this was an attempt to heighten awareness whereas all it did was remind people that there are bogeymen out to get you. I think we all already knew that.

What is perhaps more helpful is to not just scare people, but give them a method for choosing passwords that are strong. They need to be easy to remember. I know I have to keep an Excel spreadsheet to manage my passwords, as I’ve got at least a dozen or more unique passwords.  This wasn’t by design. I feel greatly inconvenienced by sites that force me to follow rules that are arbitrary and sometimes silly (like not having repeating characters). But, nowadays, anytime ‘they’ want to justify their actions and policies without justifying their actions and policies, they just wave the red flag of “Security Reasons” to stop any challenges to their authority if not wisdom.

Each business you deal with wants to impose their idea of what your password should be. SO, where I had been using a password that I remembered without fail, guess what; one day I attempted to  login to a site I used every day,  and was greeted with a message “For security reasons, all your passwords have been changed.” So then I used their temporary password they sent to me an email, and I tried to establish a new password. Oh, they say,  it’s too short. I lengthen it.

I kept getting messages on one site that annoyed me so much I stopped using them entirely. The messages were something like this:

  • “Oh, you can’t have repeating characters (I was using ’99’ as a part of the password).”
  • “Oh, you can’t use a special character.”
  • “Oh, you can’t use the same password you had six months ago.”

You get the idea.

To create a strong password, you are better off  not using  any word you’d find in a dictionary. Instead, try using a phrase, and use the first letter of each word. Then, end it with a special character (most systems allow ~!@#$%^&*()_+) or number (some systems force you to have a number, and most passwords are case sensitive, and the self-appointed acne-challenged video-game addicted Jolt-Cola swilling gatekeepers force you to use at least one uppercase letter).

I like Shakespeare, particularly Hamlet’s soliloquy. “To be or not to be, that is the question” provides me with the first part of a good password, to wit: Tbontbtitq. Then I add a #9 to the end and voilá, I have a beautiful password. Tbontbtitq#9.   Or, you could try “Alas, poor Yorick! I knew him, Horatio.” for ApY!IkhH#9 – pretty cool stuff!!!!!!!!!!

Or, how about a stub “We the people of the United States of America” that equates to Wtpofusa#9

If you want to be really ingenious, try turning your phrase into numbers. Of course, this is easier with the letters a-j than the others.

BTW – I’m going to be launching six new websites in the next 90 days. I’ve already bought some outstanding artwork from a chap on DeviantART.com and looking for more on a ‘devil’ them. Email me if you’re interested in the topics of Chinese Astrology, Mayan Codes, or the Haitian Pact with the Devil.

CREDIT: Farhad Manjoo of Slate.com published an article (A foolproof technique to secure your computer, e-mail, and bank account. By Farhad ManjooPosted Friday, July 24, 2009) proposing phrase-based passwords but I doubt he was the first, but he was the first to articulate it in a well-written manner that made it easy to follow and implement this strategy as outlined above. Go FARHAD!!

-end-

ibs symptoms
langerhans cell histiocytosis
highmark blue shield
test flash player
groupon san diego

I hope to enlighten and constructively help others to establish a WEB presence and use an arsenal of diverse tools to achieve goals we establish for ourselves. If you’re reading this, you are likely ambitious and seek fame, and wouldn’t be averse to riches.

Знакомства

city of round rock
how to install a dishwasher
creative writing prompts
meeting agenda template
website for sale