Category: Uncategorized
-
SUN Java Runtime (JRE) Vulnerabilities
“Successful exploits may allow attackers to violate the same-origin policy, obtain sensitive information, bypass security restrictions, run untrusted applets with elevated privileges, and cause denial-of-service conditions. This may result in a compromise of affected computers.” Find out More Here
-
Fun with Google Street View
During our trek through Google Maps we found a chicken carcass the size of a large SUV, a car covered in Post-It notes, and what looks like a UFO parked in a back yard. We’ve collected a few of the oddest and most intriguing sights. Read More Here
-
Riding out a real data center disaster
After a hard fought Monday in the data center trenches it is sometimes too easy to forget how simple our problems can be. When compared to a true disaster of not just IT infrastructure but basic human needs infrastructure. I remember reading about some of the staff responsible for trying to keep business moving during…
-
“Dear Family, I’m in Heaven B!@CHes!”
Worried about how you will let others know you made it to heaven after you die? Well worry no more the website youvebeenleftbehind.com has got you covered. Should the rapture or other event claim your life this Christian based site will not only contact your friends and family via email to let them know your…
-
Monsterous Patch Tuesday
Since Microsoft started its “Patch Tuesday” schedule back in 2003 they have been pretty consistent with fixing issues every week. This past week they have patched the most vulnerabilities since the start of the schedule. 8= Bulletins 28= Vulnerabilities patched Find out more info here and get yourself patched!
-
Ain’t Nothing but a G Thing
If you speak to me on a regular basis you already know how much I love my Google G1. Actually my love affair is more with the Android OS than the hardware itself although I do not have any complaints about the hardware. Well it looks like I will not be shutting up about this…
-
ACISS Reviewed
In keeping with the theme of last week and reviewing proprietary government systems. Today we will take a quick glance at ACISS (Augmented Criminal Investigation Support System). It’s names like this that let you really appreciate acronyms, but just as the name suggests this is a tool used by law enforcement to help manage the…
-
RailNet AEI Reviewed
So with the rising costs of fuel affecting various shipping industries. The viability of a strong rail system is more valuable than ever. Today we will review one of the tracking mechanisms used by this our rail system called RailNet AEI (Automatic Equipment ID). From the Company Website: “SAIC’s RailNet® Automatic Equipment Identification (AEI) reader…
-
The Constitution of Giving Thanks
“We the People of the United States, in Order to form a more perfect Union of food, establish this Feast, and promote the general practice of eating mass quantities and reflecting.” From SecurityPimp.net.. Happy Thanksgiving!