One day after praying to God asking for strength and guidance from the Holy Spirit for difficult events that I know are soon before me, these verses were revealed to me:
“fear not, for I am with you; be not dismayed, for I am your God; I will strengthen you, I will help you, I will uphold you with my righteous right hand.” – Isaiah 41:10 (ESV)
“Beloved, do not be surprised at the fiery trial when it comes upon you to test you, as though something strange were happening to you. But rejoice insofar as you share Christ’s sufferings, that you may also rejoice and be glad.” – 1 Peter 4:12-13
“I love the LORD, because he has heard my voice and my pleas for mercy. Because he inclined his ear to me, therefore I will call on him as long as I live.” – Psalm 116:1-2 (ESV)
I love my God! Thank you! Thank you for hearing my plea and letting me know that you are there and that you care. It indeed helps me to carry on, weary as I am.
Denali Highway, Alaska
By using open-source Arduino tools, security researchers are exposing security gaps in door-lock systems used by millions of hotels.
LAS VEGAS — For millions of travelers and road warriors, the ubiquitous hotel key card is the primary, and essentially the only, way to access their rooms at the end of day. However, security researcher Cody Brocious believes the current systems used to secure hotel doors throughout the United States and elsewhere are severely flawed.
Speaking at the Black Hat security conference here, Brocious demonstrated how locks from Onity—a company that sells security products to hotels and other businesses—can easily be bypassed. At the show, Brocious detailed the primary security flaws that allowed him to bypass Onity locks and gain access to rooms.
Brocious used an open-source tool known as Arduino, a portable programming platform. Arduino was used as a substitute for the commercial portable programmer that an Onity lock would typically require. Brocious explained that the Onity locks have a serial hardware connection that is easily accessible, as well.
Read more » (574 words + 17 images, estimated 2:18 mins reading time)
Have you ever copy & pasted something into your email or office program and been annoyed that the text formatting (bold, font size, etc) came with it? Don't you wish you could just copy the text itself, without having to copy it, paste it into a plain text editor, then copy it again? This extension gives you an option to copy text without the formatting. And unlike the keyboard shortcut (Ctrl+Shift+V), you can even customize how it will copy & paste.
- Trim space around text
- Remove extra spaces
- Remove extra empty lines
- Make as default COPY action
- Works with numerous applications such as Firefox, Thunderbird, SeaMonkey, etc.
- Works with beta and alpha versions; such as Aurora (Firefox, SeaMonkey) and Earlybird (Thunderbird).
- Now works properly with AutoCopy v1.0.1
- Uses key-combo Ctrl+Shift+C. Alternatively, you can use the right-click-menu and choose "Copy As Plain Text".
- Multiplatform; runs on BSD, Linux, Mac, and Windows.
- Multilingual; includes locale files for: de, en-US, fr, it, ru
(more on the way)
The options window showing the default settings. (Linux):
The options window showing the default settings. (Win7):
Read more » (650 words + 23 images, estimated 2:36 mins reading time)
The Silent Dismantling of Our Republic
by interfering with regular, periodic elections
One of the most feared aspects to the Founders in creating a government was the realization that men, who come into power either by force or by election, nearly always seek more and more power until they approach kingly status. Over a period of several decades, and with historical experience as well as their own good thinking, the Founders eventually employed several techniques to minimize the possibility of that happening in their new government. Separation of powers, checks and balances, frequent elections–all these devices were implemented to curb the human tendency to concentrate power in the few.
Return to the Original Source of Power
James Madison expressed that, since the people are the original source of authority to govern, they ought to be consulted on a periodic basis as to whom they should delegate some of this authority. Said he:
"As the people are the only legitimate fountain of power, and it is from them that the constitutional charter under which the [power of the] several branches of government … is derived, it seems strictly consonant to the republican theory to recur to the same original authority … whenever any one of the departments may commit encroachments on the chartered authorities of the others."
But how often should the people be consulted?
Read more » (1784 words + 17 images, estimated 7:08 mins reading time)
Used to be if spies wanted to eavesdrop, they planted a bug. These days, it's much easier. Because we all carry potential bugs in our pockets—smartphones. One team of researchers used an iPhone to track typing on a nearby computer keyboard with up to 80 percent accuracy. They presented the findings at a computer security conference in Chicago. [Philip Marquardt et al, (sp)iPhone: Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers, 18th ACM Conference on Computer and Communications Security]
The researchers designed a malicious app for the iPhone 4. When you place the phone near a keyboard, it exploits accelerometer and gyroscope data to sense vibrations as the victim types—detecting whether keystrokes come from the left or right side of the keyboard, and how near or far subsequent keys are from each other. Then, using that seismic fingerprint, the app checks a pre-created "vibrational" dictionary for the most likely words—a technique that works reliably on words of three letters or more.
Of course, you'd need to install the app to allow it to spy. But whereas most apps have to ask permission to access location data or the camera, that's not so for the accelerometer. This kind of attack may offer good reason to limit accelerometer access too—and keep iPhones from becoming "spiPhones."
Read more » (220 words + 17 images, estimated 53 secs reading time)
By Robert A. Hall
I'm 63. Except for one semester in college when jobs were scarece and a six-month period when I was between jobs, but job hunting everyday, I've worked, hard, since I was 18. Despite some health challenges, I still put in 50-hour weeks, and haven't called in sick in seven or eight years. I make a good salary, but I didn't inherit my job or my income, and I worked to get where I am. Given the economy, there's no retirement in sight, and I'm Tired. Very tired.
Read more » (1400 words + 16 images, estimated 5:36 mins reading time)
WIMM Labs announced an Android-based wearable device reference platform and open SDK designed for applications including sports and health monitoring wristwatches. The tiny WIMM One Module features a 1.4-inch capacitive touchscreen, up to 32GB memory, Wi-Fi, Bluetooth, and motion tracking capability, and will be made available with a WIMM One Developer Preview Kit in the third quarter.
The reference platform is designed for a variety of wearable devices with tiny screens. Examples are said to include sports watches, business command and control devices, payment automation devices, and health monitoring gadgets. Other possibilities are said to include a universal remote, and even a smart touchscreen embedded into a wallet.
Measuring 1.27 x 1.13 x 0.44 inches (36 x 32 x 12.5mm) and weighing 0.77 ounces (22 grams), the WIMM One Module appears to be available either as a tiny single board computer or a fully housed device. No processor is listed, but the device offers a 1.4-inch capacitive "bi-modal" touchscreen, and up to 32GB flash memory, says WIMM Labs.
Read more » (236 words + 17 images, estimated 57 secs reading time)
In their Black Hat panel on "war-texting," Don Bailey and Matthew Solnik, researchers from iSec Partners, will discuss finding mobile-networking vulnerabilities in automobiles that would allow an attacker to unlock them and turn the engine on remotely. Bailey devised a method for exploiting the GSM network to send malicious SMS (Short Message Service) communications that can upload data and transmit information.
Start engine remotely
"War-texting" is a variation of "war-driving," where people drive around in autos with devices designed to discover and intercept signals from unprotected wireless LANs. With war-texting, they are intercepting messages sent between servers and autos.
Dillon Beresford, a security researcher at NSS Labs, will be presenting his work on exploiting Siemens Simatic S7 process logic controllers. The talk, originally scheduled for the TakeDownCon security conference in May, was withdrawn after Siemens worried about potential ramifications if he publicized the vulnerabilities before they could be patched. At Black Hat, Beresford is expected to cover new vulnerabilities and demonstrate how attackers can impersonate the communication control used by the industrial control systems.
Read more » (637 words + 17 images, estimated 2:33 mins reading time)