Tech Talk Forum Now Active Additional Tech Talk Information Contact Tech Talk Email Questions Update: China Trip Pilots Use Google for Navigation Crackdown on Military Emails and Blogs Mercury May Have Molten Core Getting a Job without Experience – The Chicken and the Egg (Continuing Story) Selected Projects To Complete At Home Project 6: Set Up a Web Site at Home
Usually you click the back button to go to the last viewed page.
Some web sites (usually the unsavory ones) want to trap you.
Two techniques are used
Spawning popup windows when you leave.
Overwriting the data for last viewed page.
Solution
Block popups
Use the back button drop down menu to select a previous address.
I live in an apartment complex and have many nearby neighbors. I keep seeing HornyDog and Crawfish logged into my wireless (Wi-Fi) access point. What should I do to kick them off my system?
You need to secure your wireless access point
It is best (but not required) to connect to the access point (AP) with an Ethernet wired connection during the configuration process
First log onto the access point: 192.168.0.1
Use the default User Name and Password to log onto your AP
Commonly it they are admin, password
If someone has changed your password, press the reset button in the back of your unit. You may need a paperclip to do this.
Change Administrative Password
Change SSID (Service Set Identifier)
Enable encryption (select hard to guess key or use the AP’s automatic key generator). Your options will include
WEP (Wired Equivalent Privacy–Static key
Easily cracked, lowest security
Compatible with older equipment
WPA (WiFi Protected Access)–Non-static key
Better security, harder to crack
Best choice for most networks
WPA2–Uses Advance Encryption Standard
Most secure standard
Requires the newest wireless cards
Reconnect all computers wirelessly using new key
Make note of MAC address of each computer logged onto network.
Enable MAC address filtering and only allow those computer access.
Update: China Trip
Interrogating the Network: tracert command behaved differently after show
Global Land Coalition web site could be reached after the show
Brought pirated software through customs. Now in testing at Stratford. Will report next week on quality and whether MS will call it genuine or not.
Pilots Use Google for Navigation
Humorous message from International Federation of Airline Pilots (IFALPA)
Many pilots are using Google Maps to plan their international return trips.
Notice step 24: Swim across the Atlantic Ocean (3,462 miles)
Crackdown on Military Emails and Blogs
Army Regulation 530-1 Operations and Signal Security (OPSEC)
Dated April 19, 2007, 79 pages
Applies to military personnel, government contractors, and family members
Relevant Paragraph: 2-1g
Consult with their immediate supervisor and their OPSEC Officer for an OPSEC review prior to publishing or posting information in a public forum.
This includes, but is not limited to letters, resumes, articles for publication, electronic mail (e-mail), Web site postings, web log (blog) postings, discussion in Internet information forums, discussion in Internet message boards or other forms of dissemination or documentation.
Supervisors will advise personnel to ensure that sensitive and critical information is not to be disclosed. Each unit or organization’s OPSEC Officer will advise supervisors on means to prevent the disclosure of sensitive and critical information.
There is some leeway in enforcement of the rules. Some units may require that soldiers register their blog with the unit for identification purposes with occasional spot checks after an initial review. Other units may require a review before every posting.
Blogs and emails have become an important support mechanism for the military
Just Google (military blog, milblog, soldier blogs) to find more links
I was moved by these blogs and by the responses posted by readers
Most blogs were created as a way to communicate with family and friends in an efficient manner.
Unfortunately more than family and friends read them
Mercury May Have Molten Core
This discovery was based on the fact that a sphere with a molten core spins differently than one with a solid core.
Mercury is the closest planet to the sun
Jean-Luc Margot, assistant professor of astronomy at Cornell University, and collaborators conducted a series of observations over five years using a novel technique to detect tiny twists in Mercury’s spin as it orbits the sun.
The twists, called longitudinal librations, occur as the sun’s gravity exerts alternating torques on the planet’s slightly asymmetrical shape.
They found that the magnitude of the librations was double what would be expected for a completely solid body — but explainable for an object whose core is molten and not forced to rotate along with its shell.
The impact of a liquid core can be seen by spinning a raw egg and an hard boiled egg.
Spinning an egg is used by chefs to tell whether an egg is hard boiled or liquid inside.
What do you think is the difference between the two is when they both are spun, stopped suddenly, and then released.
Getting a Job without Experience – The Chicken and the Egg (Continuing Story)
We are going to start a career section that addresses the age old problem: "I can’t get a job without experience and I can’t get experience without a job." So what comes first: The Job or the Experience? This is the classic chicken and egg problem. What comes first: The Chicken or the Egg?