Show of 5-5-2007

  • Tech Talk Forum Now Active
    • Live chat during the show
    • Threaded discussion between shows
    • Make comments about the show
    • Ask questions or suggest future topics
    • Link to Forum: http://forums.delphiforums.com/techtalkonline/
    • Link is located on the Tech Talk Home Page
  • Additional Tech Talk Information
    • Tech Talk Home Page is located at www.stratford.edu
    • We have show outlines and audio files for past shows.
    • Sign up for the Tech Talk newsletter
  • Contact Tech Talk
    • If you have a question send it to techtalk@stratford.edu
    • Call us at 877-767-8107 (toll free) from anywhere in the US during the show.
    • Call using Skype (toll free) from anywhere in the world during the show.
      • Get a headset with mic for your computer ($20 to $40 US)
      • Create a free Skype account.
      • Under Add User, search for "Tech Talk Radio"
      • Call "Tech Talk Radio" and your call will be forwarded to the studio.
  • Email Questions
    • Why does the web seem to slow down so dramatically at times?
      • The speed your ISP advertises is maximum speed, not guaranteed speed.
      • You are sharing the connection with others.
      • At peak times, your effective bandwidth is less.
      • Check the speed of your Internet connection.
        • Upload speed
        • Download speed
        • Latency
        • Tweak tester
    • Why, on some sites, can’t you back out?
      • Usually you click the back button to go to the last viewed page.
      • Some web sites (usually the unsavory ones) want to trap you.
      • Two techniques are used
        • Spawning popup windows when you leave.
        • Overwriting the data for last viewed page.
      • Solution
        • Block popups
        • Use the back button drop down menu to select a previous address.
    • I live in an apartment complex and have many nearby neighbors. I keep seeing HornyDog and Crawfish logged into my wireless (Wi-Fi) access point. What should I do to kick them off my system?
      • You need to secure your wireless access point
      • It is best (but not required) to connect to the access point (AP) with an Ethernet wired connection during the configuration process
      • First log onto the access point: 192.168.0.1
      • Use the default User Name and Password to log onto your AP
      • Commonly it they are admin, password
      • If someone has changed your password, press the reset button in the back of your unit. You may need a paperclip to do this.
      • Change Administrative Password
      • Change SSID (Service Set Identifier)
      • Enable encryption (select hard to guess key or use the AP’s automatic key generator). Your options will include
        • WEP (Wired Equivalent Privacy–Static key
          • Easily cracked, lowest security
          • Compatible with older equipment
        • WPA (WiFi Protected Access)–Non-static key
          • Better security, harder to crack
          • Best choice for most networks
        • WPA2–Uses Advance Encryption Standard
          • Most secure standard
          • Requires the newest wireless cards
      • Reconnect all computers wirelessly using new key
      • Make note of MAC address of each computer logged onto network.
      • Enable MAC address filtering and only allow those computer access.
  • Update: China Trip
    • Interrogating the Network: tracert command behaved differently after show
    • Global Land Coalition web site could be reached after the show
    • Brought pirated software through customs. Now in testing at Stratford. Will report next week on quality and whether MS will call it genuine or not.
  • Pilots Use Google for Navigation
    • Humorous message from International Federation of Airline Pilots (IFALPA)
    • Many pilots are using Google Maps to plan their international return trips.
    • Have you ever used Google to go to England?
      • Just go to http://maps.google.com
      • Select Get Directions from the top menu.
      • Start: New York, NY, US
      • End: London, England
      • Notice step 24: Swim across the Atlantic Ocean (3,462 miles)
  • Crackdown on Military Emails and Blogs
    • Army Regulation 530-1 Operations and Signal Security (OPSEC)
    • Dated April 19, 2007, 79 pages
    • Applies to military personnel, government contractors, and family members
    • Relevant Paragraph: 2-1g
      • Consult with their immediate supervisor and their OPSEC Officer for an OPSEC review prior to publishing or posting information in a public forum.
      • This includes, but is not limited to letters, resumes, articles for publication, electronic mail (e-mail), Web site postings, web log (blog) postings, discussion in Internet information forums, discussion in Internet message boards or other forms of dissemination or documentation.
      • Supervisors will advise personnel to ensure that sensitive and critical information is not to be disclosed. Each unit or organization’s OPSEC Officer will advise supervisors on means to prevent the disclosure of sensitive and critical information.
    • There is some leeway in enforcement of the rules. Some units may require that soldiers register their blog with the unit for identification purposes with occasional spot checks after an initial review. Other units may require a review before every posting.
    • Blogs and emails have become an important support mechanism for the military
    • Links to Soldier Blogs
    • Just Google (military blog, milblog, soldier blogs) to find more links
    • I was moved by these blogs and by the responses posted by readers
    • Most blogs were created as a way to communicate with family and friends in an efficient manner.
    • Unfortunately more than family and friends read them
  • Mercury May Have Molten Core
    • This discovery was based on the fact that a sphere with a molten core spins differently than one with a solid core.
    • Mercury is the closest planet to the sun
    • Jean-Luc Margot, assistant professor of astronomy at Cornell University, and collaborators conducted a series of observations over five years using a novel technique to detect tiny twists in Mercury’s spin as it orbits the sun.
    • The twists, called longitudinal librations, occur as the sun’s gravity exerts alternating torques on the planet’s slightly asymmetrical shape.
    • They found that the magnitude of the librations was double what would be expected for a completely solid body — but explainable for an object whose core is molten and not forced to rotate along with its shell.
    • The impact of a liquid core can be seen by spinning a raw egg and an hard boiled egg.
      • Spinning an egg is used by chefs to tell whether an egg is hard boiled or liquid inside.
      • What do you think is the difference between the two is when they both are spun, stopped suddenly, and then released.
  • Getting a Job without Experience – The Chicken and the Egg (Continuing Story)
    • We are going to start a career section that addresses the age old problem: "I can’t get a job without experience and I can’t get experience without a job." So what comes first: The Job or the Experience? This is the classic chicken and egg problem. What comes first: The Chicken or the Egg?
    • Read Industry Rags — Previous show
    • Know Your Standards Organizations — Previous show
    • Join User Groups — Previous show
    • Join Trade and Professional Associations
    • Check the Women in Information Technology Sites
  • Selected Projects To Complete At Home
    • Project 1: Build a Computer.
      • Tiger Direct is a good source of parts.
      • If this is your first computer, a tested motherboard combo (motherboard with CPU installed) is a good choice.
    • Project 2: Install Multiple Operating Systems
      • Linux, Windows XP, Windows Vista, or Mac OS X
      • Set up a dual-boot configuration where you can choose the OS during boot up
    • Project 3: Create Backtrack2 Hacking Tools Bootable CD — Previous show
    • Project 4: High Performance Computer (Beowulf Linux Cluster) — Previous show
    • Project 5: Setup an MySQL Database — Previous show
    • Project 6: Set up a Web site (Linux, Apache, PHP, MySQL)
  • Project 6: Set Up a Web Site at Home
    • Download Linux OS (www.linux.org for list of download sites.)
    • Download Apache Web server (www.apache.org for list of mirror sites)
    • Download Hypertext Pre-Processor [PHP] (www.php.net)
    • Download MySQL (www.mysql.com)
    • Get an old machine and start playing around.
    • Read the online manuals and start installing.
    • You might use a removable hard drive so your main hard drive is not touched
    • Connectivity
      • Get an broadband Internet connection
      • Pay your ISP for a fixed IP address
      • Register a domain name
      • Register your domain with the name server hosted by your ISP