MURDER, POLITICS, AND THE END OF THE JAZZ AGE
by Michael Wolraich
Order today at Barnes & Noble / Amazon / Books-A-Million / Bookshop
MURDER, POLITICS, AND THE END OF THE JAZZ AGE by Michael Wolraich Order today at Barnes & Noble / Amazon / Books-A-Million / Bookshop |
Well if at first you don't succeed, get out of the mother f%$#^ing kitchen
Pointy Williams-Thick_as_Thieves_(1998_film)
The big news is Wikileaks. But to me, the real question is:
WHAT THE HELL IS REAL?
What is virtual and what is real?
Writers of fiction have had a lot of fun with this dichotomy.
I recently hooked up with Netflicks and it is unbelievable. Ha
If you think Hangover is good, check out some older TV series that failed;
that were written by geniuses and that are 17 or 34 hours long. Ha
Thick As Thieves hThick_as_Thieves_(1998_film)
is a fantastic flick. But I digress.
There is the movie(s) Tron for instance.
Or Pleasantville.
or The_Matrix...
The hero might end up 'in' the computer or 'in' the television.
I will get back to some wonderful pieces of art contained in old series that
were scratched but for now I would refer to some recent web activity that
tells me we are in a lot of trouble and that starts with t and that rhymes with
p and that stands for PC.
A security researcher claims to have found a new security flaw in Apple laptops that could allow hackers to ruin laptop batteries, infect them with malware or potentially cause them to overheat and catch fire.
Charlie Miller, principal research consultant at Accuvant Labs, said he has found a way to manipulate chips embedded inside Apple laptop batteries.
The chip monitors the battery's temperature and level of charge, among other things. Those chips can be remotely controlled by hackers using a default password that Miller found on a website of the chip's creator, Texas Instruments. Apple never changed the default password, Miller said.
Miller's discovery, first reported by Forbes.com, is the latest potential security flaw found in Apple's product line. Earlier this month, security experts disclosed a bug in Apple's iOS operating system that could allow criminal hackers to gain remote access to iPhones, iPads and iPod Touch devices, Reuters reported. Apple said it is fixing that issue.
This article blew my mind. I mean you can actually cause someone physical
harm by pushing buttons that send messages through the internet.
Of course I know all about how 'hackers' steal millions of dollars and such. And more damage is done along those lines, but I mean you can actually burn down somebody's house. Hahahaahha
Then, I hit upon this link:
http://mashable.com/2010/10/09/google-cars/
First, this would be like GM getting into the home-ownership mortgage market.
Oooooops!
I guess they did that. Ha
But I have watched the latest commercials demonstrating where cars actually wake up the driver; stop the car in an instant to avoid a rear-ender; parallel park your vehicle and tell the world exactly where you are on a global grid. http://www.youtube.com/watch?v=oUKO2dumwaY
How in the hell Google avoids civil liability on all of this is beyond me. I mean my PC screws up all the time and I end up going to the manufacturer's website and connect with some guy in Mexico or India to straighten out the problem. This was primarily during the first three months of ownership.
So your car computer pushes on the gas pedal instead of the brakes and you end up going through the windshield because the air bags never activated....
And fine, there will be contractual clauses in the purchase agreement removing all liability as far as Google is concerned except those contractual clauses do not apply to third parties.
(This last link is some short memo from an attorney—it is meaningless in the sense that there are literally hundreds of thousands if not millions of pages written on this subject)
I really do not think that Google has had the opportunity to bribe as many members of Congress as Wall Street so I do not predict some Federal Law on the horizon protecting Google on this front.
And what if some hacker decides to turn your car into a creature from a Steven King novel? Good Luck!
Xxxxxxxxxxxxxxx
On a different note, sometime ago I latched onto Firefox. And I would spend hours attempting to disengage any semblance of E from my PC.
Well I also learned that for more than two years, half of my problems related to my provider (a cable company). The wiring in my aprtment building was screwed up.
Firefox became more and more insufferable even after the provider finally fixed the problem.
So I was relating this to TPC and he said to get back to E.
I have hated E so long that I ignored the advice.
Well Firefox blew; it just crashed. It does not work anymore on this computer.
So I ended up on E.
All my problems are gone. In a flash.
Evidently E worked on all of its issues these past three years and vwella...it works.
No pop-ups at all. And I am working out the tool bars and after six hours today, the system works wonderfully.
I have no problems with scrolling.
I just thought I would relay this experience on.
Although, as a creature of habit I am sure I will forget and link on the net
through Firefox tomorrow AM anyway. hahahaha
I do not know if others have had troubles with Firefox, but I could never attack this program because my cable link was so damn bad.
Oh well.
I know one thing for sure. The internet changes daily!
Old men like me do not like change.
Hahaha
the end
Comments
"Charlie Miller, principal research consultant at Accuvant Labs, said he has found a way to manipulate chips embedded inside Apple laptop batteries."
To me, it always come back to, 'Sure, you can do that, but why would you want to?'
What enjoyment does a hacker get from causing misery to people he or she has never met? Is this a form of remote sociopathic hostility? Is it virtual anarchy? Or just the complete and utter lack of a soul? I can understand the monetary motivation for hackers breaking in to encrypted sites and draining bank accounts or messing with large corporations in order to get some kind of revenge. That's criminal and morally wrong, but it makes sense. Causing harm to people you don't know, for the same reason dogs lick their balls, (because they can), just seems odd and somewhat pathetic. Or perhaps I'm just getting old ...
by MrSmith1 on Fri, 07/29/2011 - 8:03am
Picture this: you see Beck with a Macbook Pro on his lap. Can you honestly tell me you wouldn't be the least bit tempted?
by Verified Atheist on Fri, 07/29/2011 - 8:45am
I'd be a lot more than tempted, I'd be motivated. LOL
But that's not what I'm talking about. I'm talking about harming people you don't know and will never meet.
by MrSmith1 on Fri, 07/29/2011 - 9:34am
A good hacker knows how to choose his/her targets.
Step 1: Identify where Beck will be.
Step 2: Set up a "free" wireless hotspot near him.
Step 3: Just to make sure there are no innocent bystanders, set up the virus to be downloaded only when the browser searches on "Nazi porn"
Step 4: Success!
by Verified Atheist on Fri, 07/29/2011 - 9:42am
GREAT MINDS THINK ALIKE. HA!
by Richard Day on Sat, 07/30/2011 - 7:04pm
Atheist kind of hits all of the points but people do do damage just to see the results in the newspaper! ha
by Richard Day on Fri, 07/29/2011 - 12:46pm