<$BlogRSDUrl$>

Saturday, March 26, 2005

Supreme Court Will Rule on ISP's to be gaven Cable Access 


"Facts do not cease to exist because they are ignored."-- Aldous Huxley

As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.

Wayne Rash - eWEEK

When Brand X, a California ISP, gets its day in the Supreme Court on Tuesday, there will be a lot more at stake than whether the company can get access to cable lines. In fact, depending on the details of the court decision, the case could determine the way in which the Federal Communications Commission (news - web sites) regulates phone and information companies.

At the core of the case is Brand X. The ISP wants the FCC to require cable companies to sell access to their networks at wholesale in much the same way that EarthLink Inc. and other ISPs are sold access over DSL networks.

Stay tuned

MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

Thursday, March 24, 2005

Man Sells Device That Blocks Fox News 


"Facts do not cease to exist because they are ignored."-- Aldous Huxley

As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.

Man Sells Device That Blocks Fox News
By EMILY FREDRIX, Associated Press Writer
It's not that Sam Kimery objects to the views expressed on Fox News. The creator of the "Fox Blocker" contends the channel is not news at all. Kimery figures he's sold about 100 of the little silver bits of metal that screw into the back of most televisions, allowing people to filter Fox News from their sets, since its August debut.

The Tulsa, Okla., resident also has received thousands of e-mails, both angry and complimentary — as well as a few death threats.

"Apparently the making of terroristic threats against those who don't share your views is a high art form among a certain core audience," said Kimery, 45.

Formerly a registered Republican, even a precinct captain, Kimery became an independent in the 1990s when he said the state party stopped taking input from its everyday members.

Kimery now contends Fox News' top-level management dictates a conservative journalistic bias, that inaccuracies are never retracted, and what winds up on the air is more opinion than news. "I might as well be reading tabloids out of the grocery store," he says. "Anything to get a rise out of the viewer and to reinforce certain retrograde notions."

A Fox spokeswoman at the station's New York headquarters said the channel's ratings speak for themselves. For the first three months of this year, Fox has been averaging 1.62 million viewers in prime-time, compared with CNN's 805,000, according to Nielsen Media Research.

Kimery's motives go deeper than preventing people from watching the channel, which he acknowledges can be done without the Blocker. But he likens his device to burning a draft card, a tangible example of disagreement.

And he's taking this message to the network's advertisers. After buying the $8.95 device online, would-be blockers are shown a letter that they can send to advertisers via the Fox Blocker site.

"The point is not to block the channel or block free speech but to raise awareness," said Kimery, who works in the tech industry.

Kimery doesn't use the device himself; his remote is programmed to only a half-dozen channels. Plus he occasionally feels the need to tune into Fox News for something "especially heinous."

Business could pick up since the blocker was alluded to in a recent episode of the ABC drama "Boston Legal." The show's original script mentioned Fox News, but ABC had the references removed.

The boisterous conversations on Fox News may be why the station is so popular, said Matthew Felling, media director for the Center for Media and Public Affairs, a nonprofit, nonpartisan media watchdog group. And despite a perception that Fox leans to the right, Felling said, that doesn't mean people who lean left should tune out.

"It's tough to engage in an argument when you're not participating in it," Felling said. "It's just one more layer in the wall that the right and the left are building in between each other."

Fox Blocker: http://www.foxblocker.com



MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

Wednesday, March 23, 2005

Do you remember me telling you of "whois"? That how you find out who owns a website. 


"Facts do not cease to exist because they are ignored."-- Aldous Huxley

As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.

Whois Privacy vs. Anonymity

From CircleID Privacy Matters

By Bob Parsons

The story can from http://www.circleid.com/article/986_0_1_0_C/



The Internet is often a lawless place. Everyone knows that there are many tricks and traps lurking on the Internet, just waiting to prey on unsuspecting and innocent users. Some of these traps will trash your computer while others will turn your PC into a zombie that will broadcast messages at the virus writer's command. Still other traps steal people's identity and in addition to stealing their money and good name, victims have to endure an incredible amount of hassle. Then there's spyware. The list of annoyances and downright criminal activities seem endless.

Law enforcement is just getting around to cleaning up the internet.

To make the Internet a safer place both legislators and law enforcement are now focusing on the Internet. In the crossfire that's taking place there are many ideas that are being offered up. Some of them are good and some are not. One bad decision that was recently forced upon the Internet community (without hearings -- more on this later) was to eliminate private domain name registrations for .US domain names. The purpose of this article is to explain why private domain name registrations are a good thing, and how they actually make the internet a safer place.

First, why the public WHOIS database is important.

The information in (or associated with) the WHOIS database is important to law enforcement, intellectual property and other attorneys, who use this data to locate domain name owners for the purpose of enforcing laws or addressing grievances. In certain cases, however, the information in the WHOIS database is not accurate. This is where the problem caused by anonymity rears its ugly head.

The problems with the public WHOIS database.

There are two big problems with the WHOIS database. One is that often times the information within the database is inaccurate. Inaccurate information happens mostly because some registrants who want to achieve anonymity -- for a myriad of reasons, some of which are despicable -- provide false information to begin with. The second problem with the WHOIS database is that there are many law abiding citizens who also, for a myriad of reasons, want their personal information not made available to the public.

Making the public WHOIS database 100% accurate has proven elusive.

Various government agencies, intellectual property organizations, attorneys, and others have long wrestled with how to improve the accuracy of information in the WHOIS database. To date, they have not been able to find a way to guarantee or even improve the accuracy of this information.

It is now illegal to provide false information when registering a domain name.

Last year, there was a brief attempt to make registrars responsible for the accuracy of the Whois database. Fortunately, that legislation failed. What did become law was a new, stiff penalty (7 years) for providing false WHOIS information. While this looming jail time might have some sway over US-based crooks, it will do little to get accurate information from those who live overseas.

Private domain registrations have the most accurate registrant information.

The most accurate domain registration information is that associated with private domain name registrations. The reason this information is accurate, is because people pay to make it private. If it wasn't accurate, if the information was false to begin with, the registrant would simply leave it as is. There would be no reason to incur the added, small expense of a private registration. Most law enforcement agencies and other intellectual property oriented organizations understand this fact, and support private registrations. In fact, every intellectual property organization and law enforcement representative that has contacted us regarding our private registration service has supported the service because of the accuracy of the underlying data compared to the general inaccuracy in the WHOIS database as a whole.

The reason law enforcement supports private registrations is that in addition to the information being the most accurate associated with domain name registrations, there's an added bonus. That bonus is accountability. Law enforcement knows that if it has an issue with a private domain name registration, that it will not only be able to find the actual registrant, but that the registrant will be accountable for whatever the issue happens to be. This is not the case with public WHOIS registrations, where anonymity is achieved by providing bogus information. There's often no way to track down a registrant who provided false information when registering their domain name.

Making the entire WHOIS private is not a good idea.

One last comment concerning the importance of private domain name registrations: There has also been talk about making the entire WHOIS private. This would not be a step in the right direction. There are several reasons why it wouldn't work. First, there are significant, additional costs for the registrar to manage private registrations. These costs include the daily processing of subpoenas, requests from law enforcement and complaints from companies and individuals. To this, add the cost to litigate lawsuits that are filed almost on a daily basis. These lawsuits typically involve copyright and/or slander complaints, and usually name the registrar as well as the domain holder. Presently, this cost is paid for by those who want private registrations. If all registrations are made private, the cost would be added to all registrations.

The other reason why making the entire WHOIS private is not a good idea, is that it would place an added burden on everyone (i.e., law enforcement, intellectual property and other attorneys, etc.) who need to get at the WHOIS information. Today, because of our public WHOIS, it is easy to determine if information associated with a public registration is valid or not. If the entire WHOIS would be made private, there would be a number of added and unnecessary steps to make this same determination. So you see, it's much better to keep the WHOIS public but allow those who want private domain name registrations the ability to purchase them.

It's important to understand the difference between privacy and anonymity.

This brings me to the issue of privacy versus anonymity. Not long ago, I was discussing this issue with David Lawrence, one of the most intelligent persons I know who just always seems to "get it." After I finished describing to him that the National Telecommunications and Information Administration (NTIA) ruled, without hearings of any kind, that private domain name registrations for .US domains will no longer be allowed, David commented that the issue is really one of privacy versus anonymity. He explained that privacy should be allowed, because with privacy comes accountability. Thus, Americans and others who enjoy privacy are law abiding citizens, and have no reason to fear being accountable for their use of privacy.

The NTIA edict makes the Internet a worse, and less safe, place.

What the NTIA is concerned about, and what their recent edict does not achieve, is the reduction of anonymity. In fact, it does just the opposite, because it now encourages those who want privacy for .US domain names to provide false information -- thus achieving anonymity.

Criminals seek anonymity, not privacy.

It's been my experience that those who are the criminals of the Internet, and who are engaged in spamming, phishing, pharming, identity theft, etc., take whatever actions they can think of to make themselves as anonymous as possible. Thus, when law enforcement and others attempt to track these crooks down, it's either very difficult or impossible. This is the problem with anonymity -- there is no accountability. Often, those who seek anonymity typically do so because they are up to no good, and want to be sure that they don't have to answer for whatever evil they are perpetrating.

Registrants who purchase private registrations have no problem with accountability.

In contract, those who seek privacy are fine receiving it with accountability. Law abiding citizens have no problem being held accountable for their actions. This is because, well, they are law abiding. So when people pay for private domain registrations they typically send three messages. The first message is that they are law abiding citizens; the second message is that they are willing to be held accountable for their actions; and the third and most important message, is that the registration information they are providing is valid.

Law abiding Americans are entitled to privacy.

The overriding message of this article is that the absolute, most accurate information associated with domain name registrations, is the information provided with private domain name registrations. The NTIA's decision to eliminate private .US registrations accomplishes exactly the opposite of what it wants to achieve -- better information that is more readily available. Instead, what the NTIA has done (besides denying law abiding Americans their Constitutional right to privacy) is to increase the anonymity in an already anonymous, wild, and often lawless Internet. And that is in nobody's best interests.


MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

FYI, Drive-by Trojans exploit browser flaws 


"Facts do not cease to exist because they are ignored."-- Aldous Huxley

As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.

By John Leyden, The Register

Analysis Trojans - malicious programs that pose as benign apps - are usurping network worms to become the greatest malware menace. Sixteen of the 50 most frequent malicious code sightings reported to Symantec in the second half of 2004 were Trojans. In the first six months of last year, Trojans accounted for just eight of the top 50 malicious code reports.

Symantec blames Trojans for an upsurge in client-side exploits for web browsers. Trojans create the means to deliver malicious code onto vulnerable Windows PCs. Browsers are the primary target, but flaws in email clients, peer-to-peer networks, instant messaging clients, and media players can also be exploited in this way.
Browser beauty contest

Between July and December 2004 Symantec documented 13 vulnerabilities affecting Internet Explorer and 21 vulnerabilities affecting each of the Mozilla browsers. Six vulnerabilities were reported in Opera and none in Safari.
END

There's nothing new here, ya know. keep your AV (Anti Virus) up to date
and avoid certain types of sites, porn and hacked software sites, some gambling sites as well. That is about all you can do today and be sure your software
has its currrent patches. Steelhoof

scan scan scan, and be careful out there. D


MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

Tuesday, March 22, 2005

Combating Wi-Fi's Evil Twin, another HACK 


"Facts do not cease to exist because they are ignored."-- Aldous Huxley

As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.

Mark Long, wireless.newsfactor.com

Just when wireless hot-spot surfers thought it was safe to get back into the water, hackers have come up with new methods for mimicking corporate Web sites and intranets in the 802.11 environment.

Wi-Fi’s "evil twin" is basically a hacker who infiltrates a company by picking up its SSID (Service Set Identification) and learning what type of encryption is being used while sitting in a convenient spot outside the building, said IBM (NYSE: IBM - news) global solutions manager for managed security services Doug Conorich.

"Then the hacker will use a WLAN tool like Airsnort or other available freeware to suck off information about who is connecting to whom and what is happening on the Wi-Fi network," Conorich told NewsFactor.

The intruder will attempt to gain entry by posing as one of the access points of the company, masquerading as a corporate network or "the man in the middle," by using an antenna that is stronger than the one in the internal access point, Conorich explained. "Wi-Fi is going to connect to the strongest signal that is out there. And if the hacker has the stronger signal, then corporate people will latch onto it -- and the hacker will be able to take their credentials by emulating the corporate Web site."

A New National Pastime?

Although wireless hacking is rather new, it already is becoming something of a national pastime. There are clubs around the U.S. that are devoted to so-called "war chalking." "When club members find an access point, they will chalk it on the sidewalk, using a code that says whether the access point is open or closed, and gives the SSID and the channels being used," notes Conorich.

"People go out on a Friday or Saturday night, walk around and find as many access points as they can as a sort of contest," Conorich said. "In New York City, there is a Web site called NYCwireless that logs all of the Wi-Fi access points seen around the New York City area and lists their addresses, operating channels, and so on."

Although war chalking is not a threat to the enterprise in and of itself, it can become a prelude to "war driving" -- a game that involves driving around looking for vulnerable access points that may become targets for hack attacks at a later date, Conorich added.

Hiding the SSID

"Normally, what companies do to protect themselves is to hide their SSIDs by turning off their broadcast," said Conorich. "This forces hackers to know the SSID.”

But, if hackers wait long enough, they will be able to deduce the SSID -- the unique ID with a maximum of 32 characters that is attached to the header of a packet, notes Conorich. "Each probing laptop is going to send that SSID over the airwaves in clear text, so if I am monitoring the signal, I am eventually going to see what that SSID is."

Whenever possible, I.T. managers should avoid installing access points that will radiate signals beyond the confines of the physical enterprise. This will make it less likely that hackers can intercept enterprise traffic from the corporate parking lot.

Nevertheless, a hacker equipped with a highly directional antenna can pick up Wi-Fi signals over quite a distance, notes Symantec (Nasdaq: SYMC - news) senior director of engineering Alfred Huger, who acknowledges that a 3-meter dish left over from the early days of satellite TV certainly would do the trick.

Securing Existing Wi-Fi Corporate Nets

"At the base level, you need to make sure that WEP encryption is on, which sounds like a trivial matter, but many companies don't bother to encrypt their traffic at all," Huger told NewsFactor.

"And if you require the traffic to go through a VPN server, then the hacker will not be able to emulate the VPN connection --because that will force everybody to encrypt all their traffic," Huger said. "But no matter what you do, it does not stop people from trying to get to you," he acknowledged.

"If only VPN traffic is allowed to pass through the network, then, yes, protection can be had, inasmuch as total protection is humanly possible to achieve," Huger said. "But even then, the I.T. manager must always keep in mind that 'where there's a will, there's a way.'"



Routing users through a VPN does not preclude someone from getting onto the network and taking part in LAN traffic, notes Huger. For this reason, I.T. managers should consider not tying the Wi-Fi network directly to their corporate LANS.

A Proactive Approach

Businesses can take a more proactive approach by deploying a wireless intrusion-detection technology that connects to the system in much the same way as a wireless access point. But rather than handling traffic, the wireless sensor just "sniffs at all the traffic that goes by," notes Conorich.

"It allows companies to inventory all their assets, know every AP up on their area, every wireless device probing, then take an inventory that identifies which ones are theirs," says Conorich.

The next step is to determine the rogue access points, which basically fall into two categories: the rogue Access Point (AP) set up on the network, and the APs of a neighboring company or a Starbucks (Nasdaq: SBUX - news), which may be free access or corporate in nature. "Even though the latter don't belong to you, you'll need to want to identify them before you can ignore them," advises Conorich.

Public Hot-Spot Scenarios

Wi-Fi’s phishing also represents a serious threat to mobile workers, because it is all too easy for hackers to set up a false Web page that mimics a public hot spot in the airport or the local coffee shop.

The hacker merely needs to gain one-time access to the source to make a Web site copy that will be able to trick Wi-Fi surfers into disclosing private information, says McAfee AVERT Research Fellow Jimmy Kuo. Then, all that's required is for the spoofer to generate a signal that is strong enough to overwhelm the genuine hot spot AP.

Probably the only thing that would alert someone to the fact that they were being spoofed would be that the genuinely secure sites "typically operate under 'https,' while those mimicked would just be under 'http.'" Kuo told NewsFactor.

"One of the first things you want to do after logging on to a public hot spot "is to immediately log onto to the corporate network through the VPN process, which will encrypt every single transmission coming in and going out of your machine," Kuo advises.

"But the general rule is, if you are out in public, then assume that everything you do is in public," he says. If you are going to open an account over a public hot-spot connection, for example, "then you’d better make sure it doesn't have an open credit line."

Forcing the VPN connection

I.T. managers worried about hacker infiltration over notebooks parked in public may elect to deploy an anti-virus product -- such as Symantec Client Security, which incorporates a location-awareness function that allows the amount of network protection to change automatically, based on notebook location.

When the software program senses that the laptop is outside of the corporate firewall, then it automatically forces the network-connected device into running a VPN session, says Symantec Group Product Manager Kevin Haley.

"Once this happens, all traffic is encrypted to prevent someone from being able to listen in," Haley told NewsFactor. "So you can sit in a coffee shop on a Wi-Fi connection and have the same firewall protection as if you were behind the network gateway."

The software uses a number of criteria -- including domain and IP address -- to determine where the network-connected notebook is located at any given moment, Haley said. The software also gives I.T. managers the ability to establish a specific VPN policy for notebooks or even push a new policy out to the clients at will.
END



MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

This just learned, ID Theft stats for 2004 


"Facts do not cease to exist because they are ignored."-- Aldous Huxley

As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.

9.3 million victims in the U.S. adding up to 53.6 Billion in Damages. Only 11.6% online. Lets see 10% of 53.6 Billion would be $5.36 Billion dollars. That onlline figure is down from a year ago, I hope that some credit may belong right here.



MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

what to know where that area code is before you call it, look at this site 


"Facts do not cease to exist because they are ignored."-- Aldous Huxley

As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.


http://www.bennetyee.org/ucsd-pages/area.html Your welcome.

MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

Do you know what MOB CASTING is? 


"Facts do not cease to exist because they are ignored."-- Aldous Huxley

As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.

Well, have you heard of PODCasting? Do you know what a iPod is?

MOBCASTING is blogging on the move via a recorded MP3 file to your blog from your web enabled cell. I know! but it's out there. Interested go to audlink.com. I don't know how audlink.com can tell if your on a cell or not but go find out and let me know. I too buzy trying to keep you safe to do it for myself.

Audlink's phone # is not an 800 #, so you'll want this website too to make that a FREE phone call, http://www.skype.com/. Skype's service is Free as well. Free phone calls for FREE, I like that.


MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

Monday, March 21, 2005

A fun way to get your news site 


"Facts do not cease to exist because they are ignored."-- Aldous Huxley

As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.

The news is mapped on this site, fun.
http://www.marumushi.com/apps/newsmap/newsmap.cfm



MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

McAfee admits buffer vulnerability 


"Facts do not cease to exist because they are ignored."-- Aldous Huxley

As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.

McAfee has admitted that older versions of its anti-virus software engine contain a security flaw that allows remote hackers to inject malicious code onto users' machines and take them over.
The rest of the story

Remember, I switched to Nortan and then AVG way back. Maybe you'll switch now! I don't do all this research for kicks ya know.

Another switch you might make is to Firefox. It's free. And when you get onboard with Firefox, remember it's safer than using Microsoft's IE, you want to have copy of Opera

MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

Sunday, March 20, 2005

There's a fun place to go on the net and how to go there safely using dodge-it.com (it's free) 


"Facts do not cease to exist because they are ignored."-- Aldous Huxley

As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.


http://www.plinko.net/404/ And what's there? 404 pages, which is getting to be a fun thing to creat.
What does 404 mean?
404 is an HTTP status code. Every time you visit a web page, your computer (the 'client') is requesting data from a server using HTTP, or Hypertext Transfer Protocol. Before the web page is even displayed in your browser, the web server has sent the HTTP header, which contains the status code. Not surprisingly, your browser has sent the server its own headers, which contain a lot more information about you than you think!

For a normal web page, the status is 200 OK. You don't see this because the server proceeds to send you the contents of the page. It's only when you encounter an error that you see the actual status code, such as 404 Not Found.
More than you wanted to know again, right? Well, that me. Here's one that was made up for those of you that are big on God, http://skribb.net/error_docs/not_found.html and here's another that uses sound for even more fun on thier 404 page, http://www.locksley.com/404.html

Now you'll notice that on the home page for 404 Research Lab you can gave them an email address and they'll send you a news letter. OH Boy! You've been there and done that, right? WEll I've got something for ya...

http://dodgeit.com/
"dodge it" is a site that gaves you a "throw-away" email address that you make up. Why would you want a "throwaway address", well, lets say you DO want to get that newsletter from where ever but you've been down that road before and you noticed that last time you did that that your inbox at that address started getting a TON of mail. Your right, that newletter or whatever free thing that asked for your email address "GOT YA" Well, that's what a throwaway address is for and http://dodgeit.com/ kepts your other inbox clean so make up an address that you can gave out and not do yourself harm.

MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

You ask and I do, "A meaning", Router 


"Facts do not cease to exist because they are ignored."-- Aldous Huxley

As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.

(row´ter) (n.) A device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP’s network. Routers are located at gateways, the places where two or more networks connect.

Routers use headers and forwarding tables to determine the best path for forwarding the packets, and they use protocols such as ICMP to communicate with each other and configure the best route between any two hosts.

Very little filtering of data is done through routers.



MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

This page is powered by Blogger. Isn't yours?