The powers that be in the Corps thought that the Ceres mineral may have potential for an Alcubierre drive that could let man expand to the stars. Corps miners had extracted some and found negative energy density (a mass lower than that of the vacuum, negative mass)–a type of exotic matter never before found. Now a folded manifold of space-time around the ship could, theoretically, bring two points together. The ship jumps from the first point to the second, faster than light.
Month: December 2023
Post-Christmas Cautionary Tech Settings and Practices
So your living room may still have wrapping paper on the floor and it was easy to unwrap those gifts and forget to set them up correctly. Use the following settings and practices to make your new gadgets run privately and securely:
- Set up privacy settings that can help you locate your new, missing devices, like “Find my…”
- Physical privacy can be improved with a privacy screen protector, so you won’t have eavesdroppers sitting or standing next to you tuning in.
- Set up anti-malware software on your new devices.
- Clean the data off your old devices and recycle them.
- With new computers, tablets, and TVs, disable ads and tracking.
- Set strong passwords/passphrases, PINs, and multi-factor authentication.
- Turn on backups!
- Use Brave or Vivaldi.
These are indispensable actions. I hope you had a great Christmas!
Divorced from history / Too long; don’t read
A knee-jerk progressive doesn’t need to read Shakespeare or any other white male. They know the answer to any encounter with greatness.
Even out there
Out in the Kuiper Belt/the immensity, human companionship is still necessary. What are extraterrestrials also without God?
Merry Christmas,
The Needy Human
Christmas Greetings From Your Local Scammer
Some basic cyber practices for the holiday!
- Guard your Personal Identification Number (PIN) in public. Eavesdroppers may be spying on you from behind while you are typing it in or if you write it down. Cover the keypad. Watch for skimming devices attached to ATMs, which can capture your PIN.
- Watch out for indications of tampering or skimming on card readers or someone trying to distract you or offer you help, especially at gas stations, bars, and restaurants. Inform the merchant or authorities if you think you’re a victim.
- When you are traveling, you want to avoid shopping hassles. Head this off by calling your bank or credit card company to notify them. This way, the company will know not to lock your cards for unusual activity.
- Keep your bank and credit cards secure; avoid public display.
- Contactless payments through an RFID credit card (contactless or tap-to-pay cards) are among the safest purchasing methods. Your RFID-enabled card, smartphone, or other wearable uses encryption and tokenization to protect your personally identifiable information (PII). RFID technology sends information between a tag and a scanner using radio waves. A credit card is RFID enabled if you see the contact list symbol on the front or back (similar to a sideways WiFi symbol). To protect your RFID device, an RFID-blocking wallet can prevent someone from robbing you even if you don’t take it out of your pocket.
- Use the chip on your card rather than the magnetic strip.
- Use a combination of letters, numbers, and symbols for your passwords, update them regularly, and avoid reusing them. A password manager is the best way to create complex and secure passwords.
- If you are shopping online, make sure you see the lock icon or “https” in your browser’s address bar.
- Your credit card or payment service should offer fraud protection.
- Don’t use public WiFi or computers when performing online transactions.
- Take advantage of your bank or credit service’s transaction alerts and review them routinely for unauthorized or suspicious transactions.
- Report to a bank or credit card company if you lost your card or had it stolen. Most times, these companies have 24/7 hotlines for this.
- Beware of phishing emails with links or attachments, and do not expose your PII over the phone or online to any unknown person or company.
- Use anti-malware software to protect yourself from data breaches.
- Don’t use credit cards on public WiFi networks.
- Use the Apple Pay, Google Pay, or Samsung Pay digital wallets to store your credit and debit card information safely. You can use these features on a smartphone or smartwatch, which operates with Near Field Communication (NFC) technology to process your payments. If your device has one of the digital wallets, you can wave your device over a contactless reader for a few seconds to process the secure payment.
- PayPal and Venmo offer an alternative secure purchasing method. You can link them to your bank account, credit, or debit card to a PayPal account to execute transactions without exposing your financial details to a third party and take advantage of encrypted financial data and fraud protection.
- What do you do if you’ve been scammed?
- 1) Change your passwords and call your account provider if you can.
- 2) Review your account statements for any unrecognized transactions.
- 3) Use a Fraud protection service like LifeLock or other identity theft companies. You can get dark web monitoring of your Social Security Number, driver’s license, phone number, email information, and transaction alerts.
- 4) Report cyberattacks to the Federal Communications Commission or other law enforcement.
- 5) Get the advice of a lawyer and then speak with law enforcement afterward, especially if you are charged with a crime.
- 6) Run your own or request a background check.
- 7) Alert the Equifax, TransUnion, and Experian credit bureaus if you want to freeze or lock your credit report.
Schadenfreude for two, please
Trump needs to be prosecuted before the election and/or beaten at the polls. But I don’t like that courts get to decide who is eligible to run.
Should not relish either, really.
Who is to blame?
And we didn’t know who to blame. Was it the administration, that was quiet when the border came down and when youth were confused? Yet, we see the blame leveled at the right, who are not in power. Deflecting and press conferences. Villainization. Refusal to take responsibility.
-Venting
Think Fossil
In the digital age, oil, coal, and natural gas are still used and give us petrochemicals (plastics included) and other fossil-fueled wonder makers:
- Asphalt (roads)
- Toothpaste
- Detergent
- Food containers
- Medicines and vitamins
- Computer screens
- Cellphones
- Keyboards
- Computer mouse
- Mouse pad
- Phone Charger
- Car batteries
- Shirt buttons!
- Paint
- Floorboards
- Window coverings
- Gas for delivering these products to sellers, distributors, and consumers
- Factory machinery
- Wind turbines and solar panels–and, ironically, power backup for those “renewables.”
- AND Food, laundry, heating, driving
In 1950 over 60% of the world’s population was undernourished, but because of insecticides, herbicides, fungicides, and fossil-fueled farm equipment, that number was down to less than 9% in 2019.
But with what global warming we do have, wouldn’t it be easier for the hysterics to advocate using nuclear? You would think so.
What is the hyberbole about right and left? Pt. II
Giuliani has come a long way from NYC mayor and 9/11. It’s sad to see him trying to deny his actions. I do think the amount of the damages was ridiculously high; the man will go broke. But the two election workers asked for tens of millions of damages, not $148 million, as the judge ruled.
As I said previously, The Orange One is a crook. I am disgusted by his behavior and lies. On the other hand, the left one, I also hate hysteria and moral totalitarianism.
The case here is clear: crime can outweigh bad policies. I just don’t want either. The left thinks their freedoms are being taken away. I feel the right is having theirs taken by the DoJ’s institutions (FBI, CIA, courts). There is no judicial autonomy right now.
No one likes censors. No one likes crooks.
So I will go back to my post of a few months back: Trump must be prosecuted and, hopefully, declared guilty — before the election — so a real GOP candidate will be chosen.
Remembering How the Waste Started
Sometime in the 1990s, I visited the United Nations in New York City. In the then-empty Security Council meeting room, I saw the famous United Nations Security Council mural with its Italian Renaissance-like appropriation of Christian imagery. Adding a rising white Phoenix tempers the salvation message by making it relatable to universal audiences.
But this month, we remember how seventy-five years ago, after the devastation of World War II, the UN General Assembly put forward the Universal Declaration of Human Rights (UDHR) for signatures by the UN’s member countries.
What is in this document? Continue reading “Remembering How the Waste Started”
What is the hyberbole about right and left? Pt. I
I am struck that left and right each say that the other’s candidate is autocratic. First, these are not only policies, but they are claims against the other side: Continue reading “What is the hyberbole about right and left? Pt. I”
All I Want For Christmas Is Not To Be Scammed
So, the spirit of Christmas and Hannukah is here: houses and trees lit up, gift wrapping — and scammers. The denizens of the underworld may ruin your holiday while you are concentrating on shopping and giving. They even steal from charitable givers. Continue reading “All I Want For Christmas Is Not To Be Scammed”
Rewriting the Bible, Eyes on Taiwan, Real Estate Problem
It’s pretty audacious of the CCP to rewrite the Bible. To do that, they are truly an atheistic government, an in-your-face move. I know it may seem unrelated, but the CCP’s desire for Taiwan is similar in that they have no qualms about letting their intents be clearly made. As one of the biggest human rights abusers (Uighur, Christian, minorities, and democratic protestors), their boldness is stark.
Domestically, the real estate crisis is serious. The Evergrande collapse is a harbinger, and their credit has just been downgraded.
They are building new coal-burning plants every month and are the largest polluters worldwide; they can’t be reined in. But do the greens care? Strangely, the Left pulls out their Chinese flags, and Newsom cleans up the streets just for them. That’s been in the news a lot, but it’s worth noting.
Note it against the backdrop of Palestinian flags and chants of “from the river to the sea.”
The war for Ukraine must end
A whole generation is now dead. Russia was always the “favorite,” and the money needs to stop.
From Rome to Nothing
On the outskirts, Italy is dealing with a migrant crisis not unlike ours. The glories of Rome despoiled by desperate street merchants looks to be our fate. The Western comfort of backcountry Italy is a casualty of human needs and a slim sign of capitalist remains. The European market represents the diversity of a fragrance. The beer, the pasta, the music. The inability to cope with immensity.
Seeing Signs of Network Compromise? The Guardians of Cybersecurity Can Help
Bug bounties are to the internet what wanted posters were to the Wild West. Companies like Google, Facebook, Microsoft, and government offices like the U.S. Department of Defense have been enlisting professional “white hats” (also “ethical hackers” or “security researchers,” sometimes “penetration testers”) to find weaknesses in their defenses — with hefty cash rewards for those who find them (see appendix at end).
White hats – the guardians of cybersecurity — help you find the vulnerabilities in your systems and networks before the black hats do. If a malicious user compromises your network, you may not know for 60 months. That’s the average time until a business becomes aware that a hacker has been in its network. And many serious problems for your business can occur during and after that time. While big companies like Equifax, Maersk, and Target have become victims of cyberattacks and recovered, small to medium-sized businesses hit by hackers may not survive. SMBs may not have the necessary resources and staff to recover fully. Continue reading “Seeing Signs of Network Compromise? The Guardians of Cybersecurity Can Help”