Author: David

Bill’s Wife

Hillary Rodham Snowden

The U.S. intelligence community is bracing for the possibility that former Secretary of State Hillary Rodham Clinton’s private email account contains hundreds of revelations of classified information from spy agencies and is taking steps to contain any damage to national security, according to documents and interviews Thursday.

Seafood Chowder

When certain people are away, I eat all the things that certain people refuse to touch. This is one, and one of my favourites.
Bottom-Dwelling, Crap-Eater Chowder
1/2 cup butter
One onion, chopped
Once celery stalk, chopped
Two potatoes in small cubes.
4 Tbsp of flour
salt,
pepper,
paprika
thyme
basil
3 cups of milk
Whoops Forgot about the two cans of condensed Creme Mushroom soup.
3 cups or so of chopped frozen seafood.
Cook the seafood as per the package instructions. On medium heat, melt the butter and saute the onion, celery and potato until soft. Add the flour and spices to thicken. Add the milk and Condensed soup, add the cooked seafood. Judge the thickness of the chowder as you heat it, if it’s too thin, add a bit more flour. Bring almost to a boil, take it off the heat and let it cool.

29Jul15, Win 10 and you.

If you haven’t signed up, wait. If you have, then I recommend using Clonezilla this weekend to snapshot your hard drive. MSFT has assured us that all machines running Win7 or Win8/8.1 will support Win10. I guess we’ll see.
Clonezilla is a Linux based boot disk (CD/USB) that will ‘ghost’ your drive sector by sector. It writes a recoverable image to an external USB drive. If you speak the language, it’s basically dd > tar > gz, although it offers a variety of options.
I plan on running it tonight on my Win7 machine that will be upgraded to Win10 on the 29th.
It’s a very easy program to use, just _read_ all of the dialog screens. There’s only two things you really need to be absolutely sure of:
Which is the device you’re writing to, and
Which is the device you’re reading from.
You really don’t want to get those mixed up.
On average, over USB 2.0, it’ll take about 1 hour per 100G of data depending on the data. It compresses and packs the data in (default) 2GB files. It’s a sector copy so you can’t use it to retrieve specific files, it will recover all of the drive, all of a partition, or nothing.
I use it on every machine that comes into my shop, before I start working on it. If I screw up and make a machine unusable, I need to be able to return the machine back to the state in which I received it. I’ve recovered from the clonezilla images exactly twice, once on WinXP and once on Win7. Both recoveries performed as expected.
Instructions are on the site on how to burn the ISO’s to a CDROM or to extract the Zip file to a USB thumb device, so all you really need is a suitably sized external USB hard drive.

Settled Science

Read the whole thing.

But the commentators ignore all these caveats and babble on about warming of “up to” four degrees (or even more), then castigate as a “denier” anybody who says, as I do, the lower end of the scale looks much more likely given the actual data. This is a deliberate tactic. Following what the psychologist Philip Tetlock called the “psychology of taboo”, there has been a systematic and thorough campaign to rule out the middle ground as heretical: not just wrong, but mistaken, immoral and beyond the pale. That’s what the word denier with its deliberate connotations of Holocaust denial is intended to do. For reasons I do not fully understand, journalists have been shamefully happy to go along with this fundamentally religious project.

#NotACult
Link fixed.

Symptomatic of a Larger Problem

Truth.

Unfortunately, there is no patch for systematic incompetence. No amount of money, new cybersecurity authorities and organizations, or smart hackers lured away from Silicon Valley firms will compensate for the depressingly obvious realization that our government does not care about technical expertise or cybersecurity outcomes writ large and is not at all interested in accountability.

Sigh.

So, just to reiterate:

  1. The OPM hack gives everything, including contact info.
  2. To help protect employees the Feds source a private credit protection company.
  3. They send the connection info out via the same medium that was vulnerable in the first place.
  4. Are surprised that…they’ve created another vulnerability.
  5. They go back to #1.

I’m just so glad that Justin Trudeau is so hyped about giving Canadians a voice that he’s all in favour of online voting.

Navigation