Reader Tips
Garth Brooks is playing Saskatoon this week to sell out crowds, so it seems appropriate to follow suit. The Thunder Rolls.
I Felt A Great Disturbance In The Narrative
Fox News: Prosecutors hid key testimony in Freddie Gray case
In All Thy Gender Neutral Command
No criticism of MP Belanger but what Libs R doing is a disgrace. Parliament isn't the Children's Wish Foundation https://t.co/2LBEmugI4X 1/2
— Lorrie Goldstein (@sunlorrie) June 10, 2016
If there are any (God forbid) terminally ill Conservative MP’s listening, please see what you can do about our property rights.
Bill’s Wife
My only surprise is that this was allowed to be shared on Facebook:
Faster, Please
Ottawa: Enormous sinkhole opens in enormous sinkhole.
h/t Jamie
7 Year Recovery Watch Remains On High Alert
More than five years after economists announced the end of the recession, fertility levels have still not recovered. As a result, more than 3.4 million fewer babies were born in the United States between 2008 and 2015 than would have been expected if pre-recession fertility rates had been sustained. In each of the last five years, this birth deficit has resulted in roughly 500,000 fewer births,” said the study.
RIP, Mr Hockey
Keeping Up With The Fruit Fly Guy
Watch as I take you through the documents showing just how much the University of Ottawa was willing to cater to Suzuki in exchange for an anti-Conservative speech.
Reader Tips
Burning House – Cam. Your tips thread is open for the evening.
The Decline And Fall Of The American Empire
Here’s how it works. If a trooper suspects a person may have money tied to some type of crime, the highway patrol can scan and seize money from prepaid cards. OHP stresses troopers do not do this during all traffic stops, only situations where they believe there is probable cause.
“We’re gonna look for different factors in the way that you’re acting,” Oklahoma Highway Patrol Lt. John Vincent said. “We’re gonna look for if there’s a difference in your story. If there’s someway that we can prove that you’re falsifying information to us about your business.”
Troopers insist this isn’t just about seizing cash.
No, nothing to do with that.
What’s The Opposite of Diversity?
University: Satirical Anti-Safe-Space Publication ‘Crosses the “Free Speech” Line’
Blog Notes
Red Rose Country
This strikes close to home, Anyone who knows me would understand.
This will devastate the greenhouse industry.
Well, there’s the problem.
The group laid out a plan to bring 400 Yazidi families living in refugee camps in Kurdistan to Canada, but officials with the group said the plan was ignored.
Reader Tips
Work Ethic Is Still Proven To Exist & Environment Canada Throws A Spear At The Greens
77% of Swiss voters just rejected a proposal to introduce a $3000 guaranteed basic income for all. Supporters wanted it because it would allow them to focus on their passions and not go to work.
Meanwhile those who don’t like to work have just taken a hit from Environment Canada. Apparently if the Oil Sands were entirely shut down, carbon emissions would be cut by an infinitesimal 12/100th’s of 1 percent! Seems a good time for a cost/benefit analysis.
On the Eve of the Olympics
Liberals, being Liberals
This article actually has two news items in it.
The first is that the Liberals were warned by PricewaterhouseCoopers that sole-source contracts are idiotic.
The second is:
The government says there is looming capability gap when it comes to the CF-18s, which has caught observers and the opposition by surprise, since the previous Conservative government decided to spend hundreds of millions of dollars to keep the jets flying until at least 2025. The Commons defence committee was told last month it would cost about $400 million to overhaul the 77 CF-18s.
Which, to me, reads a lot like helicopters.
University of Calgary
The single largest vulnerability in any computer system is between the keyboard and the seat.
This is what happened:
Patient Zero gets an email something along the lines like:
Dear Customer,
Courier was unable to deliver the parcel to you.
You can review complete details of your order in the find attached.
Yours faithfully,
Greg Marks,
Sr. Support Agent.
Which naturally has an attached zip file for you to open and examine this package you didn’t get.
Patient Zero tries to open the zip…except they haven’t upgraded WinZip or WinRar recently and it’s a spoofed name. It isn’t a zip file at all, it’s just named that.
The trojan is now on your system and here it gets more complicated based on the attackers, the variants of the virus, etc. Some will provide a point of entry for crackers to investigate the system/s, others will silently monitor the traffic for a while, the earlier variants will immediately start encrypting your system and any other network share attached to the system for which the user has write permissions. The later variants watch for backup processes to execute so that they can learn how to toast your backups too. (Which takes me on a separate rant on how using Windows/NFS shares for push backups without checking authentication is asking for trouble.)
So, PZ has toasted their system, toasted the company backups, toasted the company wide network share, because s/he was the accountant the Financial share is also toast. IT just ran basic backups to a Windows share instead of things like rsync over ssh to a root only mount and so the last three months of backups are also encrypted. Worst case scenario, the MIS system or production systems get done too.
What does the company do? You can’t ‘unencrypt’ it without the key. You get an email or a pop up telling you to send $20k worth of bit-coins to the attackers.
How to stop this
Lesson one: NEVER OPEN EMAIL ATTACHMENTS FROM YOUR EMAIL PROGRAM.
Obviously ignore them from anyone you don’t personally know, but secondly save them on your system and scan them with your anti-virus before you open them. Usually you right click on the file and can select ‘Scan with xyz anti-virus’.
Lesson two: Turn off your darned shares. If you access ‘Calgary Office Share’ once per week, you don’t need a network share on your desktop to it. Learn how to mount it on demand. Hint: type \\machine\share in the URL bar in your file browser.
Lesson three: Companies need to start firing people over this instead of just the IT people who enabled it.
Lesson four: Start using the ‘Junk’ or ‘Spam’ tag on your email program. ‘Mark as Junk’ in Thunderbird. They are fairly advanced Bayesian filters that learn over time. But you have to teach them. If you don’t mark an email as Junk or Spam, it won’t learn and can’t identify subsequent spam. This must be a habit.
Lesson Five: Never trust the company/internet provider anti-virus on the mail server, if it even has one.


